<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-teas-actn-poi-applicability-13" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="ACTN POI">Applicability of Abstraction and Control of Traffic Engineered Networks (ACTN) to Packet Optical Integration (POI)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-poi-applicability-13"/>
    <author initials="F." surname="Peruzzini" fullname="Fabio Peruzzini">
      <organization>TIM</organization>
      <address>
        <email>fabio.peruzzini@telecomitalia.it</email>
      </address>
    </author>
    <author initials="J.-F." surname="Bouquier" fullname="Jean-Francois Bouquier">
      <organization>Vodafone</organization>
      <address>
        <email>jeff.bouquier@vodafone.com</email>
      </address>
    </author>
    <author initials="I." surname="Busi" fullname="Italo Busi">
      <organization>Huawei</organization>
      <address>
        <email>italo.busi@huawei.com</email>
      </address>
    </author>
    <author initials="D." surname="King" fullname="Daniel King">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>daniel@olddog.co.uk</email>
      </address>
    </author>
    <author initials="D." surname="Ceccarelli" fullname="Daniele Ceccarelli">
      <organization>Cisco</organization>
      <address>
        <email>daniele.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="03"/>
    <area>Routing</area>
    <workgroup>Traffic Engineering Architecture and Signaling</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 122?>

<t>This document considers the applicability of Abstraction and Control
of TE Networks (ACTN) architecture to Packet Optical Integration
(POI) in the context of IP/MPLS and optical internetworking. It
identifies the YANG data models defined by the IETF to support this
deployment architecture and specific scenarios relevant to Service
Providers.</t>
      <t>Existing IETF protocols and data models are identified for each
multi-technology (packet over optical) scenario with a specific focus on
the MPI (Multi-Domain Service Coordinator to Provisioning Network
Controllers Interface)in the ACTN architecture.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://IETF-TEAS-WG.github.io/actn-poi/draft-ietf-teas-actn-poi-applicability.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-teas-actn-poi-applicability/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Traffic Engineering Architecture and Signaling Working Group mailing list (<eref target="mailto:teas@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/teas/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/teas/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/IETF-TEAS-WG/actn-poi"/>.</t>
    </note>
  </front>
  <middle>
    <?line 136?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The complete automation of the management and control of Service
Providers transport networks (IP/MPLS, optical, and microwave
transport networks) is vital for meeting emerging demand for high-bandwidth use cases, including 5G and fiber connectivity services.
The Abstraction and Control of TE Networks (ACTN) architecture and
interfaces facilitate the automation and operation of complex optical
and IP/MPLS networks through standard interfaces and data models.
This allows a wide range of network services that can be requested by
the upper layers fulfilling almost any kind of service level
requirements from a network perspective (e.g. physical diversity,
latency, bandwidth, topology, etc.)</t>
      <t>Packet Optical Integration (POI) is an advanced use case of traffic
engineering. In wide-area networks, a packet network based on the
Internet Protocol (IP), and often Multiprotocol Label Switching
(MPLS) or Segment Routing (SR), is typically realized on top of an
optical transport network that uses Dense Wavelength Division
Multiplexing (DWDM)(and optionally an Optical Transport Network
(OTN)layer).</t>
      <t>In many existing network deployments, the packet and the optical
networks are engineered and operated independently. As a result,
there are technical differences between the technologies (e.g.,
routers compared to optical switches) and the corresponding network
engineering and planning methods (e.g., inter-domain peering
optimization in IP, versus dealing with physical impairments in DWDM,
or very different time scales). In addition, customers needs can be
different between a packet and an optical network, and it is not
uncommon to use other vendors in both domains. The operation of these
complex packet and optical networks is often siloed, as these
technology domains require specific skill sets.</t>
      <t>The packet/optical network deployment and operation separation are
inefficient for many reasons. First, both capital expenditure (CAPEX)
and operational expenditure (OPEX) could be significantly reduced by
integrating the packet and the optical networks. Second, multi-technology
online topology insight can speed up troubleshooting (e.g., alarm
correlation) and network operation (e.g., coordination of maintenance
events), and multi-technology offline topology inventory can improve
service quality (e.g., detection of diversity constraint violations).
Third, multi-technology traffic engineering can use the available network
capacity more efficiently (e.g., coordination of restoration). In
addition, provisioning workflows can be simplified or automated
across layers (e.g., to achieve bandwidth-on-demand or to perform
activities during maintenance windows).</t>
      <t>This document uses packet-based Traffic Engineered (TE) service
examples. These are described as "TE-path" in this document. Unless
otherwise stated, these TE services may be instantiated using RSVP-TE-based or SR-TE-based, forwarding plane mechanisms.</t>
      <t>The ACTN framework enables the complete multi-technology and multi-vendor
integration of packet and optical networks through a Multi-Domain
Service Coordinator (MDSC), and packet and optical Provisioning
Network Controllers (PNCs).</t>
      <t>This document describes critical scenarios for POI from the packet
service layer perspective and identifies the required coordination
between packet and optical layers to improve POI deployment and
operation. These scenarios focus on multi-domain packet networks
operated as a client of optical networks.</t>
      <t>This document analyses the case where the packet networks support
multi-domain TE paths. The optical networks could be either a DWDM
network, an OTN network (without DWDM layer), or a multi-layer
OTN/DWDM network. Furthermore, DWDM networks could be either fixed-grid or flexible-grid.</t>
      <t>Multi-technology and multi-domain scenarios, based on the reference
network described in <xref target="reference-network"/> and very relevant for Service
Providers, are described in <xref target="discovery"/> and <xref target="config"/>.</t>
      <t>For each scenario, existing IETF protocols and data models,
identified in <xref target="restconf"/> and <xref target="yang"/>, are analyzed with a particular
focus on the MPI in the ACTN architecture.</t>
      <t>For each multi-technology scenario, the document analyzes how to use the
interfaces and data models of the ACTN architecture.</t>
      <t>A summary of the gaps identified in this analysis is provided in
<xref target="conclusions"/>.</t>
      <t>Understanding the level of standardization and the possible gaps will
help assess the feasibility of integration between packet and optical
DWDM domains (and optionally OTN layer) in an end-to-end multi-vendor
service provisioning perspective.</t>
      <section anchor="terms">
        <name>Terminology</name>
        <t>This document uses the ACTN terminology defined in <xref target="RFC8453"/>.</t>
        <t>In addition, this document uses the following terminology.</t>
        <dl>
          <dt>Customer service:</dt>
          <dd>
            <t>The end-to-end service from CE to CE.</t>
          </dd>
          <dt>Network service:</dt>
          <dd>
            <t>The PE to PE configuration, including both the network service
layer (VRFs, RT import/export policies configuration) and the
network transport layer (e.g. RSVP-TE LSPs). This includes the
configuration (on the PE side) of the interface towards the CE
(e.g. VLAN, IP address, routing protocol etc.).</t>
          </dd>
          <dt>Technology domain:</dt>
          <dd>
            <t>short for "switching technology domain", defined as "region" in <xref target="RFC5212"/>, where the term "region" is applied to (GMPLS) control domains.</t>
          </dd>
          <dt>PNC Domain:</dt>
          <dd>
            <t>part of the network under control of a single PNC instance. It is subject to the capabilities of the PNC which technology is controlled.</t>
          </dd>
          <dt>Port:</dt>
          <dd>
            <t>The physical entity that transmits and receives physical signals.</t>
          </dd>
          <dt>Interface:</dt>
          <dd>
            <t>A physical or logical entity that transmits and receives traffic.</t>
          </dd>
          <dt>Link:</dt>
          <dd>
            <t>An association between two interfaces that can exchange traffic directly.</t>
          </dd>
          <dt>Intra-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to the same PNC domain.</t>
          </dd>
          <dt>Inter-domain link:</dt>
          <dd>
            <t>a link between two adjacent nodes that belong to different PNC domains.</t>
          </dd>
          <dt>Ethernet link:</dt>
          <dd>
            <t>A link between two Ethernet interfaces.</t>
          </dd>
          <dt>Single-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent IP routers.</t>
          </dd>
          <dt>Multi-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent IP routers, which is supported by two cross-technology Ethernet links and an optical tunnel in between.</t>
          </dd>
          <dt>Cross-technology Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between an Ethernet interface on an IP router and an Ethernet interface on a physically adjacent optical node.</t>
          </dd>
          <dt>Inter-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent IP routers that belong to different P-PNC domains.</t>
          </dd>
          <dt>Single-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on physically adjacent IP routers that belong to the same P-PNC domain.</t>
          </dd>
          <dt>Multi-technology intra-domain Ethernet link:</dt>
          <dd>
            <t>An Ethernet link between two Ethernet interfaces on logically adjacent IP routers that belong to the same P-PNC domain, which is supported by two cross-technology Ethernet links and an optical tunnel in between.</t>
          </dd>
          <dt>IP link:</dt>
          <dd>
            <t>A link between two IP interfaces.</t>
          </dd>
          <dt>Inter-domain IP link:</dt>
          <dd>
            <t>An IP link supported by an inter-domain Ethernet link.</t>
          </dd>
          <dt>Single-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a single-technology intra-domain Ethernet link.</t>
          </dd>
          <dt>Multi-technology intra-domain IP link:</dt>
          <dd>
            <t>An IP link supported by a multi-technology intra-domain Ethernet link.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="reference-network">
      <name>Reference Network Architecture</name>
      <t>This document analyses several deployment scenarios for Packet and
Optical Integration (POI) in which ACTN hierarchy is deployed to
control a multi-technology and multi-domain network with two optical
domains and two packet domains, as shown in <xref target="fig-ref-network"/>:</t>
      <figure anchor="fig-ref-network">
        <name>Reference Network</name>
        <artwork type="ascii-art"><![CDATA[
                              +----------+
                              |   MDSC   |
                              +-----+----+
                                    |
                  +-----------+-----+------+-----------+
                  |           |            |           |
             +----+----+ +----+----+  +----+----+ +----+----+
             | P-PNC 1 | | O-PNC 1 |  | O-PNC 2 | | P-PNC 2 |
             +----+----+ +----+----+  +----+----+ +----+----+
                  |           |            |           |
                  |           \            /           |
        +-------------------+  \          /  +-------------------+
   CE1 / PE1             BR1 \  |        /  / BR2             PE2 \ CE2
   o--/---o               o---\-|-------|--/---o               o---\--o
      \   :               :   / |       |  \   :               :   /
       \  : PKT domain 1  :  /  |       |   \  : PKT domain 2  :  /
        +-:---------------:-+   |       |    +-:---------------:--+
          :               :     |       |      :               :
          :               :     |       |      :               :
        +-:---------------:------+     +-------:---------------:--+
       /  :               :       \   /        :               :   \
      /   o...............o        \ /         o...............o    \
      \     optical domain 1       / \       optical domain 2       /
       \                          /   \                            /
        +------------------------+     +--------------------------+
]]></artwork>
      </figure>
      <t>The ACTN architecture, defined in <xref target="RFC8453"/>, is used to control this
multi-technology and multi-domain network where each Packet PNC (P-PNC) is
responsible for controlling its packet domain and where each Optical
PNC (O-PNC) in the above topology is responsible for controlling its
optical domain. The packet domains controlled by the P-PNCs can be
Autonomous Systems (ASes), defined in <xref target="RFC1930"/>, or IGP areas, within
the same operator network.</t>
      <t>The IP routers between the packet domains can be either AS Boundary
Routers (ASBR) or Area Border Router (ABR): in this document, the
generic term Border Router (BR) is used to represent either an ASBR
or an ABR.</t>
      <t>The MDSC is responsible for coordinating the whole multi-domain
multi-technology (packet and optical) network. A specific standard
interface (MPI) permits MDSC to interact with the different
Provisioning Network Controller (O/P-PNCs).</t>
      <t>The MPI interface presents an abstracted topology to MDSC, hiding
technology-specific aspects of the network and hiding topology
details depending on the policy chosen regarding the level of
abstraction supported. The level of abstraction can be obtained based
on P-PNC and O-PNC configuration parameters (e.g., provide the
potential connectivity between any PE and any BR in a packet
network).</t>
      <t>In the reference network of <xref target="fig-ref-network"/>, it is assumed that:</t>
      <ul spacing="normal">
        <li>
          <t>The domain boundaries between the packet and optical domains are
congruent. In other words, one optical domain supports
connectivity between IP routers in one and only one packet domain;</t>
        </li>
        <li>
          <t>There are no inter-domain physical links between optical domains.
Inter-domain physical links exist only:  </t>
          <ul spacing="normal">
            <li>
              <t>between packet domains (i.e., between BRs belonging to
different packet domains): these links are called inter-domain
Ethernet or IP links within this document;</t>
            </li>
            <li>
              <t>between packet and optical domains (i.e., between routers and
optical nodes): these links are called cross-technology Ethernet links within
this document;</t>
            </li>
            <li>
              <t>between customer sites and the packet network (i.e., between
CE devices and PE routers): these links are called access
links within this document.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>All the physical interfaces at inter-domain links are Ethernet
physical interfaces.</t>
        </li>
      </ul>
      <t>Although the new optical technologies (e.g., QSFP-DD ZR 400G) allow
the operators to provide DWDM pluggable interfaces on the IP routers,
the deployment of those pluggable optics is not yet widely adopted.
The reason is that most operators are not yet ready to manage packet
and optical networks in a single unified domain. Therefore, a unified
use case analysis is outside the scope of this document.</t>
      <t>This document analyses scenarios where all the multi-technology IP links,
supported by the optical network, are intra-domain (intra-AS/intra-area), such as PE-BR, PE-P, BR-P, P-P IP links. Therefore the inter-domain IP links are always single-technology links supported by single-technology Ethernet
links between physically adjacent IP routers.</t>
      <t>Therefore, if inter-domain links between the optical domains exist,
they would be used to support multi-domain optical services, which
are outside the scope of this document.</t>
      <t>The optical nodes within the optical domains can be either:</t>
      <ul spacing="normal">
        <li>
          <t>WDM nodes, as defined in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, with an integrated ROADM functions and with or without integrated optical transponders;</t>
        </li>
        <li>
          <t>OTN nodes, with integrated an OTN cross-connect function and with or without integrated ROADM functions or optical transponders.</t>
        </li>
      </ul>
      <section anchor="mdsc-overview">
        <name>Multi-domain Service Coordinator (MDSC) functions</name>
        <t>The MDSC in <xref target="fig-ref-network"/> is responsible for multi-domain and multi-technology
coordination across multiple packet and optical domains and provides
multi-layer/multi-domain L2/L3 VPN network services requested by an
OSS/Orchestration layer.</t>
        <t>From an implementation perspective, the functions associated with
MDSC described in <xref target="RFC8453"/> may be grouped differently.</t>
        <ol spacing="normal" type="1"><li>
            <t>The service- and network-related functions are collapsed into a
single, monolithic implementation, dealing with the end customer
service requests received from the CMI (Customer MDSC Interface)
and adapting the relevant network models. An example is represented
in Figure 2 of <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>An implementation can choose to split the service-related and the
network-related functions into different functional entities, as
described in <xref target="RFC8309"/> and in section 4.2 of <xref target="RFC8453"/>. In this
case, MDSC is decomposed into a top-level Service Orchestrator,
interfacing the customer via the CMI, and into a Network
Orchestrator interfacing at the southbound with the PNCs. The
interface between the Service Orchestrator and the Network
Orchestrator is not specified in <xref target="RFC8453"/>.</t>
          </li>
          <li>
            <t>Another implementation can choose to split the MDSC functions
between an "higher-level MDSC" (MDSC-H) responsible for packet and
optical multi-technology coordination, interfacing with one Optical
"lower-level MDSC" (MDSC-L), providing multi-domain coordination
between the O-PNCs and one Packet MDSC-L, providing multi-domain
coordination between the P-PNCs (see for example Figure 9 of
<xref target="RFC8453"/>).</t>
          </li>
          <li>
            <t>Another implementation can also choose to combine the MDSC and the
P-PNC functions.</t>
          </li>
        </ol>
        <t>In the current service provider's network deployments, at the North
Bound of the MDSC, instead of a CNC, typically, there is an
OSS/Orchestration layer. In this case, the MDSC would implement only
the Network Orchestration functions, as in <xref target="RFC8309"/> described in
point 2 above. Therefore, the MDSC deals with the network services
requests received from the OSS/Orchestration layer.</t>
        <t>The functionality of the OSS/Orchestration layer and the interface
toward the MDSC are usually operator-specific and outside the scope
of this draft. Therefore, this document assumes that the
OSS/Orchestrator requests the MDSC to set up L2/L3 VPN network
services through mechanisms outside this document's scope.</t>
        <t>There are two prominent workflow cases when the MDSC multi-technology
coordination is initiated:</t>
        <ul spacing="normal">
          <li>
            <t>Initiated by request from the OSS/Orchestration layer to setup
L2/L3 VPN network services that require multi-layer/multi-domain
coordination;</t>
          </li>
          <li>
            <t>The MDSC initiates them to perform multi-layer/multi-domain
optimizations and/or maintenance activities (e.g. rerouting LSPs
with their associated services when putting a resource, like a
fibre, in maintenance mode during a maintenance window).
Unlike service fulfillment, these workflows are not related to a
network service provisioning request received from
the OSS/Orchestration layer.</t>
          </li>
        </ul>
        <t>The latter workflow cases are outside the scope of this document.</t>
        <t>This document analyses the use cases where multi-layer coordination
is triggered by a network service request received from the
OSS/Orchestration layer.</t>
        <section anchor="vpn-overview">
          <name>Multi-domain L2/L3 VPN Network Services</name>
          <t><xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> provide an example of a hub &amp; spoke multi-domain L2/L3 VPN with three PEs where the hub PE (PE13) and one spoke
PE (PE14) are within the same packet domain, and the other spoke PE
(PE23) is within a different packet domain.</t>
          <figure anchor="fig-vpn-topo">
            <name>Multi-domain VPN topology example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            __________________
     ( |                         )         (                  )
    (  | PE13     P15       BR11  )       (  BR21       P24     )
   (   |____         ___       ____ )      ( ____      ___       )
  (    /    \ _ _ _ /   \ _ _ /    \________/    \    /   \     )
 (     \____/       \___/     \___ /        \____/    \_ _/     )
(   PE14  :\_ _               /      )  (    /  :      : \__     )
(    ____  :   \__ P16    ___/      )  (  __/_             _\__  )
 (  /    \  :  /   \- - -/    \__________/    \ :_ _ _ :_ /    \  )
 (  \____/     \___/     \____/     )  ( \____/           \____/ )
   (  / :   :    :         :  BR12  )   (   :    :     :     |  )
    (/                              )   ( BR22           PE23|   )
 ------ :   :    :         :       )      ( :     :    :     |  )
| CE14 | (__ ____ _________ _____)           (_____ ___ _ ------
 ------ :   :    :         :                :      :   : | CE23 |
                                                          ------
        :   :    :         :                :      :   :
       _ ___ ____ _________ ________         ______ ___ _______
      ( :   :    :         :        )       :      :   :       )
     (      ____  :      ____        )     (      ____  .. ..   )
    (   :  /    \_ _ _ _/    \ NE12   )   ( :    /    \ _    :   )
   (  NE11 \____/ :     \____/         )  ( NE21 \____/   \     )
   (    :  /    \    _ _ /  \          )  ( :     /        \ :   )
   (   ___/      \:_|        \____    )  (   .___/         _\__  )
   (  /    \_ _ /    \ _ _ _ /    \   )  (   /    \ _ _ _ /    \  )
    ( \____/    \____/       \____/  )    (  \____/       \____/  )
     ( NE13      NE14         NE15   )     (  NE22         NE23  )
      (_____________________________)       (___________________)

             Optical Domain 1                  Optical Domain 2


       _____  = Inter-domain links
       .. ..  = Cross-layer links
       _ _ _  = Intra-domain links
]]></artwork>
          </figure>
          <figure anchor="fig-vpn-path">
            <name>Multi-domain VPN TE paths example</name>
            <artwork type="ascii-art"><![CDATA[
     ------
    | CE13 |    Packet Domain 1              Packet Domain 2
     ------ ____________________            _________________
     ( |                         )         (                 )
    (  | PE13     P15       BR11  )       (  BR21       P24    )
   (   |____         ___       ____ )      ( ____     ___       )
  (    / H  \       /   \     /    \________/..  \   / ..\ ..  )
 (     \____/.....  \___/     \___ / .. .. ..___:/   \___/   : )
(   PE14  :      :              .. .. )  (             :        )
(    ____  :    _:_ P16   ____ :     )  ( ____  :          __:_ )
 (  / S  \  :  / ..\     /   ..__________/    \        :  /  S \ )
 (  \____/     \__:/     \____/     )  ( \____/ :         \____/ )
   (  / :   :     :          :BR12  )   (              :     |  )
    (/  :         :                 )   ( BR22  :        PE23|   )
 ------ :   :     :          :     )      (            :     | )
| CE14 |:(__ _____:__________ ___)           (__:______ __ ------
 ------ :   :      :         :                         :  | CE23 |
        :           :                           :          ------
        :   :       :        :                         :
       _:___________:________ ______         ___:______ _______
      ( :   :       :        :      )       (          : .. .. )
     (  :   ____    :    ____        )     (     :____          )
    (   :  / .. \.. : ../ .. \ NE12   )   (      /..  \      :   )
   (  NE11 \____/   :   \____/         )  ( NE21 \__:_/          )
   (    :           :                  )  (                  :  )
   (   _:__      ___:         ____    )  (    ____  : ..  ____  )
   (  / :..\..../...:\       /    \   )  (   /    \      /.. :\  )
    ( \____/    \____/       \____/  )    (  \____/      \____/  )
     ( NE13      NE14         NE15   )     (  NE22        NE23  )
      (_____________________________)       (__________________)

             Optical Domain 1                  Optical Domain 2


        H / S = Hub VRF / Spoke VRF

       .....  = Intra-domain TE Path 1 {PE13, P16, NE14, NE13, PE14}
       .. ..  = Inter-domain TE Path 2 {PE13, NE11, NE12, BR12, 
                BR11, BR21, NE21, NE23, P24, PE23}
]]></artwork>
          </figure>
          <t>There are many options to implement multi-domain L2/L3 VPNs,
including:</t>
          <ol spacing="normal" type="1"><li>
              <t>BGP-LU (<xref target="RFC8277"/>)</t>
            </li>
            <li>
              <t>Inter-domain RSVP-TE</t>
            </li>
            <li>
              <t>Inter-domain SR-TE</t>
            </li>
          </ol>
          <t>This document analyses the inter-domain TE options for which the TE
tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, could be used at the MPI for
intra-domain or inter-domain TE configuration. The analysis of other
options is outside the scope of this draft.</t>
          <t>It is also assumed that:</t>
          <ul spacing="normal">
            <li>
              <t>the bandwidth of each intra-domain TE path is managed by its
respective P-PNC;</t>
            </li>
            <li>
              <t>technology-specific mechanisms (in the case of inter-domain SR-TE,
the binding SID) are used for the inter-domain TE path stitching;</t>
            </li>
            <li>
              <t>each packet domain in <xref target="fig-vpn-topo"/> uses technology-specific local protection mechanisms (such as Fast Reroute (FRR) in case of MPLS-TE or Topology Independent Loop-free Alternate Fast Reroute (TI-LFA) in case of SR-TE), with the awareness of multi-technology TE path properties (e.g., SRLG).</t>
            </li>
          </ul>
          <t>In the case of inter-domain TE-paths, it is also assumed that each
packet domain in <xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/> implements the same TE
technology, and the stitching between two domains is done using
inter-domain TE.</t>
          <t>In this scenario, one of the key MDSC functions is to identify the
multi-domain/multi-layer TE paths to be used to carry the L2/L3 VPN
traffic between PEs belonging to different packet domains and to
relay this information to the P-PNCs, to ensure that the PEs'
forwarding tables (e.g., VRF) are properly configured to steer the
L2/L3 VPN traffic over the intended multi-domain/multi-layer TE
paths.</t>
          <t>The selection of the TE path should take into account the TE
requirements and the binding requirements for the L2/L3 VPN network
service.</t>
          <t>In general, the binding requirements for a network service (e.g.,
L2/L3 VPN) can be summarized within three cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>The customer is asking for VPN isolation to dynamically create
and bind tunnels to the service so that they are not shared by
other services (e.g. VPN).  </t>
              <t>
The level of isolation can be different:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>Hard isolation with deterministic latency means L2/L3 VPN
requires a set of dedicated TE Tunnels (neither sharing
with other services nor competing for bandwidth with other
tunnels), providing deterministic latency performances</t>
                </li>
                <li>
                  <t>hard isolation but without deterministic characteristics</t>
                </li>
                <li>
                  <t>Soft isolation means the tunnels associated with L2/L3 VPN
are dedicated to that but can compete for bandwidth with
other tunnels.</t>
                </li>
              </ol>
            </li>
            <li>
              <t>The customer does not ask for isolation and could request a VPN
service where associated tunnels can be shared across multiple
VPNs.</t>
            </li>
          </ol>
          <t>For each TE path required to support the L2/L3 VPN network service,
it is possible that:</t>
          <ol spacing="normal" type="1"><li>
              <t>A TE path that meets the TE and binding requirements already
exists in the network.</t>
            </li>
            <li>
              <t>An existing TE path could be modified (e.g., through bandwidth
increase) to meet the TE and binding requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The TE path characteristics can be modified only in the packet
layer.</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the requested changes of the overlay TE paths (multi-layer coordination is required).</t>
                </li>
              </ol>
            </li>
            <li>
              <t>A new TE path needs to be setup to meet the TE and binding
requirements:  </t>
              <ol spacing="normal" type="a"><li>
                  <t>The new TE path reuses existing underlay optical tunnels;</t>
                </li>
                <li>
                  <t>One or more new underlay optical tunnels need to be setup to
support the setup of the new TE path  (multi-layer
coordination is required).</t>
                </li>
              </ol>
            </li>
          </ol>
          <t>This document analyses scenarios where only one TE path is used to
carry the VPN traffic between PEs. Scenarios, where multiple parallel
TE paths are used in load-balancing to carry the VPN traffic between
PEs, are possible but their analysis is outside the scope of this
document.</t>
        </section>
        <section anchor="path-computation-overview">
          <name>Multi-domain and Multi-layer Path Computation</name>
          <t>When a new TE path needs to be setup, the MDSC is also responsible
for coordinating the multi-layer/multi-domain path computation.</t>
          <t>Depending on the knowledge that MDSC has of the topology and
configuration of the underlying network domains, three approaches for
performing multi-layer/multi-domain path computation are possible:</t>
          <ol spacing="normal" type="1"><li>
              <t>Full Summarization: In this approach, the MDSC has an abstracted
TE topology view of all of its packet and optical, underlying
domains.  </t>
              <t>
In this case, the MDSC does not have enough TE topology
information to perform multi-layer/multi-domain path computation.
Therefore the MDSC delegates the P-PNCs and O-PNCs to perform
local path computation within their respective controlled domains.
Then, it uses the information returned by the P-PNCs and O-PNCs to
compute the optimal multi-domain/multi-layer path.  </t>
              <t>
This approach presents an issue to P-PNC, which does not have the
capability of performing a single-domain/multi-layer path
computation, since it can not retrieve the topology information
from the O-PNCs nor delegate the O-PNC to perform optical path
computation.  </t>
              <t>
A possible solution could include a CNC function within the P-PNC
to request the MDSC multi-domain optical path computation, as
shown in Figure 10 of <xref target="RFC8453"/>.  </t>
              <t>
Another solution could be to rely on the MDSC recursive hierarchy,
as defined in section 4.1 of <xref target="RFC8453"/>, where, for each IP and
optical domain pair, a "lower-level MDSC" (MDSC-L) provides the
essential multi-layer correlation and the "higher-level MDSC"
(MDSC-H) provides the multi-domain coordination.
In this case, the MDSC-H can get an abstract view of the
underlying multi-layer domain topologies from its underlying MDSC-L. Each MDSC-L gets the full view of the IP domain topology from
P-PNC and can get an abstracted view of the optical domain
topology from its underlying O-PNC. In other words, topology
abstraction is possible at the MPIs between MDSC-L and O-PNC and
between MDSC-L and MDSC-H.</t>
            </li>
            <li>
              <t>Partial summarization: In this approach, the MDSC has complete
visibility of the TE topology of the packet network domains and an
abstracted view of the TE topology of the optical network domains.  </t>
              <t>
The MDSC then has only the capability of performing multi-domain/single-layer path computation for the packet layer (the
path can be computed optimally for the two packet domains).  </t>
              <t>
Therefore, the MDSC still needs to delegate the O-PNCs to perform
local path computation within their respective domains. It uses
the information received by the O-PNCs and its TE topology view of
the multi-domain packet layer to perform multi-layer/multi-domain
path computation.</t>
            </li>
            <li>
              <t>Full knowledge: In this approach, the MDSC has a complete and
enough detailed view of the TE topology of all the network domains
(both optical and packet).  </t>
              <t>
In such case MDSC has all the information needed to perform multi-domain/multi-layer path computation, without relying on PNCs.  </t>
              <t>
This approach may present, as a potential drawback, scalability
issues and, as discussed in section 2.2. of <xref target="I-D.ietf-teas-yang-path-computation"/>,
performing path computation for optical networks in the MDSC is
quite challenging because the optimal paths depend also on
vendor-specific optical attributes (which may be different in the
two domains if different vendors provide them).</t>
            </li>
          </ol>
          <t>This document analyses scenarios where the MDSC uses the partial
summarization approach to coordinate multi-domain/multi-layer path
computation.</t>
          <t>Typically, the O-PNCs are responsible for the optical path
computation of services across their respective single domains.
Therefore, when setting up the network service, they must consider
the connection requirements such as bandwidth, amplification,
wavelength continuity, and non-linear impairments that may affect the
network service path.</t>
          <t>The methods and types of path requirements and impairments, such as
those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>, used by the O-PNC for optical path
computation are not exposed at the MPI and therefore out of scope for
this document.</t>
        </section>
      </section>
      <section anchor="packet-pnc-overview">
        <name>IP/MPLS Domain Controller and IP router Functions</name>
        <t>Each packet domain in <xref target="fig-ref-network"/>, corresponding to either an IGP area
or an Autonomous System (AS) within the same operator network, is
controlled by a packet domain controller (P-PNC).</t>
        <t>P-PNCs are responsible for setting up the TE paths between any two
PEs or BRs in their respective controlled domains, as requested by
MDSC,  and providing topology information to the MDSC.</t>
        <t>For example, for inter-domain SR-TE, the setup bidirectional SR-TE
path from PE13 in domain 1 to PE23 in domain 2, as shown in <xref target="fig-vpn-path"/>,
requires the MDSC to coordinate the actions of:</t>
        <ul spacing="normal">
          <li>
            <t>P-PNC1 to push a SID list to PE13 including the Binding SID
associated to the SR-TE path in Domain 2 with PE23 as the target
destination (forward direction);</t>
          </li>
          <li>
            <t>P-PNC2 to push a SID list to PE23, including the Binding SID
associated with the SR-TE path in Domain 1 with PE13 as the target
destination (reverse direction).</t>
          </li>
        </ul>
        <t>With reference to <xref target="fig-p-pnc"/>, P-PNCs are then responsible:</t>
        <ol spacing="normal" type="1"><li>
            <t>To expose to MDSC their respective detailed TE topology</t>
          </li>
          <li>
            <t>To perform single-layer single-domain local TE path computation,
when requested by MDSC between two PEs (for single-domain end-to-end TE path) or between PEs and BRs for an inter-domain TE path
selected by MDSC;</t>
          </li>
          <li>
            <t>To configure the routers in their respective domain to setup a TE
path;</t>
          </li>
          <li>
            <t>To configure the VRF and PE-CE interfaces (Service access points)
of the intra-domain and inter-domain network services requested by
the MDSC.</t>
          </li>
        </ol>
        <figure anchor="fig-p-pnc">
          <name>Domain Controller &amp; node Functions</name>
          <artwork type="ascii-art"><![CDATA[
          +------------------+            +------------------+
          |                  |            |                  |
          |      P-PNC1      |            |      P-PNC2      |
          |                  |            |                  |
          +--|-----------|---+            +--|-----------|---+
             | 1.TE      | 2.VPN             | 1.TE      | 2.VPN
             | Path      | Provisioning      | Path      | Provisioning
             | Config    |                   | Config    |
             V           V                   V           V
           +---------------------+         +---------------------+
      CE  / PE     TE path 1    BR\       / BR     TE path 2   PE \  CE
      o--/---o..................o--\-----/--o..................o---\--o
         \                         /     \                         /
          \        Domain 1       /       \       Domain 2        /
           +---------------------+         +---------------------+

