<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-irtf-coinrg-use-cases-06" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" tocDepth="2">
  <front>
    <title abbrev="COIN Use Cases">Use Cases for In-Network Computing</title>

    <author initials="I." surname="Kunze" fullname="Ike Kunze">
      <organization abbrev="RWTH Aachen">RWTH Aachen University</organization>
      <address>
        <postal>
          <street>Ahornstr. 55</street>
          <city>Aachen</city>
          <code>D-52074</code>
          <country>Germany</country>
        </postal>
        <email>kunze@comsys.rwth-aachen.de</email>
      </address>
    </author>
    <author initials="K." surname="Wehrle" fullname="Klaus Wehrle">
      <organization abbrev="RWTH Aachen">RWTH Aachen University</organization>
      <address>
        <postal>
          <street>Ahornstr. 55</street>
          <city>Aachen</city>
          <code>D-52074</code>
          <country>Germany</country>
        </postal>
        <email>wehrle@comsys.rwth-aachen.de</email>
      </address>
    </author>
    <author initials="D." surname="Trossen" fullname="Dirk Trossen">
      <organization abbrev="Huawei">Huawei Technologies Duesseldorf GmbH</organization>
      <address>
        <postal>
          <street>Riesstr. 25C</street>
          <city>Munich</city>
          <code>D-80992</code>
          <country>Germany</country>
        </postal>
        <email>Dirk.Trossen@Huawei.com</email>
      </address>
    </author>
    <author initials="M. J." surname="Montpetit" fullname="Marie-Jose Montpetit">
      <organization abbrev="McGill">McGill University</organization>
      <address>
        <postal>
          <street>680 Sherbrooke Street W.</street>
          <city>Montreal</city>
          <code>H3A 3R1</code>
          <country>Canada</country>
        </postal>
        <email>marie-jose.montpetit@mcgill.ca</email>
      </address>
    </author>
    <author initials="X." surname="de Foy" fullname="Xavier de Foy">
      <organization>InterDigital Communications, LLC</organization>
      <address>
        <postal>
          <street>1000 Sherbrooke West</street>
          <city>Montreal</city>
          <code>H3A 3G4</code>
          <country>Canada</country>
        </postal>
        <email>xavier.defoy@interdigital.com</email>
      </address>
    </author>
    <author initials="D." surname="Griffin" fullname="David Griffin">
      <organization abbrev="UCL">University College London</organization>
      <address>
        <postal>
          <street>Gower St</street>
          <city>London</city>
          <code>WC1E 6BT</code>
          <country>UK</country>
        </postal>
        <email>d.griffin@ucl.ac.uk</email>
      </address>
    </author>
    <author initials="M." surname="Rio" fullname="Miguel Rio">
      <organization abbrev="UCL">University College London</organization>
      <address>
        <postal>
          <street>Gower St</street>
          <city>London</city>
          <code>WC1E 6BT</code>
          <country>UK</country>
        </postal>
        <email>miguel.rio@ucl.ac.uk</email>
      </address>
    </author>

    <date />

    <area>General</area>
    <workgroup>COINRG</workgroup>
    

    <abstract>


<t>Computing in the Network (COIN) comes with the prospect of deploying processing functionality on networking devices, such as switches and network interface cards.
While such functionality can be beneficial, it has to be carefully placed into the context of the general Internet communication and it needs to be clearly identified where and how those benefits apply.</t>

<t>This document presents some use cases to demonstrate how a number of salient COIN-related applications can benefit from COIN.
Furthermore, to guide research on COIN, it further identifies essential research questions and outlines desirable capabilities that COIN systems addressing the use cases may need to support.
It is a product of the Computing in the Network Research Group (COINRG).
It is not an IETF product and it is not a standard.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>
<t>The Internet was designed as a best-effort packet network, forwarding packets from source to destination with limited guarantees regarding their timely and successful reception. 
Data manipulation, computation, and more complex protocol functionality is generally provided by the end-hosts while network nodes are kept simple and only offer a "store and forward" packet facility.
This simplicity of purpose of the network has shown to be suitable for a wide variety of applications and has facilitated the rapid growth of the Internet.</t>

<t>However, with the rise of new services, some of which are described in this document, there are more and more application domains that require more than best-effort forwarding including strict performance guarantees or closed-loop integration to manage data flows.
In this context, allowing for a tighter integration of computing and networking resources for enabling a more flexible distribution of computation tasks across the network, e.g., beyond 'just' endpoints, may help to achieve the desired guarantees and behaviors, increase overall performance, and improve resilience to failures.</t>

<t>The vision of 'in-network computing' and the provisioning of such capabilities that capitalize on joint computation and communication resource usage throughout the network is part of the move from a telephone network analogy of the Internet into a more distributed computer board architecture.
We refer to those capabilities as 'COIN capabilities' in the remainder of the document.</t>

<t>We believe that this vision of 'in-network computing' can be best outlined along four dimensions of use cases, namely those that (i) provide new user experiences through the utilization of COIN capabilities (referred to as 'COIN experiences'), (ii) enable new COIN systems, e.g., through new interactions between communication and compute providers, (iii) improve on already existing COIN capabilities, and (iv) enable new COIN capabilities. 
Sections 3 through 6 capture those categories of use cases and provide the main structure of this document.
The goal is to present how computing resources inside the network impact existing services and applications or allow for innovation in emerging application domains.</t>

<t>By delving into some individual examples within each of the above categories, we outline opportunities and propose possible research questions for consideration by the wider community when pushing forward 'in-network computing' architectures. 
Furthermore, identifying desirable capabilities for an evolving solution space of COIN systems is another objective of the use case descriptions. 
To achieve this, the following taxonomy is proposed to describe each of the use cases:</t>

<t><list style="numbers">
  <t>Description: High-level presentation of the purpose of the use case and a short explanation of the use case behavior.</t>
  <t>Characterization: Explanation of the services that are being utilized and realized as well as the semantics of interactions in the use case.</t>
  <t>Existing solutions: Description of current methods that may realize the use case (if they exist), not claiming to exhaustively review the landscape of solutions.</t>
  <t>Opportunities: An outline of how COIN capabilities may support or improve on the use case in terms of performance and other metrics.</t>
  <t>Research questions: Essential questions that are suitable for guiding research to achieve the identified opportunities.</t>
  <t>Desirable capabilities: Description of capabilities for any COIN solutions that may need development along the opportunities outlined in item 4; we limit the capabilities to those directly affecting COIN, recognizing that any use case will realistically require many additional capabilities for its realization.</t>
</list></t>

<t>This document discusses these six aspects along a number of individual use cases to demonstrate the diversity of COIN applications.
It is intended as a basis for further analyses and discussions within the Computing in the Network Research Group (COINRG) and the wider research community.
A companion document <xref target="USECASEANALYSIS"/> is tasked with performing a cross-use case analysis, i.e., summarizing and distilling the key research questions across all use cases.
This document represents the consensus of COINRG.</t>

</section>
<section anchor="terms"><name>Terminology</name>

<t>This document uses the terminology outlined in <xref target="TERMINOLOGY"/> as defined below.</t>

<t>Programmable Network Devices (PNDs): network devices, such as network interface cards and switches, which are programmable, e.g., using P4 or other languages.</t>

<t>(COIN) Execution Environment: a class of target environments for function execution, for example, a JVM-based execution environment that can run functions represented in JVM byte code</t>

<t>COIN System: the PNDs (and end systems) and their execution environments, together with the communication resources interconnecting them, operated by a single provider or through interactions between multiple providers that jointly offer COIN capabilities</t>

<t>COIN Capability: a feature enabled through the joint processing of computation and communication resources in the network</t>

<t>(COIN) Program: a monolithic functionality that is provided according to the specification for said program and which may be requested by a user.  A composite service can be built by orchestrating a combination of monolithic COIN programs.</t>

<t>(COIN) Program Instance: one running instance of a program</t>

<t>COIN Experience: a new user experience brought about through the utilization of COIN capabilities</t>

</section>
<section anchor="newExperiences"><name>Providing New COIN Experiences</name>

<section anchor="mobileAppOffload"><name>Mobile Application Offloading</name>

<section anchor="description"><name>Description</name>

<t>This scenario can be exemplified in an immersive gaming application, where a single user plays a game using a Virtual Reality (VR) headset. <br />
The headset hosts several (COIN) programs. 
For instance, the "display" (COIN) program renders frames to the user, while other programs are realized for VR content processing and to incorporate input data received from sensors, e.g., in bodily worn devices including the VR headset.</t>

<t>Once this application is partitioned into its constituent (COIN) programs and deployed throughout a COIN system, utilizing a COIN execution environment, only the "display" (COIN) program may be left in the headset, while the compute intensive real-time VR content processing (COIN) program can be offloaded to a nearby resource rich home PC or a programmable network device (PND, see <xref target="TERMINOLOGY"/>) in the operator's access network, for a better execution (faster and possibly higher resolution generation).</t>

</section>
<section anchor="characterization"><name>Characterization</name>

<t>Partitioning a mobile application into several constituent (COIN) programs allows for denoting the application as a collection of (COIN) programs for a flexible composition and a distributed execution. 
In our example above, most capabilities of a mobile application can be categorized into any of three, "receiving", "processing", and "displaying" groups.</t>

<t>Any device may realize one or more of the (COIN) programs of a mobile application and expose them to the (COIN) system and its constituent (COIN) execution environments. 
When the (COIN) program sequence is executed on a single device, the outcome is what you see today as applications running on mobile devices.</t>

<t>However, the execution of a (COIN) program may be moved to other (e.g., more suitable) devices, including PNDs, which have exposed the corresponding (COIN) program as individual (COIN) program instances to the (COIN) system by means of a 'service identifier'. 
The result is the equivalent to 'mobile function offloading', for possible reduction of power consumption (e.g., offloading CPU intensive process functions to a remote server) or for improved end user experience (e.g., moving display functions to a nearby smart TV) by selecting more suitably placed (COIN) program instances in the overall (COIN) system.</t>

<t><xref target="figureAppOffload"/> shows one realization of the above scenario, where a 'DPR app' is running on a mobile device (containing the partitioned Display(D), Process(P) and Receive(R) COIN programs) over a programmable switching, e.g., here an SDN, network. 
The packaged applications are made available through a localized 'playstore server'. 
The mobile application installation is realized as a 'service deployment' process, combining the local app installation with a distributed deployment (and orchestration) of one or more (COIN) programs on most suitable end systems or PNDs ('processing server').</t>

<figure title="Application Function Offloading Example." anchor="figureAppOffload"><artwork><![CDATA[
                             +----------+ Processing Server
           Mobile            | +------+ |  
        +---------+          | |  P   | |
        |   App   |          | +------+ |   
        | +-----+ |          | +------+ |
        | |D|P|R| |          | |  SR  | |
        | +-----+ |          | +------+ |         Internet
        | +-----+ |          +----------+            / 
        | |  SR | |              |                  /
        | +-----+ |            +----------+     +------+
        +---------+           /|SDN Switch|_____|Border|
                  +-------+ /  +----------+     |  SR  |
                  | 5GAN  |/        |           +------+
                  +-------+         |
      +---------+                   |    
      |+-------+|               +----------+
      ||Display||              /|SDN Switch| 
      |+-------+|   +-------+ / +----------+
      |+-------+|  /|WIFI AP|/              
      ||   D   || / +-------+     +--+     
      |+-------+|/                |SR|
      |+-------+|                /+--+
      ||  SR   ||            +---------+
      |+-------+|            |Playstore|
      +---------+            | Server  |
          TV                 +---------+

]]></artwork></figure>

<t>Such localized deployment could, for instance, be provided by a visiting site, such as a hotel or a theme park. 
Once the 'processing' (COIN) program is terminated on the mobile device, the 'service routing' (SR) elements in the network route (service) requests instead to the (previously deployed) 'processing' (COIN) program running on the processing server over an existing SDN network. 
Here, capabilities and other constraints for selecting the appropriate (COIN) program, in case of having deployed more than one, may be provided both in the advertisement of the (COIN) program and the service request itself.</t>

<t>As an extension to the above scenarios, we can also envision that content from one processing (COIN) program may be distributed to more than one display (COIN) program, e.g., for multi/many-viewing scenarios.
Here, an offloaded "processing" program may collate input from several users in the (virtual) environment to generate a possibly three-dimensional render that is then distributed via a service-level multicast capability towards more than one "display" (COIN) program.</t>

</section>
<section anchor="existing-solutions"><name>Existing Solutions</name>

<t>The ETSI Mobile Edge Computing (MEC) <xref target="ETSI"/> suite of technologies provides solutions for mobile function offloading by allowing mobile applications to select resources in edge devices to execute functions instead of the mobile device directly. 
For this, ETSI MEC utilizes a set of interfaces for the selection of suitable edge resources, connecting to so-called MEC application servers, while also allowing for sending data for function execution to the application server.</t>

<t>However, the technologies do not utilize micro-services <xref target="Microservices"/> but mainly rely on virtualization approaches such as containers or virtual machines, thus requiring a heavier processing and memory footprint in a COIN execution environment and the executing intermediaries. 
Also, the ETSI work does not allow for the dynamic selection and redirection of (COIN) program calls to varying edge resources rather than a single MEC application server.</t>

<t>Also, the selection of the edge resource (the app server) is relatively static, relying on DNS-based endpoint selection, which does not cater to the requirements of the example provided above, where the latency for redirecting to another device lies within few milliseconds for aligning with the framerate of the display micro-service.</t>

<t>Lastly, MEC application servers are usually considered resources provided by the network operator through its MEC infrastructure, while our use case here also foresees the placement and execution of micro-services in end user devices.</t>

<t>There also exists a plethora of mobile offloading platforms provided through proprietary platforms, all of which follow a similar approach as ETSI MEC in that a selected edge application server is being utilized to send functional descriptions and data for execution.</t>

<t>The draft at <xref target="APPCENTRES"/> outlines a number of enabling technologies for the use case, some of which have been realized in an Android-based realization of the micro-services as a single application, which is capable to dynamically redirect traffic to other micro-service instances in the network. 
This capability, together with the underlying path-based forwarding capability (using SDN) was demonstrated publicly, e.g., at the Mobile World Congress 2018 and 2019.</t>

</section>
<section anchor="opportunities"><name>Opportunities</name>

<t><list style="symbols">
  <t>The packaging of (COIN) programs into existing mobile application packaging may enable the migration from current (mobile) device-centric execution of those mobile applications toward a possible distributed execution of the constituent (COIN) programs that are part of the overall mobile application.</t>
  <t>The orchestration for deploying (COIN) program instances in specific end systems and PNDs alike may open up the possibility for localized infrastructure owners, such as hotels or venue owners, to offer their compute capabilities to their visitors for improved or even site-specific experiences.</t>
  <t>The execution of (current mobile) app-level (COIN) programs may speed up the execution of said (COIN) program by relocating the execution to more suitable devices, including PNDs that may reside better located in relation to other (COIN) programs and thus improve performance, such as latency.</t>
  <t>The support for service-level routing of requests (service routing in <xref target="APPCENTRES"/> may support higher flexibility when switching from one (COIN) program instance to another, e.g., due to changing constraints for selecting the new (COIN) program instance.
   Here, PNDs may support service routing solutions by acting as routing overlay nodes to implement the necessary additional lookup functionality and also possibly support the handling of affinity relations, i.e., the forwarding of one packet to the destination of a previous one due to a higher level service relation, as discussed and described in <xref target="SarNet2021"/>.</t>
  <t>The ability to identify service-level COIN elements will allow for routing service requests to those COIN elements, including PNDs, therefore possibly allowing for new COIN functionality to be included in the mobile application.</t>
  <t>The support for constraint-based selection of a specific (COIN) program instance over others (constraint-based routing in <xref target="APPCENTRES"/>, showcased for PNDs in <xref target="SarNet2021"/>) may allow for a more flexible and app-specific selection of (COIN) program instances, thereby allowing for better meeting the app-specific and end user requirements.</t>
</list></t>

</section>
<section anchor="mobileOffloadRQ"><name>Research Questions</name>

<t><list style="symbols">
  <t>RQ 3.1.1: How to combine service-level orchestration frameworks with app-level packaging methods?</t>
  <t>RQ 3.1.2: How to reduce latencies involved in (COIN) program interactions where (COIN) program instance locations may change quickly?</t>
  <t>RQ 3.1.3: How to signal constraints used for routing requests towards (COIN) program instances in a scalable manner?</t>
  <t>RQ 3.1.4: How to identify (COIN) programs and program instances?</t>
  <t>RQ 3.1.5: How to identify a specific choice of (COIN) program instances over others?</t>
  <t>RQ 3.1.6: How to provide affinity of service requests towards (COIN) program instances, i.e., longer-term transactions with ephemeral state established at a specific (COIN) program instance?</t>
  <t>RQ 3.1.7: How to provide constraint-based routing decisions that can be realized at packet forwarding speed, e.g., using techniques explored in <xref target="SarNet2021"/> at the forwarding plane or using approaches like <xref target="Multi2020"/> for extended routing protocols?</t>
  <t>RQ 3.1.8: What COIN capabilities may support the execution of (COIN) programs and their instances?</t>
</list></t>

</section>
<section anchor="desirable-capabilities"><name>Desirable Capabilities</name>

<t><list style="symbols">
  <t>Capability 3.1.1: Any COIN system must provide means for routing of service requests between resources in the distributed environment.</t>
  <t>Capability 3.1.2: Any COIN system must provide means for identifying services exposed by (COIN) programs for directing service requests.</t>
  <t>Capability 3.1.3: Any COIN system must provide means for identifying (COIN) program instances for directing (affinity) requests to a specific (COIN) program instance.</t>
  <t>Capability 3.1.4: Any COIN system must provide means for dynamically choosing the best possible service sequence of one or more (COIN) programs for a given application experience, i.e., support for chaining (COIN) program executions.</t>
  <t>Capability 3.1.5: Means for discovering suitable (COIN) programs should be provided.</t>
  <t>Capability 3.1.6: Any COIN system must provide means for pinning the execution of a service of a specific (COIN) program to a specific resource, i.e., (COIN) program instance in the distributed environment.</t>
  <t>Capability 3.1.7: Any COIN system should provide means for packaging micro-services for deployments in distributed networked computing environments.</t>
  <t>Capability 3.1.8: The packaging may include any constraints regarding the deployment of (COIN) program instances in specific network locations or compute resources, including PNDs.</t>
  <t>Capability 3.1.9: Such packaging should conform to existing application deployment models, such as mobile application packaging, TOSCA orchestration templates or tar balls or combinations thereof.</t>
  <t>Capability 3.1.10: Any COIN system must provide means for real-time synchronization and consistency of distributed application states.</t>
</list></t>

</section>
</section>
<section anchor="XR"><name>Extended Reality and Immersive Media</name>

<section anchor="description-1"><name>Description</name>

<t>Extended reality (XR) encompasses VR, Augmented Reality (AR) and Mixed Reality (MR). 
It provides the basis for the metaverse and is the driver of a number of advances in interactive technologies. 
While initially associated with gaming and immersive entertainment, applications now include remote diagnosis, maintenance, telemedicine, manufacturing and assembly, intelligent agriculture, smart cities, and immersive classrooms.
XR is one example of the multisource-multidestination problem that combines video and haptics in interactive multi-party interactions under strict delay requirements that can benefit from a functional distribution that includes fog computing for local information processing, the edge for aggregation, and the cloud for image processing.</t>

<t>XR stands to benefit significantly from computing capabilities in the network. 
For example, XR applications can offload intensive processing tasks to edge servers, considerably reducing latency when compared to cloud-based applications and enhancing the overall user experience. 
More importantly, COIN can enable collaborative XR experiences, where multiple users interact in the same virtual space in real-time, regardless of their physical locations, by allowing resource discovery and re-rerouting of XR streams. 
While not a feature of most XR implementations, this capability opens up new possibilities for remote collaboration, training, and entertainment. 
Furthermore, COIN can support dynamic content delivery, allowing XR applications to seamlessly adapt to changing environments and user interactions. 
Hence, the integration of computing capabilities into the network architecture enhances the scalability, flexibility, and performance of XR applications by supplying telemetry and advanced stream management, paving the way for more immersive and interactive experiences.</t>

<t>Indeed, XR applications require real-time interactivity for immersive and increasingly mobile applications with tactile and time-sensitive data. 
Because high bandwidth is needed for high resolution images and local rendering for 3D images and holograms, strictly relying on cloud-based architectures, even with headset processing, limits some of its potential benefits in the collaborative space. 
As a consequence, innovation is needed to unlock the full potential of XR.</t>

</section>
<section anchor="characterization-1"><name>Characterization</name>

<t>As mentioned above, XR experiences, especially those involving collaboration, are difficult to deliver with a client-server cloud-based solution as they require a combination of multi-stream aggregation, low delays and delay variations, means to recover from losses, and optimized caching and rendering as close as possible to the user at the network edge. 
Hence, implementing such XR solutions necessitates substantial computational power and minimal latency, which, for now, has spurred the development of better headsets not networked or distributed solutions as factors like distance from cloud servers and limited bandwidth can still significantly lower application responsiveness.
Furthermore, when XR deals with sensitive information, XR applications must also provide a secure environment and ensure user privacy, which represent additional burdens for delay sensitive applications. 
Additionally, the sheer amount of data needed for and generated by the XR applications, such as video holography, put them squarely in the realm of data-driven applications that can use recent trend analysis and mechanisms, as well as machine learning to find the optimal caching and processing solution and, ideally, reduce the size of the data that needs transiting through the network. 
Other mechanisms, such as data filtering and reduction, and functional distribution and partitioning are also needed to accommodate the low delay needs for the same applications.</t>

<t>With functional decomposition the goal of a better XR experience, the elements involved in a COIN XR implementation include:</t>

<t><list style="symbols">
  <t>the XR application residing in the headset,</t>
  <t>edge federation services that allow local devices to communicate with one another directly,</t>
  <t>egde application servers that enable local processing but also intelligent stream aggregation to reduce bandwidth requirements,</t>
  <t>edge data networks to allow precaching of information based on locality and usage,</t>
  <t>cloud-based services for image processing and application training, and</t>
  <t>intelligent 5G/6G core networks for managing advanced access services and providing performance data for XR stream management.</t>
</list></t>

<t>These characteristics of XR paired with the capabilities of COIN make it likely that COIN can help to realize XR over networks for collaborative applications.
In particular, COIN functions can enable the distribution of the service components across different nodes in the network.
For example, data filtering, image rendering, and video processing leveraging different hardware capabilities with combinations of CPU and GPU at the network edge and in the fog, where the content is consumed, represent possible remedies for the high bandwidth demands of XR. 
Machine learning across the network nodes can better manage the data flows by distributing them over more adequate paths.
In order to provide adequate quality of experience, multi-variate and heterogeneous resource allocation and goal optimization problems need to be solved, likely requiring advanced analysis and articificial intelligence.
For the purpose of this document, it is important to note that the use of COIN for XR does not imply a specific protocol but targets an architecture enabling the deployment of the services. 
In this context, similar considerations as for <xref target="mobileAppOffload"/> apply.</t>

</section>
<section anchor="existing-solutions-1"><name>Existing Solutions</name>

<t>The XR field has profited from extensive research in the past years in gaming, machine learning, network telemetry, high resolution imaging, smart cities, and IoT. 
Information Centric Networking (and related) approaches that combine publish subscribe and distributed storage are also very suited for the multisource-multidestination applications of XR.
New AR/VR headsets and glasses have continued to evolve towards autonomy with local computation capabilities, increasingly performing many of the processing that is needed to render and augment the local images.
Mechanisms aimed at enhancing the computational and storage capacities of mobile devices could also improve XR capabilities as they include the discovery of available servers within the environment and using them opportunistically to enhance the performance of interactive applications and distributed file systems.</t>

<t>Summarizing, some XR solutions exist and headsets continue to evolve to what is now claimed to be spatial computing.
Additionally, with recent work on the Metaverse, the number of publications related to XR has skyrocketed.
However, in terms of networking, which is the focus of this document, current deployments do not take advantage of network capabilities.
The information is rendered and displayed based on the local processing but does not readily discover the other elements in the vicinity or in the network that could improve its performance either locally, at the edge, or in the cloud. 
Yet, there are still very few interactive immersive media applications over networks that allow for federating systems capabilities.</t>

