<?xml version="1.0" encoding="US-ASCII"?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc category="info" consensus="true" docName="draft-ietf-cats-framework-00"
     ipr="trust200902" sortRefs="true" submissionType="IETF" symRefs="true"
     tocInclude="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.2 -->

  <front>
    <title abbrev="CATS Framework">A Framework for Computing-Aware Traffic
    Steering (CATS)</title>

    <seriesInfo name="Internet-Draft" value="draft-ldbc-cats-framework-06"/>

    <author fullname="Cheng Li" initials="C." role="editor" surname="Li">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <country>China</country>
        </postal>

        <email>c.l@huawei.com</email>
      </address>
    </author>

    <author fullname="Zongpeng Du" initials="Z." surname="Du">
      <organization>China Mobile</organization>

      <address>
        <postal>
          <country>China</country>
        </postal>

        <email>duzongpeng@chinamobile.com</email>
      </address>
    </author>

    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>

      <address>
        <postal>
          <country>France</country>
        </postal>

        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>

    <author fullname="Luis M. Contreras">
      <organization>Telefonica</organization>

      <address>
        <postal>
          <country>Spain</country>
        </postal>

        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>

    <author fullname="John E Drake" initials="J." surname="Drake">
      <organization>Juniper Networks, Inc.</organization>

      <address>
        <postal>
          <country>United States of America</country>
        </postal>

        <email>jdrake@juniper.net</email>
      </address>
    </author>

    <date day="17" month="March" year="2024"/>

    <area>Routing area</area>

    <workgroup>cats</workgroup>

    <keyword>User Experience</keyword>

    <keyword>Collaborative Networking</keyword>

    <keyword>Service optimization</keyword>

    <abstract>
      <?line 109?>

      <t>This document describes a framework for Computing-Aware Traffic
      Steering (CATS). Particularly, the document identifies a set of CATS
      components, describes their interactions, and exemplifies the workflow
      of the control and data planes.</t>
    </abstract>
  </front>

  <middle>
    <?line 113?>

    <section anchor="introduction">
      <name>Introduction</name>

      <t>Computing service architectures have been expanding from single
      service site to multiple, sometimes collaborative, service sites to
      address various issues (e.g., long response times or suboptimal service
      and network resource usage).</t>

      <t>The underlying networking infrastructures that include computing
      resources usually provide relatively static service dispatching (that
      is, the selection of the service instances that will be invoked for a
      request). In such infrastructures, service-specific traffic is often
      directed to the closest service site from a routing perspective without
      considering the actual network state (e.g., traffic congestion
      conditions) or the service site state.</t>

      <t>As described in <xref target="I-D.ietf-cats-usecases-requirements"/>,
      traffic steering that takes into account computing resource metrics
      would benefit several services, including latency-sensitive services
      like immersive services that rely upon the use of augmented reality or
      virtual reality (AR/VR) techniques. This document provides an
      architectural framework that aims at facilitating the making of compute-
      and network-aware traffic steering decisions in networking environments
      where computing service resources are deployed.</t>

      <t>The Computing-Aware Traffic Steering (CATS) framework assumes that
      there might be multiple service instances that are providing one given
      service. Each of these service instances can be accessed via a service
      contact instance. A single service site may have limited computing
      resources available at a given time, whereas the various service sites
      may experience different resource availability issues over time. A
      single service site may host one or multiple service contact
      instances.</t>

      <t>Steering in CATS is about selecting the appropriate service contact
      instance that will service a request according to a set of network and
      computing metrics. That selection may not necessarily reveal the actual
      service instance that will be invoked, e.g., in hierarchical or
      recursive contexts. Therefore, the metrics of the service contact
      instance may be the aggregated metrics from multiple service
      instances.</t>

      <t>The CATS framework is an overlay framework for the selection of the
      suitable service contact instance(s) from a set of candidates. The exact
      characterization of 'suitable' is determined by a combination of
      networking and computing metrics.</t>

      <t>Also, this document describes a workflow of the main CATS procedures
      that are executed in both the control and data planes.</t>
    </section>

    <section anchor="terminology">
      <name>Terminology</name>

      <t>This document makes use of the following terms:</t>

      <dl>
        <dt>Client:</dt>

        <dd>
          <t>An endpoint that is connected to a service provider network.</t>
        </dd>

        <dt>Computing-Aware Traffic Steering (CATS):</dt>

        <dd>
          <t>A traffic engineering approach <xref
          target="I-D.ietf-teas-rfc3272bis"/> that takes into account the
          dynamic nature of computing resources and network state to optimize
          service-specific traffic forwarding towards a given service contact
          instance. Various relevant metrics may be used to enforce such
          computing-aware traffic steering policies.</t>
        </dd>

        <dt>CATS Service ID (CS-ID):</dt>

        <dd>
          <t>An identifier representing a service, which the clients use to
          access it. See <xref target="cats-ids"/>.</t>
        </dd>

        <dt>CATS Instance Selector ID (CIS-ID):</dt>

        <dd>
          <t>An identifier of a specific service contact instance. See <xref
          target="cats-ids"/>.</t>
        </dd>

        <dt>Service:</dt>

        <dd>
          <t>An offering that is made available by a provider by orchestrating
          a set of resources (networking, compute, storage, etc.).</t>
        </dd>

        <dt/>

        <dd>
          <t>Which and how these resources are solicited is part of the
          service logic which is internal to the provider. For example, these
          resources may be:</t>

          <ul spacing="normal">
            <li>
              <t>Exposed by one or multiple processes (a.k.a. Service
              Functions (SFs) <xref target="RFC7665"/>).</t>
            </li>

            <li>
              <t>Provided by virtual instances, physical, or a combination
              thereof.</t>
            </li>

            <li>
              <t>Hosted within the same or distinct nodes.</t>
            </li>

            <li>
              <t>Hosted within the same or multiple service sites.</t>
            </li>

            <li>
              <t>Chained to provide a service using a variety of means.</t>
            </li>
          </ul>
        </dd>

        <dt/>

        <dd>
          <t>How a service is structured is out of the scope of CATS.</t>
        </dd>

        <dt/>

        <dd>
          <t>The same service can be provided in many locations; each of them
          constitutes a service instance.</t>
        </dd>

        <dt>Computing Service:</dt>

        <dd>
          <t>An offering is made available by a provider by orchestrating a
          set of computing resources (without networking resources).</t>
        </dd>

        <dt>Service instance:</dt>

        <dd>
          <t>An instance of running resources according to a given service
          logic.</t>
        </dd>

        <dt/>

        <dd>
          <t>Many such instances can be enabled by a provider. Instances that
          adhere to the same service logic provide the same service.</t>
        </dd>

        <dt/>

        <dd>
          <t>An instance is typically running in a service site. Clients'
          requests are serviced by one of these instances.</t>
        </dd>

        <dt>Service site:</dt>

        <dd>
          <t>A location that hosts the resources that are required to offer a
          service.</t>
        </dd>

        <dt/>

        <dd>
          <t>A service site may be a node or a set of nodes.</t>
        </dd>

        <dt/>

        <dd>
          <t>A CATS-serviced site is a service site that is connected to a
          CATS-Forwarder.</t>
        </dd>

        <dt>Service contact instance:</dt>

        <dd>
          <t>A client-facing service function instance that is responsible for
          receiving requests in the context of a given service. A service
          request is processed according to the service logic (e.g., handle
          locally or solicit backend resources). Steering beyond the service
          contact instance is hidden to both clients and CATS components.</t>
        </dd>

        <dt/>

        <dd>
          <t>a service contact instance is reachable via at least one Egress
          CATS Forwarder.</t>
        </dd>

        <dt/>

        <dd>
          <t>A service can be accessed via multiple service contact instances
          running at the same or different locations (service sites).</t>
        </dd>

        <dt/>

        <dd>
          <t>The same service contact instance may dispatch service requests
          to one or more service instances (e.g., an instance that behaves as
          a service load-balancer).</t>
        </dd>

        <dt>Computing-aware forwarding (or steering, computing):</dt>

        <dd>
          <t>A forwarding (or steering, computing) scheme which takes a set of
          metrics that reflect the capabilities and state of computing
          resources as input.</t>
        </dd>

        <dt>Service request:</dt>

        <dd>
          <t>A request to access or invoke a specific service. Such a request
          is steered to a service contact instance via CATS-Forwarders.</t>
        </dd>

        <dt/>

        <dd>
          <t>A service request is placed using service-specific protocols.</t>
        </dd>

        <dt/>

        <dd>
          <t>Service requests are not explicitly sent by clients to
          CATS-Forwarders.</t>
        </dd>

        <dt>CATS-Forwarder:</dt>

        <dd>
          <t>A network entity that makes forwarding decisions based on CATS
          information to steer traffic specific to a service request towards a
          corresponding yet selected service contact instance. The selection
          of a service contact instance relies upon a multi-metric path
          computation.</t>
        </dd>

        <dt/>

        <dd>
          <t>A CATS-Forwarder may behave as Ingress or Egress
          CATS-Forwarder.</t>
        </dd>

        <dt>Ingress CATS-Forwarder:</dt>

        <dd>
          <t>An entity that steers service-specific traffic along a
          CATS-computed path that leads to an Egress CATS-Forwarder that
          connects to the most suitable service site that host the service
          contact instance selected to satisfy the initial service
          request.</t>
        </dd>

        <dt>Egress CATS-Forwarder:</dt>

        <dd>
          <t>An entity that is located at the end of a CATS-computed path and
          which connects to a CATS-serviced site.</t>
        </dd>

        <dt>CATS Path Selector (C-PS):</dt>

        <dd>
          <t>A functional entity that computes and selects paths towards
          service locations and instances and which accommodates the
          requirements of service requests. Such a path computation engine
          takes into account the service and network status information. See
          <xref target="sec-cps"/>.</t>
        </dd>

        <dt>CATS Service Metric Agent (C-SMA):</dt>

        <dd>
          <t>A functional entity that is responsible for collecting service
          capabilities and status, and for reporting them to a CATS Path
          Selector (C-PS). See <xref target="sec-csma"/>.</t>
        </dd>

        <dt>CATS Network Metric Agent (C-NMA):</dt>

        <dd>
          <t>A functional entity that is responsible for collecting network
          capabilities and status, and for reporting them to a C-PS. See <xref
          target="sec-cnma"/>.</t>
        </dd>

        <dt>CATS Traffic Classifier (C-TC):</dt>

        <dd>
          <t>A functional entity that is responsible for determining which
          packets belong to a traffic flow for a particular service request.
          It is also responsible for forwarding such packets along a C-PS
          computed path that leads to the relevant service contact instance.
          See <xref target="sec-ctc"/>.</t>
        </dd>
      </dl>
    </section>

    <section anchor="Framework-and-concepts">
      <name>CATS Framework and Components</name>

      <section anchor="assumptions">
        <name>Assumptions</name>

        <t>CATS assumes that there are multiple service instances running on
        different service sites, and which provide a given service that is
        represented by the same service identifier (see <xref
        target="cats-ids"/>). However, CATS does not make any assumption about
        these instances other than they are reachable via one or multiple
        service contact instances.</t>
      </section>

      <section anchor="cats-ids">
        <name>CATS Identifiers</name>

        <t>CATS uses the following identifiers:</t>

        <dl>
          <dt>CATS Service ID (CS-ID):</dt>

          <dd>
            <t>An identifier representing a service, which the clients use to
            access it. Such an ID identifies all the instances of a given
            service, regardless of their location.</t>
          </dd>

          <dt/>

          <dd>
            <t>The CS-ID is independent of which service contact instance
            serves the service request.</t>
          </dd>

          <dt/>

          <dd>
            <t>Service requests are spread over the service contact instances
            that can accommodate them, considering the location of the
            initiator of the service request and the availability (in terms of
            resource/traffic load, for example) of the service instances
            resource-wise among other considerations like traffic congestion
            conditions.</t>
          </dd>

          <dt>CATS Instance Selector ID (CIS-ID):</dt>

          <dd>
            <t>An identifier of a specific service contact instance.</t>
          </dd>
        </dl>
      </section>

      <section anchor="sec-cats-framework">
        <name>Framework Overview</name>

        <t>A high-level view of the CATS framework, without expanding the
        functional entities in the network, is illustrated in <xref
        target="fig-cats-fw"/>.</t>

