<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-kwbdgrr-tsvwg-net-collab-rqmts-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="Network Collaboration Requirements">Requirements for Network Collaboration Signaling</title>
    <seriesInfo name="Internet-Draft" value="draft-kwbdgrr-tsvwg-net-collab-rqmts-03"/>
    <author initials="J." surname="Kaippallimalil" fullname="John Kaippallimalil">
      <organization>Futurewei</organization>
      <address>
        <email>john.kaippallimalil@futurewei.com</email>
      </address>
    </author>
    <author initials="D." surname="Wing" fullname="Dan Wing">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>danwing@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco</organization>
      <address>
        <email>sgundave@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Rajagopalan" fullname="Sridharan Rajagopalan">
      <organization abbrev="Cloud Software Group">Cloud Software Group Holdings, Inc.</organization>
      <address>
        <email>Sridharan.girish@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Dawkins" fullname="Spencer Dawkins">
      <organization>Tencent America LLC</organization>
      <address>
        <email>spencerdawkins.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="30"/>
    <area>Transport</area>
    <workgroup>Transport and Services Working Group</workgroup>
    <keyword>Media</keyword>
    <keyword>Low Latency</keyword>
    <keyword>Wireless Links</keyword>
    <keyword>Bandwidth constraints</keyword>
    <keyword>Policy</keyword>
    <keyword>Operational Considerations</keyword>
    <abstract>
      <?line 114?>

<t>Collaborative signaling from client-to-network and server-to-network
can improve the user experience by informing the network about the
nature and relative importance of packets (frames, streams, etc.)
without having to disclose the content of the packets. Moreover,
the collaborative signaling may be enabled so that clients and
servers are aware of the network's treatment of incoming packets.
Also, client-to-network collaboration can be put in place without
revealing the identity of the remote servers. This collaboration
allows for differentiated services at the network (e.g., packet
discard preference), the sender (e.g., adaptive transmission), or
through cooperation of server/client and the network.</t>
      <t>This document lists some use cases that illustrate the need for a
mechanism to share metadata and outlines requirements for both
client-to-network and server-to-network. The document focuses on
signaling information about a UDP transport flow (UDP 4-tuple).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-kwbdgrr-tsvwg-net-collab-rqmts/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        TSVWG Working Group mailing list (<eref target="mailto:tsvwg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tsvwg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tsvwg/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 133?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Wireless networks, including 5G and WLAN, inherently experience large
variations in link quality over sub-RTT (round-trip time) intervals and on the other
hand, applications such as interactive media demand both low latency
and high bandwidth.</t>
      <t>Superior service during adverse network events can be achieved by the
sender conveying packet behavior preferences to the network for
packets within a single UDP 4-tuple flow.  During adverse network events
this allows the network to be informed about the least-impactful
packets to drop (or delay) in the same UDP 4-tuple flow.  Without such
signaling, the network can only indiscriminately drop (or delay)
packets.  With such capability, loss-tolerant and delay-tolerant
transport protocols such as RTP <xref target="RFC3550"/>, QUIC <xref target="RFC9000"/>, and Unreliable
QUIC <xref target="RFC9221"/> can inform the network and provide a superior end
user experience.</t>
      <t>Some of the complications that are induced by adverse network events
may be eliminated by adequate dimensioning and upgrades.
However, such upgrades may not be always (immediately) possible or
justified. Complementary mitigations are thus needed to soften these
complications by introducing some collaboration between endpoints and
networks to adjust their behaviors.</t>
      <t><xref target="sec-rationale"/> discusses the rationale for per-packet metadata.</t>
      <t><xref target="uc"/> outlines use cases to illustrate the issues
and the need for additional information per flow to allow the network
to optimize its handling. <xref target="metadata-req"/> describes the requirements for on-path media
collaboration signals.</t>
      <t><xref target="sys-considerations"/> provides operational constraints in the network.</t>
    </section>
    <section anchor="definitions">
      <name>Definitions</name>
      <t>The document makes use of the following terms:</t>
      <dl>
        <dt>Per-Flow Metadata:</dt>
        <dd>
          <t>Refers to metadata that doesn't change often during the lifetime
of a connection and thus can be exchanged once or as needed. This is communicated per flow (i.e., UDP 4-tuple) between client and network.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of such metadata are client request to honor per-packet metadata and preferences.</t>
        </dd>
        <dt>Per-Packet Metadata:</dt>
        <dd>
          <t>Refers to metadata that varies packet to packet within the same flow, often capturing
the nature and characteristics of the traffic each packet carries. This needs to be communicated on a per packet basis.</t>
        </dd>
        <dt/>
        <dd>
          <t>Examples of such metadata are Packet Priority and tolerance to delay</t>
        </dd>
        <dt>Reactive Management:</dt>
        <dd>
          <t>Network management actions that are undertaken as a reaction to unplanned overload events.
Concretely, this includes policies which react to congestion events with very short to very
long durations (e.g., varying wireless and mobile air interface conditions) or protection
policies to soften the impact of ongoing attacks.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-rationale">
      <name>Rationale for Per-packet Metadata</name>
      <t>Maximizing network utilization and enhancing perceived end user
experience under adverse network conditions are challenging. Factors that affect
wireless networks include change in channel conditions, interference
between proximate cells, and end user mobility. These variations
in link quality can be in the order of a millisecond or less
<xref target="_5G-Lumos"/> while congestion control takes several tens of
milliseconds (more than one RTT) to estimate data
rate over a specific path. Similarly, application servers that encode and serve live or
interactive content (media, typically) take time to adjust the encoding level and other
processes to match the network rate. End-to-end congestion control
algorithms are far from being optimal when the link quality is
highly variable in sub-RTT timeframes and the application demands
both low latency and high bandwidth (e.g., <xref section="2.1" sectionFormat="of" target="RFC6077"/>). In these conditions, applications settle for a lower
throughput when latency is prioritized, or for higher throughput
at the expense of much higher delays.</t>
      <t>While rate control based on feedback for a flow (UDP 4-tuple) is
evidently not able to adapt for sub-RTT changes in available wireless
channel resources, an application server can provide information
on a per-packet basis that a network shaper may use to allocate the
available resources more effectively. For example, <xref target="_5G-Octopus"/> has shown for
volumetric video packets and a rate controller that errs on the
side of overestimation, that the network shaper can drop low priority
frames of a group of pictures (corresponding to transient wireless
link bandwidth drops) and still achieve significantly better
performance than state-of-the-art based on feedback. With not fully
encrypted packets, networks may use heuristics to build an "implicit
signal" gleaned from a packet to prioritize or otherwise shape
flows. However, implicit signals are not desirable as they lead to
ossification of protocols as result of introducing unintended
dependencies <xref target="RFC9419"/>. When packet contents are encrypted, the
approach of using implicit signals is no longer viable.</t>
      <t>Bandwidth constraints exist most predominantly at the access network
(e.g., radio access networks). Users who are serviced via these
networks use clients which run various applications; each having
different connectivity needs for an optimal user experience. These
needs are not frozen but change over time depending on the application
and even depending on how an application is used (e.g., user's
preferences). An explicit signal to the client can improve management
of available bandwidth.</t>
      <t>Other applications like interactive media can demand both high
throughput and low latency and, in some cases, carry different
streams (e.g., audio and video) in a single transport connection
(e.g., WebRTC <xref target="RFC8825"/>).</t>
      <t>With RTP <xref target="RFC3550"/>, the media type could be examined and used
as an implicit signal for determining relative priority. However,
<xref target="RFC9335"/> defines a new mechanism that completely encrypts RTP
header extensions and Contributing sources (CSRCs). Furthermore, a
full encrypted transport (e.g., QUIC <xref target="RFC9000"/>) does not expose
any media header information to influence on-path network elements
during a Reactive Management event.</t>
      <figure anchor="Figure-e2e">
        <name>E2E Media Transport Overview</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="528" viewBox="0 0 528 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,64 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,176 L 8,240" fill="none" stroke="black"/>
              <path d="M 24,80 L 24,112" fill="none" stroke="black"/>
              <path d="M 24,192 L 24,224" fill="none" stroke="black"/>
              <path d="M 80,80 L 80,112" fill="none" stroke="black"/>
              <path d="M 80,192 L 80,224" fill="none" stroke="black"/>
              <path d="M 112,192 L 112,224" fill="none" stroke="black"/>
              <path d="M 152,192 L 152,224" fill="none" stroke="black"/>
              <path d="M 200,192 L 200,224" fill="none" stroke="black"/>
              <path d="M 208,80 L 208,112" fill="none" stroke="black"/>
              <path d="M 256,80 L 256,112" fill="none" stroke="black"/>
              <path d="M 256,192 L 256,224" fill="none" stroke="black"/>
              <path d="M 272,176 L 272,200" fill="none" stroke="black"/>
              <path d="M 272,216 L 272,240" fill="none" stroke="black"/>
              <path d="M 288,192 L 288,224" fill="none" stroke="black"/>
              <path d="M 296,80 L 296,112" fill="none" stroke="black"/>
              <path d="M 320,112 L 320,192" fill="none" stroke="black"/>
              <path d="M 344,80 L 344,112" fill="none" stroke="black"/>
              <path d="M 344,192 L 344,224" fill="none" stroke="black"/>
              <path d="M 360,64 L 360,128" fill="none" stroke="black"/>
              <path d="M 376,192 L 376,224" fill="none" stroke="black"/>
              <path d="M 432,192 L 432,224" fill="none" stroke="black"/>
              <path d="M 464,192 L 464,224" fill="none" stroke="black"/>
              <path d="M 520,192 L 520,224" fill="none" stroke="black"/>
              <path d="M 8,64 L 168,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 360,64" fill="none" stroke="black"/>
              <path d="M 24,80 L 80,80" fill="none" stroke="black"/>
              <path d="M 208,80 L 256,80" fill="none" stroke="black"/>
              <path d="M 296,80 L 344,80" fill="none" stroke="black"/>
              <path d="M 80,96 L 168,96" fill="none" stroke="black"/>
              <path d="M 184,96 L 208,96" fill="none" stroke="black"/>
              <path d="M 256,96 L 296,96" fill="none" stroke="black"/>
              <path d="M 24,112 L 80,112" fill="none" stroke="black"/>
              <path d="M 208,112 L 256,112" fill="none" stroke="black"/>
              <path d="M 296,112 L 344,112" fill="none" stroke="black"/>
              <path d="M 8,128 L 168,128" fill="none" stroke="black"/>
              <path d="M 184,128 L 312,128" fill="none" stroke="black"/>
              <path d="M 328,128 L 360,128" fill="none" stroke="black"/>
              <path d="M 8,176 L 168,176" fill="none" stroke="black"/>
              <path d="M 184,176 L 272,176" fill="none" stroke="black"/>
              <path d="M 24,192 L 80,192" fill="none" stroke="black"/>
              <path d="M 112,192 L 152,192" fill="none" stroke="black"/>
              <path d="M 200,192 L 256,192" fill="none" stroke="black"/>
              <path d="M 288,192 L 344,192" fill="none" stroke="black"/>
              <path d="M 376,192 L 432,192" fill="none" stroke="black"/>
              <path d="M 464,192 L 520,192" fill="none" stroke="black"/>
              <path d="M 152,208 L 168,208" fill="none" stroke="black"/>
              <path d="M 184,208 L 200,208" fill="none" stroke="black"/>
              <path d="M 256,208 L 288,208" fill="none" stroke="black"/>
              <path d="M 344,208 L 376,208" fill="none" stroke="black"/>
              <path d="M 432,208 L 464,208" fill="none" stroke="black"/>
              <path d="M 24,224 L 80,224" fill="none" stroke="black"/>
              <path d="M 112,224 L 152,224" fill="none" stroke="black"/>
              <path d="M 200,224 L 256,224" fill="none" stroke="black"/>
              <path d="M 288,224 L 344,224" fill="none" stroke="black"/>
              <path d="M 376,224 L 432,224" fill="none" stroke="black"/>
              <path d="M 464,224 L 520,224" fill="none" stroke="black"/>
              <path d="M 8,240 L 168,240" fill="none" stroke="black"/>
              <path d="M 184,240 L 272,240" fill="none" stroke="black"/>
              <g class="text">
                <text x="176" y="36">:</text>
                <text x="104" y="52">3GPP/mobile</text>
                <text x="184" y="52">network</text>
                <text x="176" y="68">:</text>
                <text x="176" y="84">:</text>
                <text x="52" y="100">client</text>
                <text x="176" y="100">B</text>
                <text x="232" y="100">radio</text>
                <text x="324" y="100">CN</text>
                <text x="176" y="116">:</text>
                <text x="176" y="132">:</text>
                <text x="176" y="148">:</text>
                <text x="92" y="164">Wireless</text>
                <text x="164" y="164">home/ISP</text>
                <text x="232" y="164">network</text>
                <text x="176" y="180">:</text>
                <text x="360" y="180">:</text>
                <text x="448" y="180">:</text>
                <text x="176" y="196">:</text>
                <text x="360" y="196">:</text>
                <text x="448" y="196">:</text>
                <text x="52" y="212">client</text>
                <text x="96" y="212">-B-</text>
                <text x="132" y="212">WLAN</text>
                <text x="176" y="212">B</text>
                <text x="228" y="212">router</text>
                <text x="316" y="212">router</text>
                <text x="404" y="212">router</text>
                <text x="492" y="212">server</text>
                <text x="176" y="228">:</text>
                <text x="360" y="228">:</text>
                <text x="448" y="228">:</text>
                <text x="176" y="244">:</text>
                <text x="360" y="244">:</text>
                <text x="448" y="244">:</text>
                <text x="176" y="260">:</text>
                <text x="360" y="260">:</text>
                <text x="448" y="260">:</text>
                <text x="176" y="276">:</text>
                <text x="360" y="276">:</text>
                <text x="400" y="276">Transit</text>
                <text x="448" y="276">:</text>
                <text x="496" y="276">Content</text>
                <text x="28" y="292">User</text>
                <text x="108" y="292">device/Network</text>
                <text x="176" y="292">:</text>
                <text x="240" y="292">MNO/ISP</text>
                <text x="304" y="292">Network</text>
                <text x="360" y="292">:</text>
                <text x="400" y="292">Network</text>
                <text x="448" y="292">:</text>
                <text x="496" y="292">Network</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                     :
       3GPP/mobile network
+--------------------:----------------------+
| +------+           :   +-----+    +-----+ |
| |client+-----------B---+radio+----+  CN | |
| +------+           :   +-----+    +--+--+ |
+--------------------:-----------------|----+
                     :                 |
       Wireless home/ISP network       |
+--------------------:-----------+     |    :          :
| +------+   +----+  :  +------+ | +---+--+ : +------+ : +------+
| |client+-B-+WLAN+--B--+router+---+router+---+router+---+server|
| +------+   +----+  :  +------+ | +------+ : +------+ : +------+
+--------------------:-----------+          :          :
                     :                      :          :
                     :                      : Transit  :  Content
 User device/Network :    MNO/ISP Network   : Network  :  Network
]]></artwork>
        </artset>
      </figure>
      <t><xref target="Figure-e2e"/> shows where such bandwidth and performance constraints
usually exist with a "B" (for Bottleneck) in 3GPP/mobile networks
and WLAN/ISP networks.  When a bottleneck exists temporarily, the
network has no choice but to discard or delay packets -- which can
harm certain flows and, thus, lead to suboptimal perceived experience.
