<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.8 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-panrg-what-not-to-do-15" category="info" submissionType="IRTF" obsoletes="" updates="" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.45.2 -->
  <front>
    <title abbrev="What Not To Do">Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-panrg-what-not-to-do-15"/>
    <author initials="S." surname="Dawkins" fullname="Spencer Dawkins" role="editor">
      <organization>Tencent America</organization>
      <address>
        <email>spencerdawkins.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2020" month="December" day="29"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>PAN</keyword>
    <abstract>
      <t>At the first meeting of the Path Aware Networking Research Group, the research group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for path-aware networking researchers.</t>
      <t>This document contains that catalog and analysis.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>This document describes the lessons that IETF participants have learned (and learned the hard way) about Path Aware Networking over a period of several decades, and provides an analysis of reasons why various Path Aware Networking techniques have seen limited or no deployment.</t>
      <section anchor="PANdef" numbered="true" toc="default">
        <name>What Does "Path Awareness" Mean in this Document?</name>
        <t>The current definition of "Path Awareness", used by the Path Aware Networking Research Group, appears in Section 1.1 ("Definition") in <xref target="I-D.irtf-panrg-questions" format="default"/>. That definition is included here as a convenience to the reader.</t>
        <blockquote>
   For purposes of this document, "path aware networking" describes
   endpoint discovery of the properties of paths they use for
   communication, and endpoint reaction to these properties that affects
   routing and/or transmission; note that this can and already does
   happen to some extent in the current Internet architecture.
   Expanding on this definition, a "path aware internetwork" is one in
   which endpoint discovery of path properties and endpoint selection of
   paths used by traffic exchanged by the endpoint are explicitly
   supported, regardless of the specific design of the protocol features
   which enable this discovery and selection.
</blockquote>
        <t>Because this document reflects work performed over several decades, some technologies described in <xref target="Contributions" format="default"/> may not reflect the current definition, but these technologies were considered "path aware" by their contributors, so these contributions are included in this retrospective document.</t>
      </section>
      <section anchor="note-to-rfc-editor" numbered="true" toc="default">
        <name>Note to RFC Editor</name>
        <t>If the "Definition" in Section 1.1 ("Definition") of <xref target="I-D.irtf-panrg-questions" format="default"/> changes, the text in <xref target="PANdef" format="default"/> of this document should be should be changed as well.</t>
        <t>Whether that happens or not, the RFC Editor is requested to remove this section.</t>
      </section>
    </section>
    <section anchor="perspective" numbered="true" toc="default">
      <name>A Perspective On This Document</name>
      <t>At the first meeting of the Path Aware Networking Research Group <xref target="PANRG" format="default"/>, at IETF 99 <xref target="PANRG-99" format="default"/>, Olivier Bonaventure led a discussion of "A Decade of Path Awareness" <xref target="PATH-Decade" format="default"/>, on attempts, which were mostly unsuccessful for a variety of reasons, to exploit Path Aware techniques and achieve a variety of goals over the past decade. At the end of that discussion, two things were abundantly clear.</t>
      <ul spacing="normal">
        <li>The Internet community has accumulated considerable experience with many Path Aware techniques over a long period of time, and</li>
        <li>Although some path aware techniques have been deployed (for example, Differentiated Services, or DiffServ <xref target="RFC2475" format="default"/>), most of these techniques haven't seen widespread adoption and deplyment. Even "successful" techniques like DiffServ can face obstacles that prevents wider usage. The reasons for non-adoption and limited adoption and deployment are many, and are worthy of study.</li>
      </ul>
      <t>The meta-lessons from that experience were</t>
      <ul spacing="normal">
        <li>Path aware networking has been more Research than Engineering, so establishing an IRTF Research Group for Path Aware Networking is the right thing to do <xref target="RFC7418" format="default"/>.</li>
        <li>Analyzing a catalog of past experience to learn the reasons for non-adoption would be a great first step for the Research Group.</li>
      </ul>
      <t>Allison Mankin, as IRTF Chair, officially chartered the Path Aware Networking Research Group in July, 2018.</t>
      <t>This document contains the analysis performed by that research group (<xref target="LessonsLearned" format="default"/>), based on that catalog (<xref target="Contributions" format="default"/>).</t>
      <t>This document represents the consensus of the Path Aware Networking Research Group.</t>
      <section anchor="notes-for-the-reader" numbered="true" toc="default">
        <name>Notes for the Reader</name>
        <t>This Informational document discusses Path Aware protocol mechanisms considered, and in some cases standardized, by the Internet Engineering Task Force (IETF), and considers Lessons Learned from those mechanisms. The intention is to inform the work of protocol designers, whether in the IRTF, the IETF, or elsewhere in the Internet ecosystem.</t>
        <t>As an Informational document published in the IRTF stream, this document has no authority beyond the quality of the analysis it contains.</t>
      </section>
      <section anchor="a-note-about-path-aware-techniques-included-in-this-document" numbered="true" toc="default">
        <name>A Note About Path-Aware Techniques Included In This Document</name>
        <t>This document does not catalog every proposed path aware networking technique that was not adopted and deployed. Instead, we limited our focus to technologies that passed through the IETF community, and still identified enough techniques to provide background for the lessons included in <xref target="LessonsLearned" format="default"/> to inform researchers and protocol engineers in their work.</t>
        <t>No shame is intended for the techniques included in this document. As shown in <xref target="LessonsLearned" format="default"/>, the quality of specific techniques had little to do with whether they were deployed or not. Based on the techniques cataloged in this document, it is likely that when these techniques were put forward, the proponents were trying to engineer something that could not be engineered without first carrying out research. Actual shame would be failing to learn from experience, and failing to share that experience with other networking researchers and engineers.</t>
      </section>
      <section anchor="venue-for-discussion-of-this-document" numbered="true" toc="default">
        <name>Venue for Discussion of this Document</name>
        <t>(RFC Editor: please remove this section before publication)</t>
        <t>Discussion of specific contributed experiences and this document in general should take place on the PANRG mailing list.</t>
      </section>
      <section anchor="architectural-guidance" numbered="true" toc="default">
        <name>Architectural Guidance</name>
        <t>As background for understanding the Lessons Learned contained in this document, the reader is encouraged to become familiar with the Internet Architecture Board's documents on "What Makes for a Successful Protocol?" <xref target="RFC5218" format="default"/> and "Planning for Protocol Adoption and Subsequent Transitions" <xref target="RFC8170" format="default"/>.</t>
        <t>Although these two documents do not specifically target path-aware networking protocols, they are helpful resources for readers seeking to improve their understanding of considerations for successful adoption and deployment of any protocol. For example, the Basic Success Factors described in Setion 2.1 of <xref target="RFC5218" format="default"/> are helpful for readers of this document.</t>
        <t>Because there is an economic aspect to decisions about deployment, the IAB Workshop on Internet Technology Adoption and Transition <xref target="ITAT" format="default"/> report <xref target="RFC7305" format="default"/> also provides food for thought.</t>
        <t>Several of the Lessons Learned in <xref target="LessonsLearned" format="default"/> reflect considerations described in <xref target="RFC5218" format="default"/>, <xref target="RFC7305" format="default"/>, and <xref target="RFC8170" format="default"/>.</t>
      </section>
      <section anchor="terminology-used-in-this-document" numbered="true" toc="default">
        <name>Terminology Used in this Document</name>
        <t>The terms Node and Element in this document have the meaning defined in <xref target="PathProp" format="default"/>.</t>
      </section>
      <section anchor="TemplateContributions" numbered="true" toc="default">
        <name>Methodology for Contributions</name>
        <t>This document grew out of contributions by various IETF participants with experience with one or more Path Aware Networking techniques.</t>
        <t>There are many things that could be said about the Path Aware networking techniques that have been developed. For the purposes of this document, contributors were requested to provide</t>
        <ul spacing="normal">
          <li>the name of a technique, including an abbreviation if one was used</li>
          <li>if available, a long-term pointer to the best reference describing the technique</li>
          <li>a short description of the problem the technique was intended to solve</li>
          <li>a short description of the reasons why the technique wasn't adopted</li>
          <li>a short statement of the lessons that researchers can learn from our experience with this technique.</li>
        </ul>
      </section>
    </section>
    <section anchor="applying" numbered="true" toc="default">
      <name>Applying the Lessons We've Learned</name>
      <t>The initial scope for this document was roughly "what mistakes have we made in the decade prior to <xref target="PANRG-99" format="default"/>, that we shouldn't make again". Some of the contributions in <xref target="Contributions" format="default"/> predate the initial scope. The earliest Path-Aware Networking technique referred to in <xref target="Contributions" format="default"/> is <xref target="ST2" format="default"/>, published in the late 1970s. Given that the networking ecosystem has evolved continuously, it seems reasonable to consider how to apply these lessons.</t>
      <t>The PANRG Research Group reviewed the Lessons Learned (<xref target="LessonsLearned" format="default"/>) contained in the May 23, 2019 version of this document at IETF 105 <xref target="PANRG-105-Min" format="default"/>, and carried out additional discussion at IETF 106 <xref target="PANRG-106-Min" format="default"/>. <xref target="thefuture" format="default"/> provides the "sense of the room" about each lesson after those discussions. The intention is to capture whether a specific lesson seems to be</t>
      <ul spacing="normal">
        <li>"Invariant" - well-understood and is likely to be applicable for any proposed Path Aware Networking solution.</li>
        <li>"Variable" - has impeded deployment in the past, but might not be applicable in a specific technique. Engineering analysis to understand whether the lesson is applicable is prudent.</li>
        <li>"Not Now" - this characteristic tends to turn up a minefield full of dragons, and prudent network engineers will wish to avoid gambling on a technique that relies on this, until something significant changes</li>
      </ul>
      <table anchor="thefuture" align="center">
        <thead>
          <tr>
            <th align="left">Lesson</th>
            <th align="left">Category</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Justifying Deployment (<xref target="JustifyingDeployment" format="default"/>)</td>
            <td align="left">Invariant</td>
          </tr>
          <tr>
            <td align="left">Providing Benefits for Early Adopters (<xref target="EarlyAdopters" format="default"/>)</td>
            <td align="left">Invariant</td>
          </tr>
          <tr>
            <td align="left">Providing Benefits during Partial Deployment (<xref target="PartialDeployment" format="default"/>)</td>
            <td align="left">Invariant</td>
          </tr>
          <tr>
            <td align="left">Outperforming End-to-end Protocol Mechanisms (<xref target="Outperforming" format="default"/>)</td>
            <td align="left">Variable</td>
          </tr>
          <tr>
            <td align="left">Paying for Path Aware Techniques (<xref target="Paying" format="default"/>)</td>
            <td align="left">Invariant</td>
          </tr>
          <tr>
            <td align="left">Impact on Operational Practices (<xref target="OperationalImpact" format="default"/>)</td>
            <td align="left">Invariant</td>
          </tr>
          <tr>
            <td align="left">Per-connection State (<xref target="Per-connectionState" format="default"/>)</td>
            <td align="left">Variable</td>
          </tr>
          <tr>
            <td align="left">Keeping Traffic on Fast-paths (<xref target="Fast-paths" format="default"/>)</td>
            <td align="left">Variable</td>
          </tr>
          <tr>
            <td align="left">Endpoints Trusting Intermediate Nodes (<xref target="EndpointsTrustingIDs" format="default"/>)</td>
            <td align="left">Not Now</td>
          </tr>
          <tr>
            <td align="left">Intermediate Nodes Trusting Endpoints (<xref target="IDsTrustingEndpoints" format="default"/>)</td>
            <td align="left">Not Now</td>
          </tr>
          <tr>
            <td align="left">Reacting to Distant Signals (<xref target="ReactionTimes" format="default"/>)</td>
            <td align="left">Variable</td>
          </tr>
          <tr>
            <td align="left">Support in Endpoint Protocol Stacks (<xref target="ProtocolStackSupport" format="default"/>)</td>
            <td align="left">Variable</td>
          </tr>
        </tbody>
      </table>
      <t>"Justifying Deployment", "Providing Benefits for Early Adopters", "Paying for Path Aware Techniques", and "Impact on Operational Practice" were considered to be invariant - the sense of the room was that these would always be considerations for any proposed Path Aware Technique.</t>
      <t>"Providing Benefits During Partial Deployment" was added after IETF 105, during research group last call, and is also considered to be invariant.</t>
      <t>For "Outperforming End-to-end Protocol Mechanisms", there is a trade-off between improved performance from Path Aware Techniques and additional complexity required by some Path Aware Techniques.</t>
      <ul spacing="normal">
        <li>For example, if you can obtain the same understanding of path characteristics from measurements obtained over a few more round trips, endpoint implementers are unlikely to be eager to add complexity, and many attributes can be measured from an endpoint, without assistance from intermediate nodes.</li>
      </ul>
      <t>For "Per-connection State", the key questions discussed in the research group were "how much state" and "where state is maintained".</t>
      <ul spacing="normal">
        <li>IntServ (<xref target="IntServ" format="default"/>) required state at every intermediate node for every connection between two endpoints. As the Internet ecosystem has evolved, carrying many connections in a tunnel that appears to intermediate nodes as a single connection has become more common, so that additional end-to-end connections don't add additional state to intermediate nodes between tunnel endpoints. If these tunnels are encrypted, intermediate nodes between tunnel endpoints can't distinguish between connections, even if that were desirable.</li>
      </ul>
      <t>For "Keeping Traffic on Fast-paths", we noted that this was true for many platforms, but not for all.</t>
      <ul spacing="normal">
        <li>For backbone routers, this is likely an invariant, but for platforms that rely more on general-purpose computers to make forwarding decisions, this may not be a fatal flaw for Path Aware Networking techniques.</li>
      </ul>
      <t>For "Endpoints Trusting Intermediate Nodes" and "Intermediate Nodes Trusting Endpoints", these lessons point to the broader need to revisit the Internet Threat Model.</t>
      <ul spacing="normal">
        <li>We noted with relief that discussions about this were already underway in the IETF community at IETF 105 (see the Security Area Open Meeting minutes <xref target="SAAG-105-Min" format="default"/> for discussion of <xref target="I-D.arkko-arch-internet-threat-model" format="default"/> and <xref target="I-D.farrell-etm" format="default"/>), and the Internet Architecture Board has created a mailing list for continued discussions (<xref target="model-t" format="default"/>), but we recognize that there are Path Aware Networking aspects of this effort, requiring research.</li>
      </ul>
      <t>For "Reacting to Distant Signals", we noted that not all attributes are equal.</t>
      <ul spacing="normal">
        <li>If an attribute is stable over an extended period of time, is difficult to observe via end-to-end mechanisms, and is valuable, Path Aware Techniques that rely on that attribute to provide a significant benefit become more attractive.</li>
        <li>Analysis to help identify attributes that are useful enough to justify deployment of Path Aware techniques that make use of those attributes would be helpful.</li>
      </ul>
      <t>For "Support in Endpoint Protocol Stacks", we noted that Path Aware applications must be able to identify and communicate requirements about path characteristics.</t>
      <ul spacing="normal">
        <li>The de-facto sockets API has no way of signaling application expectations for the network path to the protocol stack.</li>
      </ul>
    </section>
    <section anchor="LessonsLearned" numbered="true" toc="default">
      <name>Summary of Lessons Learned</name>
      <t>This section summarizes the Lessons Learned from the contributed subsections in <xref target="Contributions" format="default"/>.</t>
      <t>Each Lesson Learned is tagged with one or more contributions that encountered this obstacle as a significant impediment to deployment. Other contributed techniques may have also encountered this obstacle, but this obstacle may not have been the biggest impediment to deployment for those techniques.</t>
      <t>It is useful to notice that sometimes an obstacle might impede deployment, while at other times, the same obstacle might prevent adoption and deployment entirely. The research group discussed distinguishing between obstacles that impede and obstacles that prevent, but it appears that the boundary between "impede" and "prevent" can shift over time - some of the Lessons Learned are based on both Path Aware techniques that were not deployed, and Path Aware techniques that were deployed, but were not deployed widely or quickly. See <xref target="Shim6" format="default"/> and <xref target="Addendum-MP-TCP" format="default"/> as one example of this shifting boundary.</t>
      <section anchor="JustifyingDeployment" numbered="true" toc="default">
        <name>Justifying Deployment</name>
        <t>The benefit of Path Awareness must be great enough to justify making changes in an operational network. The colloquial U.S. American English expression, "If it ain't broke, don't fix it" is a "best current practice" on today's Internet. (See <xref target="Quick-Start" format="default"/>, <xref target="TRIGTRAN" format="default"/>, and <xref target="Source-Quench" format="default"/>, in addition to <xref target="RFC5218" format="default"/>).</t>
      </section>
      <section anchor="EarlyAdopters" numbered="true" toc="default">
        <name>Providing Benefits for Early Adopters</name>
        <t>Providing benefits for early adopters can be key - if everyone must deploy a technique in order for the technique to provide benefits, or even to work at all, the technique is unlikely to be adopted widely or quickly. (See <xref target="IntServ" format="default"/> and <xref target="Quick-Start" format="default"/>, in addition to <xref target="RFC5218" format="default"/>).</t>
      </section>
      <section anchor="PartialDeployment" numbered="true" toc="default">
        <name>Providing Benefits During Partial Deployment</name>