        <figure anchor="fig-cats-fw">
          <name>Main CATS Interactions</name>

          <artwork><![CDATA[
   +----------------------------------+  |         +--------+
   |         Management Plane         |  |         |        |
   +----------------------------------+  |<=======>| C-SMA  |
   |           Control Plane          |  |         |        |
   +----------------------------------+  |         +---+----+
                   /\                    |             |
                   ||                    |             |
                   \/                    |             |
   +----------------------------------+  |         +--------+
   |           Data Plane             |  |         | +--------+
   +----------------------------------+  |<=======>| |Service |
                                         |         +-|Contact |
                                         |           |Instance|
                                         |           +--------+

            Network Domain                  Computing Domain
]]></artwork>
        </figure>

        <t>Starting from the bottom part of <xref target="fig-cats-fw"/> and
        moving to the upper part, the following planes are defined:</t>

        <ul spacing="normal">
          <li>
            <t>CATS Management Plane: Responsible for monitoring, configuring,
            and maintaining CATS network devices.</t>
          </li>

          <li>
            <t>CATS Control Plane: Responsible for scheduling services based
            on computing and network information. It is also responsible for
            making decisions about how packets should be forwarded by involved
            forwarding nodes and communicating such decisions to the CATS Data
            Plane for execution.</t>
          </li>

          <li>
            <t>CATS Data Plane: Responsible for computing-aware routing,
            including handling packets in the data path, such as packet
            forwarding.</t>
          </li>
        </ul>

        <t>Depending on implementation and deployment, these planes may
        consist of several functional elements/components, and the details
        will be described in the following sections.</t>
      </section>

      <section anchor="sec-cats-arch">
        <name>CATS Functional Components</name>

        <t>CATS nodes make forwarding decisions for a given service request
        that has been received from a client according to the capabilities and
        status information of both service contact instances and network. The
        main CATS functional elements and their interactions are shown in
        <xref target="fig-cats-components"/>.</t>

        <figure anchor="fig-cats-components">
          <name>CATS Functional Components</name>

          <artwork><![CDATA[
    +-----+              +------+           +------+
  +------+|            +------+ |         +------+ |
  |client|+            |client|-+         |client|-+
  +---+--+             +---+--+           +---+--+
      |                    |                  |
      | +----------------+ |            +-----+----------+
      +-+    C-TC#1      +-+      +-----+    C-TC#2      |
        |----------------|        |     |----------------|
        |     |C-PS#1    |    +------+  |CATS-Forwarder 4|
  ......|     +----------|....|C-PS#2|..|                |...
  :     |CATS-Forwarder 2|    |      |  |                |  .
  :     +----------------+    +------+  +----------------+  :
  :                                                         :
  :                                            +-------+    :
  :                         Underlay           | C-NMA |    :
  :                      Infrastructure        +-------+    :
  :                                                         :
  :                                                         :
  : +----------------+                +----------------+    :
  : |CATS-Forwarder 1|  +-------+     |CATS-Forwarder 3|    :
  :.|                |..|C-SMA#1|.... |                |....:
    +---------+------+  +-------+     +----------------+
              |         |             |   C-SMA#2      |
              |         |             +-------+--------+
              |         |                     |
              |         |                     |
           +------------+               +------------+
          +------------+ |             +------------+ |
          |  Service   | |             |  Service   | |
          |  Contact   | |             |  Contact   | |
          |  Instance  |-+             |  Instance  |-+
          +------------+               +------------+
           service site 1              service site 2
]]></artwork>
        </figure>

        <section anchor="sec-service-sites">
          <name>Service Sites, Services Instances, and Service Contact
          Instances</name>

          <t>Service sites are the premises that host a set of computing
          resources. As mentioned in <xref target="cats-ids"/>, a compute
          service (e.g., for face recognition purposes or a game server) is
          uniquely identified by a CATS Service IDentifier (CS-ID). The CS-ID
          does not need to be globally unique, though.</t>

          <t>Service instances can be instantiated and accessed through
          different service sites so that a single service can be represented
          and accessed via several contact instances that run in different
          regions of a network.</t>

          <t><xref target="fig-cats-components"/> shows two CATS nodes
          ("CATS-Forwarder 1" and "CATS-Forwarder 3") that provide access to
          service contact instances. These nodes behave as Egress
          CATS-Forwarders (<xref target="sec-ocr"/>).</t>

          <ul empty="true">
            <li>
              <t>Note: "Egress" is used here in reference to the direction of
              the service request placement. The directionality is called to
              explicitly identify the exit node of the CATS
              infrastructure.</t>
            </li>
          </ul>
        </section>

        <section anchor="sec-csma">
          <name>CATS Service Metric Agent (C-SMA)</name>

          <t>The CATS Service Metric Agent (C-SMA) is a functional component
          that gathers information about service sites and server resources,
          as well as the status of the different service instances. The C-SMAs
          are located adjacent to the service contact instances and may be
          hosted by the Egress CATS-Forwarders (<xref target="sec-ocr"/>) or
          located next to them.</t>

          <t><xref target="fig-cats-components"/> shows one C-SMA embedded in
          "CATS-Forwarder 3", and another C-SMA that is adjacent to
          "CATS-Forwarder 1".</t>
        </section>

        <section anchor="sec-cnma">
          <name>CATS Network Metric Agent (C-NMA)</name>

          <t>The CATS Network Metric Agent (C-NMA) is a functional component
          that gathers information about the state of the underlay network.
          The C-NMAs may be implemented as standalone components or may be
          hosted by other components, such as CATS-Forwarders or CATS Path
          Selectors (C-PS) (<xref target="sec-cps"/>).</t>

          <t>C-NMA is likely to leverage existing techniques (e.g., <xref
          target="RFC8571"/>).</t>

          <t><xref target="fig-cats-components"/> shows a single, standalone
          C-NMA within the underlay network. There may be one or more C-NMAs
          for an underlay network.</t>
        </section>

        <section anchor="sec-cps">
          <name>CATS Path Selector (C-PS)</name>

          <t>The C-SMAs and C-NMAs share the collected information with CATS
          Path Selectors (C-PSes) that use such information to select the
          Egress CATS-Forwarders (and potentially the service contact
          instances) where to forward traffic for a given service request.
          C-PSes also determine the best paths (possibly using tunnels) to
          forward traffic, according to various criteria that include network
          state and traffic congestion conditions. The collected information
          is encoded into one or more metrics that feed the C-PS path
          computation logic. Such an information also includes CS-ID and
          possibly CIS-IDs.</t>

          <t>There might be one or more C-PSes used to compute CATS paths in a
          CATS infrastructure.</t>

          <t>A C-PS can be integrated into CATS-Forwarders (e.g., "C-PS#1" in
          <xref target="fig-cats-components"/>) or may be deployed as a
          standalone component (e.g., "C-PS#2" in <xref
          target="fig-cats-components"/>). Generally, a standalone C-PS can be
          a functional component of a centralized controller (e.g., a Path
          Computation Element (PCE) <xref target="RFC4655"/>).</t>
        </section>

        <section anchor="sec-ctc">
          <name>CATS Traffic Classifier (C-TC)</name>

          <t>CATS Traffic Classifier (C-TC) is a functional component that is
          responsible for associating incoming packets from clients with
          existing service requests. CATS classifiers also ensure that packets
          that are bound to a specific service contact instance are all
          forwarded towards that same service contact instance, as instructed
          by a C-PS.</t>

          <t>CATS classifiers are typically hosted in CATS-Forwarders.</t>
        </section>

        <section anchor="sec-ocr">
          <name>Overlay CATS-Forwarders</name>

          <t>The Egress CATS-Forwarders are the endpoints that behave as an
          overlay egress for service requests that are forwarded over a CATS
          infrastructure. A service site that hosts service instances may be
          connected to one or more Egress CATS-Forwarders (that is,
          multi-homing is of course a design option). If a C-PS has selected a
          specific service contact instance and the C-TC has marked the
          traffic with the CIS-ID, the Egress CATS-Forwarder then forwards
          traffic to the relevant service contact instance. In some cases, the
          choice of the service contact instance may be left open to the
          Egress CATS-Forwarder (i.e., traffic is marked only with the CS-ID).
          In such cases, the Egress CATS-Forwarder selects a service contact
          instance using its knowledge of service and network capabilities as
          well as the current load as observed by the CATS-Forwarder, among
          other considerations. Absent explicit policy, an Egress
          CATS-Forwarder must make sure to forward all packets that pertain to
          a given service request towards the same service contact
          instance.</t>

          <t>Note that, depending on the design considerations and service
          requirements, per-service contact instance computing-related metrics
          or aggregated per-site computing related metrics (and a combination
          thereof) can be used by a C-PS. Using aggregated per-site computing
          related metrics appears as a privileged option scalability-wise, but
          relies on Egress CATS-Forwarders that connect to various service
          contact instances to select the proper service contact instance. An
          Egress CATS-Forwarder may choose to aggregate the metrics from
          different sites as well. In this case, the Egress CATS-Forwarder
          will choose the best site by itself when the packets arrive at
          it.</t>
        </section>

        <section anchor="underlay-infrastructure">
          <name>Underlay Infrastructure</name>

          <t>The "underlay infrastructure" in <xref
          target="fig-cats-components"/> indicates an IP/MPLS network that is
          not necessarily CATS-aware. The CATS paths that are computed by a
          P-CS will be distributed among the CATS-Forwarders (<xref
          target="sec-ocr"/>), and will not affect the underlay nodes.
          Underlay nodes are typically P routers (<xref section="5.3.1"
          sectionFormat="of" target="RFC4026"/>).</t>
        </section>
      </section>

      <section anchor="deployment-considerations">
        <name>Deployment Considerations</name>

        <t>This document does not make any assumption about how the various
        CATS functional elements are implemented and deployed. Concretely,
        whether a CATS deployment follows a fully distributed design or relies
        upon a mix of centralized (e.g., a C-PS) and distributed CATS
        functions (e.g., CATS traffic classifiers) is deployment-specific and
        may reflect the savoir-faire of the (CATS) service provider.</t>

        <t>Centralized designs where the computing related metrics from the
        C-SMAs are collected by a (logically) centralized path computation
        logic (e.g., a PCE) that also collects network metrics may be adopted.
        In the latter case, the CATS computation logic may process incoming
        service requests to compute and select paths and, therefore, service
        contact instances. The outcomes of such a computation process may then
        be communicated to CATS traffic classifiers (C-TCs).</t>

        <t>In conclusion, at least three deployment models can be considered
        for the deployment of the CATS framework:</t>

        <dl>
          <dt>Distributed model:</dt>

          <dd>
            <t>Computing metrics are distributed among network devices
            directly using distributed protocols without interactions with a
            centralized control plane. Service scheduling function is
            performed by the CATS forwarders in the distribution model,
            Therefore, the C-PS is integrated into an Ingress
            CATS-Forwarder.</t>
          </dd>

          <dt>Centralized model:</dt>

          <dd>
            <t>Computing metrics are collected by a centralized control plane,
            and then the centralized control plane performs service scheduling
            function, and computes the forwarding path for service requests
            and syncs up with the Ingress CATS-Forwarder. In this model, C-PS
            is implemented in the centralized control plane.</t>
          </dd>

          <dt>Hybrid model:</dt>

          <dd>
            <t>Is a combination of distribution and centralized models.</t>
          </dd>

          <dt/>

          <dd>
            <t>A part of computing metrics are distributed among involved
            network devices, and others may be collected by a centralized
            control plane. For example, some static information (e.g.,
            capabilities information) can be distributed among network devices
            since they are quite stable. Frequent changing information (e.g.,
            resource utilization) can be collected by a centralized control
            plane to avoid frequent flooding in the distributed control plane.
            Service scheduling function can be performed by a centralized
            control plane and/or the CATS forwarder. The entire or partial
            C-PS function may be implemented in the centralized control plane,
            depending on the specific implementation and deployment.</t>
          </dd>
        </dl>
      </section>
    </section>

    <section anchor="cats-framework-workflow">
      <name>CATS Framework Workflow</name>

      <t>The following subsections provide an overview of how the CATS
      workflow operates assuming a distributed CATS design.</t>

      <section anchor="provisioning-of-cats-components">
        <name>Provisioning of CATS Components</name>

        <t>TBC: --detail required provisioning at CAST elements
        (booptsrapping, credentials of peer CAST nodes, services, optimization
        metrics per service, etc.)--</t>
      </section>

      <section anchor="service-announcement">
        <name>Service Announcement</name>

        <t>A service is associated with a unique identifier called a CS-ID. A
        CS-ID may be a network identifier, such as an IP address. The mapping
        of CS-IDs to network identifiers may be learned through a name
        resolution service, such as DNS <xref target="RFC1034"/>.</t>
      </section>