In this document, this is termed 'Reactive Management'.</t>
      <figure anchor="Figure-netshaper">
        <name>Metadata and Network Shaping</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="560" viewBox="0 0 560 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,80 L 8,176" fill="none" stroke="black"/>
              <path d="M 64,80 L 64,176" fill="none" stroke="black"/>
              <path d="M 184,80 L 184,176" fill="none" stroke="black"/>
              <path d="M 200,112 L 200,160" fill="none" stroke="black"/>
              <path d="M 272,112 L 272,160" fill="none" stroke="black"/>
              <path d="M 288,80 L 288,176" fill="none" stroke="black"/>
              <path d="M 496,80 L 496,176" fill="none" stroke="black"/>
              <path d="M 552,80 L 552,176" fill="none" stroke="black"/>
              <path d="M 48,48 L 504,48" fill="none" stroke="black"/>
              <path d="M 8,80 L 64,80" fill="none" stroke="black"/>
              <path d="M 184,80 L 288,80" fill="none" stroke="black"/>
              <path d="M 496,80 L 552,80" fill="none" stroke="black"/>
              <path d="M 72,112 L 176,112" fill="none" stroke="black"/>
              <path d="M 200,112 L 272,112" fill="none" stroke="black"/>
              <path d="M 72,142 L 200,142" fill="none" stroke="black"/>
              <path d="M 72,146 L 200,146" fill="none" stroke="black"/>
              <path d="M 280,142 L 496,142" fill="none" stroke="black"/>
              <path d="M 280,146 L 496,146" fill="none" stroke="black"/>
              <path d="M 200,160 L 272,160" fill="none" stroke="black"/>
              <path d="M 8,176 L 64,176" fill="none" stroke="black"/>
              <path d="M 184,176 L 288,176" fill="none" stroke="black"/>
              <path d="M 496,176 L 552,176" fill="none" stroke="black"/>
              <path d="M 504,48 L 520,80" fill="none" stroke="black"/>
              <path d="M 32,80 L 48,48" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="288,144 276,138.4 276,149.6" fill="black" transform="rotate(180,280,144)"/>
              <polygon class="arrowhead" points="184,112 172,106.4 172,117.6" fill="black" transform="rotate(0,176,112)"/>
              <polygon class="arrowhead" points="80,144 68,138.4 68,149.6" fill="black" transform="rotate(180,72,144)"/>
              <polygon class="arrowhead" points="80,112 68,106.4 68,117.6" fill="black" transform="rotate(180,72,112)"/>
              <g class="text">
                <text x="112" y="36">(A)</text>
                <text x="176" y="36">Application</text>
                <text x="264" y="36">signaling</text>
                <text x="336" y="36">(client</text>
                <text x="376" y="36">-</text>
                <text x="416" y="36">server)</text>
                <text x="104" y="100">(C)</text>
                <text x="136" y="100">C2N</text>
                <text x="240" y="132">Network</text>
                <text x="348" y="132">downstream</text>
                <text x="420" y="132">packet</text>
                <text x="236" y="148">Shaper</text>
                <text x="312" y="164">(B)</text>
                <text x="360" y="164">on-path</text>
                <text x="408" y="164">S2N</text>
                <text x="460" y="164">metadata</text>
                <text x="36" y="196">Client</text>
                <text x="236" y="196">Router</text>
                <text x="524" y="196">Server</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
            (A) Application signaling (client - server)
     +--------------------------------------------------------+
    /                                                          \
+--+---+              +------------+                         +--+---+
|      |   (C) C2N    |            |                         |      |
|      |<------------>| +--------+ |                         |      |
|      |              | | Network| |  downstream packet      |      |
|      |<=============+=+ Shaper +<+=========================+      |
|      |              | +--------+ | (B) on-path S2N metadata|      |
+------+              +------------+                         +------+
 Client                   Router                              Server
]]></artwork>
        </artset>
      </figure>
      <t><xref target="Figure-netshaper"/> shows a bottleneck (access) router on the path
of packets from Server to Client.  A network shaper in the router
manages QoS of flows of multiple users and can buffer (delay),
discard, or apply other flow control rules. Application layer
signaling and feedback between Client - Server (A - in the figure)
adjust transmission rate over a period of several RTTs using feedback
and congestion control algorithms.  Congestion control algorithms (CCAs)
are generally conservative and settle to a steady rate that avoids
excessive packet loss.  In networks where link conditions (between
Client and Router) vary significantly at timescales well below the
RTT, this results in unused (wasted) bandwidth at short timescales.</t>
      <t>There is some research (e.g., <xref target="_5G-Octopus"/>) to indicate that media
applications can obtain better Quality of Experience (QoE) when sending at a higher rate
(less conservative than current CCA) and the media application is
willing to tolerate some packet loss or delay of low priority
packets.  Packet priority and tolerance to delay of packets in such
a case would be provided on-path in a side channel associated to
the downstream packet (B - in the figure).  The requirements for this
server-to-network (S2N) metadata are described in <xref target="server-network"/>.</t>
      <t>The client may provide information to an (access) router to drop
lower priority marked packets of a flow (UDP 4-tuple) temporarily
which can in turn allocate available bandwidth to other flows of that network
attachment, especially during a Reactive Management event.</t>
      <t>Network shapers
observe flows and apply policies to maximize performance but are
not aware whether  there is a high preference for one flow (UDP
4-tuple) over another flow belonging to the same user and network
attachment (e.g., a subscriber connection, a 3GPP PDU Session. See
<xref target="net-attach"/> for more details).
Clients can provide information to an (access) router
to drop 'lower priority'-marked
packets of a flow (UDP 4-tuple) during a Reactive Management event.</t>
      <t>In summary, the rapid variation of wireless link quality and/or
bandwidth limitations in networks along with interactive applications
that demand low latency and high throughput can lead to suboptimal
user experience.</t>
    </section>
    <section anchor="req-definition">
      <name>Requirements Definition</name>
      <section anchor="server-to-network">
        <name>Server-to-Network</name>
        <dl>
          <dt>REQ-PACKET-PRIORITY:</dt>
          <dd>
            <t>Server indicates the importance of a packet within a flow. This allows the network
to prioritize based on requirement and during a Reactive Management event. This
priority value may also be used to indicate loss tolerance and the
network elements may drop loss tolerant packets during Reactive Management
events.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a per-packet metadata requirement.</t>
          </dd>
          <dt>REQ-PACKET-DELAY:</dt>
          <dd>
            <t>Metadata to indicate whether the packet can tolerate delay.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a per-packet metadata requirement.</t>
          </dd>
        </dl>
      </section>
      <section anchor="client-to-network">
        <name>Client-to-Network</name>
        <dl>
          <dt>REQ-CLIENT-DECIDES:</dt>
          <dd>
            <t>User/Client indicating to the network to honor the application's
metadata signaling.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a per-flow metadata requirement.</t>
          </dd>
          <dt>REQ-PAYLOAD-CLIENT-DECIDES:</dt>
          <dd>
            <t>The ability of the receiver to change the priority by communicating
to the network to prioritize one payload(metadata) over another within
the flow -- without cooperation of the sender. Gives the sender the
ability to have same metadata for all the connections without having
to change based on the user preference, aids in scalability.</t>
          </dd>
          <dt/>
          <dd>
            <t>This is a per-flow metadata requirement.</t>
          </dd>
        </dl>
      </section>
      <section anchor="api">
        <name>API</name>
        <dl>
          <dt>REQ-API-FRAMEWORK:</dt>
          <dd>
            <t>API framework to facilitate signaling for applications.</t>
          </dd>
          <dt/>
          <dd>
            <t>Signaling from client to network (<xref target="client-flow-auth"/>)
and server to network (<xref target="server-network"/>))
is best facilitated by Application Programming Interfaces
(APIs). Signaling and retrieval of
the signals may not be performed at a single layer (although not
encouraged). Hence, for server to network signaling, a framework is required to abstract the underlying
per-packet metadata protocol(s) and allow the application(s) to retrieve/send signals
using a single or a set of APIs independent of the channels that
are used to convey the signals. The API framework is required even
if one single channel is used so that any application on a client can
consume the signals.</t>
          </dd>
          <dt/>
          <dd>
            <t>The API framework uses the medium negotiated under <xref target="metadata-negotiation"/> to send/receive the signals</t>
          </dd>
        </dl>
      </section>
      <section anchor="system-considerations">
        <name>System Considerations</name>
        <dl>
          <dt>REQ-PRIVACY-ADDITIONAL:</dt>
          <dd>
            <t>An on-path observer obtains (or gleans) no additional information about the IP
packet.</t>
          </dd>
          <dt>REQ-SIGNALING-AVOIDANCE:</dt>
          <dd>
            <t>Leveraging previous experience <xref target="RFC9049"/>, the following is not
required to make use of the collaborative signaling:
</t>
            <ul spacing="normal">
              <li>
                <t>Reveal the application identity.</t>
              </li>
              <li>
                <t>Expose the application cause (or 'reason') to signal metadata.</t>
              </li>
              <li>
                <t>Reveal the server identity.</t>
              </li>
              <li>
                <t>Inspect client-to-server encrypted payload by network elements.</t>
              </li>
            </ul>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="uc">
      <name>Use Cases</name>
      <section anchor="uc-streaming">
        <name>Media Streaming</name>
        <t>Streaming video contains the occasional key frame ("I-frame")
containing a full video frame.  These frames are necessary to rebuild
receiver state after loss of delta frames.  The key frames are
therefore more critical to deliver to the receiver than delta frames.</t>
        <t>Examples: live broadcast, on-demand video streaming.</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>Majority of streaming traffic is Audio and Video traffic.
Video contains partial frames and full frames, which need to be
distinguished so that full frames can be indicated to the network.
Audio traffic is more critical than video for many applications.
This differences in priority needs to be indicated to the network to
ensure network (de)prioritizes (or even drop if deemed necessary)
traffic appropriately.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY.  </t>
            <t>
Impact: With the above requirement met, better quality of service
 could be maintained in resource-constrained networks and during
 Reactive Management events ensuring better user experience.</t>
          </li>
          <li>
            <t>The server (or relay) sends the same stream to many receivers,
including the same metadata (especially with media over QUIC).
Different clients have different priorities for different types of traffic.
This would result in change in priorities for the same type of traffic
that a single server sends, based on the user/client.  </t>
            <t>
Requirement: REQ-PAYLOAD-CLIENT-DECIDES.  </t>
            <t>
Impact: With the above requirement met, each client/user preferences are
 prioritized accordingly while maintaining scalability on the server, since
 the metadata that the server sends still remains the same for all the connections.</t>
          </li>
          <li>
            <t>In loss-prone networks or during Reactive Management events, if all packets of an application
flow (UDP 4-tuple) such as live broadcast or on-demand video streaming are treated the same,
it limits the ability to maximize network utilization and use the transiently available bandwidth.
Dropping or delaying of (media) packets randomly is likely to lower network utilization
and application performance.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY, REQ-PACKET-DELAY.  </t>
            <t>
Impact: By identifying packets that tolerate being dropped, congestion can be reduced leading
 to improved performance/quality of service.</t>
          </li>
        </ol>
      </section>
      <section anchor="uc-interactive">
        <name>Interactive Media</name>
        <t>Interactive media includes content that a user can actively engage
with and results in input and response actions that can be highly
delay-sensitive. This can also include mixed traffic based on the
user activity and interaction.</t>
        <t>Examples: VoIP (Peer-to-Peer (P2P), group conferencing), gaming,
Remote Desktop Virtualization, eXtended Reality (XR).</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>A mobile/roaming user prioritizes audio over video during a VoIP
call to have a seamless meeting experience.  </t>
            <t>
Requirement: REQ-PAYLOAD-CLIENT-DECIDES.  </t>
            <t>
Impact: With the above requirement met, each client/user preferences are
 prioritized accordingly while maintaining scalability on the server.</t>
          </li>
          <li>
            <t>A remote desktop user prioritizes graphics updates over an on-going
file copy operation. A user types in/interacts with a document/file after triggering a
save file operation, while save operation is on-going.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY, REQ-PACKET-DELAY.  </t>
            <t>
Impact: By prioritizing graphic updates/interactive traffic, user
 interactivity is improved with lesser jitter.</t>
          </li>
          <li>
            <t>A game or VoIP application may want to signal different metadata
for the same type of packet in each direction. One user, in a VoIP
conference call, wants to prioritize the slide deck being shared while
the other wants to prioritize audio and other wants to prioritize
video of the speaker. Each user's varied preferences can be catered
with same type of metadata originating from the server.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY, REQ-PAYLOAD-CLIENT-DECIDES.  </t>
            <t>
Impact: With the above requirement met, each client/user preferences are
 prioritized accordingly while maintaining scalability on the server.</t>
          </li>
          <li>
            <t>A network glitch while user is in an eXtended Reality application.
The traffic comprises of haptic, video, audio, graphics update and
keystrokes. During such a Reactive Management event, some packets need to be
deprioritized/dropped to maintain interactivity.  </t>
            <t>
Requirement: REQ-PACKET-PRIORITY, REQ-PACKET-DELAY.  </t>
            <t>
Impact: By prioritizing high priority traffic, user's
 interactive experience is improved with lesser jitter.</t>
          </li>
        </ol>
      </section>
      <section anchor="metadata-negotiation">
        <name>Metadata Negotiation Support</name>
        <t>Currently, some flows are granted higher priority over other flows
because of a contractual agreement between the ISP and the content
provider. These contracts could be extended to also allow per-packet
metadata within a single UDP 4-tuple, as desired by this
document (<xref target="client-flow-auth"/>). However,
these sorts of agreements favor large content providers and major
ISPs, disfavoring smaller providers and smaller ISPs while also
preventing other network topologies such as peer-to-peer networking
(e.g., VoIP) as that traffic does not originate from a contracted
content provider.</t>
        <t>For all applications to benefit from per-packet prioritization within
a single UDP 4-tuple, the client needs to communicate with the ISP to determine which per-packet
markings are supported by the ISP's network (e.g., encoded into IPv6 Flow Label,
UDP Option, or DSCP). Then it can indicate to the ISP's network that a
certain UDP 4-tuple will have those markings and instruct the server
to generate those per-packet metadata markings.</t>
        <t>There might be many channels to signal the Server-to-Network per-packet metadata such as
(non-exhaustive list):</t>
        <ul spacing="normal">
          <li>
            <t>TCP options <xref target="RFC9293"/></t>
          </li>
          <li>
            <t>UDP Options <xref target="I-D.ietf-tsvwg-udp-options"/></t>
          </li>
          <li>
            <t>IPv6 Hop-by-Hop Options (<xref section="4.3" sectionFormat="of" target="RFC8200"/>)</t>
          </li>
          <li>
            <t>QUIC CID mapping</t>
          </li>
          <li>
            <t>ICMP messages</t>
          </li>
        </ul>
        <t>Requirements: REQ-API-FRAMEWORK and REQ-CLIENT-DECIDES.</t>
        <t>Impact: By signaling ISPs to honor the metadata for a particular flow, the client
  facilitates identifying important packets to the ISP enhancing packet delay or
  drop decisions during Reactive Management events.</t>
        <figure anchor="client-learn">
          <name>API Framework: Client learns ISP capabilities and signals how incoming IP packets will signal network collaboration</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="480" viewBox="0 0 480 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,48 L 24,224" fill="none" stroke="black"/>
                <path d="M 440,48 L 440,224" fill="none" stroke="black"/>
                <path d="M 32,64 L 432,64" fill="none" stroke="black"/>
                <path d="M 32,112 L 432,112" fill="none" stroke="black"/>
                <path d="M 32,160 L 432,160" fill="none" stroke="black"/>
                <path d="M 32,208 L 432,208" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="440,160 428,154.4 428,165.6" fill="black" transform="rotate(0,432,160)"/>
                <polygon class="arrowhead" points="440,64 428,58.4 428,69.6" fill="black" transform="rotate(0,432,64)"/>
                <polygon class="arrowhead" points="40,208 28,202.4 28,213.6" fill="black" transform="rotate(180,32,208)"/>
                <polygon class="arrowhead" points="40,112 28,106.4 28,117.6" fill="black" transform="rotate(180,32,112)"/>
                <g class="text">
                  <text x="28" y="36">Client</text>
                  <text x="408" y="36">ISP</text>
                  <text x="452" y="36">router</text>
                  <text x="64" y="84">Network</text>
                  <text x="152" y="84">Collaboration</text>
                  <text x="264" y="84">Capabilities?</text>
                  <text x="44" y="132">my</text>
                  <text x="88" y="132">Network</text>
                  <text x="176" y="132">Collaboration</text>
                  <text x="284" y="132">capabilities</text>
                  <text x="60" y="180">Server</text>
                  <text x="108" y="180">will</text>
                  <text x="148" y="180">mark</text>
                  <text x="200" y="180">packets</text>
                  <text x="256" y="180">using</text>
                  <text x="312" y="180">"method</text>
                  <text x="360" y="180">#4"</text>
                  <text x="44" y="228">ok</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
     Client                                           ISP router
       |                                                   |
       |-------------------------------------------------->|
       | Network Collaboration Capabilities?               |
       |                                                   |
       |<--------------------------------------------------|
       | my Network Collaboration capabilities             |
       |                                                   |
       |-------------------------------------------------->|
       | Server will mark packets using "method #4"        |
       |                                                   |
       |<--------------------------------------------------|
       | ok                                                |

]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="metadata-req">
      <name>On-path Metadata Requirements</name>
      <t>There are various approaches for collaborative signaling between
the server/client and network including out-of-band signaling,
client-centric metadata sharing and proxied connections. The
requirements here focus on proxied metadata connections on path
with the data traffic.</t>
      <t>The path signals below should follow the principles of intentional
distribution, protection of information, minimization and limiting
impact as described in <xref target="RFC9419"/> and <xref target="RFC8558"/>. Leveraging
previous experience (<xref target="RFC9049"/>), the metadata signals do not
need application identity, application cause (or 'reason'), server
identity or the inspection of client-to-server encrypted payload.</t>
      <t>The metadata connections may be between server and network (in
either direction) or between client and network (in either direction).</t>
      <t>Some use cases benefit from server-network metadata exchanges
(<xref target="server-network"/>) after first performing a client-network metadata
exchange (<xref target="client-flow-auth"/>).</t>
      <t>For the requirements that follow, the assumption is that the client
agrees to the exchange of metadata between the server and network,
or between the client and network.</t>
      <section anchor="client-flow-auth">
        <name>Client-Network Flow Authorization and Negotiation</name>
        <t>By signaling the ISP, a client can authorize the ISP to honor
incoming per-packet metadata for a certain flow (UDP 4-tuple).</t>
        <t>This same signal also allows negotiating capabilities
discussed in <xref target="metadata-negotiation"/>) and sharing the keys
necessary for encrypting or obfuscating server-to-network per-
packet metadata recommended in <xref target="privacy"/>.</t>
        <t>REQ-CLIENT-DECIDES is satisfied by signaling Client Flow Authorization as part of client-to-network signal.</t>
      </section>
      <section anchor="server-network">
        <name>Server-Network Metadata</name>
        <t>Application flows (UDP 4-tuple) for live media, eXtended Reality
(XR) and gaming require both high bandwidth and low latency and
would as such benefit from being able to use the bandwidth available
for the flow. In wireless networks, some of the bandwidth available
for the flow is not possible to schedule using the feedback based
rate control (due to the significant link variations at sub-RTT
timescales). In such networks where variations in link quality is
well below RTT, congestion control algorithms settle to a steady
rate that avoids excessive packet loss. Feedback via ECN/L4S
<xref target="RFC9331"/> provides an accurate signal but is also on an RTT
timescale and thus does not provide finer resolution information
of instantaneous bandwidth available.</t>
        <t>If application packets can either tolerate delay or some loss of
lower priority packets, the network traffic shaper and scheduler
can use this information to provide a higher application quality
of service. There is some research <xref target="_5G-Octopus"/> to indicate that media
applications can obtain better measured application quality when
sending at a higher rate (less conservative than current CCA) and
allowing the network to delay or drop low priority packets.</t>
        <t>The metadata in <xref target="relative-priority"/> should also satisfy constraints
identified in <xref target="sys-considerations"/>. Privacy (<xref target="privacy"/>) requires that
metadata should not provide additional information to identify the
application or the user. The application server can decide on the
metadata values that provide the best handling for the packets of
the flow.