        <t>Some proposals require that all path elements along the full length of the path must be upgraded to support a new technique, before any benefits can be seen. This is likely to require coordination between operators who control a subset of path elements, and between operators and end users if endpoint upgrades are required. If a technique provides benefits when only a part of the path has been upgraded, this is likely to encourage adoption and deployment. (See <xref target="IntServ" format="default"/> and <xref target="Quick-Start" format="default"/>, in addition to <xref target="RFC5218" format="default"/>).</t>
      </section>
      <section anchor="Outperforming" numbered="true" toc="default">
        <name>Outperforming End-to-end Protocol Mechanisms</name>
        <t>Adaptive end-to-end protocol mechanisms may respond to feedback quickly enough that the additional realizable benefit from a new Path Aware mechanism that tries to manipulate nodes along a path, or observe the attributes of nodes along a path, may be much smaller than anticipated (<xref target="Quick-Start" format="default"/> and <xref target="TRIGTRAN" format="default"/>).</t>
      </section>
      <section anchor="Paying" numbered="true" toc="default">
        <name>Paying for Path Aware Techniques</name>
        <t>"Follow the money." If operators can't charge for a Path Aware technique to recover the costs of deploying it, the benefits to the operator must be really significant. Corollary: If operators charge for a Path Aware technique, the benefits to users of that Path Aware technique must be significant enough to justify the cost. (See <xref target="ST2" format="default"/>, <xref target="IntServ" format="default"/>, and <xref target="TRIGTRAN" format="default"/>).</t>
      </section>
      <section anchor="OperationalImpact" numbered="true" toc="default">
        <name>Impact on Operational Practices</name>
        <t>Impact of a Path Aware technique requiring changes to operational practices can affect how quickly or widely a promising technique is deployed. The impacts of these changes may make deployment more likely, but often discourage deployment. (See <xref target="Shim6" format="default"/>, including <xref target="Addendum-MP-TCP" format="default"/>).</t>
      </section>
      <section anchor="Per-connectionState" numbered="true" toc="default">
        <name>Per-connection State</name>
        <t>Per-connection state in intermediate nodes has been an impediment to adoption and deployment in the past, because of added cost and complexity. Often, similar benefits can be achieved with much less finely-grained state. This is especially true as we move from the edge of the network, further into the routing core (See <xref target="ST2" format="default"/> and <xref target="IntServ" format="default"/>).</t>
      </section>
      <section anchor="Fast-paths" numbered="true" toc="default">
        <name>Keeping Traffic on Fast-paths</name>
        <t>Many modern platforms, especially high-end routers, have been designed with hardware that can make simple per-packet forwarding decisions ("fast-paths"), but have not been designed to make heavy use of in-band mechanisms such as IPv4 and IPv6 Router Alert Options (RAO) that require more processing to make forwarding decisions. Packets carrying in-band mechanisms are diverted to other processors in the router with much lower packet processing rates. Operators can be reluctant to deploy techniques that rely heavily on in-band mechanisms because they may significantly reduce packet throughput. (See <xref target="NSIS" format="default"/>).</t>
      </section>
      <section anchor="EndpointsTrustingIDs" numbered="true" toc="default">
        <name>Endpoints Trusting Intermediate Nodes</name>
        <t>If intermediate nodes along the path can't be trusted, it's unlikely that endpoints will rely on signals from intermediate nodes to drive changes to endpoint behaviors. (See <xref target="TRIGTRAN" format="default"/>, <xref target="Source-Quench" format="default"/>). We note that "trust" is not binary - one, low, level of trust applies when a node issuing a message can confirm that it has visibility of the packets on the path it is seeking to control <xref target="RFC8085" format="default"/> (e.g., an ICMP message included a quoted packet from the source). A higher level of trust can arise when an endpoint has established a short term, or even long term, trust relationship with network nodes.</t>
      </section>
      <section anchor="IDsTrustingEndpoints" numbered="true" toc="default">
        <name>Intermediate Nodes Trusting Endpoints</name>
        <t>If the endpoints do not have any trust relationship with the intermediate nodes along a path, operators have been reluctant to deploy techniques that rely on endpoints sending unauthenticated control signals to routers. (See <xref target="IntServ" format="default"/> and <xref target="NSIS" format="default"/>. We also note this still remains a factor hindering deployment of DiffServ).</t>
      </section>
      <section anchor="ReactionTimes" numbered="true" toc="default">
        <name>Reacting to Distant Signals</name>
        <t>Because the Internet is a distributed system, if the distance that information from distant path elements travels to a Path Aware host is sufficiently large, the information may no longer accurately represent the state and situation at the distant host or elements along the path when it is received locally. In this case, the benefit that a Path Aware technique provides will be inconsistent, and may not always be beneficial. (See <xref target="Quick-Start" format="default"/>).</t>
      </section>
      <section anchor="ProtocolStackSupport" numbered="true" toc="default">
        <name>Support in Endpoint Protocol Stacks</name>
        <t>Just because a protocol stack provides a new feature/signal does not mean that applications will use the feature/signal. Protocol stacks may not know how to effectively utilize Path-Aware techniques, because the protocol stack may require information from applications to permit the technique to work effectively, but applications may not a-priori know that information. Even if the application does know that information, the de-facto sockets API has no way of signaling application expectations for the network path to the protocol stack. In order for applications to provide these expectations to protocol stacks, we need an API that signals more than the packets to be sent. (See <xref target="ST2" format="default"/> and <xref target="IntServ" format="default"/>).</t>
      </section>
    </section>
    <section anchor="Futures" numbered="true" toc="default">
      <name>Future Work</name>
      <t>By its nature, this document has been retrospective. In addition to considering how the Lessons Learned to date apply to current and future Path Aware networking proposals, it's also worth considering whether there is deeper investigation left to do.</t>
      <ul spacing="normal">
        <li>We note that this work was based on contributions from experts on various Path Aware networking techniques, and all of the contributed techniques involved unicast protocols. We didn't consider how these lessons might apply to multicast, and, given anecdotal reports at the IETF 109 MOPS working group meeting of IP multicast offerings within data centers at one or more cloud providers (<xref target="MOPS-109-Min" format="default"/>), it might be useful to think about path awareness in multicast, before we have a history of unsuccessful deployments to document.</li>
        <li>
          <t>The question of whether a mechanism supports admission control, based on either endpoints or applications, is associated with Path Awareness. One of the motivations of IntServ and a number of other architectures (e.g. Deterministic Networking, <xref target="RFC8655" format="default"/>) is the ability to "say no" to an application based on resource availability on a path, before the application tries to inject traffic onto that path and discovers the path does not have the capacity to sustain enough utility to meet the application's minimum needs. The question of whether admission control is needed comes up repeatedly, but we have learned a few useful lessons that, while covered implicitly in some of the lessons learned of the document, might be explained explicitly:  </t>
          <ul spacing="normal">
            <li>We have gained a lot of experience with application-based adaptation since the days where applications just injected traffic in-elastically into the network. Such adaptations seem to work well enough that admission control is of less value to these applications</li>
            <li>There are end-to-end measurement techniques that can steer traffic at the application layer (Content Distribution Networks, multi-CDNs like Conviva <xref target="Conviva" format="default"/>, etc.)</li>
            <li>We noted in <xref target="ProtocolStackSupport" format="default"/> that applications often don't know how to utilize Path Aware techniques. This includes not knowing enough about their admission control threshold to be able to ask accurately for the resources they need, whether this is because the application itself doesn't know, or because the application has no way to signal its expectations to the underlying protocol stack. To date, attempts to help them haven't gotten anywhere (e.g. the multiple-TSPEC additions to RSVP to attempt to mirror codec selection by applications <xref target="I-D.ietf-tsvwg-intserv-multiple-tspec" format="default"/> expired in 2013).</li>
          </ul>
        </li>
        <li>We note that this work took the then-current IP network architecture as given, at least at the time each technique was proposed. It might be useful to consider aspects of the now-current IP network architecture that ease, or impede, Path Aware networking techniques. For example, there is limited ability in IP to constrain bidirectional paths to be symmetric, and information-centric networking protocols such as Named Data Networking (NDN) and Content-Centric Networking (CCNx) (<xref target="RFC8793" format="default"/>) must force bidirectional path symmetry using protocol-specific mechanisms.</li>
      </ul>
    </section>
    <section anchor="Contributions" numbered="true" toc="default">
      <name>Contributions</name>
      <t>Contributions on these Path Aware networking techniques were analyzed to arrive at the Lessons Learned captured in <xref target="LessonsLearned" format="default"/>.</t>
      <t>Our expectation is that most readers will not need to read through this section carefully, but we wanted to record these hard-fought lessons as a service to others who may revisit this document, so they'll have the details close at hand.</t>
      <section anchor="ST2" numbered="true" toc="default">
        <name>Stream Transport (ST, ST2, ST2+)</name>
        <t>The suggested references for Stream Transport are:</t>
        <ul spacing="normal">
          <li>ST - A Proposed Internet Stream Protocol <xref target="IEN-119" format="default"/></li>
          <li>Experimental Internet Stream Protocol, Version 2 (ST-II) <xref target="RFC1190" format="default"/></li>
          <li>Internet Stream Protocol Version 2 (ST2) Protocol Specification - Version ST2+ <xref target="RFC1819" format="default"/></li>
        </ul>
        <t>The first version of Stream Transport, ST <xref target="IEN-119" format="default"/>, was published in the late 1970's and was implemented and deployed on the ARPANET at small scale. It was used throughout the 1980's for experimental transmission of voice, video, and distributed simulation.</t>
        <t>The second version of the ST specification (ST2) <xref target="RFC1190" format="default"/> <xref target="RFC1819" format="default"/> was an experimental connection-oriented internetworking protocol that operated at the same layer as connectionless IP. ST2 packets could be distinguished by their IP header protocol numbers (IP, at that time, used protocol number 4, while ST2 used protocol number 5).</t>
        <t>ST2 used a control plane layered over IP to select routes and reserve capacity for real-time streams across a network path, based on a flow specification communicated by a separate protocol. The flow specification could be associated with QoS state in routers, producing an experimental resource reservation protocol. This allowed ST2 routers along a path to offer end-to-end guarantees, primarily to satisfy the QoS requirements for realtime services over the Internet.</t>
        <section anchor="reasons-for-non-deployment" numbered="true" toc="default">
          <name>Reasons for Non-deployment</name>
          <t>Although implemented in a range of equipment, ST2 was not widely used after completion of the experiments.  It did not offer the scalability and fate-sharing properties that have come to be desired by the Internet community.</t>
          <t>The ST2 protocol is no longer in use.</t>
        </section>
        <section anchor="lessons-learned" numbered="true" toc="default">
          <name>Lessons Learned.</name>
          <t>As time passed, the trade-off between router processing and link capacity changed. Links became faster and the cost of router processing became comparatively more expensive.</t>
          <t>The ST2 control protocol used "hard state" - once a route was established, and resources were reserved, routes and resources existing until they were explicitly released via signaling. A soft-state approach was thought superior to this hard-state approach, and led to development of the IntServ model described in <xref target="IntServ" format="default"/>.</t>
        </section>
      </section>
      <section anchor="IntServ" numbered="true" toc="default">
        <name>Integrated Services (IntServ)</name>
        <t>The suggested references for IntServ are:</t>
        <ul spacing="normal">
          <li>RFC 1633 Integrated Services in the Internet Architecture: an Overview <xref target="RFC1633" format="default"/></li>
          <li>RFC 2211 Specification of the Controlled-Load Network Element Service <xref target="RFC2211" format="default"/></li>
          <li>RFC 2212 Specification of Guaranteed Quality of Service <xref target="RFC2212" format="default"/></li>
          <li>RFC 2215 General Characterization Parameters for Integrated Service Network Elements <xref target="RFC2215" format="default"/></li>
          <li>RFC 2205 Resource ReSerVation Protocol (RSVP) <xref target="RFC2205" format="default"/></li>
        </ul>
        <t>In 1994, when the IntServ architecture document <xref target="RFC1633" format="default"/> was published, real-time traffic was first appearing on the Internet. At that time, bandwidth was still a scarce commodity. Internet Service Providers built networks over DS3 (45 Mbps) infrastructure, and sub-rate (&lt; 1 Mpbs) access was common. Therefore, the IETF anticipated a need for a fine-grained QoS mechanism.</t>
        <t>In the IntServ architecture, some  applications can require service guarantees. Therefore, those applications use the Resource Reservation Protocol (RSVP) <xref target="RFC2205" format="default"/> to signal  QoS  reservations across network paths.  Every router in the network that participates in IntServ maintains per-flow soft-state to a) perform call admission control and b) deliver guaranteed service.</t>
        <t>Applications use Flow Specification (Flow Specs) <xref target="RFC2210" format="default"/> to describe the traffic that they emit. RSVP reserves capacity for traffic on a per Flow Spec basis.</t>
        <section anchor="reasons-for-non-deployment-1" numbered="true" toc="default">
          <name>Reasons for Non-deployment</name>
          <t>Although IntServ has been used in enterprise and government networks, IntServ was never widely deployed on the Internet because of its cost. The following factors contributed to operational cost:</t>
          <ul spacing="normal">
            <li>IntServ must be deployed on every router that is on a path where IntServ is to be used. Although it is possible to include a router that does not participate in IntServ along the path being controlled, if that router is likely to become a bottleneck, IntServ cannot be used to avoid that bottleneck along the path</li>
            <li>IntServ maintained per flow state</li>
          </ul>
          <t>As IntServ was being discussed, the following occurred:</t>
          <ul spacing="normal">
            <li>For many expected uses, it became more cost effective to solve the QoS problem by adding bandwidth. Between 1994 and 2000, Internet Service Providers upgraded their infrastructures from DS3 (45 Mbps) to OC-48 (2.4 Gbps). This meant that even if an endpoint was using IntServ in an IntServ-enabled network, its requests would rarely, if ever, be denied, so endpoints and Internet Service Providers had little reason to enable IntServ.</li>
            <li>DiffServ <xref target="RFC2475" format="default"/> offered a more cost-effective, albeit less fine-grained, solution to the QoS problem.</li>
          </ul>
        </section>
        <section anchor="lessons-learned-1" numbered="true" toc="default">
          <name>Lessons Learned.</name>
          <t>The following lessons were learned:</t>
          <ul spacing="normal">
            <li>Any mechanism that requires every participating onpath router to maintain per-flow state is not likely to succeed, unless the additional cost for offering the feature can be recovered from the user.</li>
            <li>Any mechanism that requires an operator to upgrade all of its routers is not likely to succeed, unless the additional cost for offering the feature can be recovered from the user.</li>
          </ul>
          <t>In environments where IntServ has been deployed, trust relationships with endpoints are very different from trust relationships on the Internet itself, and there are often clearly-defined hierarchies in Service Level Agreements (SLAs), and well-defined transport flows operating with pre-determined capacity and latency requirements over paths where capacity or other attributes are constrained.</t>
          <t>IntServ was never widely deployed to manage capacity across the Internet. However, the technique that it produced was deployed for reasons other than bandwidth management. RSVP is widely deployed as an MPLS signaling mechanism. BGP reuses the RSVP concept of Filter Specs to distribute firewall filters, although they are called Flow Spec Component Types in BGP <xref target="RFC5575" format="default"/>.</t>
        </section>
      </section>
      <section anchor="Quick-Start" numbered="true" toc="default">
        <name>Quick-Start TCP</name>
        <t>The suggested references for Quick-Start TCP are:</t>
        <ul spacing="normal">
          <li>Quick-Start for TCP and IP <xref target="RFC4782" format="default"/></li>
          <li>Determining an appropriate initial sending rate over an underutilized network path <xref target="SAF07" format="default"/></li>
          <li>Fast Startup Internet Congestion Control for Broadband Interactive Applications <xref target="Sch11" format="default"/></li>
          <li>Using Quick-Start to enhance TCP-friendly rate control performance in bidirectional satellite networks <xref target="QS-SAT" format="default"/></li>
        </ul>
        <t>Quick-Start <xref target="RFC4782" format="default"/> is an Experimental TCP extension that leverages support from the routers on the path to determine an allowed initial sending rate for a path through the Internet, either at the start of data transfers or after idle periods. Without information about the path, a sender cannot easily determine an appropriate initial sending rate. The default TCP congestion control therefore uses the safe but time-consuming slow-start algorithm <xref target="RFC5681" format="default"/>. With Quick-Start, connections are allowed to use higher initial sending rates if there is significant unused bandwidth along the path, and if the sender and all of the routers along the path approve the request.</t>
        <t>By examining the Time To Live (TTL) field in Quick-Start packets, a sender can determine if  routers on the path have approved the Quick-Start request. However, this method is unable to take into account the routers hidden by tunnels or other network nodes invisible at the IP layer.</t>
        <t>The protocol also includes a nonce that provides protection against cheating routers and receivers. If the Quick-Start request is explicitly approved by all routers along the path, the TCP host can send at up to the approved rate; otherwise TCP would use the default congestion control. Quick-Start requires modifications in the involved end-systems as well in routers. Due to the resulting deployment challenges, Quick-Start was only proposed in <xref target="RFC4782" format="default"/> for controlled environments.</t>
