<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-kwbdgrr-tsvwg-net-collab-rqmts-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Network Collaboration Requirements">Requirements for Network Collaboration Signaling</title>
    <seriesInfo name="Internet-Draft" value="draft-kwbdgrr-tsvwg-net-collab-rqmts-01"/>
    <author initials="J." surname="Kaippallimalil" fullname="John Kaippallimalil">
      <organization>Futurewei</organization>
      <address>
        <email>john.kaippallimalil@futurewei.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco</organization>
      <address>
        <email>sgundave@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Rajagopalan" fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>Sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Dawkins" fullname="Spencer Dawkins">
      <organization>Tencent America LLC</organization>
      <address>
        <email>spencerdawkins.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="07"/>
    <area>Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>Media</keyword>
    <keyword>Low Latency</keyword>
    <keyword>Wireless Links</keyword>
    <keyword>Bandwidth constraints</keyword>
    <keyword>Policy</keyword>
    <keyword>Operational Considerations</keyword>
    <abstract>
      <?line 100?>

<t>Wireless networks (e.g., cellular or WLAN) experience significant but transient variations in link quality and have policy constraints (e.g., bandwidth) that affect user experience.
Collaborative signaling (e.g., host-to-network and server-to-network) can improve the user experience by informing the network about the nature and relative importance of packets (frames, streams, etc.) without having to disclose the content of the packets. Moreover, the collaborative signalling may be enabled so that hosts are aware of the network's treatment of incoming packets. Also, host-to-network collaboration can be put in place without revealing the identity of the remote servers. This collaboration allows for differentiated services at the network (e.g., packet discard preference), the sender (e.g., adaptive transmission), or through cooperation of server / host and the network.</t>
      <t>This document lists some use cases that illustrate the need for a mechanism to share metadata and outlines requirements for both host-to-network (and vice versa) and server-to-network (and vice versa). The document focuses on intra-flow or flows bound to the same user.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-kwbdgrr-tsvwg-net-collab-rqmts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        TSVWG Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 107?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Wireless networks inherently experience large variations in link quality due to several factors.
These include the change in wireless channel conditions, interference between proximate cells and channels or because of the end user movement.
These variations in link quality can be in the order of a millisecond or less <xref target="_5G-Lumos"/> while congestion control takes several tens of milliseconds (more than one round-trip time (RTT)) to estimate data rate.
End-to-end congestion control algorithms are far from optimal when the link quality is highly variable in sub-RTT timeframes and the application demands both low latency and high bandwidth (e.g., <xref section="2.1" sectionFormat="of" target="RFC6077"/>).</t>
      <t>It is also not practical to convey sub-RTT link changes using an end-to-end feedback signal.
As a consequence, applications settling for a lower throughput when latency is prioritized or achieving higher throughput at the expense of much higher delays.</t>
      <t>With not fully encrypted packets, networks may use some heuristics to build an "implicit signal" derived from the contents of a packet to prioritize or otherwise shape flows.
Implicit signals are not desirable as they lead to ossification of protocols as result of introducing unintended dependencies <xref target="RFC9419"/>.
When packet contents are encrypted, the approach of using implicit signals is no longer viable.</t>
      <t>Bandwidth constraints exist most predominantly at the access network (e.g., radio access networks).
Users who are serviced via these networks use hosts which run various application clients; each having different connectivity needs for an optimal user experience.
These needs are not frozen but change over time depending on the application and even depending on how an application is used (e.g., user's preferences).
An explicit signal to the host can help to manage the use of available bandwidth better and better share it with requesting applications.</t>
      <t>Other applications like interactive media can demand both high throughput and low latency and, in some cases, carry different media streams (e.g., audio and video) in a single transport connection (e.g., WebRTC <xref target="RFC8825"/>).
There may be preferences that an application may wish to convey, such as a higher priority for audio over video (or the opposite) in congested networks.
With RTP <xref target="RFC3550"/>, the type of media could be examined and used as an implicit signal for determining relative priority. However, <xref target="RFC9335"/> defines a new mechanism that completely encrypts RTP header extensions and Contributing sources (CSRCs). Furthermore, a full encrypted transport (e.g., QUIC <xref target="RFC9000"/>) does not expose any media header information that on-path network elements can use for forwarding.</t>
      <t>Also, traffic patterns in some emerging applications can vary significantly during the session. For example, live media or AI-generated content can have significant dynamic variations and potentially aperiodic frames.
Information gleaned from unencrypted media packets and headers that wireless networks used in the past to optimize traffic shaping and scheduling are not exposed in encrypted communications.</t>
      <figure anchor="Figure-e2e">
        <artwork><![CDATA[
                     |
       3GPP/mobile network
+--------------------|----------------------+
|+-- ---+            |   +-----+    +-----+ |
||client+-----------(B)--+radio+----+ UPF | |
|+------+            |   +-----+    +--+--+ |
+--------------------|-----------------|----+
                     |                 |
       Wireless home/ISP network       |
+--------------------|-----------+     |    |          |
|+--- --+    +----+  |  +------+ | +---+--+ | +------+ | +------+
||client+-(B)+WLAN+-(B)-+router+---+router+---+router+---+server|
|+------+    +----+  |  +------+ | +------+ | +------+ | +------+
+--------------------|-----------+          |          |
                     |                      |          |
                     |                      | Transit  |  Content
 User device/Network |    MNO/ISP Network   | Network  |  Network
]]></artwork>
      </figure>
      <t><xref target="Figure-e2e"/> shows where such bandwidth and performance constraints usually exist with a "B" (for Bottleneck) in 3GPP/mobile networks and WLAN/ISP networks.
When a bottleneck exists temporarily, the network has no choice but to discard or delay packets -- which can harm certain flows and, thus, lead to suboptimal perceived experience.
In this document, this is termed 'reactive policy'.</t>
      <t>A network attachment represents the communication link between hosts (client) and network (router) over which a connection policy (including QoS) is applied to flows within that network attachment.</t>
      <t>A network attachment may be established using control plane signaling between the client and the network (access) router and is out of scope of this document.
Transport flows over a network attachment may consist of multiple streams such as video or audio. <xref target="Figure-conn-flow"/> shows a high level view of network attachments, flows, and QoS/policy discussed in <xref target="metadata-req"/>.</t>
      <t>The requirements in <xref target="metadata-req"/> apply to data units like frames within a flow, but not between flows. Specifically, this document does not discuss flows of distinct hosts/users.</t>
      <figure anchor="Figure-conn-flow">
        <artwork><![CDATA[
+----------+          +-----------------+
|+----+    |          | +-------------+ |
|| A1 |--+ |          | | QoS, Policy | |
|+-+--+A2| |          | +---+-----+---+ |          +------+
|  |+-+--+ |  Network |     |     |     |          |srv-A2|
|  |  |    |attachment|     v     |     |          +--+---+
|  |  |  *************************|**** |             |
|  |  +------------- flow-x2 -----|-------------------+   +------+
|  +------------ flow-x1 ---------|-----------------------+srv-A1|
|        *************************|**** |                 +--+---+
+-Client-1-+          |           |     |                    |
                      |           |     |                    |
+----------+  Network attachment  V     |                    |
|+----+  ****************************** |                    |
|| A1 +------------ flow-x3 ---------------------------------+
|+----+  ****************************** |
+----------+          +-----------------+
  Client-2                  Router
]]></artwork>
      </figure>
      <t><xref target="Figure-conn-flow"/> shows "Client-1" and "Client-2" that negotiate  connection policy (e.g., QoS) and other aspects like mobility handling, charging applied to flows in that network attachment.
"Client-1" has "flow-x1" and "flow-x2" over its network attachment while "Client-2" has "flow-x3".
The requirements in this document focuses on on-path collaboration signals that apply to data units such as media frames within flows like "flow-x1/x2/x3" but not between them.</t>
      <t>In summary, the rapid variation of wireless link quality and/or bandwidth limitations in networks along with interactive applications that demand low latency and high throughput can lead to suboptimal user experience. <xref target="uc"/> outlines use cases to illustrate the issues and the need for additional information per flow to allow the network to optimize its handling.</t>
      <t>Some of the complications that are induced by the phenomena discussed above may be eliminated by
   adequate dimensioning and upgrades.  However, such upgrades may not
   be always (immediately) possible or justified. Complementary mitigations are thus needed to soften these complications by introducing some collaboration between endpoints and networks to adjust their behaviors.</t>
      <t><xref target="operational"/> provides operational constraints in the network and <xref target="metadata-req"/> describes the requirements for on-path media collaboration signals.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document makes use of the following terms:</t>
      <dl>
        <dt>Discard preference:</dt>
        <dd>
          <t>Is an indication of drop preference within a flow when there are no sufficient network resources to handle all competing packets of that same flow.</t>
        </dd>
        <dt>Intentional Management:</dt>
        <dd>
          <t>Network policy such as (monthly) bandwidth quota or bandwidth limit, or quality (delay and/or jitter)) assurances.</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>Network reactions to congestion events or protection polices under attacks, with very short to very long durations (e.g., varying wireless and mobile air interface conditions).</t>
        </dd>
        <dt>Traffic shaping:</dt>
        <dd>
          <t>Refers in this document to QoS management at the wireless/access router to delay or discard packets of lower priority to achieve bounded latency and high throughput.</t>
        </dd>
        <dt>User Plane Function (UPF):</dt>
        <dd>
          <t>Refers to a 3GPP element that is located between the mobile infrastructure and the Data Network (DN) as shown in <xref target="Figure-3gpp"/>.</t>
        </dd>
        <dt/>
        <dd>
          <t>For a definitive description of 3GPP network architectures, the reader should refer to the 3GPP's TR 23.501 <xref target="TR.23.501-3GPP"/>.</t>
        </dd>
      </dl>
      <figure anchor="Figure-3gpp">
        <name>5GS Architecture</name>
        <artwork align="center"><![CDATA[
  ┌─────┐  ┌─────┐  ┌─────┐    ┌─────┐  ┌─────┐  ┌─────┐
  │NSSF │  │ NEF │  │ NRF │    │ PCF │  │ UDM │  │ AF  │
  └──┬──┘  └──┬──┘  └──┬──┘    └──┬──┘  └──┬──┘  └──┬──┘
Nnssf│    Nnef│    Nnrf│      Npcf│    Nudm│        │Naf
  ───┴────────┴──┬─────┴──┬───────┴───┬────┴────────┴────
            Nausf│    Namf│       Nsmf│
              ┌──┴──┐  ┌──┴──┐     ┌──┴──────┐
              │AUSR │  │ AMF │     │   SMF   │
              └─────┘  └──┬──┘     └──┬──────┘
                       ╱  │           │      ╲
Control Plane      N1 ╱   │N2         │N4     ╲N4
════════════════════════════════════════════════════════════
User Plane          ╱     │           │         ╲
                ┌───┐  ┌──┴──┐  N3 ┌──┴──┐ N9 ┌─────┐ N6  .───.
                │UE ├──┤(R)AN├─────┤ UPF ├────┤ UPF ├────( DN  )
                └───┘  └─────┘     └─────┘    └─────┘     `───'
]]></artwork>
      </figure>
    </section>
    <section anchor="uc">
      <name>Use Cases</name>
      <section anchor="uc-streaming">
        <name>Media Streaming</name>
        <t>Streaming video contains the occasional key frame ("I-frame") containing a full video frame.
These frames are necessary to rebuild receiver state after loss of delta frames.
