<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.32 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-srld-teas-5g-slicing-09" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Implementing 5G Transport Slices">A  Realization of IETF Network Slices for 5G Networks Using Current IP/ MPLS Technologies</title>

    <author fullname="Krzysztof G. Szarkowicz" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Wien</city>
          <country>Austria</country>
        </postal>
        <email>kszarkowicz@juniper.net</email>
      </address>
    </author>
    <author fullname="Richard Roberts" role="editor">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <country>France</country>
        </postal>
        <email>rroberts@juniper.net</email>
      </address>
    </author>
    <author fullname="Julian Lucek">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>jlucek@juniper.net</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>
      <address>
        <postal>
          <street>Ronda de la Comunicacion, s/n</street>
          <city>Madrid</city>
          <country>Spain</country>
        </postal>
        <email>luismiguel.contrerasmurillo@telefonica.com</email>
        <uri>http://lmcontreras.com/</uri>
      </address>
    </author>

    <date year="2023" month="May" day="23"/>

    <area>Routing</area>
    <workgroup>TEAS</workgroup>
    <keyword>L3VPN</keyword> <keyword>L2VPN</keyword> <keyword>Slice Service</keyword>

    <abstract>


<?line 162?>

<t>5G slicing is a feature that was introduced by the 3rd Generation
   Partnership Project (3GPP) in mobile networks. This feature covers slicing
   requirements for all mobile domains, including the Radio Access
   Network (RAN), Core Network (CN), and Transport Network (TN).</t>

<t>This document describes a basic IETF Network Slice realization model
   in IP/MPLS networks with a focus on the Transport Network fulfilling
   5G slicing connectivity requirements. This realization model reuses many building blocks currently commonly used
   in service provider networks.</t>



    </abstract>



  </front>

  <middle>


<?line 174?>

<section anchor="introduction"><name>Introduction</name>

<t><xref target="I-D.ietf-teas-ietf-network-slices"/> defines a framework for
   network slicing in the context of networks built using IETF
   technologies.  The IETF network slicing framework introduces the
   concept of a Network Resource Partition (NRP), which is simply a
   collection of resources identified in the underlay network.  There
   could be multiple realizations of IETF Network Slice and
   NRP concepts, where each realization might be optimized for the
   different network slicing use cases.</t>

<t>This document describes an IETF Network Slice realization model
   in IP/MPLS networks, using a single NRP and with a focus on
   fulfilling 5G slicing connectivity requirements.
   This IETF Network Slice realization model leverages many building blocks currently
   commonly used in service provider networks.</t>

<t>A brief 5G overview is provided in <xref target="sec-5g-intro"/> for readers' convenience. The reader may refer to <xref target="TS-23.501"/> or <xref target="_5G-Book"/> for more
   details about 3GPP network architectures.</t>

</section>
<section anchor="definitions"><name>Definitions</name>

<t>The document uses the terms defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>. See <xref target="sec-ref-design"/> for the contextualization of some of these terms.</t>

<t>An extended list of abbreviations used in this document is provided in <xref target="ext-abbr"/>.</t>

</section>
<section anchor="g-network-slicing-integration-in-transport-networks"><name>5G Network Slicing Integration in Transport Networks</name>

<section anchor="sec-scope"><name>Scope of the Transport Network</name>

<t><xref target="sec-5g-intro"/> provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of <xref target="TS-28.530"/>).</t>

<t>As discussed in Section 4.4.1 of <xref target="TS-28.530"/>, the 3GPP managment system does not directly control the Transport Network: it is considered as a non-3GPP managed system.</t>

<ul empty="true"><li>
  <t>'The non-3GPP part includes TN parts. The 3GPP management system provides the network slice requirements to the corresponding management systems of those non-3GPP parts, e.g. the TN part supports connectivity within and between CN and AN parts.' (Section 4.4.1 of <xref target="TS-28.530"/>)</t>
</li></ul>

<t>In practice, the TN may not map with a monolithic architecture and management domain. It is frequently segmented, non-uniform, and managed by different entities. For example, <xref target="fig-1"/> depicts a Network Function (NF) instance that is deployed in an edge data center (DC) connected to a NF located in a Public Cloud via a Wide Area Network (WAN) (e.g., MPLS-VPN service). In this example, the TN can be seen as an abstraction representing an end-to-end connectivity based upon three distinct domains: DC, WAN, and Public Cloud. A model for the Transport Network based on orchestration domains is introduced in <xref target="sec-orch"/>. This model permits to define more precisely where the IETF Network Slices apply.</t>

<figure title="An Example of Transport Network Decomposition" anchor="fig-1"><artwork align="center"><![CDATA[
     ┌──────────────────────────────────┐
  ┌──│         5G NF (RAN or CN)        │──┐
  │  └──────────────────────────────────┘  │
  │                                        │
  ▼                                        ▼
┌──┐  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  ┌──┐
│NF├ ─ ─      Transport Network        ├ ┤NF│
└──┘  └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  └──┘
          │             │            │
          ▼             ▼            ▼

  ┌───Data Center──┐ ┌─MPLS-VPN─┐  ┌─Public─┐
  │                │ │ Backbone │  │ Cloud  │
  │   ┌───┐┌───┐   │┌┴─┐      ┌─┴┐┌┴─┐      │
  │   └───┘└───┘   │└┬─┘      └─┬┘└┬─┘      │
  │┌──┐┌──┐┌──┐┌──┐│┌┴─┐      ┌─┴┐ │        │
  │└──┘└──┘└──┘└──┘│└┬─┘      └─┬┘ │        │
  └────────────────┘ └──────────┘  └────────┘
]]></artwork></figure>

<t>The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs. End-to-End 5G Network Slicing (<xref target="sec-5gtn"/>) as well the management domains: RAN, CN, and TN domains.</t>

</section>
<section anchor="sec-5gtn"><name>5G Network Slicing versus Transport Network Slicing</name>

<t>Network slicing has a different meaning in the 3GPP mobile and transport
   worlds.  Hence, for the sake of precision and without seeking to be exhaustive, this section provides a
   brief description of the objectives of 5G Network Slicing and
   Transport Network Slicing:</t>

<t><list style="symbols">
  <t>5G Network Slicing:  <vspace blankLines='1'/>
Is defined by the 3GPP as an appraoch where logical networks/partitions are created, with appropriate isolation, resources and optimized topology to serve a purpose or service category or customers <xref target="TS-28.530"/>. These resources are from the TN, RAN, CN
 Network Functions, and the underlying infrastructure.</t>
  <t>TN Slicing:  <vspace blankLines='1'/>
The term "TN Slice" is used in this document to
 refer to a slice in the Transport Network domain of the overall 5G
 architecture.  <vspace blankLines='1'/>
The objective of TN Slicing is to isolate,
 guarantee, or prioritize Transport Network resources for slices. Examples of such resources are:
 buffers, link capacity, or even Routing Information Base (RIB) and Forwarding Information Base (FIB).  <vspace blankLines='1'/>
TN Slicing provides various degrees of sharing of resources between slices. For example, the network capacity can be shared by all slices, usually with a guaranteed minimum per slice, or each individual slice can be allocated dedicated network capacity. Parts of a given network may use the former, while others use the latter. For example, in order to satisfy local engineering guidelines and specific service requirements, shared TN resources could be provided in the backhaul (or midhaul), and dedicated TN resources could be provided in the midhaul (or backhaul). The capacity partitioning strategy is deployment specific.  <vspace blankLines='1'/>
There are different options to implement TN slices based upon
 tools, such as Virtual Routing and Forwarding instances (VRFs)
 for logical separation, Quality of Service (QoS), or Traffic
 Engineering (TE).</t>
</list></t>

</section>
<section anchor="sec-ref-design"><name>Transport Network Reference Design</name>

<t><xref target="fig-tn-arch"/> depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider).</t>

<figure title="Reference Design: Customer Sites and Provider Network" anchor="fig-tn-arch"><artwork align="center"><![CDATA[
                                                                          
 Customer Orch.               Provider Orch.              Customer Orch.  
     Domain                       Domain                      Domain      
                                                                          
┌ ─ ─ ─ ─ ─ ─ ─ ─       ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐       ┌ ─ ─ ─ ─ ─ ─ ─ ─ 
     Customer    │          Provider Network                 Customer    │
│      Site             │                       │       │      Site       
           ┌────┐│       ┌────┐           ┌────┐         ┌────┐          │
│┌──┐      │    │   AC  ││    │           │    ││  AC   ││ NF │           
 │┌─┴┐─ ─ ─│ CE ├│─ ─ ─ ─│ PE │           │ PE │─ ─ ─ ─ ─│(CE)│          │
│└┤┌─┴┐    │    │       ││    │           │    ││       ││    │           
  └┤NF│    └────┘│       └────┘           └────┘         └────┘          │
│  └──┘                 │                       │       │                 
 ─ ─ ─ ─ ─ ─ ─ ─ ┘       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─         ─ ─ ─ ─ ─ ─ ─ ─ ┘
                                                                          
      ◀─────────────────Transport Network────────────────▶                
                                                                          
]]></artwork></figure>

<t>The description of the main components shown in <xref target="fig-tn-arch"/> are:</t>

<dl>
  <dt>Customer:</dt>
  <dd>
    <t>An entity that is responsible for managing and orchestrating the End-to-End 5G Mobile Network, notably RANs and CNs.</t>
  </dd>
  <dt>Customer Sites:</dt>
  <dd>
    <t>A customer manages and deploys 5G Network Functions (RAN and CN) in Customer Sites. On top of 5G Network Functions (e.g., gNodeB (gNB), 5G Core (5GC)), a customer may manage additional TN elements (e.g., servers, routers, switches, or VPC Gateways) within a Customer Site. A Customer Site can be either a physical or a virtual location. Examples of Customer Sites are a customer private locations (Point of Presence (PoP), DC), a VPC in a Public Cloud, or servers hosted within provider or colocation service. The Orchestration of the TN within Customer Sites relies upon a set of controllers for automation purposes (e.g., Network Functions Virtualization Infrastructure (NFVI), Enhanced Container Network Interface (CNI), Fabric Managers, or Public Cloud APIs). The detail of these is out of the scope of this document.</t>
  </dd>
  <dt>Provider:</dt>
  <dd>
    <t>An entity responsible for interconnecting Customer Sites. The provider orchestrates and manages a provider network.</t>
  </dd>
  <dt>Provider Network:</dt>
  <dd>
    <t>A provider uses a provider network to interconnect Customer Sites. We assume in this document that the provider Network is based on IP or MPLS.</t>
  </dd>
  <dt>Customer Edge (CE):</dt>
  <dd>
    <t>A device that provides logical connectivity to the provider network. The logical connectivity is enforced at Layer 2 and/or Layer 3 and is denominated an Attachment Circuit. Examples of CEs include TN components (e.g., router, switch, or firewalls) and also 5G Network Function (i.e., an element of 5G domain such as Centralized Unit (CU), Distributed Unit (DU), or User Plane Function (UPF)). This document generalizes the definition of a CE with the introduction of Distributed CEs in <xref target="sec-distributed"/>.</t>
  </dd>
  <dt>Provider Edge (PE):</dt>
  <dd>
    <t>A device managed by a provider that is connected to a CE. The connectivity between a CE and a PE is achieved using one or multiple Attachment Circuit. This document generalizes the PE definition with the introduction of Distributed PEs in <xref target="sec-distributed"/>.</t>
  </dd>
  <dt>Attachment Circuit (AC):</dt>
  <dd>
    <t>The logical connection that attaches a CE to a PE. A CE is connected to a PE via one or multiple ACs. An AC is technology-specific. For consistency with the AC data model terminology (e.g., <xref target="RFC9182"/>), we assume that an AC is configured on a “bearer”, which represents the underlying connectivity. Examples of ACs are VLANs (AC) configured on a physical interface (bearer) or an Overlay VXLAN EVI (AC) configured on IP underlay (bearer).</t>
  </dd>
</dl>

<ul empty="true"><li>
  <t>In order to keep the figures simple, only one AC and single-homed CEs are represented.
However, this document does not exclude the instantiation of multiple ACs between a CE and a PE nor the presence of CEs that are attached to more than one PE.</t>
</li></ul>

<section anchor="sec-distributed"><name>Distributed PE and CE</name>

<t>This document uses the concept of distributed CEs and PEs (e.g., Section 3.4.3 of <xref target="RFC4664"/>). This approach consolidates a definition of CE/PE/AC that is consistent with the orchestration perimeters. The CEs and PEs delimit respectively the customer and provider orchestration domains, while the AC interconnects these domains.</t>

<dl>
  <dt>Distributed CE:</dt>
  <dd>
    <t>The logical connectivity is realized by configuring multiple devices in the customer domain. The CE function is distributed. An example of such a distribution is the realization of an interconnection using a L3VPN service based on a distributed CE composed of a switch (Layer 2) and a router (Layer 3) (case (ii) in <xref target="fig-50"/>).</t>
  </dd>
  <dt>Distributed PE:</dt>
  <dd>
    <t>The logical connectivity is realized by configuring  multiple devices in the Transport Network (provider orchestration domain). The PE function is distributed. An example of a distributed PE is the “Managed CE service”. For example, a provider delivers VPN services using CEs and PEs which are both managed by the provider (case (iii) in <xref target="fig-50"/>). The managed CE can also be a Data Center Gateway as depicted in the example (iv) of <xref target="fig-50"/>. A provider-managed CE may attach to CEs of multiple customers. However, this device is part of the provider network.</t>
  </dd>
</dl>

<t><xref target="fig-50"/> depicts the reference model together with examples of distributed CEs and PEs.</t>

<figure title="Generic Model vs Distributed CE and PE" anchor="fig-50"><artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site ┌────┐                  ┌──┴─┐  Network    │
           │    ├──────────────────┤    │              
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ─│ PE │             │
           │    ├──────────────────┤    │              
│          └────┘                  └──┬─┘             │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                i) Reference Design                    
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
 ┏━━━━━━━━━━━━━━━┓                                     
│┃ ┌─────┐ ┌────┐┃                 ┌──┴─┐             │
 ┃ │     │ │    ├┃─────────────────┤    │              
│┃ │     ├ ┼ ─ ─│┃ ─ ─ ─ AC─ ─ ─ ─ ┤ PE │             │
 ┃ │ RTR │ │ SW ├┃─────────────────┤    │              
│┃ └─────┘ └────┘┃                 └──┬─┘             │
 ┗━━Distributed━━┛                                     
│       CE                            │               │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  ii) Distributed CE                   
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                  ┏━━━━━━━━━━━━━━━┓    
│          ┌────┐                 ┃┌──┴─┐   ┌────┐┃   │
           │    ├─────────────────┃┤Mngd│   │    │┃    
│          │ CE ├ ─ ─ ─ ─AC ─ ─ ─ ┃│ CE ├───┤ PE │┃   │
           │    ├─────────────────┃┤    │   │    │┃    
│          └────┘                 ┃└──┬─┘   └────┘┃   │
               │                  ┗━━Distributed━━┛    
│                                     │  PE           │
 ─ ─ ─ ─ ─ ─ ─ ┘                       ─ ─ ─ ─ ─ ─ ─ ─ 
                  iii) Distributed PE                  
                                                       
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
   ┏━━━━━━━━━━━━━━━━┓             ┏━━━━━━━━━━━━━━━━┓   
│  ┃    IP Fabric   ┃             ┃┌──┴─┐   ┌────┐ ┃  │
   ┃   ┌───┐┌───┐   ┃─────────────╋┤ DC │   │    │ ┃   
│  ┃   └───┘└───┘   ┃ ─ ─ ─AC ─ ─ ╋│ GW ├───┤ PE │ ┃  │
   ┃┌──┐┌──┐┌──┐┌──┐┃─────────────╋┤    │   │    │ ┃   
│  ┃└──┘└──┘└──┘└──┘┃             ┃└──┬─┘   └────┘ ┃  │
   ┗━━━Distributed━━┛             ┗━━Distributed━━━┛   
│          CE                         │  PE           │
               │                                       
└ ─Data Center─                       └ ─ ─ ─ ─ ─ ─ ─ ┘
                  iv) Distributed PE                   
                        and CE                         
                                                       
]]></artwork></figure>

<t>In subsequent sections of this document, the terms CE and PE are used for both a single and a distributed devices.</t>

</section>
<section anchor="attachment-circuits-for-inter-as-options-bc"><name>Attachment Circuits for Inter-AS Options B/C</name>

<t>In some cases, a CE connects to the provider network using Inter-AS Option B or C as defined in <xref section="10" sectionFormat="of" target="RFC4364"/> with the use of MPLS or SRv6 data planes. An example of such as an AC is depicted in <xref target="_figure-51"/>. The configuration of VRFs together with control plane identifiers, such as Route Targets (RTs) and Route Distinguishers (RDs), happens on the CE. This is a source of confusion since these configurations are typically enforced on PE devices. Notwithstanding, the reference design based on Orchestration scope prevails: the CE is managed by the customer and the AC is based on MPLS or SRv6 data plane technologies. Note that the complete termination of the AC within the provider network may happen on distinct routers: this is another example of distributed PE (e.g., in  Inter-AS Option C, the Autonomous System Border Router (ASBR) and a remote PE in the provider network with VRF configuration form a distributed PE).</t>

<figure title="MPLS or SRv6 Attachment Circuit" anchor="_figure-51"><artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─                       ┌ ─ ─ ─ ─ ─ ─ ─ ┐
    Customer   │                          Provider     
│     Site                            │    Network    │
               │                     NHS               
│                                (Option B)           │
               │ ◀──────MP-BGP─────▶    ◀──────────▶   
│          ┌────┐                  ┌──┴─┐             │
           │    │   MPLS-based AC  │    │              
│          │ CE ├ ─ ─ ─ ─ ─ ─ ─ ─ ─│ PE │             │
   ┏━━━━━━━┻━━━━┻━━━━━━━┓          │    │              
│  ┃VRFX:               ┃          └──┬─┘             │
 ─ ┫- rt 123:123        ┃              ─ ─ ─ ─ ─ ─ ─ ─ 
   ┃- rd 198.51.100.1:1 ┃                              
   ┗━━━━━━━━━━━━━━━━━━━━┛                              
]]></artwork></figure>

<t>This use case is also referred to in <xref target="sec-10b"/> and <xref target="sec-10c"/>.</t>

</section>
<section anchor="co-managed-ce"><name>Co-Managed CE</name>

<t>A co-managed CE is orchestrated by both the customer and the provider. In this case, the customer and provider usually have control on distinct device configuration perimeters (e.g., the customer is responsible for the LAN interfaces, while the provider is responsible for the WAN interfaces (including routing/forwarding policies)). Considering the generic model, a co-managed CE has both PE and CE functions and there is no strict AC connection, although we may consider that the AC stitching logic happens internally within the device. The provider manages the AC between the CE and the PE.</t>

</section>
</section>
<section anchor="sec-orch"><name>Orchestration Overview</name>

<section anchor="end-to-end-5g-slice-orchestration-architecture"><name>End-to-End 5G Slice Orchestration Architecture</name>

<t>This section introduces a global framework for the orchestration of an end-to-end 5G Slice with a zoom on TN parts.</t>

<ul empty="true"><li>
  <t>This framework is consistent with the management coordination example shown in Figure 4.7.1 of <xref target="TS-28.530"/>.</t>
</li></ul>

<t>In reference to <xref target="_figure-orch"/>, an end-to-end 5G Network Slice Orchestrator (5G NSO) is responsible for orchestrating end-to-end 5G Slices. The details of the 5G NSO is out of the scope of this document. The realization of the end-to-end 5G Slice spans RAN, CN, and TN. As mentioned in <xref target="sec-scope"/>, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}:</t>

<t><list style="symbols">
  <t>Provider Network Orchestration domain: as defined in <xref target="I-D.ietf-teas-ietf-network-slices"/>, the provider relies on an IETF Network Slice Controller (NSC) to manage and orchestrate IETF Network Slices in the provider network. This framework permits to manage connectivity together with SLOs. Ultimately, the 5G NSO interfaces with an NSC for the management of IETF Network Slices using IETF APIs and data models.</t>
  <t>Customer Site Orchestration domain: the Orchestration of TN elements of the Customer Sites relies upon a variety of  controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this section does not involve the Transport Network Orchestration.</t>
</list></t>

<t>A TN Slice relies upon resources that can involve both the provider and customer TN domains. Therefore, a TN Slice has broader scope than an IETF Network Slice since the latter applies to the provider network only. More details are provided in the next section.</t>

<figure title="End-to-end 5G Slice Orchestration with TN" anchor="_figure-orch"><artwork align="center"><![CDATA[
                         ┌───────────┐                          
                         │  5G NSO   │                          
                         └──┬───┬────┘                          
                            │   │                               
                            │   │                               
                            ▼   │                               
              ┌───────────────┐ │                               
              │ 3GPP domains  │ │                               
  ┌───────────┤ Orchestration │─┼──────────────────────────┐    
  │           │ (RAN and CN)  │ │                          │    
  │           └───────────────┘ │                          │    
  │                             │                          │    
  │    ┏ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━│━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ┓   │    
  │      TN Orchestration       │                          │    
  │    ┃        ┌───────────────┼──────────────┐       ┃   │    
  │             ▼               ▼              ▼           │    
  │    ┃┌───────────────┐┌───────────┐┌───────────────┐┃   │    
  │     │ Customer Site ││ IETF NSC  ││ Customer Site │    │    
  │    ┃│ Orchestration ││           ││ Orchestration │┃   │    
  │     └──┬────────────┘└─────┬─────┘└──────────────┬┘    │    
  │    ┗ ━ │ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ━ ━ ━ ━ ━ ━ ━ ━ ━ ━ ╋ ┛   │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        │                   │                     │     │    
  │        ▼                   ▼                     ▼     │    
┌ ┼ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐         ┌ ─ ─ ─│─ ─ 
  │                          Provider                      │   │
│ ▼           │       ┌─┴──┐ Network   ┌──┴─┐      ┌┴───┐  │    
 ┌──┐     ┌────┐  AC  │    │           │    │  AC  │ NF ◀──┘   │
││NF● ─ ─ ┤ CE ├ ─ ─ ─■ PE │           │ PE ■ ─ ─ ─●(CE)│       
 └──┘     └────┘      │    │           │    │      └────┘      │
│             │       └─┬──┘           └──┬─┘       │           
    Customer                                          Customer │
│     Site    │         │                 │         │   Site    
 ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ─ ─ ─ ─           ─ ─ ─ ─ ─ ┘
                                                                
                      ■─IETF Network Slice──■                   
                                                                
     ●──────────────────TN Slice────────────────────●           
                                                                
]]></artwork></figure>

</section>
<section anchor="transport-network-sections-and-network-slice-instantiation"><name>Transport Network Sections and Network Slice Instantiation</name>

<t>Based on the reference design, the connectivity between NFs can be decomposed into three main types of sections. <xref target="fig-end-to-end"/> depicts the different sections:</t>

<t><list style="symbols">
  <t>Customer Site: Either connects two NFs located in the same Customer Site (e.g., NF1-NF2) or it connects a NF to a CE (e.g., NF1-CE). This section may not be present if the NF is the CE (e.g., NF3): in this case the AC connects the NF to the PE. The realization of this section is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration (e.g., Fabric Manager, Element Management System, or VIM). The realization of this section does not involve the Transport Network Orchestration.</t>
  <t>Provider Network: Represents the connectivity between two PEs (e.g., PE1-PE2).The realization of this section is controlled by an IETF NSC.</t>
  <t>Attachment Circuit: Represents the connectivity between CEs and PEs (e.g., CE-PE1 and PE2-NF3). The orchestration of this section relies partially upon an  IETF NSC for the configuration of the AC on the PE customer-facing interfaces and the Customer Site Orchestration for the configuration of the AC on the CE.</t>
</list></t>

<t>As depicted in <xref target="fig-end-to-end"/>, the realization of an IETF Network Slice (i.e., connectivity with
   performance commitments) involves the provider network and partially the AC (the PE-side of the AC). Note that the provisioning of a new network slice may rely on a partial or full pre-provisioned section (e.g., a network slice may rely on an existing AC). Notwithstanding, a framework for the automation of both sections is proposed in this document. The Customer Site section is considered as an extension of the connectivity of the RAN/CN domain without complex slice-specific performances requirements: the Customer Site infrastructure is usually over-provisioned with short distances (low latency) where basic QoS/Scheduling logic is sufficient to comply with the target SLOs. In other words, the main focus for the enforcement of end-to-end SLOs is managed at the network slice between PE interfaces connected to the AC.</t>


<figure title="Segmentation of the Transport Network" anchor="fig-end-to-end"><artwork align="center"><![CDATA[
                                                                  
       ●──────────────────────TN Slice────────────────●           
                                                                  
                        ■─────IETF NETWORK────■                   
                        │        SLICE        │                   
                        │          │          │                   
                        │          │          │                   
                        ▽          ▽          ▽                   
       ●──CS──□ □───AC──■ □────────PN───────□ ■───AC──●           
  ┌ ─ ─ ─ ─ ─ ─ ┐          ┌ ─ ─ ─ ─ ─ ─ ─ ┐          ┌ ─ ─ ─ ─ ─ 
      Customer                  Provider                Customer │
  │     Site    │          │    Network    │          │   Site    
                        ┌────┐           ┌────┐                  │
  │┌───┐    ┌───┴┐  AC  │    │           │    │  AC  ┌┴──┐        
CS │NF1├────┤ CE ├ ─ ─ ─│ PE │           │ PE ├ ─ ─ ─│NF3│       │
□ │└─┬─┘    └───┬┘      │    │           │    │      └┬──┘        
│    │                  └────┘           └────┘                  │
│ │  │          │          │               │          │           
□  ┌─┴─┐                                                         │
  ││NF2│        │          │               │          │           
   └───┘                                                         │
  └ ─ ─ ─ ─ ─ ─ ┘          └ ─ ─ ─ ─ ─ ─ ─ ┘          └ ─ ─ ─ ─ ─ 
                                                                  
  □──────□  TN sections:                                          
            CS= Customer Site                                     
            AC= AC                                                
            PN= Provider Network                                  
]]></artwork></figure>

<dl>
  <dt>Resource synchronization for AC provisioning:</dt>
  <dd>
    <t>The realization of the Attachment Circuit is made up of TN resources shared between the Customer Site Orchestration and the provider network orchestration (e.g., NSC).  More precisely, a PE and a CE connected via an AC must be
provisioned with consistent data plane and control plane  information (e.g., VLAN-
IDs, IP addresses/subnets, or BGP AS number). Hence, the realization of this
interconnection is technology-specific and requires a coordination between the Customer Site Orchestration and an NSC. Automating the provisioning and management of the AC is recommended. Aligned with <xref target="RFC8969"/>, we assume that this coordination is based upon standard YANG data models and APIs (more details in further sections).</t>
  </dd>
  <dt/>
  <dd>
    <t><xref target="_figure-4"/> is a basic example of a Layer 3 CE-PE link realization
with shared network resources (such as VLAN-IDs and IP prefixes) which
are passed between Orchestrators via a dedicated interface. This document proposes to rely upon IETF service data models: the IETF Network Slice Service Interface <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> or the Attachment Circuit Service Interface (<xref target="I-D.boro-opsawg-teas-attachment-circuit"/>.</t>
  </dd>
</dl>

<figure title="Coordination of TN Resources for the AC Provisioning" anchor="_figure-4"><artwork align="center"><![CDATA[
      ┌─────────────┐                ┌──────────────────┐ 
      │Customer Site│  IETF APIs/DM  │     IETF NSC     │ 
      │Orchestration│ ◀───────────▶ │(Provider Network │ 
      │             │                │ Orcherstration)  │ 
      │             │                │                  │ 
      └────────────┬┘                └┬─────────────────┘ 
                   │                  │                   
                   │                  │                   
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│┐                ┌│─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                   │                  │┌────┐             
│ ┌──┐       ┌────┐▼│   192.0.2.0/31 │▼│    │            │
  │NF├───────│ CE ├────────────────────┤ PE │             
│ └──┘       └────┘.1    VLAN 100    .0│    │            │
      Customer                         └────┘Provider     
│       Site        │                │       Network     │
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─                  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                  □──────────AC────────□                  
                                                          
]]></artwork></figure>

</section>
<section anchor="additional-segmentation-and-domains"><name>Additional Segmentation and Domains</name>

<t>More complex scenarios can happen with extra segmentation of the TN and additional TN Orchestration domains. It is not realistic to describe any design flavor, however the main concepts presented here in terms of segmentation (provider/customer) and stitching (AC) can be reused for the integration of more complex integrations.</t>

</section>
</section>
<section anchor="sec-mapping"><name>5G Slice to IETF Network Slice Mapping</name>

<ul empty="true"><li>
  <t>Editor Note: This section is intended to focus on the realization implications of the mappings. Will reassess in future versions whether this section should be maintained or moved to <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>
</li></ul>

<t>There are multiple options to map a 5G network slice to IETF Network
   Slices:</t>

<t><list style="symbols">
  <t>1 to N:
 A single 5G Network Slice can map to multiple IETF Network
 Slices (1 to N).  One example of such a case is the separation of
 the 5G Control Plane and User Plane: this use case is represented
 in <xref target="_figure-5"/> where a slice (eMBB) is deployed with a separation of
 User Plane and Control Plane at the TN.</t>
  <t>N to 1:
 Multiple 5G Network Slices may rely upon the same IETF Network
 Slice.  In such a case, the Service Level Agreement (SLA) differentiation of slices
 would be entirely controlled at 5G Control Plane, for example, with
 appropriate placement strategies: this use case is represented in
 <xref target="_figure-6"/>, where a User Plane Function (UPF) for the URLLC slice is
 instantiated at the edge cloud close to the gNB CU-UP User Plane for
 better latency/jitter control, while the 5G Control Plane and the UPF
 for eMBB slice are instantiated in the regional cloud.</t>
  <t>N to M:
 The 5G to IETF Network Slice mapping combines both
 approaches with a mix of shared and dedicated associations.</t>
</list></t>

<figure title="1 (5G Slice) to N (IETF Network Slice) Mapping" anchor="_figure-5"><artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐

│                        5G Slice eMBB                          │

│            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐            │
  ┌─────┐ N3   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N3 ┌─────┐
│ │CU-UP├───────   IETF Network Slice UP_eMBB    ───────┤ UPF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘
│            │                                     │            │
  ┌─────┐ N2   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐   N2 ┌─────┐
│ │CU-CP├───────      IETF Network Slice CP      ───────┤ AMF │ │
  └─────┘      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      └─────┘
└ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ┘

             │                                     │
                       Transport Network
             │                                     │

             └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork></figure>

<figure title="N (5G Slice) to 1 (IETF Network Slice) Mapping" anchor="_figure-6"><artwork align="center"><![CDATA[
                  ┌ ─ ─ ─ ─ ─ ─ ┐
                     Edge Cloud
                  │             │
                    ┌─────────┐
                  │ │UPF_URLLC│ │
                    └─────┬───┘
                  └ ─ ─ ─ │ ─ ─ ┘
┌ ─ ─ ─ ─ ─ ─ ─ ┐ ┌ ─ ─ ─ │ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                    ┌ ─ ─ ┴ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─  │ ┌ ─ ─ ─ ─ ─ ─ ─
│   Cell Site   │ │                            │                  │
                    │                            │ │   Regional
│ ┌───────────┐ │ │                            │         Cloud    │
  │CU-UP_URLLC├─────┤                            │ │ ┌──────────┐
│ └───────────┘ │ │         IETF Network       ├─────┤  5GC CP  │ │
                    │        Slice ALL           │ │ └──────────┘
│ ┌───────────┐ │ │                            │                  │
  │CU-UP_eMBB ├─────┤                            │ │ ┌──────────┐
│ └───────────┘ │ │                            ├─────┤ UPF_eMBB │ │
 ─ ─ ─ ─ ─ ─ ─ ─    │                            │ │ └──────────┘
                  │  ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘                  │
                                                 │ └ ─ ─ ─ ─ ─ ─ ─
                  │      Transport Network
                   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork></figure>

<t>Note that the actual realization of the mapping depends on several
   factors, such as the actual business cases, the NF vendor
   capabilities, the NF vendor reference designs, as well as service
   provider or even legal requirements.</t>

<t>Specifically, the actual mapping is a design choice of service operators that may be a function of, e.g., the number of instantiated slices, requested services, or local engineering capabilities and guidelines. However, operators should carefully consider means to ease slice migration strategies. For example, a provider may initially adopt a 1-to-1 mapping if it has to instantiate few network slices and accommodate the need of few customers. That provider may decide to move to a N-to-1 mapping for aggregation/scalability purposes if sustained increased slice demand is observed. Putting in place adequate automation means to realize network slices (including the adjustment of slice services to network slices mapping) would ease slice migration operations.</t>

</section>
<section anchor="first-5g-slice-versus-subsequent-slices"><name>First 5G Slice versus Subsequent Slices</name>

<t>A 5G Network Slice is fully functional with both 5G Control Plane and
   User Plane capabilities (i.e., dedicated NF functions or contexts).
   In this regard, the creation of the "first slice" is subject to a
   specific logic since it must deploy both CP and UP.  This is not the
   case for the deployment of subsequent slices because they can share
   the same CP of the first slice, while instantiating dedicated UP.  An
   example of an incremental deployment is depicted in <xref target="_figure-7"/>.</t>

<t>At the time of writing (2023), Section 6.2 of <xref target="NG.113"/> specifies that the
   eMBB slice (SST=1 and no Slice Differentiator (SD)) should be supported globally.  This 5G
   slice would be the first slice in any 5G deployment.</t>

<figure title="First and Subsequent Slice Deployment" anchor="_figure-7"><artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      s S  │NF-CP├──────┤  CP IETF NS (IETF-NS-1)  ├──────┤NF-CP│
   │  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
        i             │
   │  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      G e  │NF-UP├──────┤  UP IETF NS (IETF-NS-2)  ├──────┤NF-UP│
   │       └─────┘      └──────────────────────────┘ │    └─────┘  │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                                     │
                      │      Transport Network
                                                     │
                      └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                         Deployment of first 5G slice
                                     │ │
                                     │ │
                                     │ │
                                    ─┘ └─
                                    ╲   ╱
                                     ╲ ╱
                                      V
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
                      ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  1    ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      s S  │NF-CP├──────┤  CP IETF NS (IETF-NS-1)  ├──────┤NF-CP│
   │  t l  └─────┘      └──────────────────────────┘ │    └─────┘  │
        i             │
   │  5 c  ┌─────┐      ┌──────────────────────────┐ │    ┌─────┐  │
      G e  │NF-UP├──────┤  UP IETF NS (IETF-NS-2)  ├──────┤NF-UP│
   │       └─────┘      └──────────────────────────┘ │    └─────┘  │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                                     │
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      2                                              │
   │  n S  ┌──────┐   │ ┌──────────────────────────┐     ┌──────┐  │
      d l  │NF-UP2├─────┤   UP2 IETF NS (IETF-NS-3)├─────┤NF-UP2│
   │    i  └──────┘   │ └──────────────────────────┘     └──────┘  │
      5 c                                            │
   │  G e             │                                            │
    ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
                      │
                              Transport Network      │
                      │
                       ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
       Deployment of additional 5G slice with shared Control Plane
]]></artwork></figure>

</section>
</section>
<section anchor="overview-of-the-realization-model"><name>Overview of the Realization Model</name>

<t><xref target="I-D.ietf-teas-ietf-network-slices"/> introduces the concept of the
   Network Resource Partition (NRP), which is defined as a collection of
   resources identified in the underlay network.  In the basic
   realization model described in this document, depicted in <xref target="_figure-high-level-qos"/>, a single NRP is used
   with the following characteristics:</t>