        <t>The Quick-Start mechanism is a lightweight, coarse-grained, in-band, network-assisted fast startup mechanism. The benefits are studied by simulation in a research paper <xref target="SAF07" format="default"/> that complements the protocol specification. The study confirms that Quick-Start can significantly speed up mid-sized data transfers. That paper also presents router algorithms that do not require keeping per-flow state. Later studies <xref target="Sch11" format="default"/> comprehensively analyzes Quick-Start with a full Linux implementation and with a router fast path prototype using a network processor. In both cases, Quick-Start could be implemented with limited additional complexity.</t>
        <section anchor="reasons-for-non-deployment-2" numbered="true" toc="default">
          <name>Reasons for Non-deployment</name>
          <t>However, experiments with Quick-Start in <xref target="Sch11" format="default"/> revealed several challenges:</t>
          <ul spacing="normal">
            <li>Having information from the routers along the path can reduce the risk of congestion, but cannot avoid it entirely. Determining whether there is unused capacity is not trivial in actual router and host implementations. Data about available capacity visible at the IP layer may be imprecise, and due to the propagation delay, information can already be outdated when it reaches a sender. There is a trade-off between the speedup of data transfers and the risk of congestion even with Quick-Start. This could be mitigated by only allowing Quick-Start to access a proportion of the unused capacity along a path.</li>
            <li>For scalable router fast path implementation, it is important to enable parallel processing of packets, as this is a widely used method e.g. in network processors. One challenge is synchronization of information between packets that are processed in parallel, which should be avoided as much as possible.</li>
            <li>Only some types of application traffic can benefit from Quick-Start. Capacity needs to be requested and discovered. The discovered capacity needs to be utilized by the flow, or it implicitly becomes available for other flows.  Failing to use the requested capacity may have already reduced the pool of Quick-Start capacity that was made available to other competing Quick-Start requests. The benefit is greatest when  senders use this only for bulk flows and avoid sending unnecessary Quick-Start requests, e.g. for flows that only send a small amount of data. Choosing an appropriate request size requires application-internal knowledge that is not commonly expressed by the transport API. How a sender can determine the rate for an initial Quick-Start request is still a largely unsolved problem.</li>
          </ul>
          <t>There is no known deployment of Quick-Start for TCP or other IETF transports.</t>
        </section>
        <section anchor="lessons-learned-2" numbered="true" toc="default">
          <name>Lessons Learned</name>
          <t>Some lessons can be learned from Quick-Start. Despite being a very light-weight protocol, Quick-Start suffers from poor incremental deployment properties, both regarding the required modifications in network infrastructure as well as its interactions with applications. Except for corner cases, congestion control can be quite efficiently performed end-to-end in the Internet, and in modern stacks there is not much room for significant improvement by additional network support.</t>
          <t>After publication of the Quick-Start specification, there have been large-scale experiments with an initial window of up to 10 MSS <xref target="RFC6928" format="default"/>. This alternative "IW10" approach can also ramp-up data transfers faster than the standard congestion control, but it only requires sender-side modifications. As a result, this approach can be easier and incrementally deployed in the Internet. While theoretically Quick-Start can outperform "IW10", the improvement in completion time for data transfer times can, in many cases, be small. After publication of <xref target="RFC6928" format="default"/>, most modern TCP stacks have increased their default initial window.</t>
        </section>
      </section>
      <section anchor="Source-Quench" numbered="true" toc="default">
        <name>ICMP Source Quench</name>
        <t>The suggested references for ICMP Source Quench are:</t>
        <ul spacing="normal">
          <li>INTERNET CONTROL MESSAGE PROTOCOL <xref target="RFC0792" format="default"/></li>
        </ul>
        <t>The ICMP Source Quench message <xref target="RFC0792" format="default"/> allowed an on-path router to request the source of a flow to reduce its sending rate. This method allowed a router to provide an early indication of impending congestion on a path to the sources that contribute to that congestion.</t>
        <section anchor="reasons-for-non-deployment-3" numbered="true" toc="default">
          <name>Reasons for Non-deployment</name>
          <t>This method was deployed in Internet routers over a period of time, the reaction of endpoints to receiving this signal has varied. For low speed links, with low multiplexing of flows the method could be used to regulate (momentarily reduce) the transmission rate. However, the simple signal does not scale with link speed, or the number of flows sharing a link.</t>
          <t>The approach was overtaken by the evolution of congestion control methods in TCP <xref target="RFC2001" format="default"/>, and later also by other IETF transports. Because these methods were based upon measurement of the end-to-end path and an algorithm in the endpoint, they were able to evolve and mature more rapidly than methods relying on interactions between operational routers and endpoint stacks.</t>
          <t>After ICMP Source Quench was specified, the IETF began to recommend that transports provide end-to-end congestion control <xref target="RFC2001" format="default"/>. The Source Quench method has been obsoleted by the IETF <xref target="RFC6633" format="default"/>, and both hosts and routers must now silently discard this message.</t>
        </section>
        <section anchor="lessons-learned-3" numbered="true" toc="default">
          <name>Lessons Learned</name>
          <t>This method had several problems:</t>
          <t>First, <xref target="RFC0792" format="default"/> did not sufficiently specify how the sender would react to the ICMP Source Quench signal from the path (e.g., <xref target="RFC1016" format="default"/>). There was ambiguity in how the sender should utilize this additional information. This could lead to unfairness in the way that receivers (or routers) responded to this message.</t>
          <t>Second, while the message did provide additional information, the Explicit Congestion Notification (ECN) mechanism <xref target="RFC3168" format="default"/> provided a more robust and informative signal for network nodes to provide early indication that a path has become congested.</t>
          <t>The mechanism originated at a time when the Internet trust model was very different. Most endpoint implementations did not attempt to verify that the message originated from an on-path node before they utilized the message. This made it vulnerable to denial of service attacks.  In theory, routers might have chosen to use the quoted packet contained in the ICMP payload to validate that the message originated from an on-path node, but this would have increased per-packet processing overhead for each router along the path, would have required transport functionality in the router to verify whether the quoted packet header corresponded to a packet the router had sent. In addition, section 5.2 of <xref target="RFC4443" format="default"/> noted ICMPv6-based attacks on hosts that would also have threatened routers processing ICMPv6 Source Quench payloads. As time passed, it became increasingly obvious that the lack of validation of the messages exposed receivers to a security vulnerability where the messages could be forged to create a tangible denial of service opportunity.</t>
        </section>
      </section>
      <section anchor="TRIGTRAN" numbered="true" toc="default">
        <name>Triggers for Transport (TRIGTRAN)</name>
        <t>The suggested references for TRIGTRAN are:</t>
        <ul spacing="normal">
          <li>TRIGTRAN BOF at IETF 55 <xref target="TRIGTRAN-55" format="default"/></li>
          <li>TRIGTRAN BOF at IETF 56 <xref target="TRIGTRAN-56" format="default"/></li>
        </ul>
        <t>TCP <xref target="RFC0793" format="default"/> has a well-known weakness - the end-to-end flow control mechanism has only a single signal, the loss of a segment, and TCP implementations since the late 1980s have interpreted the loss of a segment as evidence that the path between two endpoints may have become congested enough to exhaust buffers on intermediate hops, so that the TCP sender should "back off" - reduce its sending rate until it knows that its segments are now being delivered without loss <xref target="RFC5681" format="default"/>. More modern TCP stacks have added a growing array of strategies about how to establish the sending rate <xref target="RFC5681" format="default"/>, but when a path is no longer operational, TCP would continue to retry transmissions, which would fail, again, and double their Retransmission Time Out (RTO) timers with each failed transmission, with the result that TCP would wait many seconds before retrying a segment, even if the path becomes operational while the sender is waiting for its next retry.</t>
        <t>The thinking behind TRIGTRAN was that if a path completely stopped working because a link along the path was "down", somehow something along the path could signal TCP when that link returned to service, and the sending TCP could retry immediately, without waiting for a full retransmission timeout (RTO) period.</t>
        <section anchor="reasons-for-non-deployment-4" numbered="true" toc="default">
          <name>Reasons for Non-deployment</name>
          <t>The early dreams for TRIGTRAN were dashed because of an assumption that TRIGTRAN triggers would be unauthenticated. This meant that any "safe" TRIGTRAN mechanism would have relied on a mechanism such as setting the IPv4 TTL or IPv6 Hop Count to 255 at a sender and testing that it was 254 upon receipt, so that a receiver could verify that a signal was generated by an adjacent sender known to be on the path being used, and not some unknown sender which might not even be on the path (e.g., "The Generalized TTL Security Mechanism (GTSM)" <xref target="RFC5082" format="default"/>). This situation is very similar to the case for ICMP Source Quench messages as described in <xref target="Source-Quench" format="default"/>, which were also unauthenticated, and could be sent by an off-path attacker, resulting in deprecation of ICMP Source Quench message processing <xref target="RFC6633" format="default"/>.</t>
          <t>TRIGTRAN's scope shrunk from "the path is down" to "the first-hop link is down".</t>
          <t>But things got worse.</t>
          <t>Because TRIGTRAN triggers would only be provided when the first-hop link was "down", TRIGTRAN triggers couldn't replace normal TCP retransmission behavior if the path failed because some link further along the network path was "down". So TRIGTRAN triggers added complexity to an already complex TCP state machine, and did not allow any existing complexity to be removed.</t>
          <t>There was also an issue that the TRIGTRAN signal was not sent in response to a specific host that had been sending packets, and was instead a signal that stimulated a response by any sender on the link. This needs to scale when there are multiple flows trying to use the same resource, yet the sender of a trigger has no understanding how many of the potential traffic sources will respond by sending packets - if recipients of the signal back-off their responses to a trigger to improve scaling, then that immediately mitigates the benefit of the signal.</t>
          <t>Finally, intermediate forwarding nodes required modification to provide TRIGTRAN triggers, but operators couldn't charge for TRIGTRAN triggers, so there was no way to recover the cost of modifying, testing, and deploying updated intermediate nodes.</t>
          <t>Two TRIGTRAN BOFs were held, at IETF 55 <xref target="TRIGTRAN-55" format="default"/> and IETF 56 <xref target="TRIGTRAN-56" format="default"/>, but this work was not chartered, and there was no interest in deploying TRIGTRAN unless it was chartered and standardized in the IETF.</t>
        </section>
        <section anchor="lessons-learned-4" numbered="true" toc="default">
          <name>Lessons Learned.</name>
          <t>The reasons why this work was not chartered, much less deployed, provide several useful lessons for researchers.</t>
          <ul spacing="normal">
            <li>TRIGTRAN started with a plausible value proposition, but networking realities in the early 2000s forced reductions in scope that led directly to reductions in potential benefits, but no corresponding reductions in costs and complexity.</li>
            <li>These reductions in scope were the direct result of an inability for hosts to trust or authenticate TRIGTRAN signals they received from the network.</li>
            <li>Operators did not believe they could charge for TRIGTRAN signaling, because first-hop links didn't fail frequently, and TRIGTRAN provided no reduction in operating expenses, so there was little incentive to purchase and deploy TRIGTRAN-capable network equipment.</li>
          </ul>
          <t>It is also worth noting that the targeted environment for TRIGTRAN in the late 1990s contained links with a relatively small number of directly-connected hosts - for instance, cellular or satellite links. The transport community was well aware of the dangers of sender synchronization based on multiple senders receiving the same stimulus at the same time, but the working assumption for TRIGTRAN was that there wouldn't be enough senders for this to be a meaningful problem. In the 2010s, it is common for a single "link" to support many senders and receivers on a single link, likely requiring TRIGTRAN senders to wait some random amount of time before sending after receiving a TRIGTRAN signal, which would have reduced the benefits of TRIGTRAN even more.</t>
        </section>
      </section>
      <section anchor="Shim6" numbered="true" toc="default">
        <name>Shim6</name>
        <t>The suggested references for Shim6 are:</t>
        <ul spacing="normal">
          <li>Shim6: Level 3 Multihoming Shim Protocol for IPv6 <xref target="RFC5533" format="default"/></li>
        </ul>
        <t>The IPv6 routing architecture <xref target="RFC1887" format="default"/> assumed that most sites on the Internet would be identified by Provider Assigned IPv6 prefixes, so that Default-Free Zone routers only contained routes to other providers, resulting in a very small IPv6 global routing table.</t>
        <t>For a single-homed site, this could work well. A multihomed site with only one upstream provider could also work well, although BGP multihoming from a single upstream provider was often a premium service (costing more than twice as much as two single-homed sites), and if the single upstream provider went out of service, all of the multihomed paths could fail simultaneously.</t>
        <t>IPv4 sites often multihomed by obtaining Provider Independent prefixes, and advertising these prefixes through multiple upstream providers. With the assumption that any multihomed IPv4 site would also multihome in IPv6, it seemed likely that IPv6 routing would be subject to the same pressures to announce Provider Independent prefixes, resulting in a global IPv6 routing table that exhibited the same explosive growth as the global IPv4 routing table. During the early 2000s, work began on a protocol that would provide multihoming for IPv6 sites without requiring sites to advertise Provider Independent prefixes into the IPv6 global routing table.</t>
        <t>This protocol, called Shim6, allowed two endpoints to exchange multiple addresses ("Locators") that all mapped to the same endpoint ("Identity"). After an endpoint learned multiple Locators for the other endpoint, it could send to any of those Locators with the expectation that those packets would all be delivered to the endpoint with the same Identity. Shim6 was an example of an "Identity/Locator Split" protocol.</t>
        <t>Shim6, as defined in <xref target="RFC5533" format="default"/> and related RFCs, provided a workable solution for IPv6 multihoming using Provider Assigned prefixes, including capability discovery and negotiation, and allowing end-to-end application communication to continue even in the face of path failure, because applications don't see Locator failures, and continue to communicate with the same Identity using a different Locator.</t>
        <section anchor="reasons-for-non-deployment-5" numbered="true" toc="default">
          <name>Reasons for Non-deployment</name>
          <t>Note that the problem being addressed was "site multihoming", but Shim6 was providing "host multihoming". That meant that the decision about what path would be used was under host control, not under router control.</t>
          <t>Although more work could have been done to provide a better technical solution, the biggest impediments to Shim6 deployment were operational and business considerations. These impediments were discussed at multiple network operator group meetings, including <xref target="Shim6-35" format="default"/> at <xref target="NANOG-35" format="default"/>.</t>
          <t>The technique issues centered around concerns that Shim6 relied on the host to track all the connections, while also tracking Identity/Locator mappings in the kernel, and tracking failures to recognize that a backup path has failed.</t>
          <t>The operator issues centered around concerns that operators were performing traffic engineering, but would have no visibility or control over hosts when they chose to begin using another path, and relying on hosts to engineer traffic exposed their networks to oscillation based on feedback loops, as hosts move from path to path. At a minimum, traffic engineering policies must be pushed down to individual hosts. In addition, firewalls that expected to find a transport-level protocol header in the IP payload, would see a Shim6 Identity header, and be unable to perform transport-protocol-based firewalling functions because its normal processing logic would not look past the Identity header.</t>
          <t>The business issues centered removing or reducing the ability to sell BGP multihoming service, which is often more expensive than single-homed connectivity.</t>
        </section>
        <section anchor="lessons-learned-5" numbered="true" toc="default">
          <name>Lessons Learned</name>
          <t>It is extremely important to take operational concerns into account when a path-aware protocol is making decisions about path selection that may conflict with existing operational practices and business considerations.</t>
        </section>
        <section anchor="Addendum-MP-TCP" numbered="true" toc="default">
          <name>Addendum on MultiPath TCP</name>
          <t>During discussions in the PANRG session at IETF 103 <xref target="PANRG-103-Min" format="default"/>, Lars Eggert, past Transport Area Director, pointed out that during charter discussions for the Multipath TCP working group <xref target="MP-TCP" format="default"/>, operators expressed concerns that customers could use Multipath TCP to loadshare TCP connections across operators simultaneously and compare passive performance measurements across network paths in real time, changing the balance of power in those business relationships. Although the Multipath TCP working group was chartered, this concern could have acted as an obstacle to deployment.</t>
          <t>Operator objections to Shim6 were focused on technical concerns, but this concern could have also been an obstacle to Shim6 deployment if the technical concerns had been overcome.</t>
        </section>
      </section>
      <section anchor="NSIS" numbered="true" toc="default">
        <name>Next Steps in Signaling (NSIS)</name>
        <t>The suggested references for Next Steps in Signaling (NSIS) are:</t>
        <ul spacing="normal">
          <li>the concluded working group charter <xref target="NSIS-CHARTER-2001" format="default"/></li>
          <li>GIST: General Internet Signalling Transport <xref target="RFC5971" format="default"/></li>
          <li>NAT/Firewall NSIS Signaling Layer Protocol (NSLP) <xref target="RFC5973" format="default"/></li>
          <li>NSIS Signaling Layer Protocol (NSLP) for Quality-of-Service Signaling <xref target="RFC5974" format="default"/></li>
          <li>Authorization for NSIS Signaling Layer Protocols <xref target="RFC5981" format="default"/></li>
        </ul>
        <t>The NSIS Working Group worked on signaling techniques for network layer resources (e.g., QoS resource reservations, Firewall and NAT traversal).</t>
