<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-nmop-simap-concept-10" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="SIMAP Concept &amp; Needs">SIMAP: Concept, Requirements, and Use Cases</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-simap-concept-10"/>
    <author fullname="Olga Havel">
      <organization>Huawei</organization>
      <address>
        <email>olga.havel@huawei.com</email>
      </address>
    </author>
    <author fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="31"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>Service &amp; Infrastructure Maps</keyword>
    <keyword>Service emulation</keyword>
    <keyword>Automation</keyword>
    <keyword>Network Automation</keyword>
    <keyword>Orchestration</keyword>
    <keyword>Service delivery</keyword>
    <keyword>Service provisioning</keyword>
    <keyword>Service flexibility</keyword>
    <keyword>Service simplification</keyword>
    <keyword>Network Service</keyword>
    <keyword>Digital Map</keyword>
    <keyword>Emulation</keyword>
    <keyword>Simulation</keyword>
    <keyword>Topology</keyword>
    <keyword>Multi-layer</keyword>
    <abstract>
      <?line 64?>

<t>This document defines the concept of Service &amp; Infrastructure Maps (SIMAP) and identifies a set of SIMAP
requirements and use cases. The SIMAP was previously known as Digital Map. SIMAP evolves the earlier 'Digital Map'
concept by making explicit the ties between service and infrastructure layers, clarifying expected
outcomes for operations and automation, and addressing ambiguity associated with the term 'digital.'</t>
      <t>The document intends to be used as a reference for the assessment of the various topology modules to meet
SIMAP requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Management Operations Working Group mailing list (nmop@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-wg-nmop/draft-ietf-nmop-digital-map-concept"/>.</t>
    </note>
  </front>
  <middle>
    <?line 74?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines the concept of Service &amp; Infrastructure Maps (SIMAP) and outlines
associated requirements and use cases.</t>
      <t>SIMAP is a data model that provides a topological view of the operator's networks and services,
including how it is connected to other models (e.g., inventory) and external data sources (e.g., observability data, and
operational knowledge). This model represents a multi-layered topology
and offers mechanisms to navigate amongst layers and correlate between them.
This includes layers from physical topology to service topology.
This model is applicable to multiple domains (access, core, data center, etc.) and
technologies (Optical, IP, etc.).</t>
      <t>Specifically, the SIMAP modelling defines the core topological entities at each layer,
core topological properties, and topological relationships (both inside each layer
and between the layers), to ensure a multi-layered topology can be reconstructed, validated and queried in an
unambiguous and interoperable manner.
The core topological entities are the minimal set of objects required to represent a layer's topology (e.g., network, node, termination point, and link).
The core topological properties are the essential attributes associated with these entities (e.g., identity, topology type, entity
role in topology,   directionality, cardinality, and cost/weight), enabling analysis of how the network structure affects services
and operations. For example, topological reasoning can answer questions such as: 'If link X fails, what services are impacted?' or
'What is the full end-to-end data path of the service flow?'.</t>
      <t>The additional concepts or attributes (such as capacity, operational state, performance metrics, or inventory data) are modelled outside of SIMAP,
the core set provides the necessary structure to support these extensions without losing architectural consistency.</t>
      <t>The SIMAP modelling also defines how to access other external models
from a topology. SIMAP is a topological model that is linked to other functional
models and connects them all: configuration, maintenance, assurance (KPIs, status, health, and symptoms),
Traffic-Engineering (TE), different behaviors and actions, simulation, emulation, mathematical abstractions,
AI algorithms, etc. These other models exist outside of the SIMAP and are not defined during SIMAP modelling.</t>
      <t>The SIMAP data consists of instances of network and service topologies at different layers.
There may be a separate topology instance for each layer in a multi‑layered network,
or a single topology instance that encompasses multiple layers.