This
metadata is advisory in nature and network traffic policy
that restricts its use would not result in additional issues. Other
constraints including scale (<xref target="scalability"/>) and continuity
(<xref target="continuity"/>) are required for <xref target="relative-priority"/>.</t>
        <t>Realizing the additional bandwidth potential with these metadata
may require a higher sending rate for the transport flow. This
requires work that is not specified in this document. Similarly,
the assumption is that network shapers and schedulers can use the
metadata in <xref target="relative-priority"/> but further details are out of
scope.</t>
        <t>Previous work in <xref target="TR.23.700-70-3GPP"/> has identified the general
problem in this section. However, the solution in <xref target="TS.23.501-3GPP"/>
is specific to a 5G network. The metadata sent from a (dedicated
5G) application server identifies PDU set information and end-of-burst
signals which are not understood by non-3GPP systems such as Wi-Fi
or DOCSIS. Further, 3GPP functions and policy configurations are
required since this is a 5G specific solution. The metadata disclosed
in the 5G solution also identifies frame boundaries and does not
fully conform to the constraints for privacy or minimality of data
identified in <xref target="sys-considerations"/>.</t>
        <section anchor="relative-priority">
          <name>Packet Priority</name>
          <t>Per-packet priority information provides the priority level of one
packet relative to other packets within a transport flow (UDP
4-tuple). When a packet is marked with high priority, the expectation
is that during a Reactive Management event, the network will give high importance to forwarding the
packet compared to a packet marked with low priority.
The application server can decide on the priority or
importance values that provide the best handling for the packets
of the transport flow.
When more than one application stream (e.g., video, audio)
is sent on the same transport flow, the application server decides
the best allocation of priority values across the different streams
of the flow.</t>
          <t>Per-packet priority or importance determines the drop priority of
a packet.</t>
          <t>REQ-PACKET-PRIORITY is satisfied by signaling Packet Priority as part of server-to-network metadata.</t>
        </section>
        <section anchor="delay">
          <name>Tolerance to Delay</name>
          <t>Some packets of a media flow (UDP 4-tuple) can tolerate more delay
over the wire than others (e.g., packets carrying live media frames
require very low latency while packets carrying a background image
for augmented reality can tolerate more delay). The objective of
this metadata is to indicate that these packets can tolerate a
limited amount of delay when there is severe congestion or limited
bandwidth. Similar to the LE PHB <xref target="RFC8622"/> for flows, the
expectation is that in this case, each packet marked with this
metadata is dropped during a Reactive Management event. As with
per-packet priority in <xref target="relative-priority"/>, the application server
can decide on the metadata values that provide the best handling
for the packets of the transport flow.</t>
          <t>REQ-PACKET-DELAY is satisfied by signaling Tolerance to Delay as part of server-to-network metadata.</t>
        </section>
      </section>
    </section>
    <section anchor="sys-considerations">
      <name>System Considerations</name>
      <t>Traffic policing and shaping are enforced in ingress/egress network
points for various reasons (protect the network against attacks,
ensure conformance with a traffic profile, etc.). Out-of-profile
traffic may be discarded or assigned another class (e.g., using Lower
Effort Per-Domain Behavior (LE PDB) <xref target="RFC3662"/>) a bandwidth limit
among others. The exact behavior is policy-based and deployment-specific.</t>
      <t>The entire set of operations to manage traffic is beyond the scope
of this document.  This section focuses on operational constraints
that impact  server-network, and client-network modes of sending
metadata.</t>
      <section anchor="privacy">
        <name>Privacy Considerations</name>
        <t>Media flows are vulnerable to traffic analysis even without per-packet
metadata (see, e.g., <xref target="traffic-analysis"/>). The security aspects of the
media payload / transport are not in the scope of this document; these
are mentioned here only to provide context for metadata privacy.</t>
        <t>Protocols such as TLS, SRTP, and QUIC offer some mitigations (like padding)
but are vulnerable to traffic analysis (<xref target="traffic-analysis-2"/>).</t>
        <t>Per-packet metadata can aid in traffic analysis. Hence, it is recommended to
encrypt or obfuscate the metadata information so it is only available to the
server, client, and authorized network elements. However, encryption/obfuscation
of per-packet metadata is ineffective if the threat resides in the same network
entity with keys to decrypt the metadata. The method of encryption or
obfuscation is out of scope.  To best preserve privacy, implementations might
also consider less granular per-packet marking, for example marking all
audio and video packets the same and only marking a background data transfer
with different metadata.</t>
        <t>Analysis to ensure that metadata exposure does not compromise user privacy
or allow unauthorized entities to infer sensitive information, while
maintaining minimal resource consumption is crucial. There is a tension
between resource consumption of such encryption and the user's privacy
(<xref section="7.4" sectionFormat="of" target="RFC6973"/>).</t>
        <t>REQ-PRIVACY-ADDITIONAL and REQ-SIGNALING-AVOIDANCE are satisfied by
not revealing any information that could identify the application's identity, reason to signal,
server identity, and securing the metadata.</t>
      </section>
    </section>
    <section anchor="non-req">
      <name>Non-Requirements</name>
      <t>Application feedback with measurements of packets lost and delay
incurred may affect the sending rate and other behavior of the
application.  The requirements and specification to mitigate these
aspects are not in the scope of this document.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>None.</t>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Security aspects for the metadata are discussed in <xref target="privacy"/>.
The principles outlined in <xref target="RFC8558"/>, <xref target="RFC9049"/>, and <xref target="RFC9419"/>
contain security considerations and are referenced in <xref target="metadata-req"/>.</t>
      <t>Per-packet metadata can be vulnerable to modification in transit by
on-path attackers, who can corrupt checksums, drop packets, or modify
metadata. Such changes can be detected by the receiver.</t>
      <t>Since the document focuses only on priorities within a flow
(not specifying inter-flow priority), the document does not induce concerns related to a specific
user or client declaring all flows or a subset of them as being more important. Such abuse concerns are thus not applicable.</t>
      <t>Privacy-related considerations are discussed in <xref target="privacy"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="TS.23.501-3GPP">
        <front>
          <title>3rd Generation Partnership Project; Technical Specification Group Servies and System Aspects; System architecture for the 5G System (5GS); Stage 2 (Release 18)</title>
          <author>
            <organization/>
          </author>
          <date year="2023" month="March"/>
        </front>
      </reference>
      <reference anchor="TR.23.700-70-3GPP">
        <front>
          <title>Study on XR (Extended Reality) and media services (Release 19)</title>
          <author>
            <organization/>
          </author>
          <date year="2024" month="August"/>
        </front>
      </reference>
      <reference anchor="_5G-Lumos">
        <front>
          <title>Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput, Arvind Narayanan et al., ACM Internet Measurement Conference (IMC '20), https://dl.acm.org/doi/10.1145/3419394.3423629</title>
          <author>
            <organization/>
          </author>
          <date year="2020" month="October"/>
        </front>
      </reference>
      <reference anchor="_5G-Octopus">
        <front>
          <title>Octopus: In-Network Content Adaptation to Control Congestion on 5G Links, Yongzhou Chen et al., ACM/IEEE Symposium on Edge Computing (SEC '23), https://dl.acm.org/doi/10.1145/3583740.3628438</title>
          <author>
            <organization/>
          </author>
          <date year="2023" month="December"/>
        </front>
      </reference>
      <reference anchor="app-measurement" target="https://datatracker.ietf.org/doc/slides-119-moq-bandwidth-measurement-for-quic/">
        <front>
          <title>Bandwidth measurement for QUIC</title>
          <author fullname="Zafer Gurel">
            <organization/>
          </author>
          <author fullname="Ali C. Begen">
            <organization/>
          </author>
          <date year="2024"/>
        </front>
      </reference>
      <reference anchor="traffic-analysis" target="https://www.mdpi.com/1424-8220/24/11/3509">
        <front>
          <title>Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning</title>
          <author fullname="Ibrahim A. Alwhbi">
            <organization/>
          </author>
          <author fullname="Cliff C. Zou">
            <organization/>
          </author>
          <author fullname="Reem N. Alharbi">
            <organization/>
          </author>
          <date year="2024"/>
        </front>
      </reference>
      <reference anchor="traffic-analysis-2" target="https://www.gnan.ece.gatech.edu/archive/ICC_2021_Netflix_Insights.pdf">
        <front>
          <title>A real-world dataset of netflix videos and user watch-behavior</title>
          <author>
            <organization/>
          </author>
          <date year="2021"/>
        </front>
      </reference>
      <reference anchor="RFC3550">
        <front>
          <title>RTP: A Transport Protocol for Real-Time Applications</title>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="S. Casner" initials="S." surname="Casner"/>
          <author fullname="R. Frederick" initials="R." surname="Frederick"/>
          <author fullname="V. Jacobson" initials="V." surname="Jacobson"/>
          <date month="July" year="2003"/>
          <abstract>
            <t>This memorandum describes RTP, the real-time transport protocol. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of- service for real-time services. The data transport is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. RTP and RTCP are designed to be independent of the underlying transport and network layers. The protocol supports the use of RTP-level translators and mixers. Most of the text in this memorandum is identical to RFC 1889 which it obsoletes. There are no changes in the packet formats on the wire, only changes to the rules and algorithms governing how the protocol is used. The biggest change is an enhancement to the scalable timer algorithm for calculating when to send RTCP packets in order to minimize transmission in excess of the intended rate when many participants join a session simultaneously. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="64"/>
        <seriesInfo name="RFC" value="3550"/>
        <seriesInfo name="DOI" value="10.17487/RFC3550"/>
      </reference>
      <reference anchor="RFC9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
          <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
          <date month="May" year="2021"/>
          <abstract>
            <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9000"/>
        <seriesInfo name="DOI" value="10.17487/RFC9000"/>
      </reference>
      <reference anchor="RFC9221">
        <front>
          <title>An Unreliable Datagram Extension to QUIC</title>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
          <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
          <date month="March" year="2022"/>
          <abstract>
            <t>This document defines an extension to the QUIC transport protocol to add support for sending and receiving unreliable datagrams over a QUIC connection.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9221"/>
        <seriesInfo name="DOI" value="10.17487/RFC9221"/>
      </reference>
      <reference anchor="RFC6077">
        <front>
          <title>Open Research Issues in Internet Congestion Control</title>
          <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
          <author fullname="M. Welzl" initials="M." surname="Welzl"/>
          <author fullname="M. Scharf" initials="M." surname="Scharf"/>
          <author fullname="B. Briscoe" initials="B." surname="Briscoe"/>
          <date month="February" year="2011"/>
          <abstract>
            <t>This document describes some of the open problems in Internet congestion control that are known today. This includes several new challenges that are becoming important as the network grows, as well as some issues that have been known for many years. These challenges are generally considered to be open research topics that may require more study or application of innovative techniques before Internet-scale solutions can be confidently engineered and deployed. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6077"/>
        <seriesInfo name="DOI" value="10.17487/RFC6077"/>
      </reference>
      <reference anchor="RFC9419">
        <front>
          <title>Considerations on Application - Network Collaboration Using Path Signals</title>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="T. Hardie" initials="T." surname="Hardie"/>
          <author fullname="T. Pauly" initials="T." surname="Pauly"/>
          <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
          <date month="July" year="2023"/>
          <abstract>
            <t>This document discusses principles for designing mechanisms that use or provide path signals and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements and points out that visible information will be used whether or not it is intended as a signal. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9419"/>
        <seriesInfo name="DOI" value="10.17487/RFC9419"/>
      </reference>
      <reference anchor="RFC8825">
        <front>
          <title>Overview: Real-Time Protocols for Browser-Based Applications</title>
          <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
          <date month="January" year="2021"/>
          <abstract>
            <t>This document gives an overview and context of a protocol suite intended for use with real-time applications that can be deployed in browsers -- "real-time communication on the Web".</t>
            <t>It intends to serve as a starting and coordination point to make sure that (1) all the parts that are needed to achieve this goal are findable and (2) the parts that belong in the Internet protocol suite are fully specified and on the right publication track.</t>
            <t>This document is an applicability statement -- it does not itself specify any protocol, but it specifies which other specifications implementations are supposed to follow to be compliant with Web Real-Time Communication (WebRTC).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8825"/>
        <seriesInfo name="DOI" value="10.17487/RFC8825"/>
      </reference>
      <reference anchor="RFC9335">
        <front>
          <title>Completely Encrypting RTP Header Extensions and Contributing Sources</title>
          <author fullname="J. Uberti" initials="J." surname="Uberti"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="S. Murillo" initials="S." surname="Murillo"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>While the Secure Real-time Transport Protocol (SRTP) provides confidentiality for the contents of a media packet, a significant amount of metadata is left unprotected, including RTP header extensions and contributing sources (CSRCs). However, this data can be moderately sensitive in many applications. While there have been previous attempts to protect this data, they have had limited deployment, due to complexity as well as technical limitations.</t>
            <t>This document updates RFC 3711, the SRTP specification, and defines Cryptex as a new mechanism that completely encrypts header extensions and CSRCs and uses simpler Session Description Protocol (SDP) signaling with the goal of facilitating deployment.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9335"/>
        <seriesInfo name="DOI" value="10.17487/RFC9335"/>
      </reference>
      <reference anchor="RFC9049">
        <front>
          <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
          <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/>
          <date month="June" year="2021"/>
          <abstract>
            <t>This document is a product of the Path Aware Networking Research Group (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t>
            <t>This document contains that catalog and analysis.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9049"/>
        <seriesInfo name="DOI" value="10.17487/RFC9049"/>
      </reference>
      <reference anchor="RFC9293">
        <front>
          <title>Transmission Control Protocol (TCP)</title>
          <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
          <date month="August" year="2022"/>
          <abstract>
            <t>This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="7"/>
        <seriesInfo name="RFC" value="9293"/>
        <seriesInfo name="DOI" value="10.17487/RFC9293"/>
      </reference>
      <reference anchor="I-D.ietf-tsvwg-udp-options">
        <front>
          <title>Transport Options for UDP</title>
          <author fullname="Dr. Joseph D. Touch" initials="J. D." surname="Touch">
            <organization>Independent Consultant</organization>
          </author>
          <author fullname="C. M. Heard" initials="C. M." surname="Heard">
            <organization>Unaffiliated</organization>
          </author>
          <date day="22" month="September" year="2024"/>
          <abstract>
            <t>   Transport protocols are extended through the use of transport header
   options. This document updates RFC 768 (UDP) by indicating the
   location, syntax, and semantics for UDP transport layer options
   within the surplus area after the end of the UDP user data but
   before the end of the IP length.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tsvwg-udp-options-36"/>
      </reference>
      <reference anchor="RFC8200">
        <front>
          <title>Internet Protocol, Version 6 (IPv6) Specification</title>
          <author fullname="S. Deering" initials="S." surname="Deering"/>
          <author fullname="R. Hinden" initials="R." surname="Hinden"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="86"/>
