<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hw-ai-agent-6g-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="Short Title">Requirements and Enabling Technologies of Agent Protocols for 6G Networks</title>
    <seriesInfo name="Internet-Draft" value="draft-hw-ai-agent-6g-00"/>
    <author initials="" surname="Chenchen Yang," fullname="Chenchen Yang,">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Lianqiu Lake, Qingpu District</street>
          <city>Shanghai</city>
          <code>201799</code>
          <country>China</country>
        </postal>
        <email>yangchenchen7@huawei.com</email>
      </address>
    </author>
    <author initials="" surname="Huanhuan Huang," fullname="Huanhuan Huang,">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Lianqiu Lake, Qingpu District</street>
          <city>Shanghai</city>
          <code>201799</code>
          <country>China</country>
        </postal>
        <email>huanghuanhuan9@huawei.com</email>
      </address>
    </author>
    <author initials="" surname="Arashmid Akhavain," fullname="Arashmid Akhavain,">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>303 Terry Fox Drive, Kanata</street>
          <city>Ottawa</city>
          <code>K2K 3J1</code>
          <country>Canada</country>
        </postal>
        <email>arashmid.akhavain@huawei.com</email>
      </address>
    </author>
    <author initials="" surname="Faye Liu," fullname="Faye Liu,">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>9 North Buona Vista Dr.</street>
          <city>Singapore</city>
          <code>117674</code>
          <country>Singapore</country>
        </postal>
        <email>liufei19@huawei.com</email>
      </address>
    </author>
    <author initials="" surname="Xueli An," fullname="Xueli An,">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Riesstr. 25</street>
          <city>Munich</city>
          <code>80992</code>
          <country>Germany</country>
        </postal>
        <email>Xueli.An@huawei.com</email>
      </address>
    </author>
    <author initials="" surname="Weijun Xing," fullname="Weijun Xing,">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>Lianqiu Lake, Qingpu District</street>
          <city>Shanghai</city>
          <code>201799</code>
          <country>China</country>
        </postal>
        <email>xingweijun1@huawei.com</email>
      </address>
    </author>
    <author initials="" surname="Jinyan Li," fullname="Jinyan Li,">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>
          <city>Beijing</city>
          <code>102209</code>
          <country>China</country>
        </postal>
        <email>lijinyan@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="" surname="Aijun Wang," fullname="Aijun Wang,">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>
          <city>Beijing</city>
          <code>102209</code>
          <country>China</country>
        </postal>
        <email>wangaj3@chinatelecom.cn</email>
      </address>
    </author>
    <author initials="" surname="Wencong Yang," fullname="Yang Wencong,">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <street>No. 9 Shouti South Road, Haidian District</street>
          <city>Beijing</city>
          <code>100044</code>
          <country>China</country>
        </postal>
        <email>yangwc27@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="July" day="20"/>
    <area>General</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>keyword1</keyword>
    <keyword>keyword2</keyword>
    <keyword>keyword3</keyword>
    <abstract>
      <?line 118?>

<t>Agent application will be surely the common trend for a long time in future, while agent protocols are so popular that more and more protocols are being worked out. The telecommunication industry plays a pivotal role in the Agent ecosystem. The overall technology success hinges on how telecommunication industry could adopt the latest AI trends in order to handle its specific usage scenarios and performance requirements, e.g., in the coming 6G era. This document will provide the first attempt to analyze the agent protocol requirements and relevant enabling technologies based on mobile communication system specific characteristics.</t>
    </abstract>
  </front>
  <middle>
    <?line 122?>

<section anchor="intro">
      <name>Introduction</name>
      <t>6G as the next generation mobile communication technology will play an essential role in the entire society digitalization process. On one hand, 6G will provide better connectivity compared to 5G, and on the other hand, 6G will go beyond connectivity, for instance, features like native-AI and integrated communication and sensing will enable new business revenues. It could be expected that enormous amount of new use cases and services could be enabled by 6G. However, increased new features as well as increased demands of various use case scenarios will also bring challenges on 6G system design. For instance, how to enrich Telco scope services but remain operationally efficient? How to provide per user network customization without scaling up the service provisioning complexity? How to speed up new service delivery and identify relevant standardization requirement to ensure interoperability?</t>
      <t>Carrying these questions in mind, 6G is seeking answers by utilizing promising technologies like agentic AI (empowered by foundation model), which gained a lot of attention in recent years. Agentic AI technology is rapidly evolving as businesses embrace autonomous systems to streamline operations, enhance decision-making, and personalize/customized user experiences. Therefore, agentic AI could become the essential cornerstone of 6G [1]. Such technology trend is quickly adopted by telecommunication field, for instance, ETSI and 3GPP have launched relevant studies in this scope. ETSI outlined its vision of AI Agent based Core network in [2] and provided a detailed study on use cases and requirements in [3]. 3GPP studied agent services in 3GPP R20 SA1 [4]. Moreover, the work task#3 on AI and agent has been adopted in 3GPP SA2 6G SID [5].</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="characteristics-of-mobile-network">
      <name>Characteristics of Mobile Network</name>
      <section anchor="resource-dynamicity">
        <name>Resource dynamicity</name>
        <t>Mobile networks provide wireless connectivity services in a dynamic environment with resource volatility and link unreliability. To deliver high-quality connectivity services, networks utilize adaptive mechanisms such as real-time resource scheduling, multipath transmission, and dynamic retransmission schemes to mitigate the uncertainty of radio resources and links. Unlike fixed networks with static infrastructure, mobile systems must continuously calibrate resource allocation to maintain link quality and ensure resilience while sustaining service continuity for diverse applications.</t>
      </section>
      <section anchor="guaranteed-quality-of-service-qos">
        <name>Guaranteed Quality of Service (QoS)</name>
        <t>Guaranteed QoS is a fundamental design principle in mobile networks, enabling customized performance to meet heterogeneous application demands. By establishing differentiated resource priorities, networks enforce strict guarantees:ultra-reliable low-latency transmission for critical industrial data transmission, prioritized bandwidth allocation for real-time services (e.g., voice calls, video conferencing), and flexible throughput for non-urgent traffic (e.g., email, file downloads). Such differentiation is also extending to multi-modal services, e.g., XR service and digital twins, enabling consistent performance across use cases and empowering mobile networks as unified platforms for diverse digital services.</t>
      </section>
      <section anchor="mobility">
        <name>Mobility</name>
        <t>Mobility management, a core feature of mobile networks, enables continuous connectivity as terminals move across different locations. Networks trigger seamless handover based on the radio conditions to maintain communication without interruptions. Sometimes network could allocate resources in advance by prediction to reduce latency during transitions. This comprehensive mobility management framework supports various usage scenarios, from stationary to high-speed mobility and cross-regional roaming, making mobile networks essential for critical applications that require constant access.</t>
      </section>
      <section anchor="multi-domain-interoperation">
        <name>Multi-domain Interoperation</name>
        <t>Mobile communication network is multi-technology and multi-business domain in nature and it is important to establish a cohesive connectivity ecosystem for different network operators, network tenants and service providers. From the technology perspective, inter-operator roaming leverages standardized protocols to empower subscribers to access partner networks, ensuring seamless global connectivity. Even within the same Mobile Network Operator (MNO) environment, different network tenants can share the network under the control of the MNO to achieve a better service performance especially for 6G new services like sensing, AI and computing. On the other hand, cross-domain collaboration supports mobile communication network and Over-The-Top (OTT) service providers to exchange capabilities via capability exposure to provide better services for end users. This interoperability not only enhances resource utilization but also unlocks novel use cases, facilitating the development of a unified, scalable network infrastructure that supports diverse applications.</t>
      </section>
      <section anchor="security-privacy-and-trust">
        <name>Security, Privacy and Trust</name>
        <t>The security capabilities of each generation are continuously improving. The security architecture defines security domains, end-to-end security mechanism, roaming security, and backward compatible security measure. Achieving a balance between security and service performance is the principle for security capability design. Supporting multiple security mechanisms and being able to switch between them is essential.</t>
        <t>Privacy preservation can be achieved by encryption, anonymization, zero-knowledge proofs, privacy computing, etc. The network provides users with privacy protection based on the data lifecycle.</t>
        <t>In terms of trust, the centralized trust model and the 3rd party endorsement model co-exist alongside with the multi-lateral trust model. The first two trust models provide single-point trust. The latter multi-lateral trust model offers multiple roots of trust/consensus trust, which facilities the fast establishment of cross-trust domain connections.</t>
      </section>
      <section anchor="session-level-operation">
        <name>Session-level Operation</name>
        <t>In conventional mobile communication network design, PDU session serves as the fundamental granularity for connectivity service management. Through session management, mobile networks perform resource allocation and policy enforcement at the QoS Flow level, where individual service flows (e.g., video calls, IoT telemetry, or cloud gaming streams) are mapped to dedicated QoS flows with specific performance characteristics. Session management systems continuously monitor Key Performance Indicators (KPIs) such as data rate, latency, and packet loss ratio, enabling dynamic resource adjustment to maintain connectivity service performance. This session-level operation effectively bridges end-user QoS requirements with network resource optimization, making it a key part of network design.</t>
      </section>
      <section anchor="systems-coexistence">
        <name>Systems Coexistence</name>
        <t>In the actual deployed commercial networks, systems based on legacy and state of the art standards operate concurrently due to gradual deployment cycles, varying terminal lifespans, and global differences in upgrade timelines. For example, in some regions, 4G and 5G networks are operated alongside even older 3G systems. Even within a single generation, almost every 1 or 2 years, a new release is published and some features are updated accordingly. The coexistence of systems from different generations and releases presents challenges especially considering the backward and forward compatibility.</t>
      </section>
    </section>
    <section anchor="agent-protocols-requirements">
      <name>Agent Protocols Requirements</name>
      <section anchor="multi-agent-system-covering-terminal-network-and-service">
        <name>Multi-agent system covering terminal, network and service</name>
        <t>As proposed by ETSI [2], agentic AI technology could innovate the mobile communication network architecture design, and 6G core network could be established as a multi-agent system. There will be a broad scope of agents, for instance 3GPP specified agents versus non-3GPP agents, network agents versus UE agents, etc. These agents interact and collaborate with each other to form a new communication paradigm, and they could invoke different types of resources to support the communication. Such resource could be for instance toolbox, memory, connectivity resource, computing resource, etc.