Since SIMAP is a data model and data models can generate APIs <xref target="RFC3444"/><xref target="RFC7950"/>,
the SIMAP provides access to this data via standard APIs for both read and write access, typically
from a controller, with query capabilities and links to other data models (e.g., Service Assurance for
Intent-based Networking (SAIN) <xref target="RFC9417"/>, Service Attachment Points (SAPs) <xref target="RFC9408"/>,
Inventory <xref target="I-D.ietf-ivy-network-inventory-yang"/>, and potentially linking to non-YANG models).</t>
      <t>The SIMAP also provides write operations with the same set of APIs, not to change a topology layer on the fly
as a northbound interface from the controller, but for both online and offline simulations,
before applying the changes to the network via the normal controller operations.</t>
      <t>Both real network, online simulation, and offline simulation APIs can be built on the same data model.
The real network API reflects actual changes in the topology as reported by the SIMAP server.
Online simulation applies hypothetical changes to the current live model to assess immediate impacts
(e.g., if link X fails, what services are disrupted), without altering the real network.
Offline simulation applies hypothetical changes to a saved or alternate model,
useful for planning, training, or evaluating changes before deployment.
Each data source is reported as a distinct topology instance, but when desired the real network and
online simulation data can be merged into a single topology instance, while the offline simulation
remains separate. The simulated topology instance can be matched directly to the corresponding
real network topology for comparison. This approach preserves independence between real and
simulated data while enabling side by side analysis.</t>
      <t>This document does not specify a SIMAP implementation approach and what modelling language to use.
Also, how implementations are connected to SIMAP is implementation- and deployment- specific.</t>
      <t>While the requirements described herein may require various modeling
strategies, the development of such models is outside the scope of this document.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>
      <t>This document makes use of the following terms:</t>
      <dl>
        <dt>Topology:</dt>
        <dd>
          <t>Topology refers to the network and service topology.
A network topology defines how physical or logical nodes, links and
termination points are related and arranged. A Service topology defines how
service components (e.g., VPN instances, customer interfaces, and
customer links) between customer sites are interrelated and
arranged.</t>
        </dd>
        <dt/>
        <dd>
          <t>There are several types of topologies: point-to-point,
bus, ring, star, tree, mesh, hybrid, and daisy chain.</t>
        </dd>
        <dt/>
        <dd>
          <t>Topologies may be unidirectional (all links unidirectional) or bidirectional (all links bidirectional), or contain combination of unidirectional and bidirectional links.</t>
        </dd>
        <dt>Multi-layered topology:</dt>
        <dd>
          <t>A multi-layered topology models relationships between different topology layers,
where each layer represents a connectivity aspect of the network
and services that needs to be configured, controlled and monitored.
Each topology layer has a separate lifecycle.</t>
        </dd>
        <dt/>
        <dd>
          <t><xref target="RFC8345"/> also refers to this multi-layered topology as topology hierarchy (stack). It
also uses layers when describing supporting relations (represent layered network topologies),
underlay/overlay, network nodes and layering information. <xref target="RFC8345"/> states that the model can be
used for representation of layered network topologies.</t>
        </dd>
        <dt/>
        <dd>
          <t><xref target="RFC8345"/> is flexible and can support both the same network topology instance with multiple layers (e.g., Layer 2 and Layer 3)
or separate network topology instances with supporting relations between them (e.g., separate Layer 2 and Layer 3).
Therefore, multiple topology layers can be grouped into the same network topology instance, if solution requires.</t>
        </dd>
        <dt>Topology layer:</dt>
        <dd>
          <t>A topology layer represents Topology at a single layer in the multi-layered topology.</t>
        </dd>
        <dt/>
        <dd>
          <t>The topology layer can also represent what needs to be managed by a
specific user or client application, for example the IGP layer can be of interest to the operator
troubleshooting or optimizing the routing, while the optical layer may be
of interest to the user managing the optical network.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers may relate closely to OSI layers, like Layer 1 topology
for physical topology, Layer 2 for link topology and Layer 3 for IPv4 and
IPv6 topologies.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some topology layers represent the network topology of Layer 3 control protocols, like OSPF, IS-IS, or BGP.</t>
        </dd>
        <dt/>
        <dd>
          <t>The service layer represents the Service view of the connectivity, that can differ for
different types of Services and for different providers/solutions.</t>
        </dd>
        <dt/>
        <dd>
          <t>The application/flow layer represents the view of Service data flows for
different classes of service - video, voice and data traffic.
