<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-km-detnet-for-ocn-02" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="ocn-in-detnets">Using Deterministic Networks for Industrial Operations and Control</title>
    <seriesInfo name="Internet-Draft" value="draft-km-detnet-for-ocn-02"/>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization>Futurewei</organization>
      <address>
        <email>kiran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization>Futurewei</organization>
      <address>
        <email>richard.li@futurewei.com</email>
      </address>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization>Futurewei</organization>
      <address>
        <email>cedric.westphal@futurewei.com</email>
      </address>
    </author>
    <author initials="L." surname="Contreras" fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>
    <author initials="T." surname="Faisal" fullname="Tooba Faisal">
      <organization>King's College London</organization>
      <address>
        <email>tooba.hashmi@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="09"/>
    <area>Internet</area>
    <workgroup>Detnet Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 51?>

<t>Remote industrial processes enable control &amp; operations from the
software-defined application logic. In order to support process automation
remotely, not only Deterministic Networks (DetNet) are needed but an interface
between the application endpoints to the devices over a DetNet infrastructure
is also required. This document describes an interface to deterministic
networks from the view of endpoints to support process control and operations.</t>
    </abstract>
  </front>
  <middle>
    <?line 60?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Process automation systems involve operating a piece of equipment (such as
actuating and/or sensing field devices). The communication between the
'process controllers' and field devices exhibits a well-defined set of behaviors and
has specific characteristics: the delivery of a control-command to a
machine must be executed within the time frame specified by a controller or
by an application to provide reliable and secure operation.  A low or zero
tolerance to latency and packet losses (among other things) is implied.</t>
      <t>The endpoints ('process controllers' and field devices) embody machine-to-machine
communications to facilitate both remote and local process automation. In this
document, networks that support all the characteristics of remote process
automation are referred to as Operation and Control Networks (OCNs) for
convenience. This document describes using DetNet to enable OCN applications
 since they provide mechanisms for guaranteed delay aware packet delivery,
reliability, and for packet loss mitigation.</t>
      <t>This document defines the interface between an OCN application and DetNet
framework. i.e., using DetNet services for communication between the
controllers and the field devices. This interface is used by an application to
express its network-specific requirements. This document presents the
perspective of an end system. Because IP network stack is widely used by
general-purpose applications and provides more connection flexibility to end
systems, the scope our discussion is specific to the IP-enabled
DetNet data planes <xref target="DETNET-DP"/>. For the other type of field devices,
service level proxy is assumed (section  4.1 in RFC8655).</t>
      <t>Mapping OCNs to DetNet helps with developing a better understanding of how
DetNets can be used in such scenarios. To this end, the document provides a
background on <xref target="background"/> the type of traffic patterns in OCN applications.
It proposes an interface between an application and DetNet, and a potential
solution direction to support OCN traffic patterns over DetNet, as covered in
<xref target="approaches"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>
          <dl>
            <dt>Operational Technology (OT):</dt>
            <dd>
              <t>Programmable systems or devices that interact
with the physical environment (or manage devices that interact with the physical
environment). These systems/devices detect or cause a direct change through the
monitoring and/or control of devices, processes, and events. Examples include
industrial control systems, building management systems, fire control systems,
and physical access control mechanisms. Source: <xref target="NIST-OT"/></t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>process controller:</dt>
            <dd>
              <t>Is a logic control function used in process automation and control systems.
A process controller maintains the operational requirement of a process and
performs functions similar to programmable logic controllers (PLCs) but it can
be either a hardware or software component. The term process controller is used
through out to avoid confusion with 'network controllers' used in network
infrastructures.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Industral Automation:</dt>
            <dd>
              <t>Mechanisms that enable machine-to-machine communication by use of
technologies that enable automatic control and operation of industrial devices
and processes leading to minimizing human intervention.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Control Loop:</dt>
            <dd>
              <t>Control loops are part of process control systems in which
desired process response is provided as input to the 'process controller', which
performs the corresponding action (using actuators) and reads the output values.
Since no error correction is performed, these are called open control loops.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Feedback Control Loop:</dt>
            <dd>
              <t>A feedback loop is part of a system in which some portion (or all) of
the system's output is used as input for future operations.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Industrial Control Networks:</dt>
            <dd>
              <t>Industrial control networks are the
interconnection of equipment used for the operation, control or monitoring of
machines in the industral environment. It involves a different level of
communication - between fieldbus devices, digital controllers and software
applications</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Human Machine Interface (HMI):</dt>
            <dd>
              <t>An interface between the operator and the machine.
The communication interface relays I/O data back and forth between an operator's
terminal and HMI software to control and monitor equipment.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <section anchor="acronyms">
        <name>Acronyms</name>
        <ul spacing="normal">
          <li>HMI: Human Machine Interface</li>
          <li>OCN: Operations and Control Networks</li>
          <li>PLC: Programmable Logic Control</li>
          <li>OT: Operational Technology</li>
          <li>OC: Operation and Control</li>
          <li>OCN: Operation and Control Networks</li>
        </ul>
      </section>
    </section>
    <section anchor="background">
      <name>Background on Industrial Control Systems</name>
      <t>An industrial control network interconnects devices used to operate, control and
monitor physical equipment in industrial environments. <xref target="icn-arch"/> below shows
such systems' reference model and functional components. Closest to the
physical equipment are field devices (actuators and sensors) that connect to
the Programmable Logic Controllers (PLCs) or other types of controllers (Note:
in this memo term 'process controller' will be used to differentiate
from other meanings of controller) using serial bus technologies (and now
Ethernet).  Above those 'process controllers' are Human Machine Interface (HMI)
connecting different PLCs and performing several control functions along
with exchanging data with the applications.</t>
      <t>A factory floor is divided into cell-sites. The PLCs or other types of
controllers are physically located close to the equipment in the cell-sites.
The collection of monitoring, status and sensing data is first done on the site
and then transmitted over secure channels to the data applications for
aggregation and further processing. These applications can be hosted
in remote cloud infrastructure, but are also often hosted within a
limited domain environment, controlled by a single operator, like
on-premise, at the edge or in a private cloud. Both options gain
from infrastructure that scales out, has elastic compute and storage
resources, so they will both be referred to as cloud in the following sections.</t>
      <figure anchor="icn-arch">
        <name>Functions in Industrial Control Networks</name>
        <sourcecode type="drawing"><![CDATA[
        +-+-+-+-+-+-+
     ^  | Data Apps |....            External business-logic
     :  +-+-+-+-+-+-+   :                Network
     :        |         :
     v  +-+-+-+-+-+-+  +-+-+-+-+--+
        | vendor A  |  |vendor B  |  Interconnection of
        | controller|  |controller|  controllers
     ^  +-+-+-+-+-+-+  +-+-+-+-+-+   (system integrators)
     :       |         |
     :   +-+-+-+-+  +-+-++-+
     :   | Net X |  | Net Y|
     v   | PLCs  |  | PLCs |--+    device-controllers
     ^   +-+-+-+-+  +-+-+--+  |
     :      |        |        |
     :   +-+-+    +-+-+    +-+-+
     v   |   |    |   |    |   |   Field devices
         +-+-+    +-+-+    +-+-+
]]></sourcecode>
      </figure>
      <t>What is changing now is that data applications are integrating process control
functions to improve automation and to make real-time decisions,
programmatically. The equipment control and  collection of data generated by
the sensors should be possible over small or large-scale deterministic networks
as illustrated in <xref target="new-arch"/>.</t>
      <figure anchor="new-arch">
        <name>Converged Cloud based Industrial Control Networks</name>
        <sourcecode type="drawing"><![CDATA[
               +-+-+-+-+-+-+-+-+
               |     Data Apps |      Integrated Apps with
               | c1 | c2  | c3 |      Remote process control
               +-+-+-+-+-+-+-+-+
                \   ,-----.   /
                 +-[  Det- ]-+
                   [Network]
                    `-----'
               +-+-+-|  |-+-+-+-+
               |        |       |
             +-+-+    +-+-+   +-+-+
             |   |    |   |   |   |   Field devices
             +-+-+    +-+-+   +-+-+
]]></sourcecode>
      </figure>
      <t>One particular motivation is to provide the behavior of a field bus between
the cloud and the actuators/sensors with the same assurance of reliability and
latency, albeit over wide area networks (WAN). This is evident from many
industrial control applications, such as factory automation <xref target="FACTORY"/>, PLC
virtualization <xref target="VIRT-PLC"/>, power grid operations <xref target="PTP-GRID"/>, etc. that are now
expected to operate in the cloud by leveraging virtualization and shared
infrastructure wherever possible.</t>
      <section anchor="connected-process-controllers-sensors-and-actuators">
        <name>Connected Process-Controllers, Sensors and Actuators</name>
        <t>Control systems comprise 'process controllers', Sensors and Actuators. The data
traffic essentially carries instructions that cause machines or equipment
to move and do things within or at a specific time. The connectivity exists in
the following manner:</t>
        <ul spacing="normal">
          <li>A 'process controller' interfaces with the sensors and actuators. It knows an
application's performance parameters which are expressed in terms of network
specific requests or resources such as tolerance to packet loss, latency limits,
jitter variance, bandwidth, and specification for safety.  The 'process controller' knows
all the packet delivery constraints.</li>
          <li>An actuator receives specific commands from the 'process controllers'. The
Deterministic network between them should support control of actuating
devices remotely from the 'process controller' while meeting all the
requirements (or key performance indicators - KPIs) necessary for successful
command execution. The actuator participates in a closed control loop as needed.</li>
          <li>A sensor emit periodic data from the sensors. It may intermittently provide
asynchronous readings upon request from the 'process controller'. Sensors may report
urgent messages regarding malfunctioning in certain equipment, cell-sites, or
zones.</li>
        </ul>
        <t>In many control systems there is at least one 'process controller' (or server) entity on
one end and two other entities - the sensors and actuators on the other end.