        <t>When RSVP <xref target="RFC2205" format="default"/> was used in deployments, a number of questions came up about its perceived limitations and potential missing features. The issues noted in the NSIS Working Group charter <xref target="NSIS-CHARTER-2001" format="default"/> include interworking between domains with different QoS architectures, mobility and roaming for IP interfaces, and complexity. Later, the lack of security in RSVP was also recognized (<xref target="RFC4094" format="default"/>).</t>
        <t>The NSIS Working Group was chartered to tackle those issues and initially focused on QoS signaling as its primary use case.  However, over time a new approach evolved that introduced a modular architecture using application-specific signaling protocols (the NSIS Signaling Layer Protocol (NSLP)) on top of a generic signaling transport protocol (the NSIS Transport Layer Protocol (NTLP)).</t>
        <t>The NTLP is defined in <xref target="RFC5971" format="default"/>. Two NSLPs are defined: the NSIS Signaling Layer Protocol (NSLP) for Quality-of-Service Signaling <xref target="RFC5974" format="default"/> as well as the NAT/Firewall NSIS Signaling Layer Protocol (NSLP) <xref target="RFC5973" format="default"/>.</t>
        <section anchor="reasons-for-non-deployment-6" numbered="true" toc="default">
          <name>Reasons for Non-deployment</name>
          <t>The obstacles for deployment can be grouped into implementation-related aspects and operational aspects.</t>
          <ul spacing="normal">
            <li>Implementation-related aspects:</li>
          </ul>
          <t>Although NSIS provides benefits
    with respect to flexibility, mobility, and security compared to
    other network signaling techniques, hardware vendors were reluctant
    to deploy this solution, because it would require additional
    implementation effort and would result in additional complexity for
    router implementations.</t>
          <t>The NTLP mainly operates as path-coupled signaling protocol, i.e,
    its messages are processed at the intermediate node's control
    plane that are also forwarding the data flows. This requires a
    mechanism to intercept signaling packets while they are forwarded
    in the same manner (especially along the same path) as data
    packets. NSIS uses
    the IPv4 and IPv6 Router Alert Option (RAO) to allow for
    interception of those path-coupled signaling messages, and
    this technique requires router implementations to correctly
    understand and implement the handling of RAOs, e.g., to only
    process packet with RAOs of interest and to leave packets with
    irrelevant RAOs in the fast forwarding processing path (a
    comprehensive discussion of these issues can be found in
    <xref target="RFC6398" format="default"/>). The latter was an issue with some router
    implementations at the time of standardization.</t>
          <t>Another reason is
    that path-coupled signaling protocols that interact with routers
    and request manipulation of state at these routers (or any
    other network element in general) are under scrutiny: a packet (or
    sequence of packets) out of the mainly untrusted data path is
    requesting creation and manipulation of network state. This is
    seen as potentially dangerous (e.g., opens up a Denial of Service (DoS) threat to a
    router's control plane) and difficult for an operator to control. 
    Path-coupled signaling approaches were considered problematic (see also section 3 of <xref target="RFC6398" format="default"/>). There are
    recommendations on how to secure NSIS nodes and
    deployments (e.g., <xref target="RFC5981" format="default"/>).</t>
          <ul spacing="normal">
            <li>Operational Aspects:</li>
          </ul>
          <t>NSIS not only
    required trust between customers and their provider, but also among
    different providers. Especially, QoS signaling techniques would
    require some kind of dynamic service level agreement support that
    would imply (potentially quite complex) bilateral negotiations
    between different Internet service providers. This complexity was 
    not considered to be justified and increasing the
    bandwidth (and thus avoiding bottlenecks) was 
    cheaper than actively managing network resource bottlenecks by
    using path-coupled QoS signaling techniques. Furthermore, an
    end-to-end path typically involves several provider domains and
    these providers need to closely cooperate in cases of failures.</t>
        </section>
        <section anchor="lessons-learned-6" numbered="true" toc="default">
          <name>Lessons Learned</name>
          <t>One goal of NSIS was to decrease the complexity of the signaling
protocol, but a path-coupled signaling protocol comes with the 
intrinsic complexity of IP-based networks, beyond the complexity of the 
signaling protocol itself. Sources of intrinsic complexity include:</t>
          <ul spacing="normal">
            <li>the presence of asymmetric routes between endpoints and routers</li>
            <li>the lack of security and trust at large in the Internet infrastructure</li>
            <li>the presence of different trust boundaries</li>
            <li>the effects of best-effort networks (e.g., robustness to packet loss)</li>
            <li>divergence from the fate sharing principle (e.g., state within the network).</li>
          </ul>
          <t>Any path-coupled signaling protocol has to deal with these realities.</t>
          <t>Operators view the use of IPv4 and IPv6 Router Alert Option (RAO) to signal routers along the path from end systems with suspicion, because these end systems are usually not authenticated and heavy use of RAOs can easily increase the CPU load on routers that are designed to process most packets using a hardware "fast path" and diverting packets containing RAO to a slower, more capable processor.</t>
        </section>
      </section>
      <section anchor="FL" numbered="true" toc="default">
        <name>IPv6 Flow Label</name>
        <t>The suggested references for IPv6 Flow Label are:</t>
        <ul spacing="normal">
          <li>IPv6 Flow Label Specification <xref target="RFC6437" format="default"/></li>
        </ul>
        <t>IPv6 specifies a 20-bit field Flow Label field <xref target="RFC6437" format="default"/>, included in the fixed part of the IPv6 header and hence present in every IPv6 packet. An endpoint sets the value  in this field to one of a set of pseudo-randomly assigned values. If a packet is not part of any flow, the flow label value is set to zero <xref target="RFC3697" format="default"/>. A number of Standards Track and Best Current Practice RFCs (e.g., <xref target="RFC8085" format="default"/>, <xref target="RFC6437" format="default"/>, <xref target="RFC6438" format="default"/>) encourage IPv6 endpoints to set a non-zero value in this field.  A multiplexing transport could choose to use multiple flow labels to allow the network to independently forward its subflows, or to use one common value for the traffic aggregate.  The flow label is present in all fragments. IPsec was originally put forward as one important use-case for this mechanism and does encrypt the field <xref target="RFC6438" format="default"/>.</t>
        <t>Once set, the flow label can provide information that can help inform network nodes about subflows present at the transport layer, without needing to interpret the setting of upper layer protocol fields <xref target="RFC6294" format="default"/>.  This information can also be used to coordinate how aggregates of transport subflows are grouped when queued in the network and to select appropriate per-flow forwarding when choosing between alternate paths <xref target="RFC6438" format="default"/> (e.g. for Equal Cost Multipath Routing (ECMP) and Link Aggregation (LAG)).</t>
        <section anchor="reasons-for-non-deployment-7" numbered="true" toc="default">
          <name>Reasons for Non-deployment</name>
          <t>Despite the field being present in every IPv6 packet, the mechanism did not receive as much use as originally envisioned.  One reason is that to be useful it requires engagement by two different  stakeholders:</t>
          <ul spacing="normal">
            <li>Endpoint Implementation:</li>
          </ul>
          <t>For network nodes along a path to utilize the flow label there needs to be a non-zero value inserted in the field <xref target="RFC6437" format="default"/> at the sending endpoint. 
There needs to be an incentive for an endpoint to set an appropriate non-zero value. 
The value should appropriately reflect the level of aggregation the traffic expects to be provided by the network. However, this requires the stack  to know granularity at which flows should be identified (or conversely which flows should receive aggregated treatment), i.e., which packets carry the same flow label. Therefore, setting a non-zero value may result in additional choices that need to be made by an application developer.</t>
          <t>Although the standard <xref target="RFC3697" format="default"/> forbids any encoding of meaning into the flow label value, the opportunity to use the flow label as a covert channel or to signal other meta-information may have raised concerns about setting a non-zero value <xref target="RFC6437" format="default"/>.</t>
          <t>Before methods are widely deployed to use this method, there could be no incentive for an endpoint to set the field.</t>
          <ul spacing="normal">
            <li>Operational support in network nodes:</li>
          </ul>
          <t>A benefit can only be realized when a network node along the path also uses this information to inform its decisions.  Network equipment (routers and/or middleboxes) need to include appropriate support so they can utilize the field when making decisions about how to classify flows, or to inform forwarding choices. Use of any optional feature in a network node also requires corresponding updates to operational procedures, and therefore is normally only introduced when the cost can be justified.</t>
          <t>A benefit from utilizing the flow label is expected to be increased quality of experience for applications - but this comes at some operational cost to an operator, and requires endpoints to set the field.</t>
        </section>
        <section anchor="lessons-learned-7" numbered="true" toc="default">
          <name>Lessons Learned</name>
          <t>The flow label is a general purpose header field for use by the path. Multiple uses have been proposed. One candidate use was to reduce the  complexity of forwarding decisions. However,  modern routers can use a "fast path", often taking advantage of hardware to accelerate processing. The method can assist in more complex forwarding, such as ECMP and load balancing.</t>
          <t>Although <xref target="RFC6437" format="default"/> recommended that endpoints should by default choose uniformly-distributed labels for their traffic, the specification permitted an endpoint to choose to set a zero value. This ability of endpoints to choose to set a flow label of zero has had consequences on deployability:</t>
          <ul spacing="normal">
            <li>Before wide-scale support by endpoints, it would be impossible to rely on a non-zero flow label being set. Network nodes therefore would need to also employ other techniques to realize equivalent functions. An example of a method is one assuming semantics of the source port field to provide entropy input to a network-layer hash. This use of a 5-tuple to classify a packet represents a layering violation <xref target="RFC6294" format="default"/>. When other methods have been deployed, they increase the cost of deploying standards-based methods, even though they may offer less control to  endpoints and result in potential interaction with other uses/interpretation of the field.</li>
            <li>Even though the flow label is specified as an end-to-end field, some network paths have been observed to not transparently forward the flow label. This could result from non-conformant equipment, or could indicate that some operational networks have chosen to re-use the protocol field for other (e.g. internal purposes). This results in lack of transparency, and a deployment hurdle to endpoints expecting that they can set a flow label that is utilized by the network.  The more recent practice of "greasing" <xref target="GREASE" format="default"/> would suggest that a different outcome could have been achieved if endpoints were always required to set a non-zero value.</li>
            <li>
              <xref target="RFC1809" format="default"/> noted that setting the choice of the flow label value can depend on the expectations of the traffic generated by an application, which suggests an API should be presented to control the setting or policy that is used. However, many currently available APIs do not have this support.</li>
          </ul>
          <t>A growth in the use of encrypted transports, (e.g. QUIC <xref target="QUIC-WG" format="default"/>) seems likely to raise similar issues to those discussed above and could motivate renewed interest in utilizing the flow label.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This document describes Path Aware techniques that were not adopted and widely deployed on the Internet, so it doesn't affect the security of the Internet.</t>
      <t>If this document meets its goals, we may develop new techniques for Path Aware Networking that would affect the security of the Internet, but security considerations for those techniques will be described in the corresponding RFCs that specify them.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document makes no requests of IANA.</t>
    </section>
    <section anchor="acknowledgments" numbered="true" toc="default">
      <name>Acknowledgments</name>
      <t>Initial material for <xref target="ST2" format="default"/> on ST2 was provided by Gorry Fairhurst.</t>
      <t>Initial material for <xref target="IntServ" format="default"/> on IntServ was provided by Ron Bonica.</t>
      <t>Initial material for <xref target="Quick-Start" format="default"/> on Quick-Start TCP was provided by Michael Scharf, who also provided suggestions to improve this section after it was edited.</t>
      <t>Initial material for <xref target="Source-Quench" format="default"/> on ICMP Source Quench was provided by Gorry Fairhurst.</t>
      <t>Initial material for <xref target="TRIGTRAN" format="default"/> on Triggers for Transport (TRIGTRAN) was provided by Spencer Dawkins.</t>
      <t><xref target="Shim6" format="default"/> on Shim6 builds on initial material describing obstacles provided by Erik Nordmark, with background added by Spencer Dawkins.</t>
      <t>Initial material for <xref target="NSIS" format="default"/> on Next Steps In Signaling (NSIS) was provided by Roland Bless and Martin Stiemerling.</t>
      <t>Initial material for <xref target="FL" format="default"/> on IPv6 Flow Labels was provided by Gorry Fairhurst.</t>
      <t>Our thanks to C.M. Heard, David Black, Gorry Fairhurst, Joe Touch, Joeri de Ruiter, Mohamed Boucadair, Roland Bless, Ruediger Geib, Theresa Enghardt, and Wes Eddy, who provided review comments on previous versions.</t>
      <t>Mallory Knodel reviewed this document for the Internet Engineering Steering Group, and provided many helpful suggestions.</t>
      <t>David Oran also provided helpful comments and text suggestions on this document during Internet Engineering Steering Group balloting. In particular, <xref target="Futures" format="default"/> reflects his review.</t>
      <t>Special thanks to Adrian Farrel for helping Spencer navigate the twisty little passages of Flow Specs and Filter Specs in IntServ, RSVP, MPLS, and BGP. They are all alike, except when they are different <xref target="Colossal-Cave" format="default"/>.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Informative References</name>
      <reference anchor="I-D.irtf-panrg-questions" target="http://www.ietf.org/internet-drafts/draft-irtf-panrg-questions-08.txt">
        <front>
          <title>Current Open Questions in Path Aware Networking</title>
          <seriesInfo name="Internet-Draft" value="draft-irtf-panrg-questions-08"/>
          <author initials="B" surname="Trammell" fullname="Brian Trammell">
            <organization/>
          </author>
          <date month="December" day="23" year="2020"/>
          <abstract>
            <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and provides for endpoints and applications to use these properties to select paths through the Internet for their traffic.  While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.  This document poses questions in path-aware networking open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks.  It was originally written to frame discussions in the Path Aware Networking proposed Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tsvwg-intserv-multiple-tspec" target="http://www.ietf.org/internet-drafts/draft-ietf-tsvwg-intserv-multiple-tspec-02.txt">
        <front>
          <title>Integrated Services (IntServ) Extension to Allow Signaling of Multiple Traffic Specifications and Multiple Flow Specifications in RSVPv1</title>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-intserv-multiple-tspec-02"/>
          <author initials="J" surname="Polk" fullname="James Polk">
            <organization/>
          </author>
          <author initials="S" surname="Dhesikan" fullname="Subha Dhesikan">
            <organization/>
          </author>
          <date month="February" day="25" year="2013"/>
          <abstract>
            <t>This document defines extensions to Integrated Services (IntServ) allowing  multiple traffic specifications and multiple flow specifications to be conveyed in the same Resource Reservation Protocol (RSVPv1) reservation message exchange. This ability helps optimize an agreeable bandwidth through a network between endpoints in a single round trip.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="I-D.arkko-arch-internet-threat-model" target="http://www.ietf.org/internet-drafts/draft-arkko-arch-internet-threat-model-01.txt">
        <front>
          <title>Changes in the Internet Threat Model</title>
          <seriesInfo name="Internet-Draft" value="draft-arkko-arch-internet-threat-model-01"/>
          <author initials="J" surname="Arkko" fullname="Jari Arkko">
            <organization/>
          </author>
          <date month="July" day="8" year="2019"/>
          <abstract>
            <t>Communications security has been at the center of many security improvements in the Internet.  The goal has been to ensure that communications are protected against outside observers and attackers.  This memo suggests that the existing threat model, while important and still valid, is no longer alone sufficient to cater for the pressing security issues in the Internet.  For instance, it is also necessary to protect systems against endpoints that are compromised, malicious, or whose interests simply do not align with the interests of the users.  While such protection is difficult, there are some measures that can be taken.  It is particularly important to ensure that as we continue to develop Internet technology, non-communications security related threats are properly understood.  While the consideration of these issues is relatively new in the IETF, this memo provides some initial ideas about potential broader threat models to consider when designing protocols for the Internet or when trying to defend against pervasive monitoring.  Further down the road, updated threat models could result in changes in RFC 3552 (guidelines for writing security considerations) and RFC 7258 (pervasive monitoring), to include proper consideration of non-communications security threats.  It may also be necessary to have dedicated guidance on how systems design and architecture affects security.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="I-D.farrell-etm" target="http://www.ietf.org/internet-drafts/draft-farrell-etm-03.txt">
        <front>
          <title>We're gonna need a bigger threat model</title>
          <seriesInfo name="Internet-Draft" value="draft-farrell-etm-03"/>
          <author initials="S" surname="Farrell" fullname="Stephen Farrell">
            <organization/>
          </author>
          <date month="July" day="6" year="2019"/>
          <abstract>
            <t>We argue that an expanded threat model is needed for Internet protocol development as protocol endpoints can no longer be considered to be generally trustworthy for any general definition of "trustworthy."</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC0792" target="https://www.rfc-editor.org/info/rfc792">
        <front>
          <title>Internet Control Message Protocol</title>
          <seriesInfo name="DOI" value="10.17487/RFC0792"/>
          <seriesInfo name="RFC" value="792"/>
          <seriesInfo name="STD" value="5"/>
          <author initials="J." surname="Postel" fullname="J. Postel">