<t><list style="symbols">
  <t>L2VPN/L3VPN service instances for logical separation:  <vspace blankLines='1'/>
This realization model of transport for 5G slices assumes Layer 3
delivery for midhaul and backhaul transport connections, and a
Layer 2 or Layer 3 for
fronthaul connections. eCPRI supports both delivery models. L2VPN/L3VPN service instances might be
used as a basic form of logical slice separation.  Furthermore, using
service instances results in an additional outer header (as packets
are encapsulated/decapsulated at the nodes hosting service instances) providing clean discrimination between 5G QoS and TN
QoS, as explained in <xref target="sec-qos-map"/>.</t>
  <t>Fine-grained resource control at the PE:  <vspace blankLines='1'/>
This is sometimes called 'admission control' or 'traffic
conditioning'.  The main purpose is the enforcement of the
bandwidth contract for the slice right at the edge of the
provider network where the traffic is handed-off between the
customer site and the provider network.  <vspace blankLines='1'/>
The toolset used here is granular ingress policing (rate limiting)
to enforce contracted bandwidths per slice and, potentially, per
traffic class within the slice.  Out-of-contract traffic might be
immediately dropped, or marked as high drop-probability traffic,
which is more likely to be dropped somewhere inside the provider network if
congestion occurs.  In the egress direction at the PE node,
hierarchical schedulers/shapers can be deployed,
providing guaranteed rates per slice, as well as guarantees per
traffic class within each slice.  <vspace blankLines='1'/>
For managed CEs, edge admission control can be distributed between CEs
and PEs, where a part of the admission control is implemented on the CE
and other part of the admission control is implemented on the PE.</t>
  <t>Coarse resource control at the transit (non-attachment
circuits) links in the provider network, using a single NRP, spanning the entire provider network.
Transit nodes in the provider network do not maintain any state of individual slices.
Instead, only a flat (non-hierarchical) QoS model is used on
transit links in the provider network, with up to 8 traffic classes.  At the PE,
traffic-flows from multiple slice services are mapped
to the limited number of traffic classes used on provider network transit links.</t>
  <t>Capacity planning/management for efficient usage of provider network resources:  <vspace blankLines='1'/>
The role of capacity management is to ensure the provider network
capacity can be utilized without causing any bottlenecks.  The
toolset used here can range from careful network planning, to
ensure more less equal traffic distribution (i.e., equal cost load
balancing), to advanced traffic engineering techniques, with or
without bandwidth reservations, to force more consistent load
distribution even in non-ECMP friendly network topologies.</t>
</list></t>

<figure title="Resource Allocation Slicing Model with a Single NRP" anchor="_figure-high-level-qos"><artwork align="center"><![CDATA[
        ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐        
  ┌──────────┐               base NRP               ┌──────────┐   
  │    PE    │                                      │    PE    │   
┌ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─  
  ■◀───┐│    │         IETF Network Slice 1         │    ┌┼───▶■ │ 
│ │    │     │        ┌─────┐        ┌─────┐        │    │     │   
  ■◀───┤│    │        │  P  │        │  P  │        │    ├┼───▶■ │ 
├ ┼ ─ ─├────▶□◀──────▶□◀───▶□◀──────▶□────▶□◀──────▶□◀───┤─ ─ ─│─  
  ■◀───┤│    │        │     │        │     │        │    ├┼───▶■ │ 
│ │    │     │        └─────┘        └─────┘        │    │     │   
  ■◀───┘│    │         IETF Network Slice 2         │    └┼───▶■ │ 
└ ┼ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─│─  
  │     │    │                                      │     │    │   
  └──────────┘                                      └──────────┘   
        └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘        
 ■ - SDP, with fine-grained QoS (dedicated resources per TN slice) 
 □ - coarse QoS, with resources shared by all TN slices            
]]></artwork></figure>

<t>The 5G control plane relies upon the Single Network Slice
   Selection Assistance Information (S-NSSAI) 32-bit slice identifier for slice
   identification.  The S-NSSAI is not visible to the transport domain.
   So instead, 5G functions can expose the 5G slices to the transport
   domain by mapping to explicit Layer 2 or Layer 3 identifiers, such as VLAN-IDs, IP
   addresses, or Differentiated Services Code Point (DSCP). More details about the mapping between 3GPP and IETF network slices is provided in <xref target="I-D.ietf-teas-5g-network-slice-application"/>.</t>

<section anchor="sec-vlan-handoff"><name>VLAN Hand-off</name>

<t>In this option, the IETF Network Slice, fulfilling connectivity
   requirements between NFs of some 5G slice, is represented at the SDP
   by a VLAN ID (or double VLAN IDs, commonly known as QinQ), as depicted in <xref target="_figure-vlan-hand-off"/>.  Each VLAN
   represents a distinct logical interface on the attachment circuits,
   hence it provides the possibility to place these logical interfaces
   in distinct L2 or L3 service instances and implement separation
   between slices via service instances.  Since the 5G interfaces are IP
   based interfaces (the only exception could be the F2 fronthaul-
   interface, where eCPRI with Ethernet encapsulation is used), this
   VLAN is typically not transported across the provider network.  Typically,
   it has only local significance at a particular SDP.  For
   simplification it is recommended to rely on the same VLAN identifier
   for all ACs, when possible.  However, SDPs for a same slice at
   different locations may also use different VLAN values.  Therefore, a
   VLAN to IETF Network Slice mapping table is maintained for each
   AC, and the VLAN allocation is coordinated between customer orchestration and
   provider orchestration.  Thus, while VLAN hand-off is simple from
   the NF point of view, it adds complexity due to the requirement of
   maintaining mapping tables for each SDP.</t>

<figure title="5G Slice with VLAN Hand-off" anchor="_figure-vlan-hand-off"><artwork align="center"><![CDATA[
VLANs representing slices           VLANs representing slices       
                                                                    
           │     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─      │             │           
           │                        │     │             │           
┌──────┐   ▼   ┌─┴───┐ Provider ┌─────┐   ▼   ┌─────┐   ▼   ┌──────┐
│      ●───────●■    │          │    ■●───────●     ●───────●      │
│ NF   ●───────●■ PE │          │ PE ■●───────●L2/L3●───────●   NF │
│      ●───────●■    │          │    ■●───────●     ●───────●      │
└──────┘       └─┬───┘  Network └─────┘       └─────┘       └──────┘
                                    │                               
                 └ ─ ─ ─ ─ ─ ─ ─ ─ ─                                
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Section         Circuit      Section         
                                                                    
 ● – logical interface represented by VLAN on physical interface    
 ■ - Service Demarcation Point                                      
]]></artwork></figure>

</section>
<section anchor="ip-hand-off"><name>IP Hand-off</name>

<t>In this option, the slices in the TN domain are instantiated
   by IP tunnels (for example, IPsec or GTP-U tunnels) established between
   NFs, as depicted in <xref target="_figure-ip-hand-off"/>.  The transport for a single 5G slice might be constructed with
   multiple such tunnels, since a typical 5G slice contains many NFs -
   especially DUs and CUs.  If a shared NF (i.e., an NF that serves
   multiple slices, for example a shared DU) is deployed, multiple
   tunnels from shared NF are established, each tunnel representing a
   single slice.  As opposed to the VLAN hand-off case, there is no
   logical interface representing a slice on the PE, hence all slices are
   handled within single service instance.  On the other hand, similarly
   to the VLAN hand-off case, a mapping table tracking IP to IETF
   Network Slice mapping is required.</t>

<figure title="5G Slice with IP Hand-off" anchor="_figure-ip-hand-off"><artwork align="center"><![CDATA[
                                        Tunnels representing slices 
                                                                    
                  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐                   │           
                                                        │           
┌──────┐       ┌──┴──┐ Provider ┌───┴─┐       ┌─────┐   ▼   ┌──────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└──────┘       └──┬──┘  Network └───┬─┘       └─────┘       └──────┘
                                                                    
                  └ ─ ─ ─ ─ ─ ─ ─ ─ ┘                               
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Section         Circuit      Section         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork></figure>

<t>The mapping table can be simplified if, for example, IPv6 addressing is used
   to address NFs.  An IPv6 address is a 128-bit long field, while the
   S-NSSAI is a 32-bit field: Slice/Service Type (SST): 8 bits, Slice
   Differentiator (SD): 24 bits. 32 bits, out of 128 bits of the IPv6
   address, may be used to encode the S-NSSAI, which makes an IP to
   Slice mapping table unnecessary. This mapping is simply a local allocation method
   to allocate IPv6 addresses to NF loopbacks, without redefining IPv6
   semantics. Different IPv6 address allocation schemes following this
   mapping approach may be used, with one example allocation showed in <xref target="_figure-11"/>.</t>

<t>Note that this addressing scheme is local to an ingress or egress NF; intermediary nodes are not
   required to associate any additional semantic with IPv6 address.</t>

<t>One
   benefit of embedding the S-NSSAI in the IPv6 address is that it provides
   a very easy way of identifying the packet as belonging to given
   S-NSSAI at any place in the TN domain.  This might be
   used, for example, to selectively enable per S-NSSAI monitoring, or
   any other per S-NSSAI handling, if required.</t>

<figure title="An Example of S-NSSAI embedded into IPv6" anchor="_figure-11"><artwork align="center"><![CDATA[
             NF specific          reserved
        (not slice specific)     for S-NSSAI
    ◀───────────────────────────▶ ◀───────▶
   ┌────┬────┬────┬────┬────┬────┬────┬────┐
   │2001:0db8:xxxx:xxxx:xxxx:xxxx:ttdd:dddd│
   └─────────┴─────────┴─────────┴─────────┘
    tt     - SST (8 bits)
    dddddd - SD (24 bits)
]]></artwork></figure>

<t>In the example shown in <xref target="_figure-11"/>, the most significant 96 bits of the IPv6 address are
   unique to the NF, but do not carry any slice-specific information, while
   the least significant 32 bits are used to embed the S-NSSAI information.
   The 96-bit part of the address may be further divided based, for
   example, on the geographical location or the DC identification.</t>

<t><xref target="_figure-s-nssai-deployment"/> shows an example of a slicing deployment, where the S-NSSAI is
   embedded into IPv6 addresses used by NFs.  NF-A has a set of tunnel
   termination points, with unique per-slice IP addresses allocated from
   the 2001:db8::a:0:0/96 prefix, while NF-B uses a set of tunnel
   termination points with per-slice IP addresses allocated from
   2001:db8::b:0:0/96.  This example shows two slices: eMBB (SST=1) and
   MIoT (SST=3).  Therefore, for eMBB the tunnel IP addresses are auto-
   derived (without the need for a mapping table) as {2001:db8::a:100:0,
   2001:db8::b:100:0}, while for MIoT (SST=3) tunnel uses
   {2001:db8::a:300:0, 2001:db8::b:300:0}.</t>

<figure title="Deployment example with S-NSSAI embedded into IPv6" anchor="_figure-s-nssai-deployment"><artwork align="center"><![CDATA[
 2001:db8::a:0:0/96 (NF-A)                2001:db8::b:0:0/96 (NF-B) 
                                                                    
 2001:db8::a:100:0/128                        2001:db8::b:100:0/128 
     │                                                        │     
     │                                                        │     
     │            ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   eMBB (SST=1)          │     
     │                                     │                  │     
┌────▼─┐       ┌──┴──┐ Provider ┌───┴─┐    ▼  ┌─────┐       ┌─▼────┐
│    ○════════════■════════════════■══════════════════════════○    │
│ NF   ├───────┤ PE  │          │ PE  ├───────┤L2/L3├───────┤   NF │
│    ○════════════■════════════════■══════════════════════════○    │
└────▲─┘       └──┬──┘  Network └───┬─┘    ▲  └─────┘       └─▲────┘
     │                                     │                  │     
     │            └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   MIoT (SST=3)          │     
     │                                                        │     
 2001:db8::a:300:0/128                        2001:db8::b:300:0/128 
                                                                    
      └────────┘└────────────────────┘└────────┘ └───────────┘      
      Attachment   Provider Network   Attachment Customer Site      
       Circuit         Section         Circuit      Section         
                                                                    
          ○ – tunnel (IPsec, GTP-U, ...) termination point          
          ■ - Service Demarcation Point                             
]]></artwork></figure>

</section>
<section anchor="mpls-label-hand-off"><name>MPLS Label Hand-off</name>

<t>In this option, the service instances representing different slices
   are created directly on the NF, or within the customer site
   hosting the NF, and attached to the provider network.  Therefore, the packet
   is MPLS encapsulated outside the provider network with native MPLS
   encapsulation, or MPLSoUDP encapsulation, depending on the capability
   of the customer site, with the service label depicting
   the slice.</t>

<t>There are three major methods (based upon Section 10 of <xref target="RFC4364"/>) for interconnecting MPLS services over multiple service domains:</t>

<t><list style="symbols">
  <t>Option A (<xref target="sec-10a"/>): VRF-to-VRF connections.</t>
  <t>Option B (<xref target="sec-10b"/>): redistribution of labeled VPN routes with next-hop
change at domain boundaries.</t>
  <t>Option C (<xref target="sec-10c"/>): redistribution of labeled VPN routes without next-hop
change + redistribution of labeled transport routes with next-hop
change at domain boundaries.</t>
</list></t>

<section anchor="sec-10a"><name>Option A</name>

<t>This option is not based on MPLS label hand-off,
   but VLAN hand-off, described in <xref target="sec-vlan-handoff"/>.</t>

</section>
<section anchor="sec-10b"><name>Option B</name>

<t>In this option, L3VPN service instances are instantiated outside the
   provider network.  These L3VPN service instances
   are instantiated in the customer site, which could be for example either on the compute, hosting mobile network
   functions (<xref target="_figure-mpls-10b-hand-off"/>, left hand side), or within the DC/cloud
   infrastructure itself (e.g., on the top of the rack or leaf switch
   within cloud IP fabric (<xref target="_figure-mpls-10b-hand-off"/>, right hand side)). On the
   attachment circuit connected to PE, packets are already MPLS
   encapsulated (or MPLSoUDP/MPLSoIP encapsulated, if cloud or compute
   infrastructure don’t support native MPLS encapsulation). Therefore,
   the PE uses neither a VLAN nor an IP address for slice
   identification at the SDP, but instead uses the MPLS label.</t>

<figure title="MPLS Hand-off: Option B" anchor="_figure-mpls-10b-hand-off"><artwork align="center"><![CDATA[
     ◁──────        ◁──────        ◁──────                          
     BGP VPN        BGP VPN        BGP VPN                          
       COM=1, L=A"    COM=1, L=A'    COM=1, L=A                     
       COM=2, L=B"    COM=2, L=B'    COM=2, L=B                     
       COM=3, L=C"    COM=3, L=C'    COM=3, L=C                     
    ◁─────────────▷◁────────────▷◁─────────────▷                    
               nhs  nhs      nhs  nhs                               
                                                        VLANs       
 service instances                service instances  representing   
representing slices              representing slices    slices      
     │          ┌ ─ ─ ─ ─ ─ ─ ─ ─            │           │          
     │               Provider    │           │           │          
┌────▼─┐       ┌┴────┐       ┌─────┐       ┌─▼──────┐    ▼  ┌──────┐
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
│ NF ◙ ├───────┤■ PE │       │ PE ■├───────┤ ◙………………●───────●   NF │
│    ◙ │       │■    │       │    ■│       │ ◙………………●───────●      │
└──────┘       └┬────┘       └─────┘       └────────┘       └──────┘
                      Network    │            L2/L3                 
                └ ─ ─ ─ ─ ─ ─ ─ ─                                   
     └────────┘└───────────────────┘┘└────────┘ └───────────┘       
     Attachment   Provider Network   Attachment Customer Site       
      Circuit         Section         Circuit      Section          
                                                                    
  ● – logical interface represented by VLAN on physical interface   
  ◙ - service instances (with unique MPLS label)                    
  ■ - Service Demarcation Point                                     
]]></artwork></figure>

<t>MPLS labels are allocated dynamically in Option 10B
   deployments, where at the domain boundaries service prefixes are
   reflected with next-hop self, and new label is dynamically allocated,
   as visible in <xref target="_figure-mpls-10b-hand-off"/> (e.g., labels A, A' and A" for the first depicted slice).  Therefore, for any slice-specific per hop
   behavior at the provider network edge, the PE must be able to determine
   which label represents which slice.  In the BGP control plane, when
   exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so
   tracking label assignment to the slice is possible.  For example, in
   <xref target="_figure-mpls-10b-hand-off"/>, for the slice identified with COM=1, PE advertises a
   dynamically allocated label A".  Since, based on the community, the
   label to slice association is known, PE can use this dynamically
   allocated label A" to identify incoming packets as belonging to slice
   1, and execute appropriate edge per hop behavior.</t>

<t>It is worth noting that slice identification in the BGP control plane
   might be with per-prefix granularity.  In extreme case, each prefix can have
   different community representing a different slice.  Depending on the
   business requirements, each slice could be represented by a different
   service instance, as outlined in <xref target="_figure-mpls-10b-hand-off"/>.  In that case, the route
   target extended community might be used as slice differentiator.  In
   another deployment, all prefixes (representing different slices)
   might be handled by single 'mobile' service instance, and some other
   BGP attribute (e.g., a standard community) might be used for slice
   differentiation.  Or there could be a deployment that groups multiple
   slices together into a single service instance, resulting in a
   handful of service instances.  In any case, fine-grained per-hop
   behavior at the edge of provider network is possible.</t>

</section>
<section anchor="sec-10c"><name>Option C</name>

<t><strong><em>for further study</em></strong></t>

</section>
</section>
</section>
<section anchor="sec-qos-map"><name>QoS Mapping Realization Models</name>

<section anchor="sec-qos-layers"><name>QoS Layers</name>

<t>The resources are managed via various QoS policies deployed in the
   network.  QoS mapping models to support 5G slicing connectivity
   implemented over packet switched provider network uses two layers of QoS that are discussed in <xref target="sec-qos-layers"/>.</t>

<section anchor="g-qos-layer"><name>5G QoS Layer</name>

<t>QoS treatment is indicated in the 5G QoS layer by the 5QI (5G QoS
   indicator), as defined in <xref target="TS-23.501"/>. A 5QI is an identifier (ID) that is
   used as a reference to 5G QoS characteristics (e.g., scheduling
   weights, admission thresholds, queue management thresholds, and link
   layer protocol configuration) in the RAN domain.  Given that
   5QI applies to the RAN domain, it is not visible to the
   provider network.  Therefore, if 5QI-aware treatment is desired in the provider
   network as well, 5G network functions might set DSCP with a value
   representing 5QI so that differentiated treatment can implemented in the provider network
   as well.  Based on these DSCP values, at SDP of each provider network section
   used to construct transport for given 5G slice, very granular QoS
   enforcement might be implemented.</t>

<t>The exact mapping between 5QI and
   DSCP is out of scope for this document.  Mapping recommendations
   are documented, e.g., in <xref target="I-D.henry-tsvwg-diffserv-to-qci"/>.</t>

<t>Each slice service might have flows with multiple 5QIs, thus there could be many
   different 5QIs being deployed. 5QIs (or, more precisely,
   corresponding DSCP values) are visible to the provider network at SDP
   (i.e., at the edge of the provider network).</t>

<t>In this document, this layer of QoS will be referred as '5G QoS
   Class' ('5G QoS' in short), or '5G DSCP'.</t>

</section>
<section anchor="tn-qos-layer"><name>TN QoS Layer</name>

<t>Control of the TN resources on provider network transit links, as well as traffic
   scheduling/prioritization on provider network transit links, is based on a flat
   (non-hierarchical) QoS model in this IETF Network Slice
   realization.  That is, IETF Network Slices are assigned dedicated
   resources (e.g., QoS queues) at the edge of the provider network (at
   SDPs), while all IETF Network Slices are sharing resources (sharing
   QoS queues) on the transit links of the provider network.  Typical router
   hardware can support up to 8 traffic queues per port, therefore
   the architecture assumes 8 traffic queues per port support in
   general.</t>

<t>At this layer, QoS treatment is indicated by QoS indicator
   specific to the encapsulation used in the provider network, and it could
   be DSCP or MPLS Traffic Class (TC).  This layer of QoS will be referred as 'TN QoS
   Class', or 'TN QoS' for short, in this document.</t>

</section>
</section>
<section anchor="qos-realization-models"><name>QoS Realization Models</name>

<t>While 5QI might be exposed to the provider network, via the DSCP value
   (corresponding to specific 5QI value) set in the IP packet generated
   by NFs, some 5G deployments might use 5QI in the RAN domain only,
   without requesting per 5QI differentiated treatment from the provider network.
   This can be due to an NF limitation (e.g., no capability to set
   DSCP), or it might simply depend on the overall slicing deployment
   model.  The O-RAN Alliance, for example, defines a phased approach to
   the slicing, with initial phases utilizing only per slice, but not
   per 5QI, differentiated treatment in the TN domain
   (Annex F of <xref target="O-RAN.WG9.XPSAAS"/>).</t>

<t>Therefore, from a QoS perspective, the 5G slicing connectivity
   realization architecture defines two high-level realization models
   for slicing in the TN domain: a 5QI-unaware model and a 5QI-
   aware model.  Both slicing models in the TN domain could be
   used concurrently within the same 5G slice.  For example, the TN
   segment for 5G midhaul (F1-U interface) might be 5QI-aware, while
   at the same time the TN segment for 5G backhaul (N3 interface) might
   follow the 5QI-unaware model.</t>

<t>These models are further elaborated in the following two subsections.</t>

<section anchor="sec-5QI-unaware"><name>5QI-unaware Model</name>

<t>In 5QI-unaware mode, the DSCP values in the packets received from NF
   at SDP are ignored.  In the provider network, there is no QoS
   differentiation at the 5G QoS Class level.  The entire IETF Network
   Slice is mapped to single TN QoS Class, and, therefore, to a single
   QoS queue on the routers in the provider network.  With a small number of
   deployed 5G slices (for example only two 5G slices: eMBB and MIoT),
   it is possible to dedicate a separate QoS queue for each slice on
   transit routers in the provider network.  However, with introduction of private/enterprises
   slices, as the number of 5G slices (and thus corresponding IETF
   Network Slices) increases, a single QoS queue on transit links in the provider network serves
   multiple slices with similar characteristics.  QoS enforcement on
   transit links is fully coarse (single NRP, sharing resources among
   all IETF Network Slices), as displayed in <xref target="_figure-QoS-5QI-unaware"/>.</t>

<figure title="Slice to TN QoS Mapping (5QI-unaware Model)" anchor="_figure-QoS-5QI-unaware"><artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
┏━━━━━━━━━━━━━━━━━┓         PE                               │
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
┃   │IETF NS 1 ├────────────┐    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃         ├─────▶     TN QoS Class 1     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃         │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃         │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃         │    ┃│     TN QoS Class 2     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │IETF NS 2 ├────────┐   │    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │   │    ┃│     TN QoS Class 3     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │   │    ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │   │    ┃┌────────────────────────┐ ┃
┃   SDP           ┃     └─────────▶     TN QoS Class 4     │ ┃
┃│  ┌──────────┐ │┃         │    ┃└────────────────────────┘ ┃
┃   │IETF NS 3 ├────────────┘    ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     ┌─────────▶     TN QoS Class 5     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 6     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │IETF NS 4 ├────────┤        ┃┌────────────────────────┐ ┃
┃│  └──────────┘ │┃     │        ┃│     TN QoS Class 7     │ ┃
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃     │        ┃└────────────────────────┘ ┃
┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃     │        ┃┌────────────────────────┐ ┃
┃   SDP           ┃     │        ┃│     TN QoS Class 8     │ ┃
┃│  ┌──────────┐ │┃     │        ┃└────────────────────────┘ ┃
┃   │IETF NS 5 ├────────┘        ┃     Max 8 TN Classes      ┃
┃│  └──────────┘ │┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃                                          │
┣━━━━━━━━━━━━━━━━━┛                                           
 ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
Fine-grained QoS enforcement         Coarse QoS enforcement   
  (dedicated resources per            (resources shared by    
    IETF Network Slice)                multiple IETF NSs)     
]]></artwork></figure>

<t>When the IP traffic is handed over at the SDP from the attachment circuit to the provider network, the PE encapsulates the
   traffic into MPLS (if MPLS transport is used in the provider network), or
   IPv6 - optionally with some additional headers (if SRv6 transport is
   used in the provider network), and sends out the packets on the provider network transit
   link.</t>

<t>The original IP header retains the DCSP marking (which is ignored in
   5QI-unaware model), while the new header (MPLS or IPv6) carries QoS
   marking (MPLS Traffic Class bits for MPLS encapsulation, or DSCP for
   SRv6/IPv6 encapsulation) related to TN CoS.  Based on TN QoS Class
   marking, per hop behavior for all IETF Network Slices is executed on
   provider network transit links.  Provider network transit routers do not evaluate the original IP
   header for QoS-related decisions.  This model is outlined in
   <xref target="_figure-15"/> for MPLS encapsulation, and in <xref target="_figure-16"/> for SRv6
   encapsulation.</t>

<figure title="QoS with MPLS Encapsulation" anchor="_figure-15"><artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ MPLS Header  │
                                 ├─────┬─────┐  │
                                 │Label│TN TC│  │
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├─────┴─────┴──┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork></figure>

<figure title="QoS with IPv6 Encapsulation" anchor="_figure-16"><artwork align="center"><![CDATA[
                                 ┌──────────────┐
                                 │ IPv6 Header  │
                                 │      ┌───────┤
                                 │      │TN DSCP│
                                 ├──────┴───────┤
                                     optional
                                 │     IPv6     │
                                      headers
┌──────────────┐ ─ ─ ─ ─ ─ ─ ─ ─ ├──────────────┤
│  IP Header   │         │╲      │  IP Header   │
│      ┌───────┤         │ ╲     │      ┌───────┤
│      │5G DSCP│ ────────┘  ╲    │      │5G DSCP│
├──────┴───────┤             ╲   ├──────┴───────┤
│              │              ╲  │              │
│              │               ╲ │              │
│              │                ▏│              │
│   Payload    │               ╱ │   Payload    │
│(GTP-U/IPsec) │              ╱  │(GTP-U/IPsec) │
│              │             ╱   │              │
│              │ ────────┐  ╱    │              │
│              │         │ ╱     │              │
│              │         │╱      │              │
└──────────────┘ ─ ─ ─ ─ ─ ─ ─ ─ └──────────────┘
]]></artwork></figure>

<t>From the QoS perspective, both options are similar.  However, there
   is one difference between the two options.  The MPLS TC is only 3
   bits (8 possible combinations), while DSCP is 6 bits (64 possible
   combinations).  Hence, SRv6 <xref target="RFC8754"/> provides more flexibility for TN CoS
   design, especially in combination with soft policing with in-profile/
   out-profile traffic, as discussed in <xref target="sec-inbound-edge-resource-control"/>.</t>

<t>Provider network edge resources are controlled in a granular, fine-grained
   manner, with dedicated resource allocation for each IETF Network
   Slice.  The resource control/enforcement happens at each SDP in two
   directions: inbound and outbound.</t>

<section anchor="sec-inbound-edge-resource-control"><name>Inbound Edge Resource Control</name>

<t>The main aspect of inbound provider network edge resource control is per-slice traffic
   capacity enforcement.  This kind of enforcement is often called
   'admission control' or 'traffic conditioning'.  The goal of this
   inbound enforcement is to ensure that the traffic above the
   contracted rate is dropped or deprioritized, depending on the
   business rules, right at the edge of provider network.  This, combined with
   appropriate network capacity planning/management (<xref target="sec-capacity-planning"/>) is required to ensure proper isolation between slices in
   a scalable manner.  As a result, traffic of one slice has no influence
   on the traffic of other slices, even if the slice is misbehaving
   (e.g., DDoS attacks or node/link failures) and generates traffic
   volumes above the contracted rates.</t>

<t>The slice rates can be characterized with following parameters
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>:</t>

<t><list style="symbols">
  <t>CIR: Committed Information Rate (i.e., guaranteed bandwidth)</t>
  <t>PIR: Peak Information Rate (i.e., maximum bandwidth)</t>
</list></t>

<t>These parameters define the traffic characteristics of the slice and
   are part of SLO parameter set provided by the 5G NSO to IETF NSC.  Based
   on these parameters the provider network inbound policy can be implemented using one
   of following options:</t>

<t><list style="symbols">
  <t>1r2c (single-rate two-color) rate limiter  <vspace blankLines='1'/>
This is the most basic rate limiter, which meters at the SDP a
traffic stream of given slice and marks its packets as in-contract
(below contracted CIR) or out-of-contract (above contracted CIR).
In-contract packets are accepted and forwarded.  Out-of contract
packets are either dropped right at the SDP (hard rate limiting),
or remarked (with different MPLS TC or DSCP TN markings) to
signify 'this packet should be dropped in the first place, if
there is a congestion' (soft rate limiting), depending on the
business policy of the provider network.  In the second case, while
packets above CIR are forwarded at the SDP, they are subject to being
dropped during any congestion event at any place in the provider network.</t>
  <t>2r3c (two-rate three-color) rate limiter  <vspace blankLines='1'/>
This was initially defined in <xref target="RFC2698"/>, and its improved version
in <xref target="RFC4115"/>.  In essence, the traffic is assigned to one of the these three
categories:  <list style="symbols">
      <t>Green, for traffic under CIR</t>
      <t>Yellow, for traffic between CIR and PIR</t>
      <t>Red, for traffic above PIR</t>
    </list>
An inbound 2r3c meter implemented with <xref target="RFC4115"/>, compared to
<xref target="RFC2698"/>, is more 'customer friendly' as it doesn't impose
outbound peak-rate shaping requirements on customer edge (CE)
devices. 2r3c meters in general give greater flexibility for provider network edge
enforcement regarding accepting the traffic (green), de-
prioritizing and potentially dropping the traffic on transit during
congestion (yellow), or hard dropping the traffic (red).</t>
</list></t>

<t>Inbound provider network edge enforcement model for 5QI-unaware model, where all packets
   belonging to the slice are treated the same way in the provider network (no
   5Q QoS Class differentiation in the provider) is outlined in
   <xref target="_figure-17"/>.</t>

<figure title="Ingress Slice Admission Control (5QI-unware Model)" anchor="_figure-17"><artwork align="center"><![CDATA[
            Slice
           policer     ┌─────────┐
              ║    ┌───┴──┐      │
              ║    │      │      │
              ║    │    S │      │
              ║    │    l │      │
              ▼    │    i │      │
──────────────◇────┼──▶ c │      │
                   │    e │  A   │
                   │      │  t   │
                   │    1 │  t   │
                   │      │  a   │
                   ├──────┤  c   │
                   │      │  h   │
                   │    S │  m   │
                   │    l │  e   │
                   │    i │  n   │
──────────────◇────┼──▶ c │  t   │
                   │    e │      │
                   │      │  C   │
                   │    2 │  i   │
                   │      │  r   │
                   ├──────┤  c   │
                   │      │  u   │
                   │    S │  i   │
                   │    l │  t   │
                   │    i │      │
──────────────◇────┼──▶ c │      │
                   │    e │      │
                   │      │      │
                   │    3 │      │
                   │      │      │
                   └───┬──┘      │
                       └─────────┘
]]></artwork></figure>

</section>
<section anchor="outbound-edge-resource-control"><name>Outbound Edge Resource Control</name>

<t>While inbound slice admission control at the provider network edge is
   mandatory in the architecture described in this document, outbound provider network edge resource control might not be
   required in all use cases.  Use cases that specifically call for
   outbound provider network edge resource control are:</t>

<t><list style="symbols">
  <t>Slices use both CIR and PIR parameters, and provider network edge links
(attachment circuits) are dimensioned to fulfil the aggregate of
slice CIRs.  If at any given time, some slices send the traffic
above CIR, congestion in outbound direction on the provider network edge
link (attachment circuit) might happen.  Therefore, fine-grained resource control to
guarantee at least CIR for each slice is required.</t>
  <t>Any-to-Any (A2A) connectivity constructs are deployed, again
resulting in potential congestion in outbound direction on the
provider network edge links, even if only slice CIR parameters are used.
This again requires fine-grained resource control per slice in
outbound direction at the provider network edge links.</t>
</list></t>

<t>As opposed to inbound provider network edge resource control, typically implemented
   with rate-limiters/policers, outbound resource control is typically
   implemented with a weighted/priority queuing, potentially combined
   with optional shapers (per slice).  A detailed analysis of different
   queuing mechanisms is out of scope for this document, but is provided
   in <xref target="RFC7806"/>.</t>

<t><xref target="_figure-18"/> outlines the outbound provider network edge resource control model
   for 5QI-unaware slices.  Each slice is
   assigned a single egress queue.  The sum of slice CIRs, used as the
   weight in weighted queueing model, must not exceed the physical
   capacity of the attachment circuit.  Slice requests above this limit
   must be rejected by the IETF NSC, unless an already established slice with
   lower priority, if such exists, is preempted.</t>

<figure title="Ingress Slice Admission control (5QI-unaware Model)" anchor="_figure-18"><artwork align="center"><![CDATA[
      ┌─────────┐        QoS output queues
      │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │     │ S    │                            ╲│╱
      │     │ l    │                             │
      │     │ i    │                             │
      │  A  │ c    │                             │  weight=Slice-1-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
   ───┼──t──┼────▶                            │  │
      │  a  │ 1  └─┬──────────────────────────┘ ╱│╲
      │  c  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  h  │ S    │                            ╲│╱
      │  m  │ l    │                             │
      │  e  │ i    │                             │
      │  n  │ c    │                             │  weight=Slice-2-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   ───┼─────┼────▶                            │  │
      │  C  │ 2  └─┬──────────────────────────┘ ╱│╲
      │  i  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      │  r  │ S    │                            ╲│╱
      │  c  │ l    │                             │
      │  u  │ i    │                             │
      │  i  │ c    │                             │  weight=Slice-3-CIR
      │  t  │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   ───┼─────┼────▶                            │  │
      │     │ 3  └─┬──────────────────────────┘ ╱│╲
      │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
      └─────────┘
]]></artwork></figure>

</section>
</section>
<section anchor="qi-aware-model"><name>5QI-aware Model</name>

<t>In the 5QI-aware model, potentially a large number of 5G QoS Classes, represented via DSCP set by NFs
   (the architecture scales to thousands of 5G slices) is mapped
   (multiplexed) to up to 8 TN QoS Classes used in provider network transit
   equipment, as outlined in <xref target="_figure-QoS-5QI-aware"/>.</t>

