<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ccamp-client-signal-yang-14" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Client Signals YANG Model">A YANG Data Model for Transport Network Client Signals</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-client-signal-yang-14"/>
    <author initials="H." surname="Zheng" fullname="Haomian Zheng">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <street>H1 XiliuBeipo Village, Songshan Lake</street>
          <city>Dongguan</city>
          <region>Guangdong</region>
          <country>China</country>
        </postal>
        <email>zhenghaomian@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Guo" fullname="Aihua Guo">
      <organization>Futurewei</organization>
      <address>
        <email>aihuaguo.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei Technologies</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>
    <author initials="A." surname="Snitser" fullname="Anton Snitser">
      <organization>Cisco</organization>
      <address>
        <email>asnizar@cisco.com</email>
      </address>
    </author>
    <author initials="C." surname="Yu" fullname="Chaode Yu">
      <organization>Huawei Technologies</organization>
      <address>
        <email>yuchaode@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="February" day="04"/>
    <area>Routing</area>
    <workgroup>CCAMP Working Group</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 126?>

<t>A transport network is a server-layer network to provide connectivity
services to its client.  The topology and tunnel information in the
transport layer has already been defined by generic Traffic-
engineered models and technology-specific models (e.g., OTN, WSON).
However, how the client signals are accessing to the network has not
been described.  These information is necessary to both client and
provider.</t>
      <t>This draft describes how the client signals are carried over
transport network and defines YANG data models which are required
during configuration procedure.  More specifically, several client
signal (of transport network) models including ETH, STM-n, FC and so
on, are defined in this draft.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-ccamp-wg.github.io/draft-ietf-ccamp-client-signal-yang/draft-ietf-ccamp-client-signal-yang.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ccamp-client-signal-yang/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Common Control and Measurement Plane Working Group mailing list (<eref target="mailto:ccamp@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ccamp/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/ccamp/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-ccamp-wg/draft-ietf-ccamp-client-signal-yang"/>.</t>
    </note>
  </front>
  <middle>
    <?line 142?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>A transport network is a server-layer network designed to provide
connectivity services for a client-layer network to carry the client
traffic transparently across the server-layer network resources.
Currently the topology and tunnel models have been defined for
transport networks, including <xref target="I-D.ietf-ccamp-otn-topo-yang"/> and
<xref target="I-D.ietf-ccamp-otn-tunnel-model"/>, providing server-layer topology
abstraction and tunnel configuration between PEs.  However, there is
a missing piece for configuring how the PEs should map the client-
layer traffic, received from the CE, over the server-layer tunnels:
this gap is expected to be solved in this document.</t>
        <t>This document defines a data model of all transport network client
signals, using YANG language defined in <xref target="RFC7950"/>.  The model can be
used by applications exposing to a transport network controller via a
RESTconf interface.  Furthermore, it can be used by an application
for the following purposes (but not limited to):</t>
        <ul spacing="normal">
          <li>
            <t>To request/update an end-to-end service by driving a new tunnel to
be set up to support this service;</t>
          </li>
          <li>
            <t>To request/update an end-to-end service by using an existing
tunnel;</t>
          </li>
          <li>
            <t>To receive notification with regard to the information change of
the given service;</t>
          </li>
        </ul>
        <t>The YANG modules defined in this document conforms to the Network
Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <section anchor="prefixes-in-model-names">
        <name>Prefixes in Model Names</name>
        <t>In this document, names of data nodes and other data model objects
are prefixed using the standard prefix associated with the
corresponding YANG imported modules, including <xref target="RFC6991"/>, <xref target="RFC8294"/>
and <xref target="I-D.ietf-ccamp-otn-tunnel-model"/>, which are shown as follow.</t>
        <table anchor="tab-prefixes">
          <name>Prefixes and corresponding YANG modules</name>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="left">YANG module</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">yang</td>
              <td align="left">ietf-yang-types</td>
              <td align="left">
                <xref target="RFC6991"/></td>
            </tr>
            <tr>
              <td align="left">rt-types</td>
              <td align="left">ietf-routing-types</td>
              <td align="left">
                <xref target="RFC8294"/></td>
            </tr>
            <tr>
              <td align="left">te-types</td>
              <td align="left">ietf-te-types</td>
              <td align="left">[RFCYYYY]</td>
            </tr>
            <tr>
              <td align="left">l1-types</td>
              <td align="left">ietf-layer1-types</td>
              <td align="left">[RFCZZZZ]</td>
            </tr>
            <tr>
              <td align="left">nw</td>
              <td align="left">ietf-network</td>
              <td align="left">
                <xref target="RFC8345"/></td>
            </tr>
            <tr>
              <td align="left">nt</td>
              <td align="left">ietf-network-topology</td>
              <td align="left">
                <xref target="RFC8345"/></td>
            </tr>
            <tr>
              <td align="left">te</td>
              <td align="left">ietf-te</td>
              <td align="left">[RFCKKKK]</td>
            </tr>
            <tr>
              <td align="left">clnt-types</td>
              <td align="left">ietf-trans-client-svc-types</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">etht-types</td>
              <td align="left">ietf-eth-tran-types</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">clnt-svc</td>
              <td align="left">ietf-trans-client-service</td>
              <td align="left">RFC XXXX</td>
            </tr>
            <tr>
              <td align="left">etht-svc</td>
              <td align="left">ietf-eth-tran-service</td>
              <td align="left">RFC XXXX</td>
            </tr>
          </tbody>
        </table>
        <t>RFC Editor Note:
Please replace XXXX with the number assigned to the RFC once this draft becomes an RFC.
Please replace YYYY with the RFC numbers assigned to <xref target="I-D.ietf-teas-rfc8776-update"/>.
Please replace ZZZZ with the RFC numbers assigned to <xref target="I-D.ietf-ccamp-layer1-types"/>.
Please replace KKKK with the RFC numbers assigned to <xref target="I-D.ietf-teas-yang-te"/>.</t>
      </section>
      <section anchor="terminology-and-notations">
        <name>Terminology and Notations</name>
        <t>A simplified graphical representation of the data model is used in
this document.  The meaning of the symbols in the YANG data tree
presented later in this document is defined in <xref target="RFC8340"/>.  They are
provided below for reference.</t>
        <ul spacing="normal">
          <li>
            <t>Brackets "[" and "]" enclose list keys.</t>
          </li>
          <li>
            <t>Abbreviations before data node names: "rw" means configuration
(read-write) and "ro" state data (read-only).</t>
          </li>
          <li>
            <t>Symbols after data node names: "?" means an optional node, "!"
means a presence container, and "*" denotes a list and leaf-list.</t>
          </li>
          <li>
            <t>Parentheses enclose choice and case nodes, and case nodes are also
marked with a colon (":").</t>
          </li>
          <li>
            <t>Ellipsis ("...") stands for contents of subtrees that are not
shown.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="transport-network-client-signal-overview">
      <name>Transport Network Client Signal Overview</name>
      <section anchor="overview-of-service-request-and-network-configuration-scenarios">
        <name>Overview of Service Request and Network Configuration Scenarios</name>
        <t>A global view of a multi-domain service can be described as the
<xref target="fig-overview"/>. The customer is usually responsible to configure the CE
nodes and to request to the provider the service intent, from the CE
nodes perspective, while the provider is responsible to configure the
whole network (including the PE nodes) to support the customer
service intent.  Generally speaking, the network configurations
required to support a customer service can be split into two
different groups: CE-PE and PE-PE.  The CE-PE configuration deals
with the client layer one-hop access link, while PE-PE configuration
deals with the server layer tunnel.  In <xref target="fig-overview"/> we mark the
intermediate nodes as 'P', which has same switching capability of PE
but just not the 'end-point'.  In this example, the link P-P and PE-P
are a server-layer intra-domain or inter-domain link.</t>
        <figure anchor="fig-overview">
          <name>Global view of Client Service with the Network Provider</name>
          <artwork type="ascii-art"><![CDATA[
         +----+                                            +----+
         | CE |                                            | CE |
         +--+-+                                            +--+-+
            |                                                 |
            | -------------                      -------------|
          //|/             \\\\             /////             |\\\\
        //  |                  \\         //                  |    \\
       | +--+-+    +---+  +---+  |       | +---+   +---+   +--+-+    |
      |  | PE +----+ P +--+ P +---+-----+--+ P +---+ P +---+ PE |     |
       | +----+    +---+  +---+  |       | +---+   +---+   +----+    |
        \\                     //         \\                       //
          \\\\             ////             \\\\\             /////
              -------------                      -------------
                 Domain 1                         Domain 2
]]></artwork>
        </figure>
        <t>According to the responsibilities of each controller in <xref target="RFC8453"/>,
the controllers have different views of the service request and
network configuration.  The duty of CNC is to give the MDSC a
description of the customer service intent: candidate YANG models
include L1CSM <xref target="I-D.ietf-ccamp-l1csm-yang"/>, L2SM <xref target="RFC8466"/> and L3SM
<xref target="RFC8299"/>, which are classified as customer service models, according
to <xref target="RFC8309"/>.  These models provide necessary attributes to describe
the customer service intent from the customer/CE perspective, and do
not provide any specific network configuration.  These models also
implies that the customer service description can be considered in a
separate manner rather than integratig with network configurations,
which also enable the controllers to abstract/virtualize the network
resource to make them visible to the customer and also easier to
manage.  In other words, the network knowledge is not necessary at
CNC and CMI, which is seen in an abstracted form as shown in
<xref target="fig-cnc-view"/>.</t>
        <figure anchor="fig-cnc-view">
          <name>CNC Viewpoint on the Client Service</name>
          <artwork type="ascii-art"><![CDATA[
                              /---------\
                           ///           \\\
     +----+               |                 |                 +----+
     | CE |--------------+      NETWORK      +----------------| CE |
     +----+               |                 |                 +----+
                           \\\           ///
                              \---------/
]]></artwork>
        </figure>
        <t>The functionalities of MDSC have been described in <xref target="RFC8453"/>, which
include the customer mapping/translation and multi-domain
coordination.  By receiving the request from CNC, MDSC need to
understand what network configuration can support the customer
service intent and turn to the corresponding PNCs for configuration.
The service request is therefore decomposed by MDSC into a few
network configurations and forwarded to one or multiple PNCs
respectively in single-domain and multi-domain scenario.  In general,
the MDSC has the view of both PE and CE nodes and of some abstract
information regarding the P nodes, as shown in <xref target="fig-mdsc-view"/>.  It is worth
noting that this MDSC view is different with <xref target="fig-overview"/> at the intra-
domain link.  Usually these details are hidden, for scalability
purposes, and therefore the MDSC has only an abstract view of each
domain internal topology.</t>
        <figure anchor="fig-mdsc-view">
          <name>MDSC view of both Client Service and Network Abstraction</name>
          <artwork type="ascii-art"><![CDATA[
                       ------                -----
                   ////      \\\\        ///-     -\\\
                 //              \\    //             \\
     +----+     | +----+     +---+ |  |+---+     +----+ |     +----+
     | CE |-----+-| PE |-----| P |-+--+| P |-----| PE |-+-----| CE |
     +----+     | +----+     +---+ |  |+---+     +----+ |     +----+
                 \\              //    \\             //
                   \\\\      ////        \\\-     -///
                       ------                -----
                      Domain 1             Domain 2
]]></artwork>
        </figure>
        <t>PNC is the controller that configure the physical devices, based on
the network configuration received from the MDSC.  Each PNC has the
detailed view of its own domain, the example of view from PNC in
domain 1 is shown in <xref target="fig-pnc-view"/>.  The PNC has all the detailed topology
information on PE and P nodes and on the intra-domain links.  The PNC
configures the tunnel/tunnel segment within its domain based on the
network configuration provided by the MDSC.  The PNC also configures
the network part of the CE-PE access links as well as the mapping of
the client-layer traffic and the server-layer tunnels, based on the
network configuration provided by the MDSC.  The interaction between
PNC and MDSC for the client-layer network configuration is
accomplished by the models defined in this draft.</t>
        <figure anchor="fig-pnc-view">
          <name>PNC view on Network Configuration</name>
          <artwork type="ascii-art"><![CDATA[
            |                        |                        |
            | -------------          |           -------------|
          //|/             \\\\      |      /////             |\\\\
        //  |                  \\    |    //                  |    \\
       | +--+-+    +---+  +---+  |   |   | +---+   +---+   +--+-+    |
      |  | PE +----+ P +--+ P +---+--+--+--+ P +---+ P +---+ PE |     |
       | +----+    +---+  +---+  |   |   | +---+   +---+   +----+    |
        \\                     //    |    \\                       //
          \\\\             ////      |      \\\\\             /////
              -------------          |           -------------
          PNC View in Domain 1       |       PNC View in Domain 2
]]></artwork>
        </figure>
      </section>
      <section anchor="applicability-of-proposed-model">
        <name>Applicability of Proposed Model</name>
        <t>Existing TE and technology-specific models, such as topology models
and tunnel models, support the network configuration among PEs and
Ps.  The customer service models, such as L1CSM, L2SM and L3SM, focus
on describing the attributes among CEs.  However, there is a missing
piece on how to configure the CE-PE session.  The models defined in
this document provide the configuration on CE-PE when the provider
server-layer network is TE-based technology.</t>
        <t>In the example of OTN as the server-layer transport network, a full
list of G-PID was summarized in <xref target="RFC7139"/>, which can be divided into
a few categories.  The G-PID signals can be categorized into
transparent and non-transparent.  Examples of transparent signals may
include Ethernetphysical interfaces, FC, STM-n and so on.  In this
approach the OTN devices is not aware of the client signal type, and
this information is only necessary among the controllers.  Once the
OTN tunnel is set up, there is no switching requested on the client
layer, and therefore only signal mapping is needed, without a client
tunnel set up.  The models that supporting the configuration of
transparent signals are defined in <xref target="cbr-svc-tree"/>.  The other category
would be non-transparent, such as Carrier Ethernet and MPLS-TP, with
a switching request on the client layer.  Once the OTN tunnel is set
up, a corresponding tunnel in the client layer has to be set up to
carry services.  The models that supporting the configuration of
transparent signals are defined in <xref target="eth-svc-tree"/>.</t>
        <t>It is also worth noting that some client signal can be carried over
multiple types of networks.  For example, the Ethernet services can
be carried over either OTN or Ethernet TE tunnels (over optical or
microwave networks).  The model specified in this document allows the
support from networks with different technologies.  The list of
identities for client signals are defined in
<xref target="I-D.ietf-ccamp-layer1-types"/>.</t>
        <section anchor="identifier-and-readable-information">
          <name>Identifier and Readable Information</name>
          <t>Name: The identifier of the client signal service can be configured
or retrieved by the name information.  The naming of this attribute
is based on the requirements of unifying with TE tunnel models.  It
can be readable or unreadable.  If it is readable, to make it unique,
it is needed to specify a unified structure for all the PNC systems.
It is hard to do that for the reason of a lot of customized
requirements from different Operators.  In the ICT technology, UUID
format could be a good option.  Title: The title of client signal
service can be configured with its readable name.  Description: More
detail information of client signal service, such as some
administrative information or location information.  User-label: An
alias of client signal service which is used to tag based on the
maintenance requirement.</t>
          <artwork type="ascii-art"><![CDATA[
   module: ietf-trans-client-service
      +--rw client-svc
         +--rw client-svc-instances* [client-svc-name]
            +--rw client-svc-name           string
            +--rw client-svc-title?         string
            +--rw user-label?               string
            +--rw client-svc-descr?         string
            ...................................

   module: ietf-eth-tran-service
      +--rw etht-svc-instances* [etht-svc-name]
            +--rw etht-svc-name             string
            +--rw etht-svc-title?           string
            +--rw user-label?               string
            +--rw etht-svc-descr?           string
            ...................................
]]></artwork>
        </section>
        <section anchor="unified-resource-identifiers">
          <name>Unified Resource Identifiers</name>
          <t>In <xref target="I-D.ietf-teas-rfc8776-update"/>, it is recognized that if the
used topology resource adopts TE modeling, there could be two
identifier systems, one is the network modeling system and the other
one from TE topology modeling.  The access ports of client signal
service or end points of Ethernet service also adopt the TE topology
resources.  So two identifiers are both fine to specified in the
configuration requests.</t>
          <artwork type="ascii-art"><![CDATA[
   module: ietf-trans-client-service
      +--rw client-svc
         +--rw client-svc-instances* [client-svc-name]
            +--rw src-access-ports
            |  +--rw access-node-id?    te-types:te-node-id
            |  +--rw access-node-uri?   nw:node-id
            |  +--rw access-ltp-id?     te-types:te-tp-id
            |  +--rw access-ltp-uri?    nt:tp-id
            |  +--rw client-signal?     identityref
            +--rw dst-access-ports
               +--rw access-node-id?    te-types:te-node-id
               +--rw access-node-uri?   nw:node-id
               +--rw access-ltp-id?     te-types:te-tp-id
               +--rw access-ltp-uri?    nt:tp-id
               +--rw client-signal?     identityref
               ...................................

   module: ietf-eth-tran-service
      +--rw etht-svc
         +--rw etht-svc-instances* [etht-svc-name]
            +--rw etht-svc-end-points* [etht-svc-end-point-name]
               +--rw etht-svc-access-points* [access-point-id]
                  +--rw access-point-id    string
                  +--rw access-node-id?    te-types:te-node-id
                  +--rw access-node-uri?   nw:node-id
                  +--rw access-ltp-id?     te-types:te-tp-id
                  +--rw access-ltp-uri?    nt:tp-id
                  +--rw access-role?       identityref
                  ...................................
]]></artwork>
        </section>
        <section anchor="threshold-configuration">
          <name>Threshold Configuration</name>
          <t>Some PM data are quite critical for client signal service users'
experience, e.g. latency value.  For the Operators, they can
configure a service-oriented threshold for the PM data, to make the
maintenance engineer recognize the network issues in time.</t>
          <artwork type="ascii-art"><![CDATA[
   module: ietf-trans-client-service
      +--rw client-svc
         +--rw client-svc-instances* [client-svc-name]
            +--rw alarm-shreshold
               +--rw latency-threshold?   uint32
               ...................................

   module: ietf-eth-tran-service
      +--rw etht-svc
         +--rw etht-svc-instances* [etht-svc-name]
            +--rw alarm-shreshold
               +--rw latency-threshold?   uint32
               ...................................
]]></artwork>
        </section>
      </section>
      <section anchor="state-data-of-services">
        <name>State data of Services</name>
        <section anchor="generic-requirements">
          <name>Generic Requirements</name>
          <t>States have been defined to retrieve the status of the delivered
services.  A few generic states defined in <xref target="I-D.ietf-teas-rfc8776-update"/> are reused in
this document.  These states include the operational state and the
provisioning state.</t>
          <artwork type="ascii-art"><![CDATA[
   module: ietf-trans-client-service
      +--rw client-svc
         +--rw client-svc-instances* [client-svc-name]
            +--ro operational-state?        identityref
            +--ro provisioning-state?       identityref
            ...................................