                              End-to-end TE path
             <------------------------------------------------->
]]></artwork>
        </figure>
        <t>When requesting the setup of a new TE path, the MDSC provides the P-PNCs with the explicit path to be created or modified. In other
words, the MDSC can communicate to the P-PNCs the complete list of
nodes involved in the path (strict mode). In this case, the P-PNC is
just responsible to set up that explicit TE path. For example:</t>
        <ul spacing="normal">
          <li>
            <t>with SR-TE, the P-PNC pushes to headend PE or BR the list of SIDs
to create the explicit SR-TE path, provided by the MDSC;</t>
          </li>
          <li>
            <t>with RSVP-TE, the P-PNC requests the headend PE or BR to start
signaling the explicit RSVP-TE path, provided by the MDSC.</t>
          </li>
        </ul>
        <t>To scale in large SR-TE packet domains, the MDSC can provide P-PNC a
loose path, together with per-domain TE constraints. The P-PNC can
then select the complete path within its domain.</t>
        <t>In such a case, it is mandatory that P-PNC signals back to the MDSC
which path it has chosen so that the MDSC keeps track of the relevant
resources utilization.</t>
        <t>From the <xref target="fig-vpn-path"/> example, the TE path requested by the MDSC touches
PE13 - P16 - BR12 - BR21 - PE23. P-PNC2 is aware of two paths with
the same topology metric, e.g. BR21 - P24 - PE23 and BR21 - BR22 - PE23, but with different loads. It may prefer to steer the traffic on
the latter because it is less loaded.</t>
        <t>For the purposes of this document it is assumed that the MDSC always
provides the explicit list of all the hops to the P-PNCs to setup or
modify the TE path.</t>
      </section>
      <section anchor="optical-pnc-overview">
        <name>Optical Domain Controller and NE Functions</name>
        <t>The optical network provides underlay connectivity services to
IP/MPLS networks. The packet and optical multi-layer coordination is
done by the MDSC, as shown in <xref target="fig-ref-network"/>.</t>
        <t>The O-PNC is responsible to:</t>
        <ul spacing="normal">
          <li>
            <t>provide to the MDSC an abstract TE topology view of its underlying
optical network resources;</t>
          </li>
          <li>
            <t>perform single-domain local path computation, when requested by
the MDSC;</t>
          </li>
          <li>
            <t>perform optical tunnel setup, when requested by the MDSC.</t>
          </li>
        </ul>
        <t>The mechanisms used by O-PNC to perform intra-domain topology
discovery and path setup are usually vendor-specific and outside the
scope of this document.</t>
        <t>Depending on the type of optical network, TE topology abstraction,
path computation and path setup can be single-layer (either OTN or
WDM) or multi-layer OTN/WDM. In the latter case, the multi-layer
coordination between the OTN and WDM layers is performed by the
O-PNC.</t>
      </section>
    </section>
    <section anchor="mpi">
      <name>Interface Protocols and YANG Data Models for the MPIs</name>
      <t>This section describes general assumptions applicable to all the MPI
interfaces, between each PNC (Optical or Packet) and the MDSC, to
support the scenarios discussed in this document.</t>
      <section anchor="restconf">
        <name>RESTCONF Protocol at the MPIs</name>
        <t>The RESTCONF protocol, as defined in <xref target="RFC8040"/>, using the JSON
representation defined in <xref target="RFC7951"/>, is assumed to be used at these
interfaces. In addition, extensions to RESTCONF, as defined in
<xref target="RFC8527"/>, to be compliant with Network Management Datastore
Architecture (NMDA) defined in <xref target="RFC8342"/>, are assumed to be used as
well at these MPI interfaces and also at MDSC NBI interfaces.</t>
      </section>
      <section anchor="yang">
        <name>YANG Data Models at the MPIs</name>
        <t>The data models used on these interfaces are assumed to use the YANG
1.1 Data Modeling Language, as defined in <xref target="RFC7950"/>.</t>
        <t>This section describes the YANG data models that are applicable to
the Packet and Optical MPIs. Some of these YANG data models can be
optional depending on the specific network configuration detailed
in <xref target="discovery"/> and <xref target="config"/>.</t>
        <section anchor="common-yang">
          <name>Common YANG Data Models at the MPIs</name>
          <t>As required in <xref target="RFC8040"/>, the "ietf-yang-library" YANG module defined
in <xref target="RFC8525"/> is used to allow the MDSC to discover the set of YANG
modules supported by each PNC at its MPI.</t>
          <t>Both Optical and Packet PNCs can use the following common topology
YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>The Base Network Model, defined in the "ietf-network" YANG module
of <xref target="RFC8345"/>;</t>
            </li>
            <li>
              <t>The Base Network Topology Model, defined in the "ietf-network-topology" YANG module of <xref target="RFC8345"/>, which augments the Base Network Model;</t>
            </li>
            <li>
              <t>The TE Topology Model, defined in the "ietf-te-topology" YANG
module of <xref target="RFC8795"/>, which augments the Base Network Topology
Model.</t>
            </li>
          </ul>
          <t>Optical and Packet PNCs can use the common TE Tunnel Model, defined
in the "ietf-te" YANG module of <xref target="I-D.ietf-teas-yang-te"/>, at the MPI.</t>
          <t>All the common YANG data models are generic and augmented by
technology-specific YANG modules, as described in the following
sections.</t>
          <t>Both Optical and Packet PNCs can also use the Ethernet Topology
Model, defined in the "ietf-eth-te-topology" YANG module of <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>,
which augments the TE Topology Model with Ethernet technology-specific information.</t>
          <t>Both Optical and Packet PNCs can use the following common
notifications YANG data models at the MPI:</t>
          <ul spacing="normal">
            <li>
              <t>Dynamic Subscription to YANG Events and Datastores over RESTCONF
as defined in <xref target="RFC8650"/>;</t>
            </li>
            <li>
              <t>Subscription to YANG Notifications for Datastores updates as
defined in <xref target="RFC8641"/>.</t>
            </li>
          </ul>
          <t>PNCs and MDSCs comply with subscription requirements as stated in
<xref target="RFC7923"/>.</t>
        </section>
        <section anchor="optical-yang">
          <name>YANG models at the Optical MPIs</name>
          <t>The Optical PNC can use the following technology-specific topology
YANG data models, which augment the generic TE Topology Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WSON Topology Model, defined in the "ietf-wson-topology" YANG
module of <xref target="RFC9094"/>;</t>
            </li>
            <li>
              <t>the Flexi-grid Topology Model, defined in the "ietf-flexi-grid-topology" YANG module of <xref target="I-D.ietf-ccamp-flexigrid-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Topology Model, as defined in the "ietf-otn-topology" YANG
module of <xref target="I-D.ietf-ccamp-otn-topo-yang"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The WDM Tunnel Model, defined in the "ietf-wdm-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-wdm-tunnel-yang"/>;</t>
            </li>
            <li>
              <t>the OTN Tunnel Model, defined in the "ietf-otn-tunnel" YANG module
of <xref target="I-D.ietf-ccamp-otn-tunnel-model"/>.</t>
            </li>
          </ul>
          <t>The optical PNC can use the generic Path Computation YANG RPC,
defined in the "ietf-te-path-computation" YANG module of
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          <t>Note that technology-specific augmentations of the generic path
computation RPC for WSON, Flexi-grid and OTN path computation RPCs
have been identified as a gap.</t>
          <t>The optical PNC uses can use the following client signal YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>the CBR Client Signal Model, defined in the "ietf-trans-client-service" YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>;</t>
            </li>
            <li>
              <t>the Ethernet Client Signal Model, defined in the "ietf-eth-tran-service" YANG module of <xref target="I-D.ietf-ccamp-client-signal-yang"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="packet-yang">
          <name>YANG data models at the Packet MPIs</name>
          <t>The Packet PNC can use the following technology-specific topology
YANG data models:</t>
          <ul spacing="normal">
            <li>
              <t>The L3 Topology Model, defined in the "ietf-l3-unicast-topology"
YANG module of <xref target="RFC8346"/>, which augments the Base Network Topology
Model;</t>
            </li>
            <li>
              <t>the Packet TE Topology Mode, defined in the "ietf-te-topology-packet" YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, which augments the generic TE
Topology Model;</t>
            </li>
            <li>
              <t>The MPLS-TE Topology Model, defined in the "ietf-te-mpls-topology"
YANG module of <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>, which augments the TE Packet
Topology Model with or without the L3 TE Topology Model, defined
in "ietf-l3-te-topology" YANG module of <xref target="I-D.ietf-teas-yang-l3-te-topo"/>;</t>
            </li>
            <li>
              <t>the SR Topology Model, defined in the "ietf-sr-mpls-topology" YANG
module of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
            </li>
          </ul>
          <t>The Packet PNC can use the following technology-specific tunnel YANG
data models, which augments the generic TE Tunnel Model:</t>
          <ul spacing="normal">
            <li>
              <t>The MPLS-TE Tunnel Model, defined in the "ietf-te-mpls" YANG
modules of <xref target="I-D.ietf-teas-yang-te-mpls"/>;</t>
            </li>
            <li>
              <t>the SR-TE Tunnel Model which is to be defined as described in
<xref target="conclusions"/>.</t>
            </li>
          </ul>
          <t>The packet PNC can use the following network service YANG data
models:</t>
          <ul spacing="normal">
            <li>
              <t>L3VPN Network Model (L3NM), defined in the "ietf-l3vpn-ntw" YANG
module of <xref target="RFC9182"/>;</t>
            </li>
            <li>
              <t>L3NM TE Service Mapping, defined in the "ietf-l3nm-te-service-mapping" YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>;</t>
            </li>
            <li>
              <t>L2VPN Network Model (L2NM), defined in the "ietf-l2vpn-ntw" YANG
module of <xref target="RFC9291"/>;</t>
            </li>
            <li>
              <t>L2NM TE Service Mapping, defined in the "ietf-l2nm-te-service-mapping" YANG module of <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="pcep">
        <name>Path Computation Element Protocol (PCEP)</name>
        <t><xref target="RFC8637"/> examines the applicability of a Path Computation Element
(PCE) <xref target="RFC5440"/> and PCE Communication Protocol (PCEP) to the ACTN
framework. It further describes how the PCE architecture applies to
ACTN and lists the PCEP extensions needed to use PCEP as an ACTN
interface.  The stateful PCE <xref target="RFC8231"/>, PCE-Initiation <xref target="RFC8281"/>,
stateful Hierarchical PCE (H-PCE) <xref target="RFC8751"/>, and PCE as a central
controller (PCECC) <xref target="RFC8283"/> are some of the key extensions that
enable the use of PCE/PCEP for ACTN.</t>
        <t>Since the PCEP supports path computation in the packet and optical
networks, PCEP is well suited for inter-layer path computation.
<xref target="RFC5623"/> describes a framework for applying the PCE-based
architecture to interlayer (G)MPLS traffic engineering. Furthermore,
section 6.1 of <xref target="RFC8751"/> states the H-PCE applicability for inter-layer or POI.</t>
        <t><xref target="RFC8637"/> lists various PCEP extensions that apply to ACTN. It also
lists the PCEP extension for the optical network and POI.</t>
        <t>Note that the PCEP can be used in conjunction with the YANG data
models described in the rest of this document. Depending on whether
ACTN is deployed in a greenfield or brownfield, two options are
possible:</t>
        <ol spacing="normal" type="1"><li>
            <t>The MDSC uses a single RESTCONF/YANG interface towards each PNC to
discover all the TE information and request TE tunnels. It may
perform full multi-layer path computation or delegate path
computation to the underneath PNCs.  </t>
            <t>
This approach is desirable for operators from a multi-vendor
integration perspective as it is simple. We need only one type of
interface (RESTCONF) and use the relevant YANG data models
depending on the operator use case considered. The benefits of
having only one protocol for the MPI between MDSC and PNC have
already been highlighted in <xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
          </li>
          <li>
            <t>The MDSC uses the RESTCONF/YANG interface towards each PNC to
discover all the TE information and requests the creation of TE
tunnels. However, it uses PCEP for hierarchical path computation.  </t>
            <t>
As mentioned in Option 1, from an operator perspective, this
option can add integration complexity to have two protocols
instead of one unless the RESTCONF/YANG interface is added to an
existing PCEP deployment (brownfield scenario).</t>
          </li>
        </ol>
        <t><xref target="discovery"/> and <xref target="config"/> of this draft analyze the case where a single
RESTCONF/YANG interface is deployed at the MPI (i.e., option 1
above).</t>
      </section>
    </section>
    <section anchor="discovery">
      <name>Inventory, Service and Network Topology Discovery</name>
      <t>In this scenario, the MSDC needs to discover through the underlying
PNCs:</t>
      <ul spacing="normal">
        <li>
          <t>the network topology, at both optical and IP layers, in terms of
nodes and links, including the access links, inter-domain IP links
as well as cross-technology Ethernet links;</t>
        </li>
        <li>
          <t>the optical tunnels supporting multi-technology intra-domain IP links;</t>
        </li>
        <li>
          <t>both intra-domain and inter-domain L2/L3 VPN network services
deployed within the network;</t>
        </li>
        <li>
          <t>the TE paths supporting those L2/L3 VPN network services;</t>
        </li>
        <li>
          <t>the hardware inventory information of IP and optical equipment.</t>
        </li>
      </ul>
      <t>The O-PNC and P-PNC could discover and report the hardware network
inventory information of their equipment used by the different
management layers. In the context of POI, the inventory information
of IP and optical equipment can complement the topology views and
facilitate the packet/optical multi-layer view, e.g., by providing a
mapping between the lowest level LTPs in the topology view and
corresponding ports in the network inventory view.</t>
      <t>The MDSC could also discover the entire network inventory information
of both IP and optical equipment and correlate this information with
the links reported in the network topology.</t>
      <t>Reporting the entire inventory and detailed topology information of
packet and optical networks to the MDSC may present scalability
issues as a potential drawback. The analysis of the scalability of
this approach and mechanisms to address potential issues is outside
the scope of this document.</t>
      <t>Each PNC provides the MDSC the topology view of the domain it
controls, as described in <xref target="optical-topology-discovery"/> and <xref target="packet-topology-discovery"/>. The MDSC uses this
information to discover the complete topology view of the multi-layer
multi-domain networks it controls.</t>
      <t>The MDSC should also maintain up-to-date inventory, service and
network topology databases of IP and optical layers through IETF
notifications through MPI with the PNCs when any network
inventory/topology/service change occurs.</t>
      <t>It should also be possible to correlate information from IP and
optical layers (e.g., which port, lambda/OTSi, and direction are used
by a specific IP service on the WDM equipment).</t>
      <t>In particular, for the cross-technology Ethernet links, it is key for MDSC to
automatically correlate the information from the PNC network
databases about the physical ports from the routers (single link or
bundle links for LAG) to client ports in the ROADM.</t>
      <t>The analysis of multi-layer fault management is outside the scope of
this document. However, the discovered information should be
sufficient for the MDSC to correlate optical and IP layers alarms to
speed-up troubleshooting easily.</t>
      <t>Alarms and event notifications are required between MDSC and PNCs so
that any network changes are reported almost in real-time to the MDSC
(e.g., node or link failure). As specified in <xref target="RFC7923"/>, MDSC must
subscribe to specific objects from PNC YANG datastores for
notifications.</t>
      <section anchor="optical-topology-discovery">
        <name>Optical Topology Discovery</name>
        <t>The WSON Topology Model and the Flexi-grid Topology model can be used
to report the DWDM network topology (e.g., WDM nodes and OMS links),
depending on whether the DWDM optical network is based on fixed-grid
or flexible-grid or a mix of fixed-grid and flexible-grid.</t>
        <t>It is worth noting that, as described in Appendix I of <xref target="ITU-T_G.694.1"/>,
a fixed-grid can also be described as a flexible grid
with constraints: for example a 50GHz fixed-grid can be described as
a flexible-grid which supports only m=4 and values of n which are
only multiplier of 8.</t>
        <t>As a consequence:</t>
        <ul spacing="normal">
          <li>
            <t>A flexible-grid DWDM network topology can only be reported using
the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A fixed-grid DWDM network topology, can be reported using either
the WSON Topology model or the Flexi-grid Topology model;</t>
          </li>
          <li>
            <t>A mixed fixed and flexible grid DWDM network topology can be
reported using either the Flexi-grid Topology model or both WSON
and Flexi-grid topology models.</t>
          </li>
        </ul>
        <t>Clarifying how both WSON and Flexi-grid topology models could be used
together (e.g., through multi-inheritance as described in <xref target="I-D.ietf-teas-te-topology-profiles"/>)
has been identified as a gap.</t>
        <t>The OTN Topology Model is used to report the OTN network topology
(e.g., OTN switching nodes and links), when the OTN switching layer
is deployed within the optical domain.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain network topology and to correlate it with the hardware
inventory information, the O-PNCs report an abstract optical network
topology where:</t>
        <ul spacing="normal">
          <li>
            <t>one TE node is reported for each optical node deployed within the
optical network domain; and</t>
          </li>
          <li>
            <t>one TE link is reported for each OMS link and, optionally, for
each OTN link.</t>
          </li>
        </ul>
        <t>Since the MDSC delegates optical path computation to its underlay O-PNCs, the following information can be abstracted and not reported at
the MPI:</t>
        <ul spacing="normal">
          <li>
            <t>the optical parameters required for optical path computation, such
as those detailed in <xref target="I-D.ietf-ccamp-optical-impairment-topology-yang"/>;</t>
          </li>
          <li>
            <t>the underlay OTS links and ILAs of OMS links;</t>
          </li>
          <li>
            <t>the physical connectivity between the optical transponders and the
ROADMs.</t>
          </li>
        </ul>
        <t>The OTN Topology Model also reports the CBR client LTPs that
terminates the cross-technology Ethernet links: once CBR client LTP is reported for
each CBR or multi-function client interface on the optical nodes (see
sections 4.4 and 5.1 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/> for the description of multi-function
client interfaces).</t>
        <t>The Ethernet Topology Model reports the Ethernet client LTPs that
terminate the cross-technology Ethernet links: one Ethernet client LTP is reported
for each Ethernet or multi-function client interface on the optical
nodes.</t>
        <t>The optical transponders and, optionally, the OTN access cards, are
abstracted at MPI by the O-PNC as Trail Termination Points (TTPs),
defined in <xref target="RFC8795"/>, within the optical network topology. This
abstraction is valid independently of the fact that optical
transponders are physically integrated within the same WDM node or
are physically located on a device external to the WDM node since it
both cases the optical transponders and the WDM node are under the
control of the same O-PNC and abstracted as a single WDM TE Node at the O-MPI.</t>
        <t>The association between the Ethernet or CBR client LTPs terminating
the Ethernet cross-technology Ethernet links and the optical TTPs is reported using
the Inter Layer Lock-id (ILL) identifiers, defined in <xref target="RFC8795"/>.</t>
        <t>For example, with a reference to <xref target="fig-optical-topo"/>, the ILL values X and Y are
used to associated the client LTPs (7-0) in NE11 and (8-0) in NE12
with the corresponding optical TTPs (7) in NE11 and (8) in NE12,
respectively.</t>
        <figure anchor="fig-optical-topo">
          <name>Multi-layer optical topology discovery</name>
          <artwork type="ascii-art"><![CDATA[
         +----------------------------------------------------------+
        /                                                          /
       /            <X>                      <Y>                  /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC 1)        /
+-----------------------------------------------------------+
                             
                             
                             
         +----------------------------------------------------------+
        /    <X> (7)                            (8) <Y>            /
       /         ---                            ---               /
      /    +-----\ /-----+                +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |             |                |             |      /
   /       |    NE11     |                |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
<   > Inter-Layer Lock-id reported by the PNC
]]></artwork>
        </figure>
        <t>The intra-domain optical links are discovered by O-PNCs, using
mechanisms which are outside the scope of this document, and reported
at the MPIs within the optical network topology.</t>
        <t>In case of a multi-layer DWDM/OTN network domain, multi-layer intra-domain OTN links are supported by underlay WDM tunnels: this
relationship is reported by the mechanisms described in <xref target="optical-path-discovery"/>.</t>
      </section>
      <section anchor="optical-path-discovery">
        <name>Optical Path Discovery</name>
        <t>The WDM Tunnel Model is used to report all the WDM tunnels
established within the optical network.</t>
        <t>When the OTN switching layer is deployed within the optical domain,
the OTN Tunnel Model is used to report all the OTN tunnels
established within the optical network.</t>
        <t>The Ethernet client signal model and the Transparent CBR client
signal model are used to report all the connectivity services
provided by the underlay optical tunnels between Ethernet or CBR
client LTPs, depending on whether the connectivity service is frame-based or transparent. The underlay optical tunnels can be either WDM
tunnels or, when the optional OTN switching layer is deployed, OTN
tunnels.</t>
        <t>The WDM tunnels can be used to support either Ethernet or CBR client
signals or multi-layer intra-domain OTN links. In the latter case,
the hierarchical-link container, defined in <xref target="I-D.ietf-teas-yang-te"/>, associates
the underlay WDM tunnel with the supported multi-layer intra-domain
OTN link and it allows discovery of the multi-layer path supporting
all the connectivity services provided by the optical network.</t>
        <t>The O-PNCs report in their operational datastores all the Ethernet
and CBR client connectivities and all the optical tunnels deployed
within their optical domain regardless of the mechanisms being used to
set them up, such as the mechanisms described in <xref target="multi-technology-link-setup"/>, as well
as other mechanism (e.g., static configuration), which are outside
the scope of this document.</t>
      </section>
      <section anchor="packet-topology-discovery">
        <name>Packet Topology Discovery</name>
        <t>The L3 Topology Model is used report the IP network topology.</t>
        <t>The L3 Topology Model, SR Topology Model, TE Topology Model and the
TE Packet Topology Model are used together to report the SR-TE
network topology, as described in Figure 2 of <xref target="I-D.ietf-teas-yang-sr-te-topo"/>.</t>
        <t>The TE Topology Model, TE Packet Topology Model and MPLS-TE Topology
Model are used together to report the MPLS-TE network topology, as
described in <xref target="I-D.ietf-teas-yang-te-mpls-topology"/>.</t>
        <t>As described in <xref target="I-D.ietf-teas-yang-l3-te-topo"/>, the relationship between the IP network
topology and the MPLS-TE network topology depends on whether the two
network topologies are congruent or not: in the latter case, the L3
TE Topology Model is used, together with the L3 Topology Model to
provide the association between the two network topologies.</t>
        <t>To allow the MDSC to discover the complete multi-layer and multi-domain network topology and to correlate it with the hardware
inventory information as well as to perform multi-domain TE path
computation, the P-PNCs report the full packet network, including all
the information that the MDSC requires to perform TE path
computation. In particular, one TE node is reported for each IP router
and one TE link is reported for each intra-domain IP link. The packet
topology also reports the IP LTPs terminating the inter-domain IP
links.</t>
        <t>The Ethernet Topology Model is used to report the intra-domain
Ethernet links supporting the intra-domain IP links as well as the
Ethernet LTPs that might terminate cross-technology Ethernet links, inter-domain
Ethernet links or access links, as described in detail in <xref target="inter-domain-link-discovery"/>
and in <xref target="multi-technology-link-discovery"/>.</t>
        <t>All the intra-domain Ethernet and IP links are discovered by the
P-PNCs, using mechanisms, such as LLDP <xref target="IEEE_802.1AB"/>, which are
outside the scope of this document, and reported at the MPIs within
the Ethernet or the packet network topology.</t>
      </section>
      <section anchor="te-path-discovery">
        <name>TE Path Discovery</name>
        <t>We assume that the discovery of existing TE paths, including their
bandwidth, at the MPI is done using the generic TE tunnel YANG data
model, defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific (e.g.,
MPLS-TE or SR-TE) augmentations.</t>
        <t>Note that technology-specific augmentations of the generic path TE
tunnel model for SR-TE path setup and discovery is outlined in
section 1 of <xref target="I-D.ietf-teas-yang-te"/> but are currently identified as a gap in
<xref target="conclusions"/>.</t>
        <t>To enable MDSC to discover the full end-to-end TE path configuration,
the technology-specific augmentation of the <xref target="I-D.ietf-teas-yang-te"/> should allow
the P-PNC to report the TE path within its domain (e.g., the SID list
assigned to an SR-TE path).</t>
        <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/>, the TE path 1 in one
direction (PE13-P16-PE14) and the TE path in the reverse direction
(between PE14 and PE13) should be reported by the P-PNC1 to the MDSC
as TE primary and primary-reverse paths of the same TE tunnel
instance. The bandwidth of these TE paths represents the bandwidth
allocated by P-PNC1 to the two TE paths, which can be symmetric or
asymmetric in the two directions.</t>
        <t>The P-PNCs use the TE tunnel model to report, at the MPI, all the TE
paths established within their packet domain regardless of the
mechanism being used to set them up; i.e., independently on whether
the mechanisms described in <xref target="te-path-config"/> or other means, such as
static configuration, which are outside the scope of this document,
are used.</t>
      </section>
      <section anchor="inter-domain-link-discovery">
        <name>Inter-domain Link Discovery</name>
        <t>In the reference network of <xref target="fig-ref-network"/>, there are three types of
inter-domain links:</t>
        <ul spacing="normal">
          <li>
            <t>Inter-domain Ethernet links supporting inter-domain IP links
between two adjacent IP domains;</t>
          </li>
          <li>
            <t>Cross-technology Ethernet links between an an IP domain and an adjacent optical
domain;</t>
          </li>
          <li>
            <t>Access links between a CE device and a PE router.</t>
          </li>
        </ul>
        <t>All the three types of links are Ethernet links.</t>
        <t>It is worth noting that the P-PNC may not be aware whether an
Ethernet interface terminates a cross-technology Ethernet link, an inter-domain
Ethernet link or an access link. The TE Topology Model supports the
discovery for all these types of links with no need for the P-PNC to
know the type of inter-domain link.</t>
        <t>There are two possible models to report the access links between CEs
and PEs: the TE Topology Model, defined in <xref target="RFC8795"/>, or the Service
Attachment Points (SAP) Model, defined in  <xref target="RFC9408"/>.</t>
        <t>Although the discovery of access links is outside the scope of this
document, clarifying the relationship between these two models has
been identified as a gap.</t>
        <t>The inter-domain Ethernet links and cross-technology Ethernet links are discovered
by the MDSC using the plug-id attribute, as described in section 4.3
of <xref target="RFC8795"/>.</t>
        <t>More detailed description of how the plug-id can be used to discover
inter-domain links is also provided in section 5.1.4 of <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>.</t>
        <t>The plug-id attribute can also be used to discover the access-links,
but the analysis of the access-link discovery is outside the scope of
this document.</t>
        <t>This document considers the following two options for discovering
inter-domain links:</t>
        <ol spacing="normal" type="1"><li>
            <t>Static configuration</t>
          </li>
          <li>
            <t>LLDP <xref target="IEEE_802.1AB"/> automatic discovery</t>
          </li>
        </ol>
        <t>Other options are possible but not described in this document.</t>
        <t>As outlined in <xref target="I-D.ietf-ccamp-transport-nbi-app-statement"/>, the encoding of the plug-id namespace and the
specific LLDP information reported within the plug-id value, such as
the Chassis ID and Port ID mandatory TLVs, is implementation specific
and needs to be consistent across all the PNCs within the network.</t>
        <t>The static configuration requires an administrative burden to
configure network-wide unique identifiers: it is therefore more
viable for inter-domain Ethernet links. For the cross-technology Ethernet links, the
automatic discovery solution based on LLDP snooping is preferable
when possible.</t>
        <t>The routers exchange standard LLDP packets as defined in <xref target="IEEE_802.1AB"/>
and the optical nodes snoop the LLDP packets received from the
local Ethernet interface and report to the O-PNCs the extracted
information, such as the Chassis ID, the Port ID, System Name TLVs.</t>
        <t>Note that the optical nodes do not actively participate in the LLDP
packet exchange and does not send any LLDP packets.</t>
        <section anchor="cross-technology-link-discovery">
          <name>Cross-technology Ethernet link Discovery</name>
          <t>The MDSC can discover a cross-technology Ethernet link by matching the plug-id
values of the two LTPs reported by two adjacent O-PNC and P-PNC: in
case LLDP snooping is used, the P-PNC reports the LLDP information
sent by the corresponding Ethernet interface on the IP router while the
O-PNC reports the LLDP information received by the corresponding
Ethernet interface on the optical node, e.g., between LTP 5-0 on PE13
and LTP 7-0 on NE11, as shown in <xref target="fig-cross-technology-link"/>.</t>
          <figure anchor="fig-cross-technology-link">
            <name>Cross-technology Ethernet link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /             Ethernet Topology (P-PNC)                     /
      /    +-------------+                +-------------+         / 
     /     |    PE13     |                |    BR11     |        /
    /      |             |                |             |       /
   /       |    (5-0)    |                |    (6-0)    |      /
  /        +------O------+                +------O------+     /
 /       {PE13,5} ^                              ^ {BR11,6}  /
+-----------------:------------------------------:----------+
                  :                              :
                  :                              :
                  :                              :
                  :                              :
         +--------:------------------------------:------------------+
        /         :                              :                 /
       / {PE13,5} v                              v {BR11,6}       /
      /    +------O------+                +------O------+        / 
     /     |    (7-0)    |                |    (8-0)    |       /
    /      |             |                |             |      /
   /       |    NE11     |                |     NE12    |     /
  /        +-------------+                +-------------+    /
 /                Ethernet or OTN Topology (O-PNC)          /
+----------------------------------------------------------+