</section>
<section anchor="opportunities-1"><name>Opportunities</name>

<t>While delay is inherently related to information transmission and if we continue the analogy of the computer board to highlight some of the COIN capabilities in terms of computation and storage but also allocation of resources, there are some opportunities that XR could take advantage of:</t>

<t><list style="symbols">
  <t>Round trip time: 20 ms is usually cited as an upper limit for XR applications. Storage and preprocessing of scenes in local elements (including in the mobile network) could extend the reach of XR applications at least over the extended edge.</t>
  <t>Video transmission: The use of better transcoding, advanced context-based compression algorithms, prefetching and precaching, as well as movement prediction all help to reduce bandwidth consumption. While this is now limited to local processing it is not outside the realm of COIN to push some of these functionalities to the network especially as realted to caching/fetching but also context based flow direction and aggregation.</t>
  <t>Monitoring: Since bandwidth and data are fundamental for XR deployment, COIN functionality could help to better monitor and distribute the XR services over collaborating network elements to optimize end-to-end performance.</t>
  <t>Functional decomposition: Advanced functional decomposition, localization, and discovery of computing and storage resources in the network can help to optimize user experience in general.</t>
  <t>Intelligent network management and configuration: The move to artificial intelligence in network management to learn about flows and adapt resources based on both data plane and control plane programmability can help the overall deployment of XR services.</t>
</list></t>

</section>
<section anchor="research-questions"><name>Research Questions</name>

<t><list style="symbols">
  <t>RQ 3.2.1: Can current PNDs provide the speed required for executing complex filtering operations, including metadata analysis for complex and dynamic scene rendering?</t>
  <t>RQ 3.2.2: Where should PNDs equipped with these operations be located for optimal performance gains?</t>
  <t>RQ 3.2.3: Can the use of federated learning algorithms across both data center and edge computers be used to create optimal function allocation and the creation of semi-permanent datasets and analytics for usage trending and flow management resulting in better localization of XR functions?</t>
  <t>RQ 3.2.4: Can COIN improve the dynamic distribution of control, forwarding, and storage resources and related usage models in XR?</t>
  <t>RQ 3.2.5: How COIN provide the necessary infrastructure for the use of interactive XR everywhere?</t>
</list></t>

</section>
<section anchor="desirable-capabilities-1"><name>Desirable Capabilities</name>

<t><list style="symbols">
  <t>Capability 3.2.1: COIN systems for XR must allow joint collaboration across all segments of the network (fog, edge, core, and cloud) to support functional decompositions.</t>
  <t>Capability 3.2.2: COIN systems for XR should provide multi-stream efficient transmission and stream combining at the edge.</t>
  <t>Capability 3.2.3: COIN systems for XR should be able to dynamically include extra streams, such as audio and extra video tracks.</t>
  <t>Capability 3.2.4: COIN systems for XR may use edge networking and computing for improved performance and performance management without the neeed for a cloud connection.</t>
  <t>Capability 3.2.5: COIN systems for XR may integrate local and fog caching with cloud-based pre-rendering.</t>
  <t>Capability 3.2.6: COIN systems for XR should jointly optimize COIN and higher layer protocols to reduce latency.</t>
  <t>Capability 3.2.7: COIN systems for XR should provide means for performance optimization that reduces transmitted data and optimizes loss protection.</t>
  <t>Capability 3.2.8: COIN systems for XR may provide means for trend analysis and telemetry to measure performance.</t>
  <t>Capability 3.2.9: COIN systems for XR should interact with indoor and outdoor positioning systems to improve service location.</t>
  <t>Capability 3.2.10: COIN systems for XR may provide means for managing the quality of XR sessions through reduced in-network congestion and improve flow delivery by determining how to prioritize XR data.</t>
</list></t>

</section>
</section>
<section anchor="PerformingArts"><name>Personalized and interactive performing arts</name>

<section anchor="description-2"><name>Description</name>
<t>This use case is a deeper dive into a specific scenario of the immersive and extended reality class of use cases discussed in <xref target="XR"/>. 
It focuses on live productions of the performing arts where the performers and audience members are geographically distributed. 
The performance is conveyed through multiple networked streams which are tailored to the requirements of the remote performers, the director, sound and lighting technicians, and individual audience members; performers need to observe, interact and synchronize with other performers in remote locations; and the performers receive live feedback from the audience, which may also be conveyed to other audience members.</t>

<t>There are two main aspects: i) to emulate as closely as possible the experience of live performances where the performers, audience, director, and technicians are co-located in the same physical space, such as a theater; and ii) to enhance traditional physical performances with features such as personalization of the experience according to the preferences or needs of the performers, directors, and audience members.</t>

<t>Examples of personalization include:</t>

<t><list style="symbols">
  <t>Viewpoint selection such as choosing a specific seat in the theater or for more advanced positioning of the audience member's viewpoint outside of the traditional seating - amongst, above, or behind the performers (but within some limits which may be imposed by the performers or the director, for artistic reasons);</t>
  <t>Augmentation of the performance with subtitles, audio-description, actor-tagging, language translation, advertisements/product-placement, other enhancements/filters to make the performance accessible to disabled audience members (removal of flashing images for epileptics, alternative color schemes for color-blind audience members, etc.).</t>
</list></t>

</section>
<section anchor="characterization-2"><name>Characterization</name>
<t>There are several chained functional entities which are candidates for being deployed as (COIN) programs:</t>

<t><list style="symbols">
  <t>Performer aggregation and editing functions</t>
  <t>Distribution and encoding functions</t>
  <t>Personalization functions
  <list style="symbols">
      <t>to select which of the existing streams should be forwarded to the audience member, remote performer, or member of the production team</t>
      <t>to augment streams with additional metadata such as subtitles</t>
      <t>to create new streams after processing existing ones, e.g., to interpolate between camera angles to create a new viewpoint or to render point clouds from an audience member's chosen perspective</t>
      <t>to undertake remote rendering according to viewer position, e.g., creation of VR headset display streams according to audience head position - when this processing has been offloaded from the viewer's end-system to the COIN function due to limited processing power in the end-system, or to limited network bandwidth to receive all of the individual streams to be processed.</t>
    </list></t>
  <t>Audience feedback sensor processing functions</t>
  <t>Audience feedback aggregation functions</t>
</list></t>

<t>These are candidates for deployment as (COIN) Programs in PNDs rather than being located in end-systems (at the performers' site, the audience members' premises or in a central cloud location) for several reasons:</t>

<t><list style="symbols">
  <t>Personalization of the performance according to viewer preferences and requirements makes it infeasible to be done in a centralized manner at the performer premises: the computational resources and network bandwidth would need to scale with the number of personalized streams.</t>
  <t>Rendering of VR headset content to follow viewer head movements has an upper bound on lag to maintain viewer QoE, which requires the processing to be undertaken sufficiently close to the viewer to avoid large network latencies.</t>
  <t>Viewer devices may not have the processing-power to perform the personalization tasks, or the viewers' network may not have the capacity to receive all of the constituent streams to undertake the personalization functions.</t>
  <t>There are strict latency requirements for live and interactive aspects that require the deviation from the direct network path between performers and audience members to be minimized, which reduces the opportunity to route streams via large-scale processing capabilities at centralized data-centers.</t>
</list></t>

</section>
<section anchor="existing-solutions-2"><name>Existing solutions</name>
<t>Note: Existing solutions for some aspects of this use case are covered in <xref target="mobileAppOffload"/>, <xref target="XR"/>, and <xref target="CDNs"/>.</t>

</section>
<section anchor="opportunities-2"><name>Opportunities</name>

<t><list style="symbols">
  <t>Executing media processing and personalization functions on-path as (COIN) Programs in PNDs can avoid detour/stretch to central servers, thus reducing latency and bandwidth consumption. 
For example, the overall delay for performance capture, aggregation, distribution, personalization, consumption, capture of audience response, feedback processing, aggregation, and rendering should be achieved within an upper bound of latency (the tolerable amount is to be defined, but in the order of 100s of ms to mimic performers perceiving audience feedback, such as laughter or other emotional responses in a theater setting).</t>
  <t>Processing of media streams allows (COIN) Programs, PNDs and the wider (COIN) System/Environment to be contextually aware of flows and their requirements which can be used for determining network treatment of the flows, e.g., path selection, prioritization, multi-flow coordination, synchronization and resilience.</t>
</list></t>

</section>
<section anchor="research-questions-1"><name>Research Questions:</name>

<t><list style="symbols">
  <t>RQ 3.3.1: In which PNDs should (COIN) Programs for aggregation, encoding, and personalization functions be located? Close to the performers or close to the viewers?</t>
  <t>RQ 3.3.2: How far from the direct network path from performer to viewer should (COIN) programs be located, considering the latency implications of path-stretch and the availability of processing capacity at PNDs? How should tolerances be defined by users?</t>
  <t>RQ 3.3.3: Should users decide which PNDs should be used for executing (COIN) Programs for their flows or should they express requirements and constraints that will direct decisions by the orchestrator/manager of a COIN System?</t>
  <t>RQ 3.3.4: How to achieve synchronization across multiple streams to allow for merging, audio-video interpolation, and other cross-stream processing functions that require time synchronization for the integrity of the output? 
How can this be achieved considering that synchronization may be required between flows that are: i) on the same data pathway through a PND/router, ii) arriving/leaving through different ingress/egress interfaces of the same PND/router, iii) routed through disjoint paths through different PNDs/routers? 
This RQ raises issues associated with synchronisation across multiple media streams and sub-streams <xref target="RFC7272"/> as well as time synchronisation between PNDs/routers on multiple paths <xref target="RFC8039"/>.</t>
  <t>RQ 3.3.5: Where will COIN Programs be executed? In the data-plane of PNDs, in other on-router computational capabilities within PNDs, or in adjacent computational nodes?</t>
  <t>RQ 3.3.6: Are computationally-intensive tasks - such as video stitching or media recognition and annotation (cf. <xref target="XR"/>) - considered as suitable candidate (COIN) Programs or should they be implemented in end-systems?</t>
  <t>RQ 3.3.7: If the execution of COIN Programs is offloaded to computational nodes outside of PNDs, e.g. for processing by GPUs, should this still be considered as COIN? Where is the boundary between COIN capabilities and explicit routing of flows to endsystems?</t>
</list></t>

</section>
<section anchor="desirable-capabilities-2"><name>Desirable Capabilities</name>
<t><list style="symbols">
  <t>Capability 3.3.1: Users should be able to specify requirements on network and processing metrics (such as latency and throughput bounds).</t>
  <t>Capability 3.3.2  A COIN System should be able to respect user-specified requirements and constraints when routing flows and selecting PNDs for executing (COIN) Programs.</t>
  <t>Capability 3.3.3: A COIN System should be able to synchronize flow treatment and processing across multiple related flows which may be on disjoint paths.</t>
</list></t>

</section>
</section>
</section>
<section anchor="newEnvironments"><name>Supporting new COIN Systems</name>

<section anchor="control"><name>In-Network Control / Time-sensitive applications</name>

<section anchor="description-3"><name>Description</name>
<t>The control of physical processes and components of industrial production lines is essential for the growing automation of production and ideally allows for a consistent quality level.
Traditionally, the control has been exercised by control software running on programmable logic controllers (PLCs) located directly next to the controlled process or component.
This approach is best-suited for settings with a simple model that is focused on a single or few controlled components.</t>

<t>Modern production lines and shop floors are characterized by an increasing number of involved devices and sensors, a growing level of dependency between the different components, and more complex control models.
A centralized control is desirable to manage the large amount of available information which often has to be preprocessed or aggregated with other information before it can be used.
As a result, computations are increasingly spatially decoupled and moved away from the controlled objects, thus inducing additional latency.
Instead moving compute functionality onto COIN execution environments inside the network offers a new solution space to these challenges, providing new compute locations with much smaller latencies.</t>

</section>
<section anchor="characterization-3"><name>Characterization</name>

<t>A control process consists of two main components as illustrated in <xref target="processControl"/>: a system under control and a controller.
In feedback control, the current state of the system is monitored, e.g., using sensors, and the controller influences the system based on the difference between the current and the reference state to keep it close to this reference state.</t>

<figure title="Simple feedback control model." anchor="processControl"><artwork><![CDATA[
 reference
   state      ------------        --------    Output
---------->  | Controller | ---> | System | ---------->
           ^  ------------        --------       |
           |                                     |
           |   observed state                    |
           |                    ---------        |
            -------------------| Sensors | <----- 
                                ---------              
]]></artwork></figure>

<t>Apart from the control model, the quality of the control primarily depends on the timely reception of the sensor feedback which can be subject to tight latency constraints, often in the single-digit millisecond range.
Even shorter feedback requirements may exist in other use cases, such as interferometry or high-energy physics, but these use cases are out of scope for this document. 
While low latencies are essential, there is an even greater need for stable and deterministic levels of latency, because controllers can generally cope with different levels of latency, if they are designed for them, but they are significantly challenged by dynamically changing or unstable latencies.
The unpredictable latency of the Internet exemplifies this problem if, e.g., off-premise cloud platforms are included.</t>

</section>
<section anchor="existing-solutions-3"><name>Existing Solutions</name>

<t>Control functionality is traditionally executed on PLCs close to the machinery.
These PLCs typically require vendor-specific implementations and are often hard to upgrade and update which makes such control processes inflexible and difficult to manage.
Moving computations to more freely programmable devices thus has the potential of significantly improving the flexibility.
In this context, directly moving control functionality to (central) cloud environments is generally possible, yet only feasible if latency constraints are lenient.</t>

<t>Early approaches such as <xref target="RUETH"/> and <xref target="VESTIN"/> have already shown the general applicability of leveraging COIN for in-network control.</t>

</section>
<section anchor="opportunities-3"><name>Opportunities</name>

<t><list style="symbols">
  <t>Performing simple control logic on PNDs and/or in COIN execution environments can bring the controlled system and the controller closer together, possibly satisfying the tight latency requirements.</t>
  <t>Creating a coupled control that is exercised via (i) simplified approximations of more complex control algorithms deployed in COIN execution environments, and (ii) more complex overall control schemes deployed in the cloud can allow for quicker, yet more inaccurate responses from within the network while still providing for sufficient control accuracy at higher latencies from afar.</t>
</list></t>

</section>
<section anchor="research-questions-2"><name>Research Questions</name>

<t><list style="symbols">
  <t>RQ 4.1.1: How to derive simplified versions of the global (control) function?
  <list style="symbols">
      <t>How to account for the limited computational precision of PNDs, typically only allowing for integer precision computation, while floating-point precision is needed by most control algorithms (cf. <xref target="KUNZE-APPLICABILITY"/>)?</t>
      <t>How to find suitable tradeoffs regarding simplicity of the control function ("accuracy of the control") and implementation complexity ("implementability")?</t>
    </list></t>
  <t>RQ 4.1.2: How to distribute the simplified versions in the network?
  <list style="symbols">
      <t>Can there be different control levels, e.g., "quite inaccurate &amp; very low latency" (PNDs, deep in the network), "more accurate &amp; higher latency" (more powerful COIN execution environments, farer away), "very accurate &amp; very high latency" (cloud environments, far away)?</t>
      <t>Who decides which control instance is executed and how?</t>
      <t>How do the different control instances interact?</t>
    </list></t>
</list></t>

</section>
<section anchor="desirable-capabilities-3"><name>Desirable Capabilities</name>

<t><list style="symbols">
  <t>Capability 4.1.1: The interaction between COIN execution environments and the global controller should be explicit.</t>
  <t>Capability 4.1.2: The interaction between COIN execution environments and the global controller must not negatively impact the control quality.</t>
  <t>Capability 4.1.3: Actions of COIN execution environments must be overridable by the global controller.</t>
  <t>Capability 4.1.4: Functions in COIN execution environments should be executed with predictable delay.</t>
  <t>Capability 4.1.5: Functions in COIN execution environments must be executed with predictable accuracy.</t>
</list></t>

</section>
</section>
<section anchor="filtering"><name>Large Volume Applications</name>

<section anchor="FilteringDesc"><name>Description</name>

<t>In modern industrial networks, processes and machines are extensively monitored by distributed sensors with a large spectrum of capabilities, ranging from simple binary (e.g., light barriers) to sophisticated sensors with varying degrees of resolution.
Sensors further serve different purposes, as some are used for time-critical process control while others represent redundant fallback platforms.
Overall, there is a high level of heterogeneity which makes managing the sensor output a challenging task.</t>

<t>Depending on the deployed sensors and the complexity of the observed system, the resulting overall data volume can easily be in the range of several Gbit/s <xref target="GLEBKE"/>.
These volumes are often already difficult to handle in local environments and it becomes even more challenging when off-premise clouds are used for managing the data.
While large networking companies can simply upgrade their infrastructure to accommodate the accruing data volumes, most industrial companies operate on tight infrastructure budgets and upgrading is hence not always feasible or possible.
A major challenge is thus to devise a methodology that is able to handle such amounts of data over limited access links.</t>

<t>Data filtering and preprocessing, similar to the considerations in <xref target="XR"/>, can be building blocks for new solutions in this space.
Such solutions, however, might also have to address the added challenge of business data leaving the premises and control of the company.
As this data could include sensitive information or valuable business secrets, additional security measures have to be taken.
Yet, typical security measures such as encrypting the data make filtering or preprocessing approaches hardly applicable as they typically work on unencrypted data.
Consequently, incorporating security into these approaches, either by adding functionality for handling encrypted data or devising general security measures, is thus an additional auspicious field for research.</t>

</section>
<section anchor="FilteringChar"><name>Characterization</name>

<t>In essence, the described monitoring systems consist of sensors that produce large volumes of monitoring data.
This data is then transmitted to additional components that provide data processing and analysis capabilities or simply store the data in large data silos.</t>

<t>As sensors are often set up redundantly, part of the collected data might also be redundant.
Moreover, sensors are often hard to configure or not configurable at all which is why their resolution or sampling frequency is often larger than required.
Consequently, it is likely that more data is transmitted than is needed or desired, prompting the deployment of filtering techniques.
For example, COIN programs deployed in the on-premise network could filter out redundant or undesired data before it leaves the premise using simple traffic filters, thus reducing the required (upload) bandwidths.
The available sensor data could be scaled down using standard statistical sampling, packet-based sub-sampling, i.e., only forwarding every n-th packet, or using filtering as long as the sensor value is in an uninteresting range while forwarding with a higher resolution once the sensor value range becomes interesting (cf. <xref target="KUNZE-SIGNAL"/>).
While the former variants are oblivious to the semantics of the sensor data, the latter variant requires an understanding of the current sensor levels.
In any case, it is important that end-hosts are informed about the filtering so that they can distinguish between data loss and data filtered out on purpose.</t>

<t>In practice, the collected data is further processed using various forms of computation.
Some of them are very complex or need the complete sensor data during the computation, but there are also simpler operations which can already be done on subsets of the overall dataset or earlier on the communication path as soon as all data is available. 
One example is finding the maximum of all sensor values which can either be done iteratively at each intermediate hop or at the first hop, where all data is available. 
Using expert knowledge about the exact computation steps and the concrete transmission path of the sensor data, simple computation steps can thus be deployed in the on-premise network, again reducing the overall data volume.</t>

</section>
<section anchor="FilteringSol"><name>Existing Solutions</name>

<t>Current approaches for handling such large amounts of information typically build upon stream processing frameworks such as Apache Flink.
These solutions allow for handling large volume applications and map the compute functionality to performant server machines or distributed compute platforms.
Augmenting the existing capabilities, COIN offers a new dimension of platforms for such processing frameworks.</t>

</section>
<section anchor="FilteringOppo"><name>Opportunities</name>

<t><list style="symbols">
  <t>(Stream) processing frameworks can become more flexible by introducing COIN execution environments as additional deployment targets.</t>
  <t>(Semantic) packet filtering based on packet header and payload, as well as multi-packet information can (drastically) reduce the data volume, possibly even without losing any important information.</t>
  <t>(Semantic) data (pre-)processing, e.g., in the form of computations across multiple packets and potentially leveraging packet payload, can also reduce the data volume without losing any important information.</t>
</list></t>

</section>
<section anchor="FilteringRQ"><name>Research Questions</name>

<t>Some of the following research questions are also relevant in the context of general stream processing systems.</t>

<t><list style="symbols">
  <t>RQ 4.2.1: How can the overall data processing pipeline be divided into individual processing steps that could then be deployed as COIN functionality?</t>
  <t>RQ 4.2.2: How to design COIN programs for (semantic) packet filtering?
  <list style="symbols">
      <t>Which criteria for filtering make sense?</t>
    </list></t>
  <t>RQ 4.2.3: Which kinds of COIN programs can be leveraged for (pre-)processing steps?
  <list style="symbols">
      <t>How complex can they become?</t>
    </list></t>
  <t>RQ 4.2.4: How to distribute and coordinate COIN programs?</t>
  <t>RQ 4.2.5: How to dynamically change COIN programs?</t>
  <t>RQ 4.2.6: How to incorporate the (pre-)processing and filtering steps into the overall system?
  <list style="symbols">
      <t>How can changes to the data by COIN programs be signaled to the end-hosts?</t>
    </list></t>
</list></t>

</section>
<section anchor="FilteringReq"><name>Desirable capabilities</name>

<t><list style="symbols">
  <t>Capability 4.2.1: Filters and preprocessors must conform to application-level syntax and semantics.</t>
  <t>Capability 4.2.2: Filters and preprocessors may leverage packet header and payload information.</t>
  <t>Capability 4.2.3: Filters and preprocessors should be reconfigurable at run-time.</t>
</list></t>

</section>
</section>
<section anchor="safety"><name>Industrial Safety</name>

<section anchor="description-4"><name>Description</name>

<t>Despite an increasing automation in production processes, human workers are still often necessary.
Consequently, safety measures have a high priority to ensure that no human life is endangered.
In traditional factories, the regions of contact between humans and machines are well-defined and interactions are simple.
Simple safety measures like emergency switches at the working positions are enough to provide a good level of safety.</t>

<t>Modern factories are characterized by increasingly dynamic and complex environments with new interaction scenarios between humans and robots.
Robots can directly assist humans, perform tasks autonomously, or even freely move around on the shopfloor. 
Hence, the intersect between the human working area and the robots grows and it is harder for human workers to fully observe the complete environment.
Additional safety measures are essential to prevent accidents and support humans in observing the environment.</t>

</section>
<section anchor="characterization-4"><name>Characterization</name>

<t>Industrial safety measures are typically hardware solutions because they have to pass rigorous testing before they are certified and deployment-ready.
Standard measures include safety switches and light barriers.
Additionally, the working area can be explicitly divided into 'contact' and 'safe' areas, indicating when workers have to watch out for interactions with machinery.
For example, markings on the factory floor can show the areas where robots move or indicate their maximum physical reach.</t>

<t>These measures are static solutions, potentially relying on specialized hardware, and are challenged by the increased dynamics of modern factories where the factory configuration can be changed on demand or where all entities are freely moving around.
Software solutions offer higher flexibility as they can dynamically respect new information gathered by the sensor systems, but in most cases they cannot give guaranteed safety.
COIN systems could leverage the increased availability of sensor data and the detailed monitoring of the factories to enable additional safety measures with shorter response times and higher guarantees.
Different safety indicators within the production hall could be combined within the network so that PNDs can give early responses if a potential safety breach is detected.
For example, the positions of human workers and robots could be tracked and robots could be stopped when they get too close to a human in a non-working area or if a human enters a defined safety zone.
More advanced concepts could also include image data or combine arbitrary sensor data.
Finally, the increasing softwarization of industrial processes can also lead to new problems, e.g., if software bugs cause unintended movements of robots.
Here, COIN systems could independently double check issued commands to void unsafe commands.</t>

</section>
<section anchor="existing-solutions-4"><name>Existing Solutions</name>

<t>Due to the importance of safety, there is a wide range of software-based approaches aiming at enhancing security.
One example are tag-based systems, e.g., using RFID, where drivers of forklifts can be warned if pedestrian workers carrying tags are nearby.
Such solutions, however, require setting up an additional system and do not leverage existing sensor data.</t>

</section>
<section anchor="opportunities-4"><name>Opportunities</name>

<t><list style="symbols">
  <t>Executing safety-critical COIN functions on PNDs could allow for early emergency reactions based on diverse sensor feedback with low latencies.</t>
  <t>COIN software could provide independent on-path surveillance of control software-initiated actions to block unsafe commands.</t>
</list></t>

</section>
<section anchor="research-questions-3"><name>Research Questions</name>