 Under this context, 6G goes hand in hand with agentic AI technologies. 6G may utilize agent protocols and relevant enabling technologies to enable the following mobile network specific scenarios:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>6G network agents interaction:</strong> 6G network internal agents collaborate with each other, and invoke relevant resources;</t>
          </li>
          <li>
            <t><strong>UE agent/resource and network agent/resource:</strong> 6G network agent and UE agent collaborate with each other, 6G network agent invokes resources on UE side, or vice versa;</t>
          </li>
          <li>
            <t><strong>Service exposure:</strong> Expose 6G network agent services and resources to 3rd parties;</t>
          </li>
          <li>
            <t><strong>Service consumption:</strong> Consuming agent services and resources from 3rd parties.</t>
          </li>
        </ol>
      </section>
      <section anchor="qos-assurance-for-multi-agent-communication">
        <name>QoS Assurance for Multi-agent Communication</name>
        <t>Agent traffic as the following characteristics:</t>
        <section anchor="agent-traffic-may-consist-of-multiple-parts-and-multi-modal-data">
          <name>Agent traffic may consist of multiple “Parts” and multi-modal data：</name>
          <t>Multi-agent communication traffic can contain several “Parts” (e.g., the smallest unit of content within a Message or Artifact [6]). The data types of different Parts may be different and multi-modal (e.g., text, file, document, image, structured data, real-time audio stream, video streaming).</t>
          <t>The sizes of different Parts can be different and the transmission modes may be also different (e.g., real-time steaming, Server-Sent Events (SSE), or Push Notification).</t>
          <t>Given these traffic characteristics above, dedicated QoS framework should be designed for better performance.</t>
        </section>
        <section anchor="heterogeneous-qos-requirements-among-multiple-parts">
          <name>Heterogeneous QoS requirements among multiple “Parts”：</name>
          <t>Heterogeneity between Messages and Artifacts: An agent service flow may contain Messages and/or Artifacts, their QoS requirements are different, e.g., the Message’s requirement (e.g., timeliness, accuracy, delay) is stricter.</t>
          <t>Heterogeneity for “Parts” within a same Message or Artifact: The QoS requirement (e.g., delay, deadline to be sent to peer endpoint) for the different Parts of a same Message or Artifact may be the same or not.</t>
        </section>
        <section anchor="burst-agent-traffic">
          <name>Burst Agent traffic</name>
          <t>Agent service flow can be burst traffic: dynamic QoS should be guaranteed and network resources should be adjusted in real-time when the agent service flow is burst traffic instead of periodic traffic.</t>
          <t>The characteristics of agent traffic above provides possibilities to optimize QoS schemes and resource scheduling. The overall QoS of an agent service flow should be guaranteed while the network resource consumption is minimized. Parts with different QoS requirements may be sent via different resources. For example, network resource allocated to Parts of SSE/Streaming mode should keep active all the time, but network resource allocated to Parts of Push Notification mode can be (de)activated (e.g., released or suspended) flexibly. The 6G network can adjust the resource scheduling and management mechanism based on the different modes.</t>
        </section>
      </section>
      <section anchor="agent-service-continuity">
        <name>Agent Service Continuity</name>
        <t>The continuity of agent service (e.g., message or task processing result) should be guaranteed, e.g., in the mobility scenario for UE-agent, or when the network addressing are changed. Additional singling overhead for link (re)establishment and connectivity disruption possibilities should be reduced. For instance, how to wake up the equipment that hosts the agent. Agent instances can be deleted or moved from one device to the other. Mobility handling in such situations need to be carefully tackled. In addition, assume that we have an agent on equipment that is currently running a task. In the middle of the task, the equipment  shuts down, but before it does, the agent should be moved (sent) to another hosting equipment. How to handle this situation and how the agent is notified?</t>
      </section>
      <section anchor="agent-task-oriented-resource-management">
        <name>Agent Task-Oriented Resource Management</name>
        <t>The interaction between agents is typically task-oriented, where task is a collection of actions to satisfy the user requirements. An agent (i.e. agent client) may request another agent (i.e. agent server) to perform a task [6]. It can query the task status during the execution process and receive the results upon task completion.</t>
        <t>As described in section 2.6, the mobile network operates based on sessions. The traditional mobile network mainly performs communication resource management to establish the UE-oriented sessions and guarantee the QoS of a connectivity for a UE. However, in an agentic system where multiple agents may collaborate to perform a task, the network shall manage and schedule multi-dimensional resources (such as communication resource, AI resource, computing resource, data resource, etc.) to guarantee the QoS of a task.</t>
        <t>Thus, a task session is required to support the communication of different agents in network. And the network schedules resource and guarantees QoS based on task granularity. Task information, e.g., task identifier, needs to be carried when Agents exchanges message or task results, to associate with the corresponding task.</t>
      </section>
      <section anchor="intent-based-interaction">
        <name>Intent-based Interaction</name>
        <t>AI Agent is an automated intelligent entity capable of reasoning, decision-making, executing tasks autonomously to achieve a specific goal. A consumer provides the high-level goal description that needs to be realized, instead of the step-by-step execution instruction, based on which the agent can make execution plans through the local AI model and invoke the proper tools to perform the task. Thus, Agent protocols should support Agents to interact with each other or with consumers through intents, to make the agent interaction flexible enough.</t>
      </section>
      <section anchor="security-privacy-and-trust-1">
        <name>Security, Privacy and Trust</name>
        <t>The security control flow provides the access security control, the secure transportation, and the cross-domain secure collaboration capabilities, which is also important to agent protocol, as agents will be one of the main communication end-point for both terminal and network. Various cryptographic algorithms ensure the security of transmission channels and the implementation of different levels of security measures according to different policies.</t>
        <t>The transmission of user consent and service visibility messages between the network and the terminal side ensures that the subscribers can be aware of the data usage purposes agreed upon between the operator and the subscriber. AI Agent brings new possibility to interact with each other with multi-modal information, in this case, the procedure of user consent and service visibility would not be ignored.</t>
      </section>
      <section anchor="agent-governance">
        <name>Agent Governance</name>
        <t>AI Agents of different skills, capabilities, and vendors need to discover each other when they collaborate to perform a task. It is important to manage and control the agent information to enable an agent to find others from a massive number of candidates.</t>
        <t>The agent protocol has to support the agent (de-)registration, update and discovery with an authority that may be deployed in central or distributed way. It needs to consider how this authority to ensure agent behaviors, agent skill set or capability publish, ensure trustworthiness and discovery among agents, when designing the protocols.</t>
        <t>The effective publish-subscribe and request-response mechanisms for discovering agents with required skills or capabilities are needed. Wake up calls of equipment that hosts the agents need to be supported as well. This is also related to service continuity which should be maintained by the agentic ecosystem.</t>
      </section>
      <section anchor="backward-compatibility-and-forward-compatible">
        <name>Backward Compatibility and Forward Compatible</name>
        <t>As mentioned in 2.4 and 2.7, networks consist of multiple stakeholders/parties with various UE, network, and protocol versions. Therefore, agent protocols should be flexible, backward-compatible, forward-compatible, potentially self-evolving (e.g., protocol self-generation and negotiation, protocol version self-upgrade or merge) in the future, and easy to evolve. More specifically, agent protocols should be built upon existing network functions and systems, while also remaining adaptable to future network architecture/functions designs and system evolutions.</t>
      </section>
      <section anchor="extensibility">
        <name>Extensibility</name>
        <t>Agent protocols exist across multiple domains, such as UE, RAN, CN, and DN. Additionally, service, data, and capability exposure may originate from different networks. Therefore, agent protocol should support the expanding and scaling of agents so that any type of agents (e.g., Network autonomy agent and integrated sensing-AI Agent) can be seamlessly integrated to the whole agent system. To achieve this, task-based communication should be supported to enable rapid service subscription and publishing between agents. 