Legenda:
========
  O   LTP
<...> Link discovered by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>As described in <xref target="optical-topology-discovery"/>, the LTP terminating a cross-technology Ethernet link
is reported by an O-PNC in the Ethernet topology or in the OTN
topology model or in both models, depending on the type of
corresponding physical port on the optical node.</t>
          <t>It is worth noting that the discovery of cross-technology Ethernet links is based
only on the LLDP information sent by the Ethernet interfaces of the
routers and snooped by the Ethernet interfaces of the optical nodes.
Therefore the MDSC can discover these links also before optical
paths, supporting overlay multi-technology IP links, are setup.</t>
        </section>
        <section anchor="ip-inter-domain-link-discovery">
          <name>Inter-domain IP Link Discovery</name>
          <t>The MDSC can discover an inter-domain Ethernet link which supports an
inter-domain IP link, by matching the plug-id values of the two
Ethernet LTPs reported by the two adjacent P-PNCs: the two P-PNCs
report the LLDP information being sent and being received from the
corresponding Ethernet interfaces, e.g., between the Ethernet LTP 3-1
on BR11 and the Ethernet LTP 4-1 on BR21 shown in <xref target="fig-inter-domain-link"/>.</t>
          <figure anchor="fig-inter-domain-link">
            <name>Inter-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +--------------------------+     +-------------------------+
       /  IP Topology (P-PNC 1)   /     /  IP Topology (P-PNC 2)  /
      /   +-------------+        /     /   +-------------+       /
     /    |    BR11     |       /     /    |    BR21     |      /
    /     |        (3-2)O<................>O(4-2)        |     /
   /      |             |\    /     /     /|             |    /
  /       +-------------+|   /     /      |+-------------+   /
 /                       |  /     /       |                 /
+------------------------|-+     +-------------------------+ 
                         |                |               
          Supporting LTP |                | Supporting LTP                
                         |                |                               
                         |                |                           
          +--------------|----------+    +|------------------------+
         /               V         /    / V                       /
        / +-------------+/        /    /  \+-------------+       /
       /  |     {1}(3-1)O<................>O(4-1){1}     |      /
      /   |             |\      /    /    /|             |     /
     /    |    BR11     |V(*)  /    /  (*)V|     BR21    |    /
    /     |             |/    /    /      \|             |   /
   /      |     {2}(3-0)O<~~~~~~~~~~~~~~~~>O(4-0){3}     |  /
  /       +-------------+   /    /         +-------------+ /
 / Eth. Topology (P-PNC 1) /    / Eth. Topology (P-PNC 2) /
+-------------------------+    +-------------------------+ 

Notes:
=====
(*) Supporting LTP
{1} {BR11,3,BR21,4}
{2} {BR11,3}
{3} {BR21,4}

Legenda:
========
  O   LTP
----> Supporting LTP
<...> Link discovered by the MDSC
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>Different information is required to be encoded by the P-PNC within
the plug-id attribute of the Ethernet LTPs to discover cross-technology Ethernet
links and inter-domain Ethernet links.</t>
          <t>If the P-PNC does not know a priori whether an Ethernet interface on
an IP router terminates a cross-technology Ethernet link or an inter-domain Ethernet
link, it has to report at the MPI two Ethernet LTPs representing the
same Ethernet interface, e.g., both the Ethernet LTP 3-0 and the
Ethernet LTP 3-1, supported by LTP 3-0, shown in <xref target="fig-inter-domain-link"/>:</t>
          <ul spacing="normal">
            <li>
              <t>The physical Ethernet LTP (e.g., LTP 3-0 in BR11, as shown in
<xref target="fig-inter-domain-link"/>) is used to represent the physical adjacency between the
Ethernet interface on an IP router and the Ethernet interface on its physically adjacent node,
which can be either an IP router
(in case of a single-technology Ethernet link) or an optical
node (in case of a cross-technology Ethernet link).
Therefore, as described in <xref target="cross-technology-link-discovery"/>, the P-PNC reports,
within the plug-id attribute of this LTP, the LLDP information
sent by the corresponding Ethernet interface on the IP router; such as the
{BR11,3} and {BR21,4} plug-id values reported, respectively, by
the Ethernet LTP 3-0 on BR11 and by the Ethernet LTP 4-0 on BR21,
as shown in <xref target="fig-inter-domain-link"/>;</t>
            </li>
            <li>
              <t>The logical Ethernet LTP (e.g., LTP 3-1 in BR11, as shown in
<xref target="fig-inter-domain-link"/>), supported by a physical Ethernet LTP (e.g., LTP 3-0 in
BR11, as shown in <xref target="fig-inter-domain-link"/>), is used to discover the logical
adjacency between the Ethernet interfaces on IP routers, which can be either
single-technology or multi-technology. Therefore, the P-PNC reports, within
the plug-id attribute of this LTP, the LLDP information sent and
received by the corresponding Ethernet interface on the IP router; such as
the {BR11,3,BR21,4} plug-id values reported by the Ethernet LTP 3-1 on BR11 and by the Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
            </li>
          </ul>
          <t>It is worth noting that in case of an inter-domain Ethernet links, the MDSC cannot discover, using the LLDP
information reported in the plug-id attributes, the physical
adjacency between the two Ethernet interfaces on physically adjacent IP routers, because these
two plug-id values do not match, such as the plug-id values {BR11,3}
and {BR21,4} shown in <xref target="fig-inter-domain-link"/>. However, the MDSC may infer the
physical intra-domain Ethernet links if it knows a priori, using
mechanisms which are outside the scope of this document, that the
Ethernet interfaces on the IP routers either terminates a cross-technology
link or a single-technology (intra-domain or inter-domain) Ethernet link,
e.g., as shown in <xref target="fig-inter-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTPs when it
knows, by mechanisms which are outside the scope of this document,
that the corresponding Ethernet interfaces terminate inter-domain Ethernet links.</t>
          <t>The MDSC can then discover an inter-domain IP link between the two IP
LTPs that are supported by the two Ethernet LTPs terminating an
inter-domain Ethernet link, discovered as described in <xref target="ip-inter-domain-link-discovery"/>,
e.g., between the IP LTP 3-2 on BR21 and the IP LTP 4-2 on BR22,
supported respectively by the Ethernet LTP 3-1 on BR11 and by the
Ethernet LTP 4-1 on BR21, as shown in <xref target="fig-inter-domain-link"/>.</t>
        </section>
      </section>
      <section anchor="multi-technology-link-discovery">
        <name>Multi-technology IP Link Discovery</name>
        <t>A multi-technology intra-domain IP link and its supporting multi-technology
intra-domain Ethernet link are discovered by the P-PNC like any other
intra-domain IP and Ethernet links, as described in <xref target="packet-topology-discovery"/>, and
reported at the MPI within the packet and the Ethernet network
topologies, e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <figure anchor="fig-multi-technology-link">
          <name>Multi-technology intra-domain Ethernet and IP link discovery</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>The Ethernet interface 5 on the P13 router is terminating two Ethernet abstract links:
- The multi-technology intra-domain Ethernet link between logical Ethernet LTP 5-1 on PE13 and the logical Ethernet LTP 6-1 on BR11;
- The cross-technology Ethernet link, which is supporting that multi-technology intra-domain Ethernet link, between the physical Ethernet LTPs 5-0 on PE13 and the physical Ethernet LTP 7-0 on the optical NE11.</t>
        <t>The P-PNC does not report any plug-id information on the logical
Ethernet LTPs terminating intra-domain Ethernet links, such as the
LTP 5-1 on PE13 and LTP 6-1 in BR11 shown in <xref target="fig-multi-technology-link"/>, since these
links are discovered by the PNC.</t>
        <t>In addition, the P-PNC also reports the physical Ethernet LTPs that
terminate the cross-technology Ethernet links supporting the multi-technology intra-domain Ethernet links, e.g., the Ethernet LTP 5-0 on PE13 and the
Ethernet LTP 6-0 on BR11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC discovers, using the mechanisms described in <xref target="inter-domain-link-discovery"/>,
which cross-technology Ethernet links support the multi-technology intra-domain
Ethernet links, e.g., the link between LTP 5-0 on PE13 and LTP 7-0 on
NE11, shown in <xref target="fig-multi-technology-link"/>.</t>
        <t>The MDSC also discovers, from the information provided by the O-PNC
and described in <xref target="optical-path-discovery"/>, which optical tunnels support the
multi-technology intra-domain IP links and therefore the path within the
optical network that supports a multi-technology intra-domain IP link,
e.g., as shown in <xref target="fig-multi-technology-link"/>.</t>
        <section anchor="single-technology-link-discovery-discovery">
          <name>Intra-domain single-technology IP Links</name>
          <t>It is worth noting that the P-PNC may not be aware of whether an
Ethernet interface on the IP router terminates a multi-technology or a
single-technology intra-domain Ethernet link.</t>
          <t>In this case, the P-PNC, always reports two Ethernet LTPs for each
Ethernet interface on the IP router, e.g., the Ethernet LTP 1-0 and 1-1
on PE13, shown in <xref target="fig-intra-domain-link"/>.</t>
          <figure anchor="fig-intra-domain-link">
            <name>Single-technology intra-domain Ethernet and IP link discovery</name>
            <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |    P16  |        /  
    /      |    (1-2)O<======================>O(2-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (1-1)O<======================>O(2-1)    |        / 
      /    |         |\                      /|         |       / 
     /     |  PE13   |V(*)                (*)V|    P16  |      / 
    /      |         |/                      \|         |     / 
   /       | {1}(1-0)O<~~~~~~~~~~~~~~~~~~~~~~>O(2-0){2} |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 1)           / 
+---------------------------------------------------------+

Notes:
=====
(*) Supporting LTP
{1} {PE13,1}
{2} {P16,2}

Legenda:
========
  O   LTP
----> Supporting LTP
<===> Link discovered by the PNC and reported at the MPI
<~~~> Link inferred by the MDSC
{   } LTP Plug-id reported by the PNC
]]></artwork>
          </figure>
          <t>It is worth noting that in case of an intra-domain single-technology
Ethernet links, the MDSC cannot discover, using the LLDP information
reported in the plug-id attributes, the physical adjacency
between the two Ethernet interfaces on physically adjacent IP routers,
because the two plug-id values do
not match, such as the plug-id values {PE13,1} and {P16,2} shown in
<xref target="fig-intra-domain-link"/>. However, the MDSC may infer the physical intra-domain
Ethernet links, e.g., between LTP 1-0 on PE13 and LTP 2-0 on P16, as
shown in <xref target="fig-intra-domain-link"/>, if it knows a priori, using mechanisms which are
outside the scope of this document, that all the Ethernet interfaces
on the IP routers either terminates a cross-technology or a single-technology
(intra-domain or inter-domain) Ethernet link, e.g., as shown in
<xref target="fig-intra-domain-link"/>.</t>
          <t>The P-PNC can omit reporting the physical Ethernet LTP if it knows,
by mechanisms which are outside the scope of this document, that the
intra-domain Ethernet link is single-technology.</t>
        </section>
      </section>
      <section anchor="lag-discovery">
        <name>LAG Discovery</name>
        <t>The P-PNCs can discover the configuration of the LAG groups within
its domain and report each intra-domain LAG as an Ethernet bundle
link, within the Ethernet topology exposed at the MPI.</t>
        <t>This is done bundling multiple single-domain Ethernet links, as shown
in <xref target="fig-lag"/>. For example, the Ethernet bundled link between the
Ethernet LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24, is built
from the Ethernet links setup respectively:</t>
        <ul spacing="normal">
          <li>
            <t>between the Ethernet LTP 1-1 on BR21 and the Ethernet LTP 2-1 on
P24; and</t>
          </li>
          <li>
            <t>between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on
P24.</t>
          </li>
        </ul>
        <figure anchor="fig-lag">
          <name>LAG</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 2)                  /
      /    +---------+                        +---------+         / 
     /     |  BR21   |                        |    P24  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |            |           |         |      / 
  /        +---------+            |           +---------+     / 
 /                                |                          /  
+---------------------------------|-------------------------+ 
                                  |                                       
                                  | Supporting Link                                      
                                  |                                       
                                  |                                       
          +-----------------------|---------------------------------+
         /                        |                                /
        /  +---------+            v           +---------+         /
       /   |    (5-1)O<======================>O(6-1)    |        / 
      /    |  BR21   |  Bundled Link          |    P24  |       / 
     /     |         |                        |         |      /
    /      |    (3-1)O<======================>O(4-1)    |     /
   /       |    (1-1)O<======================>O(2-1)    |    / 
  /        +---------+                        +---------+   / 
 /                   Ethernet Topology (P-PNC 2)           / 
+---------------------------------------------------------+

Legenda:
========
  O   LTP
<===> Link discovered by the PNC and reported at the MPI
]]></artwork>
        </figure>
        <t>The mechanisms used by the MDSC to discover single-technology and multi-technology intra-domain LAG link is the same (the only difference being
whether the bundled links are single-technology or multi-technology).</t>
        <t>Instead, the mechanisms used by the MDSC to discover single-technology
inter-domain LAG links between two BRs are different and outside the
scope of this document since they do not imply any cross-technology
coordination between packet and optical domains.</t>
        <t>As described in <xref target="packet-topology-discovery"/>, the mechanisms used by the P-PNC to
discover the configuration of the LAG groups within its domain, such
as LLDP <xref target="IEEE_802.1AB"/>, are outside the scope of this document.</t>
        <t>However, it is worth noting that according to <xref target="IEEE_802.1AB"/>, LLDP
can be configured on a LAG group (Aggregated Port) and/or on any
number of its LAG members (Aggregation Ports).</t>
        <t>If LLDP is enabled on both LAG members and groups, two types of LLDP
packets are transmitted by the routers and received by the optical
nodes on some cross-technology Ethernet links: one sent for the LLDP session
configured at LAG member (Aggregation Port)level and another one for
the LLDP session configured at LAG group (Aggregated Port)level. This
could cause some issues when LLDP snooping is used to discover the
cross-technology Ethernet links, as defined in <xref target="cross-technology-link-discovery"/>.</t>
        <t>The cross-technology Ethernet link discovery is based only on the LLDP session
configured on the LAG members (Aggregation Ports) to allow discovery
of these links independently from the configuration of the underlay
optical tunnel or from the LAG group.</t>
        <t>To avoid any ambiguity on how the optical nodes can identify which LLDP
packets belong to which LLDP session, the P-PNC can disable the LLDP
sessions on the LAG groups configured by the MDSC (e.g., the multi-technology single-domain LAG groups configured using the mechanisms
described in <xref target="lag-setup"/>), keeping the LLDP sessions on the LAG
members enabled.</t>
        <t>Another option is to rely on other mechanisms (e.g., the Port type
field in the Link Aggregation TLV defined in Annex F of <xref target="IEEE_802.1AX"/>)
that allow the optical node to identify which LLDP packets
belong to which LLDP session: the O-PNC can then use only the LLDP
information from the LLDP sessions configured on the LAG members to
support the cross-technology Ethernet link discovery mechanisms defined in <xref target="cross-technology-link-discovery"/>.</t>
      </section>
      <section anchor="vpn-discovery">
        <name>L2/L3 VPN Network Services Discovery</name>
        <t>The P-PNC reports the L2/L3 VPN services configured within its
domain, using the L2NM and L3NM network service models, and which
packet TE tunnels (e.g., MPLS-TE or SR-TE) are used by each L2/L3 VPN
service, using the L2NM and L3NM TE service mapping models.</t>
        <t>The MDSC can use the information mentioned above together with the
packet TE path, packet topology, multi-technology IP links, optical
topology and optical path information discovered as described in the
previous sections, to discover the multi-technology path used to carry the
traffic for each L2/L3 VPN service.</t>
      </section>
      <section anchor="inventory-discovery">
        <name>Inventory Discovery</name>
        <t>The are no YANG data models in IETF that could be used to report at
the MPI the whole inventory information discovered by a PNC.</t>
        <t><xref target="RFC8345"/> had foreseen some work for inventory as an augmentation of
the network model, but no YANG data model has been developed so far.</t>
        <t>There are also no YANG data models in IETF that could be used to
correlate topology information, e.g., a link termination point (LTP),
with inventory information, e.g., the physical port supporting an
LTP, if any.</t>
        <t>Inventory information through MPI and correlation with topology
information is identified as a gap requiring further work and outside
of the scope of this draft.</t>
      </section>
    </section>
    <section anchor="config">
      <name>Establishment of L2/L3 VPN Services with TE Requirements</name>
      <t>In this scenario the MDSC needs to setup a multi-domain L2VPN or a
multi-domain L3VPN with some SLA requirements.</t>
      <t>The MDSC receives the request to setup a L2/L3 VPN network service
from the OSS/Orchestration layer (see <xref target="additional-scenarios"/>).</t>
      <t>The MDSC translates the L2/L3 VPN SLA requirements into TE
requirements (e.g., bandwidth, TE metric bounds, SRLG disjointness,
nodes/links/domains inclusion/exclusion) and find the TE paths that
meet these TE requirements (see <xref target="vpn-overview"/>).</t>
      <t>For example, considering the L3VPN in <xref target="fig-vpn-topo"/> and <xref target="fig-vpn-path"/>, the MDSC
finds that:</t>
      <ul spacing="normal">
        <li>
          <t>PE13-P16-PE14 TE path already exists but have not enough bandwidth
to support the new L3VPN, as described in <xref target="te-path-discovery"/>;, and that:  </t>
          <ul spacing="normal">
            <li>
              <t>the IP link(s) between PE13 and P16 has not enough bandwidth
 to support increasing the bandwidth of that TE path, as
 described in <xref target="packet-topology-discovery"/>;</t>
            </li>
            <li>
              <t>a new underlay optical tunnel could be setup to increase the
 bandwidth of the IP link(s) between PE13 and P16 to support
 increasing the bandwidth of that overlay TE path, as described
 in <xref target="optical-path-computation"/>. The dimensioning of the underlay optical
 tunnel is decided by the MDSC based on the TE requirements
 (e.g., the bandwidth) requested by the TE path and on its
 multi-layer optimization policy, which is an internal MDSC
 implementation issue;</t>
            </li>
            <li>
              <t>a new multi-domain TE path needs to be setup between PE13 and
 PE23, e.g., either because existing TE paths between PE13 and
 PE23 are not able to meet the TE and binding requirements of
 the L2/L3 VPN service or because there is no TE path between
 PE13 and PE23.</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>As described in <xref target="path-computation-overview"/>, with partial summarization, the MDSC
will use the TE topology information provided by the P-PNCs and the
results of the path computation requests sent to the O-PNCs, as
described in <xref target="optical-path-computation"/>, to compute the multi-layer/multi-domain
path between PE13 and PE23.</t>
      <t>For example, the multi-layer/multi-domain performed by the MDSC could
require the setup of:</t>
      <ul spacing="normal">
        <li>
          <t>a new underlay optical tunnel between PE13 and BR11, supporting a
new IP link, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>a new underlay optical tunnel between BR21 and P24 to increase the
bandwidth of the IP link(s) between BR21 and P24, as described in
<xref target="multi-technology-link-setup"/>.</t>
        </li>
      </ul>
      <t>When the setup of the L2/L3 VPN network service requires multi-domain
and multi-layer coordination, the MDSC is also responsible for
coordinating the network configuration required to realize the
request network service across the appropriate optical and packet
domains.</t>
      <t>The MDSC would therefore request:</t>
      <ul spacing="normal">
        <li>
          <t>the O-PNC1 to setup a new optical tunnel between the ROADMs
connected to PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the configuration of the existing IP link, in
case of LAG, or configure a new IP link, in case of Equal Cost Multi-Path (ECMP), between
PE13 and P16, as described in <xref target="multi-technology-link-setup"/>;</t>
        </li>
        <li>
          <t>the P-PNC1 to update the bandwidth of the selected TE path between
PE13 and PE14, as described in <xref target="te-path-config"/>.</t>
        </li>
      </ul>
      <t>After that, the MDSC requests P-PNC2 to setup a TE path between BR21
and PE23, with an explicit path (BR21, P24, PE23) to constrain this
new TE path to use the new underlay optical tunnel setup between BR21
and P24, as described in <xref target="te-path-config"/>. The P-PNC2 properly configures
the routers within its domain to setup the requested path and returns
to the MDSC the information which is needed for multi-domain TE path
stitching. For example, in case of inter-domain SR-TE, the P-PNC2,
knowing the node and the adjacency SIDs assigned within its domain,
can install the proper SR policy, or hierarchical policies, within
BR21 and returns to the MDSC the binding SID it has assigned to this
policy in BR21.</t>
      <t>Then the MDSC requests P-PNC1 to setup a TE path between PE13 and
BR11, with an explicit path (PE13, BR11) to constrain this new TE
path to use the new underlay optical tunnel setup between PE13 and
BR11, specifying also which inter-domain link should be used to send
traffic to BR21 and the information to be used for the multi-domain
TE path stitching, as described in <xref target="te-path-discovery"/> (e.g., in case of
inter-domain SR-TE, the binding SID  that has been assigned by P-PNC2
to the corresponding SR policy in BR21). The P-PNC1 properly
configures the routers within its domain to setup the requested path
and the multi-domain TE path stitching. For example, in case of
inter-domain SR-TE, the P-PNC1, knowing also the node and the
adjacency SIDs assigned within its domain and the EPE SID assigned by
P-PNC1 to the inter-domain link between BR11 and BR21, and the
binding SID assigned by P-PNC2, installs the proper policy, or
policies, within PE13.</t>
      <t>Once the TE paths have been selected and, if needed, setup/modified,
the MDSC can request to both P-PNCs to configure the L3VPN and its
binding with the selected TE paths, as described in <xref target="vpn-setup"/>.</t>
      <section anchor="optical-path-computation">
        <name>Optical Path Computation</name>
        <t>As described in <xref target="path-computation-overview"/>, the optical path computation is
usually performed by the O-PNCs.</t>
        <t>When performing multi-layer/multi-domain path computation, the MDSC
can delegate the O-PNC for single-domain optical path computation.</t>
        <t>As described in <xref target="optical-topology-discovery"/>, <xref target="inter-domain-link-discovery"/> and <xref target="multi-technology-link-discovery"/>, there is a one-to-one
relationship between a multi-layer intra-domain IP link and its
underlay optical tunnel. Therefore, the properties of an optical path
between two optical TTPs, as computed by the O-PNC, can be used by
the MDSC to infer the properties of the associated multi-layer
single-domain IP link.</t>
        <t>As discussed in <xref target="I-D.ietf-teas-yang-path-computation"/>, there are two options to request an
O-PNC to perform optical path computation: either via a "compute-only" TE tunnel path, using the generic TE tunnel YANG data model
defined in <xref target="I-D.ietf-teas-yang-te"/> or via the path computation RPC defined in
<xref target="I-D.ietf-teas-yang-path-computation"/>.</t>
        <t>This draft assumes that the path computation RPC is used.</t>
        <t>There are no YANG data models in IETF that could be used to augment
the generic path computation RPC with technology-specific attributes.</t>
        <t>Optical technology-specific augmentation for the path computation RPC
is identified as a gap requiring further work outside of this draft's
scope.</t>
      </section>
      <section anchor="multi-technology-link-setup">
        <name>Multi-technology IP Link Setup</name>
        <t>As described in <xref target="optical-path-computation"/>, there is a one-to-one relationship
between a multi-technology intra-domain IP link and its underlay optical
tunnel.</t>
        <t>Therefore, to setup a new multi-technology intra-domain IP link, the MDSC
requires the O-PNC to setup the  optical tunnel (using either the WDM
Tunnel model or the OTN Tunnel model, if the optional OTN switching
is supported) within the optical network and to steer the client
traffic between the two cross-technology Ethernet links over that optical tunnel,
using either the Ethernet Client Signal Model (for frame-based
transport) or the Transparent CBR Client Signal Model (for
transparent transport).</t>
        <t>For example, with a reference to <xref target="fig-multi-technology-link-2"/>, the MDSC can request the
O-PNC1 to setup an optical tunnel between the optical TTPs (7) on
NE11 and (8) on NE12 and to steer over this tunnel the client traffic
between LTP (7-0) on NE11 and LTP (8-0) on NE12.</t>
        <figure anchor="fig-multi-technology-link-2">
          <name>Multi-technology IP link setup</name>
          <artwork type="ascii-art"><![CDATA[
        +-----------------------------------------------------------+
       /                    IP Topology (P-PNC 1)                  /
      /    +---------+                        +---------+         / 
     /     |  PE13   |                        |   BR11  |        /  
    /      |    (5-2)O<======================>O(6-2)    |       /
   /       |         |              |         |         |      / 
  /        +---------+              |         +---------+     / 
 /                                  |                        /  
+-----------------------------------|-----------------------+
                                    |
                                    | Supporting Link
                                    |
        +---------------------------|-------------------------------+
       / Ethernet Topology (P-PNC 1)|                              /
      /    +-------------+          |     +-------------+         /
     /     |    PE13     |          V     |    BR11     |        /
    /      |        (5-1)O<==============>O(6-1)        |       /
   /       |    (5-0)    |\              /|    (6-0)    |      /
  /        +------O------+|(*)        (*)|+------O------+     /
 /                ^ \<----+              +----->/^           /
+-----------------:------------------------------:----------+
                  :                              :      
                  :                              :       
                  :                              :     
        +---------:------------------------------:------------------+
       /          :   Ethernet or OTN Topology   :                 /
      /           V          (O-PNC 1)           V                /
     /     +------O------+    ETH/CBR     +------O------+        /
    /      |    (7-0)    |  client sig.   |    (8-0)    |       /
   /       |      X----------+-------------------X      |      /
  /        |    NE11     |   |            |     NE12    |     /
 /         +-------------+   |            +-------------+    /
+----------------------------|------------------------------+
                             | Underlay
                             | tunnel
                             |              
         +----------------------------------------------------------+
        /        (7)         |                  (8)                /
       /         ---         |                  ---               /
      /    +-----\ /-----+   v            +-----\ /-----+        /
     /     |      V      |                |      V      |       /
    /      |      X======|================|======X      |      /
   /       |    NE11     |  Opt. Tunnel   |    NE12     |     /
  /        +-------------+                +-------------+    /
 /                   Optical Topology (O-PNC 1)             /
+----------------------------------------------------------+