<t><list style="symbols">
  <t>RQ 4.3.1: Which additional safety measures can be provided?
  <list style="symbols">
      <t>Do these measures actually improve safety?</t>
    </list></t>
  <t>RQ 4.3.2: Which sensor information can be combined and how?</t>
</list></t>

</section>
<section anchor="desirable-capabilities-4"><name>Desirable capabilities</name>

<t><list style="symbols">
  <t>Capability 4.3.1: COIN-based safety measures must not degrade existing safety measures.</t>
  <t>Capability 4.3.2: COIN-based safety measures may enhance existing safety measures.</t>
</list></t>

</section>
</section>
</section>
<section anchor="existingCapabilities"><name>Improving existing COIN capabilities</name>

<section anchor="CDNs"><name>Content Delivery Networks</name>

<section anchor="description-5"><name>Description</name>

<t>Delivery of content to end users often relies on Content Delivery Networks (CDNs).
CDNs store said content closer to end users for latency-reduced delivery as well as to reduce load on origin servers. 
For this, they often utilize DNS-based indirection to serve the request on behalf of the origin server.
Both of these objectives are within scope to be addressed by COIN methods and solutions.</t>

</section>
<section anchor="characterization-5"><name>Characterization</name>

<t>From the perspective of this draft, a CDN can be interpreted as a (network service level) set of (COIN) programs.
These programs implement a distributed logic for first distributing content from the origin server to the CDN ingress and then further to the CDN replication points which ultimately serve the user-facing content requests.</t>

</section>
<section anchor="existing-solutions-5"><name>Existing Solutions</name>

<t>CDN technologies have been well described and deployed in the existing Internet. 
Core technologies like Global Server Load Balancing (GSLB) <xref target="GSLB"/> and Anycast server solutions are used to deal with the required indirection of a content request (usually in the form of an HTTP request) to the most suitable local CDN server. 
Content is replicated from seeding servers, which serve as injection points for content from content owners/producers, to the actual CDN servers, who will eventually serve the user's request.
The replication architecture and mechanisms itself differs from one (CDN) provider to another, and often utilizes private peering or network arrangements in order to distribute the content internationally and regionally.</t>

<t>Studies such as those in <xref target="FCDN"/> have shown that content distribution at the level of named content, utilizing efficient (e.g., Layer 2) multicast for replication towards edge CDN nodes, can significantly increase the overall network and server efficiency. 
It also reduces indirection latency for content retrieval as well as required edge storage capacity by benefiting from the increased network efficiency to renew edge content more quickly against changing demand.
Works such as those in <xref target="SILKROAD"/> utilize ASICs to replace server-based load balancing with significant cost reductions, thus showcasing the potential for in-network CN operations.</t>

</section>
<section anchor="opportunities-5"><name>Opportunities</name>

<t><list style="symbols">
  <t>Supporting service-level routing of requests (service routing in <xref target="APPCENTRES"/>) to specific (COIN) program instances may improve on end user experience in faster retrieving (possibly also more, e.g., better quality) content.</t>
  <t>COIN instances may also be utilized to integrate service-related telemetry information to support the selection of the final service instance destination from a pool of possible choices</t>
  <t>Supporting the selection of a service destination from a set of possible (e.g., virtualized, distributed) choices, e.g., through constraint-based routing decisions (see <xref target="APPCENTRES"/>) in (COIN) program instances to improve the overall end user experience by selecting a 'more suitable' service destination over another, e.g., avoiding/reducing overload situations in specific service destinations.</t>
  <t>Supporting Layer 2 capabilities for multicast (compute interconnection and collective communication in <xref target="APPCENTRES"/>), e.g., through in-network/switch-based replication decisions (and their optimizations) based on dynamic group membership information, may reduce the network utilization and therefore increase the overall system efficiency.</t>
</list></t>

</section>
<section anchor="research-questions-4"><name>Research Questions</name>
<t>In addition to the research questions in <xref target="mobileOffloadRQ"/>:</t>

<t><list style="symbols">
  <t>RQ 5.1.1: How to utilize L2 multicast to improve on CDN designs? How to utilize COIN capabilities in those designs, such as through on-path optimizations for fanouts?</t>
  <t>RQ 5.1.2: What forwarding methods may support the required multicast capabilities (see <xref target="FCDN"/>) and how could programmable COIN forwarding elements support those methods (e.g., extending current SDN capabilities)?</t>
  <t>RQ 5.1.3: What are the constraints, reflecting both compute and network capabilities, that may support joint optimization of routing and computing? How could intermediary (COIN) program instances support, e.g., the aggregation of those constraints to reduce overall telemetry network traffic?</t>
  <t>RQ 5.1.4: Could traffic steering be performed on the data path and per service request, e.g., through (COIN) program instances that perform novel routing request lookup methods? If so, what would be performance improvements?</t>
  <t>RQ 5.1.5: How could storage be traded off against frequent, multicast-based replication (see <xref target="FCDN"/>)? Could intermediary/in-network (COIN) elements support the storage beyond current endpoint-based methods?</t>
  <t>RQ 5.1.6: What scalability limits exist for L2 multicast capabilities? How to overcome them, e.g., through (COIN) program instances serving as stateful subtree aggregators to reduce the needed identifier space for, e.g., bit-based forwarding?</t>
</list></t>

</section>
<section anchor="desirable-capabilities-5"><name>Desirable Capabilities</name>

<t>Capabilities 3.1.1 through 3.1.6 also apply for CDN service access. 
In addition:</t>

<t><list style="symbols">
  <t>Capability 5.1.1: Any solution should utilize Layer 2 multicast transmission capabilities for responses to concurrent service requests.</t>
</list></t>

</section>
</section>
<section anchor="CFaaS"><name>Compute-Fabric-as-a-Service (CFaaS)</name>

<section anchor="description-6"><name>Description</name>

<t>We interpret connected compute resources as operating at a suitable layer, such as Ethernet, InfiBand but also at Layer 3, to allow for the exchange of suitable invocation methods, such as exposed through verb-based or socket-based APIs. 
The specific invocations here are subject to the applications running over a selected pool of such connected compute resources.</t>

<t>Providing such pool of connected compute resources, e.g., in regional or edge data centers, base stations, and even end user devices, opens up the opportunity for infrastructure providers to offer CFaaS-like offerings to application providers, leaving the choice of the appropriate invocation method to the app and service provider. 
Through this, the compute resources can be utilized to execute the desired (COIN) programs of which the application is composed, while utilizing the interconnection between those compute resources to do so in a distributed manner.</t>

</section>
<section anchor="characterization-6"><name>Characterization</name>

<t>We foresee those CFaaS offerings to be tenant-specific, a tenant here defined as the provider of at least one application. 
For this, we foresee an interaction between CFaaS provider and tenant to dynamically select the appropriate resources to define the demand side of the fabric. 
Conversely, we also foresee the supply side of the fabric to be highly dynamic with resources being offered to the fabric through, e.g., user-provided resources (whose supply might depend on highly context-specific supply policies) or infrastructure resources of intermittent availability such as those provided through road-side infrastructure in vehicular scenarios.</t>

<t>The resulting dynamic demand-supply matching establishes a dynamic nature of the compute fabric that in turn requires trust relationships to be built dynamically between the resource provider(s) and the CFaaS provider. 
This also requires the communication resources to be dynamically adjusted to suitably interconnect all resources into the (tenant-specific) fabric exposed as CFaaS.</t>

</section>
<section anchor="existing-solutions-6"><name>Existing Solutions</name>

<t>There exist a number of technologies to build non-local (wide area) Layer 2 as well as Layer 3 networks, which in turn allows for connecting compute resources for a distributed computational task. 
For instance, 5G-LAN <xref target="SA2-5GLAN"/> specifies a cellular L2 bearer for interconnecting L2 resources within a single cellular operator. 
The work in <xref target="ICN5GLAN"/> outlines using a path-based forwarding solution over 5G-LAN as well as SDN-based LAN connectivity together with an ICN-based naming of IP and HTTP-level resources to achieve computational interconnections, including scenarios such as those outlined in <xref target="mobileAppOffload"/>.
L2 network virtualization (see, e.g., <xref target="L2Virt"/>) is one of the methods used for realizing so-called 'cloud-native' applications for applications developed with 'physical' networks in mind, thus forming an interconnected compute and storage fabric.</t>

</section>
<section anchor="opportunities-6"><name>Opportunities</name>

<t><list style="symbols">
  <t>Supporting service-level routing of compute resource requests (service routing in <xref target="APPCENTRES"/>) may allow for utilizing the wealth of compute resources in the overall CFaaS fabric for execution of distributed applications, where the distributed constituents of those applications are realized as (COIN) programs and executed within a COIN system as (COIN) program instances.</t>
  <t>Supporting the constraint-based selection of a specific (COIN) program instance over others (constraint-based routing in <xref target="APPCENTRES"/>) will allow for optimizing both the CFaaS provider constraints as well as tenant-specific constraints.</t>
  <t>Supporting Layer 2 and 3 capabilities for multicast (compute interconnection and collective communication in <xref target="APPCENTRES"/>) will allow for decreasing both network utilization but also possible compute utilization (due to avoiding unicast replication at those compute endpoints), thereby decreasing total cost of ownership for the CFaaS offering.</t>
  <t>Supporting the enforcement of trust relationships and isolation policies through intermediary (COIN) program instances, e.g., enforcing specific traffic shares or strict isolation of traffic through differentiated queueing.</t>
</list></t>

</section>
<section anchor="research-questions-5"><name>Research Questions</name>
<t>In addition to the research questions in <xref target="mobileOffloadRQ"/>:</t>

<t><list style="symbols">
  <t>RQ 5.2.1: How to convey tenant-specific requirements for the creation of the CFaaS fabric?</t>
  <t>RQ 5.2.2: How to dynamically integrate resources, particularly when driven by tenant-level requirements and changing service-specific constraints?</t>
  <t>RQ 5.2.3: How to utilize COIN capabilities to aid the availability and accountability of resources, i.e., what may be (COIN) programs for a CFaaS environment that in turn would utilize the distributed execution capability of a COIN system?</t>
  <t>RQ 5.2.4: How to utilize COIN capabilities to enforce traffic and isolation policies for establishing trust between tenant and CFaaS provider in an assured operation?</t>
</list></t>

</section>
<section anchor="desirable-capabilities-6"><name>Desirable Capabilities</name>

<t>Capabilities 3.1.1 through 3.1.6 also apply for the provisioning of services atop the CFaaS.
In addition:</t>

<t><list style="symbols">
  <t>Capability 5.2.1: Any solution should expose means to specify the requirements for the tenant-specific compute fabric being utilized for the service execution.</t>
  <t>Capability 5.2.2: Any solution should allow for dynamic integration of compute resources into the compute fabric being utilized for the app execution; those resources include, but are not limited to, end user provided resources. From a COIN system perspective, new resources must be possible to be exposed as possible (COIN) execution environments.</t>
  <t>Capability 5.2.3: Any solution must provide means to optimize the interconnection of compute resources, including those dynamically added and removed during the provisioning of the tenant-specific compute fabric.</t>
  <t>Capability 5.2.4: Any solution must provide means for ensuring that availability and usage of resources is accounted for.</t>
</list></t>

</section>
</section>
<section anchor="virtNetProg"><name>Virtual Networks Programming</name>

<section anchor="description-7"><name>Description</name>

<t>The term "virtual network programming" is proposed to describe mechanisms by which tenants deploy and operate COIN programs in their virtual network.
Such COIN programs can, e.g., be P4 programs, OpenFlow rules, or higher layer programs.
This feature can enable other use cases described in this draft to be deployed using virtual networks services, over underlying networks such as datacenters, mobile networks, or other fixed or wireless networks.</t>

<t>For example, COIN programs could perform the following on a tenant's virtual network:</t>

<t><list style="symbols">
  <t>Allow or block flows, and request rules from an SDN controller for each new flow, or for flows to or from specific hosts that need enhanced security</t>
  <t>Forward a copy of some flows towards a node for storage and analysis</t>
  <t>Update counters based on specific sources/destinations or protocols, for detailed analytics</t>
  <t>Associate traffic between specific endpoints, using specific protocols, or originated from a given application, to a given slice, while other traffic uses a default slice</t>
  <t>Experiment with a new routing protocol (e.g., ICN), using a P4 implementation of a router for this protocol</t>
</list></t>

</section>
<section anchor="characterization-7"><name>Characterization</name>

<t>To provide a concrete example of virtual COIN programming, we consider a use case using a 5G underlying network, the 5GLAN virtualization technology, and the P4 programming language and environment.
Section 5.1 of <xref target="I-D.ravi-icnrg-5gc-icn"/> provides a description of the 5G network functions and interfaces relevant to 5GLAN, which are otherwise specified in <xref target="TS23.501"/> and <xref target="TS23.502"/>.
From the 5GLAN service customer/tenant standpoint, the 5G network operates as a switch.</t>

<t>In the use case depicted in <xref target="figureVN1"/>, the tenant operates a network including a 5GLAN network segment (seen as a single logical switch), as well as fixed segments.
The mobile devices (or User Equipment nodes) UE1, UE2, UE3 and UE4 are in the same 5GLAN, as well as Device1 and Device2 (through UE4).
This scenario can take place in a plant or enterprise network, using, e.g., a 5G Non-Public Network.
The tenant uses P4 programs to determine the operation of both the fixed and 5GLAN switches.
The tenant provisions a 5GLAN P4 program into the mobile network, and can also operate a controller.</t>

<figure title="5G Virtual Network Programming Overview" anchor="figureVN1"><artwork><![CDATA[
                                     ..... Tenant ........
                          P4 program :                   :
                          deployment :         Operation :
                                     V                   :
  +-----+  air interface +----------------+              :
  | UE1 +----------------+                |              :
  +-----+                |                |              :
                         |                |              :
  +-----+                |                |              V
  | UE2 +----------------+     5GLAN      |      +------------+
  +-----+                |    Logical     +------+ Controller |
                         |     Switch     |  P4  +-------+----+
  +-----+                |                |  runtime     |
  | UE3 +----------------+                |  API         |
  +-----+                |                |              |
                         |                |              |
  +-----+                |                |              |
+-+ UE4 +----------------+                |              |
| +-----+                +----------------+              |
|                                                        |
| Fixed or wireless connection                           |
|                                    P4 runtime API      |
|  +---------+           +-------------------------------+
+--+ Device1 |           |
|  +---------+           |
|                        |
|  +---------+    +------+-----+
`--+ Device2 +----+ P4 Switch  +--->(fixed network)
   +---------+    +------------+
]]></artwork></figure>

</section>
<section anchor="existing-solutions-7"><name>Existing Solutions</name>

<t>Research has been conducted, for example by <xref target="Stoyanov"/>, to enable P4 network programming of individual virtual switches. 
To our knowledge, no complete solution has been developed for deploying virtual COIN programs over mobile or datacenter networks.</t>

</section>
<section anchor="opportunities-7"><name>Opportunities</name>

<t>Virtual network programming by tenants could bring benefits such as:</t>

<t><list style="symbols">
  <t>A unified programming model, which can facilitate porting COIN programs between data centers, 5G networks, and other fixed and wireless networks, as well as sharing controller, code and expertise.</t>
  <t>Increasing the level of customization available to customers/tenants of mobile networks or datacenters compared to typical configuration capabilities. 
For example, 5G network evolution points to an ever increasing specialization and customization of private mobile networks, which could be handled by tenants using a programming model similar to P4.</t>
  <t>Using network programs to influence underlying network services, e.g., request specific QoS for some flows in 5G or datacenters, to increase the level of in-depth customization available to tenants.</t>
</list></t>

</section>
<section anchor="research-questions-6"><name>Research Questions</name>

<t><list style="symbols">
  <t>RQ 5.3.1: Underlying Network Awareness: a virtual COIN program can be able to influence, and be influenced by, the underling network. Since some information and actions may be available on some nodes and not others, underlying network awareness may impose additional constraints on distributed network programs location.</t>
  <t>RQ 5.3.2: Splitting/Distribution: a virtual COIN program may need to be deployed across multiple computing nodes, leading to research questions around instance placement and distribution. For example, program logic should be applied exactly once or at least once per packet, while allowing optimal forwarding path by the underlying network. Research challenges include defining manual (by the programmer) or automatic methods to distribute COIN programs that use a low or minimal amount of resources. Distributed P4 programs are studied in <xref target="I-D.hsingh-coinrg-reqs-p4comp"/> and <xref target="Sultana"/>.</t>
  <t>RQ 5.3.3: Multi-Tenancy Support: multiple virtual COIN program instances can run on the same compute node. While mechanisms were proposed for P4 multi-tenancy in a switch <xref target="Stoyanov"/>, research questions remain about isolation between tenants and fair repartition of resources.</t>
  <t>RQ 5.3.4: Security: how can tenants and underlying networks be protected against security risks, including overuse or misuse of network resources, injection of traffic, or access to unauthorized traffic?</t>
  <t>RQ 5.3.5: Higher layer processing: can a virtual network model facilitate the deployment of COIN programs acting on application layer data? This is an open question since the present section focused on packet/flow processing.</t>
</list></t>

</section>
<section anchor="desirable-capabilities-7"><name>Desirable Capabilities</name>

<t><list style="symbols">
  <t>Capability 5.3.1: A COIN system supporting virtualization should enable tenants to deploy COIN programs onto their virtual networks.</t>
  <t>Capability 5.3.2: A virtual COIN program should process flows/packets once and only once (or at least once for idempotent operations), even if the program is distributed over multiple PNDs.</t>
  <t>Capability 5.3.3: Multi-tenancy should be supported for virtual COIN programs, i.e., instances of virtual COIN programs from different tenants can share underlying PNDs. This includes requirements for secure isolation between tenants, and fair (or policy-based) sharing of computing resources.</t>
  <t>Capability 5.3.4: Virtual COIN programs should support mobility of endpoints.</t>
</list></t>

</section>
</section>
</section>
<section anchor="newCapabilities"><name>Enabling new COIN capabilities</name>

<section anchor="distributedAI"><name>Distributed AI Training</name>

<section anchor="description-8"><name>Description</name>

<t>There is a growing range of use cases demanding for the realization of AI training capabilities among distributed endpoints.
Such demand may be driven by the need to increase overall computational power for large-scale problems.
From a COIN perspective, those capabilities may be realized as (COIN) programs and executed throughout a COIN system, including in PNDs.</t>

<t>Some solutions may desire the localization of reasoning logic, e.g., for deriving attributes that better preserve privacy of the utilized raw input data.
Quickly establishing (COIN) program instances in nearby compute resources, including PNDs, may even satisfy such localization demands on-the-fly (e.g., when a particular use is being realized, then terminated after a given time).</t>

</section>
<section anchor="characterization-8"><name>Characterization</name>

<t>Examples for large-scale AI training problems include biotechnology and astronomy related reasoning over massive amounts of observational input data.
Examples for localizing input data for privacy reasons include radar-like applications for the development of topological mapping data based on (distributed) radio measurements at base stations (and possibly end devices), while the processing within radio access networks (RAN) already constitutes a distributed AI training problem to a certain extent albeit with little flexibility in distributing the execution of the AI logic. Other examples include the extraction of key patient features from local private patient data, e.g., held at organizationally separate health trusts.</t>

</section>
<section anchor="existing-solutions-8"><name>Existing Solutions</name>

<t>Reasoning frameworks, such as TensorFlow, may be utilized for the realization of the (distributed) AI training logic, building on remote service invocation through protocols such as gRPC <xref target="GRPC"/> or MPI <xref target="MPI"/> with the intention of providing an on-chip NPU (neural processor unit) like abstraction to the AI framework.</t>

<t>A number of activities on distributed AI training exist in the area of developing the 5th and 6th generation mobile network with various activities in the 3GPP SDO as well as use cases developed for the ETSI MEC initiative mentioned in previous use cases.</t>

</section>
<section anchor="opportunities-8"><name>Opportunities</name>

<t><list style="symbols">
  <t>Supporting service-level routing of training requests (service routing in <xref target="APPCENTRES"/>), with AI services being exposed to the network, where (COIN) program instances may support the selection of the most suitable service instance based on control plane information, e.g., on AI worker compute capabilities, being distributed across (COIN) program instances.</t>
  <t>Supporting the collective communication primitives, such as all-to-all, scatter-gather, utilized by the (distributed) AI workers to increase the overall network efficiency, e.g., through avoiding endpoint-based replication or even directly performing, e.g., reduce,
    collective primitive operations in (COIN) program instances placed in topologically advantageous places.</t>
  <t>Supporting collective communication between multiple instances of AI services, i.e., (COIN) program instances, may  positively impact network but also compute utilization by moving from unicast replication to network-assisted multicast operation.</t>
</list></t>

</section>
<section anchor="research-questions-7"><name>Research Questions</name>
<t>In addition to the research questions in <xref target="mobileOffloadRQ"/>:</t>

<t><list style="symbols">
  <t>RQ 6.1.1: What are the communication patterns that may be supported by collective communication solutions, where those solutions directly utilize (COIN) program instance capabilities within the network (e.g., reduce in a central (COIN) program instance)?</t>
  <t>RQ 6.1.2: How to achieve scalable multicast delivery for collective communication primitives with rapidly changing receiver sets, e.g., where training workers may be dynamically selected based on energy efficiency constraints <xref target="GREENAI"/>?</t>
  <t>RQ 6.1.3: What COIN capabilities may support the collective communication patterns found in distributed AI problems?</t>
  <t>RQ 6.1.4: How to provide a service routing capability that supports AI-specific invocation protocols, such as MPI or RDMA?</t>
</list></t>

</section>
<section anchor="desirable-capabilities-8"><name>Desirable Capabilities</name>

<t>Capabilities 3.1.1 through 3.1.6 also apply for general distributed AI capabilities. 
In addition:</t>

<t><list style="symbols">
  <t>Capability 6.1.1: Any COIN system must provide means to specify the constraints for placing (AI) execution logic in the form of (COIN) programs in certain logical execution points (and their associated physical locations), including PNDs.</t>
  <t>Capability 6.1.2: Any COIN system must provide support for app/micro-service specific invocation protocols for requesting (COIN) program services exposed to the COIN system.</t>
</list></t>

</section>
</section>
</section>
<section anchor="sec_considerations"><name>Security Considerations</name>

<t>COIN systems, like any other system using ``middleboxes'', can have different security and privacy implications that strongly depend on the used platforms, the provided functionality, and the deployment domain, with most if not all considerations for general middleboxes also applying for COIN systems.</t>

<t>One critical aspect for early COIN systems is the use of early-generation PNDs, many of which do not have cryptography support and only have limited computational capabilities.
Hence, PND-based COIN systems typically work on unencrypted data and often customize packet payload while concepts, such as homomorphic encryption, could serve as workarounds, allowing PNDs to perform simple operations on the encrypted data without having access to it.
All these approaches introduce the same or very similar security implications as any middlebox operating on unencrypted traffic or having access to encryption: a middlebox can itself have malicious intentions, e.g., because it got compromised, or the deployment of functionality offers new attack vectors to outsiders.</t>

<t>However, similar to middlebox deployments, risks for privacy and of data exposure have to be carefully considered in the context of the concrete deployment.
For example, exposing data to an external operator for mobile application offloading leads to a significant privacy loss of the user in any case.
In contrast, such privacy considerations are not as relevant for COIN systems where all involved entities are under the same control, such as in an industrial context.
Here, exposed data and functionality can instead lead to stolen business secrets or the enabling of, e.g., DoS attacks.
Hence, even in fully controlled scenarios, COIN intermediaries, and middleboxes in general, are ideally operated in a least-privilege mode, where they have exactly those permissions to read and alter payload that are necessary to fulfil their purpose.</t>

<t>Research on granting middleboxes access to secured traffic is only in its infancy and a variety of different approaches are proposed and analyzed <xref target="TLSSURVEY"/>.
In a SplitTLS <xref target="SPLITTLS"/> deployment, e.g., middleboxes have different incoming and outgoing TLS channels, such that they have full read and write access to all intercepted traffic. 
More restrictive approaches for deploying middleboxes rely on searchable encryption or zero-knowledge proofs to expose less data to intermediaries, but those only offer limited functionality. 
MADTLS<xref target="MADTLS"/> is tailored to the industrial domain and offers bit-level read and write access to intermediaries with low latency and bandwidth overhead, at the cost of more complex key management. 
Overall, different proposals offer different advantages and disadvantages that must be carefully considered in the context of concrete deployments. 
Further research could pave the way for a more unified and configurable solution that is easier to maintain and deploy.</t>

<t>Finally, COIN systems and other middlebox deployments can also lead to security risks even if the attack stems from an outsider without direct access to any devices. 
As such, metadata about the entailed processing (processing times, changes in incoming and outgoing data) can allow an attacker to extract valuable information about the process. 
Moreover, such deployments can become central entities that, if paralyzed (e.g., through extensive requests), can be responsible for large-scale outages. 
In particular, some deployments could be used to amplify DoS attacks.
Similar to other middlebox deployments, these potential risks must be considered when deploying COIN functionality and may influence the selection of suitable security protocols.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>N/A</t>

</section>
<section anchor="conclusion"><name>Conclusion</name>
<t>This document presented use cases gathered from several application domains that can and could profit from capabilities that are provided by in-network and, more generally, distributed compute capabilities.
We distinguished between use cases in which COIN may enable new experiences (<xref target="newExperiences"/>), expose new features (<xref target="newCapabilities"/>), or improve on existing system capabilities (<xref target="existingCapabilities"/>), and other use cases where COIN capabilities enable totally new applications, for example, in industrial networking (<xref target="newEnvironments"/>).</t>

<t>Beyond the mere description and characterization of those use cases, we identified opportunities arising from utilizing COIN capabilities as well as research questions that may need to be addressed before being able to reap those opportunities.
We also outlined desirable capabilities for COIN systems realizing these use cases.</t>

<t>We acknowledge that this work offers no comprehensive overview of possible use cases and is thus only a snapshot of what may be possible if COIN capabilities existed.<br />
In fact, the decomposition of many current client-server applications into node by node transit could identify other opportunities for adding computing to forwarding notably in supply-chain, health care, intelligent cities and transportation and even financial services (among others).</t>

<t>With this in mind, updates to this document might become necessary or desirable in the future to capture this extended view on what may be possible. 
We are, however, confident that the current selection of use cases, each describing the dimensions of opportunities, research questions, and desired capabilities, already represents a useful set of scenarios that yield themselves for a subsequent analysis that is currently intended to be performed in <xref target="USECASEANALYSIS"/>. 
Through this, the use cases presented here together with the intended analysis provide direct input into the milestones of COINRG in terms of required functionalities.</t>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank Eric Wagner for providing text on the security considerations.
The authors would further like to thank Chathura Sarathchandra, David Oran, Phil Eardley, Stuart Card, Jeffrey He, Toerless Eckert, and Jon Crowcroft for reviewing the document.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>




<reference anchor='APPCENTRES'>
   <front>
      <title>In-Network Computing for App-Centric Micro-Services</title>
      <author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Chathura Sarathchandra' initials='C.' surname='Sarathchandra'>
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname='Michael Boniface' initials='M.' surname='Boniface'>
         <organization>University of Southampton</organization>
      </author>
      <date day='26' month='January' year='2021'/>
      <abstract>
	 <t>   The application-centric deployment of &#x27;Internet&#x27; services has
   increased over the past ten years with many millions of applications
   providing user-centric services, executed on increasingly more
   powerful smartphones that are supported by Internet-based cloud
   services in distributed data centres, the latter mainly provided by
   large scale players such as Google, Amazon and alike. This draft
   outlines a vision for evolving those data centres towards executing
   app-centric micro-services; we dub this evolved data centre as an
   AppCentre. Complemented with the proliferation of such AppCentres at
   the edge of the network, they will allow for such micro-services to
   be distributed across many places of execution, including mobile
   terminals themselves, while specific micro-service chains equal
   today&#x27;s applications in existing smartphones.