      <section anchor="metrics-distribution">
        <name>Metrics Distribution</name>

        <t>As described in <xref target="sec-cats-arch"/>, a C-SMA collects
        both service-related capabilities and metrics, and associates them
        with a CS-ID that identifies the service. The C-SMA may aggregate the
        metrics for multiple service contact instances, or maintain them
        separately or both.</t>

        <t>The C-SMA then advertises CS-IDs along with metrics to related
        C-PSes in the network. Depending on deployment choice, CS-IDs with
        metrics may be distributed in different ways.</t>

        <t>For example, in a distributed model, CS-IDs with metrics can be
        distributed from the C-SMA to an Egress CATS Forwarder firstly and
        then be redistributed by the Egress CATS Forwarder to related C-PSes
        that are integrated into Ingress CATS Forwarders.</t>

        <t>In the centralized model, CS-IDs with metrics can be distributed
        from the C-SMA to a centralized control plane, for instance, a
        standalone C-PS.</t>

        <t>In the hybrid model, the metrics can be distributed to C-PSes in
        combination of distributed and centralized ways.</t>

        <t>The service metrics include computing-related metrics and
        potentially other service-specific metrics like the number of
        end-users who access the service contact instance at any given time,
        their location, etc.</t>

        <t>Computing metrics may change very frequently (see <xref
        target="I-D.ietf-cats-usecases-requirements"/> for a discussion). How
        frequently such information is distributed is to be determined as part
        of the specification of any communication protocol (including routing
        protocols) that may be used to distribute the information. Various
        options can be considered, such as (but not limited to) interval-based
        updates, threshold-triggered updates, or policy-based updates.</t>

        <t>Additionally, the C-NMA collects network-related capabilities and
        metrics. These may be collected and distributed by existing routing
        protocols, although extensions to such protocols may be required to
        carry additional information (e.g., link latency). The C-NMA
        distributes the network metrics to the C-PSes so that they can use the
        combination of service and network metrics to determine the best
        Egress CATS-Forwarder to provide access to a service contact instance
        and invoke the compute function required by a service request. Similar
        to service-related metrics, the network-related metrics can be
        distributed using distributed, centralized, or hybrid schemes. This
        document does not describe such details since this is a
        deployment-specific.</t>

        <t>Network metrics may also change over time. Dynamic routing
        protocols may take advantage of some information or capabilities to
        prevent the network from being flooded with state change information
        (e.g., Partial Route Computation (PRC) of OSPFv3 <xref
        target="RFC5340"/>). C-NMAs should also be configured or instructed
        like C-SMAs to determine when and how often updates should be notified
        to the C-PSes.</t>

        <t><xref target="fig-cats-example-overlay"/> shows an example of how
        CATS metrics can be disseminated in the distributed model. There is a
        client attached to the network via "CATS-Forwarder 1". There are three
        instances of the service with CS-ID "1": two are located at "Service
        Site 2" attached via "CATS-Forwarder 2" and have CIS-IDs "1" and "2";
        the third service contact instance is located at "Service Site 3"
        attached via "CATS-Forwarder 3" and with CIS-ID "3". There is also a
        second service with CS-ID "2" with only one service contact instance
        located at "Service Site 2".</t>

        <t>In <xref target="fig-cats-example-overlay"/>, the C-SMA collocated
        with "CATS-Forwarder 2" distributes the service metrics for both
        service contact instances (i.e., (CS-ID 1, CIS-ID 1) and (CS-ID 1,
        CIS-ID 2)). Note that this information may be aggregated into a single
        advertisement, but in this case, the metrics for each service contact
        instance are indicated separately. Similarly, the C-SMA agent located
        at "Service Site 2" advertises the service metrics for the two
        services hosted by "Service Site 2".</t>

        <t>The service metric advertisements are processed by the C-PS hosted
        by "CATS-Forwarder 1". The C-PS also processes network metric
        advertisements sent by the C-NMA. All metrics are used by the C-PS to
        compute and select the most relevant path that leads to the Egress
        CATS-Forwarder according to the initial client's service request, the
        service that is requested ("CS-ID 1" or "CS-ID 2"), the state of the
        service contact instances as reported by the metrics, and the state of
        the network.</t>

        <figure anchor="fig-cats-example-overlay">
          <name>An Example of CATS Metric Dessimination in a Distributed
          Model</name>

          <artwork><![CDATA[
          Service CS-ID 1, instance CIS-ID 1 <metrics>
          Service CS-ID 1, instance CIS-ID 2 <metrics>

                 :<----------------------:
                 :                       :              +--------+
                 :                       :              |CS-ID 1 |
                 :                       :           +--|CIS-ID 1|
                 :              +----------------+    |  +--------+
                 :              |    C-SMA       |----|   Service Site 2
                 :              +----------------+    |  +--------+
                 :              |CATS-Forwarder 2|    +--|CS-ID 1 |
                 :              +----------------+       |CIS-ID 2|
 +--------+      :                        |             +--------+
 | Client |      :  Network +----------------------+
 +--------+      :  metrics | +-------+            |
      |          : :<---------| C-NMA |            |
      |          : :        | +-------+            |
 +---------------------+    |                      |
 |CATS-Forwarder 1|C-PS|----|                      |
 +---------------------+    |       Underlay       |
                 :          |     Infrastructure   |     +--------+
                 :          |                      |     |CS-ID 1 |
                 :          +----------------------+ +---|CIS-ID 3|
                 :                    |              |   +--------+
                 :          +----------------+  +-------+
                 :          |CATS-Forwarder 3|--| C-SMA | Service Site 3
                 :          +----------------+  +-------+
                 :                                :  |   +-------+
                 :                                :  +---|CS-ID 2|
                 :                                :      +-------+
                 :<-------------------------------:
          Service CS-ID 1, instance CIS-ID 3 <metrics>
          Service CS-ID 2, <metrics>
]]></artwork>
        </figure>

        <t>The example in <xref target="fig-cats-example-overlay"/> mainly
        describes a per-instance computing-related metric distribution. In the
        case of distributing aggregated per-site computing-related metrics,
        the per-instance CIS-ID information will not be included in the
        advertisement. Instead, a per-site CIS-ID may be used in case multiple
        sites are connected to the Egress CATS-Forwarder to explicitly
        indicate the site from where the aggregated metrics come.</t>

        <t>If the CATS framework is implemented using a centralized model, the
        metric can be, e.g., distributed as illustrated in <xref
        target="fig-cats-centralized"/>.</t>

        <figure anchor="fig-cats-centralized">
          <name>An Example of CATS Metric Distribution in a Centralized
          Model</name>

          <artwork><![CDATA[
                        Service CS-ID 1, instance CIS-ID 1 <metrics>
                        Service CS-ID 1, instance CIS-ID 2 <metrics>
                        Service CS-ID 1, instance CIS-ID 3 <metrics>
                        Service CS-ID 2, <metrics>

             :       +------+
             :<------| C-PS |<----------------------------------+
             :       +------+ <------+              +--------+  |
             :          ^            |           +--|CS-ID 1 |  |
             :          |            |           |  |CIS-ID 1|  |
             :          |   +----------------+   |  +--------+  |
             :          |   |    C-SMA       |---|Service Site 2|
             :          |   +----------------+   |  +--------+  |
             :          |   |CATS-Forwarder 2|   +--|CS-ID 1 |  |
             :          |   +----------------+      |CIS-ID 2|  |
 +--------+  :          |             |             +--------+  |
 | Client |  :  Network |   +----------------------+            |
 +--------+  :  metrics |   | +-------+            |            |
      |      :          +-----| C-NMA |            |      +-----+
      |      :          |   | +-------+            |      |C-SMA|<-+
 +----------------+ <---+   |                      |      +-----+  |
 |CATS-Forwarder 1|---------|                      |          ^    |
 +----------------+         |       Underlay       |          |    |
             :              |     Infrastructure   |     +--------+|
             :              |                      |     |CS-ID 1 ||
             :              +----------------------+  +--|CIS-ID 3||
             :                        |               |  +--------+|
             :          +----------------+------------+            |
             :          |CATS-Forwarder 3|         Service Site 3  |
             :          +----------------+                         |
             :                        |       :      +-------+     |
             :                        +-------:------|CS-ID 2|-----+
             :                                :      +-------+
             :<-------------------------------:
      Service CS-ID 1, instance CIS-ID 3
      Service CS-ID 2
]]></artwork>
        </figure>

        <t>If the CATS framework is implemented using an hybrid model, the
        metric can be distributed, e.g., as illustrated in the <xref
        target="fig-cats-hybrid"/>. For example, the metrics 1,2,3 associated
        with the CS-ID1 are collected by the centralized C-PS, and the metrics
        4 and 5 are distributed via distributed protocols to the ingress
        CATS-Forwarder directly. For a service with CS-ID2, all the metrics
        are collected by the centralized C-PS. The CATS-computed path result
        will be distributed to the Ingress CATS-Forwarders from the C-PS by
        considering both the metrics from the C-SMA and C-NMA. Furthermore,
        the Ingress CATS-Forwarder may also have some ability to compute the
        path for the subsequent service accessing packets.</t>

        <figure anchor="fig-cats-hybrid">
          <name>An Example of CATS Metric Distribution in Hybrid Model</name>

          <artwork><![CDATA[
                   Service CS-ID 1, instance CIS-ID 1 <metric 1,2,3>
                   Service CS-ID 1, instance CIS-ID 2 <metric 1,2,3>
                   Service CS-ID 1, instance CIS-ID 3 <metric 1,2,3>
                   Service CS-ID 2, <metrics>

             :       +------+
             :<------| C-PS |<----------------------------------+
             :       +------+ <------+              +--------+  |
             :          ^            |           +--|CS-ID 1 |  |
             :          |            |           |  |CIS-ID 1|  |
             :          |   +----------------+   |  +--------+  |
             :          |   |    C-SMA       |---|Service Site 2|
             :          |   +----------------+   |  +--------+  |
             :          |   |CATS-Forwarder 2|   +--|CS-ID 1 |  |
             :          |   +----------------+      |CIS-ID 2|  |
 +--------+  :          |             |             +--------+  |
 | Client |  :  Network |   +----------------------+            |
 +--------+  :  metrics |   | +-------+            |            |
      |      :          +-----| C-NMA |            |      +-----+
      |      :          |   | +-------+            |      |C-SMA|<-+
 +----------------+ <---+   |                      |      +-----+  |
 |CATS-Forwarder 1|---------|                      |          ^    |
 |----------------+         |       Underlay       |          |    |
 |C-PS|      :              |     Infrastructure   |     +--------+|
 +----+      :              |                      |     |CS-ID 1 ||
             :              +----------------------+  +--|CIS-ID 3||
             :                        |               |  +--------+|
             :          +----------------+------------+            |
             :          |CATS-Forwarder 3|         Service Site 3  |
             :          +----------------+                         |
             :                        |       :      +-------+     |
             :                        +-------:------|CS-ID 2|-----+
             :                                :      +-------+
             :<-------------------------------:
      Service CS-ID 1, instance CIS-ID 3, <metric 4,5>
      Service CS-ID 2
]]></artwork>
        </figure>
      </section>

      <section anchor="service-access-processing">
        <name>Service Access Processing</name>

        <t>A C-PS computes paths that lead to Egress CATS-Forwarders according
        to both service and network metrics that were advertised. A C-PS may
        be collocated with an Ingress CATS-Forwarder (as shown in <xref
        target="fig-cats-example-overlay"/>) or logically centralized (in a
        centralized model or hybrid model).</t>

        <t>This document does not specify any algorithm for path computation
        and selection purposes to be supported by C-PSes. These algorithms are
        out of the scope of this document. However, it is expected that a
        service request or local policy may feed the C-PS computation logic
        with Objective Functions that provide some information about the path
        characteristics (e.g., in terms of maximum latency) and the selected
        service contact instance.</t>

        <t>In the example shown in <xref target="fig-cats-example-overlay"/>,
        the client sends a service access via the network through the
        "CATS-Forwarder 1", which is an Ingress CATS-Forwarder. Note that, a
        service access may consist of one or more service packets (e.g.,
        Session Initiation Protocol (SIP) <xref target="RFC3261"/>, HTTP <xref
        target="RFC9112"/>, IPv6 <xref target="RFC8200"/>, SRv6 <xref
        target="RFC8754"/> or Real-Time Streaming Protocol (RTSP) <xref
        target="RFC7826"/>) that carry the CS-ID and potential parameters. The
        Ingress CATS-Forwarder classifies the packets using the information
        provided by the CATS classifier (C-TC). When a matching classification
        entry is found for the packets, the Ingress CATS-Forwarder
        encapsulates and forwards them to the C-PS selected Egress
        CATS-Forwarder. When these packets reach the Egress CATS-Forwarder,
        the outer header of the possible overlay encapsulation will be removed
        and the inner packets will be sent to the relevant service contact
        instance.</t>