The layers may differ depending on the solution, so the bottom and
top layers may not be the same across all solutions. We can illustrate
the concept of topology layers by listing the common set - e.g.,
</t>
          <ul spacing="normal">
            <li>
              <t>physical: L1, one or multiple layers, if fully modelling different optical layers. Used for WSON, OTN optical, OTN digital),</t>
            </li>
            <li>
              <t>data link: L2 for Ethernet, LAGs and VLAN,</t>
            </li>
            <li>
              <t>network: L3 for IPv4 and IPv6,</t>
            </li>
            <li>
              <t>IGP/EGP: for routing inside or between ASs, different layers for underlay and overlay, for ISIS, OSPF, iBGP. eBGP,</t>
            </li>
            <li>
              <t>tunnel: for transport tunnels and paths, for MPLS and SRv6,</t>
            </li>
            <li>
              <t>service: for different overlay services, like L2 VPNs, L3 VPNs, slices, SD-WAN,</t>
            </li>
            <li>
              <t>application: for video, voice and data traffic flows.</t>
            </li>
          </ul>
          <t>However, this list is illustrative only; it is not a prescriptive requirement.
Different solutions may adopt alternative layering schemes or combine layers
differently. Therefore, we will present the above as an example of one possible
solution, while keeping the definition flexible enough to accommodate flexible layering.</t>
        </dd>
        <dt>Service:</dt>
        <dd>
          <t>A service represents network connectivity service provided over a network that enables devices, systems, or networks to
communicate and exchange data with each other. It provides the underlying infrastructure and mechanisms
necessary for establishing, maintaining, and managing connections between different endpoints.
The example services are: L2VPN, L3VPN, EVPN, VPLS, VPWS,</t>
        </dd>
        <dt>Resource:</dt>
        <dd>
          <t>Defined in <xref target="I-D.ietf-nmop-terminology"/></t>
        </dd>
        <dt>Termination Point:</dt>
        <dd>
          <t>Defined in <xref target="RFC8345"/>, as follows:</t>
        </dd>
        <dt/>
        <dd>
          <t>The network-topology module defines a topology graph and components from which it is
composed: nodes, edges, and termination points.  Nodes (from the "ietf-network" module) represent
graph vertices and links represent graph edges.  Nodes also contain termination points that anchor the
links.</t>
        </dd>
        <dt/>
        <dd>
          <t>A node has a list of termination points that are used to terminate links. An example of a termination point might
be a physical or logical port or, more generally, an interface.
Like a node, a termination point can in turn be supported by an underlying termination point, contained in the
supporting node of the underlay network.</t>
        </dd>
      </dl>
      <t>The document defines the following terms:</t>
      <dl>
        <dt>Service &amp; Infrastructure Maps (SIMAP):</dt>
        <dd>
          <t>SIMAP is a data model that provides a topological view of the operator's networks and services, including how it is
connected to other models (e.g., inventory) and external data sources (e.g., observability data, and operational knowledge).
It specifically provides an approach to model multi-layered topology and an appropriate mechanism to navigate
amongst layers and correlate between them. This includes layers from physical topology to service topology.
This model is applicable to multiple domains (access, core, data centers, etc.) and technologies (Optical, IP, etc.)</t>
        </dd>
        <dt/>
        <dd>
          <t>Therefore, SIMAP defines the core topological entities, their role in the network, core topological
properties, and relationships both inside each layer and between the layers.