        <seriesInfo name="RFC" value="8200"/>
        <seriesInfo name="DOI" value="10.17487/RFC8200"/>
      </reference>
      <reference anchor="RFC8558">
        <front>
          <title>Transport Protocol Path Signals</title>
          <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie"/>
          <date month="April" year="2019"/>
          <abstract>
            <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals. For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear. Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements. In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels. Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8558"/>
        <seriesInfo name="DOI" value="10.17487/RFC8558"/>
      </reference>
      <reference anchor="RFC9331">
        <front>
          <title>The Explicit Congestion Notification (ECN) Protocol for Low Latency, Low Loss, and Scalable Throughput (L4S)</title>
          <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
          <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>This specification defines the protocol to be used for a new network service called Low Latency, Low Loss, and Scalable throughput (L4S). L4S uses an Explicit Congestion Notification (ECN) scheme at the IP layer that is similar to the original (or 'Classic') ECN approach, except as specified within. L4S uses 'Scalable' congestion control, which induces much more frequent control signals from the network, and it responds to them with much more fine-grained adjustments so that very low (typically sub-millisecond on average) and consistently low queuing delay becomes possible for L4S traffic without compromising link utilization. Thus, even capacity-seeking (TCP-like) traffic can have high bandwidth and very low delay at the same time, even during periods of high traffic load.</t>
            <t>The L4S identifier defined in this document distinguishes L4S from 'Classic' (e.g., TCP-Reno-friendly) traffic. Then, network bottlenecks can be incrementally modified to distinguish and isolate existing traffic that still follows the Classic behaviour, to prevent it from degrading the low queuing delay and low loss of L4S traffic. This Experimental specification defines the rules that L4S transports and network elements need to follow, with the intention that L4S flows neither harm each other's performance nor that of Classic traffic. It also suggests open questions to be investigated during experimentation. Examples of new Active Queue Management (AQM) marking algorithms and new transports (whether TCP-like or real time) are specified separately.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9331"/>
        <seriesInfo name="DOI" value="10.17487/RFC9331"/>
      </reference>
      <reference anchor="RFC8622">
        <front>
          <title>A Lower-Effort Per-Hop Behavior (LE PHB) for Differentiated Services</title>
          <author fullname="R. Bless" initials="R." surname="Bless"/>
          <date month="June" year="2019"/>
          <abstract>
            <t>This document specifies properties and characteristics of a Lower- Effort Per-Hop Behavior (LE PHB). The primary objective of this LE PHB is to protect Best-Effort (BE) traffic (packets forwarded with the default PHB) from LE traffic in congestion situations, i.e., when resources become scarce, BE traffic has precedence over LE traffic and may preempt it. Alternatively, packets forwarded by the LE PHB can be associated with a scavenger service class, i.e., they scavenge otherwise-unused resources only. There are numerous uses for this PHB, e.g., for background traffic of low precedence, such as bulk data transfers with low priority in time, non-time-critical backups, larger software updates, web search engines while gathering information from web servers and so on. This document recommends a standard Differentiated Services Code Point (DSCP) value for the LE PHB.</t>
            <t>This specification obsoletes RFC 3662 and updates the DSCP recommended in RFCs 4594 and 8325 to use the DSCP assigned in this specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8622"/>
        <seriesInfo name="DOI" value="10.17487/RFC8622"/>
      </reference>
      <reference anchor="RFC3662">
        <front>
          <title>A Lower Effort Per-Domain Behavior (PDB) for Differentiated Services</title>
          <author fullname="R. Bless" initials="R." surname="Bless"/>
          <author fullname="K. Nichols" initials="K." surname="Nichols"/>
          <author fullname="K. Wehrle" initials="K." surname="Wehrle"/>
          <date month="December" year="2003"/>
          <abstract>
            <t>This document proposes a differentiated services per-domain behavior (PDB) whose traffic may be "starved" (although starvation is not strictly required) in a properly functioning network. This is in contrast to the Internet's "best-effort" or "normal Internet traffic" model, where prolonged starvation indicates network problems. In this sense, the proposed PDB's traffic is forwarded with a "lower" priority than the normal "best-effort" Internet traffic, thus the PDB is called "Lower Effort" (LE). Use of this PDB permits a network operator to strictly limit the effect of its traffic on "best-effort"/"normal" or all other Internet traffic. This document gives some example uses, but does not propose constraining the PDB's use to any particular type of traffic.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3662"/>
        <seriesInfo name="DOI" value="10.17487/RFC3662"/>
      </reference>
      <reference anchor="RFC6973">
        <front>
          <title>Privacy Considerations for Internet Protocols</title>
          <author fullname="A. Cooper" initials="A." surname="Cooper"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="J. Morris" initials="J." surname="Morris"/>
          <author fullname="M. Hansen" initials="M." surname="Hansen"/>
          <author fullname="R. Smith" initials="R." surname="Smith"/>
          <date month="July" year="2013"/>
          <abstract>
            <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6973"/>
        <seriesInfo name="DOI" value="10.17487/RFC6973"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
        <front>
          <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Richard Roberts" initials="R." surname="Roberts">
            <organization>Juniper</organization>
          </author>
          <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Samier Barguil" initials="S." surname="Barguil">
            <organization>Nokia</organization>
          </author>
          <author fullname="Bo Wu" initials="B." surname="Wu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="10" month="September" year="2024"/>
          <abstract>
            <t>   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   before or during service provisioning (e.g., Network Slice Service).
   The document also specifies a service model for managing bearers over
   which ACs are established.

   Also, the document specifies a set of reusable groupings.  Whether
   other service models reuse structures defined in the AC models or
   simply include an AC reference is a design choice of these service
   models.  Utilizing the AC service model to manage ACs over which a
   service is delivered has the advantage of decoupling service
   management from upgrading AC components to incorporate recent AC
   technologies or features.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-16"/>
      </reference>
      <reference anchor="I-D.rwbr-tsvwg-signaling-use-cases">
        <front>
          <title>Host to Network Signaling Use Cases for Collaborative Traffic Differentiation</title>
          <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Dan Wing" initials="D." surname="Wing">
            <organization>Cloud Software Group Holdings, Inc.</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
            <organization>Nokia</organization>
          </author>
          <date day="17" month="March" year="2024"/>
          <abstract>
            <t>   Host-to-network (and vice versa) signaling can improve the user
   experience by informing the network which flows are more important
   and which packets within a flow are more important without having to
   disclose the content of the packets being delivered.  The
   differentiated service may be provided at the network (e.g., packet
   discard preference), the sender (e.g., adaptive transmission or
   session migration), or through cooperation of both the host and the
   network.

   This document lists use cases demonstrating the need for a mechanism
   to share metadata about flows between a receiving host and its
   networks to enable differentiated traffic treatment for packets sent
   to the host.  Such a mechanism is typically implemented using a
   signaling protocol between the host and a set of network elements.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-rwbr-tsvwg-signaling-use-cases-02"/>
      </reference>
      <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
        <front>
          <title>Media Handling Considerations for Wireless Networks</title>
          <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
            <organization>Futurewei</organization>
          </author>
          <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
            <organization>Cisco</organization>
          </author>
          <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
            <organization>Tencent America LLC</organization>
          </author>
          <date day="10" month="August" year="2024"/>
          <abstract>
            <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

   Note: The solution in this draft will be revised to address
   requirements defined in [draft-kwbdgrr-tsvwg-net-collab-rqmts].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-05"/>
      </reference>
    </references>
    <?line 757?>

<section anchor="net-attach">
      <name>Network Attachment</name>
      <t>A network attachment represents the communication link between
clients and network (router) over which a connection policy (including
QoS) is applied to flows within that network attachment.</t>
      <t>A network attachment may be established using control plane signaling
between the client and the network (access) router and is out of
scope of this document.  Transport flows over a network attachment
may consist of multiple streams such as video or audio.
<xref target="Figure-conn-flow"/> shows a high level view of network attachments,
flows, and QoS/policy discussed in <xref target="metadata-req"/>.</t>
      <t>The requirements in <xref target="metadata-req"/> apply to data units like frames
within a flow, but not between flows. Specifically, this document
does not discuss flows of distinct clients/users.</t>
      <figure anchor="Figure-conn-flow">
        <name>E2E transport flows and connection session</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="384" width="504" viewBox="0 0 504 384" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,208" fill="none" stroke="black"/>
              <path d="M 8,256 L 8,352" fill="none" stroke="black"/>
              <path d="M 24,48 L 24,80" fill="none" stroke="black"/>
              <path d="M 24,288 L 24,320" fill="none" stroke="black"/>
              <path d="M 40,80 L 40,160" fill="none" stroke="black"/>
              <path d="M 56,48 L 56,80" fill="none" stroke="black"/>
              <path d="M 64,288 L 64,320" fill="none" stroke="black"/>
              <path d="M 72,48 L 72,80" fill="none" stroke="black"/>
              <path d="M 88,80 L 88,144" fill="none" stroke="black"/>
              <path d="M 104,48 L 104,80" fill="none" stroke="black"/>
              <path d="M 104,144 L 104,160" fill="none" stroke="black"/>
              <path d="M 128,32 L 128,120" fill="none" stroke="black"/>
              <path d="M 128,184 L 128,208" fill="none" stroke="black"/>
              <path d="M 128,256 L 128,280" fill="none" stroke="black"/>
              <path d="M 128,328 L 128,352" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,120" fill="none" stroke="black"/>
              <path d="M 216,184 L 216,280" fill="none" stroke="black"/>
              <path d="M 216,328 L 216,352" fill="none" stroke="black"/>
              <path d="M 232,48 L 232,80" fill="none" stroke="black"/>
              <path d="M 264,80 L 264,120" fill="none" stroke="black"/>
              <path d="M 288,144 L 288,160" fill="none" stroke="black"/>
              <path d="M 304,80 L 304,280" fill="none" stroke="black"/>
              <path d="M 344,48 L 344,80" fill="none" stroke="black"/>
              <path d="M 360,32 L 360,352" fill="none" stroke="black"/>
              <path d="M 424,80 L 424,112" fill="none" stroke="black"/>
              <path d="M 440,208 L 440,240" fill="none" stroke="black"/>
              <path d="M 448,112 L 448,144" fill="none" stroke="black"/>
              <path d="M 464,160 L 464,208" fill="none" stroke="black"/>
              <path d="M 464,240 L 464,304" fill="none" stroke="black"/>
              <path d="M 480,80 L 480,112" fill="none" stroke="black"/>
              <path d="M 496,208 L 496,240" fill="none" stroke="black"/>
              <path d="M 8,32 L 128,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 360,32" fill="none" stroke="black"/>
              <path d="M 24,48 L 56,48" fill="none" stroke="black"/>
              <path d="M 72,48 L 104,48" fill="none" stroke="black"/>
              <path d="M 232,48 L 344,48" fill="none" stroke="black"/>
              <path d="M 24,80 L 56,80" fill="none" stroke="black"/>
              <path d="M 72,80 L 104,80" fill="none" stroke="black"/>
              <path d="M 232,80 L 344,80" fill="none" stroke="black"/>
              <path d="M 424,80 L 480,80" fill="none" stroke="black"/>
              <path d="M 424,112 L 480,112" fill="none" stroke="black"/>
              <path d="M 120,128 L 272,128" fill="none" stroke="black"/>
              <path d="M 88,144 L 160,144" fill="none" stroke="black"/>
              <path d="M 240,144 L 296,144" fill="none" stroke="black"/>
              <path d="M 312,144 L 352,144" fill="none" stroke="black"/>
              <path d="M 368,144 L 448,144" fill="none" stroke="black"/>
              <path d="M 40,160 L 160,160" fill="none" stroke="black"/>
              <path d="M 240,160 L 296,160" fill="none" stroke="black"/>
              <path d="M 312,160 L 352,160" fill="none" stroke="black"/>
              <path d="M 368,160 L 464,160" fill="none" stroke="black"/>
              <path d="M 120,176 L 272,176" fill="none" stroke="black"/>
              <path d="M 8,208 L 128,208" fill="none" stroke="black"/>
              <path d="M 440,208 L 496,208" fill="none" stroke="black"/>
              <path d="M 440,240 L 496,240" fill="none" stroke="black"/>
              <path d="M 8,256 L 128,256" fill="none" stroke="black"/>
              <path d="M 24,288 L 64,288" fill="none" stroke="black"/>
              <path d="M 96,288 L 312,288" fill="none" stroke="black"/>
              <path d="M 64,304 L 168,304" fill="none" stroke="black"/>
              <path d="M 248,304 L 352,304" fill="none" stroke="black"/>
              <path d="M 368,304 L 464,304" fill="none" stroke="black"/>
              <path d="M 24,320 L 64,320" fill="none" stroke="black"/>
              <path d="M 96,320 L 312,320" fill="none" stroke="black"/>
              <path d="M 8,352 L 128,352" fill="none" stroke="black"/>
              <path d="M 216,352 L 360,352" fill="none" stroke="black"/>
              <path d="M 120,128 C 111.16936,128 104,135.16936 104,144" fill="none" stroke="black"/>
              <path d="M 272,128 C 280.83064,128 288,135.16936 288,144" fill="none" stroke="black"/>
              <path d="M 120,176 C 111.16936,176 104,168.83064 104,160" fill="none" stroke="black"/>
              <path d="M 272,176 C 280.83064,176 288,168.83064 288,160" fill="none" stroke="black"/>
              <path d="M 96,288 C 87.16936,288 80,295.16936 80,304" fill="none" stroke="black"/>
              <path d="M 312,288 C 320.83064,288 328,295.16936 328,304" fill="none" stroke="black"/>
              <path d="M 96,320 C 87.16936,320 80,312.83064 80,304" fill="none" stroke="black"/>
              <path d="M 312,320 C 320.83064,320 328,312.83064 328,304" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="312,280 300,274.4 300,285.6" fill="black" transform="rotate(90,304,280)"/>
              <polygon class="arrowhead" points="272,120 260,114.4 260,125.6" fill="black" transform="rotate(90,264,120)"/>
              <g class="text">
                <text x="36" y="68">A1</text>
                <text x="84" y="68">A2</text>
                <text x="260" y="68">QoS,</text>
                <text x="308" y="68">Policy</text>
                <text x="176" y="100">Network</text>
                <text x="452" y="100">srv-A2</text>
                <text x="172" y="116">attachment</text>
                <text x="200" y="148">flow-x2</text>
                <text x="200" y="164">flow-x1</text>
                <text x="52" y="228">Client-1</text>
                <text x="468" y="228">srv-A1</text>
                <text x="176" y="260">Network</text>
                <text x="172" y="276">attachment</text>
                <text x="44" y="308">A1</text>
                <text x="208" y="308">flow-x3</text>
                <text x="52" y="372">Client-2</text>
                <text x="252" y="372">Router</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+--------------+          +-----------------+
| +---+ +---+  |          | +-------------+ |
| |A1 | |A2 |  |          | | QoS, Policy | |
| +-+-+ +-+-+  |          | +---+----+----+ |       +------+
|   |     |    |  Network |     |    |      |       |srv-A2|
|   |     |    |attachment|     v    |      |       +--+---+
|   |     |  .------------------+-.  |      |          |
|   |     +-+------- flow-x2 ------+-|------|----------+
|   +-------+------- flow-x1 ------+-|------|------------+
|            '--------------------'  |      |            |
|              |          |          |      |            |
+--------------+          |          |      |         +--+---+
  Client-1                |          |      |         |srv-A1|
                          |          |      |         +--+---+
+--------------+  Network |          |      |            |
|              |attachment|          v      |            |
| +----+  .--------------------------+-.    |            |
| | A1 +-+----------- flow-x3 ----------+---|------------+
| +----+  '----------------------------'    |
|              |          |                 |
+--------------+          +-----------------+
  Client-2                  Router
]]></artwork>
        </artset>
      </figure>
      <t><xref target="Figure-conn-flow"/> shows "Client-1" and "Client-2" which negotiate
connection policy (e.g., QoS) and other aspects like mobility
handling, charging applied to flows in that network attachment.