   module: ietf-eth-tran-service
      +--rw etht-svc
         +--rw etht-svc-instances* [etht-svc-name]
            +--ro state
               +--ro operational-state?    identityref
               +--ro provisioning-state?   identityref
               ...................................
]]></artwork>
        </section>
        <section anchor="timestamp-and-administrative-information">
          <name>Timestamp and Administrative information</name>
          <t>A few other parameters are defined for the management of the
services.  Given the complicated labor division, the creation, update
and maintainance may have different responsible systems.  So the log
of the service would be helpful and should be easy to retrived in a
standard way as well.  These information include, but not restricted
to the following:</t>
          <ul spacing="normal">
            <li>
              <t>When the service is created and has been last updated, these are
specified in the creation-time and last-updated-time.</t>
            </li>
            <li>
              <t>Who created the service and who made the last update to the
service, these are specified in the created-by and last-updated-
by.</t>
            </li>
            <li>
              <t>The owner of the service is specifed as owned-by, which would be
useful when the service is delegated by or to a specific system.
The identifier of the system is used to represent such
information.</t>
            </li>
          </ul>
          <artwork type="ascii-art"><![CDATA[
   module: ietf-trans-client-service
      +--rw client-svc
         +--rw client-svc-instances* [client-svc-name]
            +--ro creation-time?            yang:date-and-time
            +--ro last-updated-time?        yang:date-and-time
            +--ro created-by?               string
            +--ro last-updated-by?          string
            +--ro owned-by?                 string
            ...................................

   module: ietf-eth-tran-service
      +--rw etht-svc
         +--rw etht-svc-instances* [etht-svc-name]
            +--ro state
               +--ro creation-time?        yang:date-and-time
               +--ro last-updated-time?    yang:date-and-time
               +--ro created-by?           string
               +--ro last-updated-by?      string
               +--ro owned-by?             string
               ...................................
]]></artwork>
        </section>
        <section anchor="performance-monitoring-status">
          <name>performance monitoring status</name>
          <t>For the Operators, there are also some requirements to provide some
PM data to the service users.  Especially some PM data are quite
critical for users' experience.</t>
          <t>For example, one of the great advantage of client signal service is
it can provide deterministic low latency.  Some industry users, e.g.
stock trading company, have great demand of stable short latency
service to ensure their high-frequency fast trading operations can be
finished quickly and definitely.  In addition to provision a low-
latency client signal service, Operators can also provide some other
differentiated services for these kinds of service users.  For
example latency visibility can be provided to the users, to let them
monitor the latency values.</t>
          <t>The latency measurement mechanism can be referenced from sub-clause
7.10.1 of <xref target="ITU-T_G.875"/>.  And PNC can provide a measurement latency
after service is provisioned if the devices support this measurement
mechanism.  Otherwise providing an estimated value could be a
workaround solution.</t>
          <artwork type="ascii-art"><![CDATA[
   module: ietf-trans-client-service
      +--rw client-svc
         +--rw client-svc-instances* [client-svc-name]
            +--ro pm-state
               +--ro latency?   uint32
               ...................................

   module: ietf-eth-tran-service
      +--rw etht-svc
         +--rw etht-svc-instances* [etht-svc-name]
            +--ro state
               +--ro pm-state
                  +--ro latency?   uint32
                  ...................................
]]></artwork>
        </section>
        <section anchor="error-message-report">
          <name>Error Message Report</name>
          <t>Once the processing of client signal service configuration, including
creation, updating, deletion, meets with some internal problems, such
as no enough available bandwidth, or wrong client signal mapping
.etc., the problems should be reported to the client system to make
the issues read by the maintenance engineers.  Since these error
messages are more technologies-specific, especially sometimes
accurate location information is needed in these messages, it is hard
to standardize these error messages by RESTCONF protocol errors.  For
the client systems, they would like to get these messages both from
notifications and retrieval.  So this document defines an error
container in the YANG data model to let the PNC to provide these
messages.</t>
          <artwork type="ascii-art"><![CDATA[
   module: ietf-trans-client-service
      +--rw client-svc
         +--rw client-svc-instances* [client-svc-name]
            +--ro error-info
               +--ro error-code?          uint16
               +--ro error-description?   string
               +--ro error-timestamp?     yang:date-and-time
               ...................................

   module: ietf-eth-tran-service
      +--rw etht-svc
         +--rw etht-svc-instances* [etht-svc-name]
            +--rw etht-svc-end-points* [etht-svc-end-point-name]
            +--ro state
               +--ro error-info
                  +--ro error-code?          uint16
                  +--ro error-description?   string
                  +--ro error-timestamp?     yang:date-and-time
                  ...................................
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="yang-model-for-transport-network-client-signal">
      <name>YANG Model for Transport Network Client Signal</name>
      <section anchor="eth-svc-tree">
        <name>YANG Tree for Ethernet Service</name>
        <figure anchor="fig-eth-svc-tree">
          <artwork type="ascii-art" name="ietf-eth-tran-service-fold.tree"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

module: ietf-eth-tran-service
  +--rw etht-svc
     +--rw globals
     |  +--rw named-bandwidth-profiles* [bandwidth-profile-name]
     |     +--rw bandwidth-profile-name    string
     |     +--rw bandwidth-profile-type?
     |     |       etht-types:bandwidth-profile-type
     |     +--rw CIR?                      uint64
     |     +--rw CBS?                      uint64
     |     +--rw EIR?                      uint64
     |     +--rw EBS?                      uint64
     |     +--rw color-aware?              boolean
     |     +--rw coupling-flag?            boolean
     +--rw etht-svc-instances* [etht-svc-name]
        +--rw etht-svc-name             string
        +--rw etht-svc-title?           string
        +--rw user-label?               string
        +--rw etht-svc-descr?           string
        +--rw etht-svc-customer?        string
        +--rw etht-svc-type?            etht-types:service-type
        +--rw etht-svc-lifecycle?       etht-types:lifecycle-status
        +--rw te-topology-identifier
        |  +--rw provider-id?   te-global-id
        |  +--rw client-id?     te-global-id
        |  +--rw topology-id?   te-topology-id
        +--rw resilience
        |  +--rw protection
        |  |  +--rw protection-type?                identityref
        |  |  +--rw protection-reversion-disable?   boolean
        |  |  +--rw hold-off-time?                  uint32
        |  |  +--rw wait-to-revert?                 uint16
        |  |  +--rw aps-signal-id?                  uint8
        |  +--rw restoration
        |     +--rw restoration-type?                identityref
        |     +--rw restoration-scheme?              identityref
        |     +--rw restoration-reversion-disable?   boolean
        |     +--rw hold-off-time?                   uint32
        |     +--rw wait-to-restore?                 uint16
        |     +--rw wait-to-revert?                  uint16
        +--rw etht-svc-end-points* [etht-svc-end-point-name]
        |  +--rw etht-svc-end-point-name                   string
        |  +--rw etht-svc-end-point-id?                    string
        |  +--rw etht-svc-end-point-descr?                 string
        |  +--rw topology-role?
        |  |       identityref
        |  +--rw resilience
        |  +--rw etht-svc-access-points* [access-point-id]
        |  |  +--rw access-point-id    string
        |  |  +--rw access-node-id?    te-types:te-node-id
        |  |  +--rw access-node-uri?   nw:node-id
        |  |  +--rw access-ltp-id?     te-types:te-tp-id
        |  |  +--rw access-ltp-uri?    nt:tp-id
        |  |  +--rw access-role?       identityref
        |  |  +--rw pm-config
        |  |  |  +--rw pm-enable?             boolean
        |  |  |  +--rw sending-rate-high?     uint64
        |  |  |  +--rw sending-rate-low?      uint64
        |  |  |  +--rw receiving-rate-high?   uint64
        |  |  |  +--rw receiving-rate-low?    uint64
        |  |  +--ro state
        |  |  |  +--ro operational-state?    identityref
        |  |  |  +--ro provisioning-state?   identityref
        |  |  +--ro performance?       identityref
        |  +--rw service-classification-type?
        |  |       identityref
        |  +--rw (service-classification)?
        |  |  +--:(port-classification)
        |  |  +--:(vlan-classification)
        |  |     +--rw outer-tag!
        |  |     |  +--rw tag-type?
        |  |     |  |       etht-types:eth-tag-classify
        |  |     |  +--rw (individual-bundling-vlan)?
        |  |     |     +--:(individual-vlan)
        |  |     |     |  +--rw vlan-value?   etht-types:vlanid
        |  |     |     +--:(vlan-bundling)
        |  |     |        +--rw vlan-range?
        |  |     |                etht-types:vid-range-type
        |  |     +--rw second-tag!
        |  |        +--rw tag-type?
        |  |        |       etht-types:eth-tag-classify
        |  |        +--rw (individual-bundling-vlan)?
        |  |           +--:(individual-vlan)
        |  |           |  +--rw vlan-value?   etht-types:vlanid
        |  |           +--:(vlan-bundling)
        |  |              +--rw vlan-range?
        |  |                      etht-types:vid-range-type
        |  +--rw split-horizon-group?                      string
        |  +--rw (direction)?
        |  |  +--:(symmetrical)
        |  |  |  +--rw ingress-egress-bandwidth-profile
        |  |  |     +--rw (style)?
        |  |  |        +--:(named)
        |  |  |        |  +--rw bandwidth-profile-name?   leafref
        |  |  |        +--:(value)
        |  |  |           +--rw bandwidth-profile-type?
        |  |  |           |       etht-types:bandwidth-profile-type
        |  |  |           +--rw CIR?                      uint64
        |  |  |           +--rw CBS?                      uint64
        |  |  |           +--rw EIR?                      uint64
        |  |  |           +--rw EBS?                      uint64
        |  |  |           +--rw color-aware?              boolean
        |  |  |           +--rw coupling-flag?            boolean
        |  |  +--:(asymmetrical)
        |  |     +--rw ingress-bandwidth-profile
        |  |     |  +--rw (style)?
        |  |     |     +--:(named)
        |  |     |     |  +--rw bandwidth-profile-name?   leafref
        |  |     |     +--:(value)
        |  |     |        +--rw bandwidth-profile-type?
        |  |     |        |       etht-types:bandwidth-profile-type
        |  |     |        +--rw CIR?                      uint64
        |  |     |        +--rw CBS?                      uint64
        |  |     |        +--rw EIR?                      uint64
        |  |     |        +--rw EBS?                      uint64
        |  |     |        +--rw color-aware?              boolean
        |  |     |        +--rw coupling-flag?            boolean
        |  |     +--rw egress-bandwidth-profile
        |  |        +--rw (style)?
        |  |           +--:(named)
        |  |           |  +--rw bandwidth-profile-name?   leafref
        |  |           +--:(value)
        |  |              +--rw bandwidth-profile-type?
        |  |              |       etht-types:bandwidth-profile-type
        |  |              +--rw CIR?                      uint64
        |  |              +--rw CBS?                      uint64
        |  |              +--rw EIR?                      uint64
        |  |              +--rw EBS?                      uint64
        |  |              +--rw color-aware?              boolean
        |  |              +--rw coupling-flag?            boolean
        |  +--rw vlan-operations
        |     +--rw (direction)?
        |        +--:(symmetrical)
        |        |  +--rw symmetrical-operation
        |        |     +--rw pop-tags?    uint8
        |        |     +--rw push-tags
        |        |        +--rw outer-tag!
        |        |        |  +--rw tag-type?
        |        |        |  |       etht-types:eth-tag-type
        |        |        |  +--rw vlan-value?    etht-types:vlanid
        |        |        |  +--rw default-pcp?   uint8
        |        |        +--rw second-tag!
        |        |           +--rw tag-type?
        |        |           |       etht-types:eth-tag-type
        |        |           +--rw vlan-value?    etht-types:vlanid
        |        |           +--rw default-pcp?   uint8
        |        +--:(asymmetrical)
        |           +--rw asymmetrical-operation
        |              +--rw ingress
        |              |  +--rw pop-tags?    uint8
        |              |  +--rw push-tags
        |              |     +--rw outer-tag!
        |              |     |  +--rw tag-type?
        |              |     |  |       etht-types:eth-tag-type
        |              |     |  +--rw vlan-value?
        |              |     |  |       etht-types:vlanid
        |              |     |  +--rw default-pcp?   uint8
        |              |     +--rw second-tag!
        |              |        +--rw tag-type?
        |              |        |       etht-types:eth-tag-type
        |              |        +--rw vlan-value?
        |              |        |       etht-types:vlanid
        |              |        +--rw default-pcp?   uint8
        |              +--rw egress
        |                 +--rw pop-tags?    uint8
        |                 +--rw push-tags
        |                    +--rw outer-tag!
        |                    |  +--rw tag-type?
        |                    |  |       etht-types:eth-tag-type
        |                    |  +--rw vlan-value?
        |                    |  |       etht-types:vlanid
        |                    |  +--rw default-pcp?   uint8
        |                    +--rw second-tag!
        |                       +--rw tag-type?
        |                       |       etht-types:eth-tag-type
        |                       +--rw vlan-value?
        |                       |       etht-types:vlanid
        |                       +--rw default-pcp?   uint8
        +--rw alarm-threshold
        |  +--rw latency-threshold?   uint32
        +--rw underlay
        |  +--rw (technology)?
        |  |  +--:(native-ethernet)
        |  |  |  +--rw eth-tunnels* [name]
        |  |  |     +--rw name
        |  |  |     |       -> /te:te/tunnels/tunnel/name
        |  |  |     +--rw encoding?         identityref
        |  |  |     +--rw switching-type?   identityref
        |  |  +--:(frame-base)
        |  |  |  +--rw otn-tunnels* [name]
        |  |  |     +--rw name
        |  |  |     |       -> /te:te/tunnels/tunnel/name
        |  |  |     +--rw encoding?         identityref
        |  |  |     +--rw switching-type?   identityref
        |  |  +--:(mpls-tp)
        |  |     +--rw pw
        |  |        +--rw pw-id?                       string
        |  |        +--rw pw-name?                     string
        |  |        +--rw transmit-label?
        |  |        |       rt-types:mpls-label
        |  |        +--rw receive-label?
        |  |        |       rt-types:mpls-label
        |  |        +--rw encapsulation-type?          identityref
        |  |        +--ro oper-status?                 identityref
        |  |        +--rw ingress-bandwidth-profile
        |  |        |  +--rw (style)?
        |  |        |     +--:(named)
        |  |        |     |  +--rw bandwidth-profile-name?   leafref
        |  |        |     +--:(value)
        |  |        |        +--rw bandwidth-profile-type?
        |  |        |        |       etht-types:bandwidth-profile-ty\
pe
        |  |        |        +--rw CIR?                      uint64
        |  |        |        +--rw CBS?                      uint64
        |  |        |        +--rw EIR?                      uint64
        |  |        |        +--rw EBS?                      uint64
        |  |        +--rw pw-paths* [path-id]
        |  |           +--rw path-id       uint8
        |  |           +--rw tp-tunnels* [name]
        |  |              +--rw name    string
        |  +--rw src-split-horizon-group?   string
        |  +--rw dst-split-horizon-group?   string
        +--rw admin-status?             identityref
        +--ro state
           +--ro operational-state?    identityref
           +--ro provisioning-state?   identityref
           +--ro creation-time?        yang:date-and-time
           +--ro last-updated-time?    yang:date-and-time
           +--ro created-by?           string
           +--ro last-updated-by?      string
           +--ro owned-by?             string
           +--ro pm-state
           |  +--ro latency?   uint32
           +--ro error-info
              +--ro error-code?          uint16
              +--ro error-description?   string
              +--ro error-timestamp?     yang:date-and-time
]]></artwork>
        </figure>
      </section>
      <section anchor="cbr-svc-tree">
        <name>YANG Tree for other Transport Network Client Signal Model</name>
        <figure anchor="fig-cbr-svc-tree">
          <artwork type="ascii-art" name="ietf-trans-client-service.tree"><![CDATA[
module: ietf-trans-client-service
  +--rw client-svc
     +--rw client-svc-instances* [client-svc-name]
        +--rw client-svc-name           string
        +--rw client-svc-title?         string
        +--rw user-label?               string
        +--rw client-svc-descr?         string
        +--rw client-svc-customer?      string
        +--rw resilience
        +--rw te-topology-identifier
        |  +--rw provider-id?   te-global-id
        |  +--rw client-id?     te-global-id
        |  +--rw topology-id?   te-topology-id
        +--rw admin-status?             identityref
        +--rw src-access-ports
        |  +--rw access-node-id?    te-types:te-node-id
        |  +--rw access-node-uri?   nw:node-id
        |  +--rw access-ltp-id?     te-types:te-tp-id
        |  +--rw access-ltp-uri?    nt:tp-id
        |  +--rw client-signal?     identityref
        +--rw dst-access-ports
        |  +--rw access-node-id?    te-types:te-node-id
        |  +--rw access-node-uri?   nw:node-id
        |  +--rw access-ltp-id?     te-types:te-tp-id
        |  +--rw access-ltp-uri?    nt:tp-id
        |  +--rw client-signal?     identityref
        +--ro pm-state
        |  +--ro latency?   uint32
        +--ro error-info
        |  +--ro error-code?          uint16
        |  +--ro error-description?   string
        |  +--ro error-timestamp?     yang:date-and-time
        +--rw alarm-threshold
        |  +--rw latency-threshold?   uint32
        +--rw direction?                identityref
        +--rw svc-tunnels* [tunnel-name]
        |  +--rw tunnel-name    string
        +--ro operational-state?        identityref
        +--ro provisioning-state?       identityref
        +--ro creation-time?            yang:date-and-time
        +--ro last-updated-time?        yang:date-and-time
        +--ro created-by?               string
        +--ro last-updated-by?          string
        +--ro owned-by?                 string
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="yang-code-for-transport-network-client-signal">
      <name>YANG Code for Transport Network Client Signal</name>
      <section anchor="the-eth-service-yang-code">
        <name>The ETH Service YANG Code</name>
        <t>This module imports typedefs and modules from <xref target="RFC6991"/>, <xref target="RFC8294"/>,
<xref target="I-D.ietf-teas-rfc8776-update"/>.</t>
        <figure anchor="fig-eth-svc-yang">
          <sourcecode type="yang" markers="true" name="ietf-eth-tran-service@2024-01-11.yang"><![CDATA[
module ietf-eth-tran-service {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-eth-tran-service";
  prefix etht-svc;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }

  import ietf-routing-types {
    prefix rt-types;
    reference
      "RFC 8294: Common YANG Data Types for the Routing Area";
  }

  import ietf-te-types {
    prefix te-types;
    reference "RFCYYYY: Traffic Engineering Common YANG Types";
  }
  // RFC Editor: replace YYYY with the actual RFC number assigned
  // to the RFC once draft-ietf-teas-rfc8776-update
  // becomes an RFC, update date information and remove this note.

  import ietf-network {
    prefix nw;
    reference
      "RFC8345: A YANG Data Model for Network Topologies";
  }

  import ietf-network-topology {
    prefix "nt";
    reference
      "RFC8345: A YANG Data Model for Network Topologies";
  }

  import ietf-te {
    prefix "te";
    reference
      "RFCKKKK: A YANG Data Model for Traffic Engineering Tunnels
      and Interfaces";
  }
  // RFC Editor: replace KKKK with the actual RFC number assigned
  // to the RFC once draft-ietf-teas-yang-te
  // becomes an RFC, update date information and remove this note.

  import ietf-eth-tran-types {
    prefix etht-types;
    reference
      "RFCXXXX: A YANG Data Model for Transport Network Client 
      Signals";
  }
  // RFC Editor: replace XXXX with the actual RFC number assigned
  // to the RFC once this draft
  // becomes an RFC, update date information and remove this note.

  organization
    "Internet Engineering Task Force (IETF) CCAMP WG";
  contact
    "WG Web: <https://datatracker.ietf.org/wg/ccamp/>
     WG List: <mailto:ccamp@ietf.org>

     Editor: Haomian Zheng
             <mailto:zhenghaomian@huawei.com>

     Editor: Aihua Guo
             <mailto:aihuaguo.ietf@gmail.com>

     Editor: Italo Busi
             <mailto:italo.busi@huawei.com>

     Editor: Anton Snitser
             <mailto:asnizar@cisco.com>

     Editor: Chaode Yu
             <mailto:yuchaode@huawei.com>";

  description
    "This module defines a YANG data model for describing
    Ethernet transport network client services.