   We outline the key enabling technologies that needs to be provided
   for such evolution to be realized, including references to ongoing
   standardization efforts in key areas.


	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-sarathchandra-coin-appcentres-04'/>
   
</reference>

<reference anchor='RUETH'>
  <front>
    <title>Towards In-Network Industrial Feedback Control</title>
    <author fullname='Jan Rueth' initials='J.' surname='Rueth'>
      <organization>RWTH Aachen University</organization>
    </author>
    <author fullname='Rene Glebke' initials='R.' surname='Glebke'>
      <organization>RWTH Aachen University</organization>
    </author>
    <author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'>
      <organization>RWTH Aachen University</organization>
    </author>
    <author fullname='Vedad Causevic' initials='V.' surname='Causevic'>
      <organization>Technical University of Munich</organization>
    </author>
    <author fullname='Sandra Hirche' initials='S.' surname='Hirche'>
      <organization>Technical University of Munich</organization>
    </author>
    <date month='August' year='2018'/>
  </front>
  <seriesInfo name='Proceedings of the 2018 Morning Workshop on In-Network' value='Computing'/>
  <seriesInfo name='DOI' value='10.1145/3229591.3229592'/>
</reference>

<reference anchor='VESTIN'>
  <front>
    <title>FastReact: In-Network Control and Caching for Industrial Control Networks using Programmable Data Planes</title>
    <author fullname='Jonathan Vestin' initials='J.' surname='Vestin'>
      <organization/>
    </author>
    <author fullname='Andreas Kassler' initials='A.' surname='Kassler'>
      <organization/>
    </author>
    <author fullname='Johan Akerberg' initials='J.' surname='Akerberg'>
      <organization/>
    </author>
    <date month='September' year='2018'/>
  </front>
  <seriesInfo name='2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)' value='pp. 219-226'/>
  <seriesInfo name='DOI' value='10.1109/etfa.2018.8502456'/>
</reference>

<reference anchor='GLEBKE'>
  <front>
    <title>A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems</title>
    <author fullname='Rene Glebke' initials='R.' surname='Glebke'>
      <organization/>
    </author>
    <author fullname='Martin Henze' initials='M.' surname='Henze'>
      <organization/>
    </author>
    <author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'>
      <organization/>
    </author>
    <author fullname='Philipp Niemietz' initials='P.' surname='Niemietz'>
      <organization/>
    </author>
    <author fullname='Daniel Trauth' initials='D.' surname='Trauth'>
      <organization/>
    </author>
    <author fullname='Patrick Mattfeld MBA' initials='P.' surname='Mattfeld MBA'>
      <organization/>
    </author>
    <author fullname='Thomas Bergs' initials='T.' surname='Bergs'>
      <organization/>
    </author>
    <date year='2019'/>
  </front>
  <seriesInfo name='Proceedings of the Annual Hawaii International Conference on System' value='Sciences'/>
  <seriesInfo name='DOI' value='10.24251/hicss.2019.871'/>
</reference>


<reference anchor='USECASEANALYSIS'>
   <front>
      <title>Use Case Analysis for Computing in the Network</title>
      <author fullname='Jungha Hong' initials='J.' surname='Hong'>
         <organization>ETRI</organization>
      </author>
      <author fullname='Ike Kunze' initials='I.' surname='Kunze'>
         <organization>RWTH Aachen University</organization>
      </author>
      <author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'>
         <organization>RWTH Aachen University</organization>
      </author>
      <author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
         <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname='Marie-Jose Montpetit' initials='M.' surname='Montpetit'>
         <organization>Concordia University</organization>
      </author>
      <author fullname='Xavier de Foy' initials='X.' surname='de Foy'>
         <organization>InterDigital Communications, LLC</organization>
      </author>
      <author fullname='David Griffin' initials='D.' surname='Griffin'>
         <organization>University College London</organization>
      </author>
      <author fullname='Miguel Rio' initials='M.' surname='Rio'>
         <organization>University College London</organization>
      </author>
      <date day='10' month='July' year='2023'/>
      <abstract>
	 <t>   Computing in the Network (COIN) has the potential to enable a wide
   variety of use cases.  The diversity in use cases makes challenges in
   defining general considerations.  This document analyzes the use
   cases described in its companion document and potentially explores
   additional settings, to identify general aspects of interest across
   all use cases.  The insights gained from this analysis will guide
   future COIN discussions.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-irtf-coinrg-use-case-analysis-01'/>
   
</reference>


<reference anchor='TERMINOLOGY'>
   <front>
      <title>Terminology for Computing in the Network</title>
      <author fullname='Jungha Hong' initials='J.' surname='Hong'>
         <organization>ETRI</organization>
      </author>
      <author fullname='Ike Kunze' initials='I.' surname='Kunze'>
         <organization>RWTH Aachen University</organization>
      </author>
      <author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'>
         <organization>RWTH Aachen University</organization>
      </author>
      <author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
         <organization>Huawei Technologies Duesseldorf GmbH</organization>
      </author>
      <author fullname='Marie-Jose Montpetit' initials='M.' surname='Montpetit'>
         <organization>Concordia University</organization>
      </author>
      <author fullname='Xavier de Foy' initials='X.' surname='de Foy'>
         <organization>InterDigital Communications, LLC</organization>
      </author>
      <author fullname='David Griffin' initials='D.' surname='Griffin'>
         <organization>University College London</organization>
      </author>
      <author fullname='Miguel Rio' initials='M.' surname='Rio'>
         <organization>University College London</organization>
      </author>
      <date day='10' month='July' year='2023'/>
      <abstract>
	 <t>   The term Computing in the Network (COIN) is used for a diverse set of
   scenarios.  Often associated with leveraging richer computing
   capabilities within network elements, its clear scope is yet unknown.
   This document tries to bring clarity to the current understanding of
   COIN by providing an overview of the terminology and definitions to
   streamline corresponding discussions.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-irtf-coinrg-coin-terminology-01'/>
   
</reference>


<reference anchor="GRPC" target="https://grpc.io/">
  <front>
    <title>High performance open source universal RPC framework</title>
    <author >
      <organization></organization>
    </author>
    <date />
  </front>
</reference>
<reference anchor="MPI" target="https://arxiv.org/pdf/1603.02339.pdf">
  <front>
    <title>Scaling Distributed Machine Learning with In-Network Aggregation</title>
    <author initials="A." surname="Vishnu">
      <organization></organization>
    </author>
    <author initials="C." surname="Siegel">
      <organization></organization>
    </author>
    <author initials="J." surname="Daily">
      <organization></organization>
    </author>
    <date />
  </front>
</reference>
<reference anchor="FCDN" target="https://arxiv.org/pdf/1803.00876.pdf">
  <front>
    <title>A Flexible and Efficient CDN Infrastructure without DNS Redirection of Content Reflection</title>
    <author initials="M." surname="Al-Naday">
      <organization></organization>
    </author>
    <author initials="M. J." surname="Reed">
      <organization></organization>
    </author>
    <author initials="J." surname="Riihijarvi">
      <organization></organization>
    </author>
    <author initials="D." surname="Trossen">
      <organization></organization>
    </author>
    <author initials="N." surname="Thomos">
      <organization></organization>
    </author>
    <author initials="M." surname="Al-Khalidi">
      <organization></organization>
    </author>
    <date />
  </front>
</reference>



<reference anchor='I-D.ravi-icnrg-5gc-icn'>
   <front>
      <title>Enabling ICN in 3GPP&#x27;s 5G NextGen Core Architecture</title>
      <author fullname='Ravi Ravindran' initials='R.' surname='Ravindran'>
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Prakash Suthar' initials='P.' surname='Suthar'>
         <organization>Cisco Systems</organization>
      </author>
      <author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname='Chonggang Wang' initials='C.' surname='Wang'>
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname='Greg White' initials='G.' surname='White'>
         <organization>CableLabs</organization>
      </author>
      <date day='31' month='May' year='2019'/>
      <abstract>
	 <t>   The proposed 3GPP&#x27;s 5G core nextgen architecture (5GC) offers
   flexibility to introduce new user and control plane function,
   considering the support for network slicing functions, that allows
   greater flexibility to handle heterogeneous devices and applications.
   In this draft, we provide a short description of the proposed 5GC
   architecture, including recent efforts to provide cellular Local Area
   Network (LAN) connectivity, followed by extensions to 5GC&#x27;s control
   and user plane to support Packet Data Unit (PDU) sessions from
   Information-Centric Networks (ICN).  In addition, ICN over 5GLAN is
   also described.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ravi-icnrg-5gc-icn-04'/>
   
</reference>


<reference anchor='I-D.hsingh-coinrg-reqs-p4comp'>
   <front>
      <title>Requirements for P4 Program Splitting for Heterogeneous Network Nodes</title>
      <author fullname='Hemant Singh' initials='H.' surname='Singh'>
         <organization>MNK Labs and Consulting</organization>
      </author>
      <author fullname='Marie-Jose Montpetit' initials='M.' surname='Montpetit'>
         <organization>Concordia Univeristy</organization>
      </author>
      <date day='18' month='February' year='2021'/>
      <abstract>
	 <t>   For distributed computing, the P4 research community has published a
   paper to show how to split a P4 program into sub-programs which run
   on heterogeneous network nodes in a network.  Examples of nodes are a
   network switch, a smartNIC, or a host machine.  The paper has
   developed artifacts to split program based on latency, data rate,
   cost, etc.  However, the paper does not mention any requirements.  To
   provide guidance, this document covers requirements for splitting P4
   programs for heterogeneous network nodes.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-hsingh-coinrg-reqs-p4comp-03'/>
   
</reference>


<reference anchor="Stoyanov" target="https://eng.ox.ac.uk/media/6354/stoyanov2020mtpsa.pdf">
  <front>
    <title>MTPSA: Multi-Tenant Programmable Switches</title>
    <author initials="R." surname="Stoyanov">
      <organization></organization>
    </author>
    <author initials="N." surname="Zilberman">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="ACM P4 Workshop in Europe (EuroP4'20)" value=""/>
</reference>
<reference anchor="TS23.501" target="https://www.3gpp.org/DynaReport/23501.htm">
  <front>
    <title>Technical Specification Group Services and System Aspects; System Architecture for the 5G System; Stage 2 (Rel.17)</title>
    <author initials="" surname="3gpp-23.501" fullname="3gpp-23.501">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="3GPP" value=""/>
</reference>
<reference anchor="TS23.502" target="https://www.3gpp.org/DynaReport/23502.htm">
  <front>
    <title>Technical Specification Group Services and System Aspects; Procedures for the 5G System; Stage 2 (Rel.17)</title>
    <author initials="" surname="3gpp-23.502" fullname="3gpp-23.502">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="3GPP" value=""/>
</reference>
<reference anchor="SA2-5GLAN" target="http://www.3gpp.org/ftp/tsg_sa/TSG_SA/Docs/SP-181120.zip">
  <front>
    <title>SP-181129, Work Item Description, Vertical_LAN(SA2), 5GS Enhanced Support of Vertical and LAN Services</title>
    <author initials="" surname="3GPP-5glan" fullname="3GPP-5glan">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="3GPP" value=""/>
</reference>



<reference anchor='ICN5GLAN'>
   <front>
      <title>IP-based Services over ICN in 5G LAN Environments</title>
      <author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname='Chonggang Wang' initials='C.' surname='Wang'>
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname='Sebastian Robitzsch' initials='S.' surname='Robitzsch'>
         <organization>InterDigital Inc.</organization>
      </author>
      <author fullname='Martin Reed' initials='M.' surname='Reed'>
         <organization>Essex University</organization>
      </author>
      <author fullname='Mays AL-Naday' initials='M.' surname='AL-Naday'>
         <organization>Essex University</organization>
      </author>
      <author fullname='Janne Riihijarvi' initials='J.' surname='Riihijarvi'>
         <organization>RWTH Aachen</organization>
      </author>
      <date day='6' month='June' year='2019'/>
      <abstract>
	 <t>   In this draft, we provide architecture and operations for enabling IP
   services over ICN over (5G-enabled) LAN environments.  Operations
   include ICN API to upper layers, HTTP over ICN, Service Proxy
   Operations, ICN Flow Management, Name Resolution, Mobility Handling,
   and Dual Stack Device Support.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-trossen-icnrg-ip-icn-5glan-00'/>
   
</reference>


<reference anchor="Sultana" target="https://flightplan.cis.upenn.edu/flightplan.pdf">
  <front>
    <title>Flightplan: Dataplane Disaggregation and Placement for P4 Programs</title>
    <author initials="N." surname="Sultana">
      <organization></organization>
    </author>
    <author initials="J." surname="Sonchack">
      <organization></organization>
    </author>
    <author initials="H." surname="Giesen">
      <organization></organization>
    </author>
    <author initials="I." surname="Pedisich">
      <organization></organization>
    </author>
    <author initials="Z." surname="Han">
      <organization></organization>
    </author>
    <author initials="N." surname="Shyamkumar">
      <organization></organization>
    </author>
    <author initials="S." surname="Burad">
      <organization></organization>
    </author>
    <author initials="A." surname="DeHon">
      <organization></organization>
    </author>
    <author initials="B. T." surname="Loo">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
</reference>
<reference anchor="ETSI" target="https://www.etsi.org/technologies/multi-access-edge-computing">
  <front>
    <title>Multi-access Edge Computing (MEC)</title>
    <author initials="" surname="ETSI" fullname="ETSI">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
</reference>
<reference anchor="Microservices" target="https://microservices.io/">
  <front>
    <title>What are microservices?</title>
    <author initials="C." surname="Richardson">
      <organization></organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="GSLB" target="https://www.cloudflare.com/learning/cdn/glossary/global-server-load-balancing-gslb/">
  <front>
    <title>What is global server load balancing (GSLB)?</title>
    <author initials="" surname="Cloudflare" fullname="Cloudflare">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
</reference>
<reference anchor="L2Virt" target="https://blogs.oracle.com/cloud-infrastructure/post/first-principles-l2-network-virtualization-for-lift-and-shift">
  <front>
    <title>First principles: L2 network virtualization for lift and shift</title>
    <author initials="L." surname="Kreger-Stickles">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
</reference>


<reference anchor='KUNZE-APPLICABILITY'>
  <front>
    <title>Investigating the Applicability of In-Network Computing to Industrial Scenarios</title>
    <author fullname='Ike Kunze' initials='I.' surname='Kunze'>
      <organization/>
    </author>
    <author fullname='Rene Glebke' initials='R.' surname='Glebke'>
      <organization/>
    </author>
    <author fullname='Jan Scheiper' initials='J.' surname='Scheiper'>
      <organization/>
    </author>
    <author fullname='Matthias Bodenbenner' initials='M.' surname='Bodenbenner'>
      <organization/>
    </author>
    <author fullname='Robert H. Schmitt' initials='R.' surname='Schmitt'>
      <organization/>
    </author>
    <author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'>
      <organization/>
    </author>
    <date month='May' year='2021'/>
  </front>
  <seriesInfo name='2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS)' value='pp. 334-340'/>
  <seriesInfo name='DOI' value='10.1109/icps49255.2021.9468247'/>
</reference>

<reference anchor='KUNZE-SIGNAL'>
  <front>
    <title>Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using In-Network Computing</title>
    <author fullname='Ike Kunze' initials='I.' surname='Kunze'>
      <organization>Communication and Distributed Systems</organization>
    </author>
    <author fullname='Philipp Niemietz' initials='P.' surname='Niemietz'>
      <organization>Laboratory for Machine Tools and Production Engineering (WZL)</organization>
    </author>
    <author fullname='Liam Tirpitz' initials='L.' surname='Tirpitz'>
      <organization>Communication and Distributed Systems</organization>
    </author>
    <author fullname='Rene Glebke' initials='R.' surname='Glebke'>
      <organization>Communication and Distributed Systems</organization>
    </author>
    <author fullname='Daniel Trauth' initials='D.' surname='Trauth'>
      <organization>Laboratory for Machine Tools and Production Engineering (WZL)</organization>
    </author>
    <author fullname='Thomas Bergs' initials='T.' surname='Bergs'>
      <organization>Laboratory for Machine Tools and Production Engineering (WZL)</organization>
    </author>
    <author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'>
      <organization>Communication and Distributed Systems</organization>
    </author>
    <date month='June' year='2021'/>
  </front>
  <seriesInfo name='2021 IEEE 30th International Symposium on Industrial Electronics' value='(ISIE)'/>
  <seriesInfo name='DOI' value='10.1109/isie45552.2021.9576221'/>
</reference>

<reference anchor='SarNet2021'>
  <front>
    <title>Service-based Forwarding via Programmable Dataplanes</title>
    <author fullname='Rene Glebke' initials='R.' surname='Glebke'>
      <organization/>
    </author>
    <author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
      <organization/>
    </author>
    <author fullname='Ike Kunze' initials='I.' surname='Kunze'>
      <organization/>
    </author>
    <author fullname='David Lou' initials='D.' surname='Lou'>
      <organization/>
    </author>
    <author fullname='Jan Rueth' initials='J.' surname='Rueth'>
      <organization/>
    </author>
    <author fullname='Mirko Stoffers' initials='M.' surname='Stoffers'>
      <organization/>
    </author>
    <author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'>
      <organization/>
    </author>
    <date month='June' year='2021'/>
  </front>
  <seriesInfo name='2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)' value='pp. 1-8'/>
  <seriesInfo name='DOI' value='10.1109/hpsr52026.2021.9481814'/>
</reference>

<reference anchor='Multi2020'>
  <front>
    <title>Routing on Multiple Optimality Criteria</title>
    <author fullname='João Luís Sobrinho' initials='J.' surname='Sobrinho'>
      <organization>Instituto de Telecomunicações, Instituto Superior Tecnico, Universidade de Lisboa</organization>
    </author>
    <author fullname='Miguel Alves Ferreira' initials='M.' surname='Ferreira'>
      <organization>Instituto de Telecomunicações, Instituto Superior Tecnico, Universidade de Lisboa</organization>
    </author>
    <date month='July' year='2020'/>
  </front>
  <seriesInfo name='Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer' value='communication'/>
  <seriesInfo name='DOI' value='10.1145/3387514.3405864'/>
</reference>

<reference anchor='SILKROAD'>
  <front>
    <title>SilkRoad: Making Stateful Layer-4 Load Balancing Fast and Cheap Using Switching ASICs</title>
    <author fullname='Rui Miao' initials='R.' surname='Miao'>
      <organization>University of Southern California</organization>
    </author>
    <author fullname='Hongyi Zeng' initials='H.' surname='Zeng'>
      <organization>Facebook</organization>
    </author>
    <author fullname='Changhoon Kim' initials='C.' surname='Kim'>
      <organization>Barefoot Networks</organization>
    </author>
    <author fullname='Jeongkeun Lee' initials='J.' surname='Lee'>
      <organization>Barefoot Networks</organization>
    </author>
    <author fullname='Minlan Yu' initials='M.' surname='Yu'>
      <organization>Yale University</organization>
    </author>
    <date month='August' year='2017'/>
  </front>
  <seriesInfo name='Proceedings of the Conference of the ACM Special Interest Group on Data' value='Communication'/>
  <seriesInfo name='DOI' value='10.1145/3098822.3098824'/>
</reference>

<reference anchor='GREENAI'>
  <front>
    <title>A Safe Genetic Algorithm Approach for Energy Efficient Federated Learning in Wireless Communication Networks</title>
    <author fullname='Lina Magoula' initials='L.' surname='Magoula'>
      <organization>National and Kapodistrian University of Athens,Dept. of Informatics and Telecommunications,Greece</organization>
    </author>
    <author fullname='Nikolaos Koursioumpas' initials='N.' surname='Koursioumpas'>
      <organization>National and Kapodistrian University of Athens,Dept. of Informatics and Telecommunications,Greece</organization>
    </author>
    <author fullname='Alexandros-Ioannis Thanopoulos' initials='A.' surname='Thanopoulos'>
      <organization>National and Kapodistrian University of Athens,Dept. of Informatics and Telecommunications,Greece</organization>
    </author>
    <author fullname='Theodora Panagea' initials='T.' surname='Panagea'>
      <organization>National and Kapodistrian University of Athens,Dept. of Informatics and Telecommunications,Greece</organization>
    </author>
    <author fullname='Nikolaos Petropouleas' initials='N.' surname='Petropouleas'>
      <organization>National and Kapodistrian University of Athens,Dept. of Informatics and Telecommunications,Greece</organization>
    </author>
    <author fullname='M. A. Gutierrez-Estevez' initials='M.' surname='Gutierrez-Estevez'>
      <organization>Huawei Technologies Duesseldorf GmbH,Munich Research Center,Munich,Germany</organization>
    </author>
    <author fullname='Ramin Khalili' initials='R.' surname='Khalili'>
      <organization>Huawei Technologies Duesseldorf GmbH,Munich Research Center,Munich,Germany</organization>
    </author>
    <date month='September' year='2023'/>
  </front>
  <seriesInfo name='2023 IEEE 34th Annual International Symposium on Personal, Indoor and Mobile Radio Communications' value='(PIMRC)'/>
  <seriesInfo name='DOI' value='10.1109/pimrc56721.2023.10293863'/>
</reference>

