<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.25 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-km-detnet-for-ocn-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="ocn-in-detnets">Using Deterministic Networks for Industry Operations and Control</title>
    <seriesInfo name="Internet-Draft" value="draft-km-detnet-for-ocn-00"/>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization>Futurewei</organization>
      <address>
        <email>kiran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Faisal" fullname="Tooba Faisal">
      <organization>King's College London</organization>
      <address>
        <email>tooba.hashmi@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization>Futurewei</organization>
      <address>
        <email>richard.li@futurewei.com</email>
      </address>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization>Futurewei</organization>
      <address>
        <email>cedric.westphal@futurewei.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="13"/>
    <area>Internet</area>
    <workgroup>Detnet Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Remote industrial process control &amp; operations improve automation, resource
efficiency, safety and better overall control from the software-defined
application logic.  So far, industrial/process automation connectivity is
mostly localized. In order to use cloud-based connectivity, not only deterministic
networks are needed but an interface between the endpoints and the DetNet is
required to be clearly described. This document describes an
interface to deterministic networks from the view of end-points to support
process control and operations.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Traditional industrial networks are designed to support process automation
within a production plant or a manufacturing floor. Therefore, the network was
typically a campus-area, local network and it played an important but not a critical
role. Now, as equipment control  and monitoring become remotely supported from
the cloud or the edge, network technologies such as TSN, and DetNet in
particular, are gaining relevance.</t>
      <t>Process automation systems involve operating a piece of equipment (such as
actuating and/or sensing field-devices. The communication between the
controllers and field-devices exhibits a well-defined set of behaviors and has
specific characteristics: the delivery of a control-command to a machine
must be executed within the time-frame specified by a controller or by an
application to provide reliable and secure operation.  A low or zero tolerance
to latency and packet losses (among other things) is implied. In this document,
these special purpose networks are referred to as operation and control
networks (OCNs) <xref target="OCN-MODEL"/>.</t>
      <t>DetNets provide mechanisms for guaranteed packet delivery in-time, for
reliability, and for packet loss mitigation.  Thus, the OCNs are an
application's view of a network and DetNet is one of the potential underlying
enabling technology.</t>
      <t>The packet processing in DetNet is associated with a flow. A DetNet service
deals with aggregated flows for which a network service provider would engineer
and allocate resources.  Thus, the networks are
provisioned for less dynamic (long-lived) scenarios. However, OCN-type traffic
patterns arise from the programmatic behavior of an application. Hence they can be
dynamic, sporadic and intermittent. This leads to the issue of how applications
can interact with the DetNet-enabled networks.</t>
      <t>This document outlines the opportunities to make DetNet more amenable to OCN
environments, by describing the interface between the OCN
application and DetNets i.e., using DetNet services for communication between
the controllers and the field-devices. This interface is used by an application
to express  its network-specific requirements. The document presents the
perspective of an end-system that is a 'process-control &amp; operation' type of
cloud-hosted application. Because most cloud-hosted applications would rely on
IP, we consider first these specific to IP-enabled DetNet data planes
<xref target="DETNET-DP"/>. Hence the discussions will assume IP-base end-systems.
For the other type of end-systems, the field-devices, service level proxy
functions are assumed (as per section  4.1 in RFC8655).</t>
      <t>The rest of the document presents a special case of DetNet referred to as
Operation and Control Networks (OCN). <xref target="background"/> provides a background on
the type of traffic for OCN applications. In the context of interface between
an application and DetNet, some of the limitations in IP-enabled Detnets are
covered in <xref target="gaps"/>. The document is intended to discuss possible approaches or
potential solution direction to support OCN traffic patterns over DetNet, as
covered in <xref target="approaches"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>
          <dl>
            <dt>Operational Technology (OT):</dt>
            <dd>
              <t>Programmable systems or devices that interact
with the physical environment (or manage devices that interact with the physical
environment). These systems/devices detect or cause a direct change through the
monitoring and/or control of devices, processes, and events. Examples include
industrial control systems, building management systems, fire control systems,
and physical access control mechanisms. Source: <xref target="NIST-OT"/></t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Industry Automation:</dt>
            <dd>
              <t>Mechanisms that enable machine-to-machine communication
by use of technologies that enable automatic control and operation of industrial
devices and processes leading to minimizing human intervention.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Control Loop:</dt>
            <dd>
              <t>Control loops are part of process control systems in which
desired process response is provided as input to the controller, which
performs the corresponding action (using actuators) and reads the output values.
Since no error correction is performed, these are called open control loops.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Feedback Control Loop:</dt>
            <dd>
              <t>A feedback loop is part of a system in which some portion (or all) of
the system's output is used as input for future operations.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Industrial Control Networks:</dt>
            <dd>
              <t>Industrial control networks are the
interconnection of equipment used for the operation, control or monitoring of
machines in the industry environment. It involves a different level of
communication - between fieldbus devices, digital controllers and software
applications</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Human Machine Interface (HMI):</dt>
            <dd>
              <t>An interface between the operator and the machine.
The communication interface relays I/O data back and forth between an operator's
terminal and HMI software to control and monitor equipment.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <section anchor="acronyms">
        <name>Acronyms</name>
        <ul spacing="normal">
          <li>HMI: Human Machine Interface</li>
          <li>OCN: Operations and Control Networks</li>
          <li>PLC: Programmable Logic Control</li>
          <li>OT: Operational Technology</li>
          <li>OC: Operation and Control</li>
          <li>OCN: Operation and Control Networks</li>
        </ul>
      </section>
    </section>
    <section anchor="background">
      <name>Background on Industrial Control Systems</name>
      <t>An industry control network interconnects devices used to operate, control and
monitor physical equipment in industrial environments. <xref target="icn-arch"/> below shows
such systems' reference model and functional components. Closest to the
physical equipment are field devices (actuators and sensors) that connect to
the Programmable Logic Controllers (PLCs) or other types of controllers using
serial bus technologies (and now Ethernet).  Above those controllers are Human
Machine Interface (HMI) connecting different PLCs and performing several
controller functions along with exchanging data with the applications.</t>
      <t>A factory floor is divided into cell-sites. The PLCs or other types of
controllers are physically located close to the equipment in the cell-sites.
The collection of monitoring, status and sensing data is first done on the site
and then transmitted over secure channels to the cloud applications.</t>
      <figure anchor="icn-arch">
        <name>Functions in Industrial Control Networks</name>
        <sourcecode type="drawing"><![CDATA[
        +-+-+-+-+-+-+
     ^  | Data Apps |....            External business-logic
     :  +-+-+-+-+-+-+   :                Network
     :        |         :
     v  +-+-+-+-+-+-+  +-+-+-+-+--+
        | vendor A  |  |vendor B  |  Interconnection of
        | controller|  |controller|  controllers
     ^  +-+-+-+-+-+-+  +-+-+-+-+-+   (system integrators)
     :       |         |
     :   +-+-+-+-+  +-+-++-+
     :   | Net X |  | Net Y|
     v   | PLCs  |  | PLCs |--+    device-controllers
     ^   +-+-+-+-+  +-+-+--+  |
     :      |        |        |
     :   +-+-+    +-+-+    +-+-+
     v   |   |    |   |    |   |   Field devices
         +-+-+    +-+-+    +-+-+
]]></sourcecode>
      </figure>
      <t>What is changing now is that cloud applications are integrating process
control functions to improve automation and to make real-time decisions,
programmatically. The equipment control and  collection of data generated by
the sensors can be done directly over DetNet-enabled wide-area networks as
illustrated in <xref target="new-arch"/>.</t>
      <figure anchor="new-arch">
        <name>Converged Cloud based Industrial Control Networks</name>
        <sourcecode type="drawing"><![CDATA[
               +-+-+-+-+-+-+-+-+
               |     Data Apps |      Integrated Apps with
               | c1 | c2  | c3 |      Remote process control
               +-+-+-+-+-+-+-+-+
                \   ,-----.   /
                 +-[  Det- ]-+
                   [Network]
                    `-----'
               +-+-+-|  |-+-+-+-+
               |        |       |
             +-+-+    +-+-+   +-+-+
             |   |    |   |   |   |   Field devices
             +-+-+    +-+-+   +-+-+
]]></sourcecode>
      </figure>
      <t>One particular motivation is to provide the behavior of a serial bus between
the cloud and the actuators/sensors with the same assurance of reliability and
latency, albeit over wide-area networks (WAN). This is evident from many
Industry control applications, such as factory automation <xref target="FACTORY"/>, PLC
virtualization <xref target="VIRT-PLC"/>, power grid operations <xref target="PTP-GRID"/>, etc. that are now
expected to operate in the cloud by leveraging virtualization and shared
infrastructure wherever possible.</t>
      <section anchor="connected-controllers-sensors-and-actuators">
        <name>Connected Controllers, Sensors and Actuators</name>
        <t>Control systems comprise Controllers, Sensors and Actuators. The data
traffic essentially carries instructions that cause machines or equipment
to move and do things within or at a specific time. The connectivity exists in
the following manner:</t>
        <ul spacing="normal">
          <li>A controller interfaces with the sensors and actuators. The controller knows an
application's performance parameters which are expressed in terms of network
specific requests or resources such as tolerance to packet loss, latency limits,
jitter variance, bandwidth, and specification for safety.  The controller knows
all the packet delivery constraints.</li>
          <li>An actuator receives specific commands from the controllers. The DetNet should
be able to enable control of actuating devices remotely from the controller
while meeting all the requirements (or key performance indicators - KPIs)
necessary for successful command
execution. The actuator participates in a closed control loop as needed.</li>
          <li>A sensor emit periodic data from the sensors. It may intermittently provide
asynchronous readings upon request from the controller. Sensors may report
urgent messages regarding malfunctioning in certain equipment, cell-sites, or
zones.</li>
        </ul>
        <t>Almost all control systems have at least one controlling entity on one end, and
two other end points - the sensors and actuators. The interface to sensors and
actuators is through the controllers; i.e., applications do not directly
interact with the field-devices. Neither actuators nor sensors perform
decision-making tasks. This responsibility belongs to the controller.</t>
      </section>
      <section anchor="ocn-pattern">
        <name>Traffic Patterns</name>
        <t>For either local or wide area, the process automation activities over the
network can generate a variety of traffic patterns between the controllers and
field-devices such as:</t>
        <section anchor="c-loop">
          <name>Control Loops</name>
          <t>The equipment being operated upon is sensitive to when a command request
actually executes. An actuator upon receiving a command (function code) will
immediately perform the corresponding action. It is the responsibility of network
and controller to ensure that behavior of the sensor and actuator follows the
expectations of applications.</t>
          <t>For several such applications, the knowledge of a successful operation is equally
critical to advance to the next steps; therefore, getting the response back in
a specified time is required, leading to a knowledge of timing. These types of
bounded-time request and response mechanisms are called control loops.</t>
          <t>Unlike general purpose applications, commands cannot be batched, the
parameters of the command that will follow depends on the result of the previous one.