    The model fully conforms to the Network Management
    Datastore Architecture (NMDA).

    Copyright (c) 2024 IETF Trust and the persons
    identified as authors of the code.  All rights reserved.

    Redistribution and use in source and binary forms, with or
    without modification, is permitted pursuant to, and subject
    to the license terms contained in, the Revised BSD License
    set forth in Section 4.c of the IETF Trust's Legal Provisions
    Relating to IETF Documents
    (https://trustee.ietf.org/license-info).

    This version of this YANG module is part of RFC XXXX; see
    the RFC itself for full legal notices.";

  revision 2024-01-11 {
    description
      "Initial Version";
    reference
      "RFC XXXX: A YANG Data Model for Transport Network Client
      Signals";
  }
  // RFC Editor: replace XXXX with the actual RFC number assigned
  // to the RFC once this draft
  // becomes an RFC, update date information and remove this note.

  /*
   * Groupings
   */

  grouping vlan-classification {
    description
      "A grouping which represents classification
      on an 802.1Q VLAN tag.";

    leaf tag-type {
      type etht-types:eth-tag-classify;
      description
        "The tag type used for VLAN classification.";
    }
    choice individual-bundling-vlan {
      description
        "VLAN based classification can be individual
         or bundling.";

      case individual-vlan {
        leaf vlan-value {
          type etht-types:vlanid;
          description
            "VLAN ID value.";
        }
      }
      case vlan-bundling {
        leaf vlan-range {
          type etht-types:vid-range-type;
          description
            "List of VLAN ID values.";
        }
      }
    }
  }

  grouping vlan-write {
    description
      "A grouping which represents push/pop operations
       of an 802.1Q VLAN tag.";

    leaf tag-type {
      type etht-types:eth-tag-type;
      description
        "The VLAN tag type to push/swap.";
    }
    leaf vlan-value {
      type etht-types:vlanid;
      description
        "The VLAN ID value to push/swap.";
    }
/*
 * To be added: this attribute is used when:
 * a) the ETH service has only one CoS (as in current version)
 * b) as a default when a mapping between a given CoS value
 *    and the PCP value is not defined (in future versions)
 */
    leaf default-pcp {
      type uint8 {
        range "0..7";
      }
      description
        "The default Priority Code Point (PCP) value to push/swap";
    }
  }

  grouping vlan-operations {
    description
      "A grouping which represents VLAN operations.";

    leaf pop-tags {
      type uint8 {
        range "1..2";
      }
      description
        "The number of VLAN tags to pop (or swap if used in
        conjunction with push-tags)";
    }
    container push-tags {
      description
        "The VLAN tags to push (or swap if used in
         conjunction with pop-tags)";
      container outer-tag {
        presence
          "Indicates existence of the outermost VLAN tag to
           push/swap";
        description
          "The outermost VLAN tag to push/swap.";
        uses vlan-write;
      }
      container second-tag {
      must
        '../outer-tag/tag-type = "etht-types:s-vlan-tag-type" and ' +
        'tag-type = "etht-types:c-vlan-tag-type"'
        {
          error-message
            "
              When pushing/swapping two tags, the outermost tag must
              be specified and of S-VLAN type and the second
              outermost tag must be of C-VLAN tag type.
            ";
          description
            "
              For IEEE 802.1Q interoperability, when pushing/swapping
              two tags, it is required that the outermost tag exists
              and is an S-VLAN, and the second outermost tag is a
              C-VLAN.
            ";
        }
        presence
          "Indicates existence of a second outermost VLAN tag to
           push/swap";
        description
          "The second outermost VLAN tag to push/swap.";
        uses vlan-write;
      }
    }
  }

  grouping named-or-value-bandwidth-profile {
    description
      "A grouping to configure a bandwdith profile either by
       referencing a named bandwidth profile or by
       configuring the values of the bandwidth profile attributes.";
    choice style {
      description
        "Whether the bandwidth profile is named or defined by value";
      case named {
        description
          "Named bandwidth profile.";
        leaf bandwidth-profile-name {
          type leafref {
             path "/etht-svc:etht-svc/etht-svc:globals/"
             + "etht-svc:named-bandwidth-profiles/"
             + "etht-svc:bandwidth-profile-name";
             }
          description
            "Name of the bandwidth profile.";
        }
      }
      case value {
        description
          "Bandwidth profile configured by value.";
        uses etht-types:etht-bandwidth-profiles;
      }
    }
  }

  grouping bandwidth-profiles {
    description
      "A grouping which represent bandwidth profile configuration.";

    choice direction {
      description
        "Whether the bandwidth profiles are symmetrical or
         asymmetrical";
      case symmetrical {
        description
          "The same bandwidth profile is used to describe both
           the ingress and the egress bandwidth profile.";
        container ingress-egress-bandwidth-profile {
          description
            "The bandwdith profile used in both directions.";
          uses named-or-value-bandwidth-profile;
        }
      }
      case asymmetrical {
        description
          "Ingress and egress bandwidth profiles can be specified.";
        container ingress-bandwidth-profile {
          description
            "The bandwdith profile used in the ingress direction.";
          uses named-or-value-bandwidth-profile;
        }
        container egress-bandwidth-profile {
          description
            "The bandwdith profile used in the egress direction.";
          uses named-or-value-bandwidth-profile;
        }
      }
    }
  }

  grouping etht-svc-access-parameters {
    description
      "ETH services access parameters";

    leaf access-node-id {
      type te-types:te-node-id;
      description
        "The identifier of the access node in
         the ETH TE topology.";
    }
    leaf access-node-uri {
      type nw:node-id;
      description
        "The identifier of the access node in the network.";
    }
    leaf access-ltp-id {
      type te-types:te-tp-id;
      description
        "The TE link termination point identifier, used
         together with access-node-id to identify the
         access LTP.";
    }
    leaf access-ltp-uri {
      type nt:tp-id;
      description
        "The link termination point identifier in network topology,
        used together with access-node-uri to identify the
        access LTP.";
    }
    leaf access-role {
      type identityref {
        base etht-types:access-role;
      }
      description
        "Indicate the role of access, e.g., working or protection. ";
    }
    container pm-config {
      uses pm-config-grouping;
      description
      "This grouping is used to set the threshold value for
      performance monitoring. ";
    }
    container state {
      config false;
      description
        "The state is used to monitor the status of service. ";
      leaf operational-state {
        type identityref {
          base te-types:tunnel-state-type;
        }
        description
          "Indicating the operational state of client signal. ";
      }
      leaf provisioning-state {
        type identityref {
          base te-types:lsp-state-type;
        }
        description
          "Indicating the provisional state of client signal,
          especially when there is a change, i.e., revise, create. ";
      }
    }
    leaf performance {
      type identityref {
        base etht-types:performance;
      }
      config false;
      description
        "Performance Monitoring for the service. ";
    }
  }

  grouping etht-svc-tunnel-parameters {
    description
      "ETH services tunnel parameters.";

    choice technology {
      description
        "Service multiplexing is optional and flexible.";
      case native-ethernet {
        /*
         placeholder to support proprietary multiplexing
         (for further discussion)
        */
        list eth-tunnels {
          key name;
          description
            "ETH Tunnel list in native Ethernet scenario.";
          uses tunnels-grouping;
        }
      }
      case frame-base {
        list otn-tunnels {
          key name;
          description
            "OTN Tunnel list in Frame-based scenario.";
          uses tunnels-grouping;
        }
      }
      case mpls-tp {
        container pw {
          description
            "Pseudowire information for Ethernet over MPLS-TP.";
          uses pw-segment-grouping;
        }
      }
    }
    /*
    * Open issue: 
    *   can we constraints it to be used only with mp services?
    */
    leaf src-split-horizon-group {
      type string;
      description
        "Identify a split horizon group at the source Tunnel
        Termination Point (TTP).";
    }
    leaf dst-split-horizon-group {
      type string;
      description
        "Identify a split horizon group at the destination Tunnel
        Termination Point (TTP).";
    }
  }

  grouping  etht-svc-pm-threshold-config {
    description
      "Configuraiton parameters for Ethernet service PM thresholds.";

    leaf sending-rate-high {
      type uint64;
      description
        "High threshold of packet sending rate in kbps.";
    }
    leaf sending-rate-low {
      type uint64;
      description
        "Low threshold of packet sending rate in kbps.";
    }
    leaf receiving-rate-high {
      type uint64;
      description
        "High threshold of packet receiving rate in kbps.";
    }
    leaf receiving-rate-low {
      type uint64;
      description
        "Low threshold of packet receiving rate in kbps.";
    }
  }

  grouping  etht-svc-pm-stats {
    description
      "Ethernet service PM statistics.";

    leaf sending-rate-too-high {
      type uint32;
      description
        "Counter that indicates the number of times the
        sending rate is above the high threshold";
    }
    leaf sending-rate-too-low {
      type uint32;
      description
        "Counter that indicates the number of times the
        sending rate is below the low threshold";
    }
    leaf receiving-rate-too-high {
      type uint32;
      description
        "Counter that indicates the number of times the
        receiving rate is above the high threshold";
    }
    leaf receiving-rate-too-low {
      type uint32;
      description
        "Counter that indicates the number of times the
        receiving rate is below the low threshold";
    }
  }

  grouping  etht-svc-instance-config {
    description
      "Configuraiton parameters for Ethernet services.";

    leaf etht-svc-name {
      type string;
      description
        "Name of the ETH service.";
    }
    leaf etht-svc-title {
      type string;
      description
        "The Identifier of the ETH service.";
    }
    leaf user-label {
      type string;
      description
        "Alias of the ETH service.";
    }
    leaf etht-svc-descr {
      type string;
      description
        "Description of the ETH service.";
    }
    leaf etht-svc-customer {
      type string;
      description
        "Customer of the ETH service.";
    }
    leaf etht-svc-type {
      type etht-types:service-type;
      description
        "Type of ETH service (p2p, mp2mp or rmp).";
      /* Add default as p2p */
    }
    leaf etht-svc-lifecycle {
      type etht-types:lifecycle-status;
      description
        "Lifecycle state of ETH service.";
      /* Add default as installed  */
    }
    uses te-types:te-topology-identifier;
    uses resilience-grouping;
    list etht-svc-end-points {
      key etht-svc-end-point-name;
      description
        "The logical end point for the ETH service. ";
      uses etht-svc-end-point-grouping;
    }
    container alarm-threshold {
      description
        "threshold configuration for the E2E client signal";
      uses alarm-threshold-grouping;
    }
    container underlay {
      description
        "The unterlay tunnel information that carrying the
        ETH service. ";
      uses etht-svc-tunnel-parameters;
    }
    leaf admin-status {
      type identityref {
        base te-types:tunnel-admin-state-type;
      }
      default te-types:tunnel-admin-state-up;
      description "ETH service administrative state.";
    }
  }

  grouping  etht-svc-instance-state {
    description
      "State parameters for Ethernet services.";

    leaf operational-state {
      type identityref {
        base te-types:tunnel-state-type;
      }
      default te-types:tunnel-state-up;
      description
        "ETH service operational state.";
    }
    leaf provisioning-state {
      type identityref {
        base te-types:lsp-state-type;
      }
      description
        "ETH service provisioning state.";
    }
    leaf creation-time {
      type yang:date-and-time;
      description
        "Time of ETH service creation.";
    }
    leaf last-updated-time {
      type yang:date-and-time;
      description
        "Time of ETH service last update.";
    }
    leaf created-by {
       type string;
       description
         "The client signal is created by whom,
          can be a system or staff ID.";
     }
     leaf last-updated-by {
       type string;
       description
         "The client signal is last updated by whom,
          can be a system or staff ID.";
     }
     leaf owned-by {
       type string;
       description
         "The client signal is last updated by whom,
          can be a system ID.";
     }
     container pm-state {
       description
         "PM data of E2E Ethernet service";
       uses pm-state-grouping;
     }
     container error-info {
       description "error messages of configuration";
       uses error-info-grouping;
     }
  }

  grouping pm-state-grouping {
    description
      "Performance Monitoring (PM) state attributes";
    leaf latency {
      type uint32;
      units microsecond;
      description
        "latency value of the E2E Ethernet service";
    }
  }

  grouping error-info-grouping {
    description
      "Error information parameters";

    leaf error-code {
      type uint16;
      description "error code";
    }
    leaf error-description {
      type string;
      description "detail message of error";
    }
    leaf error-timestamp {
      type yang:date-and-time;
      description "the date and time error is happened";
    }
  }

  grouping alarm-threshold-grouping {
    description
      "Alarm threshold parameters.";
    leaf latency-threshold {
      type uint32;
      units microsecond;
      description
        "a threshold for the E2E client signal service's
        latency. Once the latency value exceed this threshold,
        an alarm should be triggered.";
     }
  }

  grouping resilience-grouping {
    description
      "Grouping for resilience configuration. ";
    container resilience {
    description
      "To configure the data plane protection parameters,
      currently a placeholder only, future candidate attributes
      include, Revert, WTR, Hold-off Timer, ...";
      uses te:protection-restoration-properties;
    }
  }

  grouping etht-svc-end-point-grouping {
    description
      "Grouping for the end point configuration.";

    leaf etht-svc-end-point-name {
      type string;
      description
        "The name of the logical end point of ETH service. ";
    }
    leaf etht-svc-end-point-id {
      type string;
      description
        "The identifier of the logical end point of ETH service.";
    }
    leaf etht-svc-end-point-descr {
      type string;
      description
        "The description of the logical end point of ETH service. ";
    }
    leaf topology-role {
      type identityref {
        base etht-types:topology-role;
      }
      description
        "Indicating the underlay topology role,
        e.g., hub,spoke, any-to-any ";
    }
    container resilience {
      description
        "Placeholder for resilience configuration, for future
        study.";
    }
    list etht-svc-access-points {
      key access-point-id;
      min-elements "1";
      /*
        Open Issue:
          Is it possible to limit the max-elements only for p2p
          services?
            max-elements "2";
      */
      description
        "List of the ETH trasport services access point instances.";
      leaf access-point-id {
        type string;
        description
          "ID of the service access point instance";
      }
      uses etht-svc-access-parameters;
    }
    leaf service-classification-type {
      type identityref {
        base etht-types:service-classification-type;
      }
      description
        "Service classification type.";
    }
    choice service-classification {
      description
        "Access classification can be port-based or
         VLAN based.";
      case port-classification {
        /* no additional information */
      }
      case vlan-classification {
        container outer-tag {
          presence "The outermost VLAN tag exists";
          description
            "Classifies traffic using the outermost VLAN tag.";
          uses vlan-classification;
        }
        container second-tag {
          must
            '../outer-tag/tag-type = "etht-types:classify-s-vlan"' +
            ' and tag-type = "etht-types:classify-c-vlan"'
          {
            error-message
              "
                When matching two tags, the outermost tag must be
                specified and of S-VLAN type and the second
                outermost tag must be of C-VLAN tag type.
              ";
            description
              "
                For IEEE 802.1Q interoperability, when matching two
                tags, it is required that the outermost tag exists
                and is an S-VLAN, and the second outermost tag is a
                C-VLAN.
              ";
          }
          presence "The second outermost VLAN tag exists";
          description
            "Classifies traffic using the second outermost VLAN
            tag.";
          uses vlan-classification;
        }
      }
    }
    /*
    * Open issue: 
    *   can we constraints it to be used only with mp services?
    */
    leaf split-horizon-group {
      type string;
      description "Identify a split horizon group";
    }
    uses bandwidth-profiles;
    container vlan-operations {
      description
        "Configuration of VLAN operations.";
      choice direction {
        description
          "Whether the VLAN operations are symmetrical or
           asymmetrical";
        case symmetrical {
          container symmetrical-operation {
            uses vlan-operations;
            description
              "Symmetrical operations.
               Expressed in the ingress direction, but
               the reverse operation is applied to egress traffic";
          }
        }
        case asymmetrical {
          container asymmetrical-operation {
            description "Asymmetrical operations";
            container ingress {
              uses vlan-operations;
              description "Ingress operations";
            }
            container egress {
              uses vlan-operations;
              description "Egress operations";
            }
          }
        }
      }
    }
  }

  grouping pm-config-grouping {
    description
      "Grouping used for Performance Monitoring Configuration. ";

    leaf pm-enable {
      type boolean;
      description
      "Whether to enable the performance monitoring.";
    }
    leaf sending-rate-high {
      type uint64;
      description
      "The upperbound of sending rate.";
    }
    leaf sending-rate-low {
      type uint64;
      description
      "The lowerbound of sending rate.";
    }
    leaf receiving-rate-high {
      type uint64;
      description
      "The upperbound of receiving rate.";
    }
    leaf receiving-rate-low {
      type uint64;
      description
      "The lowerbound of receiving rate.";
    }
  }

  grouping pw-segment-grouping {
    description
      "Grouping used for PW configuration. ";

    leaf pw-id {
      type string;
      description
        "The Identifier information of pseudowire. ";
    }
    leaf pw-name {
      type string;
      description
        "The name information of pseudowire.";
    }
    leaf transmit-label {
      type rt-types:mpls-label;
      description
        "Transmit label information in PW. ";
    }
    leaf receive-label {
      type rt-types:mpls-label;
      description
        "Receive label information in PW. ";
    }
    leaf encapsulation-type {
      type identityref {
        base etht-types:encapsulation-type;
      }
      description
        "The encapsulation type, raw or tag. ";
    }
    leaf oper-status {
      type identityref {
        base te-types:tunnel-state-type;
      }
      config false;
      description
        "The operational state of the PW segment. ";
    }
    container ingress-bandwidth-profile {
      description
        "Bandwidth Profile for ingress. ";
      uses pw-segment-named-or-value-bandwidth-profile;
    }
    list pw-paths {
      key path-id;
      description
        "A list of pw paths. ";
      leaf path-id {
        type uint8;
        description
          "The identifier of pw paths. ";
      }
      list tp-tunnels {
        key name;
        description
          "Names of TP Tunnel underlay";
        leaf name {
          type string;
          description
            "Names of TP Tunnel underlay";
        }
      }
    }
  }

  grouping pw-segment-named-or-value-bandwidth-profile {
    description
      "A grouping to configure a bandwdith profile either by
       referencing a named bandwidth profile or by
       configuring the values of the bandwidth profile attributes.";

    choice style {
      description
        "Whether the bandwidth profile is named or defined by value";
      case named {
        description
          "Named bandwidth profile.";
        leaf bandwidth-profile-name {
          type leafref {
            path "/etht-svc:etht-svc/etht-svc:globals/"
            + "etht-svc:named-bandwidth-profiles/"
            + "etht-svc:bandwidth-profile-name";
          }
          description
            "Name of the bandwidth profile.";
        }
      }
      case value {
        description
          "Bandwidth profile configured by value.";
        uses etht-types:pw-segement-bandwidth-profile-grouping;
      }
    }
  }

  grouping tunnels-grouping {
    description
      "A group of tunnels. ";
    leaf name {
      type leafref {
        path "/te:te/te:tunnels/te:tunnel/te:name";
        require-instance false;
      }
      description "Dependency tunnel name";
    }
    leaf encoding {
      type identityref {
        base te-types:lsp-encoding-types;
      }
      description "LSP encoding type";
      reference "RFC3945";
    }
    leaf switching-type {
      type identityref {
        base te-types:switching-capabilities;
      }
      description "LSP switching type";
      reference "RFC3945";
    }
  }