"Client-1" has "flow-x1" and "flow-x2" over its network attachment
while "Client-2" has "flow-x3".  <strong>The requirements in this document
focus on on-path collaboration signals that apply to data units
such as media frames within flows like "flow-x1/x2/x3" but not
between them.</strong></t>
    </section>
    <section anchor="x-req-def">
      <name>Extended Requirements Definition</name>
      <dl>
        <dt>REQ-MEDIA-AV-SEPARATE:</dt>
        <dd>
          <t>Audio can be prioritized differently than video.</t>
        </dd>
        <dt/>
        <dd>
          <t>This requirement may be generalized to non-media packet types.</t>
        </dd>
        <dt/>
        <dd>
          <t>This is an enhanced requirement that requires e2e application layer
signaling (out of scope here) to identify of frame boundaries and may
not be suitable in cases which are sensitive to traffic analysis
(see REQ-SIGNALING-AVOIDANCE and <xref target="RFC9049"/>). If the application
provides frame boundaries, the client signals the enhanced application
priority values in REQ-PAYLOAD-CLIENT-DECIDES.</t>
        </dd>
        <dt/>
        <dd>
          <t>This is a per-flow metadata requirement.</t>
        </dd>
        <dt>REQ-MEDIA-KEYFRAME:</dt>
        <dd>
          <t>Video contains partial frames and full frames, which need to be
distinguished so that full frames can be indicated to the
network.</t>
        </dd>
        <dt/>
        <dd>
          <t>This is an enhanced requirement that requires e2e application layer
signaling (out of scope here) to identify of frame boundaries and may
not be suitable in cases which are sensitive to traffic analysis
(see REQ-SIGNALING-AVOIDANCE and <xref target="RFC9049"/>). If the application
provides frame boundaries, the client signals the enhanced application
priority values in REQ-PAYLOAD-CLIENT-DECIDES.</t>
        </dd>
        <dt/>
        <dd>
          <t>This is a per-packet metadata requirement.</t>
        </dd>
        <dt>REQ-NETWORK-THROUGHPUT:</dt>
        <dd>
          <t>A mechanism to signal the available network throughput to interested
clients, including changes to throughput.</t>
        </dd>
        <dt>REQ-NRLP:</dt>
        <dd>
          <t>The network shall inform the endpoint of the Rate limiting policies.</t>
        </dd>
        <dt>REQ-SIGNAL-EXPOSURE-FAIRNESS:</dt>
        <dd>
          <t>Means to expose the signal independent of the application should be
considered. An example of such exposure is OS APIs.</t>
        </dd>
        <dt>REQ-NETWORK-SEEKS-LOAD-DOWN:</dt>
        <dd>
          <t>During detected Reactive Management events, the network implements a
reactive traffic policy to reduce or offload some of the traffic.</t>
        </dd>
        <dt/>
        <dd>
          <t>This may involve utilizing alternative network attachments
available to the client (e.g., Wi-Fi).</t>
        </dd>
        <dt>REQ-CONTINUITY:</dt>
        <dd>
          <t>Handover from one radio or router to another should continue to
provide same service level.</t>
        </dd>
        <dt>REQ-MULTIPLE-BOTTLENECKS:</dt>
        <dd>
          <t>Signaling should support Multiple bottlenecks.</t>
        </dd>
        <dt/>
        <dd>
          <t>The network must identify multiple bottlenecks, including those
within the ISP and subscriber networks, ensuring all bottlenecks
benefit from network/client collaboration to enhance overall performance.</t>
        </dd>
        <dt>REQ-SCOPED-METADATA:</dt>
        <dd>
          <t>Means to characterize the scope of a shared metadata for the sake of
better interoperability should be supported.</t>
        </dd>
        <dt/>
        <dd>
          <t>The metadata can be used by the network to prioritize traffic
within a single 5-tuple connection and metadata cannot be leveraged
for prioritization between different flows.</t>
        </dd>
        <dt>REQ-SINGLE-CHANNEL:</dt>
        <dd>
          <t>The network should use a single channel for sharing metadata
to simplify the process and avoid the need for redundant functions.</t>
        </dd>
        <dt>REQ-ISP-SCALE:</dt>
        <dd>
          <t>The metadata and other state information that a router has to
maintain for each additional flow it handles should be kept
to a minimum or eliminated altogether.</t>
        </dd>
      </dl>
    </section>
    <section anchor="extended-use-cases">
      <name>Extended Use-Cases</name>
      <section anchor="media-streaming-extended">
        <name>Media Streaming Extended</name>
        <t>Streaming video contains the occasional key frame ("I-frame")
containing a full video frame.  These frames are necessary to rebuild
receiver state after loss of delta frames.  The key frames are
therefore more critical to deliver to the receiver than delta frames.</t>
        <t>Examples:</t>
        <ol spacing="normal" type="1"><li>
            <t>Audio is more critical than video for many applications and should
be prioritized differently than video.</t>
          </li>
        </ol>
        <t>Requirement: REQ-MEDIA-AV-SEPARATE.</t>
        <ol spacing="normal" type="1"><li>
            <t>Video contains partial frames and full frames, which need to be
distinguished so that full frames can be indicated to the network.</t>
          </li>
        </ol>
        <t>Requirement: REQ-MEDIA-KEYFRAME.</t>
      </section>
      <section anchor="assisted-offload">
        <name>Assisted Offload</name>
        <t>There are cases (crisis) where "normal" network resources cannot
be used at maximum and, thus, a network would seek to reduce or
offload some of the traffic during these events -- called
'Reactive Management' policy.  An example of such use case is cellular
networks that are overly used (and radio resources exhausted) such
as a large collection of people (e.g., parade, sporting event), or
such as a partial radio network outage (e.g., tower power outage).
During such a condition, an alternative network attachment may be
available to the client (e.g., Wi-Fi).</t>
        <t>Network-to-client signals are useful to put in place adequate traffic
distribution policies on the client (e.g., prefer the use of alternate
paths, offload a network).</t>
        <t>Requirement: REQ-NETWORK-SEEKS-LOAD-DOWN.</t>
      </section>
      <section anchor="nrlp">
        <name>Network Bandwidth &amp; Network Rate Limiting Policies</name>
        <t>Bandwidth constraints exist most predominantly at the access network.
This can be constraints in the network itself or a result of rate
limiting due to various reasons.</t>
        <t>Also, traffic exchanged over a network attachment may be subject
to rate-limit policies. These policies may be intentional policies
(e.g., enforced as part of the activation of the network attachment
and typically agreed upon service subscription) or be Reactive Management
policies (e.g., enforced temporarily to manage an overload or during
a DDoS attack mitigation).</t>
        <t>Requirements: REQ-NETWORK-THROUGHPUT, REQ-NRLP.</t>
        <t>Use cases:</t>
        <ol spacing="normal" type="1"><li>
            <t>Performance Optimization: Some applications support some forms
  of bandwidth measurements (e.g., <xref target="app-measurement"/>) which feed
  how the content is accessed to using ABR. Complementing or replacing
  these measurements with explicit signals will improve overall
  network performance and can help optimize the data transfer.
  Signaling bandwidth availability allows endpoints to avoid
  contributing to network congestion. When the network informs the
  endpoint about available bandwidth, the endpoint can dynamically
  adjust its data transmission rate. Knowing available bandwidth
  helps the endpoint allocate resources efficiently. Cloud-based
  applications can auto-scale based on available bandwidth.</t>
          </li>
          <li>
            <t>Rate Limiting: Monthly data quotas on cellular networks can
  be easily exceeded by video streaming, in particular, if the
  client chooses excessively high quality or routinely abandons
  watching videos that were downloaded. The network can assist the
  client by informing the client of the network's bandwidth policy.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="extended-system-considerations">
      <name>Extended System Considerations</name>
      <section anchor="app-interference">
        <name>Application Interference</name>
        <t>Applications that have access to a resource-quota information may
adopt an aggressive behavior (compared to those that don't have
access) if they assumed that a resource-quota like metadata is for
the application, not for the client that runs the applications.</t>
        <t>This is challenging for home networks where multiple clients may
be running behind the same CPE, with each of them running a video
application. The same challenge may apply when tethering is enabled.</t>
        <t>Requirement: REQ-SIGNAL-EXPOSURE-FAIRNESS.</t>
      </section>
      <section anchor="classification">
        <name>Redundant Functions and Classification Complications</name>
        <t>If distinct channels are used to share the metadata between a client
and a network, a network that engages in the collaborative signaling
approach will require sophisticated features to classify flows and
decide which channel is used to share metadata so that it can consume
that information.</t>
        <t>Likewise, the network will require to implement redundant functions;
for each signaling interface.</t>
        <t><em>As such, application- and protocol-specific signaling channels are
suboptimal.</em> (REQ-SINGLE-CHANNEL)</t>
        <t>Requirement:  REQ-SINGLE-CHANNEL is preferred.</t>
      </section>
      <section anchor="continuity">
        <name>Session Continuity</name>
        <t>The frequency of handovers increases when a user moves
faster or when the media session lasts longer. During handovers,
there should be minimal delay incurred during handover in
configuring/setting up the metadata of a media session in progress.</t>
        <t>Requirement: REQ-CONTINUITY.</t>
      </section>
      <section anchor="multiple-bottlenecks">
        <name>Multiple Bottlenecks</name>
        <t>Whereas models often show a single bottleneck, there are frequently
two (or more) bottlenecks: the ISP network and within the subscriber
network (e.g., Wi-Fi link). As such, all bottlenecks near the
subscriber should be able to benefit from network/client collaboration.</t>
        <t>Requirement: REQ-MULTIPLE-BOTTLENECKS.</t>
      </section>
      <section anchor="metadata-scope">
        <name>Metadata Scope</name>
        <t>An operational challenge for sharing resource-quota like metadata
(e.g., maximum bitrate) is that the network is generally not entitled
to allocate quota per-application, per-flow, per-stream, etc. that
delivered as part of an Internet connectivity service. However, the
network has a visibility about the overall network attachment (e.g.
inbound/outbound bandwidth discussed in
<xref target="I-D.ietf-opsawg-teas-attachment-circuit"/>).</t>
        <t>Hints about resource-like metadata is bound by default to
the overall network attachment, not specific to a given application
or flow.</t>
        <t>It is out of the scope of this document to discuss setups (e.g.,
3GPP PDU Sessions) where network attachments with Guaranteed Bit
Rate (GBR) for specific flows is provided.</t>
        <t>Requirement: REQ-SCOPED-METADATA.</t>
      </section>
      <section anchor="scalability">
        <name>Scalability</name>
        <t>There may be a large number of flows handled by the server
and wireless/access router. Per flow information (state) at a
wireless router for optimizing the flow can negate the advantages
offered as the number of flows handled increases.</t>
        <t>Requirement: REQ-ISP-SCALE.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is a merge of <xref target="I-D.rwbr-tsvwg-signaling-use-cases"/>
and <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>.</t>
      <t>T. Reddy contributed text and ideas to this document.</t>
      <dl>
        <dt>Acknowledgments from <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>:</dt>
        <dd>
          <t>Xavier De Foy and the authors of this draft have discussed the
similarities and differences of this draft with the MoQ draft for
carrying media metadata.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors wish to thank Mike Heard,
Sebastian Moeller and Tom Herbert for discussions on metadata fields,
fragmentation and various transport aspects.</t>
        </dd>
        <dt/>
        <dd>
          <t>The authors appreciate
input from Marcus Ilhar and Magnus Westerlund on the need to address
privacy in general and Dan Druta to consider a common transport
across various client/server to network signaling when possible.