The key frames are therefore more critical to deliver to the receiver than delta frames.</t>
        <t>Streaming video also contains audio frames which can be encoded
separately and, thus, can be signaled separately (requirement:
REQ-MEDIA-KEYFRAME).</t>
        <t>Audio is more critical than video for many applications, but its
importance (relative to other packets in the flow) is still an
application decision (requirements: REQ-MEDIA-AV-SEPARATE,
REQ-MEDIA-CLIENT-DECIDES). For example, the ability of the receiver to change the priority by communicating to the network -- without cooperation of the sender -- gives a hearing-impaired user the ability to adjust video above audio.</t>
        <t>Especially with media over QUIC, the server (or relay) sends the same
stream to many receivers, including the same metadata.  Thus, when a
client needs different prioritization (e.g., video over audio or the other way around), this
is only achievable by signaling that priority inversion from the
client to the ISP router (requirement: REQ-CLIENT-DECIDES).</t>
        <t>Examples: live broadcast, on-demand video streaming</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-MEDIA-KEYFRAME:</dt>
          <dd>
            <t>Video contains partial frames and full frames, which need to be distinguished so that
full frames can be indicated to the network.</t>
          </dd>
          <dt>REQ-MEDIA-AV-SEPARATE:</dt>
          <dd>
            <t>Audio can be prioritized differently than video.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>In loss-prone networks or during reactive policy events, retransmissions cause long delays. All packets being treated the same can have challenges in efficiently handling/forwarding data. Today, there is no way to identify packets which are less important and/or loss-tolerant to prioritize packets in challenging networks and/or during reactive events.</t>
          </li>
          <li>
            <t>Some media frames may be able to tolerate more delay over the wire than others (e.g., live media frames require very low latency while a background image for augmented reality may be delivered with more delay tolerance).  Even when the media payload is not encrypted, the network has no means to distinguish these different requirements.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-interactive">
        <name>Interactive Media</name>
        <t>Interactive media includes content that a user can actively engage with and results in input and response actions that can be highly delay-sensitive.</t>
        <t>Examples: VoIP (Peer-to-Peer (P2P), group conferencing), gaming, eXtended Reality (XR).</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PACKET-NATURE:</dt>
          <dd>
            <t>The receiver indicates that a flow is interactive and requests that the network honors the incoming flow's
per-packet signals, which prevents denial of service of mis-marked incoming flows.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>A mobile/roaming user prioritizes audio over video during a VoIP call to have a seamless meeting experience.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-preferences">
        <name>User Preferences</name>
        <t>A game or VoIP application may want to signal different metadata for the same type of packet in each direction.
For example, for a game, video in the server-to-client direction might be more important than audio, whereas input devices (e.g., keystrokes) might be more important than audio.  Each user can have varied preferences for the same type of data originating from the server.</t>
        <t>Determination of such preferences is outside of the scope of this document.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-CLIENT-DECIDES:</dt>
          <dd>
            <t>The receiving client determines importance of packets it receives, as the client may have changing needs over time.</t>
          </dd>
        </dl>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>Dynamic changes to priority based on user activity is not possible today. For example, audio packets having the same priority when a user mutes the audio locally, or change in priority during times of emergency where video streaming applications share the same priority as SOS signals.</t>
          </li>
          <li>
            <t>A user prioritizing video over audio while playing an interactive game.</t>
          </li>
          <li>
            <t>User's foreground application should receive priority over background tasks. For example, a user is typing in a document while playing a media in the background within the same session.</t>
          </li>
        </ol>
      </section>
      <section anchor="mixed-traffic">
        <name>Mixed Traffic</name>
        <t>Mixed traffic can contain multiple types of data flowing through the same 5-tuple connection. They may include digital models of the real world, multimedia content, virtualized desktop/apps, and interactive engagement.</t>
        <t>In cases where the wireless network has to drop or delay processing, all packets of the media frame or stream are treated in the same manner.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PACKET-RELIABILITY:</dt>
          <dd>
            <t>Indicate if a packet is treated as reliable or unreliable by the application.</t>
          </dd>
          <dt>REQ-PACKET-NATURE:</dt>
          <dd>
            <t>Indicate if a packet belongs to bulk traffic or interactive traffic.</t>
          </dd>
        </dl>
        <t>Examples: Virtual Apps and Desktops.</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>Document being printed/saved while being edited. The interactive traffic has higher priority over bulk traffic).</t>
          </li>
          <li>
            <t>File download while intearacting with the webpage. With QUIC, this could occur with the same webserver. Interactive activity performed with the webpage higher priority over file download.</t>
          </li>
          <li>
            <t>In graphics remoting, Critical Glyphs (Reliable) has more priority over Smoothing Glyphs (unreliable) during reactive events.</t>
          </li>
        </ol>
      </section>
      <section anchor="honoring-of-metadata-for-servers-behind-a-gateway">
        <name>Honoring of Metadata for Servers Behind a Gateway</name>
        <t>In enterprise networks and remote desktop use case, a server can host multiple connections with varying type of traffic. These servers are often exposed to the Internet through some sort of a gateway-proxy and the signaling (like DSCP bits) from these servers are often ignored by the access/transit networks.</t>
        <t>Requirement: REQ-CLIENT-DECIDES as defined previously.</t>
      </section>
    </section>
    <section anchor="operational">
      <name>Operational Considerations</name>
      <t>Traffic policing and shaping are enforced in ingress/egress network points for various reasons (protect the network against attacks, ensure conformance with a trafic profile, etc.). Out-of-profile trafic may be discarded or assigned another class (e.g., using Lower Effort Per-Domain Behavior (LE PDB) <xref target="RFC3662"/>) a bandwidth limit among others. The exact behavior is policy-based and deployment-specific.</t>
      <t>The entire set of operations to manage traffic is beyond the scope of this document.
This section focuses on operational constraints that impact  server – network, and host – network modes of sending metadata.</t>
      <section anchor="policy">
        <name>Policy Enforcement</name>
        <t>Some metadata requires the network to share some hints with a host to adjust its behavior for some specific flows.
However, that metadata may have a dependency on the service offering that is subscribed by a user.</t>
        <t>Let us consider the example of a bitrate for an optimized video delivery. <em>Such bitrate may not be computed system-wide</em> given that flows from users with distinct service offerings (and connectivity SLOs) may be serviced by the same network nodes. Instead, the network needs to dynamically adjust the bitrate based on each user's service package and connectivity SLOs to ensure optimal delivery for all users (REQ-METADATA-ACCURACY).</t>
        <t>Requirement:  REQ-METADATA-ACCURACY.</t>
      </section>
      <section anchor="classification">
        <name>Redundant Functions and Classification Complications</name>
        <t>If distinct channels are used to share the metadata between a host and a network, a network that engages in the collaborative signaling approach will require sophisticated features to classify flows and decide which channel is used to share metadata so that it can consume that information.</t>
        <t>Likewise, the network will require to implement redundant functions; for each signaling interface.</t>
        <t><em>As such, application- and protocol-specific signaling channels are suboptimal.</em> (REQ-SINGLE-CHANNEL)</t>
        <t>Requirement:  REQ-SINGLE-CHANNEL is preferred.</t>
      </section>
      <section anchor="metadata-scope">
        <name>Metadata Scope</name>
        <t>An operational challenge for sharing resource-quota like metadata (e.g., maximum bitrate) is that the network is generally not entitled to allocate quota per-application, per-flow, per-stream, etc. that delivered as part of an Internet connectivity service.  However, the network has a visibility about the overall network attachment (e.g. inbound/outbound bandwidth discussed in <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>).</t>
        <t>As such, hints about resource-like metadata is bound by default to the overall network attachment, not specific to a given application or flow.</t>
        <t>Most importantly, the metadata can be used by the network to prioritize traffic within a single 5-tuple connection and metadata cannot be leveraged for prioritization between different flows.</t>
        <t>It is out of the scope of this document to discuss setups (e.g., 3GPP PDU Sessions) where network attachments with Guaranteed Bit Rate (GBR) for specific flows is provided.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-SCOPED-METADATA:</dt>
          <dd>
            <t>Means to characterize the scope of a shared metadata for the sake of better interoperability should be supported.</t>
          </dd>
        </dl>
      </section>
      <section anchor="multiple-bottlenecks">
        <name>Multiple Bottlenecks</name>
        <t>Whereas models often show a single bottleneck, there are frequently
two (or more) bottlenecks: the ISP network and within the subscriber
network (e.g., Wi-Fi link).  As such, all bottlenecks near the
subscriber should be able to benefit from network/host collaboration.</t>
        <t>Requirement: REQ-MULTIPLE-BOTTLENECKS should be supported.</t>
      </section>
      <section anchor="app-interference">
        <name>Application Interference</name>
        <t>Applications that have access to a resource-quota information may adopt an aggressive behavior (compared to those that don't have access) if they assumed that a resource-quota like metadata is for the application, not for the host that runs the applications.</t>
        <t>This is challenging for home networks where multiple hosts may be running behind the same CPE, with each of them running a video application. The same challenge may apply when tethering is enabled.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-SIGNAL-EXPOSURE-FAIRNESS:</dt>
          <dd>
            <t>Means to expose the signal independent of the application should be considered. An example of such exposure is OS APIs.</t>
          </dd>
        </dl>
      </section>
      <section anchor="privacy">
        <name>Privacy Considerations</name>
        <t>Encrypted media payloads along with temporary IPv6 addresses between a server and user (client) provide a measure of privacy for the content and the identity of the user.
It should, however, be noted that media flows (e.g., encrypted video payloads in SRTP) exhibit a pattern of bursts and intervals that amounts to a signature and is vulnerable to frequency analysis.
To avoid this kind of frequency analysis, media sent by the server would need to be scheduled or multiplexed differently to each user/recipient.
This may be possible in transports like QUIC which allows flexibility in scheduling each stream.
Transports like QUIC also fully encrypt the entire stream and, therefore, no media headers are observable on-path either.
The security aspects of the media payload / transport are not in the scope of this document and is described here only to provide context for metadata privacy.</t>
        <t>Some metadata (e.g., the size of a burst of packets, sequence number, and timestamp) can be readily observed or inferred by entities
along the network path. However, it is essential to recognize that while sequence numbers and timestamps are typically visible in
the clear-text headers of protocols (e.g., TCP, RTP, or SRTP) they are not directly observable in encrypted protocols such as QUIC. All metadata sent
from the server to the network, including these elements and others, are vulnerable to modification while in transit. Only an
on-path attacker can modify on-path metadata. Such an attacker could engage in other malicious activities, like corrupting the checksum or
completely dropping the packet. For instance, an active attacker could alter the metadata to mislabel packets containing video key-frames
as unimportant, but such changes are detectable by the receiver.</t>
        <t>It is recommended to encrypt or obfuscate the metadata information so it is only available to hosts and to authorized network elements. The method of encryption or obfuscation is not described in this document but rather in other documents describing how this metadata is encoded and exchanged amongst hosts and network elements. The privacy implications of revealing metadata to network elements need to be thoroughly analyzed. This analysis should ensure that any exposure of metadata does not compromise user privacy or allow unauthorized entities to infer sensitive information about the data being transmitted while maintaining minimal resource consumption.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-PRIVACY-ADDITIONAL:</dt>
          <dd>
            <t>An on-path observer obtains no additional information about the IP packet.</t>
          </dd>
          <dt>REQ-SIGNALING-AVOIDANCE:</dt>
          <dd>
            <t>Leveraging previous experience <xref target="RFC9049"/>, the folliwing is not required to make use of the collaborative signaling:
</t>
            <ul spacing="normal">
              <li>
                <t>Reveal the application identity.</t>
              </li>
              <li>
                <t>Expose the application cause (or 'reason') to signal metadata.</t>
              </li>
              <li>
                <t>Reveal server identity.</t>
              </li>
              <li>
                <t>Inspect client-to-server encrypted payload by network elements.</t>
              </li>
            </ul>
          </dd>
        </dl>
      </section>
      <section anchor="scalability">
        <name>Scalability</name>
        <t>There may be a large number of media flows handled by the server and wireless/access router.</t>
        <t>Per flow information (state) at a wireless router for optimizing the flow can negate the advantages offered as the number of flows handled increases.</t>
        <t>The metadata and other state information that a router has to maintain for each additional media flow it handles should be kept to a minimum or eliminated altogether.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-ISP-SCALE:</dt>
          <dd>
            <t>The metadata other state information that a wireless router has to maintain for each additional media flow it handles should be very low or none.</t>
          </dd>
        </dl>
      </section>
      <section anchor="continuity">
        <name>Session Continuity</name>
        <t>The general trend in wireless networks is to deploy the wireless router closer to the user.