  /*
   * Data nodes
   */

  container etht-svc {
    description
      "ETH services.";

    container globals {
      description
        "Globals Ethernet configuration data container";
      list named-bandwidth-profiles {
        key bandwidth-profile-name;
        description
          "List of named bandwidth profiles used by
           Ethernet services.";

        leaf bandwidth-profile-name {
          type string;
          description
            "Name of the bandwidth profile.";
        }
        uses etht-types:etht-bandwidth-profiles;
      }
    }
    list etht-svc-instances {
      key etht-svc-name;
      description
        "The list of p2p ETH service instances";

      uses etht-svc-instance-config;
      container state {
        config false;
        description
          "Ethernet Service states.";
        uses etht-svc-instance-state;
      }
    }
  }
}
]]></sourcecode>
        </figure>
      </section>
      <section anchor="yang-code-for-eth-type">
        <name>YANG Code for ETH type</name>
        <t>This module references a few documents including <xref target="RFC2697"/>,
<xref target="RFC2698"/>, <xref target="RFC4115"/>, <xref target="IEEE_802.1ad"/>, <xref target="IEEE_802.1q"/> and <xref target="MEF10"/>.</t>
        <figure anchor="fig-eth-types-yang">
          <sourcecode type="yang" markers="true" name="ietf-eth-tran-types@2024-01-11.yang"><![CDATA[
module ietf-eth-tran-types {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-eth-tran-types";
  prefix etht-types;

  organization
    "Internet Engineering Task Force (IETF) CCAMP WG";
  contact
    "WG Web: <https://datatracker.ietf.org/wg/ccamp/>
     WG List: <mailto:ccamp@ietf.org>

     Editor: Haomian Zheng
             <mailto:zhenghaomian@huawei.com>

     Editor: Aihua Guo
             <mailto:aihuaguo.ietf@gmail.com>

     Editor: Italo Busi
             <mailto:italo.busi@huawei.com>

     Editor: Anton Snitser
             <mailto:asnizar@cisco.com>

     Editor: Chaode Yu
             <mailto:yuchaode@huawei.com>";

  description
    "This module defines a collection of common YANG identity, data
    type and grouping definitions for describing Ethernet transport
    network clients.

    Copyright (c) 2024 IETF Trust and the persons
    identified as authors of the code.  All rights reserved.

    Redistribution and use in source and binary forms, with or
    without modification, is permitted pursuant to, and subject
    to the license terms contained in, the Revised BSD License
    set forth in Section 4.c of the IETF Trust's Legal Provisions
    Relating to IETF Documents
    (https://trustee.ietf.org/license-info).

    This version of this YANG module is part of RFC XXXX; see
    the RFC itself for full legal notices.";

  revision 2024-01-11 {
    description
      "Initial Version";
    reference
      "RFC XXXX: A YANG Data Model for Transport Network Client
      Signals";
  }
  // RFC Editor: replace XXXX with the actual RFC number assigned
  // to the RFC once this draft
  // becomes an RFC, update date information and remove this note.

  /*
   * Identities
   */

  identity eth-vlan-tag-type {
    description
      "ETH VLAN tag type.";
  }

    identity c-vlan-tag-type {
      base eth-vlan-tag-type;
      description
        "802.1Q Customer VLAN";
    }

    identity s-vlan-tag-type {
      base eth-vlan-tag-type;
      description
        "802.1Q Service VLAN (QinQ)";
    }

  identity service-classification-type {
    description
      "Service classification.";
  }

    identity port-classification {
      base service-classification-type;
      description
        "Port classification.";
    }

    identity vlan-classification {
      base service-classification-type;
      description
        "VLAN classification.";
    }

    identity eth-vlan-tag-classify {
      description
        "VLAN tag classification.";
    }

      identity classify-c-vlan {
        base eth-vlan-tag-classify;
        description
          "Classify 802.1Q Customer VLAN tag.
          Only C-tag type is accepted";
      }

      identity classify-s-vlan {
        base eth-vlan-tag-classify;
        description
          "Classify 802.1Q Service VLAN (QinQ) tag.
          Only S-tag type is accepted";
      }

      identity classify-s-or-c-vlan {
        base eth-vlan-tag-classify;
        description
          "Classify S-VLAN or C-VLAN tag-classify.
          Either tag is accepted";
      }

  identity bandwidth-profile-type {
    description
      "Bandwidth Profile Types";
  }

    identity mef-10-bwp {
      base bandwidth-profile-type;
      description
        "MEF 10 Bandwidth Profile";
    }

    identity rfc-2697-bwp {
      base bandwidth-profile-type;
      description
        "RFC 2697 Bandwidth Profile";
    }

    identity rfc-2698-bwp {
      base bandwidth-profile-type;
      description
        "RFC 2698 Bandwidth Profile";
    }

    identity rfc-4115-bwp {
      base bandwidth-profile-type;
      description
        "RFC 4115 Bandwidth Profile";
    }

  identity service-type {
    description
      "Type of Ethernet service.";
  }

    identity p2p-svc {
      base service-type;
      description
        "Ethernet point-to-point service (EPL, EVPL).";
    }

    identity rmp-svc {
      base service-type;
      description
        "Ethernet rooted-multitpoint service (E-TREE, EP-TREE).";
    }

    identity mp2mp-svc {
      base service-type;
      description
        "Ethernet multipoint-to-multitpoint service
        (E-LAN, EP-LAN).";
    }

  identity lifecycle-status {
    description
      "Lifecycle Status.";
  }

    identity installed {
      base lifecycle-status;
      description
        "Installed.";
    }

    identity planned {
      base lifecycle-status;
      description
        "Planned.";
    }

    identity pending-removal {
      base lifecycle-status;
      description
        "Pending Removal.";
    }

  identity topology-role {
    description
      "The role of underlay topology: e.g., hub, spoke,
      any-to-any.";
  }

  identity resilience {
    description
    "Placeholder for resilience information in data plane,
    for future study. ";
  }

  identity access-role {
    description
    "Indicating whether the access is a working or protection
    access.";
  }

    identity root-primary {
      base access-role;
      description
        "Designates the primary root UNI of an E-Tree service, and 
        may also designates the UNI access role of E-LINE and E-LAN
        service.";
    }

    identity root-backup {
      base access-role;
      description
        "Designates the backup root UNI of an E-Tree service.";
    }

    identity leaf-access {
      base access-role;
      description
        "Designates the leaf UNI of an E-Tree service.";
    }

  identity performance {
    description
    "Placeholder for performance information, for future study.";
  }

  identity encapsulation-type {
    description
    "Indicating how the service is encapsulated (to PW), e.g, raw or
    tag. ";
  }

  /*
   * Data Types
   */

  typedef eth-tag-type {
    type identityref {
      base eth-vlan-tag-type;
    }
    description
      "Identifies a specific ETH VLAN tag type.";
  }

  typedef eth-tag-classify {
    type identityref {
      base eth-vlan-tag-classify;
    }
    description
      "Identifies a specific VLAN tag classification.";
  }

  typedef vlanid {
    type uint16 {
      range "1..4094";
    }
    description
      "The 12-bit VLAN-ID used in the VLAN Tag header.";
  }

  typedef vid-range-type {
    type string {
      pattern "([1-9][0-9]{0,3}(-[1-9][0-9]{0,3})?" +
              "(,[1-9][0-9]{0,3}(-[1-9][0-9]{0,3})?)*)";
    }
    description
      "A list of VLAN Ids, or non overlapping VLAN ranges, in
       ascending order, between 1 and 4094.
       This type is used to match an ordered list of VLAN Ids, or
       contiguous ranges of VLAN Ids. Valid VLAN Ids must be in the
       range 1 to 4094, and included in the list in non overlapping
       ascending order.

       For example: 1,10-100,50,500-1000";
  }

  typedef bandwidth-profile-type {
    type identityref {
      base bandwidth-profile-type;
    }
    description
      "Identifies a specific Bandwidth Profile type.";
  }

  typedef service-type {
    type identityref {
      base service-type;
    }
    description
      "Identifies the type of Ethernet service.";
  }

  typedef lifecycle-status {
    type identityref {
      base lifecycle-status;
    }
    description
      "Identifies the lLifecycle Status .";
  }

  /*
   * Groupings
   */

  grouping etht-bandwidth-profiles {
    description
      "Bandwidth profile configuration paramters.";

    leaf bandwidth-profile-type {
      type etht-types:bandwidth-profile-type;
      description
        "The type of bandwidth profile.";
    }
    leaf CIR {
      type uint64;
      description
        "Committed Information Rate in Kbps";
    }
    leaf CBS {
      type uint64;
      description
        "Committed Burst Size in in KBytes";
    }
    leaf EIR {
      type uint64;
      /* Need to indicate that EIR is not supported by RFC 2697

      must
        '../bw-profile-type = "mef-10-bwp" or ' +
        '../bw-profile-type = "rfc-2698-bwp" or ' +
        '../bw-profile-type = "rfc-4115-bwp"'

      must
        '../bw-profile-type != "rfc-2697-bwp"'
      */
      description
        "Excess Information Rate in Kbps
         In case of RFC 2698, PIR = CIR + EIR";
    }
    leaf EBS {
      type uint64;
      description
        "Excess Burst Size in KBytes.
          In case of RFC 2698, PBS = CBS + EBS";
    }
    leaf color-aware {
      type boolean;
      description
        "Indicates weather the color-mode is
        color-aware or color-blind.";
    }
    leaf coupling-flag {
      type boolean;
      /* Need to indicate that Coupling Flag is defined only for
         MEF 10

      must
        '../bw-profile-type = "mef-10-bwp"'
      */
      description
        "Coupling Flag.";
    }
  }

  grouping pw-segement-bandwidth-profile-grouping {
    description
      "bandwidth profile grouping for PW segment.";

    leaf bandwidth-profile-type {
      type etht-types:bandwidth-profile-type;
      description
        "The type of bandwidth profile.";
    }
    leaf CIR {
      type uint64;
      description
        "Committed Information Rate in Kbps";
    }
    leaf CBS {
      type uint64;
      description
        "Committed Burst Size in in KBytes";
    }
    leaf EIR {
      type uint64;
      /* Need to indicate that EIR is not supported by RFC 2697

      must
        '../bw-profile-type = "mef-10-bwp" or ' +
        '../bw-profile-type = "rfc-2698-bwp" or ' +
        '../bw-profile-type = "rfc-4115-bwp"'

      must
        '../bw-profile-type != "rfc-2697-bwp"'
      */
      description
        "Excess Information Rate in Kbps
         In case of RFC 2698, PIR = CIR + EIR";
    }
    leaf EBS {
      type uint64;
      description
        "Excess Burst Size in KBytes.
          In case of RFC 2698, PBS = CBS + EBS";
    }
  }

  grouping eth-bandwidth {
    description
      "Available bandwith for ethernet.";
    leaf eth-bandwidth {
      type uint64{
        range "0..10000000000";
      }
      units "Kbps";
      description
        "Available bandwith value expressed in kilobits per second";
    }
  }

  grouping eth-label-restriction {
    description
      "Label Restriction for ethernet.";
    leaf tag-type {
      type etht-types:eth-tag-type;
      description "VLAN tag type.";
    }
    leaf priority {
      type uint8;
      description "priority.";
    }
  }

  grouping eth-label {
    description
      "Label for ethernet.";
    leaf vlanid {
      type etht-types:vlanid;
        description
          "VLAN tag id.";
    }
  }

  grouping eth-label-step {
    description "Label step for Ethernet VLAN";
    leaf eth-step {
      type uint16 {
        range "1..4095";
      }
      default 1;
      description
        "Label step which represent possible increments for
        an Ethernet VLAN tag.";
      reference
        "IEEE 802.1ad: Provider Bridges.";
    }
  }
}
]]></sourcecode>
        </figure>
      </section>
      <section anchor="other-client-signal-yang-code">
        <name>Other Client Signal YANG Code</name>
        <t>This module imports typedefs and modules from <xref target="RFC6991"/>,
<xref target="I-D.ietf-ccamp-otn-tunnel-model"/>, <xref target="I-D.ietf-teas-rfc8776-update"/>.</t>
        <figure anchor="fig-cbr-svc-yang">
          <sourcecode type="yang" markers="true" name="ietf-trans-client-service@2024-01-11.yang"><![CDATA[
module ietf-trans-client-service {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-trans-client-service";
  prefix clnt-svc;

  import ietf-yang-types {
    prefix yang;
    reference "RFC 6991: Common YANG Data Types";
  }

  import ietf-te-types {
    prefix te-types;
    reference "RFCYYYY: Traffic Engineering Common YANG Types";
  }
  // RFC Editor: replace YYYY with the actual RFC number assigned
  // to the RFC once draft-ietf-teas-rfc8776-update
  // becomes an RFC, update date information and remove this note.

  import ietf-layer1-types {
    prefix l1-types;
    reference "RFCZZZZ: A YANG Data Model for Layer 1 Types";
  }
  // RFC Editor: replace ZZZZ with the actual RFC number assigned
  // to the RFC once draft-ietf-ccamp-layer1-types
  // becomes an RFC, update date information and remove this note.

  import ietf-network {
    prefix nw;
    reference "RFC8345: A YANG Data Model for Network Topologies";
  }

  import ietf-network-topology {
    prefix nt;
    reference "RFC8345: A YANG Data Model for Network Topologies";
  }

  import ietf-trans-client-svc-types {
    prefix clnt-types;
    reference
      "RFCXXXX: A YANG Data Model for Transport Network Client 
      Signals";
  }
  // RFC Editor: replace XXXX with the actual RFC number assigned
  // to the RFC once this draft
  // becomes an RFC, update date information and remove this note.

  organization
    "Internet Engineering Task Force (IETF) CCAMP WG";
  contact
    "WG Web: <https://datatracker.ietf.org/wg/ccamp/>
     WG List: <mailto:ccamp@ietf.org>

     Editor: Haomian Zheng
             <mailto:zhenghaomian@huawei.com>

     Editor: Aihua Guo
             <mailto:aihuaguo.ietf@gmail.com>

     Editor: Italo Busi
             <mailto:italo.busi@huawei.com>

     Editor: Anton Snitser
             <mailto:asnizar@cisco.com>

     Editor: Chaode Yu
             <mailto:yuchaode@huawei.com>";

  description
    "This module defines a YANG data model for describing
    transport network client services.

    The model fully conforms to the Network Management
    Datastore Architecture (NMDA).

    Copyright (c) 2024 IETF Trust and the persons
    identified as authors of the code.  All rights reserved.

    Redistribution and use in source and binary forms, with or
    without modification, is permitted pursuant to, and subject
    to the license terms contained in, the Revised BSD License
    set forth in Section 4.c of the IETF Trust's Legal Provisions
    Relating to IETF Documents
    (https://trustee.ietf.org/license-info).

    This version of this YANG module is part of RFC XXXX; see
    the RFC itself for full legal notices.";

  revision 2024-01-11 {
    description
      "Initial Version";
    reference
      "RFC XXXX: A YANG Data Model for Transport Network Client
      Signals";
  }
  // RFC Editor: replace XXXX with the actual RFC number assigned
  // to the RFC once this draft
  // becomes an RFC, update date information and remove this note.

  /*
   * Groupings
   */

  grouping client-svc-access-parameters {
    description
      "Transport network client signals access parameters";

    leaf access-node-id {
      type te-types:te-node-id;
      description
        "The identifier of the access node in the TE topology.";
    }
    leaf access-node-uri {
      type nw:node-id;
      description
        "The identifier of the access node in the network.";
    }
    leaf access-ltp-id {
      type te-types:te-tp-id;
      description
        "The TE link termination point identifier in TE topology, 
        used together with access-node-id to identify the access
        Link Termination Point (LTP).";
    }
    leaf access-ltp-uri {
      type nt:tp-id;
      description
        "The link termination point identifier in network topology,
        used together with access-node-uri to identify the access
        LTP";
    }
    leaf client-signal {
      type identityref {
        base l1-types:client-signal;
      }
      description
        "Identify the client signal type associated with this port";
    }
  }

  grouping pm-state-grouping {
    description
      "Performance Monitoring (PM) state attributes";
    leaf latency {
      type uint32;
      units microsecond;
      description
        "latency value of the E2E client signal service";
    }
  }

  grouping error-info-grouping {
    description
      "Error information parameters";
    leaf error-code {
      type uint16;
      description "error code";
    }
    leaf error-description {
      type string;
      description "detail message of error";
    }
    leaf error-timestamp {
      type yang:date-and-time;
      description "the date and time error is happened";
    }
  }

  grouping alarm-threshold-grouping {
    description
      "Alarm threshold parameters.";
    leaf latency-threshold {
      type uint32;
      units microsecond;
      description
        "a threshold for the E2E client signal service's
        latency. Once the latency value exceed this threshold,
        an alarm should be triggered.";
    }
  }

  grouping client-svc-tunnel-parameters {
    description
      "Transport network client signals tunnel parameters";

    leaf tunnel-name {
      type string;
      description
        "TE tunnel instance name.";
    }
  }

  grouping  client-svc-instance-config {
    description
      "Configuration parameters for client services.";

    leaf client-svc-name {
      type string;
      description
        "Identifier of the p2p transport network client signals.";
    }
    leaf client-svc-title {
      type string;
      description
        "Name of the p2p transport network client signals.";
    }
    leaf user-label {
      type string;
      description
        "Alias of the p2p transport network client signals.";
    }
    leaf client-svc-descr {
      type string;
      description
        "Description of the transport network client signals.";
    }
    leaf client-svc-customer {
      type string;
      description
        "Customer of the transport network client signals.";
    }
    container resilience {
      description "Place holder for resilience functionalities";
    }
    uses te-types:te-topology-identifier;
    leaf admin-status {
      type identityref {
        base te-types:tunnel-admin-state-type;
      }
      default te-types:tunnel-admin-state-up;
      description "Client signals administrative state.";
    }
    container src-access-ports {
      description
        "Source access port of a client signal.";
      uses client-svc-access-parameters;
    }
    container dst-access-ports {
      description
        "Destination access port of a client signal.";
      uses client-svc-access-parameters;
    }
    container pm-state {
      config false;
      description "PM data of E2E client signal";
      uses pm-state-grouping;
    }
    container error-info {
      config false;
      description "error messages of configuration";
      uses error-info-grouping;
    }
    container alarm-threshold {
      description
        "threshold configuration for the E2E client signal";
      uses alarm-threshold-grouping;
    }
    leaf direction {
      type identityref {
        base clnt-types:direction;
      }
      description "Uni-dir or Bi-dir for the client signal.";
    }
    list svc-tunnels {
      key tunnel-name;
      description
        "List of the TE Tunnels supporting the client signal.";
      uses client-svc-tunnel-parameters;
    }
  }

  grouping  client-svc-instance-state {
    description
      "State parameters for client services.";
    leaf operational-state {
      type identityref {
        base te-types:tunnel-state-type;
      }
      config false;
      description "Client signal operational state.";
    }
    leaf provisioning-state {
      type identityref {
        base te-types:lsp-state-type;
      }
      config false;
      description "Client signal provisioning state.";
    }
    leaf creation-time {
      type yang:date-and-time;
      config false;
      description "The time of the client signal be created.";
    }
    leaf last-updated-time {
      type yang:date-and-time;
      config false;
      description "The time of the client signal's latest update.";
    }
    leaf created-by {
      type string;
      config false;
      description
        "The client signal is created by whom,
        can be a system or staff ID.";
    }
    leaf last-updated-by {
      type string;
      config false;
      description
        "The client signal is last updated by whom,
        can be a system or staff ID.";
    }
    leaf owned-by {
      type string;
      config false;
      description
        "The client signal is owned by whom,
        can be a system ID.";
    }
  }

  /*
   * Data nodes
   */

  container client-svc {
    description
      "Transport client services.";

    list client-svc-instances {
      key client-svc-name;
      description
        "The list of p2p transport client service instances";
      uses client-svc-instance-config;
      uses client-svc-instance-state;
    }
  }
}
]]></sourcecode>
        </figure>
      </section>
      <section anchor="other-client-signal-types-yang-code">
        <name>Other Client Signal Types YANG Code</name>
        <t>This module defines the types for other client signal types.</t>
        <figure anchor="fig-cbr-types-yang">
          <sourcecode type="yang" markers="true" name="ietf-trans-client-svc-types@2024-01-11.yang"><![CDATA[
module ietf-trans-client-svc-types {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-trans-client-svc-types";
  prefix clnt-types;

  organization
     "Internet Engineering Task Force (IETF) CCAMP WG";
  contact
    "WG Web: <https://datatracker.ietf.org/wg/ccamp/>
     WG List: <mailto:ccamp@ietf.org>

     Editor: Haomian Zheng
             <mailto:zhenghaomian@huawei.com>

     Editor: Aihua Guo
             <mailto:aihuaguo.ietf@gmail.com>

     Editor: Italo Busi
             <mailto:italo.busi@huawei.com>

     Editor: Anton Snitser
             <mailto:asnizar@cisco.com>

     Editor: Chaode Yu
             <mailto:yuchaode@huawei.com>";

  description
    "This module defines a collection of common YANG identity
    definitions for describing Costant Bit Rate (CBR) transport
    network clients.