The communication with sensors and actuators is through the 'process controller' entity;
as such data applications do not directly interact with the field devices.
Neither actuators nor sensors perform decision-making tasks. This
responsibility belongs to the 'process controller'.</t>
      </section>
      <section anchor="generalized-communication-model">
        <name>Generalized Communication Model</name>
        <t>To describe networked process control behavior a conceptual communication model
is used so that the data applications do not concern with the details of the
networks realizing operations and control. We refer to this model as operation
and control network (OCN). The scope of the model is</t>
        <ul spacing="normal">
          <li>Logical reference points: identify an endpoint's role or function as
sensor-point, actuation-point, or operation &amp; control point (oc-point for
short). Note: term 'oc-point' is used to avoid confusion with network
controllers and term 'fd-point' is used when both type of field devices are
refered to.</li>
          <li>Interface specification: in terms of associated traffic patterns between the
endpoints as described below in <xref target="ocn-pattern"/>. The interface may be any
type of network (Ethernet, IP, wireless, etc. The model assumes that the
network is capable of providing network services and resources necessary of the
application specific operations and control.</li>
        </ul>
        <t>Depending on the design of the usecase the process 'process controller' functionality
(oc-point) may reside as a software module in the data application or as a
separate module. When deployed as a separate module, another connectivity
interface between the data application and oc-point will be needed and is out
of the scope of this document.</t>
        <t>The applications will use an communication interface between oc-point and
sensor-point to receive sensory data and similarly interface between oc-point
to actuation-point to execute a single or a sequence of control instructions.</t>
        <t>This abstraction provides an additional layer of  protection in the sense that
the traffic patterns between the reference points are well defined so any
exceptions can be easily caught.</t>
      </section>
      <section anchor="ocn-pattern">
        <name>Traffic Patterns</name>
        <t>For either local or wide area, the process automation activities over the
network can generate a variety of traffic patterns between the oc-point and
field devices such as:</t>
        <section anchor="c-loop">
          <name>Control Loops</name>
          <t>The equipment being operated upon is sensitive to when a command request
actually executes. An actuator upon receiving a command (say a function code) will
immediately perform the corresponding action.
</t>
          <t>For several such applications, the knowledge of a successful operation is equally
critical to advance to the next steps; therefore, getting the response back in
a specified time is required, leading to a knowledge of timing. These types of
bounded-time request and response mechanisms are called control loops.</t>
          <t>Unlike general purpose applications, commands cannot be batched, the
parameters of the command that will follow depends on the result of the previous one.
Each request in control loop takes up a minimal payload size (function code,
value, device or bus address) and will often fit in a single short packet.</t>
          <t>In Detnet-enabled network, it can be imagined as a small series of packets with
the same flow identifier, but with different latency constraints.</t>
          <t>It is required to support control loops where each request presents its own
latency constraints to the network and where commands are small sized packets.</t>
        </section>
        <section anchor="ocn-intervals">
          <name>Periodicity</name>
          <t>Sensors emit data at regular intervals; i.e., there may be more tolerance to
variations in jitter between the measurement intervals. Usually, 'process
controllers' or applications listening to sensor data are programmed to
tolerate and record intermittent losses or delay variations upto certain number
of times. Therefore, time criticality is not always high.</t>
          <t>Notably, industrial software now increasingly rely on sensor data collection to
monitor the state and behavior of the entire shop floor.  Thus, the number of
sensors are growing and the combined traffic volume generated by sensors is
expected to be very high. In fact will contribute to a large percentage of ocn traffic.
Moreover, the periodicity of each sensor will also vary based
on the equipment.</t>
          <t>It is required that network capacity is planned appropriately for the periodic
traffic generated from the different sensors. The periodic interval should also
be preserved in the network because any variations could provide false
indications that the equipment is misbehaving.</t>
        </section>
        <section anchor="ordering">
          <name>Ordering</name>
          <t>In real-time process control communications, out of order processing of related
messages will lead to costly failures of operations.  For example, Messages
such as request and reply, or a sequence of commands to different endpoints may
be related in some
way. therefore, both time constraints and order must be preserved.
</t>
          <t>The network should be capable of supporting sporadic on-demand short-term flows.
This does not imply instantaneous resource provisioning, instead it would be
more efficient if the provisioned resources could be shared for such
asynchronous traffic patterns.</t>
          <t>Another consideration with ordering is that both actuators and sensors are
low-resource devices.  They can not buffer multiple packets and execute them in
order while maintaining the latency bounds of each command execution.  This
means the network must pace packets that may arrive early.</t>
        </section>
        <section anchor="urgency">
          <name>Urgency</name>
          <t>Besides latency constrained and periodic messages, sensors also report failures
as fault notifications, such as pressure valve failure, abnormally high
humidity, etc. These messages must be delivered with utmost urgency and
immediately.</t>
        </section>
      </section>
      <section anchor="communication-patterns">
        <name>Communication Patterns</name>
        <t>Control systems follow a specific communication discipline. The field devices
(sensors and actuators) are always controlled, i.e., interact with the system
through 'process controllers' in the following manner:-</t>
        <ul spacing="normal">
          <li>Sensor to 'process controller': data emitted at periodic interval providing
status/health of the environment or equipment. The  traffic volume for this
communication is determined by the payload size of each  sensor data and the
interval. These are a kind of synchronous Detnet flows but with much higher time intervals; still the inter-packet gap should be minimum.</li>
          <li>'Process controller' to/from actuator: the commands/instructions to write or read.
Actuators generally do not initiate a command unless requested by the
'process controller'. Actuators will often execute a command, read the corresponding
result, and send that in response to the original write command.  The traffic
profile will be balanced in both directions due to requests/ response behavior. These are like asynchronous flows but without the observation interval constraint.</li>
        </ul>
      </section>
    </section>
    <section anchor="gaps">
      <name>Gap Analysis</name>
      <t>Today, most of the operations and control solutions are split approaches. This
means that the 'process controller' is on-premises close to the equipment, sensor data is
first collected on-site, and then bulk transmitted to the enterprise cloud for
further processing.</t>
      <t>To support delivering remote instructions to the machines over wide area
networks using Deterministic Network data plane architecture
<xref target="DETNET-DP"/> and corresponding data plane DetNet over IP
<xref target="DETNET-IP"/> mechanisms apply as discussed in <xref target="detnet-rel"/>. Later in
<xref target="depend"/> additional asks from DetNet are covered.</t>
      <section anchor="detnet-rel">
        <name>Deterministic Networks Relevance</name>
        <ul empty="true">
          <li>
            <t>Note: This section's text and explanation on DetNet can be removed.</t>
          </li>
        </ul>
        <figure anchor="detnet-arch">
          <name>A Simple DetNet-Enabled IP Network, Ref. RFC8939</name>
          <sourcecode type="drawing"><![CDATA[
 DetNet IP       Relay                        Relay       DetNet IP
 End System      Node                         Node        End System

+----------+                                             +----------+
|   Appl.  |<------------ End-to-End Service ----------->|   Appl.  |
+----------+  ............                 ...........   +----------+
| Service  |<-: Service  :-- DetNet flow --: Service  :->| Service  |
+----------+  +----------+                 +----------+  +----------+
|Forwarding|  |Forwarding|                 |Forwarding|  |Forwarding|
+--------.-+  +-.------.-+                 +-.---.----+  +-------.--+
         : Link :       \      ,-----.      /     \   ,-----.   /
         +......+        +----[  Sub- ]----+       +-[  Sub- ]-+
                              [Network]              [Network]
                               `-----'                `-----'

         |<--------------------- DetNet IP --------------------->|
]]></sourcecode>
        </figure>
        <t><xref target="detnet-arch"/> illustrates a DetNet-IP dataplane divided into two sublayers
and is specified in <xref target="RFC8939"/> . The forwarding sub-layer is responsible for
resource allocation and explicit path functions, whereas the service sublayer
provides packet replications, sequence numbering, and other functions. Within
the Detnet nodes, resources are allocated a priori for a flow. The
DetNet-enabled end systems originate traffic encapsulated with Detnet
forwarding and service sub-layers; otherwise relay node will create those
based on information received from the end system (via traffic classification).</t>
        <t>The DetNets support both asynchronous (by allocating resources for the
observation interval) and synchronous (with repeating schedules) flow behaviors
(Section 4.3.2 in <xref target="DETNET-DP"/>). The granularity of traffic treatment
is at the flow level specified by 6-tuple information, including DSCP.</t>
        <t>Realistically, leveraging DetNets for Operations and Control (OCN) traffic
patterns <xref target="ocn-pattern"/> directly depends on how DetNets will provide network
knowledge to the applications.</t>
      </section>
      <section anchor="depend">
        <name>DetNet related Considerations and Dependencies</name>
        <t>A DetNet-aware node should express the network requirements as part of either
forwarding sublayer or service sublayer. <xref target="DETNET-IP"/> doesnot specify
the interface to how those sublayers are mapped. This can be a non-trivial
task, as an OCN-application, will first need some way to request its DetNet
service provider or the operator. The DetNet operation is expected to allocate
resources and return a mapping  - possibly a DSCP (DetNet Qos) for each pair.