This can help with low link latency but can result in more frequent handovers as the user moves between routers.
The frequency of handovers increases when a user moves faster or when the media session lasts longer.</t>
        <t>During handovers, there should be minimal delay incurred during handover in configuring/setting up the metadata of a media session in progress.</t>
        <t>Requirement:</t>
        <dl>
          <dt>REQ-CONTINUITY:</dt>
          <dd>
            <t>Handover from one radio or router to another should continue to provide same service level.</t>
          </dd>
        </dl>
      </section>
      <section anchor="abuse">
        <name>Abuse and Constraints</name>
        <t>It is important that not every flow be prioritized; otherwise, the network devolves into the best-effort network that existed prior to metadata signaling. It is a requirement that mechanisms exist to prevent this occurrence.</t>
        <t>Such a mechanism might be simple, for example, a cellular network might allow one flow from a subscriber to declare itself as important; other flows with that subscriber are denied attempts to prioritize themselves. However, the network cannot identify whether the prioritized flow is legitimate or malicious.</t>
        <t>Requirements:</t>
        <dl>
          <dt>REQ-SIGNAL-VALIDATION:</dt>
          <dd>
            <t>The network/OS needs to ensure that the user/client signaling of priority (if any) does not associate the same priority level with all traffic types within the same flow, thereby avoiding prioritizing of all the streams/traffic the same way.</t>
          </dd>
          <dt>REQ-CLIENT-VALIDATION:</dt>
          <dd>
            <t>The network needs to ensure the signal is coming from the same user/client that is part of the 5-tuple flow. This is to ensure no other application influences the priority of another application's flow.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="metadata-req">
      <name>On-path Metadata Requirements</name>
      <t>There are various approaches for collaborative signaling between the server/host and network including out-of-band signaling, client-centric metadata sharing and proxied connections.
The requirements here focus on proxied metadata connections on path with the data traffic.</t>
      <t>The path signals below should follow the principles of intentional distribution, protection of information, minimization and limiting impact as described in <xref target="RFC9419"/> and <xref target="RFC8558"/>.
Leveraging previous experience (<xref target="RFC9049"/>), the metadata signals does not need application identity, application cause (or 'reason'), server identity or the inspection of client(host)-to-server encrypted payload.</t>
      <t>The metadata connections may be between server and network (in either direction) or between host and network (in either direction).</t>
      <t>Some use cases benefit from server – network metadata exchanges (<xref target="server-network"/>) and others need client involvement (<xref target="host-network"/>).</t>
      <t>For the requirements that follow, the assumption is that the client agrees to the exchange of metadata between the server and network, or between the client and network.</t>
      <t>Requirement:</t>
      <dl>
        <dt>REQ-PACKET-SELF:</dt>
        <dd>
          <t>Packet importance is indicated by the packet itself.</t>
        </dd>
      </dl>
      <t>Note REQ-PACKET-SELF should meet the requirements of <xref target="privacy"/> especially REQ-PRIVACY-ADDITIONAL.</t>
      <section anchor="host-network">
        <name>Host-Network Metadata</name>
        <section anchor="interflow-priority">
          <name>Priority between Flows (Inter-flow)</name>
          <t>Certain flows being received by a host (or by an application on a host) are less or more important than other flows of <em>the same host</em>.
For example, a host downloading a software update is generally considered less important than another host doing interactive audio/video or gaming.</t>
          <t>By signaling the relative importance of flows to a network element, the network element can (de-)prioritize those flows to best accommodate the needs of the various applications on a same host.</t>
          <t>Without a signaling in place between a receiving host and its network, remote peers are able to mark packets that interfere with the desires of the receiving host -- making their flows more important than what the receiving host considers more important.
This eventually causes all flows to be marked as important, or -- more likely -- such priority markings to be ignored.</t>
          <t>However, prioritizing between flows, even for the same user/subscriber, presents the following challenges:</t>
          <ol spacing="normal" type="1"><li>
              <t>Identification and authentication of legitimate applications on the host. The remote peers can also be malicious and benign.</t>
            </li>
            <li>
              <t>Identifying whether the traffic belongs to a single user or multiple users from a single network attachment (e.g., tethering or LAN connected to a CPE). The network will enforce per-subscriber policies, not per-host.</t>
            </li>
            <li>
              <t>Enforcing fairness to all the flows belonging to a single host. For example, it is a challenge to prevent a platform from marking certain flows as low priority at platform layer, bypassing the application, to (de)prioritize certain applications over all the other applications on the same host. Such unfairness can be revealed during certification or public benchmark efforts, though.</t>
            </li>
          </ol>
          <t>Taking into account these challenges, and despite the use case is described in the document, inter-flow (de)prioritization requirements are out of the scope of this document.</t>
          <ul empty="true">
            <li>
              <t>Future versions of the document may re-consider this conclusion as a function of the comments received from the TSVWG.</t>
            </li>
          </ul>
        </section>
        <section anchor="intra-flow-priority">
          <name>Priority within a Flow (Intra-Flow)</name>
          <t>Interactive Audio/Video has long been using <xref target="RFC3550"/> which runs over UDP.  As described in Section 2.3.7.2 of <xref target="RFC7478"/>, there is value in differentiating between voice, video and data.
Today's video streaming is exclusively over TCP but will migrate to QUIC and eventually is likely to support unreliable transport (<xref target="RFC9221"/>, <xref target="I-D.ietf-moq-transport"/>).  With unreliable transport of video in RTP or QUIC, it is beneficial to differentiate the important video keyframes from other video frames.</t>
          <t>Other applications, as mentioned in <xref target="uc"/>, such as gaming and remote desktop also benefit from differentiating their packets to the network.</t>
          <t>Many of these flows do not originate from a content provider's network -- rather, they originate from a peer (e.g., VoIP, interactive video, peer-to-peer gaming, Remote Desktop, and CDN). Thus, the flows originate from an IP address that is not known before connection establishment, so there needs to be a way for the client to authorize the network elements to receive and hopefully to honor the metadata of those packets from a remote peer.</t>
          <t>Without a signaling in place between a receiving host and its network, remote peers are able to mark every packet of a flow as important, causing much the same problem as the previous use case.
Eventually, when all packets of every flow are marked as important, there is no differentiation between packets within a flow, rendering the network unable to improve reactive policy decisions.</t>
          <t>Requirements: The requirements vary based on use case and user preference. The requirements listed in <xref target="uc"/> are applicable here.</t>
        </section>
      </section>
      <section anchor="network-host">
        <name>Network-Host Metadata</name>
        <section anchor="assisted-offload">
          <name>Assisted Offload</name>
          <t>There are cases (crisis) where "normal" network resources cannot be
used at maximum and, thus, a network would seek to reduce or offload
some of the traffic during these events -- often called 'reactive
traffic policy'.  An example of such use case is cellular networks
that are overly used (and radio resources exhausted) such as a large
collection of people (e.g., parade, sporting event), or such as a
partial radio network outage (e.g., tower power outage).  During such
a condition, an alternative network attachment may be available to
the host (e.g., Wi-Fi).</t>
          <t>Network-to-host signals are useful to put in place adequate traffic
distribution policies on the host (e.g., prefer the use of alternate paths,
offload a network) (REQ-NETWORK-SEEKS-LOAD-DOWN).</t>
        </section>
        <section anchor="nrlp">
          <name>Network Bandwidth &amp; Network Rate Limiting Policies</name>
          <t>Bandwidth constraints exist most predominantly at the access network. This can be constraints in the network itself or a result of rate limiting due to various reasons.</t>
          <t>Also, traffic exchanged over a network attachment may be subject to rate-limit policies. These policies may be intentional policies (e.g., enforced as part of the activation of the network attachment and typically agreed upon service subscription) or be reactive policies (e.g., enforced temporarily to manage an overload or during a DDoS attack mitigation).</t>
          <t>Requirements:</t>
          <dl>
            <dt>REQ-NETWORK-THROUGHPUT:</dt>
            <dd>
              <t>A mechanism to signal the available network throughput to interested hosts, including changes to throughput.</t>
            </dd>
            <dt>REQ-NRLP:</dt>
            <dd>
              <t>The network shall inform the host of the Rate limiting policies</t>
            </dd>
          </dl>
          <t>Use cases:</t>
          <ol spacing="normal" type="1"><li>
              <t>Performance Optimization: Some applications support some forms of bandwidth measurements (e.g., <xref target="app-measurement"/>) which feed how the content is accessed to using ABR. Complementing or replacing these measurements with explicit signals will improve overall network performance and can help optimize the data transfer. Signaling bandwidth availability allows hosts to avoid contributing to network congestion.</t>
            </li>
            <li>
              <t>Dynamic Adaptation: When the network informs the host about available bandwidth, the host can dynamically adjust its data transmission rate.</t>
            </li>
            <li>
              <t>Efficient Resource Utilization: Knowing available bandwidth helps the host allocate resources efficiently.</t>
            </li>
            <li>
              <t>Auto-Scaling Applications: Cloud-based applications can auto-scale based on available bandwidth.</t>
            </li>
            <li>
              <t>Rate Limiting: Monthly data quotas on cellular networks can be easily exceeded by video streaming, in particular, if the client chooses excessively high quality or routinely abandons watching videos that were downloaded. The network can assist the client by informing the client of the network's bandwidth policy.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="server-network">
        <name>Server-Network Metadata</name>
        <section anchor="mdu-stream-id">
          <name>Identification of Media Frames and Streams</name>
          <t>Feedback provided by ECN/L4S to the server (UDP sender) is not fast enough to adjust the sending rate when available wireless capacity changes significantly in very short periods of time (~ 1 millisecond).
Differentiating using multiple DSCP codes does not provide the resolution required to classify media frames or streams and adapt to changes in coding due to dynamic content or resulting from network conditions.</t>
          <t>Relative priority and tolerance to delay of media frames or streams can be used to optimize traffic shaping at the wireless router.
The application can provide information to detect the start, end and set of packets that belong to a media frame.
Alternatively, the application may provide information to identify one stream of the flow from another.
The application provides information to identify either media frames or streams in a flow but not both.</t>
          <t>In cases where the wireless network has to drop or delay processing, all packets of the media frame or stream are treated in the same manner.</t>
          <t>Requirements:</t>
          <dl>
            <dt>REQ-FRAME-START:</dt>
            <dd>
              <t>Indicate packet containing start of media frame.</t>
            </dd>
            <dt>REQ-FRAME-MIDDLE:</dt>
            <dd>
              <t>Indicate packet containing middle(s) of media frame.</t>
            </dd>
            <dt>REQ-FRAME-END:</dt>
            <dd>
              <t>Indicate packet containing end of media frame.</t>
            </dd>
          </dl>
        </section>
        <section anchor="TrafficType">
          <name>Identification of Traffic Type without Disclosure of the Application</name>
          <t>Different nature/types of traffic can be part of the same 5-tuple flow. This could be reliable/loss-tolerant <xref target="RFC9221"/>, bulk/interactive traffic. The type of traffic can be used to prioritize/buffer packets as needed and deprioritize/discard appropriate packets during reactive events, thereby optimizing performance. The application may provide information to identify the type of traffic in per-packet metadata.</t>
          <t>Requirements: REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as defined in <xref target="mixed-traffic"/>.</t>
        </section>
        <section anchor="relative-priority">
          <name>Relative Priority</name>
          <t>Relative importance of a media frame provides the priority level of one media frame over another media frame within a stream.
The application server determines the importance based on the media encoded in the media frame (e.g., a base layer video I-frame has higher priority than an enhanced layer P-frame).
Importance may be used to determine drop priority of a media frame in cases of extreme congestion in the wireless network.</t>
          <t>Relative importance of a media stream  is the priority level of one media stream over another stream in the flow (with the same IP 5-tuple).