    Copyright (c) 2024 IETF Trust and the persons
    identified as authors of the code.  All rights reserved.

    Redistribution and use in source and binary forms, with or
    without modification, is permitted pursuant to, and subject
    to the license terms contained in, the Revised BSD License
    set forth in Section 4.c of the IETF Trust's Legal Provisions
    Relating to IETF Documents
    (https://trustee.ietf.org/license-info).

    This version of this YANG module is part of RFC XXXX; see
    the RFC itself for full legal notices.";

  revision 2024-01-11 {
    description
      "Initial Version";
    reference
      "RFC XXXX: A YANG Data Model for Transport Network Client
      Signals";
  }
  // RFC Editor: replace XXXX with the actual RFC number assigned
  // to the RFC once this draft
  // becomes an RFC, update date information and remove this note.

  /*
   * Identities
   */

  identity direction {
    description
      "Direction information of Client Signal.";
  }

    identity bidirectional {
      base direction;
      description
        "Client Signal is bi-directional.";
    }

    identity unidirectional {
      base direction;
      description
        "Client Signal is uni-directional.";
    }
}
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>[Note to the RFC Editor - remove this section before publication, as
well as remove the reference to RFC <xref target="RFC7942"/>.]</t>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in <xref target="RFC7942"/>.
The description of implementations in this section is intended to
assist the IETF in its decision processes in progressing drafts to
RFCs.  Please note that the listing of any individual implementation
here does not imply endorsement by the IETF.  Furthermore, no effort
has been spent to verify the information presented here that was
supplied by IETF contributors.  This is not intended as, and must not
be construed to be, a catalog of available implementations or their
features.  Readers are advised to note that other implementations may
exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groups
to assign due consideration to documents that have the benefit of
running code, which may serve as evidence of valuable experimentation
and feedback that have made the implemented protocols more mature.
It is up to the individual working groups to use this information as
they see fit".</t>
      <section anchor="usage-of-the-eth-service-yang-model-on-onap">
        <name>Usage of the ETH Service YANG Model on ONAP</name>
        <t>The implementation of the CCVPN (Cross Domain and Cross Layer VPN)
use-case on ONAP follows the ACTN <xref target="RFC8453"/> architecture.  In the
design of CCVPN, ONAP presumes the responsibility of the MDSC, and
third party network domain controllers the PNCs.  Consequently, the
ETH Service YANG model is used as the MPI between ONAP and the domain
controllers.</t>
        <ul spacing="normal">
          <li>
            <t>Organization: China Mobile, Huawei Technologies, etc.</t>
          </li>
          <li>
            <t>Implementation: ONAP CCVPN uses the ETH Service YANG model as the
ACTN MPI</t>
          </li>
          <li>
            <t>Description: ONAP CCVPN realizes the E-LINE and E-TREE service on
a multi-domain network.  Both of the services are modeled on ONAP
by the ETH Service YANG model, and the model instances (e.g., JSON
objects) are sent between ONAP and the domain controllers.  Refer
to the following CCVPN wiki for more information:
https://wiki.onap.org/display/DW/
CCVPN%28Cross+Domain+and+Cross+Layer+VPN%29+USE+CASE</t>
          </li>
          <li>
            <t>Maturity Level: Prototype</t>
          </li>
          <li>
            <t>Coverage: Partial</t>
          </li>
          <li>
            <t>Contact: henry.yu1@huawei.com</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="manageability-considerations">
      <name>Manageability Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The data following the model defined in this document is exchanged
via, for example, the interface between an orchestrator and a network
domain controller.</t>
      <t>The YANG module defined in this document can be accessed via the
RESTCONF protocol defined in <xref target="RFC8040"/>, or maybe via the NETCONF
protocol <xref target="RFC6241"/>.</t>
      <t>There are a number of data nodes defined in the YANG module which are
writable/creatable/deletable (i.e., config true, which is the
default).  These data nodes may be considered sensitive or vulnerable
in some network environments.  Write operations (e.g., POST) to these
data nodes without proper protection can have a negative effect on
network operations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>It is proposed that IANA should assign new URIs from the "IETF XML
Registry" <xref target="RFC3688"/> as follows:</t>
      <artwork type="ascii-art"><![CDATA[
         URI: urn:ietf:params:xml:ns:yang:ietf-eth-tran-service
         Registrant Contact: The IESG
         XML: N/A; the requested URI is an XML namespace.

         URI: urn:ietf:params:xml:ns:yang:ietf-trans-client-service
         Registrant Contact: The IESG
         XML: N/A; the requested URI is an XML namespace.

         URI: urn:ietf:params:xml:ns:yang:ietf-eth-tran-types
         Registrant Contact: The IESG
         XML: N/A; the requested URI is an XML namespace.

         URI: urn:ietf:params:xml:ns:yang:ietf-trans-client-svc-types
         Registrant Contact: The IESG
         XML: N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>This document registers following YANG modules in the YANG Module
Names registry <xref target="RFC6020"/>.</t>
      <artwork type="ascii-art"><![CDATA[
   name:         ietf-eth-tran-service
   namespace:    urn:ietf:params:xml:ns:yang:ietf-eth-tran-service
   prefix:       ethtsvc
   reference:    RFC XXXX: A YANG Data Model for Transport
                           Network Client Signals

   name:         ietf-eth-tran-types
   namespace:    urn:ietf:params:xml:ns:yang:ietf-eth-tran-types
   prefix:       etht-types
   reference:    RFC XXXX: A YANG Data Model for Transport
                           Network Client Signals

   name:         ietf-trans-client-service
   namespace:    urn:ietf:params:xml:ns:yang:ietf-trans-client-service
   prefix:       clntsvc
   reference:    RFC XXXX: A YANG Data Model for Transport
                           Network Client Signals

   name:         ietf-trans-client-svc-types
   namespace:    urn:ietf:params:xml:ns:yang:ietf-trans-client-svc-types
   prefix:       clntsvc-types
   reference:    RFC XXXX: A YANG Data Model for Transport
                           Network Client Signals
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="ITU-T_G.875">
          <front>
            <title>Optical transport network: Protocol-neutral management information model for the network element view</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2020" month="June"/>
          </front>
          <seriesInfo name="ITU-T G.875" value=""/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-topo-yang">
          <front>
            <title>A YANG Data Model for Optical Transport Network Topology</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-topo-yang-20"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-tunnel-model">
          <front>
            <title>A YANG Data Model for Optical Transport Network (OTN) Tunnels and Label Switched Paths</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="3" month="December" year="2024"/>
            <abstract>
              <t>   This document describes the YANG data model for tunnels in OTN TE
   networks.  The model can be used to do the configuration in order to
   establish the tunnel in OTN network.  This work is independent with
   the control plane protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-tunnel-model-22"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC8294">
          <front>
            <title>Common YANG Data Types for the Routing Area</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="Y. Qu" initials="Y." surname="Qu"/>
            <author fullname="A. Lindem" initials="A." surname="Lindem"/>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>This document defines a collection of common data types using the YANG data modeling language. These derived common types are designed to be imported by other modules defined in the routing area.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8294"/>
          <seriesInfo name="DOI" value="10.17487/RFC8294"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="I-D.ietf-teas-rfc8776-update">
          <front>
            <title>Common YANG Data Types for Traffic Engineering</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc.</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="24" month="January" year="2025"/>
            <abstract>
              <t>   This document defines a collection of common data types, identities,
   and groupings in YANG data modeling language.  These derived common
   data types, identities and groupings are intended to be imported by
   other modules, e.g., those which model the Traffic Engineering (TE)
   configuration and state capabilities.

   This document obsoletes RFC 8776.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc8776-update-16"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-layer1-types">
          <front>
            <title>Common YANG Data Types for Layer 1 Networks</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="February" year="2024"/>
            <abstract>
              <t>   This document defines a collection of common common data types,
   identities, and groupings in the YANG data modeling language.  These
   derived common common data types, identities, and groupings are
   intended to be imported by modules that model Layer 1 configuration
   and state capabilities.  The Layer 1 types are representative of
   Layer 1 client signals applicable to transport networks, such as
   Optical Transport Networks (OTN).  The Optical Transport Network
   (OTN) data structures are included in this document as Layer 1 types.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-layer1-types-18"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="9" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-37"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-l1csm-yang">
          <front>
            <title>A YANG Data Model for L1 Connectivity Service Model (L1CSM)</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <author fullname="Kwang-koog Lee" initials="K." surname="Lee">
              <organization>Korea Telecom</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <date day="11" month="April" year="2024"/>
            <abstract>
              <t>   This document provides a YANG Layer 1 Connectivity Service Model
   (L1CSM).