Notes:
=====
(*) Supporting LTP

Legenda:
========
  O   LTP
 ---  
 \ /  TTP
  V   
----> Supporting LTP or Supporting Link or Underlay tunnel
<===> Link discovered by the PNC and reported at the MPI
<...> Link discovered by the MDSC
x---x Ethernet/CBR client signal
X===X Optical tunnel
]]></artwork>
        </figure>
        <t>Note: <xref target="fig-multi-technology-link-2"/> is an exact copy of <xref target="fig-multi-technology-link"/>.</t>
        <t>After the optical tunnel has been setup and the client traffic
steering configured, the two IP routers can exchange Ethernet frames
between themselves, including LLDP messages.</t>
        <t>If LLDP <xref target="IEEE_802.1AB"/> or any other discovery mechanisms, which are
outside the scope of this document, is used between the adjacency
between the two IP routers' ports, the P-PNC can automatically discover
the underlay multi-technology single-domain Ethernet link being set up by
the MDSC and report it to the P-PNC, as described in <xref target="multi-technology-link-discovery"/>.</t>
        <t>Otherwise, if there are no automatic discovery mechanisms, the MDSC
can configure this multi-technology single-domain Ethernet link at the MPI
of the P-PNC.</t>
        <t>The two Ethernet LTPs terminating this multi-technology single-domain
Ethernet link are supported by the two underlay Ethernet LTPs
terminating the two cross-technology Ethernet links, e.g., the LTP 5-1 on PE13 and
6-1 on BR11 shown in <xref target="fig-multi-technology-link-2"/>.</t>
        <t>After the multi-technology single-domain Ethernet link has been configured
by the MDSC or discovered by the P-PNC, the corresponding multi-technology
single-domain IP link can also be configured either by the MDSC or by
the P-PNC.</t>
        <t>This document assumes that this IP link is configured by the P-PNC.</t>
        <t>It is worth noting that if LAG is not supported within the domain
controlled by the P-PNC, the P-PNC can configure the multi-technology
single-domain IP link as soon as the underlay multi-technology single-domain Ethernet link is either discovered by the P-PNC or configured
by the MDSC at the MPI. However, if LAG is supported the P-PNC has
not enough information to know whether the discovered/configured
multi-technology single-domain Ethernet link would be:</t>
        <ol spacing="normal" type="1"><li>
            <t>Used to support a multi-technology single-domain IP link;</t>
          </li>
          <li>
            <t>Used to create a new LAG group;</t>
          </li>
          <li>
            <t>Added to an existing LAG group.</t>
          </li>
        </ol>
        <t>Therefore the P-PNC does not take any further action after a multi-technology single-domain Ethernet link is discovered or configured by the
MDSC at the MPI.</t>
        <t>The MDSC can request the P-PNC to configure a new multi-technology single-domain IP link, supported by the the just discovered or configured
multi-technology single-domain Ethernet link, by creating an IP link
within the running datastore of the P-PNC MPI. Only the IP link, IP
LTPs and the reference to the supporting multi-technology single-domain
Ethernet link are configured by the MDSC. All the other configuration
is provided by the P-PNC.</t>
        <t>For example, with a reference to <xref target="fig-multi-technology-link-2"/>, the MDSC can request the
P-PNC1 to setup a multi-technology single-domain IP Link between IP LTP 5-2 on PE13 and IP LTP 6-2 on BR11 supported by the multi-technology single-domain Ethernet link between ETH LTP 5-1 on PE13 and ETH LTP 6-1 on
BR11.</t>
        <t>The P-PNC configures the requested multi-technology single-domain IP link
and, once finished, reports it to the MDSC within the IP topology
exposed at its MPI.</t>
        <section anchor="lag-setup">
          <name>Multi-technology LAG Setup</name>
          <t>The P-PNC configures a new LAG group between two routers when the
MDSC creates at the MPI a new Ethernet bundled link (using the
bundled-link container defined in <xref target="RFC8795"/>) bundling the multi-technology
single-domain Ethernet link(s) being created, as described above.</t>
          <t>When a new LAG link is created, it is also recommended to configure
the minimum number of active member links required to consider the
LAG link as being up. For example, a LAG link with three members can
be considered up when only one member link fails and down when at
least two member links fail.</t>
          <t>The attribute required to configure the minimum number of active
member links is missing in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/> and this is identified as a
gap in <xref target="conclusions"/>.</t>
          <t>It is worth noting that a new LAG group can be created to bundle one
or more multi-technology single-domain Ethernet link(s).</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup an Ethernet bundled link between the Ethernet LTP 5-1
on BR21 and the Ethernet LTP 6-1 on P24, bundling the multi-technology
single-domain Ethernet link between the Ethernet LTP 1-1 on BR21 and
the Ethernet LTP 2-1 on P24.</t>
          <t>It is worth noting that the MDSC needs to create also the Ethernet
LTPs terminating the Ethernet bundled link.</t>
          <t>The MDSC can request the P-PNC to configure a new multi-technology single-domain IP link, supported by the the just configured Ethernet bundled
link, following the same procedure described in <xref target="multi-technology-link-setup"/> above.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to setup a multi-technology single-domain IP Link between IP LTP 5-2 on BR21 and IP LTP 6-2 on P24 supported by the Ethernet bundle link
between ETH LTP 5-1 on BR21 and the Ethernet LTP 6-1 on P24.</t>
        </section>
        <section anchor="multi-technology-lag-update">
          <name>Multi-technology LAG Update</name>
          <t>The P-PNC adds new member(s) to an existing LAG group when the MDSC
updates at the MPI the configuration of an existing Ethernet bundled
link adding the multi-technology single-domain Ethernet link(s) being
created, as described above.</t>
          <t>When member links are added or removed from a LAG link, the minimum
number of active member links required to consider the LAG link as
being up may also need to be updated.</t>
          <t>For example, with a reference to <xref target="fig-lag"/>, the MDSC can request the
P-PNC2 to add the multi-technology single-domain Ethernet link setup
between the Ethernet LTP 3-1 on BR21 and the Ethernet LTP 4-1 on P24
to the existing Ethernet bundle link setup between the Ethernet LTP
5-1 on node BR21 and the Ethernet LTP 6-1 on node P24.</t>
          <t>After the LAG configuration has been updated, the P-PNC can also
update the bandwidth information of the multi-technology single-domain IP
link supported by the updated Ethernet bundled link.</t>
        </section>
        <section anchor="multi-technology-path-properties">
          <name>Multi-technology TE path properties Configuration</name>
          <t>The MDSC can discover the TE path properties (e.g., the list of
SRLGs, the delay) of a multi-technology IP link from the TE properties of:</t>
          <ul spacing="normal">
            <li>
              <t>the IP LTPs terminating the multi-technology IP link (e.g., the list of
SRLGs reported by the P-PNC using the packet TE topology model);</t>
            </li>
            <li>
              <t>the optical path (e.g., the list of SRLGs reported by the O-PNC
using the WDM or OTN tunnel model); and</t>
            </li>
            <li>
              <t>the cross-domain links (e.g., the list of SRLGs reported by the O-PNC and P-PNC respectively, using the WSON and/or flexi-grid, the
OTN and the packet TE topology models).</t>
            </li>
          </ul>
          <t>The MDSC can also report this information to the P-PNC by properly
configuring the multi-technology IP link properties using the packet TE
topology model at the packet PNC MPI.</t>
          <t>This information is used by the P-PNC at least when computing the
local protection path, as described in <xref target="te-path-config"/>, e.g., to ensure
that the local protection path is SRLG disjoint with the primary
path.</t>
          <t>It is worth noting that the list of SRLGs for a multi-technology IP link
can be quite long. Implementation-specific mechanisms can be
implemented by the MDSC or by the O-PNC to summarize the SRLGs of an
optical tunnel. These mechanisms are implementation-specific and have
no impact on the YANG models nor on the interoperability at the MPI,
but cares have to be taken to avoid missing information.</t>
        </section>
      </section>
      <section anchor="te-path-config">
        <name>TE Path Setup and Update</name>
        <t>This version of the draft assumes that TE path setup and update at
the MPI could be done using the generic TE tunnel YANG data model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, with packet technology-specific
augmentations, described in <xref target="packet-yang"/>.</t>
        <t>When a new TE path needs to be setup, the MDSC can use the <xref target="I-D.ietf-teas-yang-te"/>
model to request the P-PNC to set it up, properly specifying
the path constraints, such as the explicit path, to force the P-PNC
to setup an TE path that meets the end-to-end TE and binding
constraints and uses the optical tunnels setup by the MDSC for the
purpose of supporting this new TE path.</t>
        <t>The <xref target="I-D.ietf-teas-yang-te"/> model supports requesting the setup of both end-to-end as well as segment TE tunnels (within one domain).</t>
        <t>In the latter case, the technology-specific augmentations should
allow the configuration of the information needed for multi-domain TE
path stitching.</t>
        <t>For example, the SR-TE specific augmentations of the <xref target="I-D.ietf-teas-yang-te"/>
model should be defined to allow the MDSC to configure the binding
SIDs to be used for the multi-domain SR-TE path stitching and to
allow the P-PNC to report the binding SID assigned to the segment TE
paths. Note that the assigned binding SID should be persistent in
case IP router or P-PNC rebooting.</t>
        <t>The MDSC can also use the <xref target="I-D.ietf-teas-yang-te"/> model to request the P-PNC to
increase the bandwidth allocated to an existing TE path, and, if
needed, also on its reverse TE path. The <xref target="I-D.ietf-teas-yang-te"/> model supports
both symmetric and asymmetric bandwidth configuration in the two
directions.</t>
        <t>[Editor's Note:] Add some text about the protection options (to
further discuss whether to put this text here or in <xref target="multi-technology-link-setup"/>).</t>
        <t>The MDSC also request the P-PNC to configure local protection mechanisms. For example, the FRR local protection, as defined in <xref target="RFC4090"/> in case of MPLS-TE domain or the TI-LFA local protection, as defined in <xref target="I-D.ietf-rtgwg-segment-routing-ti-lfa"/> in case of SR-TE domain. The  mechanisms to request the configuration TI-LFA local protection for SR-TE paths using the <xref target="I-D.ietf-teas-yang-te"/> are a gap in the current YANG models.</t>
        <t>The requested local protection mechanisms within the P-PNC domain are
configured by the P-PNC through implementation specific mechanisms
which are outside the scope of this document.</t>
        <t>The P-PNC takes into account the multi-layer TE path properties
(e.g., SRLG information), configured by the MDSC as described in
<xref target="multi-technology-path-properties"/>, when computing the protection configuration (e.g., in
case of SR-TE domains, the TI-LFA post-convergence path or, in case of MPLS-TE domain, the FRR backup tunnel) for multi-technology single-domain IP links.</t>
        <t>SR-TE path setup and update (e.g., bandwidth increase) through MPI is
identified as a gap requiring further work, which is outside of the
scope of this draft.</t>
      </section>
      <section anchor="vpn-setup">
        <name>L2/L3 VPN Network Service Setup</name>
        <t>The MDSC can use the L2NM and L3NM network service models to request
the P-PNCs to setup L2/L3 VPN services and the L2NM and L3NM TE
service mapping models to request the P-PNCs to configure the PE
routers to steer the L2/L3 VPN traffic to the selected TE tunnels
(e.g., MPLS-TE or SR-TE).</t>
        <t>It is worth noting that the L2NM and L3NM TE service mapping models,
defined in <xref target="I-D.ietf-teas-te-service-mapping-yang"/>, provide a list of TE tunnel(s) that should be used
to forward L2/L3 VPN traffic between the two PEs terminating the
listed TE tunnel(s). If the list contains more than one TE tunnel for
the same pair of PEs, these TE tunnels are used for load balancing
the associated L2/L3 VPN traffic between the same set of two PEs.</t>
        <t>The possibility to request splitting the traffic, between multiple TE
tunnels for the same PEs pair, in a different way than load balancing
is identified as a gap requiring further work and outside of the
scope of this draft.</t>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>The analysis provided in this document has shown that the IETF YANG
models described in 3.2 provides useful support for Packet Optical
Integration (POI) scenarios for resource discovery (network topology,
service, tunnels and network inventory discovery) as well as for
supporting multi-layer/multi-domain L2/L3 VPN network services.</t>
      <t>Few gaps have been identified to be addressed by the relevant IETF
Working Groups:</t>
      <ul spacing="normal">
        <li>
          <t>how both WSON and Flexi-grid topology models could be used
together (through multi-inheritance): this gap has been identified
in <xref target="optical-topology-discovery"/>;.</t>
        </li>
        <li>
          <t>network inventory model: this gap has been identified in
<xref target="inventory-discovery"/> and the solution in <xref target="I-D.ietf-ivy-network-inventory-yang"/> has been proposed to
resolve it;</t>
        </li>
        <li>
          <t>technology-specific augmentations of the path computation RPC,
defined in <xref target="I-D.ietf-teas-yang-path-computation"/> for optical networks: this gap has been
identified in <xref target="optical-path-computation"/> and the solution in <xref target="I-D.ietf-ccamp-optical-path-computation-yang"/>
has been proposed to resolve it;</t>
        </li>
        <li>
          <t>relationship between a common discovery mechanisms applicable to
access links, inter-domain IP links and cross-technology Ethernet links and the
UNI topology discover mechanism defined in <xref target="RFC9408"/>: this gap has
been identified in <xref target="packet-topology-discovery"/>;</t>
        </li>
        <li>
          <t>a mechanism applicable to the P-PNC NBI to configure the SR-TE
paths. Technology-specific augmentations of TE Tunnel model,
defined in <xref target="I-D.ietf-teas-yang-te"/>, are foreseen in section 1 of <xref target="I-D.ietf-teas-yang-te"/>
but not yet defined: this gap has been identified in <xref target="te-path-config"/>;</t>
        </li>
        <li>
          <t>an attribute, which is used to configure the minimum number of
active member links required to consider the LAG link as being up,
is missing from the topology model defined in <xref target="I-D.ietf-ccamp-eth-client-te-topo-yang"/>: this
gap has been identified in <xref target="lag-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to configure splitting the L2/L3 VPN traffic, between
multiple TE tunnels for the same PEs pair, in a different way than
load balancing: this gap has been identified in <xref target="vpn-setup"/>;</t>
        </li>
        <li>
          <t>a mechanism to report client connectivity constraints imposed by
some muxponder design: this gap has been identified in <xref target="muxponder"/>.</t>
        </li>
      </ul>
      <t>Although not applicable to this document, it has been noted that
being able to use WSON and Flexi-grid topology models together
(through multi-inheritance) is not only useful in cases of mixed
fixed-grid and flexible-grid DWDM network topology but also the only
viable option in case of a mixed CWDM and DWDM network topology.</t>
      <t>Although not applicable to this document, it has been noted that the
WDM tunnel model would support also optical tunnel setup in case of a
mixed CWDM and DWDM network topology.</t>
      <t>Although not analysed in this document, it has been noted that the TE
Tunnel model, defined in <xref target="I-D.ietf-teas-yang-te"/>, needs also to be enhanced to
support scenarios where multiple parallel TE paths are used in load-balancing to carry the traffic between two end-points (e.g., VPN
traffic between two PEs).</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>This document highlights how the ACTN architecture can deploy packet
over optical infrastructure services. It highlights how existing IETF
protocols and data models may be used for multi-layer services. It
reuses several existing IETF protocols and data models for the MPI
interfaces between each PNC (Optical or Packet) and the MDSC,
including:</t>
      <ul spacing="normal">
        <li>
          <t>RESTCONF</t>
        </li>
        <li>
          <t>NETCONF</t>
        </li>
        <li>
          <t>PCEP</t>
        </li>
        <li>
          <t>YANG</t>
        </li>
      </ul>
      <t>Several existing authentication and encryption practices and
techniques may be used to help secure these MPI interfaces. These
mechanisms include using Transport Layer Security (TLS) to provide
secure transport for RESTCONF, NETCONF and PCEP. Furthermore, access
control techniques can also provide additional security. NETCONF
supports an Access Control Model (NACM), and RESCONF supports Role
Based Access Control (RBAC), which should also ensure that MDSC to
PNC communication is based on authorised use and granular control of
connectivity and resource requests.</t>
      <section anchor="lldp-snooping-security-considerations">
        <name>LLDP Snooping Security Considerations</name>
        <t>Earlier in the document, LLDP is discussed as a mechanism for the PNCs to discover the intra-domain Ethernet and IP links. While LLDP provides valuable information for network management and troubleshooting, it also presents several security issues:</t>
        <ul spacing="normal">
          <li>
            <t>Eavesdropping: LLDP transmissions are not encrypted. Potentially, LLDP packets could be captured using a packet sniffer. An attacker can leverage this information to gain insights into the network topology, device types, and configurations, which could be used for further attacks;</t>
          </li>
          <li>
            <t>Unauthorized Access: Information disclosed by LLDP can include device types, software versions, and network configuration details. This might help an attacker identify vulnerable devices or configurations that can be exploited to gain unauthorized access or escalate privileges within the network;</t>
          </li>
          <li>
            <t>Data Manipulation: If an attacker gains access to a network device, they could manipulate LLDP information to advertise false device information, leading to potential misconfigurations or trust relationships being exploited. This can disrupt network operations or redirect traffic to malicious devices;</t>
          </li>
          <li>
            <t>Denial of Service (DoS): By flooding the network with fake LLDP packets, an attacker could overwhelm network devices or management systems, potentially leading to a denial of service where legitimate network traffic is disrupted;</t>
          </li>
          <li>
            <t>Spoofing: An attacker could spoof LLDP packets to impersonate other network devices. Potentially, this might lead to incorrect network mappings or trust relationships being established with malicious devices;</t>
          </li>
          <li>
            <t>Lack of Authentication: LLDP does not include mechanisms for authenticating the source of LLDP messages, which means that devices accept LLDP information from any source as legitimate.</t>
          </li>
        </ul>
        <t>To mitigate these security issues, network administrators might implement several security measures, including:</t>
        <ul spacing="normal">
          <li>
            <t>Disabling LLDP on ports where it is not needed, especially those facing untrusted networks;</t>
          </li>
          <li>
            <t>Using network segmentation and Access Control Lists (ACLs) to limit who can send and receive LLDP packets;</t>
          </li>
          <li>
            <t>Employing network monitoring and anomaly detection systems to identify unusual LLDP traffic patterns that may indicate an attack;</t>
          </li>
          <li>
            <t>Regularly updating and patching network devices to address known vulnerabilities that could be exploited through information gathered via LLDP.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This document has identified the need and enabling components for automating the management and control of multi-layer Service Providers' transport networks, combining the optical and microwave transport layer with the packet (IP/MPLS) layer to create a more efficient and scalable network infrastructure. This approach is particularly beneficial for Service Providers and large enterprises dealing with high bandwidth demands and looking for cost-effective ways to expand their networks. However, integrating these two traditionally separate network layers involves several operational considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Network Design and Capacity Planning: Deciding the degree of integration between the packet and optical layers is critical. Furthermore, this includes determining whether to pursue a loose integration (keeping layers distinct but coordinated) or a tight integration (combining layers more closely, potentially at the hardware level) coordinated via the MDSC. Accurate forecasting and planning will also be essential to ensure that the integrated ACTN infrastructure can handle future capacity demand without excessive over-provisioning;</t>
        </li>
        <li>
          <t>System Interoperability: Networks often comprise equipment from various vendors. Ensuring that packet and optical devices can interoperate seamlessly and the PNCs can manage them is crucial for a successful integration. The Service Provider must also check with the vendors to ensure they support the IETF-based technologies outlined in this document;</t>
        </li>
        <li>
          <t>Performance Monitoring: The integrated POI network will require comprehensive monitoring solutions that can provide visibility to the PNCs across both packet and optical layers. Identifying and diagnosing issues may become more complex with integrated layers. Telemetry data may also be required to collect lower-layer networking health and consider network and service performance. This topic is further discussed in [ACTN Assurance];</t>
        </li>
        <li>
          <t>Fault Management and Recovery: The POI networks should be resilient, including considerations for automatic protection switching and fast reroute mechanisms that span both layers. Fault isolation and recovery may become more challenging, as issues in one layer can have cascading effects on the other. Effective fault management strategies must be in place to quickly identify and rectify such issues. This topic is further discussed in [ACTN Assurance];</t>
        </li>
      </ul>
      <t>Specific Security Considerations are discussed in <xref target="security"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="ITU-T_G.694.1" target="https://www.itu.int/rec/T-REC-G.694.1-202010-I">
          <front>
            <title>Spectral grids for WDM applications: DWDM frequency grid</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2020" month="October"/>
          </front>
          <seriesInfo name="ITU-T Recommendation G.694.1" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AB" target="https://ieeexplore.ieee.org/document/7433915">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Station and Media Access Control Connectivity Discovery</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2016" month="March"/>
          </front>
          <seriesInfo name="IEEE 802.1AB-2016" value=""/>
        </reference>
        <reference anchor="IEEE_802.1AX" target="https://ieeexplore.ieee.org/document/7055197">
          <front>
            <title>IEEE Standard for Local and metropolitan area networks - Link Aggregation</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2014" month="December"/>
          </front>
          <seriesInfo name="IEEE 802.1AX-2014" value=""/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC5212">
          <front>
            <title>Requirements for GMPLS-Based Multi-Region and Multi-Layer Networks (MRN/MLN)</title>
            <author fullname="K. Shiomoto" initials="K." surname="Shiomoto"/>
            <author fullname="D. Papadimitriou" initials="D." surname="Papadimitriou"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="M. Vigoureux" initials="M." surname="Vigoureux"/>
            <author fullname="D. Brungard" initials="D." surname="Brungard"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>Most of the initial efforts to utilize Generalized MPLS (GMPLS) have been related to environments hosting devices with a single switching capability. The complexity raised by the control of such data planes is similar to that seen in classical IP/MPLS networks. By extending MPLS to support multiple switching technologies, GMPLS provides a comprehensive framework for the control of a multi-layered network of either a single switching technology or multiple switching technologies.</t>
              <t>In GMPLS, a switching technology domain defines a region, and a network of multiple switching types is referred to in this document as a multi-region network (MRN). When referring in general to a layered network, which may consist of either single or multiple regions, this document uses the term multi-layer network (MLN). This document defines a framework for GMPLS based multi-region / multi-layer networks and lists a set of functional requirements. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5212"/>
          <seriesInfo name="DOI" value="10.17487/RFC5212"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te">
          <front>
            <title>A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="9" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels, Label Switched Paths
   (LSPs), and interfaces.  The model covers data that is independent of
   any technology or dataplane encapsulation and is divided into two
   YANG modules that cover device-specific, and device independent data.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-37"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-path-computation">
          <front>
            <title>A YANG Data Model for requesting path computation</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Anurag Sharma" initials="A." surname="Sharma">
              <organization>Google</organization>
            </author>
            <author fullname="Yan Shi" initials="Y." surname="Shi">
              <organization>China Unicom</organization>
            </author>
            <date day="19" month="August" year="2024"/>
            <abstract>
              <t>   There are scenarios, typically in a hierarchical Software-Defined
   Networking (SDN) context, where the topology information provided by
   a Traffic Engineering (TE) network provider may be insufficient for
   its client to perform multi-domain path computation.  In these cases
   the client would need to request the TE network provider to compute
   some intra-domain paths to be used by the client to choose the
   optimal multi-domain paths.

   This document provides a mechanism to request path computation by
   augmenting the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-te once it has been published.

   Moreover, this document describes some use cases where the path
   computation request, via YANG-based protocols (e.g., NETCONF or
   RESTCONF), can be needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-path-computation-23"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8527">
          <front>
            <title>RESTCONF Extensions to Support the Network Management Datastore Architecture</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document extends the RESTCONF protocol defined in RFC 8040 in order to support the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
              <t>This document updates RFC 8040 by introducing new datastore resources, adding a new query parameter, and requiring the usage of the YANG library (described in RFC 8525) by RESTCONF servers implementing the NMDA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8527"/>
          <seriesInfo name="DOI" value="10.17487/RFC8527"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8525">
          <front>
            <title>YANG Library</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document describes a YANG library that provides information about the YANG modules, datastores, and datastore schemas used by a network management server. Simple caching mechanisms are provided to allow clients to minimize retrieval of this information. This version of the YANG library supports the Network Management Datastore Architecture (NMDA) by listing all datastores supported by a network management server and the schema that is used by each of these datastores.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8525"/>
          <seriesInfo name="DOI" value="10.17487/RFC8525"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-eth-client-te-topo-yang">
          <front>
            <title>A YANG Data Model for Ethernet TE Topology</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <author fullname="Yang Zhao" initials="Y." surname="Zhao">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>   This document describes a YANG data model for Ethernet networks when
   used either as a client-layer network of an underlay transport
   network (e.g., an Optical Transport Network (OTN)) or as a transport
   network itself.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-eth-client-te-topo-yang-07"/>
        </reference>
        <reference anchor="RFC8650">
          <front>
            <title>Dynamic Subscription to YANG Events and Datastores over RESTCONF</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="R. Rahman" initials="R." surname="Rahman"/>
            <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="November" year="2019"/>
            <abstract>
              <t>This document provides a RESTCONF binding to the dynamic subscription capability of both subscribed notifications and YANG-Push.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8650"/>
          <seriesInfo name="DOI" value="10.17487/RFC8650"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC7923">
          <front>
            <title>Requirements for Subscription to YANG Datastores</title>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document provides requirements for a service that allows client applications to subscribe to updates of a YANG datastore. Based on criteria negotiated as part of a subscription, updates will be pushed to targeted recipients. Such a capability eliminates the need for periodic polling of YANG datastores by applications and fills a functional gap in existing YANG transports (i.e., Network Configuration Protocol (NETCONF) and RESTCONF). Such a service can be summarized as a "pub/sub" service for YANG datastore updates. Beyond a set of basic requirements for the service, various refinements are addressed. These refinements include: periodicity of object updates, filtering out of objects underneath a requested a subtree, and delivery QoS guarantees.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7923"/>
          <seriesInfo name="DOI" value="10.17487/RFC7923"/>
        </reference>
        <reference anchor="RFC9094">
          <front>
            <title>A YANG Data Model for Wavelength Switched Optical Networks (WSONs)</title>
            <author fullname="H. Zheng" initials="H." surname="Zheng"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="A. Guo" initials="A." surname="Guo"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="August" year="2021"/>
            <abstract>
              <t>This document provides a YANG data model for the routing and wavelength assignment (RWA) TE topology in Wavelength Switched Optical Networks (WSONs). The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9094"/>
          <seriesInfo name="DOI" value="10.17487/RFC9094"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-flexigrid-yang">
          <front>
            <title>A YANG Data Model for Flexi-Grid Optical Networks</title>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="12" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a YANG module for managing flexi-grid optical
   networks.  The model defined in this document specifies a flexi-grid
   traffic engineering database that is used to describe the topology of
   a flexi-grid network.  It is based on and augments existing YANG
   models that describe network and traffic engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-flexigrid-yang-17"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-topo-yang">
          <front>
            <title>A YANG Data Model for Optical Transport Network Topology</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating Optical Transport Network (OTN) topologies.  It is
   independent of control plane protocols and captures topological and
   resource-related information pertaining to OTN.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-topo-yang-20"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-wdm-tunnel-yang">
          <front>
            <title>A YANG Data Model for WDM Tunnels</title>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Universidad Autonoma de Madrid" initials="U. A." surname="de Madrid">
              <organization>Naudit HPCN</organization>
            </author>
            <author fullname="Daniel Perdices Burrero" initials="D. P." surname="Burrero">
              <organization>Universidad Autonoma de Madrid</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for the provisioning and
   management of Traffic Engineering (TE) tunnels and Label Switched
   Paths (LSPs) in Optical Networks (Wavelength Switched Optical
   Networks (WSON) and Flexi-Grid Dense Wavelength Division Multiplexing
   (DWDM) Networks).

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-wdm-tunnel-yang-03"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-otn-tunnel-model">
          <front>
            <title>A YANG Data Model for Optical Transport Network (OTN) Tunnels and Label Switched Paths</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="3" month="December" year="2024"/>
            <abstract>
              <t>   This document describes the YANG data model for tunnels in OTN TE
   networks.  The model can be used to do the configuration in order to
   establish the tunnel in OTN network.  This work is independent with
   the control plane protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-otn-tunnel-model-22"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-client-signal-yang">
          <front>
            <title>A YANG Data Model for Transport Network Client Signals</title>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Anton Snitser" initials="A." surname="Snitser">
              <organization>Cisco</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="1" month="August" year="2024"/>
            <abstract>
              <t>   A transport network is a server-layer network to provide connectivity
   services to its client.  The topology and tunnel information in the
   transport layer has already been defined by generic Traffic-
   engineered models and technology-specific models (e.g., OTN, WSON).
   However, how the client signals are accessing to the network has not
   been described.  These information is necessary to both client and
   provider.

   This draft describes how the client signals are carried over
   transport network and defines YANG data models which are required
   during configuration procedure.  More specifically, several client
   signal (of transport network) models including ETH, STM-n, FC and so
   on, are defined in this draft.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-client-signal-yang-13"/>
        </reference>
        <reference anchor="RFC8346">
          <front>
            <title>A YANG Data Model for Layer 3 Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 3 network topologies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8346"/>
          <seriesInfo name="DOI" value="10.17487/RFC8346"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-l3-te-topo">
          <front>
            <title>YANG Data Model for Layer 3 TE Topologies</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Himanshu C. Shah" initials="H. C." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for layer 3 traffic
   engineering topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-l3-te-topo-18"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls-topology">
          <front>
            <title>A YANG Data Model for MPLS-TE Topology</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Inc.</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="16" month="September" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for representing, retrieving,
   and manipulating MPLS-TE network topologies.  It is based on and
   augments existing YANG models that describe network and traffic
   engineering packet network topologies.

   This document also defines a collection of common YANG data types and
   groupings specific to MPLS-TE.  These common types and groupings are
   intended to be imported by modules that model MPLS-TE technology-
   specific configuration and state capabilities.

   The YANG models defined in this document can also be used for MPLS
   Transport Profile (MPLS-TP) network topologies.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-topology-01"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-sr-te-topo">
          <front>
            <title>YANG Data Model for SR and SR TE Topologies on MPLS Data Plane</title>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Himanshu C. Shah" initials="H. C." surname="Shah">
              <organization>Ciena</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a YANG data model for Segment Routing (SR)
   topology and Segment Routing (SR) traffic engineering (TE) topology,
   using MPLS data plane.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-sr-te-topo-19"/>
        </reference>
        <reference anchor="I-D.ietf-teas-yang-te-mpls">
          <front>
            <title>A YANG Data Model for MPLS Traffic Engineering Tunnels</title>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Rakesh Gandhi" initials="R." surname="Gandhi">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>IBM Corporation</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <date day="26" month="May" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for the configuration and
   management of Multiprotocol Label Switching (MPLS) Traffic
   Engineering (TE) tunnels, Label Switched Paths (LSPs) and interfaces.
   The model augments the TE generic YANG model for MPLS packet
   dataplane technology.

   This model covers data for configuration, operational state, remote
   procedural calls, and event notifications.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-te-mpls-04"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-impairment-topology-yang">
          <front>
            <title>A YANG Data Model for Optical Impairment-aware Topology</title>
            <author fullname="Dieter Beller" initials="D." surname="Beller">
              <organization>Nokia</organization>
            </author>
            <author fullname="Esther Le Rouzic" initials="E." surname="Le Rouzic">
              <organization>Orange</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Gabriele Galimberti" initials="G." surname="Galimberti">
              <organization>Individual</organization>
            </author>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   In order to provision an optical connection through optical networks,
   a combination of path continuity, resource availability, and
   impairment constraints must be met to determine viable and optimal
   paths through the network.  The determination of appropriate paths is
   known as Impairment-Aware Routing and Wavelength Assignment (IA-RWA)
   for WSON, while it is known as Impairment-Aware Routing and Spectrum
   Assignment (IA-RSA) for SSON.

   This document provides a YANG data model for the impairment-aware TE
   topology in optical networks.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-impairment-topology-yang-17"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8277">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix. This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s). This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-service-mapping-yang">
          <front>
            <title>Traffic Engineering (TE) and Service Mapping YANG Data Model</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Giuseppe Fioccola" initials="G." surname="Fioccola">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Jeff Tantsura" initials="J." surname="Tantsura">
              <organization>Nvidia</organization>
            </author>
            <date day="20" month="October" year="2024"/>
            <abstract>
              <t>   This document provides a YANG data model to map customer service
   models (e.g., L3VPN Service Delivery model) to Traffic Engineering
   (TE) models (e.g., the TE Tunnel or the Virtual Network (VN) model).
   These models are referred to as the TE Service Mapping Model and are
   applicable generically to the operator's need for seamless control
   and management of their VPN services with underlying TE support.