As with media frames, importance may be used to determine drop priority in cases of extreme congestion in the wireless network.</t>
          <t>There is no requirement associated with this use case.</t>
        </section>
        <section anchor="delay">
          <name>Tolerance to Delay</name>
          <t>Some media frames may be able to tolerate more delay over the wire than others (e.g., live media frames require very low latency while a background image for augmented reality may be delivered with more delay tolerance).
Similarly, some media streams can tolerate more delay over the wire than others (e.g., a stream carrying a background image may tolerate more delay).
ams may be able to tolerate more delay over the wire than others (e.g., a stream carrying a background image for augmented reality may be delivered with more delay tolerance).
Even when the media payload is not encrypted, the network has no means to distinguish these different requirements.</t>
          <t>If the application can indicate that a media frame or stream can tolerate high delay the wireless router can opt to delay packets rather than drop during transient congestion periods.</t>
          <t>Requirements:</t>
          <t>REQ-DELAY-TOLERANCE: REQ-PACKET-RELIABILITY, REQ-PACKET-NATURE as defined in <xref target="mixed-traffic"/>.</t>
        </section>
        <section anchor="burst">
          <name>Burst Indication</name>
          <t>Media flows can have large and unexpected variations in packet bursts due to dynamic changes in content, server estimation of network conditions and pacing behavior.
Encoding of live video, and multimodal media can only increase the burst size that a server has to contend with sending out in a relative smoothed out manner.
The burst size is observable on the wire, but can only be determined by the end of the burst of packets.
Wireless networks on the other hand cannot reserve resources for the maximum burst size allowed as that will likely lead to poor utilization of radio resources or tail drops.</t>
          <t>The server may provide burst size at the beginning of the burst to allow the scheduler to reserve sufficient resources (and avoid having too few resources that may lead to a tail drop).
The server may also signal end of burst that provides information for the radio to go into sleep mode (Connected Mode Discontinuous Reception, C-DRX) if there is no paging message.</t>
          <dl>
            <dt>REQ-BURST-INDICATOR:</dt>
            <dd>
              <t>Client indicates this flow's maximum burst to
ISP, and ISP agrees it can handle that burst size.  (but what does ISP
router do with the burst? Needs to be described above!)</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="non-req">
      <name>Non-Requirements</name>
      <t>Application feedback with measurements of packets lost and delay incurred may affect the sending rate and other behavior of the application.
The requirements and specification to mitigate these aspects are not in the scope of this document.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>None.</t>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Security aspects for the metadata are discussed in <xref target="privacy"/>.
The principles outlined in <xref target="RFC8558"/>, <xref target="RFC9049"/> and <xref target="RFC9419"/> contain security considerations and are referenced in <xref target="metadata-req"/>.</t>
      <t>This document has no other security considerations.</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is a merge of <xref target="I-D.rwbr-tsvwg-signaling-use-cases"/> and <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>.</t>
      <dl>
        <dt>Acknowledgments from <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>:</dt>
        <dd>
          <t>Xavier De Foy and the authors of this draft have discussed the similarities and differences of this draft with the MoQ draft for carrying media metadata.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors wish to thank Mike Heard, Sebastian Moeller and Tom Herbert for discussions on metadata fields, fragmentation and various transport aspects.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors appreciate input from Marcus Ilhar and Magnus Westerlund on the need to address privacy in general and Dan Druta to consider a common transport across various host to network signaling when possible.
Ruediger Geib suggested that limiting the amount of state information that a wireless router has to keep for a flow should be minimized.</t>
        </dd>
        <dt/>
        <dd>
          <t>Ingemar Johansson's suggestions on fast fading (which L4S handles) and dramatic drops in wireless accesses have been helpful to identify the issues.
Thanks to Hang Shi for the review and comments on host-to-network signaling.
Thanks to Luis Miguel Contreras for his review and comments.</t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="TR.23.501-3GPP">
        <front>
          <title>3rd Generation Partnership Project; Technical Specification Group Servies and System Aspects; System architecture for the 5G System (5GS); Stage 2 (Release 18)</title>
          <author>
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="TR.23.700-60-3GPP">
        <front>
          <title>Study on XR (Extended Reality) and media services (Release 18)</title>
          <author>
            <organization/>
          </author>
          <date year="2022" month="August"/>
        </front>
      </reference>
      <reference anchor="_5G-Lumos">
        <front>
          <title>Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput, Arvind Narayanan et al., ACM Internet Measurement Conference (IMC '20), https://dl.acm.org/doi/10.1145/3419394.3423629</title>
          <author>
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
        <front>
          <title>Bandwidth measurement for QUIC</title>
          <author fullname="Zafer Gurel">
            <organization/>
          </author>
          <author fullname="Ali C. Begen">
            <organization/>
          </author>
          <date year="2024"/>
        </front>
      </reference>
      <reference anchor="RFC6077">
        <front>
          <title>Open Research Issues in Internet Congestion Control</title>
          <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
          <author fullname="M. Welzl" initials="M." surname="Welzl"/>
          <author fullname="M. Scharf" initials="M." surname="Scharf"/>
          <author fullname="B. Briscoe" initials="B." surname="Briscoe"/>
          <date month="February" year="2011"/>
          <abstract>
            <t>This document describes some of the open problems in Internet congestion control that are known today. This includes several new challenges that are becoming important as the network grows, as well as some issues that have been known for many years. These challenges are generally considered to be open research topics that may require more study or application of innovative techniques before Internet-scale solutions can be confidently engineered and deployed. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6077"/>