   This model can be utilized by a customer network controller to
   initiate a connectivity service request as well as to retrieve
   service states for a Layer 1 network controller communicating with
   its customer network controller.  This YANG model is in compliance of
   Network Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-l1csm-yang-26"/>
        </reference>
        <reference anchor="RFC7139">
          <front>
            <title>GMPLS Signaling Extensions for Control of Evolving G.709 Optical Transport Networks</title>
            <author fullname="F. Zhang" initials="F." role="editor" surname="Zhang"/>
            <author fullname="G. Zhang" initials="G." surname="Zhang"/>
            <author fullname="S. Belotti" initials="S." surname="Belotti"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="K. Pithewan" initials="K." surname="Pithewan"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>ITU-T Recommendation G.709 [G709-2012] introduced new Optical channel Data Unit (ODU) containers (ODU0, ODU4, ODU2e, and ODUflex) and enhanced Optical Transport Network (OTN) flexibility.</t>
              <t>This document updates the ODU-related portions of RFC 4328 to provide extensions to GMPLS signaling to control the full set of OTN features, including ODU0, ODU4, ODU2e, and ODUflex.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7139"/>
          <seriesInfo name="DOI" value="10.17487/RFC7139"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IEEE_802.1ad">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Virtual Bridged Local Area Networks - Amendment 4: Provider Bridges</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2005" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1ad-2005" value=""/>
        </reference>
        <reference anchor="IEEE_802.1q">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Bridges and Bridged Networks</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1Q-2022" value=""/>
        </reference>
        <reference anchor="MEF10" target="https://www.mef.net/Assets/Technical_Specifications/PDF/MEF_10.pdf">
          <front>
            <title>Ethernet Services Attributes Phase 1</title>
            <author>
              <organization>MEF Forum</organization>
            </author>
            <date year="2004" month="November"/>
          </front>
          <seriesInfo name="MEF 10" value=""/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC2697">
          <front>
            <title>A Single Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Single Rate Three Color Marker (srTCM), which can be used as component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2697"/>
          <seriesInfo name="DOI" value="10.17487/RFC2697"/>
        </reference>
        <reference anchor="RFC2698">
          <front>
            <title>A Two Rate Three Color Marker</title>
            <author fullname="J. Heinanen" initials="J." surname="Heinanen"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="September" year="1999"/>
            <abstract>
              <t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2698"/>
          <seriesInfo name="DOI" value="10.17487/RFC2698"/>
        </reference>
        <reference anchor="RFC4115">
          <front>
            <title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
            <author fullname="O. Aboul-Magd" initials="O." surname="Aboul-Magd"/>
            <author fullname="S. Rabie" initials="S." surname="Rabie"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services. This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services. The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4115"/>
          <seriesInfo name="DOI" value="10.17487/RFC4115"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
      </references>
    </references>
    <?line 2964?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to acknowledge the contribution from Francesco Lazzeri to the initial versions of this document, before it has been adopted by CCAMP WG.</t>
      <t>We would like to thank Igor Bryskin and Daniel King for their comments and discussions.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="Y." surname="Xu" fullname="Yunbin Xu">
        <organization>CAICT</organization>
        <address>
          <email>xuyunbin@caict.ac.cn</email>
        </address>
      </contact>
      <contact initials="Y." surname="Zhao" fullname="Yang Zhao">
        <organization>China Mobile</organization>
        <address>
          <email>zhaoyangyjy@chinamobile.com</email>
        </address>
      </contact>
      <contact initials="X." surname="Liu" fullname="Xufeng Liu">
        <organization>Alef Edge</organization>
        <address>
          <email>xufeng.liu.ietf@gmail.com</email>
        </address>
      </contact>
      <contact initials="" surname="Zheng" fullname="Yanlei Zheng">
        <organization>China Unicom</organization>
        <address>
          <email>zhengyanlei@chinaunicom.cn</email>
        </address>
      </contact>
      <contact initials="G." surname="Fioccola" fullname="Giuseppe Fioccola">
        <organization>Huawei Technologies</organization>
        <address>
          <email>giuseppe.fioccola@huawei.com</email>
        </address>
      </contact>
      <contact initials="Z." surname="Liu" fullname="Zhe Liu">
        <organization>Huawei Technologies</organization>
        <address>
          <email>liuzhe123@huawei.com</email>
        </address>
      </contact>
      <contact initials="S." surname="Belotti" fullname="Sergio Belotti">
        <organization>Nokia</organization>
        <address>
          <email>sergio.belotti@nokia.com</email>
        </address>
      </contact>
      <contact initials="Y." surname="Yao" fullname="Yingxi Yao">
        <organization>Shanghai Bell</organization>
        <address>
          <email>yingxi.yao@nokia-sbell.com</email>
        </address>
      </contact>
      <contact initials="H." surname="Yu" fullname="Henry Yu">
        <organization>Huawei Technologies</organization>
        <address>
          <email>henry.yu1@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19/XMbN5Lo76rS/4DV1qtIMUlZjpPYysslsiwnemvLOkvZ
7N5ma2tIQtSshzO8+TCt2H5/++sPAANgMMMhJe8m98y621gk0Gg0Gv2FRmM4
HG5vlXGZyEOxcyT+enT2g3galZF4kU1lIq6yXFzmUVossrwUZ7JcZvlrcZzE
Mi3FRTxLo6TY2d6KxuNcvgEI7i8MjiBBo0lUylmW3xyKopxub21vTbNJGs1h
4GkeXZXDWJZXw8kkmi+GEwIzLAjM8CZKZ8ODh9tbRTWex0URZ2l5s4B+pyeX
z4T4o4ChMhg8TqdyIeF/0nJnIHbkNC6zPI4S/OP06An8B2azc/rq8hlgk1bz
scwPAQtAC/4zydJCpkVVHIoyr+T2FkznC5hZLiMA/SqryjidQT8kwCzPqgXO
9vjoxbn4Gb6B38QP+C20eC1voNEUYIqhSOXbUsxkKvOoBLzpuyqNJ1nO/y4W
Uf46we7TuCjzeFyVcioSOZ3JHHCQaYXICWGGzObzLBXHQII8S0SUTsULGRVV
LudI+PMkSuUOdmAK7fjICTGP4gR+IEJ/jzQfZfmMfonyyTX8cl2Wi+Jwfx8b
4lfxGznS7fbxi/1xni0LuU8g9qnrLC6vqzGuQb2Iy9l+j4Wl7gmsQVFaYztg
Rgx9FGd9APZpM7ou58iSsL5VeZ3lROIh/o8QzJI/Rtk8jlLxX9cynfEPMH34
voqWMhaXcnKdZkk2i2XBv8LiSQlT+PFA/CVO4uqJjBeZ+HOcJNFMDsRFls6K
awD4PHotucckLmEvPIUfZlWU8ne5nAGXHIof4JvZNNNDT2ALHep/VrD00PH4
Ok4j/k7ymv6KuF4z4t9fE6KjSTZvzO0ohh9hiMya17OqBB6CHg7ECFvOqozW
//sZfhmEeFpGSSaeVEXch1QKeIydRmPo1IlsWgK/X6RxWeCOMNCP42KSucgW
afxrlH8/wV+CsI6BOFMp/lqtgeVNNaFeDo4kLni3hpjnr1U6jlPxF3uc46PT
40sH8tvqhtp9P4niSTmKJqNJ2gQFfABMGNlrRSsPYnUcJ9JjgChD9r755833
E2w0pzZBWvylugJuEc9jG8mjRF6JE5A9HqLYdARMvYoPLrPhEzk8mk7l1ILa
+FbB9b53IP0QV4VcLKR4FmeTSZZEayzZTPUdXam+XfwFG9wjwirwQAfYaQcP
vugCeyFz2MniiUyysrR3xVn2Ona3bUFNR2Nu+n2KDYIw/wqC/G0MLGEzwwUI
Fdj0MQ6VuJxLzUc3UcYwhwUMEV63H2Wa36y3L66xy+imOvA2Rprlc1B1b1he
nV7+NLz8xw+jR19/qeSXsjX+g//Cz8tFGU+iBNSutjNStjMOxXmelRms4DCV
FfycgPJKQZyiqqv7x+kVjwlyYm6slhLWVcERMmHt+CaWS+5niX0z49O0lHlK
cGCkS+gEU5qjsmbYP6WswOFDNoP4P1UqxYP7D+4rDSBzIBJic8jzFjRvJIpB
UZPl5OTkH4/uPxgdRNNWumAjcVGCio/yKc3peYZ0Yp0P6n+RJSBDU3EENoq2
zQq9sPj5c5yXFfR4ksewp6eqf2vzIyDSlAj1kEj/Jp7KXHUuuuhWAPJgt4gM
hAdQDQSjxpP/zICGhThJZ3EqZV7YNHwqJxINMaDj/S8DdEQaKEINdZOaev/9
EYmn5k09NAF1uwAxGtN58KBrOv851C1enDw7uO/O4wSYNwfmRSnyJp4AEkel
sg0LcX4dFVIctK8HABTPsrya24idZW8MnR82EcM+B4qPyyifoSWjbbHlcjma
y6sRILR/VBSyLPZJKuAi/+NiISfxldoixf7502f7AOsfB/dHi+kVsv5wOBTR
GKyjaFLi30fNfS5ioDKi80bmwyS6ASz1L2UmFsyIYPikKTBT/AbMJnAFNGWg
BZgGgm28kRCXsO9LXN1sdkNrV1bQL3GkBOhmoDD4PQYTHhUoC74EMMT0Royl
TMVUXgHLTsX4hm34eILe0BXMFxhFKn6G30nsMKuUWmDeDAtFG/3zrhzNRgPx
8vJsIH6+eHm2N9re+jFbSpj2QFxnS5JZPBFRKA8K/A8RTWCiBVrxMFlbriG+
aQZkVcgWE2ASOWUqAJM4c4amEuFEIOkBzjgrr/VggPf2lqJzPsJVuryG9mRI
G7BFF4qTKAdmmgrgstymq8YUKcPEVE7hFH1MRZfldTy5JjC5/O8qztEcmFY5
ThgW/SqeVew8IStMJPwiYYYvMmivKRwlyc0AOAhGhz3O+AGPEIJiF8RSA6M9
PXicTpJqimOdXP4Idvrli2E6EM+OCeUCNG0GfyJumheIeTR1RprF5/F0itbY
9tYfUZHk2bSasMMH3/xRvHyD/IraZ90dAOSHacC49VYg69PsBWG2Akq5SM2+
uY9wiW6s9aNlQlZW6MAc0zKBPTPJs6KghkGEcllkVQ7jwdyPq1z1Klu2naLy
dfRGulsKkA0wSjGwFuTduz+cDp+OLE8uK9MhjkJO3IcPzLgtzWj8IY3/4cNA
0Q7BOrPSOGMMg4UUMpo1AZcDx4AmzuL8pAAeNJsX5TVsN9ALwNQx79VFDNuN
1kSDwG/1HgIAorjOqgSER7SwlgUEi8KMV2cABJ9IMByAZHk2p5bHJwPaac1F
YqQLUAjEozMADf+Rb2GflMxDY+iRJW9sRs4mFWp9a+Orb8yWjaz9iloe9luA
id19B0tZESFovyewYOBKOtsIFu7Vs+OvH395/8MHJbl5hEmElN7eAjOeZG+0
WCRaxeBkMi0MoxAWHBpJgBpv4kiArf3q5OIS1wDGBAvvKpqg/HhW5bhqcxAj
wHOlGlOYIVN71O0tbVJeAeRsSetb5YAIEGcX9DKKYXAM5jFTee+Q5AJ4OCTS
ZFHuVwtUxAgXjCxg4qFE+cJbFwec5rCbAWwEE1lq5iszlO3QrBTVAidcVAua
LC2c6v3N2mPxuuDPb+MC41rALjSgDYqYDudl1LtYxqAzcjlDk0qpIlvFTNAV
QSsQuU+CG/YGdoqNJK4wcQMsc5UA6RoyVTMeLhfALfQwyvDa3nphHAAKUxYl
qoEjjFKB4sUQhtg9e/H0aM/ls++Azx598fAB8BmL6OMsBeSYoXCzP8XWMf2t
JPZ5Dl+9laggVCz0DFwl+vXUw3ZAXlSBG4O2SQrNGWyGLObsnfE/Ac2C4oog
kmiIqVoP2szaYuXfRFQU2SSOkKuI+GS2TDKQusD06dRsr3iObMGWCFLWE6Mw
/a8ePz5AOch/PXrw+OGHD4AGINlPftZKGsTWEnZHofYCUfS9oheboe/tVRb+
5714Ja9AXqYTiR1RlNc/ERYU8MUAZuF1tKeCffOybqb65hyp9bu/9yb+Hgy1
Rl/7K2fcX/4GXf8Kn79jz+Sg0ZOk70Gjt+r5X/ChnunS/o16arHVGFPh+8XD
Lxlf4PiWvkOjeNv6lrLRt2wujIXxn+BDGE+S1NBY90SRa4KqbybqZ1hWsJr+
Ah/sJ8trvx98RX09Krn9aDwAamPqjKekmN+PxnP7mfHqPv547w7FH8toPFzo
zU4O2Lc7ZvPj/ghsN7XLdj4g7yO4EzprAC+LzhLOE4k+Wi4XCSgbGstsX8EH
D7izjV2HXyOUDLaEZVyCPppkc8ICfx41ACNH1oARAgMvHOj2/i6h/zC/mjz6
+uuvhqwmSCZ6gJFh1wPMgsPeBiG4yFYbIMzyQGrp/UdxCYo7TmtjE+geGeF9
BJ7JHFT3FTokszxaXFM4AnCAZQQeYmWFTgHgYMlmIDtp/zhV1pMxjJRtIqMU
OUD1LG7m44wcCPqz9mrwIADdKRoMD3OAyHlTxcVFUEcZW+gGha1xy8AokSBs
yZ7Mtfhk70M8AbP1NbjlYueXv+0QPXb+vgOqf5KAfQJWSVGK1/KmUK2P6Kwu
VtbUWF6hBjV6i1XZodjJlzs048K1gLe3dtE/Hi5zULh7PFie7aDiKhUYbpCl
yc2eGvJCkQp4WqtDZ6zv9FDA6NlCBeCwxUDs/GFne0v9KJimE4oFlBGQDkxv
wuDzHaAlmCpkqtKE8WvgPZDM8JdC45xcHPSMC0OdyXWGooH2OXIq6e6B9zd7
4Ql6g/Mof62VMfhawIKp2N053NFTPUmSeFHA2u7ujEajnT3W6IX2A0pAgAyF
ohojn6CfFZUEnxx50q3KRllx7ur4lJaLidBV3AgULRmEvEc0EMehuZjINMrj
TO2cWZKNAbSGA1ujSsp4OM3mQG5jQipb2QQc0Bggy+TdOwA9zBQmyMm4cSYV
mGlz3AO4wyp01gVL1CIeJ5KcU4WUVP4NxpG1EVUaw1bLSh2qMP4PIhUTcQe2
l6ShLEDCLMhflmTIJNIFA3h14bO9tbzOkjrsslvbVuzKMZfsuQZ6PW8TrVI4
wv7+gU6EkRCAWIQntAMnsuPsOVgbHRixh4hqwnoLU4D0K3EwINcSmHYaX5HE
KPkYGbbc8ckQ0EbqnuO/lITjb12PdyqB8YECWmir4A+7m1kqh9fZQkWoYOel
rzWBz5uwABEEVisAdl2F7boCJqcoDV0+EksQvxHGMXA1yI2byynaxXqDFuKz
88+0lYpxsQJkiyhgKDwImwFlFtE4TjBeAnx9DqyBXts/gYDkuiE2n6GztMgA