Ruediger Geib suggested that limiting the amount of state information
that a wireless router has to keep for a flow should be minimized.</t>
        </dd>
        <dt/>
        <dd>
          <t>Ingemar Johansson's suggestions on fast fading (which L4S handles)
and dramatic drops in wireless accesses have been helpful to identify
the issues.  Thanks to Hang Shi for the review and comments on
client-to-network signaling.  Thanks to Luis Miguel Contreras, Colin
Kahn, Marcus Ilhar and Tianji Jiang for their review and comments.</t>
        </dd>
      </dl>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19a3PbSHbo9/4VXXLVtTgmKVu256HNJitLsq0dWdZImpnd
1K1KQUSTxBgEuHhI1trOb7/n2d0AQduTTeomVVHtjiUS6Mfp8371ZDIxTdbk
7sDuXLq/tVnlVq5oajsvK3vumruyemePyjxPbsoqabKysFfZokjyrFjsmOTm
pnK38Orwk/GAO2aWNG5RVvcHNivmpTFpOSuSFUycVsm8mby7u0kXVTVp6tu7
xaRwzWRGg02qv62aevL4qanbm1VW1zByc7+G905Prl9a+8AmeV3CGrIidWsH
/ymanbHdcWnWlFWW5PjH6eEL+Ae2tHN6ef1yxxTt6sZVByaFNR2YWVnUrqjb
+sA2VesM7OipSSqXHNjrKinqdVk1Bve3qMp2DVP5T21SpPbKVbfZzNX2V3gE
4GJf4WM75p27h5fSA2Mn9g0sJ8Ffzso7ewazFrN7/PNXgE/u6tqeZcW7Gj95
AUPeZWmztLispkoygB5+cVHmGb/0du0YwkkOEC/qLJW/a3PrihZ2ZK0s9frq
l19fwZ8Msc4C4dNVkuWwZ4T4nzLXzKdltYCPk2q2PLDLplnXB3t7+BB+kt26
qT60hx/s3VTlXe326P09nDNrlu0Nzp7DDuvmwJikbZZlhSCATy2cPMD4z1P7
Y5Kt10meZyvApJy+Ylz4c7kshr6FOZMi+zvt8sC+bJu2cncuo+8cb+M3eHX6
rvPqn+b64HRWrjqLOJ4C7ItFNPVxUoSPuvMd5WUL51zOmztACwaffV3mKTxe
j+1pMZvSW0oPQ8/HS02T4g5e/dMC/9xY2tXUvmqLNLl1sI9ogVdV1v+it8ys
npXxPPWCH//TDL8Zmugy+S1ZlACxpOjOlC4TQPKN7/9r4eLnnS6yKquX2wF0
nNwBJtfxmoH2Z67qfNNd7TU+UDT2cOWqbJbYs7OjDrB4gJTfJ1TfnH/e5jnP
96Zcwr+pfVG2syRNsmpgxrewlYWjL2ZZA5zv0hWF47XNyhRGefr88ePH8ndb
NMgdX8JLMxevbMVTTW90qj+VNDAtDH6KslrBjLdA+AZ5a/jLAgOY7j+dPn/8
ZPL01cXFAQ0rDN/uPK1S+8oVwj3sRVI18Ee9zNb2oip/c7PmDwC12bIAcOUI
4Vk2h1/pYT5s4n3A+ogP3teNW9lDAOSsqf+gfxPvaOAjoEQSK83S2eev9Ovd
56+uRvBwkyyc3be7l8APk9rZJ9+Pdmi1xKPtGxzG7j/ef0q7usRdfff48eS7
x9HGws6umja9t7DMv1za3ZP3DcqFFMAPXKG5H9FyV8iSba3MO0z8g0wsMx+2
i7ZucOpnOPXzV5OzdlXWHVDu0EfPX+E612tksTjDRQVTzBr886hcAdbNQBzZ
1epXIEmEwPUSYLhYrttmbA9hGfDKOWD/fVIA5TkQLvkUvjh6A4TUuApEIoiR
pG5ZoiLnn7sKcdbunr45sg/3H4/Gnmun+TSZrYhXp2W29+Tx9MmTZ8/3nj57
8sPTH55Nnz7bf/rt/g8xhN/OmhKEIm70sWwUP1q3va3qh7CqSZD7sEIkrTRZ
N4wfTUmfViXJqAWIA/wU/gcbJ2E3tn+Fz/++LFt7tHSdDe+dnpycAIKs1mWd
tSt86yQF9AAoArAQnrtXJ7jjp1+x4+ffP/3u2eMpbPf7Z0+/j3d87GZuJVsm
tIKzm6wCiAWpor0H4Rw9Rkj908+nRzv+eR6fUEY/8pJQfib+t5ir/GsCZwpc
HrSCLzx5mGf2aGpfuIUrwjqTauGaILthHQmoELN3rgqyGxSvvToHpaGePHny
w2RV/m1yo/uKtz+BfU1Ag5vtIWxgmDkQ/wSQM7+vs3oTOCfFrLpfN0BnihbX
/I49lHeIKo7yBJQ4z0d+brI8+zue6ZsEGEXh7JlLqoL0y38YnKc3VbLMgCdN
AV53y5vsC88f5dl8jmD917L9wqOXDpjXOY4LEisauH8Ed3d301W6Jg1k78mz
/WeT7/f3H+/tP9t78gSQ8/EPA7Cd7G9C99CCQppPAK55igABVtXYcm6BLczz
7L29hQMtGcItMDV7lzSz5eTGLZPbrKwGYPnks0sGHb+YAn1MF/D8bDl1absn
WuDe6dHRv+EA/3bOc//bKeigi2VTT9fpHOTRZDIBkY+666wxJrIJgO3Vaj3Y
eVWu7CzPENOaEjV+whncADJlV0WfgvFQ2Gy1rkoYAuUHbdG9B0U4Iw54c29Z
8uHI+IAfDoRmg5+YIiEJhOMDdfFqYEjQ4lHeIijXSChg++zOKzhiYFCwBZes
4BfXzKYjcwf6LY6GIMVpSpuCXpWXNa9pJkwQRsI/ZbQpaAqVg3VXY8NPDYNj
ldzbG2ddkdzkQEJ1CYMkjQCIztUwWOB33AZpUDKVbPZhbXHBzUpWkRWAczi2
LsUcgqk0HgD6rGO3IbBhKcBqYQi7zhMAj+zdgB7neME4cYbWFkhUXQgwjrJx
cn6w9eslEH1ncAPKOVgNxDNTIDaUYE2WINfwojhpOke4C0gIcoE3YRDkCegt
68qJ+AMZgI/XKOMrfTpBSYQQbtBWE7txhDYgnAKJXVhXqYYUrp8XvcfAITSJ
FjE1hvYCvLMl8OZZDadSlyvCRQBZDQunE8vyvEXcb5wMAFvD3SZmBYQE2mG9
QtSpl3iAK9ckSMw0H8AXIAvjVH1L/KZsluYraQWh7sJC5/ALrg1AH5DNa4mw
daaQxP58fMHAIsN2Dqdkd/GzZ5OmXeduNGXCXmVpmjtjHqBWUpVpO6NRPjzI
8M9PxniTVtYD5AOImLdoFKDwx0X/enZ4jh8v6fjz+5iUc+RG5jYB251sWsRB
WPQ7+7eWtDeLtGTr9mZyeX1td+Esi3TSVKCzNtnKjeBxUJZuk5x5IWoiAA6A
n6sMQD8do5TPRfrACbagViY1vwX8ClGGNcMUtG8YAEFvERi5WO344RLYnfVC
EyBz1eL64aQEiW3aVqQGpkgIAZeBevBMhcJQ4MEnKbIvZFGCwsBIbt19IFyr
XDxC+hpxKKYSOFCjDAyJFaAG2i0MkjsbHSMd7NTa48+tD0gEhTVTajwJzAnL
ZuyBZXvmalF1bibATgGEICP9SpBHVuXa7iK5A9e9x/NhcgUWO7SwX4XJ4sEE
jB13loHgK4sceT6ygyoDLgenAx/0JjOeCdO4fNqzZJ3cZIhKYzjYugbayeHs
hejpRf+RCRQBwqcpgZcFnLm8vrAfPvzL5cujp8+fP/70aUxaoHz0Axh2+BGO
+XMBJJEhYzfxE/v7Tz59os0wRLuCq0AeV6JYx4NU/AIMMT3hh+iHfEh4MPD8
CL+JJSGnAVC1M0a1LYeuEigXcMqzwIuQl6VAXAUyUbVu2vWigm9Bqrwu7xzK
NwaMfk4SrSgbQvT8LrkHwZqtiLbwqEYWlPs6A5ggT/4NWCbohGDkkpKfE+9L
qntgN022kL3gNpplWxNPheUhFy3nQJW479qZ7s5JJWAOhUsmVt2Vczewf4eW
R5Guy0ylrLItHD5JcWE4fFZ5KoQdmw8fajebqBfOwTEiIrY1SwEQhPoNsW84
qYmQsjJ8GqOdwYue60dypOxLEZBfratNkEoqVNI0E09gzNNhQubguIecfgmo
ZeDDEoTjKvs7DAy7RraIRDYFxNT1TUAG4a4ckteN7qovl8oC9kXWELo3u9Bl
2hVg3deTWcdTCWMLdoNoivyZkdNTOUUQwQ/AZJtnRca+TtORc6vkncBQ6GBe
4sZJU3HVCuwVcwHH8BKB8UY2eWBQj5+jTgUw8bKYaCYtXV08BAVsia4Wy3gm
XJ04XjZ3KHAMTJfgsgvHkpDPqPVM3r3nIVAWoZ5ZIetgDBYFiXSk1apFNwuS
nT+93WzqQJeJpbBH2khP8QA6sCfvE6SemhQapMagYADxyDt4jA7RurTLshjG
T+E/XtxMGXwX/NTXABAlOCxExoWv5TcRTl4G4E7HAl9gzQ2BmFTlSGOfoVtw
BgcJalc2q/WMxXCyDiSpjg/aIU4ssEVA1yK3OkDGkyJIq4xNwPD6MggFABfI
jFEZodNmYQGHi+IO5Ycxl06UiTdg1C3EnXDgLeOV/9Qmsx6nblEJaACdC8SU
BO2+mbpU2gLUcUC1lLSgvExS4d5TsLPA/nbIWlFYIlqR1oVHgJEDPIu7ZQb7
ofFwsFnwy4hegmdjYeB7UE9R5sFD+JfJ4UlEfmGtomPDCZOWcqcaH7nVSpCt
cGjAMEmnmqP1ADMxn6pHltSYsmFqMX5tHWZuWZPAI4CZSxI5TQOgr4kLXHa4
60XAXsVLUEe7/NmYN8l75Hg4lMq9llwPiadaVwChkrAAvJi5DDUzJ/a0iTRU
OqANKRr2yLS2BMbrigXx1ZewmbLSMwarBwzju76erAemLAeIBH8rXB6NPRao
Mlka5QYAUdgeSouZy/N6LPsRXwCdCWArmQaw5KBcm75yLUxLCLSscKfE4VYg
kTIAaolKdWVx5cDY1RsK7ByQK3cxTs3E/dcQZ65RRQAGDyeMpGWi8QChViXJ
dtLrHChW1yNECByINoVnakgYkvKfoLOefNEWxc/UXsHRgt2AqB9p92qHMtgB
XmXqgs0E+74l3SNW/dWG3yWJNsa4Gfq+UV3BbZCJ0VUMeFxEmhx2mLPRQdYG
nAkwTpHnK3THdBQ83M7UnqDxUk7wqDZBB8byAtnMcsU4NU8qdpvcOJyQhDiA
9G4pVNM5yaw2aKaAUkzHjYoWnKraTbgRdnN4UzeGHBs/telbP3bT+lFu8OHD
lUjA/ekTPGHUcb99/N13nz6NpmAsspLWQeWuJeaaRig6wSmdt9TREUF71EUA
c1szAwYVJqXALr6G63IYX9C3jHgSkHYL1gxWyNHlQWLVyFF+JdQl/FKkBXHA
QmIOAuQGuIssbNMuRkC7W/KE5KzwEqwJSUCc0XsKdaZs0mySW4yr4pPKCIxS
e+XqsgUGRGQ8gNBEpGobRGqfUZk2iWWaMB2Pd/UyQbGH2jlqS6IhzkTTNGFd
fhmWqNMR2wIiyYGPvERThAUlnnyIFQAjWILUAvFxV5BNelvmoKCBfT5jF6X3
siEmJR2g53R4SKpVVYvlblBnJDkAGxd+AFsd84MxPcm+EDZkBeJBCZbcG0F1
4mQUGid/X0ZBKWA/s7KCf9eImuzYI7OPlCV/OkRcAetxjpojSbCqPFdjnvRe
cm8TPgCDbpAXAMvGYyIlAdlc3cDGJ+V8AluYJFWziXBTNlkRodDrfG+c968L
CMdBdOhpLl2rKhLqPG2Wp4hDOxlZRlkjFvWOXYDFjmoEsZMk1tI8YSFZESe7
Az7N4DWI/qBaeYtPx1Vtn9gULhn0jqwiNErIdrhHFwGqSqaMvf94Ct6uTtDz
Vbe5OC+D7QZKW8EhPKM5HqQziB397MkPnz4BuJBFqBLIfJzX4wE3Zgxfw5So
MMIsbU3usP4uUHEsLWo9gFG3xDyBTQymZgAZAMCBRGp0EbgUPa589IKfyWwW
SXkj3BJM5KzsfVcDn/y5RoF1tyxp5eJNSnENYuT6IydzUbzDoti1BfH6EoyP
mLX+gfVjdlsb73X1RsstigtWlInJFV6y9D0NrD8YflaPGlDo7wD5mzYYS8ik
SFTycZGwKvpChqxZVDy7TwHn6LO9jHabqqTBVT2sTWSdAOAOC1xofIzqIROr
Jw4hBPWbzDfP8mKX3ltE/a6IyrN3bsBTSCwn8haieIllF37Rk6FjksXkkkCL
f0xWy33wiBsJPXh3dkvoUqTMRMmL5t17wUcVzFDFs1/dzeW1epy+/37/OUpj
dNLCOjf9Vwgu3hMmDGFOAvAPsmETQGv0+LFKmRq0TIo+4bBX36G9nZGfyAda
lBEH1mGEeJ8+fU5+hjn5QFBM3dnIUU4xEPIIkX9PSJl8b2YJHIXws2HPlMQX
UZhkNxwnVgm2e3R1eYRo8rKt8FxRogFUDXLWwB8iSAr4Nhx6I3IMEN4DupVA
DElxLzCT9cSOGPTkFPO8JbtBvSXe78Zurtqos9gOWI1smsGR/bv8JEl9u4hC
ktGPjxpiSsSeWGLKeB5NBn4Ohj6cTB6Zj1aefxSPD/9/FD7VXz/C0x+ZyuJJ
XuCXxOceyStH5/YjPf1VYz/isb9y3R953cNw2fjkoz7ooxVLIMa906sLfzr6
4Bfn51187E100N2mguDAhk/5AdrmQfg0/BqD9cXkEQZNHhFYHwFrASKjt4d/
ZUXx49euYbJ9DV+5/T6cD772JP7RFykXEzgQPiFpKIakKPAUlJ176nKhEd6c
v6VDPveHHHwy+IT87onNfDiwD15mC1ATJ27fcTT+jzsn+yec0hkSRO3bW8qF
utv5hB7P8A5wN9SGUUg7FOlogAQ1ktxskXIYJ322dYump2gY5JtJ7M6LHbuL
fPZFifYSsPt3JA0GSJ79xYg2MWJTMARVpQSllQzBc4Cm5jAiDjoEe5G8ukFK
PahEs2WJ0S2U9RL+xlisxlu8bj+ZiEoCotEsk2plZ+jSgmWSAskSEJ2kY1UL
0URSrSPyvkRBDrIgoxCserlq8u/Cww8HuOfDzzLO3cORPYzNKx8g3RWlYSIm