            <organization/>
          </author>
          <date year="1981" month="September"/>
        </front>
      </reference>
      <reference anchor="RFC0793" target="https://www.rfc-editor.org/info/rfc793">
        <front>
          <title>Transmission Control Protocol</title>
          <seriesInfo name="DOI" value="10.17487/RFC0793"/>
          <seriesInfo name="RFC" value="793"/>
          <seriesInfo name="STD" value="7"/>
          <author initials="J." surname="Postel" fullname="J. Postel">
            <organization/>
          </author>
          <date year="1981" month="September"/>
        </front>
      </reference>
      <reference anchor="RFC1016" target="https://www.rfc-editor.org/info/rfc1016">
        <front>
          <title>Something a Host Could Do with Source Quench: The Source Quench Introduced Delay (SQuID)</title>
          <seriesInfo name="DOI" value="10.17487/RFC1016"/>
          <seriesInfo name="RFC" value="1016"/>
          <author initials="W." surname="Prue" fullname="W. Prue">
            <organization/>
          </author>
          <author initials="J." surname="Postel" fullname="J. Postel">
            <organization/>
          </author>
          <date year="1987" month="July"/>
          <abstract>
            <t>The memo is intended to explore the issue of what a host could do with a source quench.  The proposal is for each source host IP module to introduce some delay between datagrams sent to the same destination host.  This is a "crazy idea paper" and discussion is essential.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC1190" target="https://www.rfc-editor.org/info/rfc1190">
        <front>
          <title>Experimental Internet Stream Protocol: Version 2 (ST-II)</title>
          <seriesInfo name="DOI" value="10.17487/RFC1190"/>
          <seriesInfo name="RFC" value="1190"/>
          <author initials="C." surname="Topolcic" fullname="C. Topolcic">
            <organization/>
          </author>
          <date year="1990" month="October"/>
          <abstract>
            <t>This memo defines a revised version of the Internet Stream Protocol, originally defined in IEN-119 [8], based on results from experiments with the original version, and subsequent requests, discussion, and suggestions for improvements.  This is a Limited-Use Experimental Protocol.  Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC1633" target="https://www.rfc-editor.org/info/rfc1633">
        <front>
          <title>Integrated Services in the Internet Architecture: an Overview</title>
          <seriesInfo name="DOI" value="10.17487/RFC1633"/>
          <seriesInfo name="RFC" value="1633"/>
          <author initials="R." surname="Braden" fullname="R. Braden">
            <organization/>
          </author>
          <author initials="D." surname="Clark" fullname="D. Clark">
            <organization/>
          </author>
          <author initials="S." surname="Shenker" fullname="S. Shenker">
            <organization/>
          </author>
          <date year="1994" month="June"/>
          <abstract>
            <t>This memo discusses a proposed extension to the Internet architecture and protocols to provide integrated services, i.e., to support real-time as well as the current non-real-time service of IP.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC1809" target="https://www.rfc-editor.org/info/rfc1809">
        <front>
          <title>Using the Flow Label Field in IPv6</title>
          <seriesInfo name="DOI" value="10.17487/RFC1809"/>
          <seriesInfo name="RFC" value="1809"/>
          <author initials="C." surname="Partridge" fullname="C. Partridge">
            <organization/>
          </author>
          <date year="1995" month="June"/>
          <abstract>
            <t>The purpose of this memo is to distill various opinions and suggestions of the End-to-End Research Group regarding the handling of Flow Labels into a set of suggestions for IPv6.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC1819" target="https://www.rfc-editor.org/info/rfc1819">
        <front>
          <title>Internet Stream Protocol Version 2 (ST2) Protocol Specification - Version ST2+</title>
          <seriesInfo name="DOI" value="10.17487/RFC1819"/>
          <seriesInfo name="RFC" value="1819"/>
          <author initials="L." surname="Delgrossi" fullname="L. Delgrossi" role="editor">
            <organization/>
          </author>
          <author initials="L." surname="Berger" fullname="L. Berger" role="editor">
            <organization/>
          </author>
          <date year="1995" month="August"/>
          <abstract>
            <t>This memo contains a revised specification of the Internet STream Protocol Version 2 (ST2).  This memo defines an Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC1887" target="https://www.rfc-editor.org/info/rfc1887">
        <front>
          <title>An Architecture for IPv6 Unicast Address Allocation</title>
          <seriesInfo name="DOI" value="10.17487/RFC1887"/>
          <seriesInfo name="RFC" value="1887"/>
          <author initials="Y." surname="Rekhter" fullname="Y. Rekhter" role="editor">
            <organization/>
          </author>
          <author initials="T." surname="Li" fullname="T. Li" role="editor">
            <organization/>
          </author>
          <date year="1995" month="December"/>
          <abstract>
            <t>This document provides an architecture for allocating IPv6 [1] unicast addresses in the Internet.  This document provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC2001" target="https://www.rfc-editor.org/info/rfc2001">
        <front>
          <title>TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms</title>
          <seriesInfo name="DOI" value="10.17487/RFC2001"/>
          <seriesInfo name="RFC" value="2001"/>
          <author initials="W." surname="Stevens" fullname="W. Stevens">
            <organization/>
          </author>
          <date year="1997" month="January"/>
          <abstract>
            <t>Modern implementations of TCP contain four intertwined algorithms that have never been fully documented as Internet standards: slow start, congestion avoidance, fast retransmit, and fast recovery.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC2205" target="https://www.rfc-editor.org/info/rfc2205">
        <front>
          <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
          <seriesInfo name="RFC" value="2205"/>
          <author initials="R." surname="Braden" fullname="R. Braden" role="editor">
            <organization/>
          </author>
          <author initials="L." surname="Zhang" fullname="L. Zhang">
            <organization/>
          </author>
          <author initials="S." surname="Berson" fullname="S. Berson">
            <organization/>
          </author>
          <author initials="S." surname="Herzog" fullname="S. Herzog">
            <organization/>
          </author>
          <author initials="S." surname="Jamin" fullname="S. Jamin">
            <organization/>
          </author>
          <date year="1997" month="September"/>
          <abstract>
            <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet.  RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC2210" target="https://www.rfc-editor.org/info/rfc2210">
        <front>
          <title>The Use of RSVP with IETF Integrated Services</title>
          <seriesInfo name="DOI" value="10.17487/RFC2210"/>
          <seriesInfo name="RFC" value="2210"/>
          <author initials="J." surname="Wroclawski" fullname="J. Wroclawski">
            <organization/>
          </author>
          <date year="1997" month="September"/>
          <abstract>
            <t>This note describes the use of the RSVP resource reservation protocol with the Controlled-Load and Guaranteed QoS control services. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC2211" target="https://www.rfc-editor.org/info/rfc2211">
        <front>
          <title>Specification of the Controlled-Load Network Element Service</title>
          <seriesInfo name="DOI" value="10.17487/RFC2211"/>
          <seriesInfo name="RFC" value="2211"/>
          <author initials="J." surname="Wroclawski" fullname="J. Wroclawski">
            <organization/>
          </author>
          <date year="1997" month="September"/>
          <abstract>
            <t>This memo specifies the network element behavior required to deliver Controlled-Load service in the Internet.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC2212" target="https://www.rfc-editor.org/info/rfc2212">
        <front>
          <title>Specification of Guaranteed Quality of Service</title>
          <seriesInfo name="DOI" value="10.17487/RFC2212"/>
          <seriesInfo name="RFC" value="2212"/>
          <author initials="S." surname="Shenker" fullname="S. Shenker">
            <organization/>
          </author>
          <author initials="C." surname="Partridge" fullname="C. Partridge">
            <organization/>
          </author>
          <author initials="R." surname="Guerin" fullname="R. Guerin">
            <organization/>
          </author>
          <date year="1997" month="September"/>
          <abstract>
            <t>This memo describes the network element behavior required to deliver a guaranteed service (guaranteed delay and bandwidth) in the Internet. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC2215" target="https://www.rfc-editor.org/info/rfc2215">
        <front>
          <title>General Characterization Parameters for Integrated Service Network Elements</title>
          <seriesInfo name="DOI" value="10.17487/RFC2215"/>
          <seriesInfo name="RFC" value="2215"/>
          <author initials="S." surname="Shenker" fullname="S. Shenker">
            <organization/>
          </author>
          <author initials="J." surname="Wroclawski" fullname="J. Wroclawski">
            <organization/>
          </author>
          <date year="1997" month="September"/>
          <abstract>
            <t>This memo defines a set of general control and characterization parameters for network elements supporting the IETF integrated services QoS control framework.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC2475" target="https://www.rfc-editor.org/info/rfc2475">
        <front>
          <title>An Architecture for Differentiated Services</title>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
          <seriesInfo name="RFC" value="2475"/>
          <author initials="S." surname="Blake" fullname="S. Blake">
            <organization/>
          </author>
          <author initials="D." surname="Black" fullname="D. Black">
            <organization/>
          </author>
          <author initials="M." surname="Carlson" fullname="M. Carlson">
            <organization/>
          </author>
          <author initials="E." surname="Davies" fullname="E. Davies">
            <organization/>
          </author>
          <author initials="Z." surname="Wang" fullname="Z. Wang">
            <organization/>
          </author>
          <author initials="W." surname="Weiss" fullname="W. Weiss">
            <organization/>
          </author>
          <date year="1998" month="December"/>
          <abstract>
            <t>This document defines an architecture for implementing scalable service differentiation in the Internet.  This memo provides information for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC3168" target="https://www.rfc-editor.org/info/rfc3168">
        <front>
          <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
          <seriesInfo name="RFC" value="3168"/>
          <author initials="K." surname="Ramakrishnan" fullname="K. Ramakrishnan">
            <organization/>
          </author>
          <author initials="S." surname="Floyd" fullname="S. Floyd">
            <organization/>
          </author>
          <author initials="D." surname="Black" fullname="D. Black">
            <organization/>
          </author>
          <date year="2001" month="September"/>
          <abstract>
            <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC3697" target="https://www.rfc-editor.org/info/rfc3697">
        <front>
          <title>IPv6 Flow Label Specification</title>
          <seriesInfo name="DOI" value="10.17487/RFC3697"/>
          <seriesInfo name="RFC" value="3697"/>
          <author initials="J." surname="Rajahalme" fullname="J. Rajahalme">
            <organization/>
          </author>
          <author initials="A." surname="Conta" fullname="A. Conta">
            <organization/>
          </author>
          <author initials="B." surname="Carpenter" fullname="B. Carpenter">
            <organization/>
          </author>
          <author initials="S." surname="Deering" fullname="S. Deering">
            <organization/>
          </author>
          <date year="2004" month="March"/>
          <abstract>
            <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 source nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods.  Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of scope for this document.  The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC4094" target="https://www.rfc-editor.org/info/rfc4094">
        <front>
          <title>Analysis of Existing Quality-of-Service Signaling Protocols</title>
          <seriesInfo name="DOI" value="10.17487/RFC4094"/>
          <seriesInfo name="RFC" value="4094"/>
          <author initials="J." surname="Manner" fullname="J. Manner">
            <organization/>
          </author>
          <author initials="X." surname="Fu" fullname="X. Fu">
            <organization/>
          </author>
          <date year="2005" month="May"/>
          <abstract>
            <t>This document reviews some of the existing Quality of Service (QoS) signaling protocols for an IP network.  The goal here is to learn from them and to avoid common misconceptions.  Further, we need to avoid mistakes during the design and implementation of any new protocol in this area. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC4443" target="https://www.rfc-editor.org/info/rfc4443">
        <front>
          <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="STD" value="89"/>
          <author initials="A." surname="Conta" fullname="A. Conta">
            <organization/>
          </author>
          <author initials="S." surname="Deering" fullname="S. Deering">
            <organization/>
          </author>
          <author initials="M." surname="Gupta" fullname="M. Gupta" role="editor">
            <organization/>
          </author>
          <date year="2006" month="March"/>
          <abstract>
            <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol).  ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6).  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC4782" target="https://www.rfc-editor.org/info/rfc4782">
        <front>
          <title>Quick-Start for TCP and IP</title>
          <seriesInfo name="DOI" value="10.17487/RFC4782"/>
          <seriesInfo name="RFC" value="4782"/>
          <author initials="S." surname="Floyd" fullname="S. Floyd">
            <organization/>
          </author>
          <author initials="M." surname="Allman" fullname="M. Allman">
            <organization/>
          </author>
          <author initials="A." surname="Jain" fullname="A. Jain">
            <organization/>
          </author>
          <author initials="P." surname="Sarolahti" fullname="P. Sarolahti">
            <organization/>
          </author>
          <date year="2007" month="January"/>
          <abstract>
            <t>This document specifies an optional Quick-Start mechanism for transport protocols, in cooperation with routers, to determine an allowed sending rate at the start and, at times, in the middle of a data transfer (e.g., after an idle period).  While Quick-Start is designed to be used by a range of transport protocols, in this document we only specify its use with TCP.  Quick-Start is designed to allow connections to use higher sending rates when there is significant unused bandwidth along the path, and the sender and all of the routers along the path approve the Quick-Start Request.</t>
            <t>This document describes many paths where Quick-Start Requests would not be approved.  These paths include all paths containing routers, IP tunnels, MPLS paths, and the like that do not support Quick- Start.  These paths also include paths with routers or middleboxes that drop packets containing IP options.  Quick-Start Requests could be difficult to approve over paths that include multi-access layer- two networks.  This document also describes environments where the Quick-Start process could fail with false positives, with the sender incorrectly assuming that the Quick-Start Request had been approved by all of the routers along the path.  As a result of these concerns, and as a result of the difficulties and seeming absence of motivation for routers, such as core routers to deploy Quick-Start, Quick-Start is being proposed as a mechanism that could be of use in controlled environments, and not as a mechanism that would be intended or appropriate for ubiquitous deployment in the global Internet.  This memo defines an Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5082" target="https://www.rfc-editor.org/info/rfc5082">
        <front>
          <title>The Generalized TTL Security Mechanism (GTSM)</title>
          <seriesInfo name="DOI" value="10.17487/RFC5082"/>
          <seriesInfo name="RFC" value="5082"/>
          <author initials="V." surname="Gill" fullname="V. Gill">
            <organization/>
          </author>
          <author initials="J." surname="Heasley" fullname="J. Heasley">
            <organization/>
          </author>
          <author initials="D." surname="Meyer" fullname="D. Meyer">
            <organization/>
          </author>
          <author initials="P." surname="Savola" fullname="P. Savola" role="editor">
            <organization/>
          </author>
          <author initials="C." surname="Pignataro" fullname="C. Pignataro">
            <organization/>
          </author>
          <date year="2007" month="October"/>
          <abstract>
            <t>The use of a packet's Time to Live (TTL) (IPv4) or Hop Limit (IPv6) to verify whether the packet was originated by an adjacent node on a connected link has been used in many recent protocols.  This document generalizes this technique.  This document obsoletes Experimental RFC 3682.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5218" target="https://www.rfc-editor.org/info/rfc5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <seriesInfo name="DOI" value="10.17487/RFC5218"/>
          <seriesInfo name="RFC" value="5218"/>
          <author initials="D." surname="Thaler" fullname="D. Thaler">
            <organization/>
          </author>
          <author initials="B." surname="Aboba" fullname="B. Aboba">
            <organization/>
          </author>
          <date year="2008" month="July"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5533" target="https://www.rfc-editor.org/info/rfc5533">
        <front>
          <title>Shim6: Level 3 Multihoming Shim Protocol for IPv6</title>
          <seriesInfo name="DOI" value="10.17487/RFC5533"/>
          <seriesInfo name="RFC" value="5533"/>
          <author initials="E." surname="Nordmark" fullname="E. Nordmark">
            <organization/>
          </author>
          <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
            <organization/>
          </author>
          <date year="2009" month="June"/>
          <abstract>
            <t>This document defines the Shim6 protocol, a layer 3 shim for providing locator agility below the transport protocols, so that multihoming can be provided for IPv6 with failover and load-sharing properties, without assuming that a multihomed site will have a provider-independent IPv6 address prefix announced in the global IPv6 routing table.  The hosts in a site that has multiple provider- allocated IPv6 address prefixes will use the Shim6 protocol specified in this document to set up state with peer hosts so that the state can later be used to failover to a different locator pair, should the original one stop working.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5575" target="https://www.rfc-editor.org/info/rfc5575">
        <front>
          <title>Dissemination of Flow Specification Rules</title>
          <seriesInfo name="DOI" value="10.17487/RFC5575"/>
          <seriesInfo name="RFC" value="5575"/>
          <author initials="P." surname="Marques" fullname="P. Marques">
            <organization/>
          </author>
          <author initials="N." surname="Sheth" fullname="N. Sheth">
            <organization/>
          </author>
          <author initials="R." surname="Raszuk" fullname="R. Raszuk">
            <organization/>
          </author>
          <author initials="B." surname="Greene" fullname="B. Greene">
            <organization/>
          </author>