It is a basic topological model with references/pointers to other models and connects them all:
configuration, maintenance, assurance (KPIs, status, health, symptoms, etc.), traffic engineering,
different behaviors, simulation, emulation, mathematical abstractions, AI algorithms, etc.</t>
        </dd>
        <dt>SIMAP modelling:</dt>
        <dd>
          <t>SIMAP modelling is the set of principles, guidelines, and conventions to model the SIMAP. They cover the
network types (layers and sublayers), entity types, entity roles
(network, node, termination point, or link), entity properties,
relationship types between entities and relationships to other entities.</t>
        </dd>
        <dt>SIMAP data:</dt>
        <dd>
          <t>SIMAP data consists of instances of network and Service topologies at
 different layers.  This includes instances of networks, nodes,
 links and termination points, topological relationships between
 nodes, links and termination points inside a network,
 relationships between instances belonging to different networks,
 links to other non-topological data for the instances (e.g., inventory,
 configuration, health, symptoms).</t>
        </dd>
        <dt/>
        <dd>
          <t>The SIMAP data can be historical, real-time, or future data for 'what-if' scenarios.</t>
        </dd>
        <dt>SIMAP API:</dt>
        <dd>
          <t>SIMAP API is the set of interfaces that allow the client applications to create, read, update, and delete data that comforms to the SIMAP.</t>
        </dd>
        <dt>SIMAP client application:</dt>
        <dd>
          <t>Consumer of the SIMAP API. An application that consumes the SIMAP API.
It sends requests to a SIMAP server, receives responses, and uses the returned data to drive its own logic.
Typical clients include network management systems, orchestration tools, monitoring dashboards, capacity management applications,
or any software that needs to read or modify the topology information defined by the SIMAP.
The client is responsible for forming valid API calls, handling authentication/authorization, parsing responses,
and translating the SIMAP into its own internal representation.</t>
        </dd>
        <dt>SIMAP server:</dt>
        <dd>
          <t>Provider of the SIMAP API. An application or a system that implements the API endpoints to expose the SIMAP data model to external consumers,
building it from live network state or simulation scenarios. The server accepts requests to create, read, update, delete, or query instances of the SIMAP topology,
validates input against the data model schema, persists changes (if any), and returns responses that conform to the SIMAP API specification.
The server's implementation may reside inside a controller, orchestrator, device, service manager, or any other application/system-or
be a standalone application/system-depending on the solution architecture.
The server may offer ancillary services such as authentication, rate limiting, versioning, logging, and monitoring,
but its primary role is to expose the SIMAP via programmable interface.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sample-simap-use-cases">
      <name>Sample SIMAP Use Cases</name>
      <t>The following subsections provide a non-exhaustive list of SIMAP use cases, with a focus on the related SIMAP client application requirements
and its interactions with SIMAP server, in order to extract the SIMAP-related requirements (Section 4).</t>
      <section anchor="common-enablers-for-simap">
        <name>Common Enablers for SIMAP</name>
        <t>This section identifies a set of enablers that are invoked when providing the various business-oriented SIMAP use cases.
These enablers are grouped here to avoid duplication.</t>
        <section anchor="service-resource">
          <name>Service -&gt; Resource</name>
          <t>The SIMAP APIs can be invoked to retrieve all Services for selected service types.
A SIMAP client application that triggers such a request will be able to retrieve the topology for selected Services
via the SIMAP APIs and, from the response, it will be able to navigate top-down to the lower layers via the
supporting relationship provided by the SIMAP server.  In doing so,
the SIMAP client application will be able to determine what logical resources are
used by a Service.  The supporting relations to the lowest layer, provided by the SIMAP server, will
help the SIMAP client application to determine what physical resources are used by
the Service. This addresses a requirement for systems to be able to provide topology and resource views of services,
at different levels of abstraction, using the SIMAP [REF: ETSI ZSM 019 Clause 6].