This could be become a tedius scaling problem as the number of 'process
controller'-device pairs start
to grow or keep changing.</t>
        <t>Given that only DSCP is available, field-device pair can pose issues such as:</t>
        <ul spacing="normal">
          <li>How can application request the proper network-resource for each command?</li>
          <li>How can an application  receive periodic data from sensors and with what interval?</li>
          <li>What are the ways to differentiate a less sensitive (periodic) updates from
urgent alarms.</li>
          <li>Or  how to differentiate data received from a sensor vs an actuator (with
stringent latency requirements) and process them accordingly?</li>
        </ul>
        <t>These issues are described below in more detail.</t>
        <section anchor="app">
          <name>Operator vs Application view</name>
          <t>The DetNet data plane is designed with a network-operator-centric approach. The
operator's view on dealing with large-scale networks is being discussed
in <xref target="I-D.ietf-detnet-scaling-requirements"/>. In order to use
resources efficiently, flow aggregation is done. The operators in industrial
control networks are not necessarily network experts; they simply need an
application side tool to dispatch their request to the Deterministic networks'
entry point. Especially, an OCN application may need many
'process controller'-field-device (ctrl-flddev) pairs to the be mapped to different
aggregates.</t>
          <t>As the number of ctrl-flddev pairs grow, their variable traffic profiles can
become hard to manage.</t>
          <t>The Detnet service provisioning internals should be transparent to an OCN
application. This can be achieved with a common signaling or user-to-network
interface between the applications and DetNet.</t>
        </section>
        <section anchor="class">
          <name>Flow reservation and classification</name>
          <t>Inside the DetNet, flow identification is done using IP header and DSCP
information. These flow identifiers are then used by DetNet nodes to provide
the corresponding traffic treatment. For a variety of commands and sensor data, latency or interval
parameters will vary and DSCP maybe limited in expressing all the possible requirements.</t>
          <t>Encoding requirements into each packet explicitly can provide deterministic
scheduling even in
an otherwise link that can be congested  when used with non-deterministic flows.</t>
        </section>
        <section anchor="split">
          <name>Split Traffic flows</name>
          <t>One of the most constrained design elements in today's industrial control
systems is that data from the sensors is collected on-site and often aggregated
before transporting
to the cloud.  Historical reasons for this approach do not apply anymore.  Due
to growth in sensor data, it now requires a much larger on-site storage
infrastructure which is expensive.  Applications also expect real-time
streaming telemetry data.  Although latency constraints are not as strict as
for control loops, sensor data need to preserve periodicity (<xref target="ocn-intervals"/>),
thus could use DetNet service support.</t>
          <t>Leveraging DetNet could eliminate split traffic flows by collecting the
sensor data by the applications. This also allows  'process controller's to be run and
operated from the cloud platforms where much more powerful compute capabilities
and available.</t>
        </section>
        <section anchor="prov">
          <name>Provisioning for variety of Traffic flows</name>
          <t>Different operational scenarios have different constraints; even commands
within the same application will have different time requirements.</t>
          <ul spacing="normal">
            <li>Different types of latency bounds will be required between a 'process controller' and
an actuator pair based on the type of end-equipment and precision
requirements. Out-of-order message processing may lead to failures and shutdown
of operations.  Messages may also be correlated. Therefore, time constraints
may be applied on a single message or on a group of messages.</li>
            <li>Similarly, each sensor-'process controller' pair may come with its own interval
requirement. Sensors emit data at regular interval but this type of
information may not always be time-constrained. The gaps between the period
can provide an indication to the 'process controller' about communication or other
                                                                   problems.</li>
            <li>Additionally, some faults and alarm messages are urgent reports and must be marked and
transmitted accordingly.</li>
          </ul>
          <t>It is not clear if all these variations can be predictably resolved without any
additional information offered to the DetNet forwarding plane. For example, if
two independent OCN flowlets (that is, ordered group of packets that are related at
process control logic) with variable bounded latency are classified to the same
DetNet flow, they will receive the same treatment, regardless if one has the
shorter latency than the other and may end up behind a flowlet with longer
latency value. On the other hand, if an OCN flowlet have packets with different
latency values, they could end up in different DetNet flow and may not reach
destination in a specific order.</t>
        </section>
        <section anchor="sec">
          <name>Security</name>
          <t>Operations and control networks also have split security boundaries. They have been
designed to be air-gapped or secure by separation. Current systems have strict
admission control, ingress and egress policies.</t>
          <t>From network layer security perspective, how DetNet-enabled network deals with
security falls in the <xref target="RFC9055"/>, the end systems expect those mechanisms in
place. In particular if additional information is distributed for datapath
decisions, integrity protection as per Section  7.2 of <xref target="RFC9055"/>.</t>
          <t>The border gateways and firewalls will be more prone to errors related to
provisioning churns if the system is dynamic or continuously changing.</t>
          <t>The transport layer deals with the end-to-end encryption. It should evolve to
incorporate additional IoT-friendly(lightweight) protocols such as COAP, MQTT
and their encryption mechanisms.</t>
        </section>
      </section>
      <section anchor="summary-of-gaps">
        <name>Summary of Gaps</name>
        <ul spacing="normal">
          <li>Application view (<xref target="app"/>: An OCN application is unaware of how DetNet services are
provisioned. A common UNI between the applications and DetNet-enabled
network needs to be added to the current framework to better map the
expectations better.</li>
          <li>Security (<xref target="sec"/>): of process control related metadata to be used by network
must be secured.</li>
          <li>Traffic behavior (<xref target="prov"/> and <xref target="class"/>): Within the same DetNet flow, classified via
6-tuple, additional information/metadata must be supported so that dynamic
traffic patterns can be scheduled deterministically.</li>
          <li>Split traffic (<xref target="split"/>): Leveraging DetNet should eliminate split traffic
flows by direct collection of sensor data by the applications. This also
allows  controllers to be run and operated from the cloud platforms where much
more powerful compute capabilities are available.</li>
        </ul>
      </section>
    </section>
    <section anchor="approaches">
      <name>DetNet Potential Approach</name>
      <t>Remote process automation presents different types of traffic profiles and to
deal with them within the DetNet framework, we discuss few possibilities.</t>
      <t>The DetNet UNI will enable applications to convey specific requirements to
DetNet-aware Network. Note, that it is just an interface and blind to the
internal implementation of such networks.</t>
      <t>The DetNet architecture does not describe how DetNet-aware node can design DetNet sub-layers.
 But even from the view of an end system the separation between
forwarding and service sublayer functions should be maintained. This means, the DSCP should not be
overloaded and DetNet-IP forwarding layer should be extended.</t>
      <section anchor="application-association-to-forwarding-sub-layer">
        <name>Application association to Forwarding sub layer</name>
        <t>Applications should convey specific resource requirements to the DetNets they
connect to. There are two potential options: (a) The DetNet Relay-node performs
translation and binding to one of the DetNet services in the DetNet; or (b) or carry
the application defined data over DetNet as is and enable processing on transit nodes.</t>
      </section>
      <section anchor="encapsulation">
        <name>Encapsulation</name>
        <t>OCN applications are expected to be IP based end stations. (MPLS DetNet will
not apply). It is also reasonable to assume that the data plane is IPv6 and
Extension Headers are used for support in DetNet.</t>
        <t>The end system network requirement is expressed as 'OCN flow QoS'.
Each packet carries its own unique OCN-QoS. The meta data to be transmitted to DetNet are:</t>
        <artwork><![CDATA[
  - Async traffic with latency-information.
  - Sync, periodic traffic
  - urgency of messages
  - Flowlet identification (for related packets).
]]></artwork>
        <t>This can be implemented using the HBH extension header option.</t>
      </section>
      <section anchor="operation-and-control-network-option-ocno">
        <name>Operation and Control Network Option (OCNO)</name>
        <t>The OCN Option (OCNO) is a hop-by-hop option that can
   be included in IPv6 for OCN traffic control extensions.</t>
        <figure anchor="ocn-detnet">
          <name>Explicit Traffic Control HBH Options</name>
          <sourcecode type="drawing"><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                   |  Option Type  |  Opt Data Len |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | OCNF flags     |   OCN-TC-Flowlet nonce       |  sequence     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                (bounded latency spec)                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                (Delay variation spec)                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></sourcecode>
        </figure>
        <dl newline="true">
          <dt>Option Type:</dt>
          <dd>
            <t>8-bit identifier of the type of option.  The option identifier
   for the OCN Option (0x??) to be allocated by the IANA. First two bits
  will be 00 (skip over this option and continue processing the header.)</t>
          </dd>
          <dt>Option Length:</dt>
          <dd>
            <t>8-bit unsigned integer. Multiple of 8-octets.</t>
          </dd>
          <dt>OCN Function Flags:</dt>
          <dd>
            <t>Some flags require metadata, others dont.  So process flags in order, if the
flag is off,  following metadata will not be present.