Each request in control loop takes up a minimal payload size (function code,
value, device or bus address) and will often fit in a single short packet.</t>
          <t>In Detnet-enabled network, it can be imagined as a small series of packets with
the same flow identifier, but with different latency constraints.</t>
          <t>It is required to support control loops where each request presents its own
latency constraints to the network and where commands are small sized packets.</t>
        </section>
        <section anchor="ocn-intervals">
          <name>Periodicity</name>
          <t>Sensors emit data at regular intervals, but this information may not always be
time-constrained. Usually, controllers are programmed to tolerate and record
intermittent losses.  Automation software can make a more informed decision by
monitoring a lot of sensor data.  Thus, the traffic volume generated by sensors is
expected to high.  The periodicity of each sensor can also vary based on the
equipment.</t>
          <t>It is required that network capacity is planned appropriately for the periodic
traffic generated from the different sensors. The periodic interval should also
be preserved in the network because any variations could provide false
indications that the equipment is misbehaving.</t>
        </section>
        <section anchor="ordering">
          <name>Ordering</name>
          <t>In real-time process control communications, out of order message processing
will lead to costly failures of operations.  Messages such as request and
reply, or a sequence of commands may be correlated therefore, both time
constraints and order must be preserved. The traffic is generated when software
triggers control-commands to field-devices. This may not always map into
asynchronous DetNet flows if observation interval is not known.</t>
          <t>The network should be capable of supporting sporadic on-demand short-term flows.
This does not imply instantaneous resource provisioning, instead it would be
more efficient if the provisioned resources could be shared for such
asynchronous traffic patterns.</t>
          <t>Another consideration with ordering is that both actuators and sensors are
low-resource devices.  They can not buffer multiple packets and execute them in
order while maintaining the latency bounds of each command execution.  This
means the network must pace packets that may arrive early.</t>
        </section>
        <section anchor="urgency">
          <name>Urgency</name>
          <t>Besides latency constrained and periodic messages, sensors also report failures
as fault notifications, such as pressure valve failure, abnormally high
humidity, etc. These messages must be delivered with utmost urgency and
immediately.</t>
        </section>
      </section>
      <section anchor="communication-patterns">
        <name>Communication Patterns</name>
        <t>Control systems follow a specific communication discipline. The field-devices
(sensors and actuators) are always controlled, i.e., interact with the system
through controllers in the following manner:-</t>
        <ul spacing="normal">
          <li>Sensor to controller: data emitted at periodic interval providing
status/health of the environment or equipment. The  traffic volume for this
communication is determined by the payload size of each  sensor data and the
interval. These are a kind of synchronous Detnet flows but with much higher time intervals; still the inter-packet gap should be minimum.</li>
          <li>Controller to/from actuator: the commands/instructions to write or read.
Actuators generally do not initiate a command unless requested by the
controller. Actuators will often execute a command, read the corresponding
result, and send that in response to the original write command.  The traffic
profile will be balanced in both directions due to requests/ response behavior. These are like asynchronous flows but without the observation interval constraint.</li>
        </ul>
      </section>
    </section>
    <section anchor="gaps">
      <name>Gap Analysis</name>
      <t>Today, most of the operations and control solutions are split approaches. This
means that the controller is on-premises close to the equipment, sensor data is
also collected on-site and then transmitted to the cloud for further
processing.</t>
      <t>To support delivering remote instructions to the machines over wide-area
networks using Deterministic Network data plane architecture
<xref target="DETNET-DP"/> and corresponding data plane DetNet over IP
<xref target="DETNET-IP"/> mechanisms apply as discussed in <xref target="detnet-rel"/>. Later in
<xref target="depend"/> additional asks from DetNet are covered.</t>
      <section anchor="detnet-rel">
        <name>Deterministic Networks Relevance</name>
        <ul empty="true">
          <li>
            <t>Note: This section's text and explanation on DetNet can be removed.</t>
          </li>
        </ul>
        <figure anchor="detnet-arch">
          <name>A Simple DetNet-Enabled IP Network, Ref. RFC8939</name>
          <sourcecode type="drawing"><![CDATA[
 DetNet IP       Relay                        Relay       DetNet IP
 End System      Node                         Node        End System

+----------+                                             +----------+
|   Appl.  |<------------ End-to-End Service ----------->|   Appl.  |
+----------+  ............                 ...........   +----------+
| Service  |<-: Service  :-- DetNet flow --: Service  :->| Service  |
+----------+  +----------+                 +----------+  +----------+
|Forwarding|  |Forwarding|                 |Forwarding|  |Forwarding|
+--------.-+  +-.------.-+                 +-.---.----+  +-------.--+
         : Link :       \      ,-----.      /     \   ,-----.   /
         +......+        +----[  Sub- ]----+       +-[  Sub- ]-+
                              [Network]              [Network]
                               `-----'                `-----'

         |<--------------------- DetNet IP --------------------->|
]]></sourcecode>
        </figure>
        <t><xref target="detnet-arch"/> is described in the DetNet IP dataplane <xref target="RFC8939"/> and illustrates a
DetNet-IP network. The DetNet-enabled end systems
originate traffic encapsulated with Detnet forwarding and service sub-layers;
otherwise some attached relay node will create the Detnet sub-layers based on
information received from the end system. The forwarding sub-layer is
responsible for resource allocation and explicit path functions, whereas
the service sublayer provides packet replications, sequence numbering, and other
functions. Within the Detnet nodes, resources are allocated a priori for a flow.</t>
        <t>The DetNet supports both asynchronous (by allocating resources for the
observation interval) and synchronous (with repeating schedules) flow behaviors
(Section 4.3.2 in <xref target="DETNET-DP"/>). The granularity of DetNet services
is at the flow level (6-tuple flow, including DSCP).</t>
        <t>Realistically, leveraging DetNets for Operations and Control (OCN) traffic
patterns <xref target="ocn-pattern"/> can be challenging for the reasons described next.</t>
      </section>
      <section anchor="depend">
        <name>DetNet related Considerations and Dependencies</name>
        <t>Per the Detnet architecture, a DetNet-aware node should express the network
requirements as part of forwarding sublayer or service-sublayer. The
<xref target="DETNET-IP"/> spec doesnot specify how sublayers are mapped in 6-tuple
flow.</t>
        <t>In case of operations &amp; control-application, a DetNet service consumer will
need to provide a service-level manifest to the DetNet service provider (DN-SP)
for each controller and field-device pair. The DN-SP is expected to allocate
resources and return a mapping of a DSCP (DetNEt Qos) for each pair.  This
could be become a scaling problem as the number of controller-device pairs
start to grow.</t>
        <t>Given that only DSCP is available, field-device pair can pose issues such as:</t>
        <ul spacing="normal">
          <li>How can application request the proper network-resource for each command?</li>
          <li>How can an application  receive periodic data from sensors?</li>
          <li>What are the ways to differentiate a less sensitive (periodic) updates from
urgent alarms.</li>
          <li>Or  how to differentiate data received from a sensor or actuator and
process them accordingly.</li>
        </ul>
        <t>These issues are described below in more detail.</t>
        <section anchor="app">
          <name>Operator vs Application view</name>
          <t>The DetNet data plane is designed with a network-operator-centric approach. In
order to use resources efficiently, there is an emphasis on aggregation of
several flows together. The operators in Industrial control networks are not
necessarily network experts; they will face complexities in presenting a
request to the DetNet forwarding engine. Especially, an application is
written to control a set of field-devices and monitor  a different set of
sensors and will need to learn the mappings for each controller-field-device
(ctrl-flddev) pair to the applicable DetNet flows.</t>
          <t>As the number of ctrl-flddev pairs grow, their variable traffic profiles
can become hard to manage.</t>
          <t>An OCN application is unaware of how DetNet services are provisioned. A common
UNI between the applications and DetNet-enabled network needs to be added to
the current framework to better map the expectations better.</t>
        </section>
        <section anchor="class">
          <name>Flow reservation and classification</name>
          <t>Inside the DetNet, flow identification is done using IP header and DSCP
information. These flow identifiers are then used by DetNet nodes to provide
the corresponding traffic treatment. Accordingly, resources are provisioned over
longer timescales, i.e., the model works for relatively predictable scenarios.