        <seriesInfo name="DOI" value="10.17487/RFC6077"/>
      </reference>
      <reference anchor="RFC9419">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RFC8825">
        <front>
          <title>Overview: Real-Time Protocols for Browser-Based Applications</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
          <date month="January" year="2021"/>
          <abstract>
            <t>This document gives an overview and context of a protocol suite intended for use with real-time applications that can be deployed in browsers -- "real-time communication on the Web".</t>
            <t>It intends to serve as a starting and coordination point to make sure that (1) all the parts that are needed to achieve this goal are findable and (2) the parts that belong in the Internet protocol suite are fully specified and on the right publication track.</t>
            <t>This document is an applicability statement -- it does not itself specify any protocol, but it specifies which other specifications implementations are supposed to follow to be compliant with Web Real-Time Communication (WebRTC).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8825"/>
        <seriesInfo name="DOI" value="10.17487/RFC8825"/>
      </reference>
      <reference anchor="RFC3550">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC9335">
        <front>
          <title>Completely Encrypting RTP Header Extensions and Contributing Sources</title>
          <author fullname="J. Uberti" initials="J." surname="Uberti"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="S. Murillo" initials="S." surname="Murillo"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>While the Secure Real-time Transport Protocol (SRTP) provides confidentiality for the contents of a media packet, a significant amount of metadata is left unprotected, including RTP header extensions and contributing sources (CSRCs). However, this data can be moderately sensitive in many applications. While there have been previous attempts to protect this data, they have had limited deployment, due to complexity as well as technical limitations.</t>
            <t>This document updates RFC 3711, the SRTP specification, and defines Cryptex as a new mechanism that completely encrypts header extensions and CSRCs and uses simpler Session Description Protocol (SDP) signaling with the goal of facilitating deployment.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9335"/>
        <seriesInfo name="DOI" value="10.17487/RFC9335"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC3662">
        <front>
          <title>A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services</title>
          <author fullname="R. Bless" initials="R." surname="Bless"/>
          <author fullname="K. Nichols" initials="K." surname="Nichols"/>
          <author fullname="K. Wehrle" initials="K." surname="Wehrle"/>
          <date month="December" year="2003"/>
          <abstract>
            <t>This document proposes a differentiated services per-domain behavior (PDB) whose traffic may be "starved" (although starvation is not strictly required) in a properly functioning network. This is in contrast to the Internet's "best-effort" or "normal Internet traffic" model, where prolonged starvation indicates network problems. In this sense, the proposed PDB's traffic is forwarded with a "lower" priority than the normal "best-effort" Internet traffic, thus the PDB is called "Lower Effort" (LE). Use of this PDB permits a network operator to strictly limit the effect of its traffic on "best-effort"/"normal" or all other Internet traffic. This document gives some example uses, but does not propose constraining the PDB's use to any particular type of traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3662"/>
        <seriesInfo name="DOI" value="10.17487/RFC3662"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
        <front>
          <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="29" month="May" year="2024"/>
          <abstract>
            <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-13"/>
      </reference>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC8558">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals. For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear. Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements. In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels. Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="RFC7478">
        <front>
          <title>Web Real-Time Communication Use Cases and Requirements</title>
          <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
          <author fullname="S. Hakansson" initials="S." surname="Hakansson"/>
          <author fullname="G. Eriksson" initials="G." surname="Eriksson"/>
          <date month="March" year="2015"/>
          <abstract>
            <t>This document describes web-based real-time communication use cases. Requirements on the browser functionality are derived from the use cases.</t>
            <t>This document was developed in an initial phase of the work with rather minor updates at later stages. It has not really served as a tool in deciding features or scope for the WG's efforts so far. It is being published to record the early conclusions of the WG. It will not be used as a set of rigid guidelines that specifications and implementations will be held to in the future.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7478"/>
        <seriesInfo name="DOI" value="10.17487/RFC7478"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="I-D.ietf-moq-transport">
        <front>
          <title>Media over QUIC Transport</title>
          <author fullname="Luke Curley" initials="L." surname="Curley">
            <organization>Discord</organization>
          </author>
          <author fullname="Kirill Pugin" initials="K." surname="Pugin">
            <organization>Meta</organization>
          </author>
          <author fullname="Suhas Nandakumar" initials="S." surname="Nandakumar">
            <organization>Cisco</organization>
          </author>
          <author fullname="Victor Vasiliev" initials="V." surname="Vasiliev">
            <organization>Google</organization>
          </author>
          <author fullname="Ian Swett" initials="I." surname="Swett">
            <organization>Google</organization>
          </author>
          <date day="29" month="May" year="2024"/>
          <abstract>
            <t>   This document defines the core behavior for Media over QUIC Transport
   (MOQT), a media transport protocol designed to operate over QUIC and
   WebTransport, which have similar functionality.  MOQT allows a
   producer of media to publish data and have it consumed via
   subscription by a multiplicity of endpoints.  It supports
   intermediate content distribution networks and is designed for high
   scale and low latency distribution.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-moq-transport-04"/>
      </reference>
      <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
        <front>
          <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