## Flexibility
 AI Agents are capable of self-learning and self-evolving, which implies that skills, capabilities, and accepted input and output modalities may change as time goes. The agent protocol shall be designed to be sufficiently flexible, allowing fast adaption to expected changes.</t>
        <t>Moreover, the protocol data objects and agent profiles exchanged within the protocol shall be designed with flexible fields that are easy to scale and modify without re-design.</t>
      </section>
      <section anchor="isolation">
        <name>Isolation</name>
        <t>The messages or traffic flows of mobile network usually have different-level of security or delay requirements. For example, request messages from UE have higher security requirement than that for common traffic flows. Thus, agent messages or traffic flows with different performance requirements shall be decoupled and isolated to facilitate differentiated processing.</t>
      </section>
      <section anchor="tool-invocation">
        <name>Tool Invocation</name>
        <t>The key feature of an agent is that it can invoke tools to execute tasks autonomously. When AI Agents are introduced into 6G network, various network capabilities, network functions and even the 3rd party application functions can serve as tools to be invoked and used by agents.</t>
        <t>It is an important aspect to enable agents to invoke the required tools accurately. Thus, it needs to consider how to enable the Agent protocols to describe tools’ information explicitly and sufficiently such that agents can easily identify target tools and easily learn how to use them.</t>
        <t>Different tools have different implementation methods and invocation approaches. How to enable agents to flexibly invoke different tools to support plug-and-play of future tools also needs to be considered.</t>
      </section>
      <section anchor="knowledge-retrieval">
        <name>Knowledge Retrieval</name>
        <t>AI Agents need flexibly access to 6G network internal or external data sources or knowledge bases to retrieve additional information that may not be present within the local knowledge of an agent model. The following issues need to be considered for Agent protocol design:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Metadata filtering:</strong> how to filter the un-related data, e.g. through time label, data type label.</t>
          </li>
          <li>
            <t><strong>Data representation:</strong> how to represent data of knowledge so as to improve transmission efficiency, such as represented as vectors or graphs.</t>
          </li>
          <li>
            <t><strong>Retrieval mechanism:</strong> how to search and retrieve the required data, e.g. through similarity, key words, Token, natural language, etc.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="enabling-protocol-technologies">
      <name>Enabling Protocol Technologies</name>
      <t>Given the agent protocol requirements elaborated above, the following enabling technologies can be investigated and standardized in IETF, e.g., in terms of Agent governance layer, Meta protocol layer, Security control layer, and Transport layer. Different features should be provided in each layer, which will also be investigated and introduced by 3GPP potentially.</t>
      <section anchor="agent-governance-layer">
        <name>Agent Governance Layer</name>
        <section anchor="registration-and-discovery">
          <name>Registration and Discovery</name>
          <t>As shown in section 3.7, an authority is required to govern the available AI Agents in the mobile network. The new agent will register its agent profile to the authority, request to update the agent profile when the agent skills or capabilities are changed, and de-register from the authority when the agent is not used anymore. The agent profile contains the key information about the agent, such as agent role description, skills, capabilities, identifier, input and output schema, vendor information, URL, etc.</t>
          <t>The authority will store and maintain the agent profile of all the available agents. When an agent wants to discover a target agent by providing required agent description, the authority needs to perform a search and matching between the provided description and the role or skill description of registered agents, e.g. through cosine similarity computation or Jaccard similarity computation [7][8].</t>
        </section>
        <section anchor="publish-and-subscribe">
          <name>Publish and Subscribe</name>
          <t>The AI Agents can subscribe to the authority about the agent information of specific set of agents so as to acquire their real-time updates. The agent subscription can support various forms, such as through agent ID, role type, skill type, etc.</t>
          <t>When the profile of an agent is updated or the agent is de-registered, the authority shall notify the other agents that subscribed to the information of this agent as to prevent them from sending inappropriate requests to the agent.</t>
          <t>In addition, if there is no registered agent can perform the task requested by an agent, or all available agents are in regions where the request agent cannot render the task, the agent ecosystem can also provide a registration mechanism such that an agent posts its interest and gets notified as soon a new suitable agent comes and registers with the ecosystem and comes online.</t>
        </section>
        <section anchor="agent-communication">
          <name>Agent Communication</name>
          <t>In the mobile network, an agent may need to communicate with other agents, resources (e.g., tools, data, or APIs), underlying infrastructure (e.g. base stations, computing platform), and users (e.g. UEs, applications). For different communication objects, various protocol methods and data objects are needed to be defined. To enable the flexible and intent-based interaction for agents, the data objects are usually semi-structured, where the contents or values of each field are not pre-defined and only the key labels are inserted to improve the understandability and completeness.</t>