Knowing the physical resources a service uses enables capacity planning, fault isolation, performance monitoring, and accurate billing.</t>
        </section>
        <section anchor="resource-service">
          <name>Resource -&gt; Service</name>
          <t>A SIMAP client application can navigate from the physical, Layer 2, or Layer 3 topology to the Services that rely upon specific
resources. For example, the application will be able to select the resources and by navigating the supporting
relationship bottom-up come to the Service and its nodes, termination points and links.</t>
          <t>This APIs can be invoked for Service impact analysis, for example.</t>
        </section>
        <section anchor="traffic-engineering-te">
          <name>Traffic Engineering (TE)</name>
          <t>Traffic Engineering (TE) <xref target="RFC9522"/> is a network optimization technique designed to enhance network performance
and resource utilization by intelligently controlling the flow of data, for example by enabling dynamic path
selection based on constraints such as bandwidth availability, latency, and link costs. Its primary goals are to
prevent network congestion, balance traffic loads, and ensure efficient use of bandwidth while meeting performance
requirements.</t>
          <t>The use cases for capacity planning, simulation, network simulation and network emulation, closed loop, and potentially
others, should consider TE if configured in the network.</t>
        </section>
        <section anchor="closed-loop">
          <name>Closed Loop</name>
          <t>A network closed loop refers to an automated and intelligent system where network operations are continuously
monitored, analyzed, and optimized in real time through feedback mechanisms. This self-adjusting cycle ensures
that the network dynamically adapts to changes, resolves issues proactively, and maintains optimal performance
without manual intervention.</t>
          <t>Key Characteristics of a network closed loop:</t>
          <ul spacing="normal">
            <li>
              <t>Real-time monitoring: Collects data from network devices, traffic flows, and applications to build
a comprehensive view of network health and performance.</t>
            </li>
            <li>
              <t>Automated analysis: Identify anomalies, predict potential failures, or detect security threats,
for example leveraging AI and machine learning.</t>
            </li>
            <li>
              <t>Proactive action: Automatically triggers corrective measures, such as reconfiguring devices, isolating
compromised endpoints, or rerouting traffic.</t>
            </li>
            <li>
              <t>Continuous optimization: Uses feedback from previous cycles to refine network policies and improve future responses.</t>
            </li>
          </ul>
          <t>The SIMAP client application will be able to retrieve a topology layer and any network/node/termination point/link instances
from the SIMAP server via the SIMAP APIs and from the response it will be able to map the traffic analysis to
the entities (typically links and router) for automated analysis. The corrective measures would be applied,
either directly to the network by managing the SIMAP entities (network/node/termination point/link instances)
or by first validating the corrective measure in an offline simulation (see the simulation and
traffic engineering use cases).</t>
        </section>
      </section>
      <section anchor="inventory-queries">
        <name>Inventory Queries</name>
        <t>A network inventory refers to a comprehensive record or database that tracks and documents all the network
components and devices within an organization's IT infrastructure.</t>
        <t>Key elements typically found in a network inventory include:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>Hardware details:</dt>
              <dd>
                <t>Descriptions of physical devices such as routers (including their internal components such as cards, power supply
units, pluggables), switches, servers, network cables, including model numbers, serial numbers, and manufacturer
information. This information will facilitate locating additional details of the hardware in the manufacturer systems
and the correlation with the purchase catalog of the company.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Software and firmware:</dt>
              <dd>
                <t>Versions of operating systems, network management tools, and firmware running on network devices.