          <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Dan Wing" initials="D." surname="Wing">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
            <organization>Nokia</organization>
          </author>
          <date day="17" month="March" year="2024"/>
          <abstract>
            <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
      </reference>
      <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
        <front>
          <title>Media Handling Considerations for Wireless Networks</title>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
            <organization>Tencent America LLC</organization>
          </author>
          <date day="14" month="February" year="2024"/>
          <abstract>
            <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-04"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA91923Mbx9XnO/6KWapqRVgcUKIsO2Yqm0C8yIgpkgEgy9mn
HWAawJiDGWQupGBKX6XyvA+p2qTqe9h9+x7zslv7F/kv2XPt7hkMJftb79WV
2AQwl+7Tp8/1d06HYdirkio1x8He2PypTgqzNllVBou8CC5NdZcXN8FJnqbR
LC+iKsmzYJIssyhNsuVeL5rNCnMLt3Zf6T9wrzePKrPMi+1xkGSLvNeL83kW
reHFcREtqvDmbhYviyKsytu7ZZiZKpzTw8LiT+uqDJ8+65X1bJ2UJTy52m7g
vtHZ9DwIHgVRWuYwhiSLzcbAv7Jq7yDYM3FS5UUSpfhhNHwJ/4Ep7Y3G0/O9
XlavZ6Y47sUwpuPePM9Kk5V1eRxURW16MKPnvagw0XEwLaKs3ORF1cP5LYu8
3sCr7LdBlMXBxBS3ydyUwVu4BOgSvMLL9no3Zgs3xce9IAxew3Ai/OMivwsu
4K3ZfIsf3wJ9UlOWwUWS3ZT4zUt45F0SV6sAh1UVUQLUwx+u8zThm642hikc
pUDxrExi+Vz2bk1Ww4yCQIY6nXz79hV8ZIo1BgjfrqMkhTkjxX+XmGoxyIsl
fB0V89VxsKqqTXl8eIgX4TfJrRnoRYf4xeGsyO9Kc0j3H+I7k2pVz/DtKcyw
rI57vaiuVnmBJIBvA1h5oPHvB8E3UbLZRGmarIGTUvqJeeH3+Srr+hXeGWXJ
DzTL4+C8rurC3JmEfjM8je/h1sFN49bfLfTCwTxfNwZxOgDaZ0vv1adR5r5q
vu8kzWtY53xR3QFbMPmCr/M0hsvLg2CUzQd0l+6Hruv9ocZRdge3/m6JH3eG
NhkEr+osjm4NzMMb4KRI2j+0hpmU89x/T7nky383x1+6XjSOvo+WOVAsyppv
ilcRMPnO7/9r6WLfO1gmRVKuHibQaXQHnFz6Y4a9PzdF45fmaKd4QVYFw7Up
knkUXFycNIjFD4j5fmL13fcv6jTl973OV/DfOHiZ1/MojpKi441XMJWloR/m
SQWSb2yyzPDY5nkMT3n+4unTp/K5ziqUjudw09z4I1vzqwYzfdXvcnpw98Cm
SVED95sSaAwvjONtx8gu8xuUR3ZgIHWWUZoX/N7CLOmqb6Iii6roJmqOcJTF
crMMcO8mz+IKxmXptdfr9bK8WMPrbkEe9VDku09BMB0Pjp4PXjx9Fj5/dX19
TA8TPRTsPS/i4JXJRKgF11FRwYdylWyC6yL/3syrX8NizlcZrGKKCz9PFvAn
Xcw8SCIZJDKJ521ZmXUwhPWdV+Wv9TOJtAq+AgFB2q5ameDFK/15/8WrSR8u
rqKlCY6C/TGI6ag0wbNf9fdotKQ6gtf4mODo6dFzN6svnz4Nv3jaNbFJVcfb
AEb53TjYP3tXobaKYY1AVlXbPo12jYoiKFWlPPTeYb2sywpffIQvfvEqvKjX
edl43x599eIVjnKzQbmPL7gu4A3zCj+e5GvYCnPQkcF6/RbkBM5/ugIKLleb
ujoIhjAKuOUStuQ2ykAcGNB46QB+OHkNXFCZAvQ06LaorFnNozpamAI3UrA/
en0SPD562j+wqiROB9F8TQokzpPDZ08Hz559/uLw+efPvnr+1eeD558fPf/i
6Ct/nlfzKgdNjRN9ihOFiYRr9z6erz9npz69y2h9//BmdLJnr+fHw2M/t19Z
XSX/hPYvf3v9+wgmCHIY9PYnrhymSXAyCF6apcncOKNiaSqnXWEcESj5+Y0p
nHYF0+iwTEGtl+GzZ1+F6/xP4Uzn5U8/hHmFYGPND2G7hWEIghYthnnV61nD
ImPTDFjJDJawdHNQHjUodLSG3l4ML/uBeQf2REJrVoJtR3sJaDarKzCHwNBJ
kIK3EdhSZGOADA7A/LsJ/lQT3xJXrZB7NmSh+HaLvtSOvg/bLAImWixg5wU1
8Ln3+kHPsx9veTRkaepjVnlZhVUeypzozbhVTOF92w9g+EGy3hQ5PAN3des1
wWwbsDzCR+MF9nkgYSv+JiK5gC8AOvJw4JFg8qFwDvJFsME1wxkuClht0HYw
ZxOt4Q9TzQf94A6MIXwaUIZekwcxKOE0L3lMQKQK6QpPwo/ytAGolcLAuIsD
uWqXHkSQdbQNZiYwWTRLQYSUOdMVCQRSD0dOGlaeLvN7XAY4xmotL04ykNT4
NPv2IZjSu2SeN6x6pC68GgQEcsImjYAeOlnQ8oZXDF+boC2OHCLDAKbNKyMr
Bm+brpKy9XCYHtiUtF/jZEGipAK+M7ETiVHVWDNhDZ4C0TgC9bEpjMihPlOy
RFlb6NWgRTdEUmJw8Sr65CFULP9gXLma2Th+HnRwSMQhvvAGMej1aC6wb2si
bprgOpT5mpgPSFbCwGmFEth9uDsqIw+AqeFsI5BX8xVo6HKNvFKucPnWpopQ
QND7gL5AWXhO0fbTZjmIu/ai7eM9SLEAiR31uzfLzmW4KsZNZAF/4NiBCLCf
iyhcwPogmRa0TrBfkBI5kzji6RYDFkbrJI5T0+s9QlVR5HE9J2LeP8In5R+6
ZFSSrWjJ062/X1OUmR+TQHFtiGjAfQUoswVIwBwYDBbFAPWBzdM6lm23QsMJ
H3CnL8evMpPijgSXEZ9/gHM1hSqyGYzOGGD1In8HfgWsHMpQNi7k5hJJMjPz
CFdbuB0YjiXPGvYzElPH85GJyN6Cr/EJ4DzC7fA4YA7gm6Q0OEZ8FQ38/l7V
/ocPwd0qSUmqLMHxom2aI5VTUDg3sH5KGpA5JT7Rex6IsDUIHWRP4PQMtiku
algVYG5VCSzp/ng67feRwPhoIgAxJTLxoHeG1+Yhzrbj7VEKLj8IhzVLpQXo
nUWRr4N8g09KYdiG59ogA2ylVbJcARcQrUDEIUnA/w9hKDQoFrp2H4JZkKoF
GINRirOiXYHcmrK7zXoKHuu0kYqD+/uJYeY8GjxD8vx2fH7yxdMvv/zwoQ/M
PKpwRBhmCLK8Aj4A/iLTE0gCE701Wzs2mgYzWQmrz0YXsoLSaAEbfgaySoT5
oDeEJ5PKhF2N7HbgTwYXrqpIoLKQgPkYK6NQBBMBdYYwyk2RIMGTHwwxSgRG
riEFhDNv3iqCFDdaxmy7rsGYlQtjUHtb2EOwS4FQOG+0bGBfZvNiu0GJLFrj
wG1f1Eq4A0jwrUwNPhwQqkQ6zeokjZEWe6BGYXpJJRTYgzcVIIpjZgxPN5bM
+iLZ4Rlubjg1WF5T3CX4ulW0MSyRBr1R8/HMdzh8sKaSgngpQlkMiwaWNQmv
HMS/dSBQtRd5lYNeKvHKwpR1KuqSpRhSs85QRJD5rlGnOToc9/fIOl+BQfvh
w6D3FhdHxm8nheOxRDxQ9i1yWCp8CzNN0p4FLG2Ww/IDYxUgr3EesDadwSJY
UaA7iJ0SedXEqOMjkqmy4tF87kld3QRFFCd567cS2P8NyLAS+CynkYsaRp0R
4cNK45Yfl54tEJBGMJuizmgD53XZ2KHzFE1KcMUMzlkMJKvucSoZbsdbFAWo
IFnLoXQSqbFjN05lIHitrjew0w9AfjRjReqjXcUijdcMX5tnOwIE5QSIy6x5
1QokCQzBvzChKcdKQBzV49IzPZB6wwwH6q+lqksyJFDgr0y6wS9BbKGzKRYr
Mf8txt6QZZ3IAm0EuokGKX+yrQDPRyuMrAMUwih5PEECzHKFG6YpXdLkxrCy
Q5F2a8T9xFGxGBXbAqWmLzngh5ZkPSAJjfuejB3wM6Ki2HqrKo4tG8nWDquJ
58gEiU3ex4fARTD4VGwzirIqRwDN5ca3Zjaensh2+9Wvjl6QpJ6i9aC2sbcO
4nQ0Vw8vA/GxclIcbHgUgBFKZJGCInK2zIE0WuIiGm6wL2GDfLPJy6QyNH7R
gsAXujEGLEPH02sZ8PMXL55++MB7HyOzJHuZ8nmdxmTZv4tg25qYiENchsPK
2oKBLWUDCwhX45pbb0VHPgi+Bp1BHoUIp+fPgVpw04KsyQiGeecbn0gq8As2
KTzVyfuShr8CiUlbD+0I4iAc3gkq+wQ2Gg6gzOuCIhcnk/EJ7IDgvC6Q8dDG
gAUnLeIpEbfIsrLoputInz4FMvXBGjUlbWnYSeg/RdlWyCXjsdEl2s0w/jwL
NxGqLRFxYOmxuYycjZsLyQb/BycJ9zdsDvZ8YDQL0AQgs3FnsYFGTA23F8v2
nqKngYDb+n5ziuZooS4QbAWkE1AhL2hNgawHsO3sVoOvh6NwydEuE1u/kARD
dNt0yeNtBlwx9y1IpP8mr8hNQvUcoVDMY7iITSRQiB5xYFtFmaraOnPLwINR
n5YsJSKtbJ27HUudWFLs1E1Ukn4m8YzaWcmIilnjTuV8ZeKaTBmV0Lyc9Bg3
EmC9dZ15Yuuf5B8vxuL9816/xnDb4TqfoRkso+w9CTv+ed/1ZRg+6b2HywP8
q/F8+D8/hr7WP9/33r9nNea/Y/9lH34kRfqEr3tzfQ6PeE/PDj/97Cf87J84
7vc87m66PEwp63atgLMPR5Nru030wk++/4l7x3v/DTTNwKfVE7rCzv49/fnE
/Rk2//TICsR8ggEq+guoCv6vKeju7j/Zt22R+uExPPznT51+m87vf+pK/M/e
SOlHUAF4xQnLi16AZhoIdTTODjUdS094fXlFi3xpF/m9+xuukL/dPrs/Dh6d
J8u6MKE5MhxZ/c2Pf/4vZ0dnnMd0WdHg6pYi7XfwMzj09/fuPlAx5QpjBHek
lEmzOiuGxBa42CiZ0Mf2zde6rEmUsRlLRk0U7L3cC/ZRar/MwSECcTm/IW3b
se1ZfiHr+MxdijkeoUkjT+BXgIwzGNoDoZpuDxrBpVVEZvd8lWOEhCKiuY0x
5eIkWbEJrM+GLwvvYh3MTVHBpCRaQmZStarBOlLXA/xGNWqBHHNDjpBv2Y5Q
xHqhpQP+mOCgC8w/PQaDim03Dr8+RmXmIppVBTY2hXIKAxZRSVqQnSxPzrLf
qoEOtuH3eSNy4Mj6Crzh+mwF8Wwj3z6TGPA+B11Q2v8hn/TJf0bNaWjWTA5c
2UQU9u54H5qGRj7LCgxjMN9MLC6Thhw2Kag4L3ass6JJ05Ta4btgn72efsCz
o99hxBjRxNDfPN9IVMdbCLA27S7g+RBJoofGjByO/ExudlolYAhYa1jNTrYq
1dIcBHY/IYEp9GZ3FVuowEe3Jg1wB+KDd18NrEaDO6A5wVIcygIhE9elaN/7
e400huA+oOeKpnQz0NhxGS3plrYExoOAmypxKSQ8Iysc0RgOaP+g3tcVYY/d
JfBS3n5+INWafjJeJfUCvwB7cy4x70N0vhrWwpNOcb0r2p+IwnjSFsqta1nn
B8NnwXtWF96V75GyB4LQUH2PSm549H73maLyw9ZjnAqEC5+ojgwasrzj3/xn
WdyG8DK6VxWz4wK+8rb73icyFnfvZw/98x7/1dJL+s4mtWidwndHwY7u9BfF
n3Ljfrn9WdCpfhuPoZk/o1HwPz9r9A0CPAlPSD6Ezx7Q8LvE8+nQ9e3PuL3J
sJe7UiT49mO3Wy5+cP6fPTB/vp1Yu2sRngfhp/558tPf/jP2JRg3vBxHuwMe
k6DutFmsrGxaLlVLWkccsFa9JY5ay47Zlbt7yiJ79AT9eLSnemyZU8Iq6FKK
4uGiQqSMDgdkGJjAgpMsGYw3gDceo/o6wOCV53r6CvRjytMbJxoxe7KhZNSy
O/dYZ6HY7tBanFLwZug96PneoFNFNKW3lz1Sj7yZ7tPoJsdnOrSJakb2T5tq
hYlAZNPpHb47OoSx7WgaIPQaA/mYRFivwWNnM68A9zR23jSqFevptlPch5jh
sfZrCo5u5ZI4zvLECC3brH5YrRE1oMlKeK0zP+FF2tCS7LAV2wFQUM31HHjU
5gi9rGPezjkmZVl7uROXgow5/wXP9wMq8JKAt1PO6dmG6eS7/bhgyrdA7QkG
TiQZRgGlJgUoaJnFNQaTZ1sOJICBDjdlkWeeALPc2pieQbpnFCiZEawpioEB
KSOVrDkkpfGGerMER9yAfeECYMRN+gM9E5gEHwOPjtK7aAtWb7ImXsPYVx82
LkgFjL8Ceb4HGoKZYuIBAmc2HFHC4A9wQrLUcAwl0uqSqMp7tcwXFbNg2aYD
ARFcUoHDp40NogxssniTk3fkWeO0uFGMA8PHJ5iCxGg65T5BiOUOJwq8gXgI
hJQE3tcNv0uiOT64Ysfig/vnRTIzpST0W5lo3eUazOzY6wNMCJ9i8JGTrWxq