          <t>For the communication between agents, Google A2A defines several methods based on JSON RPC 2.0, such as <em>message/send</em>, <em>task/get</em>, <em>task/cancel</em> [6], to support initiating a new task, updating or deleting an existing task, querying the current status of a task, subscribing the information of specific tasks. The data object “<em>Task</em>” is exchanged with the methods, which includes the information such as task identity, requirements, context, states, outputs, etc. They can be applied to the mobile network with proper extension combining mobile network characteristics. For example, the task QoS information, network status and resource information also need to be exchanged. And an agent can also refuse a task due to reasons such as limited network resources and transmission buffer.</t>
          <t>For the communication between agents and resources (such as tools, data, APIs), the methods need to support AI Agents to invoke various network and service functions, in order to trigger and execute suitable network actions and operations, or to query network operator data, network running log data, beyond connectivity data (e.g., sensing data, AI data), etc.</t>
          <t>The methods for the communication between agents and users are required to support a user to request a service (e.g. AI, sensing), update or release a service, acquire the service status or result, etc.</t>
        </section>
        <section anchor="multimodal-data-management">
          <name>Multimodal Data Management</name>
          <t>The data exchanged by agents are multi-modal, which can be text, image, audio, video, structured data, etc. For example, A2A protocol defines three types of data structures [6], i.e., TextPart, ProfilePart and DataPart, to respectively carry texts, profile and structured data. More kinds of data structures, such as AudioPart and VideoPart, may be needed, e.g., a UE may initiate a request to the agent in the mobile network through audio. Agent protocols should be designed with the principle that the Agent data with different modalities can be distinguished, based on which 6G network can provide differentiated QoS assurances. For example, on one hand, the Agent protocol can support to encapsulate data of different modalities to distinct data structures. On the other hand, the 6G network may establish different resources for transmitting various modalities of data to perform QoS control and guarantee.</t>
          <t>Besides, there shall be a closely integration design between the agent ecosystem and the underlying network. For example, the equipment hosting the agent may enter sleep mode when the agent is not executing task, and it needs to be woken up by a client agent so that the server agent can process the multi-modal data from the client agent to perform the task.</t>
          <t>Multi-modal data is heterogeneous, meaning that data from different modalities differ in structure, semantics and representation, but they complement each other from various perspectives on the same subject. Processing and analysis of multi-modal data are quite challenging, which requires to consider multiple impact factors, such as data alignment, feature extraction, etc. Thus, the following key technologies shall be adopted.</t>
          <t>- Data pre-processing technology: it includes data cleaning (removing noise and redundant data), data standardization (converting data from different modalities into a unified format), data augmentation (increasing the diversity of data through operations such as rotation, scaling).</t>
          <t>- Feature extraction technology: it includes text, image, audio, video feature extraction, etc.</t>
          <t>- Data alignment technology: it is to ensure the consistency of data across time, spatial location, and semantics.</t>
          <t>- Fusion technology: it is to integrate diverse data to enhance its completeness, accuracy, and usability.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Data pre-processing technology</strong>: it includes data cleaning (removing noise and redundant data), data standardization (converting data from different modalities into a unified format), data augmentation (increasing the diversity of data through operations such as rotation, scaling).</t>
            </li>
            <li>
              <t><strong>Feature extraction technology</strong>: it includes text, image, audio, video feature extraction, etc.</t>
            </li>
            <li>
              <t><strong>Data alignment technology</strong>: it is to ensure the consistency of data across time, spatial location, and semantics.</t>
            </li>
            <li>
              <t><strong>Fusion technology</strong>: it is to integrate diverse data to enhance its completeness, accuracy, and usability</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="meta-protocol-layer">
        <name>Meta Protocol Layer</name>
        <t>As mentioned in 3.8, 3.9 and 3.10, agent protocols should allow for customization or privatization of the protocol while maintaining the standardized agent protocols. Capabilities such as self-negotiation, self-generation and self-evolving of agent protocol should be supported to solve the compatibility problem, while protocol release control is required to accommodate the co-existence of multi-releases of those cross-operator and cross-domain agents. Additionally, agent protocols should be able to call tools and data by calling network functions.</t>
        <t>Meta protocol layer should support the self-negotiation of agent [9]. Agent itself can decide the modality of interaction message like text, voice, etc.</t>
        <t>Considering the co-existence of multi-party and cross-domain agents inside of the whole agent system, both the standardized protocol and negotiated protocol can be potential options.</t>