<figure title="Slice 5Q QoS to TN QoS Mapping (5QI-aware Model)" anchor="_figure-QoS-5QI-aware"><artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
  ┏━━━━━━━━━━━━━━━━━┓         PE                               │
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                                           
  ┃   SDP           ┃              ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
  ┃│  ┌──────────┐ │┃              ┃       Transit link        ┃
  ┃   │5G DSCP A ├───────────────┐ ┃┌────────────────────────┐ ┃
I ┃│  └──────────┘ │┃            ├──▶     TN QoS Class 1     │ ┃
E ┃   ┌──────────┐  ┃            │ ┃└────────────────────────┘ ┃
T ┃│  │5G DSCP B ├───────────┐   │ ┃┌────────────────────────┐ ┃
F ┃   └──────────┘  ┃        │   │ ┃│     TN QoS Class 2     │ ┃
  ┃│  ┌──────────┐ │┃        │   │ ┃└────────────────────────┘ ┃
N ┃   │5G DSCP C ├──╋─────┐  │   │ ┃┌────────────────────────┐ ┃
S ┃│  └──────────┘ │┃     │  │   │ ┃│     TN QoS Class 3     │ ┃
  ┃   ┌──────────┐  ┃     │  │   │ ┃└────────────────────────┘ ┃
1 ┃│  │5G DSCP D ├─────┐  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   └──────────┘  ┃  │  │  ├──────▶     TN QoS Class 4     │ ┃
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃  │  │  │   │ ┃└────────────────────────┘ ┃
  ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃  │  │  │   │ ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  ├─────────▶     TN QoS Class 5     │ ┃
  ┃│  │5G DSCP A ├─────│──│──│───┘ ┃└────────────────────────┘ ┃
I ┃   └──────────┘  ┃  │  │  │     ┃┌────────────────────────┐ ┃
E ┃│  ┌──────────┐ │┃  │  │  │     ┃│     TN QoS Class 6     │ ┃
T ┃   │5G DSCP E ├─────│──│──┘     ┃└────────────────────────┘ ┃
F ┃│  └──────────┘ │┃  │  │        ┃┌────────────────────────┐ ┃
  ┃   ┌──────────┐  ┃  │  │        ┃│     TN QoS Class 7     │ ┃
N ┃│  │5G DSCP F ├─────│──┘        ┃└────────────────────────┘ ┃
S ┃   └──────────┘  ┃  │           ┃┌────────────────────────┐ ┃
  ┃│  ┌──────────┐ │┃  ├────────────▶     TN QoS Class 8     │ ┃
2 ┃   │5G DSCP G ├─────┘           ┃└────────────────────────┘ ┃
  ┃│  └──────────┘ │┃              ┃     Max 8 TN Classes      ┃
  ┃   SDP           ┃              ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
  ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                                          │
  ┣━━━━━━━━━━━━━━━━━┛                                           
   ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
  Fine-grained QoS enforcement         Coarse QoS enforcement   
    (dedicated resources per            (resources shared by    
      IETF Network Slice)                multiple IETF NSs)     
]]></artwork></figure>

<t>Given that in large scale deployments (large number of 5G
   slices), the number of potential 5G QoS Classes is much higher than
   the number of TN QoS Classes, multiple 5G QoS Classes with similar
   characteristics - potentially from different slices -
   would be grouped with common operator-defined TN logic and mapped to a same TN QoS Class when transported in the
   provider network.  That is, common per hop behavior (PHB) is executed on
   transit provider network routers for all packets grouped together. An example of this
   approach is outlined in <xref target="_figure-QoS-5QI-mapping-example"/>.</t>

<dl>
  <dt>Note:</dt>
  <dd>
    <t>The numbers indicated in <xref target="_figure-QoS-5QI-mapping-example"/> (S-NSSAI, 5QI, DSCP, queue, etc.) are provided for illustration purposes only and should not be considered as deployment guidance.</t>
  </dd>
</dl>

<figure title="Example of 3GPP QoS Mapped to TN QoS" anchor="_figure-QoS-5QI-mapping-example"><artwork align="center"><![CDATA[
                      ┌─────────────  PE  ─────────────────┐
┌────── NF-A ──────┐  │                                    │
│                  │  │ ┌ ─ ─ ─ ─ ┐                        │
│ 3GPP S-NSSAI 100 │  │     SDP                            │
│┌──────┐ ┌───────┐│  │ │┌───────┐│                        │
││5QI=1 ├─▶DSCP=46├──────▶DSCP=46├───┐                     │
│└──────┘ └───────┘│  │ │└───────┘│  │                     │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │                     │
││5QI=65├─▶DSCP=46├──────▶DSCP=46├┼──┤                     │
│└──────┘ └───────┘│  │  └───────┘   │                     │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │                     │
││5QI=7 ├─▶DSCP=10├──────▶DSCP=10──────┐  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 5│ │
└──────────────────┘  │  ─ ─ ─ ─ ─   ├─│──▶   Queue 5    │ │
                      │              │ │  └──────────────┘ │
┌────── NF-B ──────┐  │              │ │                   │
│                  │  │ ┌ ─ ─ ─ ─ ┐  │ │                   │
│ 3GPP S-NSSAI 200 │  │     SDP      │ │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│  │ │                   │
││5QI=1 ├─▶DSCP=46├──────▶DSCP=46├───┤ │  ┌──────────────┐ │
│└──────┘ └───────┘│  │ │└───────┘│  │ │  │TN QoS Class 1│ │
│┌──────┐ ┌───────┐│  │  ┌───────┐   │ ├──▶   Queue 1    │ │
││5QI=65├─▶DSCP=46├──────▶DSCP=46├┼──┘ │  └──────────────┘ │
│└──────┘ └───────┘│  │  └───────┘     │                   │
│┌──────┐ ┌───────┐│  │ │┌───────┐│    │                   │
││5QI=7 ├─▶DSCP=10├──────▶DSCP=10├─────┘                   │
│└──────┘ └───────┘│  │ │└───────┘│                        │
└──────────────────┘  │  ─ ─ ─ ─ ─                         │
                      └────────────────────────────────────┘
]]></artwork></figure>

<t>In current SDO progress of 3GPP (Rel.17) and O-RAN the mapping of 5QI to
DSCP is not expected in per-slice fashion, where 5QI to DSCP mapping may
vary from 3GPP slice to 3GPP slice, hence the mapping of 5G QoS DSCP values
to TN QoS Classes may be rather common.</t>

<t>Like in 5QI-unaware model, the original IP header retains the DCSP
   marking corresponding to 5QI (5G QoS Class), while the new header
   (MPLS or IPv6) carries QoS marking related to TN QoS Class.  Based on
   TN QoS Class marking, per hop behavior for all aggregated 5G QoS
   Classes from all IETF Network Slices is executed on provider network transit links.  Provider network
   transit routers do not evaluate original IP header for QoS
   related decisions.  The original DSCP marking retained in the
   original IP header is used at the PE for fine-grained per slice and
   per 5G QoS Class inbound/outbound enforcement on the AC.</t>

<t>In 5QI-aware model, compared to 5QI-unware model, provider network edge resources are controlled in an even more
   granular, fine-grained manner, with dedicated resource allocation for
   each IETF Network Slice and dedicated resource allocation for number
   of traffic classes (most commonly up 4 or 8 traffic classes,
   depending on the HW capability of the equipment) within each IETF
   Network Slice.</t>

<section anchor="inbound-edge-resource-control"><name>Inbound Edge Resource Control</name>

<t>Compared to the 5QI-unware model, admission control (traffic
   conditioning) in the 5QI-aware model is more granular, as it enforces
   not only per slice capacity constraints, but may as well enforce the
   constraints per 5G QoS Class within each slice.</t>

<t>5G slice using multiple 5QIs can potentially specify rates in one of
   the following ways:</t>

<t><list style="symbols">
  <t>Rates per traffic class (CIR or CIR+PIR), no rate per slice (sum
of rates per class gives the rate per slice).</t>
  <t>Rate per slice (CIR or CIR+PIR), and rates per prioritized
(premium) traffic classes (CIR only).  Best effort traffic class
uses the bandwidth (within slice CIR/PIR) not consumed by
prioritized classes.</t>
</list></t>

<t>In the first option, the slice admission control is executed with
   traffic class granularity, as outlined in <xref target="_figure-20"/>.  In this model,
   if a premium class doesn't consume all available class capacity, it
   cannot be reused by non-premium (i.e., Best Effort) class.</t>

<figure title="Ingress Slice Admission Control (5QI-aware Model)" anchor="_figure-20"><artwork align="center"><![CDATA[
                     Class             ┌─────────┐
                    policer         ┌──┴───┐     │
                                    │      │     │
5Q-QoS-A: CIR-1A ──────◇────────────┼──▶ S │     │
5Q-QoS-B: CIR-1B ──────◇────────────┼──▶ l │     │
5Q-QoS-C: CIR-1C ──────◇────────────┼──▶ i │     │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-1D ──────◇────────────┼──▶   │  A  │
                                    │    1 │  t  │
                                    │      │  t  │
                                    ├──────┤  a  │
                                    │      │  c  │
5Q-QoS-A: CIR-2A ──────◇────────────┼─▶  S │  h  │
5Q-QoS-B: CIR-2B ──────◇────────────┼─▶  l │  m  │
5Q-QoS-C: CIR-2C ──────◇────────────┼─▶  i │  e  │
                                    │    c │  n  │
                                    │    e │  t  │
   BE CIR/PIR-2D ──────◇────────────┼─▶    │     │
                                    │    2 │  C  │
                                    │      │  i  │
                                    ├──────┤  r  │
                                    │      │  c  │
5Q-QoS-A: CIR-3A ──────◇────────────┼─▶  S │  u  │
5Q-QoS-B: CIR-3B ──────◇────────────┼─▶  l │  i  │
5Q-QoS-C: CIR-3C ──────◇────────────┼─▶  i │  t  │
                                    │    c │     │
                                    │    e │     │
   BE CIR/PIR-3D───────◇────────────┼─▶    │     │
                                    │    3 │     │
                                    │      │     │
                                    └──┬───┘     │
                                       └─────────┘
]]></artwork></figure>

<t>The second model combines the advantages of 5QI-unaware model (per
   slice admission control) with the per traffic class admission
   control, as outlined in <xref target="_figure-20"/>.  Ingress admission control is at
   class granularity for premium classes (CIR only).  Non-premium class
   (i.e.,  Best Effort) has no separate class admission control policy,
   but it is allowed to use the entire slice capacity, which is available at
   any given moment.  I.e., slice capacity, which is not consumed by
   premium classes.  It is a hierarchical model, as depicted in
   <xref target="_figure-21"/>.</t>

<figure title="Ingress Slice Admission Control (5QI-aware) - Hierarchical" anchor="_figure-21"><artwork align="center"><![CDATA[
                              Slice
                             policer   ┌─────────┐
                   Class        .   ┌──┴───┐     │
                  policer      ; :  │      │     │
5Q-QoS-A: CIR-1A ────◇─────────┤─┼──┼──▶ S │     │
5Q-QoS-B: CIR-1B ────◇─────────┤─┼──┼──▶ l │     │
5Q-QoS-C: CIR-1C ────◇─────────┤─┼──┼──▶ i │     │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-1D ──────────────┤─┼──┼──▶   │  A  │
                               │ │  │    1 │  t  │
                               : ;  │      │  t  │
                                .   ├──────┤  a  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-2A ────◇─────────┤─┼──┼──▶ S │  h  │
5Q-QoS-B: CIR-2B ────◇─────────┤─┼──┼──▶ l │  m  │
5Q-QoS-C: CIR-2C ────◇─────────┤─┼──┼──▶ i │  e  │
                               │ │  │    c │  n  │
                               │ │  │    e │  t  │
   BE CIR/PIR-2D ──────────────┤─┼──┼──▶   │     │
                               │ │  │    2 │  C  │
                               : ;  │      │  i  │
                                .   ├──────┤  r  │
                               ; :  │      │  c  │
5Q-QoS-A: CIR-3A ────◇─────────┤─┼──┼──▶ S │  u  │
5Q-QoS-B: CIR-3B ────◇─────────┤─┼──┼──▶ l │  i  │
5Q-QoS-C: CIR-3C ────◇─────────┤─┼──┼──▶ i │  t  │
                               │ │  │    c │     │
                               │ │  │    e │     │
   BE CIR/PIR-3D ──────────────┤─┼──┼──▶   │     │
                               │ │  │    3 │     │
                               : ;  │      │     │
                                '   └──┬───┘     │
                                       └─────────┘
]]></artwork></figure>

</section>
<section anchor="outbound-edge-resource-control-1"><name>Outbound Edge Resource Control</name>

<t><xref target="_figure-22"/> outlines the outbound edge resource control model at the
   transport network layer for 5QI-aware slices.  Each slice is assigned
   multiple egress queues.  The sum of queue weights (equal to 5Q QoS
   CIRs within the slice) CIRs must not exceed the CIR of the slice
   itself.  And, similarly to the 5QI-aware model, the sum of slice CIRs
   must not exceed the physical capacity of the attachment circuit.</t>

<figure title="Egress Slice Admission Control (5QI-aware)" anchor="_figure-22"><artwork align="center"><![CDATA[
   ┌─────────┐        QoS output queues
   │     ┌───┴──┐─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │     │    ┌─┴──────────────────────────┐ ╲│╱
───┼─────┼────▶ 5Q-QoS-A: w=5Q-QoS-A-CIR   │  │
   │     │ S  └─┬──────────────────────────┘  │
   │     │ l  ┌─┴──────────────────────────┐  │
───┼─────┼─i──▶ 5Q-QoS-B: w=5Q-QoS-B-CIR   │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-1-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-1-PIR
───┼─────┼────▶ 5Q-QoS-C: w=5Q-QoS-C-CIR   │  │
   │     │ 1  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
───┼─────┼────▶ Best Effort (remainder)    │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │  A  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  t  │    ┌─┴──────────────────────────┐ ╲│╱
   │  t  │    │                            │  │
   │  a  │    └─┬──────────────────────────┘  │
   │  c  │ S  ┌─┴──────────────────────────┐  │
   │  h  │ l  │                            │  │
   │  m  │ i  └─┬──────────────────────────┘  │  weight=Slice-2-CIR
   │  e  │ c  ┌─┴──────────────────────────┐  │ shaping=Slice-2-PIR
   │  n  │ e  │                            │  │
   │  t  │    └─┬──────────────────────────┘  │
   │     │ 2  ┌─┴──────────────────────────┐  │
   │  C  │    │                            │  │
   │  i  │    └─┬──────────────────────────┘ ╱│╲
   │  r  ├──────┤─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │  c  │    ┌─┴──────────────────────────┐ ╲│╱
   │  u  │    │                            │  │
   │  i  │ S  └─┬──────────────────────────┘  │
   │  t  │ l  ┌─┴──────────────────────────┐  │
   │     │ i  │                            │  │
   │     │ c  └─┬──────────────────────────┘  │  weight=Slice-3-CIR
   │     │ e  ┌─┴──────────────────────────┐  │ shaping=Slice-3-PIR
   │     │    │                            │  │
   │     │ 3  └─┬──────────────────────────┘  │
   │     │    ┌─┴──────────────────────────┐  │
   │     │    │                            │  │
   │     │    └─┬──────────────────────────┘ ╱│╲
   │     └───┬──┘─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   └─────────┘
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="transit-resource-control"><name>Transit Resource Control</name>

<t>Transit resource control is much simpler than Edge resource control in the provider network.
   As outlined in <xref target="_figure-QoS-5QI-aware"/>, at the provider network edge, 5Q QoS Class marking
   (represented by DSCP related to 5QI set by mobile network functions
   in the packets handed off to the TN) is mapped to the TN QoS Class.
   Based in TN QoS Class, when the packet is encapsulated with outer
   header (MPLS or IPv6), TN QoS Class marking (MPLS TC or IPv6 DSCP in
   outer header, as depicted in <xref target="_figure-15"/> and <xref target="_figure-16"/>) is set in the
   outer header.  PHB in provider network transit routers is based exclusively on that TN QoS
   Class marking, i.e., original 5G QoS Class DSCP is not taken into
   consideration on transit.</t>

<t>Provider network transit resource control does not use any inbound interface policy,
   but only outbound interface policy, which is based on priority queue
   combined with weighted or deficit queuing model, without any shaper.
   The main purpose of transit resource control is to ensure that during
   network congestion events, for example caused by network failures and
   temporary rerouting, premium classes are prioritized, and any drops
   only occur in traffic that was de-prioritized by ingress admission control <xref target="sec-inbound-edge-resource-control"/> or in non-premium (best-effort) classes.  Capacity planning and management, as described in <xref target="sec-capacity-planning"/>, ensures that enough
   capacity is available to fulfill all approved slice requests.</t>

</section>
</section>
<section anchor="transport-planes-mapping-models"><name>Transport Planes Mapping Models</name>

<t>A network operator might define various tunnel groups, where each
   tunnel group is created with specific optimization criteria and
   constraints.  This document refers to such tunnel groups as
   'transport planes'.  For example, a transport plane "A" might represent
   tunnels optimized for latency, and transport plane "B" might represent tunnels optimized for high capacity.</t>

<t><xref target="_figure-23"/> depicts an example of a simple network with two transport
   planes.  These transport planes might be realized via various IP/MPLS
   techniques, for example Flex-Algo or RSVP/SR traffic engineering
   tunnels with or without PCE, and with or without bandwidth
   reservations.</t>

<t><xref target="sec-capacity-planning"/> discusses in detail different bandwidth
   models that can be deployed in the provider network.  However,
   discussion about how to realize or orchestrate transport planes is
   out of scope for this document.</t>

<figure title="Transport Planes" anchor="_figure-23"><artwork align="center"><![CDATA[
┌───────────────┐                                    ┌──────┐
│  Ingress PE   │   ╔═══════════════════════════════▶│ PE-A │
│               │   ║   ╔═══════════════════════════▷│      │
│  ┌ ─ ─ ─ ─ ┐  │   ║   ╚═════════════════════╗      └──────┘
│            ●══════╝   ╔═════════════════════╝
│  │Transport●════════════════════════════════╗      ┌──────┐
│    Plane A ●═════════════╗                  ╚═════▶│ PE-B │
│  │         ●═══════╗  ║  ║  ╔═══╗   ╔═══╗   ╔═════▷│      │
│   ─ ─ ─ ─ ─   │    ║  ║  ║  ║   ║   ║   ║   ║      └──────┘
│               │    ║  ║  ║  ║   ╚═══╝   ╚═══╝
│  ┌ ─ ─ ─ ─ ┐  │    ║  ║  ║  ║                      ┌──────┐
│            ○═══════║══╝  ╚════════════════════════▶│ PE-C │
│  │Transport○═══════║════════╝               ╔═════▷│      │
│    Plane B ○═══════║═════════════════╗      ║      └──────┘
│  │         ○═════╗ ╚═══════════════╗ ║      ║
│   ─ ─ ─ ─ ─   │  ║ ╔═╗ ╔═╗ ╔═╗ ╔═╗ ║ ╚══════╝      ┌──────┐
│               │  ║ ║ ║ ║ ║ ║ ║ ║ ║ ╚══════════════▶│ PE-D │
└───────────────┘  ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚════════════════▷│      │
                                                     └──────┘
         ●════════▶  Tunnels of Transport Plane A
         ○════════▷  Tunnels of Transport Plane B
]]></artwork></figure>

<t>Note that there could be multiple tunnels within a single transport plane
   between any pair of PEs. For readability, <xref target="_figure-23"/> shows only single
   tunnel per transport plane for (ingress PE, egress PE) pair.</t>

<t>Similar to the QoS mapping models discussed in <xref target="sec-qos-map"/>, for mapping
   to transport planes at the ingress PE, both 5QI-unaware and 5QI-aware
   models are defined.  In essence, entire slices can be mapped to
   transport planes without 5G QoS consideration (5QI-unaware model), or
   flows with different 5G QoS Classes, even if they are from the same
   slice, might be mapped to different transport planes (5QI-aware
   model).</t>

<section anchor="qi-unaware-model"><name>5QI-unaware Model</name>

<t>As discussed in <xref target="sec-5QI-unaware"/>, in the 5QI-unware model, the provider network
   doesn't take into account 5G QoS during execution of per-hop
   behavior.  The entire slice is mapped to single TN QoS Class,
   therefore the entire slice is subject to the same per-hop behavior.
   Similarly, in 5QI-unaware transport plane mapping model, the entire
   slice is mapped to a single transport plane, as depicted in
   <xref target="_figure-24"/>.</t>

<figure title="Slice to Transport Plane Mapping (5QI-unaware Model)" anchor="_figure-24"><artwork align="center"><![CDATA[
   ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   ┏━━━━━━━━━━━━━━━━━┓                        │
   ┃ Attach. Circuit ┃      PE router
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃                        │
   ┃   SDP           ┃
   ┃│  ┌──────────┐ │┃                        │
   ┃   │IETF NS 1 ├──────────┐
   ┃│  └──────────┘ │┃       │                │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │   ┌─────────┐  │
   ┃   SDP           ┃       │   │         │
   ┃│  ┌──────────┐ │┃       │   │Transport│  │
   ┃   │IETF NS 2 ├──────┐   ├───▶  Plane  │
   ┃│  └──────────┘ │┃   │   │   │    A    │  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   └─────────┘  │
   ┃   SDP           ┃   │   │
   ┃│  ┌──────────┐ │┃   │   │                │
   ┃   │IETF NS 3 ├──────┤   │
   ┃│  └──────────┘ │┃   │   │   ┌─────────┐  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃   │   │   │         │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │   │   │Transport│  │
   ┃   SDP           ┃   ├───│───▶  Plane  │
   ┃│  ┌──────────┐ │┃   │   │   │    B    │  │
   ┃   │IETF NS 4 ├──────┘   │   │         │
   ┃│  └──────────┘ │┃       │   └─────────┘  │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃       │
   ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃       │                │
   ┃   SDP           ┃       │
   ┃│  ┌──────────┐ │┃       │                │
   ┃   │IETF NS 5 ├──────────┘
   ┃│  └──────────┘ │┃                        │
   ┃ ─ ─ ─ ─ ─ ─ ─ ─ ┃
   ┗━━━━━━━━━━━━━━━━━┛                        │
   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork></figure>

<t>It is worth noting that there is no strict correlation between TN QoS
   Classes and Transport Planes.  The TN domain can be operated with
   e.g., 8 TN QoS Classes (representing 8 hardware queues in the
   routers), and 2 Transport Planes (e.g., latency optimized transport
   plane using link latency metrics for path calculation, and transport
   plane following IGP metrics).  TN QoS Class determines the per-hop
   behavior when the packets are transiting through the provider network, while
   Transport Plane determines the path, optimized or constrained based
   on operator's business criteria, that the packets use to transit
   through the provider network.</t>

</section>
<section anchor="qi-aware-model-1"><name>5QI-aware Model</name>

<t>In 5QI-aware model, the traffic can be mapped to transport planes at
   the granularity of 5G QoS Class.  Given that the potential number of
   transport planes is limited, packets from multiple 5G QoS Classes
   with similar characteristics are mapped to a common transport plane,
   as depicted in <xref target="_figure-25"/>.</t>

<figure title="Slice to Transport Plane mapping (5QI-aware Model)" anchor="_figure-25"><artwork align="center"><![CDATA[
     ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
     ┏━━━━━━━━━━━━━━━━━┓
     ┃ Attach. Circuit ┃                         │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃        PE router
     ┃   SDP           ┃                         │
     ┃│  ┌──────────┐ │┃
     ┃   │ 5G QoS A ├──────┐                     │
   I ┃│  └──────────┘ │┃   │
   E ┃   ┌──────────┐  ┃   │                     │
   T ┃│  │ 5G QoS B ├──────┤
   F ┃   └──────────┘  ┃   │         ┌─────────┐ │
     ┃│  ┌──────────┐ │┃   │         │         │
   N ┃   │ 5G QoS C ├───────────┐    │Transport│ │
   S ┃│  └──────────┘ │┃   ├────│────▶  Plane  │
     ┃   ┌──────────┐  ┃   │    │    │    A    │ │
   1 ┃│  │ 5G QoS D ├───────────┤    │         │
     ┃   └──────────┘  ┃   │    │    └─────────┘ │
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃   │    │
     ┃┌ ─ ─ ─ ─ ─ ─ ─ ┐┃   │    │                │
     ┃   ┌──────────┐  ┃   │    │
     ┃│  │ 5G QoS A ├──────┤    │    ┌─────────┐ │
   I ┃   └──────────┘  ┃   │    │    │         │
   E ┃│  ┌──────────┐ │┃   │    │    │Transport│ │
   T ┃   │ 5G QoS E ├──────┘    ├────▶  Plane  │
   F ┃│  └──────────┘ │┃        │    │    B    │ │
     ┃   ┌──────────┐  ┃        │    │         │
   N ┃│  │ 5G QoS F ├───────────┤    └─────────┘ │
   S ┃   └──────────┘  ┃        │
     ┃│  ┌──────────┐ │┃        │                │
   2 ┃   │ 5G QoS G ├───────────┘
     ┃│  └──────────┘ │┃                         │
     ┃   SDP           ┃
     ┃└ ─ ─ ─ ─ ─ ─ ─ ┘┃                         │
     ┗━━━━━━━━━━━━━━━━━┛
     └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘
]]></artwork></figure>

</section>
</section>
<section anchor="sec-capacity-planning"><name>Capacity Planning/Management</name>

<section anchor="bandwidth-requirements"><name>Bandwidth Requirements</name>

<t>This section describes the information conveyed by the 5G NSO to the
   transport controller with respect to slice bandwidth requirements.</t>

<t><xref target="_figure-multi-DC"/> shows three DCs that contain instances of network
   functions.  Also shown are PEs that have links to the DCs.  The PEs
   belong to the provider network.  Other details of the provider
   network, such as P-routers and transit links are not shown.  Also
   details of the DC infrastructure in customer sites, such as switches and routers, are not
   shown.</t>

<t>The 5G NSO is aware of the existence of the network functions and their
   locations.  However, it is not aware of the details of the provider
   network.  The transport controller has the opposite view - it is
   aware of the provider network infrastructure and the links between the PEs
   and the DCs, but is not aware of the individual network functions at customer sites.</t>

<figure title="An Example of Multi-DC Architecture" anchor="_figure-multi-DC"><artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ DC 1─ ─ ─ ─    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ┐   ┌ ─ ─ ─ ─ DC 2─ ─ ─ ─ 
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1A │           ───■PE1A│         │PE2A■──┤           │ NF2A │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
│ ┌──────┐               │                 │   │           ┌──────┐  
  │ NF1B │           │                                     │ NF2B │ │
│ └──────┘               │                 │   │           └──────┘  
  ┌──────┐           │  ┌────┐         ┌────┐              ┌──────┐ │
│ │ NF1C │           ───■PE1B│         │PE2B■──┤           │ NF2C │  
  └──────┘           │  └────┘         └────┘              └──────┘ │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─    │    Provider     │   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
                         │     Network     │   ┌ ─ ─ ─ ─ DC 3─ ─ ─ ─ 
                                       ┌────┐              ┌──────┐ │
                         │             │PE3A■──┤           │ NF3A │  
                                       └────┘              └──────┘ │
                         │                 │   │           ┌──────┐  
                                                           │ NF3B │ │
                         │                 │   │           └──────┘  
                                       ┌────┐              ┌──────┐ │
                         │             │PE3B■──┤           │ NF3C │  
                                       └────┘              └──────┘ │
                         └ ─ ─ ─ ─ ─ ─ ─ ─ ┘   └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ 
                                                                     
  ■ - SDP, with fine-grained QoS (dedicated resources per IETF NS)   
]]></artwork></figure>

<t>Let us consider 5G Slice "X" that uses some of the network functions in
   the three DCs.  If this slice has latency requirements, the 5G NSO will
   have taken those into account when deciding which NF instances
   in which DC are to be invoked for this slice.  As a result of such a
   placement decision, the three DCs shown are involved in 5G Slice "X",
   rather than other DCs.  For its decision-making, the 5G NSO
   needs information from the NSC about the observed latency between DCs.
   Preferably, the NSC would present the topology in an abstracted form,
   consisting of point-to-point abstracted links between pairs of DCs
   and associated latency and, optionally, delay variation and link loss
   values.  It would be valuable to have a mechanism for the 5G NSO to
   inform the NSC which DC-pairs are of interest for these metrics -
   there may be of order thousands of DCs, but the 5G NSO will only be
   interested in these metrics for a small fraction of all the possible
   DC-pairs, i.e. those in the same region of the provider network.  The
   mechanism for conveying the information is out of scope for this document.</t>

<t><xref target="_figure-27"/> shows the matrix of bandwidth demands for 5G slice "X".
   Within the slice, multiple network function instances might be
   sending traffic from DCi to DCj.  However, the 5G NSO sums the
   associated demands into one value.  For example, NF1A and NF1B in DC1
   might be sending traffic to multiple NFs in DC2, but this is
   expressed as one value in the traffic matrix: the total bandwidth
   required for 5G Slice X from DC1 to DC2 (8 units).  Each row in the
   right-most column in the traffic matrix shows the total amount of
   traffic going from a given DC into the transport network, regardless
   of the destination DC.  Note that this number can be less than the
   sum of DC-to-DC demands in the same row, on the basis that not all
   the network functions are likely to be sending at their maximum rate
   simultaneously.  For example, the total traffic from DC1 for Slice X
   is 11 units, which is less than the sum of the DC-to-DC demands in
   the same row (13 units).  Note, as described in <xref target="sec-qos-map"/>, a slice
   may have per-QoS class bandwidth requirements, and may have CIR and
   PIR limits.  This is not included in the example, but the same
   principles apply in such cases.</t>

<figure title="Inter-DC Traffic Demand Matrix" anchor="_figure-27"><artwork align="center"><![CDATA[
      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  8   │  5   │     11.0     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │  1   │ n/a  │  2   │      2.5     │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │  4   │  7   │ n/a  │     10.0     │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice X

      To┌──────┬──────┬──────┬──────────────┐
From    │ DC 1 │ DC 2 │ DC 3 │Total from DC │
 ┌──────┼──────┼──────┼──────┼──────────────┤
 │ DC 1 │ n/a  │  4   │ 2.5  │     6.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 2 │ 0.5  │ n/a  │ 0.8  │     1.0      │
 ├──────┼──────┼──────┼──────┼──────────────┤
 │ DC 3 │ 2.6  │  3   │ n/a  │     5.1      │
 └──────┴──────┴──────┴──────┴──────────────┘
                    Slice Y
]]></artwork></figure>

<t><xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> can be used to convey all
   of the information in the traffic matrix to the IETF NSC.  The IETF
   NSC applies policers corresponding to the last column in the traffic
   matrix to the appropriate PE routers, in order to enforce the
   bandwidth contract.  For example, it applies a policer of 11 units to
   PE1A and PE1B that face DC1, as this is the total bandwidth that DC1
   sends into the provider network corresponding to Slice X.  Also, the
   controller may apply shapers in the direction from the TN to the DC,
   if otherwise there is the possibility of a link in the DC being
   oversubscribed.  Note that a peer NF endpoint of an AC can be
   identified using 'peer-sap-id' as defined in <xref target="I-D.ietf-opsawg-sap"/>.</t>

<t>Depending on the bandwidth model used in the provider network (<xref target="sec-bw"/>),
   the other values in the matrix, i.e., the DC-to-DC demands, may not
   be directly applied to the provider network.  Even so, the
   information may be useful to the IETF NSC for capacity planning and
   failure simulation purposes.  If, on the other hand, the DC-to-DC
   demand information is not used by the IETF NSC, the IETF YANG Data
   Model for L3VPN Service Delivery <xref target="RFC8299"/> or the IETF YANG Data
   Model for L2VPN Service Delivery <xref target="RFC8466"/> could be used instead of
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/>, as they support
   conveying the bandwidth information in the right-most column of the
   traffic matrix.</t>

<t>The provider network may be implemented in such a way that it has
   various types of paths, for example low-latency traffic might be
   mapped onto a different transport path to other traffic (for example
   a particular flex-algo or a particular set of TE LSPs), as discussed
   in <xref target="sec-qos-map"/>.  The 5G NSO can use
   <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> to request low-latency
   transport for a given slice if required.  However, <xref target="RFC8299"/> or
   <xref target="RFC8466"/> do not support requesting a particular transport-type,
   e.g., low-latency.  One option is to augment these models to convey
   this information.  This can be achieved by reusing the 'underlay-
   transport' construct defined in <xref target="RFC9182"/> and <xref target="RFC9291"/>.</t>

</section>
<section anchor="sec-bw"><name>Bandwidth Models</name>

<t>This section describes three bandwidth management schemes that could
   be employed in the provider network.  Many variations are possible,
   but each example describes the salient points of the corresponding
   scheme.  Schemes 2 and 3 use TE; other variations on TE are possible
   as described in <xref target="I-D.ietf-teas-rfc3272bis"/>.</t>

<section anchor="scheme-1-shortest-path-forwarding-spf"><name>Scheme 1: Shortest Path Forwarding (SPF)</name>

<t>Shortest path forwarding is used according to the IGP metric.  Given
   that some slices are likely to have latency SLOs, the IGP metric on
   each link can be set to be in proportion to the latency of the link.
   In this way, all traffic follows the minimum latency path between
   endpoints.</t>

<t>In Scheme 1, although the operator provides bandwidth guarantees to
   the slice customers, there is no explicit end-to-end underpinning of
   the bandwidth SLO, in the form of bandwidth reservations across the
   provider network.  Rather, the expected performance is achieved via
   capacity planning, based on traffic growth trends and anticipated
   future demands, in order to ensure that network links are not over-
   subscribed.  This scheme is analogous to that used in many existing
   business VPN deployments, in that bandwidth guarantees are provided
   to the customers but are not explicitly underpinned end to end across
   the provider network.</t>

<t>A variation on the scheme is that Flex-Algo <xref target="I-D.ietf-lsr-flex-algo"/> is used. For example one Flex-Algo could
   use latency-based metrics and another Flex-Algo could use the IGP
   metric. There would be a many-to-one mapping of network slices to Flex-
   Algos.</t>

<t>While Scheme 1 is technically feasible, it is vulnerable to
   unexpected changes in traffic patterns and/or network element
   failures resulting in congestion.  This is because, unlike Schemes 2
   and 3 that employ TE, traffic cannot be diverted from the shortest
   path.</t>

</section>
<section anchor="scheme-2-te-lsps-with-fixed-bandwidth-reservations"><name>Scheme 2: TE LSPs with Fixed Bandwidth Reservations</name>

<t>Scheme 2 uses RSVP-TE or SR-TE LSPs with fixed bandwidth
   reservations.  By "fixed", we mean a value that stays constant over
   time, unless the 5G NSO communicates a change in slice bandwidth
   requirements, due to the creation or modification of a slice.  Note
   that the "reservations" would be in the mind of the transport
   controller - it is not necessary (or indeed possible for SR-TE) to
   reserve bandwidth at the network layer.  The bandwidth requirement
   acts as a constraint whenever the controller (re)computes the path of
   an LSP.  There could be a single mesh of LSPs between endpoints that
   carry all of the traffic types, or there could be a small handful of
   meshes, for example one mesh for low-latency traffic that follows the
   minimum latency path and another mesh for the other traffic that
   follows the minimum IGP metric path, as described in <xref target="sec-qos-map"/>.
   There would be a many-to-one mapping of slices to LSPs.</t>

<t>The bandwidth requirement from DCi to DCj is the sum of the DCi-DCj
   demands of the individual slices.  For example, if only Slice X and
   Slice Y are present, then the bandwidth requirement from DC1 to DC2
   is 12 units (8 units for Slice X and 4 units for Slice Y).  When the
   5G NSO requests a new slice, the transport controller, in its mind,
   increments the bandwidth requirement according to the requirements of
   the new slice.  For example, in <xref target="_figure-multi-DC"/>, suppose a new slice is
   instantiated that needs 0.8 Gbps from DC1 to DC2.  The transport
   controller would increase its notion of the bandwidth requirement
   from DC1 to DC2 from 12 Gbps to 12.8 Gbps to accommodate the
   additional expected traffic.</t>