+meMBclr+RYUWyJ5eXCC4nx4bijHhrwXugEIeaT3TJaz26n/RhC0wf8vfADv
SRwPo9w6zhD3hvC5F7TOWj7cwwLxHpYS/meND/dwsbi3Nhb3HCwI7Lqf9z6A
of0J93GaOAD299/vO01/gY/zxT5+XAywTQ0Efw1MwwLj9Vd4UxsD5r1F0Hu8
vuo/7+0W1MD6r+ph5vQe/w/2leKRc2rD/xnSd0P7i/q/mhveuwgN10Zo6CHk
EMKla4hUfht7rYJL43zxS3j1XI4Ra3OM3x8+T3mzHrQgbho84H3MnoQts7Qn
8YOrULUGV/LaSEKtnPWpG3sWRxPwPaZW4N9oKZRkMYccZAQSzwp61cbkwy+/
AM+dgzF1AxWMrXUC4lYYq1ZhlteWA2jRkFZSOmNasUg9PjtGPQqIYtyHYL14
enGM8Te2Exa22d3QXKwZD1GDTWOKXmlHS6L6YY0rxfOD44sXIcfjYFLMVVR4
IJ4/oEZMhK++4kCxeP7FxQs0Ub7jMMBjN6oxSdAFIZ8BtEcDP0ZkgJqOlwTI
mhmr/f5jbbUXuqk5t6pPXaL6EA/6autJrU+YILU1oxvsg5x27Bk6WsnQ1CnN
mFF6Y85GwjaFjy1bt+Q3aaM0iJa9lsrawMw55Fl2ZCK0dhZRjks4j0Clg78S
URisxPQnnNYMUZgx84cNngGaXLQygBbY6tFYmWw2G2P8V8Xs99/wSXf8q7TN
KLSb+LACG8+j1/TrHDjeGHrOJJGUPGJUxHQ4gAY/BhzZIOBwHib3Fa659jrN
lpSzR8dsWeks+vYW7g2EffziVLMchW8lHUViqFnNg89F5siBHGVDX5SNoUk6
GSqjutN6CH72jaz7pbOpK3BrNRg0SZpKsfmNY5mwjeGIXg307OTy55ev/mR1
clS6bZzcDS7hj6teAqql0cHguO9rAr1gWhMgE/wZ/iYLEyxn9lEcfcBSH6Xq
VZVO2A82cp6kqX2Opp0vX+Azh9Uy02HxebRYgPTap6BaEpnTLtvPwwgzCTkt
KZ7cqPMA7fJo7UDSCSY2YOxSSR7K9laVgjwgzxeQicrwLif50cdfUsdxeWo2
rBOROz87LpxzNkabCenrs7jgwzqOemB8DQ9x6MiHpkBOUySu0K0OyybCBrov
o3zKDhl4QWjmEwkX6PoAQiR6lIwGLw+dZ8A1kdoN8GkuCuWIs6ThjOFEKW+1
9Hwoq00JOsBXTtzxiX3ocCUKIKOVdWEf0vDxjfFdTcCjljjK+5pPCyNxACci
HZCjvCZVwwAidRJFCBJiGNUylgVJ+IYvp1QLe0mYBV77RUL8pOIDFKaBBSqj
WKUYXMfTqUwHtNLFJEqUO7e9pQ/iWBXWq+tQDsNRtqQ1ZETzySARcwpYYo6F
15G1YXuzzcK0zVvbrIUvGcbQ8UKsXp4E+iXwbUhw2wa/sujRm7jnfMdfinbB
fW9I/sd7JZfP4V/ocfC/1Hcn/GWH4L4FLs25+7RpuAhB6tc0t90M+FJRv0v4
r7vSosWhaHMizNbTuqPeX3rje46EHeA7qhMZWKGcK9PcsZ9497pxt8X1TUGx
8qmkjJKBGEcoHLOU5VBYjDfzExBd2Msn6Jng4Nc6Psj7GZrquWDqFkod3n9s
VKmIC/5MzQgszSE1G/WADChXYC1SS16h7NdDU7bCtZYmJLN10octGbNUi9Nz
W5qmlrSyZFVRD0L5OExGpjKHsvbVIX4hZ3MtDVHGlIWarqEuEydM3Tr+f2PT
Vs+PzNV6eHedwAwvtcelIn51oI6CZksJtFGKRZkG5vzeSSTSuUJKxAazTga3
nRCJX5WCozJtmHspaxP3gE7DCCY5ueNQNs4EFXwSF9f1eMrhaU/n6hL3rfGs
9h96xrNsAK7x2zOe9V63uE08671u0ZgGt+kZz3ov7iaede+u4lmtCK0Zz3rf
0WKNeNb7usXm8axWjrH7nyuvA/nc00Hv25s0NNLCc2awD8vwNHywxJrnj38U
R5xFZcXeMfcaxQRl1WCrE5WFJC5PVqTQDsBfwKhAUeca6ghRI+dw4PgWYRkR
zTN0IE4KjnOda6HeGv7Rw1McSgWadGwJTVPoiBmj2jvTZrYV+eEhj8P5g8Kk
D4JZS/mDAItSBptHZCjOC0m3Ie3kOVuyeefYJjykLAGLEHilkCAur2XqHI6x
M9bIAgWwlydDlvf1eo1MepSjxl9enmkl4+oNP3lvgK5XhfdY6BAXuv4wPD99
KpbonlTzOThIvzq5gwdfWGE8fSwZs35BVw4TMsGXE+ruKbjSilYMV6cw60iW
avWr6W2lxtI6p1k6tL5DI4enyQFUq7UGPY9ualdcJ/YbQ8tkJBaYc6zSj1Xq
saCFVedQMJEFLAlaVEhGpKgy0nTIKVqil6Tjq3aKNt0FHTCLE0N4eeHkG1kR
K+JQL9oGmLzk7BRQ7Di6TqsvVHaixcRpZh28KcfbmAUmS5RYwPfZCBWFtbZH
KHNdwooOyITKqtJkOeu8RYWDuw/IwFUyIK5nZHP9lbvCdka7k5sxGeec6ZRL
acxLjgbqW814MxizecfSZ5JaahxTlnxe3+8gu+b8+cXw8pwnh/zaoJ1LOT4u
tdZDNJZjewvXI/LiJOYiRPMclwx0zg3WqaZ4XxsTxnV2+UejLaZpWbQlCULB
BjJtKeIg7IADxTZc/jbb176EYMIxnG4GG0PnmGP2L9iRzsmuWRKTTT/BO7ke
VCFjWnSkeGatIyguZQOLXWqXqTttmOQ+jyd5tsTAnUZgz8l2VjoulAYbYYKl
8p20NiN3SEPiEEsdcSmt63pqECVJQQjhxXgOJ1K0rHmLw9YcPZK7UL//UZwS
2KtYxc9fyWhK4frTWshg0zO+IIpWft0hKK28ZAaj90B6UfITqFL5prbnMYnI
lmhq2vC1SdZCZtIaGOhQOH6KvnQy16k5VRpf4d1Jpq1ZWsX6FAvDzUHI5Xq2
gFmV6r+wDfq2nFjC3w3MEQR8D0PAzh4ALmUt3ii3g3gBZDBhgTwBvnzFic10
vUO5smh/FTcgVueY1sX75VqlZU8z3ijaVwIMCj55i0SSkVZl+wb1nEkt4ekT
c9Xs9HKBdQsyEv9KrZ8eX1oKfyB++un0KaXHzymcoERgJGZZNlXJXLgifLEN
F4YsSELCXvU65ttYdl4HdJsNtXHNAerT+jDqkC4E6QiDo+H8oTSD1XIZRQpI
3ilwDBZhoHuaLogcKDfRl8dsVvupIGtmLBO8qg5AkjgqWoesD38o0xDD2dHM
85rRAC9lGqUThzXbXFNORT1sT5XV3gA4O/lS1Gm7bq6H89MwTjF4D1Lwc/E3
62sk+99d76TRlbZj/cGaFrqKQWsfYonvevSpDLW/E+6n1zhklXePM1r9wYXw
Ce/nGrtE18nJDl3Nl61UdVr0nK3p49H0rqlqxvFoeguqssfJSuUnJf1e6fPb
WsvoKxgr05oHRgJPsllKRj3JxfiKN5ragsqPNCfF0RSkFno3LPB1ah6mCGjp
Rkl1lhpTknhAJ0Eq0qodJQ1ENTIBNLIe0VeULHRRzzg+LfRRqkwF7VD7N0VL
LTjRpAHgdL5I7Xybhi0qmh+hYA1Zn5SjqL+gvEFLUbN5QIFntBBqTWWsFlkH
QXVUmGzX4jctt4p8MmTqDom6jWAfN1NNMCg8jKfE7PqqyCH8Q33fo3OVx9g7
XR726pOUCz2eMyB9vbqrGk2k5WFXD6c8Dg+mTMUb8MpCZJsWZQfZxG3IFuy8
gmx+nzXIFuraTTaxCdnER1YsjT1xW41jUmGdfubbEIQmEMMiCo79N9C12d9f
Dd0SfwiplUCXdZkt2H81v/nd1mO5UO+VXOd3yrNav3cxnthA/V5egzq4zkDb
HbsJ3NtbF+h+n7/gWxyoFcBCLUE35jF7vA3X0mgfNDOKz7a38DYyuHApWuBY
EYEuyKSTG/EmSiqpnHOKa2jvgxTwDXvkdRg00pCHGNijqzalwVs7PwrTgZ0A
5trYuoxDbSc4+jsuiopvgZbxXP6mtVmURPl8WGgatGxPRe2hoRUyUQX0+OLB
71No/ZumXe8XrDOjLz/Vl28KvZl+UJVDXlmONu0k7BUqjUAXXjjKoS8Fl5XJ
0EXT8I2kcIgVmzuiMLcuUlIwaPeufbe1rOpvdN2AK6QGbKeWZQtV2xC3esn3
zqe8zegMAQ8oyP7F337D+yezZzIkbI1b02kPqbocap5uz9aOv4OdlfGSBfdT
G7G6FFEXrW5tOTnaCwQ1QJ4viBOPWsM6fOUN9w2H8jFreS5L7e5YlUpUfoQp
PZApF9LagD9QtQOOg8+5cATd/RxDbzyRwilzqHmSSxp+IHjv8dklqST4f9JJ
8+jGz9K3L6jpyB97ahjjzcAy8jL4zXHEtUwWVxWXvlIlR+BbkAE3RtK8qXO3
dQGCJaCgEkTC9YRYBAyErn4BCGLhrxIFk8rTNMUyVDmMn/XhosnvLJgamHQP
2OExBEnCJCpKRZ3pQOUC0m1Y3+s0xByiduZbn9BXSbXp0OhsHDwzg9k4cJIq
WgdKoFmDq4RTs9AWLg0HWAMfjm+aeGxvjW8UHnR0tEzr6LdFDIbJVxCwDQLT
p5t6PSlwgeu5DFATlIOc0RQBC+RbTGY1h+jMNyozthmGVxEKKzpp7kxTqNRJ
l/pNS3KHK5ygFl4ROcQ1GUYps0eof4OHvluvf80KfSNq3phOx/Y+mkf8Uf4N
sc1/hc4JL+uqJQlT2IDo3T28qC1+adeadnYJL2lLl7VVIyht2sGkZEAHY4Fs
ZZtVZJSGfa9cmivwfP7qHBpZRfr4JEW7h0oNOA4gpkyQQOLbz0FvErw8251k
x1HUfuNIY2qOcCkFn6XYDJdJRNM3EejTWfOkyRKXdP6G500a/SlqfzYXQFxi
vQXlNpCqpXPGaQVrccM4sf+KSjObvMbsjynXrJsvohTkNmlwRmcq5zo1v6QT
LFDEVHaQoNcx3BJvOxUqySfOxXU8ux5eUSwVPeQrVE16HGOBFaZgFhYxolxH
IOPkdXJT190DqiY3fIoXTadU6cisW0GpUDhdKj7GznjLkZnhCxqTGMJeex3W
NnYL1y5yStSxCn0dY1kEJIjHHc/wzFwnD5nQQKwuPd7o80GTRqqYTC0I/JVI
Cm/Pwc1nDlda3QoyFCN90UZ/PbeKqM8lVrKKi7kwp7yq4IbKcS6qMSi1CIbc
3vp6dHB/dIATeffOqnZLWSJHmEt8duywWOQMZRiAS2NYmtysDBoY2vNjIjpF
wCxoWChDYY7pIbgSy7iQVuk7LPkFrD2nRSFKWEe2XNs+yrOK0o+S6jev5hfz
YZe6UMT9fcc3ujViKwXWIMImeuQkz2FfvcCMsRmWGUF+xN9MThKV6uRCiK0C
2DkwsiqWofh3XCQ6g0PTlr+bSyx2Q1kBBQtldWsHBgXZOld5mrCpKBdNplk1
uxbRG3zPAGXvGKTiMp6W1/QgxDLHdDcXQ5V6tr01kuVkNNAzIuCWD5VLVXVN
30tTQNiOVhFHTqZXYUTMYDCJ6IEgJPl0sSIibF2JdMZ9TYRmv3ROl5usRB+T
JQv6yFWtaM1wGnxFF3JDSQxWAgo7MngpWI2nj1AxtYS8Ou0eqiipxtB0wLlh
ucXjl2fPkGJUvZvbGNneoJSO77KHk8SvSQ/OWIxb2KgDyBwLjdt1CfmihgqZ
RYl2i4OFLFNNUlNCqFnAidOyak1CMtwycgirelF+0yKSZjvE5W6RINwAH5iw
LE6UFAdfdfawLoJjx06blnuUOizDA/Wwu38H4vl2Z2arBXzH+m20hBut4q0X
su9aGhVjvRzU5w0i7INXFZxcUhWcJ0iX8AUB8kurh/but+5HnL28PDkUn/3y
Gd6bkqAwVGIymMJUw+7R148fCK/Ttwh4JVcGOZK/5Epc+mjdHNYjE4F7qDXY
EGTSVZwQqza+dDjuvQU73FL4DNDdBc84v3Na6gslde3Hw3C3APzj01fNIIZh
5K8ehro8uVi3y8n6o5ysPwpWhcuHlI/vdR1nWSL1Wz9en2qBKT/DqySafdfe
ZwNRtW4y2bqJZOsmka2bQOa113dzvuvZnvjUxsdiT32AbDFlE0ASX8nJzaQm
ggXA/DbUIRQXCKYAqBSrYR1wrVuZfa2v26gsAujHAsDJBPBTdqyMg67WFgYK
tvWNj3EuiziJuThvCEsss2zeQVE/Bn5vkh0/wWOeFgA5Xo1CB3g4jQu02xGa
uxm8zniqO8yurppRX/74/o/ddxnFJVbKplHLZmdfndp9o0WhHxfTK9Lo+yhA
TTwxycy7cPWvItBgPXoGIRSTa9mgy1oQei+J6LskoTURzTWhMt+9FiXQObyg
jc63s+betwNoSlz++HKrC0SQr9YD0ZCzK0AYGUGJRj7n06eNeXpIkg2SxJwt
tzpBLNC8d3JYW9+OxLBAl55JYS092xPCAh1WJoM5QnY+5NCL/7PdgotuufzS
In1Nt0LSTbMhxhqGGLrm7o6htKJXki3VmCt6mYJE7mjr9dKjhXsFvbP37q9r
pEF4PddIhHC61Sc4qxZck5dtHF3gbmLpkw129W4Y3l4DFjQ/3EWXzW8ZbPgm
Ac9oRUOhccgqLKhaRrM/BJrUAiyatc7Smq5lzZGLBr0UHjdd0HfjlC4aV7Dw
4yqdkvGOs2hSQljYH9r9qHlrazMU0Yai9d+5+OIPTcHgDkedNYLtgwlnsBwf
8mifh/WxsYmn3NEzp73FKyQIn2nb6ok+qyc2XT2x2eqZnr1Wz/y56epZw61c
Pbv5ytVrfPqtnlo3LCo9vMbr8SA+qJB0i2PcalLsTuOcrfsWcVHczOeSnw9s
TNZAAdg56jzJ/2mEGAIdRS29yptENke32eNwl4IsIQS8+YTjKEgVLD0fFv7W
MMQU7cOI9mGCG8PjPn+BO0MxHaP3jMx0QegXQumA0DNu0wXh1jj0jep0gugX
5DEgiE2irl0h/F2xcjsIR5mHt4NwVEh4O4gGtLW3gztMeDsIi5BrbQe748bb
oTn6utshAGFNVmxCWHc7BCDcGoe1t0MIxJrbwfTsK/rt0Tp43TTr4HXz5+a8
bg3Tyut2s7V43UaRPpvwujf6BrzuQ1ifzzwIG/C6D+HWOGzC6w0Q6/C6ZczV
WV7hOFerTWVG7zCrvAGtdvW44Q5m/EW2QKu7MH70o1UdqoLs9MZ8PLTb/bw2
9MMuQ/MfgR2ifYfGvmgby7XqV5j1bUCm8iqqknK4mCx07KKdeoYqbQ6U9w+x
FlnErcgi7oIsYk2yrDCOPKBRX+a2OymjqrXV+7V2gd+nYyPYf/bYC/afvbaD
12H9pQ+OaK3+RmO28khwtJ5sYv/ZZwN5f65HS3FbWor1aRkesxctxUa0tG2w
1kZig60h+m8Nu3WPrWG+7Luc5stNl9Mbsc9ydo25Yjm90dZaTv703xpel760
FLelpVifluExe9FS9KOlUi50BblsXkE2K9Lr+jE3pccTkugmAGW3rrzVEkFL
6ZYjJhtRmlN7FI0IzzXrPhd/a55mGjbk5tgg/Lum3vA/xH4pD0up6l4X6r/7
7V0VJukkwwOg2iruPj4xHU2hRHM43n16crh7hRc8qWppO2Hqx4//PyLMfJEU
w3LRHl5aLLt868Wy7YRatB3Met2197xJd8qtncelSj/qPjDQT0Yf0pSpRxds
Vdz+Y4CG5Y0WRZUE8zs6FqyGwcePKvWoSb1eMNaLHApbGHUGVAzzdMdUPJtu
w7CKNVhXZMWb+FrBlS5bKwTol+2tthCLh8ZmURYfyEZBDg/IZrEWH8hGmBhB
sIjKaxS8+N9Q/ofwenAza4RHK3qUi1XiXTT6BNNjhcW3WEis5YCstQ9W0erZ
R1kZWMkguNuDO/1eKH1B2JKjf/2Ge+umLJg+G93Z5a4b3de1Ru1zVzcwUtc9
XUW7vnd0FdlCl7Te12N3XdDiNu23AOzfe90AsDv0yv63O/TI/HffDbAT8kWU
U+o+ifRvd4JJ8cMrMI1H2JofEEA4TvHtYFI/l+9Y9V62eW/Az/fvdVFHhXH9
Szr+1z0v6DS6rSib2mi/omSq8iTWzMnuXyq10d7Lyg63D2UEKqH8u8uT3kAY
d9WbNEhskKrY7Nidp+i075+k2OjWmaHocsiqIom1RvxEnlZV3tQjfZRIuwZ5
v5b6eL+W7ni/tuJwWeFOIyrmiKxfAr3aqyhljaHI/2rN+rZ+FgFqdJlcqxZ9
vdpiXUZXH8pvWvumy+xqp0j/mjddhpfd3nuD1TIdQuZHSNlb1oeyM45hY/S9
hUjFM6U4ufzRvM1nYHDNCazZQAaHiOdc0hmFylRe8TVm/k1V4udXbr56/PgA
y1nzX48ePH5Iz3qvLOlXX0zGldN2Tvg2oniHtMZ2Q3XHQxyMDr7BL5FexSKC
NjtVnh5i90MqlVYcvp0nh2lxSIwRBLtDEBbAovFbk/P/DV/a5ekzOjQwP9Tx
jhdd9cEfvuFvTBUOzRU7ePkSiXMI5J3PAWUi9VO8w32JsHj0D83hwM8q45YR
dRSnc1RchLZRTcG4VzyKOIJd0YqKVioeFvprHwsa/q/wOURupCf5TlTtABzK
xsglAb1ghqifTLEmyiEWL0hwURFY/RB9NMF3tKlhWs3H+KhHgepJThUIVeoA
G2SID72bN2xjQtVpjA/t8vX7V/jMkaquRv9jlyLge/zzjApf8rtGctSkma7N
6pIsXXYt2aMvHn55KI6sxapvF+vdfMnmXtzBOWpoYxl6OOyk5c6/AItS+uOW
snPcP8GnbdwQH12y4tMgcF1OzVNVq3kKh7tDnmLp8JGYyYis0Dasg3xd1P0L
fDqoG9YZGgDrjh5ExVFuQdT6lcu7o2OWz6I0/tVKpdghNsEL9g47RcVrLP4B
aOyenlw+2xPHx0cvzsXPP/C0qRjHRL21ufPzD+JnOT4U//u6LBfF4f4+VuXA
J21fy5zU3QjG3V/O9uldov3/UJSEbs/jooR+8yhOyuyQfv5ed/gPVSpCGML+
GGXzGGb/X9eyEfbQMH7F36654ffXVbSU8QjI1gR2FMOv4ofKj9BoQBH+Pqsy
msD3M/w2DOi0jJJMPKmKuAVSjA1GY2jQjVBawuJdpHFZ2J60i1SBq5d/P4mL
SRYGcwyTB/Pnr1ULiJtqQi1sXHaUhrd8BLW0tvljarI0Sq/gvqlfUOSupnBD
49FAU0xGF2PVc6if2MI3BW+o3hBwdaG3ht6QL0xhV+6HO5hunILmnlzHeCEZ
K7Ltnr14erRnoB9ni5s8nl2XYneyJx7cf/BQIGvDhq+K0jzzASZ/YXL3TGSD
CnxGVXmNhdT0I1iAKdYMSxJBYLFYEL2WODVDvpJTLGSL71jpjVlRWVah3y6B
b4Bk+IofzZQflaNXyLC/fj4PiGJuWQ2o2BhWvSuxktGiyosqwpfEMn6br6jG
/5R6ayrCJUDmtMAiREhNXUkH6wdxqaRXElwW+PvJxVPYktSW++Prclf0ohvg
fME+mXg4mmga1AT8rBDP5QwE3Ln2fwpNgyTix+Aybv5U1fhRv+9qoVEiGClr
gaGwJid4z2ISmL82efVrYcSQ2lwuzDvKKEtRCn8DE1Ez0iIWd1lyRZyLzCYS
Qh6rFCFH6g2RS1VtD9lleP9geHCgFU5jr5AsjcsYwPyZ0evU8GITJfQ/QQft
f06z+Fz8gKcnwBnMCJ/v888z9a0I3DDsov1R3ZPr75pauMDxDhTdhdAUj+4/
GB38p/jz86MzTI0xS88nmCZbRg8tyPvrusb2jW4YwJIkqqRHxAgM1e3FBafh
XTRHmn0+8H8m1xmVGmy5CFcjGB6XRuCXyzyiqqKJNWBLcwBqehSLMoBMVDio
uBgo2tV5P/ZPTQpyfs83dpPgHOp5nD5Vj0/sWL0+6H9+cLB0ruSFcaR7dCtw
dK7b9cT1uXoU18G56ET6g+VBuFthmce1G7HuDsAEvf1FthCB9HR8aPAO94FD
n/Y9oAdiOFitDVEsltHCZ/xWXlrBRyvG1uvROjYJqs/BvaNqm9OpnB56b1Oa
0ttY2vuQWkd7/Dzp5Y+mbCJWSad3crHo7XF2IXYjep9kUuVUKV4psz3qP94j
U0NnsXHR8Mi8rTsGdSDpmxnVr0dwNAvqLISxY86Pz9X01HPDujr+Lox8VZGB
pAYuaOR9i9hWCp1HbTqwt3cKb52d+6PR1zVbf1i9BHp+53mc5VgmloJ251gf
QuwC8nuBxXH4IrhHrBK7G24UYo0ajL8NdHJsT7IcjEYP1iKLUstaZtBQSALY
ubsgi5EKWF3WvPqhO4NN988qZfuM1L3JyN3z1Yipo2iarFId9nYt9Ip04xNA
SFFur6ZHjYrJCLZpyGsycY7hwcSa0lMNhZD4Cj2F2JQxSkDmGYjcWra43l2D
k1rnrGYdBBmQFvgBGhSWpG6uej3dOmu3nu8crN8a2Gej0b4hyr4Rvt+KHbsa
FqldI3R3aPN/Ju5ZYFp6Tryen9VdHC3Ih0GqcKan3Dz/kh+LQNLAviLq0AbD
dwlx2QfeEuHc3SnzZ2w/1KBKcF8Mmfo4Dy3fmIR+7yZ8BAggjoeOvhl5c+mp
z/3hsKT56cnJiVaeVNiWhAfXvh6w+PaJ4oOpaaQfwKRi7er5yybdiPMbj/gh
ZWKyzJleA49WHhBs6oNgKnUQ58NmuzNqonBnW7QL8mY7NaheuI4jbAZSS83c
y576BnCyH0QjMFMSjwqMerB8XGeTa++R6oEzHnUmpOmXOX30GPqpdzY8taBs