      </section>
      <section anchor="security-privacy-and-trust-layer">
        <name>Security, Privacy and Trust Layer</name>
        <t>As mentioned in 3.6, agent protocols should consider the requirements of security, privacy and trust. Some of the enabling technologies are listed as below:</t>
        <t>-    Distributed Identity (DID) system for AI Agents</t>
        <t>Based on the mobile network oriented DID system, the network offers rapid authentication and key establishment based on multiple roots of trust, fine-grained authorization, and selective privacy disclosure via agent protocols. Simultaneously, the DID system supports the security of cross-domain, e.g. working for different groups of AI Agents, connections through the same DID translation and related policies.</t>
        <t>-    Distributed ledger</t>
        <t>Distributed ledger technology provides a foundation of trust for multi-party collaboration, which will be common case for AI Agents ineraction. Acting as a bridge of trust, it enables different systems holding credentials issued by various authoritative institutions to achieve mutual trust. As a consensus infrastructure, it offers tamper-proof functionality and transparent auditability for critical information.</t>
        <t>-    Ciphertext-based computing technology</t>
        <t>Considering the elimination of user privacy concerns, ciphertext-based computing technology provides the capability of "computing without knowing" for network queries and computations on user data. Agent protocols should include this option to ensure that data privacy at different levels can be handled in an acceptable manner.</t>
        <t>-    Quantum-safe technologies</t>
        <t>Quantum-safe technologies include post-quantum cryptography (PQC) and its protocols based on cryptographic techniques, as well as quantum secure transmission methods such as Quantum Key Distribution (QKD). The preemptive deployment of quantum-safe technologies, such as PQC migration, will prepare for defending against quantum attacks. The algorithm set for agent protocols should consider quantum-safe from day 1.</t>
      </section>
      <section anchor="transport-layer">
        <name>Transport Layer</name>
        <t>As mentioned in 3.2, 3.3, 3.4 and 3.11, the Agent QoS and service continuity should be guaranteed. Agent messages or traffic flows with different performance requirements shall be decoupled and isolated. The following potential technologies for transport layer protocols can be investigated:</t>
        <ul spacing="normal">
          <li>
            <t><strong>To support stream multiplexing, collaboration and grouping:</strong> e.g., different “Parts” of agent traffic with different sizes can be sent in parallel via a group of transport streams to enable them to arrive to peer node synchronously within a strict delay budget, or sent asynchronously with different priorities within a same stream if synchronous arrival to peer node is not needed. The balance between the complexity of transport connection establishment and the flexibility of scheduling should be considered.</t>
          </li>
          <li>
            <t><strong>To support a reliable and efficient transmission mechanism for agent traffic:</strong> A) Stream multiplexing of multiple agent traffic data streams, B) Traffic steering, switching, splitting of multiple agent traffic data streams.</t>
          </li>
          <li>
            <t><strong>To natively support connection migration, quick link establishment</strong>: so that agent service continuity could be guaranteed in mobility scenarios.</t>
          </li>
          <li>
            <t><strong>To support burst agent traffic transmission</strong>: Burst traffic information can be encapsulated in protocol header for better QoS guarantee and resource real-time scheduling and adjustment. The QoS (e.g., latency and timeliness) is guaranteed toward the whole burst data set of agent traffic rather than a specific packet.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="summary">
      <name>Summary</name>
      <t>A hierarchical consideration of agent protocol is definitely important to meet different kinds of requirements, e.g., from 6G network. Collaborations between IETF, ETSI and 3GPP and collaborations across different work groups (e.g., for agent protocol, transport protocol, and security) of IETF are required.</t>
    </section>
    <section anchor="reference">
      <name>Reference</name>
      <section anchor="informative-references">
        <name>Informative References</name>
        <t>[1] Li, Xu, Weisen Shi, Hang Zhang, Chenghui Peng, Shaoyun Wu, and Wen Tong. "The Agentic-AI Core: An AI-Empowered, Mission-Oriented Core Network for Next-Generation Mobile Telecommunications." <em>Engineering</em> (2025).</t>
        <t>[2] ETSI GR ENI 051 V4.1.1, “Experiential Networked Intelligence (ENI); Study on AI Agents based Next-generation Network Slicing”, 2025.02.</t>
        <t>[3] ETSI ENI ISG 055 Early Draft, “Use Cases and Requirements for AI Agents based Core Network”, 2025.06.04.</t>
        <t>[4] 3GPP TR 22.870 (V0.2.0): “Study on 6G Use Cases and Service Requirements; Stage 1 (Release 20)”.</t>
        <t>[5] 3GPP SP-250806: "Study on Architecture for 6G System".</t>
        <t>[6] A2A Protocol. "Specification". https://a2a-protocol.org/latest/specification/, 2025.</t>
        <t>[7] D. Gunawan, C. A. Sembiring, M. A. Budiman, “The implementation of cosine similarity to calculate text relevance between two documents”, Journal of physics: conference series, 2018.</t>
        <t>[8] S. Bag, S. K. Kumar, M. K. Tiwari, “An efficient recommendation generation using relevant Jaccard similarity”, Information Sciences, 2019.</t>