<reference anchor='TLSSURVEY'>
  <front>
    <title>A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made "end-to-me" for web traffic</title>
    <author fullname='Xavier de Carne de Carnavalet' initials='X.' surname='de Carne de Carnavalet'>
      <organization>The Hong Kong Polytechnic University, Hong Kong SAR</organization>
    </author>
    <author fullname='Paul C. van Oorschot' initials='P.' surname='van Oorschot'>
      <organization>Carleton University, Ontario, Canada</organization>
    </author>
    <date month='July' year='2023'/>
  </front>
  <seriesInfo name='ACM Computing Surveys' value='vol. 55, no. 13s, pp. 1-40'/>
  <seriesInfo name='DOI' value='10.1145/3580522'/>
</reference>

<reference anchor='MADTLS'>
  <front>
    <title>Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication</title>
    <author fullname='Eric Wagner' initials='E.' surname='Wagner'>
      <organization/>
    </author>
    <author fullname='David Heye' initials='D.' surname='Heye'>
      <organization/>
    </author>
    <author fullname='Martin Serror' initials='M.' surname='Serror'>
      <organization/>
    </author>
    <author fullname='Ike Kunze' initials='I.' surname='Kunze'>
      <organization/>
    </author>
    <author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'>
      <organization/>
    </author>
    <author fullname='Martin Henze' initials='M.' surname='Henze'>
      <organization/>
    </author>
    <date year='2023'/>
  </front>
  <seriesInfo name='' value='arXiv'/>
  <seriesInfo name='DOI' value='10.48550/ARXIV.2312.09650'/>
</reference>

<reference anchor='SPLITTLS'>
  <front>
    <title>Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS</title>
    <author fullname='David Naylor' initials='D.' surname='Naylor'>
      <organization>Carnegie Mellon University, Pittsburgh, PA, USA</organization>
    </author>
    <author fullname='Kyle Schomp' initials='K.' surname='Schomp'>
      <organization>Case Western Reserve University, Cleveland, OH, USA</organization>
    </author>
    <author fullname='Matteo Varvello' initials='M.' surname='Varvello'>
      <organization>Telefonica Research, Barcelona, Spain</organization>
    </author>
    <author fullname='Ilias Leontiadis' initials='I.' surname='Leontiadis'>
      <organization>Telefonica Research, Barcelona, Spain</organization>
    </author>
    <author fullname='Jeremy Blackburn' initials='J.' surname='Blackburn'>
      <organization>Telefonica Research, Barcelona, USA</organization>
    </author>
    <author fullname='Diego R. Lopez' initials='D.' surname='Lopez'>
      <organization>Telefonica, Barcelona, Spain</organization>
    </author>
    <author fullname='Konstantina Papagiannaki' initials='K.' surname='Papagiannaki'>
      <organization>Telefonica Research, Barcelona, Spain</organization>
    </author>
    <author fullname='Pablo Rodriguez Rodriguez' initials='P.' surname='Rodriguez Rodriguez'>
      <organization>Telefonica Research, Barcelona, Spain</organization>
    </author>
    <author fullname='Peter Steenkiste' initials='P.' surname='Steenkiste'>
      <organization>Carnegie Mellon University, Pittsburgh, PA, USA</organization>
    </author>
    <date month='August' year='2015'/>
  </front>
  <seriesInfo name='ACM SIGCOMM Computer Communication Review' value='vol. 45, no. 4, pp. 199-212'/>
  <seriesInfo name='DOI' value='10.1145/2829988.2787482'/>
</reference>

<reference anchor='RFC7272'>
  <front>
    <title>Inter-Destination Media Synchronization (IDMS) Using the RTP Control Protocol (RTCP)</title>
    <author fullname='R. van Brandenburg' initials='R.' surname='van Brandenburg'/>
    <author fullname='H. Stokking' initials='H.' surname='Stokking'/>
    <author fullname='O. van Deventer' initials='O.' surname='van Deventer'/>
    <author fullname='F. Boronat' initials='F.' surname='Boronat'/>
    <author fullname='M. Montagud' initials='M.' surname='Montagud'/>
    <author fullname='K. Gross' initials='K.' surname='Gross'/>
    <date month='June' year='2014'/>
    <abstract>
      <t>This document defines a new RTP Control Protocol (RTCP) Packet Type and an RTCP Extended Report (XR) Block Type to be used for achieving Inter-Destination Media Synchronization (IDMS). IDMS is the process of synchronizing playout across multiple media receivers. Using the RTCP XR IDMS Report Block defined in this document, media playout information from participants in a synchronization group can be collected. Based on the collected information, an RTCP IDMS Settings Packet can then be sent to distribute a common target playout point to which all the distributed receivers, sharing a media experience, can synchronize.</t>
      <t>Typical use cases in which IDMS is useful are social TV, shared service control (i.e., applications where two or more geographically separated users are watching a media stream together), distance learning, networked video walls, networked loudspeakers, etc.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7272'/>
  <seriesInfo name='DOI' value='10.17487/RFC7272'/>
</reference>