        <ul empty="true">
          <li>
            <t>Note that multi-homed clients may be connected to multiple CATS
            infrastructures that may be operated by the same or distinct
            service providers. This version of the framework does not cover
            multihoming specifics.</t>
          </li>
        </ul>
      </section>

      <section anchor="service-contact-instance-affinity">
        <name>Service Contact Instance Affinity</name>

        <t>Instance affinity means that packets that belong to a flow
        associated with a service should always be sent to the same service
        contact instance. Furthermore, packets of a given flow should be
        forwarded along the same path to avoid mis-ordering and to prevent the
        introduction of unpredictable latency variations. Specifically, the
        same Egress CATS-Forwarder may be sollicited to forward the
        packets.</t>

        <t>The affinity is determined at the time of newly formulated service
        requests.</t>

        <t>Note that different services may have different notions of what
        constitutes a 'flow' and may, thus, identify a flow differently.
        Typically, a flow is identified by the 5-tuple transport coordinates
        (source and destination addresses, source and destination port
        numbers, and protocol). However, for instance, an RTP video stream may
        use different port numbers for video and audio channels: in that case,
        affinity may be identified as a combination of the two 5-tuple flow
        identifiers so that both flows are addressed to the same service
        contact instance.</t>

        <t>Hence, when specifying a protocol to communicate information about
        service contact instance affinity, a certain level of flexibility for
        identifying flows should be supported. Or, from a more general
        perspective, there should be a flexible mechanism to specify and
        identify the set of packets that are subject to a service contact
        instance affinity.</t>

        <t>More importantly, the means for identifying a flow for the purpose
        of ensuring instance affinity should be application-independent to
        avoid the need for service-specific instance affinity methods.
        However, service contact instance affinity information may be
        configurable on a per-service basis. For each service, the information
        can include the flow/packets identification type and means, affinity
        timeout value, etc.</t>

        <t>This document does not define any mechanism for defining or
        enforcing service contact instance affinity.</t>
      </section>
    </section>

    <section anchor="security-considerations">
      <name>Security Considerations</name>

      <t>The computing resource information changes over time very frequently,
      especially with the creation and termination of service contact
      instances. When such an information is carried in a routing protocol,
      too many updates may affect network stability. This issue could be
      exploited by an attacker (e.g., by spawning and deleting service contact
      instances very rapidly). CATS solutions must support guards against such
      misbehaviors. For example, these solutions should support aggregation
      techniques, dampening mechanisms, and threshold-triggered distribution
      updates.</t>

      <t>The information distributed by the C-SMA and C-NMA agents may be
      sensitive. Such information could indeed disclose intel about the
      network and the location of compute resources hosted in service sites.
      This information may be used by an attacker to identify weak spots in an
      operator's network. Furthermore, such information may be modified by an
      attacker resulting in disrupted service delivery for the clients, up to
      and including misdirection of traffic to an attacker's service
      implementation. CATS solutions must support authentication and
      integrity-protection mechanisms between C-SMAs/C-NMAs and C-PSes, and
      between C-PSes and Ingress CATS-Forwarders. Also, C-SMA agents need to
      support a mechanism to authenticate the services for which they provide
      information to C-PS computation logics, among other CATS functions.</t>
    </section>

    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>

      <t>Means to prevent that on-path nodes in the underlay infrastructure to
      fingerprint and track clients (e.g., determine which client accesses
      which service) must be supported by CATS solutions. More generally,
      personal data must not be exposed to external parties by CATS beyond
      what is carried in the packet that was originally issued by the
      client.</t>

      <t>Since the service will, in some cases, need to know about
      applications, clients, and even user identity, it is likely that the
      C-PS computed path information will need to be encrypted if the
      client/service communication is not already encrypted.</t>

      <t>For more discussion about privacy, refer to <xref target="RFC6462"/>
      and <xref target="RFC6973"/>.</t>
    </section>

    <section anchor="iana-considerations">
      <name>IANA Considerations</name>

      <t>This document makes no requests for IANA action.</t>
    </section>
  </middle>

  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>

      <reference anchor="I-D.ietf-cats-usecases-requirements">
        <front>
          <title>Computing-Aware Traffic Steering (CATS) Problem Statement,
          Use Cases, and Requirements</title>

          <author fullname="Kehan Yao" initials="K." surname="Yao">
            <organization>China Mobile</organization>
          </author>

          <author fullname="Dirk Trossen" initials="D." surname="Trossen">
            <organization>Huawei Technologies</organization>
          </author>

          <author fullname="Mohamed Boucadair" initials="M."
                  surname="Boucadair">
            <organization>Orange</organization>
          </author>

          <author fullname="Luis M. Contreras" initials="L. M."
                  surname="Contreras">
            <organization>Telefonica</organization>
          </author>

          <author fullname="Hang Shi" initials="H." surname="Shi">
            <organization>Huawei Technologies</organization>
          </author>

          <author fullname="Yizhou Li" initials="Y." surname="Li">
            <organization>Huawei Technologies</organization>
          </author>

          <author fullname="Shuai Zhang" initials="S." surname="Zhang">
            <organization>China Unicom</organization>
          </author>

          <author fullname="Qing An" initials="Q." surname="An">
            <organization>Alibaba Group</organization>
          </author>

          <date day="1" month="January" year="2024"/>

          <abstract>
            <t>Distributed computing is a tool that service providers can use
            to achieve better service response time and optimized energy
            consumption. In such a distributed computing environment,
            providing services by utilizing computing resources hosted in
            various computing facilities aids support of services such as
            computationally intensive and delay sensitive services. Ideally,
            compute services are balanced across servers and network resources
            to enable higher throughput and lower response times. To achieve
            this, the choice of server and network resources should consider
            metrics that are oriented towards compute capabilities and
            resources instead of simply dispatching the service requests in a
            static way or optimizing solely on connectivity metrics. The
            process of selecting servers or service instance locations, and of
            directing traffic to them on chosen network resources is called
            "Computing-Aware Traffic Steering" (CATS). This document provides
            the problem statement and the typical scenarios for CATS, which
            shows the necessity of considering more factors when steering
            traffic to the appropriate computing resource to best meet the
            customer's expectations and deliver the requested service.</t>
          </abstract>
        </front>

        <seriesInfo name="Internet-Draft"
                    value="draft-ietf-cats-usecases-requirements-02"/>
      </reference>

      <reference anchor="I-D.ietf-teas-rfc3272bis">
        <front>
          <title>Overview and Principles of Internet Traffic
          Engineering</title>

          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>

          <date day="12" month="August" year="2023"/>

          <abstract>
            <t>This document describes the principles of traffic engineering
            (TE) in the Internet. The document is intended to promote better
            understanding of the issues surrounding traffic engineering in IP
            networks and the networks that support IP networking, and to
            provide a common basis for the development of traffic engineering
            capabilities for the Internet. The principles, architectures, and
            methodologies for performance evaluation and performance
            optimization of operational networks are also discussed. This work
            was first published as RFC 3272 in May 2002. This document
            obsoletes RFC 3272 by making a complete update to bring the text
            in line with best current practices for Internet traffic
            engineering and to include references to the latest relevant work
            in the IETF.</t>
          </abstract>
        </front>

        <seriesInfo name="Internet-Draft"
                    value="draft-ietf-teas-rfc3272bis-27"/>
      </reference>

      <reference anchor="RFC7665">
        <front>
          <title>Service Function Chaining (SFC) Architecture</title>

          <author fullname="J. Halpern" initials="J." role="editor"
                  surname="Halpern"/>

          <author fullname="C. Pignataro" initials="C." role="editor"
                  surname="Pignataro"/>

          <date month="October" year="2015"/>

          <abstract>
            <t>This document describes an architecture for the specification,
            creation, and ongoing maintenance of Service Function Chains
            (SFCs) in a network. It includes architectural concepts,
            principles, and components used in the construction of composite
            services through deployment of SFCs, with a focus on those to be
            standardized in the IETF. This document does not propose
            solutions, protocols, or extensions to existing protocols.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="7665"/>

        <seriesInfo name="DOI" value="10.17487/RFC7665"/>
      </reference>

      <reference anchor="RFC8571">
        <front>
          <title>BGP - Link State (BGP-LS) Advertisement of IGP Traffic
          Engineering Performance Metric Extensions</title>

          <author fullname="L. Ginsberg" initials="L." role="editor"
                  surname="Ginsberg"/>

          <author fullname="S. Previdi" initials="S." surname="Previdi"/>

          <author fullname="Q. Wu" initials="Q." surname="Wu"/>

          <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>

          <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>

          <date month="March" year="2019"/>

          <abstract>
            <t>This document defines new BGP - Link State (BGP-LS) TLVs in
            order to carry the IGP Traffic Engineering Metric Extensions
            defined in the IS-IS and OSPF protocols.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="8571"/>

        <seriesInfo name="DOI" value="10.17487/RFC8571"/>
      </reference>

      <reference anchor="RFC4655">
        <front>
          <title>A Path Computation Element (PCE)-Based Architecture</title>

          <author fullname="A. Farrel" initials="A." surname="Farrel"/>

          <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"/>

          <author fullname="J. Ash" initials="J." surname="Ash"/>

          <date month="August" year="2006"/>

          <abstract>
            <t>Constraint-based path computation is a fundamental building
            block for traffic engineering systems such as Multiprotocol Label
            Switching (MPLS) and Generalized Multiprotocol Label Switching
            (GMPLS) networks. Path computation in large, multi-domain,
            multi-region, or multi-layer networks is complex and may require
            special computational components and cooperation between the
            different network domains.</t>

            <t>This document specifies the architecture for a Path Computation
            Element (PCE)-based model to address this problem space. This
            document does not attempt to provide a detailed description of all
            the architectural components, but rather it describes a set of
            building blocks for the PCE architecture from which solutions may
            be constructed. This memo provides information for the Internet
            community.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4655"/>

        <seriesInfo name="DOI" value="10.17487/RFC4655"/>
      </reference>

      <reference anchor="RFC4026">
        <front>
          <title>Provider Provisioned Virtual Private Network (VPN)
          Terminology</title>

          <author fullname="L. Andersson" initials="L." surname="Andersson"/>

          <author fullname="T. Madsen" initials="T." surname="Madsen"/>

          <date month="March" year="2005"/>

          <abstract>
            <t>The widespread interest in provider-provisioned Virtual Private
            Network (VPN) solutions lead to memos proposing different and
            overlapping solutions. The IETF working groups (first Provider
            Provisioned VPNs and later Layer 2 VPNs and Layer 3 VPNs) have
            discussed these proposals and documented specifications. This has
            lead to the development of a partially new set of concepts used to
            describe the set of VPN services.</t>

            <t>To a certain extent, more than one term covers the same
            concept, and sometimes the same term covers more than one concept.
            This document seeks to make the terminology in the area clearer
            and more intuitive. This memo provides information for the
            Internet community.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="4026"/>

        <seriesInfo name="DOI" value="10.17487/RFC4026"/>
      </reference>

      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>

          <author fullname="P. Mockapetris" initials="P."
                  surname="Mockapetris"/>

          <date month="November" year="1987"/>

          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name
            System. It obsoletes RFC-882. This memo describes the domain style
            names and their used for host address look up and electronic mail
            forwarding. It discusses the clients and servers in the domain
            name system and the protocol used between them.</t>
          </abstract>
        </front>

        <seriesInfo name="STD" value="13"/>

        <seriesInfo name="RFC" value="1034"/>

        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>

      <reference anchor="RFC5340">
        <front>
          <title>OSPF for IPv6</title>

          <author fullname="R. Coltun" initials="R." surname="Coltun"/>

          <author fullname="D. Ferguson" initials="D." surname="Ferguson"/>

          <author fullname="J. Moy" initials="J." surname="Moy"/>

          <author fullname="A. Lindem" initials="A." surname="Lindem"/>

          <date month="July" year="2008"/>

          <abstract>
            <t>This document describes the modifications to OSPF to support
            version 6 of the Internet Protocol (IPv6). The fundamental
            mechanisms of OSPF (flooding, Designated Router (DR) election,
            area support, Short Path First (SPF) calculations, etc.) remain
            unchanged. However, some changes have been necessary, either due
            to changes in protocol semantics between IPv4 and IPv6, or simply
            to handle the increased address size of IPv6. These modifications
            will necessitate incrementing the protocol version from version 2
            to version 3. OSPF for IPv6 is also referred to as OSPF version 3
            (OSPFv3).</t>