14jfGySGr/lhxrQ3jMRf8/N/DXPEDs/sr+jR8LtW2SmxFPrBf3aPRvZo/1z/
9D8fN97uffPRj/JP8ez//DGs5tHvGaX/9UclQ/wVzvuuYG1Ilfsta/lj/PPo
j4/sFVuEj/7p0R+3/Tz60lo6O9p9MfJC/Aogp55hv5YBuWZ/zxkJqhwx8m3+
XBKH3zoC/VwRwg5yMCBmsZIByxfFH3cwH9ZVO8rW3sTOf2WLCEXMxorZmh/I
M7cOM9llu2ZkWSKp7o9wM1GeDdmevFxKF6RdA3c67Nv04o3k0Qwr77X9qbxC
E445Crl28ibDSHJLNhSFDdCb2aJObXc5IjzWBBLyGqF2f89GLnt21P1TtTmG
EGLmAG/D5IFF4PjeOaR+2CNlG7Kt3UP4XZY/J9iNjPoOo8QUG/s2KdKbckoK
+0wvr69rMVV1RmLtA87W4DGc2jjxcvN7oP+jw3qEhQ52QUnAKGuoFqK6Za2d
faXklkM3ka0bYNb3VqKS6FW6LbO0Nu49Hjfp+UyhGFaH+YFle3OVpR85USJP
+a4AzhyFcBYj+YjCCz1vCprUYFbCAWKA5s6B8n7jJLxpAEoiE9iLQG62tmDL
8S6BxaejWPI2GuTwI1KWDy4zk9QeGMhR4rH3ccaerhGr92k28wDhQGjHaKRk
hRsSfuwMsj9pIsvcnoSowu5P5cmI/Zy1WMPktxNnJQLd7JKq2jkj8ibN2oos
ejjRkffnslHStaPNHbrdxcdFYStM18KtRicX5DmssONGC+kUEgdbfz4OFmfV
kfN5tjQJmbz2Tm1LcWSmnrOKaSuBEHSIJnVdzjhJrCkpNLgpFHZfbFAaLPN6
KGqNOGI28qbsLrD0UTfap+HvFEfGmD+9Iy98+sT4og4G9MENeGWJdIoNniiZ
MYY83QGOq6R6Fzx87LAc8DlHeprxmhZtv62K4NAd8GzgxIHhSSQVEE3NRIqz
LVnBchRmIb7wVSbqeYdt16a84UiLV/qE4cZBvxXH5VxHC0b9EuBvyJtOmY5A
F7RoPF8mUKaMKEYtGQkuwMt4eDFrLSJOj3yDonPqJqJgNDm8oph6BA7vikFV
ldGiihwu+AXq4Pbi+Gfg/sTWp/CLA6mJ1Ww8EMhLXCU51FPAtCyvR1NhfvU2
v/4wBhnNrXrYRaGHE8Yh8yUc+qojRbW7blcwJBsEwIfWWRoiiDi6j2R24k8A
xb2yMgHxMK+oCTl9XjIkFF0m8yb2rcVM1HBKBvvYBsNRkbsNobhpVQxkTT3o
VChGuSX2wwNgGpPUfwC6z4MHItORZaiZaC5PfppcHB79eHI9ubg8fXt5ev1X
DPOL9FfZUGtMO0o2Tnr5EIkkwF0Pp96ZrmveRwsi5sbpa18+VJrCeI5zm+St
I+aFhZTIkUlixqKNhELg7iJgTN+PRYNI7CW80HhmJmsbWJnRJIYDnxGTDGal
RNuddqB/fHJ2SKD3Omy8AeUeIS+bsMRLQBJWv3d2wIgjn5LbwYijs9OTc1zT
0enxyRWuCh0Se6LjyKoi1hOlV3JCTs9T/rA2fg1eAd1cLtH4Z0H117O3h8cD
y0MpJjmRIZWbbHASVOLWJ+gp2tzcR/k0lLGzsZc4lFQg4O8xYWVXV9jjykwH
JN1pI+hDkFzQXqZ2yPae2lewxjrO/6YIj2wF4Ym1VsTaPWAoxgGao+TsC/+u
bTe934R9e2LzlQdB6ADbBw2YlBtQIWXi33c0gEeHF6d8RPDL5OXl4ZuTX99e
/ognAx9YCl4qUOfJDOcgvS3UUpTdSAUu4Gqo0gJH8PrOhw+SUo6rm2BFDei0
JiSV9x7uaz+jkYH93WAmWVgUJY3GZtNFVS5g/VSHcKoJQbXZhY2hP/6qY09V
GCh2wJEwf4AOVQJyUS6p6AkYjGhCDISsMxCROZ7hgsKmGDAt2wpYTAoTvebT
mkuOdnd3UZ5xEoE786n4xA+1poXxALEtx/wnM8QqNKq5KzHikIUZnRN+CePK
rt0eorBu2bC95zdI2QdS84Ows1G9u0/9ZX2ZQ/5k2Ckr55RyG4GUywS66BXv
FzmyyeZEubIEVcc1HKc1KhgBic0MSkMIUTeqr29XrjO7MJ3u/K2mz6Lp0q7g
eBalFIdwzlWUn6rfoXT+RKIeYLEnXCueyrDs5mrTXrk8s8XL018Oj/46OTw+
Pr0+fXt+eEaEV3iDRNTYSsy4mhLMKYAO51eU25JwQ3b86YUoY8KIr05fwSyn
568mh7+8PT0+PD86wSnPyNwnnRQYzC3FcaO0Mw1DPftBQ3UhxZUC1lidE7AV
E2LjfNgthUdUJfwNCGWs69nIA9ICnyk9dEIRr42HZglOg0B5CBZZDfKK0Fpi
giHjuTePALU7xWlB5cNRjZI8Fmc/kBxBRtPXQEipA1lrjyiP+sODdsaqGzvr
r8hiRHjhN5Na/4RnwlecpYL+EjprSoObgcnKB/wOqIgQ1u7unE7ot52RkaeZ
YCmmyKPQ92yGwqI03wrj5g5VeXRwEP1ToobxIpeSQ2wyRzuRDfI5qiiN8KZa
DFu/FhrTkGU0R8uCzIsZit4Zh8HhZZXlXdm+pNB1NLIxmv96wAlyNxXAGrYP
5iDQg6jgvDsPP3jrZ01eB3x6MgXV7jdWE9CL5UGr6bqArYc+oP0LjSVfTc0v
XfCvk6rBqukoV43gqyV6bPxSPjwl+aJ7D9WRNquXEYuK3gkpjqmkAnc1l6nh
tUWL7cETgSbni7Zcj/0BDLlUTGL5M8738opTnJG8bQ3o5sCOJFVUBZe6UVCo
mAdx8gQq3BkiiEOh6DFrZHQHlPCyrrjuYmooFBFZPgd2wIqRx04pD/eAU5GI
7m8wfyK2OoC+x+rZ+lvwbEnqivY2YF/PCgNbCWUSZIVPMJv4oJdLI7PQWzOy
4C32DPBIhBTil6xi09LbZ2knrARBV3ExEgqNOpj/4lIi7gmnqnRSj00oYfMP
e1m/G/lJyIxlzxtpt5hAABb+cUi6EVufFNOQi6NH63qlkZSIwV4apRDCLnaf
SbqUZApzznBvJL9cyugI4xhJCxTZLqAheIw3NV4pi9yOPEOWxe/EIUpS4nn2
elo2MzgcLMr7xOypssIzQbhTCqfiF6V+BH1cd8KbHOOeBTNZ2YjLFiLJxMjB
2X0V9uIoIlTZYkXAnp9StitVlgHdFSEcS37VrTawYPMYaRkHjt03nXQoM+DL
0ZK0Lsu2XKIzzLS5nArrhV3qtwWI3rCjppaj8paUd9RtS59vRTXwuZPosB9K
rToGbkRNMtTPTL/PJel65HcO46TlKqd8X0y9ymkd7O0aWIRRB6PqJZFH8Su5
3tj2XQo9HH5xL/rKPKrPlBRb703g7Gzky2vMOYyjNCx6QEOjWjz0Uil/Q3cF
Z6d1EgL2NlnqlDXa08hXxuoNKTWRC+0Teu/6yWq+KkRT3YUPEMXh+hJJ8gW2
ugDUNJx3UKRxVCUrNK+N02Zr1y1jkX1y/rnhkkpssZXh0FoWjnOhx0nLHlbZ
e07BIqEVsyD23SWaqojz+m2WRUdn+aU8vbC7F479dPgv/LV/MRpL2u9Mu6YA
3PFDIoWxueTC9WNXv2tAnP6SVQ3C/e+SbOz+0u0gY3f/cjna1HoOpfplDwiQ
SEzYWJDanMdHkoHJ0fvrcOFmRhxFvBZo7iUrcqyunCN/UUeo/c/nxCyZD7Vt
QCrQ34DaokrWS8xpbtcpuVPFcYTMjaqDzJxrT9b3oZgQB6aRWIJmxZ7iTK25
NJpKskevs74Npvhi4fhQTI3nQF/6YceyQfoquKWy2i/mP5HXeCDgcgQKCoS9
2FkuVMO5sdIpS7/lYpDAXWjziFaw298y1JhYaB0iNZCjgYgo5qTofrlL2H0k
Zl3QUFR+mkF1QxwjwDQIq1IACVOtfVuwbjHmiB8TQGhqhLQwplnrnjOR5sAG
NoAxFHsnJMN+CikfjvEl/4Pvh2Tarc8Ypk51Nq5dgi107AlugdOPub6xUyOp
bA81elgLc84OMLyqAdMssMjau+c6RPF70Od/Frk/n0bZHQt4BGbmEWjijEtj
ik2GG2HjlIKuKicwObjKataRl9j0A6iATk+ypsd99kFV3mA7gyZUvkNjWnoh
sA61XTUbx4HyumNzugg6eyL4WWdisHSp8b+KQUg8VOzMDkt4WPeYgos9S1/k
DuRBEdQ9D443e9WuKffxw4NBv5wxR5yYgNmEBDyJBGPKCYaGXKrpDX7ZxNqj
ALW5cexf0jprcsGCcLbJonJ8PJp9Q762qwufASEqjpGYaqX1jzpKHWe4C8JR
PVStZfPBtRsiMJ/prjFGHZxKX7SpR1YbX6I+7HCPUuK5Qq4GiLLarxsESy65
xaJLbI3iFTfdldTdosfFwO7Bgkizml4grF4lVFjVfVo/xeeFAHHXWFOBqE4K
OZ1BcEisy7xcoFWptsZalCz8V59DWSxxcuTnI67+SRpPrj57Xjmg0xIkPRRg
nP0dAga+FHOrk1pD1Fe4edbwIJEj3hMGI6oEl4bPLCoS8c6ZqFacSUJxi7xp
XOHgxPsUI0lCMGAUr5k6fH8XfP9hHTw6DCeuSyWNtrSnF7ffWupRcJbcuHxs
cKFv16x4AAiOr44uRoTGwFOkpsUnIJUDk7B2bzT9Nm64gqlArGk2S3TrhrWT
fg3ssZ3F9jBGxDhRrNFXhiIfOoxPplphbzD2/hT3UYzCqxI4xUZsfXBsQT2z
W4Cy5d4vE2wbQqW8dTMST/b10QXVLyGCaKOVH55++kRfBnDSl6eTY+qLJ12H
23Q9kVfleTqP1+V6cnM/gX/8u7uh2vXZ9CkSK9XX7FOJCL1JlSMgjWHXZOzy
cEdvLmA3dY0JjNgkIKQfsAjoxP84G24jngyAjSRACAISLXdCyN2QJ/tSZ22e
VNJ0ISA+rC7E8OqOjatpCyGOHxAtLpnno5K0L9RByTEJGlrGtTlf9HygXdtP
1N6aCbvtBxcl+THyyfZE5O0/vjzk4+9P9f7n8PKWDtpH2oAIuOm/bJ35H1r2
P315nf2faObV/ZaVz6KV/1cs+x+DtmTdEF9DLuQRlkOpO0AOyzK1D57t/Ccv
+x+Ddvlu2wzbZzYht1tUihy7ZoLYoWObDOd3Y7T1pUZbD4S4DL1ZE+V0zjcJ
wWgqyvTtBME4DJ3G8lxyoqNGGBHKYNq4eQC2HodSvRbZybyK1EdsO6SCA2Vo
VM9KRbvi1d7WRVHTiYPU2ttslBP1owNOgUXYN2Gv5A4SmCL4sHA9yB8wMjVX
gVpuuLTj/EXBbDr5prQR6sGHtpC+4weM80/we8yQ9+oGO6XV7U9WDwFRD4VT
n+sl6bAcC9YcHeDJ2sOGSqc5PE3BMa6NRH0itGHh53zoemyxfnMVO3fJJ4xi
TDqzsJ4bJ8eGUmx6QSpOnz//HmuzQ2jbDIW2d+PY9mjcFV663bSkGDfZXUMx
6vGXgtJjVWRC20qWkxkHnQUQXw49y2EMnqJ0UVOTRIaIsW8XFFGXkXbtvSHU
Fmd7ayd8x268o43fQuOwjjbczdcJq9WGVKBGDST1iBtsnlVY0M6OaPZQClz6
4xkdb5t9w8p708/E5rgsYS0feFLX7Wqt3jQfjBEFhYwhr3v4OWOnSmwGbsJ9
bCIQRyp/p4NWlNSnEpC08UNqNxwTRGwGf3iwsW9jOrqZ6EvjTmKMNDFWl5ZY
F6S+mdC7dUANZnUuLqnbaNVJLnaOaTJ3DkZt7fNqcPyY5RttYickPZxsI00v
hBU2nIhQm5DSMC89zUiUp7yZt7XkPG4m3uMWzWauJZpgbJPTYoCr3Saze8q6
31SKqWQDJqixiSDaWwH2okMOnSPnF3SJvpsTNo0zfxUlOm2mOvRjTJz7xt6O
bqQOgZP7cMxmaMFgaIEgzLEJJZrQWqBXPdpLhzYcGU7ETu9wBPaUansajddF
w2m0zrtyOSf5tLAb3arEoSMe0i+NIQlKoecjWn8gzdOWXH+KSKGeCqM/ptOR
ZzdtvY0bVQVx0nnULhbrerjdjgmVPdyBiCDSq0j6TKNZLJcJJUZUXvTZiquB
WinTr5WyW2qlXurOsdPHydH53tmzq9Ai4UncLpFidLO2CimgVC9BaeNA48Sf
bGf7oSehd79omQG2XagoEyNvmfXG/YTm5AcAKCeFQ5E9cMxojc67YVfRDZHD
iczqJlojRyDkkdymfg2Mb2/TyYgRB5IWMCILEgSqqD04ozN5kDuVE6GJqrga
47XKUZsoumq3lID1uhz9x0q/pL1+OrQIqv0y22q/7NfWfnGHbaWoKB3bw36j
PVJoEN7Va4jvag+PiT7NNZ/EZBDfmOvedyrXxX+Q+cKpgf6fU2yiiBwd9QbP
3EfK7ySJNVK9acoYd7fkXeLJiP+Cs8Hj1NTKp7RwStCW7lrotsC+Uxx+9oug
WgnRTXQVxP4wCVrbqPq0m5DB4bPaOXsnDIhEm95mdVndU01M6HjZx/s1X/9E
U2MjLLBLMBbfcCOgOw+ckBIUg4fax04t9bQx3R6ragoxp0CVMMRvVNgjr8uK
lsQTKHn+L/q+ciFrGLc+iDJTaokpNz2QthdWF7jKuiRbBXvaiRFUB3SkBsUq
DT1tKL0QjSjku33MpeLFI1ZwjIpUkm6CjK2dJgNxa0GzRUntFivXXdbETEBE
rfkyZSEnn3OPGi0QIwhjKjHgUT0r18hyL9SIEnsWRtu4E0dasUW0iBuQUl+M
iQD3Xvkd1xqW9b29SNAGsYBTdC4T+vQJ8/99J0aSes9feV3adlhJjSxKPP27
qZO0R/P81WiIBP2aayqnqymAHGVWc3NLstxbsFOMmojsj9fGVJQzXjdlybnC
ZUHLtjWlgoc4xq/Z5GWGxsHx26Or0yvfI2jM9XzzthDTjqx+IkNKI8Ei09CZ
OuReU3aZbXz9B8DEA0nh2YOO3iORGqlgxXcU9JwkEyDC6cc32PeeW+xSpqQI
dupoxOujjuKlBsI8xVNDauG8mL6Klr5PMSI6+yrujXrxg412uFg410dq7hzc
jcvcd87TqzZNXGHE/TSpBaxT88A3lPJVrBs97wfuMPB1oFPtfKJZCbUW3BK/
6QRQx2JoomeA1SEl+C/X2HVVF3JILvA5miCqA2wohfguqTSzVPeJUe1Ey050
tfFSY/HNAfGvkWRRmLUy0Tr+Q3LNhCbMMbM1BOJuQ9fO2jjHVnsIR5F6qici