<t>In the example, each DC has two PEs facing it for reasons of
   resilience.  The transport controller needs to determine how to map
   the DC1 to DC2 bandwidth requirement to bandwidth reservations of TE
   LSPs from DC1 to DC2.  For example, if the routing configuration is
   arranged such that in the absence of any network failure, traffic
   from DC1 to DC2 always enters PE1A and goes to PE2A, the controller
   reserves 12.8 Gbps of bandwidth on the LSP from PE1A to PE2A.  If, on
   the other hand, the routing configuration is arranged such that in
   the absence of any network failure, traffic from DC1 to DC2 always
   enters PE1A and is load-balanced across PE2A and PE2B, the controller
   reserves 6.4 Gbps of bandwidth on the LSP from PE1A to PE2A and 6.4
   Gbps of bandwidth on the LSP from PE1A to PE2B.  It might be tricky
   for the transport controller to be aware of all conditions that
   change the way traffic lands on the various PEs, and therefore know
   that it needs to change bandwidth reservations of LSPs accordingly.
   For example, there might be an internal failure within DC1 that
   causes traffic from DC1 to land on PE1B, rather than PE1A.  The
   transport controller may not be aware of the failure and therefore
   may not know that it now needs to apply bandwidth reservations to
   LSPs from PE1B to PE2A/PE2B.</t>

</section>
<section anchor="scheme-3-te-lsps-without-bandwidth-reservation"><name>Scheme 3: TE LSPs without Bandwidth Reservation</name>

<t>Like Scheme 2, Scheme 3 uses RSVP-TE or SR-TE LSPs.  There could be a
   single mesh of LSPs between endpoints that carry all of the traffic
   types, or there could be a small handful of meshes, for example one
   mesh for low-latency traffic that follows the minimum latency path
   and another mesh for the other traffic that follows the minimum IGP
   metric path, as described in <xref target="sec-qos-map"/>.  There would be a many-to-one
   mapping of slices to LSPs.</t>

<t>The difference between Scheme 2 and Scheme 3 is that Scheme 3 does
   not have fixed bandwidth reservations for the LSPs.  Instead, actual
   measured data-plane traffic volumes are used to influence the
   placement of TE LSPs.  One way of achieving this is to use
   distributed RSVP-TE with auto-bandwidth.  Alternatively, the
   transport controller can use telemetry-driven automatic congestion
   avoidance.  In this approach, when the actual traffic volume in the
   data plane on given link exceeds a threshold, the controller, knowing
   how much actual data plane traffic is currently travelling along each
   RSVP or SR-TE LSP, can tune the paths of one or more LSPs using the
   link such that they avoid that link.</t>

<t>It would be undesirable to move a minimum-latency LSP rather than
   another type of LSP in order to ease the congestion, as the new path
   will typically have a higher latency, if the minimum-latency LSP is
   currently following the minimum-latency path.  This can be avoided by
   designing the algorithms described in the previous paragraph such
   that they avoid moving minimum-latency LSPs unless there is no
   alternative.</t>

</section>
</section>
</section>
<section anchor="network-slicing-oam"><name>Network Slicing OAM</name>

<t>The deployment and maintenance of slices within a network imply
   a set OAM functions (<xref target="RFC6291"/>) to be deployed by the providers, e.g.:</t>

<t><list style="symbols">
  <t>Providers should be able to execute OAM tasks on a per network slice
basis. These tasks can cover the "full" slice within a domain or a
portion of that slice (for troubleshooting purposes, for example).  <vspace blankLines='1'/>
For example, per-slice OAM tasks can consist in (but not limited to):  <list style="symbols">
      <t>tracing resources that are bound to a given network slice,</t>
      <t>tracing resources that are invoked when forwarding a given flow bound to a given network slice,</t>
      <t>assessing whether flow isolation characteristics are in
conformance with the network slice service requirements, or</t>
      <t>assessing the compliance of the allocated network slice resources against flow/
customer service requirements.</t>
    </list>
<xref target="RFC7276"/> provides an overview of available OAM
tools. These technology-specific tools can be reused in the context
of network slicing. Providers that deploy network slicing
capabilities should be able to select whatever OAM technology or specific feature that would address their needs.  <vspace blankLines='1'/>
SFC OAM <xref target="I-D.ietf-sfc-oam-packet"/> should also be supported
for slices that make uses of service function chaining
<xref target="RFC7665"/>. An example of SFC OAM technique to Continuity
Check, Connectivity Verification, or tracing service functions
is specified in <xref target="I-D.ietf-sfc-multi-layer-oam"/>.</t>
  <t>Providers may want to enable differentiated failure
detect and repair features for a subset of network
slices. For example, a given network slice may require fast detect and
repair mechanisms, while others may
not be engineered with such means. The provider can use
techniques such as <xref target="RFC5286"/>, <xref target="RFC5714"/>, or <xref target="RFC8355"/>.</t>
  <t>Providers may deploy means to dynamically discover the set of network slices that
are enabled within its network. Such dynamic discovery capability
facilitates the detection of any mismatch between the view
maintained by the control/management plane and the actual network
configuration.  When mismatches are detected, corrective actions
must be undertaken accordingly. For example, a provider may rely
upon L3NM <xref target="RFC9182"/> or L2NM <xref target="RFC9291"/> to maintain the full
set of L3VPN/L2VPNs that are used to deliver network slice services.
The correlation between an LxVPN instance and a network slice service
is maintained using "parent-service-id" attribute (<xref section="7.3" sectionFormat="of" target="RFC9182"/>.</t>
  <t>Means to report a set of network performance metrics to assess
whether the agreed slice service objectives are honored. These means are used for SLO monitoring and violation detect purposes. For example,
<xref target="RFC9375"/> can be used to report links' one-way delay,
one-way delay variation, etc. Both conventional active/passive
measurement methods <xref target="RFC7799"/> and more recent telemetry methods
(e.g. YANG Push <xref target="RFC8641"/>) can be used.</t>
  <t>Means to report and expose observed performance metrics and other OAM state to customer.
For example, <xref target="I-D.ietf-teas-ietf-network-slice-nbi-yang"/> exposes a set of statistics per SDP, connectivity construct, and connection group.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document does not make any IANA request.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>IETF Network Slices considerations are discussed in Section 6 of <xref target="I-D.ietf-teas-ietf-network-slices"/>.</t>

<t>Many of the YANG modules cited in this document define schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>

<t>The NETCONF access control model <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>

<t>Security considerations specific to each of the technologies and protocols listed in the document are discussed in the specification documents of each of these protocols.</t>

<t>Adequate admission control policies should be configured in the edge of the provider network to control access to specific slice resources. Likewise, access to classification and mapping tables must be controlled to prevent misbehaviors (an unauthorized entity may modify the table to bind traffic to a random slice, redirect the traffic, etc.). Network devices must check that a required access privilege is provided before granting access to specific data or performing specific actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>




<reference anchor='I-D.ietf-teas-ietf-network-slices'>
   <front>
      <title>A Framework for IETF Network Slices</title>
      <author fullname='Adrian Farrel' initials='A.' surname='Farrel'>
         <organization>Old Dog Consulting</organization>
      </author>
      <author fullname='John Drake' initials='J.' surname='Drake'>
         <organization>Juniper Networks</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Shunsuke Homma' initials='S.' surname='Homma'>
         <organization>NTT</organization>
      </author>
      <author fullname='Kiran Makhijani' initials='K.' surname='Makhijani'>
         <organization>Futurewei</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Jeff Tantsura' initials='J.' surname='Tantsura'>
         <organization>Microsoft Inc.</organization>
      </author>
      <date day='21' month='January' year='2023'/>
      <abstract>
	 <t>   This document describes network slicing in the context of networks
   built from IETF technologies.  It defines the term &quot;IETF Network
   Slice&quot; and establishes the general principles of network slicing in
   the IETF context.

   The document discusses the general framework for requesting and
   operating IETF Network Slices, the characteristics of an IETF Network
   Slice, the necessary system components and interfaces, and how
   abstract requests can be mapped to more specific technologies.  The
   document also discusses related considerations with monitoring and
   security.

   This document also provides definitions of related terms to enable
   consistent usage in other IETF documents that describe or use aspects
   of IETF Network Slices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slices-19'/>
   
</reference>



<reference anchor='RFC4364'>
<front>
<title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
<author fullname='E. Rosen' initials='E.' surname='Rosen'><organization/></author>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<date month='February' year='2006'/>
<abstract><t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers.  This method uses a &quot;peer model&quot;, in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no &quot;overlay&quot; visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other.  Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4364'/>
<seriesInfo name='DOI' value='10.17487/RFC4364'/>
</reference>



<reference anchor='RFC6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>



<reference anchor='RFC6242'>
<front>
<title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
<author fullname='M. Wasserman' initials='M.' surname='Wasserman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem.  This document obsoletes RFC 4742.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6242'/>
<seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>



<reference anchor='RFC8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor='RFC8341'>
<front>
<title>Network Configuration Access Control Model</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability.  There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.  This document defines such an access control model.</t><t>This document obsoletes RFC 6536.</t></abstract>
</front>
<seriesInfo name='STD' value='91'/>
<seriesInfo name='RFC' value='8341'/>
<seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="_5G-Book" target="https://5g.systemsapproach.org/">
  <front>
    <title>5G Mobile Networks: A Systems Approach</title>
    <author fullname="Larry Peterson">
      <organization></organization>
    </author>
    <author fullname="Oguz Sunay">
      <organization></organization>
    </author>
    <author fullname="Bruce Davie">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
</reference>
<reference anchor="TR-GSTR-TN5G" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-HOME-2018-PDF-E.pdf">
  <front>
    <title>Technical Report GSTR-TN5G</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2018" month="February"/>
  </front>
</reference>
<reference anchor="TS-23.501" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144">
  <front>
    <title>TS 23.501: System architecture for the 5G System (5GS)</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="TS-28.530" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3273">
  <front>
    <title>TS 23.530: Management and orchestration; Concepts, use cases and requirements)</title>
    <author >
      <organization>3GPP</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="O-RAN.WG9.XPSAAS" target="https://www.o-ran.org/specifications">
  <front>
    <title>O-RAN.WG9.XPSAAS: O-RAN WG9 Xhaul Packet Switched Architectures and Solutions Version 03.00</title>
    <author >
      <organization>O-RAN Alliance</organization>
    </author>
    <date year="2022" month="February"/>
  </front>
</reference>
<reference anchor="NG.113" target="https://www.gsma.com/newsroom/wp-content/uploads//NG.113-v4.0.pdf">
  <front>
    <title>NG.113: 5GS Roaming Guidelines Version 4.0</title>
    <author >
      <organization>GSMA</organization>
    </author>
    <date year="2021" month="May"/>
  </front>
</reference>




<reference anchor='RFC9182'>
<front>
<title>A YANG Network Data Model for Layer 3 VPNs</title>
<author fullname='S. Barguil' initials='S.' surname='Barguil'><organization/></author>
<author fullname='O. Gonzalez de Dios' initials='O.' role='editor' surname='Gonzalez de Dios'><organization/></author>
<author fullname='M. Boucadair' initials='M.' role='editor' surname='Boucadair'><organization/></author>
<author fullname='L. Munoz' initials='L.' surname='Munoz'><organization/></author>
<author fullname='A. Aguado' initials='A.' surname='Aguado'><organization/></author>
<date month='February' year='2022'/>
<abstract><t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t><t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t></abstract>
</front>
<seriesInfo name='RFC' value='9182'/>
<seriesInfo name='DOI' value='10.17487/RFC9182'/>
</reference>



<reference anchor='RFC4664'>
<front>
<title>Framework for Layer 2 Virtual Private Networks (L2VPNs)</title>
<author fullname='L. Andersson' initials='L.' role='editor' surname='Andersson'><organization/></author>
<author fullname='E. Rosen' initials='E.' role='editor' surname='Rosen'><organization/></author>
<date month='September' year='2006'/>
<abstract><t>This document provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs).  This framework is intended to aid in standardizing protocols and mechanisms to support interoperable L2VPNs.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='4664'/>
<seriesInfo name='DOI' value='10.17487/RFC4664'/>
</reference>



<reference anchor='RFC8969'>
<front>
<title>A Framework for Automating Service and Network Management with YANG</title>
<author fullname='Q. Wu' initials='Q.' role='editor' surname='Wu'><organization/></author>
<author fullname='M. Boucadair' initials='M.' role='editor' surname='Boucadair'><organization/></author>
<author fullname='D. Lopez' initials='D.' surname='Lopez'><organization/></author>
<author fullname='C. Xie' initials='C.' surname='Xie'><organization/></author>
<author fullname='L. Geng' initials='L.' surname='Geng'><organization/></author>
<date month='January' year='2021'/>
<abstract><t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked.  Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance).  Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t><t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t></abstract>
</front>
<seriesInfo name='RFC' value='8969'/>
<seriesInfo name='DOI' value='10.17487/RFC8969'/>
</reference>


<reference anchor='I-D.ietf-teas-ietf-network-slice-nbi-yang'>
   <front>
      <title>A YANG Data Model for the IETF Network Slice Service</title>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Dhruv Dhody' initials='D.' surname='Dhody'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <author fullname='Liuyan Han' initials='L.' surname='Han'>
         <organization>China Mobile</organization>
      </author>
      <author fullname='John Mullooly' initials='J.' surname='Mullooly'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <date day='13' month='March' year='2023'/>
      <abstract>
	 <t>   This document defines a YANG data model for the IETF Network Slice
   Service.  The model can be used in the IETF Network Slice Service
   interface between a customer and a provider that offers IETF Network
   Slices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-ietf-network-slice-nbi-yang-04'/>
   
</reference>


<reference anchor='I-D.boro-opsawg-teas-attachment-circuit'>
   <front>
      <title>YANG Data Models for &#39;Attachment Circuits&#39;-as-a-Service (ACaaS)</title>
      <author fullname='Mohamed Boucadair' initials='M.' surname='Boucadair'>
         <organization>Orange</organization>
      </author>
      <author fullname='Richard Roberts' initials='R.' surname='Roberts'>
         <organization>Juniper</organization>
      </author>
      <author fullname='Oscar Gonzalez de Dios' initials='O. G.' surname='de Dios'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Samier Barguil' initials='S.' surname='Barguil'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Bo Wu' initials='B.' surname='Wu'>
         <organization>Huawei Technologies</organization>
      </author>
      <date day='3' month='May' year='2023'/>
      <abstract>
	 <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   prior or during service provisioning (e.g., Network Slice Service).
   The document specifies also a module that updates other service and
   network modules with the required information to bind specific
   services to ACs that are created using the AC service model.

   Also, the document specifies a set of reusable groupings.  Whether a
   service model reuses structures defined in the AC models or simply
   include an AC reference is a design choice of these service models.
   Relying upon the AC service model to manage ACs over which a service
   is delivered has the merit to decorrelate the management of a service
   vs. upgrade the AC components to reflect recent AC technologies or
   features.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-boro-opsawg-teas-attachment-circuit-06'/>
   
</reference>


<reference anchor='I-D.ietf-teas-5g-network-slice-application'>
   <front>
      <title>IETF Network Slice Application in 3GPP 5G End-to-End Network Slice</title>
      <author fullname='Xuesong Geng' initials='X.' surname='Geng'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Reza Rokui' initials='R.' surname='Rokui'>
         <organization>Ciena</organization>
      </author>
      <author fullname='Jie Dong' initials='J.' surname='Dong'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Ivan Bykov' initials='I.' surname='Bykov'>
         <organization>Ribbon Communications</organization>
      </author>
      <date day='4' month='May' year='2023'/>
      <abstract>
	 <t>   Network Slicing is one of the core features in 5G, which provides
   different network service as independent logical networks.  To
   provide 5G network slices service, an end-to-end network slice needs
   to consists of 3 major types of network segments: Radio Access
   Network (RAN), Mobile Core Network (CN) and Transport Network (TN).
   This document describes the application of IETF network slice in
   providing 5G end-to-end network slices, including the network slice
   identification mapping, network slice parameter mapping and 5G IETF
   Network Slice NBI.


	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-5g-network-slice-application-00'/>
   
</reference>


<reference anchor='I-D.henry-tsvwg-diffserv-to-qci'>
   <front>
      <title>Diffserv to QCI Mapping</title>
      <author fullname='Jerome Henry' initials='J.' surname='Henry'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Tim Szigeti' initials='T.' surname='Szigeti'>
         <organization>Cisco</organization>
      </author>
      <author fullname='Luis M. Contreras' initials='L. M.' surname='Contreras'>
         <organization>Telefonica</organization>
      </author>
      <date day='13' month='April' year='2020'/>
      <abstract>
	 <t>   As communication devices become more hybrid, smart devices include
   more media-rich communication applications, and the boundaries
   between telecommunication and other applications becomes less clear.
   Simultaneously, as the end-devices become more mobile, application
   traffic transits more often between enterprise networks, the
   Internet, and cellular telecommunication networks, sometimes using
   simultaneously more than one path and network type.  In this context,
   it is crucial that quality of service be aligned between these
   different environments.  However, this is not always the case by
   default, and cellular communication networks use a different QoS
   nomenclature from the Internet and enterprise networks.  This
   document specifies a set of 3rd Generation Partnership Project (3GPP)
   Quality of Service (QoS) Class Identifiers (QCI) and 5G QoS
   Identifiers (5QI) to Differentiated Services Code Point (DSCP)
   mappings, to reconcile the marking recommendations offered by the
   3GPP with the recommendations offered by the IETF, so as to maintain
   a consistent QoS treatment between cellular networks and the
   Internet.  This mapping can be used by enterprises or implementers
   expecting traffic to flow through both types of network, and wishing
   to align the QoS treatment applied to one network under their control
   with the QoS treatment applied to the other network.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-henry-tsvwg-diffserv-to-qci-04'/>
   
</reference>



<reference anchor='RFC8754'>
<front>
<title>IPv6 Segment Routing Header (SRH)</title>
<author fullname='C. Filsfils' initials='C.' role='editor' surname='Filsfils'><organization/></author>
<author fullname='D. Dukes' initials='D.' role='editor' surname='Dukes'><organization/></author>
<author fullname='S. Previdi' initials='S.' surname='Previdi'><organization/></author>
<author fullname='J. Leddy' initials='J.' surname='Leddy'><organization/></author>
<author fullname='S. Matsushima' initials='S.' surname='Matsushima'><organization/></author>
<author fullname='D. Voyer' initials='D.' surname='Voyer'><organization/></author>
<date month='March' year='2020'/>
<abstract><t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t></abstract>
</front>
<seriesInfo name='RFC' value='8754'/>
<seriesInfo name='DOI' value='10.17487/RFC8754'/>
</reference>



<reference anchor='RFC2698'>
<front>
<title>A Two Rate Three Color Marker</title>
<author fullname='J. Heinanen' initials='J.' surname='Heinanen'><organization/></author>
<author fullname='R. Guerin' initials='R.' surname='Guerin'><organization/></author>
<date month='September' year='1999'/>
<abstract><t>This document defines a Two Rate Three Color Marker (trTCM), which can be used as a component in a Diffserv traffic conditioner.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='2698'/>
<seriesInfo name='DOI' value='10.17487/RFC2698'/>
</reference>



<reference anchor='RFC4115'>
<front>
<title>A Differentiated Service Two-Rate, Three-Color Marker with Efficient Handling of in-Profile Traffic</title>
<author fullname='O. Aboul-Magd' initials='O.' surname='Aboul-Magd'><organization/></author>
<author fullname='S. Rabie' initials='S.' surname='Rabie'><organization/></author>
<date month='July' year='2005'/>
<abstract><t>This document describes a two-rate, three-color marker that has been in use for data services including Frame Relay services.  This marker can be used for metering per-flow traffic in the emerging IP and L2 VPN services.  The marker defined here is different from previously defined markers in the handling of the in-profile traffic. Furthermore, this marker doesn't impose peak-rate shaping requirements on customer edge (CE) devices.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='4115'/>
<seriesInfo name='DOI' value='10.17487/RFC4115'/>
</reference>



<reference anchor='RFC7806'>
<front>
<title>On Queuing, Marking, and Dropping</title>
<author fullname='F. Baker' initials='F.' surname='Baker'><organization/></author>
<author fullname='R. Pan' initials='R.' surname='Pan'><organization/></author>
<date month='April' year='2016'/>
<abstract><t>This note discusses queuing and marking/dropping algorithms.  While these algorithms may be implemented in a coupled manner, this note argues that specifications, measurements, and comparisons should decouple the different algorithms and their contributions to system behavior.</t></abstract>
</front>
<seriesInfo name='RFC' value='7806'/>
<seriesInfo name='DOI' value='10.17487/RFC7806'/>
</reference>


<reference anchor='I-D.ietf-opsawg-sap'>
   <front>
      <title>A YANG Network Model for Service Attachment Points (SAPs)</title>
      <author fullname='Mohamed Boucadair' initials='M.' surname='Boucadair'>
         <organization>Orange</organization>
      </author>
      <author fullname='Oscar Gonzalez de Dios' initials='O. G.' surname='de Dios'>
         <organization>Telefonica</organization>
      </author>
      <author fullname='Samier Barguil' initials='S.' surname='Barguil'>
         <organization>Nokia</organization>
      </author>
      <author fullname='Qin Wu' initials='Q.' surname='Wu'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Victor Lopez' initials='V.' surname='Lopez'>
         <organization>Nokia</organization>
      </author>
      <date day='18' month='January' year='2023'/>
      <abstract>
	 <t>   This document defines a YANG data model for representing an abstract
   view of the provider network topology that contains the points from
   which its services can be attached (e.g., basic connectivity, VPN,
   network slices).  Also, the model can be used to retrieve the points
   where the services are actually being delivered to customers
   (including peer networks).

   This document augments the &#39;ietf-network&#39; data model by adding the
   concept of Service Attachment Points (SAPs).  The SAPs are the
   network reference points to which network services, such as Layer 3
   Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network
   (L2VPN), can be attached.  One or multiple services can be bound to
   the same SAP.  Both User-Network Interface (UNI) and Network-to-
   Network Interface (NNI) are supported in the SAP data model.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-opsawg-sap-15'/>
   
</reference>



<reference anchor='RFC8299'>
<front>
<title>YANG Data Model for L3VPN Service Delivery</title>
<author fullname='Q. Wu' initials='Q.' role='editor' surname='Wu'><organization/></author>
<author fullname='S. Litkowski' initials='S.' surname='Litkowski'><organization/></author>
<author fullname='L. Tomotaki' initials='L.' surname='Tomotaki'><organization/></author>
<author fullname='K. Ogaki' initials='K.' surname='Ogaki'><organization/></author>
<date month='January' year='2018'/>
<abstract><t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service.  This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364.  This model is intended to be instantiated at the management system to deliver the overall service.  It is not a configuration model to be used directly on network elements.  This model provides an abstracted view of the Layer 3 IP VPN service configuration components.  It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service.  How the configuration of network elements is done is out of scope for this document.</t><t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible.  The changes are a series of small fixes to the YANG module and some clarifications to the text.</t></abstract>
</front>
<seriesInfo name='RFC' value='8299'/>
<seriesInfo name='DOI' value='10.17487/RFC8299'/>
</reference>



<reference anchor='RFC8466'>
<front>
<title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
<author fullname='B. Wen' initials='B.' surname='Wen'><organization/></author>
<author fullname='G. Fioccola' initials='G.' role='editor' surname='Fioccola'><organization/></author>
<author fullname='C. Xie' initials='C.' surname='Xie'><organization/></author>
<author fullname='L. Jalil' initials='L.' surname='Jalil'><organization/></author>
<date month='October' year='2018'/>
<abstract><t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service.  It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service.  How this configuration of network elements is done is out of scope for this document.</t><t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t><t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t></abstract>
</front>
<seriesInfo name='RFC' value='8466'/>
<seriesInfo name='DOI' value='10.17487/RFC8466'/>
</reference>



<reference anchor='RFC9291'>
<front>
<title>A YANG Network Data Model for Layer 2 VPNs</title>
<author fullname='M. Boucadair' initials='M.' role='editor' surname='Boucadair'><organization/></author>
<author fullname='O. Gonzalez de Dios' initials='O.' role='editor' surname='Gonzalez de Dios'><organization/></author>
<author fullname='S. Barguil' initials='S.' surname='Barguil'><organization/></author>
<author fullname='L. Munoz' initials='L.' surname='Munoz'><organization/></author>
<date month='September' year='2022'/>
<abstract><t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t><t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t></abstract>
</front>
<seriesInfo name='RFC' value='9291'/>
<seriesInfo name='DOI' value='10.17487/RFC9291'/>
</reference>


<reference anchor='I-D.ietf-teas-rfc3272bis'>
   <front>
      <title>Overview and Principles of Internet Traffic Engineering</title>
      <author fullname='Adrian Farrel' initials='A.' surname='Farrel'>
         <organization>Old Dog Consulting</organization>
      </author>
      <date day='27' month='October' year='2022'/>
      <abstract>
	 <t>   This document describes the principles of traffic engineering (TE) in
   the Internet.  The document is intended to promote better
   understanding of the issues surrounding traffic engineering in IP
   networks and the networks that support IP networking, and to provide
   a common basis for the development of traffic engineering
   capabilities for the Internet.  The principles, architectures, and
   methodologies for performance evaluation and performance optimization
   of operational networks are also discussed.

   This work was first published as RFC 3272 in May 2002.  This document
   obsoletes RFC 3272 by making a complete update to bring the text in
   line with best current practices for Internet traffic engineering and
   to include references to the latest relevant work in the IETF.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-rfc3272bis-22'/>
   
</reference>


<reference anchor='I-D.ietf-lsr-flex-algo'>
   <front>
      <title>IGP Flexible Algorithm</title>
      <author fullname='Peter Psenak' initials='P.' surname='Psenak'>
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Shraddha Hegde' initials='S.' surname='Hegde'>
         <organization>Juniper Networks, Inc.</organization>
      </author>
      <author fullname='Clarence Filsfils' initials='C.' surname='Filsfils'>
         <organization>Cisco Systems, Inc.</organization>
      </author>
      <author fullname='Ketan Talaulikar' initials='K.' surname='Talaulikar'>
         <organization>Cisco Systems, Inc</organization>
      </author>
      <author fullname='Arkadiy Gulko' initials='A.' surname='Gulko'>
         <organization>Edward Jones</organization>
      </author>
      <date day='17' month='October' year='2022'/>
      <abstract>
	 <t>IGP protocols historically compute the best paths over the network based on the IGP metric assigned to the links.  Many network deployments use RSVP-TE or Segment Routing - Traffic Engineering (SR-TE) to steer traffic over a path that is computed using different metrics or constraints than the shortest IGP path.  This document specifies a solution that allows IGPs themselves to compute constraint-based paths over the network.  This document also specifies a way of using Segment Routing (SR) Prefix-SIDs and SRv6 locators to steer packets along the constraint-based paths.
	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-lsr-flex-algo-26'/>
   
</reference>



<reference anchor='RFC6291'>
<front>
<title>Guidelines for the Use of the &quot;OAM&quot; Acronym in the IETF</title>
<author fullname='L. Andersson' initials='L.' surname='Andersson'><organization/></author>
<author fullname='H. van Helvoort' initials='H.' surname='van Helvoort'><organization/></author>
<author fullname='R. Bonica' initials='R.' surname='Bonica'><organization/></author>
<author fullname='D. Romascanu' initials='D.' surname='Romascanu'><organization/></author>
<author fullname='S. Mansfield' initials='S.' surname='Mansfield'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>At first glance, the acronym &quot;OAM&quot; seems to be well-known and well-understood.  Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t><t>This document provides a definition of the acronym &quot;OAM&quot; (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM.  There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the &quot;OAM&quot; term.  This memo documents an Internet Best Current  Practice.</t></abstract>
</front>
<seriesInfo name='BCP' value='161'/>
<seriesInfo name='RFC' value='6291'/>
<seriesInfo name='DOI' value='10.17487/RFC6291'/>
</reference>



<reference anchor='RFC7276'>
<front>
<title>An Overview of Operations, Administration, and Maintenance (OAM) Tools</title>
<author fullname='T. Mizrahi' initials='T.' surname='Mizrahi'><organization/></author>
<author fullname='N. Sprecher' initials='N.' surname='Sprecher'><organization/></author>
<author fullname='E. Bellagamba' initials='E.' surname='Bellagamba'><organization/></author>
<author fullname='Y. Weingarten' initials='Y.' surname='Weingarten'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>Operations, Administration, and Maintenance (OAM) is a general term that refers to a toolset for fault detection and isolation, and for performance measurement.  Over the years, various OAM tools have been defined for various layers in the protocol stack.</t><t>This document summarizes some of the OAM tools defined in the IETF in the context of IP unicast, MPLS, MPLS Transport Profile (MPLS-TP), pseudowires, and Transparent Interconnection of Lots of Links (TRILL). This document focuses on tools for detecting and isolating failures in networks and for performance monitoring. Control and management aspects of OAM are outside the scope of this document.  Network repair functions such as Fast Reroute (FRR) and protection switching, which are often triggered by OAM protocols, are also out of the scope of this document.</t><t>The target audience of this document includes network equipment vendors, network operators, and standards development organizations. This document can be used as an index to some of the main OAM tools  defined in the IETF.  At the end of the document, a list of the OAM toolsets and a list of the OAM functions are presented as a summary.</t></abstract>
</front>
<seriesInfo name='RFC' value='7276'/>
<seriesInfo name='DOI' value='10.17487/RFC7276'/>
</reference>


<reference anchor='I-D.ietf-sfc-oam-packet'>
   <front>
      <title>OAM Packet and Behavior in the Network Service Header (NSH)</title>
      <author fullname='Mohamed Boucadair' initials='M.' surname='Boucadair'>
         <organization>Orange</organization>
      </author>
      <date day='26' month='March' year='2023'/>
      <abstract>
	 <t>   This document clarifies an ambiguity in the Network Service Header
   (NSH) specification related to the handling of O bit.  In particular,
   this document clarifies the meaning of &quot;OAM packet&quot;.

   This document updates RFC 8300.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sfc-oam-packet-03'/>
   
</reference>



<reference anchor='RFC7665'>
<front>
<title>Service Function Chaining (SFC) Architecture</title>
<author fullname='J. Halpern' initials='J.' role='editor' surname='Halpern'><organization/></author>
<author fullname='C. Pignataro' initials='C.' role='editor' surname='Pignataro'><organization/></author>
<date month='October' year='2015'/>
<abstract><t>This document describes an architecture for the specification, creation, and ongoing maintenance of Service Function Chains (SFCs) in a network.  It includes architectural concepts, principles, and components used in the construction of composite services through deployment of SFCs, with a focus on those to be standardized in the IETF.  This document does not propose solutions, protocols, or extensions to existing protocols.</t></abstract>
</front>
<seriesInfo name='RFC' value='7665'/>
<seriesInfo name='DOI' value='10.17487/RFC7665'/>
</reference>


<reference anchor='I-D.ietf-sfc-multi-layer-oam'>
   <front>
      <title>Active OAM for Service Function Chaining (SFC)</title>
      <author fullname='Greg Mirsky' initials='G.' surname='Mirsky'>
         <organization>Ericsson</organization>
      </author>
      <author fullname='Wei Meng' initials='W.' surname='Meng'>
         <organization>ZTE Corporation</organization>
      </author>
      <author fullname='Ting Ao' initials='T.' surname='Ao'>
         <organization>China Mobile</organization>
      </author>
      <author fullname='Bhumip Khasnabish' initials='B.' surname='Khasnabish'>
         <organization>Individual contributor</organization>
      </author>
      <author fullname='Kent Leung' initials='K.' surname='Leung'>
         <organization>Individual contributor</organization>
      </author>
      <author fullname='Gyan Mishra' initials='G. S.' surname='Mishra'>
         <organization>Verizon Inc.</organization>
      </author>
      <date day='26' month='March' year='2023'/>
      <abstract>
	 <t>   A set of requirements for active Operation, Administration, and
   Maintenance (OAM) of Service Function Chains (SFCs) in a network is
   presented in this document.  Based on these requirements, an
   encapsulation of active OAM messages in SFC and a mechanism to detect
   and localize defects are described.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sfc-multi-layer-oam-23'/>
   
</reference>



<reference anchor='RFC5286'>
<front>
<title>Basic Specification for IP Fast Reroute: Loop-Free Alternates</title>
<author fullname='A. Atlas' initials='A.' role='editor' surname='Atlas'><organization/></author>
<author fullname='A. Zinin' initials='A.' role='editor' surname='Zinin'><organization/></author>
<date month='September' year='2008'/>
<abstract><t>This document describes the use of loop-free alternates to provide local protection for unicast traffic in pure IP and MPLS/LDP networks in the event of a single failure, whether link, node, or shared risk link group (SRLG).  The goal of this technology is to reduce the packet loss that happens while routers converge after a topology change due to a failure.  Rapid failure repair is achieved through use of precalculated backup next-hops that are loop-free and safe to use until the distributed network convergence process completes. This simple approach does not require any support from other routers. The extent to which this goal can be met by this specification is dependent on the topology of the network.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5286'/>
<seriesInfo name='DOI' value='10.17487/RFC5286'/>
</reference>



<reference anchor='RFC5714'>
<front>
<title>IP Fast Reroute Framework</title>
<author fullname='M. Shand' initials='M.' surname='Shand'><organization/></author>
<author fullname='S. Bryant' initials='S.' surname='Bryant'><organization/></author>
<date month='January' year='2010'/>
<abstract><t>This document provides a framework for the development of IP fast- reroute mechanisms that provide protection against link or router failure by invoking locally determined repair paths.  Unlike MPLS fast-reroute, the mechanisms are applicable to a network employing conventional IP routing and forwarding.  This document is not an  Internet Standards Track specification; it is published for informational  purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='5714'/>
<seriesInfo name='DOI' value='10.17487/RFC5714'/>
</reference>



<reference anchor='RFC8355'>
<front>
<title>Resiliency Use Cases in Source Packet Routing in Networking (SPRING) Networks</title>
<author fullname='C. Filsfils' initials='C.' role='editor' surname='Filsfils'><organization/></author>
<author fullname='S. Previdi' initials='S.' role='editor' surname='Previdi'><organization/></author>
<author fullname='B. Decraene' initials='B.' surname='Decraene'><organization/></author>
<author fullname='R. Shakir' initials='R.' surname='Shakir'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>This document identifies and describes the requirements for a set of use cases related to Segment Routing network resiliency on Source Packet Routing in Networking (SPRING) networks.</t></abstract>
</front>
<seriesInfo name='RFC' value='8355'/>
<seriesInfo name='DOI' value='10.17487/RFC8355'/>
</reference>



<reference anchor='RFC9375'>
<front>
<title>A YANG Data Model for Network and VPN Service Performance Monitoring</title>
<author fullname='B. Wu' initials='B.' role='editor' surname='Wu'><organization/></author>
<author fullname='Q. Wu' initials='Q.' role='editor' surname='Wu'><organization/></author>
<author fullname='M. Boucadair' initials='M.' role='editor' surname='Boucadair'><organization/></author>
<author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'><organization/></author>
<author fullname='B. Wen' initials='B.' surname='Wen'><organization/></author>
<date month='April' year='2023'/>
<abstract><t>The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be augmented to cover network and service topologies. This document defines a YANG module for performance monitoring (PM) of both underlay networks and overlay VPN services that can be used to monitor and manage network performance on the topology of both layers.</t></abstract>
</front>
<seriesInfo name='RFC' value='9375'/>
<seriesInfo name='DOI' value='10.17487/RFC9375'/>
</reference>



<reference anchor='RFC7799'>
<front>
<title>Active and Passive Metrics and Methods (with Hybrid Types In-Between)</title>
<author fullname='A. Morton' initials='A.' surname='Morton'><organization/></author>
<date month='May' year='2016'/>
<abstract><t>This memo provides clear definitions for Active and Passive performance assessment.  The construction of Metrics and Methods can be described as either &quot;Active&quot; or &quot;Passive&quot;.  Some methods may use a subset of both Active and Passive attributes, and we refer to these as &quot;Hybrid Methods&quot;.  This memo also describes multiple dimensions to help evaluate new methods as they emerge.</t></abstract>
</front>
<seriesInfo name='RFC' value='7799'/>
<seriesInfo name='DOI' value='10.17487/RFC7799'/>
</reference>