The problem is that the control loops in <xref target="c-loop"/> may be  short messages so that
one command is sent per packet, expecting a response from  the actuator in
another return packet. The transmission of the next set of commands is driven
programmably by the applications. This is how the softwarization of industrial
processes is happening now.</t>
          <t>Perhaps, it can be stated that the provisioning resources for flows does not necessarily
guarantee that the Detnet-specific resource contention at the instant will not occur.</t>
          <t>Moreover, for any cloud-based solution, controller may as well send commands to
the devices from different locations (different IP addresses), thus the scale of
provisioned flows can grow very fast.</t>
          <t>To utilize Detnet-specific resources, it is needed to embed specific
information in addition to DSCP, so that dynamic traffic patterns can be
scheduled deterministically.</t>
        </section>
        <section anchor="split">
          <name>Split Traffic flows</name>
          <t>One of the most constrained design elements in today's industrial control
systems is that data from the sensors is collected on-site and often aggregated
before transporting
to the cloud.  Historical reasons for this approach do not apply anymore.  Due
to growth in sensor data, it now requires a much larger on-site storage
infrastructure which is expensive.  Applications also expect real-time
streaming telemetry data.  Although latency constraints are not as strict as
for control loops, sensor data need to preserve periodicity (<xref target="ocn-intervals"/>),
and also requires DetNet service support.</t>
          <t>Leveraging DetNet could eliminate split traffic flows by collecting the
sensor data by the applications. This also allows  controllers to be run and
operated from the cloud platforms where much more powerful compute capabilities
and available.</t>
        </section>
        <section anchor="prov">
          <name>Provisioning for variety of Traffic flows</name>
          <t>Different operational scenarios have different constraints; even commands
within the same application will have different time requirements.</t>
          <ul spacing="normal">
            <li>Different types of latency bounds will be required between a controller and
an actuator pair based on the type of end-equipment and precision
requirements. Out-of-order message processing may lead to failures and shutdown
of operations.  Messages may also be correlated. Therefore, time constraints
may be applied on a single message or on a group of messages.</li>
            <li>Similarly, each sensor-controller pair may come with its own interval
requirement. Sensors emit data at regular interval but this type of
information may not always be time-constrained. The gaps between the period
can provide an indication to the controller about communication or other
problems.</li>
            <li>Additionally, some faults and alarm messages are urgent reports and must be marked and
transmitted accordingly.</li>
          </ul>
          <t>It is not clear if all these variations can be predictably resolved without any
additional information offered to the DetNet forwarding plane. For example, if
two independent OCN flowlets (that is, ordered group of packets that are related at
process control logic) with variable bounded latency are classified to the same
DetNet flow, they will receive the same treatment, regardless if one has the
shorter latency than the other and may end up behind a flowlet with longer
latency value. On the other hand, if an OCN flowlet have packets with different
latency values, they could end up in different DetNet flow and may not reach
destination in a specific order.</t>
        </section>
        <section anchor="sec">
          <name>Security</name>
          <t>Industry control networks also have split security boundaries. They have been
designed to be air-gapped or secure by separation. Current systems have strict
admission control, ingress and egress policies.</t>
          <t>From network layer security perspective, how DetNet-enabled network deals with
security falls in the <xref target="RFC9055"/>, the end-systems expect those mechanisms in
place. In particular if additional information is distributed for datapath
decisions, integrity protection as per Section  7.2 of <xref target="RFC9055"/>.</t>
          <t>The border gateways and firewalls will be more prone to errors related to
provisioning churns if the system is dynamic or continuously changing.</t>
          <t>The transport layer deals with the end-to-end encryption. It should evolve to
incorporate additional IoT-friendly(lightweight) protocols such as COAP, MQTT
and their encryption mechanisms.</t>
        </section>
      </section>
      <section anchor="summary-of-gaps">
        <name>Summary of Gaps</name>
        <ul spacing="normal">
          <li>Application view (<xref target="app"/>: An OCN application is unaware of how DetNet services are
provisioned. A common UNI between the applications and DetNet-enabled
network needs to be added to the current framework to better map the
expectations better.</li>
          <li>Security (<xref target="sec"/>): of process control related metadata to be used by network
must be secured.</li>
          <li>Traffic behavior (<xref target="prov"/> and <xref target="class"/>): Within the same DetNet flow, classified via
6-tuple, additional information/metadata must be supported so that dynamic
traffic patterns can be scheduled deterministically.</li>
          <li>Split traffic (<xref target="split"/>): Leveraging DetNet should eliminate split traffic
flows by direct collection of sensor data by the applications. This also
allows  controllers to be run and operated from the cloud platforms where much
more powerful compute capabilities are available.</li>
        </ul>
      </section>
    </section>
    <section anchor="approaches">
      <name>DetNet Potential Approach</name>
      <t>Remote process automation presents different types of traffic profiles and to
deal with them within the DetNet framework, we discuss few possibilities.</t>
      <t>The DetNet UNI will enable applications to convey specific requirements to
DetNet-aware Network. Note, that it is just an interface and blind to the
internal implementation of such networks.</t>
      <t>The DetNet architecture does not describe how DetNet-aware node can design DetNet sub-layers.
 But even from the view of an end-system the separation between
forwarding and service sublayer functions should be maintained. This means, the DSCP should not be
overloaded and DetNet-IP forwarding layer should be extended.</t>
      <section anchor="application-association-to-forwarding-sub-layer">
        <name>Application association to Forwarding sub-layer</name>
        <t>Applications should convey specific resource requirements to the DetNets they
connect to. There are two potential options: (a) The DetNet Relay-node performs
translation and binding to one of the DetNet services in the DetNet; or (b) or carry
the application defined data over DetNet as is and enable processing on transit nodes.</t>
      </section>
      <section anchor="encapsulation">
        <name>Encapsulation</name>
        <t>Note that the applications in this context are in the cloud, IP is expected
for the end-stations (MPLS DetNet will not apply). It is also reasonable to assume
that the data plane is IPv6 and extension headers are used for support in DetNet.</t>
        <t>The end-system network requirement is expressed as 'Flowlet or Packet Level QoS'.
Each packet carries its own unique QoS. The meta data to be transmitted to DetNet are:</t>
        <artwork><![CDATA[
  - Async traffic with latency-information.
  - Sync, periodic traffic
  - urgency of messages
  - Flowlet identification (for related packets).
]]></artwork>
        <t>This can be implemented using the HBH extension header option.</t>
      </section>
      <section anchor="operation-and-control-network-option-ocno">
        <name>Operation and Control Network Option (OCNO)</name>
        <t>The OCN Option (OCNO) is a hop-by-hop option that can
   be included in IPv6 for OCN traffic control extensions.</t>
        <figure anchor="ocn-detnet">
          <name>Explicit Traffic Control HBH Options</name>
          <sourcecode type="drawing"><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
                                   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                   |  Option Type  |  Opt Data Len |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | OCNF flags     |   OCN-TC-Flowlet nonce       |  sequence     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                (bounded latency spec)                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                (Delay variation spec)                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></sourcecode>
        </figure>
        <dl newline="true">
          <dt>Option Type:</dt>
          <dd>
            <t>8-bit identifier of the type of option.  The option identifier
   for the OCN Option (0x??) to be allocated by the IANA. First two bits
  will be 00 (skip over this option and continue processing the header.)</t>
          </dd>
          <dt>Option Length:</dt>
          <dd>
            <t>8-bit unsigned integer. Multiple of 8-octets.</t>
          </dd>
          <dt>OCN Function Flags:</dt>
          <dd>
            <t>Some flags require metadata, others dont.  So process flags in order, if the
flag is off,  following metadata will not be present.