          <author initials="J." surname="Mauch" fullname="J. Mauch">
            <organization/>
          </author>
          <author initials="D." surname="McPherson" fullname="D. McPherson">
            <organization/>
          </author>
          <date year="2009" month="August"/>
          <abstract>
            <t>This document defines a new Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute traffic flow specifications.  This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.</t>
            <t>Additionally, it defines two applications of that encoding format: one that can be used to automate inter-domain coordination of traffic filtering, such as what is required in order to mitigate (distributed) denial-of-service attacks, and a second application to provide traffic filtering in the context of a BGP/MPLS VPN service.</t>
            <t>The information is carried via the BGP, thereby reusing protocol algorithms, operational experience, and administrative processes such as inter-provider peering agreements.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5681" target="https://www.rfc-editor.org/info/rfc5681">
        <front>
          <title>TCP Congestion Control</title>
          <seriesInfo name="DOI" value="10.17487/RFC5681"/>
          <seriesInfo name="RFC" value="5681"/>
          <author initials="M." surname="Allman" fullname="M. Allman">
            <organization/>
          </author>
          <author initials="V." surname="Paxson" fullname="V. Paxson">
            <organization/>
          </author>
          <author initials="E." surname="Blanton" fullname="E. Blanton">
            <organization/>
          </author>
          <date year="2009" month="September"/>
          <abstract>
            <t>This document defines TCP's four intertwined congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery.  In addition, the document specifies how TCP should begin transmission after a relatively long idle period, as well as discussing various acknowledgment generation methods.  This document obsoletes RFC 2581.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5971" target="https://www.rfc-editor.org/info/rfc5971">
        <front>
          <title>GIST: General Internet Signalling Transport</title>
          <seriesInfo name="DOI" value="10.17487/RFC5971"/>
          <seriesInfo name="RFC" value="5971"/>
          <author initials="H." surname="Schulzrinne" fullname="H. Schulzrinne">
            <organization/>
          </author>
          <author initials="R." surname="Hancock" fullname="R. Hancock">
            <organization/>
          </author>
          <date year="2010" month="October"/>
          <abstract>
            <t>This document specifies protocol stacks for the routing and transport of per-flow signalling messages along the path taken by that flow through the network.  The design uses existing transport and security protocols under a common messaging layer, the General Internet Signalling Transport (GIST), which provides a common service for diverse signalling applications.  GIST does not handle signalling application state itself, but manages its own internal state and the configuration of the underlying transport and security protocols to enable the transfer of messages in both directions along the flow path.  The combination of GIST and the lower layer transport and security protocols provides a solution for the base protocol component of the "Next Steps in Signalling" (NSIS) framework.   This document defines an Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5973" target="https://www.rfc-editor.org/info/rfc5973">
        <front>
          <title>NAT/Firewall NSIS Signaling Layer Protocol (NSLP)</title>
          <seriesInfo name="DOI" value="10.17487/RFC5973"/>
          <seriesInfo name="RFC" value="5973"/>
          <author initials="M." surname="Stiemerling" fullname="M. Stiemerling">
            <organization/>
          </author>
          <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
            <organization/>
          </author>
          <author initials="C." surname="Aoun" fullname="C. Aoun">
            <organization/>
          </author>
          <author initials="E." surname="Davies" fullname="E. Davies">
            <organization/>
          </author>
          <date year="2010" month="October"/>
          <abstract>
            <t>This memo defines the NSIS Signaling Layer Protocol (NSLP) for Network Address Translators (NATs) and firewalls.  This NSLP allows hosts to signal on the data path for NATs and firewalls to be configured according to the needs of the application data flows.  For instance, it enables hosts behind NATs to obtain a publicly reachable address and hosts behind firewalls to receive data traffic.  The overall architecture is given by the framework and requirements defined by the Next Steps in Signaling (NSIS) working group.  The network scenarios, the protocol itself, and examples for path-coupled signaling are given in this memo.  This document defines an Experimental  Protocol for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5974" target="https://www.rfc-editor.org/info/rfc5974">
        <front>
          <title>NSIS Signaling Layer Protocol (NSLP) for Quality-of-Service Signaling</title>
          <seriesInfo name="DOI" value="10.17487/RFC5974"/>
          <seriesInfo name="RFC" value="5974"/>
          <author initials="J." surname="Manner" fullname="J. Manner">
            <organization/>
          </author>
          <author initials="G." surname="Karagiannis" fullname="G. Karagiannis">
            <organization/>
          </author>
          <author initials="A." surname="McDonald" fullname="A. McDonald">
            <organization/>
          </author>
          <date year="2010" month="October"/>
          <abstract>
            <t>This specification describes the NSIS Signaling Layer Protocol (NSLP) for signaling Quality of Service (QoS) reservations in the Internet. It is in accordance with the framework and requirements developed in NSIS.  Together with General Internet Signaling Transport (GIST), it provides functionality similar to RSVP and extends it.  The QoS NSLP is independent of the underlying QoS specification or architecture and provides support for different reservation models.  It is simplified by the elimination of support for multicast flows.  This specification explains the overall protocol approach, describes the design decisions made, and provides examples.  It specifies object, message formats, and processing rules.  This document defines an  Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC5981" target="https://www.rfc-editor.org/info/rfc5981">
        <front>
          <title>Authorization for NSIS Signaling Layer Protocols</title>
          <seriesInfo name="DOI" value="10.17487/RFC5981"/>
          <seriesInfo name="RFC" value="5981"/>
          <author initials="J." surname="Manner" fullname="J. Manner">
            <organization/>
          </author>
          <author initials="M." surname="Stiemerling" fullname="M. Stiemerling">
            <organization/>
          </author>
          <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
            <organization/>
          </author>
          <author initials="R." surname="Bless" fullname="R. Bless" role="editor">
            <organization/>
          </author>
          <date year="2011" month="February"/>
          <abstract>
            <t>Signaling layer protocols specified within the Next Steps in Signaling (NSIS) framework may rely on the General Internet Signaling Transport (GIST) protocol to handle authorization.  Still, the signaling layer protocol above GIST itself may require separate authorization to be performed when a node receives a request for a certain kind of service or resources.  This document presents a generic model and object formats for session authorization within the NSIS signaling layer protocols.  The goal of session authorization is to allow the exchange of information between network elements in order to authorize the use of resources for a service and to coordinate actions between the signaling and transport planes. This document defines an Experimental Protocol for the Internet community.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC6294" target="https://www.rfc-editor.org/info/rfc6294">
        <front>
          <title>Survey of Proposed Use Cases for the IPv6 Flow Label</title>
          <seriesInfo name="DOI" value="10.17487/RFC6294"/>
          <seriesInfo name="RFC" value="6294"/>
          <author initials="Q." surname="Hu" fullname="Q. Hu">
            <organization/>
          </author>
          <author initials="B." surname="Carpenter" fullname="B. Carpenter">
            <organization/>
          </author>
          <date year="2011" month="June"/>
          <abstract>
            <t>The IPv6 protocol includes a flow label in every packet header, but this field is not used in practice.  This paper describes the flow label standard and discusses the implementation issues that it raises.  It then describes various published proposals for using the flow label and shows that most of them are inconsistent with the standard.  Methods to address this problem are briefly reviewed.  We also question whether the standard should be revised.  This document  is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC6398" target="https://www.rfc-editor.org/info/rfc6398">
        <front>
          <title>IP Router Alert Considerations and Usage</title>
          <seriesInfo name="DOI" value="10.17487/RFC6398"/>
          <seriesInfo name="RFC" value="6398"/>
          <seriesInfo name="BCP" value="168"/>
          <author initials="F." surname="Le Faucheur" fullname="F. Le Faucheur" role="editor">
            <organization/>
          </author>
          <date year="2011" month="October"/>
          <abstract>
            <t>The IP Router Alert Option is an IP option that alerts transit routers to more closely examine the contents of an IP packet.  The Resource reSerVation Protocol (RSVP), Pragmatic General Multicast (PGM), the Internet Group Management Protocol (IGMP), Multicast Listener Discovery (MLD), Multicast Router Discovery (MRD), and General Internet Signaling Transport (GIST) are some of the protocols that make use of the IP Router Alert Option.  This document discusses security aspects and usage guidelines around the use of the current IP Router Alert Option, thereby updating RFC 2113 and RFC 2711. Specifically, it provides recommendations against using the Router Alert in the end-to-end open Internet and identifies controlled environments where protocols depending on Router Alert can be used safely.  It also provides recommendations about protection approaches for service providers.  Finally, it provides brief guidelines for Router Alert implementation on routers.  This memo documents an Internet  Best Current Practice.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC6437" target="https://www.rfc-editor.org/info/rfc6437">
        <front>
          <title>IPv6 Flow Label Specification</title>
          <seriesInfo name="DOI" value="10.17487/RFC6437"/>
          <seriesInfo name="RFC" value="6437"/>
          <author initials="S." surname="Amante" fullname="S. Amante">
            <organization/>
          </author>
          <author initials="B." surname="Carpenter" fullname="B. Carpenter">
            <organization/>
          </author>
          <author initials="S." surname="Jiang" fullname="S. Jiang">
            <organization/>
          </author>
          <author initials="J." surname="Rajahalme" fullname="J. Rajahalme">
            <organization/>
          </author>
          <date year="2011" month="November"/>
          <abstract>
            <t>This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods.  Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.</t>
            <t>The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC6438" target="https://www.rfc-editor.org/info/rfc6438">
        <front>
          <title>Using the IPv6 Flow Label for Equal Cost Multipath Routing and Link Aggregation in Tunnels</title>
          <seriesInfo name="DOI" value="10.17487/RFC6438"/>
          <seriesInfo name="RFC" value="6438"/>
          <author initials="B." surname="Carpenter" fullname="B. Carpenter">
            <organization/>
          </author>
          <author initials="S." surname="Amante" fullname="S. Amante">
            <organization/>
          </author>
          <date year="2011" month="November"/>
          <abstract>
            <t>The IPv6 flow label has certain restrictions on its use.  This document describes how those restrictions apply when using the flow label for load balancing by equal cost multipath routing and for link aggregation, particularly for IP-in-IPv6 tunneled traffic.   [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC6633" target="https://www.rfc-editor.org/info/rfc6633">
        <front>
          <title>Deprecation of ICMP Source Quench Messages</title>
          <seriesInfo name="DOI" value="10.17487/RFC6633"/>
          <seriesInfo name="RFC" value="6633"/>
          <author initials="F." surname="Gont" fullname="F. Gont">
            <organization/>
          </author>
          <date year="2012" month="May"/>
          <abstract>
            <t>This document formally deprecates the use of ICMP Source Quench messages by transport protocols, formally updating RFC 792, RFC 1122, and RFC 1812.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC6928" target="https://www.rfc-editor.org/info/rfc6928">
        <front>
          <title>Increasing TCP's Initial Window</title>
          <seriesInfo name="DOI" value="10.17487/RFC6928"/>
          <seriesInfo name="RFC" value="6928"/>
          <author initials="J." surname="Chu" fullname="J. Chu">
            <organization/>
          </author>
          <author initials="N." surname="Dukkipati" fullname="N. Dukkipati">
            <organization/>
          </author>
          <author initials="Y." surname="Cheng" fullname="Y. Cheng">
            <organization/>
          </author>
          <author initials="M." surname="Mathis" fullname="M. Mathis">
            <organization/>
          </author>
          <date year="2013" month="April"/>
          <abstract>
            <t>This document proposes an experiment to increase the permitted TCP initial window (IW) from between 2 and 4 segments, as specified in RFC 3390, to 10 segments with a fallback to the existing recommendation when performance issues are detected.  It discusses the motivation behind the increase, the advantages and disadvantages of the higher initial window, and presents results from several large-scale experiments showing that the higher initial window improves the overall performance of many web services without resulting in a congestion collapse.  The document closes with a discussion of usage and deployment for further experimental purposes recommended by the IETF TCP Maintenance and Minor Extensions (TCPM) working group.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC7305" target="https://www.rfc-editor.org/info/rfc7305">
        <front>
          <title>Report from the IAB Workshop on Internet Technology Adoption and Transition (ITAT)</title>
          <seriesInfo name="DOI" value="10.17487/RFC7305"/>
          <seriesInfo name="RFC" value="7305"/>
          <author initials="E." surname="Lear" fullname="E. Lear" role="editor">
            <organization/>
          </author>
          <date year="2014" month="July"/>
          <abstract>
            <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Internet Technology Adoption and Transition (ITAT).  The workshop was hosted by the University of Cambridge on December 4th and 5th of 2013 in Cambridge, UK.  The goal of the workshop was to facilitate adoption of Internet protocols, through examination of a variety of economic models, with particular emphasis at the waist of the hourglass (e.g., the middle of the protocol stack).  This report summarizes contributions and discussions.  As the topics were wide ranging, there is no single set of recommendations for IETF participants to pursue at this time. Instead, in the classic sense of early research, the workshop noted areas that deserve further exploration.</t>
            <t>Note that this document is a report on the proceedings of the workshop.  The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC7418" target="https://www.rfc-editor.org/info/rfc7418">
        <front>
          <title>An IRTF Primer for IETF Participants</title>
          <seriesInfo name="DOI" value="10.17487/RFC7418"/>
          <seriesInfo name="RFC" value="7418"/>
          <author initials="S." surname="Dawkins" fullname="S. Dawkins" role="editor">
            <organization/>
          </author>
          <date year="2014" month="December"/>
          <abstract>
            <t>This document provides a high-level description of things for Internet Engineering Task Force (IETF) participants to consider when bringing proposals for new research groups (RGs) into the Internet Research Task Force (IRTF).  This document emphasizes differences in expectations between the two organizations.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC8085" target="https://www.rfc-editor.org/info/rfc8085">
        <front>
          <title>UDP Usage Guidelines</title>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="BCP" value="145"/>
          <author initials="L." surname="Eggert" fullname="L. Eggert">
            <organization/>
          </author>
          <author initials="G." surname="Fairhurst" fullname="G. Fairhurst">
            <organization/>
          </author>
          <author initials="G." surname="Shepherd" fullname="G. Shepherd">
            <organization/>
          </author>
          <date year="2017" month="March"/>
          <abstract>
            <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms.  This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP.  Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
            <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic.  They may also need to implement additional mechanisms, depending on how they use UDP.</t>
            <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
            <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC8170" target="https://www.rfc-editor.org/info/rfc8170">
        <front>
          <title>Planning for Protocol Adoption and Subsequent Transitions</title>
          <seriesInfo name="DOI" value="10.17487/RFC8170"/>
          <seriesInfo name="RFC" value="8170"/>
          <author initials="D." surname="Thaler" fullname="D. Thaler" role="editor">
            <organization/>
          </author>
          <date year="2017" month="May"/>
          <abstract>
            <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol.  Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult.  This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC8655" target="https://www.rfc-editor.org/info/rfc8655">
        <front>
          <title>Deterministic Networking Architecture</title>
          <seriesInfo name="DOI" value="10.17487/RFC8655"/>
          <seriesInfo name="RFC" value="8655"/>
          <author initials="N." surname="Finn" fullname="N. Finn">
            <organization/>
          </author>
          <author initials="P." surname="Thubert" fullname="P. Thubert">
            <organization/>
          </author>
          <author initials="B." surname="Varga" fullname="B. Varga">
            <organization/>
          </author>
          <author initials="J." surname="Farkas" fullname="J. Farkas">
            <organization/>
          </author>
          <date year="2019" month="October"/>
          <abstract>
            <t>This document provides the overall architecture for Deterministic Networking (DetNet), which provides a capability to carry specified unicast or multicast data flows for real-time applications with extremely low data loss rates and bounded latency within a network domain.  Techniques used include 1) reserving data-plane resources for individual (or aggregated) DetNet flows in some or all of the intermediate nodes along the path of the flow, 2) providing explicit routes for DetNet flows that do not immediately change with the network topology, and 3) distributing data from DetNet flow packets over time and/or space to ensure delivery of each packet's data in spite of the loss of a path.  DetNet operates at the IP layer and delivers service over lower-layer technologies such as MPLS and Time- Sensitive Networking (TSN) as defined by IEEE 802.1.</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="RFC8793" target="https://www.rfc-editor.org/info/rfc8793">
        <front>
          <title>Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology</title>
          <seriesInfo name="DOI" value="10.17487/RFC8793"/>
          <seriesInfo name="RFC" value="8793"/>
          <author initials="B." surname="Wissingh" fullname="B. Wissingh">
            <organization/>
          </author>