WpGxpnSll0Zd5MhzFE8Dh6c87vVOd3L8x73jYMTh0Sz2EjlxkW+8y5r2qM09
IlqCIlLAHxi2IhdBqQAukwQ0gdbE3MgqKS2kqTzwBI8X+JrS4PgCEjgUmSNS
v6bwPqOWjq1+F9Wgcm5/DV7MClnPyZo/1XlFgcKW+CG4gkqofXZFRVB9n2D8
sg9qBvY64QmR7mP1FLuHwo4k7c/cz+ViLqSiDDcmxnyVhitFsArSGjfgZZDk
g722RXVZkLtMn0gsxrXAlFUTYuw0IXkpQpcQcOzMR0khafiI4wOSnMeE7LQZ
X8RJjHGRO1QQDAD0reRW6BtJguk7DyXjJa4fqh+iJCFQhNHcCnP+1WYFcP9R
htUwFAJ2/EekOYycojTX5KGe15mkNN5cn/e9OeBDKa6hYWtBjoBOyucs+zyX
VsgFEruIYCvXcwtcwl9PUZXqAu+fXiJHkCWTsUMnds7z5WaDbt8xxakjTg4k
xCu84ze6pWhcVkR4GMpSVCpH5OEVmMigracJL7z1cRlMxwFDP+H1TRgoOZ4c
6f3xb//xx7/9ufm/v/7cr3+Rx9Bg/nI5mZzjf+lDcHnmfxjLB/54feL99ub0
tfswPKf/0gP/ps//h/7xzz/361/kMb3LrCwXMvzLzLg/C/0TPmzm9vs6Xtvv
mTLRgmZkKfbfd2i4+9M/fs5Pu4/9x8M/feSuPzc8tMuodhOP1m62wWVJn1r+
nMcc9qF/ffDrB25oc1bzBX8ZvpmMPX55bRlL/juBb5SHmrf+befxH2Oczl8a
Nz/gzAY//v2/BoHHAIH36ce//7feiQThWMQxOZ/xXcQsR/5tl5/rfZef9378
+1//n/ufL86bJAoepJIQaoewDdnzMGNdPn/gl8uvgm6xdvlFEAzsN4OON//l
zRn8+z/rNf+yP+4PL70v7P/+hfJZO790fr0fnF4GQb/jdT6v/vODzPswW3/s
lv9gv3nca8UFUMdJSGDvxatJMPSUF7jFBam0EKypZfabPSwUMcXeBzRWYZGD
E/Kl7h+BlwVfPZI8yITit2jB4C9hqR/hGvcTB3UxOg1mNtvN+Rx8M7YKb8yW
3dpgf28U0l97fb2afBnOmPNT6HeFuygGDm1XgzYMOiOgawvDYKvCUD4BlHGF
HlK0QPsmBY+GTGOTVpHNEaMJbkeiXgwYxgsEBhI6cI7AK8G8wb30XNHr9j2E
IGw+eIcOhKKzxGBEhbr1NndCyGYskIl7pdlEBXljfvpELmKXgsDB9qp9zyk5
7o3P/hC+PjsdDcNvzv54Ph6+PkP7cUivBYOqNTUcvxAazKA14gx8z50j2ODl
9jwo+L5FXKArTBEdtRfFoUJfgDIgYE7DSkZZrwlXnCclmYG+NwXGoB358Ntw
cnY9HA+nZwfehE4uRmeX0/D07GR0ejbptyAGBGqSWJKFX+s65YqIIqdbjdnZ
1k8KMWbddwgxvSU47xY42gNYw0VLeAklKEyEOIgQiAXGvBE0rD8w574Kc5Cv
z8mPXu8MA2OMaiC3QgATOAMEiSium3DZiMTBhQDHCQdSWkByjzel4Ku2lggE
8tUUlUUvq7c7CIIpMRr5iFFP8kYMMHOYJgtIjHxskmRxKBvEiCFBCRFz3KGX
RhDbPic7ephpypC/yZNguNfWS2CR9W9XKclw9Pg6xUvq6GS5MOcpzkxjLxBH
tZkGqMwcAxxHqJRZkUcxSCf0LrNQolQ8Iyve0JP0WBXrcnb3GdbRHAffNoUf
7FLEqQQefJekm9ZQsAigiBRiRo1keZY1J/qkzKHn3eMg0+T4m7jFtYPm6Ly9
xAMMWBZoUYOHnrXLjEFJKxnYh+PYGs382SAYZSRWQ3CPMy8LjR4kI4FaKVrx
qA/ge7/+AOeCgQ/2lRl+GwxhpipPZobYAUs4TOyY1kKFYFOnqSHoMUJqNJaR
umjyocM8Bczn0zyOOBqK4TjKdiOHYtSQqjcWLr0t2V64jnx1lYGVBh2IBlWe
gmDI2nhdTyTqKHEMfsb+sINeTChaw6NBQAHFRiRYwoK0Z3Dd6eWVqCzx429F
6KDDLyB3nK0NQnhgLHmq7BqNXLgILUfEowAB3Evaw0AFxGwyOnCJ+8Gg4uWY
jIxO1CX8wGLMjU2INTcgvYMzhJxaPLwCsrYp7EdemKoNG26hFNYm4tiNt2kk
7OhElq9kBmTKjLw4NZs1ZMx44esPHMhqYkSlqqK0iDUO6rKQR5bkqwlBuEQa
MZCDCqoQUU28kGQKJ4UvNwiCD2wMinCIvC2lGICIFmKpPoUmGsLr23x0Hexf
G65uwf/Cp6NrkLFUCY+j5CggEAa/JEF2EJjvmkWYwf534/7gAQF3PTz55mwa
Xg6nb8YiPqa+XlUZpAFuDjMiWsNPBdBkCaMr1zWWMs/ygrWXrc7Cpzwue6Bw
Q8GSSyhV5eWmkBAd7FiUrlKulHChGkiXcB0VN5Tq9x5ZdomyocSTDkEN0JW0
nG4jl7sgWNmzES8BZvE5VIpzhXFEa5IWa8PRUh/bgtzHHpQH1SXm87C7HxAH
skQ5B3uMXrED4hVxI4hYH3Is5VNa3kviUgG3QkuUlAhDj2G5ifUGvYYhxXUX
OADV7GLWuVoq0b/2CUDy5QqTT7zXnaAk6UMEPGBYVFTKFmDglpVJYIuDts1v
TNn/CQ9D4YFTsFuPiI9pLRM3YNCddCAKwfIuMbFCzKF1GDxDWKdTARi7aria
2c4+mdEy2InC2oMPoGa6t1bTLmnvLYL3CJFlKKZ8oB4zqXRDIuil9GE/yCyq
KFX/oEFn6wK6dsSpYG61qMfpNRDuEWao8owpH2nNgkhrmzyqUMe27HPeRjpo
LRLVtbFvYPtT6sjqSvIufDNGgwkyA891dW32VkUhJ6jSgEAEYRY1hsq+ZdS1
yo5W4gO2xgMEnVxNvFwOKeZhS0w4d8+zgll5bkCES1WULxWX5NfC054PSCQ8
JmY1omT9HW8jy7TGbmT0Jk8xV1F5U7aJzuNE8NyWgMmUDLK5gtYIraIjOniP
tsA1oY6CvDkykLwDntAMxf2jNX4OBRENwox/V4Q07laxjh0sDHdmabfmQtNf
UphqX/sirOoNF/0J0ICKN9nu0KLHGPZ1hQX+4E2npXMFsfYuL1KwJOi1mrAj
VY6CrqgwsUR2sClvqnxzCIsgMDJ/4Vi5y9YeZZJ0Zg7z0ywNYwVtFEzNOQRl
kWMAg1Ry5Fm8MlzPOsN7xKUjDhVj2F+ONZZkFp9Q4uOzi9Hw5ehiNP0jS5uR
KO8g8YrOktK+gUrBUi5GhDHUmf0kyWuPSQcfsRg63zMzaPRLoVx6Y9kjLxrE
lq+bhg8vVTCE5aHVOeX16lTvp8rq7ErA5kGD9bCMEHbK7M+/YPckzHRPV6Zr
BLSK7RIZ3oHe8PsqH87xwXF+l5Exy+/Bp0b0WAVMELuY2Qb4CZvzwDfq5lOZ
OO76fD6vC3c1LTfcIoqqYcpaaSwwYzW/vbd0z2DhD1ZlEnD2sog2K6xmpDJ2
YtUTjRy9SrebFXfrIJ7oE4FIYTcfPlnnOQqPpb3FMVL/YfcH5MrXaBlSLdoC
zHTPsJlwOX3w0qywWUcUvALuAh+OtiOFMWEIZQsdLaX4srctXOQgiDSiQnYE
lqhZseTkTCl5XknfqiWh7BlwfFLq/ANuRIAYCC340EiFdhBR0UYAiBLzxlT5
ueSJoF/9bmtTml5XCML+nE5OroNZUoGppJZL58vhtrxwWBNO+x5WgqV3KHFf
bHQFTVAScPEUGVe3WN6YbgnW8HBjLlAEPhrDpbApImBrZLRehkpEYXHnLNrg
uwIHa+g/VpQKIgSZQMss0aSkBLuk6puIjiUGYSqXrcemZwUtrAXiC9welxJH
V+S4HaSnxSC4qqswX4TytV6lfi6ny6XwuMR1ovo1jnvNU/jKlUriNC8omX62
WOCKX4MtfZqvURG+FBRLsH9xFlyfvuxr2dwXXxxhPVjURkIE0RpjJuzXs9AC
nT+vLB6GKqMp9hKyzYbUjs0mzbfUR6UUCLIAnzHwQbWuxIh24Uq/SlPWL8Gw
zDZX3nwIKo4fS/EOfFTcA1AcTvivNzgH3ZA//vk/6UqyGqbd6X1LOr5k74/L
Vm04kySIwJPPmLFIDdw/Yqp8ELSW9ZgkTFC2sV5sF3J9N41U+IXG4sK5CUWr
hPbIn7yzhcrqflpcFk3Xvtua6ZGrrd5qoa5zbMH3sNFRpG49Y2gS7fBIG1Fc
GGwzw+j7WCJBYg+ykAHJQSEjv8SY7B7xbjl4A+b7ZxMqYZHLBTyGfI9QoJpa
lFDrqBAY03xGUXDBZzJQkWvuuJgaiWYB7O0pldyUo1EGPbm4QleQN5qtwRZR
RmpQFynLCfQ2AmYyUStQxO4OWl/s1HDFoAWQ2clZv8aoW/m4tMNEkwV3QOcY
qUsESxXFKioFmcJpKjTY56DsdHg6nA7D4cnJm/Hw5I/9tvwNOi9jhh6bGPvb
AR8rlkbqUVHUuIr+kwbm7v7RvPEzBre8agLb0AP5vBZl5bwhy6QKwYlcQ5jI
255uzyADsJFsE0JdXX3EA+M2AHeYJ9IoZJmD2YF9FMgMXRjqTMQYLZ7I1kM0
YzYJrH5JpUlnE61T3+0ro32Dkko9kbJeG/nOYUBxH4GqxWYLTYZqDBRjxoqL
hC91bRa6Nr8mDiCWcnO2EC94x2dDBvw2WmCEXCsmLRmspPYe0VgyB5IdfMY8
Nhldvro4C0++Hl5enl30u/ireQm30cDYBkxCnDol2IQEPHh1CoskiY8xqpYw
11A8S79VJIYdgwlDhvQx4lsfLapxHb1L1vVa9yIlDnfChPAdlwzjBubIMGW2
YwXpkofBb8G4oUfPA/qCC3LwL3amWMMrNFnj1RFnbEhQZs5ca+x6EQs+zLYd
m45AlpaJ5Pxcj62cWtKkXdBzogXwBoHqDuEGbjTk1H6rfOm3o/CU2qeF4PhE
d8sQZF8ZugeG86SY10nF/Vwsm7EK4xHZtWmuSqJNjmYYf15E2AtEzNeHx39A
a2JZlQB9rA/8SIZ0UYIBvUYRYiN7WoRoxyBRcNrDIvI9lexlWdQosThX6aSw
GymQXoPuBaLLUuoTtBREeCu/qTLPRVg1jswdcqRe7mFDSKsnsZALjKt6Yw1C
ghVen74Bb4ZzYX2JIXSUtLH6fFVjo9AKU4UvQXyNkeH3X70c93nHNUwN3tEE
f45bCkY99cnJ1fXZqdU07Ku/1owK1mCALQbq+QfTnF/EIjXuCjbf0BXSpYME
HYkI2QgSyEJ9Xm9w6WlsJG3U43K1rmUPq1cpYGwjOejUlNSWRNfZVbZqRo+a
LlG6AfmqB7SkVDl6pn3vcux8LKljH/7tB7rUvCp6rb4xb5PwPKFyCcxiOREO
O8N7ATw3Irr03JM8EmgGbwZXL5KKjSV50SF3SvHB5F1e2us3F9PRNYjxl1fT
6cXZ5dnJN5OPEHno7cSR3+7r/hE2mfQ7gKF43yngYAuVscO0wVvC3S+hQLst
ikEvUQ+SJXlxlGy3jg7akMRGJFu4SSCK4jx73HhVH8NG1LwIkd1rSgNTqumj
qiVxof+GJqA2OfIDW/D4sKIWmFKrf8xUCo/9BC7ejW0EXHSBt60NGnAtsRiu
8OSMS3IpVGFt15PrM4GOG+mChAU79vJI4SFehI2cPE5/W1VLZKYiIk6jGtwD
ZGSU2inxod0/enU5vAjPvru+mrwZn4Xnw9H48mwyaYkB6T/iohCB13RcRV9H
sHpmrAOCQTXqCWRdEMql0JNrTsFfTYLh9UjCPtdFchuB+7MTTtjwD8CbZztd
PChp3ChG0gr3bTC6vv0CS32QB03p2bHiZkbats7Wf4vkpIB4xKY99sjicSn7
aBZYozTt3o/sjoGeYJJgk0mxFmbUDEQ5WUK9JLVFwLjeIMwGdn4gmibj6TV2
MF2BeVFRPJUat5DcrYtS6mVoM9+6QrM1djKWbUsLaTHzQP7bOkXLSgSSCE8C
9EfptkwQLQf33eZJzMrtBlkZ3rd75YHt5osR162PV7ojvvCALtIehYMnunve
tWEoufPIDgvQcJvEhRe07ZFmnVBwa82jlMlRbx2BcUijTXiJWmbY68Y1aWE7
nYxDr9TdfxBB+RpN4di7luCJBOkZtCdYwgPGKbjWPRKgowguh9algsgkeBMj
E0szryX7xKWSjbSAYiQOvRJP7TCjyqvbGpEF15om7HmDg8mY0sr2xNnvWFBa
iSrsP2jHTYRlWUL8oCEG5EQvR3kQaLO/gA8i4HgOZeoqkAt9tfiwmCKB0TB9
mDeSjB0TZCjaYokpe7zTfcMQiei1fkrIQMMtT42CGCY6z5cZGzSRJr9aAyub
AxNk6HYjoQMy64nVepxmBR0fErF0dRvd9IQ405PrA+wmRYlL3sCs0bRRH+XR
7bS1/aPXeNA+UcumkB8ZK+VcW+yK0kplt7BhLQhgaVyfKFueiykvTJY2hAKY
YC68oOkMaZZcDYIrQvNlPeVljrdKTJ3u3XqVcoo4pPAS2gf2apIRgp5JBLYU
4MEGc26pxy5Ygolu2pXzvCjqTaWZZNjLYHiBK5kXPa+hF2beNnoNcySnSTE2
HHEHSkXvtAcTpZXE0CydkRxJCaaZcWk7D77MIvvGbBnbDKyKNWPW12FILS2j
Jtgjgkdh8NrPrinIxjobyL7rNYN3KOjEEgiLEGeLupxrtaszgjyDDAQX7wgG
Xto2ewhcyVVroHqgluAUDmy3EmMLBJ6+ykn8ywDEsdMxSJtA6T8pYmanSA1p
AJp9RW6CrLP+aOUTNfGk6lsU9p5pJ1Bp7lv4jskYc0i8rLz5dM9AFXniB8lg
Pq6Vs7/UOw3VPBWGpMI0Tioa8AdOIGLrF1GIag9JhFC68m2d9UN98ORttvUH
8i7sY8xhKcyARszhRKBInXnrpDKRwlEoKwMLGGuwgItDSDyPsZUEx6wqmw7F
hITyMrbYw4im2toSL9vseiSYcKX873j07fDkj+Hw9HQ0HV2BjYl1fkNXDi+S
HRmGEbJZ/lAdthvw6Fr3Lb+FrdfR5atw+O3V6HR4eXKGr7lgX54TvZyn8rsq
a4+9z7/SVoRYapvcicGMlJfIXsx5jxvj1+U+EMQkkzr4LBgT++wYxGoWDviq