   The models are principally used for monitoring and diagnostics of the
   management systems to show how the service requests are mapped onto
   underlying network resources and TE models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-service-mapping-yang-16"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8637">
          <front>
            <title>Applicability of the Path Computation Element (PCE) to the Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network (VN) operations needed to orchestrate, control, and manage large-scale multidomain TE networks so as to facilitate network programmability, automation, efficient resource sharing, and end-to-end virtual service-aware connectivity and network function virtualization services.</t>
              <t>The Path Computation Element (PCE) is a component, application, or network node that is capable of computing a network path or route based on a network graph and applying computational constraints. The PCE serves requests from Path Computation Clients (PCCs) that communicate with it over a local API or using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>This document examines the applicability of PCE to the ACTN framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8637"/>
          <seriesInfo name="DOI" value="10.17487/RFC8637"/>
        </reference>
        <reference anchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t>The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC8751">
          <front>
            <title>Hierarchical Stateful Path Computation Element (PCE)</title>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="J. Shin" initials="J." surname="Shin"/>
            <author fullname="D. King" initials="D." surname="King"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>A stateful Path Computation Element (PCE) maintains information on the current network state received from the Path Computation Clients (PCCs), including computed Label Switched Paths (LSPs), reserved resources within the network, and pending path computation requests. This information may then be considered when computing the path for a new traffic-engineered LSP or for any associated/dependent LSPs. The path-computation response from a PCE helps the PCC to gracefully establish the computed LSP.</t>
              <t>The Hierarchical Path Computation Element (H-PCE) architecture allows the optimum sequence of interconnected domains to be selected and network policy to be applied if applicable, via the use of a hierarchical relationship between PCEs.</t>
              <t>Combining the capabilities of stateful PCE and the hierarchical PCE would be advantageous. This document describes general considerations and use cases for the deployment of stateful, but not stateless, PCEs using the hierarchical PCE architecture.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8751"/>
          <seriesInfo name="DOI" value="10.17487/RFC8751"/>
        </reference>
        <reference anchor="RFC8283">
          <front>
            <title>An Architecture for Use of PCE and the PCE Communication Protocol (PCEP) in a Network with Central Control</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="Q. Zhao" initials="Q." role="editor" surname="Zhao"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <author fullname="C. Zhou" initials="C." surname="Zhou"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>The Path Computation Element (PCE) is a core component of Software- Defined Networking (SDN) systems. It can compute optimal paths for traffic across a network and can also update the paths to reflect changes in the network or traffic demands.</t>
              <t>PCE was developed to derive paths for MPLS Label Switched Paths (LSPs), which are supplied to the head end of the LSP using the Path Computation Element Communication Protocol (PCEP).</t>
              <t>SDN has a broader applicability than signaled MPLS traffic-engineered (TE) networks, and the PCE may be used to determine paths in a range of use cases including static LSPs, segment routing, Service Function Chaining (SFC), and most forms of a routed or switched network. It is, therefore, reasonable to consider PCEP as a control protocol for use in these environments to allow the PCE to be fully enabled as a central controller.</t>
              <t>This document briefly introduces the architecture for PCE as a central controller, examines the motivations and applicability for PCEP as a control protocol in this environment, and introduces the implications for the protocol. A PCE-based central controller can simplify the processing of a distributed control plane by blending it with elements of SDN and without necessarily completely replacing it.</t>
              <t>This document does not describe use cases in detail and does not define protocol extensions: that work is left for other documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8283"/>
          <seriesInfo name="DOI" value="10.17487/RFC8283"/>
        </reference>
        <reference anchor="RFC5623">
          <front>
            <title>Framework for PCE-Based Inter-Layer MPLS and GMPLS Traffic Engineering</title>
            <author fullname="E. Oki" initials="E." surname="Oki"/>
            <author fullname="T. Takeda" initials="T." surname="Takeda"/>
            <author fullname="JL. Le Roux" initials="JL." surname="Le Roux"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>A network may comprise multiple layers. It is important to globally optimize network resource utilization, taking into account all layers rather than optimizing resource utilization at each layer independently. This allows better network efficiency to be achieved through a process that we call inter-layer traffic engineering. The Path Computation Element (PCE) can be a powerful tool to achieve inter-layer traffic engineering.</t>
              <t>This document describes a framework for applying the PCE-based architecture to inter-layer Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) traffic engineering. It provides suggestions for the deployment of PCE in support of multi-layer networks. This document also describes network models where PCE performs inter-layer traffic engineering, and the relationship between PCE and a functional component called the Virtual Network Topology Manager (VNTM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5623"/>
          <seriesInfo name="DOI" value="10.17487/RFC5623"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topology-profiles">
          <front>
            <title>Profiles for Traffic Engineering (TE) Topology Data Model and Applicability to non-TE Use Cases</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Alef Edge</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Cisco Systems Inc</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document describes how profiles of the Traffic Engineering (TE)
   Topology Model, defined in RFC8795, can be used to address
   applications beyond "Traffic Engineering".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topology-profiles-02"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-transport-nbi-app-statement">
          <front>
            <title>Transport Northbound Interface Applicability Statement</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Haomian Zheng" initials="H." surname="Zheng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Yunbin Xu" initials="Y." surname="Xu">
              <organization>CAICT</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document provides an analysis of the applicability of the YANG
   models defined by the IETF (in particular in the Traffic Engineering
   Architecture and Signaling (TEAS) and Common Control and Measurement
   Plane (CCAMP) working groups) to support ODU transit services,
   transparent client services, and Ethernet Private Line/Ethernet
   Virtual Private Line (EPL/EVPL) services over Optical Transport
   Network (OTN) in single and multi-domain network scenarios.

   This document also describes how existing YANG models can be used
   through several worked examples and JSON fragments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-transport-nbi-app-statement-17"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t>This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t>Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="I-D.ietf-rtgwg-segment-routing-ti-lfa">
          <front>
            <title>Topology Independent Fast Reroute using Segment Routing</title>
            <author fullname="Ahmed Bashandy" initials="A." surname="Bashandy">
              <organization>Individual</organization>
            </author>
            <author fullname="Stephane Litkowski" initials="S." surname="Litkowski">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA Lyon</organization>
            </author>
            <author fullname="Bruno Decraene" initials="B." surname="Decraene">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel Voyer" initials="D." surname="Voyer">
              <organization>Bell Canada</organization>
            </author>
            <date day="22" month="November" year="2024"/>
            <abstract>
              <t>   This document presents Topology Independent Loop-free Alternate Fast
   Reroute (TI-LFA), aimed at providing protection of node and adjacency
   segments within the Segment Routing (SR) framework.  This Fast
   Reroute (FRR) behavior builds on proven IP Fast Reroute concepts
   being LFAs, remote LFAs (RLFA), and remote LFAs with directed
   forwarding (DLFA).  It extends these concepts to provide guaranteed
   coverage in any two-connected networks using a link-state IGP.  An
   important aspect of TI-LFA is the FRR path selection approach
   establishing protection over the expected post-convergence paths from
   the point of local repair, reducing the operational need to control
   the tie-breaks among various FRR options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-segment-routing-ti-lfa-19"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="5" month="November" year="2024"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  However, the data model is designed with
   appropriate provisions to ease future augmentations with application-
   specific and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-04"/>
        </reference>
        <reference anchor="I-D.ietf-ccamp-optical-path-computation-yang">
          <front>
            <title>YANG Data Models for requesting Path Computation in WDM Optical Networks</title>
            <author fullname="Italo Busi" initials="I." surname="Busi">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Aihua Guo" initials="A." surname="Guo">
              <organization>Futurewei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <date day="29" month="August" year="2024"/>
            <abstract>
              <t>   This document provides a mechanism to request path computation in
   Wavelength-Division Multiplexing (WDM) optical networks composed of
   Wavelength Switched Optical Networks (WSON) and Flexi-Grid Dense
   Wavelength Division Multiplexing (DWDM) switched technologies.  This
   model augments the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-path-computation once it has been published.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ccamp-optical-path-computation-yang-04"/>
        </reference>
        <reference anchor="I-D.ietf-teas-actn-vn-yang">
          <front>
            <title>A YANG Data Model for Virtual Network (VN) Operations</title>
            <author fullname="Young Lee" initials="Y." surname="Lee">
              <organization>Samsung Electronics</organization>
            </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
              <organization>Huawei</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Bin Yeong Yoon" initials="B. Y." surname="Yoon">
              <organization>ETRI</organization>
            </author>
            <date day="22" month="June" year="2024"/>
            <abstract>
              <t>   A Virtual Network (VN) is a network provided by a service provider to
   a customer for the customer to use in any way it wants as though it
   was a physical network.  This document provides a YANG data model
   generally applicable to any mode of VN operations.  This includes VN
   operations as per the Abstraction and Control of TE Networks (ACTN)
   framework.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-actn-vn-yang-29"/>
        </reference>
      </references>
    </references>
    <?line 2507?>