<reference anchor='RFC8641'>
<front>
<title>Subscription to YANG Notifications for Datastore Updates</title>
<author fullname='A. Clemm' initials='A.' surname='Clemm'><organization/></author>
<author fullname='E. Voit' initials='E.' surname='Voit'><organization/></author>
<date month='September' year='2019'/>
<abstract><t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore.  Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t></abstract>
</front>
<seriesInfo name='RFC' value='8641'/>
<seriesInfo name='DOI' value='10.17487/RFC8641'/>
</reference>



<reference anchor='RFC6459'>
<front>
<title>IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS)</title>
<author fullname='J. Korhonen' initials='J.' role='editor' surname='Korhonen'><organization/></author>
<author fullname='J. Soininen' initials='J.' surname='Soininen'><organization/></author>
<author fullname='B. Patil' initials='B.' surname='Patil'><organization/></author>
<author fullname='T. Savolainen' initials='T.' surname='Savolainen'><organization/></author>
<author fullname='G. Bajko' initials='G.' surname='Bajko'><organization/></author>
<author fullname='K. Iisakkila' initials='K.' surname='Iisakkila'><organization/></author>
<date month='January' year='2012'/>
<abstract><t>The use of cellular broadband for accessing the Internet and other data services via smartphones, tablets, and notebook/netbook computers has increased rapidly as a result of high-speed packet data networks such as HSPA, HSPA+, and now Long-Term Evolution (LTE) being deployed.  Operators that have deployed networks based on 3rd Generation Partnership Project (3GPP) network architectures are facing IPv4 address shortages at the Internet registries and are feeling pressure to migrate to IPv6.  This document describes the support for IPv6 in 3GPP network architectures.  This document is  not an Internet Standards Track specification; it is published for  informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6459'/>
<seriesInfo name='DOI' value='10.17487/RFC6459'/>
</reference>




    </references>


<?line 2256?>

<section anchor="open-issues"><name>Open Issues</name>

<t>The following issues should be resolved prior to the WGLC:</t>

<t><list style="numbers">
  <t>Assess which/whether some the material in the "5G Slice to IETF Network Slice Mapping" Section should be maintained in this draft or moved to <xref target="I-D.ietf-teas-5g-network-slice-application"/> (Adrian)
  <list style="symbols">
      <t>This issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/40.</t>
    </list></t>
  <t>Assess whether we need to mainatin the "First 5G Slice vs Subsequent Slices" Section:
  <list style="symbols">
      <t>Unless we explain how this ss important for realization, this section should be deleted (Med)</t>
      <t>The motivation of this section is not clear (from Reza)</t>
      <t>Need to describe the implications to the realization of IETF network slices (Jie)</t>
      <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/19</t>
    </list></t>
  <t>Clarify the use of inter-AS option B/C to model the AC between CE and PE (Jie)
  <list style="symbols">
      <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/52</t>
    </list></t>
  <t>Further discuss whether the TN slice in the customer site is covered or is out of the scope of IETF network slice (Jie)
  <list style="symbols">
      <t>The issue is tracked at https://github.com/boucadair/5g-slice-realization/issues/53</t>
    </list></t>
</list></t>

<t>Active issues can be tracked at: https://github.com/boucadair/5g-slice-realization/issues</t>

</section>
<section anchor="ext-abbr"><name>Acronyms and Abbreviations</name>

<t>3GPP: 3rd Generation Partnership Project</t>

<t>5GC: 5G Core</t>

<t>5QI: 5G QoS Indicator</t>

<t>A2A: Any-to-Any</t>

<t>AC: Attachment Circuit</t>

<t>AMF: Access and Mobility Management Function</t>

<t>AUSF: Authentication Server Function</t>

<t>BBU: Baseband Unit</t>

<t>BH: Backhaul</t>

<t>BS: Base Station</t>

<t>CE: Customer Edge</t>

<t>CIR: Committed Information Rate</t>

<t>CN: Core Network</t>

<t>CoS: Class of Service</t>

<t>CP: Control Plane</t>

<t>CSP: Communication Service Provider</t>

<t>CU: Centralized Unit</t>

<t>CU-CP: Centralized Unit Control Plane</t>

<t>CU-UP: Centralized Unit User Plane</t>

<t>DC: Data Center</t>

<t>DDoS: Distributed Denial of Services</t>

<t>DN: Data Network</t>

<t>DSCP: Differentiated Services Code Point</t>

<t>DU: Distributed Unit</t>

<t>eCPRI: enhanced Common Public Radio Interface</t>

<t>FH: Fronthaul</t>

<t>FIB: Forwarding Information Base</t>

<t>GPRS: Generic Packet Radio Service</t>

<t>gNB: gNodeB</t>

<t>GTP: GPRS Tunneling Protocol</t>

<t>GTP-U: GPRS Tunneling Protocol User plane</t>

<t>HW: Hardware</t>

<t>ID: Identifier</t>

<t>IGP: Interior Gateway Protocol</t>

<t>IP: Internet Protocol</t>

<t>L2VPN: Layer 2 Virtual Private Network</t>

<t>L3VPN: Layer 3 Virtual Private Network</t>

<t>LSP: Label Switched Path</t>

<t>MH: Midhaul</t>

<t>MIoT: Massive Internet of Things</t>

<t>MPLS: Multiprotocol Label Switching</t>

<t>NF: Network Function</t>

<t>NR: New Radio</t>

<t>NRF: Network Function Repository</t>

<t>NRP: Network Resource Partition</t>

<t>NSC: Network Slice Controller</t>

<t>PE: Provider Edge</t>

<t>PIR: Peak Information Rate</t>

<t>PLMN: Public Land Mobile Network</t>

<t>PSTN: Public Switched Telephony Network</t>

<t>QoS: Quality of Service</t>

<t>RAN: Radio Access Network</t>

<t>RF: Radio Frequency</t>

<t>RIB: Routing Information Base</t>

<t>RSVP: Resource Reservation Protocol</t>

<t>RU: Radio Unit</t>

<t>SD: Slice Differentiator</t>

<t>SDP: Service Demarcation Point</t>

<t>SLA: Service Level Agreement</t>

<t>SLO: Service Level Objective</t>

<t>SMF: Session Management Function</t>

<t>S-NSSAI: Single Network Slice Selection Assistance Information</t>

<t>SST: Slice/Service Type</t>

<t>SR: Segment Routing</t>

<t>SRv6: Segment Routing version 6</t>

<t>TC: Traffic Class</t>

<t>TE: Traffic Engineering</t>

<t>TN: Transport Network</t>

<t>TS: Technical Specification</t>

<t>UDM: Unified Data Management</t>

<t>UE: User Equipment</t>

<t>UP: User Plane</t>

<t>UPF: User Plane Function</t>

<t>URLLC: Ultra Reliable Low Latency Communication</t>

<t>VLAN: Virtual Local Area Network</t>

<t>VNF: Virtual Network Function</t>

<t>VPN: Virtual Private Network</t>

<t>VRF: Virtual Routing and Forwarding</t>

<t>VXLAN: Virtual Extensible Local Area Network</t>

</section>
<section anchor="sec-5g-intro"><name>An Overview of 5G Networking</name>

<t>This section provides a brief introduction to 5G mobile networking
   with a perspective on the Transport Network.  This section does not
   intend to replace or define 3GPP architecture, instead its objective is to provide an
   overview for readers that do not have a mobile background.  For
   more comprehensive information, refer to <xref target="TS-23.501"/>.</t>

<section anchor="key-building-blocks"><name>Key Building Blocks</name>

<t><xref target="TS-23.501"/> defines the Network Functions (UPF, AMF, etc.) that
   compose the 5G System (5GS) Architecture together with related
   interfaces (e.g., N1, N2).  This architecture has native Control
   and User Plane separation, and the Control Plane leverages a service-
   based architecture.  <xref target="_figure-28"/> outlines an example 5GS architecture
   with a subset of possible network functions and network interfaces.</t>

<figure title="5GS Architecture and Service-based Interfaces" anchor="_figure-28"><artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork></figure>

<t>Similar to previous versions of 3GPP mobile networks <xref target="RFC6459"/>, a 5G mobile network is split
   into the following four major domains (<xref target="_figure-29"/>):</t>

<t><list style="symbols">
  <t>UE, MS, MN, and Mobile:  <vspace blankLines='1'/>
The terms UE (User Equipment), MS (Mobile Station), MN (Mobile
Node), and mobile refer to the devices that are hosts with the
ability to obtain Internet connectivity via a 3GPP network.  An MS
is comprised of the Terminal Equipment (TE) and a Mobile Terminal
(MT).  The terms UE, MS, MN, and mobile are used interchangeably
within this document.</t>
  <t>Radio Access Network (RAN):  <vspace blankLines='1'/>
Provides wireless connectivity to the UE devices via radio.  It is
made up of the Antenna that transmits and receives signals to the
UE and the Base Station that digitizes the signal and converts the
RF data stream to IP packets.</t>
  <t>Core Network (CN):  <vspace blankLines='1'/>
Controls the CP of the RAN and provides connectivity to the Data
Network (e.g., the Internet or a private VPN).  The Core Network
hosts dozens of services such as authentication, phone registry,
charging, access to PSTN and handover.</t>
  <t>Transport Network (TN):  <vspace blankLines='1'/>
Provides connectivity between 5G Network Functions.  The TN may provide connectivity from the RAN to the Core
Network, as well as  within the RAN or within the CN.  The
traffic generated by NFs is - mostly - based on IP or Ethernet.</t>
</list></t>

<figure title="Building Blocks of 5G Architecture (A High-Level Representation)" anchor="_figure-29"><artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
                                               │
│             ┌────────────┐    ┌────────────┐
              │            │    │            │ │
│ ┌────┐      │            │    │            │     .───────.
  │ UE ├──────┤    RAN     │    │     CN     ├────(    DN   )
│ └────┘      │            │    │            │     `───────'
              │            │    │            │ │
│             └──────┬─────┘    └──────┬─────┘
                     │                 │       │
│                    │                 │
                     │                 │       │
│              ┌─────┴─────────────────┴────┐
               │                            │  │
│              │                            │
               │     Transport Network      │  │
│              │                            │
               │                            │  │
│              └────────────────────────────┘
                                               │
│                    5G System
                                               │
└ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork></figure>

</section>
<section anchor="core-network-cn"><name>Core Network (CN)</name>

<t>The 5G Core Network (5GC) is made up of a set of NFs which fall into two main categories (<xref target="_figure-30"/>):</t>

<t><list style="symbols">
  <t>5GC User Plane:  <vspace blankLines='1'/>
The User Plane Function (UPF) is the interconnect
point between the mobile infrastructure and the Data Network (DN).
It interfaces with the RAN via the N3 interface by encapsulating/
decapsulating the User Plane Traffic in GTP Tunnels (aka GTP-U or
Mobile User Plane).</t>
  <t>5GC Control Plane:  <vspace blankLines='1'/>
The 5G Control Plane is made up of a
comprehensive set of Network Functions.  An exhaustive list and
description of these entities is out of the scope of this
document.  The following NFs and interfaces are worth mentioning,
since their connectivity may rely on the Transport Network:  <list style="symbols">
      <t>the AMF (Access and Mobility Function) connects with the RAN
control plane over the N2 interface</t>
      <t>the SMF controls the 5GC UPF via the N4 interface</t>
    </list></t>
</list></t>

<figure title="5G Core Network (CN)" anchor="_figure-30"><artwork align="center"><![CDATA[
  ┌ ─ ─ ─ ─ ┐    ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
      RAN               5G Core (5GC)
  │         │    │                         │
  │         │    │ [AUSF] [NRF] [UDM] etc. │
  │         │    │     (Service Based)     │
                       ( Architecture)
  │         │    │                         │
              N2     ┌─────┐ N11 ┌─────┐
  │    CP ───────────┤ AMF ├─────┤ SMF │   │
                     └─────┘     └──┬──┘
  │         │    │                  │      │
                                    │         Control Plane
═══════════════════════════════════════════════════════════
                                    │         User Plane
  │         │    │                  │ N4   │
              N3                 ┌──┴──┐     N6  .───────.
  │    UP ───────────────────────┤ UPF ├───────▶(   DN    )
                                 └─────┘         `───────'
  │         │    │                         │
   ─ ─ ─ ─ ─      ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
]]></artwork></figure>

</section>
<section anchor="radio-access-network-ran"><name>Radio Access Network (RAN)</name>

<t>The RAN connects cellular wireless devices to
   a mobile Core Network.  The RAN is made up of three components,
   which form the Radio Base Station:</t>

<t><list style="symbols">
  <t>The Baseband Unit (BBU) provides the interface between the Core
Network and the Radio Network.  It connects to the Radio Unit and
is responsible for the baseband signal processing to packet.</t>
  <t>The Radio Unit (RU) is located close to the Antenna and controlled
by the BBU.  It converts the Baseband signal received from the BBU
to a Radio frequency signal.</t>
  <t>The Antenna converts the electric signal received from the RU to
radio waves</t>
</list></t>

<t>The 5G RAN Base Station is called a gNodeB (gNB).  It connects to the
   Core Network via the N3 (User Plane) and N2 (Control Plane)
   interfaces.</t>

<t>The 5G RAN architecture supports RAN disaggregation in various ways.
   Notably, the BBU can be split into a DU (Distributed Unit) for
   digital signal processing and a CU (Centralized Unit) for RAN Layer 3
   processing.  Furthermore, the CU can be itself split into Control
   Plane (CU-CP) and User Plane (CU-UP).</t>

<t><xref target="_figure-31"/> depicts a disaggregated RAN with NFs and interfaces.</t>

<figure title="RAN Disaggregation" anchor="_figure-31"><artwork align="center"><![CDATA[
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │                                 │ N3
┌────┐  NR  │                                 ├────┤  5G Core  │
│ UE ├──────┤             gNodeB              │
└────┘      │                                 ├────┤   (5GC)   │
            │                                 │ N2
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
                            │ │
                            │ │
                            │ │
                           ─┘ └─
                           ╲   ╱
                            ╲ ╱
                             V
            ┌─────────────────────────────────┐    ┌ ─ ─ ─ ─ ─ ┐
            │           ┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐ │
            │                                 │    │           │
┌────┐  NR  │ ┌────┐ F2 │┌────┐ F1-U ┌─────┐│ │ N3    ┌─────┐
│ UE ├────────┤ RU ├─────┤ DU ├──────┤CU-UP├──────────┤ UPF │  │
└────┘      │ └────┘    │└────┘      └──┬──┘│ │       └─────┘
            │                 ╲         │     │    │           │
            │           │      ╲        │   │ │
            │                   ╲       │     │    │           │
            │           │        ╲      │E1 │ │
            │                F1-C ╲     │     │    │           │
            │           │          ╲    │   │ │
            │                       ╲   │     │    │           │
            │           │            ╲  │   │ │
            │                        ┌──┴──┐  │ N2 │  ┌─────┐  │
            │           │            │CU-CP├──────────┤ AMF │
            │                        └─────┘  │    │  └─────┘  │
            │           │                   │ │
            │                 BBU split       │    │  5G Core  │
            │           └ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘ │
            │                                 │    │   (5GC)   │
            │       disaggregated gNodeB      │
            └─────────────────────────────────┘    └ ─ ─ ─ ─ ─ ┘
]]></artwork></figure>

</section>
<section anchor="transport-network-tn"><name>Transport Network (TN)</name>

<t>The 5G transport architecture defines three main segments for the
   Transport Network, which are commonly referred to as Fronthaul (FH),
   Midhaul (MH), and Backhaul (BH) <xref target="TR-GSTR-TN5G"/>:</t>

<t><list style="symbols">
  <t>Fronthaul happens before the BBU processing.  In 5G, this
interface is based on eCPRI (Enhanced CPRI) with native Ethernet
or IP encapsulation.</t>
  <t>Midhaul is optional: this segment is introduced in the BBU split
presented in Appendix B.3, where Midhaul network refers to the DU-
CU interconnection (i.e., F1 interface).  At this level, all
traffic is encapsulated in IP (signaling and user plane).</t>
  <t>Backhaul happens after BBU processing.  Therefore, it maps to the
interconnection between the RAN and the Core Network.  All traffic
is also encapsulated in IP.</t>
</list></t>

<t><xref target="_figure-32"/> illustrates the different segments of the Transport Network
   with the relevant Network Functions.</t>

<figure title="5G Transport Segments" anchor="_figure-32"><artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┐
│                         Transport Network               │
│                                                         │
    TN Segment 1  TN Segment 2  TN Segment 3
│    (Fronthaul)   (Midhaul)     (Backhaul)               │
   ┌───────────┐ ┌────────────┐ ┌───────────┐
│  │           │ │            │ │           │             │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐       ┌──┴──┐     .───.
 │ RU │      │ DU │         │ CU │       │ UPF ├────( DN  )
 └────┘      └────┘         └────┘       └─────┘     `───'
]]></artwork></figure>

<t>It is worth mentioning that a given part of the transport network can
   carry several 5G transport segments concurrently, as outlined in
   <xref target="_figure-33"/>.  This is because different types of 5G network functions
   might be placed in the same location (e.g., the UPF from one slice
   might be placed in the same location as the CU-UP from another
   slice).</t>

<figure title="Concurrent 5G Transport Segments" anchor="_figure-33"><artwork align="center"><![CDATA[
┌ ─ ─ ─ ─ ┐
 ┌────┐     Colocated
││RU-1│   │ RU/DU
 └─┬──┘
│  │ FH-1 │
 ┌─┴──┐
││DU-1│   │  ┌────┐         ┌─────┐         .───.
 └─┬──┘      │CU-1│         │UPF-1├────────( DN  )
└ ─│─ ─ ─ ┘  └─┬─┬┘         └─┬───┘         `───'
┌ ─│─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─ ┼ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─
   │    MH-1   │ │    BH-1    │          Transport Network │
│  └───────────┘ └────────────┘
   ┌───────────┐ ┌────────────┐ ┌───────────┐              │
│  │    FH-2   │ │    MH-2    │ │    BH-2   │
 ─ ┼ ─ ─ ─ ─ ─ ┼ ┼ ─ ─ ─ ─ ─ ─│─│─ ─ ─ ─ ─ ─│─ ─ ─ ─ ─ ─ ─ ┘
 ┌─┴──┐      ┌─┴─┴┐         ┌─┴─┴┐        ┌─┴───┐     .───.
 │RU-2│      │DU-2│         │CU-2│        │UPF-2├────( DN  )
 └────┘      └────┘         └────┘        └─────┘     `───'
]]></artwork></figure>