            <t>Changes between OSPF for IPv4, OSPF Version 2, and OSPF for
            IPv6 as described herein include the following. Addressing
            semantics have been removed from OSPF packets and the basic Link
            State Advertisements (LSAs). New LSAs have been created to carry
            IPv6 addresses and prefixes. OSPF now runs on a per-link basis
            rather than on a per-IP-subnet basis. Flooding scope for LSAs has
            been generalized. Authentication has been removed from the OSPF
            protocol and instead relies on IPv6's Authentication Header and
            Encapsulating Security Payload (ESP).</t>

            <t>Even with larger IPv6 addresses, most packets in OSPF for IPv6
            are almost as compact as those in OSPF for IPv4. Most fields and
            packet- size limitations present in OSPF for IPv4 have been
            relaxed. In addition, option handling has been made more
            flexible.</t>

            <t>All of OSPF for IPv4's optional capabilities, including demand
            circuit support and Not-So-Stubby Areas (NSSAs), are also
            supported in OSPF for IPv6. [STANDARDS-TRACK]</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="5340"/>

        <seriesInfo name="DOI" value="10.17487/RFC5340"/>
      </reference>

      <reference anchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>

          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>

          <author fullname="H. Schulzrinne" initials="H."
                  surname="Schulzrinne"/>

          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>

          <author fullname="A. Johnston" initials="A." surname="Johnston"/>

          <author fullname="J. Peterson" initials="J." surname="Peterson"/>

          <author fullname="R. Sparks" initials="R." surname="Sparks"/>

          <author fullname="M. Handley" initials="M." surname="Handley"/>

          <author fullname="E. Schooler" initials="E." surname="Schooler"/>

          <date month="June" year="2002"/>

          <abstract>
            <t>This document describes Session Initiation Protocol (SIP), an
            application-layer control (signaling) protocol for creating,
            modifying, and terminating sessions with one or more participants.
            These sessions include Internet telephone calls, multimedia
            distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="3261"/>

        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>

      <reference anchor="RFC9112">
        <front>
          <title>HTTP/1.1</title>

          <author fullname="R. Fielding" initials="R." role="editor"
                  surname="Fielding"/>

          <author fullname="M. Nottingham" initials="M." role="editor"
                  surname="Nottingham"/>

          <author fullname="J. Reschke" initials="J." role="editor"
                  surname="Reschke"/>

          <date month="June" year="2022"/>

          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless
            application-level protocol for distributed, collaborative,
            hypertext information systems. This document specifies the
            HTTP/1.1 message syntax, message parsing, connection management,
            and related security concerns.</t>

            <t>This document obsoletes portions of RFC 7230.</t>
          </abstract>
        </front>

        <seriesInfo name="STD" value="99"/>

        <seriesInfo name="RFC" value="9112"/>

        <seriesInfo name="DOI" value="10.17487/RFC9112"/>
      </reference>

      <reference anchor="RFC8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>

          <author fullname="S. Deering" initials="S." surname="Deering"/>

          <author fullname="R. Hinden" initials="R." surname="Hinden"/>

          <date month="July" year="2017"/>

          <abstract>
            <t>This document specifies version 6 of the Internet Protocol
            (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>

        <seriesInfo name="STD" value="86"/>

        <seriesInfo name="RFC" value="8200"/>

        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>

      <reference anchor="RFC8754">
        <front>
          <title>IPv6 Segment Routing Header (SRH)</title>

          <author fullname="C. Filsfils" initials="C." role="editor"
                  surname="Filsfils"/>

          <author fullname="D. Dukes" initials="D." role="editor"
                  surname="Dukes"/>

          <author fullname="S. Previdi" initials="S." surname="Previdi"/>

          <author fullname="J. Leddy" initials="J." surname="Leddy"/>

          <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>

          <author fullname="D. Voyer" initials="D." surname="Voyer"/>

          <date month="March" year="2020"/>

          <abstract>
            <t>Segment Routing can be applied to the IPv6 data plane using a
            new type of Routing Extension Header called the Segment Routing
            Header (SRH). This document describes the SRH and how it is used
            by nodes that are Segment Routing (SR) capable.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="8754"/>

        <seriesInfo name="DOI" value="10.17487/RFC8754"/>
      </reference>

      <reference anchor="RFC7826">
        <front>
          <title>Real-Time Streaming Protocol Version 2.0</title>

          <author fullname="H. Schulzrinne" initials="H."
                  surname="Schulzrinne"/>

          <author fullname="A. Rao" initials="A." surname="Rao"/>

          <author fullname="R. Lanphier" initials="R." surname="Lanphier"/>

          <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>

          <author fullname="M. Stiemerling" initials="M." role="editor"
                  surname="Stiemerling"/>

          <date month="December" year="2016"/>

          <abstract>
            <t>This memorandum defines the Real-Time Streaming Protocol (RTSP)
            version 2.0, which obsoletes RTSP version 1.0 defined in RFC
            2326.</t>

            <t>RTSP is an application-layer protocol for the setup and control
            of the delivery of data with real-time properties. RTSP provides
            an extensible framework to enable controlled, on-demand delivery
            of real-time data, such as audio and video. Sources of data can
            include both live data feeds and stored clips. This protocol is
            intended to control multiple data delivery sessions; provide a
            means for choosing delivery channels such as UDP, multicast UDP,
            and TCP; and provide a means for choosing delivery mechanisms
            based upon RTP (RFC 3550).</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="7826"/>

        <seriesInfo name="DOI" value="10.17487/RFC7826"/>
      </reference>

      <reference anchor="RFC6462">
        <front>
          <title>Report from the Internet Privacy Workshop</title>

          <author fullname="A. Cooper" initials="A." surname="Cooper"/>

          <date month="January" year="2012"/>

          <abstract>
            <t>On December 8-9, 2010, the IAB co-hosted an Internet privacy
            workshop with the World Wide Web Consortium (W3C), the Internet
            Society (ISOC), and MIT's Computer Science and Artificial
            Intelligence Laboratory (CSAIL). The workshop revealed some of the
            fundamental challenges in designing, deploying, and analyzing
            privacy-protective Internet protocols and systems. Although
            workshop participants and the community as a whole are still far
            from understanding how best to systematically address privacy
            within Internet standards development, workshop participants
            identified a number of potential next steps. For the IETF, these
            included the creation of a privacy directorate to review
            Internet-Drafts, further work on documenting privacy
            considerations for protocol developers, and a number of
            exploratory efforts concerning fingerprinting and anonymized
            routing. Potential action items for the W3C included investigating
            the formation of a privacy interest group and formulating guidance
            about fingerprinting, referrer headers, data minimization in APIs,
            usability, and general considerations for non-browser-based
            protocols.</t>

            <t>Note that this document is a report on the proceedings of the
            workshop. The views and positions documented in this report are
            those of the workshop participants and do not necessarily reflect
            the views of the IAB, W3C, ISOC, or MIT CSAIL. This document is
            not an Internet Standards Track specification; it is published for
            informational purposes.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="6462"/>

        <seriesInfo name="DOI" value="10.17487/RFC6462"/>
      </reference>

      <reference anchor="RFC6973">
        <front>
          <title>Privacy Considerations for Internet Protocols</title>

          <author fullname="A. Cooper" initials="A." surname="Cooper"/>

          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>

          <author fullname="B. Aboba" initials="B." surname="Aboba"/>

          <author fullname="J. Peterson" initials="J." surname="Peterson"/>

          <author fullname="J. Morris" initials="J." surname="Morris"/>

          <author fullname="M. Hansen" initials="M." surname="Hansen"/>

          <author fullname="R. Smith" initials="R." surname="Smith"/>

          <date month="July" year="2013"/>

          <abstract>
            <t>This document offers guidance for developing privacy
            considerations for inclusion in protocol specifications. It aims
            to make designers, implementers, and users of Internet protocols
            aware of privacy-related design choices. It suggests that whether
            any individual RFC warrants a specific privacy considerations
            section will depend on the document's content.</t>
          </abstract>
        </front>

        <seriesInfo name="RFC" value="6973"/>

        <seriesInfo name="DOI" value="10.17487/RFC6973"/>
      </reference>

      <reference anchor="I-D.yao-cats-awareness-architecture">
        <front>
          <title>Computing and Network Information Awareness (CNIA) system
          architecture for CATS</title>

          <author fullname="Huijuan Yao" initials="H." surname="Yao">
            <organization>China Mobile</organization>
          </author>

          <author fullname="xuewei wang" initials="X." surname="wang">
            <organization>Ruijie Networks</organization>
          </author>

          <author fullname="Zhiqiang Li" initials="Z." surname="Li">
            <organization>China Mobile</organization>
          </author>

          <author fullname="Daniel Huang" initials="D." surname="Huang">
            <organization>New H3C Technologies</organization>
          </author>

          <author fullname="Changwang Lin" initials="C." surname="Lin">
            <organization>New H3C Technologies</organization>
          </author>

          <date day="22" month="October" year="2023"/>

          <abstract>
            <t>This document describes a Computing and Network Information
            Awareness (CNIA)system architecture for Computing-Aware Traffic
            Steering (CATS). Based on the CATS framework, this document
            further describes a proposal detailed awareness architecture about
            the network information and computing information. It includes a
            new component and the corresponding interfaces and workflows in
            the CATS control plane.</t>
          </abstract>
        </front>

        <seriesInfo name="Internet-Draft"
                    value="draft-yao-cats-awareness-architecture-02"/>
      </reference>
    </references>

    <?line 573?>

    <section anchor="acknowledgements">
      <name>Acknowledgements</name>

      <t>The authors would like to thank Joel Halpern, John Scudder, Dino
      Farinacci, Adrian Farrel, Cullen Jennings, Linda Dunbar, Jeffrey Zhang,
      Peng Liu, Fang Gao, Aijun Wang, Cong Li, Xinxin Yi, Jari Arkko, Mingyu
      Wu, Haibo Wang, Xia Chen, Jianwei Mao, Guofeng Qian, Zhenbin Li, Xinyue
      Zhang, and Nagendra Kumar for their comments and suggestions.</t>

      <t>Some text about various deployment models was originally documented
      in <xref target="I-D.yao-cats-awareness-architecture"/>.</t>
    </section>

    <section anchor="contributors" numbered="false" removeInRFC="false"
             toc="include">
      <name>Contributors</name>

      <contact fullname="Guangping Huang" initials="G." surname="Huang">
        <organization>ZTE</organization>

        <address>
          <email>huang.guangping@zte.com.cn</email>
        </address>
      </contact>

      <contact fullname="Gyan Mishra" initials="G." surname="Mishra">
        <organization>Verizon Inc.</organization>

        <address>
          <email>hayabusagsm@gmail.com</email>
        </address>
      </contact>

      <contact fullname="Huijuan Yao" initials="H." surname="Yao">
        <organization>China Mobile</organization>

        <address>
          <email>yaohuijuan@chinamobile.com</email>
        </address>
      </contact>

      <contact fullname="Yizhou Li" initials="Y." surname="Li">
        <organization>Huawei Technologies</organization>

        <address>
          <email>liyizhou@huawei.com</email>
        </address>
      </contact>

      <contact fullname="Dirk Trossen" initials="D." surname="Trossen">
        <organization>Huawei Technologies</organization>

        <address>
          <email>dirk.trossen@huawei.com</email>
        </address>
      </contact>

      <contact fullname="Luigi Iannone" initials="L." surname="Iannone">
        <organization>Huawei Technologies</organization>

        <address>
          <email>luigi.iannone@huawei.com</email>
        </address>
      </contact>

      <contact fullname="Hang Shi" initials="H." surname="Shi">
        <organization>Huawei Technologies</organization>

        <address>
          <email>shihang9@huawei.com</email>
        </address>
      </contact>

      <contact fullname="Changwang Lin" initials="C." surname="Lin">
        <organization>New H3C Technologies</organization>

        <address>
          <email>linchangwang.04414@h3c.com</email>
        </address>
      </contact>

      <contact fullname="Xueshun Wang" initials="X." surname="Wang">
        <organization>CICT</organization>

        <address>
          <email>xswang@fiberhome.com</email>
        </address>
      </contact>

      <contact fullname="Xuewei Wang" initials="X." surname="Wang">
        <organization>Ruijie Networks</organization>