        <t>[9] Marro, Samuele, Emanuele La Malfa, Jesse Wright, Guohao Li, Nigel Shadbolt, Michael Wooldridge, and Philip Torr. "A scalable communication protocol for networks of large language models." arXiv preprint arXiv:2410.11905 (2024).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document should not affect the security of the Internet.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="appendix">
      <name>Appendix</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC8986">
        <front>
          <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
          <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
          <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
          <author fullname="J. Leddy" initials="J." surname="Leddy"/>
          <author fullname="D. Voyer" initials="D." surname="Voyer"/>
          <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
          <author fullname="Z. Li" initials="Z." surname="Li"/>
          <date month="February" year="2021"/>
          <abstract>
            <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
            <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
            <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8986"/>
        <seriesInfo name="DOI" value="10.17487/RFC8986"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+V963IbV7befzxFR/4jqgCIpC6WOKfOHJqiZNrWxSJlz0RR
pTbQG0BbjW64L6Tgqama1zippCoPkl95lHmBvELWt9batwbIcaVyTn7ENWMT
QPfutdde91tPJpNR25kq/8+mrCt7knVNb0dz09ll3WxPsrbLR20/WxdtW9TV
1XZDl1ycX70cFZuGL26748PD54fHo9JUy5PMVqNRV3QlXfbe/toXjV3bqmsz
ekJ2XplZWVTL7MrOV1Vd1svCtlm9yE6XdE32rqm7el6Xbbaom+zpq+yN7W7q
5nM7MrNZY69PsstV3XTZFZYf5fW8Mmt6TN6YRTdZ3UxMMTFYaPJ0OTk8HNWz
ti5tZ9uTUb/JDf8x+irDXyfZ8eHx8eQQ/8smE/4uK+i5RVnaPCuqzPRdvTZd
MTdluc1m2+zLujxuFvOsWGRV3WXL4ho7NY01J9krW9nGlCMAu2zqfnPiQM9+
pn9hx6/wdTYafb45GWXZJPtst/R7fhR/OI4/PKLF+472S9dP6Ieiak+ys5Wt
5vT/7M+E6zF9KxjY+bpulqYqfiP46+ok+7Y3N7agr+3aFOVJtqWr5nrL1/+y
4l+n83pNV7RdY213kv1QmOrXos9+MJ/tOPuRdrDpsxcF/VzMO7puXnRbHAet
tDJYel7njNWjr58/54991YF8zlZFZaIdECwVPbHiP6It7H5/9x5w7XKlNz3/
d97EaWPa1brIs9PPK3NtiirsY+9Pd2/F6C1To7fs382jw0fEN02zzV7WX7IX
DRHgOPveVKYzfi9vu87cGL+T74+/zx59d5RshW7I4728NFtLmOrDFuJv7oa8
LPqFLY5uQf/z7A1x6yr7pq8rk/1EeDcE9jQgng7EbOrGeniPjr5++vXjGNzo
Gg/xn3pbFtlphPT4m7sh5iunp7eg+D2JI/p7mh0/8VC+7qtivvIgPjt8/vw4
hvCVbdam2kbw/WyLX/oq+1MR0/fgy7uh/EJX3fANR/8ulB0B/11RkXigBwTQ
k69SwPl2osrSCnyeLn7he/5ljt87+Xk6r6IdfGOLX+kqurm+qca0EIG6gaDc
2QVdSastA5GQ5D68exOnjOufEwGTfve7tnFDF5tfHv2/2sXPJKFrWiuV9fjk
frptJx+IZOONQODfzI+/lp30/Gu6kTf1lPiV1GvfFdkl/XuVva9NPs6+NUVO
xPZ7NnR4+Pjxng3RP1XdQJdeW+i+9y/Pnj1/9pR0cVEtwg+jCelhM6OnGHrK
SCwCs9mUpIKxt+yGdHM2s1nbN5ZUcrey9Kj1mn6hPZBxAZvBZCUw1hVrCyW+
6Du6eJzdrIrSZmwbZBtvZJDuzto629SbvjQNLWi6bE2ihk0V/iO9dmZxstDq
ZCIQiqbZFcGgdLEGVgXQosrJKCI5vSnNlm7NNsV13Zkya8gcAVgAXfZHd7bb
trNrWau+hhlR0ppqHm1pt/M5CaWMcLmErVRlq/rmrocS+ss8M3m96fhBJQyf
Lju9EDS1AIDMC0sbrjOi1xwwkX3Wbuy8WBTzrG8JUVk7t5VpiloMt41t+Kiq
uc2ayKobZ3a6nI7dpggkoIgsN9oHtkQmFZlpPa6V8yOMXhe55asXRUOAmY62
D1hrepIpt7/Jj+lhJQ9liIgG7LUBCp1N2cU25cy0OKSKznGGs0+RJTgPW56v
DKjONkTkxbydCjGSSibkwGS8IIKu837ON//lqwIf/zoa0T5Ny9BW9guZhGwF
8jV7nxqdquCCyIP2ktHx0raKAYHgKybQeWG7bZYXy4JoSBkdiAFZTLO3dJqV
5YMcA/EJlmeWkNsQGFVlCfhrYlzAtCFqzoHwJ6/GjMxaHlnTv5rBUsuaVtnW
dFG8ypi5jaRUB5KgT9aA01qS/J8JG8zSEyI5LE7YskvCi80H+MCPtPOWuQrP
4qMEMm+yWU9fg+7J7LdVb2mnF53SNskA+4WODisy01rIl7onwlhD9sChwBp9
SydAdNDqk5rrgnAWLcKPy2HcP301zb6tb+hZDYh5TlY96Aer+K3RUd9YgtK0
0RU5SVgwFT3yGuxCQLjHRizEuzMlCZtZg90SvZGf4RiaUK0Emdu2WFZTMvBi
5DLD1wQuyd8VtNS8prXrjQ17mvUdYYqEPVHDRomQHRe7IPouiJb+iP1hGUcb
dBlAbWiT4qnMSX4Q//7mpG0HZUAPMsxd5LyARPSJsgocQt4OkVRpvxBd+KcQ
axF26Cag0N2Uk+1FGN4KWeSg8MU2cDJ7oabJHQgRz8v+IfmZnBreJLEYP3I0
OjNkFrMMWFlC/K9EL1iBZR1JJCFnkkWtteyMmaq9sU2Lkyd9R0yFL2lL5OTu
SBKmaJZGJCiIpO+TtCJKaYRwFkRwueN52t8BKxs6piWdBV0ChcQECTFXqaSm
nc2xqa01DRH2aVg8EhEEbmM2RY5DvK7La4a79YxBkNn1jKSWZVe1qpkBhI5a
PgES92ZNZ2cDSUBeVyuW4jmJPpzfZG2AkrET8y0Ip/jNPnTkgGMEmYDlGqKk
OXiRlFVjSQQQdUaocZxF9CBCPEi2ed2QcKQVAc4Cx/Hx6NM0u+wJVdGmRZPT
1unk559p66zHBNW7Om9R2DIfiqLzq0uRO49evXtHwuwaKrCHr5vHpNbnOFyW
tSAMsNNU7iWqL/nsoBWFyDlEcaE6W1TLGewDxzq0zMfjT4JCYS+cfG47sr7o
TzxtC05PJVKi07DEI8IIQy3g5aoEPZfTNfzz++PD7PL0KPv4mG54TYDULLeA
cQanM+3nrx7hgSqCZZ0VyMfayiPVrXd5eowTubx4kX18QkuSxfbVV2n05gey
IHtaZjSCnfLZbvEkknv3Xn+4vLo3lv9mb97y3+/Pf/xw8f78Bf6+/Pb0hx/8
HyO94vLbtx9+eBH+CneevX39+vzNC7mZvs2Sr0b3Xp/++Z4Q6723764u3r45
/eGeP0Zva8Bc66C5RFxsGov9mnZEEnbeFDPZ/Ddn7/7nfz96nP3lL/+BjNLj
o6Pnf/2rfnh29PVj+nCzspVTkUSN8pHwvB2RZUrcy5Eiku1z4lTSzsRfhOOW
BDaZacQhZEg8+AjMfDrJ/mk23xw9/mf9AhtOvnQ4S75knO1+s3OzIHHPV3se
47GZfD/AdArv6Z+Tzw7v0Zf/9EcWNJOjZ3/8Z7b4v4IvFNtUYKHXYhVpaEyJ
rK37BvJoS+5NAddiNNLrlLtar7JuCjBw26YGTcwexq1Dcu66aOpKLU9yZxr3
JBKmpmPVwQdLgH/O+opWLlSjkHirna4iu3u5mvzam1Jspz3PHQdARZmQRM7N
BiZQtibRRt5ZSyK5hagzMGhMOWEHxUPUQjj1JYvhdV92xcYQwOQIVa2GXYUG
3d6ImqPf+Pa1ZaG/LrpiiVgmZAEJPduQCKoIWMJ+Y/Ki9g9t/eZJnH+oWMst
ii9s9OhuGG0kViHdyVVrDKkUsoHZo1ID1+mbNSkLYKcrqp70ELEKzIYZrL6w
TWKU2pnCBCoAg8HCB+AwDKBU0dN9hE0oHPXfWnoI3QBF6CwKfSTuhBbIcWQk
YyO3EcY80dmrnqiRRAHt70d9FKHkUpe5/2N9eTAaxRfVl1BDhlxI0u+gIlJi
Yp4ROZL9V2zEVF+ntDoO/kikQGP3CVsnl5vkA+wY+AxsuUaOrtqU0+wbUv20
ZVquhftH21ssSKpAo3aszRSxBFDd0MkntGjhXIO42G3Plm5v7QlRWGMmQvAE
elnfTOAkVvNtQnOM0TnWpbN0/iV0Odk7ZkCdDgJsdkbA3xQ50U504FgrUL5n
2fviPl7XfJh0Pe0ArF7jZHmvc9r4gZD/AjYmIO5WTd0vVxsyT7FuRVZM37CK
I6hg8Lp1OfwxRlSfBAwJ5bI2eXugZkeMTbbLWjHRyZUjI4TtwFrYcUKmHe07
MLys/qf3ng6ZO8VDy7qbokrogIiQZCC7sxEdmHlTt+3AJFDbErcNCAuigyyf
BcwCchw7rNMmRO+e78AUwmdZCqnq/iDGq0iRg6QJrTDMrPNxwBL76ZndJsfd
qRiEB2wbsrIJeXT3td+Zx2/mqIBI2mV06KSK5ZLkawsjlQMctH/YMcF1hwwT
oUUPzAux6GPJkVqDzmNhjd/0G33iJRmjILo2ODoSIRHitJFEhALJr/l0yN4k
oyEv5k5c0Yd+LtEUMEre8yExFxT6JA53wBdq7ApuLeT/LtIzEqRry4C0/WZT
N7AyveuYhF6IcsknERFMZjk5TgjZQCGJe+VXB+kw0omrl+z6ZU1t1qJQ2L7f
IadgmidsHktOca7VSmUy7mA7Gw5IKXUxe+Q1e54X3jPD7U6Lp4fkLeZWWSsy
/jnsxl96719Xpv9VQqHsOXa4vVgDd0Z9QycmmaLJCQTyEzL1kTblGUebDiCB
u26CCCWyrowLNyV+b27htr3E2XQcAfRbgAO14WfasRDixC3sTiQrEWUw8P2D
w2vzKNaI/YgcIAqZib3a8NeC+mxjmq4KnjszaSsE6dlpWdYz9rsCDsi/ubbC
JxpjaokSB1ZZ9tbBe//1m7cHsR013oM2h6O5ITtkxWb3KvhFpDsRZ1yJom7q
EhIGH2lp2c+qsJAYLlLl0RwJSsthOo5maFo4iimof65hpLFzeMCFZIxVSw6Q
DWNbwipKW4Ty0sxqDdx5ltwbwXP7wiPe0ilOyBmaXNWb7P7bq6uDXSLho/wC
E3AJKb8RAxOO53VhwhdbONc1Gz1RgCZFich6eMfwxp20GQZDODXNror6+W2w
EsQ4lY0gXsTKriedOCdxUJHoLYMyIslj5ljRdBpWIauErqg3LMIQz3DaaMwh