</section>
</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank Adrian Farrel, Joel Halpern, Tarek
   Saad, and Jie Dong for their reviews of this document and for providing valuable
   comments.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact fullname="John Drake">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
          <city>Sunnyvale</city>
          <country>United States of America</country>
        </postal>
        <email>jdrake@juniper.net</email>
      </address>
    </contact>
    <contact fullname="Ivan Bykov">
      <organization>Ribbon Communications</organization>
      <address>
        <postal>
          <city>Tel Aviv</city>
          <country>Israel</country>
        </postal>
        <email>ivan.bykov@rbbn.com</email>
      </address>
    </contact>
    <contact fullname="Reza Rokui">
      <organization>Ciena</organization>
      <address>
        <postal>
          <city>Ottawa</city>
          <country>Canada</country>
        </postal>
        <email>rrokui@ciena.com</email>
      </address>
    </contact>
    <contact fullname="Luay Jalil">
      <organization>Verizon</organization>
      <address>
        <postal>
          <city>Dallas, TX</city>
          <country>United States of America</country>
        </postal>
        <email>luay.jalil@verizon.com</email>
      </address>
    </contact>
    <contact fullname="Beny Dwi Setyawan">
      <organization>XL Axiata</organization>
      <address>
        <postal>
          <city>Jakarta</city>
          <country>Indonesia</country>
        </postal>
        <email>benyds@xl.co.id</email>
      </address>
    </contact>
    <contact fullname="Amit Dhamija">
      <organization>Rakuten</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <country>India</country>
        </postal>
        <email>amit.dhamija@rakuten.com</email>
      </address>
    </contact>
    <contact fullname="Mojdeh Amani">
      <organization>British Telecom</organization>
      <address>
        <postal>
          <city>London</city>
          <country>United Kingdom</country>
        </postal>
        <email>mojdeh.amani@bt.com</email>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA+y9XXMbV5Io+M5fUVf9IKAHAEXSst2c9XRTFKnmjETBomT3
xMbGRBEokmUBVZgqgBTt0IZHftiHvhGtjnHbujvdETOxjn25/TITHX0fdvbP
6Jdsfp6P+gAKICm77xpBWySqzjl58uTJk5knP7rd7to0no6i7eDWThA8icJR
/Hk4jdMkSE+Cg72n+8FhNL1Is+fB0SgeRHlwkmbB3Qf6bR48y+PkNNidZVmU
TIOD/nrwqP/wKHgaDc6SdJSexlF+ay08Ps6icxjjYDwZRWN4ExtBN0+zMMkn
aTaV7m+tDcJpdJpml9tBnJyka2vDdJCEY4BvmIUn026ejYbdaRTm3bun3Rza
QEfdOz9by2fH4zjPAfDp5QTeRtDXktn4OMq214bQ5/baIE3yKMln+XYwzWbR
GsCztRZmUQhwPUlnCNKtNZzUaZbOJvDl072do1trz6NL+HK4vRZ0g4dbn/QP
6ZdN+YXADo6i7Bz+XVsLZ9OzFEaER2tBEJzMRiOG/u+yzy/zz6eA1Ae94Ojz
MHueXsSDz/GlLEX0R8N4mmb4d5qdhomswnbwt7MknkSZQTi+MYingJ9P4yih
v9JZMkWE7czyaRaH+F00DuPRdvA8NyP94jPuqJdE0zJ4T+LBWZgNgycpIGya
XwWsJ1GSRLkH2D6sMmDHwpVlPM58oP52NorDJHg4G0TPl4HgYZoMUx81z5J4
Gg2Dv4M1HqZjB5LPRth7FRwOII/SM/h3GNxLZ4NwGMaEjxKCCvA9hkmf0qSr
EKHjj7nr3rF2/YuU2vUGAGYJIw9ncR486gW7QOZZlIV5GS1Po1F0kibxgOgA
CCKKprAogJIwGEbBKITG4xk+H8D7nSBfTyzmHoXDLB56mDuahHHiIGwEIIzj
01k0AhAFivEsi0ej9BdTMzaBD43gwTb8czadTrbX10dj0wRfWF9bW6Mv4uPZ
tHLX/G16lgT3s/B5tMz6H82S5PI8HEVVJHA0BWaQI3fbGUeZoEmJYYhDzSfK
g3MgyXuXz9PzMkhP4uNj4JyAYMYwfuvABUsT7JzH5x5YB3kWRiMHiBgG6B3j
AL/Ijo+TakKAXfZ5CKv6fBaXwdgFxhDaYR9Pp+FF6A26GyZAbP6GhK5+McCW
daQXXgZ/C8fDqDzgJ4DIz1OHju6Ho1GYd4Knv1p2CUYwTO8zHOYX59xrNTj3
ouQyuH8RA+udXsL0kjJUv3oY7LyIw6mDir8Nn4fZ1MfFATKLKPf45jH0Psx/
8QJpvAcbojT8zjieBvdh68afhRV0ED6fTSMHH/dgS4ejNIuKI3ujQm/T3pA7
/UXGfVTP/lH62TA6Ayhg0PLw97J4GudnxApkHy7PGMc0RC/EIX5xPGU4kjQb
wyDncJqu4fFs/oJ2dx9076Xpc/rd+ah0AYf9o/Q4HkVmwwIWg6PLfBqN82Bn
MsnScHB2q9Baz9Og8OmWvvFoNcyyy6AfTaMs5/ku0fjx6exzZCHh5ZIN72Vw
lADpn8dR4T2SP4LNO5ubReSE2SmyZ+SPOTDIu6e9nDESCkJ6sLTAJ+Hdp0+6
D47gf08P7z6oQzJJXbChRsAfSKoyLZoiFoYDwnz6rPu0cg4/C/aj42wWAno3
72x8uGA6FxcXvXg668XJdH04zv9hMjteh7+70/V0crw+nU3Xn3afPnva/eXj
R3td7K/bv7/f3etNhic85aPu5lbv7p2N2vkeBfKCUFIQZoMzoOjBdJZFJKtO
zyIUNOVx6+6Do3YRF2Z5NpZB0taDfn/B/HEJwlFv63QyoXUcRvnzaToZp8PZ
KMrXjybRID7Rc8L/8340hW2Y98J88uLnufvkYPjR1sZ77xkEfdi7u3VnAYLg
BTjbk/CUZO8gTIYwh8FZBOIB9fnXKFEMoskUePYsj4JBmAODxtey6B9ncUbN
8hLiavBThx6D563vC2+bH2wR3h53n+wc9j598LPer/pHOztHdegrvcctA/gm
+NVZOBsF/XDwPALt5SKeAj6HwY5Df4zBo3Q0I0DxmEQFJbiz1btzZxlc8qA7
IxSHBzXM5QN3Zy5kNLgz0y5ImoRfD085YejwQW9jY8sFR3EiT2BTHYEAAocV
aHIPZvEwGsVwjJpJvtfzplgxPZrag6NHO86XMpkPgVovizuyag6n+ZjklfUk
usizFH65mHRRpgR6XZ9NRmk4zNfXGeTuOcDEvKXb7QbhMVL/YLrGh1cgymQA
EnYYnEQhcZDpWTgNLsIclNFpBuQ3gCU+viSmsgXq0oMoiXgHYSd9kC3g7/ws
ngT9LP0MqCBo4T5oQ3M4UOn0S+T06wVPz2AoHWiQgriTKxCkfzk7jzgZyFTa
CRzVIJXDZo2TwWg2RLARpCfhME6DnQEo0iR2qureAvJpd2CPZ5H9bhe/QgK1
Orh59vSw3WMGgzCCCj4jvgH7cADCOhJ2cBzm8aDCQgBwWxsC7FiWbWH+B/11
sgwoAgLYMmeIaugdhMGEZlCGBc7XE1AuBCnOOsEqJ4Dh+BxEGw9ZgtkSHPDN
DNkaSDSXwfEsHhHejkfpAIAZsAFjdAn9jsdpAr/Ay0OBPWf9PoAz+RwoPbOr
yLQ0jodDUDfW1n4SgFTHlEJUge2/+OK/HHTv9+JoesKWC/pNeiAbRpS/fAnI
PaENBBjJQJ7gybNmKe9aEmVkEZ2/mKIgbZCK85oC6Pga2UBw4zi2mB6uacTr
VuzWjmuoPceBWGCk8wHHCs3aPInydJYBXpDyY8J06/BJH+jq4iwenOFWyuPx
BHApIvdoFA3UuJRJY9hbQzQIncSwt2RmswSQPAIWICAy1EZ8HsEmjILxbDSN
JyOP4vJqsxXSOW2IJ32dSY5AQpdBBFKWTyzx6dkUB0gn03gcfw5giSCBXQzj
k5OIbF1F9JmDc8HWSa6yazqytmGA/6A0DVPCXVzYTaIvyNZptm8M1E3gC0YR
cCyQKBZtKF4zZ08t2lDw/k5wnMXRCYKNfBEk6gskJnmbevjiizwaoBGQaBX2
D64RQAmd5bdxkudRAtrsIOoRwfMTABXnDAsYTFPowgiY0B6af/GFKDHS3Vg0
tiELFXBkpLMpSTZm8V15E4H/SXAf93EsJykObWiAuA+SN+gloPPwhpfJNGER
PVB2I5k4TKILNBWfJgKrwxBmnhE3T8cR/gsv5DI0wLmTBPBmlCA2R3HOG5us
tLFsJF2qqUfHpVWAXrrYEMAj9mdtw0Q5xIcAqlM+JrFNiccDnn7yk+BokE4U
0Ipz4Iuf4LRzfOnl2lpp9QUo2l6GZFKiIF2qAoVul47Mq52XRGblZ7FdaBUc
kH5CpoRbE+CcQT6bYJvS7sQ9DQjDQY+huyhKgt1D+hPlQWya3wpaR8JTN3C+
TNOkE7x8iYf4Dowf58AUZDn17fd67/XKLToWwjHqC7TmrJICDQB6kxR4GXCM
AR+ViP1R9YptBzGRC5rdcYvD8CGebkmadO0A8C13D6D+TXAbcWheINywhAMj
P5UZM6KdHlwYDRkgSC6Djnx5CnY/bxhgUgB1QnRR6i5nckzzAlDAhaPeaY/n
zWDpGuZNV1AXsHfbrmD1mrTX1g4SmBnIqjCPjo6KrAxXYxxOlPkDj01HOOLA
14NxPGdyLD32ggNanxNEDIs+eUQLHg07NN9ZEqOJp+O0JyK2RyCe21OSKvaB
BUUvQrze6QD4J/Fpd4OEmkk8mOaOzLA/SwYiKeyjXJxPUadhQZv2Cgjtl0yq
sJWj4WmESkEYDBCwLGjd320riuEtWEfoej+AHR1OpVXQnx3Dige7o3Q2DICf
wVefAlGAbhZZOFqfwh4PWriOHbqy6n7SP9RzCXbzgXA+MylB+wCgAtkgx6UM
id2oIoGTyqIJEJTcbyH8ybA7Tbvwj08XID0DtLMJib0ZcHXYo9BmoIsD3On+
bicAGBn77pR6cDzyEax8v8x1uH88AFw1XztHRDsKjTlN8WU8ZkgI4CEmcF7E
vGGYjdGhCNQIGmMeAc2wEDVVmbJwWxhOQPqDrf2/w4dVubdf/9e3X3/5Tn5e
r3nDvTKaJJ5R+8Tl8dQHxq4P4CW/8Sv839fvCuA3NKQO3OwjDb75z8YNvvnP
NQcrrwlH8N+XV/rPRfRr6P/V4f7br39vH+OnTKZmDvjmd9jk1ZqDb8LH19cB
m+3SMSgUsVz4mzHroK2IxiJWfXL78j6yrV1iWxbZ/ILyG2cF4Ffe5D71lRab
/rsXDp4fp7AZhUJfCbPzyMffaa8LfwZC7fDln8w3Tqs/aZPCU7d/d2O8Kfyp
/cOXfzTfOK3+qE0KT6V/l5ya/b5gLi46nVG+roJ/zu8LZlQ1ygrs402TZm8W
dP6Gue4X28FP6DhmC95Ht0D03+NDDUWN8qa8j5dGkzQnHeYWSBKshYBScZp8
dIvP4VsvWbdBdSK4VerjFp4wpEDgEQVnWzg+jk9nfAiRsOLI5XIGH/Q7IBGh
NbXLpxc0vQgzkszOc5J48STcRVF7F105RGrhk7kwBp47cUTHVnmCqpecg9yy
xwc0/FOlubRUz5iCmtXG8/4iGrG8W5Kn4Mh+gsf1rhzZICvIgx7pN1X9o80P
1PV6EFnrofHXXIueKvNnJFJbgWwchYljIWIpmW2GCNNUB8K+oKPREA1Cv0Q1
uWOkiTx8TpTBZzxhU+wLqP2C4POc7I0pikHRi7NwluMdYIfFpVxEWauP4VCs
zbMNZKKKKY6VHn9GMhFfB1dgSAw3tRjaJrT8tKIpP4HPQa0GFhKhZGE6OBM5
Bo1keH2m5oj1iVq24G0004IISfIxS9x4STfJQGOOgODTEdFex7Fs0UWLsSJN
0wla4S4RdyhowpoEk1k2Qf0CcK82EfWAwu9Ab5uC/p7lvkpAOlAeuSPhdVeW
jkVM7SgtCg6K0nfONGptbZdMNSdZCMLijNSGnqAWCLmIUmfr88PI7viSyWCa
SitjeAlFJYvrjL68cQyRoKEJtt3dB9KRq9z0XJgMORFnM3AjbDAsL1HUkQbA
K2DgaQSkC5iGZUzx3vzzKngsnnGTsD2mp1yUSDefkRXRWQ696zie4eYEhI/i
5DksLvA40ABozOgclAhxPQOFQ+7TYXfcAwYI8unBvTYt077lhOW39uEtRYIz
ZbMBz0OY2Qz3wCkoGgzsGXwH73hWWNVPdXaeRueq0zoFowpBb7y3cJG4OZop
Z/DnpaqmBtmgScZJPJ6NUbXgtxkXaIaNQREHqKGlUIgMAT2JgjeMhjH/VgSn
R1bonC3UpzGiVl9BVRmtszgLRF+UkYUaD0D4KsvNQyAPIOvC3JEQsyFTbg6Y
z08uSd8cgXZ3CmwlIlye2iswXDK9UjO72jU/dBRnsF52AYxh2zWwIVTHcCrS
ZWMLbZLxEH8XW5RFR7OupDX1pN2K6cosq2F5OC1SHSPgWUY3Z/uITM/dfWho
yCLnMEonzDhx66nfJ8LJJOLowNLHNE1HiBvcSsCdP4kzNGWaDVLYCWo6yIPW
J0/287Z0ghtUuXgewVyEKX+MVlGYHZCHeGsGrY/TozYRH+z4E5iNdLHnLGvr
6R7urv8VLdgA/v+2HfwvfxO0fv7zn+Oxm4UX+M4FYfssGk0CeNCm077MQ55E
hBZ0ESG7rZztjiEXzZooqU2TbkiauDGfTMmCre35dStfkaY+0kvAOcYAR2aB
zRePyUEmaO3KIUMCUV8s8m1Pa7+Wz1pgRnoM8+sVHuvIVQ+LDRmq+3xMVH/m
PXSfXecEm2jS/Fle5369REuek0FaUFAmDaYLerj5FFqumdZHcOx6b9ZbKuyT
qtZr3psFk9Brt23x2dyGTR7pjHwjiAMo/7OzKyqi811hbvoYX9U/DvcL764F
zlisVZuFIs19D377PVuegsKz/l7FwPxlxbLDt63dvbbXwswVFMXvPH24OF93
QgvmO/dd1XnZnMPPC1rqG7eX4jNv2NqH89oZivVNSYXPUpTrzW/xXn1j2i9p
qWrc7s218mUe9FsXn01/SsfN0n188+cagK5lbp4NRE5WtYQUj+Rty/iQVbEk
V2SWCywiFUounTVkU0no8ik/Sy8Strr7xz1pDWsKw/badoDXtHjHcmkuSPi+
Ko+PR+zfSGe6ikeOtV+kAd++4Xvg4i3PNDwGIR2UxVysK2it8LFAcBhNVISI
XMRPlAhzV/s2Gibb18Vkg7P1e+0FjxPUiAt6v9OczUKnhyDd3Atap4f3QFaD
N+lWtnX3wW4bZWAXrkuBLQiHQxJgQQQEcTMayaWf9EiqNypkGQiW9EvO3ns5
yYKf9HeDByDzXoSXedtc4PnQ4xWM94UqKlGMCgXq9WeXOcmg6LgVnIsoS1oM
AObrjkWiQ0HazgsU03M0MGhbmEc/jRO6se/TZROKsv0U3W7u7xJOcAqlm7CO
2hhQ5jtLc1QaZHbGCwMtDqkOpKoLqwePvYskvaY/1C4Kc8giMr/RBRdo+xFB
K9fFIwSAHNpm0IT7EzOIWaMyOYg2oI4NB56pAi8TPzmAue8lZ6gTDClCBrad
I+OgF0J2EiKydg/x3f3wOAPksF9sxovvXR3u9A9yUY6G5AFi3ShgI6IxTNCQ
W9cFx/ABG0l5h7+Vi1s4Rsj0epCC6fyNggA4S6TrIHvQ7MeSM40DgLmUp71s
XiSPlHJD0tgcoEoQfQoUmucwywprD/KpqQux4wlhNJGDPmIbr0FcdrOHt70o
wjCYw4jUNOrRmDNUt/OuU+U6v4QAQl1lC7zZRVMK0gp0/zC8hGabiNB1AIz/
3CL8kuKbpOM4IT0b9vnOdBoOzmi2u3E2mMXTwn7ey9VtgW6MLecX6mbGo3yH
CO8kzoDjjEY5W3zCUZ5WscWgFfeiXoeulkWhZv4pFjPVnfHaKcPdAhBjiAdg
9RnyhzjnaCvz9f1nrAE/g80e9EdhEjljPevvt9u9gifbKfm8Yteslw6NvxOb
XkCeJZsPPosdX0h86o7PWJKb56F9QI5Ehm6ZJPoFknCcERzq1SOy4B6wuycG
Du8CXqxdBC9hHOVq9P0dnMXRORomyM8OL9nwlFVfw6q1n48f6NZBUSPU9Oeh
pgxB0NrZJfxUUTt5GABeQmpG2x1mTIjp79E5tleBMwAaHSdKs9+FzQ+MDBQe
NKmqX+ll19iDyHRGLj9wwCSDSzthaEOOHOxXgNbjmBvrrvjii58/2d/92caH
my9fogup4TEMv44KnYPUNMuYkYTB2y9/fxzBmZm9/fIP6nhq3DDyoonbJQJ/
18Lc6Oj95CEKQ4jS0lDmUI/tWcJjt+mcT4LH5+y3+smvoJdg75ODqo6A+RkH
V20PC7v2N+h0YkyNz6NowhZLaimutGgsRUdKXBnAB5kayRG0e5aOZVfhLAwG
omEPOv5leoHump0CszYuXdELZldMmWhYm8bmpHeXv2bjJHJ3NFGBRNggLx0K
NEx+RF7kQQJPEpoFUCFazH4SFLYAi457YiZzdwEK2u4sjF+l46Q8LHAakuT3
DAdWj6ut3nu9Lfa4QuJ77/3330O3Od7SGoNF9JyO4iGfuQWOt7u33t9bh7Vw
2A9T/9QSv++GY41vzJlcANGIjMGFKCTwXcaIL62MQIhvVogDjn+PWrdl27lH
eS4CjL2a9HlyHRvRQ5P9gJn1KlWT75zSCHPo3PioK9TqdMbzDU70kIlzd62I
u0T2dprPM/uGtGB7qOfmGia+HJUmxlOaovaNId7IIGGBSPigpod4jvHhHLRE
NJBzWc5u/XqrHbQGdA0Tx22r0t0V50ufolfFbS1yKzxR5xKGCLP9xuj3UcQH
JA4MPPeRHMGAN8Es8N/CzYlzNiNZk+bhLEUuK+SSP/Nv5BjHKewd56D3BDyD
9DLWaYpjCx1qZiRO4T1S4DjlqJaH8hIb2u09ieKgFZ+3mT3oAD1Hfu46w6D6
yUwOWRxOyeWc5h63V2TFLNCgWzV6kYpCUSHJWwhqbgXkXE1PI1JBifVEzvlW
wxHVzL/IrFz9WWyMfk3GHMegPNe3zch9ZLvRV0nDnmsJtuDoU+MI5Ni4fY8u
a9X8/Qp2L/r5zunGsTkVLbBi4y1iB1hz2YJbtvl+b3DPscyW3/ljxTsE9wI7
ZrlTadrkhsP5ACMo3bBVfH74dD7nI+8VKfrt1795+/U/LfPzz/NGcXH16u3X
X5V33pfWk9H9Ct+tQFxpR/ozQvi/MthSD8dA6Pura6Zvfyzckv/pbD5+apd1
Z7e80N/V7lDt+8nTJ2YeR5/e5DzK3n8VnoNvqtelyc79lgnGEWOUgv5lAe1Y
SOVXYIFzPuXN8i55B3APYB++IFw9m//peEflS8UvV2IvxdNk4elNm6SCW9Qx
mus9FWHs7x4lp0P1bbYXnl9Vzabxmf6Ve8frbGy9xb2ZmdhuFs5k4SlPPVZw
izpG05yuFrCXtbnboNh9f8//5p1yjwL76Fewj1UvNf/n5DrLM5WS2LJyF+oc
QNvhoK8XQeYrZ4SmHImbmrl9VXqpMvyisVDwu1/jnr6/W9rTMpY7owZhGZ6Q
43IsHOdV8EBkFtPKiDyFWS4fpLHkjM1c62e8fAhHxRo34m6F2X9rqGqheDSP
08nLPq+bIyzV8LrKbdfgsyYBVn6wUu3Yi4KxqtxS0ISyiDnWc0exAtfCP396
9e08v5C7d9QlhDK64K0wWVPO86JUyFaTOT4gB3gJdyzRKRoOkZcuhztOIgDT
Ldm9jFsnGcBMnge2PrpGHDEGivW8fC3El+x07d3dOQoeizfuvfVdhhLzAlC+
ig4b862FuPo2VbOK+B0G9yiGko1oTkIDE5V+B+f+X9C4voXGdWsTR6dreETp
LaCLoyfn7/MN0QSvIfNqU3BuL4Jcmx1Zx2ZZ1L27IdERxoJqLMToJVywj2kA
O41o85Bkjhcyeh9HwVPKPYQ+LU/lhpa/v09hu6ezOCc/8taT+3m7E5yFk0mU
mKQ2fAEZ55xaSFKmsD/EyYwCbACxdNGNlnkPbr7MmV5O0GA8urR31tCILhaZ
BILDdIoTwosbdI7uVHsMG9O378zB7guTLDrHLBfbAjNCWzC/elcQerng3OrX
LGUhAQ3AGlk3ATS6j6JpJDeCnnsJdC/uJZX0iCZXRjUObiKoxa1nmzcc4jwh
N3+XmApmbbkVQpfgInnvMi53ZtM0SccYSCGp5O7xTd0TuQ/YObr3xNwRRGOc
I9rLa0An6gOCLFApBieUjO7tvxgT7ZzP6uontvrlUeGbJqpBSxlU2/myZtRK
38dH/e69B/3i9+yuuNhZkt5bWgkOmhjMfNjNPxRVzJtRnJedV+pwV6/KVv03
30BdL5H/P3P/rBLw50MPohjsnl9tl5D3lftHU+P0f+8G2TTY2Nzahv8q++Iv
FiuG0Aj6GgYbP/uwd3ejt3HnTm9je6PcV/FTFClX+llgk/NEHj4rVerxGHdZ
kpjr8spxfyRJELPFqzY6eTK+7TeOLBt3jtHHFTik/j3gpEF497+bdu2N4tra
DjBG93YN/e2s4xsdSCQeVZ5Kym1tEg8ErjPnFl2D1c7C88gIBe6ZItd0Prd2
Y2j4APFGqHDWxefoGGL8R7yregNOTctPvZZByyb/yzhEat0JmZ6kGAgY5W0J
l8aO1Sn4VIRcujIkJ1oP2RhUTNi1Thgnxg9TkJzRYicpBoiBFIYMx968Q5cj
jBY+PUMvHjymNQmQPfehAeB2OjhDoOhG3IhNNMfERA/KGcpLUPCGVOdH6VGd
U0SCUYIgF5OKEK4EwxElOxKJHUIuFAE3mI3CLPgrdCam0M11IGo+t22ePBPu
VZCoHmsGKnZeobwqQui+QzYnV/MbuylEZYNpVLWTly8MTkfpcTjyswVWOJuw
b4STiMYMK6GZn6fpGKduEiyhJxInp7QJAavdWpyAskGaIuHxmCppGU/3feI4
wXu9DyoSHPVIH7HSKqVmEx7FKWk65Sn46eksBgEHLXx89LhdtY98D/kKrOSu
w2+ukij32MztV/PNud4p5FNQsQT5JEzyYt4A0HxA9EZdJDXqlE1+Jjm6rHM9
a40J767IzjjWeEcT8u6kAGYh1uU+sPy0o2UCJSKy7+STEab2SlBPvEhR3e2a
xEIJ8UgMUU6UwipVkbgi/nF7be2n5di0xxWOLNsldbNJ/ryOz2XFR53yG1Sl
PNw17upB6/Bot02uaxJg4MVaVKc+qhH9e8Wt5WRYkt4Lrs2uwnr08DEQ6LPR
NB7DuJr8QqnTng28tRP4etewBWez1tR2sWlDyfedQzyMzyYyhp8Wwh6qF2da
FS/gRmIIOc0NGsC49YgJ2IsckKPW997vBHviDl1B4xjUcfCoXbMxHfZq3CHj
5DwdnUc1Tlbe1NAjV+PuI28KNhybDr0Beahxv0Z2MdSBqDaSg5M6hAOrYQnJ
ncqMQ0d0llJOS2ZD5E9ZTcjGuiDx7W52lErtFD1Me8EjdNNUPhhm5WDyBJPP
Cu4WRgs3y/tVoRC5InJd168C3QMLlNd5nRS0hfLvJRWiYdcGqMVK6zvohPJW
Ld3J8mnbXq8yyCs+qPQ4CRx3kPndNIPvuwJbeiv53v5zybk1o+NSDi/8y4uK
Wzw/eVjR1bJppd6sNlDtmw27efv1b+C/f1rmP1qVZVr8czX8wC395V4N/q/s
s2X3wFJ0ZQP8v5q7HuVcf6Vv/C+q5rTCfm7IwVfquXrGZJvy5I23HHTOh9yR
jdAvvVU/71dVPKCwS2veqoOy8uSY8/OmaveW21a+Nufnj3I+Vcz724B3yqug
0Y763a+bvWfe/Zc6iq3ebHVb0F34v5SuKjNv1uXj1O+1KzbOGxfEwn9eOoua
dxq9/9bmi1jE4D3zfg0q3kqChUo2E1hG+SfL2qzhv87A7aRv1EYW46VcHVWm
9Fqjt/ulvoR5OqwN/42d1VvKXfrtbxz8fVdhIX/7zb/Wp+eAZ+6r3/7Gz8uB
8ylkpqjzw1o4nwWNSxcl7iqZvJVeq2KXvvHc7694c9TwY1q4EOoVkjtCFamW
n2vL+S5fbg+LdtLit6+egKOmAyAeGKGsxslyAGk17mpZWIBQlzlv7I/qpau1
lh/Yctc5o+JtR+ok/tirMMX55z0ZUJ4ezrn5+Elllq+jyLGT+2r4gRtXubZ2
T2/Nq+xjHY1nLEcsH+7nmm1iGJmQNbbGUSpxCgTHKric608A6kkMk7VCFiKJ
bN42bUL2OF+02g72OMOFdRa5SAkkJwM7JxEdF+w7JrXD/kb3cH+TImbjqe2I
8rhLwLb7LnBOsZmpmUYz3x9rvOk0iNmgBD1IhJrbx1Z72+QpoGsquS1wQyJl
cLktWGgpQntvRjkGxTXCsUj7hET3TCmazWO60SjZvQrv//DMWxVGWazy60VY
V1IqkoYTc9vf2+j29zbbvQbINQY/jvFPjMRPNsjyDWUzgCoCgXf3AKYN+Xaz
i8RSa/92QBQ7H10U0bKy0RL9R1Q1cYqy+H5IQn2y80FcULtf9ySU8k7Gjqs3
WPMopuFAu3gJRuVAin5THk9Q16FicG2FXVFyUZQKXiDvnsAM9BYAL97iKZcQ
VNrLqy2PtFsMUmUCLcZTF28Q7bzaRU8i6iyXvJUUvJpEF4UiIFz/h+LnMTqV
R6L8G7PRCLlJ1/SClUlktYVWwnmd4aUXO4MZ2HyPrLDips7JgAMAk1XYeAxy
pR3l7lV3TD5R+LvHLbkipX5yhyy8NZPvnuwcru+q5dnke2b/rBc8ZZPnwV3f
3Mttul1Br35eYc4UzBfumNrXQzmdu/kZ8iO8fJcEn6P0Am3XmFCiLZmauf7c
x+nR+hHmFZiN7D0y7tMZ5vOMOf0wz8FJRcGVBOUyBXMu8AVLmg3zjlyVxImU
0tKlEs87vT5xLvOwG9dZTsjRpxVlQeQTZra3l3WDyRo36Rfb23JZ/XJt/9nT
Z0/2gid7+5wz6RqpCMZZN+NcW7ZP7WJlYfJaBMvrFSbndMHiuvvDnHLv6aeP
n/yd92g50d1Rc44eHlgX6GrtvUk38/54lx198/82+aPUkSGo3SNF6L9Bk38z
CKZoTUG0+33hR8pulH6ot38t91Ykpfm2GC/P6ELPy8Uvy+zrdew6g42nY9tF
qtKy9Q/fO7P42GrZNZ9Vc7W645Sqf+ib/ld/Wtbg8189a5R81naPAjL3bJRi
7SpNPlXOj+bL4qsgSrq2lldrRGC25ohjVvHtN39cwfhTtuGsVTYOnDbudBtm
XfVWytxdLcMZ5jwmBAW+7XDOffCCj0NLsBSbdcbf5SAMitiZcx/cEL55ETVe
TtuFoTeLX76ec7CateLaYW53tR0s1aX97B59VBAel+5iZ/cjzsi81Mfron/4
0eIk2eUuvJgiR0IUq9MRl9fzParKpXNqLU6m3G5+mQzOMlB0PrcaIMzYVYA0
11CFH1pFAjmSXkG5mk3EU8f6rmh1B9ezco4yWvTBtT4lVVYOdKvqBexpYkrK
dTilGIdS2LikSGr5UfjPGEAAmNZKqoPjpegEoIRcf8+J9UGdxBTSEGgw81t3
7eB+jsWI0O8TsJBH+Xo+O4ZZcILQew/6wc5RkMzGx5i1TWvnVOjMKGqvFVNS
VWfNI/hEicrJHdfxpVwG8+zx1aNolbFNAuxpxoVikNZOQN6SrA8MKRUU0p/i
lfOjffiz93+GJoJCbj62rLlAx255h4CU4DAbBn+/c/jA9SjjSpjoatYau95G
qH3NMtLKlKFgFMy29QvFSLLY1iH3clZp9k6y7XDZFWdt1kTFJLJW6rT03jLl
J5AagBgIRqAHoM+T+EWEOYExR9UaeUSFVFZVl8j1Qs2l8qSt0GH0vmLGSFHQ
yB+L7AmENFIjNGmZgzNWsCvMMVrWwia6hUVb5BbZTY7j7mWYnHIF5Br+UO66
JX0fp1naTSd5eHHKQ4SmdXfArcnB19Uul/EQKAkAV6gf+dpkOv/6lbeT6JQ3
bo/r9x/Zg996GnA7pwtv+5Ew1CSB+jd/xrat0uni912YckmEMw4KmQLQLoLX
pIvSx+uiofPBHyvEIF8oXernTaWYUgtt+XPV5g1Lc5BoWU2eVcUZKv57vQyk
C/QnkcaLFS3K2+X122/+k8fY+Nlm704P/lvf2qAR9EERBiNKU03PmmWrSHKy
wk9lciWZW6mWQ1lR6W3g98i5g407d/D33p15c8LPwtvr8jDVIZB+EOTcHeeK
lG8Xpyqx/1UA16xhBanNMZHwj7GAVHCxfyv3dwXtonRZ+57KzLuuVMGy6ROv
GJsIL31HxFlwabtjqwN4Ejme81wYKF9bI5HU2L6hA6yixhevEnIsCRaB/Wrd
7GKoBElkXimCKnf5XAtx480cySn5FCQaKriMpSQwbWVyqXETJ6PwPM06wRln
kbTWasl9mwcm72/AUVqJZBmgu2AHTpMqdF3vnzh82UZlcepivmrOIpOXAIdE
WebU3jSNXWw5z6T0pbljh0lVCC6PAKG22OWY/3qJUUh7gDwYEe95tv07YK5g
TZIq9sq2enOZbgVxzJkca+EEU4+DRsA89vFohK+jmC9SJ91QYKZSanFxxsEX
3uVffqbl1RDzVGZgSGmy03OGpiR33T0tSF3kgc9gkXgUuBXUTNZQp4AaVnkP
3aqpeRVCsR+O5dC6mBv4yqHWItzRbBKlACpcZhwDh9Lhiz2bzoMWd4u62+Mk
qkjYq9Gg5ApgqrDBC1rqja/MJcRGEs8j9dk89BK/78aWOkmtpR8v9QMml2Ak
CnZa0aN799peWXmJeauCyUmBT/7ZPmxT2dVaFfMQMbChiH2kOCsiNre3hFLt
XXwj6pDbwxQELhpZuVQJ/CHs+lGwg6UcSUJvHT3caVvfDZu0m4OepOcLJVh8
hYBxLthhasWl4GKwJo+vXurCxy15Cpq0XIhJlcA4yuevGqyX9GNW7X3SJ2XZ
aqsQGMbz7MnDh7taPjQ3VKCeNfb6LcLCAQOq4wH/zyO9YTs9vBfsPus+67uD
Qe9arTOiCBm5bFz/LKY/BVtuuFwl9RKE/X2nFCFSoIAbZpEPaazs6pQPCILW
o69HSl9PecRq/in8DBnwMRWgxCtAd7048b+Q/jh+oTVAqZyFW0QSGGE6iA3r
bpJ04ub/e702L9uDOVsI07UflLKK3Vzv1F4Xh6vWVV8Hh1vXNjaOCd1VjqP2
eSL2OsE8CKoI6ln/HxSbNRLgd0jmgYygFd8K79jy6Ncw00KtdW+c8rrOD2Cp
eW/umm1e75ptLlyz3XlrVr1su32dSM2a7Tz6Ia1Z7RCNFehG/83t7c2ar7Us
QTp16k7Jor/6CMWW17EodubFbCCqcm1QAD2RFMU8HwatMrG1VWqfo2xV+5Ms
uD6vRiuVAaKqXJU9loxdlb0sMh1WjS3bBbjdP5DoYbdP1bvzo3qqXMbLi/rK
W6QmPgTld14taOP9V4cr550/Ne5PBp8LtPDr3QiULzGZmLvk+k+dYawG/IV9
8StPRPgq2s/mkcmy0HI1OQOtnslKUGUu/10T2BsA+7poOZvz86Y0K2/T69iV
wN59sEuHz/zNYd2Z6LTaefiwclYLgX1zk2vlfumuFclDP9y1qhy7ClhkZDIX
WauFO7rxbmq0djXob8Jbyv/VeKbMA3bODOYer/POnQVHvr59rcf1+3pcHxaO
641Vj2uA0XeoDgdUtLTChUA1zmE0iZIhGd5yNEcCH4VeTqBh6ubQdDo7xhwj
aGyTzKMSenEO3bAOPggnIaWuiUuPS1EymLkU9Fo8R8Jc70rJ+9wpaBphlMYo
OqWZWD9lUG+P5PodPZE7LpA6vZirfZHhdXCWxpy2U+9k00kkN72EMbTzUIkh
U1spPekENi8YuwxgB54RgO00HYItoqKsWh2J/A0wrGYURMkpYI0TeLkIIvX9
dBZjdSVKmWqKC1ngxFo5AHUfndydXFzjKGTjYoSWGvFpj9Wsa2069VWdcM5U
Co2cucNhOpnC4w30e9mwWDzBOB/MWELZ4Mzcg5Oiez7PJxygE0KK1dbEkZpL
cuHrTh2lp05ZUIZkCMs5jLjC3HnEsUSHPizkQn16mgE54CTXc8BuKJmSTA3a
GM2Yudh142SABmJdKRhkLFVB02OqpjvsBf3ZdMqBG2wTA0zAaiL8jmu2wbaU
+SpO3UnnRqQ4/AxgUBcNHtvUzYJeCq1lgm0x9VWuKNOENcsH+3GWT60FBa3e
mN/Upi9mEyaxhp2yzRjTGBFFKcUDpZKRiVzQqwxk2JFjdvNIWaJJrDEK9r1N
O8dVJafRiyl6ggSBSe2HS5kNJV4OUOuyqVsnNEHCwy0OCzj+DOvZImlgJ8YB
hwMHOFEOECu5F7HNmCcD0g1Zp/u9wKTyxfsaGIWZVm7T9HE7s3JOMmhequNo
EM44Cu2S7O5kisNubOBcX6fgzECtj059RmLBii8CbocMrK47TMIkTBc/Ixe4
uhTKH+iNxA4fA9N4TD1dZDGN2Nq8s7nVtjUU3+9tckq3wwe9jY2tly8VrZr5
SJDkmEJbR0dPP+KoqyQVarrv2LAxidvR/XbbuWrJZxM8YQFWznuHGYp4Ke4+
oKXklHb6egF3VA47uaRKuQYDPaOi/hCMnHWSyZUgW1MxZUM6K8udZpwGgudS
PyYBUM2wVlIDnkN/Hu7Xm71AzoZdIe44LOJ0D4+6G+1qSRdbSHevDBKmwQh/
m2f2um4kmKw7NcO64mpclC4N4HeDwQ939R4Eka5eraEZVu9Zxeptzl+9Z97q
1S7R9796bxvtxro0H1f+bzXPi3pNaTnF5mojXcmmWQ/Ofe8QPlFBhw6DZpOY
Z8x4dy8bMvy66Tq//d1/0P//vSEw8Hrjl4NPfjwt6x5d8efH0/LLH09Lu3o/
npY/zNNyGefgm+Z+myvOANYoYR5SuQ9ey0s3sk3m7D9vmwyZ+fA22awzvMOj
8jbZale+rj25WySu3QdvDBJuYJvM2X8ekyNGttoCE5vxn63Q1Q0R8BJbpV5C
XbCNy3ltFjSc0+XVZmjuPHyZ1PEMVsE0cEOTPONZ0fr/gVr/2YSHhpSi2c4Z