</t>
            <table>
              <thead>
                <tr>
                  <th align="right">Flag</th>
                  <th align="left">Description</th>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="right">U</td>
                  <td align="left">send message immediately. its an alarm</td>
                </tr>
                <tr>
                  <td align="right">P</td>
                  <td align="left">periodic packet (intervals in ~ms)</td>
                </tr>
                <tr>
                  <td align="right">F</td>
                  <td align="left">part of flowlet. see Nonce and seq</td>
                </tr>
                <tr>
                  <td align="right">L</td>
                  <td align="left">bounded latency spec provided</td>
                </tr>
                <tr>
                  <td align="right">R</td>
                  <td align="left">Reliability with no packet loss tolerance</td>
                </tr>
                <tr>
                  <td align="right">V</td>
                  <td align="left">Delay variation with no packet loss tolerance</td>
                </tr>
              </tbody>
            </table>
          </dd>
          <dt>Flowlet nonce:</dt>
          <dd>
            <t>16-bit. identifies that a packet is associated to group of packets and shares fate.</t>
          </dd>
          <dt>Flowlet sequence:</dt>
          <dd>
            <t>8-bit. sequence to be used for ordering with in flowlets.</t>
          </dd>
          <dt>Bound Latency Spec:</dt>
          <dd>
            <t>32-bit. Encodings, to be defined.<br/>
16-bit (upper bound), 16-bit (lower-bound). This field will provide upper and lower
latency bounds describing the the latency bounds in milliseconds corresponding
to the packet.</t>
          </dd>
          <dt>Delay Variation Spec:</dt>
          <dd>
            <t>16-bit. for synchronous stream, delay variation tolerance in ms.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>See section on security above.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="DETNET-DP">
          <front>
            <title>Deterministic Networking Architecture</title>
            <author fullname="N. Finn" initials="N." surname="Finn">
              <organization/>
            </author>
            <author fullname="P. Thubert" initials="P." surname="Thubert">
              <organization/>
            </author>
            <author fullname="B. Varga" initials="B." surname="Varga">
              <organization/>
            </author>
            <author fullname="J. Farkas" initials="J." surname="Farkas">
              <organization/>
            </author>
            <date month="October" year="2019"/>
            <abstract>
              <t>This document provides the overall architecture for Deterministic Networking (DetNet), which provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency within a network domain.  Techniques used include 1) reserving data-plane resources for individual (or aggregated) DetNet flows in some or all of the intermediate nodes along the path of the flow, 2) providing explicit routes for DetNet flows that do not immediately change with the network topology, and 3) distributing data from DetNet flow packets over time and/or space to ensure delivery of each packet's data in spite of the loss of a path.  DetNet operates at the IP layer and delivers service over lower-layer technologies such as MPLS and Time- Sensitive Networking (TSN) as defined by IEEE 802.1.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8655"/>
          <seriesInfo name="DOI" value="10.17487/RFC8655"/>
        </reference>
        <reference anchor="DETNET-IP">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: IP</title>
            <author fullname="B. Varga" initials="B." role="editor" surname="Varga">
              <organization/>
            </author>
            <author fullname="J. Farkas" initials="J." surname="Farkas">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." surname="Berger">
              <organization/>
            </author>
            <author fullname="D. Fedyk" initials="D." surname="Fedyk">
              <organization/>
            </author>
            <author fullname="S. Bryant" initials="S." surname="Bryant">
              <organization/>
            </author>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery.  This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8939"/>
          <seriesInfo name="DOI" value="10.17487/RFC8939"/>
        </reference>
        <reference anchor="RFC8939">
          <front>
            <title>Deterministic Networking (DetNet) Data Plane: IP</title>
            <author fullname="B. Varga" initials="B." role="editor" surname="Varga">
              <organization/>
            </author>
            <author fullname="J. Farkas" initials="J." surname="Farkas">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." surname="Berger">
              <organization/>
            </author>
            <author fullname="D. Fedyk" initials="D." surname="Fedyk">
              <organization/>
            </author>
            <author fullname="S. Bryant" initials="S." surname="Bryant">
              <organization/>
            </author>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery.  This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8939"/>
          <seriesInfo name="DOI" value="10.17487/RFC8939"/>
        </reference>
        <reference anchor="RFC9055">
          <front>
            <title>Deterministic Networking (DetNet) Security Considerations</title>
            <author fullname="E. Grossman" initials="E." role="editor" surname="Grossman">
              <organization/>
            </author>
            <author fullname="T. Mizrahi" initials="T." surname="Mizrahi">
              <organization/>
            </author>
            <author fullname="A. Hacker" initials="A." surname="Hacker">
              <organization/>
            </author>
            <date month="June" year="2021"/>
            <abstract>
              <t>A DetNet (deterministic network) provides specific performance guarantees to its data flows, such as extremely low data loss rates and bounded latency (including bounded latency variation, i.e., "jitter"). As a result, securing a DetNet requires that in addition to the best practice security measures taken for any mission-critical network, additional security measures may be needed to secure the intended operation of these novel service properties.</t>
              <t>This document addresses DetNet-specific security considerations from the perspectives of both the DetNet system-level designer and component designer. System considerations include a taxonomy of relevant threats and attacks, and associations of threats versus use cases and service properties. Component-level considerations include ingress filtering and packet arrival-time violation detection.</t>
              <t>This document also addresses security considerations specific to the IP and MPLS data plane technologies, thereby complementing the Security Considerations sections of those documents.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9055"/>
          <seriesInfo name="DOI" value="10.17487/RFC9055"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="FACTORY">
          <front>
            <title>OCN Use Cases for Industry control Networks</title>
            <author fullname="Cedric Westphal" initials="C." surname="Westphal">
              <organization>Futurewei, USA</organization>
            </author>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei, USA</organization>
            </author>
            <author fullname="Kapal Dev" initials="K." surname="Dev">
              <organization>Munster Technological University</organization>
            </author>
            <author fullname="Luca Foschini" initials="L." surname="Foschini">
              <organization>University of Bologna</organization>
            </author>
            <date day="7" month="July" year="2022"/>
            <abstract>
              <t>   This document present industrial networking use cases for Operations
   and Control Networks (OCN).  It is a companion document to the OCN
   reference model and the OCN problem statement and requirements
   document.  This document compiles a list of potential use cases where
   new industrial networking protocols could be beneficial.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wmdf-ocn-use-cases-00"/>
        </reference>
        <reference anchor="VIRT-PLC">
          <front>
            <title>Virtualization of PLC in Industrial Networks - Problem Statement</title>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Lijun Dong" initials="L." surname="Dong">
              <organization>Futurewei</organization>
            </author>
            <date day="5" month="March" year="2022"/>
            <abstract>
              <t>   Conventional Programmable Logic Controllers (PLCs) impose several
   challenges on factory floors as their numbers and size on the factory
   floors/plants continues to grow.  Virtualized PLCs can help overcome
   many of those concerns.  They can improve the automation in Industry
   control networks by simplifying communication between higher-level
   applications and low-level factory floor machine operations.  Virtual
   PLCs provide an opportunity to integrate a diverse set of non-
   internet protocols supporting Industrial-IoT and IP connections to
   improve coordination between applications and field devices.  Besides
   automation, virtual PLCs also enhance programmability in industry
   process control systems by abstracting control functions from I/O
   modules.  However, to achieve desired outcome and benefits, both
   operational and application networks should evolve.