        <address>
          <email>wangxuewei1@ruijie.com.cn</email>
        </address>
      </contact>

      <contact fullname="Christian Jacquenet" initials="C."
               surname="Jacquenet">
        <organization>Orange</organization>

        <address>
          <email>christian.jacquenet@orange.com</email>
        </address>
      </contact>
    </section>
  </back>

  <!-- ##markdown-source:
H4sIAAAAAAAAA+1963IbV5Lmfz7FCeqHySYAWZRsT3N6esWh7Ba9ls0V2e3u
3tmJKBQOgLIKVdi6kIKb6pjXmNfbJ9m8nktdQErt2YiNMH7YIlDnlidP5pd5
MrOm0+lBkzW5PTPn5psq2di7snpnlmVlLsrNtm2yYjU9v0sqa26qZLnMUnPd
WFvB1+bo4vzm+vggmc8re3tm8C/fxUGaNHZVVrszkxXL8uBgUaYF/HZmFtBP
M80X83QKz9TTpTaZfv7lQd3ON1ldZ2Vxs9vCw5df33xzULSbua3ODhbQ5dlB
Wha1Leq2PjNN1doDGPr5AUwwOTNvS5qwwb8OsMtVVbbbM4PjHLyzO/hqcXZg
puaPta3M1++3sBBbpBa/uijzPJmXVdJkt9Z8bxtsD53hb9e2us1Sa8ptk22y
n+GRsjiAiSzg9zPT1tOkTrPsYJudmf/ZlOnE1GXVVHZZw792G/zH/zo4SNpm
XVY4/IEBmsD0L2bmuwz+YLpcrC1Mnb4oq1VSyDhn5nWb3NnM3Nh0XZR5ucps
Dc/YTZLlsLRZ/nJND8zScgPfVyVupl1kTVnBn2nZFg3uwsU6K5Jg8L/OzKvW
Df7XslhtcXz6Lh6fWpo35TzLrR940f4sbV6m+MCGfpdJDI1qlm2e82hvyjX8
f2H+tWzTZJFkONHOoD9USbHC4boL8n0Dr9HeuSltuNvZXLt9WVIvPKnOHL5r
s9q8mcG+Q2+2Sur+HG5sbpdlkaVJNO71NsmKYNgcetpkq9bmMJB0tmmrLM/L
l43rIpgE0f9boH+VvKP584y+LdeF+dp/G0/m27bIgF+VM4G1Lot0FkzjpwU2
fPkTPzcrbBPN+o9F1gDJrxs4RLUpl+Z8A9wPSzugSWfztnHcyfP5QwvE2+J5
eo3/Yr4AVrn52nPBGn+ZrfTJlz83RO1ZWkQ97ZLCvMnqdZVoL3+CwYGBdBHa
XbJL5m2drOrNyxV+5anGPb1us59gMPOXpNSehtlzl5RrfrbPnr67v2Q/r8vW
HboHzlqe7ej56MD5zl5lIDlvqrIG8fSo/hbQYNZwg5E+gUtXmblMiqIs7OMm
iS1mGbcY6fU1bJe5Xj9u1fU6W8Pzv+315WVYEQgxePQuIUFW9CTJ9/bOvH5+
MUreItXms89fvHj24uX6edoZ788z8yMzIw/459bW67bQLzuS6/Lixvf/vsae
Xy4zUCbrcmMf7hmJMtjxW2CtzGmJYA04wntq+OxlRQ9Fx0FJ9m2S/u/W8hFV
wlVZ3cC2Rb+NyESV/dpm9pO2CSXeQVFWG1JnZwcHqIT9XwfT6dQk87qpkrQ5
OLhZgywEBd1ubNGYha1TkAcgJRKz/BRIMDNXSdVkaZsnVb6bmGZtfe/ZAv6b
LTPqvrYNiiKCDjDlLbBs0YBo81OAtlkFdGssThXIAL8mxcLY93azzbkf7B/n
uMzLO+wO/yahVub0LOCGxGzzpLD1jJe+yRYLkBYHT0D+wGOLNmWV7hYIM2OV
n1QgPhqbNm0FI60TwAZzawsYfwtd45PLqtyYGv6VW9eqhiamKc2mzZtsm1tE
BBsL4AH6SEOgMYma1NgmWSxgqNrcJlVWtrUBOAQ8bo7sbDWbmByUroHft4iC
DPcIOwO4icBJkvuZw8oLZlBsULYVfImy1R7PcMvhj2JhYYNwEYXDOwjXQIEB
tJI1N+sEdq1I83ZhaZOYQNplDX22SZ7vzLYqb2F34Zec1gZf1aBtgD90Sous
3iYNymNgFe63ZvaoQU/SHuj+aRM4MQ2qeZnHHWhV2AD4+rZ8B+oMuTKBEYH7
6wYY77IAUqTr7iIcmaf11qYZ8mwjvJuhMmxgR0EawxSgT9gD4qC8rKHTeE9p
s2FAAZqgaLFDgox3GeC7tkHOq4EMdB6wH2BboI/bCiSJ1d3USUCbFYyF64d/
AtRBRj/GjQ1pQTOg9rCB57U7JQtYrvnb3/7b5fTVLLPNknF1W9s0gRVMkTqw
Njx99YcPftBaTy1RtgHwUONBAw5MCTUMbLYBJgbQUMNxa/MFbERhlxmS6BaO
p2M9IDfzCzYFXgCIvZsiZs+IUPoUCPx3sJMbwCF19D3Np0L+aYHNiQSwGOSM
pF3hMmDFgPDzrNkhiW6ziiisXx2dv336p7fHpkEtkyFnzEws4YRTQQIV4QGH
Pry8o0kk2QYeaswySTPoO2l0UzcJnRWYEhPJTsPzNk1IPPYIvQDeQ9sG6Rwe
OVvAGsqCdsjcrW0VHjTdfX/gsO+F3eblDsAuH+VHSuZgfQmIlY0Su6ExAcSu
GzxdKrbGTiGOwDQkIhTWrGADC318Zr5O4AzySa6HekmB8HM8GvBHDbt5myWk
Dfg5lN1watzzM7BNhwTsJtmxRM7BKkOmGJJOyS3oymQObXHiMlGUmxOmdML6
Q6VtLI5xBOvMRBARyyU0KRp/IKT7jDhPRHUJp4GG2DvxEmQLkg44uEfvLgVQ
b7mtBN4hhQkcDXqkbVR4qrzZwtZsqwzFzFh/gTB16kKlKB3/inYWZYHqaJVf
yOaeziIP8IAlTSDFcYVF2UAr3GGgLRzmCqQEHLFAJnYZY1DGTwzLSlj2OgMx
g+c1hcZANxDYLcsOXKB939BEYIdALVhWLCqwOmqlRxCc8Nzy5Faryq4SZCht
TWJ//FToIcRd8ScsI/mCzJBD5zGSGtZ5LYiY+R42OKqPVQPJrqQIQtAvwisH
ZsXnAUYjWkITK9EBPtPeP8OJLSz8uskKWON8B93Bjs7BStKHA9k0vN+gf/K6
RBKPIccuIAPIKnwL7JnahccWKE0AzqVtw5psXjbrBzAcALcbmj8aEbsugN2Q
KhOVgR0tAXKVd8TR0KoGAHyRw4luzg7OzDlguWKxLUHzCdRBiFYUDgt4uSRq
o1LyzALAuF/ugl19ZkAYqEawxQpoz0/QeUV5GWrwBuTStFqmz0+/Op1noLZH
lTSB6x0YEdAtbCCQ1WuljiQMACGjEOhGXFp2HCABu8LSRB7gv2onRscF9p9E
nIIWt7cJ7omcJDlnbc3EtWiWoFhE0OYmPaY/t2WepRlxAHGS+uUuXwGdr6eX
r5jQsKXOykAhsQUa4J9IbJ0zSv8sFT4jZmCOYcoi/s6aGQxgYVsITmUL2AUd
+FLFxjWdYTjQNIXLsTkgdDGOsuNkGxhP1gidcq8lqiCH2jKk6MIGWo6Os+PU
OSKkFLRwUyWOACQ5PF8c+dM+UTgDgBlWBbYCSN8mnR3PaPgfiWTIR2s42Kzc
Y1hS0w7RQa7NFqzAruBFoz8V2mc1G3YFagUG3TrxmfkGiArSbEPWU3co5iI4
xwY+v0FPblmzKOtqVBI2gDFgmcns3SyZOab5pi3YoDRH19+AYIXj9/abi6++
/PKLDx9ovdjzFc+Hulac6cT+xGzXuxqV0cSQHRJKUYJU5VI7eg3qHrpBIyFj
SFuDPsBmC7ThYSqgLxfI2g8931NDBFW03cU6IakO9FR7zAuwtmYWQLBjETwv
4VwmBZ4n3N7XsKn+YdgdZ0DRdiLU0N1My61Vy51540an6LibMd5WKZghKih2
wAEpUaj+Z2M9TNyQ3dRkTduIZyDWsaGsNaNn4tOPw5DAPFKTLlCH7tdjfzbd
JN2EHKzAg9YWRUcQxwArlqV0QJikb5BcYs52kLMtcHWLeHkzJ5dUsy4I18vZ
inaHz6GySPfnWW8hQNlmt0VeRyQnS4ItTSI2nBlWrPX/+Y//VDwpgoGf8mdU
jYMI4gZdsRR13MILQtDMeN1T02EIsXOJ94kj/ORm3FkPhKMNQueOz69CXTmI
2AQZfOomTw2zurPqMdxAbb9h9Qm749fXFfzCN6KIpmhtBobfUgRVByZntfqB
MmT0JeNhm90yswntRXgIPmZF1DHWPF3UAkDZLXJzEXNrX5SLJ2MNWiG3tF3I
IeiSYlVg5kn6DhBWeHI8PJrbXQm/7YXmMJt1tlig2VYyOFSFjZqo4ztkzh23
JZlsIHdIOpDd2Zgc0BYbY1+vyPfGd5l+50zEPkPW68MmnDs1bG8H8l+NSicZ
zVEk24/HJOyQEaM+tu6mkm9RtWNZDVgxupVJl9PmFq1sIHfI+HmZLKbzJMfH
quMICjN6C3DjEbKDbPnEi9pj5ftHPAoqB5SEVdRGONgdWAWX4jhaIiZjtk+2
bJtngn8Z944BZDwu8G1wUoV4Ioz0fHiQWFZipg7gO2BzlN1JeKxoaV27oreP
yFCx8Kg7Eiw8qXmCool1ew/FwzluyrTMuYPrLk/gRqGdbt9v6bSizxZZEaS0
HjKYam8uB/E3Qh41LhD2Arqg3WBbLNhg7wObJ3h4SvVm6AVFSeecCOUtAGeU
IN16VPB2CYgqFoo01s6qTwJl9yjqvuka43u2Bgwa5CVyTMqpnzL7Adxt1Iah
ZYQaxJFK1A65rYDfLgsWOMBHgeiJlIY+MkTyIqI10azu84BSMaHLA2EtAfoL
nja1BzG44CuIYng2/JhouVr1wQY9WT3fhVeM5OnaK+HdHuHGA+3q5Y4aZAWc
3MBPJPsNRBmcnjPnPUngfJBURT3Gk0BVRFs8QAWUECxgwjUmAyBADcErbOaM
wKOL6ZUY++dObcP8wxnJiCKOqGVNo9eOjb2IVX2Az3o57aeJunmzKckBJLDI
+/pxmV0l4GRSl1nFJTHmYRi6VEJZivdT/uCqAVvbdJpuA3tZ5c4bPinnK5Qx
QK3rN+cPkGsA5eAFmvg7vUYekPOtXBUyMtqWlbpIN35XBzcwWka9Sfw65MK3
t47veR3s5PmklShRP20lMOto0kU4afVJXeRJXbM/AqZ8c/HxlFevIY7ODLhF
cAesNrckW2g2znGE3j++oNu6++DeWTaXNFSS12VvvEBtkBmkozlBBus2+wQZ
HwlxQT3kdiHKNSkR7kknnI2hpkOZ5m9P3E9T+AnkCHS0beoP0PSJOce7lS0d