Note that a network device can have components with their own software and firmware.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Licensing information:</dt>
              <dd>
                <t>For any licensed software or devices, the network inventory will track license numbers, expiry dates, and compliance.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>A network inventory lifecycle refers to the stages a network device or component goes through from
its introduction to the network until its removal or replacement. It encompasses everything from acquisition and
deployment to maintenance, upgrade, and eventually decommissioning. Managing the network inventory lifecycle
efficiently is crucial for maintaining a secure, functional, and cost-effective network.</t>
        <t>A well-maintained network inventory helps organizations with network management, troubleshooting, asset tracking,
security, and ensuring compliance with regulations. It also helps in scaling the network, planning upgrades,
and responding to issues quickly.  In order to facilitate the planning and troubleshooting processes it is
necessary to be able to navigate from network inventory to network topology and Services.</t>
        <t>The SIMAP client application will be able to retrieve physical topology from the SIMAP server via the SIMAP APIs and from the
response it will be able to retrieve the physical inventory of individual devices and cables and the customer
information, if applicable.</t>
        <t>The SIMAP client application may request either one or multiple topology layers via the SIMAP APIs and from the response
it will be able to navigate to any other data modes outside of the core SIMAP topology to retrieve both physical and logical inventory.</t>
        <t>For access network providers the ability to have linkage in the SIMAP of the complete network (active + passive) is
essential as it provides many advantages for optimized customer Service, reduced Mean Time To Repair (MTTR), and
lower operational costs through truck roll reduction.
For example, operators may use custom-tags that are readily available for a customer-facing device, then query
the inventory based on that tag to correlate it with the inventory and then map it to the network/service topology.
The mapping and correlation can then be used for triggering appropriate Service checks.</t>
        <t>The IVY working group is a good source of information for inventory information.</t>
      </section>
      <section anchor="sec-feasibility">
        <name>Service Placement Feasibility Checks</name>
        <t>Service placement feasibility checks refer to the process of evaluating whether a specific Service can be deployed
and operated effectively in a given network. This includes accessing the various factors to ensure that the
service will function as intended (e.g., based on traffic performance requirements) without causing network disruptions
or inefficiencies and effecting other Services already provisioned on the network.</t>
        <t>Some of the factors that need assesing are network capabilities, status, limitations, resource usage and availability.
The Service could be simulated during the feasibility checks to identify if there are any potential issues.
The load testing could be done to evaluate performance under stress.</t>
        <t>The service placement feasibility check application will be able to retrieve the topology at any layer from the SIMAP server
via the SIMAP APIs and from the response it will be able to navigate to any other data models outside of the
core SIMAP topology to retrieve any other information needed, such as resource usage, availability, status, etc.</t>
      </section>
      <section anchor="intentservice-assurance">
        <name>Intent/Service Assurance</name>
        <t>Network intent and Service assurance work together to ensure that the network aligns with business goals and
that the Services provided meet the agreed-upon Service Level Agreements (SLAs).</t>
        <t>The Service Assurance for Intent-Based Networking Architecture (SAIN) <xref target="RFC9417"/> approach emphasizes
a comprehensive view of components involved in Service delivery, including network devices and functions,
to effectively monitor and maintain Service health.</t>
        <t>The key objectives of this architecture include:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>Holistic service monitoring:</dt>
              <dd>
                <t>By considering all elements involved in Service delivery, the architecture enables a thorough assessment of
service health.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Correlation of Service degradation:</dt>
              <dd>
                <t>It assists in linking Service performance issues to specific network components, facilitating precise
identification of faults.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>Impact assessment:</dt>
              <dd>
                <t>The architecture identifies which Services are affected by the failure or degradation of particular
network components, aiding in prioritizing remediation efforts.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>When a Service is degraded, the SAIN architecture will highlight where to look in the assurance Service graph,
as opposed to going hop by hop to troubleshoot the issue.
More precisely, the SAIN architecture will associate a list of symptoms originating
from specific SAIN subservices to each Service instance, corresponding to components of the network.