M2dQNxqEEg4WHdXHnNB63PcAXi6r4b9J6Nh6wSgjk0EQQAjWkuv8NrZsP8y2
uzuETPAJKDt12u8fle7Th16z42QknapZd7qmjmzNcvFw3DIE2c3uKkWFl19r
6b3PB/tUztEPyO2z8ApBfFMRNqcwVMTTA1DzZGapQjGKb0H4Ukyasg4c6yPV
aMfeHDVoSlwKU0qKrNmanCQWl5ns9GKMdGyC/NAd5aLBHsM7gqGA5peXnht1
YzacZ+LNSMrN7woACipfGjYdW54e7pTR5DqcnAwvaH80pvGJKbTp/EvMxcKL
4d4szwQQKQEwauyWZDUz3dx+YJ7T6C+iU8i/6ejQmHCmh5KcTSiOzIEOI7A2
ETto3JJfm9KS60gAaGyGoSjomfSlkM7IiFzKvTATzTTn5HtpH01d0J27yUOQ
yiPnOQHbubstyzVRcPScRVTiFPKijZgWLBYMFtUe90tGBCMjK+zDNT7mVkOF
OwOS4N01Wdlx80Zp8LrAkjLE02N7boLJbprGBjdtb4yIsHk5xX46efPk6nI6
unxDgKTj4Gt9IbdLx7bskdSSuEp1za3LLIRLjO+9CECNU3fULUzjX7O6NNq+
1Sae7x9F+P0HtbIacFPuqWI4mYds0ayY+LVryd3MAcTmNk9vKf8lzDYDfyI0
nPhvZsqwIR+Z+BgWwx1m7XnVMINA+rH7WHYNHkgXW+2BTYQgFA2bTYQfKgR9
zAa31/rWIm3LxGF/PfCgPTrFJtzpBjZCcImIKLRgkRcw5W04T7lLc2nSBW4M
S1khm9cUjyfjPYBN4gzhvBjfWG8qH4cqMek1PPkWU7+deRgJ8duiDtg21Ups
eb/qRSHrqVkm0uw/95yOh1B1EkD7FsyQ0yFaOg7Cq1Hcq4nLP/sGoEqIQ0Hp
usQeh5kYPbWPcLls6zUDjsoynyeq0ZowVW6Lx9gExKNLXoSBlW34JufCSB4g
cgAjOwKOc2hW3M8pmzPStO/QPtQC0aLtoIVn/gg9OojhooroQq2bWGw9XEPJ
pLgHTdDhRZrnobRSoPFa94pMKxQbJlm2SGttk+3j1RZWvniXPy41afUI/Fw2
Ym12tHGCpJckxd4xaiuRN+2awlPCW6DpD+XF/XYXbDYd2qS7zYhaTz5njNKM
AFX6jAO1ALGwt0DMkpUrkpuVLPO7xPh9wcqONlc0DQLxIERC73HJNA8mh78j
hSzykP0oC+MkBwwv0EZYCAS9U3nOrW90VbI5hgRLOYnAtpVB5AI336bcruvQ
QtdZQ+aAFZym8qj3FEKn5LABBBpFZdNH9c8ykG5A1G39xYtfYaeOT7gX+75/
0W9lNHW6djOTG9nlKBx8yjE4aFv+Wm6ZsOkvpODl30e+6X/MDWibt/5qipmv
7OhZ8DYlhnGqhP13rQbp89kwrrXqp+/QsKLr4tXIi+0Cwtx4NQBQ4gJIiYpc
RNA5G9dikoswSTLS0Jx7v7+ns4TcXTCccyFqYyMwuImYVAqOS3WHG6gF7boK
tg/75QzC0lMZPJ9/d6f7xDrwKek/2F3yQH5HcNiTs4tzFsTXgu92JSRUpqU1
pNqPTK4ipQ2PvkTMbOt5ulmxwGmXRDC5+3tN1XwIjCtp7g4PKNYX6K9de6x0
vX/UWBe8kvJDUosidDnn1AmlNEMuPacTl0xBPfJUvMPtJ43mxBwAkTCbYOiI
W3G34acWeEGhT31XESqJ5XaNkm/eAD0+s+oMb/+sVW4lL1X8Naf/Sj0xtN7E
5KD58BeXWWvXpXKFlOgweazFHGmAE2tTDm3jXa4LxJNVmhXY5qFj4Hha5JG2
ogdN+0tbOaHjtB+bsN8w3jAIYp+ExjGme/P1Oo/9g8Js4qPjUJWSV8TSVQ7u
wZBR1IBbyYltLu/nSqyscPIaQh4oVHxjNFtjo+AR5Rk45CuQMUmaewoPT90x
XuFJ42V4Slh0IyROlEm6mOhOhUnrCbr67bvElSXbn9uJk+4oyYzzSB1IaaRv
kZOcwaHhEzGyDnfDRyl6k/2G9yVas2EUXQ5kt+Z3w4Bs9Dw+4PNlGuV4ZNs5
mx9v97p1uy54rsjblp+zTe8fX4PxUPzStcLz7Pk212j2fyAVd95yUx0vpvmI
UDbxQGfPZDDlAdd3yAi4l5vnWKiJ7JW3WKwKOfNerlNgoeo98UUPQcMOvOQ+
PONieKmKWiBwCCmQs+waWEVB1TPyzTlYjMLHRAoV7sGPvIeo9oMB02SNR0mR
KeBD3AGVnjhDaZphh89Ubci3RHxXh1rwfNQIN2eFNhvTQXis3Ua+pJiMq8mr
3G1ptKWc+nYTUTnVLuYDXgfyxxc/+vQmX5DulTnueAGWb5y84fxVnVka2Rwm
hmddJAXf5p22BbSvZynxSAYrjCKF4wIUosF0AlpkLCMofICCsSapQP007W44
EPxruUkqd4gSWk/NHK94fq6ffmI1ZZMwPMCGNqdc9adAbjDefycnlAfSqsOK
P6/NJbYiCT1YOvl86MRQsIhQk4qc9Zqo8jislrbuIZ3zzpEdzyawOMBzmt2I
TnA8dzaBnOfoGwV+CRW1xjjkFh6riKNpsE4mk/oN/zAjd+SX8M6b02uGgzVI
787Zez74cnDE9hE+5cvPv/yV5CEYBXMbgVeKt/jngPqS9BbPZNCabFp7yglQ
Q4vH5U55KyqDd0ReakpAY5xi5RAeooeiYZ0suUVuLvAGOQZM1EdSqiqgVrwE
JvOrAL2DjMTzOTp6hjPy0al4kq+9EC3rgAvdOp8DtLEF53j4Uq59b1iGsEsw
l2x+47RU9n+sArU5WOlvwSFF2tNeW6nuI8IOuPsyeZvqFmKrYXdW1lLKh3er
ykRzeJ5Ley1Z61sbot255TUmB5n5rYEU8yGMWrBuVGMoAEkCn1ix4DUu4uzq
AQMNdu7dULsIVizYYuCgYSISjQ7oIvQc6WLtHzHmGUvNJcugk9NLUj21tMQU
y7f10gzTeILDssEcnNlNht05Z9x7y0Ps2hMvWGwRdJ8RshJHogwUNm+xmCzb
F8jmR7ts0lLQIEbbU6xArDGuh/LhWd5K+dOKoMmqCydk9EyH/13mJwejxU+j
oDsJ8qY1h5Yf5W+RY71gYQ5PWmuSwsYwVG0Memd292sjqGZpshcJp6qKLkvS
yrOsuUd9PLVtsNM8LqOgjlqqxHXR6kwJoEdct7sLaUexnWBtsBPKosPL/C4G
rDAtBtC1eBjs3pxyqN6KBF4dlh04RJw5+7Piyobo1/r+rMyJjC3xZ4dlyY+9
WizQAfTDhhwK2QdtAtcoQHwvwxBXutfRsdnC2nt8gF5liyu8VnLOb2NMXmnM
DW8IbE1OWA4ZSen1M1fL1h31Vmq5LoobBmcjSMo/oadX+UWf28eoH3ehoL7Z
0s44lD3bOh0VWLqVAyhJ+FJ+yM3evFsB3wMp+96xhpSg7mGg1YXGNibH99uD
tLE7OsgXZGECAuKs+Gxs+5yeNvLilyoFYbsjVklNdO6VTP/mX1DfSSYOH9WL
XF9nBh0hvChjN/vho398uE5PnZcGGh0jVspzILHpd/84WCAayDeyvP1TzG0z
eVmnnh9btT6C7zJZokmj45U7ulOmwvHd8qAnXOT4rc/lSZdn07dX42/CydnZ
N5Pw4mp4Gp5evb3sD3g/aBTInfT6b+13VPNwoVHcax0f7Ksi3Xz4ZU6H1VPa
2Zj/SLt4yWxRtxx3Zi5ZVDbQLOd0t4qVd05fdCCmjx+pRKj+2fdU5pzTq0Iu
B9al0kp0u3Rylx8/t79ZtLHUXUfN3Apt4UbHw45REWzMwiMp4IknEeSZTcGK
07nxIsMtAd41Fu+AMq8GGWNrKAWQrVzztCg4Pc0ngtzzDifoaGvl89/06/HV
m1dfX7+ZYvoZG0E1zqOXo2tX/vZzmVt7XgWBroDz+QBUwp75KEuviU6jLToN
ZHxxrbAMfXKJ7p2kMdymE/qPG7yltOvoenHtHTR3xeAYosgxd5RrNr4Ry56E
Pd5Fmt4VngkEnjWgPT4cK0a8XzDSzv4QHvctqD2HkccAAG0yDlawcTJ8OfYP
lpDIRmFQNDkV03g9V0w0Txcu2ZlR26Bdo+afuUcFvAr1cGd3elmqrFxgW42J
y8S5A/yYC6Smj8HkDDWsFB0/94+F9bCD7mgB7Q+iPZaGcbSpZGneKq7DZfh4
OSwbMCCu44zkA3cNnWS8W+yMFqabpPRflAPtJehjT4IYK9rvTQWzVc75JuNw
XNcRzUhQf5xaj+npZtebkV74+QCcbdBUCDUjZvBY8jg4SfM61sYF7fNnI7wP
QWle2XbHoOg1LwZNnXEcvObjJpgYVDpE+m3H7rBteaMyoaMZ53y+yWzbdrTp
IGgyD+b4hAMpWFJnZL7K85KskzkXQWF3SjwmQQ+yEIBLklHLXxw/9RuJqvnK
4on1VFq0/zRToN1qPMADNaEoGzkoOnEF+ciCpPn7pkgH39GtJhtrCs6ihFpH
aqaVamPl3YrMUucWhASdu/anEzkC8P7ROq6lGDdMYnjAOVAYm07ZykUc/NnJ
5eHF5xN1lbX77ZvTa2nA21c3EhFSoEC4ZZR/TIztDkG6mf0ayy8WIzaPwCvB
9VCR3TziGNbYO+WDzxzmKBcer77/T8Ez0DwpeAgGLTxQPactz189Mgn+UhOX
OfWvsDlhhTBx1L/M09qPyMWNCvhG/07bIopJHKFUcU2PuQlpHnsGiZ6rrAKa
BC+aMBaC4ckuOYeEtGnrrG2BjUtTT+8skcWDA/Rre6uPHaHcPLXEYkSnO9DZ
zBKugWPMBVQvGBbYoGhfMGpcGp00cjkc0RaspRv8AGw1a6RrpXK7I+MDA7Dg
I8RKSX2QnvLjkFOcr9udmT2/6KGnShr9IUq7g3/s6WA5ycX/u7uWoWlEDZXD
yXQ4JuPMthCTuIdXbkEL2+K3gf+Q16PTU4a/fuQp6ySOU7MPPvZHnnR2efqJ
xxgujGs+oFsuajukKbaS0i7jeNBTagsDkFJ+0e79I7kJ7/nQcxIm4Hq+Q9tG
z2+2h5BFz6pvNNLzYFNzhYVqXPaw2d24GeLFpmeHXY3aSCO12mO1t7zLxBzO
apyCO4bdHiMm7YrclXo0ESGoNkXiFqB8oIuYQ7h5+HDPHOSx/tydXHXML6Ez
47RXrdeDqBmM6m7Gd7DbN89vuMWn0DZaKn4QprLS2KY/7h9p0t7PcIy7E/kN
KeeETQMSx7BCbAmVtbY3I1XytgDyOjFoJWWLyKLBvbamfux+7hl1TqRowU+S
7cgZ8Ugiuo2zgWKgyeESnZ37BCgBD17hO2O58ZpvAe09cuMRF1q51w5cD1vz
0IONkSUqZTFw+q5CNvAPGZO5tAXv4JPrJWKVAUcfXytVOf5iyXfeUQ3BfrO/
4OhaBQQQYlj6ZxFo2/rkZ5PnX02NqRdP9vHPFg1r2xwmfiibdsjUt0xOSYXd
PyJV5vp//X/ZXL03AYEHzgjaK6Wbp2+D/atmZ1kKZHEhTWN3hr+2Y2k8HUaF
7/4liPyThvELUPH/SIf60W5Xhbk76FGLCB8wthorS26mzKqrHIa7vzmrXfWp
VGby6Ta4izXoT/W+5NS6nSuuULcdd3p2MfxjOL26OBtTkd4vrgNfUqX5yB2C
ef+Iis+x77BXimZ7hHO9GqV7MsTuEn7GnodbsivPHWq5m0LbYfI9KukdrMja
kuBGYt/t+k8MuObYlvZBGWAvC/bMELLkJV+pXRE1Ks5jW1pFK5aRN8qVQrSu
XG1f2sJ229lCbHgeqHC6+sI55wEiB/MrqVMrqt66ssb5tPl8rCjxWxdYvjqw
RVI0vplxisCCS8U6dkN2Htig93annEueLmBGid1xkSbNz4suaf7XthJzI6ZI
nVb7RYJ8EFyDnjO8ybG/sQt2cRy/mVzCN0RJSvtBSwKFzL7Z6L9ZWgyaZcJd
XRpzr/yzhbUXRsF5OJ6edzarGwYlvjjaqC3U8zxYmDv/3FaqDIrc/CI39P6g
PXLCLEi0W1ZIRsin8HT4oEpuphG8YJkzVKlMjdlQv6Zg/8TC017jZ3RtuFoL
EyFjMzcbzoKdhKfj77TLj9X0G8bZr/GQr6W6YS/fjCfTcHR5OjoZTq/G6Iyd
KJzbHUSRlHKARIsdqrw3mlzzzsK+T4LOlk6ActItRwLsIg6CYJ/wMtybCC6H
O3siP+PcoT7plt8Glx40wcGA6JSnf9PHCpLLPAtbRSMZfMX1Ir6zt9BgmFhf
XhTcC1ykiiBoFfHRwoJ+mXcEwFz9qu3GtNvIp6MKhOIm0mXM+kWSbTGi1LRf
yU9qR0LorWA0vBzuNvtJoiz60LuUIlFEUXFDlJ0LSzMnUBkadO2uKYs2joPK
ypqN9CxUnWfsl53w0eJeZQgXghw0Csm9OhEpHNHu9raJy7w5ZtrBhQks0kAV
XOPgaW0/ZQF0YlGIEd/9bKLVcI6AmtTEZPqUvftjLnE28W/2FrDbzd6H9rMJ
oEmnJQg+DfFbxd2sCKvy9m4ZWjxLCAZ2SHa8mzleexMlmw3IMywoTVK5i3RW
uIqLUC0PmlZrfBwE+7nPwb3/HTAv0OLUBOe565bNyJ/ScRtYDNJRzC09MSWb
yNw7gfaQWGRz077bbvPX+R/kKyrfUuuTtbNz/DmnpyO5I6OPGo9mN8FrbFzy
tYkKsBgnBrzWCngdHmzSVIo/pkCPr00BS8avkWErCtX13UtMGoMzBjYgkdKh
oTXf7PUH4i3RHhpGUwzXFPKxLLQYr6MCa71G6SriEb2Olhl88RaTnEWKJnau
qSqBHwusy/bWyGzBNnXohxmeFjV31LAQ0IjwnXnmD3Ne4HGNOn5tsmyzozYv
R0a5dn4a9MY1rMASnvnKJDPQnMsl52NJnNuMKbEHtcIi7MnPLH2/Qd3Gh+Ms
vJo1raTGYtIBhQeXZg10+30Oy12WVEAoA9IVpEzFgms99jltiikOKZjnmiXg
MhzVnA2ORsG7pFJLZmqCp2ICTgAejUhVUpY1H3cJrEez+Brs12CySpwSN7CL
7qS5scBtc67bQijJDun9h12APwMMvawNtX8HF6SIWOyuqGHNzpNh+4dhSL5a
738AEjS+WYqrAAA=

-->

</rfc>