Ig3cOXc4NhZFjHjE3m6jXdo5ETGCi++a4trMRSJcocKAvc5Wf08xSbBYg4BL
iL6axqbGKMkKIBXkkCxkGiJAYl8GM7cLCJ3wqxAIc1c+6eqJZTmgP3rLfuwZ
u/XwA+6ZmX++IeaWgGvHhkt0t8FxT7NT5gCO7dAdpegeQiPc9ABmLIAizigk
+BzsUZDILpa2Pq54KYfA+oD9jBQm76sw/Jzt4HNFNImkBiHZgUaPXePxXosg
aOBOjfQfoJWzgGCYWcfpHMghBdpsWT0DU3W1dUHHcfYbUfPkc1XflDZfMiPV
i5bNS17ZszWdSTeXw3REp2zTCn+I87LxENU4Zab82LpgS7YsFna+nZfw1i8q
NmaYqri0RaIqiNY1HBbL5WsJ9jGe8PsjOmYIZewtJx0iil6umRPhfCmQ6EBq
qhU/Fu4d3SfaDjZFA8MxrCxbkwQJbS/+KbjDkHilnWzqgi1fukJuKw0LjlsX
p80tgCJPAoTlLmz5ITQ9FErrUCARTZUI4DnO3hCHB73rxIKIVnmYF7CigthG
UkZnt2ECTViqwoHFcMEXX0uclGC+UwYLTZOsePGBaFg9YSI7idQzhJHrtiRD
DVk+5ynu8+QjIw2IZB/DLx1bzUNbSnlyr6fLMcGaJN3WeWQSoJLkHNzMl+SA
sVFQAtOWQ9wkJIu8D8Y8+T71TXCXxEMSd+mivuLQKFm5DYke7K2s+zxbqlDi
MHB7wEJxjagVZ35y2LbsRQIEWV38fZcTiwXNMD/mTjA2a10oIBG867oqYEt8
b7fZu2jBi4ofT6yS3f/+3QWB58IjzJKIG4ydra2haRKnFq4EckJAbeRhhbiI
w3/+CxGgSxxE/sKeQ4/2qUq1TcjTG7TIpYhph4KwpshhwkE1cHgcaEwCuoxN
R6wesprkXhB3apuTQWs4pgoZItmrmMZVOyp+z2oWJ4iLsLhCrpQUGIcnNmW9
1TSbbWAzRSaiOx8vAEu7dDoWHoZ1thlgcJZpq9tnfUp6ArZfCe+HlQIxVR4e
zOhmQQon3mhCRl1DlrLtxkCd4olqnjqDUr2vfoMlLefvEVBsJRVmvxgkmDjN
3NYcOVtKNuPxK17tyavIT25cwgMRXy9zkUbM6hL26COXb2tTi9ioRI1MCQK2
XNcQdJy3OgJ7HUveBs4zDFGEJJHtI8LZ9CwL8VwgFZCG7CGBJVWIOcz4ukGE
odyKxJ6HM8UpuKNi7y/Y3AGskALnyAErXLbCQ14xspo5AJFLVAEH7C0TI1UT
iZUiEVAEcIc1mXE+IHL+NEchvtUcHnx87uPEZlaeG41OWYuRzSsWAeddPh5/
SrJJkVslHntRkZXqgpt32+epXSeKAgCQ8zCPEzchF+wUGacJ6GjXO5vTrJev
QyGDjSy/XFOxMImXUhIR56M0nyNC1WV0yPwn/du3HLniC9ytfgPJZR/O/QXO
7Gmtu4ZdAJIA6vc4Z0atDDaNxfchhmUtJWSbIo4Ej8mL5XrsTJqA8+v6s42I
sNtuxOgOYROYh2JY+qIcv7LG2rz88whPkNTVdTmrv5BAtOsaWiyR1O7mcbD/
ou+AkVH2QT3NQhSQ/dJxzndZW4ksQXTwfxkr+6isgLShW9ZmG+L4w4qhf1x4
wolqsZphgtB51De78ZegZn2w52Q0OppmDx48fTWkAnfCKPB68CCLLuBfIF31
yjuOf6y1GHycfg/+EP8wGh3j6Y7UHgZdWuUpQP6nATCCLFzuFrkbnp1bBbg2
oiyiTFoLwosNG9bX4AlD4D4CuC6A7/xngHSOv+3u8t6RllOMqNeZ73R+fyAL
9XG8MoRnv9445J/xR/aM7lqUJXe0rKhw2AinLcHJRA8OiEXoWcw3rgDOBbSd
SevpaWCSnbBl7YS2uwu0rOFnju06g//vf/uv7wiw9u9/+29R1E2i3DDA/tf/
+C+jUQzboJBJl4dvB26DbdVyVKtMllZzlSNNa2gmAoNWEUcBXKq5Oda9r8nq
QvSTsHJKOFtApH18+ulANKTkHJzsCeKIn8X7nMVSargpBwnLBaQDxj5XTFbF
mp47znzAIuenjaN8hekRhRZT2pnf8gnZiakkxVuSGHuhUxc4hY4Dh3G2Ba6Z
3wnHZsINCn6UQOmshndBp7aZXOIyGDP0vPuXl+cHzDDv+naVvak7SBo+ugN4
YK/QuqClMv4oB9la4lqEMAduQohcr5wcF+1qpfxSQ1axSS1k+W2S7Nqxlc26
jkMSEQ2BEsPN0AYuBKH0IpznKAa1v1XKmuzcOE5gUo3vfBiRW8ukWuyx5WG8
+dNw6R+OY8pSf//bv7ZJuZKjN2fHwlqck/1s4M6QC262B1yPxLk52xCW0k0C
mTEnBQuVI7a7rHLCXDIA3IHBD8R/TM5peqmMaNU92ljLgUWOIxzwozk2MqBi
jvnd9nhHtz6ozGm5Tk//mx5xjEQ0OfmWHJIyyowv1wtPvHeHzQW6W4Zcbayh
gggOl4o3KCUfgYVQyxFVmiaAFG0KBFsqhD0gAVVQNXGF+025f8hAzh4MEhwc
FaJUpKPawgcx6RjUM5RDdCn9WKtEZQJptTBuwOP2Ev5ejEk+PY7URwaa13ec
pCkqhiqfKhmwGg+0scMqSghMXAhyh0v90Qycuh0QXGaOAxWe+EioPbx0Mpel
pdvbZ2s38IGR8+Hq6ZV4kGMOc//O5XdEpTxCSfJ+bg/4CXyfF8elFIEi6tqT
RUc2aH7g0tTq2kVmCNYSWpTU5u65it4KMRUfkh2ELT1OWWloVE0YytktZ74y
QukzVEp40nSEovtZB75GBZmrMVZzm4TzwV5qGtSA+6Sks2xZonw4F0uC1ZJn
PW+g5XmjT+LYPSdMiOROc0n7IhAGdxkXgOpX4EUsy7Uj9xt7kAYizaBcmTDW
akZ4wHhhQ5LgzW8pvr0xn62rgQW5Sx6EMxuruu3aIEm0ntMvEfS/LbkKjZZH
mjwXIxEFkbnlY6DH+EzV1CfupUafw0SVRMnaous1DFBZIeMZKLWxix7+fkf+
fYmdXIDeBIMoTCO+1mTMjZXCSC8yEN1KdwVHysd7mr6qJEcBwuCF+ai5QN7F
jfDTeIAgwm+PnA93x4AbZ1w1iohXXltRuI4Y/UkIdu5DhBxIW4Am7wjRgMIv
P3XVxtrGIKWcDjtMBXx8/hkFXO6OPfE/RjxzRZBP3qK4FefjS9Jee0YUFor8
MG+FOBethXGqzaJAxKTW5VxMlzmKK4rgFGkyApw493UNLYHdLqSzhWOKsWCd
BsPmfjG1U+dhoUKK0ASxi8thYjt87V7N8fHmQLR+o9EAhowsbamwJ5KgVZqt
P1IODpLR5ioecL5f7LyP2xBUT80tRLDKNpIXLXEMRBZWkRpxDglw+CcpxGwV
H8fTp+M4upMm5+O2Do3RttqDg+hFmjRwtyL4W27ddtuBJ+NlcCR0k3ICAEOy
y52mf64EMZ0M9LF8NpISySNdSR/Ok/4Cz3gIAEjkTKjEm8BKV2K2Bid65+DG
iRxtEf/TvUjATVSLyzTlpBWrVgtEvKV038Xe9+OGk+p3x2AkaJ+EZJjIbkGQ
CBEwVc9hVCEzTSkU3pLO74wspZ6WD5U4XIBf8hQ5iosoJZ4covglQdECqCht
NGUxkfmeNchUtfL5e2lnKHDAkMptEMtNwSYXSYtTgdKVBLQ7Klf5Zsxir0Xv
jw+dCAJIIrebWsvTgEYWYxfsS08E9osgpojTXNU6RI/varfSlVOWhXShEeQu
YSzyHN0t3Nsx3m0UUO5XANqo/aDcpkUdPsi1rJEhPlXjEh6iM4OxK65okmQL
LlTRINqadVGMTxjwsEfHsU3ObkdnN5PZdoL/RhIKVzXSuTUOhysZzaAYIPbW
UPGRaCsNl0BJGpA76WpUSBFGQ/JX42mShYeU4lBmG/Opk6OQVCD300FMUfWe
o3MlEVrAB3aHgVxYUPjKYTNAWTAdCPnwdiLVFykvX0hpK9z2j6svBuUXWsvD
/kVyklqfNLxSQ0D4VoMeXLrlKgCETZOiHL02rc2Jyz5cUtoVbSbVYGnYlmvy
VT642L22obCq2a0kRFJPsuoc1KjBfS6PFTmb0+wnrdvjeoaahMVmBU+vXKIY
drVuXSlzF6OP8+xR4AeyoLIaXcaVBTQl56135RyzCTssw1qSNqSVOMHrb+Hs
cyFuwtUw6kQLsakhOf8uKTVB74srX3Qhk6gAJMnsSB2c4kgSbpVAxRzMCIhq
2VxVyI1p/EGwEpEKyE3fIIaLY2ukjywyudhGdkVq7tlh8WnUqQOLpeV0R7D6
t3fyFn+OI4eJvHd9JqiRGjuuJ6dBa2d/DyZvmNtRpoXmlGVF1nA+jWzRV/Bv
KjgOXnYPgort54IT/yk74HHXUn3ivQLyejghl2xQfa9/YFewMTissowMCycD
YgHjERUlQbyHgexTgT4aQKEBckMrtlyqWfXrGSTbApSRFzysxdHroBMYXUwD
u0AN3dxODpAZRgu5nJckXLU6W3Cx1QwQ68JVzRwknd8aQ3ZJdEgFKfvJuGAU
sTryYKDKzZbR49WSS7Cqt1G08dq+cVGgnFnyvAquM1WbHMdJlNJx6Uao2dJk
8tjLEEjiGwzUkNLYdFMSQXVZQj5kicw6m90rHI1X+WIG96CJZyHfnEZm8ETs
jTZpZZEK2tYne71w5TYbtd2ETJNNFZoHB+Lgn/6sTjVXsnAh352edeLu6vlL
uhZ9ua4iUhVCY0sX49nTLCLKI3I5tUREOw3dE9FH5Dv0mUm/cbnzszhfzhh7
qZn0M1/vBz8HuyFaFII6nj7mS4+nX0edGvsyNOSAfLYrrldoH2oSSRDsasU/
nPslxq7zUDgEGTLvGyVtmrtmBzKxag2MfWHAJJQsjl2BQPLdpuZmVvZ2W1su
Jr5DVUNJHhb+NS7NZPW5rLXpYrwDtdzhCkEQK7HN0h646JKb6MDNEqYV/sLD
rXRCepsTsN2161lflJ0oFq69APBOoS36ah7KLLQaw0+REOpaaycSt3q5KkmB
bm8ZwsOwqDBmvDhvoY9KYc/Rg+J0xmhoMmo9obRZeJLx5arOnQOFvD99M87O
3gjCXryJQ2rAj7LGWDNeLNn3VCVDNpI4W/IYlGFZiqPjO8htaORKEGFjxI8R
R1XazH0ZBSZzsBAw1ZYTf9FPSmSuYl0dkG2UgY5mDmhp+MRp0wNnfLhSedQH
h8s1CHezqv3EEF/+EXwbCHlx/NTpGsyX8GQWxFTQidzW7aWSit1NqBbsfcNX
GmUihUik8ZLZVQgjCyYCx02DA8dcVFrTVB7DMZ9685lMzcIZabcbFrDrtWMY
TVfcD9t3+JONJJHsHKuQUneoaORYUH4hEZodejBiiPv0oZPqbl4Bqv29YDIu
681Fp9JdqWaGGwShHjWMhrQj2j+T7ct69gtd30Zd0fQ7EsLBK8/jDok7IGZp
7F0p7kVXROIsnHACYbuJMjnGHbg2pcZO4vK+i5bbUslnB7q8vY3AgCaQpEhz
p0WLrM6eBTFHdD1buurFyFGA1kYmcBBXTJIxLoboAWBm/3Auq8NTt1GJeTKh
gZAn25f6Wp3ME8HuPGDB++1bHKSYbps9Ex/JvO43paYCC8akkJTvYogwI82T
Ibkh+L8ivz27IHd+Hk4BJZlRa5y3ZQs950ICBy4I4Dx/iSHYPeERMnk4DJRw
baHDZSQoU0cZo7FX9iGFFLPmfn1lNbsfVaXH3aXhYu7ZQUSY+dVBzz3z2JBg
s9cSPRVBo9GFiyUF18Bwz1Ns9UdBDB8giaJ6XEvF+fDOSqIMdFHcalInNVVD
bcjVzGq58tJ//9u/Jt4IyQh4wBApLAhjGcO6UphWS6gwkMe0BbSCm1DSGTJB
Oge3WB64gOWrgxC9M2iLIBS9CNVyfEvKmUP/fm1JIOStjye5wvENbZH0DWTa