XdmDgdsWVL17LloULZZFgBAjWDgJBIG39WNr0u+kOMHYAuuZg4GvCrBn7ISC
8/C6vMMrvglTZVHC/BA1oHI3aKQmbsFyJdGx7UyJa8bZkDmyE3sthOEfcxXy
RLbn0s0ad8TNWGje1iIUvfvXL5OcwKM+xF/WiUgSt8ARwuCHPBcd52jUs80m
Bi8iKjCsar3ByCqnFrxVQPNmd9rCbkHDIa/A8zy7PWq3uhUS9TSsGUOLNRAi
Wcgd1x6lLryOtlKgpUhoTXp35M7KF/8SK36UyB33obujEqMxun47QmMXHfyh
f/OpiiM0WCYkVsSteDwea6CNp3cZbGeyQXHDLKwzF8VMV9h7b/Ef6TL+RI8x
nQUvpX64xQftHZwGkmZRfC2ci3OwpFfrKQhEmxt6UEgQX11NXDCDD3Ohg9TR
FJl1DgbRXxPiwjxvycOmkQnLbCVzuSPp+ve//x3dlSfTBz8nxtwb/bjnT7C1
//5NUiQrwjzmCm+I3A/34VPuX/cfMfbv/oU/v783hFakte/VcABpmXeG/gXG
jtZ94tbd/Tz9t4EvoxnKsL1H7ge+fEzDf3v6yIa/1AYb8wqv/zoUNj0ix+0/
fovvVeINLnv4E87+/kLO5ye1h3+rkPjE9sH6ow4Utr4q6Ra29/GedX6CDujf
zsyT4OAaShP4l8M37h73MgjKO/yAAQoJA1O6okahMC+bBv6p90AdQUBCfFPe
Bq7Fdoshzvj8pKO5+epXQl+WeMUBCvw3PJGeADgzbztIEiQ4xo+LU6mAebT8
B80BltQkDGupQwXjC0sBSTMdKDrq/UHQRbVo88AwCZwc3uEU2lCR8bQHCUu8
kXeeMMzCazgFxfVaYrIUNjPUQ/dUfsuhcgqmycGtN/ubFsPTGwey/RiyKbT0
4ACyCsX7egIhv+k+0CdM92JXwufCMDHyH9NGy3JEr/C9PyD7Cc8uqeWJYD2g
UV4R7BG8nKF2R25gTEHhAxQuhd/pZaIwFLpjSKfXDdvLHMkWajruq34aBqgq
/gCLCABI7WJWopC8mINr9i9x+ILaF36YyLhwyhujXRTP8q4R5h70p7GpFeN/
5yEjR0xSc/Aq3xMgT3AwCWPXvqd/xBiNfHVANPLJj+PAgN/Z1+ZDQQbIrKTt
RP0y9gR+LzqQwu9KCC1EFJ7Ecu5k2vtWvzrw/7wfbNLTUick5e+ZdvfRSPpl
MJL/6sAp9Hh2A1/qVwd9Ue87HvjKPd9TgSdmYHXBUzrUCc8D3QRPnkVfRaSl
30/jUeFf3VE9/Bn5/aDzABr2PO69H5G0dcch+QKbzuhzH0yOe6VvqavTe/09
JBP8zD4b0+/49D4g7v0AmeEL33qAztG0h34/c60/5fPRrU/Cme1v/UeKCwfB
6D8If78H+Hv/QOvLKO76E8Z+6PNLtB7erfAz/AS37nLKs/vOAntPPPdUG+TC
ezItnjwjhh3gNPz6LJBqNFKPt05GZt6BkgNGifuL59E7z/sbnsQzevyI7tt/
5Plovd19PBkjRKfV8IL0x6AdPKgmAv7Ro2D0Y9xOTYPBdtGPcTvnNzD3nfV1
fxxf3yOpEt/dPItbRb+d9i0Er4fVUhhHOIfkJn3iyHXN7sxrBc0ujIWBlj6m
VPJRLoyU3IUXdvMhDiNh4MChZXaT1eqXokupfdE/M3MOYAvdHGWhfgzvE51w
tBc6nh1l5PqcHNcJYa+0XBXkBTLbtsIQtZrjTFbqerXVMUL+ltIU8p13AElk
T8dD6X207KmcBd4/55QtLF+kARpd5eWcwjF4AIS+ZbtaD0QuucAi/gKdb3hl
Vix8lEOzrrDxmDfa1KWE4nRD3qXn0AUddYzeX8XdI17EqiXYF8bfrwgVkpvM
h+OO4EICjtDVXWkCJH102JXkhzSx7tfPD495Fs7Jzr5dvKwcdVLjztRWRvL3
vYP3ljAVvn0o04piDw9+b74vGzCkDvn5Q2ISpBXdHGSI4IkQqQvu4uylgQQq
tQAoTAD5mZnGPZ9I5oLBwB0JyvXBAMKQfGNg32eNREsFXsM41WrGJ/vBWz81
cvB6LYie39uEAq8Ck8FtMW/PKkEPbWydaIJEJBCKhRw+f9onuDl3Fow4yQcR
S0cW2uf5eKdZc7KscffNi5+A4kXTDZsaNpAkGm3NYZ9yRfMYbkGJokMWGOLF
w20ePA144cI+TbsBg1VCNPvMzzI4Kdj/zS30WilcY/80hbyw7+ZUeaGIeWFv
k0/mBd1cx8Stot3IRqVhXLi68yjgvmIUD5AELyFtEHlGt1fdXdRLA+85UC9G
d1MxvbZ3IV3LjbRuOV2qU7AVofGMLyDgnAL9cxKhKzqmNV8QuwQ41U0c4/xP
X3z1jLvZzyEqySfhgnnkIC55kH6Vi68MQ86EqOSoKPoNA3YZupZXNtnWyiVy
6PBqlnuu16rt5WqdmNqzAE57nMy2FkGPd3iaRhoFJVkXWTZ2NHEyW5DdqEJR
8+49+ceS7Addi0cnzLoYc+bMDE+WPYUuk4c9riTqKZrkCAAHuuB2EhrWtEVh
c1xib7RJ7PrRXLi0yjCHKDFRCnCcQkLemr33X3SchrcD+Bd0WMmipxOeGMX0
LQnT0JZfXfdjVzhm2l20RoceaSRTrwUq8R4JcfgGTlK4wiTImHGJ4Jq1osiP
05mI2hQKPawPzyVOQQFWY1d6N9aPrdOTesgukMM93q7jQOJoOqjEaA7Ip7jj
070dz8wfbIF4DLP3k/j0+5WMyF+CZKgUoH32M2Vlktc8R9wqEaZ8/C6CLfya
5as5urr4WnMxXnz5BedieLkwGsuiwqFJPzwU9vKQ7hgIfIEeyjRjJzkwU7kJ
PdXkRNXrf5IwTgL3w684XNlNSQ4x1jOqJFpDu3Vx7aC2Co0YfehCmBpgaIG/
A9CoMg4R3Bc/POEIWOZdZ4JgbJGQNJo3ztdlBIjGE79uHCuKm/eDZEF2uZ13
DZEMi/QRsapSXTP16jAwmXjeJ1pa7oIuZHoh0EpTTx4KZBg+ut2MgSAFoR8y
IAcxSgEIRciYwnBlEDiWdM28RVUJsHhPhfEHeK2QrQpK1isLLHOw1Ogn9Om7
8MlHMUihkvTmglpvkuqdSFcV5MTE9BAJx8m4xsNfCqVm7Tp4fOgVFmwoN2gk
1lZqQaTrMktt144ZTdnN7RKEzpbTA8YnepTNbFBxIXMLLwvgX79iMay1kEQw
r+F+NYRzT8ww698MHnpXlHdgZK1sGJsZ3gfGNy6xSZK2laQJJCTnyzlZMc5a
iCc22RO2Apw9pzBvtfQ4s3I3GY/83bS1xHuxpPIYAqVNJLO2tsLb1KHkpm7A
di8ObSDABS1h6hjLwgS3fHz9RueiE5SjBp6OqAGxE5zadJyh/DUllTAJ8r9R
BfiscOoFBULoNoobEA4cTAg8VvXZ1pGINX/k5LyPGibZbm1SSWbGtspus9yu
kKc5Fq8G4SzBURTJNDHzttEQ9nJkqzVwiwVZiAf3hHpF2BjrD9hqz6E/H+Uy
vI1dl6XE0CktTJjJT+o2MMjZpuejQueWctLx3O47tnRhq0MpcCZq4515A6vB
8DnLbObiTqsKiw2gwG5Esbm7kvjmg7XZoTNxYs2yD3xhDB/ex3N1ksurp2+u
vvMRCQpQurUVaHV0uS7mq0emTue5QFliuqvpxbW/tga8QiXgUImQ2OgLlI7f
QaJPsQOcDEhV3X5v11EenSeRhB1EwOGKggGk92txYX0xez57hiKSUODnp18q
CjSv3D0+eoODQ98rYvVwjKrkMDv2Hr+RrjoeABdQYBdUQDCtwAhDrAwcQ+JW
8ISPOpA4AAaeuO6Q4qrdq252SfaeUECApR2AZouYZhL0FC3B2RL0rTPSPIY7
5koQOkefMKIOqTCVqk5uy6yaLpOscrpZisp06yMgXAzmzMvTwjZsnI8JNBc6
FDjUvO1IjHtE1h4yz3FEmmGrMDA50LDgw4CQW3qt3dHqVChIFiBEcX8vWQbA
PBtUpE6uuMTDeDxsLsmT3lQYysVTI9LngciBhS8mrC24jMl+JzOmZUNXHD/M
zqVoVjoXnBeBNQKpGvXDOHWMQdhgolTnS9KyYEZjrMnEJ00268rakNE3cMhz
d52gmllKdbHOds8OBp+eHRy8Clia+sP4WB+k5rRfNSS5OsFb4ul2bpCwgUuO
c/GuUcgJgcJBW5ajh3wtgSDyy2fr1qjB0RMRQzRne1Q+yEnnRKVzcMGTbh0b
AvtSMCF0H6COGEwQ6xzCB8jYOWOjS3aRT5JWPPacLj0oqNQn0SQoLuNC9V1g
E53nQSuOTsyuSFFQeuQ+QgaHCISujpCBQM8eWA3Q8vVuXmUBGS/rftWcaBtp
ad0NAHMYM240ILJXV2eEpV0MX4e3mYAlu7qdAfq4nexU2CAjTMr1hf4zEZ+R
XRL87tDsw+cQTh8lpEj2B8ByrmY3z3EutLkFlS7CRLTV0CR8FcMGpvJzPIHH
rpuAJagyDH6TMZd5SaWce8fx4w68FrwID/2+icDePRWZGMsFKeVUNKRqOR4W
0yCJdd1wA1cTD/HxgAXldP7eoEkuudRJifpRKjwx1g0CHdu5xjr6K1P2z2jK
gUIv6tFXitoimiM0D1CNM2166IbRBKNBqs6CCklq8UmQroJpmNi/XpyZ6ZSj
NH2BiG3YDlTZxfn1jYd7R/MSVH9dgXHF8cLQhP35pGO3mJhMLQjPOv0M/wrr
g7sjHZhCUkxnOqXZKy+dF0UJm0qjo7c4KMCifkepBAP04Jv8MFNE7m0Tdl2g
04q93L6+hcYauzb+FopMDC05qtGZtG6iJ7nG8cT0+6i9/yWpiiA+IKGKtnRY
cxaFbvU66qvvr8XF++zz5y844e6J3PPBr4EYHapzGQfHfmA0jLeSDtKFAanO
lu8Fs8oGyf2mUpr00EbJzaRkq8vnbgV+qeD6lwgyYrMOZbY5QBdWFCKXPoej
80RqC8c/QfMCf8OVzYLbL1bFyQLOVkPBLbJlnCFJi3AXKaVD23KdEafuzEwU
RB3ANHbITbTvqFe9fwiOaRSocZfs0Acc6Rq6K1l0Md5w/wPqJbYR+vnqvnCH
WWZVjdDPgRaKQwk769+0B837JHPGdBeHhejD91Azcu4K5X94vftE/JJqUjiP
fvf2xs9oHUCauFjiwCTQSnBcM4Z7xDYOJyf7fxN4cnWUXk3hntute5nKvsxe
fQN9nJPxkKPphRE4NeBnLIRbofXpkjL33clSldBiF9UJbaK0SxbiYTmq8CwQ
frEGzuPOAQyYuSTVPq5Er1z+AlnTlt6FwRm4YX+922m05MMzWEsIWFDoMelU
ZBPyuW3EZQf5IGw7kn2EmZWaqOFKH6vtJEZ1p7CfnwwNFuW5aHFA9lIO2Ipe