</t>
            <table>
              <thead>
                <tr>
                  <th align="right">Flag</th>
                  <th align="left">Description</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="right">U</td>
                  <td align="left">send message immediately. its an alarm</td>
                </tr>
                <tr>
                  <td align="right">P</td>
                  <td align="left">periodic packet (intervals in ~ms)</td>
                </tr>
                <tr>
                  <td align="right">F</td>
                  <td align="left">part of flowlet. see Nonce and seq</td>
                </tr>
                <tr>
                  <td align="right">L</td>
                  <td align="left">bounded latency spec provided</td>
                </tr>
                <tr>
                  <td align="right">R</td>
                  <td align="left">Reliability with no packet loss tolerance</td>
                </tr>
                <tr>
                  <td align="right">V</td>
                  <td align="left">Delay variation with no packet loss tolerance</td>
                </tr>
              </tbody>
            </table>
          </dd>
          <dt>Flowlet nonce:</dt>
          <dd>
            <t>16-bit. identifies that a packet is associated to group of packets and shares fate.
 as an example, an application can set same nonce for a set of an actuator and sensors.
when set to 0,flow id  flowid is set to same value in related flows. when flow id is also 0, no
relationship exists.</t>
          </dd>
          <dt>Flowlet sequence:</dt>
          <dd>
            <t>8-bit. sequence to be used for ordering with in flowlets.</t>
          </dd>
          <dt>Bound Latency Spec:</dt>
          <dd>
            <t>32-bit. Encodings, to be defined.<br/>
16-bit (upper bound), 16-bit (lower-bound). This field will provide upper and lower
latency bounds describing the the latency bounds in milliseconds corresponding
to the packet.</t>
          </dd>
          <dt>Delay Variation Spec:</dt>
          <dd>
            <t>16-bit. for synchronous stream, delay variation tolerance in ms.</t>
          </dd>
        </dl>
      </section>
      <section anchor="ocno-operation">
        <name>OCNO Operation</name>
        <figure anchor="ocn-interface">
          <name>An interface from 'process controller' to DetNet</name>
          <sourcecode type="drawing"><![CDATA[
   OCN
 Controller         Ingress Relay        Egress Relay      OCN
+----------+             Node                Node        fld-device
|   Appl.  |          <----------DetNet-Service ------>   +-----+
+----------+        ............           ...........    |Appl.|
| OCNO-EH  :--UNI-->: Service  :-- DetNet -: Service  :   +-----+
+----------+        +----------+           +----------+   |IPv6 |
| Ipv6     |        |Forwarding|           |Forwarding|   +-----+
+--------.-+        +---.------+           +----------+
    :   : OCN scope    :                         :
    :   +..............+                         :
    :--------------------------------------------:
              extended scope
]]></sourcecode>
        </figure>
      </section>
      <section anchor="ocno-extension-header-signaling">
        <name>OCNO Extension Header Signaling</name>
        <t>The current definition of OCNO only covers application to DetNet unidirectional interface. It is possibile to extend OCNO EH for conveying errors from DetNet to the 'process controller' as well - for example, when service violation happened in the DetNet, Relay node will set error flag in OCNO EH. Field devices are considered resource constrained and are not expected to insert or process extension headers.
Due to flow aggregation, it is upto the DetNet operator to design mapping between an application and the DetNet.</t>
        <t>Two different options of carrying hop-by-hop options are considered.
 1. EH is inserted by application and Relay node performs mapping to DetNet flow.
 2. if the DetNet dataplane is IPv6, then EH can be carried all the way to last Relay node, which
    acts as gateway for the fld device and performs EH specific functions.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>To request an option code.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See section on security above.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DETNET-DP">
          <front>
            <title>Deterministic Networking Architecture</title>
            <author fullname="N. Finn" initials="N." surname="Finn"/>
            <author fullname="P. Thubert" initials="P." surname="Thubert"/>
            <author fullname="B. Varga" initials="B." surname="Varga"/>
            <author fullname="J. Farkas" initials="J." surname="Farkas"/>
            <date month="October" year="2019"/>
            <abstract>
              <t>This document provides the overall architecture for Deterministic Networking (DetNet), which provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency within a network domain. Techniques used include 1) reserving data-plane resources for individual (or aggregated) DetNet flows in some or all of the intermediate nodes along the path of the flow, 2) providing explicit routes for DetNet flows that do not immediately change with the network topology, and 3) distributing data from DetNet flow packets over time and/or space to ensure delivery of each packet's data in spite of the loss of a path. DetNet operates at the IP layer and delivers service over lower-layer technologies such as MPLS and Time- Sensitive Networking (TSN) as defined by IEEE 802.1.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8655"/>
          <seriesInfo name="DOI" value="10.17487/RFC8655"/>
        </reference>
        <reference anchor="DETNET-IP">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: IP</title>
            <author fullname="B. Varga" initials="B." role="editor" surname="Varga"/>
            <author fullname="J. Farkas" initials="J." surname="Farkas"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Fedyk" initials="D." surname="Fedyk"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery. This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8939"/>
          <seriesInfo name="DOI" value="10.17487/RFC8939"/>
        </reference>
        <reference anchor="RFC8939">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: IP</title>
            <author fullname="B. Varga" initials="B." role="editor" surname="Varga"/>
            <author fullname="J. Farkas" initials="J." surname="Farkas"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Fedyk" initials="D." surname="Fedyk"/>
            <author fullname="S. Bryant" initials="S." surname="Bryant"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery. This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8939"/>
          <seriesInfo name="DOI" value="10.17487/RFC8939"/>
        </reference>
        <reference anchor="I-D.ietf-detnet-scaling-requirements">
          <front>
            <title>Requirements for Scaling Deterministic Networks</title>
            <author fullname="Peng Liu" initials="P." surname="Liu">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Yizhou Li" initials="Y." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies USA</organization>
            </author>
            <author fullname="Quan Xiong" initials="Q." surname="Xiong">
              <organization>ZTE Corporation</organization>
            </author>
            <author fullname="Jeong-dong Ryoo" initials="J." surname="Ryoo">
              <organization>ETRI</organization>
            </author>
            <author fullname="zhushiyin" initials="" surname="zhushiyin">
              <organization>New H3C Technologies</organization>
            </author>
            <author fullname="Xuesong Geng" initials="X." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   Aiming at scaling deterministic networks, this document describes the
   technical and operational requirements when the network has large
   variation in latency among hops, great number of flows and/or
   multiple domains without the same time source.  Different
   deterministic levels of applications co-exist and are transported in
   such a network.  This document also describes the corresponding
   Deterministic Networking (DetNet) data plane enhancement
   requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-detnet-scaling-requirements-03"/>
        </reference>
        <reference anchor="RFC9055">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman"/>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi"/>
            <author fullname="A. Hacker" initials="A." surname="Hacker"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
              <t>This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
              <t>This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9055"/>
          <seriesInfo name="DOI" value="10.17487/RFC9055"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="FACTORY">
          <front>
            <title>OCN Use Cases for Industry control Networks</title>
            <author fullname="Cedric Westphal" initials="C." surname="Westphal">
              <organization>Futurewei, USA</organization>
            </author>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei, USA</organization>
            </author>
            <author fullname="Kapal Dev" initials="K." surname="Dev">
              <organization>Munster Technological University</organization>
            </author>
            <author fullname="Luca Foschini" initials="L." surname="Foschini">
              <organization>University of Bologna</organization>
            </author>
            <date day="7" month="July" year="2022"/>
            <abstract>
              <t>   This document present industrial networking use cases for Operations
   and Control Networks (OCN).  It is a companion document to the OCN
   reference model and the OCN problem statement and requirements
   document.  This document compiles a list of potential use cases where
   new industrial networking protocols could be beneficial.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wmdf-ocn-use-cases-00"/>
        </reference>
        <reference anchor="VIRT-PLC">
          <front>
            <title>Virtualization of PLC in Industrial Networks - Problem Statement</title>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Lijun Dong" initials="L." surname="Dong">
              <organization>Futurewei</organization>
            </author>
            <date day="5" month="March" year="2022"/>
            <abstract>
              <t>   Conventional Programmable Logic Controllers (PLCs) impose several
   challenges on factory floors as their numbers and size on the factory
   floors/plants continues to grow.  Virtualized PLCs can help overcome
   many of those concerns.  They can improve the automation in Industry
   control networks by simplifying communication between higher-level
   applications and low-level factory floor machine operations.  Virtual
   PLCs provide an opportunity to integrate a diverse set of non-
   internet protocols supporting Industrial-IoT and IP connections to
   improve coordination between applications and field devices.  Besides
   automation, virtual PLCs also enhance programmability in industry
   process control systems by abstracting control functions from I/O
   modules.  However, to achieve desired outcome and benefits, both
   operational and application networks should evolve.