<reference anchor='RFC8039'>
  <front>
    <title>Multipath Time Synchronization</title>
    <author fullname='A. Shpiner' initials='A.' surname='Shpiner'/>
    <author fullname='R. Tse' initials='R.' surname='Tse'/>
    <author fullname='C. Schelp' initials='C.' surname='Schelp'/>
    <author fullname='T. Mizrahi' initials='T.' surname='Mizrahi'/>
    <date month='December' year='2016'/>
    <abstract>
      <t>Clock synchronization protocols are very widely used in IP-based networks. The Network Time Protocol (NTP) has been commonly deployed for many years, and the last few years have seen an increasingly rapid deployment of the Precision Time Protocol (PTP). As time-sensitive applications evolve, clock accuracy requirements are becoming increasingly stringent, requiring the time synchronization protocols to provide high accuracy. This memo describes a multipath approach to PTP and NTP over IP networks, allowing the protocols to run concurrently over multiple communication paths between the master and slave clocks, without modifying these protocols. The multipath approach can significantly contribute to clock accuracy, security, and fault tolerance. The multipath approach that is presented in this document enables backward compatibility with nodes that do not support the multipath functionality.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8039'/>
  <seriesInfo name='DOI' value='10.17487/RFC8039'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source:
H4sIADkg42YAA829e3fbVpYv+L8+BVay1liqkJQtWY6jmmm3IsmOOrajkhSn
qmfNVEMkSCImARYASmFkz2ef/T77AKCcqtv3zrh7VSQRPDiPffZ7//ZwONxp
8maRHSc/11lymtZZnUzLKrkohu+z5r6sPian5XK1bvJitpPe3lbZ3XFy+tPF
+/D8zqQcF+kShphU6bQZ5lUzHY7LvKhmw3WdDcf40PDpi51J2sBDD2cnN+ef
d8bwy6ysNsdJXkzLnXxVHSdNta6bg6dPv3t6sJNWWXqcvMmKrEoXOziRWVWu
V/zyqzc7dQMPLI+Ti6ub1zvwW1pM/p4uygLesIE5rfLj5P9syvEgqcsKHp3W
8NNmyT/AhJfpagVL+r92PlbpclLeF38vV01eFvXxTpLA9/6+yO6yRX2cPBuN
DnZ20nUzL6vjnSF8msCM4YOLUfLjuvg9o7/w+i8+Zu5vZTU7Tq5+ufkhOUnH
86xIfi7yu6yq82ZDn+tuukfo79kyzRfHyUcc6N/H5bLe1KPqvpkPU3pmNOHh
cQOy5jg5gYkV8MsoOTqiD8bwgmM/4LicwOTOhkcHT799Ln9ZFw3u/ZusWqbF
xq/rx1HySzavFn5hPy7Sde3//D+4tnsa6f+DxZ2NkpuqrGv5Mq/uLAcq93+m
1f2wTu+zPLnJxvOiXJSzHG7G2TqDhxaTspomb5a3P0Rr5S/4ZeLAIxn43/nj
Eaw5WuEVjEsLPDg6dSt8ty7y8Txa4cun33130L9Cv8R3o/8YJe/KolllcLPd
Mt+lVZ4N/6OEext/TMt9N36TLxbbzpE/9Wtb0mi/wmijpY7278vxDB4bjVO/
EvgUruoiWvWLl0+T63lW3VZlCZfmmv6c/DJyC/7h8CQ5vHoWL/g0LdJJCutN
woL/OkomWfK63Li1/jW9y7PK/50WeVE0WXWWz/ImXSBfW+Iup3TvB8nbt6fR
HJ88e/o0muUvWd082bYyN+k3z3sn7TbvN5oeEPu03Px7jpOa8KSMPFpE+6bK
p9M8IloYYhL9nVYYzg/Wt1hksyx5WxaTsoiO8+fTt9FS35T3sFvXjVuc+xYv
7ZfTZ+fJi+9v4rX9/KNf12Q04wn9+3q8GKXj0fpjfFbvRkDwpSfKfLbOFvbH
/x+sYUkzGlV56Rexg1IKLlsDU0MRcXJ5eXr+/ubq/Bqoang2YtFXp1XazMdz
EEZVSjJwCHJmnCGdgAhEurj6+fzmBzi+ny5Gz56Onj17frR/eHDw3dF3z0b8
X7ziH86vby7eu6eefrd/fvP6ZHTw9NnL0cujpwfPj17Ac2/enn//47k9d/D8
4OjZ/g8Xp9fX+OR3o5ff4v35+fr89OT6/OT9ydu/XV9EE+6T1UMg18Wmzmv4
6s351buL9z+9/enN37Z9jVYJFLzMiU3ibXtzdXl6THsqusUP+WyerLKKtrAY
Z0m5AplRl+sKfl7zccONhK8lU5DHGYp7PmyRu/jzkKiDfmRNYpouahYXTVrN
kAbmTbOqj/f3Z9VqPMrLffjw3eVFNJXrcboAwQ+8GQgnv1032QQ443ieF0Bl
WVoV+OF93sy9CnQym1XZjBhFZ1owMfmv0PjJKPmQ1/Ni3f/x6Si5zoGmF/0f
A/M+AzrctNdJTKFvrWn1W343gq3ZX02m+89ePD0cPT04PPxuBL/SV16fnr2P
tuAkeb3IfstvF1kChJqcw4Ud50CjCTwIq4YTgK1Zj5t1ldFOlOsmOXt/nVxl
k7zKxrgLSTmFuwmMC751lU0X/Ncv7w3c/5PF8D2ww83WB2AHrrJssnV7rvJ8
nv+aVnd5/yMtGd/5/D18Pi+XZf3YFH+cA5lM8n/1FF7iKTx9+e0LOgX4Bt6d
Clj2MB/jpTmajfGnY/lkXgPVzfVGVdk/6uHqOYiCFT5w3ZSbtCjvojN88u7m
8voE9YRFkw9vsiKFk7isyhlcn2WKR3sNRwdaUv2k5yLRQq9GNrT/M2zPf+aL
W9Is3PKfHDw9eMpj1RmI/hoZItDS6bvk8nnyC9ySel6uYIjkfF3B9U528b+X
z+F7e9GOPdEty4rZqPyNGez+Emgr3X9xePR8v5ZJ4QuX8GiKe4hvvrk+OBwd
PX0WbwQpaCDFF8n1KhvnUxHoIBrBXEiuM6CTMahuSOnXm7rJlslJDQ829Z/t
9wquf5MxwaPx08yz5OiNfAyPNSmIoINk9wrkwrNv9/p2lKXZ4Wy1GvIkW1v3
rLt1h28uL/t35v7+foRDET2dbYr0KluBFbN/cAgDj+bN0u3GwX/bbgD1jLMJ
7EH937UJB/+zNuFAN+H65GB49ObtSczgnlxfDp+9fPbs4LsBUWZygQs9y+px
lZOVN0g+ZFWD2/R3+O4ujLI3gMVeJ+fFHOUTbM56hW9DPqeP0qbB47aLj2wB
rAru+KJzg/7wDrQ3YNqs9pt69vc63b+5fvP365P9s3Jc7+tCn45+z1c49sXp
e94PJ60b5obCevIV/sCzGz59ipsIPARkfryFrxcgs5sVPIS6ZpPiTxlKzTTI
QtqRy0U6zpYoCJBqgBcIF9rOeIDDyCv9X4GzX5cF6E7jj/7PP4DyC3slzHxo
tvclMIxaTST583+Okh/Sov2q+SZdflyDveI/uB4l36+rdOL/BoL7LPuhjAb4
HoTFCBTJsp8Vdqh2ats2Guf1aA16TjGCW+U/EHZ2fnN90eLpxMzTMdBWnZxP
4L6Z7yXZfXd++silw8FaUzzYMkWkq6ypc6Krxpm3+0v3/mEG7x+O9f041rt8
DJQkxB/N/Jd52iQpcM+lf+TVNgI4RSEOJ11N6rJ9Q55vmXU0Mup2+Nyb67ff
x1tIM8nrZLYob+HK4hfAKliU6SSB3+Fu017i9/Zebd/N00W5nkwXsKJ/Yk/H
9iW04vYXokzujyfFPkynBuNgs8/zGvK8hjivoc1rOKsXt7SutwcfQMVuXci8
qptkVeXw7GoBBwBPJYUoqHfw+Bo0lt/5XuJNXOTThi5oPYeftl7Gt6PkR7jP
MJlr4HIfYeA/uORbIJoaaCgdL3jBtP5hHumP+6uybvanOPVhmPpwcTCUmQ/j
mQ9h5kOcORghk6HN/Mef3//n+RBsrrcXpyffX7y9uPlbbBxdnF5eP//u4Oho
hEx29N3zFy8Pnn9r37y+eAPGT+sr1xfnz4+Ojg7kK0ffvjg4QLF9nVag9+Mf
4y/8cHl9dQR/fqHveAmsF006urbIE1pm3eHLb4+ePR8dPn969PIFPnh98fbH
q59OzlrPPf3u5cuDgxH/9znZT+fn708u4tdfXry7Oj168S28Gt51CH8/+O7w
5YtDVAXeXl//fPXh/G+tgY9ePj06QCH87uQMnrFPn788OnoKKutfQWU9OHx2
MHr63YsjkgSwwTf+SRrn4OXBdzC10cG3L799/vJgh/4Nh0MwxeGg03GzsxP4
FCiAqDmo5bSL7to9sLWXoFaQWYWfruAqo9aB4nWSrRblBr+6QgWkRlU4ma4L
siiAMJpNAhQt5IKfTTLiAYOkXo/nSVontWi6RO16I8irMgXRlIyRz4x2fpnn
oBXTd+LRx2mR3Gbw/0WGhlC6GCR5k8xh4KbED+D72XS9WGySFYq6CQ5d0jLG
aAH9RqvAX2fsrGYvE8wDVx08TDQ7GLgA28aGRiYBA+cTkJ+grMHg9/OsYrts
Xt7DsOiu46k1sMDVarEZ7ezczIHFTcrxmuTuqkL5CB/XsMsJmPEJudzxHZNs
WaL/FG4zjZcmxXoJuj1OGSxutvrghMDmWKRoCuMb1CUmO0PvBru8XNKjo53X
6wqWWy3LKhvgS2ZrmH+Ck0hBk8bTwudoF6f8aFhgnaAHFX6GfbJv/GOd1fxG
XDeYm2Chw5MTUJEqsmXG6Sq9zeG0cIAGWTyFIGrSTeFbk0klhIPnEHZgmW5o
v3GWNWt0o50LEhApkttkPbbT20rCVzpN1qF3OQCxpwMVJbLZ5OL85rUNKUet
nyYUngAyHPG9WeaTySKDS/Q10gp/Bynk4escf/0M55sFKrpPeStmBZ4PzvwW
tmuYTaeooK5AX8oaJfsBsv57eBPdJ/qo5qMTZwvRBGx2wTRJN3KRL3M8+9k6
rcCMzGDjUMPjQWAncjAG8mUGdEriZE36AdwIeGqckT49SnZQR4T9LvLVepGy
js3Kg/yCX0WKob8ust9wr5pyXC5atxFlN98jvHBVeQekA7J7Q0eSgVCAGwFr
uqfbrJe9KCd4/WH0jzChpM7xFUxMBQxTTqdAg2nyFZiWcrlkm77S/QNOgfQF
l4vuFo2Qj4n5TJPVulrhPRRK0bciiwCj976Q21yv84bIFcVvCnsLt+IO3eQ8
SnS16ILD9+W9dPdw7Cpd5XASVXkPByPvU0oA6vmhvM9AcRgEVlrlPLEiu09U
PRowJ4C/wjYhj4RFT8j6uSX2BV90/GOA4+C2oP6m+8M/hBnD08sUFAa+fVX2
j3Wuj8NfiogkHQmCxF+s6Sf0tsHN8E5AR2+wYaA+1NkEVCLyIjQZ2BD0Ythb
eByNzwmS2HRR3gM3v5BFCAsG+lrAByQ6aPMb1LaR8biRYD9Mn/WyAn8F/kEX
hG3frIBzpKd4iVP1l03UaxiNJxNN649wsKim1p5OBkk2mo0GsEWbEl765Nd1
3TxBUl6VMDs4LORS82yxwqWiJxJOmL5P/C++lzjr22ye3uVlBd+E7a2yFAng
jm6M316+ckDHcIeIO+fI7pkFTNN8gYY+3FviNXdgSvGCnuSFqmZhs57QUCK4
+VncHJQhKE673Bn+gtGM/PcMpcGvuM5oq3C4WDjq/gPzxqNu5sBrZ+R59DcO
DnyVVsayl7gy4m5w4NkiW83LIjyMbuxytmnfIhbfcrAT5wXmCQLN3JZAvUnq
vEKgPeAWIhch0V/WLZkEN/kJiST/1ycqSSoMLRQTFrt0snL1cP9/Qfm+kENP
GybrLx6IKS1gE4jAhCkvSroA6woWBuPXxGpgEJOIAzJwFhtZA71wN99TRktc
BB6GG/DbCn0UxZiOlA6DZWuTm5WBPuD2mpNd2qaKZa5tixvuyd4AXgnvpEvG
r/TSXK+LvhU/J2UuHTPrvIXdyLKiR7uSE9TV4A2BN8Gr9Bbgcwu4MZMNzCiv
iRF0lsAXZze/607RPwZnd53JlA5tti/wGXIkKpVQmgPujD8HeoVuOpEyEEgS
3O5EJ45Hj+iazkrQmnJS7ETnI6UuMLXAxYBV69B2eZYg65qw8No7AyPhhBwU
2SnxwrwoyjveY5hitsyqGXHGrmxAav5+A2xrcce8H7UuFERA+zmsFMw8eHuK
spltARwvHZucS2/xjMKOgZTLlLiTkrQ3OG++b7x9JJXhf2pizj36JC4ARATu
hQgB0SRQOFdKQiCf7zGJYbUGi5NFCAqwrczQcQZcdKQPi6a7YUulV4ElCQVL
vyt5o+pywQKlXqG9otdKtVtUVkGNRDW6vP0VSe7OVBElKBHvnMICU7rxkiSv
ScTDe1VGNulvZVEuSduSbZyIakhKQnQsRrTHOzvPRt6NyoG9IaXKKEUaayBx
EStONluiONSdKqRHdIpFX7PnVNSB5nMwSk7nKTIBYCTMgI6T8+53jaob9Und
ZrhkZlzIJOHdGLXnX4AQM5CbaS1fBtHZ5GO6rBHTEU6uM6NEhZ3DEcxAb5Mc
Igagwg6RjrAGdghXdZkBS5jIxFDmyyziJe/mtA5hUMAr0YIYL1LQ0fHgSvj7
PAUNAohggUPc5dk9jQAbMamBzmi3bTawc89HyU/+8hwnJ0W4VlNiIV0+jhOs
1QleeQ4aTRf3BUifNszrdqR7E83CskHzI+ZwNArGlN1ROEWzCMPFtdOLlGq0
NIXP8SgtjcnZ0RG/gF14QZTbcx2759W9qxu5kbqr4QzJupzgBShXZIyzDMbJ
xBzLhDTsWI7hiOd/RvZGthc7EyItSrUMjrii6QU2zNgE1gBtr3JW5L+zjYab
BbO0Y7nHXB6ir5piF0QqorPjg2Ax52xzdZeLjgYmzVRsu7bDAbSm8bomF8Mc
TgKspd/gBlEYSdbv/QyO+2/1TZBSZFkfygG9UFJzG29lMTFLOK1znrV6Gjh5
QUSETJSOTATOv2Lqm/rLUsOoz8THaOeEBASYvyQOZZ8eHlqpF58/k/gGQwE9
PWjCyZ1hW4NMh6HjkpyHAUJllI3Q37XErKvf1XxB5RXOWd0eH7NNr0uFDRK0
Dmz7R60DrTLzIYlfC36p17WexNWbETorbkKWR/LwNd37z23aWAtZJC4lJCL+
hweXVAIbQt6NKX0KenB5D2+K4th6Nmfs9kt2L9+f1XvHptZ03IFbPIDsvBBX
4cBZxiv3NlU+1+RMunyOrI/ZGLBXsMNmxEvEqXn+WzZmwX1e3OVVWeAGHOM5
LtKa9o6d5qBG2sdKrOzyAGYuQwzY7mTtCDTQ5D8+vBsCdcOu2DN+HLWzwHJa
FzZeHU6SNxtGAY2nySj/CS4yXSsO6R7TKeFmJru4NRluD6scRvB51f92VChK
WBlujHki+g06vrEVkFQh/AueXQ4wA6girwcoZKAKwAeLoLgnFH9mjbpX96dI
1cp9Q1gymZrm8elINdmAU/3TBk9rmqWkc7OyP4nMHTZdnWO6ZfNvN2RNZRBy
NKoR4j4mExTuB7KlccsJ1kgUy/xf6Xhcij+OXc91FN1H2qnTfKK0TPNiCkch
dZsR9weOoPuNNt4oSZhrlcB0TXEyy3KdLxp8uKzwwiCbFiZVLm/zoHO5NdDe
ygzcNZEFgwGObtBxdpyglQ5kWzAH5r+Sh0y/Led0blYj7laPbZrc0lE1aDqQ
q+CPG6o75H69pA3GebxXG+/cWb4PX8NL3R+A2339dfKuvEXn44mzgH6aTjGW
hwM9fL2kz+Fj+St962uvZgjTrMdAc1Ve6p7DXUO3I+kvORIXqF1LlImg3szS
ZcvsGmisQG8PbQ4oxBuUjPB8JmwsTT5wkA3kG9PX7oervWQOdnCdNSPUZNG6
lN8TdrDWGbmUNIBjxwrmDhmFfGpsWHwFkgjf+1XraaC6gu4mJfXVSrs4z4F4
cJm56ujEj005R6r+cMUuvvgWEnsq0f1VgoFBGkRewKVkFyG6pWHLJuL4BklG
zjLm7LCvt+UkBx4Bt7JQ6eEclThDeKvuDin6P5HfDI/Mm73ijSJFSsNCqDyh
+IS/rnHSre1juU0Rr8BpkHRTb/MNhHr58MSB0sOGB+zefvQI5P4vsmmjHEmW
pkcgvJs8J6RdEb3hKQzR7b/lCFqvEQoumeLF+wNXNq1uN8G5VyFHmqNL4PKU
vAyR8G2JdJL0INazrK0z7OlKWIiU1RNUcyhrwsdBKFLSNJkXYrvTtG5ITZyo
42CTzMGKZb1OLXEOQeCPeyO+vW3jE7QUPXt1FBNXiAiEPCBykR6lCjTMWTUA
C6ZUMRkNRvruGPOhLQOzPQyv2ZzVyttVUKWRu9P2BK70BRqEpn6wI2YAK6qb
2DwgHt2zUDl9dd38rrcBTQ2yy6sMxvuKLyYs7iv4JdDSV+xxUxLGvyRU7INC
5KTYKD14mxlFCKyWnLhi+bd3Y9tkSdn5bcX+TzDEhCvJ1/kGSgSv9y73a0Sw
i7+gD6k7E6AAkL3IQYBh8JfRPi0C4+b1MS8FZjAmnxnGuEAL2JRrugJNOYHl
p3XsqVMpCqPJSoWhMd+ycBEFz2zetDP9fAJd6nR5mTHvMtOkbVZLfC+o3IFr
oh6pSvU8vctkhyfCXSq4W6uymPRwjrT2FmLrQ5Uzdf8pAW9ZZmkhZ/1EVRhz
A1RPRizb4PWgMZLxhTsBlvBduiA1ukyeyM6ZUl6aMH/CfMR5GDVUi+4OKjhA
Alkv2XkguxW+n5xe/ux4qpC8U9eJS1ZgCIsCllV7SNbT4HFhxbyt99i5kANR
Lk57XOG+9RJDJjcf9nC76mwharg/U0tt2Lr9ynAlzhQdA3oIHh6m+Qy0aKf1
fKbgaM3aXvAnxN5eVYGCMvPk7PIKifwJnpaj7zSm8GQXhVKaF8orvSg+4w3Z
PdsbcFprXe9eslVzxcrBLihAkb66R2trSyS2F+EVqj5IdkZyffZ+oMJGaAwj
yWAgtnzpFFUFiZikd2m+oEFVTU2TRTkWXecJ6W0UnmY6UMrtFStwKouFKSHe
m+luAasZyJyeKOUNRHvXPaP349jxmGTSxdIiDMbWorMKQEbimXqO3GHFBQsT
c+Y5YxO/xFboE6deyCag9N35f+zfjqXq9/77Zmj/vtFzx8GuaTD/XVHh3b9P
+u1v4MdkpzvkN/5ZeOSSf9gJf0zQJJCfekdNdtp//2bbw+7JT2efLj9dfYqf
hF+ur9oT+MKY9kcNhT7+1Wg33b99vwyeRzQ53YzWv/3H39bzPp3544eR7H+C
yyjlDp/+jv8+fQ/GclZ96qGWb2yA/Z436q72fPFTcvTm5D38d79vjZ2p9r3R
vrjz2HKi4eXJTzZIe2P9EvThT8L+PrUejjaqf2i/PX1D+4f3P/1y8foiObkM
W8L/bB7wP2f8w35rG77RH7oDtwaDz66vPn1xH5L9b/wO8Dkmn7YQWO963Bsv
lRl/4ag+CWuJSebmQ3ty0as9P3s4Tr5uC07O+P0/vvL+hdeqmzhHwzlr66Ov
PgOPvEbnZxAnjl2Py/ViMpBQrlrtt1nwLZFDCBMOOI6VN1nwpaZgrTXZgm01
1JZJzqLEE5M4SxzXftLRH2pxA6ei8jZBonml12QWCEaOse5eg4AGXYV9prEr
jZ4CISNf2lPnFkW9myydmLK4wvhYua4XGzO69x6dsNM3JN0lFkiiJBQhio5X
KugBP2QYA45TQywSNuZwR65e4KCLia1XlasqR2dGPCtyWlBEAKN1Kat86kMI
KVgggAeqxofDhVfr9qWTOyxlqblao9dqskiHHQhvLdpC2WI6ovu6c1LzFjSc
YqLbHWt0HL5HyzBd1CXZSvwwOa7FoUAeGtQctnsWZEVeGcGUML9sU4Db+8Y6
G+41OYz3MfY1xIgpnahOdCTHlhbOf+Ht02guaIIHh5O4mNjERy3diHVXMtv3
Yrd9qb4F1HXNA0EW8tCSdig5lhKG1BPcoG3p9+AuT9GA5GOSEDwtEgjFWe0w
dHlP4Y94x7b5i8TbYWHtaw15cqIYlpmo8tRXoJI8POAjqPuv0amMROYBFIQu
axdKpdPZaoERd9K0ha4uTJYO36PY847VK+bco6g52d3ORFJeYblk3rjQsKu4
OzmHghd/fqq5BDUdQGO5AhhrCrVzcrvZ4AmKL87LZor6eIiLYLbMEIO1WJIM
r/E6P7OfWn12dKWilMc6Y+uakyR7Y0x2TzvjogUX+QqiQ5uUlIQgq+Yan6Hl
WTw8RHVBcPRAoJTPREHnBaXvt+pTiNellLOvkkasObxAMHl5HoahymxKYFnX
EsNmf9s8Y4yHllt4CcZ0BaZwWTZYcEJOz8d8qMbx5FNOXAKhhQWpFed5ncBu
874QCbCPsswku9sypSiIvSlS2CB3+pxvElVOd3yniwUR6V1aUd5QTCQJYgow
K3A+o34CQYeZTTaiQFqiHzfZFVowxwOZkotUUktqDHGNB3SEIhLP3l9rTFKy
V8M71Plj+4LOwEpJTpIPWJrrbMTbGIJc7HZkRwCntICQGG9oc20L+aZoRpTc
10UeUsqm2T3Q6GIBgg6IaiJu0UU+C6X9lA2FMQniw5qUKUIkom+8GW+Boy42
g213kkz8db2mLAtNNssm7gDbaeyqx6j7OsQ6YXfwLXERlcVK1lXI8GBHBLIB
WF5WZxJ1X1k1Jrs5ncuvdW+RSapnyZyGyOR1XFJxqFBigZlLVcrhPmKTjkHD
GxtMYXDL1OWwQpM1QNbhMUrVDrnpnJRGdA2HllbGG5ApGMfNRW9IheCQBJGY
u8eBVNzK+CIRgTn/FmON0uU4JqNs07vFSeRRDW2SYjZHAP0ALmdlKj7XxRLH
IwaqzEEPr52fTw7TW4xrmyuHw38nxaQq84lcuh4nWutMSWMXBtGKFOJ7MF8e
FYMF14Ewq5LkIL5dCeinCAcRPMDRG7oOQe8C0+FJ7+jLEFijSsPcZAU8TZbl
ygWc2rLLsUtQr/ekAsayhSbJag27PMY7yRpeyilUopj8UlaLCcJTzLAqKEHM
FDpjgkTZYQUnTokjv9KfkuDFk1B/249FQQ1T/Xtcc+HbqCpK+jAflFYhkMao
OYG7PIa61IcEFQPbH11czgTrV34oTzUNHureCI9Sy2MhKEu48wn26u7tvlss
Adu2yB8ogSyt63vMqax5DJFHkMrK0SUI9P6R4z4EGLNeMY+jxTKZUKWrmb0x
30zK+4J0JtUxyJZl/SIr1uFzJHZKGOGUFw2GdjPy8FOylMuqjp30yDnuENMG
tN5hWFRIHWhvWHQ4u5YjKuQAOy06ffucKC9zhVmHshvRQJQE0tpvCsDiHpmp
GWmEUWxnW2jHJ61SYrkEVmlYZlesOvCYEjzqiX2TGqfJpFG1ih6SCP2Ru5Oa
h8p6rrd4xF+ASzcnwG7LmcBJZxHv9smtEvzlqCkTFSWDm+s/GKlbCNnpI8qQ
Jmv6KyJBETd43PTHzJYtY1Mcj81TOgc/8/Y6g02FRhMPDxtqewSXGfUbLpbD
XAVUvySZDCeBajSKapccuijLj0BncXYSxZJRQzDzVWdE2QXw8ULOBGUJpdcr
cVguI+ejG+OX+IEU44nS6AsVJTuI3Tls8/MWp3qATBDBb6FViCg7JF91IukX
rhLu4SGUe3/+jLsdyC5Y0JbV3yI/NivUS0VJt8EcsGOJXSkuuTf6ejeaigSV
oXYXNjoy+awspZU8RsWIPJiW+/WJD1Rweq9YIFaR0JEhkQaeve0+kJOM7kNN
Ybp4tK3XckABw7EqBUzwnTPaozsQtrldoifVLIEJR7PfJotkt29bWyxsbpll
3k8XxtbESdKivZEjfhRLKP6L5eNqfph4cq/+8lmO4eovyeHo2ejZcfIDVn6X
EqvLWjTXkrQKlybV9UFwOFWECw9eJdF7Duw9FNVWaysnuYylKUw7nQ1z2Zhs
qW2jAhY5+By5zZAVZgns0PjjYvMqmsqhTQWrnDVXRtjlWslB6cbdI/ZsPaZf
ALWCckCiDeQMiPvWLjy3V9sV7xNbnbFbwxx1h3H3ZDwvc85w3DpVd2XivXlh
I2u5mDFVlPdd3vL4nij/xSz9rCLcPtT5i9rOFKkoW6GrH12a6AUAhaFG7SCv
58hCmz/AAuI1fNtZw1amMIFx61BiIYlFIcJtBe9OeJA6FGduk/mV455QfVFZ
9XF7NRt8yTyhHJWVZk4GPxVpog8PhvUBX2dzUcoRdAFa1t46xpcCkvN4oU1H
n+tXoVANDZS4Y+mlUt1yGqW50ixCxrPymBMrauFUmuWa0GX4eDipxl+6PlrT
ZOxOynNkhARX2yhowK35HPzh+fjyOjN7Ndfotnt5yRIxx1F7CdtndPgvzWjr
9Y6nsatXeC9SCr58rUb9x/n8D0/W2/zAlUrDzKBCYrMidZ8sc+0L+R0sh2c5
WkDeHA72T6hhcXrGXNJ3Wqu1GxAZTa01A8d9F5YFCh5yUDpjNWXakwTlYr2Y
+OjYlu188Ye3c5UXlkvTSq/TLXxUY4oPXe+R7tU2wfqlW9a7qG+7i5IN6VlW
UB1i/1Kw6y0u62chziCrpSdfdpwjue04gT/G3hdki6LDUhqpVwkidBIf635M
wnpngzpgg4pSBrPfRWdijfyR6X93nFAEPsxfNhemjSZu4v1GUel0mPwS7LKF
81Y85l4aJDc/XZ+etJTBBssHQF7Tcpq0Qsizha5NizZq1nTLqen/beHw9I9L
B0sSrzfFeA7nbBEeKowpalgyufAR6MlRSuS3RRUDFWYqrjhXgaq1CjjShZVB
vMOwDOjQf73qq6qwL1da6PBXTCMoqDaPChY/XA2Sk/VsyRVSVg9xcsXZge/y