RqFpA5Q70Rl+vFF9IHvlfdbGL1uKoH2XwbjcEWhmVlGN4jJOwpWma7ox3s4g
9gIkIvD5gKAMiPpVeHRu9ASngwWjnzFdN7pNB4N104yOWssjaV7H1fjHpPt9
eEA64CfxG3UKhDk7cCC1tFMoKYXL2OKam/wtuX+pHDVSZN29sKXm1nbUIDdk
IXIqvvJMbjkdG7Ickt4YIbFoIy3ozg84AExPJF9Iu0DacyndkaRtjAcWzaFT
0Ml/41amrJohF4gUsg3NntWQ2KzxQyeGHKOo0K/wAj+p1EjufVNeMSVQpHa6
I5MbgF4NJdJe21C+fXZiL16/UF/qt/v7Uj9OjgVu0BQxKK+RqExHp+C40xw9
ZiFNXxPVxJWvqSE+ZI5rNkPu91uVm220azb51O/TuM2mxj3ImTYKhj9DegPk
89XUN1xtht6iTUkKJles4Wt0oeauO9K/FPY3Y2kMn4EKW+85+sdXh8v9FQgH
jZiw1xuoUdz8HZGULDCbvdGu6mOtNhG9gfYtSZLeAKlKzISUy7DAluDQiXzs
i03E/y1ddlzKFx4gXKl9JAvtGd4BF9p54kbPqOPzyXyOx4Us97jE7Cn7Qu++
2UViOH4x0paV3367T+aH7XUYMECJmr4iVY7uPYYs/C06mbTEv59wkjFf+7LO
y3u69k6VNbGGUReiVqzcjn7tj5OrRPDayqhU6Mbdl5J9RLo6y5KORcHpz6Jv
R/czbbsHg20+ibv0vPrc6L3vmS9Tub6AbSPTkQze7N7ATjXCjXnjhQFbH7dt
jlaDOO58XZFe60d1SFo+PZQytVs7RBzpodO/7o6SoK7JaT9rRc7RHaJCx4Zl
htb97UV0raq+XiiBILd9kP+BObjhC7coFoaJZ8iQ6RahyElEmUfvuWl3VMtL
cCGzq38H0PXZ1dheXV5f8ElQ1kdJDafIexRfX7NL7WPXaPgWi5GRHidfgu3u
Jrwm+xxWiTWTEItC92DGlmxvLF8EnTVc6hs87FRvRh772F3vurw4VtnRJGk4
67lT5sGCy2ilDWMmw8ZHO4Jzw9dtBqtTAwdlseejBuyKHIqEkLvPdybH0hni
+0ssa0FXCFkV8W0jyjAlAEg8DsMX7CBjCMSb9obakltyheWhCh2tkGDRsnAg
Ix3ovGQxtUYfYsVdcBGRuG02X3EkQUNMkTJk6Kl4oBxMypKkhJ1485xgxbXs
0oRdP0St1/SaBUdVKgIEvhgtvw9vxXqVhp2LGtCYo9Gbyd6Afv5WT7ypgcWH
OEJ9oHFd0sfe60zJuuUK+4lrkj8CxHByH+h/bRFhCZ2RtAnKijk7e7iGpBut
5qTvOAdZrFpfYmi5Bt07bmZViwV7kbM3sdJF2N+pMfiuXgoT4YFmm0peuO4p
ShH7bvpMU8S+/eG7p0K9w7XnPulroEicswojfcWwx0+vZMT8uo4nlLsno2sw
9oh2W4tE8XNWGUJm3tj0arTH0hJuFu5B6ug952Ux6WV2oNuFkzo6kTENd0i9
pL90to5bhuXYVN1fyoYxUfR1p9yshoheYr2RCzCk9Xt5L1IkTiEf6AxGO+tc
cY0Cnvm3UwkicumrxA7VadnTw/PDTVGbAU8GkAC8uBHRlUq+TZXRzUhlRKOt
Lx5V7e32LOvGcKOw6XUvN4QvHovSNzhbY9zrNBCyOTi9Q6vdg7juqrTM7Mkr
LFUE/XAy3S023S6/bvpSETSacCws2ajpL1CANmlgTRZrdal7Pg6Dtzq0a+xK
70DHbfEiVzbNNb5Enbhg5PugIdkruiJQ7umQxaB9P4vyeLUuGBMwxNk3eONm
fs9JP74gt9PrCbNY1ffMmZaYrMWtYtRoklwYP7bnpHydH0J+5jB7i8wt9Rcp
GnPdHKZLcQgcBFwuCUxYDs/93yrpaOa0jcgK9RoOFZPl7BNABTjJTVtHM4db
+bBZG9MYxwVF0Zzo2vpo8llkpctGqdMlMRZRGA5DOzZgLaGtGnCXYNuEZypH
srcQ4Rc1LCol1qsJY9E9uyHpppJOlOTqEN9yfNWbOIN3fRDF/FRejUiaIBz4
OBjM/tazKGAQFjrdsn69krFuAKTc0YCtJQ0+421gUf6b2ZLfEpt+/UaElO1d
dwIMm6zMRo2uBW+4WenmoilMQ0ddN522rHqlgarOUmJVsfNvGrrLIoSJDKLu
suQ5ZY8wNtmWm697U4MdK54R0sXLqz05oW15LcqINoTBwGPSuxD1RORTgEeN
3AghzqwOcY8pksMti/hI5OqUKxUxub+oTaFsPHXLekOLRu5q4fui1FSnVW80
t+71p456DW92rtYe/4/kv3EO7Mfe89Lj//AJdmc+3MdHO09/RGCP7QVDW3v8
P6KxHw2Ozb3oZezuGrlJ9Ud5mP+j9N/9NPrHfqyr28nh/seNlwN68Ke3Ay93
2mP7l6ebabuPJtONl632j/4oYyns6Pgm7/etviv5zVGaM8/4yI/eefHJZ16M
ennzz8PNxU4mD4cWG7W7DmfymV97r27Hsc+96iGsOf2TJ7b387nX+XSf+Kzp
gZ+vmn1z8V3M+sy++yDr4xX93G55Va9eGECpDmoNvPrRAtkFpIrw46mN3x5A
D511EDciHPlqjPDL+n2Mxp/5/sZQ0u15sF25lwPxtQtNTw5JeoKK5Jo7r1La
+WcEyo4i4Q4NoH/u7/iGQtJ5zAyIe7kaBkV9sDZUJyeJoBcuGvVQj+kGU2rt
taEafE4tiNaJsfwdYQyyauEvOyyMs6YeEsccSol2GA30dAdw7ptvhsRfVzL5
DHZVtwfv+pVEt005aVTmx9Ef1YkYCgQ33d/e+/09WJzK0FitWU2/+QY1wpP3
Pm9yWw/X9xPp4vqJje03J8enh2BNT65OLg4vD6+p6Ro3exJFPy5y9j4P3Ixv
+eRbO3aqqFlNk9QKehubCwKs1HPJt6thI4JOb8hCCqgochXGkyQfSVfBe0fi
oEm/Ef1u7HYit+aokwOFPfKHUgZg1UZ6KtZt1ugNkZxJHjIpgs9lwD1p0LO7
3V1BlmNI7J/a03nfAWF88L+/yE5hZsAwF2DWHaYb4IWdfK5A/vf2TmXc+fHk
r1Sdh4jz/61Rmfbd/V9M+m+JSV9uWXx+co3lnZPr15dvf371+uLna2JE8bVn
ndrY4F0PVb2+2zX5Rhu6GxMrp9k8GEd5ferLIOTR13Qll2cX2v83SmPLNaFS
gJRSeFGjqpfUElrqgXwv905ry8nJXy7eXv18eTJ5eXh6eX5ydcWtmRMOm7nQ
R1K2OdDMtBMnXkqdvlEfAl6eTlf+sfvbu2XV5QzH8faKGqX2gH51cvLj1YRO
8vjtr+e4Lun/4L08n2vOFVvS3osPR28q123FotoC9XckXw15IucUwopT532B
lyASCpOsuC1zGIu7W7HDBs644NynAcPX9CMwiu16DSDmuI20cuLt+fXp+c/S
q/w1dtlC/YGy8zBbh++mxCZ5/qoCDdzKQUgGKE6mVCfFJpxEzZa6ss6fz65P
L85OJi/eXl+fnZyfHP1I6BBa/8qoUi9v36jHIFwp4xvG+hgnXqHiGdNq4I2Y
Bqha3XgfTOgSEbXyD4UNvp8gEkI0oukUU8jzWl/YVYgoJLLkXu90h0ve60ZG
tHL09uLkGETL9eHx4fVhh0TChffa8EYdM4m2uumUA3Fs5x1ltEiuObEFiilL
MxZPRaEzgYK1736l/r7i7Rzu6K1tBPvdMJ5Ld4FIbyYREU0goiLnmkDgWpKS
GDdsUI0vRJ7Yf6Jc5vwVINTR68Pz85OzTQ5G+0QvpV+W9i6m/s9SuuQTi4nd
4lWWEh+Rm7vZkY1lGwIHSXBGegbJgmvS3FBZF6AVnOrh2clBH67BUODmrhth
mkSpDdVzICvfOoaifJjCE2VMc0mNJMC4OjrZd27dGHICUwisXSEdO+TWBakQ
wEfKBTXDn3a06J9rN6GmuYPtcvWx/+2TO9Anl1u/kRnxu3vFSq4Pnp75SvvD
bPQN2rBruK/af4NOutvWqnq0dL+v0VcMr79l8RjXf7MOuQsAhWdGUrO1UyDt
5Due4sNV5cxejLIwDEdj30qgg+jOweC25roJ0DzfdQS1+Yyg1vQ4zgqUFrST
CfUrAwoZvIVQlAG822xTZ9HyXYpLuzzHeH+45pmZQ8VyJL+Xi5Cp9SKJ6bB1
6YeCt1zxRUuokWrLIFibL3BeuxLn92maMJAbW3KqUJNB3NIIo2PebE889vCk
Cj7gWJj/JCM1XMZF/+VvsPNtp7mWv/qLr7b/rFIjZvVXqzbiycOkvJ6qL53w
AXVJiLUUuF3nCd5lkgKGUoBX5FlcIh8uKiqLgZm5TZrG/kk2y4Ywj7tZYoRR
8Mhj3GiIKLbopkwd6qAMt4//H/8ZqeJnqopf6Go/PCiqfP3pP+fGcmk4rL3t
OrVDXXW4qV0+54BiuMed7i3z1oLUcPZyFDH8ldfl2JOYlnen28NM6nQBDQ6T
eVHm4VQTmipYJSJS/EHKW1FTBP+d8Q2ZJN0yyvdksACidi4hGfC2UbTtfs3x
He7gBZrIWnJdUTUWlXMdlf0PXonjl9xfVnT3V5SDiOnXyCEQ23yfYZPY4+Py
SoLjUTZaDw3rLh4Gw5R70KGZ2Ot2ai0IvYvoyi7sjKQdI0C3R77ZEXSq3HMb
OHgLO9IBHEP2ZicLxF+4B4NMom8w5ZMlFaaQwBBLaXqhPcPQDif8ZXHE4dLD
F5dTe1SqvSZV6ZVDHsC9mbTULFoCpab07pTnjif+HnnR7eH9qJbdg0RvoFy6
fE0tqVaqzHdSrPDig2ALbZTYsu4ulftqi5ONQKqpsRwM1hvPo1tNQra51L10
qJUUUNLbYAhv4/OlFQNtm8ddXwClbN8XoAoSpsMQcq0leqHD9uL7Laf2x4IL
UweGx5MEMNXdWfxFdpGUQwbB3aXhSPOyTTmLF1fQr71NWmziQXWNvp3wYEdq
eBkUpg43BVsMwLrEq+9wN39ryyYhOaAiOhSS4x0nluL0oP3Sfc0zwE02oHpN
t6nXaejDNZaMRTxEMSOXZVm7qEwcxqPYt+8DzWZ5VuA3Ce4BLzKx9i5pZkuv
l4vecOcqvisR2QK6TGIziSBEqld3CTeaRKYpXvJ5l+k9rDt1m6TemI5JseXK
FVT4ItcO3wkkPV8/PEByz6KPunljsi1uj8xSimwdf5MAHVPHuELfZJIC9ZHC
saC0eWqS7vPK41orbmvHVV5l8ZCnMpoxwYd1z0WgVE/Jhlt3do4ARRmqsBjT
82iNKcyvhrvezUTO2laMqe6VEkadjDN0zzm+uRDfx3vr+z0NvDtEs1oQCNh3
vC0K7pIEmBKavtuji5OxsDs0NDUNSB9PGKe6CXTX+rIuSO6Qo+APF7+QmZnx
7TSuQJpLh7SfbS5DVn8uvbH9slOIeYQlBCEpjJi7xxJsyBJ//YmaFIQkCu1B
GF+RRF6VbjqdOiES34SmiFS52I6go+OG6V4v2tKjymgrKxYlWgJVl+slro8N
qbmjSnB2BfFW7kPA00ixjNz82buWye8lFN+K7SYdI+U+JqkrCLQCAD8D3L3L
ajdQwKgL5Ub1LEiHXCF/MN5jESILmd78BXN8c8g5QJ1+TRPtqUX59ZNQMOuH
iA/NhHsdp9/Y3U2X0KiHZ3bzESoDIQ2+IrykNi8srY58gTtiUqh250ShOUKC
qtSo4zB7T6mSHtVZingQzlDy3Qq+rM0cbx+mTDwtC5NIqISrwUyrKd8VyKjy
DYn92GP2WURuHs1v5loznxibdl+EL4xWKsPne9ifhNrSr7t4HhUA6oLoIpGS
uOUQzQYXsnQHVo7zInKXYiUogoQKUnL0zjSOfPl3wS8X3KtjqZZDzBUQg4w3
gIHUxQv9KqPYG3vgHbleDS9SG/l4g2/X31QZm4yU/zeiSjbBxq63F4ZN+DrB
yEkcTkAN0q/2CQ96QwZc4712y1fk94065JEjGMVir2DIs+HYxfk50aT2jjpI
brIG1bRRp/uWVxfr6JJwlF2UEI4Oj6YMahrPglGwjqzTACv/xsoQ15HRREbc
bl2TKxHdoKByaHYmUy9736gl7lTgj3hJ7orbrM5Uc/bXsKknfsCYJFCYrKCY
4R68QL9EGk6cQWjizrHluk7uFpMG8HwSBpzMsmoGPINT/V+Txs4L8SeyoSbI
lKBwunmC1rPcdb192eO4e4V0YMA68+51MVIvio16mqhKZXviOnlCJQMRWEa7
VnPM9C849h65gZAUKxSv2oQafQPgXmSNIRV799WLS26E5ZcumTC1vw18UFHo
xkuEZ0fd5j88iHuX+P7DbPKrL6xoV0jJGMumSdmH7qMdUpLKvIR7Xu2JqskO
ejJ7xQMf6Zm75IweUd8e47tliU+fbqZmA9C3usIBUBoXTgsMsBUM9lrC1nxU
Q8YEQWS4ZdFe6AzBy0cjyNV/OHsH5he8tOCI4YcDHtSlf9yZg2Xrdj6Jlunx
gGLaK1dxnz3B+uruppJ+yV44T0DWTcg18OmTkXoBfPZdkq3XgLvUYSKXt0jQ
TJZpNVEwcQ7uFHW99D6Ys+TreM8ZzIATicSwuyUWvW0xH/6902O45i9gDgCI
j519Wd77rGkuR6oDjVTJvNHLu5QlkJDgyu3QOjW+/637tm/w+ab8ST5CE8FX
ubMkDoU1cj+vrATUsyUDIine2TfIRV6DpErH5sqBldtkgFNvSkft3XEd1wCP
166Ck27kajFadiYtR0MUMXN5ihnUVbLwpWlcRSbeuqjskpPd+ktDzRYvQmuc
4RuC6DDeJBUmj53mIJNovDfJooAPfsWUhSpvC3/TmAYfkjRFxcNomxIQ6CJ8
6P1j2OFx1fIdz75eLqH0/rIIyzTS5EHXL1dcfOb6V1bPtEnd1Fy2cBSgktlX
LrsBNWGxoDQLFo/eqUl44sv/N+J7etNanylwoM++c24tHR3nUT9XVfIwFoRw
PgXRvgIA/rmEc69rqtySBelRopYJ/6GI9y7bBmfPrjRIyDf7ArrhqmZUCUOm
il+WuM3karobNHzQJSNec421k0jSflJw+oCEtI3XCcx6tcy8UYsdityd5Geu
pLZLCy02Gy3CojvjnbVAL29AcwXLBvXxCo6/HmM/ahDAPyZLUCs2EOsacP+3
zP45S0K3kqwaWsnU/D8r3fGX+rYAAA==

-->

</rfc>