   This document introduces virtual PLC concept, describes the details
   and benefits of virtualized PLCs, then focuses on the problem
   statement and requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-km-iotops-iiot-frwk-02"/>
        </reference>
        <reference anchor="PTP-GRID">
          <front>
            <title>IEC/IEEE International Standard - Communication networks and systems for power utility automation – Part 9-3: Precision time protocol profile for power utility automation</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2016"/>
          </front>
          <seriesInfo name="IEEE" value="standard"/>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2016.7479438"/>
        </reference>
        <reference anchor="NIST-OT">
          <front>
            <title>Risk management framework for information systems and organizations:: a system life cycle approach for security and privacy</title>
            <author>
              <organization/>
            </author>
            <date month="December" year="2018"/>
          </front>
          <seriesInfo name="National Institute of Standards and Technology" value="report"/>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-37r2"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIACQ+q2QAA719e5PbxpXv//0peq2q1UyZoGQ5cWzm5jHWw56KHhPNON6t
JPdekGySHYEAA4Azokfaz77n2Q8QlJ2qvZcpR0MQ6Ofp8/ydg6IoTDmft+52
ZptFXfi6WLq+dn1nlvC93LqZXbblqi/ebeWXYtW0Bd77+InpfV/BHT90vl7b
Z6537dbXvuv9wr52/V3Tvuss3G4v6+W+61tfVvbNzrVl75u6s2W9tE+bum+b
yizLHhqyq7LqnFnAl3XTHmbW16vGwJOu3OKXpds5+L+6N8bv2pntW2j2yePH
38BYSrhpZj+7rGEUMMzPDHa/bpv9Dq4+o6Hb7/DrZ+adO8CPy5nVm4tnOEcD
PcGY/k9ZNTUM5uA6s/Mz+9e+WUxs17QwjFUHfx22+MffjSn3/aZpZ6YwxsLH
193M/mlqX5XvNv4fZe3pKi/in3xb1oNfmnYNf/5EqzGzL/b9vnV3jn9z29JX
M/sOH5t616/+uMYr00Wzhe5Cb2+n9mXazVu/2JTtUi9CDycabvnGaeX/uNLf
h40/ndofXdfvNmWVdPHULeHh/JfT/Szo7umd3H26s5dTpgWgji7p7eXed/bV
8Dfq78ZVbtXUflGmHVbwwNav9w7XSp7Z7ltfVc0f+/DEsPebqX1R+i6bqL1p
mnmZXs837E9A9A87GFlVubWzL5t62dTpUHp8fropu83WJ9tnkKjbLbRy62Zw
/4uLpzdv3v4ndGgvi2fTu+1yRedr37liUXYOp/yXy7c3xdXLpzO+Bw6jb/pm
1xUe/i1W7d07uOnq5qr47u3ls5l99uZy+sXj6RdfPP7m0eXz58+vb55Nnzz+
4qvpb371m29+9eXXcPPry+ub4s0NNCg3f/X4ydeP8Or0+mr69ePHxZe/aZ8Y
UxSFLedwBMsFHJC3btv0Dk+inudd2yxcB6O0ri7nlbMLPtH2320Tj/qqbba2
3zjTNav+Do4qMJOVr93SlrtdBRuCt9mqWQOtwKmElV66FhbQdvvdDk6edmPh
yDVbutu0NJbqMLF109umrg6nWNAZXIcv5xY6trVzS+h3vu+BAcFM4IlVuXBm
Dnc7V+Mos0EBw9k1cFuHw8Efl+7Ww1hscwtDLC23jZwKKA0Y0gIJ3ADVAitr
bOv+ufetW07tzQauAVPdb4F/QSPdovVz12WDwC6W6RxMHdiorKC99e7ONqt8
XMNl0k1AFhu3YcrbufXLZeWMeYD8r22WMGSc6P0Dj18/GnN1tNjA9LrebTsY
6m1T3TptFNh+aXfewdBxSDDXHU3vrNsvNhZOK1DNXu6rl49AFHSuJmmx8q5a
6lqe4/Ig6Wy3+1oXPtkQ83Awscq13UOaXdaOde83fu5hTUp756oqUFkHOwQD
nLtNeeublmSPgZNpu51b+BUQC7JDGKxrad2BJfBWV3BI2wM+W2rfBQ4Tu4Z1
L822XGygC7uFAwHtwwjcYt9Dl3e+hx+omd5vHWwgcBXtDwnwEJuE6QDJG7xU
Z8QHXcDMb/3SASVVng4Ydt1BJ62LWzu19gKODxBGa39ybWP6BtosayapCuRp
vTjQk7ty8Q4Wo2rozJ6V2wY2o4FRwnGD8a67cwt06rcwBqBaY3BfIqmd/cKN
OAceOG+WByvLU/RNIX+abJeJeoH0feV7GKWdw1Asn2xqtWoWkckkBElcAgZM
egodKWADelb6TdmHI1FWFW3CYINxS6Ufad0k5I6MAoS8a+Ho0j53UXFJ9ZaE
x7x5+hqmDZwdJljfutrDkrvTx36vOhMyD+hBuCe0khIA8H64D3dx4w6BFLYO
JgMMYsva1XoPMwMW4nD5qxL2GTms7rTS8MQwBeFKA8+kLYOHE3oAxtD7NS8v
bnw+cDxIHa1kZFd6RIFqBwOn9nl2higfV2lq/dRNJ/ncO9fy2cXRnOYACb1R
2ziQjORkqePgPC6yHLThqTLu/a5FikJeIXRTBF4gTBsn3g13EB9zxHVhUEAS
+BBKcmIRJC2EV07tt25Rwgjs5ZV2YUHBXLzDkd3BPoLAkgGatauBuqpit293
TZcJIJ6ubD3sUdOSjK0dc+1V5d573lQmo6URXj2hNeoWwCRss2/t0neLfdfh
Qz5hfCLVLq8KJsGlkY0BlRx4e1Xitt/f/9uz5zevn98Uz65+9/bF06+/+vWv
P34Epalp6WlhIIcdrUO2LxMjO2wrd+voLL8/4AjKroMlXYKskKnYX02/gP2z
0v45EOErWAikFTxcOFIZ2sZVu444LPbiqmbHkggIBnbf7sFGaEmXx8swoE1z
J7MCxlUiYfHKQ2ckqLoFzL31De52Q2wFF5IXMNl52YLSzGEX0bRA6QqC8z5+
//iROb6sBKhNK1zkXYkDq5E8j4741FxS47jxA3UgOV/jZ4vPMWwT8LG6B30M
FKxqTzctgYIXKkSUGWLfR2MiRSa0h6wdLtDqmPt76LdtgHO7DvYbdYYb0k4a
0NUOoE5Etghs+gb4Ev8C7PDmHJTbmQVdYg3nf0vcTbUIoBqV2MSracaoYNKW
4gLuNofOI+t39a1vm5q1CngOJG+5duOP26PHTfI4KxldGMUjbQM1LngY2Q+d
11LWDkVGvUbeC1u7poYNiEvfN22i0KiqBbutFB+VYt4fIFHiJM/flyBXHVLB
otovQUuMerQ2Ew7vfO8rol+eMS1A+HHlW3f0iCFGoQtXLjJNMMqMqb0GdrAA
C+f+XqyAjx9xK49FO5onYCWjOkW6eWhtta+ZtvQYHUtomvlgiFNzMdILzBB2
EP5j8dIkFJVwYtbBQj/A5+A+NKS6MBrgan7rq7IVvSkSXjZ6kiFnYE2BvEYz
wPfIFAwqb574WGnRNiYhihqrmCwonHZNDUNhbRXV9LHZiNwxSjbNngR8edt4
WpDVnngw0epDFQyZOqWLKj+a3LYgNV5dKrBGF2HJebteRe2ATodoFsea2FDa
kjiCZTa9nmPv8jZ0dxfjBgZuUULSchyMyC8xEytXElnDkqCVs/U/4bfNfquc
Dw8LqyBFULNeNs2O2IleqOBCZ1nNaYk2hqZPtFjs3cYvNgZYN1pi4UZYSdjO
jhQF4e1LZH++3vGOITGO6LsPJ9JgoD9SL5uWG6TJlXw6zljTYSMIzI5zWq8W
VkBIfd9jX7dltcdtvSZVrwYp3rbEWVpl4ThE7s2xWEI2hSQJ2q2jHajDxGlp
aPVegEqIomm4jLCOF3alP+L91IEsZClLF1YOTgBYLig/aE4wMuj1nAhlo9z0