bp5DdGCLFWgeEMfeT2XQyBjULMW6W6FA8oygV7J0TVcMshommLGPSVjY0+/w
Sb/d4fAqtk5xgveQY+JGo2jgeGzakC1Tt8u41FE2/BGmidKk62wvlLQh3NzO
kgKrjLt1OVFGp9pQdhafnnVH6JDZ/ceU8subam0wE05zwp6qJvPICcwivSAz
PqxyCF1m5O5t/HWDh5uf9A/XH27B/81NA1v81OOdbJVANdaHdVs9RZ6yRbQ4
M8S+2Q7YhRJcLmF8ucbMKfeNRjFQxSW9PI6HZ+FsRER2HA6e0x+2PxvdmHMB
g1A64S430XSrEXnWz/IkA/Kmnpz2vSDa7T85UFufVCExwEgW+gUoGsOqUGwo
D0Ru66GNFKQSW4AQg0WxrCsugVT2OfRwTEnXKSe+St6lwYAIZ6NpzuZFd0tz
VbCziDK0t0JMFTV4Hk3VYxV9QaNkEE6gORpv14eR/cNkkIH55sFZylmFSoO3
5faDqGkUhVSuBih4XIwchdX+OD2S4hICAHxBl2fRi8kojL0yE0DL6ISvVuCf
4j1BEnVPM35P950JqBVo+3s+GaK5PR1HaD3G2z5yNb4dDscx11qR1reRPG4D
NWG+HmkOjxiPMLPbPXZ+pRgHuaFRx/JCSh5hMPA5hqlexEMt8AfbzBjnebkz
ohHXU9hrXy7XRv7JZAxnSBGEsxCjD7rpyYkbo6tz0KiiHB1c6qKiexZjeF+V
jvJoyhSrFXYA6wkVogFcYDiy1PVBMzxVnhjBciN5tNWxPlW0mLljgKoiJMfE
TeqPnAw7bmq6Dj7TbmSagxEwCLcKTy4+6o9nU5h51+BXGxR2XzweR8OYSlUE
wyydTKIhXWuOw+w570tkovQI00Ad612cdNdR/3U9EijQZBQ/x/5gqpgDkXsl
WruQiBdKFFYZhR6fWBo7jXI+TgaDGV4o6hERMaKHcSbnjSFw2pEK01kcZSGW
6iEuwjmooixfh+N7gnUqTI5GjjzoeLSFC3g6A5YD5zDuqRDrX5il8a61zWv5
ovWJQkASL5DS1X6aBbayEzBoIvbSLjTAOoUHnaR5yrQ4dZ5118f8aSo1lPtE
HoC3UGN2/Tdp6JzeOPHWKt1QSSfmTrtpmOVRLV+ikyqeBq0kTZzoZKUDqZXa
pjjx2qotcg54B3yHqvckemHLoRUVW1x2uIDBTL2uLuQwpWtFjSuiOytg99OI
/QaGMbw+01Mr174xsyicNB0q3IEeCHCM8HxdIm3TKcASgcgm0MASFIG3AAsk
yMwoTOhDnwjRTUBvDPt7HZ9Ouycg9WDRm3Rsw4sKd9oU+YShdUPLyrAz4nAY
qm/8Jwrj6kzK2PQmZeklhLOYLvxHvHzrTjoEitkwueNmechnQ6lrI31uuywc
yI4ru+oQTs8xu1ok+SyrZk5KkdpW9uRsGqO7wNBm5AuFFhO6nAY1AOSn5zkf
lAZ3xbMEewN0wHRoFcQdxMxHcdGBptKHgMosFzki+jSMDPYNryDRnS/v+Y0B
SCwgX4VDcxxD53hmtTt08z48R/llaHpyvVsoO0aMrjBCbEZi1Onbwx2jirLz
UERPigLE/S/BiCYPiAOJBzM5BgGl4z7Z233UB8TAog9Hl5Z+0olWrS2kx3s3
JnCbqKrWaOL+FIPRMQMHaSL+p2FPa8ZowAW7G1sQKlrNy3N/7aayeaNw/qJ/
9TM1vDZmyxrnV9anN4ozJEQ6JT6++TMnfn+lEeter07vc2zTCx9W9Fk1p+/K
c6Jf+42+wn9+Xz+337tYLhrb8M1/q06FUX608OWVe0YMNFr9Okw1/WoupuZT
Qa1xfuHDhlTwphllW0Oya8Cvm9PXwQ9mJ/tIXZZD+e3WqpFetwaLRmjUk3Oe
XGdsT91/NjkglajoBkf3+3LMnrgqPsqJLetYZi1tEy5Ol7NLMfbyb9DLgAVw
MilQZ+XsYSCVjkamae6iqpT7wTerqaHT2At3RpRqHk/wI1GFyUqp8a1HRkCf
Y/ZExEtMrZ8XzC3gR3HX0pu7X7DxUaTWyJ08l0TFIIc7OcWOuodHRzsH7WBr
s3scGz80tVVmJGoafwT9fqBGKIROulBnQ0xwgXVMRTC2JjhOJEHawBG72JI2
AJOzDpQDSgNN5hMJX5alKPaGvUgO6ONL4ziLousLzFkAM6kw7NlpOW7fmkEL
06lhryajGpkAXH8/IJEj1QN2YTGDfhpjcPv9o91+u1iJ8BilQNcLXTVVKh1H
2bqQxRUcZDkRsqlfuHyKBnSYpcwyv4QhyOrD+SrOgW66aAuCr9iLXl1TOX1D
pyZfVwedZ0/i0YhDt20+brZOW091r/IDepSmY7t+nWKEvWi9sLOxH9x4DPXB
/aAFWB+mMyQh+SrvUHJ2UhufJ1irF5bt4zj5uN3hCqsVVm8zX8QBYCYI9tDu
gD0y5CYPf2jrZ6u11eRAUz3eKuRGFSfd8SwSV1xZNMkXn+amsC1QJDtbwwMg
6tIIZLWInRreD5lityrMuOTRrUYGxxhMKBTsCx1hVrdSBz3M/aNFNmFp3Az+
QLpM/pwQzy3gjW8T7qMXeEvCVg/HgXV/09rJuzwdaaw2GLaXE+fbQ1sKkLBj
V5ZEKagEoup1xgkTaO1RG72ccOwDezLr/kcaGmSA6GqLJXAmbUcLJa79NA0O
VsBwCeJkiJBwqnn2uZ420GWPzFLks0vZWZTpBZyI0slBaBLiuYkzGHzDb7Af
8uqH82Vnl41TiRDKCC2VJiQChs4lhzp1JFZQZnim+IkeLpy4g6rZo7O2fYHG
Pw9Hs0hUblOe1SB3fpqGaYg7kFJumuwxZHaAjYBd7Ox2jMGYugvtiefmWXRs
dMbanBZTQmKHTjSMW9kDgZ+ZAvQ0km5rMt7ThiBrAXYikTgTYszAhfDGsINL
Blw919w/uC+HM3NCOVxMLu10yogHDx+5QQGRiCYMRKgc/kb3IEUJYtE7q/l7
FD5uJ1Z8bGYE8BoVO6nvvuJToUVUdTbPsUPKvxYKtNFTk9asTgX1Gzd/+qWG
NzKwdYUB4HtOke9NR4V01G1qGy7q2HRFYAAdLwSjmIcO/+DSbnMaPtxcf7g1
H4zDfQPGDwIbtd4v/EqhRBw/szkr65XUZZ992bSk2mItr9xNU/WqWcdzlbtl
i3Yu24P6Ai/sxQPZyekaVGW2dnO+lrNvK0I1Hax+NAIoqHpefHhNbJgqM375
zxUSpSsFg9xLBxreCpxd5oU3A0cDFlHufjQOMzlkWfloBk9RefWkY9VdTYQd
CWqeEjFPR0WN46BvXq3VLVTDSTTxoKhvxYRTohBAl9MZqBugS7W8NF8HfdBn
UEZ+8LTffaYvtQMQGeCIjvMzK3GQJ89+Xq8lxBNfR3jqKawihZlcdCZSke6O
yXhP1YLk1oMkB3NthNqlwNaRkL1QhVnbGar1VEN8jPckqDqRBB1RbBpJvfef
seC/+4wufzFztJgrgEfLhQYm1N7nKDYK9sx9UCR218Gi7eT+My/zXMc0I2lK
FoDuYuyo5BZisd1hgYhf9iUcDl9kBOqd/A6SBZf6EQHMF+pMNjl2LUjoomfO
PpILT0KnuXbtiGqG8rb6EHH0Io4zkhUDUlDgCroSpQykvvjy94zcEEDYjEE9
GJHyOwf4sCBFo/PBc/wTiZqlbtfJzBe8Y1Opali8z1n0eSrrVSVlXrt8KZ9l
a/66Letky6U+zaVKAVe/ciqt1MiUf6pr6nXbTKJ8++2v3/7u9eIfEJmavHbF
JvN/vv21INaRQ2tzJlMy5KBKCp3XiGXQOZ0WZdC/VPw1kly/9GvjVEuuxQrH
NyS5LvpU8oAmguuiS4kf5dbvX241H6RhFGDlVG+R1NVhmasT9Hq9NiVsVifO
iS+Muh1dQYAtya2OvFYttTqCaIN7Ff+UFk8WNfehqHhSSDF70D9/Xy8I5KxW
52lyGaEHKMZRjgPvdU7TsrH5IV2zjFJM8xFHo6GTrZVuRuxlSqh3MvTeNk9z
XTH59HLCGQra28GHwTFapO29T0WWgu1g8z16rQfdyvt4RZGeIFD0hXq3IdjO
TUhHk8bMRGYDySoV10UBV93hx+FzslOzoEPzqTAqIkmBSJKH2aUUGXFkH0I/
3gewmdaxKo6j6VlqcM3fRx6O+Z4Izo1Rmk7QCVzcc3CeIE6hoz5LYTy/HJOk
oFt7zyLMXzNndPSdHJMBUH3j1VKtwGsSWxdd6h7kpJ92+8T86L5GsrGhHs1u
liOkBkt1DAoii3GE6EiM6y3S66nQ4V+zwEzerdmlePWh+J6kU+cCh1ZVs+py
InfHSVzRpDvM4ocBfZxEfAORAIK57Oj4OBqaHDGGpBNDXe6moCk6VyhEeQG5
0kdhfhlchFT7VWzpl6ZaEHmqo2Z3HOFukuu/Uyx37W4kNO0nl3IJU1Q+NTmH
6w/My+Zte+g355vUc7TzRwmRMV4z6yjjNMEc8OSaxrcGOKg4jjrvkfZBb8Un
BTHf5+BAxCbti/mwK1lks0u28E5EPBTl7TY9QPBlzDVm51c5M2t+sEhMXb/f
/BnHLQnFf3xXf77m4V9t3rmzsX1nePzh9gv4FP83nQ6H20P4mKC0+Yf/n27s
KctmUz4P4bw8ehq0mCuzz/yQPuQMEbSEk7eL8VYbG3oqwuGzZ7PrKPXxvuTr
vZQ24vxEa+pqLj0hu0pK3EpqEaM3pb1TmwY/e790pli2yqr4jFwoVZE+3O8E
x7OpOhcPwiy7ZM9iv6azUxJNzk69+BkBv/CBkJOOWJ45vRAJBcZkeuypaPCz
9+no9Z2+GXph71r6i7ydKXpBGQdZcJR3iEniNEpPs3DCfvjmAJBwj/u7Rc8K
CWYTNOfdBE7LuGuTAmH6ojN0ViZ/CaeqWC7OJvbVjhMXYqULgrFEDs5BSug6
vhRh5nC/u0M3qHitzBghwZBQX5QD1SlW1hf4HzsrePXqzAk+9C7vaL/idt0O
t+9s31kHMuKSZionAST3ELiGoDAkjUGwwx/L8HpEuJsADq2LVAwr25wxinNF
tfUy89FB+pS/22r7968m3T65s7B07QOVcUI2MgSCHhFjuY6WijEm1RwbJz3B
qo2n4RcuBjfuwCQ6xYnRty8VodiRC64ChTgmKnQ73KIOvd7oq5fGVFWxgC2k
nnZRuC+jml68174uXaaEiHUUdGs+JfzQywzJklHJ7keb3mxHzW1wHq1eEcrK
90xXxaP/G3bUvKodjoxt85yP5dk3/1l4/JduR/rRDneddrhv/oOlLoOo1exw
0E8jS5wMV5D2rmmnVb3S3CLnsf5mnS/zsR2VjpGm7HirwI6v+PnRzPijmbEA
T9HMWJa3Va9ykmOoQEgC5koaFl2dP+o/PAoehscw+8VX6BWR/c5Nn/X+s2W1
UJqkhLMAE8cKW0dF1LhA+HPipr14cLotlbB+fZ0yJxCZ2evbKudLK+9aWw35
YeY8YTerAJoh62OhCb24/OcRNSXFxfUdpTngk/TZ/X7xEaf+xhnInE0yX7rD
Fc3Om3bH5sFQfI9oediDQPIs2CjzQlm86VkWocHzM4xpJotlHrScKtO6ozbu
cDra//Jkf/e9rfffe/mSy4d5tbgxagDRZcJPU6ymaG/2te4yl2g02Tkes5fu
DtY/RufvjTshdL8dfPJkHxNNwz9ePgu/1T3b6phaZZEXkIhZKRAfMCFMbZFh
DglRs5LoxbR7lk5kXw7OKJIznBpP/XSGFbbjqDjmrh1zsNyYqBNVD/tXczqx
Ph6rgk81Oi2i2cke8SzkYHauhkUwCWCyGlxQpii9yyANDW0fnjNBx8/1wgjy
/PhfFuC4Z+A4rvbxr8tGUir65mxJzzfX2+J5VNehcp6qQnLFzUYXB8ah3HVS
iWIysOjOTceTGbZQnjROj1F/deKSbRxJy9hOoKccEeI4+nSCUXQyJTwHOMt2
kQ3e310faBWfODnJQvbzwTjjeJpHo5OgxRnzBbRpOlFWgp4elBE/Ck+C/AKL
lGIv0jlX+gN1/yQ8zuLBIjA5AYiFs90TrxTCbykmQTc1s2Z0gpF0LmxTGMEx
MLysYKJoX3B46Dr9ctD33iCDNYNPSc5pLSrwM0yTt1/+t6kmx3E5t8+b2z3n
lFCOCsoKmXYSWXqJCknQ1pE4ZpJ5UUlObAkbFCXSiHvGJ3YHeg42b7/9p7IM
ZgWVVR9WyBv0/3sP+sTM5DP/z7pOQFx7/OijDdjZH+3c8v+87f+5sJNNfO3e
Lf/P2/6fCzvZwtd2b/l/3vb/rO+kEo/VP9/8j6YvN3+TXp43Q/0kZ7n8r/xX
7Wdl0ZkjB7STMvMufCpe8KRE6GR+pEIQ1IUpuK9WaIZNzFCB+/qrur/q1E63
pPmc5oXOmpiiCrczi3y+nGdFS5PzUq2x6kvPIPXfHHgxbrjoUO9403vfQcu3
X/7fxZ8lwgt46FrbTynAwIkumGMxWgGsoonp+8DIYketP855Nq9dHbtZ0V3L
yRRZ2CFkzCu9X+qmiXFo8Uf36M2ZUd5csxlFQL6aGUXReSUzyrXZUa4nzmCN
91y34uxouTd5VnAq3eYoPNcQrlAyx5RkY7XGEDxqNdk2WtACzy87CxWM9RZw
eJmEY4k2BWld+tu4c4+v4tT0Y3OLsaRZUg8NHvnq0jqfw5+jyAQMGIUTvUtO
2LiSRBeiHKJXvgOPgZKE5TA3cfbufXyFFqGqikx4pxOAZIgjgbyo6Qa58ICJ
kODECeVry4rLePRtEY35ODoLz2N8bVptycGkbh0V86l2ERYik1QBw4jtfIQm
1gkZDU6kNn+tcQTinICCspccgWNr+Q6eVHg3LaVZEDKklFWojpOezkZ6FPZS
qPuBxx6P4c/pZSfIyePNOPsz/GGODglsQ0yd5I4Y6W/Df73SZVx+fr5q6GeK
dHLLEmGJ2A94Docw0WlMF8tExVUkJaDu3NII8Y41V4jqrXMU5ZMbTFMNT7YV
2XFiFKRPw6NPJVeR8smZaLg0PJVeEz8vrAeVjhGPRoktuHoZ/W+Dt070IhrM
0H0N/fAmGbmyUSJBIVJDoWyyO6A4bqBM3IipWDnDYgYMjWiuITby/1MyMa4G
TGUmKyYgjukVtjvGGUuUCFGavIp4AuCoP2vGNXgvRrsULL09ytrsGTrZoiRV
DN08DR6FG7NLicLNCOwo6R8LFFCVzqYjm5K1nlZ1q4ZTG9rDZjfaLWF2itkA
Xkw5lt5O2aBVc+NKZTvPtZU6Z3c7drZz/V4w+Mds+NZcU3nbW0iNEQJMSHzQ
bTY23a5CRcJpPdnbD/tBKgHWwikqlf+GmCERzwdnju3CJD2rhjtRDoR/nElY
lFm20K2URig+BcxOci+Ky2RQAUQjiuhqIqyLfOpItmCpFEhMA/GBaficspJu
UokDzgDJq+ul6MHNUHM8aD7bcvJThzH65s1dY94csHnzpz/9KaJMPbHy6Wx4
Cd9RvnDMDiTVRMu5wnPpSZMI01UMtqBMMe7TEX3x0riM26RBnAmSk5Ziuo1z
2OjpLKduOP1tZOPqhIFgL9aESokuBUTOGk1sTSxnEiNYlXfFyzR6TrlJyRmW
7Y2I9yJS2fZ1kQY8H0Q8jk4kgxPBnMyzPC8mWJbZq51ZUjQTkggj1AfeLmnu
SEz+OXCtvdKEOsL9RN99fEDVYOEBWxCpTZppOpcTy1aeHnU3t3p376BXNBZ3
/Jg94xM3Q1Hr4H5bvIhzdeDlXNq2EivgVSApZDTX7SmpceV25yLCfYmBoybR
K97r5GfpaAjfwtk/i9ysme5D5AeYypOPSZw2rMY0HaSURJz4JBtAFUVPdhx3
5Afov0yzwfY4X8rwYzMg2bc7koqknHSp3mSv4lx8gn13wwu6snJXEAvJZnb9
tBuHcjXtL6Vu0u+s6Z1ZGrrmYV4kzXdFqUhYBHbYMM4vT3nxhn6mJQsUno0u
xdekfRWxGCGDud5z5BeQPwgUTofSQQ50dJ9qV8oRXNgsOWtrhpYAqSbWtxAe
TO7mTpojcls32bCFwN0M4IbhOzMyV4goAg6mpYxRRAXsV0jziHON3MgH6URL
ejqVAGD+yvpMnhpOF6MXM/omRe/SBrDZpkB6zi670/z84rSLi4IsH68N/3EQ
a2zCnhUh9EAYy13FOcBDaXRp4c1VJcyBCiXP8uIZhpHPvtiD78IT68aK1Wvp
y1aadThzKhDRAKRaSe8zSDMgqknKEpCz2G2abSElWWnBmSCwIw2oLuVcLzVq
97wbNluEgf7kjS9c9iIGQYSELJhgxszptuV/u5gg+HbQkq9u41IAM8mmfC+F
X+OMbgsTfnpYYMJagkMAhef2kFqYb9hL4u0kuLf8cB1E6RSLqmpx7cVdAgKM
/sB5ngm3c1M9Cx7LGYmYaZgDnPgY8fpOxcui0ZPOhQq9ZgfkThQrwvNxdGLl
SCaLVzxo8TwwQ1NbvWdRxqwDAyPmeQ+ageUrPTt1dL1H9NJb14Bhc1uxFJ2x
hJYNiZdTpV6RIIoZsHk0UofwuQTZ44Gg92+0MtOIr/K06EZtB2YgVlhPowRr
qztVeXUjdOYJCiAU4FMjBRD1qX1BdqyfLGyW158CfP7SXSjwFxY8mSHIDSem
OKfJ0LYLWk932+rivXjT8t6zm5Y3KH97m8X3M8JssTZLz0iYZVmU8PUpURNy
enNCcB7EWjebDkmddF1t+B1tM58ZokSp2MTu6b02nc8mIEvlR15Bm4ODcmdo
Ij/H/iUwomJPEllRjqE8ax299+boO6obT+o8TAFb1Z73lG2ikvKNa4UWAuDo
EU5/QRnYJasl7+8kddx9OIhrqoco89ZYD2SJOmR3Id2OKFprAgk/poK0RVw8
yRnyuIuT3xmNYlahvOgxFmhRHp2cEVc0gYIcIqlmHAoLo1NTitXz+7nkVmfd
HoB0CjDg9baE8glaO/V4LQa/EbHsgGbxIthnXySaRu/TBz/r/ap/tLNz9PJl
23FvEkMgrk7IWg7oBhOOiuuosF+nsrjlfjwuo9hB5cTmVC2XByLRRRVkUU69
6WwDVCjTzhKWavlcIYc1+p5EH/sEZUSs26PdiQJWSk+jcoqRBrFY1CxDBMNa
uDVHQifhZdGkx32yLeXUpPCHt7VsUWt/o/vMGuUdy4CR051oJzmtaEgqfC4w
Fzo3dZBah1ulvhmfGMyqSpmPOrPyeaTIwWeqbEej8DjNXFXPiYzF6Bgs9KUO
ZqzGu0NwMlzWs53vjdtSEZxOgdPZ6g9iHQR5MKJQGSLQw31BEwr65Il0mqQY
amnsxmV26qScUS5fsMEo3kWV5BOE6FX4gFTXcAUCkhjU4suVI4gVsfVFhDnq
qcO1bqaO76S103gSgzIoPv9rC2EAUJ+y9pWPkY+Z2hT2OgOAsTl23TxLzGpw
Ic1ziXTCHYVO421NrOkYbNiSzyc7xWdRitLIgdzkT9SEPWIyJ7ln8XxMmkzh
k1zGTd37QFI9h+HW6boH/pAIJk2AFLL7jy3R4UydU1nO8oIqUZmqJ0fVHZ1q
KUmwsaT5y9OkUkl9tiapscf5hoo2CzEdeYWlPDzKoDnm7oVVlMzXLa8oTEk2
DccpC6Y1Iq1YZ+J8gnKSb/YFcLxdbMLBvs8izDD4b95+/U/L//yzuYrk6hBz
Puw68NXiab6Gtxb05X7W+HXkXu5ghS5WneD8n//OM3pV67ri/lBJ4QrA9Iun
Dkk6T2V+0FYLo24E9T4lpTG5k2st/fpawZKZN8iMX5h5Bfzf/JmR4HB5KdDB
RRcYD4uJ2R3klZn9NdZ8fWNnvxQlu+DcxGLM3QPu4K/KiN4sInplmr5ppPs7
YbOKklzobh7tK+0BBmrBomytTP3l7r9n+i8D9E53wIL5V7Ge9/5Cd8RW0Phs
ePND3BdzQalaqLtX3CXBjS7O0nskuNFFmbND/MEr2NH717Ij3gXS/R3xXjB3
R3x340i/wgkxd0E++JHymy/CVSj/w79Qyr8bzKX8N0VUPApfwFxh6rtSh1Of
XknWl06+vQH161+W1gkWflhL/b9WA6f5MJiu/HvS9dFbfr9YHMw1kOhn11QB
KzxeC+qLiTmfVlXVsEAcustWk5KftLHzCD3n/EbJ57lgUVGPZ7YkTlPdy3rN
3yrZVtvzU3t9ehaZ259StXD1jtU4OnslUxF0WHs9JZ6+ThRhrs4pZkR0RaNb
uVZ8wr9Y/wqt/ltjPGtrpj1KXNWVGFdybGXjGd5bOWkMucp9TiMdPYEm7kjG
ul8/GPn5RcmQnS9c03NaY90Tcxw5AsXJc+vmkWbxaYwwAfIZLCA4zgPP4adH
fao9TitrqoqLCVtuW0v2+raTSZTcyKXnFqE1zQhPbcqrhu5EYuE2w1TcjVLq
tBO9Ny0H3ZM1XvKdIUbXaSX8KE+sjBRKRCoy4fTIdc5xTyQHmk7JZdcUT6q6
a6fsXOT7q6WiF9RYdsI+ii+oCVqy0EV42RBOGanOstGdO+MXIcPdqhMdomMK
XXtockmtZe14zHoO3ht3X76sxTNdZ7sp996XlxHj7F3kvF+VSrL6RFhKHnnd
pMdXDP8vGS2BpFRc1Kp8lv+xPHzj3l5RJg34Fyjr6a4c76/qksLXTrfBeVOG
u5zg0XzzHYe2YXZiwU7ghm6hcPG7/7B4LL7o1OGpnch3bm+Bdtekodv7K3E2
YrmwDj8gZMkA1U3XakS0uhSYFnbqirpetos1F6H+3L2Oq15r0JYar9o2ePvN
b+a07YeXWP27btx/D6pew7YtypOzTklz2lXz/Xd6tfTaYpip6RLznbeXpLMV
sMeU/O+VEDZqrY3rWi+lrrwpcICq/5brsJS/9a7KeeyBBFIMsdQ9l8XPkeu+
R9ZPR/+SrL8Ba1qmF+T5yoAatFuSvSzsET8qgzaHm/AmXzQMChVB9t0canN+
fjzU5pOMv94/HmreuP8e/Hio/f/kUHu/dKgR02t6qMG89tX8UPI6PEYXPua6
4nPNLjOuqxA5VJGvUk6FGNSpaxCZCAtyvr5ItSfx5mKVeJfbjS6DLXKLRaW4
9aF1eRqk42PJT2jdwjVOQ5Kgt95/zzTgeAWnDcIakdsomSW++OLnT/Z3P/zg
7nug6Jm60hT0cILFa8WdFVVAVqjZmws93jtu4TjyXTTDqE3kZCrBaaDziw9V
FwY5AaDXsSPQUfVvtdKo308xQCxOKOK9iz7zXTWLdSU8ViNFSoo2edj7UXTS
ZMSdhyZ+xg8mZPtAkhjvr7K1zq2tYRzNKp3xen40n4Kw7toEz9BZD8lqair+
knnoImXXwEzcG7cDwQTp6oBA+qNH+R2pOKI83cOZP9ERNWqDXSDn49IpWIMI
IvKnmhjSc2WofWly5KhnEqE7sR7oJD1AmnJmr8aL5zHO6cQzluJ+OJliQecQ
Fw27uG0D5WS02+Qar4a+AfrTIbaA7m4L8k/TUIJWYqmCzrMpDEUFZ/JZZoqh
GNiD8Dg9NznqaNyQEhiQzyF632cp+VumFBesYSwY81TMC+mHS89G6NjH2dcW
hKsKnjqy15xSkG4Yuq6LwTQGjyMu1p0gQkmBqO909R3MDOkUBXQQggNgQG+e
SmREoQo825nCIIeFokQLvH+4CGMogb4dg06YHvJHpg9M9p+kmN5tNEPuRMwh
8dCP73PgrThYRhgMF5/4WQ6ALtiKx96F4pt//z6wcrImP6eSNViaZp2cxE7C
eASTyymXvglJ8IKTztMRRaaY9S8ufm5trQwHdyFhA9ad8nNNmGB9l9FjdYzJ
KDj5PYfExdH0pDuNwrxLv8ly8k7qJsdx9zLEdTIJOHcPnmzDDh+P4ymCdGAL
TARPkB4kzOx0BoPBOUfVI5LhRTycnrW1jz720Y/C57XNx+GLeDwbF9uyy7ad
h7jYe0tXjIJN3UWTWENkzVr/4ujhY9sjBY/IRhiaoN4HweHRY1tU/mhXDb2W
cnywKm3mhqXhIXWpK+aGf85y3rZMkSfO0snpbVZhI9scqNdrl3gCjAFMdZRm
beYRFDMiYXSBcLyYIaOCJsdhDshyXzWVrngOzh1JKJ0oinOMvBgjhBwkanBL
Vu4cM0m6qS3gHFYilo5amO3iwiVtIKs2bhY8pNMT837Q4o1QeLMn/RzYnv2E
kINBNMGXESagsIswG5KH/GPqPiiA4zaV9IzKXz1OibhoYTyagzdYAnYXxyXD
yw5EgZa1cCI/VeLSywUQcORKANgBR8sEgVR4uYTTBddLY9/PNKBUodKwBEpu
Q/WfMO5ZV0md/UOc5ynGJqXJbaAWlJAKgFeeFu6BIcRaH7AnMQfA3uEclEQJ
JpjDxS2tIyweh1romngpLeGXSxZ1Z8efoSAAW46CZaUvnf5wRg7elJnBzJBY
9LSyKFY52kq20Wa2BdsItw7vIUxwvHAXXRBJUxgTxVU5Mf0o3m6+/7MPMY0N
B+vluMFheMykALtKYq9JJJD339vASxLJogJiKInLLkPDldSoT0AInmOyHMx3
CGrpFYXG0xRvwbYVZqy5FDyAVxJJrSPdAisCjMCCeC/+fYQsx39Tj15aPJhV
v9DmiVYV84UX57WdxHA/QjnzWpf10W5xEUJixyRkqUC68REci+pw26TdPYGJ
J8PR5W3iOpjcOMqT21McKM0VRSrFgsAYPud1z0Ee5ogBm0wG94PpmESk1u5e
WwkxopzVPWc2FAkhcaLEFkHWx9zkWUm1qRRppWNXQMyiU9giROjEzjRZuWK5
dYqLSnu4q5tNBUHeHnjWTCnEhygVd0+xEyeeg3eVEpLdV61LogkOKyTuV9lT
C5bKRI7PE969nAF0gUgxXcVLX5OJDFPdMBPhmFcnT5JzsGuyBymARfFjWF+v
Lj6lxdW3737sOA4VY6IKbdtzbzo/0NAQz9Zp4rz1QwxVHC8WmTmLBuq3v/tt
uZlTY0Y6LVpbTTNr+2v26lHzV0dzX6Uy0vpG7L+6hAXm2//D/0bTk37z52Aw
b3x31hH/srPwRflluvDFjaYvyi/hvBcrjajfwX5s2vvZwhdlVccLX5Q1jRa+
KCuaBDewoovRGjVdevlld+GLm/xL3LTHbN6LV17R2cIXj5rCO2qK0x/EHl38
4lxe5j7fus4eyxWTvjTemTWNyg3LP2Xz8gdqXj6QArjsI7djDFJqaRMfuWYu
cmy6e6xiUKXtzkncoIKbnLNFY9jcnJiBlhHGJD1pZk7jQpi8UwqikHHGCmvN
7IAcWk5FKSS7iliW0Lg4osp/pKOgHfyZ/i7JESWVBMlK+H/1/1oWBlgEo6eL
GxcOS/Z8R4R27AWsLFR3T25dqjaXfRQlDdAwhi9xWVhHOJmNTuIRo/r0FAXJ
aSTB0YEEDSMolOHuRFUm1uUx5l4yY4ipDT0DXUlPejEKXccVFjFDhuLL2JFr
3QgdyZcMZBUTbJv0S2iyLmRudd1iS+tg1AZji8KZciVVXIdCvLZjhzT64U5y
iemh4J+gtbO50/ZyP9jMWWw50LBzWM1TyUFBFOikHDTieFOUGbm+ljSsaZIu
cszauuYorRGrZhNSYwlInXK+AJcmMUdgJlYB81xWwP6JnEEHy7aYDDDLmfpB
N+YUQXgPZBVI7JZ0SFTouqK25+sibecOJ6m6OzBdkrG+qJaGkjQvGmrCqEuK
hmd3TkfDUkO5AUadJkjDJA9dg0i8G9vB3MBhPCJDVTi6zOn6wU9QKgOBkokZ
f+N8nC9OkibFQXJjyeQ7CNGfP/jwzvt6h2XVF1CpVbdhK+HSrBfPHeyzqM0x
G+l5qdX4XDBmDZNoQMq7U64BuUvJZ2RptEyrY9Igygbh1cEJ6jpxByb3SYdz
MpPX64tBJCqi5gv37om0IHKJD/U014Xk+7EmekyvhPRGJ53kfs6izzgZtpiQ
1XAMsCcjqhOdmKo10Fl4PIrzM81Pbe5ZQOumHItMc5TaMJ8BDqMXcT7lZGST
LIrGk2mh0vpCxVJlEtR9YaEnQC6cAct08KqiI6tqvn03wQ8laF6BrOvKaDWS
1u/+g50JKtqPGrR3pDi3abxC0x3+d9CwqRLzR0Rr3Y0u2uecp1P+N7IrM7/2
+go/7JGsNjEDSJ8BKUv206Kkb+T9RVMtoCrkfzespFx2l77izxt0TyHS+A93
5EG9nvY9EPrZFQl9vDqhR6sTenIlQt/8oRD6Zj2h136zPKnv8r+b757U4x8U
qWdXJPXB6qQ+W53U4yuR+tYPhdS33gmpy79b757UAzvkl/7Ab941qS9r+Plw
keFn4Bt+GgZHmlR1zvs21a+Tj0/FZle5CYMRFjTwc4yZuxPyKnIqLWACT7rn
RocKzreJA7VK1h904NEU4OksDykK0clf1rbJ5agDjTJ9EQ3x3txkgnXj7SIb
XjkvchFV34nUU6gp+qCxqjb3l1ZV/F7Tf+Hw7yQBGP7/BlKAUbfB95YETGb1
ynLcOT+rpgHTd94aT3tQBpaMQ5DhbyLHwkFwxSQBdiqLU4HtGVw0QHeRDqST
G8jA8NTBgVmkew0X6bUL2rUvz77BWIPFcTHGR58B7FV5afzkYVfaC4XBrn2B
DoPSHtp1lud3v64mn1c3ujRHwao7R0ltwQJtlRdo6b1TNdS1L89GULF/7gdV
++d1NUjXvjgWW433jYWreuMvTjcme2hR6ck3peFudnmWOrxrwbrBJWpM0HNW
Z+4y3a1aJp9cq8/kV/W/KHpvYMEOgisRr+o8N7Foew7uljgmasCrYHp+urKn
BhNmofYaLtQbO8y1L9C+g4UlWL+HgBtbotX3lQ9YxeL4qcsOg4p9tD9/ed54
Q1z7whwFq+2c4B0sySq7ppmWUMXy/ORnm0FpHz2o7P5NERc3dRqtrnBY4aY+
8VljxfJm0pstJQg0/age/i6SnAULIL/J/7Ao+JUTnV1DqrMbSXZWkepMXI9r
Mp41NOkhxLawHtqu2EpHZjWvsE2rbL7DxrlmwPfrB1hPFd/KR9Y4vIPGgiYR
+h2EnJ/fa+0b4zpOrTS/M7cUAF3DF2K3up4FklK1FcubBuT7fqERMlQkVB03
sD4cutJMMM4uzboaqwHgUVVxCVnSwhUhe4177PSCkslpOjWv2mVlvKSU75KR
S7m+Wv1f3mtXZPVSH/ySuVKTdmmSMA2n0Xlq6dMexliYAhc28tQU5IkXWDil
Ml9X+iBb5yEgf3ttm9wweHELZTAX9xK0jrqHR0c7Bx0u4YNHkFSZ7ATRdNBj
/zUTcofzjEejWT7lUpLBZJahp5DEqVOmOg6HYic/csJCjLFHiFMz9nQWD7Fk
kWOzreauTU99NpmuJg1UZzQJDve7O5U9GjPGws/bqrQK8kDlgCoN8HW5hd/h
1oN+P5DFCzbu3Ak8YdE/YOs6qUHu6zlYf+3AXdfevLZg8FdAch9tBCLvfPNn
JL6P3nu/Ts2vfFyNJzNEpSSD0kudiPPGn9/i124KvfNeChoMTch9/+4qyDV3
it/NH+IKyJ33UpPZ3SzdNkPuBwXK3bgzF7n4uHItV8im9M6oW3/xzTbyZNmM
L4VVlr7LsqbVsFQ/JU3qY6pwdFcWInhb68pfWj5nJkunqKlJ4YhnA15F1Kxo
HQB1JFUzibnnw+JOvTNis/aMWNjRu9hvCwC4jrPiO53/X9h+27D77cbPlMK1
Ie+5DYdKru90eaMwrbQnb/T8qTsC3pnc1GQ3rHD+zDcslYa5WXqv/tzouVI/
ZN2Ta7SzNQK/1kJRUN3UVrFndUri9mqoMHmv4Ys59okDjKKnkqJwHDxGPY8d
mrS71pNo1Nv4gDPicK1ZSlEiphA0U3x8gKE8mnaMnfgn7F0fJ07ap5MwP6O8
0hw3zu3Y5qndjcPLtfMwE1MCAZBr2nn7Vyc4oxRqRUDYduEU6lyzthu1aMAI
5P8fUhYRNgNwqMXD+DklpKgIdC9k4K5LnM6hdJzUvFQJGafbcs0rNUnTyYmq
Nm+66d/PbW46dTKcY0feKbI4w7mJRRsGhRrxGIBE1Xcb5UFfPgm6a2Opy4Ne
sQKSAJ0jCatyoDuthNAUfdNQTS1iLqroXssASNxUf48G9CKxbOCVpC6iYshu
kVYJn1o38Tp+8UzqeWe351af9YjPSbMROGGk6gG4fJI7zsRCuTlwzOqUd0vm
uyN3vWLKO/GKRM6xOGEe269oIU5sriihvRalROLdOrpEn8L3cHt8WHyREv0U
U+YEv/zULcYtEUTGubCtlZQN/NiJN4Veo3x6tIK7zmrZ2sbuipUjdFtuQjwn
W11bw3ELNGEyq9il43wqQllkWMSt49fstkFUHBgJ64xBShiKhlwRuriIYHtL
J05uO323TNsu5nLBFLRR51BJmGWtyx8fcCY012rMcb2XkieNKrhrLKxf2vki
vLQJtp7Q2wiQRwJBC0MrU8qb81f9gydtKsVOSWQsHlr5bKxBkicyLj7lHjDM
lnm636zdc8d2uysNiRRvu3Wy/2mc8CSLxvFs3C4TOvUFy4bhh/ciIPro5ATr
hHgvSjezXAA1Wdg4q1Wc2Gi8dYSIiAEXcjamqxQTtWoAUwB6rrsxp6/iGMmO
m8ulRMEu+9fgOH9dlFQpTq7Om3fzjiZamprqFVzq+QRL2DPSpEPNHSTT4vPr
PIw52yC/owTfCdihGEhPrNJZRIz9+BJQg1lIuWdJbkd43yO8t7mnebUteCf4
QuNyaWNkNZzEM4Ve3HiD1wskVv9j5Gz9BRve/ZiEyp1tJJDuRqWFu5gmou7H
SR9xVDXIPRmk0lSywiCjqkF2ZZDdaxok9gZZAs+DVRtGxYb39nT3djfuX9O0
ZLSdpaHb4F+mq9LdUg3r8rGEq44+qKL6zatTPWJUaP6siuY3r07zOIRQ/LiK
4jevTvE4hNB7tCq9J6vS+7SK3jevTu/seLPiXpTsQrur0lt8HdTetJRFafRK
at+6VmqfVVH71rVSe1xF7VvXSu3Lc7Mb4e5b96vhfXf0vrVqw1VGNOY0N8rQ
WFwbdeL3U/lTitjbvLNUqqbmxQyf2tyqrJtJjhEWzMPheZhMw9MoF0uZb1mi
dCPGyacsV7NqyskwSpqOeVu0NE6+slC05tlXivAhC8lFeV2SYjrCd1FROXRk
aKOgiDDtS9OS2juPMPvNNCpOxeazobS2JPtTqhTKloIWgwtWrWc5281Qi9QU
Jo64bwoXWo2AJ2fzKI1TyTV/QGDW9lChOhVwgX0wfMFZHGUUPTkIR0bfJ6+X
WOyh2N4uykZlTsryp5Slsvyx6sNK6oenxfT8XpqqH54G89fB9krqxwK+951l
eu4vS6ofKw+yjPqx8iBLqR/upSH+vdQhVWy8vBqywvSWUkOKEG4ESxze20CF
BRpseOrzDriaKlKxAxqpIlfdAY2UkavugEbqyFV3QDOFpGYHNFNKanbAEorJ
6jsgWAnCpdSTih3QUD2ZvwOaqSdNd0BRPbnqDmikoFx1BzRSUa66A5qxq3d2
Bmz9IHbAUgpLxQ5o1jC4HXyfCsvG8gpLO+gGv3Qk0OvIMWtl1c3aBIRz8g3K
1am53qWa53pVOQov5Q7X6lzVyQhNJkK6YtfrJDcZYe5nI6TvJK8PKCvRP87C
EV+gmmvtgyfm/spcbbT566pshKTvOKVq6FpimkejE0wUmQw7GicxunTv/kp+
BKV0iTyl+vSHTXIfGh3iaokF7e743rMKOhvVhegGMi/ZxFXO1w3yLNkj7OIj
/R1TRynQwh3ciRxZRnADSZaqRhzdKOpoxIVYi0s4u+fg7N4CnA1uHGd1OR1d
KL6nhI4LcWt/LHZ3HezuLsDuxjunyJvdzEEjivSw5tinMO4Q6xxSLZE5WAtu
FGtesjSrKn/vSQEdgfSdseSqYWs9RyuXLHwXS+aNOHCY/c0Suo545jD75bAj
uUjjd81kNz0mGzms/ntKJmoMBgrMMlicvnMak3833x2N7a68A+Pvh2lmPxym
Ofh+mObsqkv2DuXVqcPC3g1BBw7rWw47gcOu3iXT3PpBSKZbHtMMVqYx+fdm
E89WjXiz27B2xJWwE7xjpumM96U/6rvMybu8tWzThMM0NpbNtY7ZtKGVVjF9
WFWrhLJv5FSkhNNvsHWt/Gpd7dOAC7A0SHfbmVvRpeMXT5TQB7qadzMBH19y
aIQTUYKxKpIXeJweY4yK9nsyS7jyPJm/ZAaS8gKmihki0pMTNYA9PXSyA9sv
nXAVsi+HkgvYfdKRzB6mf/IxTgbhJJ8xnFzABUNFsBOJ2PAjZzqVATDyEtf6
xfd4/nw3Tx1Kb8W7e6cay92XL8nL237zvtRKR7w5QSVOdxj28st785Iem9AX