twkSAnZdqnFPmZ47TqdyN2W/nBgENiABiJrVVtFNwahJwpaKf+ecfu97Mt5b
coTstSkj/5Ttcg+MRoESUg6laixt9G8Wyb7Yq8lC58eMC1u575IfZ30mK/XJ
g++mLrXWwsYyXOJ2Ye2YleNuC19bVbRtb9PkmkcHS7eUBFUlYIRZRv88ePDa
doa3RoqlYxcJpWNKJ/KdNuhPnJsi9hfsmhByhAYlDx19Ab78Sb6Y+ke9kMi7
7tq4MjV9lv9Bld8iwkJbC9trc9QgLuTmBqFeJUwu0NXE6bomnke0gfDBka82
QOVpJHiNEVRkeDVYkb1MPd1EQOxBRlusC4nDj8P0kTFJ7c+YyMHNoSgy1ykl
WieLKmY/ctYVMiezZ6NiqDsnjlkXKcldZVRajbe/FlQNTWJOzCNayu1Sbh/6
PtE4e371Ms6iuw4kIbOljwjR/rYwa0BfAVD98nIYntXvJYqrMVf5cpoFCeUL
1IPN6kfYFJVEjnQlMRmjWVZ7thYpM1IaXNscOYv7A13ZD1hfSoXeR/Eb8Vlc
iIOzhjJaJcoYPoInnQRzBvkjwZ4c8LUppFExSK64aMGGwK40lt0oTfCWJbJE
nIuxQInp6HwGD0Mwo6AXJAaVUBjfNSxAuj1eonapDgGxEw/KwrUgh+0PVpWM
t2hx8qQw1XBgkC+kjJ7DHxJsAX/FIpYovo8CbUEgyBo8tC7K2YxvcSTiDNmO
H8EFT8T0EsJMo64f3v/gGfoq3SyHzjo/s9E1+uwiGzJfS4MCGTi3io0yrxJu
jGpXHz41zgLQEN5WWUSSoEpr8luCh/RkvHoNkdZIEtJm54nPp96HcGKcEnMh
b8Y7So84gBhfwQk8IRHfcjCQp/MaHfaRWNW8rqYcmuw70uKIZt1yxcevP318
9knr+9712ntPkF26KKKcVeA0tjZ9iHHIMkMiSwgQToyvl7ddGiQw2hkvUwqk
gDNU+eng75jmE4dboBITyRnbXCgQqNyhTO6+eDEWzEMbK6nr39yJMPp5FQ7P
k17kObgmIC2z9N9HfA1WT7Ejrg7XrmxDkZC3BKXBeuYqKhS5AxRKYFpCJEKH
PFuRkb7WSRM6+KSo2PrcNIUMyGBh1vpD4zInbpYN5UUFJ3EaKxJnh/4Y0cOU
qFtZPYzKyRfkdaBkBoyq3pLr/nKFNSsPYXgUZB5GyamhFSol5IowDIJr8qDM
XFOtyeIUQlSBF3kK7jQ3HJ8uXIuG1N7kGUmKUGfEA8FqsK2MLeiLLmwJLOWr
PAVhbcj2Byh1pAF3RKCCdxoX+w/6Bi72abRxZPGarbdsQ9RKiwxishrHJSJa
6QBnwQULYQejdXMsYx7KrVBO0vrP97Ex76aYtHEFiRtkowN+pHNb7vlwjkhB
NCPgQCIVwcUZVINIYCe4zN4+iv2rNAbkUxFq5csEgJwjfXETj4vxuMiiL7VI
kup1QJxPZ8aPcnGa1q6LSWg2GEd0rE0RbAWQ9dxH4w04viQg11BriB4tZMSk
m07ndDe7CI5bCKUaC/F2PnseSCywGRqPkJEaLVvJfJeXtZvdESM6jUmOyY6r
0TN5enwaTVCQXhCHeV928d3l2zfZ+3dn2fH0MAjYBxoKegjx82CcPQC7PiQu
8n/PYSaWD1ClNo6d2qIqOJHApYlgL2F0FrEcTW6k6lJioCHQL5dxnZvLj2mx
o6t283VKYy9Y3ZW3aSYO90TdKnL2KON/gMqhB6jjL4ZhRuFVwZMPylbzsncl
FfHTvEYKBUfO2AwDmX37Gzf10hdiYUW9g1uffgd7BX0xiCvqBAWuarGSj6i5
UmImmY/B5Ts94klc0Yt8HqwWW3e+PEsQn1S8J1aoC1Eos3o8SqWXl29eoqMc
Fm2S8lxtWZbCpjCNryTzprP7+gfYzIpd4lkPyfM7+WLQD+ZL7BIJquIzIgG/
QV8OdJFUBHGUZxgUjCsNfHRvnMz5dtO2OHil4Umvivw6URAxHhlb8xJSFToc
l6Q78ejTQmFygPWXPcOjhT1UpbgB0IqRC/7jwBlT2VWEm8XvxbvoEdMkMUeP
UiN1GkwMajaklfAEhYfrwBcR8AA7afU2IW8W2Z0ho6MipNFyPreZr1zPtFSW
cOhmWGPMqAkiwgdeZXxDqEtxskI5WTheG9m4W03b1Pa0tbEYSJgTsjsKZokQ
J7PX2qjljkN1bq1WRDFKi8fZFT0cfRSoHGOTFx/Eeaeb5BfGthuNxeMh8SIT
gM3jXcRSlthIAq5mdT8XOmR7AEZQIqfYtH/wT9i7PFnrOkTRuygLKnL5F9Ug
Yvd5nz12Q/aJRu8S4KHT20r6dpJF4hW4YT2+MEpu550NUh9Rds03EbIG67lT
faegcdBs4mzaQeoDIti4NtShoK7jefK74fbEYeKQNDn5ROScYdEY4174xZ8m
2Ofd8BD3zujC52g7OKtQlb2nqUikg8jrjpW8E5MREI6AIiccyHARs6QcmBj2
G4ugr9hzKC1w+SaDESutjRLHRe3qbRL/fehtONc9Mph9yGlHXYZiGNf4EJZk
dFQ8HqxE9xP3Ku0P/aTlutoGntbU3iCKikIciBttKXDOch0V8HH3QOzPafU/
c8ighTjEppL19hXGulbj6GaCPZmPiuYko7VMposesJfW5EsOE4aJtS2mqkpv
K6vmOGQuvSlaFeeyM3HVHD/LexZhyF/rWrK46ZEsRZh8U8hB1znFiWa816It
Wl/hE28Vgp1OurN+ekeUn1f9labEfMUHWfSoYUQDJheUJTN0CBlLHdvncpgk
bdVb8cZg3w5D2fAgkih2IHsZG07n9Z8mor3ghkRdYmFixwkPaXR2LMMzL/UE
75OpysPYiDyL1lWb5RjWpGLwYOxEhEleCHCfp0PJ/LJ/QAKcSfUz6jIxI926
pl+G9Nt9fZmDn3PH8+m0UFekhUr7YBOFlEjtCEgLWA4EOy93MH4rcm5V3bce
W8C/P+Od1duo8FA9SxlCOw/70gIiaZVsUdyFFIrmH8dqVirT6Lb6dt9WfLk6
19CEgbQqat0rB4quTVzMuCdazDbjx89MXG7rVhJ78OD/ayIDgu6ksiF+/k/o
zJ/CPkJzD/g3IDXe3JDWkuf9X6Q2mWWElJpPEXJCKtsp33w0fTamfz3n+x9N
jw5vLTDkgiUphEneqlI3MpOw818s0jIjqTF0iQxHLknCcPDIaXYW54sc0XC5
V1Jpua8UMy3e9I3Bw7q9YSFbi4JL54tFZbB0HzmUa1cqGeVSxXFyhtYgR4fG
hTX4qnOLTpJ5WKIz/bgrxhlGvEjLSNILkHSRuPxOWvN4e02oK+Occ6rIV3sw
Zc14pH25t0wUjioZMbtZ2X11j8ODCVj/+PyTbx7ucBkbWei/yt3Mq9yPro9D
j66LjEfhCp/zRHXHxmeDAWD78aulQvuRiEgiwFB63S2PHGufzJBaPULiyt/4
e3VsfJaYByHEsyJvbUvSvPEulz699ZC9DRXVG0iGPyqUC/NGJQbEgzUxRtzt
fn+2H4ZcWbRaHTGzJAFOWGvSPy+i9oELDdxl919cvDjIoqnUPthDrkfc7z/s
hnXNqHS/x34XNeTofE+pM0USCQ+M5lHCxEsb5sPr0vbPBMXQnMpOSOJKyFkS
U78l4rt0/QSKPKRPS6kfxiCIHbF1WeBhhu178CV2EHYUBgZ3g+apmDo1q3mj
L9lNR3vzm3jb+N09bZgsVg+a+9iAx+PZhywDslyFjm+j2nemXFLToPJr+F0y
Hdz1ypn4vVEOxwx9zIpJ91tSfjHzrz7kF40ltEMs4AQDxgt3+t4ooyMroyMt
Oj/cP+ou0tmD6D3gOVMko4UxW6mL4qCUc4VchpJf+Ma9lkXX+4Z2Vy297nk+
pXLSqTTBuxmzwzeL8Hgopt+OnGHbTHgIsBe24TUh0khopP2X7JnOpTIG763w
IWR/cmfFZoW0yJcuVG9rRiqc1q7YtAgWV/7QOIoYJhPjZSuc3fo9i6dtk1HJ
Pa17L9zgaoVRtUWf78nrLpTLEZAtNFAdpeZbfdFUo/GzW4JTahdKVrgO9dTO
jnNetheF3W4Xoopumb6Qu752rhVnVbpGY2Pj0f5jTwZev560ZmET0Tka3fqT
hxO5VryHB5fF/ZYkRt/9eHagYY022qiXaWl3Jq9eINQ3jl/p55aOu1T9aC4N
QDvbSqHlqbae49nM//H7FzqwjPwWvNYSbBGNR6Xj/fW2rQb/nTaUrYulZ3x5
paMFrYuIswtN1Bu8Zo5Eh4PedBj+4codXB8qF034/OQdWjGBTfwes82OtELa
F5Fpvdau4j2GefwI/3rsbOSjOIrIkccoWxF1ZO2bLOOI99+8VHxYABqMkYQW
fYgxlNJFyNxT7XcirsxVSD7I1DivZr9wrCdtc+YoJFSX1o3qDC+/yXgu2M6U
qQFCZCadb3iRgDaGfZalLUUty7N8V3IE5WCY5ZpFetPwjA8dG1bxGKZtNSdN
WskEgDCqTF48JC0Hs550j5R2SHfs7k3xOfoXGg0mnyn6ikX8UAEKhxVDpeFP
12uIAx4O2HcOjLy7MkVBsBOy3dlCoSrAS+1oiFMg5aSKekAJSDjoG5g4K+eK
0oeix9WfBP51k9GINk4Psstdiko6CVP6cKF3HO84++YAXM0/kNZnTTfWUf/y
56bUYPrvWzHsUl4BywX2myE+I9HGr3mUKU4JluHr+wYw8TJ2RcZ8z2Qz90au
eABVu4t8me6WbiTGO57/zWACXEhFKz9FuQ9+cGhRtgbSNJqICMEXhqEkOe5o
qGM6BywMMZ/64X6aNHVvIWJa9DMGeaRghIuu5n7U4K/JruXAojI6v0c6FR4U
jE6eaHqHjF7nmdCX/XptuBY3I9Ou4QbHubxmhgl94NF6jHB92wLJNiuv44ia
yvEytMD6PtO37zXTrJJCVmiancWSM0wnkILq9E2gJhmPLInu4Yuq2K5St0FR
vas2x5GUiGZMVOHlIAeAHzAkOeipvhjxvdWR5zq6xb8DPfzS4sqPR5+yH4px
9qd+nP1sCxKb2eWqwBvZiUD+IxLEeOG8rZarvsjeWR4GujL1Fm+57wWgn+me
qxrzAu9dOSVczNEKideX8qzM04vJuXuh7Th7LeQfhmHxa05doyVw8QaG7asQ
RdK3B10NX87aTu9lD86RzBC58iC7f3x4/AShS7wqlc/m1fvs/M1FdvjkKPvp
8fRoSrYCKbdzfdEs6199tI61kYE1yNPTfQd/INmnL1YN3o9YfQxlFOtyO7iE
D1ctSXWOM4AzPTwGQI8UIEBzcfmKIHqSnZuGSPUFsUbHYH0gR+vMv6gteTlq
6n9F74fVx0aPezo9fIwnPv4kVHn1Pjs+nj77+jC7/9Ph9Hh6eHCCh/mNEbGn
D3bz/WIAgAjEf46y++810nZ8eEBPxZOe6JMu302Onxw+O3x6kt0LeIsHpevb
leRFA/dw79NPXBvg4qJERpeuvRpovTfNVl23aU8ePjTHZuKYYVo3y4fy2vmH
bXz9Q8UCrfz1p+zFNHvVV+bGkB44I1MPb5VYzwpRQq/5i2/IrVvjd0IJCHh3
MspuHbPE7+aSkoYb5qZdx4r/pvbzf1s+ne9IGHN30iIjn6Llicr+FYSc+mQL
/fjw6BnAf/YpuyTwDHhumn1P/+tJLjLY9OGqIMFbMNSnVaTZG2YR6xz/iD57
nbKoY7l3i68ZyItIB13O5V3MDNNzwPT8U/aaLKGaQDLr3iKNfE7Iw19ksdNv
5cLQRvHKnuznpliuiK5f9TWJDBYzb4i1SkiQfFajZuV1QZYHffNzXZc5hw5E
prxbkXbdkFhpGqKH0/D2p8FEeSf6I5eV5XqJUnrfqaPvtCFhYZo/Fdfs5jSY
vMMfT44fHx2SD/H88AmLj8cHU5GhvtnlLFY8LWpo4tcAqyUGO9DwvIudYBI+
88CsSjXcxemb0/2rYjZ9SKdUdVwwgrvkpQkbjAEtvozkn/8NWJe1Hl2LAAA=

-->

</rfc>