   This document introduces virtual PLC concept, describes the details
   and benefits of virtualized PLCs, then focuses on the problem
   statement and requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-km-iotops-iiot-frwk-02"/>
        </reference>
        <reference anchor="OCN-MODEL">
          <front>
            <title>Operations and Control Networks - Reference Model and Taxonomy</title>
            <author fullname="Kiran Makhijani" initials="K." surname="Makhijani">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Tooba Faisal" initials="T." surname="Faisal">
              <organization>King’s College London</organization>
            </author>
            <author fullname="Richard Li" initials="R." surname="Li">
              <organization>Futurewei</organization>
            </author>
            <date day="2" month="July" year="2022"/>
            <abstract>
              <t>   This text formulates a specialized network concept to support
   communication constraints in automated systems.  These specialized
   networks, formulated as Operations and Control networks (OCN), are
   significant to many application scenarios involving the control and
   monitoring of mechanical and digital devices.  The document defines
   the OCN reference model, describing the associated components,
   interfaces, and reference points.  The reference model is independent
   of any specific technology.  Standardized mechanisms will facilitate
   large-scale machine-to-machine communication and help with the
   integration between OCN and the Internet.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-km-intarea-ocn-00"/>
        </reference>
        <reference anchor="PTP-GRID">
          <front>
            <title>IEC/IEEE International Standard - Communication networks and systems for power utility automation – Part 9-3: Precision time protocol profile for power utility automation</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2016"/>
          </front>
          <seriesInfo name="IEEE" value="standard"/>
          <seriesInfo name="DOI" value="10.1109/ieeestd.2016.7479438"/>
        </reference>
        <reference anchor="NIST-OT">
          <front>
            <title>Risk management framework for information systems and organizations:: a system life cycle approach for security and privacy</title>
            <author>
              <organization/>
            </author>
            <date month="December" year="2018"/>
          </front>
          <seriesInfo name="National Institute of Standards and Technology" value="report"/>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-37r2"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAJFHD2QAA719+Zcbx5Hm7/lX5IrvDbufAJCiZB3ttT0tHlI/82izW9bO
s727BVQCKLNQBVcVugmRPX/7xBcReRXQor1vdzEjs1FHnnHHl4HpdGqK+bxz
N2e2XTTTqpmWbmjc0JuSvhcbd2bLrlgO03cbvTNdtt0Uzz5+bIZqqOmJn/qq
WdlnbnDdpmqqfqgW9rUbbtvuXW/pcXvRlLt+6Pb2zdZ1xVC1TW+LprRP22bo
2tqUxUDN2GVR984s6Muq7fZntmqWraH3XLHBl9JtHf1PMxhTbbszO3TU6JPH
j797/MQU9NCZ/eyioTHQID8z6HzVtbstXX3GA7c/4Otn5p3b083yzPqHp88w
Q0M90Zj+V1G3DQ1m73qzrc7sX4Z2MbF929Ewlj39td/gj78ZU+yGddudmakx
lj5V05/ZP87sq+Lduvp70VR8VZbwj1VXNKM7bbeiP3/h1TizL3bDrnO3Tu65
TVHVZ/YdXptVblj++wpXZot2Y6i/0N31zL4oqr6ok77sddvOi/R63tMfaa8e
9rT0de1Wzr5sm7Jt0l4HvD9bF/16UyX9Jt2+ndmX6fTeVot10ZX+IvV3z4Q6
eXBWV/++9PfHjT+d2Z9dP2zX2ayeupJezu/c38+Cn57d6tOjzgzoqtvQety4
M3rtxfnT6zdv/4OW7mL6bHa7KZdM37veTRdFT3Rg7Z8v3l5PL18+PeNHiBeq
dmi3/bSif6fL7vYdPfPm6evpqzfPnr+MDzUD6BKt0f3L68vpD28vnp3ZZ28u
Zl88nn3xxePvHl08f/786vrZ7MnjL76effPVN9999eW39PDri6vr6ZtrGpM+
/PXjJ98+wtXZ1eXs28ePp19+0z0hYphObTEnHikWRMFv3aYdHFgF7FYVtd12
7cL1vV0Ip9l/s21kwWpDt2+cJUpuN3xtYjvXt7tu4YxbLqtF5ZrFnoi+WLph
zyw7dwNxjaXXuqKuQ7vLrt3YYe2IU5bDLc2apMWyalxpiu22rhbcuq3bFW2L
tVct8Xo3SQb6yA80jgVtN25Bu1RR31VvNm0/1HtqZFHU1S+unBEHExGUNJyh
tbRddlG3u3I6p00rs7cntmkH2zb0dplKKdN4KUUjto1zJb043w00UxobPbgs
Fg5TvnWu4emRANq2dEvkF66QcCFZh/F17h+7qqMWaDRzDMYVHffYL7pqjvFe
r6vekmDdbUiKhRtoy8Tu6O1skDYMMizyTeVubbvEaKY6HHqr3223JKfMeM8x
0rjrMyGaTVWWtTPmAcRg15a7Ba/5hwcVvt4Zc90VZYVrREUJQWUrRjOoVo3M
WHu3hxtpbqthXTW2wD3f0bYuaAlINxR2UzQ7mjmxKNTIsm7bDkvlSM62nZvw
jLVbe1v0ZthviaBqWtrCLorNdtdPwWYToYzwKKZdDehoTyPEjm4wQHSLLQZF
0PsdzZHeMrRQbmZft7cTW/QWO7nlTfKLyM1t2qYaWh7m3JEoccQu4Dgaik6f
esIuGYyZqRFTZMIpVzQVP7bBLdZNC3ag3e93izU6vb56PeFuPEk1Zlt0NLxd
DWbBgq8KIgrqvXO1uymahaPdvDzknH7fD25DDN7ctDUxuO4+vUh7UDkiMhBP
mOOJjsBgE/S5pnxEI+9dw7p9Wbm6JJa+qagr3hxamM1m13jOTnjE6JLVrhMu
yV627v26mldgIHvr6trLCepqwKjmbl3cVK2+SlrI9Fu3qEgWWegOGqHrmC1I