<section anchor="additional-scenarios">
      <name>Additional Scenarios</name>
      <section anchor="ossorchestration-layer">
        <name>OSS/Orchestration Layer</name>
        <t>The OSS/Orchestration layer is a vital part of the architecture
framework for a service provider:</t>
        <ul spacing="normal">
          <li>
            <t>to abstract (through MDSC and PNCs) the underlying transport
network complexity to the Business Systems Support layer;</t>
          </li>
          <li>
            <t>to coordinate NFV, Transport (e.g. IP, optical and microwave
networks), Fixed Acess, Core and Radio domains enabling full
automation of end-to-end services to the end customers;</t>
          </li>
          <li>
            <t>to enable catalogue-driven service provisioning from external
applications (e.g. Customer Portal for Enterprise Business
services), orchestrating the design and lifecycle management of
these end-to-end transport connectivity services, consuming IP
and/or optical transport connectivity services upon request.</t>
          </li>
        </ul>
        <t>As discussed in <xref target="mdsc-overview"/>, in this document, the MDSC interfaces
with the OSS/Orchestration layer and, therefore, it performs the
functions of the Network Orchestrator, defined in <xref target="RFC8309"/>.</t>
        <t>The OSS/Orchestration layer requests the creation of a network
service to the MDSC specifying its end-points (PEs and the interfaces
towards the CEs) as well as the network service SLA and then proceeds
to configuring accordingly the end-to-end customer service between
the CEs in the case of an operator managed service.</t>
        <section anchor="mdsc-nbi">
          <name>MDSC NBI</name>
          <t>As explained in <xref target="reference-network"/>, the OSS/Orchestration layer can request
the MDSC to setup L2/L3VPN network services (with or without TE
requirements).</t>
          <t>Although the OSS/Orchestration layer interface is usually operator-specific, typically it would be using a RESTCONF/YANG interface with
a more abstracted version of the MPI YANG data models used for
network configuration (e.g. L3NM, L2NM).</t>
          <t><xref target="fig-service-request"/> shows an example of possible control flow between the
OSS/Orchestration layer and the MDSC to instantiate L2/L3 VPN network
services, using the YANG data models under the definition in <xref target="I-D.ietf-teas-actn-vn-yang"/>,
<xref target="RFC9291"/>, <xref target="RFC9182"/> and <xref target="I-D.ietf-teas-te-service-mapping-yang"/>.</t>
          <figure anchor="fig-service-request">
            <name>Service Request Process</name>
            <artwork type="ascii-art"><![CDATA[
               +-------------------------------------------+
               |                                           |
               |          OSS/Orchestration layer          |
               |                                           |
               +-----------------------+-------------------+
                                       |
                 1.VN    2. L2/L3NM &  |            ^
                   |          TSM      |            |
                   |           |       |            |
                   |           |       |            |
                   v           v       |      3. Update VN
                                       |
               +-----------------------+-------------------+
               |                                           |
               |                  MDSC                     |
               |                                           |
               +-------------------------------------------+
]]></artwork>
          </figure>
          <ul spacing="normal">
            <li>
              <t>The VN YANG data model, defined in <xref target="I-D.ietf-teas-actn-vn-yang"/>, whose primary focus is
the CMI, can also provide VN Service configuration from an
orchestrated network service point of view when the L2/L3 VPN
network service has TE requirements. However, this model is not
used to setup L2/L3 VPN service with no TE requirements.  </t>
              <ul spacing="normal">
                <li>
                  <t>It provides the profile of VN in terms of VN members, each of
 which corresponds to an edge-to-edge link between customer
 end-points (VNAPs). It also provides the mappings between the
 VNAPs with the LTPs and the connectivity matrix with the VN
 member. The associated traffic matrix (e.g., bandwidth,
 latency, protection level, etc.) of VN member is expressed
 (i.e., via the TE-topology's connectivity matrix).</t>
                </li>
                <li>
                  <t>The model also provides VN-level preference information (e.g.,
 VN member diversity) and VN-level admin-status and
 operational-status.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The L2NM and L3NM YANG data models, defined in <xref target="RFC9291"/> and
<xref target="RFC9182"/>, whose primary focus is the MPI, can also be used to
provide L2VPN and L3VPN network service configuration from a
orchestrated connectivity service point of view.</t>
            </li>
            <li>
              <t>The TE &amp; Service Mapping YANG data model <xref target="I-D.ietf-teas-te-service-mapping-yang"/> provides TE-service
mapping.</t>
            </li>
            <li>
              <t>TE-service mapping provides the mapping between a L2/L3 VPN
instance and the corresponding VN instances.</t>
            </li>
            <li>
              <t>The TE-service mapping also provides the binding requirements
as to how each L2/L3 VPN/VN instance is created concerning the
underlay TE tunnels (e.g., whether they require a new and
isolated set of TE underlay tunnels or not).</t>
            </li>
            <li>
              <t>Site mapping provides the site reference information across
L2/L3 VPN Site ID, VN Access Point ID, and the LTP of the
access link.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="multi-layer-and-multi-domain-resiliency">
        <name>Multi-layer and Multi-domain Resiliency</name>
        <section anchor="maintenance-window">
          <name>Maintenance Window</name>
          <t>Before planned maintenance operation on DWDM network takes place, IP
traffic should be moved hitless to another link.</t>
          <t>MDSC must reroute IP traffic before the events takes place. It should
be possible to lock IP traffic to the protection route until the
maintenance event is finished, unless a fault occurs on such path.</t>
        </section>
        <section anchor="router-port-failure">
          <name>Router Port Failure</name>
          <t>The focus is on client-side protection scheme between IP router and
reconfigurable ROADM. Scenario here is to define only one port in the
routers and in the ROADM muxponder board at both ends as back-up
ports to recover any other port failure on client-side of the ROADM
(either on the IP router port side or on the muxponder side or on the link
between them). When client-side port failure occurs, alarms are
raised to MDSC by IP-PNC and O-PNC (port status down, LOS etc.). MDSC
checks with OP-PNC(s) that there is no optical failure in the optical
layer.</t>
          <t>There can be two cases here:</t>
          <ol spacing="normal" type="1"><li>
              <t>LAG was defined between the IP routers at the two ends. MDSC, after checking
that optical layer is fine between the two edge WDM nodes, triggers
the WDM edge node re-configuration so that the IP router's back-up port with its
associated muxponder port can reuse the WDM tunnel that was already in
use previously by the failed IP router port and adds the new link to
the LAG on the failure side.  </t>
              <t>
While the ROADM reconfiguration takes place, IP/MPLS traffic is
using the reduced bandwidth of the IP link bundle, discarding
lower priority traffic if required. Once back-up port has been
reconfigured to reuse the existing WDM tunnel and the new link has been added
to the LAG then original Bandwidth is recovered between the end
routers.  </t>
              <t>
Note: in this LAG scenario let assume that BFD is running at LAG
level so that there is nothing triggered at MPLS level when one of
the link member of the LAG fails.</t>
            </li>
            <li>
              <t>If there is no LAG then the scenario is not clear since a IP router
port failure would automatically trigger (through BFD failure)
first a sub-50ms protection at MPLS level :FRR (MPLS RSVP-TE case)
or TI-LFA (MPLS based SR-TE case) through a protection port. At
the same time MDSC, after checking that optical network connection
is still fine, would trigger the reconfiguration of the back-up
port of the IP router and of the muxponder to re-use the same
WDM tunnel as the one used originally for the failed IP router port. Once
everything has been correctly configured, MDSC Global PCE could
suggest to the operator to trigger a possible re-optimization of
the back-up MPLS path to go back to the  MPLS primary path through
the back-up port of the IP router and the original WDM tunnel if overall
cost, latency etc. is improved. However, in this scenario, there
is a need for protection port PLUS back-up port in the IP router
which does not lead to clear port savings.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="muxponder">
        <name>Muxponders</name>
        <t>The setup of a client connectivity service between two transponders
is relatively clear and its implementation simple.</t>
        <t>There is a one to one relationship between the tranponder's client
and trunk (or DWDM) port. The client port bitrate determines the
trunk port bit rate which will also determine the Baud-rate, the
modulation format, the FEC etc.</t>
        <t>The controller, when asked to set up a client connectivity service,
needs to find a WDM tunnel suitable to comply the DWDM port
parameters.</t>
        <t>The setup of a client connectivity service between two muxponders is
different since there is a one to many relationship between the
muxponder's trunk (or DWDM) port and client ports. For example, there
might be a 100Gb/s trunk port shared by ten 10GE client ports.</t>
        <t>The controller, when asked to set a 10GE client connectivity service
between two muxponder's client ports, needs first to check whether
there is already an existing WDM tunnel between the two muxponders
and then take different actions:</t>
        <ol spacing="normal" type="1"><li>
            <t>if the WDM tunnel already exists, the controller needs only to
enable the 10GE client ports to establish the 10GE client
connectivity service;</t>
          </li>
          <li>
            <t>if the WDM tunnel does not exist, the controller has to first
establish the WDM tunnel, finding a proper optical path matching
the optical parameters of the two muxponders' trunk ports (e.g.,
an OTSi carrying an OTU4), and then enable the 10GE client ports
to establish the 10GE client connectivity service.</t>
          </li>
        </ol>
        <t>Since multiple client connectivity services are sharing the same WDM
tunnel, a multiplexing label shall be assigned to each client
connectivity service. The multiplexing label can either be a standard
label (e.g., an OTN timeslot) or a vendor-specific label. The
multiplexing label can be either configurable (flexible
configuration) or assigned by design to each muxponder's client port
(fixed configuration). In the former case, any muxponder client port
can be connected with any other client port of the peer muxponder
(for example client port 1 on one muxponder can be connected with
client port 5 on the peer muxponder) while in the latter case only
client ports with the same port number can be connected (for example
client port 2 on one muxponder can be connected only with client port
2 on the peer muxponder and not with any other client port).</t>
        <t>In case of flexible configuration, since the two muxponders are under
the control of the same O-PNC, the configuration of the multiplexing
label, regardless of whether it is a standard or vendor-specific
label, can be done by the O-PNC using mechanisms which are vendor-specific and outside the scope of this document. The MDSC can just
request the O-PNC to setup a client connectivity service over a WDM
tunnel.</t>
        <t>In case of fixed configuration, the multiplexing label is assigned by
the muxponder but the O-PNC and MDSC needs to be aware of the
connectivity constraints to avoid try and fail.</t>
        <t>It is worth noting that the current WSON and Flexi-grid topology
models in <xref target="RFC9094"/> and <xref target="I-D.ietf-ccamp-flexigrid-yang"/> do not provide sufficient
information to the MDSC about this connectivity constraint and this
is identified as a gap.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Some of this analysis work was supported in part by the European
Commission funded H2020-ICT-2016-2 METRO-HAUL project (G.A. 761727).</t>
      <t>Previous versions of document were prepared using 2-Word-v2.0.template.dot.</t>
      <t>This document was prepared using kramdown.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Belotti" fullname="Sergio Belotti">
        <organization>Nokia</organization>
        <address>
          <email>sergio.belotti@nokia.com</email>
        </address>
      </contact>
      <contact initials="G." surname="Galimberti" fullname="Gabriele Galimberti">
        <organization/>
        <address>
          <email>ggalimbe56@gmail.com</email>
        </address>
      </contact>
      <contact initials="" surname="TBD" fullname="TBD">
        <organization/>
        <address>
      </address>
      </contact>
      <contact initials="A." surname="Snitser" fullname="Anton Snitser">
        <organization>Cisco</organization>
        <address>
          <email>asnizar@cisco.com</email>
        </address>
      </contact>
      <contact initials="W. C. P." surname="Correia" fullname="Washington Costa Pereira Correia">
        <organization>TIM Brasil</organization>
        <address>
          <email>wcorreia@timbrasil.com.br</email>
        </address>
      </contact>
      <contact initials="M." surname="Scharf" fullname="Michael Scharf">
        <organization>Hochschule Esslingen - University of Applied Sciences</organization>
        <address>
          <email>michael.scharf@hs-esslingen.de</email>
        </address>
      </contact>
      <contact initials="Y." surname="Lee" fullname="Young Lee">
        <organization>Sung Kyun Kwan University</organization>
        <address>
          <email>younglee.tx@gmail.com</email>
        </address>
      </contact>
      <contact initials="J." surname="Tantsura" fullname="Jeff Tantsura">
        <organization>Apstra</organization>
        <address>
          <email>jefftant.ietf@gmail.com</email>
        </address>
      </contact>
      <contact initials="P." surname="Volpato" fullname="Paolo Volpato">
        <organization>Huawei</organization>
        <address>
          <email>paolo.volpato@huawei.com</email>
        </address>
      </contact>
      <contact initials="B." surname="Foster" fullname="Brent Foster">
        <organization>Cisco</organization>
        <address>
          <email>brfoster@cisco.com</email>
        </address>
      </contact>
      <contact initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
        <organization>Telefonica</organization>
        <address>
          <email>oscar.gonzalezdedios@telefonica.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+y9a3MbR5Yg+p0R/A+16ohtYg2QIiX5QXf3NEVRtmYkkZdk
2z13tesoAkWy2gAKU1UQRVva337PM/NkVhYAyfb07A1zpmUSqMrHyZPn/RiN
RttbbdlOi8PsL9tbWXa0WEzLcX5VTsv2Pquus6Orpq3zcVtW8yyfT7Ljat7W
1RS/uqzz6+tynJ3Mb8p5UdTFBEd4XbR3Vf1jk+0cHV++HmRtlZ3l4x+LNjtd
tDD0NHsxb4ubOqchd85OXwy2t/Krq7p4e5jhKxl8tL01zuGhqr4/zMr5dbW9
tb01qcbzfAYLncC87ags2utRW+TNCFY3Hy2qcpTbxY/2H21vNcurWdk0MFN7
v4BXX5xcPs+yP2T5tKkOswflfFIsCvhn3j4YZg+KSdlWdZlP8Y8XR0/hP1UN
v51fPn+wvTVfzq6K+hAWAkuD/4yreVPMm2VzmLX1stjegvXDlHld5DD0ebVs
y/kNvIfQuKmr5QI+jUEGT2RH9fi2bItxu6wLAvFFeTPPp/zyj8U9vD+B6bJR
Ni/etdlNMS8YePTZcl6Oq5p/bxZ5/SO+mE1KOLXyatkWk2xaTG6KGpZXzJe4
7iz75NVkGYPxwfewJ3z6GxyJvpjl5RS+wAP5Kx7NblXzGzkMCF/ctu2iOdzb
w+fwo/JtsavP7eEHe1d1ddcUezjCHr15U7a3yyt4F09tdHlydDH6/ps9PW16
ZApH0bRmePvoLg+wW1bupb3NcGf3tp1NHyDS5cv2tqoJaiP8J8sYB5/Dk4DY
Rb386adyXvJXsJXD7PLFK/6rYJBc45O7C33yr20xLcbVrGwBqPlu2Zqhyzng
0r+Onu9mT6vlfyxLPDU/5b8W+Xz0vM7n46psoido5u+qSX5dzYtg+n8U19e7
V/LwX9/KI7uwgs6eXsCSquzpsrHb+XaZ3xVlMCQuvdq9guf+ekvfJkd7ls/L
Ypr9G6CJGe50OsmeVTdIRprltHVfytATeumv1XQyqW5g2N3ljz0DF9lxMR7D
ZZtO7XKPy2ZcJYZkZPvrDX7Gy6ULzJckdcAXRX0DJ/y0mFZta2d4Xf1Y5sEM
DT26e8WP/nWODyRB8k1+VdPSv4GzR2LShoC9ueHPn3xuFxoNcvn0Weezo3kL
tPRiXrZNgBFdaOTNvPwpr/86xm+S43+fN7dwLDjgcdW0OSJ5UdY5/FXDL3mI
6tnTOm/KaTDH3Zif/GsLm6GvcaLdq7oz16tyfJsDklzAf+pri3XV+LYZ3y4B
VidNg9SnmAOB+9scyEbdKGvCKwsE7mJcFvNx0QSLmPHQuw0N/dfbZlToQLuT
orOSf6+WQM5eFoVZxAV+9G/3y3n2b3f53EweTHSPb06LYrd9t+LU/hWuYXaZ
z9tmWVsQHi2QvXZubAtPdjA2GvIsr+C6fldNF3lbrb6xC3x09y0/uurSPq2B
FWbP4dzX4NFVfU0PJRGJ6NjpbvZNNf8pnxY/ZZMie1ZWjZ3ptIHL2/MEIxdc
FCBVQJODiSt8b/dG3psAy64aoqn8rN7teVXPgEm+ZYb34vJvo8sfvtn9/KvH
u/uHPJ5IPQ8uFsDsahBLbupy0mTXwPG/f/YqE36AfBY28ww/uq6L/1gCpt3T
ow94GMMg3NJRwKnn9C6Me8kEf4acmoUewCTi3vBDskR2Om4rIAfZwcODh/w5
3OOyaFD0OeTVZ+c0CAgrPIZsRvaS1zcFsEHlgnd3d8BZlrvlvN2ri/He5ej8
5Hgkr4xwlv2HoxcEmZOTkx++fHiwu3/0NATMX3RL+Eh2ARg5yesJwedlhWIc
CgezAoTBRQU8Ey4ISj4go4j4N9L34VUnPb6C88qzozHc1saJkvDfOZxB+Rbv
9TPEJ7hn96vA28AaQbZBInAyxeMrdUH8J6JC48SaxoL6FcoaAOj9zxOAxp0K
MEb+kRi6ZVEU7xbTqkamAhcfJRgQTpdwOO3eF48fPfpq/0kE279HSPepMM1e
lvMfs6Obm7q4IaiuxMJfAKZnxbiYMUruP14Jqb+P/CMfB6mHT57sf/UF3lYc
1N/X7a3RaJTlonjg35e3IPHoixkK3uUEFpy1t0WWb6ixbG+hynLS0U9yK/Cu
VFa2t0hbAfJGE6P4gAI5DPvibO/V2csLmq6SF0siAjwZsJ1dEK9go6hqlNcA
Rxri349ef4MAz7NZNSmmsMfiGs5ikl3d0/ekrsCamuViUdUtfFbCKYHOMq3u
CRR5LK03QM1KlOmbcTHPayCOGYhIxVvgJzgQSDVvyzEwubO6eksw3EX4nrwD
fQHleZpwUVdtNa5gOTiiXR5gY+a2wHhb5OPb7a0ZynIgUY9v58Bpbu6znQWD
Ea+ygmTgFpXdgWSe5X6113C2TYYgxm2/OnuR7byiIZ9VQPbnum44S1CGSiCt
MDOeFe4CtTtcuxzs9pYc+BQxhEjxdT4uBnJqpGFasO0qws3KyWRa4F8/H2Z/
KHGMD/jXH3CQuposx4wEiI54+rPFtIDLBVevmjGFA0zAKWb5PL8p+HwAgGOv
MXfBD6pjPm/ocN0t3xF0GirghkwXyjFoSPlbeL37EmBlk71FyZxOZVYUdJ6w
CpBNUSEE9jnnE7stb25HV/DXXTmBU1g2sJm8KZohoOx4upzg40++oSmvSyQB
Y0ufG94C4g2CYZV5YM1dg8fx5sv5AOfNx3iHgfzwvfZw5WslWi8OzcB/p/AB
NQ2e0Evo4NjegnZ6c5s1SmfNZBFm7wqNyadTUEIBMwE2RQZQviHqKUO6zcPQ
OdAhoM9X8BRKBU1Lt5bxF24rgG2a3+MBXy+n1+WUtPJ8OgOhCea+z4AkTHBk
GRGU9LcF7APHKmvCHXizrmaZo/4ZjIn3BYlktlPsAkVZ3N43RGsmKpkOt7dQ
JQYZZZi5Ix7CVVnQtRxmRTveHSAOr7PJID4h/5kA6RjD3hRNCMnZbrC9VXjD
AdC3OUFtFLAsQN1MSIHu4wpGgb3TddzeeiFkEu8yUR1E/wFjfHUNW8mIEChN
yl7mV6gwAAEZ35L2uIOHPkBDzUVxQ5dOTC/ZzsU5DAT7aO8XuMnpPZwVaFg/
yfTVAjeTw5VWmt25V3zQsPcGOOIcdv893L8pbBsuzrOSac/2Fq8QEJJmRVlx
sKOsAEVAmBhAqaC+dJM4irVzCreD8GVA5AhAOUMsKZQu63I86QfIIqoJbHE2
/NNdCHcJkGQXzkBnrlKB98GZv6b3u9kRIn5doF4+JETGS4pMEcm64Nn1NXyK
yhZgfntXFExUHeFHxka4CQPA5WvxAuBlzXFuINgK6IbOrwCypSsnnRHAMp+Y
/QYYRo8upvmcqD1ISbfVRGfjqz2aMLdY8At8rjPQdwmt4YsXZ8MMb8oSOS0Z
tZgTuYtUwlLLmq8fPI9HCTsB3EKJ1G0fWGk5K4CbgQrSDAjz88mkxFmGGTAy
IFy4cVg3LJCpBHBt97JCLrenB08pcGTzfAfKFjF4XoHwsJyjBkCYS9exwiOC
lc0nVU3LvYJPMoZBs5tdEj4YqgmPNwWaPZh4msmjmRucki8fKO9VMYGlNPq6
YfIyVSZUywgfPwLFA9rWsnhx6RB1L5ops7JMQOWbApBGyH9dIKMokOaU+CRx
OLwfcJ2bCvf6vKybdsgAGOcL4oMgeQJoSuI1O8dHZyd/HzCjcJPED53iM4CJ
y+kECXtT3sxxOzleD5gLJAAh8qVSS0Cg/lvowLkLpAmYKIAxlpMAt+aAhoWj
0Kg7A39m5gLwRMq7ALpULa8A126riikbI30+zesZHihcnSntiO+TAtdDU14Y
q/gkGIHHB6eMFB6u2ltEeyG9HYGuur6OF4rPV3AtcKlwcUCkgVGUof3HMieB
XGaeFMj2ZVrHrkiUB6ILqwDhpeI9NAPmxnUCXsp6MksXcH68DyQ1vEX7MsDK
kxDAB5AsYLJZhbRQsWh63wcVoEOwL4YnXm7AGne7F1bixPGvSWAQUaABMExZ
NgYUFQkG3SI5iG6g8YpIIPPCNQbhuQS4e149quYjkdVYxIUjRN0IhyAJDCns
ZEn7NqcHZAyowF0z2O2qS8S9GENHzHu7jpts5/JkoMIIoMK7HGkEE5GGucCk
aMY1yIMTpAUPLk9Gi7y9fcDKkJluN/vbHN4ENYXI010Jrzco1E2GTEFQLnRy
1Cy/R7gB0qPFqySutGxwc+cX352NYBaRFoC7n7s/h0gB7vKaWAVyBJC5AUXy
ednMPMUhSf+6zmcFXQYAFF4hYTYivHfwy+M+01Vz1xk5VlFNFTjzzCov21sp
7WXn1bOLY7lsiTGtZrO9JYJCZjWbnbPXx8nz1oMCrKxLYbdOGUTSCeIdy5ae
dPl7SygayJrEhUK9VQj+JLg621vK2BL7EcwHhBZKQasIqT/yayFYinh24awh
yukopw9Ey0ZHYCTNs/GU+AUcW4ckd+EGWtv0vlEMQVH3jkQgQ+DdSYtCroqv
rAYwGy+F470RejjGUpTEuXOSL5ysNiQhEXBWyfcOyiYgRLH1kcVD8kjmAgT6
aHsL3tmjR+RFYIfLGmdAgjfM7FfdRVyX74rJCA2aOPI1CrFwTegDgtGr/hsi