YaeTUbUrrCTqdez2GZiiqVtwqE/TZl8es8eg4+PskSETyST6UGaG0kBWqqNo
55PIs4H3RIYOE5KTQVTDqq6eskSQgO3RqyHckbRYgaWA/bGGA+3kJ6sIgpw0
o/m+i6Ji6ddg+VR2qN8q1zGZNQCL9j2dlFdyhC+DrnD2/atLELmwtWMaRFwA
3D7Rn2W2U3NsfMcWWjQpOnv56A1rhEQzYj0AB0tUFG3/YWfYhVEyf4CBRSYK
5yrlHbL8cc9Qx3hgLxaw1octT/jV5ezUrFEBefp6dsKrHKgJbiPnWaaMvCSZ
oA5oaOhmdkKboV5m4xbg0QjGBwCK07eZ0jhC+9fCse4fJPqkMbSfpw6CTek/
kBUTPiw1b4mbpGuuOkyiY4UD47O+EpoHreH+3i/qomwXG1By5w69DR0o1p1h
FZoH/5DNZrR9YW/BxmFSEQFN4xchCi0+rVDlVV5rRsaDFJN7eM4CMxVHSN0R
YyUxJeuABh7S9+ntTlUAWIlovpBfINMTXoNqPTOevQ2gRm0blvxjkgGEelUF
6wKdecoaPOyCIR8e97V1IKLr9aC7czGNwWLC9UdGkcniM5xyDcbMc2wESOAc
HT9z0NdhdGg3nnDPwCp+km0YZaDQd+RmuDxsfLLo4ZHdoqF6pAiiu7Op16zA
u/ekOVNryDKCWp6bPaAMwhBgKw9gxTYNaU5Lz3IYyBoYBbrwOt+zce94QEfb
lbsG2qj8g32N7iN0xi2Q0lSmZ+ROsjv2I6wQGgviJEqICdrv/T5SXpghjBxU
ciDlJdA2Hm+SjNCiEV5bo9lVd1vf43DI4hIfHi5V7aroXsb2MvsffUrlet26
dWQwq31LiyD7DQNR6yZ7VIxdoA3oFolYXF6wHvvlwGc9YZ84DIk818CwYdT8
pDozS1OBwoYXlg0q7SmHmESaE+cmjqqKYmdiK//OmaYudjAK30GHcGRpQ5Zr
0rSxB5iRvy11iFP7LToEmx1PZw198inKhy4eP9hzR3rIxKJvFwRXx7rqFvQQ
cZzCQMCaMqCrkRGE8byGvWt8dhuSaUPnn64Xu51gjs0dn4aF0vJ/4WfZlnid
w4H4+bxI/sdX/7e1H+wz3OSLHaiwH6bwscnn+Xu0yvn0oyrSFWS88MOzQZN8
Kf+IzAkP8OdD+H3Gv9weNRW/6FjpOdDHl7A5F9TGB/n2LX27PFK+kufiscTn
sm/JiQ2LcnIwOMmzoJL2bt2yLp1PMM7vQ/xh2F7YhBk9ga6k/6BZ0Z//+SGs
DFwhZsM/0p8fChqJCKJibApH/dEjH7KBhnHGPwbjtUd/pMOSB4/+eJFKybAL
J1skcjX3M/tAhbqlYP7vPnsROLof1VJUpfkMVJMfyfvS2cDuQTbhdzqOx4wM
eYvuIN49EFYmChM4dX6LRpkbehTQbCzf4QEtq4ICK0u38GhRdxMTbP6e+T+L
jcjvU81zwOVptOyG7dknSyyc1QtUdPawvHM0g4Dboj7BPHyL4QU4D1XZrl1B
HCiP4AWLxaBBVFVkTvRs39/f1+5ONKqTLCTdyGNuEj9MTwlj4cuXst7QI11G
Tn786OIL/L8n9OeX+ujbLDwSdulfHZj9G/w3KfCDjO7R0e/QxF8tOiAL+/eR
x+HzVyG6v4/9aP8vtf1wfGB4gD+9ZMkfH/I7jg7PSCtHB/FnDuQn2o1nUslC
z+RTjCgBgS1RZQZBNC9Rv/yZw/mmZueIX+zRJQZ7iYJVvAlJYBHpXAOjbP+z
xo3ap1h3dBZYBqrtGNTwR3pGgpbXYaATvfscgKRAW4g8kQUiAUlQAKq58z2f
JQyJIIsoo5F/9uPF63MN7IBAx/HCMSYNANTZw5gDNeU4Eytx6KBoJtzk/l6Q
Fx8/TpDFG1BlYE6VADzgd0Vd4A275g7GuG59GlCHexR0gfe4fjFl3kdAA9DT
3XsMD2W2WFA6eScP5DQAnQQZ4mAEpLBsoK3lwAVo70D3w8cCO2Kz+SmLYuhP
QvhFYu9M7LXsFLZ7oftngOJmaPzDyn7ERt4GA+6Kg77oQHkaDYRf0OT97FFo
0ShtqkMO1bHWnzJWTjTJnByZtNH4BboTKeYBev6ibFtPbhteIxYiZBKSSz/4
dVJXg0FZQiKmRoVW4t+q66KfpEctNgTKQNgoToEX4xbp2b0HPo89m1w33KJa
387Qg3ExbiwGH0t6dpLJl3Hyl719B/SE11OH0MPgFqSTBqcdjl6PdhA77pAM
JdLJEgcFE9mc6lrOYp4OJwLzDspxOD4ZnCAJGU8CtoAMAxDB//AUgrst4VDC
/WBUwFTgaPcbjoVoh0zhSFpduXI9iGpa2tGFoqkbDeQP4tp4J8pUJFXyKl7U
YeVgJgvn0UsXcR4M3kgANaNkSBtt7ABRpE6XxKu2Vd1AQ2xJPCiAX4x6LxSz
9MneH+LuocfeOUbO8MRNGpYmN+w7xAQk+w/cEBcW6aewf7q67M5hxNh4iSY2
LvWegkKrfWUUxMJ4FUJU3CRsXSSH38H2dmyYkQ0dQzrkNi47wVPxygv5WjDv
ehyZb2BArFqFCQuFE01vywOfArKL674KGAfQlg71YgO2ZbPvyGNOZ3O/a2ol
1U+v4TTwEeykdbg3Zg8yFOTHFpdkTduxLlsJslWqfeJXmPDCtT2ZuMouJomf
YIJwnZ/A1keSu6xJGB1FHtBAp+hCiZ5h4N4WnQOjG35GyKj2Fl1AyNSArzS1
wdsRUEAy964Rvwf9jsyuOM0x1AWhTyzHfLzEdMYfJx0+RD3Hx8zj/C3qtcQm
jvV94KkIzeNoanUYidPmCA7zWgNwYSC1QMbwbyH1oPAXYAhQJKns3glOw0hQ
RxER6KZEuvlENIcl53cMwPA/oY6VrdIr9GIac9ME8I6ygSSWpFsf9CiCdi3c
DsX5YNnJLWo0TELeB/GDnFxBaqut47qBiVH6ijg5coagMKFVxAG1JveIywAR
0cu+DV4S9Giyl7aLT5g0cqssD/FNAtMTSMmKYwj0uCdPPblYKWqrGgTDxmaW
9Da/OghEhi6D8IIOyPETwsmE7+X9LuimiTJRdBvxBdRSg7P938NA6Vc4SAu+
j7xmwJpb9JGSD1fctnrDwxCpOhWcVRl5BD2idlbLYTt36OYjB9IoEAalseGl
wT4lAqZ+2EwuzjJZDap0s/Bkwh1hN1KIlE2AemUXyHUpznoyOBFYLA8jfucm
g3Mhp5yjOgTGr8wgbL96nCf28moC6wMqvUP5TzrvTSAEBvV0gaZNiFOgM3JH
nngO1gKXJ4+BIqMUBsYRUlVAovwSUk9xMEGonyB2Y55RwgCdh1oOTufXtRIv
bBsirFmtkKM8yutiAAO4iglEdi7CpSPTBWOBIc4Fy7GvgrI/PNmkXSKSqHOo
tPV6P5xPJKKl21XNgYOo0GZ+D+pRzNdTPdSMx/yOOqaAvZ4RDVcIJhp/8+RA
NbJAyVFPQHACC804FTVF6Jn6ZChRBxb6R1swPe14FEVlEy5wkBmg5sjYDpUj
oy2iSj9gGISKY1Bu4pNuaV1BjxALVblIakAoCFLh7ziZCAKDpVwuvUS1qvLg
yHjGG3oN2tdBQLOHmiyETx3hI85JGjwimW1AMjd0Pt17FC6pjx8UDE+WEAht
iaLeSFdX2tX9g/T8G4PwPRG5DLRtEjN8kh2L1A3HJOcVA58ecxyMetFgidEM
cP1hFAqXhaZTisi5ppggM5zRgwzJgPNZFKiHfhSccnD0zV2UgbBopDYi6BFj
NoTWBKIgdl2qQaBaJSPW0aYUogHNIrUoRANFGmXMoT5/1iHyNoqyBfDDczoW
xoMpvEQGXgV9/SRmZJqZ45c9q2LODhSbxITDzkeZFsFBuxAeSX08UXHMFD8x
Xxncyr4LOd4ohrLgXWbivyAtjSODvF+ZEwZ7Qxuu4kAPQUyCJZIIc3Tx/JMW
34DkIh8uCeflrZqe2FLt3vcWNOxd91tWsWE9gSmuXU/WUrJYjsEKYJqXCfCe
nMa+C6kZkxSSVOYDhXuT0FqIOM4xNO+W7H9Wc0QEF3ecQLQTnM4QovNDjSEx
OTCgwoygfyfRYoWzhcrgHKfVLzaCBDKJ1S87GxIUcNuJMfO+Ws6fC9YBjHZf
9frUroUTh9ZWg5CQ5+ViE6bmc3QRaNzvEGQA9h9juHDs5aFqSuTSPzl7lp2C
iSGA00SONDIZ9C0C+0THBGOiaJQcclz5ng1O4dWkxInVz9YWZ/MpXlkPwkSA
fLhAMKQ1pxeRACUvPQbVOb7PbYkvPHgsV6QksaLqXcvhUMYYR4CPeDtynwOf
UqWnFG+bbTh77YBRJysb4OQIRG/uajPSQyR85rG0XtRUIA2kMZklmTAywykz
TXslpjhyDpYBjLQrqw5OrxrKZLWzuO3RNCa3cbjxtwLeZ6tWVEVCo6fOIUOO
nxA/Em9Qyuq3IKj2AukMjU/tDx0d/ElgZana/ZAEdqpuVB44QC2HVjgZD711
AfpJeyGpMBL/Bc7dtMvM6aC5MARKxvSJZAr7HcEQ2BNQ77dz1xpmC4JJUO5D
nECZFi6z78hyK6s7RE9t/HoDmwF2CJAsTDLxWweNkWJn9aJFQQ6Ej3plhW6A