VWBdS1eTGCfTgt4t/G5NMThm0Jbpa0Hk58yGaBiM6d67xQ47pXSJZoZq40iQ
k66x2h8kwT42WUPodXypyWQadQEpWpUghroq5rXjoffUSeci45HYOycKvUUr
v7iupRepTeyhoSZqMnpI1PKb22LxjhajbntSPvakIKpb2ZZGCUqi3ehPSdqA
mutKheCQypUJiK/XeUAF7Lpt27ucc4m3XKeyikgvjJIHoFOO0vGEdBv1+uFD
0HF3d0R5Qqd9mP+GqJosjX4jVt9qR/tFYs2FKYXNIjsTKz7Bc0aWrapZUDPB
0MvJIpCsGqqVX8Tr9a4XmYBB8WTyHSHjxsvHIhMGQVKTJmAOQCNbYt9mwDrt
yLYkeU0LbFxD2wi6D3y6p+mC6nVYKuTwCBFQbLjo+5YW3RMXDYDE2e2Mdl6f
6V0HNjClI1tXn1mtOrfid/CwrN3tugJLhvHre36p6YF2V5ekAFZE2a4zmB+J
xBbGc9DhfbZc6f4bbqen1XKy3DUkSLknY4sY7YRM4NUUW1We2n5Bq9FVLTX2
Y3vraPsmbOqQFCa2IcuZWJPkFKwCWPXEnC4qKupmRUwFsbQIrM07Q5QWt4ya
Jup3eGVPIh3ixOhgyPgguUqqaCECvWHNOGDTVJ+Smi1Z/6HDqu93vLdr4rSk
h94svE4nESILH7X3lDeclsKvEe92qqvb3UAEQeyIl1oW9ST8Bohv6nlTvAuG
wKYFRW6kRdykxSKCuqm6tkFTtBvzYBQwjWHYR40NvJmKmkjExP4zN5uQ0aOe
V0JbQkBHxbOopZF4xrUD+Q4BE8ZEX3a9ysNs3yC53PttB+KxkOm6ftMgs9Um
4omL3ghLitccmy6kM0j+4B2Y5EoesG1Ej9EDhXCXfaiMNz1izz60TJLt0ogZ
uCZzEYo/JbPv3aKAoQhT0t73WK/M1UGv0yQvLiekqrBuPbPesuro7UTIYqK0
EheXgY50R8ivLdjSISfiw4f/9uz59evn19Nnl797++Lpt1//5jckRSPl27Lq
F7u+lxFUZFyTNKGlQrswaZMVIfp8oXaF6gWZefrI5HBjJ0GMkPXg2Dl4vzfL
XbNQlxyUy32WpHZIrjtYAGKv2a9mX0DW6chPVR7SHg5elB7ubBGUEBwpPKcL
k6sf8yZTPxoViCEEqJ/TGamfOUlfOPVNeXfnRSF6idexX6zPdUFUQDFLUCvZ
NqvqFI5w73keB4xocopPeBBRgU3QI3VFUsn7Vc2IFhBQYbG7gN/kIMZoNqti
24MCMq5QxmtKWRylCVJTRBhsWmxp3mTQ0LxJdUbt1bf1jgdYErstvGXijXJM
3S9FkNUYS5gL7UI2uNgPq/oH9po9EtaF5EHESA71fR20JG3V9Sn51Gf20kt+
DNrbo7QJ3gwUnlZ5bII83q73Pexxm0hMe0LvkTlXrNzx1+3B66nAPeUV7sMo
Hvk24GUt2AcRoVDo2sHQbFbgSSKpFTdsEstfTWMvgWj/A3updMKfoBNiMhZ7
z9+Tl0Ialga8qHelM4k/5ZsJXDvfVXWJfmTGvADhJoked/AKK/+wcMUic/6i
TTYjtxtWwRntroYX7u6wlSE6dx48CIRFzuyraM/xeqtOU3t6OrRT/TPXNob0
xE7YPfNz0ja8s7I47qUKK/pFMn7HeKJ+jVnxswIlBUxu0ab6Bd/Wu43X9Fh+
iH1M0guVl227ZQL1F8jd3Irog7OFjsf+c/SmxCwzcHvBKP5BEndb4ntWlCqV
SljVVbMlR1Mtk6h2J9oMTRZxqF5vd9IMT6kQDj4R/S5uGflEp7wCnRg8EP67
AT3cFPWO1La5qqBKGtLJXccU2nlRULEwR2+unKjqwpThRjte9yZMlxeE1+wF
me4QrePFo9U7t0t/E89zB7p8hS5YWC+Rk5BDPCf4/HV9CkXNASN+mIx2nYw3
NsL6QXRLAG8UxfCECzYa6wze4otDNsucIDA2E4qPFQnhRceYB7L0mtZ3Pom8
36UhAZqQ8gPTith1ylqJPCK1M3jPvGehsyRliO5EK8OAyYy3aTAKWZvPd32U
OGW1IrVTHxh1PgxnMhuY1uxHZo9XyrcXQd2d/PjqgiQ37ex9oS+ZP3ZPjUad
7MwchgNiC2REFfveXjx6I9YQk4w6eSS0fQc0Jt/+w95I9KsQoUADC9MBM6UC
Q1c/bhlU1QN7vqC13m9kwq8uzu6bNfTY09dn96QlAjHRYxz7zXTaS8QyQwaD
Gro+u0cpci/JzSz1MR7B8QGQ/v0+tXGOkf6ViqkPDxIzyRjeT6XCERfYlPgD
UQnV00LLhrhJuuJeESaKOnBL1aSBwtTlge1WLZpp0S3WZLnNHeIgPbloveHQ
k0rYh2IXskG8aUsne+ztU6byDUlIafFp3fYwPkW8miPjAb0wx4SZnQRJqiGa
pmepyppJ14EaZLl0/2Yzk50QRdCb8GaDBd5DeqScyOLbkNGNBQHfZvrwBGNo
aCWeowXak1PEiOaIyA9rRGwypqbJMBWbe3g3BLxJEkWRglGK2hTxj7u94+B9
EqeziQ8A318MKveeDSFuEKwbrKzMiCYKs4jetkRfHLuFBC8rUYJEYMSwCPP1
1eAjhzymg4Uz49n6HdWQP5y0BfbcK9SM8FiFxn5UJFFjQapHQU2GO1nqu0gD
YYY0cnHuSo4QSbNo0ajMa2BFNz0HIEoxoDXOh6VqXB0CERL8Ha3Uf+JTdsUt
yIITVvh8Pk3+T67+T2s/2mcY0vmWrJOPM/rY5PP8PUx4ISrom37KqRV5+WzU
pFzKPypZwgvy+Rjun8mdm4Om4hc/Vn6PTK2StvSc2/io377nbxcHGjZ5L246
3su+JfQQFuXewWCSJ8HuGNyqE4Mpn2Cc38d4Y9xe2IQzfgPu6v/gWfGf//Ex
rAxdYVKWm/znxymPRAXO9NgUDvrjVz5mAw3jjH+MxmsP/kiHpS8e/PEilYZh
F+5tkcnVfDizD7zwtpzx/91nL4K8qI7qIq+4PiMF9LNGb4Iwgcir1B04ZBPm
fb+FeFytbC8fEllFrHaYwrQa9+eYHJnKNUeaadILjneSu5QGJSFeRCodpnzQ
0EiIsJRYuYYVIwJiYsKKHtHIpQgPcSURQIpedggJ3JJw5JxVYo/2pqprrCO3
zD54425VZd4rO9IdPBQj8SOElEgUuXyh60w98mWI+MNXF1/gf57wn1/6VzXX
PHKW/uWB2b/Sf5MpPpBwjw7uUxN/sVjAqf3bkdfp8xeltr8du2n/N7f98PjA
wLm/vmTJHx/zJw645kgrBxz4CU78lXYjM3qy8MxITEc0tqI9fMrcJPnvT3Dl
m0YcXskuknYcqpvC+4pJTgv0nQXubWLOZGFl4WT1DYKh9cgzR7AeeiTZEGbk
5BfaTBJAbGNqMmxCxsjcVYOw0BGeOfn5/PWpj1b31mHAxL+cfSBLaW8uxoZv
KmgmIfHqzZdEiHz4oKiQu7sJRLshY5ZmVCuMhu57SAge2La3NMJVV6WJdnrG
Qz7wjBsWM5F5jDVob417j4h3ZmsHU0Y2cs8uYVew2ByNgI2XNbVVAs/SFTTP
3YK95FukzrFkPmgoTtFTUcGuTO3Yib3S/UF7537XjHk6Cn7A9Obczqdf1ogm
yRrjY44I2HCcskZ+p+sqdpFlyCLKWRlIbN770Klfh0zDhgU99VS2mgj1GVw4
pYOPNnM0nkS+T1MnIBL3vuqROxGKXdIs2lsNtZFIP4O7eJ4mfIMbm5JvMuUi
n3Ly5rsGmbyDxKRa4Uz4xH3ECQPMXc32dc5nU0QDwA1mn0Ip3mRpFYep0MxD
ti/Qc8gsMyPHROokpJk5Wk2q8O8Vo3luCmJpen5CsqMpidOGtUQwfYdCcoiE
CBSIE4uHEzaABA0xTRryvcidEC0AqcKRG3JK/drR+BeuQigkJvole58AXhJD
Spbap7zWyNQYUro+26bxxSQ6G0EN3g0MoI0j7RvaC8Q4nRMchE4ozWNxCOud
22e7SZ4vlgmUMbV/vLwg05PojraygF+EhdtxYHa5q/38jAARODF1nchMlcvV
ljaLDaxCHJ8yC9FhowWxJCuqhGndBqAXktEtcqZssERwltAuR6A2xT7LptJy
qMw3Rb9vFmty3ttdz9FG5rUdud6e8I6t3CxIAzTdOcYi7UgvkUjeYCFWvPSr
otPwdu0tOU2jL1w3EIlEpp8kLt0E6Y5fyLJij7PmBF4KQPNyijSVgzCoXYHM
VBNHiF4ghAYk9fgOeSlM5oa4S71RB1dZEFXTT7F7BtlKnjMxysBmbsgipGT8
W83gZqYvCTbAkrztaA4THKNE7WtSjxh27LFR1A7+Vvo03vadkk3MAfOif+ez
vBq7rlT9IjSDzT4IWtOqQ4lcq0C/9EmkDw+AldScEtkVyEvqoASO1YrqtgLR