6OeYsBK9GIxmeXwejS45mgEWnOdENkw/rocdLkwci+ep74ZnTcPnWJEo4QJM
mqAjNGWNGBh2BS8G6lhQi/SMDtnUPfpmoJ+F1g2KcVudYLnfglcHhScYK3Lp
NeuDcSwhTYFX3kfCE7ikD5ODqS8DK4vJZAbx1BbokaKlMeax5opaXPWnp348
qPprPhOJQqnd5UDMUZJjgmxaE1ubVfFULHyccwlejd4bhMYBXbeWFJ/XQKJp
NJ6kGQbDZRHSBYduFdxwODeLcePn0AOcGpaApU3KSB4MZhmRpbgQEdAXRN5d
NwzgGJetzkXoiy/yaNCVZe0ii+kqarryDt4R0ECeW/0xIKIbuQ71ZK/fVcP2
ZBQmiZbEHYdJeBqZtN9e9TmGQA3iXW2HnJBXQ2rFRUk6Oz1jl38Zw3MGMiXY
Rhw3MJES0LlXQQjDfoTX071FH4aDETQNFLmH5Vwwy6yi5jKSqmic0Sg4DwHH
MwBuliTRiJMD5RoIidEztODOQwR3IOVyOQmTVL+jcIxx/DnvVsAMJmMKlWac
YJ2elBHTmlMwqxNkLTB1qlHkgQKIxua37R3NhOZ6G3rZt1QLCxIUXglu7dyS
uZpDxU4mV3AlcxBy7gS3Ni50qad7pZ5qusHcVmZlC4WyNreABplpUxUnJ+dS
KMeyWSz2rrtILSjk3kVT5/ukPCqCmQuMFEQCksPnkkxfl/igv47HC+/gwVkS
Iy35e39/FL3o7oxOU9wrT44+6a8fPTE7M8LiyVGk7EQRwKddZthXf3ePsVh8
YGKBsDViMTsnWskVTzU7KBjG+WDGKcQSqXvmJPPyuiVWKlsNw7mObXG9WrEm
CH6ZXgAnzDhGjwejonTHCPZZeoGkKSjFCaXZAPA/5cLvxTXg5Fnzq6zJrdjy
aSNrUy/5Ent1CgBO5qGXtpTEnyXrt7/7+u3vXt/gzzd/xoH6e5SyqiqpiMLx
25uC5pv/YQY1EMzNXmKh+T+vPPy3OnB10oIiPt5++5uqXv5wTbj5g87+lTk/
aka83h+DhXnUGfBRhrmVl4Dp24pNUF43Q4X3XBp4tQjv3D9Rg/zv68LQi76p
pcBKTdOq186Qv7X0WP3/Jehr4Qgu5v5Q/qbR7qnue2lu5e6KX9eszm8dWK9j
u5boZdejF2fXLISoYveV6LQZpci+uNcEDytty2ZU5O+XMiTfrrAC3zqD/+63
i3cGvq1o+3bhb7+tg+gPy9GfP/qi/5bBgaGz+7LeyyZ2eWPp/g8Nf1tqH/j0
WL2NF3xqqcqhpnp+j255T1XePinqPcGO20vd7sB5zO3lXsl0t6Wmu6KiNT/w
BnOfsgQ6JS1qoBlmjXuYKzpj3gutYVsQJskaAUJqFCWkOU/CmHLk9vdAB0Dl
B6vASvKITkHPyEFslcyn3Lmjx0nEjqfioIzaio1s2FEXtv5em8ZlGf2IHcnU
YMZpXyRBDkveKqs7SvE/pjmmCEJVGEeRBgRPWpafxW7ogkL1z90QJdQujLHR
Efu5ljZl6uVgfegB8/F0vGicXDUDY/3znQAFEFVbxFjlG6NapYipNtq3sKOT
EWKek5MYJaVY8Ewrb8NULwlsymFDXnjhODKBVx2r0llTpe21BHOrjJV2j63G
pXJvWk+7YsWcd3HVnFwffsKQKnWKdCjJgIDmPLLmBeEAdoHFAxulJDMDGfdO
KB3TWTphouf0P+I56YVSeVZb2TeeeZYWUyu9l0Ox0BA6O8Yay0rFlLpZRrdD
O+Q+uuwU0y8Vt4+3CzrOqDaGzgO8bsvPD8p6zw3KuqEyctz1VUvElU9O7ver
YId8RHvBLjuIBiahPSikmTGaX7l2nDNiRU5/M8SrWgHAEwawu6aDwR+S2Z1C
ghbWY3jtA7NsgYOK6zsHnMUL/lWp0VKIV2ltoXPv/AUp9OYImQ5YKy2W6dLK
7d6NZmHJNuuWjLNQOo9QKGHJoQzkMovozllmvmMAX3opK3pbdXn9rhbcezZY
YNPf6gtanteCHbhVt5zfVYGy+rItQ/7f80LO2wjVy+Yi0ClmNW8DrLqoMtN7
VRvAW9j36hb2TbGvajayGptdbhs0W+gVFzUozLBqI8xhs9fBVBvtwLt1C+Xh
7WqLU/ostwj86mp1fWqL5BgQFpX0Wem/kq76nl8hBpNvFvRbr0ZM48LPgaYQ
gMeg0STplLKGWu025rQJ0wxEVs4tOmIVSTXXglMAXyOX7i5F1IeXhynddouO
xreWTvK2qHfa65SrNlvHEYTvw+AszIY0Q44hchwfxJNBkuFtlm9RWzyE3Ag6
F3zluzhJI0gFfPX9cYS44LorkxBryYSjwYyRUrhetP3YXIIHD/raBSaw8NxE
hhFAPjZhbhUaU9E3hXVicRfglcvwArpSdZO0r8aNyCGe4sgwr46DmTSzF7x4
V49eEXzFb66db+fBMWILlXq9HO4YQjLgUvqM1K21PQ9irNAypzJ5ZZibyVVS
MAJUmSJEl/RyjhTKl/e8KkoEpCmAZMoaVRoYYOeMAH9TdI7Q6ZMZoKbmEXbi
lj0q1TyiiToqppQSKqqY2E+d+9DmXT/vx83VKn+tA6yoamrzORplPVde/qj1
1dNFB+yigZc7dN0Rsa2QRW1N8PrCM7gtVjxnpfkq9bgrpAUXIq+Wtk6utpb2
d9hklRrXvji4SGC/ynqVBivJoU51arPJ6yZctbhFKV66XbW+dGnkV96fZUHf
4nRpKvD/MZqudLxRRQvVdaErSKMG2xaCpanF/LNI7vfppWEZRzvI8kzJB7Bi
W11tjYrEv5jruNhvvL9WqFtcTUjuzFesOFzuuGqPOfWFFSXV9YW/lGQMxWfl
3bRibWCPuxQV5ysQQUW3Lna9Gr6KguoavrVE0nA3rVCbt7wFVlRxvan73Tql
cXX+1aVxK8AsgnVlVbe40pW27uXY0sJxVlSVtfmNaMRBVfDF3YVa8XiFyqk/
cRyE++KmuP7IOAcHX/yk2pORdJV7JiP6E0z0n1GTXDI2kpc+hTEY7+JcrkNB
nRyLa22anEeX7BJN93IPgsOjx3Kb5Wsapr4Ce2Gi1+VEbr74UsrmZ88caAqO
q6SPdO/vmmtlUMkiLCyijpYwCqrsMWiAWDeTrted60ATmoH5SEZ5Sr0kpK70
96QPUF8jrsGh13LQvRgF4CXWcUcpVyypceN8TJVThuQgmmtOEn3P8YDvsJ8x
6ED9rsY1GL1cS4EQeBg0QMAK5HS56fd/fxcXJwtB+Z0Npuh2j8aLWT5Nx5iH
H9S73I6Xwyqg7yjn4eehOzoSXRXSYCZ/pywteogTaWqFiBeg8VGhGfmiFATD
8zmLYpq3lrPIHV9XyVyJM/T6Xow+WZVKKsMsmpSBZzJJce7BeRxdBF0ejBRP
d6xStEkBkzIJWRA1KE0tSegLQCtcLqJqRlh3FobBPDsVeJoWFqsnNV+rBDFY
643id8TRmijJr2vehE43i9+t1Z5Yr32OXPHea+d57aPq585BuCZCRHC4T3kw
X3nt9N1v/rW/t7FTEBL6e5s78MQ78h2ID/c3pcO12gPwTaFN+b03zvPaR9XP
nXNVZrkQ0waOyu+K2Knrbk0RQEk/X5X6WfwR/HFzC/9CHC4Hf113Pyyq3J1P
lffKVHlvPlXu/oCosrmIZNfPBMS5K9u8o9Uc+4qf+l50PbR+kQtlJVfcWhXC
K1HYQvidv/t7W/M53ZbldA0hvwLVNIbcfrcE51r5I5iwPOsa4JzDoRrC9O4o
ZD7X2bJcpyHkN0MhTfjEm8ZvXjNHAQyCDAmarRR988rBofrdKldx4wpXcguN
ObNK5StVrVEdcScJnJKVj/TpDuasnEYkkc5RCnGyDyOMMTauoii+s+J561e3
WM2hwlg5SJv1kjs7/dFNlapZ6Mx6wiFkrLahmK33ja7i1nEVwot4NMKuSLXi
yOrpGQYQex6ZdGGIpQmpLh0HNh/uW10OewCNhh8AOug+McWbszg5T59L3KOF
rUdOpSGuA2CQguBI+ZG7TqkuqLUQO/5EHc0Qex+d8/WUi0e6vpIimZTDIKVf
GUvoFB1Pc9N9dxxyALpFCysy0TD3dGrjfnt4tCtxf6TGHGOUIgChyFYdBIfD
nvoUuxoeo4uoNr8gf28TJ4rzSyfpKD29lCKH4THelNLdG0JAMyKayadSMHSS
whp1p2mXfnEb+KoQemaTqgbwqD4U5nk6iGkvKNQhJgHlamlY2K4D+BmFlxQY
ytPHdnyJnXKJBK5SyvUDLtR/ncpdSpAyEVUYjKMBrEGcj4UKHGsEEw5O0GJG
iKjLcIuORuH1mOpOugAK1Tv0rmwFutik8qjwfpoNae3TWQ5w6/RZ/yuQPzvA
H3NKVBnGRII641CZ0SAfY8j1CWJafJLxb77SzfP4mK/GFXzOamC2lHUlzqJT
aV5jp3jKZhofd2zV4St6394T54vDSQPXTfgDx1CDiIM5vsDm1tgzjMaEOspw
qyURYXMRTX9aSD3bsRfSRW7lmHzUUZ2sGFLlUq/aaXfd342pqu7uZ64Vwlmw
fDbO1YTlELHCSlwrTZgMo2L4N6mpSMakXcW4QzcIyeo/X4QJOjPTOtzPucmm
UlGsgbzRC9zIVGo1t6PremtnjONt2ezTcFQMdiYWPVR8MzP7leJlg/GyGbQ+
DGYJ8K+2ZhnO0gvXcwXn0pWCo6PZOKkGw1l7hiUcE6c3bgj07mmK2ODSuVJ4
hExZYl4r5UTuIF2H2XAUMYcw5iJkWkyo93d7fvQLWmPYBUKcLbAxc22ZkuQc
hj0FzA7Gt4vt7Kf0oqMFU4/DPBaLIdl5+ISrMYFlaDl6HnHaY4cE2E8jxlCU
F/EYIEAPI4ImRpIIkwhYy+iySGIWoQW63qB1lUUlVpMHGxu8lE6uEG/yOnO2
XpVmr7NSBAStjS1LG4jjuhQUTrRNaPNBI/cklo0+QxTOQg5F1ebfjmS7kCaY
p1WyOPThV/JZMUkcxOAWJ4PRbGiD7A3SlClrWMskg1dx0+WY22JERyIJCIMw
j/xqlk/TGjG8Mt9U8y/rfl6v7eN6Biyao61Pf9nUXyi/+1OiAVl7lqtrAC3n
eL36l3U/3635YCfrml/0Q5lRcDewOsrGRu+OiP4Ef+Xl1fcDv5SR2BBo7UQ2
HfiDzd7dHyj8UgTgPYX2g9JEEP93fPxXam2VSeCu+GXdjxOK6XyUqf24Ja9E
EhsFAlDaICJWknhfKCL44ZE0Y/uOQmsmcqf3oUPSP1z4twTb7wu0W1Vb8m5v
w4P/B70l/7501/2BLcsBig6KE09FTLlPYkXwiKTD+b7eX3zx8/+vumfZbSO7
cq+vqHEvTAYk1SJlu63BLCRKspWRaIYUOxMEAVIiS1LFZBVRRUpWGg00+gu8
mAz6A3qZTYJgVvmafMmc533Ug6IcdzIR3G2r6tZ9nHvuued9ztrHnThaXbdX
UZi36V/CW7WJnWgnV3H7IaTMPMLWUcIw4LFYhlGuzJjfHFGmkl8VllN0NX2x
L5p69yiRA6sQo0qH67jl7GgO/Knw9NwBsDQ1nDGzQO5glFhrifJvZF07c4rz
FPkyLdabt8wSGTxBSixyiPHKzDQ0NecADMoMilSMNjNisdBMwcwsZZcDTpK4
OhE/qqQJbi2yDfKzuWXZS9bUEpCEmosxu6ULc+y3yPQxX8YZ6AwnPgPmcOqr
Si4H1lSvtdBJGXMfcw1Ejg6w8jMFqnO6K1I2SNeAqVeRRISnIBTm6yvhaj1x
AiAawQwHp7AvM9aLYFdJcNgXPKQ5zND3+joGhGTf/Of4VTsPl+149px55mub
vdJie7rMw/sbbEge0CjoR0sRGIzwobvAFWTWeX1WqaDB7PjV/bffNjUmWXRV
rFzRLxkvNUdilTzQom0RD4Er3Yv5gyDbbINLxAnKdc5Wu4dRNCqwiuv1vHgI
WSdRlQaPPDo4IyALTNybZCdkXaWR13jBt6SAcpfGjhRElgqqDsnTaLxbdEIt
+9uvDgdvguNwRTpF8tah2Z73vh4OgnGU3SGWH0dzEGqzB9zk0Wn/q+7r15wC
8NFuupu62X/5EumeqsQEBXKglTMRsJ9GQuXAA9XM10uNCfF1QRbtKkhpWSfA
ZNcV9RnDrFdJCVcFEygF3YJzr6pYFgb34QMfwBi9dEQ7KEkDH5bs7IPxIIVU
cvP0vq36RzMRR0ckgQop6aKrcxpg8AzqfFjXK300nEFIUwTtslWMETZZcI35
60LJX+e9weSnmPTjJDgfDyn4x8l8IDruggDd8XxwkMTAbn/CJUnJ4yhvowsU
31GLFZCshpF0AddGbeTqywrYLNOxmDlL2WmJkUkHpqPrgsOM3MY9JPokUU92
huhRlUSiN5bMouH6ZiFa7Twy2fb05mcyF3uqdVUUCKsQTm/j6I6PdxYxiUY8
fr7G2ibz8KHtAea5xBWtp6sC4YYlv977qmuy3dKD7muuW4sxQdbRjtNhilse
EOTNznZoinAovXXry6e38A/j8wYUQOhxtHg0w+AF5m8x+nbJjipKZZN1FtNt
mvPj+//lwKzhHOjeM85Z3gVPHAFNEcYby1y7BJ0ehVVdnvy7uYDMRGDxcCbc
6bD6tahaKmB8dj3tdV91r+Jc4P2FDBnsHQTjW9g5RPchnmDgkO7DjO7Rxnh4
2uREMtqEDvm1bRLnTFPRPJW5zJ2Ni9OIK8Y22Auyp0lqF1/px16FQoXG5+/E
QGb7CrhINUGeeBJBUyQXauXC/URcREQxnKbEBl4b/zRSnZ8ljP9AM1tsPFBN
IcX3iUI+TkjrqJ0QCMSiQ5MR9kbcMKFPBS32iXYPiYYzGV0F4Vx93s06hDO0
iiJlOo063/i7MTBMCGf0AZgJTEsM4+MlDX8FdCiXMd/9oj/2biSAqckPQ6Ye
z8zgJvmEHc3S3Cj4K87IiIx6kjzlA/qpAh7AEomUJFJtT8nHXUzXdolDadmU
zEbTnaX3eJNkxC5zGmKgg/ESzQvsn0rehobb8mUAm0rZVAf0/EORZW2zLtvh
W5m88L7hvJNwnt7QnZkaSzAdrQVSBnLolDNsoiSRDeHkpaKVjSXIsHKXOd8y
AZWTNDOmms0mCqNz1r2GU2K2GHN6JzNe80x2Sze8Iu4ywOAda0EUfs+umGZq
88m6FGSeZ21zUwMBlzPfcYUpsrXYzw25RUImB6fNO602PN5YJnCFD01Rdjj4
bHljOnJJ6G/smyFtBuJ+6niGW19mpTEAIhqAYACDyEH9JQbPmrNKMKA0u1O0
uQbXQDaJ2ovj7d16npDlOJIDuk4M0qNd8EYkBEFiQFYQUNmxdzd10ukzx+Yw
5bmY3omaJk62b0dlfxVRlu8WDIrE0l4XakTu8f7xzQY3RMsNm0UMIjEEMJ+M
2CZ3lVB1OuBwmuVmUJh0D5T/YjeO0/gDfO06xFtywbeEfMduE5iPuA0doK1l
1PZ6uqae6hMMAzfwEDyjVs9awT0aftEOL8Y8vkRW4QO7bqzChE81YX+8YDCx
8cayg+lisU7I5wSFfd4x4pp9v3rH/CeneLaOzOHEPNp0ejLkpTCLdmhMz8ad
AkVgc9fhZ8/ctT2z+KsCZZzM9GbyQs0dOb/tuH8nESB1juncG5QhfYZ1PpUb
YNMWgrspeMqDu5eATMsrnirMc6WBiZCMkmAT6ExmcPJFQTZXmBsz20YWNQHg
y/XKiT+X+wj2EfCAh3OT7ZkMW4DX2JaxRR0nzB1LUOWbJMtIdeWAjg3FKOS0
RHIsjEAOAyjdogTN88Hhimm1iZzgNCjTeIVgxDogyyOw5bqCTXCJnOnRCtpu
f0QSKtgOh/nhMP5H7IhahGArSmkpJILbipyVeFD0C1BtkWcaRR+s31l1QW7V
isar31Tm9ZVx1+z9ocZ2UV2I+lTuS/LRIZajqOKpmKfa6dXE2xWtnprtXTMw
7dR+6fmv0Hz7SxkN+xFyoon9AbJJdK9+F74h3h4IYgWwYzzqrHpLpkJgNiyj
xFO7hMlh78wMSiBNqoKCWixtYm0N+6m4T7B/yIo9OYSJQt8rNBy8uVrmRdAW
Y0sKZIsRkBYbotfNiiiY421TS2+Krhb0O+wgTQKe7XV1RuIbtwCCTAnexSFl
NovZf8rypnLaDJvuGb5JpDjuc0TMfUqRTtfAq+KtzPI+roFEsGshqzHKeAT1
y5qNF+hhEkhNyKH56eEQ6v45y6xGBJRsqpl0UpGQKyNSy/LmFE8YYRGXAMFp
Em6oKo/AlmV4Mc6ksgOpkRhQ4VWuEUzIARdqjbRczX1x78L5Pd7VZLfIrTb9
JmXKg/EnrcIV4lxcubPXnrQiLCysnEekjqU/o9X0NblWsVkHhGoIaC9bAqEG
Aiws+kBAP5M0nAFvPEeZSRl5WoTYHLpHG6HzsrP/ROBQv/AZdvOkL4/YwdD4
aOGl9P6BL66slvqJYG5ivPAOnqIOhFHYXOjMkmEvpMIUUM75EuFJqSITDmdL
g8kkcej7JL03XFe8sidP+q0/QHR0DK2dP9AFWvQkQo9GXXaYsHMiEhfVrEtq
YNpzw6EQG1yFE7goXBMalFqedyxC27ocVoJTjAseTEmel6l4cFFnIvwAQWTh
A/82MGITUg2ImI20BIatYIxKu4QVnkKp50sN6ApZKTKwB7aVZoJuy3SxQYCo
4BzZFWxb5rGWcySAb8881nGOylRuzTxWco4q2G3JPNZxjlZ63pJ53Mw6qiHg
Ee5RrQMoWMkeGNEQF2W2WfUO5gFmIsZeEF1JGViQFH3MVHgIXpyxXaeFwgrw
mbz2EPVBswB4g7DNubsUbndofxFNjFrE4+QaJMzEGpGtC7y1RoiiHakUkjNS
cbFeXOzAqVoeZjEmWrtaI/eh2EwCcLgGgJpVkYGXCMqKCrQZ81/l+RfLRrAi
XcIqe2jPMjJEYKeoxJ86SgTCo7s0noXMqajGk+zpMHWnOh5DrQAex50VQSjp
z4B0se2DdLDRhykRkpC08fltOp8Vb6wWER/RmCEHRLUNZUSnYx0cDRDrDA1M
czo4AJU5GUUopFzrXCFIPerQIuCs1klkxE4i8Sj1kMyeMbIExpCB3dAi7HVP
1j2CGf/O2mLiGR3netTD5bEqhKBr9q/no2fOPN6iDnnnUy3HF0iNkCpfgxmK
8stuohodiV1X6kD+8tCJ6KvEwR8LWkVOeSzh+armxRyfBbPNaVf1BemHCrYh
hBGZhljey+ObRD9HVWEGmL4o0BvWTsJ5wWt8GWbhTRYubwn6rs5ENwDASmm6
y9PPHSWP6sQJvPYgUdU1DV9EeQ67end4YemU0daKBy1e60koHJ5QN5P03wS9
A6V/YFMmmh2gQ8eJucGWrZdk2WoK62NKWomNXNWzmFi+c9M5oAn9zEaEUlyN
0l9BMM69HtFwqzB/TzxRSEFTnroTu0KtNDped7TwGLXHXZumqq55BrfY/JkI
f2aNkswRrZvSkVpS6K5EvRt9QFZdONtrmB3MlbNMqkuBdyU2O+qM6LFU6NfM
XdkF8QQprgZRpYEacLwIJOseQKF5oJ0FQRvpAm2pDSFjxxNABy4ESaZqJlQe
jFrbdaIBU0QhHZuX9omVA54wEiUFzDlqKyISQB3EeSouGVX5AVn2YKnaGFa4
2pyjwmNI5uID4esv06xyDkxhYDPi0ElMAaQk5bg8v2sLnfAmRCUBzX1X52Yy
MlTMwOw/n4xX3Vdo9zYmMIwIu8PPgLThbWoqK+JB5Q9XaTq3uIw6eorOaptK
htRAqRJaqS2twSso+rCSngq2AYBDxzl0XH+TzmqxmS40XHL9DnQZK5/RHG7k
KapFAYJ4zgi1zXzxVJkpX0fhyhiq+FIJZ7NMCFosmgMDu/Fpn3pzzTL59bSd
hos256LkGCLqB1O2oE2UfQrYvCQymnJsOOoCqz0Qo43ETnbORAoBMsaJXbls
3suXmHAyOPSqIerkTJVChAUWOY6Tdbx6kB76t9H0fQufJ2jFv0Mr4NeA66pE
Z65bTmNxOrl0gkY6BmHZ0I3wYC0XabQRNuoa5tFWFIfuQ1arALXHvTPuLKz4
EklKxkTVzZRviCyimi6yeSYObX0l7ipOEp0gMHrOQt3LCjJBc5JDA6PnK2dQ
6UyGNkFouWR/ZWGAViUtRTbU8o+m7icyOGhH4aNkbYSOp0zglpo0WXB47190
v3qJykP57dXePv4GSxN/lt6LF7XglkNFo5M27CEJF8K4oFePuZV8OLroKtND
msibNtNbi7SKapUe45yle9P1gz24CiRU7cGvoVooGN5qy0lgrgDjcDU1ln7W
PwCVkg6IWZD0uQ8ut7vruKAwU6tZb4Td9ZHEU0CpslkHj7RGzoo0mC32IMHT
Q705B2MBJFjZ0oyDh12VRhEHzeYz4s0VLOslQOC8N7jwXXbIzc4+JOaGlZgM
BNY/rNmPGDGft5E8/HbJQc+5VlXWmrGrXvUlxuG6AfNpVWmq0Y70AU3uGtLI
4nJ1b5Z6ONvGMsAzYEJhq9rSsh3PngXhSqQ2ZOfGghevOj1ck4WKwfULRWs4
oyirhUU0dp0i1PyNHANdxjI35QkIUW6yyNQQVlKYUhGc+E5w4jZNUvI1u5TI
2DBxRFmyYJy/A/45iVdpphWRge0WMAp9sV6gLoJ4NP9179WLsuu4LJVcK56j
fNW+p3MOpFc/9x5a1wPgeVfTTnCUsmM2VrRmPX1Iq9tdAljgb8VrFuDpNAHo
btOZ0qNXr8injhh3lOvgXJCuXKVibS4dUZZw9iEdrvNbpVov94lPd1an21ra
1QSLqHNFbw0zr9pYUu3RVuKdmK/IKJEaHknw2juPT3RQ5FnkFs9wEOEZUR6g
xAtT9541TnmsNdV3KMZj1WYSlM4OB4d4O9uqWU6WO1P72dRmJ+4BCSV9J/Yw
rnMNJ2ZNqbeLvbFvsCOQRTb5guNo51W40uP3Ehf6zTf/9hig2MGN/PeEp6U9
X6SzNQYxTmMTUO4ti6trkztMSKeHlBKsLM1FtmXMJ6fIKccYY7lm65RryX6W
rtIp8qR6hQ5OLvvvBqe4AJIOEeuoZvPJ2H3x1Zf7XyJ/hUQP+Gt0uNMviacx
FleEsKttp7dGJY5zmaGnGentjJtw+TPobszPxrfRfB40xuO3TTvJbmEuZrZm
Mm8vL4fjTxr38nysi97ff0mbhiPpchnEpmA8O/BL+x5Bz0gQNLA9rFLaQDrg
rP7Gj1a7d0EPh56rmeO1GOl9TBYg5euotLuRTKo60S0XJz+T04/kDwr5N6ei
gPGOFMNGSNVKq+AQS/5Bi1Xz2EmLYJG4dHYIVaR7IfvSlnh+Z7Q8st3DXA9n
cJ6RcIUzYEVyyWJJO0FhMr7444BMw4lnN/VJA9n9mDqTTULRSaFQkDc7ZCLA
CJWW05qioe2qWHnDaukVblFu+CGjgqSzi5onukniXCsw5EED+d8kXMNtkVF1
BLyRYJ+QNSIvH2bvVirlXcXJzCrfEW0Ar2fpQr0AAA4U8OHaFvjSa3YM9ZtF
xOXwPKcoGgmDZJMPyHKXGdDweXRDOi71GISlkdULCx2wt3gZkkTBEP35kiKx
St8J84j1GNrtdnAFIiSS7ndL4KzO8hxoOR9HqxOM6amz67hFlPAFJpiaEpO/
fHPeP9jZ2QMZkbgbDqffVe6GXH+ZUlBFiblizDOTZgE6Kt8TWg3lmbkP7EQc
ls7QdYD6ijW+d7zzpSv2xU3hgqXgHEYooC6NwxlML2nukNpE/PDyNbtKZihx
z9CP6na1WuYHu7s3IIqsrzrTdLF7la6n4QxktV0YgrvmWvTU9S7DcXf/y85O
1wESg+c+IrlfWWv4QqBzGmf5yqaiuAO6jcQJLl3AZr5JDWgOeM4TVo/ek3Pu
HJl08jwgP9cclZhAiFEKFtcGnWBLmpTADAQ4QqrTuIhmBiwYUwA8RmhVhM63
4q82nUdAeRtkOxxFvw/l40GkYgCrh9lLaGE2wSSWdSaHQxByFATExs/jyJnT
Z92pvdc7vQ7W9MiUEqDxRfPgtA/HGnFxtNtnSwBeVdjusG+klf6JGPN/0qm+
6O7sAye/zgiZ5CrwJIvLgbr7iHrMzaVKVheUl7lCjM1jQ/cI5bKphP9Pu6Ye
XEcs8QoJEl7ddn7wyb0jzTucZmnysOA79vDqCo0TgoDffBF9WLVDeMYxKL03
w+FB0MtmwZso0dKyQ+Au4Jf8Nl6i1gOFtB32FOsf4IntoxWeHvzi7EDzj58l
lP8szdgxu3t4EByylRX+4mfwNVdKobtdiqXwq4tTeMcEnwKFUwnVdHJan4ri
jD+YjPGLNbrNrfTSxIg5dL12Gx4dTQ6CozCP0DQJFEQGPHqLT6fvb8M11+o5
GnOzYLyytvz+yUHQV3w6AQ6An56N4HG6WMQrpB5nTkjcCNO4UJvBAYFJaT4/
TGEQrqOEOkYR5OnN8IDUi8hBUFZwfjoe8kDs5qtLRPxUZRS3gyX2IwwIntNt
b1bZn7Sp58K7qqEm7UlVywlwkk6zY9hCjFekhjL68TEu69ixCx9HCd6Ddo0s
dh0P5GMXJsdjnOGxr63Uz2CiM1grejpw44k/kFlo1B+OABWj5JZdjvpcd2i4
voJjArsyi+EKxhljlDN9cQoIcArHZGUw4PTs6MANFXL3FTGDGr0ZjmCxdFag
4yHpqaV/dz9vBtDXzQBmf8SfXcIi8Vsp/439D4U71QbtSW0T3oal2Ya3vzwI
3kp5MTbjHh8EZxp3zNty9gaGpDUjL/MG4IqaC2/QM20BtM9/Qwqug+CchKJu
8HWckZ5vmOHF6CM1acS0aW9zU8Tn8/AKLpMxpyGfUYAWvbyADbmIZ2Y7Ls7S
S3jCqhM7TfRZuAXYMEpdDM9hOyhRohFX3AFQ24/tBkAslPvyyMNghC/ueQvl
SUVbuOUpmzjIgdJoaBuNhLMnuhnbrsf9gwLL17f+bthiCOTFpMw15GWI5GUY
he+rKcvw/ALALZh9boilD+nh+NI2MrC+BH5neQtXg9f2F3h8fwF7JqHxLh6P
DqEbRm+hzu6XCCl+eUraEowpped4kkbijlh5jNDN4cACzvGh8vFwNNERzFEf
A6ozNF2iIdfO+Bi6tYHTizATumlpyPj80DY5B+FpHhyicpLcdLnBu2KDd6qo
5AZ4WY0jFiLrLqhxezAeHwJNGrMbl48IYzKr4ffALsei7XUgxV2ML2Wpuzqd
y4elzGGEU+BIWIG0PL97WXoTYEoD0jix+gvwUhNz0G3ET0/s0xMxtGiviEy2
bIWLApeAO5caYxSMXcmc3k+OLw5w78i6RcTfAowbwLBE3U5ARlzax8OD4t0z
GZ66z3xwT0bnIKUFkzlcX4BO85hE23MQD87FwcK7R+mbr88Ru5Vgnae4gkPg
qLwFfo2kQ9tUkhAif5vI3tcjpwvdEjy49rLhdv/lTejkA0ycI2Cq5vZFgDbL
d46hGR35+S0OwLHGwCnGSHMqIo6tvTq4yuKIuP8sna2nGmb6AnWMRFoS0y32
wu5eKIRTKQ8kz+LMWsKRTjHKWXSt2A15pqjmHX3SkEMXrSWypUHopL1tmRQH
aBszhgPxTZOlBOyOZIzvIgc6lvDUuuGFujjUFKDOOJmxdzl2Qep39CXIolvc
hDsviQwqRK7Ztembby7H7W6v8+JLG/b9n9FDcLSO58RFHM3T6ftcMts4bWWl
rOsr4hWIf4DtLWSLRc1iXXBhUqm4U6Hw/ABQWQSNF2/GTS9PMEzuRiRwLrsy
11jTWPkgU2d0sAf/dZu6WS7cKXiAfY/09sI+iJe2RzGP0O/JKS96G/k8ZjBH
74HwRlT8bJfCjjiA0h2x4+YR/Qp1yuvVnCAVWhM9LNf7yEFLq+I0AWTVtUls
xQ+Fh+T+26nOvv3xqY8/Szc0me/hLjkNTMWrwYn7y+hU80fhX8O+8w6or/3l
8FTySrmJpUwutB+e+vizdLMzSPL8WqY/SCL7z0z/Cb8sp+b5erZwcpwjZMLr
Hbfywqb8Vn8pTWCbV+Vu/1j/asNX3+0Ezs8gXNuFhwu72mCQ029eaw85TKcf
ax/XfFDELH+A70GoHjn4cmEQS/4GxidQHPI/LScq24Q4lW+8jwsD2JH+8Kdy
Kv7v9d2fd3yiw+Dc468IWbruZ4N9/W6wv/O3P3z8l/uz45BgH0RBLZQEUCXA
erSnHrEGvZo3g9dBNVkbvAyCjnnSqRj5+4lXvvDHxqh5OKhK3vcj8oBB6U3l
40ZwPAiCZsVwLq7+UIu89Wi96ZPfmifPS9nxvtLseHh5eVc1BRDIpcgXotFV
5JuT5Y2lDrMYgsgFWZh90jERH+Uzceps8HL/xWtO0Vvi89gnbR4rm8ZKa2s4
uQapLViEv0N+jbxryUlY1wm9No3/7+SkFVyM4b9Byyr2IuPzSlGGUbbIoSHw
PJ4c0MQvg4ZIt6KWw4cDfSidoJpFaqnLOgx7xn5Qd7HnBHubYpirepxKJ+JL
RdmersgByKgcPL8DtI+HDFebNwQY8Yux9cghxjGmHCCsab6kQEnk6XVxQQPD
2dm/R1aojdS74+Ky2fEh5INS1mocZIiP4dAwrAagTjiaSr2Urf1nQaVkHzRA
6LdeyUOVEu5j4CHFgG3BITCG3VMwI4Ay7Jcj62LjzgV8eLBeKkgOkftPxB+B
zOiY01lcEqcROQWhh0I4V6uJ9DM5MSymq68VBj++iVfx7zVlEX2vRmtMFZE7
HQHfRPbEfAUywoKMdEOtgm4g5Opwg0bfAYxcNTxSf6jrAuCpaZvhVgUuTfkW
2FpEworjW6vrogxiIlGCmKn44CmWuRvG6Vn6+yhxnV+tu0boqcpbAeqBuFAA
rN84OKG/9g3lsLHWV9Ql0ZIwUAxlKwOckrgHWF2FOh4I1H5kpVUr9sj6YDy0
VKtU531uMn0goAWc/dR4tg40VXyIdkL0ccidM8BfpZn7pD+wwYmBk5yezSHs
C0nZ+fOgHWCWu/lD0LYpfs4oXOcEJS3YMpEgfrqa9fRfHXdU96Nly/xnj5aj
NZf+U1qXucqKXyue/q2uFN7HJ3aEP53K2XV2RCqqrZZMxZEQRSqG6OvTApsR
BMRpAKvxt6pKeD98wvR/Wzn9538vaP3nlbmFy9x4LcNT3boaNevLasm/SvPb
/OFnG6UKr5+UILnuq+I5qJxc8XXNFB/7sG6oMnn+yYaq/6J2qEfLTn/an1rR
cdOqapZh9Guf1udPVWSa74CiePFaxYuC6lE0w57A0TgM3sY3t222bowiyULD
HPamstNfVHBEbqlg/+WLN/0me6gb1s84+OKVynVJrtEVkaWMe3YSCjBeC4Mt
I1ew6H3pChbQt6OB9ASKChsB6VOb6mvKnDJzFfIdZ3N2AyOEva6pB+zasYPG
MbBm0hGyvFbBasLa8FJBzpi0vT3bBLmLKJmGy5yyGCc3GoA2i5yHzGPbZamd
BkD15nIoBmN0+3sfsiXZhsiJcGE/bnZcEHoKEw+KtJuuNqWwkcoxekpy3dwK
xo4CrG7DdU66ZPT3dEKB2GNq6eTRySN2WkQcqHHbQZlGv1fJhuduRVVEM07x
bPYkpFwAGWZWZUd95HelnzyWQPk489lODSqptXQY2LU5rwpqzxpVHi0Kk6YO
4GOJJTXGPZXj0zWeaNC1iymMifq5qSuW0CEZnlrM23e/5To31byqcn2fQJr0
6lM+yqOnRCCIMOwUlFKV7EuJqtZ+9Gv0CPpN8OvBCP8/Ob74DQdlbPwIfxpq
W0VpctZ0Rqr8aXiU9JNX4f6IVrJGfba3V/3GjgzC5xYX44+i0K1Sq42NqncD
c7WFmsxR7G8PF6vA3VQftOqDICh4Mv3TNbJP1uA+db2OTfxpEB7sV0J40Kto
XWdS8FW57p+Onc1kK2zc5k+Nulf//M//ovBFsleFnrdiWXUIjD+/rRzj+Scf
7yrSKO//blav96XVJJfZsUfYt3qVn+HjkHCbu2kazecUZ2L0f0afyskplFFy
J9KxHflcA+c2Jxt2QrH8ZLhlNlDLdPIMXd2eYfouRelnfDmDxtHRpOkHzji8
lcPOlXVEhpfjAe3Uz1Z2+aJhsj5IDtMSU57bZZrYNKXY9konKOpHmNxUMxSk
omDsuCtyOm+MJk1OoMYpC6ZzsvWnnspUg3A4CEQmIxG7AA6zAqPwtDCTKYmG
1cmbC9+pAgzDP3hK1+rVJd95s9bZeAORWxN6RtYONJoI4gQBq4mD+/AOHUQd
KQLxxtPtUoIWingJxasyaNwMjpqVm4UdeafC4bsbDh/MtTq7cGjcO6Tpu0h0
ivPynCMkH0FOb2ZxHt7cYIlKrY6hud0wUx7JB4N0ZQv1AshNrnc0tkhR5OB4
AgJFwcm1idiFPZCCGxOOlnCLbQl9+LjoxEsf0xTFSRM7sl+i1wv716PXC8+t
b6YWr/Jofu3O0HEDYcGgQW7GzaJTSIN8ipuF0rA99n1ZxpR91wUaJpSCORIz
XGbbMa7HFmZUWrqlVvLv/PMIM/yxMKmNKhHTZtDbqdJ1DkbbdlGyghr+OlCd
xiOaTvMjZ6o4x50ttZlbT1BUAmVGZGugdQuf/URapMIfVYLWIMBmnZOqYP8B
bWSyDJaNDf/wZ/r/nzaPCK0eaxN8/a92JLeXaj9+Mp5WDPr9xuNe8e6USh5W
vdhrTyoB/VFQRLj6arFxM134To7qaFLZ4ke8nepICtH7jf1qJ8zXG91wPZGp
fkdgqfuoQhhVsJSa2K8f3WU+Mf772p2u78wKu7Y/I3lviW72088xEac/eHay
t+1EAAv75tPPMxEzladCxH76uSYi/X3KRIJaVz28vxTvazxAnzLB//6eGK+t
Tpw4822/hBqPPgvV+ibbL8F5us3kkGNmRtRrQ395vM+mCWxrlfnhKfAqtuG/
Hud2fPbXZcPK3/w/YXWKyog9VUYg837syUCPqCKq3Udcgcum1/DELus6j9oE
shjlHPFiEuhSJ8X+W6JqCNm5f0HFGchXLOPA7TC3MYFB4/Qtl82UqLSgcfFW
3Mw0cjRoHFFykctR+80Y/nc5ePHm22+NusL2dYulBpNccxyo+OcJYWfoE9Ny
rRpWk4EFc9TjhGIdg8aJiXWEX5ssNomjvnqjSDcAkbOha2VKE5voSdaGJpYl
Zy060JB3jiGiWnocGGKzYZiTqOYzNiByg8MlVS39EBx1epSMF1as46iHIUHd
qFeOJ231qpp41jky3XFZ0tM9Cw8U/A9XPE+MLJi3tOJvELgJd+2aeWYAhgZL
zioxr01gpbWLmd3VXQuvYdzyhl1qRnIqqLQIlwVPteJCXHWUuompaspRPx3a
om1W0UQZEMvLKQrXmNksns/XWM7G5IEzhS3NIVG3xFJIVxBYYxSq++4wnULZ
mvcP8XKq+e9jnbWefmp8HlzSu/H7x36ULF8OTJDdnvdb1/utp4M1DC3AC6Eh
x4GtTQ1FuGb1YNvJVB+3bPeEpgLq8hVe5kQqGpVWwvv315p9/euGd98Rxy//
r39f9/WOWW/BoFF4/hfzfNOrevuI5+aOICApylq3WHjyzQl99xHJZht82beQ
erznm159khN7r+uYHuxZE3R/xFmdvIFLpndNEsQ5RDGxValymC0nzgF+XO4g
p5Cyuc8nGBIHdNfkASdvUAkjm0n+YUsze1IjwKtL55YD1hLDMFApkgy7MlU0
KIrRpqkKFxEr8ukWs/69uMOkD0cPXJPheqteJGk6Sdrch+Rexx6oq+ZG4vzR
HgWHGuBPPxWbww6dpe9Hk/aelX5Gk93jicU/x85rKMTp2/aenvPiYZM+j70+
62ZSOGMVbwvnrDgnc5b6ZjzzCGCPz2olJj1qwgGX6IoTMPJH/X/5sLmOkVU2
xue6PY9RtI10rZZaPvbfjqXQF7hrHgU/4iceoaq4Vs1Fup1g8sOW7b4TXcw/
784LvB9nmQQOwPKuD68LflIAoTT6J156AUHyc1585c6+q7v5gHp03Zvv2P3d
HE73kZzN7j/i6qvExcfvvp7efX1ztwRPvQYxORPWDZlHM24LIyTrxRVmqPqP
Z9fA5kfPvjUiMGfwyyWbOtVJ5eK9yfuAs7kFpyEmEm4FP0+jefA2nC9B8msF
lyDiEjc/Dql6DEgaP49BzkopeisTDzeMGIvuc5PlzKZdTDjfLtvVKYNEOF+H
UpobRWdOg/9/Vme62gGqAgA=

-->

</rfc>