u3ZnNAxEe0ASkRXdDg0Ngfd+/tk9MZIHPnyg4UnYcmaLaxLtY8V5GBElGnCi
xkMZ6OefgcFclzcfPtBenou9wi156CXs1ZaPoTHduMU3LY7uproHbfHDB14X
4RLqGWLoAFkGkGEJ/Hp7y2GymjpWWibcmjukym8C3w7R+CdA49vqTiVF0rT6
tV81XKRXcATYPpvl9b0+dpMvmiwEB7EAvkAlSY8LPif8cnuLjmE8XSI9a+Qs
/jbHU0TNXIUoUoFJJxZ9XQV3FasWwEIROXkBdyBibm/dFtMF3PUG7cn4zDVI
hKW3BVri3U+dtrfojqg4G+tueCf59uFW4ZICZxi11ajo8AolooGUYGjprlqX
4CRmDVuX/pBdwh+lyoNJ7u0Op/WPOlshYeN/O39+/OXjJ48EuoFG0qYHvK7Q
2EHQ96PS28eiwiifPtzeOiSSZjauWyVGcnyCmHZ8Qm+/Do0l7uUzegj+5Tu5
5GOxVicS33Fpkb0FjRrIlXa+O38OF//8EpkIkN89kN5Rj0Zj+Rh5UzCy0y09
/fH6vQxIZhQRNbKXF2eozRH8eVEMKfIU+3GzHbm7sBW0Qw/0XrgLBvtE6YTB
fHwC+j3N893Lo9dD0EHxaIB6wE5qsVQ46waZZ5g3xWoWwRE0gJop4oNGTSBZ
RyN7MHTIgbJaXdygp8AjypOD/QOkVJ6/IQaYBxu2qrPOvvMNW1jUjqkKJlmR
Xh9nz/zykMwpNBTmS7zo1giaZyjgwTXGl1nyGxdoHsd5m+XVP+Cu4LzMhhds
2cfTlYHxtbvbEkii2XjZ6BTTghnXGUDK4Z5T8JFotfds1iFsmJUt08O6GBdw
RRv/bEORL41cKDlbGvLIPwRHgXaPDccW9YWGRFcOjzZHClaNy5BOAfisxdKZ
HIt3KOreFE4XmoAoNkYLjiy0zpU1T3WKnH4Nhs4n/4BxgSDMq4kOjyEMiFAM
/AZEZ4I2j+bh8MuH98YQP764IlAqQXugG/yoO7h7yMOHXr4gxLJMMjHcPPxw
3cDIqfW00ZCn+4J7LBautJz068wsuJWeeCj3oHQCqbiOYDxSOHvX08Q2p3Y5
nxdTMiLxopgRrBxk9abyeWJPGbFzvwVdRs+TScA7uRoQq4uT/xkHvgKbRzE+
d1GytDf0n7Fcf7dH0e3uIPFvsNaVGL3RUn9ztIf1rKI+8HVEdwIMDN52f4ZL
RYtZL9ZugjcbTSKMdrMD3QABNpu0o6ismfMP2bnqgeoRCaNQf/5DV1Fcob43
oEdgPI8xLkT2D6cAgO7c7/+aC5qR4H1bwpiwKJI0eGSSjiSKECSbxMY7qrLK
RKQVIio5BUR1DxJZ4QtRUuRjsr+D7Hc3ZyEOhNERwMSrzRQ18X/gBx4cl+Uo
r1uNBen7+Wzkfj5b9+x7+B/aq/DXzcb9bKNxZfTUY2Z5IzOk+0//wt/3/B5+
Eb35mV908HvfF9Hr74VA7cNv77NT97v744C+ONPff93ZP33bnQfe2C/20m/a
E3AnEby61/MQjXF8sg8PnMG/9ufp+T6O8N4MsQcfHgQPnZ0cwEPHJwc0UDUa
7cGoVbQd+Hj0ZvRe5ny/6qFRpbvCxR9GzxzSMnRF71c85GDzBj84+7dLubiA
A/jAXmZH6Tx0wA9ZAB9GkDtEAAeDJB8KMSO11GiQxEO/5gjJNQq6ZB5HVm5k
r28ZfB578Yf27zc6Cj5V7YY/DiXeGERPPvTGYknmhAd/xjKH3oDoAcXhAE36
fvZWfx3hSc/PZ6u/JvAit2BjVMRNOEjxzw86XPnBh8C1Yg2Fwz5rFMVfLBu2
JCir5DC2j2CXZKcgK6jwbiSjO0RNMVAF42YwdICtg8ji1RaA5hFUwgN2ShOZ
MU+VCdOopzIq23jyK/RVeKcnOrtXTuWDSUSuzrz321kYvalCI/1oLz5Y4GjZ
VvNqVi2b7OK+aYsZhlBdFOidDQD9LwDo/a8ePURAw1pefHNGEaOoGYKIUUo8
HUnQ7BmBh9RLoIdppG8b0xEvmT2c4jU4usAEFLTS3m9vncvbsMKn5xSJc4Qh
QE+rGi0//C18Cd8ddtyFQzawUVJTOWY7VPQijmmQqC4WcAQo1akbZZ7hxBSm
gb8/PXdbI5kleWbqthLb891tNS0C5FsR02gsxwPvczky4Q9iwDY292zn1RkI
lQu0tAI+0sJase/k41YkQrTjqy4pvo4outG4AAFV9xhtBn7D5E7QOQVQHMgl
gXoERMFmWAAuZAjS7YT8jH6zI7eZnIzXTWzWQyDwa248jExt85LCWCmqAr4T
UylZaO+z8W0FC8oweLnu2P0xC9AHEzqlgi+Qcw7YZwQnqyuYlaJm0f2EIRUi
aOEaWfwKDbgYWTIrWuOKF3cFI+OiatGUB1c4iHz0ho17NP2yJnkPMgp5BZwj
VQDkArkCV5gPzbhOifFDCffJmwZux4S0YQ6IJiAI+brim1cWyQtrva5Oq6jZ
iH1TL8lFD8vi4CHMLQRiUc2LmGkJ/Bt6rwsEQzTgYXyf5p2DWo9/BMTja7cD
CSibV1G8lhpTWUfXOaJd7EZ6dvQWefJoBQSxLBvFHh/n3yl3Czhz/fbpeSMW
B0ZmfNdbdMJ3gYJxEINYE2o0URMdtxvCEZyei2T5TJ5nohxSwK97Vps6x2jl
egKkyWaBYWzFSteZSJRzZGvWOXZeIpACGu+lC6M9wyXjCMcnQB84/APfgask
++hfck4JI5Tw2QtHjuPOsqPplNfhYvqM37MNEc9PpDCA2999j92gU3TG36iD
6s7bkLrBj9n/c/H8bPTsWfb/nmePHz78ZsCBxcyNlRFTNIQSHnJALqbLmxsK
XgpNZm3ApTk205o3iDQDZTUD0OIaCR3M7ouWYnPJ6AZfkYvkkggTBtBRjCwa
3ig82a+P7yq/Dk9OiGNwdLsjd+nwwbn38izn7CU24hDQPIpMyPXL7S0XXmyd
yLDfRqhy1oxhXbzT+ND77EDO6MOyXi6I0eHrej2HmC9u7YndIA727gcGrR3+
6+hij39B+QvEtGYJkmXeAHqPnp4P8T9nQyA1+C8wJzengYf3IUb2Nj6IfHqX
3zcJkx4/Eqy8+5DH75DGbuDZMAdWXqfuj2VCMcUiqswYew/cRmJPVJbTvJZA
6ncxwhIkJuZeyqzfHCWKkBx6ktFdYyDaCrulmBl8kUxvocz9YvSMcjNH43E+
W4xkuJGPHR6pRDTSmBAOA5m7eAQY6/z0CHMKl3OSZZgW0mPAMDTwxzwehahT
9IQwVooZ4rXSAOYtiShiki+M3M25bsp4hVWdXIULaphNmvEIw2/elsWdBje8
skfbHwjnpwll96S1MyXSByiUimBFQcbEeUpE5kxC91dKTxiix3Taqa0UP7AX
TPryYO/lo+y7s9dx+EITpIhQwsHpxcXeaY0R8K3IpDQgR/xQ2geF1E4pE0SE
Vh9GwhE/BnXEeyzxRttbBLsoNsrr5Bp1SWUgkDKrsCMu5H0WuWX1IxtSPKJA
Y0z98pMjmwaFJF80LAZVWQ6ElCjQEDjKHDMZ4QJH+xmGEfgtR5c4ocLH0gjs
GnWiT3zs4vGrF9mOC1ahTft8L2ZN+SRfOC3PhZTpAUnyDzozJOSVUUsUp4I0
uOw5ag5FdsBCexRps09vR2eFFAV0HWTJSOUWAAGmWAJShWIcoJIALwHUi6P6
hYYblEyhUPUKThsNA18+eviVRKehQC/x1493uxvJXszFKIM8eOj05gnmHC8q
f7Co641YF9O77NG4qode41WYOynxbZnroUlmA4/okmDsQJkdJhfgAXm6Jd3H
owxqv4StVtW2/Ci1Sieq9kzNMpMowD0BVnTsrENtePYEU0PljJ/8AabkAVdl
wOKDD5gsjr4ddAjdwnivlFJ1RBpL6oYBMJneg4rmrF4PQDJNTv5yoIoxRZtb
WpeO+8VtnrIhi7XBQu11PF7fcBFptsOJXWynKXj3ek3lTn5FdgN7OoMNjger
/5gzAhy/otQGPSV3LdmM4A7NqvTjZU0XMgj5A3b4xyadrCVI/BrEHSDQZDxT
kwrbYDASCmRsjpA6fg2fuLQ1ovd1wSl5/cxDb3HGl9hth8UuBwfSkVmHUKNS
OJrbL8k+MTmxhAZtJZi7ccB20kC4d9MjnW/8lY2ZIyc99lD4VXzy0vDAXAM+
V7zkrr2jFAAECtQzJ1+jcLokeVj1IGMKwzOLBVDKK2cJFGsLRTAINBOy6oiq
RfgVrhTQ24HCrQhpCFyg5aIrXzge6TMPfBqEWahZwx8bXrQX7DnD74400Rnc
AlinprVwWjBqT3O/njViFYVOlpzJIaI0oKV8gNKP7HDtEcvGl4vtrRWCFYFS
08/6JLNwiSI0Z0bG5OUR0Gcm52bFgDaxkIjdHqWk+Xwck63DwZ91ocGeGGa6
vaX3oayt+OY2RkBfLFt6g7Iyq2U9BpSalj8WKGBdl1ekkc2DaVGg0fSgPJEg
hNTxb3MawwXwcn6yM8Zj3oPLa1ILgMolLNxFxxCGO+sBB5eZyc262wxztGyU
tPj3UWpfb0KHS3MXa4A524iboTGkLm9uKC+KIlri/Sa3mLrR4RZRR3q7mMcq
UqQjeWxX6nzhKCWyOtSGcBTUMV3ugX6I6SfwoVqVci/XElu5XV5l/x1kkurH
0NlhJhW8rAuMb25MiDC+e3aS7Zyd7D8aOP5OYwGj5C8eD+i0jK5NrqfAhjr0
aZLEn3k1ZxglfXZy8Ih8PTJA3meH3U2Fu4hflB2c/Md7DDZ4xI5qkUSehU5b
+Qm/PAiGyn5I/NiXu9/K+zthIEbwM3C/7SS+5AF2KLAEd0Br3H8iXz8939/3
I+zgBwe6obODx2YIHPt9sF7/O3080DH8Q/4JGoOWRw7yN9kP9H977nf+WHct
D2XWiY1D8AbfuEfkjz33m/e/+4fewPh7OgSOgOiVZYf4eQStPQdRXavEAhzi
eHYM2eUhzwQQ/Vw+DIaAP8MpfqBhZCu6y0PZ5iiD/wsB4UBxyAA7/MG9JYMY
YISg0D3jQgKImQfc0e7RTg6zzEY/HBJ+HDB+7ITfu/gNRTA7euKHhwDssmE4
eEvfM0z1hqSX4YagUcwK7DLoij6GP3YAxnQ8/o7Rv/6iZPiMfA5QdRd9/SLi
D/hRnPrg0fqItlU/ltr4kTdfhHtTdpUAQHR7HQACUiMA7pt6EH5waL4bOGLl
ZnBf2rkH3ad2d/H/LbnSW0HXN9Mr/CZ7fYIYKfhEgzuKIktxSA2P7ium8zKi
e0B34/XJwb7/wtMaWeGhv6eZUioTVTPwCOlJT7gMQxXeHP7g6PgbBYlQm91g
aZ5QZJ5UeEJp6CetRsZIfulgakliREHxj4FAPv2lO9vXykXwt8duwfDHk8yc
LYD1wHwJt8ONIZev78dxo9R3jjnrj4bdprlx4okDHMJfFj6FP2eddJTGPSPI
+eeMkxhY0gsfYYjzMGHSTBPHR6nEpcFRgciGcpMLqhCBi4Ol/uvKKL9QRPnl
EsonCyg/JOWTb/0F9xQhkk8QHzhmcHf3DWFHLJ5QzF9CPGFk2sXbfriX+QcO
I+mEFxBRfH55EIPRE+eOcJL9cKjSCX3Ijw48GMwMP+CzTja58LIJ7lGBQCtX
MGSZIYZMKS/gg6RocrhSNPHLWCGa2MUehqJJBxqhaLKChwaiift2lWgSLMMN
ES9El2Ekk0OVTADQ/m790JFMDt03/aLJ6j2Zb7qyyWH4wKqX9adXOLGPrViG
J5Rm5/53lUb05wcLA0tkrHCSmNqQCf+NXBovnBxmXh45zLJ+4eQwpH2xcAKj
voH/4Qz8Ryic0I+jFNkK4cTpEb3CyaGV3kPpxOy089OhFPqgEU4Ojbbmh9Cd
6whKLHA7/Lu9oEAgkNwh0Tu0tDMhmzioHP5C0eRXkUx+LcHkV5dLgAshCf5z
9u3yKvvu/Dn+ReYN+N08JlwmkjsuT4DFt7cw6c/IUYfIAIYEFPoXP4DfP3QF
nEAI0lEOdBREWfr3YEiK4TDr6jvIrofEo4eEvPQvTnjweEhE9UNKHkJjU688
pLVQQnnIm5ypfhcXWdCyMOKeSBumqASHVgo4FB/P02/ORi//lu2Ig+Lgiy8+
fBjIdwFUJMU/9RXVFVpjPCwjCOu60SMlqei3WNhoe0sSCsmxHAfFu7gR6jyA
oSHwG0aHjIO4GPEUYSjvtRQg8kiirlGzmCC2lV33LogKK9+glY0t1uRPXhlW
RR4M8nJxHCo6yhLBqPimryAKb1McfRlhM+FH2UjEGNlSKUAePZpSW4gcbGKR
TwUfG3/GjpbdlSKUZecQJTDuquTQ44sXzwbi0JFatamjpEVioWSqpSBLoe2E
OQMuEsXYXrmURmLZUyrmjFUdxOlu96GRYc/zps3OyS1QZDvPz88p6UC3hzUX
sCgFLPtSVYsXvl5j9rKqFqNrNNMeTbnaeBGNePli9PL5UTAogWkw9M64/A4A
NMfiKVgNLvYiK3hgIwtsVuDjGy/OX34TRDgnT0WKhDUurDlGJ6kevB7SSSu3
IxmNNzXTHXQ78LZmd8JBJq9G+NDFnxdcekxCCfwm/D7LxlTdoaBp9jj+WNxH
/n0Kqay0Ss49OwcsZduzDghHLOEVEx43zuuawxAdGaTav1T1QfeBVnobvtwb
u8ywqPD+way8G1d4m6tKeo87VafD7jZk/ReSBFP9EesXudprLZdUE6QAJscX
jvFleu9Ik0T7tUVRMyS8v0G3Q4Wi9YLOsXLQCmghymCdLXUcNVhi35Zgdhf7
lkhrm/9YSLzJGIjtvHX0Oii4q8iiFCSsxisEpN8Nq3jCHXqmw9Vjdd1KWjjV
zTBwdQWpAFOpBaWIEuLVJ4eWMsNLG21DSQTUogfnwtWWjdRXJBy5n+czifsc
1wUQDw6XwtVKUnzj8u9leU3lMOHeOQab27yWopjizlEPptS8gV3siugT5HH4
5cgeHdpK+H4GogZ2G/rzg5xlB/gIdpl9S5Wc3dtEyrC6JJYwwlpe40wqIAPR
zQHrzdWBEeQYsDgcutWxGGUxwb4MWBbxJLuUre/MJbkI96dNajh0JtzlnLKJ
Zgsut42w9nzRP0+vC1iDoJr0wsX/nM/F6Sc7vw13frVsXdRmOA62PMFUn5r+
tENcVNetGYIhhIesZx6FEkbQ45JrCq9WEAIXQlFPBIciAQVO1yXIyUS7KaSd
VAXHXgHq0ih+pVxIHe+yOl9zXpVip8R4++XrjvQKMaJGYZ/bWyhahoXWlHa4
IodBAf4EAVBsQAmV+JwrVOZEJoxHcgNzqH1RCN+65FyiJKHIpxR3jxU5y4Zr
EpsYGhOA6OrY6SROpgRRlMPYtOqohIq4EyK5GhMBCmrWhgtbt67VV/TSEOAI
FfU03KIoY6i0CUw0inea85CnyGtrruCKuRdUVAq5WFjIg2suCxel6BHJ5wkO
0EfjciEll9uGPAgHdex4py9KgMNEGT98xBktTXfO1Z/DpfQBN+RD66Fr56kL
EkMdAvSB5uvfCJr8hcsO9AsLoEevrYbghmkcLsfMaBgiMGH4qkpMVrYwotJu
duHLVZpIEA4BrzHdaApLUQRw6gP6Bap8MrrKp0CWRdJaORsGRUiVSkcPkFJK
zM8maS7U89BHt6DujcsaIaFdcjzjmmAS6rljcJhMA8f+dXzp+1uqRb4Sd004
n8rxJi6VZMJuUm1vpLwQKLcK2t2zOGf0x3l1R70LmWDS5Le5u6zO4UKRsGGC
pzzCeH0fFNDXgiosQOUL4MU5huuwri2c1weobrD64IiV2j9fTqfZhYht9Nih
C8/USQ1QcV9Bki7hoNsiHjBF8ExZdvIZ7SZfYWj26wrKKA3tCQ11HPc2f4sB
+MQZzMz0bqQkrIuOSx0vS38mz0kiQ6fYxkiMLGc+cliCiG35a2QKrFXH4PfR
RmWdGduCSbL3wOCFzEkjXXrzjt9gDehemxY8qVUJMcMlFC6jaObisBMqCy7a
i8EGB4Ic7RJUY+5BhDNpmavwjEh9wum1MiKFvRq8dVWfepZhFi/h4fA8CFAl
C3Ec7dfWVJY8uGcGSjSGj+BkuKAorCfqP7cYo+wltQyFzpGnliD8LVlD4ABm
LsnJ0dE+ickEmxHYWNaunJwYRa5GSWYxNnEyBbI4rbYkkeb7D5PpH7hiCTSP
lntV8CqIW/lV1MV4WTeIn66k1JBl6yDNzGdr7MfzCt8auvZLVFKUU4DjLG7M
SMM8yxUx/i61yaFW0TSS/x6KP67LgFOUE4kL7F/Q5AU7dn8Gwe4KEjX6ltDy
hmidI5COIuqaDam3i5bJBIfRgEVYiwTUvMGQ2M1OEJj8B04oZXKRkpvpENrh
sPcS4grL8HUHEouGk7XjhEclaGsGjFdJ16mbux+QalsdwSoi3qbs0zVlo75I
guJQ4gE+CRV0z7CaNWZofhR/06L721sYLOxpl4jDbu/yUZRHbo1YmATRA9TE
QJ2WIyFndHHgLcpBJGCghMlGzR4aG9B5IbeewgbcSc1Gsh2pO6xoy4+zTiQM
ZaLcBBahL3crwlmjSifjAhSB6dQLcV2i/EtZq+sx84K5KCNvh5NKdLRwUpMZ
hJidkG/cMKka/y4rYH10vgNsxF5ULnOS5XqZzPR5w9shEhLXOVmNeppuHqHd
9tYOlblWrPT9HwZGViMfAdnU/VJkPAtiPGLW0EKg9LD+kNGp7QhZlIjdlE6X
FFMwZVRElSH3VvBVUiZ1fncFWxhSRyS5MSw5okBDR85p1GUzXjZNyOEOdg92
hcUlHGSxvgPsj8/XX8bklUuVJDAqDI0Byiec6/gWlT62nl8V41w7yahMx4og
O15Y8xH5h4u+e6ePO9FWWq832Q5LcJJv6w3z5dwxrsANcW2e0b5OpjTN7KMU
ZbddJ+cumG5jmQNDuP0hUy6csOViNSpxGyl7uS6DbDV32+uik8FoiXJnLNMU
r1FrXYf+SGkJT8kNFaTMGVBa2RiyCO6gGurYhj1bNr6ZKPsOtdYNkS9jh1Of
nempl3OrH27pC0h55zvDoeZRzpfYj4+Tp0FPx+ZJeR00GGM7IOBGDmc+lpSw
Tm6Nag7Ip7TpGclf9wu2XFljpfdjmIlcMQrcI+Y8OvL1yfUMyCZi6Xpw6bqH
qu4CLNgf+bhFlhTdEAkSYgCZQUgl72b5sB2E+hkt5t2KA9oHUiI0TMEs7hKp
paef24oDJys8vlGJprBTHbrJXB0yrb/mapHFZdywRtqgkx8Tl2YbEoUKi8Tl
0erGpg4YF8Ljqvf91y66E87GZetawfRkt0LzINZF2kyvJuIetsHknFZTOsEW
Cku5HfEFb4fnmBFWcRKOfmN4vCq5/D3nxEswB10JkqEpNhXec7UaqQXFgf3s
IFVd17uZh844G2ZlGkpJnnQtknEtMRJ0EjTfYtlgD5iLF8+yKdaooiXQsrTx
BQ7w1IctgHRr/BgMH9qZGDznLvqInTS0oVwcOdSCmeoBtGpq3RGXbeZANfja
LPKgd5EYA7TZKl1EQXKd+7rO/dXrrLF0MxIot05Cie9LonBaQw2Wxoe0wPuP
V9JgPUnxBvWdd7QS4qNV7xJSrZLFwACmb6uEFYj7galFpGjvgfHCFrAHXpep
A0KLsNEIeO926KYGo5qmKzI01Vi0/n+8Znhdr5nspGJc0FOGTnI/99d+b85P
z/4RX9itR/J3ybmAMXrfeofDODgu9DU6PrGVrXa0OAOX98ool7wZSEJ1VGZJ
Kkb4fa0ssiJ9pJWm9FfGTtRI/cxGxqW+t+8noud7iy/rR4n3hVj0vi/3tPf9
T57/s5GrlIw/7xP773wfxQ++z/Z3Acnk94Nd9IWs+b4zAvkl9HebTbzm+85A
x4R6PTsPv4/e/a7n9+T3wbvpOrufrftex4BLQfWw6Q8lHoQLT899WO7T8+B7
xAV45U1G/YX4Ia2Hvdv5qajY9Yi+T38dFMPOVpUg3lv3vYWNeywKqN2Lvnf8
LDXIpwN4XWbfSYe0Rm/8KTnyqp+/xJGyxKQ0TLYrk/53Kt3lhVF29X5vuIWy
XudoDXx1xmARGFuFJfriSu8W2CSrlRAEcu1x5M+EfcHskPf2RWBZYmDU8SXG
Y7acUwBIGDDGBjM1lpAIgQYdLr5Wzt9W07faKo6VmmynAT153FKs7CBVvISN
qSgK/2NJ2fZenvVVMTiMUDcnQNnNjBQp8hhBwoiPPDqKPQWZw26LfFJwPUoS
fukh2QeKO6g9VQKyEKJe5Bn6vneiHDlGKwuQQGS7hKDmR3cVGDdHTIvbUSk2
uNm1e1n//Kw+VtyvmjzZKHu5ZYeNJoLTVtuDmLW3t6ZUM0fwrgIBjgzR1EI7
jkmWvr7SDJNHGOdckXouEXsh0hBWiG6EFkKT668msVzQg+NssE1uTi2ICQt4
DunalaFFyioXKIKVpOShaNqySZrrEZvINt77j0WxoGZd4x/Vuqe1wyh8mWpx
NNmyLadiRPGV2/DhTqiqU2iM5hVKg0a1WKI/GtUwkJZHlAY24pTuEafRjUgy
31WhAM10d1Qk41oMxajVcdiVUzGd6jVD3954mFF0ng538FgGFUmSPqXcqpFo
ARpsZgxUGA/BJmAxDl5L1RYN8/SxnVKHXOp7qJWNDxGbBdNY0rftuRrMlzWK
602n0keiRrKHHlfJBInU0kJ3V/Q6qy31tlo0MRlTyRZtD0QV7+2hOQOEWklS
FogoRySyQLw+CU0PlwkfhVu+C80JqjD7+jcVditie4fvNn7p/Q22nuGKYCaM
F5gXFg/XtpxxRqlTIdMRgRay68yXlTkk48hLhTmEji9f5kyh426gUNZINQu0
sYTdO9bEvLIQjRd1iZJImK4mFxLaW9uN2lnKOs7wQLsxJdS1ha14BjCImTUt
U5oqNj1HhamAV/TXyOnE2aAhMdEieRgcjXEsDsW+Etj3wrW6duhGVd4RMxnW
I8W79f2zV6THWqzETsbwuQgDjmB4kSCIKOstGodT4Ipc22RuScuAd0e2vcUe
VVe+dFHyBfZFJFHXMA2B//3o9TfZM+yb+4r75qo1G/2qzjKvjg3fh1sCwplk
SR4ONdgc5yLMKEGCgWyjXl/qm5tfUH8KOSbXyMr1OZV7izQhCNBzfoHA/5K2
q7quxkLKzk8uLo9PXz93kLCuZEV395D2Me0WzaXwhYePH7LxWIWYf704fY0M
VTxLucAteu+Lr57sSycRR/SrKF2qCRocEwL5BrjFu7aYN5pppquNFunKCD45
+AJnExEZhZMSa4YS99OSTK8opYm4EeJDA0IIdu2wXct2Xr96djRIQOHR4wPX
JjqxHawNVkynbl9hTwdxgFMijcTEvX5qv3cnSaZ6OcUO4iYO0faDXvo23k1Q
jDxatPrKcHw0/uybSajUGaxhCYBK4wOc60PHR5IXR8cOFkcMnxZirxATcd/a
zTFh3ONudlHNNFunSYypfVe063O3g4WjtcqEwohDtR1Swdi1jcjxfFCTquYj
c0x/wMhM+GztcR350Nnu7cIHH5A7hxyo0/Kqzuv7BzwobHeJjjM+ClmsYP0T
LqysyUdUsT6weOumVBtFePLJ87BREXJHsrDqPvY8OXtBm3+K7u9T4/72PX34
IBSrfINqhpXhkp0D9BAy/TKeogPdXdlOSqaHlJxpACQyQ7orC8D5umdgl563
wQzOkxaeRzSTRv7lyxuf3tbdjFkQpq5ssoy2iFagZ2eWANdykyVcusOgCelo
NzlVOUuXbBOtl3DSLjgFqd5MWo8G0rNhaufsYg1QEW09RHSVd6tSYSKz06xF
S8ObussB1qLF3dSNXYv2RNQVSq4nRwTmnnMFRbx7tj0wYy8vvjGeluTd5RfV
uauKcnD0HQRjfuiWmYKV8fL9souPZqTW+dqbxDnGt/8Z57dlF8srPJ6Fehrp
zZO3zkvumHfDCYgqG6BvK8G6P0eGJdcuOfTrYJ0oHpoZlosJBTtzue7O2I/3
hTu4MCkkvBI3d8/wbuykoc+/QTtRG4gyX3x18MhwHFVZA5ajiGLAaDmnU/Lk
M7HiJI4qhQH9BDuiLzSW3sQOrhmS/j1IjJuRurummq8ldl89/OqxO1F89/m0
eFeObupystks1+75j7l89Ba9xHfOLAB1l3jmEBf95FW7ZodxZIc8L7N2OmV8
5OEy+eZp+4+26ZytIfv2ZEFZS3KE6FgnsxHPnOTW0Y790z2QXj8hAW3jCf3T
I4LGBlBW0MS5OTzb+dnxMCAXATOPw+Ni3CNKsFFYHS0TyJeme6c6wfGB5hro
EKy+G/MDKycKiFd2aC8WSecA/I4VAd4AgkNpDleo9Er2fElqUZZnN/kiCU0K
cOthIMTixCjsGQfdE8BVU8/i+Ol5dsxPX/DTKwUpbICiDFTMcRtcfH2BJuii
pGOnmy+EOD8s5hcuIg6s6vKIBL/V4v6GT5j+nL8GmzD04eWjzSjy9NGIHFSN
D1t7IAMnpO3PP0HUNQcm24051nrpe8Rw3lC4hT3Juz3L9eQVPT0WSkZJ0JIi
m2oKIHY0q2GYlMPD93oWTGWKON03JVeahkStnH3vukljcGe/qRScBq452ovz
zQDV1BGgVjJiPy2856bd/WXX59dlxA5N1vNGOewHkRlgHXJEcI4nk2WXmoGq
U0faFvK2cYXRaWTaM1BcrINiHGTbxxdePrJ12HlxOy8fvX416CU+6PSbt3cp
LMAaVV/tf3ngto8j4UFoHNSrfLGA5fWOPZ8hBLWJ0IyfTmD5v4Sg774Tcp6X
B6ldHqzY5cG6XR58tW+G/6hdHvzau/SsbVws1CLaEbZOpPqYs3PvnB2fnFEx
Maku9vmjL8STC6vmy6QWSJcjlPcOjOXtj08GAqAnj9FYx0rw8QnZ/TiqAt+I
lqCuM2y6vb11ja1ruePwC2wHVZNTxZtMb8Voh8PaDt28VnEZcv9umHxaauAB
TmUN5T61BK8Pfcs5yrwMZxPe5Qwq0j2vl1OaV8uxPSKzPXwykhYguDv98st9
sjW4F7+VdEiW6mCUnW9HBmJffsFOAAUZJ+cU6ESbmljpmoB2fDzw82DHMzT0
NN4ETAWbrFcARF5M7mFb8i13i4BHYag92jrKsbhxwqULypd1QNNOuV15Nqhr
YV2xLsy/GfIY2PMAjf4NpqRMTNhzOnlnV5Hyyeeo4ZvjzzOHIBwNCqd+r+4W
PAnpkRyghjaiFkfdNwPyJ6v3nnJjigLL4GD+FCEclo4YOgNX9rlmqfqTYoxg
3KKDjC5LvEV0Z52y1S64b4yhb9GBtWw6WMq+ANwjboJOCK8FmtKw02UauTtJ
KLantS7CqEI6gHg1tR4E4Nw/bBJy6K1QTtI1EKKLreuazQK/7N0thdbITaVO
bNhLigcBRagG9Qj0oinFbl3V1R3/NaQAEC31R12f48IEl2rQJ6XJdWlVw9ce
bcD3UuMGSY035iP5cI4AdVtengQh/QhHTb9GJ7KU/JFQEVdlgVNrVyWpZTal
vKthCmGkUIF5ge/2J7ARDJuyzjUdwre5pUSBXBbCrnWpe8CtMMuw+yI1xaIQ
lIYq0O1m3xdcKcWVJhGXuhtFWsArkNljq2KJ60oYKz/0escR5ZJFXMtcTWHS
XulXIOJdl9SynYYAhZrf1+bcyl+M+zpI+uWL8PqYKg5wXjHXIWK1HJO+p/C/
dlVlyx4LQwcD29vfDvkkKBFD9iSzzJfoBHT8trrDfANfC8KR+lvLi5KppACT
oybDmwufMBxO2Sq7PxSEmvujinp3Sv4h31O2/U8mAbpxTNw7JJQYmkiFH7hH
F4cjCGa5jnFUvHBOoVSrAIoXYiJsPecsRlc3iDZvmkrveLLiQggGQp/73Zth
KVFOTvxJHD+Iq1KmS8jO9taKlTqSZ5LFpJu4QG4f08BhHQMn4vmFaSQH2vqr
+n7oxE8KwYpdd8/0PQk2jEo90vQXz45NTrX3hdauK7iNWUJKZKxLymJUSyRX
VScRGBs+U7wKNfbCkm6NiaJlgQ0bVUdJOZI/4b5LtJAmhwbHFTTrOsAb5Swu
CCWyjs+BN4MEAU06r4xFO12dz9Hf5Q3Nn4IKJnNOnjKLdRltZpWc8Ng/tnkd
y+vdcXtvQZqArgBic50NBxR0vyyCltOujoLGu1IlEE+xiDS5wBw3oSsk2Ttz
S3k4bsIg/9JFZILI4cNSGI9cJBUKyCAAkVB7+oIxOjkb2bX7NurK/ImyhKME
0XsNp8ljr1GQ8jRSmgXgvVQcIr7EwahD3I/PFUQBitW4ILQL65iAVMEFR15e
nrnE7jCIUGpC2URNltFD5DEgwNfcOXIANB0eeWWDyAek+XVqiBiKhPS9oOSK
hlxTRbo02kP38bvcZJ3xxkuRMUGhtZ8XHu/dQv0CcUqX5JZMxkRik4gcdVn0
NorTlAQIE/816z9dJaBboRpHNAPQIoKiDNzP28dUIveaTGrOGdPxZVZfT02i
n/sjIU9UrAiChTU3sBuWSpdNcoNbp3MmwgB+/lldrc7c2+WYYmhPPdGVkVBi
iJJmA5x0MfTJRQdRk0FtDV8eodW83ia8BVJBl64B9ZPE15YLTJtBb7bHrqGz
ptHli/GTBNurXAK6o1shQZrKS1+cXD6Pff76HUoBQftnjsfF5OUuGd3T2fd0
bVzxMavGWIVJK53bPV6Zcn2U5as31IKfBDytuhRtQspsSrIBXMchfDO7muR7
p5cXJRswXH6rKzC4vUU53s6mC4PrkkXuR/+oox6u9jaVdBgvp3k9dOL8Gvau
2RNoA8FXJLwLJIRlW+EGpSywoU2J3Qv4PdD9+YJMJnb7xS3ccZKhifi6FzXD
dEe0T1wXBQVfgQg1VZKHi3t59A0ZwMSPFxDx89OjZ68ctlqKYjnMdQ5/ZIYz
9lRcjCsNePWAmSzfNrrgHhSCORg62CzRWkKrdHqVSxVXUCaFPUC8vJ6xZQ4Q
oJiMMK8JYITFtW+rigg6KFbl9F6imuhxHKNARM/Cm8K5/xIemFLrQECicEk0
nfhr44qh8vvCbfLprGqoYAloUUDPylkQyr+9JehOSWwVN9gCkJfTZY1JXaAj
Jfqoc1zKUMuyNZjcxIEtV9I0XUuqXP0D7okgDmKbU5ElpIYqRATb70S7JAhs
lKaR1gIu09EmLtg6FSlCeru1E1HOmBH5nuEt7pBGgSF95yT901cXfA8G5P/v
Gof8gLEdq8TsJwnhvS7fAULhMqkoBUWeAF7xwqkM+ax8h3fGP0jTBw+alhB3
2MCcMI6kjLztsr+jBS32XfaCjYIvLv82uvzhm93Pv3q8y0bf3M7mYt/I1aPj
kPSgi8h4/UT3TWrZYdASPs+ePPzm25/ioaNRafIACEypnRWXzCSzPz8mKLzN
p0vmWHN1pqFRjZ/hurElGi+vsy93JTI3pxWiAWI+1tzDo2jKNBrgamnkK3MB
pSXBSoz72s3it56cYqgQCYeXCiY8S4jzjNFCz9YvYIYL4GUEWJSt2TYS0OSa
1lw1tH6ilP09JRLgjObZNniWKcMx0M7ymizi6ClxL2er3w1btOCtltzHqKg2
M55yDl+B+kONwDuyYddv5YMC6uoahPOGuthgguLaMJhuuJiN4TaUBx+MQe+o
N37Z3GmHjMjaMBj6FvDhgyJRWluNUdDD+oaahLomrNwJspaFk/ifEFuDGsCR
tNZ6KVH17B79OqhXJRCzGWoRdcXDl1nJmCVXXCpSEx8sjbrminS6YahFexde
3TQ33uzXLGWaOYjHJudQnsEV1zSZAUtyEaPkZ+AI8ZnIlRUV5O2rj0q+otbk
JZ5qu5DAwW5lJCE5pmAj18RqjZTRSg6eC+C1CIR1uWcFCYxOronLTUUVbZfY
VoYqzfwa9a6Mkcjv+1LYM8tyL4+ISzimbV5xQnCQwmmNGs7KhkFlaK8goZDl
DFDqUcxtVt14qcfN/AsHxFg2kZjJRsL+TW4R4bxya9SEQ0C3cTxUjHaCU/iQ
S+VzlXnlNW/UrcLtMp3ZaYrCh8pnj3eZ8z5xLsXouARIdTuaX5WjfLEYkacR
zw10axW9meYu1H4Wrgx092hpzcDBtxN5L0C28HXPrADypjBOjmbhzNXVCc7u
yY8GttiQO+GTMcqFVENJvhiYxzkVhCBSaq9zyx4kWw4O7t4lCGkgXAs8KLCB
CvxkO5cArsEwFQSvuSddLtKxd5F/z69DKt6CwFbigK5R1tTVgb3OqeBA3nqY
hLuv/V2lphTsjgmZGiXTq6BOKmv0GmYdtyx654CFpMGj57nGQE7RnNz7Wnkb
FN+q5YKfzVqK4F8n4wF+x4RCDDjOpIZL9RZpe2DG8Uth1yfZaxpPRIWR5s+Q
Xi1FvuIkW4uLHXqjh66iq0fx1RfC7VEBcEkm3iYpD1OabvaSRISX1fjHEZz8
zouXLwdeYkJPSg+WdYvNkcCQpwqNWV1Sc+xgIlUP/s7ZwXwxXP6cKeGGlMCA
Z+eL0UPqy0btRPHdnS/9Jwei6LA4ZE3YAVB2voiHcAMMbY89MRr0dKLuL5+z
0Y+pBWVanX7sj6/2Ewzyp7//Jf38n/498YUbZM/s6VSWGT/c8/We9sbkdVAJ
KT6sLFFQir/+Mvpa1rFnngnf6P/gvR1hz35Ip7xiBGlhK3/RAA6U4fH2gcJ+
je93jtPe90AG2WEas+/aIcPrvwClOvXF4p9f7etfEe8RVfFCrvjB+xkhbgrv
YfBVo3S/TuH9m2zPn6b96fl6r4v2ruBZH85GX/8z0F6x/rdE+yzr2gk7GK/T
/zKM2t56WdyA1JKDDvRn+cEtncLgwDe4nThh8Btc5yV9ROewvfUn+Pcv0tg2
5IiOc2pDE2yREZYos+wtbOgrsXkqjThfjhpKXVff0LnvXCLM0+vAfn7llUZh
5sa154xsq7rUiol+aBzqFNNomhxsIkGKC0Vbl+aBzQFtVXvWaMJbGwYPBZtW
xZo3HKTCO60RpS2JpTgUt5421Whuy0Ug6ch5GeD0OBkp1Mq6Dzs1isIHIvM3
RSx3Td9ROl7CrKQBWGZToA822BS0bG7TxiDbue77FValbCOjknT8jTP5VqwV
H/2UtQaaYZhUNgvcApcksedUIcuLxVq9TR+ui74FJus8uXpWDit6W7apiB6J
507lRQF0mPX6E1LTIzgpqngkXoVa9BLaJTure9cj1h+x5gKquAA8GMdYFl3l
jTXIQMZKH8Rn0TWaUgGstXBkCWm9RQ+oiUsSpa94skIRI6ONHRyRMQ71Mngb
XYkbNgR3ukPDYybohzdvekrTt+7tLV24dN9gK2zj6XgiUkDqOblQKqCvq1C0
U3mw7xaFhlZXY5hjJaX4infw6Zx6amzkN/qmWUzpquNMk8FrikKsX5mZg5ZJ
dXGT15Op9MSOKPBVQRXUtd1gw90cZxnWBdMeAauJdhw2RygyorJZfPIUpUfG
S27z44ZSXwOau7DJq60/Mxh2Oefa+BeT7tnvJNUMx14faScv01Ff4314cZZm
v8kBhqncu24BCmcgdbmEnSc8mRV3TegTkWrxidjM6NikB9jBR2bzJXIW+9eK
9R6iBE3JN127D30vtRGqsG4RcLOkTfVmbvBymJyK6wlEGmsz8mhgvCiuelnP
LoRZNTGrol4F0cOlxC/A5bipl0gfsKtC1R5qzEinotzLR4RAaRSOi5y2SXxH
SmC6tPRazDCCu7ve/7qOscyEDPe0GPJlkwP/C+kZAZ0nAyyme4RtvWwkc45k
r41ijcLqnr4Rg19OagXEnm1o1FrvnGsLwgxmractFexsC29a/I69M/B4bCWV
GKsgcBsTmFDUWOeYSPt7Q/4fWVmDAOkiuZkmOH0ks24M5+3IZpgFknmXx/rI
M7PFzqowGiWIZI/JMPvxmBLZkZiHGg2ID3EFv421JS0UFUDCLU+jtXq0WYLO
mVVpDf/3csHLl8/OMBrm5OTkhy8fHuzuHz01yfEUVvKRKm/W1Xgjc3vYfC7J
glEK0EoiHe5P7CpWD7/XGoD+dgaCZNyLPM5XKDHQzzRS8ukdtFNMZXEVIk26
uklztxl2GwvVXKaaIZFKo2fxCniu8CGAHQkIg7Dwya9RKMXkIYlGeK2zBSVf
5xMDWY5bnLpylZp8ud8vleDGqXQz8cRlXbNDLBFQ0p9PX2WSF5tkS0TTux1K
QulUNKN1oFJIrdiLi9QFXikVH7WurqF9uohOLXEfrlO4TjfUxgZ0P82KMscw
6PqINNdO8ZMrBJS2bZCVhHw7B7SKzQtMX9PQ3x0s8D062/98BL889lVcTfsc
FqainjjYQdD1ftl/LL1V9h8NfDRq1+jnmhEpLyUNA6eqy1mu1Yb595FOydk0
1p3oriGKDA1FOEnOod5nX2TTpeO4+q7M/tyjpFGKuxTWGa4RhSVPP5hIalnh
+xlXMWf/q/+z9HKWg5bnnyKQaNqlpygzkeIEapYiDU2WIZc9brK01aisowZd
HT3S2DlDPTIzauTXGWe4RR5skxG8Wr30NaE0H692emQ+t63gUmpkQotcxYzY
+Y27cJxkFVsWnvIiyPpCCaubfVcYL6xyLaJyiX5sLacUUrch7OmujfGkSIEr
B04BFxyWEyyhXzbqyaSzPZvyyT9yrELguwJr6M/xGk+3b7tGneNcU2FucOsH
dsEKEg4moZZGUPJDYS8ZiTmgYbCNBIu1gZQTwsnINeESV0X9eqpCeUAYzYUx
XpTOpkpabkU8k9Xrw5DyNRLjMO5mFcmMGfe7MlLjbrocqg/vpYvomSrVSGCw
NB2QkMQwrzi5WyOLlOFsb2EbWYanVFDv4JvSHsVPTOHV5BKtZhxwrjx1rMcn
DQu0ZyfkNVhX7jWMpZFlS/orIEHbggLDtU4kHufi6GyQGEeLuTx++KUTk7Em
k2S7BjJfsPCeDAtxeHhZduyDcVeZDRqGnADsNqcruCYutlxxwynzbl0cSiDl
U3aO00K9dLqYLm/Qx+ZavnZ1Ft/I/ZGtKOxDUF5h20sXoRjFrWk1F50oMm3r
ClOkjpK9UfV0hlmzmie7+7uPPyG+zpdYincehPHH6zO4PWLdDlN9BOWjTEDz
WEf4XZu0w8uzzUJUYJNm7r6QlimUgVdbpyJLdw/j2N/NLhJcE7862E3rd5lL
qvKbwedPiUKaSh2eMCBgkJ5GhUPibR4F6sDHHiSLp8BfK/YCXQdoNgdZr1nk
wkaIZDqJnbYZ9vkWWdO40HQgCpAK+s8W2fEtCtxNBvI3ETWkffC7b+Zz+fK7
hqr9l5poLMlWsgQmhi4V/0oqYDQtpdVyy2AV21wTrDBt1uFxSgryZibiw8Cs
Sgydo9ofV8t6glSponA76XKoxb3vED2X8/I/loUNQTuUhLvWdbmdUbuAt6Ur
RrKCXHEvKzIBrrOu0EElEC5rqumSzZGaFkSn2MyrijKssTsGCVy4IOlVqfjo
QKVJe8U7SaJE+X+CbUVpMJZ+m06l//A+8Nm1t3EUMC2FNSo7mOshr6mD2IIK
30rIFTa7nnUI7XV/SyGYHPwY5NGGThuPmGLBZMwcau/e16QBAXImCgSFu5lU
dINzCcATU2S54DxSt02Xa+1AShp/BSPg6w11HJ/fByDZ1aKcq+VLL1NnP/8h
RpyUYH6p3A3puK9YsAbpUG8DULKv1lx8QG6XOaUqGZkNA8XUys9R6YRDMkhQ
aEYHVcUy72Qxa1uNqROaSWB0Yd9hOGUChyrnp5Am0aAPTaWnzunayTy6puZL
CsOJkHhXDkEkIAwHfzJ6iI+ims83CD/8gj/EIKlUt6bkqQsL748G/XUi98Iw
qq7lWlpWJ4KtegI5bZzWmjAuebcb0kYN1dxf9oc+eHoeB5v98pi2VFDbzpPV
AaWfh18no9o+Jq7VhrX9jDAYPvmQ/e/4zfDnf2c/IziGn3/oiWs7XI0J5utk
OOfh6ukP/y9557PEfteAIwEWf1nWTd35xEaQurN9u3qUt+Zsw0F+j5z+Z0RO
Gyr424eQ/ml3d/cvbHXrOLHELvwzPPuBGMyZSPEbhJAmmY3Gkq4RVaJo0m7U
wapqKuLFh9Vad+o6uYWSVu22QOiRPoZRdotz45KUzmIlBaB1EpHhW8ri0eLL