UxyhwxLdOFritSmP2Ui7TfIpJ9e0W6p/MCFbtF6X+WIKQ69WZHW6HxFHkZM7
boX3swu+qubrzkaDP3oeggc1iQZ99ZB4100z3/krwh494czmHKcHDzVYNVly
cTgF3pmsMkpY9SpNKmC7xK1nCEQDZn2nRZmPg1iXYIJ1qBZC/aGGaBDtR3ge
N7CtnW8nlA1DlxxBjwPRCyP3TOVA+N2eOxeumEGVebzHKail5chGIL0XYXEN
7IbVCnyMX1c4TUIi9STXgATtuR8moaAkBhWJzKWOelWrnUtT8ZDma3EKktpX
aNvWdGfYc+zhbcqAt4v9YSy4gtrFr6SqaI9D2ZdEftUFXu8lcp+FJmSUGlTF
R4X20N5aqSmi7ED6bW7JlkJLTMEuB5jIvAY4+UrMInzrj42CCY6u3l5QdvcP
11ff3D4XrPnF8xefU3CDCxaihDlaPYsfSgvE65MqvAYntSL+yIhl6X5Aq2Fy
EXmRKkEyHmwYB/RG5yeOvRJkNJUrbB+AVShoUqOJ4EWfyWq7wTPnTcAeutKo
LGINzfdq4Mys/dR0QzAgdyCaT3rgu3j0+kWlC0KlymFWBJ0Pnx2eUeBtFBrZ
mMMw9tucHvrJDI1+ypG5dNsvATvYM4frnh7+M99er7NqvMxTpxRQPP7zB8Z/
fii3HbiuS17Y88OQpshEKEcw8GmQDrAE+pOumxGMjU50D5UYvO3jnEmAFFEB
SV809ABVu0K/i9GWYnPsufuTi3UOSTfPJkqgZ3w90fv+9BiOoLvUFYEVnG61
W/1FKDs6NazcGTuczTknr2330i+cP1UZ3Rswo1dui8DacjrAgwKkabKyWqlv
jJG9MTZGUeLWO6da6iBgdGDH+9g5pkGt9fglnl59zRQe4jsePtD8GLGvL5Ub
K+ruaFogziGlmTnP88iF2XbnMXzfQTuFiRguUGSkhs8wJujlq2q9MBFwn9Vd
xT6JtsRHe9GPeL12KNx6iDpA/jg9PJZ2YdjwnnDuWoo0eRpEroZeVz7+VbNX
+ePyXvQEOabVI2Z+Jz3//mOanQbN+oUGzn7XTSHjz9nAo71vBr8fzQx7fBf3
spihygqP6QKmcK9Ee7iL4fS/+49aCeV4Sc0Q/gLb4bfxCf9/M5nB7FYiyqPp
Opo1qYQ9hT5OOj+OpmqOpNzBUu6lhrA+cubrV4xU9DgZHFfl0X0nQ1In0E+q
Pgt5P8p43d/Ir2lspOGJn3S66jTqJ5qiKHVsNNzoESN10nv37zw36qX1dpKt
93Pg2Gz5v4/jwLGtpx+UA58/Vjrc9/985FqGTsHJo1r2s4KZya6JyWI4+l80
heHPWUyAT+yC98EJgk/pwjwwixHF5D5nH6MEnz9Cd55Ogod6Ga8d7K1prxjc
5o02Mtgkg+kVYJhso84R8oKHkQ5v0E47lEBotfuy/XCfLgswnCh48wrGDT4Y
0xhdVrsgFwTQ8U32QyGJw26RaApC8DgPR8LGKCGC3MDOdI3QJpe0t1i5LfGj
S4+hyxG90jh5f8vikn+jkOw9kcxx4qOYBIzW3KvffAzTwFuCMAwHLbShqJZu
yIG+imHgWsADRrHw9Q1IkZ99X5m1oNOoKMrQ5xNB5kd2cvpLdDJ8ZPd1Eh3g
uI0KpKAATPiryJp7Nl/uHxI9Az10+je/c8I6/ITA5X64B/j8e/h9p+KXV6D7
eohhTPxvj4wf6mEQA94/dhX3OnQXFt/HkPi/fA5DaPijKDmGhT0UjsHYyR48
NIaEGQMGYDgAwoNzGOCv/hw8Kh7Hq50ewi97MGQYJodPnIz28PAcuDIKnL6T
AWTLR+qkR8KRaYxgatfd/k7w8+9CkD31Y8Ywdqe/ce7yTz+IuR/TychyPKfv
72Scx05C1L2/k/E53T9uOX1672P4kU6Gi/LQJ8be+zp5uHLQI2bSeS5+oFNJ
6JGdaKszYWXF4dzVIzvpPDCCxB+Nwh9W54MPDpWWCTDSwyA7DMLkrNygucPY
HwPSitFQiYF7PgVrfYCGzQKQxn0CPuu96swJ6WeT08nzXhCYS1N71g/d7Uaa
IHrxXkft9wV980Uv2hSvPobjo52DdRA6a4g1LyUZuP84nbiC16Nhx0Nz99ks
nVc1wDQA6Q8msMhch+OBoxQDQHbzXVSM2r17cjghwdcagKW2FYajbFyI9vCA
/oaVbq/oklQLVgdecU4zkohnsjkwipLjU90dOl18B6nHAu2HwPDjYT1z2SCi
fjys/0c6ef7RnfwK64ca/Qrrf4X1v8L6T4f1vbKknwLr2Uffo4l/+jGw/iQY
/VdYb36F9cLK/3/AeqeczYvJF79/LMgXiP3R+F4SsxywDxMrOFDwiuMaADf5
WjyacxakSGPAASKysRIkYbBBFBIzGNpIL7KncCl1Zy8oNQNHD+JDw/Cc0VQ+
c5TUg7Wve9cBUg1O8mPjzGGyhXru5iDskP4+no1mUnMU4Y6TqfNVWcGkN4RX
e6m3PsYjKn7JIcl1u/XRERIOJ5Gzrls2D4beOBy9cT54M1FGoRz2/VZc/VKK
slN4Qorl5RILTFsRF5fqZ/TS5vww/wlXcxu+NzoqCtmLfvTl5pg86wQTS8HM
qBuqEMFmYvjKmk3yPtu0Gxed66NFHnyHoQvq13sjxy6PiBaTcMDaFouwjonE
2d5SATAblCDgPB/8rh9UNPHv9h5PTTVBTY/eeJ2K/EOvLNV6DELDa0tR8jAa
vTUI/3nlItevL6+0ntTz0y+f4Zpf39xcyVe/ffbsFL+6vLr9UqvjnX7+OX51
/dZ/9dUXLz58wGm8tUk+vclgq6+byiaUpObHentz7Qb76p+obIGRtyBhYLYz
3OPEBozKTzYYVSoZWCNSwCVm18JVTASp7hYH2fvXboeZx2m3FNbM/EgxrED0
Jl1jP/pIqm8FbCqqDrqkIlRqnMrYe+1eYOFkC0Z6ojU3fZUgeXGdO3OOv4ff
gcmTbPi1DbJqennY+G0ez4wqS5g1CHbr3iQlhd+srxfl5uluJimsflPeSug+
07agN5Pw6PpUHdT3fLjYkdZ1lYQJrfeEGQVSPWyoiJS70RwoUVVHuReSPxm/
4S18w3y3UIOGmAMl6qB0rPeHOdmfUlw4TUUqVGlMubyPbaxGszlfLjEsb4cS
SkMu5St++bzpVz0L3yZImaH9PEiXVq5B3Jho1N2S/aWFYg+OTiB4CxsNPfRa
Fc6ucyNw0KKmFW+yelpW4k9KuHJbGPaeYbbWonXFettiiylpKb8+VWQ/FSXR
Yk3XmqnjElRo2PESOkgGABd4lc085Oo9+rMrgaVuL6gUiM8V4rliIgC9Ed3e
AZxA6dLmSaiIXGG7oE5Tv1ouMzb5v/xvGBgvJZzvpOAQsGnD70Y1nyHxP9NK
JLhqfAmmK0csfOF6Q9/jjRaVmejP6M6NKmrjmr6YNi0eJ8BBRY1ABEYmZEeC
6khSzDn/Gc+NaHNOkaV83+EnqCvOPJNAT3Wfhi9Q7GTnFeYt6CI8jPjKY9Qo
RCpMpvGUCnumDvh5SlttFxnnbmBtzzN2M5PCwUhof9AkV9wTIxmoX6BhyUoh
pmGQ8atJPwR/l1zPhiAu02bxuHN3cPDaFvzyRCwNxqiSoyFcwhl7RrVIyZ6S
zv14blkzVWiXSmT8vjtY4TK37zNxvtJOCD9J7sldmLjhYOrM/IAbx6/KIRyy
4uqYGJCC00dYKBVbgvaJjJajMxl3KKtJ63kYvYjLa0st+l79x7ol7PlQwpOs
G8j7puSCRTD7BI+GXiok8pKgcNWJf00rCQeG6pw6WdM7svpDhIvcYsQMbcw0
fPmkk4aMHO0irOThMzf7XQMOWpeLOjgxD654KHtAk3lIplIxpbD02zwBdCn3
LkFywKSHolKqJstpqqQZgVZP3Ruq5GQIVGp2WyvZgEDo4PChEEWWvU3y1mr2
6GhqF77bjEwszzRLevXukl9QhnPGGabR+4/3cAPq5hR2EmbSL5kV12ISyRZR
gNKvap8X1k1thQXRdpLB6e6nUhBlzhJkrdJLCRyoZ0RArx4o40vJHVWV8U1a
0stJg60rASoh3TQFi+5duCpZULKYD7/gnqyuW5yHMDOGf5WZlhApOCXonS9b
C9/W2+SuUMUO5rJt9m1DzcSqkm22yDHbkiCc1kWouaiiyBmzavkd9qsEmzMV
AEtQjdOsrOr+PWFtg77kTGpvGp5GnOnqgE/MAprbgrOWhb9cWkI/ezaqaOMz
Zm86x2Qgob5zXcZ5Mw7g1pjWimJTijZHHEfrQGHCE0jzsuZ8+zywqXVLFZ+H
b5DVOzVX3T8oTxu9CkDZoC8/XHHGgAtApjl5fWcTYCcw4bjycyHYu6w+q309
hQhf9jK2ZaRNufAv/AhG4wtOqUoDZKjabQi8gPcyPokiucWEmGBNpKaU/FdN
2gY+il8Q4eu0BmMG+TJxNZj9jJu0MD6QJfUnnqsjYNlJPKAyrmc4WHdzhy+i
46zKp5KQydyC/iDmSP8UlzuHr0YudTEDqS4nYY5W7V6E4uYZ6+Fg2jbM6GEd
6V7svHMenk4x+GFvUR3XXY0L8pE0vqqy2yTtC+M3bAyFxgIAANCrZF5w7cRu
yf3YGiSkD9ttqy0o7kZrs6fvnH0pgixMYcVl+vf/cf5X9N7oY97tnuMu4oiZ
eRMAI9QKiI0oB53e4EhdSMAviNlSwCImuFcFu0AoRVg7nttdSS835wytQPZ7
E0acrFgJFwRWRvn7LNJ9OAEtDN93o8WngtiEPCf3W1h+WFkG6/SKsAkQDjzg
ThnSFrcJJYUiKgSd7IbUtzJIhvzQi+r74dD+vT0Aj6sdHfdsGazjqdczYZUG
KQea5Phi7p1vLGVXCLH6WhKyrC1z4YTfJIPjstvqyxdfnsqrWeWL3371nCv0
mMvz788fKLuJ1TZxOr5YGx4mashV9aCj6XQKCCx9h12ep64k8kZKNqFRCkcT
38pwR6qAy3qQ6VG8M9+WoAdeJznwVzGBv9aFuU7bBfl8XmUw8jdgORfAytnE
nC/AiC7wm8rmk4OLNs9hx761BSpA2MTvQMsk5lVbzBNo/a1dAqzZmb8i5JmY
Kwun+LusnUB7+NcfEpAv59lPbWF+pN8vSvp9cvDnrHgPfPQXGPBbGNucV+/e
wbNvYIxda36EDl4n2byUZn/OEnMBggcehrnd2cy8wZ7/0JZLHPB/wJcTmIIt
wDLT7neAUmRWuDHfo4BbVIn57+0mqVQDZPSeEf8OzbpdydsYUO5cI5c3+H4Y
3n8tetqv3Ng5ULq1GmROJUx2SSklmLDkbAFSg4oxZSjqQRAhv/xfjjDqeFqo
AAA=

-->
</rfc>