          <author initials="C." surname="Wood" fullname="C. Wood">
            <organization/>
          </author>
          <author initials="A." surname="Afanasyev" fullname="A. Afanasyev">
            <organization/>
          </author>
          <author initials="L." surname="Zhang" fullname="L. Zhang">
            <organization/>
          </author>
          <author initials="D." surname="Oran" fullname="D. Oran">
            <organization/>
          </author>
          <author initials="C." surname="Tschudin" fullname="C. Tschudin">
            <organization/>
          </author>
          <date year="2020" month="June"/>
          <abstract>
            <t>Information-Centric Networking (ICN) is a novel paradigm where network communications are accomplished by requesting named content instead of sending packets to destination addresses. Named Data Networking (NDN) and Content-Centric Networking (CCNx) are two prominent ICN architectures. This document provides an overview of the terminology and definitions that have been used in describing concepts in these two implementations of ICN. While there are other ICN architectures, they are not part of the NDN and CCNx concepts and as such are out of scope for this document. This document is a product of the Information-Centric Networking Research Group (ICNRG).</t>
          </abstract>
        </front>
      </reference>
      <reference anchor="Colossal-Cave" target="https://en.wikipedia.org/wiki/Colossal_Cave_Adventure">
        <front>
          <title>Wikipedia Page for Colossal Cave Adventure</title>
          <author>
            <organization/>
          </author>
          <date year="2019" month="January"/>
        </front>
      </reference>
      <reference anchor="Conviva" target="https://www.conviva.com/datasheets/precision-delivery-intelligence/">
        <front>
          <title>Conviva Precision : Data Sheet</title>
          <author>
            <organization/>
          </author>
          <date year="2020" month="December"/>
        </front>
      </reference>
      <reference anchor="IEN-119" target="https://www.rfc-editor.org/ien/ien119.txt">
        <front>
          <title>ST - A Proposed Internet Stream Protocol</title>
          <author initials="J." surname="Forgie" fullname="James W. Forgie">
            <organization/>
          </author>
          <date year="1979" month="September"/>
        </front>
      </reference>
      <reference anchor="GREASE" target="https://tools.ietf.org/html/draft-iab-use-it-or-lose-it-00">
        <front>
          <title>Long-term Viability of Protocol Extension Mechanisms</title>
          <author initials="M." surname="Thomson" fullname="Martin Thomson">
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
      </reference>
      <reference anchor="ITAT" target="https://www.iab.org/activities/workshops/itat/">
        <front>
          <title>IAB Workshop on Internet Technology Adoption and Transition (ITAT)</title>
          <author>
            <organization/>
          </author>
          <date year="2013" month="December"/>
        </front>
      </reference>
      <reference anchor="MP-TCP" target="https://datatracker.ietf.org/wg/mptcp/about/">
        <front>
          <title>Multipath TCP Working Group Home Page</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="MOPS-109-Min" target="https://datatracker.ietf.org/meeting/109/materials/minutes-109-mops-00">
        <front>
          <title>Media Operations Working Group - IETF-109 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2020" month="November"/>
        </front>
      </reference>
      <reference anchor="model-t" target="https://www.iab.org/mailman/listinfo/model-t">
        <front>
          <title>Model-t -- Discussions of changes in Internet deployment patterns and their impact on the Internet threat model</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="NANOG-35" target="https://www.nanog.org/meetings/nanog35/agenda">
        <front>
          <title>North American Network Operators Group NANOG-35 Agenda</title>
          <author>
            <organization/>
          </author>
          <date year="2005" month="October"/>
        </front>
      </reference>
      <reference anchor="NSIS-CHARTER-2001" target="https://datatracker.ietf.org/doc/charter-ietf-nsis/">
        <front>
          <title>Next Steps In Signaling Working Group Charter</title>
          <author>
            <organization/>
          </author>
          <date year="2011" month="March"/>
        </front>
      </reference>
      <reference anchor="PANRG-99" target="https://datatracker.ietf.org/meeting/99/sessions/panrg">
        <front>
          <title>Path Aware Networking Research Group - IETF-99</title>
          <author>
            <organization/>
          </author>
          <date year="2017" month="July"/>
        </front>
      </reference>
      <reference anchor="PANRG-103-Min" target="https://datatracker.ietf.org/doc/minutes-103-panrg/">
        <front>
          <title>Path Aware Networking Research Group - IETF-103 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2018" month="November"/>
        </front>
      </reference>
      <reference anchor="PANRG-105-Min" target="https://datatracker.ietf.org/doc/minutes-105-panrg/">
        <front>
          <title>Path Aware Networking Research Group - IETF-105 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
      </reference>
      <reference anchor="PANRG-106-Min" target="https://datatracker.ietf.org/doc/minutes-106-panrg/">
        <front>
          <title>Path Aware Networking Research Group - IETF-106 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2019" month="November"/>
        </front>
      </reference>
      <reference anchor="PATH-Decade" target="https://datatracker.ietf.org/doc/slides-99-panrg-a-decade-of-path-awareness/">
        <front>
          <title>A Decade of Path Awareness</title>
          <author initials="O." surname="Bonaventure" fullname="Olivier Bonaventure">
            <organization/>
          </author>
          <date year="2017" month="July"/>
        </front>
      </reference>
      <reference anchor="PANRG" target="https://irtf.org/panrg">
        <front>
          <title>Path Aware Networking Research Group (Home Page)</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="PathProp" target="https://tools.ietf.org/html/draft-enghardt-panrg-path-properties-03">
        <front>
          <title>A Vocabulary of Path Properties</title>
          <author initials="T." surname="Enghardt" fullname="Theresa Enghardt">
            <organization/>
          </author>
          <author initials="C." surname="Kraehenbuehl" fullname="Cyrill Kraehenbuehl">
            <organization/>
          </author>
          <date year="2019" month="November"/>
        </front>
      </reference>
      <reference anchor="QS-SAT" target="https://dl.acm.org/citation.cfm?id=3160304.3160305">
        <front>
          <title>Using Quick-Start to enhance TCP-friendly rate control performance in bidirectional satellite networks</title>
          <author initials="R." surname="Secchi" fullname="Raffaello Secchi">
            <organization/>
          </author>
          <author initials="A." surname="Sathiaseelan" fullname="Arjuna Sathiaseelan">
            <organization/>
          </author>
          <author initials="F." surname="Potorti" fullname="Francesco Potorti">
            <organization/>
          </author>
          <author initials="A." surname="Gotta" fullname="Alberto Gotta">
            <organization/>
          </author>
          <author initials="G." surname="Fairhurst" fullname="Gorry Fairhurst">
            <organization/>
          </author>
          <date year="2009"/>
        </front>
      </reference>
      <reference anchor="QUIC-WG" target="https://datatracker.ietf.org/wg/quic/about/">
        <front>
          <title>QUIC Working Group Home Page</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="SAAG-105-Min" target="https://datatracker.ietf.org/meeting/105/materials/minutes-105-saag-00">
        <front>
          <title>Security Area Open Meeting - IETF-105 Minutes</title>
          <author>
            <organization/>
          </author>
          <date year="2019" month="July"/>
        </front>
      </reference>
      <reference anchor="SAF07">
        <front>
          <title>Determining an appropriate sending rate over an underutilized network path</title>
          <seriesInfo name="Computer Networking" value="Volume 51, Number 7"/>
          <author initials="P." surname="Sarolahti" fullname="Pasi Sarolahti">
            <organization/>
          </author>
          <author initials="M." surname="Allman" fullname="Mark Allman">
            <organization/>
          </author>
          <author initials="S." surname="Floyd" fullname="Sally Floyd">
            <organization/>
          </author>
          <date year="2007" month="May"/>
        </front>
      </reference>
      <reference anchor="Sch11">
        <front>
          <title>Fast Startup Internet Congestion Control for Broadband Interactive Applications</title>
          <seriesInfo name="Ph.D." value="Thesis, University of Stuttgart"/>
          <author initials="M." surname="Scharf" fullname="M. Scharf">
            <organization/>
          </author>
          <date year="2011" month="April"/>
        </front>
      </reference>
      <reference anchor="Shim6-35" target="https://www.youtube.com/watch?v=ji6Y_rYHAQs">
        <front>
          <title>IAB IPv6 Multihoming Panel at NANOG 35</title>
          <seriesInfo name="NANOG" value="North American Network Operator Group"/>
          <author initials="D." surname="Meyer" fullname="David Meyer">
            <organization/>
          </author>
          <author initials="G." surname="Huston" fullname="Geoff Huston">
            <organization/>
          </author>
          <author initials="J." surname="Schiller" fullname="Jason Schiller">
            <organization/>
          </author>
          <author initials="V." surname="Gill" fullname="Vijay Gill">
            <organization/>
          </author>
          <date year="2005" month="October"/>
        </front>
      </reference>
      <reference anchor="TRIGTRAN-55" target="https://www.ietf.org/proceedings/55/239.htm">
        <front>
          <title>Triggers for Transport BOF at IETF 55</title>
          <author>
            <organization/>
          </author>
          <date year="2003" month="July"/>
        </front>
      </reference>
      <reference anchor="TRIGTRAN-56" target="https://www.ietf.org/proceedings/56/251.htm">
        <front>
          <title>Triggers for Transport BOF at IETF 56</title>
          <author>
            <organization/>
          </author>
          <date year="2003" month="November"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIANWY618AA719W3fbVpbme9bKf8BiHiJ1k7RkW7bl6ZkeRZYdpW1ZZSnJ
mnnpBZIgiTIIsABQNMud/z7725dzASHJqa41D5WySOLgXPbZ+9v30Wj0/Xdt
3hbZ62RwnbbL5Gyb1llylbXbqv6cl4vXycdJ06bTImuStkreZOui2q2ysk0O
zpKfsqbN03qXVPPkU5XOmuSqapPb9HNWHg6+/y6dTOrs7nXy+zJt5RsaoPr+
u1k1LdMVvXJWp/N2lNftfLROy3ox2tIvR2XVjtpqNKtGxyf047SlX37/3ZT+
f1HVu9dJXs5pkGYzWeVNk1dlu1vTLy4/3b79/rvvv8vX9eukrTdN+/To6PTo
KU2jzlL7Hqta1NVm/Tq5Prv69O777z5nO/pw9jp5m+ZFE/zt9yD4kLcn+Bt7
Fv55doU50IaVs/9Mi6qkie0yGnWdYw0JbeFUP0mSpqrbOps3/oPdKvp7Wq3W
6bQN/8bO2w9oZZt2WdWv8d0I/0lob+jbm3HyJt3SzBv5UDb7Zp2V06yOv6rq
RVrmf09b2sfXyS1+QUd7tsrqfJom8ptsRTvzOmnk+Zk8Ps6zdv6/F/hqTPOS
X9YVCCmb5W1V81nQSdUrGvwue42/k+Ry9GYcnPffNqCgiiaNL90PaOhR29xt
F6OclpvVd6PVpmjzdZHRx+tsGgyW1p8/V6O0ni7x26wuMyKeJZ14O1pVs6wI
fjpP6zorilHWrvTTT2/Pj16ePnUvl7+fhX8fHx2/8L8+Pj49ir598Sz+9auj
0/jv487fr1760YhAj8Nvnz49OhEycR8cH8U/OO48cPy08/dJ9Pfzlyf+dc+O
X7wK/npx+jL87fOj0+d4uf35/Hm0sucvX0WvOjniv+2vp8evom9P4n05OQkn
cvLiVbSMk9OX/Lf/81n85/Poz72Hn4d/v3h6Gv/97DRY9Yvnz6JV09/RxF90
DvTF6dPg6ZfPjqL9ffk8Xvaro1fR96+OXx4FU3/14iT+WmgNf51XRdU0aTE6
T/mu4Da1ab3I6PYv23bdvH7yJCvH2/xzvqb7lY7p4j7BX0/syf/Ek/95Nruj
C7wBj+IhlLX/bs8Rw1pkCd1K98YEzyXuuYE8KFz3U9bWeXaXzZJf0nIDRv/0
6PjUZlze5XfpPXPdbrfEFvgXYA9PaLy0WWZZ2zxZ19k0B98e0fUkzlDv+OYW
Rb4Ag3kSz1xfk1zbU8lr4mBtmtxgtHtm+yabZqsJ8bqnR0+PMF1mARdXI7q/
r5P4BTe3ySg5o/GrddXQs5fKRZIbYs7pCl8Q066KQXL/Suv5dCRcj88lz0r8
j142br+08piyah1EGfUv4+QtPZBn7mNh1b/Qf5vkd/s2XORNtm5lbcenL/Uo
3n26OLu56C7sfVUuRrSWVfJbnk7yIm9ZTtt6kosvbVbyjn7IpkuSAs2quW+R
bVUVwvJ5gct2VTxR4Z1ORpsmG+XtqKpHRFL8z6OjB1b9YZzcLqtVQ2+Ol/0h
rdu8tC/DVf+yKYz28CEf5+3Z7QPER/PiqZL8zO/yNs+aJ5DmzbJaN0/yNm07
dHZ59lPyu/4goZk5MrilzSnprix2dEmqNaRVQtI9ua1T2j3+8wBzOYxoMaDA
42dySh+uR7fn1/dMGfejrdPp56z227xdPFmt2+n6STqpNt0Jf2CJCMhGo/LU
Cakk74Btkp+rVcY3fWDc5sPH65vR8dHp6ENe/pkprOiS0bhP6NEnJMgJFqRF
82SVl5s2a3jAFW2oO283OeY1H9dZzcii6cxvRJfx9i0eTz7IUNHmXVV38fVN
Epblo/YbDhyIZJWWT4qckAXhjyf6aGeC8mEyGiVv8ma6YSDZ4H7gKizo9uUB
Dcw86qUdx4cN00C7zPI6yRmlgWjob/+QoBCZ+UBWcXV29fHd6NnJA8so07Ja
hFvfPOGPnp08ofMsZ2m8jivCkEvDa6VhVt35qm50w+3FyRmPEe32x2lbyWYf
neg0by5vRuc/n326vfg0ciDlGymGwP0T2sOadmHEQI5uSdOh3avsC/hrtm5o
u5KbfFGmBagjppJzGSWa7AcgPVyqY5kqg/jR6ek/QtOnp0+aTA7+CcPReJK9
6hAJmSbjOUSUfHo66GNXL8NJHh89+7O3D3vp79ozAc1P/vFp0hiPXbjjV0k8
6ZP/3qRP/gmTPumddCATwvm++O/N98U/Yb4vHt1kN+fbn0ckKtLZfZjv3hk3
RT6jCZ+eqiaVEprCOKMKulW7HKWYbUn03VnKWSIvZCzgloUfDiKZHYvmj4TU
cpr7T1WZRghTZfrH8f5X99+FexYLxZAX+I/exgMn+A6V4+IxQLsuODpLfqum
6WRTqPWCh8cPsxpY4c/joKxcELuatXocfARrN97o6Fk/IBq5f9lO3y6zOmvS
5EIH9N/zRt+O977ZH+N8V+dFkfxHnWbLrJxssmXRGeZ8HH2rmOoBUv3Lzejm
XsA1K8bpdMVbMgW2IpY6ns5X/57P/icpnUfPjp6P5f9P4lP4tcEh/mWTTz+P
bmjQFiamrCQJPM0Aa0ZzAvTljAiIpFmWkELR1oRcaVPZroBfkZie5LOctAO8
ldSZJmVdgn5eCp106PqBrf+UzucpPVwRyp5Ol3lnzz6NO5/vj3BW/3VTkm5C
p5+nTZYVadkZ5GwcfWvf3T/k2xrrbKZVck3AnaipM+DbcfeLnmkVdJi0te+q
tk33J8QfPziJd1VN9+RtmtfLTd10afLduPuVkBEMcP6nTEW/Xp6Pfr/v/t8H
gv9GBNKLgTHco9D35uzsH5JjHvqe9ELfk1GTpos96Esksqmha50R/AMQg37F
I/1JgXZz9vbopZHr48R7nTY5kRbdj3S5RyTX4/2v9ocgcPWZaAXwufM8qWzx
5/sP36QFTf8t4eRZ5+Gbcfix7dObDLppXmJj6B6ka3BL2mO6uA3deXzMl55Y
UY0fbMpZVm9a0mP/Tlq63m3A8aVuYkMnlDWA/E52Dc6r1Zr2uQ5kxoDe/VtV
bIhMTo6HydWGGd3LDsrEQRypyLqZLo8NAnfPQTdujB+l9byj54Yf2rrfpg2w
LzE7olanLJxXUDpYmzxXLgcjzU91lc4mUDX4l6zMZsnZel0Q3GfNan/xbm6D
6+X4zRjrJZlCIHyY/FrC3tKoJeCm3bTtgiYSrf2MDqFQhC33Z5mvXnilpQMP
9gnhTXqXz4jmd1ndIYQ34/jjHj6TVfN58vOmaasuCRKTiT8fdR/+JYVJgfac
ZN/eu38Z732zN8Bv+V/p4N/RjzoP/zYOPg0tBpfXdwT2oIkvqxVI9jotsyKB
uwMaV/Ls5AHi5J8MHlfihLM9oLPxrHp0yR1xzM0kYwPcNm2ny3+/+59/zV/8
n/+s/8/PZ39p9HxvP12+u/10djU6eUgvdWyRruk0y2asmZ6cPHn67HRMMKgD
r27rfLEgSmMiZkvJmtaY/PTxLfYGXDA5OeljfoyT4lm9+NOzevHk6cnxPzir
F/dhdp3ZaDRK0kkDadGCPZy1rPXPc5J9iYoMXC58+C2Ydci/rO0z9k0l6aKm
xQAM0S1Pi2rB1oaU4M3u7xnxPHpVNqdFtOyTm2V3WVGt+TdiqQjf3MJ+lcPR
MkxWFT1Jk9suc3rXloAmsdVmMyV80cw3RULbwhaLBnYOQhTM0v33Q6CtqiY+
zDjtC28Cbki+WLZiESnolzCkYIe9GmLsmpm6LpXOYYwNvF3mTUIazYbNK4B4
KY1Iu0Iz2Vs9cTF+CKewymezglSNH8Ab62q2YQS4PySpSdM6n8B/STttE+Tx
+ch5pdOccDutYQljeEETLGn/D2RF8gceBuxOtunuMGE0cs8Bi8QCSs2rGba7
oQOqCZqKhkbngHGJYu+gwrHw07Xhx4QaeILb5S65S2mITXPPe/zJyrQJUZZJ
ka8I+85wlGUVGK7GrNb/8IM4Y99U9NCgo/4Rc6a55DBj0VTe6P79e/L1B1La
Ztn8D9lbwuGbupadnZP8ZqFFE+8ON0w2sKdPdn/iLhAKoL/Z+HYjiD45Hh8n
B4QW7FWDQ3z79et9nsQ//oB5OY1ml2PEabGZ0XygXiUpbTtojfTVHE4H0LPc
QzqgWvbq3yZFNf38t03VZv+LecJb0PSmhpugkSsekNkwGbAxtkvvA09/PAhB
m3WVY/NywvTwfhi38NoiPsFgTLE7bCPuEz8OF/CmVOEvhORGpMnLlslimmhI
pnfSb2hXZSK04a1gr9kTWlgLdqgO9f9BpEPIix/hRU5TsXmnBTZoR4vW1Sxx
YPzCBrg7g0uhFRLyZOJADk6aiHMKE8GYn7/4QqfHWK9SsvOnRquL9tTcu9jY
AY60KvEhjyMMrX9veYhgJ6I9a7JC6awSnCb77iiXdPt5PqWFiVnYkbMbADPL
vgCPkZDZ8RDNZg25ks2GdCSEr2bgOXbKcF/nGJLIIl+UweGLV2aepdieJlpW
Oiky3R63MizDzZ5289+eRPT6/Xc/EbcB6URkSjOa4xniLwyfRZMGvwDT2mNU
fKqteUCwe0bNM7mFDFbzyUavXrIiAEXEY6+J6CA8WnpCaTQanUUS3cuGOGNN
7wjOf6Bbn9diB8BLq5rnqCNNw7kkQjJ66Y2p1RlJChwB42jbFMcbr5jsK/hm
kwsXxXApRxTyoEcYFB3qQwzKfAwi+1sYw3kzlc3+scdckmZZbQoiviz4l1Fk
im0rClnE78uMxqzl7srtbEQWtPI2v7SE94OnJVijzlZEBfLmRulKdgb+UZLX
tm8f4aMLRARJiLX/+o9/BiyS3fj07o8/hg6bnZ7ap6PTU3zRY5QkcU07wtdE
fDosmR6wefKQzgqLUeHfa9tstW7pgAKkBFhEcCgCTIA5KYvpTHQqld5DAUgk
fPO2H4wJPyV+SFcuHmJRpUUj95E5A9CeXEhSwlvjPrKZaRsslV66xV0ACJYp
pxPSmgnX0LSnwDFynCPYGD1XVpFCL19CLE7pTDdFCpqwi8jsh1YDHQbCcpvT
glZpeQ/ONABUkE4boKA2X2UssWQOZwXpkZvFUnhMwOe7sGYCWCNABpgMW559
SVfrgkZ7k5NEA3PJecI3WX2XT3Gx6Ef4Dh/QCWsozB9/HHoMHHAf/7Lyx1Zg
1BbQbA1pl6Sh1xfzUDx1QT9PBp4YBuFgRf458zOA/JyntHOVj6XD2dELQLcN
v64mqZMusjGfjqHAOd/dchRNwjDe3szUR4ldxPEIPsBfW2iYTF1Nu5ntxobk
Vlmbjhxmr6uVzCs86wzmfBzYdR+8YZrhE1pV9IW7xDRMCUN1XmY0UrlgNk2c
hkgpb5Zq80FIXvfeY8H9DCIXAF9D2RAqZ+WnkvNFKA5BP6Ut1pT4LU6HYCTQ
RGujxxndG/Tr3/GtMdyUtDN4dIWpEdeU2TJXjRbBszgraKUIrkhLmv4QbJrX
e75M85oIFLhCFCz1lqqO8U3ckcQFFOYhO+zkVt+rR2VevfDinmVp2nYVz4Ov
X98LNbwXtYevzCQFHGKEFihlB3vS/7BvJnW2xktA5QwG6JckkzbNn5EGkYBu
gl0HWnevvLRoQ/YDeP1PGGQWqVEOb61c7EuAO+Ti0CYzb5qmeJhjOgnMwfw4
NBjomGhA6slt2nyGskAUdgDBdSjD2fBNoluc6B7bxSO9IpiO8AGA3tJ0GKJX
iajkdzOAA1XbUgRRZjWLLYEBisRBeCL+MR/mjlnRZFvWhfJO3EI2rZodUfdK
dv2MNdR79na94ftsCEveRFuFyKlhB8OAU5BKKvZDiJtJtqskiCL52ya1+KSI
YHNPyY4GzgSmnTkNfCRHeuu576XhvssOUumxDkATBmI1ss4YXa8tHKxXqfOc
Xq7ENpUxmGeAMTt+nM3GNAnazZSIZpt59XxTExkTXbKyFkJgEQxp0zA/qFlE
2sl5WS0kRYCyKBIiKiKReZ5Br5Hf+62g4dXSQNd4yrHP9KDdIGP9IVDeZwEB
4QXWG7NiCPFlegEapQSC6dgsZoVXpB4uU7pJrIcTQeNNNoVgrntw3QN0okJC
vtuyf4LDLhE5LSuS75CcbVtkKjcYxmwdYCZNm0GTgxoCm8fJT579RdNViumZ
7xCEmwsKKJTT0ovKfdDBb1wTIdN2EJHNhs4UQNotIwP8oK13Ku5sm5kzqRBk
psxCCjQ4ydyPaGZYI+6JyKxpWstI+MiOkjaXNHJ4TvmMnLibp3mhbxUpyWzK
i08hweBX9Hyd7QMI7HLFe9xvBVSFXMlnrLf8t6zcSKDqmwjLt93rfOA1mtcJ
gUI6rD5NhlY0r3ivJ+Y7OcTj8eiObpwuiUvlFmNRXyEDobNfkCpR8wby3rUp
Yb91wXhPiIaVlmSlW4XINFvmmTeJ0ADvNvkM3l7lu50Lyx4wFkNy7NmeIFFe
2UuR3rwFyqTVEAtKF6L5TYjnr3DiK5phWsuZRUIhmGdG+hZR6o9+cJhikgEb
Fj/Q2htVi268nmRBp/8+ELSGeHHiK9jNwXWRluwFZOhn/CSKtbzZTBpoqrTd
Puyy0bEQZK3Iz+kUes+2VTBHuvG4H3bEDL3Ep3CPpdp4m+jpOwbSy6xYY0FE
v7R/U12r7CtoLfuslyFfge1mygrjo0OUoalWYqzAIIFaeR+wpwehddnEOD7Y
K0M4MOJVRL2688nbdMpBgJHR5ibjoZ+Oj8VOERxHsMBwWV1zhIhib19iFMEw
geiorFY0g5StAeKdkLjtRm3mfjmKSP4bgbdfvyLylmZOIBOeHNEEnh2dYDFF
U3kj+7yqTOSAQOT+3ai5S1FH9zb1y0KzbHVOsGMXc5s6DCclLLNLtcQGbtkV
Lov9tQnubwxcIDrqFbKsZhkPdVFkxoS6YEtojwBlypeLjW82O4uKgq1cZ/CB
pEk1kxlIekBoTPv6w21GREZKdgz59/EUqUhbFi9C5MEYE+/P2Pe7MMfZkxpl
BiHMmuVjLhBTPdjsofqv2UICCQkLWprPlBY7+kcfwGvMlOYtEextA7B7qxDm
AadAaKoUWR6Z3JQ+RWvFUHBE8zX3MxgqLrJACU6qy1NRCua8ScCfMFljFPoo
vSNJA6PNUK0wkgbABmvx3eFVE5oFqBn2k2lmBGyixb0eY6YQbbW50tatk8UM
VehFq/gZnpBDeuwdKO4eGyl0fO2NBsOMoutwGGKpbWascc+9F4IMmGACGAP8
3SU3Pjr31rFaPtfrYteVt79nP95ljk98/SHVHzkPGZuCgQimRCnKd8Jbgv1h
aE8yaICkx2RFoIBlJ1PaFgQ8c7qZmP9or/OKjy82gwq8NNMwdmoFBJIuCAoM
xslNJSSl2ndwI3st+KStw/fNP4+WIQoprbnIQTmB5tV3IYWyajn+3hfRfnz9
enP7FEvY0yPBapDhctQg9OIuK80bFd1Sp6qycpndgcoEBeXlhhgNLCQ5W/RW
jdKXuFIqx74T0irwNx+h4gYlImclE/jWMcHgEmZbNdp0RUefHaWLzjIJM3rG
RpzThANzAozraMXM3wgbs4PXcDaTKMD1OWuVuCWz3NR0j239IC+CQV7IIGP6
iOYz3wDdMQmo1GS3B8w1joDqqloNlHtmKW2G7FWSzpmzsA3Dv/YeI8Y0XTOO
NN0r9bhbh5MTY2TKfP1fk8FlCelBwmKQjNjhMVJQBcnO5hqvb/FzqURJ4bwZ
j5aBVt8vTYhLbdSbRi/8Da+jp/E+kBchugzsLMBjeo6wK4pLa8XGSVXDggnQ
D9MepXQc2Y2c1YPm7wFjqKHa9gBsBYM3tLANjAAycWRaX1VbzFu8t6SXERCk
lzQtv72cidlhQ9wQ0SY07ZLgQUbykaAf46EZ6QbsxxAln0d3QXde19/C/rCl
m8tX6K4iybpIV5NCPbpp11BSZwX7twWuDGmZbV4EuiwMWAzOYcIUJxmO/7/0
giX/lZxrGnjyX/j4lw0tac78OcxM//rVf+E/xx38r8TRkYxwzbSOAX7KsAmt
gPELYnOKO7FOGpE/sQ++dajZppaoMA6m6cxRP31kgh83rZptMdJFOUNuPBxA
TlXy6XsYNfq9jGiUrNNMd07b8tcgsJ7x1Hbu6c58Ll22k0vvSqHgIfZgKk8H
X8iv+7crq0fEEkvVz28gyvnd0ef8cd8y/iPL1mxtVRc9DYHQypE48Gkc/1ff
4xfqwG9oANAKjcSaxwqZazQRQGw5d/uh/e7yjQ6o90y3Zf9hN7B/F41Hj9sX
7vOe8T5xMIfokm+ADWjbJFGKR/mksR63+SrrXd+NBCGA89hrPMXQpk4/y0Hr
R/yJPrM/3NfXyQ9eQOBGDnpv3mBI6vy3XCj+4SN0OBDmM3iY4AZ7MQPC/XNH
bAKs96QYYzADFY3ZvdJim+4adq/va+j3iZBbz895b3q24M19jGDA8yChDbMx
C1ET9kPjHh0fTZGyJa8ohib2WNW9fwdkVlBWBn+GmQyGgWqPSBhOLprT0O0W
ipBaOGZROgaD6362wr5ID05Q3KLIvsBgC5Uor8Ur1Uj8fs8Asox/iW0epO3s
qg2j+2oCdCWHDS1qz+bCpvxYGKrTk5TkhihbbVkTRWnqxp6TQssqqFjiCMOu
SXK5AKAcE8GTbMrkiMoIhmTpQnQuWnuwaDk81lLTVk2NoqVMMpuPeoZgV9G3
DZ1BNyWAhcXZnuch/ynBf4Jj72O1crzJ52yXuNAU5ytzELVDe3zXBoDMqw19
yOrXQK6pOJP4E1DMivZQ9nFgB0cskr3hYILyT3Aad/jyKIzH7IHZWxBfQfku
WItRI2x9tksN+wv6nVqhpjD0BnE+CD9sI4it3ZQI55bYOQ1NZHWmu9cSUIhs
piILZyfecTauMgnBf4NADY5ZSiOwnvnLGM5jVonqG90d2ar+mbgNkbkHe3Lp
gh74K6FWUn/r3ZqD1f7EYCDUH9m1Chm1AQC0nwaTH+K42EihKip7V5qcA0oC
8nxQlA/Yb4aAxFniIxKZedfqIeDDg3UKbKgRJA4MzjzbIqOEccCkPoHJBOGP
7Crl4bzuwBGwyjhlJA5ltsEdjN3JgVbO+j9SKxDfcR4bB8SauPp2xAyn1lB9
scXLcXjBHA6lZF6k2wfCILomL97Bb0IzelG/CakId/C6sBiPnOkIaSns0LHI
sTtaVRtfuVvJf+dMezuC3+0k2eDC2sBeGFPjjHO5hTFp2ClzdJLPztkcuUQj
RfmANEj+zQPpWJrKBStEkCJG+i82P44gk2i+x2oNqUdDfhxUG+IgCq0X8JBL
hdnFFONxEFvoL+I5qWEDOmiwW8ROtcSBBGts2BhUE9chXervLozXDKP9VCX2
em/BlPSCoXLnEIUEVPcARt27teweL4pQ2DH7gdPWCYg5GzjtF7iVHDHkk8A4
wHgmmCMKK+PQWDCPTcFUWk1QNipL7vI05Kw+vMKBp7u02IittB+2+AtvATB+
goFzPY1014ngvoj34zFJ4LL1ngUKP/wu5smPIIG8EriiyeCYMRd/lfxVIHjH
QdQfksejMDPaGAwGrwre4/y+6gEau2P+BlVi77iDWaRBthrBhkaYnZrh/IpZ
7llwe2awQCCZMIQ+/GZbectW0tEcDi+SrtPPGT12dn1pUSfgGvDvulITwazY
EDxtA6AfmBnlrcr3XLQDovg+q4X4ZrNaaRZ51wz49YeOFdD5S8wr3fDDdE2b
XjuiRgZlkT+6gTd0er8Jl+d1AeOcWk2cQ4teki4Wxn5D90psGBYfPlzEpQWm
Id5egxcN7HhyZ9NYzhTYxkknH9l0Fc4+IEoIPzZ3swJz7/ssWjycgslN75dh
uYT8rub++ZgHMIrBEBK65IANvWMtu4rzqTJPtk9B0U5YzbApsK1PrIKRV3O7
zAsGshL1wE8OvV7SGUBjQO/1+eJ+gP1YXGiExz1eD6AYyNvQWCfgVGeLV/SH
ospe5wHcNbP7BNoP6NyGHshgiir0+QGrMDSHeashzLR6UsGbwAnRJXIwCRdi
OKlQiOF+HsaAACdvYTrCyB97wv9a5GNnEA7ABYuvEySbf8Z23xCCIGiA7Fcn
2M9ITy9nm9VIijnhc8lDUYXUyU/eAT4I3TbnaO03WX79oddiaR4Ikyd78euO
oUpo6r5wIJ6PVwVVjUDDgSFF+ZyQF/G2oqIdoM9/Hd+MfU7qBWk2QPnEKutM
o80HJK9BKTlUAYKEn+mmiroyz7/QNwOxHAzY0WhJIGtnt+FEpVm6+7FxmGic