UlDAGLBUiISGWmBlj4iOD1LBqvYmN7ECZBXAiElyL2S00nDlKCJqchSSisoz
TOpBFt/GlBZTcNidpDijY0DGCMK8W7X+mSFoCTmEwJlrWrVbBAkKz+KeX4Qk
oP0UfETLn8pA5S0IQkFp+fdPPI/QldKdcl7YVJuNK4EyqYMMujeHINHmXoVY
tteJYklQP7XAKWlOOw6RF0Nm/0WeyFhClakk88WwUZqGBM6jIC+YRDkGpfuQ
WWXoAdqkBmROTc4oO2OKqGKYHhbVeBQfp5PLG6/6BPXyntTE4LbEcUPEFK7c
MHjwRUjfcGyajIMiwYCx88h8IuDOSZp2KvKB0rN0w6cbQ2BrjkisK8UP9QJU
iEM7ToBTSVZmnJD5qakr8mmFFyKuK1+9oDuJbSBL5pjWsFhr3sckVofuZsDK
YasZdyB7aQVv3/s4GI12V4dkP5kpRBI7xlLNzHOy2cLUqjyXROLmHaLKW0Dx
kKfD2It93RZkX1S/uBGNTwynsyaqrRl0h1hdWcIwkgwYj7JdDpwSGURFIoqH
VPOaQahsf9CaXTSafx9DfCbAhqrDTkNaMQaxYMjCBnoFXo4EdKUt9Y2DAwOo
lmV/A3TSTRhTymI6yeeotZVbP8KPKVjYZ+mzDRcz3rp0ZQOwAlib9rYxR3qI
hB+Rb9JUIA3QmM4SOGo/w5kIQ3upxgNkhIh3yaYWdU8i0St5tjPYvCiA51ix
GxkelPUYBEekaHvaYFgGDLytb5EVmjvDwMswfOAZf+qZqSe5BO8imEwWTYzc
wSknkewrTWrPKH4SIfUEGOvzSNh5jhAVAtiSQboyxIkQ20mT/tQc077KPkw8
Q9d5XXTT1sDspDGioI+rPvP51tVqrYb0NllyZCCx6doTRkoL2kLx7dW3F440
adZrTFVg5qhBaYcFRM9opEbwTl1LHp1oEZ/j9OMIjlucR7D4In0HczKdQqAB
Nc558LDQmXi7G3VtEgqdKyiLPHbxRERxLPhtH4eQs0FqZUeXcZQIAFa0F3VF
gljo+Q1OCHDQ7KJJAoLjLH+WwIS5ueP9lvMFar8muE/DMgi6QHKSfDRhWVQ1
aU0WG0mu2tpX3v71LlqiBgyZyiB3xsL3uK5hkcCv4Jq5qveaNyPRZPMWpiHN
yKRCgNEUMnRFPYfll+3yG0xLFveYjZeQOh66arUC841Q1SxijiEGR9y9Kbac
AMr9CfXcBOpa0TrNMawkbQzSqXpuCNq1UaRZQMIKVWE9iKzh64ErRYJydsvD
RVucZdtImITuTSEapNuZB3c66QZQ6j3HI4qG/t+J2yNetQ1IWc4c4SHsOcm+
Wx2HYQHij8sMmJNauQFhG130hR+8hG68Z7jO12hs2MLlacRB8ShEWTBWOK0S
eAiqM0kcTXUyCI2WYBqmF3YQVCHgWzYbdmByIp56qLa1C0qQYU1iwmKWSLYY
oTP1m0F+ekiBYXGqoNgG6oNs8zZH4gEzCZmNK5o+kw5Mv9tiEcfAcwStIZB0
AxXZ1XvxTx7Yn+BwLvbGfO96RgceqEhX+oSoyCvvm07iIkHcigMbWNpwnBAG
EC1PCIkkQUSO28BkJvq9cf49cvDmDdQfbH8IfLPebaqSoe4cERRbMfjHnls1
cuJx5LuBHd6dTI6lRuIEqG/2NINgeA/tMJSn5l2RB1zim8Ac0qYD2sGiImN1
c3LUIz4V8KgwflDcZHOKl3voyMpgjPeOU12v6uEgPDdFnEPMjwQHQq+ciR3i
NC1bDEeUkegRCG6r6d9Ha9IFYJ+lnuyKgMMMUcJrMNbvojCrfgTVqfpwdktU
vwTDEmPXc0BqSPioufGj9WTBa2rJZy9ZyOVStAlSNJieG9AiqAw+HDsu3h77
LU260lgWX5xqiG5FQjqKVLbPd5sUMSf+4CNW/367z1LHoX+UR3LJByZ3zElo
sihntOAhNOydFxyLk1hHBRS9ePZeKOyaWlB1rCLDOpo01BRbTHwBL5hCUxMe
waFvbMSXmXjRWHo8aXTJ1Iom62/FSCSZk7arVls4/dC1Swg/Hgo7XDVcUDZ0
WBYHTC6Rx47b9gHcR4n3qV52uvns8GWqId/xdicm0FElGu0B2s8PZ2cYPBH0
nQnnOEKmpvZ0jdAmbAGJNKgL6D1AVriIHahnhE1JATb2hAwI1lLVwLHJXo9C
hpBJQinY1fSrmLpqKE6jrX86o7E/CmMHFOoHotlz2pR9XyFawzhqMhLasiCp
yoJSebrNcV0hVqhYafWESNQNCa56lmsiNTLTrACcXhohyRvAUI+DUiYZg1cI
jfetzyazCc9xTc/6ObAkw5AI/rHDuppof8Iqip6jqgs5GqhngHOeTAB7/Sih
Fs957e4/yJ+cZbBIPlbATpOCu+dcg653Go9KGlAbkIdxcZk0cSFNfPfld9RE
GhXZwkIreo+H9xlyLUlAZjGA9C+LgZM2BjdAuBhHGU6xIuopboz2z46ggN4l
RXZPCYO3/rQlEVvSozG/t69bVC5gc1JPSjwEyuv9oJYS5quI5nBOTKMO2Kgb
7jnP7OtTF5eaD34LBOWxzPb4ZnjR2OfUueAB5dbrllyo+z7pzfiiMZ9Pw+fz
e18+9klfNMh2n9P2kcz8+N+nyQd9AUPOXeq5lOT279MXR2OZJZ+D3vN7o7H4
jjCWs/jtjIaTOCY0juzm79MXR2P51VW6/1Hz8UXb3UouBCiE7Nvoc/+jcSwz
6WCWfDsYy4zv5GOZpTgue2ZfVs27gJf6q/wT4Rn0eRTuHEVtfC4rH7rnfv5i
7dVuDgBHskqfJ5eP4jqST4B43HP5E697EMg9lxM4TU6ikVYjUx69//uPCT5D
RUQK0Ti3V3Ayw3nD5xqMpPZe+3jkW7ecWZV+QGgE6aaoWbYttZSAt5HjsCBd
RbiSNI0ylM9MBlwRCVI9tEuS1ntYaUI1REmh9dVfMGoDDTFoQE4I6dxdHQ+6
ens0kKaaVsI0Pe0yjuF3/W8Nu7G3QBLwsQDyUqB1SwGKk0lYqh21IM0kTqZv
PLYSwmAmDS5qIjkJVcVZqCcThxcak8oNmhipxbIP3rEeqfV4C8hzBOngmK8j
EG0iAVaUJuDsSJi0dBAOqqnJjXhP4j/6iE+z28yd4FM5esMKP/Qxsz/H0+q6
IFisfpJEF8QH82hZ1Fsge7LiKelJZIml+Oy5WA+9BgxSM/MEZz118mxU+C40
UmiOWZwSnM+aYeKgCTtpp8dW78i8PxU5G077m5MrRdl9Nfty9kS0+zHDQk5z
WTIOG0ScNWA6OgFrcFhU7DbuRg5WnHw9HXZgQlyb6GEsNniunl7iQONbcghZ
9Uv8OcHe+FO3fIzw+GEBPqR4eCD6w4c0P3rnlT9ZNmQJCh7SB19BQewiBC5H
8ipYJnJuUnjuaRoF6vVQolRHWsA4h53CBpAxl5JO9TST2m5EaJ7vi1tBJZXO
e4P+XG8SizEZCqKIR35yvhKq5yQfb8fUX+Otu8/aQzCCQ3LwCiUysedT3P5t
Ie8NmYIi/3Q3jdL1RRMOmSZm/7+F4GWSJovzDswKX4n8n04SrPBdUhBcEaYi
lEQ+YLWMhw/GjYVD+ifPXk+vLk8NdljjXsGLGFfGoMWsOpXFeIvzm0m2wPO1
SdidMx+0kw1Xudhu5RQSZkcUTb3TsJ4P9k8t2M0PQboRHydEI7WaCc0TtXUE
dEvCcMNoorWXTfnxhnTcPYpndbweq4634weSxI24T1x3h0cEtrwpqho6ZnI4
e2YOzmnyMf40S2/tFOUHJBuSHMf1cXSNuOLEsj+DHoR4svrsvf8hby1v0GuR
YxAajXzJ+z97KB+65rAXH9fV3IiGNDiQEfEBJ77RU7vblqyQuVoMLA9FyhQk
1HC+G1286SxzwEHDPKRc3RXe32wjGoTjhGjb5zo4YlsskCtDtlSLWsT11po+
Kn3kmA5xGge4yRhBKTDNqfizYDc92+h+9bjwxocHtKB3maZJfD8xY6RskNbI
8DvmT4BNFzRRlPvyTjlOapus0lNkghB4h8jmvAiTWWPdZrsuenbWQ40NPX/g
0QcSTBnaFUcthPn8IMbQ9qMnCElWBZhXRVTug9ZgXFKsDDnYa1K9YDEDK/C9
RFCofU3osr1kAi1nQiWRrVLtY2af66n6muulZORLTI1IFaJh6VE5X10nB8Gk
J+iyg4jytEkjvTwHLxdR2arRkAJLnd4eEXHTtDdzshi6erqsS/p+KuyuE9Xx
z2uXJYeQ9DiQPrENkTssbnjfK4UxMg7Q508kMCfFP1TGcaU6Ph+A49WcWRlX
BuAzqI2oRC0lMi6xoflon+GZMW50Q4tpfnp9keGQ8rMNoXrAGI+QxcuKUo7/
C7B613UCay42TqpHtb4MG1JsbOimiBu5p5z6Ajwsqb+kwE9d9H3EdX54wBfu