These components are good candidates for explaining the source of a Service degradation.</t>
        <t>The SIMAP client application will be able to retrieve a topology layer and any network/node/termination point/link instances
from the SIMAP server via the SIMAP APIs and from the response it will be able to determine the health of each instance
by navigating to the SAIN subservices and its symptoms.</t>
      </section>
      <section anchor="service-e2e-and-per-link-kpis">
        <name>Service E2E and Per-link KPIs</name>
        <t>The SIMAP client application will be able to retrieve a topology at any layer from a SIMAP server via the SIMAP APIs and from the
response it will be able to navigate to and retrieve any KPIs for selected topology entity.</t>
      </section>
      <section anchor="network-capacity-planning">
        <name>Network Capacity Planning</name>
        <t>Network capacity planning refers to the process of analyzing, predicting, and ensuring that the network has sufficient
capacity (e.g., <xref target="RFC5136"/>), resources, and infrastructure to meet current and future demands. It involves
evaluating the network's ability to handle increasing (including forecasted) amounts of data, traffic, and users'
activity, while maintaining acceptable levels of performance, reliability, and security.</t>
        <t>The capacity planning primary goal is to ensure that a network can support business operations, applications, and
services without interruptions, delays, or degradation in quality. This requires a thorough understanding of the
network's current state, as well as future requirements and growth projections.</t>
        <t>Key aspects of network capacity planning include:</t>
        <ul spacing="normal">
          <li>
            <t>Traffic analysis: Monitoring and analyzing network traffic patterns to identify trends, peak usage periods, and areas
of congestion. For example, by generating a core traffic matrix with IPFIX flow record <xref target="RFC7011"/> or deducting
an approximate traffic matrix from the link utilization data.</t>
          </li>
          <li>
            <t>Resource utilization: Evaluating the link utilization throughout the network for the current demand to identify
bottlenecks and potential QoS performance issues.</t>
          </li>
          <li>
            <t>Growth forecasting: Predicting future network growth based on business expansion, new applications, or changes in
users' behavior.</t>
          </li>
          <li>
            <t>What-if scenarios: Creating models to assess the network behavior under different scenarios, such as increased traffic,
failure conditions (link, router or Shared Risk Resource Group), and new application deployments (such as a new
Content Delivery Network source, a new peering point, a new data center...).</t>
          </li>
          <li>
            <t>Upgrade planning: Identifying areas where upgrades or additions are needed to ensure that the network can minimize the
 effect of node/link failures, mitigate QoS problems, or simply to support growing demands.</t>
          </li>
          <li>
            <t>Cost-benefit analysis: Evaluating the costs and benefits of upgrading or adding new resources to determine the most
cost-effective solutions.</t>
          </li>
        </ul>
        <t>By implementing a robust capacity planning process, organizations can:</t>
        <ul spacing="normal">
          <li>
            <t>Ensure better network reliability: Minimize downtime and ensure that the network is always available when needed.</t>
          </li>
          <li>
            <t>Improve performance: Optimize network resources to support business-critical applications and Services.</t>
          </li>
          <li>
            <t>Optimize costs: Avoid unnecessary over-provisioning by making informed decisions based on data-driven insights.</t>
          </li>
          <li>
            <t>Support business growth: Scale the network to meet increasing demands and support business expansion.</t>
          </li>
        </ul>
        <t>The capacity planning application will be able to retrieve a topology layer and any network/node/termination point/link instances from
the SIMAP server via the SIMAP APIs and from the response it will be able to map the traffic analysis to the entities
(typically links and router), evaluate their current utilization, evaluate which elements
to add to the network based on the growth forecasting, and finally perform the 'what-if' failure analysis by
simulating the removal of link(s) and/or router(s) while evaluating the network performance.</t>
      </section>
      <section anchor="network-design">
        <name>Network Design</name>
        <t>Network design involves defining both the logical structure, such as access, aggregation, and core layers, and
the physical layout, including devices and links.</t>
        <t>It serves as a blueprint, detailing how these elements interconnect to deliver the intended network behavior
and functionality. The application will generate a candidate network topology, based on the initial design
and the current network topology; this candidate network topology can then undergo further analysis (e.g.,
perform  traffic flow simulations to identify bottlenecks and redundancy checks to ensure resilience) before
being transformed into actionable intent and, eventually, deployment actions.</t>
        <t>Throughout the network's lifecycle, the design rules
embedded within a topology can be continuously validated. For example, a link rule might specify that a connection
between core and aggregation layers must have its source(s) and destination(s) located within the same data center.