HMiuByUhxIVu6aDeh37D8Rejv2yIbyzxMZamKpL4yJwP/tDc7N9m7P36Q2zr
xcP+yUn4ZMZPpvakqu/QqdkRy9oqyINPSXMzQ6O4y6fci4aLAvf0lRK4eScJ
VyycUgZVw86jYGSxEcICE3vIXHfcaeS6vZ0T+Mc2916rF3IK96zfHJLByQBs
Y4OlU1GAgiCCjyyNs8JwAacYcKIJ/BZFVi4g19QzjZ/a9disFzBgiTNa8UxK
tL8N/ewaIgZt0p2yHimSAsYSSxr5mWyC06qCgpdGNonKVeHaLitXvSQVAd46
k5QtRyh7/2FNWINwQnjl3NuedFUCpc2Qwop+SGTOnecWxbGIVQnS5TCMaMtc
RL/t2Z6O3FY+fuw+ufXPICxjmX/KBfL1h9gDwnFhs3TNmUuBKtAXAQ5UQext
zWHJVTIn9RYGA7ssjr2aTAxMMsR+i/zvDGuNWYvxjoksEE/udTpMnWdqKSjz
NSfemEmJiTvlQ+GbbzoNv9kDdzq7vgewFpgS2U63SlH4IOGsDAJsHHbTip86
Og89I89t/SE86jbClXZBEIO3kCRbCUEiDrgbD0CWnqjFgAQ0r/VI014ZLnds
6rKhplUjWqpQGueFaCCZo24F6/YuxwNwRMhn98B1nJxXdCVRBOp1Z3qPTWz/
nXI9LS2rdzE2kxA774tsW6e7QhokEdylYc9B6Tk95p+j+7HnnmMArM/N7zsJ
bwowMAE9O3jH2r2D84U515jDK+z6VLUJoBTXb5U3ccgIp/9a1DwHDvCcLFWk
ydybQdyszQZAmfUY4VCC8qp5i3gtZMwKq+rhTgrvwhirHpTnZVyfz5IIv8dl
yagh/rkax8s+S6vjumnZUV/uUwzi4AMNxsTxsS8JBGRKtbocSBvDjgyJ/FY5
0fyekNN0RFUPmXNw6jIiB4vdiKQB+0V4GV4YZhzXIOG0sMhyPmrCAdhOfc1m
Cwf/FXAOSWbXmqRi2feakj7FSYa0b2Y15zWw83jYCfz1h8AHjCc+QLTDWFaX
ob04WMGSdDIWD84+HEb+cX6Nbg9qQWxdwDt2kAmyYX8Q7FP0Xpgheq2/ycFg
7i3carXjN4kxOHybWZGXWXq3M/NNXo64LFAgvBqcF7LMru+e84ZxcZpPvI7k
jNh/SxxB9PuDT2cfD82yJQCGbw9XUWkaNenda7seE4MQC4vzn/TMB3szQ70h
jXUUbVhfUblEEd3pkOaqLX4ouxdMCeWg6N0fQxkifL3YTNn46JT9PSWQDXjY
wVwMeT3znfh45h0zmIBLowJdNttMM5uWZuasN56VoGpqQJrfFmBAukZffIGm
nfc5mhzkFXMYi9FJJh0P2IvT/hjCf7Hk2FQ4XseMmY2GE9zjP+TdrIGaAn7v
oOckI3LN6RTc+kMVbU89Ixyhtn+Z0oDnyxoiUzxB5xpKE0GFIQiA/oM4W+YZ
+KXY6zKFrqk4BPOm2UiS54pIBBweFEEMd57XCq9yyTuDe8KXwJbdEwquSr+Z
krQTBPEbZJeI7aNXiCs/yMaL8ZBz4s4/XLs3u9ylNOESDDOjFMcDJWGANuKM
uQyReGeJLDXrvMl0kd7tK05Ly57ll0j8K87Ma4VCGvyRjEgnLVbNZb6WC2ZW
TfEQG2T4ptiVrz/0hq4EFRI8nWmuhRj3yt2902k1OrCXyB30dRfe8+JvvvNV
GUzLCsttSmQhwrI2tUR3Pme7EQCdwv/vVWPktjNVs/VSSZtdFnLJVpx/C68e
kjDozOG9Ej4a2ustSdwxjocif77+EAf+dPIwvHOJLS+wCTqjMXu/h+KM5RhN
CR6QW+KzO4VeZ/reWN1ua9p/2Z4IIy6BNbDyDSc1Z8wvCwDooZ6wH14Mt0yq
cOlMpxuwdeavmicsl0WCAZDjmLcbeVSVLpsbv5UzWfesATxtvkRypUmDyHIA
m6LivB/kZGpsZNrEUF5NDf0Q2GnSzEc5xobDbpqWTacS0bFTX5cFEsnAwBf9
5i138N8SskVYsy9iCyP8IsqFEEPa8VUE5aZYIdUyM0+E4n0WLNJFXLyDd9vw
eo3I4mfHfo6NzNG24HNJ2F/DqzPWBugMUEFDijiGEeRhkbJADncXIfq5AJY9
mo0mDOsZcmrafauahLD6+Qj4ir1UdogjDrnPZSndq6IlIPRGhQ4l3s7eZ4TW
/r97qkDv3tC4t1NqZxQdK3qHfBser3j6Ms5y5nmLi0QZFMNINjOEQlaMkE2k
eD2A65O3HGjIaWEA8fyXMrtdAoWlZArsyzBX6RCU+eHFhzYmi5Tj8hVqo+j6
JCBVmANJWkDl7Nec8yrT688ccsZLhWIsHbj+RvTiIKq7Vs03W7MydIdgrIWc
d5HNRcJVVrolQlESIoFdQjyM86HEzjyftitwp6eoXG/ik1YPKVx+3D1ePJqx
5F2w67Zpfd4kS8dZzikpcb5FFFoifjC309zqacpaLU1gmCw4/SMlJXpWtWxp
W3PlQxUHGvJxyi0uEluGuMeCwkOX135gFN/gU5C8M+K3KACcTC2Ir41do0W1
ceX6JBY87KbBQRe5hf5PssCHiKE/h85rV5MdPD5Ypxqet5kiJgILTVuJTzmq
N+Shg8DzKCFT6vpYMJ/UebQEC291VOs3Yk613JvBn6DQR5bzcx45dbgGB1yk
dHxTKbzDYC72TJGiVjqdf1XRTVSWgsPQSEAmsKSUErz0uaiIYZm4RvB24qoF
cwqDD1zR9Ep0VkIwodaIsXY3tEWDhnn5gEFLGTFTt1pL5rXEOVUUSodA9Xy6
bN7ZbvPyr5zt6qwQrcb3yamXM1e3rfH4xMlcl6s5TYlh6rwbkuYIZ1XzIMtM
+QZE3Z3Kj7hFZb7arJg1a95NLyl0T51VsCwTmxF83JzbtOYgJBOORphWC1OC
YpXQw5Q7c37zWhFxsLLKeK6aSidRz4bUj33mpLtPKKMlhidfZ0+7ZiXMD3lq
C/kJ8h0ZVneT+4LNGsnBp3AKyEE2uUBhej9Am4SyRlIStlk9ZnA/Pei8HGUI
x9ZscmfIcj7VG7bJuBexcrlyIARZTJFPofdwaDFshUOgkhWqbDrTc9tx6+K8
oqgnF968pySxu75FRQlbVLpHXYTld/SDA8SZYIw3plfgO72LqC4LhjY6f3Ol
5a+sdRcHqOBfsAxk7XR8GJ6eBA1JWnJvMkIPHFXLLvuaQ5QZIsu9aACzWIqi
3jiIyomEcgguKzjvuygI9SO1u7AAe4thQrmfQJExWOZLBLBFCXdsGIh9MZ6G
YDfccQI5WTFnHmGLZD3/vt8H4BHMQ1A9kFIXzeFBjqOUrNYuTrwV3DN0JfBc
bBo9uHI10hZV27JQ3sldESbNnN4aNd7eXF+cO9zF43y6+e2aN0zGZmaW1zVH
Ns6yaVCMc7KLD1yrKT7WF5KIhdbL0eREUGi9dTh+EDa1VfVZNARSFkeuYOm1
w9ShLIJxlcEIlyREpZHWLgtHuXA+ZJwDbdkihEF7EYJDRVH8Jea6fXQ2Ytpj
/bWqNbJn+Ciq268ZIfDT1ZRT6Yf2V9c2xRaW/06fDS1QK8h+t1qh+d7UCmc5
fWcEUEVf9NbVcCbrqxQ1ybitXxCTenD15uqQB1TGMzrXwcIfnZ9ffTnklChp
qAgYwH62OVfg2p+0zRa29HA6I5efGRbhEoWkWw1hvwpC/IvKSv08Wl1AApyl
sjczFqTy3mVGWHsVXiR19p7iFDLdj5rbrtdeQJHV9baaHqzRgwX6GO40LDgV
xChOafaIr/BgYJuWrmbolPRKXSxcIqM519dw8l1iBaUuo/MCSECEaPMWOR6V
TZCarrsfaY4OHc2yFh16gcc5cpW+KWfOPa3dGn1V94Ob22FCWib/518P6dCg
clpAVbPhSEFahKuAIAr13ji0+NfCQ761UyS4lfSa/OMPPHfBUAQLIwq876Fh
8psmgD/F1EeXl4cCbdFyVsa5933Rk08PA6OR1brhcxy5H2JHdPRXMkvZFakS
FWSid3cDmxkubyhc7t7s/R8lemUr6dOaJxXXRzML/Nmn67Ori1scLIcrJA2B
qowZp5W3MPK00h3Hp6/wBqkIGuxxWMsaq7ircpSrgv5WDQ2Oe8tozvVOc6t2
y+SBQjazOCc/w9qbaEdlu4NjCjdVEvvKeGreGzyqAE8F+/jC1pFM5lsr1m9s
mlpGEUMqgCxtgvEYI16i0cvtU2d4cUVPgvBQq/4IkEMsfik1odxLRRsjvevy
eijvxH84yJ7PoPPD5Llhfry39xcnGkTifpD6Tk4F6fWyGku4E6kjUECs8EJD
MA4j+sUpSVqhqBix8JWag6hfW1eNWDm9VSzQbEl1QVxKfI5B4DlvDjjWOuX2
M77WEl+QvmetPGhHHf5LdeM9/s6dvOZOBVrLJSINp4XKSmX08PWc6Qnn6Iz3
WoeMnCXMYWHcCOH/YkNLIRrL+PU54s3F0tLQOxoNOMFso5h7217ZXS2s68sS
+5BNYcDst3AFVK+4u69zc0S1uUJGwFl2NbyLrLPR69ciALBAq6qoMSNCOpwi
KzENYfEYv5Mks8EzZrmUw5Pd4ItD/MTQjVSua7MRataZ1S6slM9Sh3M3BOFw
2pq7OT3Fk12xEL5+dgPYvWnODlosrWFs+9UR7WMt+sb7LfUfNa5zL/NWPeaB
a1yqApef/e3Q6uDj5D19LHoGV3hrWs6kmbkoI65avTeg/p470NepGu7ZHIad
JtBqWSy2ZHejbel8XAPumKFpovDuwsgir+PjDXyaQ7vlqjRpsSS+9KikH3EC
/U32Rdia1pFoXQ1HbymAFzDjy49UIGdVhxe2ITVypI4mdJ8CfJekcIEwzYaz
jLRgUt4IvokfGGrXk1nQiCWsR2SWLs7Q6hYJc3bvMbeWUU/soo5qWRMjlp8B
wtgTj8IYZ2Fz6AVlEtGuvvcd3RqwYW7aa3Cqj3f4abZVAUfjCCbBqOhK34Ea
unptZUXbM3pfEby0zkZWtkzfrxW6aZho0Kf7g74zVjZL/uKrfXaHeRoNc5K8
0/qM5y536O8y4jX9vcpaawm0vzPdGTfuHSfhO45OUB1IuPenjJ79Tce3y3AA
1ffQHj46Ech1WRKEOWUBmpURuUSKnvNvBHsf465hIAjNjIMfCJ6TVI7cmmyE
vPssku+IiCFm28o1ED92Cr6JdXHq8ozDyDwQ1V26dsbxySYvXKEYFRdvbp4l
B89Pkg+TdYPmLfOauFC9mYoLh328m8mIpe3BvyXHyYf1hH6XSgnDLYMcZE2P
xbgFS6yvZRxFs6aizEjQJoLWXMgapJvT6sa69/dtuLa9iC0QsJOZ69HUGS9Y
O3OruvY5M9kEVOJl/ANUEhhzeA0hNnBYJ0Q6kH4XnCOvPF1vtv1GrdK1bZr1
uRYmpTn7XCh8JFjH80jopodW7IELUPTYyDiC/ZAYXYHIL79DM9s0EXPdvXmL
d8W3/cB91rgtOT6SLTE+avKRCd6isndJtsqJttnapAKkiWGjN9RLnyb/fgDF
vBn/WUxjO+hj57WGAruU1hzUg61Z4EKUq6CYEmEye5jxDlJGDPF0VSR374Jo
Tw7f5GBhxqccdc1x2lr6M3LaxfG6eEyFg6MADVAO35yF5CT+7MY7R9RYbgPk
ZhLasNXLgz5+ivTmJrfMT7HDGhzQoZ1TJKDRkEQ7MR6TTOJFTcwMXbEBI/+4
KBgjuhRJZm1BQmH62e8+XXBNxBdV0+pZ8Wj+gc4Mos1zJS+YpuT+4OoosgvP
WSbu0veEofnTq6Zs/Zvp8by1Igdi1sk4F4QdzAbUNIlTGsNpmxaru+jwvdVq
hIYzk2Qm4/jj5CcFl5BITKtPj46Ohg/xep9Tw7pkzNjV7xzzfprRx/PR81fJ
wdPx8+QdPlPFBnEnKousZkQY/yYWAI2hFEIrpSw9/zWSFkkzH1uMa6GVNi21
uU5rjvbQvKyh0HmZY/eboHhI4tpt9i87qCMuJQUlLpK9ATofQONRbwMS0Uck
vd+ObOSOjKRhQZTR+rBrk2BDV5zOjPjBgT6oUsRswcxyjJLV9/bammbsuskp
KvAaK4rv7qSACb6CdnsrR/+B9LBqMLhZ/h6yQxtr2ojVoo1TaZiMwXHNTR9G
HfmgX/MxugBLJGCMH1tJ6jOr2GMkNGxhDkw2qlf/f542Q5KsvMvrqhSoGXNW
J1p8Kut+VKUV0vW0TCPw2c2sU46+uOfRrpQRH5SrXKF+RfG9cTuhYjeyssLL
nPYUGCrT5n1ya95zhOsZ2lnKmg5u3p81Wg2DizjaAK0zuIJyGhNUiJTJuX9b
Rj+VGAAxg4s0Z+2LiKyc7mLzBSNP8VHIPrpHcELiCo9LUThHR6ZW5cflsqRt
SeCxTUgwWQyzf662wnI6wWgaoSw2oUzspG5wNcDwddVMcsRVeZAur5b4DwY7
ebM3QzFBfrh+fxNElHkknPz0DhgJ0kTwKYaZQk1fswr7ltA8vZhRGAMvZzeF
bpFtcW3m/BuECwXV16VaOkAiTcKjK/Rj5sYGye1uLaSCGUjW3wkYpAVDhk3h
b8/pJz+EQZOP6r/dx70eHH7DfWDxLWdLyDSev3yl+uMDHapdYdw/16maS828
PXop4/+TO0FjcHSqlsF/ZWkZLpal1JKDfmnNoznMzzMYSDB3Z74Jarntufwa
OLhJ9GVewfv69S83oxvUYMfuhq8LNlOLw0d+EGw7V3Nh9YFvQsHl2JFoYBm6
jkcaTw6j9VkPUI7A56O20d6zEZ1QngubquiuDy3iKXXhx5IVy4FhzJvm/P5a
LZD5TJJ88grBNr9rUbYwJtVXGBcLdMoTgvFSgCbd7JxvariER0hsrHVO5inK
3GALp55afJiCaqKJu9ZNOs+kiAZtPzLSmg2n0ja0YyNZa1os0JVnudLL+OLV
MYe3syXbH+swKk7G5V102yUD0lIb+mbfaKisOJzDHMhNKQ03HWuLQbZ6lbWB
puxiJzYxNoY7GuENVQSscFCbF+zYBy6XG98inh7RD+9xrQ5ub98fJlIRl25B
SNbqWYnPMzhFmmUvtUpg31pLJjKAC0Z1cwskBaNiFOWXfH6LNuHuIhxplE65
YEq0/mWO3EU2U2uRNyfuotQPRG3mootZHOW1+GEcaHSWXI5gdWEzyL1xiQMu
qhw/Vncx1x1HOssyEwHuzoZttxyJX7tydH3bwFmF3oLrdg16C1Ires9ahCvu
BCcGcFwTvB8p0uQNNLuhQI//QzZmC+Ucz4maYKYau2X7N2y8N2dGlrCOzR0z
VruLC46FP0ZyMBrr2Bn4hcbJGxfbBZsFolriTBGS2AXqG0DtC1+/5QIkRVCY
1PpPKO+1wmGiIEcI0x11OKAHzpxDUiBoZZvhv7j7ad0EOolm0Q2NtkZSlRLg
JeUWeSLbArxxuwySplMuGLmZ5XK23hGrfiGrdbNOoU872amBa5X5kTSm0kUy
hWYkeSM3PbTEMPXwhGtmYomy/WgQaNlrdBkfNSzIY1GgTaZlatprRNvcqUbk
OGpjpg3tjCtGxM+auhorS+PkfYqHZVsCmc7rrbOl+F64UCHHjDQxNXCoo1TD
eJ+Xmy/e25a6HGL9kU6TT8p6JLdVS7hMVe3Ah2pJmxxLzyV6uCleTIrOExp6
+PhlvmFlT/nXb/YgOt4YOPvU1RrMgsnfNg1FidKCrY/S6sVfo9dSOOzn9E7y
VzvZJA8IFTEFczYo/ypvPmu3E2UUEiejcl6sSHlYyCkElnt5ACoLnUKhaijB
7jsIVNwMaddlZEYnKglY0UmDpYBgBYa4jiB+3HvYv9WNQHVf5PuqhX7m2RMY
Tar5CaRspDCpBLvHWYxasJHGobfPxCeu6VjoUr7MGic/1XR+X5VhFvm4jHQX
9/GYOTL3z0DMSF3qUGuTo1QiS6RaCP+RgihmKelAZ3VHpMJn69DL1T2x0CE/
9qVHxf9cZPsXLz45ax5Hn9J7NMVR7UtwxhL9FqGrlsvIGChpXGRpGvnNFUlw
mCaR0N7F1nB9dz0Yoe3KKWHl0rxlnHbuD9pOyCX5WKFCHVREkc3YWin7/tV8
MURFXWkcoNmHxR+a/AvNqdCS0C3riyhvEAXgix1fjCtB1ZXoyM/tYDg0Xu3T
vg1PGJ5vhSf83/5Yw6eddqfxAPNC43PzNox5F4NzE1y/uYNjbOYYJ6QFugZ6
Bj383NzLg1J5crWEAQn1r6uKgXAs0iyXwBpUckMZPxOXkQ9OLGkyPVCsiUQ2
qIILjQGk8YXWS2werlzBCJY52RSf1ZjDYJ35oM/AJSUCqdP1rve1QyFVjCND
SCwUkwOjOg0SS1cMgZUz0Fkvq6rpUdgNWUKUB8bAIClAorCIryLWuuCCFebs
4Pag7IMsdlYBzZ+9t1ydXV8ygr9PN+Czddpo6ZSkeyCwOWA5k1Y6jwuWDM2+
jnmWFc+87KQX95k7HA2yB9XNv7nPjuwKc5n1WI2ZRVilMrpyb7JmDTuBuDlS
MUEylBwJlnRwLYYQyCBmbzxGJLKGIjkVk14aZj8F8TpDwSN1ttAyFXaDOF5n
D5Qb54u9FQ6SI1Cxld5VdTq15Nc4f4TuxMUXtpAJtqY9qA0P9ejjulk0IdqQ
LMiQ9t2Yg2CtTiSG60SsVUs0xbb1p94K9+SWBtxGMK7LCXWHd0ydPnHVP7O0
iFeWLRtBg0wTcNEJheja4sd9Xj7T6ohDN/dhWkDyJGJndFGQ38bK2fFR8uHm
RhSXF6dP0crbIt74WrK1a3D5+/HRwAfrCNQg6F2nq/UI5TBjdKDRTi4d1Vo4
95ySq3vJd9wxCLnGI8Tox6TEFeZTVdVUW4/mxZX/m1wBWkDFoXU278Zj/M6R
lPRZVWeWVdRVVCpX3kw3RJPsg7POyzBEjsNCuKZ1uD1SlxQjchE2KYAvRIyI
/hUXTu8lieCQhhJUrsQJ3qIEyhTBq04b5yE0lTomAhfCzfU0pG5IInVDELQd
1RF5PO5pfwxv+r28ur34hBjj849Xt58+vk8+XNzcnL27SK4/fbz9eE4f8NKO
Xp4+9THRPSNazY/g184MhgMqRx3PmDF1JkIZiutssd7H37M2kQclKszc561A
7g3BwK76dKmlKGlHg5NCUogMF1C8d90roPdpSmkbxAsklsTonyW48o26Wjjx
yKuRBx0+nZ1MGm10a3oLIxcuzOGhzqsliQdZfif8Xq2JaSG1XlL0QpM8Fw3X
zSQ6shmqOsr9KyRx6ItCaEMZmc3a6QgWDkASRsrzHawqvsocRitHd+iRgEXE
yAFGnh+tDdWtuSDcUhXl8rNMmNEkR+647FiZokWspvxjZ8KJIhixobATloZR
0PBiY/vYI6NkzSwg2dnCDuujo2OrNFekrZk5oCj1gockKETSZG5I9jRL+PVm
jQIgQTJi5erGuKqMljDLrN1M0sonfRcUH+lpWFZaemgJDhbp0rMlXeczqYNU
uilBC9dwuEjQx6U3RVCGxksXjiBMLhCaPUyCQ+hEWFp8B+/YhIBKaakzq1VW
WlsLt5PuVsctQbpnFhySgPQuk2Iydm7jakLoMWuDGGbMRng5hxRq+VGAqSVX
WUx9GTQJDEKmZUMCitELVKS0npmhmjniQwAy5AgIoTCLjIJZsce8RcDiMGKs
FsgdFZeRjd258g0KtzXQAzzDmFvPyej9c2Yepjkt6yQhlkfHL7hklYBrzuNY
TfLFRhPjOm9VldaSTwULeKgVVQwJzA8FJ1yh1d88zWurCoBxOYtTohbUWp4c
wBksZ3FoJUqFLUX7L3kWnLxiaRnC0kRgYS+dyOidoRDqhRrfQ2fkVdUGwXkX
51eHgamYt+3Z8YtXvnukC3Gh891oLUL3ojvHBSE/Ys9EINb2ZJoW5wnq1HJE
l96OIOLFT41YyAKFeSWDJhU0FAbciiySgAgJ08aBx0ET4+QDx1btNX2y7s9K
pEFmKw0gxTzVwGZnEMzHujsZYOCiZr7WwM6bGYIBDBRwe9g2udsUCG5WLoh4
JmlobTGqNCPmVYmUPCJguRv6W82qmOQ6IGi1DK0QcRmzvealfLHW6a6ohIzv
0iLXxrF/bsVBeX+5vx3sGJRSDK1etL9IXdIy3NOlN7vHXqFgTKcVBsEmm1K9
23q3vd03OMSwBWe8LZo9RUpgdClTXyfQDSdMD7QU1KMZuizLk/FTB66fP3+O
GG9JjcdG372wogVynBBdwqTFvKO960g8a7okG2lwWnbUwdbJgB2mqCeprbPC
HBQfZKhngi5XBAImd1xGxh13gQpNyLYTQgj0RyUEduqxi8rzNd6rxnr0GDFL
ko7E7UQDOFBGp76QrZZ+ObjYablgi/b+JahYyfV5Oui4XqNXhAb+B1mjVsUQ
2RauouGjaof9MlA23Ec/fXzrWhOdnASFEkcnmkTQ/9MX0U9fqEZi6OyIU52Z
CaYSSSXWn22WfmZZMupCK1Y2POAz/rg0B6LrXyacWSRBgWAm1lWabLFyVc4w
jS4P9EU0NP3z1ZHTAzkIOmuVk+0NmnBPNvSCmQb8QyN8e/q7eXNoVwAE5ZSz
L8uUw5nVplR16u4uK/Txs05s5jyOZfpgIkQ9R/bSPVqaJh/lUqXBGm3wjxZa
mI67TWwt6Fdi49U3Bu8M70cUdvGhYgDbq1Vrr0iUOGJHRVrXWjKsxXQWcBuK
18dqr1mSlQMtburBSzW5W8prilsiTF4LMPEw8JZbSyoBtEiqD5Wgxqz+8mPC
OWhaifgA9SpVm4lAlLwmjTLSnzgg4yNN6eDTLYrV0p+1hTeC3WMwY+X6zNAX
lRTDjJyFn+02RaEmWDokwbcxactTF63K0XkWFHdTUhRrfqgeeIylhMO96fLW
SqVzsbLsSytvcPCEK0NJnh3qQnoO4JqSIgBa3Y1iyYEFuGmJk4FwNFPYV/tj
xbFbAJHGGsyIKQwko2XJ+RzWarnr1OQNUlDGO7a0pus8Ns1/Y5XRlK36nmZG
UxKRJBgctJCv9LIh7tqoPdwedVXX8dHjrCt38mIW+BYvse2uwMaZJARH7Fl6
waSSBB2UzC6RvbtZrT3IdI+0Jihcg6xO9dD9CHYQ2AAxVwM/jGe4ESApcktL
Dit0iTesydrWDNpc1Pn29j2sAlzX+edqTeh8I97BpyRXGNwGwVHw0cjTEmQK
anh68lyUcBbA6zZoROlksh5gCF8tb5LHkHaHligNJPPXFEU+7N0ihsRNFgZA
CfPbNJbpyTpdxX1a5RHT4Zhh+EbqfA07Y6myNsBha3Ifw2RskGv453pCJAfv
bm8+HA6U2x0hLMbyDnx10VwxvxVHV/0RJtH7LIsOlrCBK0rt3OtOo3xQ2hk2
VZeIhlqrXUmsMYs9MNRcsLJAP9iSfIBQzu4eOjqHtx4wVwYQMFD7NY1X6fRH
2pIpMTgSgDUdjAD2gdt4LtJBDIUrq7HjEwr7iESpcAn7XoPsBNejzt4CedxV
renPZim675IxHplkXpV0+lrnfSGL2x+MtxPlimpiEUSkRE+kfQp767AcK2cd
MXwVMcYomFr5tVa53vPQKMrXz2pMR9EzMSvR7zoga3E69e3qFyb5W7Q7m9I+
WiyGKZvcYUPSgjQPOh6S3dwoxD8LXIVszQAFwhtDTC8AXG6iwXXna6o+BVFx
mkxRu5XL4egTzZqfibHJBIIPTLAqICWhtHTmWYpUD20l9Eus2/YWpv+d8QW9
/2z0lLvrHPJqQFUa0TwFM/CaZVfke6DfciENyyUfJjvV1ux13ENHDsyqa8Ud
pbkLMiZoFcUr1CjKpf4IhyW4VHYpCC19ZSa77u5IryhE26xzyV3QSFfZIUBQ
DokRmGTbo7qTTREZdeIB4u3g0oitE+GBIHYxL2LtDjqL+XdK70fS2bnoT4Sa
g34AYq7pdbWGRpw98tfuHL6Mv13ToOlKz0NSE0gp2Nc663aHwUp4KjvZAxGD
w6DmDMuhtUQl9bTN5quyrSKtTM3Yy6yYDR9Q5iSRoF97i8wcWrGVAwto0dz0
MEy00SXy7DgaoAzm7iameUgq3N1AklKtvk6Wi0G/XI+juslirpyDJZ1sl7uH
5+s7hPicJDt1M+92ikRKUovEdSKKsqMrc8Ro5kIUiWtvJEpNih9KjGvuY+yC
qjncgKnNfTEDQYHIYmykFthMNDgXCiCCTlMPwFaR6WBtvcIf+pvtO7FJj+nA
8CNzCB+bOit6HOzIVRqbrHc2WzN5yGxMjxGMShdSTSPYRrX/VGq6BJoOEEWX
mWsVQlcJ3Vm/Xa1KTMz31jAhMwFEvVN7pOCTvmvqkot8/e5YVDdWCBhCld4O
jyhM+WpPsHGcxC+DQ+A2eS4fTAqQZF2OoCmZMEKUlv66Jv67TDX3WrsEuEuJ
CCmQloluV30mbAgaVG9GR1DD0+ztwy60cUh1vClxNazToyawosqeWCgu5+Fx
WK+ENXmnn1Gl9RHKZnrwI9EvS6njP0ymWVFsAFwRA+ISdfg14h7yRk/fMnvr
4l62ktsntIfSMdLLyswhnVBAV07JSVmLAwv9sipjRbpvmqiClVac0BQZ34ba
aWGx3pZ6QyPO2yQGoizE4GPvl+qbLg09Zb2MhgYTsrgpNYWjQORRY+GWEuCl
WqlawgbYvoHkfkpG0sojkk5Cg2hx+iCeG1rqqG+c5a+LjoBKsLBJMLSk85nB
PO5C2tgMqxYKwwySfuR3Oe3ewdjkomqmjxV0wfc0vnuSdSw4a1wrArTFQvQF
t8d6vGge/zyolIe/X2v257PkA4hkWXHKEb7yFS/mps5qBqCUldHAC3xuLaGi
gihaZO3VS+6/ShSTqQ+Vg1FIPmT7yaxOe9eO05pzYGndyVmj7Zb4taRSzfMv
WWAffCOxK6O3dZYl/xf1wX2WT7ELLrYWKmqDhkeSON7R2zQoTu47v3RRVBP1
OPP9AXfy3daNtoijYr1YpcYdCVd2FYVR2milO64/tH7P3A8FzTClWpqbmw5h
zE7GCRI6kaO5Cg5ROxsqse8PxzEInCeMeOlslW9WzhZ/ALHIWai+VcCWPVU+
DhjG3r3VWtqw5YHd+3KOLOD+b4GlyqeKBXsj+cFTZ5yUFBRiqFm1aQrNTGDT
ixIVrykYAMEQExw8FuRo6ZIuNwJvJFDRKImjGmaIzNC+dwwC7PvE0hIdR91b
mSYa8iK65ipubObn5eYcuobc91Lc9e4Fsz5UpGZ55PtFRTfPXZxmM5Eq55Xn
4hwKy9UeWIMlVlwGtRLu2YjONVCyj17aikOTy0F8WeaT3FwH/FbkhlVIg2Eb
eCskQ1/6kZ53b5F2ou3gwqFQu4RkSFxUVHtR1m6QNroBxriEMMy26Vm9fI5d
0SN/ZFt88fBHeAGrvj56VlOsmeMOfTJm5C1hZ4gUhPPklc5mHMeMXnTvqymj
voE2hcNtWaVsag5P27m/DwaXzEXb3eDQggTDch0WGOxeZi9wxbGFN/qAntzS
hzi6m4lJFWvUUnKPO/t+WN9WgQF+aBq1UX0hRT7M4aKL8WVFbDhenq1prPLM
1e90rb3pL7fyJzqp5GZdoNe1r9TIMRh6HlCN5uY2D4ScYgexedCnzTCMmwBV
8g1wRT8cvYVEKGla+yLMXzXf1ZLRrigPltwg1RPKbEHAVoM/NKvWiqI732GY
dOGLZeaun4r4gMRjooa6VIIcnSGNC2s5h0WYty513IkP2Tnb7xuzinofU1Cp
857Tc8lrvuKFDvutLoSrKoxicEVzJJRdb41YswbMYoMjGQik9fSzdk2xB2wm
C3+rKYSB44DBt3ZZVB/e1rWR8P4Hez3bozTd1cKYobPJ5xp24JJWo4JVLHyZ
+U09TpTyIkAIYWgpXLAcDsF1K6ZI6laq1MZZOaPCoGspcxzZgyAslFXb0HfG
4WY4LVgQrBK6hVeLihyOKb4bq5gEZcKxF1PhXGWXqP1LE3d35YmNnrG5BmUK
rs6uPr7jv717LmhJ26BKt7SGwVtpYCHJKeFKVUpkqd6Zg10RoyiU85SLRhVq
oHLJ8xafxaKZf8WxGV3uAjbMFnS9V58BZwu1FdlTdl/MHrYoJRCNfTewH9Jm
uJgpsWq7tbo9+6alBi3NcRxBW24zemblgk6UC+CoS9kTGCn1YSdGR5wSASx6
rZlxdxKSJHrcgmunSl6PwmpXFyCI5nQmEZuEn5VGnogN1ZWvAEpvpnlRdNRa
1/m7qDhKgLZNxvZtbS2CmrP8UEgxtRYsw769SNYVQuqyxtVYW2/YDTlTdxmi
3OjCIbOTX9UJE7JyK42hIi0ERk/Oc06Icvr9SPpKOiijMUpmBHRRWxYbBc6b
KhE7LioPWUv6oP6A5R7417kC+rJ9NlMmTA2v8o0u2CEubpjAH1VUC5Ss5Olw
0SX0ZUBnY5lyPClvqXTco0u77PZgoqhF+zXwF3QGamD36Go2TmEQJTp3mD8q
fStqS6Sh2M2+izKae+JgL7W8QYsYaEQ3hmmeXNwhrtGnty+q+BBEaYzEchNW
HF6lnyXOxJoNBx2ofIsNUZhTSYsn0lQ05FxJ/Z29H+TZtmrrn42bxLo/d0GQ
Kj7d3tp4RsG58vawfML12dWndzRpcdKZ4f346Bm6xeC7Ef1bunANk/cpsaUL
eAsIUDLx+LiuM9KkkjdsS6uIqhn+4apvVPLONtbZHMbtaCoGWXkla1tJ3Gjs
61drFR62K/WpgjETpaHbauU8lOyRikdvEXeTzhDrn1mdF191RUpM+ffEWquz
ODNdoCLDXRbV9Qki8PtriIqvD44sNtKx5mAXiLQSHgTQjvs080mBUTuyiKqK
BTUgH9vEyInhbBu8cSFKSZnvCTavJoiMsthX392d22CYYKtYb821CY1iM0iv
eTXdKMP34MaOKvDX9E2CUyG0X3s4iz3Yo+aK/Rd4bymkH0KLXCbUFSKGbtps
LcXUXOGuA3SdRWQid5991Cz3yDDeXqfQRDsYx6diV0Ja3o7Ofz77dHvxaSSJ
B3j43eXN7WtXY9kXTuTX8fv8NRQN6PSlPnp1dvvkrdURw/DBJN9zNQJfG/fq
5r3VxqUBtPz0Nz0j9cA4wndUzUdWm84/ZoM+l0HPNkSwrkY0b+RDr7HQvdNX
x954yU/8rhv5Tsib/hJi85XYgkYwYSC8VGLwdc413kVq9O93CSBadbuIy0/b
Kr166yYtDjVp63fIDK7vFtYXdq018jBxmMsbeR+E9ZFDtiACdtYqUSDL6ZJZ
b10U+bDKxEjlcV4zDrIAGpBaiOqPUJnt+n+1/dv2IP25KrLsKfVhcRIzOquk
BzMLNq8OYhujHoPIYgwaA9RVGth4ZGios04d9c48LtaikbIa/uyCmXPdbhdw
4ZD5TNsVPT86fc6hSMlDZBO5dhkjTD+zcQxMVzdRkis4q5Kz7x1f4yYUvpWs
ZDdLEwiuDMHxTTQBl6cmvvScy+SiUbDLK8u0kJF2tG2tZiGyPGbseIps9IrW
gwR7Fy/i5+M7QR2403/kNh8yt67WEqDBwWjRkN7L5SCRH9szor2xbzG2R5b4
W7qydqw3zLuIgLdVgvlIcK/+6nXyrav4UzwpTE7nF/x3uOY3lLZ2mqGKNflN
WItK8ptZPkgMRdWJBh+Zacv6moFAI91fPtfyKJcPPvw6Nl3wil3hMfNncUNB
uelwyKuheo6LKlfbX3KtOW/3VKES7pYMEpdL62PWQ24FsZXiquXMqcOuK70M
1PrW9Bxr6MwmXhlyKWtSFMonZckInepN2XzOLakQTKXPNZJQ3V9aCQcnA1k5
7E6NoIjcwSzhIZKGQxzVyBoGwZ4111Dau7fDJB9nQ51q2wQBkVEZGLVs7cXa
/NiYAUCGkG5Aro4MM80g3khc021qpVPYEu5recgYQd1fjZ/hSg3B3M1EbJHb
UqpU3wMdjVdTessioWZUeDhgshIO6wP/xA1C23TIxl6anq5FXjMWckUlRqUJ
C+aVmqN3L5JPcjRnBektyUfx6Rx8OvvI5bIlxs8do1uQy64Rq3fvKdlpML3b
2+EZd9Ytt3n95CEG11oCEGQAHwInMsceEJsXfVRoPjUtQIu4DNnKUtoIShaW
IMU3Fj+W8kIa75SKE6DIgLXdieWot87bUKOryx2UZn7U2ZylArMRTGBgkLBh
PZuolFqg66mH0ItVZXRzNoTlpTwtsbPPTl9ZiigCPFr1erqgSl6XuPV5b/vu
cxO1j+QMDgvaSoN0+zM1eWm18dxRklqGH7igjRPXnOWs/FEc1zKKWNCkPAER
er62EnwyndYKhDXe4X3A1Wt2fcwyK1wBCokTL1jNUIt0M0VZ3HL32ufHHRhl
NxwQZD4DPvBD8+Ky11aY06bkaKdMy/FpULLyOFkG6/FICrN6d91lOc7e+hoL
NkbDKl3jwSsSCTgcBrluisMrmIEYBidvXK6ZifCDN9UN3GiYAd/gkAF7jifM
7lADemEtBCPXwkBhhfLAfo9xrvsP3GCaNU4y04yvFpSicfYB2/rAVy3t8Jmv
6BGQtMTQ2rZqnro13y0tsYhFqAIeCQZ1jCZsVB6mVouWdKgFvlDhKwAFZ17e
g/J13DZgHkEGp1hRBeh7g4qGUOY+7kL0eIl4XhHX1vk5bSDwrl84Bj/sAOew
YScEbzQbueafYYVFwNauJPVh6uIdxBibWgl0F0mEi6mghUU5WMMuOQgJT0oG
qTg/TAi9QN3g6j3OZ6d061Qety6niNtEgoVqFrqDCeBcMo6UunK0I0FUaH4t
ETOulk1qIQz6ele590BOANFeKPjF6phrnkFX2r8K9WHXVp5H6lkjOhlFzTm6
WG+pU3iDYZKJiSPH3N2duO/gxslbidpfVdJ2SEbo1p5od2vXzZs1niasVCCO
VtMrA7EqoRzWIsJ6qnKrUo4OUlDFYaEossP1PNRr81DVBBTlW1TCYfg+cCQc
cKWkR6vpxp1kFMadg9o9VuN78JjESCTHzflWv/8Ouh6tFmX2ovdcXqvB33ey
mWS7yrWW687p++963iY9BsaasWIgYP99qudr0U7xy6LcqlbScQ2ILfzK7kPc
1cNJvn/pV9nFqbaRvs5cymqvM1pcN6xvMv4KKpMCekBNGvde6ffBi51k0v8D
HMF5pZRhSuEENqmyn4kFJnJFDzHQDDENC36pi+VFS8PEtzSkTWP3qI4n4hwn
GzeFkh7ZaJrxGG0sjfi4eJNQCAcya+j1OLS7Ngk3jMOLNM3uT+BezX24pwIr
LxhX1ioqC9raNHR3IwVL5hf+ktFIs+Ebzkk0YRaWFFMl0LmzKTO8nHJ5JS7X
bmUJeC7n17+ymR4i0WbqtBd0jFxowqRhXo5PNDhrcQpOlRy4iqADhQUcORTo
LBpliI9oYpqGg4ifeqjtZDSmOSjYa8W1sOXciOF9OiGB9PWHt++/oZxW56mg
llbnm7h5lwCK589eaqM7jpTSYjhIWH96NJqgVidXWA9GkQ+Cp811702EiGyZ
cSsa12MRo6uTUw6wnNqVZCgq3WsksJN3cpycBdFKTaYlpCXJQF6UNzoZVl4y
S1fnl66bbDOrRhKvC23QAm94AClt7hBu7vtZSQjRTquF8mKw9IKXLi/nttuM
G/9OkFPrqrw4fQmb01lgkr1RTaGBTQsBBrTun4Dhz7Vr/LW67Di4KIJgr45e
nWBjo122P4AAaWeIB6ATg+xZFEiG2XEJ+BFPUGcd7hhpLWdxea0w8lwSCCr1
7OOWRYlashmNV30DPqVecgudkzKj0PUk234zYbuAFM6SoXFwGtctEzVfnjno
08UChSOhBvj+vnIeHGXnSIgbndCWaIfZy2uSGRLmKsVNwE7WG6d9JlxUIQuc
uzSdkcsl1Zo9ZqmQVHjUxyDuslu3SufhVXjlmruDtpus3aMfMCmL2QnL9IrH
kb5cZsVav+lU3BFrvm2gW7Ypp+702C3hE7mBcjSnzlV4EPShictc3REQT/wZ
Tozw0tRt8uIpbOC8/VDD9gpJN66bnChDFVR7Kd+w9ccnOXNuom4pYKtmpmSn
OSHBjecltg1qbtCm02HdWFedPTAr8EBTKzRrSMMKVWbqQw1OTq4fn/zF3xDg
cQ454F2hnzTK8+Di/MO1qITo2puc6fJYMr4/e3d4+E0F+NilrgVYPSVJ/NpD
XFFIypOlpQBpioML0OYAvojyM24mUXEWGdeRdqYKjWuzQ0QWRh72FSsX2sKI
q5JtqwA9Aa98zpZVAUitwO/CeHZsMX7touQ7hN1pje1LdEVXR5JKwvrOPRyO
1Kg2lEIdQeWSWzRPw5gmbu3t/vhlkKikSr+TR8Zl4wrG8YR0WJ2dVisJfs5p
J3MmZ0a6rIRC/AQkFTJCiSey6blQVC0V53LE4vYk7hh54fBLsc0b6fx069IS
XiGG1a2G01gFw55cjAOJBoPPEpPv+b0jQ7v0wOpZ2oIKDtkSPbawHYeX0rre
eTOtP/KoX6uxq71DR3RMv4V9WeWuYqYpeygnj6JcWhYhiJjVvtDaWyWKh3Al
aQNJD4KY5LNGUrtJFs+UmWoqkw8V78IHucFBtaMw3zn4MRcN4hhgzudEoxiV
moq7xapHKlU6ClmyK7tTp3kU1qIS5L6NDO6JVgaQpCYryAg23dNbzdUUl99Z
tWFXJYEzZB+5Re6yqqsptDeZKSYoC818Qx1OLjeaq+5qSQLWdf5u4iSNHtzr
PsSFHqQJU0e4scxkUQzs4kK1iH1eddMRk4OgBuUThITms1mRTaovWXPoqM+1
Uw1Yhq1P8iR3vI6IBTIT44XcEzOmhr5pAYg7F+TqEJYuIJCMei/Gya9WVwXu
JN1t64SY92xbU3lmEqfUSqK2RGpGEWmk4Mx8jHjrml7lFl9YaEeHwFftykhM
rUVQaN0ax6fOSqZsl3mfYngYxmBOwop1f/OtyaUGtmjpINAw7n0URhhxmwBN
BOw26dXyEGYVHjqjvcrQDjz3JP9QHOI+3E3NZo+8WYTLmlIldIL5b6Qsg1H4
WEFMob3GfBS5dSPSthIomcDFATGAmrCCFioda1FAUcHNcLLHCmPZtWCy5ipI
gQY91MDNVgg7ncFbxNUI517jlpBKQn1sm/PuInHrWCFgqQ6USxq+dm2VAh1+
okNXtQcYTmrmwjIg4XIYMmL9IXBw9nULrvAHapJy57tRiepEzB13Dw04XUfG
melOquTkLvpZqw9HGvoaPQlasXlETNMrZ6LqhZhDKrJb+HanInP3wYC46Kc8
DOxHiHqDhVn9PexPEKavAyvUUxEBsaD15I2dTXb+xUPvQ5emNUGHaQSGS1aX
E0fBnAQPNzAGXMX1Rx0r0Xhk5bDMpbIV+/O1H6f3CvDrWDIw46b94mxwC38W
g0OQSBS0doOeyOl8Mp8Vd7T3RUDE+C3FKs0g4QsEE2tbg8VB92RzkHXiEpWL
Nnypx2alrpKTUQsDX8TXnbWizlwbq1TUNszqLq+K0LCjOhuHlDmowJI8yCPx
bWoheyLDmdXp8DUtDAc1alPW8bQKW9hXdMXF7lDAvtAYZOl6WCVdY69Dbj4S
LSj3rDmxPHswrydOh41qVzpGSspHPJUO93S1njU0Nay8mHPdEObtcaCt365q
wo3q+Xil3xOU2bSODR3xa6Nywrpcllqgd4R1c8Rv66HEUHIu2N0kRXU13GJP
7DhbdKc4bJ2NDE/G6nzQ2eZAuwxpPxUVJq7Vt0yUnfZmgPeLnWp0ThrGGy03
9UyrfLsTFuGbBwUZdtrzr8N7rIlLt2WP02mE10sVwKl4BNV0RjMbLNTXheph
7z5dnN1cIGpS8ibEaqom30BzJbmkVSnj1CoUccpwxnnIOrUm2DbdBcV07rG0
jUGHmv5+dOpKxMoZBuXiBIg5Gu5aGaUtDexolq4U5FM61mO64V7FNw9iXFcn
2Qom/LPry0DFU3Zi5hvXotQbiWpJjdn5k2Lc4MS9dKYQsyaMra6DEb2osa56
WvY2b+KOJpYgrFq78kA1s2VBIWDiNEK2f/n18hxdben/Rr+/gzUUCdJN0Aac
dR9XJk4jRVghg/gLEtQmlRakFzpYVaSnSC+iMtta7SGt7nMfzhTfoC9qdx6l
XLh84Fk13fBVsTJ0DQcKJGcCcwI5xWnNbI6A82NWrc3t0dW/OgUUuBJC3rKd
EumaKfuw9CR1cmaPd+1M2PY/l3NxU0RWnsShwrGJPDjRtFVL5qjTTlx0sJYr
X/EnLH38+GzE/xlE/YUbqZiJ8Uvg6s8tgTio7SfyK1RR2MIuV1DL0tNvVnpy
l2dXZ4+eGmlfHAnt2l+xt4ye1EHOptaUiu3P0pxceqisEBKQayH1r19vblEz
n86O/hEkoMrdfVfBHPI2zWviqNYJ956BtPm5DBZ2Qg8H/ETf/VQhrWH8wFBh
424ertucuzvsB2IpKXxKiHueg8dU1mJTf6T8xoLUrPKZMADrQyuNmqU4VjbL
rTz8fTsXV2zkZfd3dfhHt9SVk+bBHy9A3X3XzRqAuU7epFuif3G2ajqrnjnn
nkw2OazrlW+25OahhMxs1wX3hq+4qPPPyVVVz1Zp/VnL6SIPciG5oFK38J6p
3LNqTlXh6QXpKJc96Sj7xFWwV4thHv71IYU3lEbIs1VWF6ZU3fPet+/1EGNH
ZfNtR/hxI4EpkiN6Pv5AAol0Z0Jxb1J6kmZFuzLsPjtMfqnQRZpUQf5nndOW
J58QxkOC7EO1TJEq+BN9n87omWG0RvprQ2SKYn7vsnwyFBNlkyYX5QIaq5be
/p2O7GI228m1cAupM/a2iyrZ8vGv8RnC1mBUdeG+H+BXo0n/R8m9DuS5bNZh
0uYoc3EPF0EqK52h/IMzFGRabiIsruFrgq0/uKeyr7J7H2vz7bjH7Am3AKlh
+6WN7npVduapeXvfME2o4gWX8OLMWvhjEXOX1nB+vt1wIghr42w1RyftRjdH
KzpIbFhAFWczIreSTh/RqFKSjRbBb9brUdJqF6m6Ydotqeo7q1OGxDwOlSZO
z9SJ8WXVb3O4kvSD3HHfIaeTEBldv7+RPf/p3TVbKnbWiJ3+RzAFDXI56Nmn
UnNAgsOnX7+eV4gjSYvROeEmTQoYjUZ817/7f5Vuch4VEgEA

-->

</rfc>