3/yf313tYXa0LZ197KHokAyrrEkxDMCWh2SYTqr8jj3C3jucTu6MFk2Rvouj
bZRHjOeOAiInRg0zL8c5+VlIO9NSEIL30I3BBVUYQePCgMhNWJT3dpck2RR2
cVaUVFyIoboGAWQpG4PM0Uk+zjmboFhPU3Sm6QtxF5e36HnFLy0W+YxiDbMq
H4NmRMEKzjcdOyyFMEuqjKvKEuuD/nqFu4ViRSNB6tRGHYvv4JB+9o4AOAlg
7ktNIyALCfEyJlkpoDorKuBubTFDG6JvcxPbMOSTVnQauIDpJg5WOTXUAWGl
UTDBg8JwwJ43G4lk5nihOSsTQxPnFUkAcxCidCRRA9LmwMKUhLInvkdESgnf
hhsEW0pQU4IvxhNGm4pKxagyjt3PNqVIFe349F/7msS/XnXRwSQO1M1xJuZM
gDjI+XBFFsE2PIZbDjysCZNRY33ke6P7KhgiDCvIVkIHQikjvFaVBOqubmVL
w0LeodaSL1H1oG0YqCJeqJOe0jpusZYIVwFrdb5bjUla1aEmejAd6b7VWHKl
kWvGcsiLwCMHIrcWWa0xUNDjV/NNTeiyJosGUc6DhWtVx9lIRHlYZU45p5PH
jiiBgTD0mFY3UuwOmDjeOvX76fuaOHRDzvYa/cvoYQredg1lCQtxO4YESsKZ
iJgPxrGjNkaG7b1qgxo117QguIfIPzcO1qlNfRTUS5e4mcgiJ3DtI49rVHOb
qovGX31K17Iatq1AUa0bIr5JAxny2NFMjSIl2O8gsTDnXeb9icDwp53V3bJN
yLEy5smNnLwIkYmct4BjMddfcXIYvv4+3UhqDVG+MmBix44v+gjFzs4FMEM0
pdvTUeyAIO/DGBqFab+DkKkwFLnpDV1xUBBHEJ8dDjvEYr2cJoYBWTih77Nx
imFTdPKC4C0m9/mkoUgmIi+IZ4g+dNVbxBn51JndcjKVsuDDM//EHAUvGggD
kQKStiI5DxH78cAvAw740Dq0dNKzckJ2qC3Siz+vykaALgzRUVhHzH2Id4w4
z46L8dkMG0RgPLYFQJLrAhb6kb0Za8QBszcRcW2tYYM3IOVw1YTkX7R5X0Zq
M2ki7LZm9yCHNSIWQDhz2P8DdQGGeKB7rAUFYwKcFPDbaGft6BiIJaBVdOuN
SZAL7UcSEh3CJMC1yhJlOeLvKZtjvZUcnsRJWRYiMq8qKtgDakmOpnHKsR/m
tUo9mKeEMHX4gxnLrqpVPUrKHVDwBTZjfJfNVNDykWtb0IYDMIQFiGlRtyjJ
6QhdwXm6kLIjSnUCfrtEycGiU6L8nO8IKt+AAQpXa0bjIksp4JTAVopzW4iX
s3aCCcdmtWnsYZ6MWkghUHKK4VPEx1i1IP3EUmPwCgq8ZLi9xPoRuqKlmyx4
ac424LIx5Cqg5dUt6FFSFWALJ8CVhKEE/uE0rC4/I3OGQ1jqVIWvjpmHx6lh
iINRaW01aPWpbXTAWvARs9t1NcnULUEkGOYU4ZnA9bZvoUJCMmOe4QYssTMN
mUyYleIYHU5I00ctm6i1uGBAslIs/A30DJAPjKcHpv8/1inl5hlCXbpY6huH
ZL0ULXmrejByYyzkxLAh3gyDKZH0O5TAeU15PgFcSfL4EgXFJhDCXFRaunWE
RBPunM+8Nt5QTAhfi/dLoha0bVQRKllcuGU0WQHaRed2LtGbAA8QdNyfOM3F
zVv3j3OC8kWTVYEVSAEg84ttRgCtICoP1qSqwLIR0mEJNr/C3xj7kolbHilq
lTESzs4vSOtROpOv9cVvEVQcmZ9yyyOuLoZGSK8P8R7JleyoiWrTHO/s/KmH
7DgvQMJ6jSsyh6fZoMkMgq0F0UWRPJbTLmE3oGpwExoyFC3rT9JzafTZpC8P
TEYX7Z6Hd0SFOap0IN6M7UoVFx4L7Mvbh7Y+uaoNx+Iayc7FkLWSNaUJB7OP
BR/8wOkr4ukg+EscNJKO3v/WNvva8H2xIg4j+RUevdl/8QbrcbMwV9ISUYmk
wVS7lHr6CCRwZWgZXn211DmzQZxOyimFmPdmuketAGvw/ColhNOAIdOqNida
XKYgZcCQRWmzEHAUMyEUOFULw2FQku3R8mL1qgUrVfBVBZ0lrQZxQL32FmLk
c3VZVQacglewYHuDMZdQF8oor4dzLlr2dWxex9xmIOdsugczHGbp7vAXVHpA
Rxfehp0V7pHlRNtJmxw5AnGDL3+mgd/gf7vKi+jyEiab+eRctdUYhLdeL9Fw
CCLR1UyjP8llQbZU+Qli7k2EINBUb4uKLqKubCd7ZThAzwjBJgAIJRgFZDgw
touWTB0MbzyBi4z8BZMRmRKobjAKtuoz/1gLFv004qOsjrKWKbDtGUyoRCld
Usa6mO/IDhwAAfNnVjcjx1ZtgOWIKE1seaCU79Lf7Zp64UtknDOIvbv2GDd6
LZsfITJGINCMV24+EpxBUTYGSsvZq3ol5bpbsjfKiijkrWFQYrQMg0VFQy17
WbNlO258d7FqBqiI4Z41WzgC92TdFKb28NDB4Pls4Plak/dooQssbppnCwbp
hsVMSYUlDVfqnu4c4KjckBWW3mzgT3TV2U076Og+VjceDPtBrwlLz3a9qRfl
De1IECWnkjX6PuBZ77K2QqD+ez6O7f2mnEdbz8naYOBPxZUztR/0fLxZpsCQ
B4qKeybBBf6YwzZGlmVrFMGWTq72A8wO0+9swU56yofGo86LNd8FwkrNLLsh
XTeMX8r49STcPSxXDOcb+SIc4N7S4Elit6WUXAVVTWqx6Ipx7EA0NnLlLhkV
7p1pkEmaLzlXIXZPxnYcwdHJ7uJ8xyb0YiQPLuAUZUUSJ4E62/DTZDWrk19E
lfgLUQ008AHVjhwcYtvkWdeBWWqWtMFI4mGwm4v3LfZjeddSx1nr6WpKzTg4
3xcDUdcB21Cy4yPbmGJnwl6FYJQ+IvJgzJScQx6Emhp4KXD5YE2Tvzw2wIiW
xLLh8gzennca4GGtOYRzOAvdXGTcQANeBjMny/vjBojqI4iDyShUV3nA1IA/
7zL0WdSO13UPj9Y0YR+DleqsBpUkEgvUqC2MHoNWE3PzaigV/RRcsSKHhFUw
ZK/XoWi3V4E29o+Q2gippTTHZh2p6u0a3jsMLZEgrdplvcKakNqV0Mlr5kgs
y2lQmg2emYgmVFUGbkRSnoGs/pZF3Q3Y50B3YupRxe+8h5QKv1pcK1IondVC
dXZi2KClKvnr8Y73Fxywj54NPoI1nZPutth4SvIHRYbsMic0U1bLplRga9dg
nrUh71uI9jAgihlqRGZ+SXyum5TkqbSNd6hMy0wop9pQHraFz93O09siQFza
RmRkdOAd8iU786pco4+gylfkHj5ODp4mjIht9VYkiFLSLdarFdIGIeqKghJ7
XK5VmJEtk8WwjlgOzCtnWjfC3Q1ZAHEurVDEniyBU8HUncL42W3HEywZ1ADE
7NdbYglk5CuENX8gFd+fNqdGiPolCi99Pi4nbBmoNijqkZiNeHDUF4dg7xGY
q5mjf2OFEP2N97WojRr7bGCO2l9okksxI3wULK6WXeygkEbJL4Itl9fKjtUP
CF/tcJPQLKdcN4Zcb14pIlDUyteorATKrbMo9znUaQQjJjivU0bKkSnIivdt
J4yctauTVCeRX8aqN0kHCP4B4DF/wj7gWBECgxwn13kR7YnVluEtgLlOUvKo
LEyDNk4+6MvlZsrSHVdjh9/XkqnqlDGLnUjMWb6wRtsVpW2s1RCfNzXXacph
FkenkCRfb/E0HScnSnnbnFEDrc5xYexIM4k7sihv2YaiGpn8NvM2OlauAH4L
nP2F83/oMMFBoZkqhMIhsPI3c+ktgm6cqumzqPAdPYMhbaOaL4CkbIZy1A4D
lGFZJlwJoIEohHNPZTpNBbYT/yUAUuXWr4y3wIW8Y+vJkYHKn24mOjFYzE49
wHzQUxhV1QtKvF+57hRccCR+r4mvkyxm1tApeEq5rlXKPYx5YqIMXwW1WaeS
dYXfJsLQ4mlkxcH18SpxUz3ARFoUK5JgRXPFiQHzD46kOnOTIPxLKVTCV6q/
OepFhA0sohcd8p44y1ckPYwSfBPGVtVNEc5zTDFwDiKgK0WlMc1nLR0X0DJp
ggvcivZb7gKS5vioCNk6W+bDFfVoJn0Q3mdWFG0v+dimlMhMjpFK4AHIa40s
zREtg+OJfHOFXb7YFO1hdYq9crv0nHeJWJcqbY2rg+82TCLS9n3KBltuvrNg
ZRWcIYez/OuVn4Rk3yuem5FtKGlqFQb6gtyW1YJ+cuRN5Oh69XhqdSt1ju+R
b90hTF7CTbjt2gvJxU09QnudzaIaeWUxu+R8YzV3XFbS3InU3D3X3G4rG65H
3cke9E+2nRXq462ZtYrvaKPyRMCXc6p5z8sPH305OiJ6qpTVvAXpXKWa7+LA
ioDPlFL3jg/cqSY1/ti3/udbDivlPgp0Z12HsNBgSPMIrPiz3fjC/+7uGTKn
0NEq05iehEwVCQSUiu5cj7bPVRNXDM0PbzimnUnYgd2+Lpqwotwh4a0973rx
6NEYwroKX+7UgJa51OGB8ViFMohOgdGm55Xf/jFSDAnK3uvgnajSnQ5fVyuN
NoRfyIInhPhrCvzTPLfu+svtu96dU08wNCTuYJ0t6P3Ie1q6VeuV3z26E5Zx
RoeaF5NS1EAgK/pZ77u3RpvgN9JQhcqWnglg9u8fX7TFjZCmnYucFJBaC3k4
7MrHgotwTZWKGWsjkifK05xKLJRywMiLnzGMGL5prpVEOUpeCflQtpBkEF+C
iCX9Wbv9ePbu+21UDVbjXdpfTuAPPVnFBGwQGt5gTs4ky1YUhqREgziL30Dd
hYXHeVFZO0PZekWE3iihXJVKlv569fkzZyGTWygjOM2F5FpKONoERnt9IV4j
n2hWBjJLUmSXGfqzGMVklnGqgPBb57BTjFN38dgdf5c5JPOQIRnySIRNu4Yb
TZpzRdYj4DCSYxgmPRCnJhpiZYU+wnUxkfyS2bwJRV+gqheadxxwhdvL/bPf
D424lLfkHR2Ee0aSzVLbNRJNPij3fcrypPlaEuefTW1zzwkwPR/eFF56C6KJ
gwrkvZE5DlzrBrJIbzO301pd315RAG/BLb4vuaWctOU5TnLSE7LlmsDLNJGJ
zeKQyjT3GYF4Fgt3aTi3sY+iBm7u4YiYBdqZ0MTG5dBhBlh+g2XBUuqbxx+E
RxBIiPczl1WoA7pKLe/GRognS4kSnAIbsKZWxiEiMBW38k6/DfKZVNwVgkqv
s0n7ztE+6OqFAnsO6Vw74HHHrGgiPsfiQ57dtzCWAliWlm55vpOlloksm6ZQ
0hLtFFPdywjFYo6n+QRzh/Tt6pCRR/2e4ytxlCGmLBWzGusOOIeQSqfnefcK
7KKbRWIP5MiRNMmoWQkGIeuQ4OS+rihbRmOkQSGoYUMFVClsZ733Z9g+KfKI
DthzL04XW98S2KYQcDl0uECDhJLchk0640icdgBivcLgBTyoYr0vLHloOEwD
9YMzzfJTbCrX3Nv2YzeSwskXml0IbJg703R49i6ynTvO9JmCICGFT3JbyUhf
5YuM6iEwkxpBfzkDAhQzBKEYY5WvZUjAWjEa230NGB7NeLSnnoROFmlgO9br
ACv7Yq8Qpj1yGoLJgTHckHxC6Y5ca88FwAJsmbaLmGu6FpdKDFGaDhvZnOZl
dio8fdbOysJaoEn7qcvWNQyfJVQgFTAGefLGL7T3n4i4YL2IdRtkXGtPBx0B
R3eGP3QxSYWbb2D8MBkNQppopfTakINonhblF0bnYQxxPFDbaBkmnTYxnp4t
sCQIPunLyjlT1aokSWLdWAlNDfZ4tpAELn4B9+1x7KRyEVX+Exkn0qYcUwQ6
zGiMaccFccsV978M66D6HYoeyI66bF3PxHEGWVCQdTXeqRLC0YYFZ1vjh7IJ
4tM2InDBe24AwY2bdBMxFEjYXgFb1CQ+TwpWiL5XKbUTgomcwQp2oi50Nzyn
A1skV4cZyEbrN1TjDp5pzoMmfUQA2UhbDSqTrp3Dp/JKjGUic5UdMCWGu+z4
ifkL1n3eX97wpOSK9TAH598MjOEy4HKxH9AjJTI7ccpG2BzseNa0RMsTQT7u
uaw14udny7xm2U9JkgTUhZyObHdV+/YE3Ie5oIgjZVt9KkeL6XfJ1akd7A9z
qjKKjppCJ8UU8xtEXCBYLiZL+nmSLcQAGEl76ba4454shdgd16Wie+J4qkBj
zUsWsvlcqNzbZFqohA48u6zx/dPkMkwTZoBA2RC6chqZqulyWeTvlkwCNI7S
GYvWnDBF9bt/Kc9D6jbtY93J/aDtM56CGpe6vDDYSLn/ckFlUOQHd2UONIBJ
TqGyWMFURqLKBZRF7htaNpzmEk9gyNcZ7Vs+Hj2qiHiosG6gyhBPBIg0xCNa
40t6yWbLnfewcO7SB87aNwe7tLhApwFwIaVW80X0SuWPfUVI2jtUvDdc+cE5
YXe5Q80Lqp+tFVP3TAZ9ycTl06WyCSTEQAziL5r7GDXvFiGN66Yg5jId85AJ
3RFOnI7TRPeOcuo5GlC38ZUtxWXnPQiv454PmKWgqqzbpHkhoVEoGVZ3maGc
dLPfBuJIYLPk4eH07H2NeFc8nVZuwp+0tSVFbTAdopVuvJUY4PYN6UgeYdIE
CU5XZpI1wFz2cXsbbuarbNWKRQX2t1UkinPYEneOk2rjENlCauI815V27YO4
lsiHLQbt5Q78GwfW8B3TrJTipG4FhjWJ52vDOpW9QWlxHnBubDxRc6nN56a2
HYTk25SLjIMUUj+SK8FLe9UBhbi1kQ8lusIYz54+5aQztkZyDNq4ewQ/Ss+u
sDhdksfswy6MbHCKuQO6mEkQ2gqBY1LTFLg80tceso/LKBGDKc40L26N1iIm
QcNTHwv35ZVnuL3p/nmMun6baWCfE0dSSpAmu0ljtA0V5EYsixmEoBAZEpV3
R1ryEiqSPnuVxlU1k+6Ew0o276XQAEdZyO85LkkLkA/6cBWw1GLBlc3bYrvH
Fh07xKDURSEroV0TEmvfz07JudpKgy/c+RBefZWcehEZG+490tOFEg8VkGya
Vo9ze/owaC9BWYrXZbgvYXqh9lxd1nqDMH/ZJ6kSPK3yJaUySaLM1cndYv8k
YVOOnr+ipciE+GaSDhduIzo3qIzcb8HhcXLN3+EKc0TDmmQ9Z+epMUTi+06U
iZqJvLQ9arjDPKUHxRSvwB2KtUIymZAN5SwCQpe4ZwIGSVntc7hLkC9ct2G/
yoC5pr3bO1TOEVHzJjutJCTeweGzY4ZdNxztC6ap8VZpvkG9tSVK2WemtLSP
PlATDRtzyE2ogLZg3YDO/Ioa7hG3IPnseXhMePCi9tiuTy/lWKhOwyen6Lzk
xy2d45QzR4Basd47NBYDWtkn3QUzTuEraVURE99fZFoizo+GopGc4ZL3M0ZN
dh0NNB0f3xcPDCPTLxM3Xi09k7Gmouc1SMUyAuZbUHAF6AKojUREXa8pnzlG
PLHNqvvpoyUy0Gm/vh3q7w8Pr65en3578O0BtxvXBLf4jGVo3Xc/T+pfZh2n
aWE85sunh9+RFmW0faTpKXRl6AJcOkak7R9fJRcC4oS6oaDOTQX3E+Qk0ywo
UzyDllHWKesR1UpTYNPJr+mYe//4r1HVjL+ICHRVtSy+xWYYwDwYwWPYqihF
Y0FK2irZeqyonhWu1WgBBghv6O54OhLlcw+GcgD55JgSsC4z9ztMrMW02D3M
+Wsdu94v7lsQe+qnc8hc8ZEgAI1vWduzYd4BzpuMIp31SJcOvcESqnoQ5or9
nSnfmDUPt2icwishE0n4JpUOE1WU/LopuRw9RDEFFr9D/hAGgVGRSdiGx/JW
WjFf0hB+JnnTTb/g8ELLkCtD7lurVhej3Zh5tNtCcxYZSswAi5BpvfXeqJND
A2oAtiV3kqNnUhVldTYkJBWLNZs8LsfIN6fbFnS+AMRM4vVRedo3W8QJ/MJs
ffyQNLygKrZ2r83WNPuJpxuFSMqixWrJlEuuOQ+IFdN7PzFtZu5gUbib+UUx
lLohhMynvMP95CYG44hymB++liSu3lh5ZtmLqCFZUE68h3ouVilJ2VeTNVpb
/Jh6vLm3AnbMrWuBslDxO6sYEgargJbmTnPfJf8C14n71sppQCRrLFmBwHJH
OzchrKXF+LoOc+ACYVSg+7Dupp/W5bQhU8K1DgsZm1R6PBNkmwqbN2PU5vLt
ab1nrkktZoYT+82wr+15IxCFqKONG7HgtF4ZpG3UzdAVZomBpdEBrJgjUYk5
dInWOHFGQdyNmGoa7v0MwnkBlb2DAaqie1R0m+blCqm1lHyCUPT7O+9aWrhq
LOcftAp09ZHx3ZTO7akduUAgT9EfjCYzshZlmWwvqJ4R5sxaIMVANdlUD48T
Ckc7J5G/Rj/F0hvjoORPtCJTdvYFoIZQX+VLNjRaBARHVKSe9Myc6YmzuVTZ
YdkflYozCnjeeEt0xPAwnLw58JKL9z6qepPiJ+qDNy7Xq4WkxnC755TAgtTm
cgdf3v6KHidxw+BFHXP1aQCI15yuC2mnJS2JFUwxTmcvMVdmey8masoVkjel
SQ6eaC1xJKuPZHgtvixcXQ4TxmSigatSL4iMeSIB6pE2eYnyqV7ityrvrN0K
lBOSsuU6Ci9h9VjTLXwNOKxmsVhryxLyy8l3hc9+/nyMt47lBuPQ6UtIh3JM
g4qTzZVkSbR0XJK0zUjNqqvzoHmtxQJtgORwtzS72N6FpLdYZwHISnpt+3Iw
vWfjLLp+Ohcd1KIXMjs4r49ZtiJKDt4AKkGLHhxFTTLDpxj245Ho39D906pe
//tPZJbthIf+DVt2noaVfkroj59UeH9yQ/6b7+X6f3/5ZUmrb2xPC9yef52v
SA7SxK/zC1/p/OvMM25oO+z+w0amRBAw4P/OX3281XLfW/hfu71pTPPa3PSa
pVGbpJkjU0vTE2pE0+ZK/MCgnW/on1hVOZaScs/PjKAFJCsGlBqqrxtnKx+E
k9ilzSVy+oEh+Ss1RgJKpcI51WidcjkQHq8ZTSRHh5N8BnTuOpGBkVtgMvQ5
NYqZg56Wube2QnsbqXk1Y9DyA4PblW30DLaIkkwFCW2IpS+zjShfNbt9mU2G
HENyfq4bLnwrV5oS76pNDUeQ4FmsNwB+0VQyLfHLuSEormtWsX+30Pzmmg08
huQSvyll65Asr50fG9vSMtqb15bwHKSah/qrrSTAGER9z0D5lK1FQiTLEGUq
lKsvbUf48xiDyiQJ6SsxXrZAC2JVRSHLcqIDdd91IcVy7kMjUG27jcIP/Y1T
LoPkdAECNc2nyqVB6g0lLisx5tBnTaQ7tfd4pF+n3rhYBOe1T+FabMwlgbcE
FdPYTyvgBdVmJLF5eqTZrKxxGPvL4OgnZRUaY7QwJgWeIjNliMtR1yvQkydM
HOsVmf9q5XzUfL2W3KU4QtTsI0KcYx1tBFqqU0MCZCS3Cqky5AORlm7IQ6jo
zFMJDHsUvZhMOFVZ3cgO3nHUxaowBd90o76Dgdntiha6J0ceq0a1uwaasTlI
NtiAFFttWgpAPu3jUbT7QNg5g/KcpxUaR90+nA8PVz+f3/yAnjIKFH44v765
eA+/UjQ5XWCp94YatQjQFM9JTcTgHXfINAYZEqd+4yaM+qujLc+LdBWWFbpt
bFCVhYWA9tnr9ZheSczcvP5OwxXlpkcLomuA4QXuYjdw3Y6AnmoG/Gex4sVC
qwnMn5LTSrIkUZ9jzVtXolZYMCwxwryb7/GS2atBZ/RbvgzBiV5TxlWiWQrd
45vCut8uOnGjETVeahaupAn6YRstspcGz+qTp/YuuFlIlgw9WqTj8ZrqU0Ik
kKS6Q6BQouA+l+w2C2o8SRHLwwgrpnHHFHOx2hMVU5xMNk2rL9Y/Po967qCL
HgMSYf8xDu0z7GeL8hbofVemsWfX+JUkpVlsY0zWoXotNBOrheZYSTgluBcD
c6V7HfUjosgDp+zI19xw2icU/ZkNJ5PkXL4tzwZQk9sNowH3UI/4a3/8+f1/
ng9PLi/fXpyefH/x9uLmb58/77XWSBB+5sNFuZKB4PIA/byR4x41zXLbdr+y
k4wf+WpPq0I8Dp2QKeGzfxU+Y8bzFczQTjV0OGpVSfedbkyJuk6pAK0ybkEe
nAvCikjzUJn91T+o57Wj+P+NwSaCBoX9tvmUJ2QHRS/dgyE4VTt8PyJs/PaS
+4HdA3tcLx6/3kD9mO4Fxj2OzNDRrZkR7FAYvCt2aBQeQ/fkl3kpgUmLj6vD
xDpU1EGtoNKw8t5TzqTsOGviAQK29pe620QOWbnKN3OHT+xCOo8JCBUAcrud
HAgOXfW+t/3AQmv/va+lmlFGZJ2l0pIZyBaLUvwtEhuob0romg7FQY/Ngt51
y5kyVT6hbZbgbmdifW96fmwQAfWXJLHfTqEQUue93kyZOn0vOvonXqSL2v4a
ZTtaOPaWnHofQINeZslJ7PK24vau0xs+fa2f4p8/I4422alV4Z3bCiAzaHnD
tcc5m1YKLkbqorhuIiC7zByj6tllZySFRKo14WXE+FeV2C0kE0WZQhBAuP+7
zLkYEuYWo8TAD7miuFzNGfWp80ZtUz7BUDHHhwNy2WhHPQlTxurlXC532QWC
jgFiObGtcukMhAM+xuQYFzgwepdO2M2c66kUbRAzxIoJwtZNQV5yvpXaS6Od
n1ij8daqcD51JwfQPu7/GWyQqMJRPAUc7keFToxF+jytPwIlnZHPQQIBnMMo
apPuYdA1TZBpGoH5fiSHm31oWp1viWwY879jMiV8SlD8FxwZFTRfarVHMAGc
ifzmNm/2Ubd/8/b8+x/PMWTN1hyPUjvTTDX8yKqinp6Zw8Zp87AcrxosCJtx
oReAFUq3OxR+6xi1dXz00V5zSae4IHxurdp1aZELCGTN8INqTTbSIC0q+e9B
3IXfqzURcthQhAkvye1i9za8iyElKPjGSn/rHbfryUxRGHgyVI8DBiW5Nqkh
w+IeAcrNWOOaXfoZwxDL9FdujMU+CA4Pr2vWTO9w31Jp51gS0JNaEBqikINi
Y46iE7XhSBMejGqhAu+6yAusjd8560IdRwBJAXAxxKc87qIVqg7Ub3a7zhe0
/FtEpq+tYWnIa83FTma0+x3qn2SfDlBnYMS0JW01FUJyRnOJAQhKUqFTnKBC
G7YMMZLQx42f07pDyksW8vg9zIpDy0qLDcVV2BNGKB5SeM3IA7344tRQOl2s
WW7qu+tsXGVkZU1cwRxIHLzwUgxe24puM4LAAvbJmGVsA/R8Qe10oKhqs2r8
beFaMgfDUrVQrpy5jx4YdgCQ1b7IDEMwmB8Kgrcu5GWSyzxC1xL3JGi4E9C4
BJauIGg6Ze2VUWfuxQOFcLvlPsMuAyu1ht7WQjh+L0HS4y3Aj9Tv0NmhgV0a
tEzD3qfrGhZG7YMZ2XNKrUzYKtwW+PGyHT9j2U7+T0XRDu2El4YDFZDgOEjE
vJjZP11Zjp4qY1MuTLa9jcFbfWOUyKkiRQRrwHdBl+iiT/oWqtfnJLEWYrQC
FcSQy5UyU8RjcYC6yPpprlxXli9KZBsndZBqJkGwfmO9CiIZScQ3lUfwE1BV
9FDd9ab8N/nWiHr2lMQBuu9QB6ICNxEjRf5qSE5E0oS6EqAV7+cbS/K1SCIu
GbPFWUPiThsbTgzCN9GqpaRIk/M6F4B4sIenJvlnp+YPDMcJdjhRdJ1TeA4O
aOkudAToFC516Gzawo9W9BtObGo7azAvXyRv8MAhZ+ORKRYQlCjycMvEeBkh
BI3s1ApneEQJKbJmCatFzUEG7qTwN3OX5Li7XmHu1V5I5hc/uscrJZXL8eJb
7q2DM0MnpLwc214hUWDYTNBK7VwH0jRW4dQxN9A+4l6L7EINjWAJAygphs1c
vjsIXWGdnKypka7wTp0ryoKMQR0pab8gqzBjBz3rZuKoCe8TVV7MfU+eirQa
Dc6jqMrlx4/cN9cXb96fvP38eU8VKXJWc940YVarY7i8XeTcWl3ke42o3ArU
7l6P5zDQ1OkmDBMqqmjFoBnQibgac4tT80DsOiFvObV3TLFYooNBzRD+k+G8
rBsNfND8J4KwRguy86jLROGqGSdtwmGRNYIcqz3OSgEhLik4H4+QTTgkVqiJ
Qh2RgMrRoFd23+JeebBzQlIHkwnuDEmbsgukCepOQDFc0sKI4MwHKwG0YCc0
8VWYrJ0323kAJbJVOcRmvpeVB0QLEU5V97VokEAGbglLTI0SZ3Uga0eek1aL
nPJTdQLSqiGnHpVc/lOX3M7HLBZUU/VaY98N1/gPdzEvrKPnMv0tX7Ily6BY
gfL93FWT0HrHJqvUU4JkQ3lReDMoRRX2D5OTSqt/nOZAovg3BbXfNtGfpRYa
tq9JPhbl/YKR8Y3+YBXjKNcWmFC28oYepuI0WQyaRfvUd7ks3NEejxPL11JF
8CX+jlVGKSGTOM7bY0Kq6tMNIXrl55rS/U41vyMokpG+Rsqpz42q210vgnZJ
BgIoCrS8TlZ+aGuvCu/JCl+YvEaTRc1X15TIQhA2Ga9bdcGol+nK3Z52olIo
wEyJZVHDKnPUtFoj6RDO4yDoE7rtVkgfO2ZIZEf5TZN8iRaGZDRaxJcjINhf
tm+LRj1FfP7s8IPP6E3bvaaN3tuy02y5oUiROKlGWW9JmSeV1cJ52xyatVdI
nRIjPQBGPA+RLnvWzd1YuKUZySdY8Csoiqt0g9pCDFIrfT3pWU9ouJjdCVrn
TG97vmGQI38X17N+bnixFwKwUmycPHIvaC+EhtxFbLU9bzazf806aFTLliCo
O0m/vBZpuKIB6MXGx1NlubYfzMjrcssS/5k1bYmVeXK6+gsQkxNfUqFNyo1+
8R/2RRNDVQYr4BeaBxsTXmEQs+U6fEAR4i1Wd6CxurFgc0YczeMi5KsME1M5
cEPtvtkidQgH/kXEYR0COZlantFK4n7MKF6FebloEyWctBRyvMK79Va6D8EV
km4VCrOc2+qEu0H2PcqK7FUSXnx4LN/6mEsflfjN4pAR+hFXW5tSeQN8kMYC
zLzRG2ENbsXP++Jr7FiREsYsnor77lH4bjvFZvuXXtiXgsuBqb2zHEJBDHoh
na4171SaqaU0zS0aUXBpEqYJs/mzaW3qLecNkRkiD5qeqjErF7SKjGx/l7J/
fO7EOYjGXwtEUOyKQyuYAhuur7gTbUN2aNebokl/kxxq0eO74RQi2UdekxrP
ybYz4w5LbL3i8LFXhFgQ1g/Fhnu1LqjTKPOk5CL4Y6/TaQajP3xd0w99fcDh
l1VOxOjTzV29QB4lsFs8ZpDM17Bf5PlSTDzORmBngAHKtj0APJWWW0+CDFLr
K60zCAOS+9OV8rZFPuWQKRrfs4wcDBdFhLTFDRdzAdXH+LrG9ZCNovqp1g0N
2RNYQoE51NrTCIBBuTTrnWCZsP7ZXhL1esyw6JIcJPU9FoEx2AFOST3zhjjL