bHpJ0AqmpkgeouFe5zhk9EjRLZ2jHQMtyNe2F8bMs0KuFlwBcPO6ZS+muvuB
0uZ0oFSM3zYV6IJZxCwY6mANpo5voBNy1NEiYN7Oin0AlTjt/Rx1M2K+FEZD
GbmAQZfMg4FctdepeQWrjUqHKCcJXSPwD0+WrBY1T0CGW7QeKGJihO+lYLPh
2UWWGZUZOEeymZgIIfmKbbNrRZortlAHEpzTcV2ClypykeACu0keDYdBHYo4
eAQlE4tob13AH0QvpODV64xmF/S0Rnc4o1o8g9EtPsDBYO5Px3QD4o65xhvM
waRQ5GWdhFuHLo88nWtCcGfcNcrgjPAUCQPhkpjgf6NNQunLsMAOnUSr0leI
cqZGIl7UUq6JYwT9xL6SJox6qHMpvMNDNqLkC7tMkVmJ0QxMzcydDpOyQ5qt
M3CCp6mmwSY+HfiESZNhRZPWVMCwcblOdxONAPQCRUohhTQCJVu/XqNQH6Qd
csbcSOYTjj5hOdtyxyiqzJMqCTQr0vI8rPAch5gYakiAzLsMakL1QNO7Segv
BsUTy14kH6Fj4I8SKbvBqgJbjmbBbwU5UGgIU00zc8wuMe/wQEZYCee/duz8
ZWcAk3THHtoJ3YSUAzLrTsZhSBw5XFlPZK2KjTznUs/CQgfPETb1j29yz/PQ
akHUWrS+0e5vE2dqI0cmYCCIVEYRi+QNgiUowvTCbiJbOJAmQ+reHgkViKrq
PZB+UF6i895xHALUXKY/iR5IUoXqxKpYkO7aBXY5EgdgTyoiFLuM3xBd78pF
HAPNEVUBDL/domoD5jksEfGPH9DZvjgY8y35R7pj5UlcDoEDKl+YxEXiHGrS
pZQxGArnouIKyxNcZkmsl+JdaPYALd86fW4CdnyNkRK07VAUmc1+65eUDKlO
LFLchTfpKZY4k4Dg7L7fAp+ye54c2auJecdzH3iQ1fw+DoWKWl7m4an4JKbs
waYjRptkRXbszdmo7/5cIHzEBCIkbyLq27EPngcT0lXGIaRH0DcJbxboxWQF
EvnSmB06Y83FCfax7EdEXvAHovuXMJaPNiBx8EipDhPTwDK4OK3LUCthsey7
AQ7fdwGbwwoLhxMTw0VPRa5Ssg5kdLQBaYnrbN95ZPzA+HIuWwcuG8yILdIn
Uh76TMgIjbp113sJb9LFQoKca2Dikc2SrbXfkuf44dWoxf+I1A0lhllqDnaP
8uh4Y+9AX3Uc8C1BSNkYbleTFI6KhCCgawIxJx6PfV1xHg1J3rCiY8n6D6dJ
24mtFx1z0uiExnLsHTFsq06UhS418y+a3GIlNSA3KfWAZyftSnhZ5S6McIVM
Uh2g87JCA4ZkPvHskD0JJLN37JfkAPmjxLsginZKEGTQZyIkpwLKBsNhjgne
qE9Mc1jG982dC1ove6iU1jF0iPoD+5rExFcLnwQzeozE8sXtSZmIPQOlg6SZ
78kL3InCHlxnCc3g/qZfKWGyFhW1iEbX+UBnMA/sd0DHF7Aph86j1w7IGg3P
m2ZZAvclhirnfNyTbzWrVSxdYIm9jZmp01xiiXo7jrlA94YCkLsTuPBJdvyh
ZcZ2i+2F+O2awsATZQ2wNPvqXQbx1jZxaxnuwoAfDEuNgLcpwKheAxE5yGZb
LbiSn9x+k2JaMvRUDAbuT5dlSpK7LQLNPPqssW7JeKK37EXqrUwaEJ2ShnF5
lTRxyU188+U30ETqEduhlochKk5JVzSkFJgC/RtjUy9LdB1QEjITNY4jutwx
6MvGlfTPKZokqtn9faIazFtXOXYo3j9IejTm9xInJJVUoN0PMQPjfS/aFs5X
4je1diseJ9woUvVNjuKUuy6vBPv3llwMJz7pj+FBY59D55wcxD+9bmCvT33S
H+ODxnxehM/nJx8e+6QPGkQ2XsD2AT/98L+K5IN9YW4pdSkJ/8nPv08fHIxl
mnyOes9/G4xFO8KxzOK3GQwnMXRgHNmPv08fHIzlk6t0+lbzAazTO8aSIOI0
+zb4nL41jmXKHUyTb0djmdIv+VimKXTfzuxLX78LEPm/8T8RigufR+GXUYTu
57zyoXvq56/WXu/nCNZNVunz5PIohjf5BDjvics/87gCfk9cTqDTOYlGWo2H
cvT3339IsLjCIlI47oW9RkNVOR/QPDuiob3X6ot+61ZTK9wP0biBu0kCXYSC
d6GIFDBM4qvMVrNUKIT/dPs5xRk5ozrW8FD2+W+R2Yq5EEgLny04SOm7GEuq
6J6QDINIsyaJEyPDQ+caWr+bmOo1Ye9z2UkYiY+Sjs6EEKnosOiNSYw09cew
35FMeXKdkEQMfUztjwTDJPe8qNM1cLZukpjwbOhojhelDoH2R9p/SSefUXyy
uBouiCVaOlUW+xiWhbGBcrJnDxCp7dy7SRaTddAwbV5YUOJpDnco6ylplgYs
fk5Yrl6S9Ayjt0nvk0JwIaSY+gvjOO3ZrS/DCBdVCTqD2r3nEozX8iaqQ7Dn
IdVDzzApSzaYNAtdRnFimjGVlKMzWTO0KLCpjtvpMBK1r7DmEzHbUGPLnF2L
p/pX0y+nT4RGR7QLgRWB9lhjyMHn8WIs/tgTXJeRdGSGYkecbJ0V1Pqq6Pc7
Ql2EhZ1IsQ1Sha6fXk2xiF1ZkU7AAYcEf62LiCtyIqWYcFDRjgiR9RxZEzFv
SchtA4PWHogq1EerkdwYehQVb5AvyTrNazpTTKBPUx9UJ4VhuEbmAlV+1HBI
dcJkSzkHpUQblk5NSy2GlDp7MrBpGasDMFzA5KxF4A/tETOY2hPaIHr80Kzk
7eNkm6wMHi4W57QGtkfnfQtrEsrpie5Vwmzqom+BYZaVQTgg1bHhqlRFsogT
iYaSOo/mDpc2uCsPiYVHoTgpXaXzkZ2iOUYzRSy/oABngewkAKI8yiSsi9zU
oHJjoHMrVY5soXh+RBIgtWrpQvvnhouLsXtiV/pWXKfBjTl3C5wL8Am39HBO
MRdJkqyA7W2tsOsQ7hkLtD0sxCzEDjr0xLQEqcFokCXAsduFZC8gyO+AY9Vs
cXH9RRwyHtPb0lfIbSfsskqbpU2jMLfvun0G8MAFAEuX7kgxS7ox4syFZQ41
u4LoCmsjBv8f8tbyBgPIaASjnDrViNXdhRJDwA+52R81xwNHRI62Ya43xrLw
SEXEyZn2dW73uyXJfeyPlBXBJZfA/bBIDnbxprV8BoYN00hzaVGqvXrLuCRF
c5yFZC+MNdbrNIKdnu9zLTG2EC6AHiSMk1Ic8g8kYOJ+4bxHsIXke2dcqgaQ
tN4EDOsiWX2qYHn/ADbkYyq7UpOSPHWI1FMhHJKCCj16BYYIsRKt+gFY2Mci
FFIpE9F0fBKooTRRL1jKvhPEUDBIDUsrLLaK1Xe19rEcqiJdPbRV05Kl+y49
6CEagaKG5Faayk2xD/Xu6tC7vAyDns+89gkyTwVHIu5L+TbynbZnaMwBMXM7
+pFc7Tl4knK/mqZiEut2iCnBp3wbDxyLodEkiO6hwQ04MFJtap8TK2eROlIP
EKMENAzK2xrzzRQZqzhb9G1VrKolfD8XfiTDmasUyA5HSJEnTP7FkNslzUlr
yNQmMmEKn6I6HOI97CDsxMNFrJUqK1P+KRbkinpXHasYZjEqZhp1WaX5o+Qj
AmHqGJnIK5VuzEC0LTbe3cZTgNyNNm9dM1EjJA06R9M7losaQ4IelRTkUydn
9QVSJscrk+pdmaaJaDu88BEDwp1mDmrduAw9s8ioWxxRYNxsXImHhHoHUWES
PU19qAMUTij0U4dijsItyBpI8hjNMaLuSIXkgoUZLDFCaEJsjhhRzGxqIggm
xVqRJkHYAp0O0vjcWS2RgLkjrFglSTwxfzgrMpl7ey8i8x2aO2ksE31dBvMb
JJ7A9Q8mEacjmOxYh53URpAblGcDasKi57J8ofwhkbRqDD5xpuZAJmKOAr38
qFggAWqFAJpkNlAWi4YMGINJESAxDyeiKTGYMrjWSa5Fb3dPm2AU+Cyak2DC
1LOPvleubynOZEYKcunfsM9IlBisrGO2OOpbEg3KNO6QeMrKqNPgvOZnZuXO
TCxxhk8gg6olJR6298q1cKlLMWoE2FnGJc5YR26dcQghRMkTvm9C8dfYkMDj
ktQ+0ZFwE7m4mhpSEmlnYqYy2ovFvsXCmwFnQ9Y0Zjeh+7pg21Xd8ZNxJztF
hDvGLVOsJoEu0DFVbC/tcoKua5Q/ncWLwDYEKQgmJpL1XvwOJMKblUmPBC8U
gZBRZSXY0arsRhHrmOMZgAm7WAd753euIsc669ZwiDBzhWOFC4ZYoZZiAvgn
eXZQgMAGWx9ZDoEr2c9B6cgZhMz4XkFjEcGg7I2omhTlWBAcqw5g8WbWK6Et
cluroDFSBLVphMRwaUZoIuX5hHES+AKOAzjuag/a3I8EKOhDOhs0XzuEaRJm
a9GUbXdkvhMfzwVIJ+DBUBy9zOo7itsGVr4dNqZlko/4eR5oel4vmiWfnsR4
Jf+ZmE3kkFK3VsUgC7XC88Lr4tbA1rB8J3OfxMNToWdVMozpOC+QEVMYlIE8