9jYWTW2cKneDckZXKQjY+oR1GDgaIIQ1RYnYChmrwu6WMkBbndu9W73yZ2Ey
OMtMCruldGbT1lf5qu4vyJARgN/Z12dhh/of9Teq8ue+Lx7uKZGLbdrKgHZ2
CuPuCivhbMou4YUka+WAXo6U78m1Lc6TBgtYj4PrlW/uSNeXKAPU6rVTm902
swUDnOwUQLdMQ7VXTNrCrfYLFw23bj+acCB97HuR3u6x+/RYJpKeyBTBLauf
FFJxXX5N2GEpKpPOuehG1fAlsxX8ZZfy7i4N4+7Gdt6+1IR0ZKmySrkMuVkc
1/9WvLdKvK/eHdGa1D+1KNdGNf1QSG0SraDjRyKgvdKGjndFRnseH5cPLAa9
81l0SaRG7cT63boOyWSFEArzpLjp6fmlbpqd550GEu56BEma740pJBCE6+zp
iIf1QHkwiOPl9Hlo1ul9d4Cd/SZsFy6cL9hBMPq9B0Iw9yROXwt+kIgjq1Tu
0kJ1QKxoEy6bsSYgF9lbxNK86H7Dj9qZbmqqzy/PV00tQGWV3dhjSivng3TW
h3p64QeOVp92TBFxa51jvyliGU1vflaWnS01MPJtWxgWgL7xGe3cEGvRyJlG
hB+WAncPKEFPqORWZeSR8GZghWB0Zc8aVZJA5vuhFiJdy8WntEbcWMq7UA9i
1O8ssxF3VZsU4RfGOnDmN2MNvgr/K7CA+4R9ubeFov3mU/1wrs7ts7xPWvdG
Sqa9xl3rrzig3tmcAEow/JC+pZratTfxgvavmm/q+o/o2DP54EypmTC66ZyS
YnFXEzJItU5oYHe3nrHRr1zmtMqRwAeuZnIg4pGEDUIHqvAXJ54GiGJvcps1
N9rkFoBgOK4v455biLyoX+HTeYMNZu22AhTrbWAFcE/LCmj6IPWF81VOiE53
nVdJGS8S+VbJjmyhGBkt0yv8fuzY78pRd66t24ugznf5Q6fQKHgkvW2qX0ID
9lrksSwx8cEe3+q5y0fzOemOaVxMqkKfkqiPPrIgfsGTNuuKvLtNXssbMup6
hvnIlGFSE1zUcvwYsUlqKSYyjfI4C5mPCoWm6G71Hepr7s75JJ0e1rfbbzWn
l5dn/pyemVGndzwfdTvdRtjSecu+1vx5IatptoxzN7fAeRYmewMgX5w/vxha
loKF/GI5LOQM80364K/+o1n4c3w+MeW3wA6F/k6QV7akcAA+U42F0DFyW9JB
Iek1Ou4jg2e+MNtXXVR2Ttpa7qF64o6T5VcIqVNtR0Vc+lUoiCyBhIokq8Qj
ZoW696Vl5alDuMvL872g7dVyD/bj4TzFNxAVchsh7oviWhYvrDsrnikWksbH
OgAUY66eJcEdntQHv+cvasOrcZLYqL0eOFL86uEK+v2I/WrjDnT0ArMuSw1d
5JyYI16PF0VwMf1i7ptg8Ry63QqJQG34O6WGgb82KndMkT6IdDIr2mLd9kKA
CbETvZDbzYRllrWR/osHKyZ8nFV49sUnVrE5BSqdI226VOa6eS6LgL045pQx
SS/p1jRcybqIfHix/mW4j2VCyy5FYi9/Dy77d1DeZ8X1aB+YwL+Y+k38+9C/
fXPpe+B3rQUae8592GsDpWkf5FjuQVCcua+CbTIaOu2njWDbqnHrm+ybjHmU
xFGx9hQJ1ibDPa2/XXtQfY9+k3GPdd+1F7MzEc9+JG3V4mJXGN1OV9tdPFgM
wG59AKYr8HM+X+xZhvX+5+JoOjXpW7BM0NzYtEFszZtr7Sj7z7KtUq8GoolN
hGgXwpa2eZKAje4jzb6OHfltFjj4xmpaF0fwPQvtjPoPU9XzR+et5eGpPnHZ
bEanTNBRhWR1JMKmghVbqY9X3fE8vBuhPu9S96qIQt3QOSitsXtw4saQPAy9
4Vaipwvv9clfIyWDbVUMxXYoSfVMojy/UeGvum8vgjYCOqGAtVV+Yo1glh+v
rMF4+9uKXTOvd/WsFiEuc4JNjDDeXuHIB3Xsa6gaXeqEM0Oq9IIarKtCO6LA
a1N0E1p2UdHiO5ucjQhxUMJ3xYL7z6wlDrzieMPG1sajA12nbIGHabP4wCrJ
Fs8bukgPEBy9UfjgY2CAg6hbLu0koBoH1nqETICWOBcJJ/cxezBlFVRMllle
Z3Mn1q5SAiL9bH1GRzJXV+L0aa359Fo3CXW3iFrkuStsdc2IfyuaIeycYzv/
oKYFG/C+6Z4kchVoP1+yWQFLfe7HG9ePVTZxqAvEhLEQO9RC6Ffv6QDHVsv+
2DXA8Oi+uG/g2iXnW05Qds9f7Ckbrk5B1Igp3qWqMd2eZYWXZsU8nuQZp4Ou
2OgaKB+Gauu7Y33CBzpNgnVGZmg5bLujNZujru8TmPfBV2HlzcuNnYK+g18E
qLfDInamEngu0ZyE9CJo7cOY6kEbSWQ0JNWVQkorQ6nMk4OdfB0tFhIEROfK
tBmSXctzhH2soJ13yOYzZMgqvgvWjCwUWu1mzZ6fWUngCq+ReMkXN6VwuVy+
nUhKKY+LeghLBoIAJLIJ+KGCwUEaAkvMZjK3s86C5A54Ql2U1vc+aX51Xy+7
0ljbtciz2naAv7RTrBUnRXgQmUorKcNaX0MEdSErweMI++AST3MG+tIUaIpp
PHUllgYQp5OkmsoBXqiWeTkQP1++Gogf1ZvKAu2LfCBGI8tDVV7nofOQdv2C
84KuE5SxLDolUbtr13shKDnOOJRtma6uZ+89mbxhdCm14llN19bz7f28lDaE
GjldvdFpZpatRKonThsHqPjCXCNItRmxnHeiN8urcED09S+8DBPjvJvKPAjM
EkicUXVdjQfFInst8TrLDT4QDv9pT05qiojWnA5rg3cJooGqEYCbv+5elNW0
mePoxH2ch7Ld0I/3GrahIHroMqHKFoXYObDjWPXQdCR9SkfStgV7SmfQi6wo
MF8DD6OTeB7zAeo8elvDpbNpnNPiwcIG4B1T64/Td8e6zVinX7QF6fjys45L
lXnEJQ0aSa2cVajrsFrC0U71a27rFr+gPcXpqUbHxDhCCDRSkvxwTyOLN7DJ
Oh5x3mzLdQDsuwF1wo93/Z/uw/kbSl3+CQ66amcdMVXDVQbogWnOOXGuNdTl
CfxUo8CT1G66kUgzvJ4dq+iKbWHXPBqoCdAOc8XF1PryW+stUb6i5+ajtCe6
HCtM0BRQxb2qwuQWNqCH8lwCM7IaBZPtQ7dQ8dO8ltnrNqqufzHka6k7zkVU
gsLm/IreE9Xb7vvOBdRxKzVwSVPdTAWOoCc2Vt5IBS5tgrjFndSNb6X691I7
OCg47Z63U23CNIHc/l7qndxMbbmb6pPoQ/smbb8neod7NTiIC+B2+/fflqd2
i3yvVWlenu4hcrTe/avFV0vBh/Y8A/tIShdY8Co9cNv263ztxoV9pc+D3H2f
r+1GX/edPkeOhx5K9GVmzWQ1YmtIlwsb/ZpmjW168hZ3Xde1sYEAl7nRj65U
oNNcWEclJAkWwDB8U0Bd3VK7rnXjf/Ao2HYxzzno7EVDh6ePiiBJfJHduKPn
A+21NP5+UqDah/3QhoW8MyRO1sIhtEBdd+aaN2B6RTJMQa2WgPNxM8ZkSTkY
VKbRuOEWqyd/u7z0WgAAozIMVU4wdLtmZTrbRimQfNC9gDHHWcVmip2j9nHy
P1VGwnKdQe8i3zMwWTcl7GOldwYm3DVwg7GbCelrcvbPoUipzcXLW0S/Tu3L
fbUjhSmsJhs/HFdSj8LdKgrYPmQwkuW8I+cNHHjcbRUWCpxgcDYuoMzOfw5P
23lw7tY4vGJo66HQfJhusxhDE07f0MIlBY+t3jTuALbDEk980eYNYm49h/eR
UjjWvJ4YvMhH9dR+FmrbdlyN7HENPzx0XTHjXHW4ygy4RuKRJUJ6XlW3A5T6
zTY3JKneZVtBoiN1KQl3O3UpGjc09QNvfpiOSqT1iNI1Q/ChoeorlIhP/USc
PWzghlRXORk6Ib8817ekdHzatmpogi31YxphyFW1WHqM189S6s8Nneefv7ci
RWrzfSpThJ+NqxRtUqRo3RpFH/pvit9LgSLedHQq0iRY86Zh1/71r1f22KRE
Je5WC8WAcGrjGMUt6pFjeWjeOdb/xH/566iifya509OpIQsBU+sX4AxQGoJK
vLXBekYMPZ68iR2ACY+6v/P6Qxtazy/O6wGpAqLp4L7c8sXjh18G3SbnxeZN
cK4hgNnEEdm4F96m43qIf/Cqb1PFcazD4ZbftiIFaot38aN9O90WygaIkjqr
JPMPqpnJv3ITyCmDwwC1DA5U/m1SyzcFwpKqh3GgDzJbtJoqZWEpNvx05TAb
Luot9dc2LtaUo7erwOaffJujXNfEdC4+9bDFjan5YOGk5BrwNkXdI1rvMlet
vduqmLQ4Cu1MYdZXn6oSwKJFaTST4ttUw4e2F1kxd07d3sYcv+E8yl/LvPh2
p8zBPrF/6Xiu9fv6HYMRAlTPpvnvptFx/c2i8QCaETFY2ONKLsVUv+WgUp9I
fr/7DuTPg68ef61ePVN/PuIn0fCvhwcHX/JfeD71Dzqfiqb+N//94QMdFL17
9+Lk2cH9nu+jEfvywt7d62gElJc29NAQfv/paZ1PT+vcwdM6kyxJ1KkTJWzX
z8Npq2JA6pCBmONnYzwSpJjPndxneQIv8jAQ91me+jmeTw/mfHow59ODOb+h
B3M4No9ugmOya8FA9Y+cuu6rTHc3+8QQx97LAHYSBlrHj93fV1h2KhnF3H1G
HCxHxRu7+Bhja5ONpr/7n3H6n3seBvX4q/P4gtcag6l2rRTuTHGjmfZJ/2vJ
c8VN0f6ykIdJZ2LcLTFZ8caRh4mztjo7bJUfaRh61TA2e7uZZ6EDkiYiPTyE
Y41ziOPpSMRu/hIzcY6H5kGcmNNjF2V91WUF+sXHRT+wacKTuLjdJPDi00ea
icrZA3VRJ94ZQM5ETjjArbPR2uZg8G868qskRPPE57L2MZq7YS6vhgf3h+Pl
wtuO4ZFX7ETwp8TBfdHAoX035leTIbp0d4UBKkyEtwEOj+4Yh0fr4oDe613i
gPBW4tDQSKsYzJT28AJR7UrowcIO93nivsdczEicql9mnLNfFxY5OX8+ECd/
Pn++1yH38/ldoZFnGV54pvqSpY/K8PLVyQlgc07/6EKIKqHcEUpc61KTJ4BZ
3QlQpFRZwBD+20DQoOeXTuniibpuygW1beWFukqKO+c167ScajAd5MWLeelt
BzpnIF3D6DwntLHtRMCNhlMJTq8YWOvaBK9ataUU6YrSjYtRh9ZVKMF3oXTH
+kqUu5T1blp9ZbLrJpSXgFLfpFQY1Fej1I0oEUYjUK67iYd1QWxpndSqSzpU
TDhYX5u7c7NWjkZhAII5nmPowF38UCnw1kJR6Efq+mQaHMIWP52dqpcUQbbk
0sgHDjLUQOawsuCJ0sMaNjDsr6aqOQEkwOnZCfUnYVADCVw8DM13HE1eV76e
2ni6ClrnbDswwhMPdXfqrjCiQ5S+qFiioFFWevWmsDtZu2LQ3ALhHdCeo9W5
Ea5VRTtz9lFYkPA1xzIT5z/vUf15nW7FUKycq+DRH5mb/IWKIyBSU3kl7Ic8
NZLt55qdjviHdpFnEg0LuhVA12smYkVUwkfR9wvXQdPzINZGtdvX9BDmp0kd
NLmWQ41h/WTkw/uPH+6sRguVxsGD4TjmaybD06fOSyeE3yXgdy0j4OIWvJxn
bR38+Myxxm8RlXicIXZ2/3YwfPz3v92H/3l3f/DFh92h98Xedzv+3S9Ad3ew
ut/e5/5zleEsiMR5WHdaDFAjpBjffIO6k58epB9pcniDqRYjERa7nrIameKF
fP2o6gGJWqR+7QxS9FQ7s+bNArwyhRKHAMB3IXwMCAwfx7MqA9uMsbFbjsSf
owQ4Q/9trofxKhogzB0HODoiyFpF1RswS26qlbuUaJv5qPbE6bKYfBvNF4k8
FAcD8DUP7t8ffIn/R/+8H2Sfbr93xW7sdJjW3o5Nh7pdfIR8qBXIBqz9fijS
8xu9fDGNXZtFvwLDFhu2P5aJ7x6IUVh/rHi4vSV1oF80JPjUGhfr8B48aMmg
COTjWGkNGznpl9YStidU2OlBx6evPBx6lY0+zubqlOrUMrxfqVLRfxoviuBg
Ty5uN9iTKge5cRH/SsPgSE9urDpM9lgnqya2/7k4kywl4/q9nKiknuopavUK
BOfa6UhQLYuaL+GOl+7yfit26oDYDsp+99XbcBc7frRWJx3wwUvJ/ZH8Qz3k
17o3t15VOeHkLRnJbTxgadbTlDMf1dEdzm4gzoHS3xIL3kOqB5dxM5ZRiLn8
wszihE/DaMGY3xKz3sPxQ2hNwN/Nh9ESL0y66PW4gSXs52eXMjIOJEOd07tg
FvHswahwFv45ToBrw4X+QLolGEG4SiI/SdHHrnUTHCsg4lnCoWWdaKyLclhU
5CDt5tuiN7s5SPW5vLQq7bVL0jfzrmd2FSLrmsUnSf9J0n+S9PrzP0XSB0qX
1ZKkS3AcvYnihO7VcnNojQJDv0DlFukLQnXm/66ehXK8749G6Oeoj3PWx//g
Un479uZsvSfVRFZX4bPux7+Ok2yMMBemGstKWtHFQCoRl8dOcYJgvJ9uEb6y
GreTrJli4UtUOy4Umr91/G65Xt4l0TzOcoyHNdfkURim7tGtmAxpVpOjnQRu
kKZJAP79m3qd206cDR3iaU+0wWeTiwDuGmn62amNbefNGJ63obSEmbxA05cB
Rtdlrw9WcLmFmv92tqlDFqeTXBUPc8wbDNfaU/HqojQywNC6M7Vsoukhp81h
dPZJHk9nsvmITjCTmhbylrnUBKM1k/ol2Z2cfabSzursaj+hOp6jeiy068+v
QfNvQK88m4t37/4AgvWrx48PVDb1H06HTynlb0g5vcP6gTgycRPOoq5blTIq
hqCdHn399VeqCHR3JjVlhw45GVTnjTP7dOdTM/VXJ1WH4PPaqdTqSZJSxryy
/5hGjBthYGV4mz74g1p/9x6MQNIdimMrkbYOf7uhemscfUvHG0V/HRzpr/A5
xEREqglkp3zbg7vjtqYhIrBbpCFSBuKwbf1VpztITbRplkQ3Mj8I0i056KDb
f8GnLa3zOcIUB32phqDuhmq8t+wpfRyi6dxrl17pMkipR188/LKNUjrt9ZIP
jeMO5lZjmvdN/MHLjzm4u/vVWzY+v5AECHKM0eWA0Sb5wOYg9vecEPzpqsmn
qyZ3cNWE9g2ldMzNvqmvi3BXc1XEuyVSX2usrxlIDafCd6AxgI83NPSO0Pvw
RZRGHEHifrhxsd61FEf55DrGnA48S989e/H0qL7E8Okuyqe7KJ/uovz7VU/f
M0BLwTfKJXcmwrXKGyaaKdnc9nSGGg0vtjerYNmvu6kWPQLCzYLwComUjhT4
6P3yxOTrBQMfNl5VHnuIpcvDO8ZHka8Ll6RcdJOIfu+BEMw9idPXJKH0W8yq
prZdTcym0cDKiFNZFTNO+SN+91YRQ8y6hGg93xrCcxw98BL087YnrC0KBBaj
POw7817T1pxs5t576ojbyrlfngePq9QG5ACEO8Gu+hTaVTt0AIRiRMEDOBtT
98kSvqpaFNkkpsw1JddQ4MN27z51+h/40lDwPZfuWOHdPjdk5v3psaFPjw39
Jh8bClLbjhz4z27eyrBQ5YlaDQs12sYlLk/ql0dV/SQEteJFTWu2m7xP7W17
WmPff/OmaY246VSbr0VjBZd2T5IXIJx0Ya32pg9Y2+VwNkbkDt+zvgti0DCb
YPLUknwKn9vicpcvYK+LS++Hf1RCvwhfc7mqUvKOIy7C5Q2yxsPQv5+nfo89
t2rla79O8aTcet4ot183Ci/zhQqY6Od22MGP3MX1H0XrciHbEJsW5VqIwXYo
ten+8bFrPhu6qjpt4wHRruez2x4PbeARejp0NSa9nxNd8ZpoA53f5CvjtJMD
L0Cs3Mb12cWh6d7pPomdn9J4CG0xUekJ/0vPJcyCdtG12hDyqq1Z9sqqY3zr
oS4wUy4VNJW7pauz9t0NnY+h9zJwNns0PGTXmIX8Vz0YvnoXOXL3N/Uq+Lq4
f9w3wldjQ7macW3buU7LWOpHtO/67fBbYvZZQb7S+q+Kh6yqNaubr/HOeJ93
u1sJ+rHRXvGc97q4N18c/xhI0yg9sPWRDN7e7CrcWsvUfg5xh0eImiEgoj1V
4/mMveKmdWnPsgURt84nd/aVTVudz9Z2du3N1kSxyTjfvORmKL1prWQxynVp
TxnT57f6Xhlrv4wANSOuRf9MLzcX42PkeukRmtleOtcDv29mN3xKb/iU3vAx
Kmlq4dhaMfM4Q7FRglVecl7+7vGTV3uf6md+yln4lLPwO8xZWFU/s+Huh0j+
1DTyHqtytHhrHZpxbEZpVCFqxgtaoqaOvQCTHVPUQEPtqMFSpR9j+CptHT9o
W90iCT9sULTYV+IUyxng1udF4lvt+NMvfzvLSmlzH/OxGDpMVKiVHssrTFBb
VOPECMUIAC0lbOSoqPtYJdIROALmiudfP3744MOH0d+NNadBA9WyfMrmnAoZ
Ay+9TsFbwLxZC32tB7a3sPRRBupNWM/UML6qGILaEvxGr/ZEF1lBYlGJsO0t
bVQNn+J+G+hnetXj3NAfXXzoFSVaJ/K1JWdGOB3puL8A30ecclKsSccFPUac
Tin7YXsLhUJR1gIe7yaWeDl2wsIQ8MAQqyRI8Ac9i0XVrhHzgmAASgVox3Pw
6PCFnkzfRtR1MdTUo/SGriu+iacomVxMt7fAiobZZJKvL+KvWLpnClqYWjGl
GUsY7FmVo909B+YY4Cvk8uqKrIJr4IkxVhSBBSFNifpDp0U4R/J8XQbIQAMT
wkvkLAy+0bunMCCRBHUo6XVAZaSUkrpkaUgZFbyIVEIEftneGuvHfyu+qDnG
clTgcaKxx+QwF9UazEYRyBgMgysZYUomDvuKSsnwi7bRlHU4gK2pzX6ID2se
ga1FzyyTSD6aIM8rFW1z0wCjuzCrZYz7KsHXGVEhyiWNCTPT9b8ogAhkgv6s
UMS04qnilSD1Al1mPU9AyF1HapOOZQo7BzX29lZepRTBQkkzUPeYsEYXWVa4
uSVeM8INDeTC022ilnwLFlFsMQ5idyXlFItkWaPNgV686pokaEKp/YtGa45t
kLxAmVN6ZbtaaLlk8ak7cWyAdh0Ry9GCSJNridhLATPcGSlH8yedTEER8ssf
TTlXMgbYDoD+L8+OzllE+Qyh+x4f//n8DOzgPCsKsKzAXmfdy1/wfQ1osbe9
BQgO+W4owwU7A1eURd3R8eWZWvpHD7/8Al96sLJ/R3SxlGQdV0kj/YojDxgU
7ptqrrxg+PcCV55fNdeIvnh6cUzbASkS55RjAb9qY33KqNO2QkchZ1jnZyRF
jgGe/O8KJp/cDBiRBtE42VlXBYq4/4vzU1NOiDDVZj6Pt71lDUhrMxQvLX8X
PSOwzmFBYDLAjj+S+yMu5eQ6VTcrBkKWE9XV1W+HPCKvEB9ahhab8WZ8YS/i
QgDWDNA6Hnag5TJK4l81RLssHVbPNBEb2ghc5HKoCKzzEIV4kqGjcWWXM2NB
QgixymH+U0I2jHn9eLxaABOT2uUyif/n4uXZ9lZGTkmxx49vk+huXxabDUjK
XaFzq3Yhsy25g0SLZfw6JpuZNq+1+w5B8CvXAtuMwBZakF8BPhkYxzf7T38G
i5OA/K8Hj2jD3OMddA/Qucdf0A66R00e3/vp4uTe8dHFCS/OC5QTyOHP5RuZ
0A3IMkP7h38+xopPsMvhB+B08Ar01xQFOQQNk+Y3o5vqwHKq2UzilPxI7Z9j
W4qStXT55Ck3BIeMMQi04SyqyCJXvUbaTtF2gJbLVM7uLbj66Qw9gjdxxPX0
VCGqgZKCYKZcoW+hV5AKb02uJR1XQ3NczEhzGogMf01HGkHba2vFScdj6VQX
GgBWvFVenVxcHr88eyYa9hcZRXhP89H9h/dRjSF3RDcARXUWZyfU1bLd1MXO
Bw8P1HXMSzIBSLNqZwl2y9REe12M3cmw2oK+YJPCAqGK2qfYPv0Ltxf9S+zG
IwlbRIWy0SzQKi8utLylnII9sjFkIW0EUC2OazULqMDGKmLKGIAZv6mSFFgC
xtneoojD3KQhgw31Js6zlJQxgP4ZkLQeWzV79/zlxeWeUn8YErAG16EJtEml
Xf6TFoyULfLAjBMYwBKDX0kgaRScZ+vJOzg6OwpwMmthNn0phw10OTVVuWrK
4EjlUvz06lRd08UF2SFD7S8vngOryBnGYW52lI774qtHj1DHFVoJHpqwbFRM
4ngY5VaNCYR7KPq/TtSoHSzU+BimMfv/kuzWix+sZoDroTjbP/pG6VHQeAUa
KDA+1VtNsUUd9bXrxfVFMhQO/00i6l7v/k2iGHZ+/xWosg+vXFcjKXMajg/g
tdC3pFLhSKoX9N32Fj99m6sNosXg/QfO+17upkBMDg327bxvMKbGm+0fPpXQ
o2HxByA0/WI8e/qxd0DNi3C7H+9yqoqyKdbomna98ptOuobQnLL1429h1q0y
ZM25t8JxKYAnUr+lRe/Y9rcigAMpSIJ/Ex9oaTMcDqnoNKvrowlGxcBRmKlg
/rtDNpPk9NsdOpXnsN/PYA6Rok7i1xSFi0xHqc5R0vqIhLT3s5w8iEkGDuyv
v0q+dcO2J8fXVfi/MPF/LQMHOjYYo8Ovoj7RNFuozAR9IjkKYga2RfpanM4w
8Su/KV4rX/op+INAyD/pomgUh6ETLIplYBNwKSZVUShr5v8Bm+nuyhWAAQA=

-->

</rfc>