4ayCO+75RouzspyEyAu/JtQV2Er7CwiirHYFGdaaEmRXkTZCVnXhWz2gtikA
jXXfnlXlbYlayhX9V2xISd9Ka/Ll8dODgNBBRXLSkgYMPqQHNJJQm5BUMwIT
TyvFJyGVHywPqpTotiGu6swdKP41UCXRMexASLHmiWKBhIVicvbvZoz+FpM0
Zm2sKbmEg02xiel2z7dH6RBDlAXKx4vrbTCuAKesYSGFJZYNxlxWeqvpxf51
WzLv3c3vm0UwKKzrWbAKNJ+U5Je62lcIuFnls7Iif4f4TcTBZVmh44yA3+Wy
BEV2SPYy3BJ1ONlsLEbAswwXRDEqLcDa7jzj7w8drohsTTggKE6nwjyRS/+E
xn6CL3xCX6Ti0QkJA4256bnr6u9TLGkncPoy7octhREh4TNyLy5Tmp8lU/M9
3XC1D0fhCJl1nvFMxKgW8qQLQO+bcEtHdsOqoW91YtQ4A/sBsX0XnTR59sY+
ROTVY9eyWVo+EMtQohhYBmqc4Mt3jnhKZgD04olv8aMAfKlrj9oG6KGx+kD3
nFvb4bqDh8Fw8NKQiSp5ocwg0DUkJWWBkMlIVO+gyza1qA0xKqdJaYkkM79g
Fs0IISusXTwPomcbRAgnh1GmuA6P3vUZRr5ma7iiQDfoSRXmHQEGs/5sqkO8
w20MBe/TUpY2yRAhNg6oqKlhp0HClJWF7WyKi8cl017TDynDoPaQ1bYiuJln
lqcggwnJavaDtnoL2sOckyVFk5HWapO+9EZ1TxoMDu1nRqm4DiYFoRNC6rFM
45Z7ylBNWkMOyFEX6iYIX8xpiFUZE25hrgSNLhyu/VndlNxRgTHtgAbAfIdd
L0N+eCqvIFyXArTPiIfhbZ/aM4x+RNDJrILIsn4vi4xDPVEXG6zQiDufCXPl
rpgaDdQ+dml1m8Niqo2nJ9if3DFYpwhKzabDYotrUCU5x8zqBRa2YT/E7N7a
NJppPw0loLfrGX4LJQ47/QnpOaCVYaKM6Bc/ZJXGbOJ7AzOR0kZi++WazId5
Nv7I4Aik6XDHTEQ+QRildYGbaX9/pCTgbG2J/eoAYJhfPo0oQQYxdVwmiaxR
QijOAZjmjDbtu91pUHYUeXkZ+3mmURhlOb4s7er1xZn6Y6kLdUW7BvzrI2jJ
jRmzMBUkohyR5bDZIMYgjNTHIGY5OzudMZ8t4I7dbh7JMdAyBimaxfhlHD12
eeLScM0YXIAB9bS3Ja09AGvxlodMp1bjWc1v1zug7k3mFkEPR7Ygyo56zia0
bz11Tdws8T4Gp2MaVBIeR4j7jhgN2Qs4610GJpGSTrsQeojt3Ri7Q2eG+Q2Y
BdJDqV/KzSZwAnZvPMLnhSpk2hO06P+UnGn2QdAixgL+ZHj4NM6r8LIDfZns
Xduj6Bm8JbY+aux3bOJD7RKi96C1Fkv8xPS6dOLpK36ya24fak+PbUNjVZlg
Zz8y6g6Y21beYs91ESkevtYPfU4uowqcCoDjmaL4v9f2eQ9fE/Zcr9UuzwpV
CXIXtlVgOCQ2wkHTyxkEf/tLdvEde6CYwH8klaFO84kNa8UdbnSCJ+RU6KH2
KrAmBB42JjS0QAcIpRDks9wajwsGHaYQDVhy8rzh2lOH6rP313I+qFpoYzHC
GFZ7jNIQagpF3magX0wtGOffNNr5vrQYEnayoUrF/E4tfkHZppI5TjGSvClW
/7i3NiWTibWmjFG5V9cYe63lmA6L1/AIJ1U6RQjwBHZdbwvjMWH0i7v0Jbum
DGkvCvQE7FHWCAzUAu/SQI/53SzhH1UJF4PhoiB2l2JcL+r7rKduxaTRNhri
Lsw6ZxAkVUULC+66Z6os9FqnCguNSaIHH3gFavThKAmjBNRWPw85Xtvn3uo9
eBPlemCiX64uJcKhIEIMaUfBPg3hQLu1WnMIRHlK9q0fklw6bzjD+5r34i2S
9PfpQgT57pvrt9/vYeIo/Fdqwk6KzRhbGMruuRhcFfpaIfpGAIK1hA9P8QQR
1tqSZFcbO7ZCJkBNP9zcXOpze1afiIaKVaBwdipundyQZEd5BBWZ88EpAnMN
gpHltoBN3gvrrwiTFKbwq0xVjpmB0h0t6S/lPVjMCv7OSS8C+00Sx82I3lIy
OhR5THi1Mb08qXWdnA3jKS5qoE1evtB3OG/qDHgFp1pLDRRGxpEb7ql0ZMja
glKoBSDNsycsRs3vqCt6ZmmEhvZTkUJoDV2tXXqrwMZ6wxeCOS+1poxeOJNf
qe9vs6bm8BrlbRDqm9NJX8Oste5Q6w3TAA0cdRYTJ6R5FcEQzozbD2RtJM6s
jExS399Su6KDPQ7AEWFzYmDYcu06TWF/PErChRpI6nFUFSp2bhRl8FBJcmd0
FuMNN3Zxwbs6uiNaVegpr0KMpQxR/51QshtGk2z1laYeOrdZAaZXY4UAsV1u
nSFtZgLTDiaPdK/jt1NkmMr88DypbV4TSqPZ4zHa+SUK3btDvb54++PVTydn
cLAqD0+uL05FqlLXBNkkkZEkY2+NIbFFHzYd5lVLxyfR6SlDAullnGofa2dN
t6pQT9+7tJgtSjsFhxywkgguibU4JC5l6xjnY9mmH9LSTy4vT8/f31ydXyMS
mmFrgdiKhZ6rgqL+XqKrUqR90tfrcgpES/4Nogti2xbTJspaUsc4pnfp7yd1
Q3t6rngXueKNOvlFM9DcTDmwibYA4K5juh3WttiaXkV5H6FHHbudFkEKcDZO
IbC/OS1KCsl8I3ku6YSzFGwpbVoznpdYut09qM6LUntBz7iigNiwwh/u8gp5
NONFO41jT99rfREE6jDUXAsFKxEE4Eygj6xDEHCQW+nAtfDynKWPHm43DtMs
TZ7QfVUB+aR3A6gwwCQCr4YAmmGIfUsfwqfoMtY5bIil8Lv+M52R8Ua1D0X4
bWxJUPGH8d9dTagh8RH64kmch/LvuIuJzzvr3rH2yYR7v8/OeT0gx+vdIQVI
YN9irt5zhrbEn2Yw/kpRxuf5ylP+gK6QS8xQ1sO3KWrxWUmSbZ8UEQeEkxzb
jeeL4LoIPbY6mRkOKVxgwq/+8vnzsRwZGMRHUWW0suu3B+6oHGGiPQaykZMf
BADXfa2/xzgJBvnKwMkLPjB1OUT7z0o+kOuaIu1+smS9p43Pq1X7Bg/BMyCT
l2Et0eTkirIOsqe2fnCPBOQIBTewzGHtrRxeV5ITgicibIX7wJFRIDl112fx
/nC9bbS+Q1lfWpmaFSBogHj02lMPWr1Evm9DnH7GmepuYxhOMGqoSC7L0J/Z
GmC+khwR60pISZZYUbiNh8lLwqXMoiYgJAfKOlqUM7X1GgTpEoC3Kd+8u1vY
35NTeSQjHS6Q5JgFaOqAaKVAugp2bQxNxHqbm2xn1lR6IcHhovRKglo5i7L8
SByDaOIVApXWJVoGiLWsHvio1x5fMiKsV0lM9ZJKw2ehmt+tlOOjdj81PU3q
G5pBIPseHhjT/ivZRX/K+06Fkn3oIfvMzWaD+EdK6kD5ZFHJu3Ub4mW9EGLH
XH91cUmzMEZGQj4QMSNP3cZ/kHAopbEh5J8/eIYapMY8ZsThwlp7bKJUZYFq
y8oTKLN2KuqgADjGjiuBqZuWJldvc111YBl4oI9XufvfkkNky7YE/O0Fq2iY
CMSmgtqbufUSQzsjSIXjlutQOD1Y9g5hT4DIle2L3Ha832czd8R5iGdxmU5I
/49uFU6M/YXErYav09sqHw/TepgOr+XR3dPXaXq9h55D/KHPdfiL8zQlojG4
zFzXxUarOCVmkTrnAa4wCKFzFMgFFn5cFNP8e2o5sRZTDb7I+3E4iDHJ2fci
aWwYNtHBEeBSrpeQe3gTaG/U7k6PFCj2VoiEWn+40pWTy4taWnEGqCUbGgtN
tQ+Lgy2bt9KfDamU9D5RFxFoVDRrhV3atomgeVwaOAunJcs3H/mSS4VVDwBl
yUw0nCcNUgakXnGwv9RGnpRLY9quYDUN8CRhOWtO5PadW9jKi2pz1ftB9Mjh
dKKmITnB6A+U3hAn1IWvDaI6Utb9rX0iRsNWFRUZdA7aHYG5APC7OjIdJx+8
uYx7CFeRP50NJsgGEjPnYq128wOYIXu1WlTA3Vu5z6LixgQviWUiOeU75COx
lG5PEL1ACBvA4WDvm+W+U3zRe73KvxCLzFDs8Oh0MvGhoEDLCrD4DWMMPc38
JyZ7S26zrk7s7kLDj8rWyKEe7ULkqr8Ps6Cgdg+SB03LBub+pjSBVh6rdAts
00a8WTRdOTzKE/FtNqfEB9l/SdE8DGPfSyp12KyMxC2+sfNd2TRMcXCpcuQ/
CfPgJmm00SGRVb/PVBkCtFk11AibG2L3no5M5sHVnBw1RNVKXi/J3gEfTh5f
lZjgBMpu0r2x4RUUoCfowIZ8UFESSexksgla12mwa4Y1BzOj4bEvWDZHiIO0
CjmBI1IjbyLcBd07PqahrjQVEPyMoADzmoLh9nCRalOgqMpEt1Z6ta4rqyrF
OtE1+bK4eQUakkr5WCvTRBTmswN1o4wyd+s9S6aJaXYkHRfE4eiaoMXGdESp
mAXvXp1OfoV5MrmIfNtE3ILynMIIlna927rAe7odKgAxxR6nq6Ztb2Dkhi47
q4Cpg5COIhs4a6ovwrQUjgrsUkIDpqbsmTLjHKgizx1Ki5QNyyk5HHFlisWs
hw0y0Hi3PEgBvwgmhNmOqpuD5OjN8O3Je3SPnhwMj97Az58/q4AnqhrDLIlQ
QeG9zQjXydL33HTg0zATbRuluN42BitAZSWKBGnx5Ay4OH2vLweDhWG919Jn
mDritDXXoC2SLiHLcLsKRq18CT/Qmd5xNjQD60npa5HA2+VZpDV2qV5cEiFj
6Ef9rZ4ytX9MvMUtyUVJkZg9RBO25N+Yb8h6t/ZPG+3A3qrJYz7BYC8pl3x4
eHvwAT4mj15N8kZYgDoADO2EOsD/zrs4xKsFf39CsChDbtP7JFbbiLL8Hya4
IeVKoY2eaBaldQIkHwts5US84gqoqOKtq66RGBKjTUVQsvM/6BdvX5J/zlHO
HmhVsGMd5R62kCPg3YuYx/VBzAeF4bg2D+x68PfV7/HAZX3Gd9paJtbBdREX
GZIIkzTUbjNj6efhsKnorrqMsO6XgoHa41iNHUKaAdJyf38h4sDXWNCVdrd6
sntOiQKa4ZjEh2TOqK4kirFJXXZFLCP8Y494k3EzD/9X+JTbC51kllVIC+3z
7prZGEIWMhn/1K70+FXPe0LTIIXARX+blv6trpR6T5L3bjd+Tk3ZEC4IQ5Bw
mBod1Gqrxoq2BYFaZJWhO5t7lxOx9+gpVHlQS98tU+uc6/0PuAiVh/LriKUo
FZgLD2wHgSnhRqPhnTQxfqrTdYrT0YDprFHf/V/hOT9wnvMxqvCbDmV3eqPS
DXb9qMMBMdt6FY1/0FtBF+JyzvJG9BVWdBHVB9NaKLeyoCRwnpUK13YHHQ3s
KnPvu5evkmhih52QQdf3j3Se93TVoyR9Bk51SeJuKYzWca+e69usw1dZAeN9
y3wPSK9z30e+rTZ3D6JhHHxkoaOdKxu0RT//Y4uWm2SUuuXakHxSs4JuYcVo
hqL0s9GJX24xVUYcSWtM5ZuE0PaXUDT/Wf+i2dfo+xMpLxSCBWHlKtDuqOV3
FFhV53o82OZ6ZLMAMxM5h1R7Ubn4TXx5urIjsrrY2DUPin5LdRA79VH/LA/6
Z+lkgZh+egflGvepJoai9kcmiJ4jm9yfRQD40Sg1nms3KNsZs5MF560pB8Fx
1rXeR8lrjn57vcPl9g0o5z28S0E1TZKxeegMuBA/l7hAL07Ali0+bG0xvU6T
kY0ORLnQ0pJYnvdtuDcAJOQY2bMTrYHIuB+OA1dpU/mXySxkUsRre/7ltdG1
xwpRfnvadJnjuk7Zs+zOv1aWyTSjcKbJBzZTQlasNDIjG+Dha7Ri4CP84+eQ
wxx86je01GqZfCX2TmjDGsb5KuH2BeLBLi0v0eel3SqkJu+colNx8plgKsbl
1ay851XSerWk8HcK3EN2S3L53D4ZgMmSFa/xflbrRcb9EQ1RecM3wvJMc4Jl
JK8NoctwdVGr+YbLu1T8Qkp7tVbLkocpEEDx7GtjkgPWtAkoievWwiNil6JT
3HzirGw454Q1Wp7mv3Gc4D5HhIW6toeADh4BCJNItusyH2AcqBsYn9WTur0I
ih2dENOD0TmvX3od8x3iECdtuOTWFBzcDuDGXMgw5tpc/DItiAL72s2wlC7A
dssYAoorp7H2TBLZJ1ZsAtN6zZ4JyitdcX0Zhv50UE7jSyl/T3qTsKnrAfFg
mJ+5FQXfqcpVVgT3Jd+9fZ/swniLZVOCOYG42WQdSCUbDY5l+Lh32tzUtACV
6za8afXWrkk/cS9AEqA85pDRmlJFWeENUQ5Qyd/rBeFYORBdm8O6zqQ8K0XQ
V3qS6lUws4gUKIEoI4EghqDORrMaLk7f7w3MZQQ3sYXdTjqUtDS1hjM6iAZB
ewIEN75+3OCUtK4IRlUa9TS+JACW+4BVCt/Ve2xzPHrTcwk5BkOusLavx7yM
m9A6K3Ac4qwLUJnXSlVRhfO1yKgj0K9g0g8PF8OzUZXe5cN8XFSz4dFsjD99
/qyr5RMJSNMigGDSyopDwZDV9HPTXoNbgeOnlahDk+De8OjvESwqdM8ko+bm
+uBwdPT0mbX/kD8coAfMkv95Z1RvGoMgg1tW7YtaSsBvRL6D9myF2TNMkFRI
M8iapD7z4QAXzcfWNI0BHj+8f4boskH+usFs/CDmU5lkqDYgQCby1RXyenaL
UuUA5h7SbPYidCFmrvJdgSYUVqwNY3aBjLF5anIOCumK3kHpwXvJz+fPBvA/
B/g/h7SdP58/Fww7VjyxobKcjXvpGY38jL7BPx8ku6qOwxB7IqzUlckILQgN
w+mz5EfClsKM1cZh8QgYbO2xiegOvC+L4eUazI2xagsjkf+01cQcnGBlQc/N
nCRNTU0Nwt9Vlw/vHy5ESEZq4qPBTcWq7dTCq4KuHItAvn1WoalaRNwzL2oi
90f+jfBfcsPzGsm/R77q5nnc8/HxI1910Fjhqz/ZLj72Vffvw5a3fkON2b5J
wMquAleQP7t/33S/+gkJ94tPdjrPRW999Mner27590e++i++9YOs9WDbWpkU
/VejB7/5wqvfCl9xX/wm6j34pVVf02XRPwCp2fu/+SPvb/2hAl0G+53Tr7L0
wz92zCeXF+HXf33Dv7jgx7/6L7/1G/gSct5/mqQ/7Xza9tYvjYVf/Rf/4Vdf
d5R6Z+E+/tU/8A9ISanBjpa++k3vcjprbS8ddhi+oGLLT+GRUR+Za9+39AbJ
G/8rvFHu7ze4LL0y+Jd/22Xpo811dpJtg+oyWo0rTe/QnpUgJ1smdWRRY5eJ
uzy7x+aV28PX5nS2ttLYGnKN6s5A4lKs1YLR/PBw3ZSbtCjvSPUxxAtYaY8p
LjgGCm6nKrHJ3ATVaLBbAobpADGoAryseiZsZiHAyMYMSixv1sYWJVm0IqWl
DJ7tV2+R9gUSP2x3LwQPtUFTSAYvFTOZtcxGKYZMSJf1I0jD0AAbi8WYi5y6
q2qQo43t5oCCzQQPaqxYut7+xt87Bnik1WHkQmtAWQJgz2bpfcjgsjkiDv8p
uQhAFVFNG+vZVjJgCNkYYRAVvN7XzSIAm8hnEJ8JZ3+lmvUj7QbagDbBKywp
C+ZMcEp9dqeEI2WSVF9ICNoR6Iai8oSSh3hF1MOdSw877g7tMyWp0dzmYuKp
w/IU2kfvO1dcPscNZkDfFrVxkY12Pu4xCp3vhhVn9XSYbf6X8pq9CsHnALo4
7FS88wMBMAw1HnbEeTGEW4bJ+9vPWhZsOTJbwROOGGrg57AS5VoniNOATSqw
/3TfZdZsQ32n7QtTPtV1y1/wENgs4y1zOzZKrnNq6Yz74YvBOMrDZqtEccIS
0c2CXyAriqsXykZi0oO+c0l1NVouR6F43xUhBJrLIgr0dGhAu4SP3B4eHCfX
K7gFyCn2z1zV6dbdw3kwfHfsFGxDvVo1hVaUItAMh237oVQJQM6C9WTuLbXf
tq+HHSXRZdV5cZF8QF0kNxHFu1ICuCOseUbI1nTJMdUhGAY+e46sJSF54rmq
UjOCqIRCwKW6hzUK5Bpathu4D6VE0sVNC9zUXRlH73RWUZ6g4jiOLacmrkCO
uTl5DNfUOUd8ltiBGGfNENWRM32UnDny8BYvI5BhsbK4JdB3M0dOMh+Oge9V
syEwhHq4eo6nav6TazjrtEjRfRIo6vA4eUe4xWRpjjcabz8OpNFLV6E+Ae8n
6HAGJoieBA1DIC2NEsb7d074+4yzoNlTj3wKlsfwyY1Mg7PFWIeKdY8eaqwy
6njPMOghhhnHKPkCT1NquUFhaKsqctnktjHP4aqJN/eY663SeKQ+hzkDvzAm
llW6WFuYKq8/RgEgVFOQHIgQavppaowgChn96kpU2UtKTldpnYSh3gJIcV4y
OKXVIYXlYGVOK9og+LTH7Lpo+9ZFYjkNhdODfSuQmLpTTvwrI5+vvA5lzquE
fEXcoBvz5e0E0f8ldSvaRa2WBU/L8TpC4d5HaeamP/onmjKKGDqJQox1SDBp
OVg19suarp49+ZsoZtTSOcU71I0UocbSmQeGcPuvlrxW282R9N5XKG5ig6Ty
FcoldztskvIxJ9mSa81dWTnWoaLznXuSh8tcR6KItWe9/gj91LcA4xx6ZQMz
ly2Vu92romv6ROAjW1znErgJPftMByecRwL6CDeRJ8t0xpy87sbn6UJm2xnF
IHCKXWqKBsS84byzPVOeLbjLxXTGtLsbBZzkQ+/CZMO0So00TUnvsKgLYyCd
Iwkyp7nvRT+Cv3eBj7z8OLlIblDx4HirO+2Ti74ippsAvoZwrrRGLSTyAcil
NFbR/ADOMjQlGt7a6FujGYO8w2x2n+gSVkxxVSlEEJ3MJQlJcVukuYY+0VFD
Y2xNK1hK1SwbUqseQ82TIILkG0SJBpLX5ics8/jDWZTiJC+pN6NjN57954yr
xnn+hGIfAGzwfVxIw2o55o37QlhYNicCkCKldgDbxrBXXFImmyuKh8AtEIdF
iBeycEKnY8v1qFLE6cSukgwf9xdB2IiygLaWK+aFQNw9nvvAnYcJBYyigdzH
XLp2+MUyHSDjG8Ish9OFdQql7LHUZZQRZeZaSaJHRRZBkXCEgLHgpg1F4DgQ
ic6nve0wU+esudYdOvK0rTRl6uNtXobwHBsZQOqIyrxJFJ0inCEzXMR0vou6
lTBCccglD2cSz4r3i0lKn6FP9Ij5VWF6VTpJKy436+R1s5gnb4tlWYKmprGp
JXyBKlEIi16j0bsRHAWihZcK4yYZfE1cTMeYBqHfBQFHkU27p6q9SCiF0Ze8
ZB5bFB9TvHavToAatYOQpkRzRG4Ss8H2oXFQGjGWUYekYnjMkQUikjgz2luL
LIK6zYsY1YtrLV0SN/4B3kWbNkp+IvdMpmemp8DfarS0C772Mdug1UKgQJIA
IvKPC0cMD0me4S49fB3m2EgwxUDbDNTs3wPSUY3aLjUd4hR1SuCrrQau3zOo
pBl6soQi0RsCJHxNuRLCFzuJYi1BQDU3EY34kxAeZn06qepnWQZEF1/KqOFH
Sz+wec2uLk8RHwz+g2UjVfLu8gJ+h/+FXw0AjMBQg5dHi0dRJy2GY8xIfn/5
M2LDrasAwUpd6PJmj3HK0tvaTk1CgrAc2yrsRuiqgVIuMxGgwG3UyFVEEo5l
1Nqp3kMlsSOBBHgB/+VGJZy+FbmorDEydfxyL5exD99cXibXZz95j6AX6d7P
is+f31xfJO/OTxMB00QeteQdZPsT8dbpXTZKr3O1J6F7a5mG7co/U54x4JXD
plr+J0sCK2ouE4d6ovUUjyIePQoUFAO+dQCDjDkqLCkGwiPvk15deAZmzZix
JjZjgAxeSVQbwh6c7WUZ7d3mLM8t5QXAWZbUTdbdc+Aew6YcUrtqkHmoPQwZ
tHsQLryoZJ3L7UD+H4UiCygybUQEqz5oYTT4IgRtbmCNESSLzCUVMCjCgCJ+
bvm2YN+M7jHgI3JxcapdEIeUs4m5LekswytAD/Xs/dZ9V9PDzK3IIHK0rAbT
9ooFpFeB3abGc/lylRLsOm+0lX70VXzcGvI7SZu+eg8Cnaahhtx9IkKssU0c
/c8uaHjBABEt9JlW2z/E+hO1VyRUsElJNd1yHA6QWautyqi5mxGa5tZvK1+K
rIceAPZdT53s7kKnPMqcLUPuvYr2IBRdaOkhw5Ogq82OxUBjuVj0i5dfirLT
VT7RHkjMhsdZTgib1Eba9O8qC6xaL7xabJ0adNx6ZYkovEAxdhB/3jWOMvz8
/D2Ypp/jNSvqUNcEbjPr7WtV4piKB7stkVWXj98ciipC9l9bJLkKDaI8mU8N
ow57IDJ8AqWyXNRY4KSuzt6d/HcXSmhns9ZyW5G1xyskXgRwFu9C68+N9zUS
/nTJMFkwDO3uyYXPy+eoQAtvtW1nw8eqratREkaQuJ9DTEs1x3USentobAWN
jdgm7akGkMv26KKV9KQwdh8ovyqHSiCPHr4U4DIH7FrWpsu0tBg3FfYRqbca
E3sox1Rk2sPXdTb++zj6I/bPdHj/A1FrYYUcSZYlciDzv/5rmU8mi+y2/C2r
nzxhsFGCQg1OOfNxc2cttjox49ZMS74RaANTuyRDZZBsy0loMTnwmBmTuMld
yHR1nuhJie5/Uf9IKcunFKljl1C0G/4muGW5y6LuLL9BsMPYPcAA8lPuaBJA
8KPuCdwdPRF/Pj0wdOq6uj6KTYBEESB/2lXqM4+HD+RqhGUuX3pES2pif1d0
lbWTE7xN9KZojqFXEWfDYqfkVov7gMerIeCs1e5RDHVtkhHY2Lxcwv9Vqzkl
kNOopO4KMJiiGuOrOZKIPleN5FGvgdD1VJvQOjVNyKY1X20tOWdsnBAbybGB
FAK2EX636xehnUSzELlCfzXKS43UG2FHxIzKcbEJBOSAnFo7qTnt1A22Na+w
Mxi+DYPh/RL8ZDrtZYq1eKhemu1ahyoTbvKRN8ms5M6/oMDlBKVjzpyofXvU
XFY6vqJbGeQidma4y8YKJ4awhgQ4hL6CH7Q/hcthCFMO70D4P4xzRf4nJiU+
JuJj6H/XNlDYyAAUOW4Fptc1M/xw15xTfuWU+/DKVvcZeoG5qCQD5DdCf14Y
4ATXZLPh7MNVJeuc5JXIUo7nphHKr66J2nar77TWgkduH06VhmT2pYjWJ/1y
+XsthqRVcqnLk2+zH9ezCSXI4o785a55E0VAfPiVDM5wH7kW03WWkU3V5i8q
W+zex1RCBAkCHHvPaAMa4AgL9MijjEB6rrHSu6mV6DKNWJRTJdWz8lqILHAn
jkYViR0+JyRNAjjGQGGArWqb7GGKDTj+DWMIWx9wXjuivmOEjLOxJ6xhU4xs
iCcB5z7LKMbpcBWEu2oOgsD4oOO45qRwSoZIOccqXZA3XThho+aI9WWU9nbT
fCGKSOjkbsYRENwM2z1RooGXRsYjOFYV+AgBeTAmfU7A51OKvdGEyOmTcQAp
iGbfH8eH3a3QCK34h4ebt9fXP199OP8b5gegFsiZJvBnjL9fvr24gR8/f3bX
Ts/VT7ylFmBvVIH5oIb2sxJ/wTHRtCgyU31p+8IJIDmEnb6vqIGm7QnfA6y1
zDyPBS5FzZuqjAvyyZkedwcPeYN+0tivjXJ96FBI1Q6sGQn69wyUudBuHYYs
p8zBuSyYUu2U27Qp9XatQAkcsiW8NxXg0T3DBZycwe48PPB/YbtRl0jzRekw
sdw1Zs1H2CtxcgR11AL6LdsXT7Ddiodp6Rb+5z6fIKAJMH3stTpQYHtFcCA0
Z211iY5r0GhSBuSHhfzEbp6BIwamPFC0ZA8ciaoLpdb0IfcXNuKl2PcPCooe
IUFpg9JBw9wOUnmYCpj1fbqRmn1anKZwMi6H6wlr6alcyA+6eVrn3H0Az6PR
M+G3o/S09l8RWw+pm72StNv1K04liWL5Ir55YK11VAluuhG7L/xdKjYaeIF5
nrAzfYDZTCkLA8qpYY4uBYQuJrPrfqZWdgNrWZwXW24/DrsnS0Oywx9o7tIE
hwMiwMsWa4GrdNl6Nht5sdz58s7gMtv7J13k1bdiYhOPjlqmYXCEmeBu7H+k
UBCF5NQLvTfQbESBFKXq8nZgEKaIhMvGdIhODjiXMJqfJkxoqxLUYNBkjkTl
dVC4HiGWgai3ob8A04jdnHBfGHbDWGG3lXiikfeQhNpxgDu/t9CkWbTSt+nk
/UnLFt15v39Cn8GfwehGmcr1Y5NyvF4yj6D0H6pa1pCE9YmUTinEWSKljdmg
9kxPFUlHsmimubZIiRAwVGCboUktfQ1LOEWoKmIDolfg7e1iqWUtq+sXhu+A
fV0jDN/EHLxhPXAz2OjjrkfUCIt2khpcGHx+new+PMCfzsNfGEieZQ6VK2uI
kJ+MMkDwUUwDci0brM0WW/cxyPjDQ28HLRwmsKmwCNaZun44TZZCsJ/Fhg2L
CMRq6lX1PFJKZeuJsfDSHUwDzATo6ntGb2YQMwLaDBWpAhITxe8DIJZNnepw
DRd54sBaWZvO6+AGN4Sv7kKjhicdL7Z5nl3uret4xeD6HNPRxGaQ1ytVFPyU
iKa4slCB4Sb9/d06ZkOAdWPe4AN0OOg46DSigOW1+APELuRoQZXNhROWUlgS
tacIVMEYMgkhvJG2A6ZTka7qedmwryP44+3b+bSPjH6jAAMivl1w49uB2LKM
FGu5m+RGUUDn8QKj4kPpbBNlNlDtJhXbwzWn/xJmdN4ocDwThDrAYqIgnWDC
EPmW89WUPtcYTDgBnxQ80SGQIjqlJOg+psa/qHotFvmMJit0VEx4KtQD0wiZ
W3bnmFmXh24k6NikzCnOQccb8QvHtXMHsLcmzICa9UXPXRkRVSRiMFRIMVaK
UufrmtAnsKAjXfGPOBT3CgASZCIoeo8UJN8vFMN2XS1Jf5oY+BHpawbD7cSK
u6aEyiAYFxq/nGD9P9timB/jT6kvM3ggahgDEscRVU0WqTIROjUX5RO+Ojdg
CQiNNOlNjikWMI0lTPnOADbr9W3NWPYG3GCKoaxR0LBo55gZBNB/Cnj9fH1+
enJ9DiLz7d+uL0Dx74ViDhctyEm2XSMAS8tymGQBS8Jc1aICcqZQKGkG1Q5M
+oLjjnghr94QLYCpUGtHIdpFrynkHOtPTgInIWbNiC2ckVwLwhW5mOltafEx
OUeQoV/SWSEZeiERg3V4SSZX3SJ2mox6htfuePFrTuEc5qC1J9eYAjNH5XRS
pYPkLIW3JT9VCNdyOQcT/Rzu8SIDEX/drEFlS07h90HyH9l0WoFp8wOQ8k2Z
VWTonaOq2jBp/Qe2GqnK+zGoGdqtC6+G0atcvdHO/wv6pDFd314BAA==

-->

</rfc>