oER7D/r2hQEyoEMS5gaATuJF5EqsXVGqToOgT81yH84cASbCCdwm1BbRNWar
NtG+5hDa5PcXpSEHCdKfR6k2tojTTByiPQYQN42QQ9/BhpY0BVM0HzyMtSvZ
5CI5y/hIR7J7kJIGoSyO1AVSfVkdhgwVzsEWrQLL7nxKV+EqIf3Tt/y6aZuI
yxGEGec01IOY6H4LMCEEkFkPZOh7BjNp4lANBUXG+Pg1Qo5ccsSHTAUvJdIi
5Hux30i1NfHszJzWQ/MbeU0Nj8ZnxbUOBQE9bD0/2B8P8+MNmHaNnhCaseVK
l/oUqYPMjUc3ZEnWQydFZHvI8SZS2oTCVLEhBQklAGs1Hrg2SCOcM2j6hPPE
KhGBClkQi9J4X5GabDmuzg5Xs8/qEfqgc4prkSxmz4XQJA+RpNiZ7r2o5r1N
kEWtlygn8SLxoaKkyL8CMe9EfDKNQ55nRZ94eRhbSRLUMkp7WfTjVMH1WIIB
bR8S62k9v2rrpEKSGJXERjDgJf+1kDg3DAAToCbJu6MDWRHlAonOIDMmYTmn
0afFAU01eLBAzMB72cF0zTZkLKGIWlc44SqWGLXFoVufADNcBKwf2laJDMt0
hCpSgcqIGk2/YxwkzpY7MpR+5oR4tEio+cYBrsbAwUVbdP2BH8tCMpfOvVo1
7NMih1CkYHTv29PKd/c4xYfCMk+oXJNFNVSoqHkvFwgPVh5wzvjQDUxE/2QW
hwEcT6PueBIKYeIlW6gxdoDd1bJfPkJQ5kUw+ZyepvivOGHjkchCyB8ecBpH
DzapLJMqT0neXwxP62p1YRFOQdboYW8PS7KYUPdDZfpRLD2fbDya1ZGcZKzu
ZuZMsiJ1Fa1i0kwPeWU/0mTbjqGsPhrgM83BGPaZU82JNHuY5/Tusx1XEgQ7
k1VNU0sSULx/DVsCTDogR04WE7VAFfpxo3dSRIcninA+RR1SMhFu0N95ZtiA
MkUrRYyV1m6WQnpYcxzFUuTceY3s5Wp9DCTpTWuIRuzJAn+ZZVJ0h1VqnmKL
PrvgnDJM3YmEYSKO8e50ojXz+jYuysiP1/gY0d3LcShIpZzDQRoOjUoWcciI
cr4Px0cFDmPSAd+vPYXNBU+dISPEOux2bMWZkFWNhzE4YUgCaZDCMoL75I1m
H47PqekJlC0y5WlGV9bDu+dqPl6mChY7kMDvxxwImUsM+CwopBCHARjQ20ty
QiNqrWTff8sVk4IONEl9Tjk0mJjorH1HTQWAdag4J4GDOKJQpWGES/KZ+4Cf
DHVJRiEbdqeLJj2rQ45HisrMarElxShYXSq4lFvJS+O92Q3Tdjm9D27IloJH
GwaYoYDbdkMJLDDavBd3yIYGyCrDEeZldrF6yW5wg2qn8srLFAPS2g8SMQdc
5mrrXGlBO4W8xvJfEY/UwGhNUmBrcjheFhFdsYfGUQFFOIfY8njJ4mmjXwUi
RxiyLw6Idn4VkmwPIckccSZTNHPsRL5wexy38rHCxkaU6uE5GlvMAdrIYUO+
GIYP1sCV0INyIX2N5eOMCaPQFH6FYFH0HiA2NYwk6DV18RVTtim6dwJ+MzaD
G+QRoYtgUXEFa+AZ9RRc7zJ8rpjk0Snas71Q32hgp+U62nuTZODTdW+ZJ8v7
ox0cLppZPlAkBdRIiy35rFbyWwDsu0MC1YjPn2ipyImAIqn5QJUZelBK4Eos
vTismM3FNE6FEENQQY9xxFK9QA+oqRbnAUFlkjDGJAkB+dBiEGjBJJvowTiO
FwIU2yBQIadp2EXEcSrtlyagBZnYKOYdLvac66KZzt0acLHCr4lMQjzecFyA
T1iQzEnbWTNequLam8maioxNz0BEgZu31+tUVTPKcKomkc9pht0PG3TWQSyg
qtpQNdGEjPBE3stg/aHeihxN6N2CYxbHqxupHuXxi3bu/au8lVBk4kvs5aE5
jrKnJc0h+KpuupKUQxtqvTCkHwdpJL7xVAM02RFEsVuI+L1/raND3mnFiRVO
KMqf2xZpRZaYL6DLfUxIMilh2EmR1EkSlToIJcXiwia8uyQeDtBKSRF/9xgJ
tYnPlPrCod6MkxpECQgH9chr8uW4bmZSOwA0c5zHuRIQVmLO9baXavoge2pi
QQ6t9sEz7NpB84Baf9SnBe03sydg43Toms2ci9KEkc0iXDIrHX2p66jaxQDq
wFmDVsjrgwwgbzsLJSzWO/gkCuX2dWVihWQ1RatmR94pzrRrbRMdUTDxdQeT
as9+sYd2ChYh9un223BQz+fepGw7japqSDQD0T64dJEv2uvpkui3Kev9SV2t
1qSW8L+nvIItWZ3xqMHTN+fkf7360/W1r2JUdUm/aYVITjVe7cj8koLqP5DO
Ix0+PYzxn3CF0Ls7rhf3fxQ+NaLqDiOo9l+MoJpfi6DafzKCao5HUGG9eA6i
KUPg3J2eHSsS6SmJnJyCjREZh49t+gwqTCpVxyJMgI+dBlM6nLSkzticFgTH
hw8SoEXfP4+M4kzXJPropirQm2ZJJ/ew6KMw3jCs8EMGI5cdrd3jtdtf9dqx
iJl3hJVkbx3zOXStPBMc960wjOBe+YKtWZGef97JQluf9LPsv+Jn8QZ/0tUS
oEbqavm5X4aCvufe3ed0mq/FG37j5cgh6nA6sDz0d8YZEa2SxHXog2DapL+I
4OnK8wzXwPbliJckAqS6iM4oB5aAg1nu+mqvKQdLXuqGtO7RKuEYVQZKeO1h
SsBaThSpzTbq33f96KdaMCtU7vesL4h6pnkYkOgghKGzwGA+/hQkEUPIPjOa
qt4ENwFW0ABTwNd4wBIxwfdkDrN7e/ArLuNi5y6xLkKJnfuRVaJiYlWsBM2v
h3HCT88wplkUPufj9VE5J2wQu8ZBBT0gE4FiSd9qkYQu3HupVa11N9NC2fpT
COoFvTgCvTImiyFpq4fEEYKuGZUkVMqG8t7ECo7q2EqOiRyGWCe7ZaXXn9mT
4jStJMJA2ilvpK/La1iN1zFtNq8af/I7+QWJsW7L+Oe3MBVO5qcCb+86KRiW
Kkv/+ycsrpJiYVwAV61E4aIkGtAqXrzSdJks//MAy0OMwYBfYoZjHMVnp9hX
Ppeaa1G2TZBMSAAoIWrPhOrV5Mmry5dXfrghHcJxyVNfd0ADbIhl+hItUmLe
hJHl4ICLy5uvFWw3INZIU5Xsovq3viSvh76H399QFk5YyRsGabxcJqU1dmiJ
H75QP4eavBR83kvG+PypvXqoB9sVtxcKF2logvz3f+wcHpQIAVSpTXT/CNEf
QednHnBKhhXQckE6i68mTtU0zaGG56/o8UnEpiQ6kW/7A2JJFCbc8xMd5XJP
QpIzngQ/9b9/EQ7Iq/BE1Yven+378fsfDzZJ+Uvo8VeL2tJd6Z+sxzenvCJY
RNiS2R3Jnazb7XS+n9I/2oPVilEc98IQpbR6KcX3iYR8xX+/tt5QCyP2BTmz
mnqPj4CHvzhy7cmRa19qC1/Q3S/tV/Y39mv7jf3WfvevXPsUkhmfg6J6nyyy
d+Tz0fp1vkZkTL9LicCXpKa42t0ne/pnRvIR+/CCjLZi1fuu+Sdkrp9OPVE2
LSCwYWQBFMvf/y+OZPQ5GQd1oHVO71+z/4cjecb45xBf+/8zkghaR3pE8OYe
s/7cg529c+IZGHwvpMOVBOntmx453t999pi+Z2QlxeKt/XY6r4YE/eF1p4+V
q9SwisASLzI8zSa/KqBUPjx+/4c/nHqHL8Ce1eS/OH99PrMv5LdayATAb45R
Qz4c8PixPenfVVtfbwg4sW0EyIhzn+lcNCpCbsbiSkdBvLIa1jpRmeeu0RgS
BzYALHvlz1HTXL+dtqRSNTmB6fhiqiShiUOkpSuO9DLHqPYKnuVEAnYMwRnk
xxS9MyAvVPqriBONXxhc5lNry+XEpudqve8XdLevE8BHBpUZMSpUI2brV+Z8
P0miniZ/zj4/elAiPVPhX6D/fsI/DIDwWYX0eDNrXC6DgXB3+t4l/gnaUPX0
SUjzYSn+c9Of5gOk/17wex69LDJoRgMgb4MFkZjY/8jeeYl/jsmL+JsPeSdv
8c/bpLYlq/cmK8mX1OpL3vwzl38eCYRPvR3YWKhAuZgJTC60PjERbNZQxhd8
nIli/BIAfb74GgQ9i7zo4+d+FPlvnkn6OY+3hzqVOD8/wNn1HXkhr319K10F
0Z8EUJaMa9UqB5IeakLQn1r8nsviv9Q9uaI90Ta/fCKNkmXcchW7iTarVvfs
r3+VVZeJ2hMyKkkc8C6fTsLVGs78VK6qKyXnXplxfOZH3sV8+XlpeJRoHP3u
13BYIgF4W2q16h0JIdRxyg4uc5vq+4QiR0Ipfw6UkixA2EE2mZOTGZKaR5Wl
nMoiRWEgnMN7wLJ0dOaADMTvn+FeiI+N7185F349CvrMP1egwj3HPM4XoXwW
O3Xyy6SowmX+C4dxwX2ZegAA

-->

</rfc>