ncp9ripgVJjIFslICQRr7XCBJWadZUOLA0gWezVPizJWbOrKLd6mrVoBCiUk
pHk06X8tFJd3xUZGqlGblEPZCiSmGTYy0NPOOCp+AmO8xfcwZK5Tp0wNudyC
jTxt3ny9GK23YEcmbHTnd6zYPeL0fIWmFxciQPNpygI97BO6s47MHTvt44sc
SODsHzl0X/DfmpefxhL2YzRaz4r/TCht6wTvJhZ6A/zB2/1otI8Yy1Ka6pDB
E49H+xk9cLAfi8KdM/0lYvBnax4IpGA4s0jo5bSBvRUPHAwintzDh/bWPBBk
daRF3L3OAwfBAwFLdhx059HoYHD6p7iN/F9Odx6PDhw7Mxy1h6e/iZaQ7SW4
esCSo42+j97P3nch0ZfVIRMEr3eFhJUs+f16XFiVjrRGpglTmS48ZUNkT7wb
PbFirI9dx281lh0nguH7CJ0/ez/q+bH6RXzO34Xf7JkPwp89K41HOLTnv+F/
3qy+bvQMb/vn/Q9wV/b77sr+AB6wUApufeqy+EWkL8vKO//dzv8Y+AHgj+/4
Hb30780A0Y3nv8zc/Mmb7hIS9/3nA4TCQ4DC/4l+CAoPBz8/clBYddujyRMP
8F0HrrCborrycvJrIFsrhe/PutOFX6tJsFHJe3sLwR1eShAy4MBZ/Xo0RLgP
H4NQAQDSD/GvR/SXfLdWosfp/9KZZwM5H09DHgGWXtS/jiLQYbWqBKR97ia0
LtYDnrlO81biKE0REDb+kxMjCnUJouG6viqRkKKIRuOv6hWiJSizW7425Tq/
NgtyVl3yGucYa1PVpfGVp82RaO0z5siP8J2Lbzy5SN4FFQK8za0P2sTioQjY
kR45jkfkzu0tignqrtsJc5UEGkeS3EPvVoplvGGYOCfPDzcQ6EwHG6dRBaNL
7JcuoWRZMrCcYghcz/CDKM5WCp+2djoRpcdBdZc+s29wrh2BNngUA9hMiQkn
sZO1WNt1holWdnSgRKVNc5S27H2IMxDMCSqHZOEQq1FvYDW6VHnUdQ6JDwnz
/tCm7fTdaTgjON/hb+EK+Nr6igBRhF5zNVch17EmpvRymNl6DEPuLpu6F1bB
ibVo1nEeqo4zpAi+9ffCNADDhIPV12L/o69FdGHzTS/f9lZnmv49DIb29gVR
BbInAEbq8qVtEOZuxLGFWgmve0dcXqD/jIKNFMu7CLsJE1qFsE6vRh18hWPp
o7CXVxOJIH14m8TBR6pnr8RTp4tveMQrjVyW9qwyoUgdMjW8UBSFIMvQhO2w
7zUZw9BHXmRkRe4+dAuYZohyKQJu0fCqGOcSm9pg7h7GioWnIl5lMv2Enuvo
QS9LBsRpg0MIi966Mt8kHzLdc9c7nSohNsZrFC1Q0mmcqPPLs/3V3pniqE0H
4xtXQXKVzMSSEBdC7d75nbCqQRinMYhiFbe3mMZtju6XjmRQ6c9ZqSXxnGEv
RUul4jVWjSIIsz3wE4EqdYA3oSmNSfRZJ/oG5s8Wl9trA1XpP75GmADlM406
JRU6t62TUtWxn0ahpUYv6kooawzBH9xpR+mNTCAPnCFSBTv56rH7Cos0+Q1Z
8eAjiG4kP38i1UXVbV2alMRuv0oY07vG76PNmoNIMvrKriJ0hD10Jp2KJTdq
Wv5YUPBMxQw9XgDOHfOOLhqsKNI/VM7cycUKAuF8M4XgTOM02NKbwLsHlzyc
f0okh/z0WbWjn75Ijo4ntbvkVZEcEsfRa1nEL9jq5SM51NhoDVM7T8iM/efk
z19Odz4XY/aKWI7ot94v1L6X9fiXI4j4F+NHaIQNSq31AocgsQlq9Blc15Xn
0gVs+FhguSLP7EeOvmovvUbjzl72eoOUALPX2MM3DFh6n1juZ51B1sQrfec/
2DheCfB8v4PnhN/7kbNmTbzSm2jfHx+v9J5M0LKs/zF4n4omSTps/nf25k8R
PP3wf9mz4Uz/jHgl/s+nv/npr6Yuwi+JRtoLJ+iNXVkZjWSPz7hcUnXTOh6Z
8CIkEOTk8ts9LADT87UZIyD2JhjJ12/adV+ng5EiYv93A7EEYP8ePBxehG4w
UkBV+oKR+n0d0QDpYKSVhH4NdVxH6N9nf5OyRGsf1JzRNY8FP79dgVJbqDFB
2rFQY/SzrlBjYpTRRxdqDML2/pMLNf6dmcL7WAqSDxKI3R9ld7rAmmCcWvv/
10KNG3j6fkk1R5wn9ulRPYJQVsKP9A66O4Z8vtfzpzH2Ca1lI5/hO1jYO8cU
9kwdLi6ftr31d0KX06D0VuwjTOozYeHJPtVxE8fhZdqR8kRNRGcgVonfpYyq
sFiDgmsAoQlgbERfrdpG2RFiHEga3p+wtk5SnuqHyQc/97r/17qKdXmzbAQq
o1IvWLJl8+WHxo0eW5TJTHC7SLsAJF2hNeF/SDYiS5jzk7pOHPfOvBl0Kpxb
gHWq05hDXWGoHIY+ndSp6AGIX2RD1Xwopd3FmLuicgxeSa1Emk8mZVRAqVs9
qOccPqH7QFwG6CNQwxkrOoaqBD5EVqrPvZ+r49ddZelwNkWFYWNt+v0lEdbZ
8cT/sxms1gMqLmtkIRUQhRS0/D0BHnPyqQAKepY2Q993z16guF4jsUr2GGxY
Z1apTE+TYD76zdoEK6qYIGBbwaVNtcchcuajZTezOa6w0q8CLXKujnsgQqZ0
nLBfQde9IMbT5hPrLFTX60otdNLZAl9IB2DoBUm5PvvpgFIucir4onq0YKyd
cpffN556dcz1Wk5to8X3kpx9CSjZlxBhyoNJGL/dHlbZT9Ni50eLiCpqJqTU
/wuspyAifb7Werq/2np68CnW0/fJ3z/KemqH+DTr6Qpz34bW037NemVA8CYr
CH42GyvWGn7Fof+5Y/UdxDqz7+qg4c2XFEQN9+GjVeuTNzQgFnq1ugbb4Grt
h3l17pabuF/eQmSydS90718/pfjOGG31x0UPW0qxlyAT/FsPjN/Ey5ARPJXA
COr9ZOywiyA+wAjigw8Svryhh8X/hI/0UogV7gHz1N6GzpVerNw8iJi43L5G
D8MxDA9+QbjwpxsNfqso4pBbq3XgYkPhZIV5YOMgoxWiW1fI3zTuKIxI/Ni4
Ix9iasqQ/aK4IxzHBR5lyagj6rC8SdiRoCSHRDJGpmIIO3LYuqijLBl01Kdo
Wf1qP6FfHchnsD4uhLdWUByuCmhKht5sVsuVI1uiCvfm+Eia/YSgpp5wJooD
3jyeqRuOsOoMPz2eyQJ3SJW2foUIsRVGOTSKxaBxSt40v+lGvbw8+qab3Snl
JOM01aiUkGQa4Ag3cIQLX6fXVCU1lWu6xaXx1bwJEgSulvPJtNAgfhNt0s1a
Lt4tqiYg2b5GllbbpeFc8A220hb49Fh+FCMQynJpAGx4j4NSqcGCeMmTTqhX
ZBt6YnI4k0meYgs9O3hMIcFXy3IKSpszcMRGGyqja4OrJEugN810f90CDuiB
7S1YgenMuyptdfV4j/14/6XieQ7+8zRSyT9bo5EePP6nxPP8rpGuW0Hw87tG
+pHgd8fwX1sjTYUQJUKJVmik/pY/FV4QHn33lqdqyqwGQ/eCJqjEo9VbeRxs
JRUP9THa+X++PnrwK+uj6wrKfLLmGGp8IEGojgcSj3fkGlmQ8n9sIVabC9S1
WvvmKH3aIopWKhKSWInpjDvkoMTSKBNJQB0XXNiCCiOy9H1bBBKNtPzbJGdo
ICbzpi1yqWL3yVuM4tt1O75yMKpzT8/V86jptNTgxEvToAElxWnvwrzX1BMs
yHlPLtluHsW4quqJdvrWBZjw57DNVtPTYGhlwPUKYPmqzJ8gjJsOAazgUmpd
T7+OzXQR2p5Ta8sek0M+HhPQbrjVdDwV5ylJZporNyq9xd0usp2jmxusNo8X
DGtWUiuBPSz8jqoFHM18ObvCarPXtFF8cVbgJ41/lduz120z0NRlNlY00v2B
JqV8Xvs6nitDcki45upn2+qWjH5UjRY0QmP3saWD4gS3sG09Tt5Us7Ue7UNq
3ENpc1qum6tHFk1D9hYDRAC/30oXEIMpHN1UqrFzBX0c+7qSEvx23Kw7bM/J
0KDaun5M3RrY+EK7K5sG7SiU3pOsehlnP8IY62rCxuVY16beOk1+TXp5UJtZ
68pGBaVScNfvV2Mh9eKgjlimbLJrLSFZZkGPBKcDJu/80oUqht5qJNHuTXdw
rifX26rkEqz57ArGxIaHMKZW5Q6LvuI9laq/92K3CK/BVTGt+Kr7bxVENuRD
TApUHFhBicnL9GBjAShUzEDX8g7T7KTDB0MNPz1WKrii004ODSbSvXAwzH4s
ikVg7UysGjMA+dyFtDAr0Eu20DIPlGfPCBV1Qmzs1qhKLxKe7a3rspg6UyqJ
JBaxLl9+Z6/CERz/u+w5F0E3lPfvsBHJivMt2exJ48IS56wFetGg2n/Ohz7W
wufGIQGgu+NP20ZqePwMILr6TlF7ShOzsvFtDgJpPppwoDiHTXC6NrSDvZeP
MmyW81riNy60c2jatBZW2nVvu36jZvuei2uXjMDqfvD6FRt/H8EvGj2ivW21
Wh8+QMflijK7BjEO3RKdobQzI9w7Mt25heKFpRn6lwIjuVXkC7o3vJpuCqXa
5y1aoJgB/0WecwXg67YqtDvBaJqh637l+kOuKI7nOHDQS1AvgnQo8qtZkU3J
S6mLt2W1bLQFAUoMUSp/ZzE0ifK9cV7XkvQIssQ1lqJ33fg66GH60Uhjw1Qf
Gu152EFAPNZ55VuNae8JjCM6uXzOwttYmy3FnZxblhCoiMottkOppnhyqQ6L
ocqUu2BA6RLx6PGTDx+y25y6jwDjK0QMIgzmuvE6KpuIo3ZavBBFeWmXxv0F
4s1RIRhqqzFBGYXqODZVdp3XURMTCi77aOBICUBqQekQKqjELt4GJkcufhMd
WNilJNsBbXMgNUDSwLTxQWFNTRPniIFSVHChRC+f9oBPHU17W1OrEzxG6hgi
68fv+Ia5Lq1RfaJUezWuWYQruF7WfEvxSIwqpuJNrFAArvt2vdLWiTA4O9FG
VKStodTtroGjrbRSuP/nXDMJn2xszFYzBiZcl74vmO+rID3own6fLw9weA4U
C7+gRmg0HaHoxcsjLdREk4Y0TcR9Ju74WNG0dk6/k4heG1v/6cXF3mk9BoGw
FVmPm6LuwD0BfqXBtPl0pJtsgLWH6yCtZEputJDNxMtHw0FFTcCCT4UxmG6G
AGvpRnZVgdDZYDPjl9/gRf8H4vEcuPdQtJo9orR7ohBnpbbe2yveyW/cFA6Y
cNAZToN9ZwX3DeNea+G6GAbIiZG8vC2LO937p7WzY5+u+xCXoRo5u/lxkbww
cbEE3e1cU7t8Whf55J57RDZEi27ztwVZF4o5XTjTH850b2dCdscrTKVqd3tY
fvh6KD4XWVSWZSP1pyLsd0DPMK302EWMAS1IC9MrgiHMouDIYDuOvUdN8HLD
edHRDO9ubu342i04p327FvCR/uIILV8dlE15UWLbgSHi3nxrt+93SO+v3aWW
2jW79TuVIeI4YtOtFz2HeCMnJSAvor3pSBNvm0+At47UsRjbGGa6067HiVyZ
OiB9aMD1fMLtZaBUyA/mUJb6AbN0CW/b/su4qFn5k/KpaTm+N6kXWukCW9rz
JUFIhD1tSOWPzzrVYTnod8NnHZ8djXF2cvBIOaHECmiAR6cva/8IIgFhEsyU
FB6lNfgu1Z8ouUxIQHVQ4MDjSQnsyDNMpElNfZjnrsejLkVWoMgIS+k1FIZI
ZOica/UKLD/H1m+zGVD/n0xvaj6Nu3I6DdpBJuSSTpi8uP1dagOIZXBaruiy
ND91y1K0atgqFTSmSbZn778kQ27kjZ8URl4mTNyzKMPVsBNXW6HZcdP3jaRN
tqMbRjTHcUIWWggjq2sh/qtpVmdlkgtixDTs7H7nK153yX26YIlYIr7+mFU4
3zw6nzr0cxPiaUforBWF+ZWLpSP5/laiBxSQ0S2K1VbXoio8eO/zYAJljfIm
ukpbw3G9H247RpZN/7wQe5032SBLtJ58Wv5U6G1gUS5ernTlwhFB062rRV2i
JqAnQs1npW+69Q84Oe2OuFzrEkRkHsE2d6X2rQyJZ99z5PjC+enRs1dkhYWv
sDMUvmvZ4KdinaMStJrlYuLSsVKGSUeUHa67xkco0R99Qx0cfa8x3pd52AUt
nvzHEnZ6XAH4OYeSOnfvnBy/AsXJ09ffdIud29IUUwZuh84bsrTfvTWJVrbM
CK4pjQWkDoPOjsbSmg4sEkTT0lXVZprIKIlTAKMu3i2Ae5ctP73DJZToOuNz
Aya9c9Q0pBkfEygdHqEgjGQVyQn5tllLgm6kIJA569gBMiagztN7jxtS20/d
Kt3u1w4uRusqJl7KqeHLet6Q3O09kJHZyYk3KJBIX9SUwIIdhktuUhAFhhmc
DfyXZFMzhnAskYVRgY4WofFVg6h8/b2LF8+w65z08O569NiDRu2qJdSSQQfz
OZkNlndbFnUO6qSYDRAbClPD0dF4AVIWw0glIuwrLnV1bWNxxhmej5NJD1zq
67wPlfdXobIX2ph99qAyZ0PhIwkszhiJRWL4JCyOl8FdGqmpK/EYwZe4o6Zp
Vu7bYOMoatxrqzBqLrDN+C6j6ucL+aDCyqHghhqj6gYeRSMfu8FRe+CsBzkT
mjt4bWt+4O5UWGXPoaCixMDc8X13x40Drck++Y773otJBWP9de2HBa93mOl1
pZOP76wtmrnm0vpYybMTArCBKLCOoFN8F7U8gZVqeVIRT5dhT657VEOlFY0l
Fp5SyC021IHuAF3mU4mY8CoWWTcIKRwrhHWQ/ZEJ6JDPa29WTchmOBTrsZr+
jXWM/O+igPBVFqHAm26kpJ7fozoDOpw4We8ObTtWLEWbY69GInZ0rfVA4sax
//4T9DbrautoUkg/l82SMhk6eglrVF6Ulgd8ScGUchPNYHVD8sECxG5UsmGX
HVKb0HXat9wetXV1K6s1yepihFtXq5EByRp2jlELMNsI/oPieaLDdh5oDKsK
NQL80yyhUwiZL01bcjRIHoLJpK5IE2Yq2nJ5xigpKm54tMOg9bXWz9YQKZMp
EkxMgkLTVOOSQjDMPl2ac7hTd2oAzGXT6Kn9N9dauQXNcHSfz2/SCvqtbfWu
3Z1JSeJLjO6HUwlVUhztRaFDNeC8LXM4pQcCmBG6ih9496TY3LyX8aaYF2iA
9k9Evho0Othu8YndtQWgW8VTJ+0a52fHxj9MHquNgGRadKNnA49nOSukymvv
TBL/ErmiPt5FJ/4xxh6FU3JGppv+jrn+1z41iym+XoTUo9Ybp4JKajZqR/cR
biONPwucRH9sJJJvTVFXpu/rCrpe4FOraVj/DYgIT2bpjr/9G5ZscGViu7Zg
oT4OK4QAhTaAzepCGNrvbCue7gdSVSwP7/DV08wseOL7Z69gRfyt6w9Io2EJ
PfM5yQHK9dBXRU80dyKJEV64KsEDm+oTV8Mg4QZW2RYa+kh1mbw8HacLrit4
Im55NO8H2x0iF47261495mJQF1QMKntFW9+5phirfFaMpPGg60w/ULhc0ic5
hadiUam+cfRdftKP0zVrsjaUUVdzCuGlCMveOh+jA+vOCgUv1/zZqmPzVbYl
y9Oo3JzWc6FjwgJz3Lf5IDw2ATnGPvGY/hwzOUZ/e6irAhU1lB7QLsGRaxnK
DP+lkor+i5W5+L1IcM/P70WCk3v5vUiwHeL3IsHRz+9Fgn8vEpz9XiQ4+Pm9
SPCqUUa/Fwn+vUjw70WCNy8SPDroLROs1gLSzzh/FA/gcJ3WJ5FaoDiO0WC0
uOeMkHUVIdURXcR6oHMCqaI4SapxpPHhGfk8hqHTzU29lzGtDVMyboyeTep0
E9QAmjXF9C36JCiOlGz/lC8CzzX5TeFakibTGrnlozTLSSaDDD+2uI2mrFm9
eEX1Ir/lP2bSPs85lggI+bKt0P3HpYx0iWzJc5ahNXlOcXVmbl7fZujOtCZl
U5CldEFbWtRyw4iJODPmFOe+K7FEJtt8vBHTba0H8qFbwrp9yubjtmxvcmXa
07pom9UttTaYMKrK1N+4y51ZMJ0vYazW7A1sVTbyP1HDeXvLVNDeqOor0oXo
ln8UmB0N8JebChs5BKvqvsZVw4SXuNsUK+m84GuCntcwXVjDQMP5FeHt+dvs
78gwD1/pNGUq49AP01tfjcKZOOyzNThhjJqKQjB8W1fTaRI2niSEDtBNoYTl
iypMjWYD76fRjtJV4uprQGajtqLTN8WYfOkzDx4PGj/aLYaKmpD0KBqCmkrb
6gR+VXt2FR+1xzvxnlCU3f5u9jeN05Do94T9PglxCho78O9jeGWrkWwu9ZSe
erSbHU0m4quZ++C4KDM3KBQd1Y1vc2n8ph6TnPLNspyu8to1d47ZnG9wpK4F
X3ykneQ9Y0h2dQo6EX2bgXKYoKXwv38sm7Z3oR936tRNkk6I06V05qD7cg2i
Dn6NjremrWrXUZ23R4h9qgmtbumuo6PKRIFxnmSJ/kaA67lMOgsaEEqivli2
CYIwyb+SjPD+zR0K3fiu9Rjw0ga3SEfJJ9xR0kVTysefa6NJ5HgxynyklMTz
nVx+m2xboZ9/LoXMcMq4GmAUvOSikjZDeopbGsLgAPTrEmSiW+6ozenBXkDj
SGGPpfC6z9EzhfDQl6gXVWv+WadowiuK9Md5RJMbi6hZUILFRWvdatE7xgmi
g43tHMmjpKvm7TgPP3AT/oJLoyK3BHAhLwrc+phB+sVXT7B3vSvxtwmjDM6f
49xJUaHlTiIJmHKPfdyNB4MTFfQ1LoIicefjajbD0g2TgBayRALiXzlbzjJf
tiSn6n1aq4P9kzYGXdPYGDhudpLCcOnAN8KYttwvUQKk6qJwufNjDNNgGYqG
xVoICz49KXERrCW7zsspU7UJypb0ICboTYscr/tdFa4cH3c3xPcDjzZkJZse
gGglBa2HAbJ52TTc8ySI6xiPYd+jAt31pIbC4VMEEgVpSFxRKyUhozCE7S2M
Q+AKAJVmKDZr+nXHl0FL2DAqUCgbIXBGUUkYQIw85GPI0k7zUT5fqk+5lhwf
BP7dtbUrO+18qF7rZrUrP/1Cbly7ki9TonhlprUmV/WcCHOBVWTTsE4dVVs0
RzpbEnT/NMHICAbxwrSG6nWFpT50+VQHDMSCcTHBdXxMgoShh78Zav4yScHh
ZygpYPJTB4QRuIQb90gEmyD+7koO+zdKJAlZbD6ZcJQ6k7odKQ2U0g0cfxVj
CeelBPyVdesoDccOlkYQ6szU1yVpE+aJhZo24J4BOadiC6QMASLVxazC8liU
/e6519DyB1vo62M4ZmYYJp4uc0wqwc3FHgqh2YWk+kx+I/yG3X68fNqwWPZL
K/Aidrog/T50MDP2kuHtLbkPFPq+9lLQU3ozvLkJjyREVGdTkjPo2EfhqBTn
6SufixX0TbveBMSoqvFeY5Igs68g8cnIQ4oV9MG5/ZK2ZiOYQN7jUGWLmEhQ
Qibx9o5tv9W0lMaAJRnErjoppvn9gK5MbzUcX4EJx7cRxiYBkclplxf2Dtq7
sG6DBDpkH+BrChSpE4uiCQcmPS8IKu5OlaVnkiZgfqrvn71Sr35r4hYHpvY1
0VQy0JocjBTcV83JmYBS98mX67Zhzd9fnL7WyobXU7iio5u65GuwvYULdO0H
e8DTDLoiiGmvJxJwaFjz4IfVdtNx1h6ywZbE+ZniShwm6mKg6QG1pfiK7WGh
mW4BTHiflQ5ihRyb65TGaUUIUVctl2BKFGtI5x06+3qVFfNG9DRZanJQXFxQ
9sSnoSzqcpZjpSV8bq0UGmLOdZU04DkzgagZwOVaXBhmMr0Iyi340GxT5Yzf
2t5ylRmibPeqDjGVLKBcUoAJLS+OBIm4vCAlRjRB1VJk62XPqhCDMWEITb34
ELokpZAFBbpLjPuca3vix5QvgiiWX5VTLE/ohR3spbBssW5WIWlIzMPRQEq4
zdUNvcrocMuR8QgRJGYcLhbl+lw4B6cV3OAsseug4TWJQH+Xc+aGEMZli2e5
6H3qUvAR+Q3DDRMcXKEIrorWjeDf3rIh/MAx0vVbWIuOjSC9hTsiYUhTLvvX
CXo+UQeTSBKoTOjCLNGLOfRZwT4NkwEqaQeS/NmGrU/DnFG66IAMY2Nf51o8
qhq7tGfqKFsUUqWvmE8w4h/+E5UJIYKpM/NxN2IM7DSPZOHK3D9JnACKsazR
hodoFXQudWmsmaMplyvhKcTW9Y4UoDr1T0swUL6d2RQA666YTsmDVBBeBEUC
xfSIyCodVXx7RKBHeYvCnW+SuC5jpJEUWUBCV4cyWULAcoX+pGzJ8fVZnslK
IJTTmfWsR+Zbj6g+t1fvoSvn6o61Y+VyuEK5oWtSfGWh4ZYkmt4CzN0Rx+PD
xN0wRbsw58rwanYzjCLxHMnni5pR/H4XSPqaFodwdRx8+03YiMo4VxWxuh6J
ZD1NyFaSBMzU9VVMjCqAkBmrEc4qvr52E2enYn0DTk+lBXEBJJgLabuTszlZ
eeOLBgwJb1RzP5MSaVRd2f/plxnieenCRLC8dy0FJAl0b/7nyaRsq/qPDZ3T
4f9C/yFXoGuLd1i/CCAvgocTUTQxbwcBpW5CSfnzXtQqWyxFKKShKGKDai6u
MwJFcqbImCttXR0xyksMibY6z8/PO290Sz3/y/nz48cPv3qIMU6+5IIWMfVN
oEixeTF6+fxok0HdUdftzR06TujCjBDDSzz2cjS9zsMp+a7yhIwyViCKUDg8
+p51EU3wJMAK1yuwkSwqmdizaa5lTYlERrhyR+e9VCvOxrqb1A/N+esoJPdE
SWRaWjKqBZYQTrU79UcUnfemMxT0pHAhFppfzm33as727erL21uiuJH8bljL
YNhXZ3qTgkex/k/No2MVxcI4RANXlsGXxrFIJbq8IAsICS2KrECqbsgWRVus
6mH/NfDX6gpEOszzI6Y+MIx0nQWaMceypVi2jYtFukpTg8wWG8U8981zQU29
uSArtNvWISgk6hP919VnDv2eHal1k+rK5oqbmCNTZDRR3lmV+bhksqurHNVM
TnLCRJmEMyzhKf7YIF/Sr8FUIGGRwBdOEFnPXZJORei1Gu2GJaBjFeZfQpoG
ipm8N5L3RAkZajgDVdJl5dmtm4zn1DU9qL1Csj0g+l1eTxJgiCM1z046Ri40
FjYBiNA/l7249kq8OKkbdvXBKlhQ9jqc66zA3pe8JDs2TEZ3symsqO3KbuP1
nFY5bCWf5vOx03ZM0v/qDdFkqD/hNeHNOSoKdKQpRa022NWAqtT68EQe1Led
dE30yLwjC1YRlqZDAOL+iB7lpjHLHUZoI2TiLX1yUeGNaIH163Jl4WP/ifNT
z/PpfWPDZbSEkIsYvHWtIh22Uyo+clfRDCJT06PdAx2PrFnXSycsEsjOWDM/
1XzvF/O2uFGWcHb6YuDqFzOI66Kplqi3+jjaHSVJrui5qczu8Akgps/52tJu
kIHV/AhPO4FKifIivcX7GMOeg8oKh2grxJgzZvUnn0xgS8bKVwMteptjB1cA
7PbW9zAqruEb6t0gxmjsTkFythpMs+fOWhpbRMMKCUgIpIb8jnIk3lI5hw/L
FvCxGBzysSMCOp+EX7k0hVxV5+TrXV5oF+K0qNXji4CRquv+wTGNppouVXOw
tLN8ez+SWUd+BAmCcJOhmFJp2XJEqSkcUNmqcX2t2t5XCvT87HgTy1S3rALh
dpTw3yTAFMgNa0o1rIUVx4z0DSBA295KQS3rAK2n8AxGAZkq+EHzCWBrU5ia
68+CSj+Gi9NovHdQ80kFMC7TvqasgSsC9bfXL/xtcE4kt4CuKvXV44dffvgQ
gh39jjF6blDXGUuT+pmCnRo14fXTF135hcQMZ5u43AQZgXEGNSc2to4im3WN
B8q5tm7I9jlFpt8KxC0G2uwewC5zrb3VCb+Dwmruo6SMuOsaQ6yOlULU+TRf
uAseGxIHVkO5cwZGvpseoK6JvWK4cJRVL2BMk50E/gQwCKWTjvBjCoEaQSX7
NDkFXUpWUNnkjE2FsfRWxFAn+VJSnbV8i0KYNSKD7lxpKSgy98yW7zBfgqIg
0US3yWLcO5ruMW1vietR6evoWobZTabaHzxccJV5jZ7Ql1BJ2oQLK9sFvaKf
72rmBIUgirAkCi1d81n5DtnvNf6Hp6HmATgrLIc/eYb+3Fgioir8LrQLh9/e
elvSHrQbk9ebc54nO8aRcILkkL8KNJlO4/DW9SxpCS4JgayTqQKVdtGA7Z+2
apJ6E8LuqjWT5B9W+dmQ4LKriI+CBMBifotnz6KIbtnLvHdkk3QXeZHX+XQK
szqzmFOUSlYqRu6uBi11uqrRXUWOD+q94nz51NYo9ShQCtZ8/5BdFONljZf1
WKiq8KGf/9DINx+6uUa35c3tFP4HU2lvtaNj9OhjPVa0CCFl45J8i2l172pF
E8vWwy/n13UO9GHJjzthO3vRmcAXXSYxGs1O1bjSGF5TTQxjoKwbwtrO7AQo
J5JLq0EDOSwmmCHrn0AJLmXkkVRznaP5Q6FL7Y1QGNjRbFmnFg2cCIdGmSGZ
/DnxUxSB85OLy+PT18/5r9cn5o+z45Mz/o2Vs+2ti3jh+RKGnuOcnD4DcxXz
cX2/kLL4yFXFUINJeyCHlKgfByADHLstpouMjr4QPZ5sXG6n4iHHUGYn+vFG
1OV7qVWespcEd4dhO5cvLygaUFRIVOx4HvcGglfBMFQQcKwJQGA3e85684zq
hrGI6bLPMrMp55hx1hXXXSZTvN71IHaeRXjtiAXXYxlUalm9Pjp+NeCSpLA+
WpV76byawl6eUhuL6O2d86dHxwMVgsSMQwvjwAymQeJf297iHIXZbDnXYzS9
GumEq7rEv5BRcTPPfL6c5pQmQxOi/BTwYE6NFTVbqxXvqhERc4svtGllDynA
Z0/yGvh7rXZ4T1W166gvwEjWDi8h6IVR614Q/hVUdnOCvwS7spE2+/62nEor
PWd6eJtPl8SagrZ7MJNrnQWM4KaYafdcAM0SHgf4k3WPmIGgR9FQKwylA4oc
0ttTbuYJqPzNBBSmBUlNtBhpkCrN/bT/hly5YrKbnVXoViwx/XkYdBz0Svw4
X7SmdWOuoQ3NnGS33eyIRGn8sCacntIybySVOIp9ukEolnB0RDfJj4BA7hhU
sGMYWjCp++tQmmUZ673LHQ/LMVJZOM3Ro0U1IhH+bS6o+ZO7AYfZi6ht2lTE
PwYFl/hmshEup6mu2zsEp0SlyArTjQ0mRYu5HNyhFSQd2DlTsNwAzjV/fLuc
zjHyZqpzNjbzThgfF6LkyCQMs6hK8b4SeJd2q6LjorevAVKPPoNFDdduWtwU
gatJFi/geob85BVcj8VyKoVDX1wHK74hy6sMj+4gt31eN5lY7+V8ZjqS3JII
K/LJW/ThAMG4BpR30A4asU2LXLsaLxRrUX+KQINXucYIfWseULXLwUoOQ2I9
6+XCt5egwCc3FiA+OYetAX+WY1wL9h2UE1KYFXNcE/qRxP6+86y6GBxmT+9B
ZK4qF+6tU1Gk0DXmltqrNwzAzPBDagSC2XQWAZnWaAhJc9+0Bab3L/zFtpAD
jcstUp0ELPABPgDzmeEJucsoW2bSiUAqJrLVi0VVXROdOeqstcHvQmLSUuQZ
3BVgbq1mTUY7iYhR6y8Lrl+aqGAK+7g1JJSo3bpT1552khjee4AvYbkImaNA
TBFa6pKBlSQY4YKCCM1LGvTDHE2hoVUzlHTNilzvsp4mXifAxc4d4RD9+b0O
CQzMH5h2Fp7B31pbGts/h2xi6Mt6TtCgQR3uqlqB7PzGXTYD60Q5wJYBEZ7z
jDoKu7Ig1LAKpQ1GKU7OQ5Bp2AdF4TJSAoGi6056w3JOp1c4EuqoNvEcb+s2
tW+R4EaSzEvq/7ZzdPySMzqmJYAEe2XSRW8o3Mr3BQ9QVOY7maEuYOecVXOM
BdFIoHwOggDWCinUqSxXjhBUifhyTkXFHROma7SgYC09cRRpMdpnTBGKeolk
GefFDUpMqJOjm1cnhxE4JikmApzngGZ9ytqfOy6CjqZSAyQdqzQsQ6MGDK4B
Ct1SfiLWacYdiBZ2qoSROsLE0tdlx21jPQ9E9IqJSPyCM2j6reYk2sgFoool
Gv4cikdeeAwUJqW0Zyx2YaUXL6krMmGUweyqnOvQtkXQrBzX1R1Fsrr3eGgf
XswCz86Lsz30zQ7ke1t1gByQBR5zqQsmbots3LskrC4pHIg6F+VsfKTmYmM5
+KtiXuBw+ZTjUuJ90hzw6A0q9IBXCxS6kaDlBFtaPGqoJjRgUgBMJ/JmVZGX
55qEi6YdweI5QB4tcYRRgCWiDJaOWDe2uIQ6zhiqDXtyAYqqxWDEaIH2A8NT
CHQo+L1FY76XaSuDXOMAuYTUaATBMzLE0R6OczgZJFBn05xqBxzCt+PSsdkJ
LK9wLWHUx2c9tXKyuWlCrAvEJOOSPoo0OpFqiQc0RAfQbU0wt1FeNdBc9JdX
SObs/Dvaz1xmmpBuPG7JYuZ6ZWFlZopMb5k62wE8MssQhH0kvCLntKxfjEe3
eT0heRVl8+nATuOqsUthg/F4SQeGNvpx3njaIzDOqMOdVoRBRyJLYm2oLorm
RItGgRstL5ExBWkyMFBMgbpeyidyoIyphMQYale8QzKPuIly0IhULOnpqPII
EeHsRRS5fqhog8bMVkKD8KJkaKpfEHEh1voWbV9LjDKfT4An7mYnuBcXZJHA
EyW9Y+3IyBiMbDefgRrXTO+dLYX0SnyQaRp+NmMMW7oLnmPsNG6TTbDuuDm2
Lb7+QAMbUQ/Ht8X4R0+sZAfBeYAYblueovmIy2Z7xyOlHi3bqVoUA8OkAPmM
ewug8TB75djiIS3QnPXZ6Qsj4QKyaE8/An5xi/040XXiGau6C41iozYRPGgf
LuGAKb3fyCXde4l3sxfCkBWJJ2V+M684NYGEIrEsjcnYX8kap8W7TFpCu03p
iJcFSkktevLJ4qb5jFdxrv0UA3zg+t8BwjK/EJjg5LdApaU/lnMU2aLrKpov
PMSFX4CCzBJ5FGLKp/Y/6Z4dwdZqfOd/ycE9z4FjojZnGep5we5DPj9zaI0J
5QGRoiSniS0BF9LngHePbbidKznPToOcxHOKkwpCNSl4aIHKLJ6mAprXXAJq
eHGvLtSlG5/aLdqo5zelNGWSw5XAeWlbSOTmLVIZYM20EeZ5jea9kFoCV99x
wmtag1WvUGYu6LLQBbxCxEfSyMmpcP7jH+HeOzlQFk2/U2oEL+zTz/JCHbJ9
JnEk8lGjEWcj/yCC3Iuj10drJTjXsGBe8Qu5iZDGApIY1KjRPsm+2DzZkTdq
XuhXYtnrNtt+yW1UODqorxc3NYJ4W7aUiFi3rieLsetjR+98VriW9rm/UUJA
NckSBOcrHB/uqnOTuXJ9SGoGNDgX9CI64sREjGZXew8RDUOknqKxDMXxC9EO
pIAmb+FrN7lnxNnr598NjV2a3CPZi7NhWlp1kzeDYfac/FBHyD2GcLA1213P
AckrDWb1UjfwlynmIPGF5YwPk4/igiU1bRlpFOA63LW68Qun4fAuwTFUN8ti
NKnhxsxDOGvfZWKxxTtuWwxzs9tO4uVpn8cyQ3YGexeOeOLEWgdOF2aFu648
bjiBz8mG0xIu8f14GugRaHj+/2q7tt62jSX8bsD/gchDYwGSIquXJAc4D47j
pgbiC2zHeStAS7StE0ksRMqJD07/e3e+uewsSSlO2tOX1CK5l9md2dm5fMOa
qptwVPsTm7R2xPXM16j6RBnMkixq3sHtX4f7W6zXu6EQ0GJaTZKKVW2/oIVF
Rx8HY2fhySZGQdZFHWuYUCoWHygVu0Fv18tJEl6kSnZsjSKcW1Err34cvbaq
O5v7t7qDCIsH/JeAI+hREwNvPdySq/ZH+SHeZ0jhA7F4X6RFXVKgKfd0eFQl
wXXe4qbdXb4/0HaWjMpRTLlGpc/CpQh3Ys87QR1zu0ZZwlq0EAgZgqUDqLt4
KXccM9gZr0UAC5r96Ztj2Sd0Tc8j5Q0HQcPNFAJhE/0dKkJa2soFSHeFEnLW
GV0/VAEn57Ovyt1LvdrbBmGrxOE1XGpNKWEBRn2yrAsMK5lsolGffQ7qb3uB
rIrYJg0w8CRrASrJ6VKTZouSe7BV1UkdBl6Ot/IDEFLdR4Q1T5oBKDRQWsj7
558IUlXQXzoNqGsO9p0XZry4pRQydwHd3dnCu5lfMpQPpJtW3VHBOYpFn9ve
nvBSA5LA0bOuCD1EDwQaLgcPGo/Xp0kjWG38ep8ryuGv/VdjKx/31FDyzsox
W3G3v4qJ3fj6KyUz0ne3fb1pZZ729Xf0vWneXb8/sRZKZz9Ztj+8PqV/x0Pe
S6cn2Q+N0f/e2YF75erypPXbpuIr/+v4///fZw8d/y+f/TiUtPLs+vRvUPDv
rdQ/tkP1P8iI7/76G/r+Rs5MsdcbIlMx19WycSE/n9NhXFUMtj7A3TRs1mYy
/qb8wS7xRQ6AykAigsQPZzcSonBSnxz325EYoUcdV3omiB+G8OVUMkSnRVR+
AU8RDgDS6CKClMnteOLoF2QvvzrK/BnrLK3sC0OQBztUCE1FcHO7c53YfhGu
bs1Gd7lO14ACmCxUQdLkbmd8bF2fQnkpSE/kPwXEsM+hQ6RGhzbU/66o0pWm
/07vUKSP/k3R5VRpwuderbs+PThHck+drEMljgBx8iUHZ2gBX0XLVwIDm2jj
4aKzmn2Jbwrz86zYwOaSe9RfI181M+z6+JZc2Uuq3evsHTCuBhrVk2EvIRyQ
nb/8wWkX+HxvNixCo2p7vTqyuO7nVdfYe3HhaLQC7JKQ6vp0gAFQvIgCZnm3
Ds9DCKcDm86gKdWPHPhlbcBFOAgqR72WaKws8zZ6eTSMTJrmoDV1j45LBGsT
3LjXKDbxqypyjl1jSBji7cC678dasrhTue3k5wY7d93kUp528w4M9oMJixPJ
t2tM/xsUpLieYU/IK7s78o52a08swa+LYVxOhJM8rEhOCscpHhYevM9vVMks
W122GVXRC7zACco55AIiJEl42FBeuK4cpitRf1Ks1FfnygN7WAzmSQdO/mhW
ZgZKwbZi6yEuWpq0uE6rliByIAjUnsz1klB+OolazWoPLu05i43RuztRCqOZ
47d9Iqf4qM+xf+g3y0Kl0iqSSucyUTTu7cR5OemTE58HdiF2Wap6IXdHCmEv
lqDmx7AQ5Wd68oYhzeG8IWxk95JxM5k/09Bl5HjDqskA2yoRo12YgQPv6QiX
6J8lB3XYDKCULNbO5nt87kKCDWm9eIAD2PWJY0BhSm6KeIsij345+eQbErOB
E8Lc1zpcleZMWj9ndAaLq0E+r5eYQi7G3pL8X7AIw15r4C9E4gsG3CATVfZr
PpvD0MgmEBNSlGXOKRlIlfTW8CBhFmYncAAe2Kpk2hbBRFO9ODt4ezI0i2mm
FXApOBGCNIIGc0URORU1CxnlbVnrQFMuk+GmpJTcvDYkmgppKfnk04BSsjmA
oy7V2O5KuHD0K0+8OVG5aKMzymTmOgalgWbLXDnWHB/Y0zi0xoMUGZScZj0K
tSwaJE5GheUjfJF8xbhYgSb5TJQl7MkbAvcyeDiG39rjcfFxR3jL4cZ/dskn
+VDLpJCfTdSNMzRgqc+1Ls8ypg3oiNLSurs7YGhXc1qi+FCRBFkX9KtWR6DE
oc8OLcP7rl09H/G3SoB9xSPuS3UCjFuSmF3hXbOlYzc187Ghu0EmhPOLsqVX
s7u70BUrzfQAbwBoclUM0kMVSR+arKujfG57jFeMHWx8QLhi6roV2KQKA5ai
ArikDTRPhMnn4dSYPiKBcw2loXggRy4FULDNjtahmDa3IEJ5plM1Dn5mPZX0
iFrytWQP6jLSVlMdjKN9I2853uWAxlR+ImjEBdOhjWimWRXTNWVjxDgN4SWF
+2MwzD7MxvmK4YxIAyXXImlJJfxA1v6tOSKpXgJZJj3ZY1pnaCIOXFMsldYW
se+IrueWkctSVYAoixZFHhMBYVoNY7ubke/nTQSoqFS0NDZ0IWqm7GqlNhfc
Ups4tawupqBwKwQc74g3v75F81JJIvwSXmdiQat1G1P5tb5nnw62dwG5iOXi
DwSevdArj0olVZ9lpWhQwGsfCt8e3yYywcgBRUJHL7Fxk3mRk+iDThb3KUti
239sEU3rVcmoo+OK5i8f9Chpa0UxAuEguxn8PFpU/jBKp/kvAinZww8Xl9fn
BD5BsqgHGHUBQOHHHDXAgCSTBGUkT/Aaw9CH2UHtwBfq2aLolEtZIpacKXbJ
jXG98poCCUhU9YUUOnlmoU4Ms+RMc1wVz92IXKtyB1wwUDagkSfZYuJOYOxA
oCjz/p4/WhJBp8BhVtzdofv8I+85V88JQa3zx6RsG86qd/PyJhDl/PCIg/co
CyTMurLyFOZSoL+FInnUmMJUiLCL2X+VMLwiKhKwpoy6V2Z3JX7XpuWh3MIE
mg9rnbaxmbgYoAoAR8QgokpEfc0pD6Sq+3qbxoGLegEL0r1JgrloMxYAyj7i
2cLuyDm4kFagsQmz8/cfLtOhzhrHp8IhWXyvhhszY7JmkD+QBcJBEWuOpynr
8oNhWxjgX96ZdtpwG2no3LKyZiAnKfiBMGtlMFDrOFE1AXnC306pAE1ok9Yl
/ulMla85R2/JPZLdAeOEi5OiqQlOOFCUrgY92cQ0MZkN6HIzw5XZouAKcSzy
1/pKhneYyjF6zL5hh3m+ng7oPcHeDfdmSTzI+KIlaEpHh9gkSmUr6rUS7Ke8
+mSGsQzA9luo32dAOqi7QbYE+eq3abWe1ZpbCg8/KxS4KrH/n2IbF4UdVt+5
7LaZ2CoZU6L5TKhbK7oglXzTklIO9hdb0q5l5LCjuIodYHDEVxwWToAh2f5o
9O7mhbbGHHGfK2RX6Hd/9O4obfJpC5QnX3ZRyun/nlS2W7WuI68jH3m1BcXd
SwZ0pKHoix6l0C15Uw1eOLY2dzGKgcVVkrgYVdm5DmOiN0mf6LDSWnxKFhk5
rnOkf0pgBb3UoioCLzSZoflKI6dO6Kd10trDMnmHcbWGdZ8LW6zIe5z2Glvp
g28kLwwhkClI+EIi1vnIiI+Ub/TgSIn93O20ygyXYc3Ori5nnGHMUWXhhw8/
9frRlb+NenDvbyRf5+5j+DWwoSVEb3mdw6+INSwDhFSfj3QlVnrl1tIXjuC9
AbZpOAzBaw46FOaybWvL8rijOdR3lQKNxL9kZJuGqwPdPum5mM9Av1NoZtW8
rCXgmANII/QHPkFXEd6h0RcFAnN3iRFjT3ECImoho/6hI8M8fdS4HZ3zBi7f
3dkDDkFqwiWvgVzVwjlhYLgkIqNWl7SihYOYopoTFM0c/oBT2J0CIbfSHA0k
CszkfZRfQCmn2HdXd2EU7quf9baZ9tOjM3NuJgQH9iuAColsMO8GY50h/4Hx
Sloj8MNPRzJ+wvghqtBbQtZx9yQ4MbKst1DZII01Vkb3TbrS/XggNs9NQBLw
0jgxpqsHgpz5QqgdlwW/tYVPqB7cXWAbGAjDa2pulqJjxla0nRtcYy0I9YA2
niC+swHAo34aKGeTAz32Gt8gO4E6IQ0MS5GqFHHQjqIXnjlo769pRhmb/rzo
ai1Smxf7LUqKkCByRX6XimzRIrn2A4StOykURTIM2QtqLd8I4GIA9BSgzUHH
UhZtG3yiIrZuQ1UxrDkrg/d69Poni39pQvNgB1MD6taZlmAC9VJVa80VIo9M
qzoER6AKzPCs4RGME860xtomND+9sLAgKKb/fob82mcamzuhbLFwW70TX004
7CimWreW4fNxLH/uy8hS3DNF32pVpzWd/uQZPywXknGe3a5Rje+38Wg8Ghwf
Xg3Go30qDXVydHVxNvjt4MN7Ish/KFB+793wYJi9/GX/5fgly4NzMeVZjjUN
y8KTP5NC98eK0ossNX08+FiupoOH8XA0rIsg3Cg3cloqhK2Pbqa5NL7+FHQS
Mv2Gt/8CU6hIJsICAgA=

-->

</rfc>