nBJEeUREZqkKJdgXFr3XFM1SrD5T8P0DinFJFn9ItaIgVARPSDKLq8JMYUeW
5eFhN1IxzISCiGl9jmFaJuXpDONc7KCjgG1QspagFa0I/UkKDUN+jGhoUrvH
fu+x3o7khJWdFDPiZBJV2zXALEGh+oCGBDz7bO/U9IQ19HUunDFcSRoLbTTS
JEXXSbtvw7i12s9R9jwmR4uRDqrMLfZ3kelHSJ4smCL0TV5EQpoFrXkv6Sn4
dIWh3fVmDCEc9HXMlESTBf8yq6R2LEnVPOpIujIdfwaRZVjHM3Y3RRDvx/OJ
Ic7ILAtRgXl5bfULAtG9HPq75CGHigv5Qjm+2mcUOT8E7CkDikw62tPSkw86
ZxWMSguNOLd7UjpNiDwH0uTAKTCnnsttMvaZ9puMTirNgJkEWugpjXqTrzz4
I0TbvUpFLW5EohAODyKyBziHz4JASuvTBs0JBP5tCvFMtv+3zEBUBprkxQBc
KSOxkkgOD5oKSQaJtogegjiiULhugPFSdENAt4ZijeNyG5cfvQWpD4FcNkGK
4aA1NRAEe5FU6iMhKpm51EpeRf3Nvi+aVSEISdYRU3go6gyKBA0QUIYM7vsl
IuOxzSEm9FVAa6HKgaQ2FyOA/KMjEO24L9Sgpjzu6H0HOMWQd6CDRCA1XqZ3
CVFBOOkUGThuxLUmpk1SBHIxusS0nNgpWZQkHgT5H42MweLFTPZPAvQJYUKc
VTZI3m4TQwxkgkeA6JxfTFEkEkUc8aCoZqYjsx5qLxWYVLBXccWfSrG25Rxh
LzkYS+v4/Vyw75d+xGqRGhABJ4C7Qk5eggwKVg79bNFQQfYsHjiGGvJdCgDc
lpTqzYcjhXgkPrIAJKdsbaDjFsGnYvN1LoNns7oQ7S9KIMVasssAEEIXSQJ1
SDexWWkCcWJ+p5E+cqBNc7S0XxkMICYv0CL/DLK4CqMRZwymorIGS2o+EHsG
9eTXYnDoASy7IRScCtWdM1UHj4rkSsWXkCBMQ/TCOA/khCaJ2U/Yf0UcTJ21
gWMG/W8iFRzI1Ypo5tpR5T8ST2iNYmKj9AsTSGsi0A7DgUDzBGY6dxtPlfRl
TcRZSMZ1yMmhNCZgZWk7GwKt+ZX6vPR5YuJpolHiqcra62SqIoR5OL5OBEAK
ZdBhI521yG2wrHXva43apVhS2sugZWK1Sc7/6dwCFctxpFV0MiI3pVmwOtBp
A7ShKC/ZfDnwTXMsExV8tizSgdcVa/bUNaHeJeWJUEIzeX2e7ts2KW0vPZKW
BEdADXoZHQbz1q3Uf7eO/9w1qM0TO36BKoN6QjkoFYadvKtjkoTihllk5C2W
1LDw7ApOcqgJzYH2bx5j6HIyiNRq3EdCVwnmCewHOJn4RpjLOi3LhZQzftKp
Gmon6TGMTydwQNnjpmvNOymoRzOMqcclVcuwGoC1v5k+wcOcDl1M4jlLZFTp
SSpQcVGQPHc0ZdUgWM9q8Xz1Up68C5wAjPrMd7HY7OlVF6sEXkyzOdSgPS+s
KL6+3oNBjEZYDCgFTw7FsHkH44boYqOzE9ccDlF72DEdAfvVaCa/oQpG5cEe
bDEJAU2YuMiXzU2xAvqtl9XhrPLrDUg6/P9zWsEG1NxY+Ojpm4uriX3155sb
reTq26Tf9LUKFJ+93oOWx9UKvgMxCgpCcRz7OKPXanz8SLW6h45yrCZRc4yW
31xy9KIczBxggad+j6m9UM/wD68vf4nbN7zsRck+BX/CWkXOvJADGt7iwzdR
Xh/mmPTDVGH+bUpTD1wHpoxs5+P5bKxWv1ISmFQl6Tc8DvX4qmMb9TURysxM
ELRcBI095L1BZ6S1M27x/p7d1tj3jwPdO5M4iVS69fRSQcETTE4c0UdhvGFY
bGUldV2E6LG1owx4dQQKgmKZuyCogCUtYmaO4UqSbwDnc2zL6SEYN+ZwGMGe
07ecZHUwf7lVh22pYZeWSMnMOfuvmHO0wT9r0THsJ7XodO5X+hYcPHLsXKAw
o77AJry/cKSoQUjEXR6bVUdBIS5EapAzBca0Td/4pnSlZ2Zi75wGF+0KWACH
AWRGGYSHTjDxXX3pRnqCuXz+LYb2xt5WhaPKYB6CR+MSOBMBzZOm+o99l78B
kXNHK1/r0Tcav6K0LOog+L0zX2Q+/hRPHH3WoXhSInoTJAoeBXFnKSEHYBUc
gm9BKSYr+ug1iNk7t8STpdpFKF95GrvFIiZ5gUxMtpD8qQA2IXg5C3yK9sit
nJJv0FmOeSSS0xQBfUnfopGELtz7HrVxgSunYkJL/ohh9SJD23A7xmQeK2n1
mDiCnzejkoRKSV0+aAl4rEzEVjNH3sBsCC+X0jrcM3tWnqfIF8ItF7SR+lIU
Q2K8isHEua+1yEITfZpD2Zadn9+iqnA2P+dMg7ZlmFAqLLUqCrGr5D1W9PYR
0RL5FKWZqFKM3UsQkZf/eQD+oQPDDN/SpbUU06xm2F32jBAF9sohz15dvbzW
gVABkODfPOd3h4TENvSJcty5kdJJNq8GFuAQl1e3X5ENivXBa1KKv6doqtiv
+qYTxf/5OgZ4b3I04QjES5yhUigSFu+h2jL2z831QykHIf7zUGxTHBdg0/9z
T68uLOBmqQYFktEmonyQGhEh+zOF64KehDDDwGwFrUGWUpEGisP913D7JEJ4
EhFHP2uKXuKxCb+9ECttELA+C0HSWEPhXMsAhdISwguxrkyn2ZXff/s9H2fa
GYlz83Fh8vrk+0HgV+4f1vDNOa0ILiLuQfYLR182za6YHwpM5+ceQhwCH8Qh
8uvFKARNdEN4xuTVb6p3hRFrBfus+vTjES/LFyPXnoxc+1Ja+AJ+/dL+yv7a
fmV/Y7+23/wr136Ja+io/PTPlqMe+Xywus436DuT71xM+yVIHaoL/bM9/ZKR
fMB9eAEnq1x32jWdnJunhRJljdX+4sgCYpq+/w+OZPA5G3pqUIicn16z/4cj
eZbX4fj/M5II+cfYCgO+FPH/XJHwamvoAcZzz6RDNbfh6dsOo8S/++wxfM/I
il+8Ze3Xxdz3CcRFRaH61YVrWMGEsVEY7iYNXgLPKX94/P4PfzhX+y1g4kWD
v7x4fTG1Lwj2ihIdX5EMDal1//ixPeve+Z2W88IkuV1EAbGtnolQbJSZ3JTY
lYwCzsq638hEeZ77WlxC5KdARPArzWSHuX5dNCBPJaSB09G3DwCHhhPCLV2T
+5ZOjIisYChO2AtHOKMeluy6Cbo9P+AFmDcRd4TBy5QFuFpNbJrPrKZcgEJo
BQdKxpTDiKPC13eQMstzPk2SWHmePrPPR9NM0owUfQD++wH/IdiERiDSBHOS
uhigIR92+twV/hOkocjqsxAjxKX4r213ng8Q/ntBzwm8W9yXUxgAGA/EiFhj
/mf2zEv8Z4xfxDfp5Z28xX/eJmXgJTKevX84FhJKnvwLvS9lwBB+7ulwjJkK
5BQTgfGFRkMXQQUN773Ac5yxYnypGny++AoJehrPojrFdRT8TttQqrM5dqKH
gu5YwaB3qsowVj146wdgZdQ7EMREDguWDSspbdKLBRSidUmBCWmci4rwO6Yf
TwRdx04AL3gs+o1aJ4c0J1WzDsRABW5En1Xt9fEERmMYUgbLtgH+wbXQp3H9
VHbJEn7NKxgkWuLmwSmF8hkcF6tDgAJa/JZenPZSSO0aSE3a/PIJN6rgDzTR
Gi7cQLbB9G9/45Xg/bNnoCBjSSps73wSrlbocij4qhh8nCidZWrws7jKdD83
PIi6iqWrbLI/rr2BaGlo1XcOeCsWdssy3alNsdBC1TM+AH8JByBZgECYpP4n
mToMV5gMq1olBwUHIuYP6pdRST3WBhGlmpT+D5zuUhzyWV7r86Nr+PjJ3Mqx
fNb02irAgrP803hzkuYnhneegvp7qymSn4+O4kQG6uDqB+r4gyEd7k3x/HvK
NP3h9SV0MJ59muWd/swYTqzO4PIH0udxDJc7+EOZJP8xnnU6uHw0hmk+humn
x0DkOaP/kJ1ygVg78hqq8JmFRz6fZp/TacjyyM9JzfQzG+j56lvhEQ6UuyTT
SDI6Uz8Y+ZhOVdTknf3so4mnZmiR22tFZ7PprR50YkhePWj0KGXNUNJ6N3hD
vZIQGNehFgV5n2WU6khQRyIHZmjSMqrvrUCMbt2BYGwctUlT5j8ZsxcAZ8Gp
NSqcRJ4wUd/6Rjw8jHeNNcoUFv52kAiJ0obfbsuKWK2DneYvzJFsfs5uS+o2
HRUPUmxV6prxNQyQ6sToxIamOTC9Z1zWY5iSMRH3KFX+SzxU4eWpfaOOSk3b
+sRb2mMD6EW4S8uO6TvtEJuMvi16C/LQsh+uAwj1L6a4tb6TWbKSP+w3Wfbw
lmIdbqQtSpE19slUY3VJIk7meJowAh/6VbAjuYCWAdUuGXT4wr2kb31RMp7H
csF5hBJoDDbMKtYiSV412WFfwYkZs4LR2Y/GzCDxkapnxApwar1g8VF6JISh
ho9dO6eVHrjSotxX4js16dGLRcjKJN+pMaiuY11Z89+OUSwvPY0AAA==

-->

</rfc>