Another example is to declare that a specific link type should only exist between Core &lt;-&gt; Aggregation layer with
certain constraints on port optic speed, type (LR vs SR for instance), etc.</t>
        <t>The network design application can (via SIMAP API):</t>
        <ul spacing="normal">
          <li>
            <t>Write the intended network interconnect (topology + rules), this is the intent of the network topology that cannot
be retrieved from the real network (e.g. our L2 topology interconnect intent, or L3 topology interconnect intent).
One network (in case of small network) or interconnect of multiple networks (bigger networks).</t>
          </li>
          <li>
            <t>Retrieve the proposed network interconnect (topology + rules)  </t>
            <ul spacing="normal">
              <li>
                <t>Use case can be for purpose of traffic simulation, testing behavior under failures. Network simulation
use case is described in <xref target="sec-emule"/>.</t>
              </li>
              <li>
                <t>Use case can be for purpose of comparing different proposed network interconnects.</t>
              </li>
              <li>
                <t>Use case can be to build a simulated environment using this design. Network simulation
use case is described in <xref target="sec-emule"/>.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Retrieve the intended network interconnect (topology + rules)</t>
          </li>
          <li>
            <t>At any point in time, compare the discovered topology with intended one  </t>
            <ul spacing="normal">
              <li>
                <t>Potentially validating discovered device configurations with intended ones assuming SIMAP has the
external reference to configuration from topology.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-emule">
        <name>Network Simulation and Network Emulation</name>
        <t>Network simulation is a process used to analyse the behaviour of networks via software. It allows network engineers
and researchers to assess how the network protocols work under different conditions, such as different topologies,
traffic loads, network failures, or the introduction of new devices. Network emulation, on the other hand,
replicates the behavior of a real-world network, allowing for more realistic analysis compared to network simulation.
While network simulation focuses on modeling and approximating network behavior, network emulation involves creating
a real-time, functional network environment whose protocols behave exactly like a real network. Ideally, network
emulation uses the same software images as the real network, but it could also be performed (with less accuracy)
using generic software.</t>
        <section anchor="types-of-network-simulation">
          <name>Types of Network Simulation</name>
          <t>There are several types of network simulations, each designed to address specific needs and use cases. Below are
the main categories of network simulation:</t>
          <ol spacing="normal" type="1"><li>
              <dl>
                <dt>Discrete event simulation:</dt>
                <dd>
                  <t>This is the most common type of network simulation. It models a series of events that occur at specific points
in time. Each event triggers a change in the state of a network component (e.g., a link is down, a card fails,
or a packet arrives).</t>
                </dd>
              </dl>
            </li>
            <li>
              <dl>
                <dt>Continuous simulation:</dt>
                <dd>
                  <t>In contrast to discrete event simulation, continuous simulation models systems where variables change continuously
over time. Network parameters like bandwidth, congestion, and throughput can be treated as continuous functions.</t>
                </dd>
                <dt/>
                <dd>
                  <t>The main use case is to model certain aspects of network performance that evolve continuously, such as link speeds
or delay distributions in links that are impacted by environmental conditions (such as microwave or satellite links).</t>
                </dd>
              </dl>
            </li>
            <li>
              <dl>
                <dt>Monte Carlo simulation:</dt>
                <dd>
                  <t>This type of simulation uses statistical methods to model and analyze networks under uncertain or variable conditions.
Monte Carlo simulations generate a large number of random samples to predict the performance of a network across
multiple scenarios. It is used for probabilistic analysis, risk assessment, and performance evaluation under
uncertain conditions.</t>
                </dd>
              </dl>
            </li>
          </ol>
        </section>
        <section anchor="goals-of-network-simulation">
          <name>Goals of Network Simulation</name>
          <t>The simulations can be also classified depending on the goal of the simulation.</t>
          <section anchor="network-protocol-analysis">
            <name>Network Protocol Analysis</name>
            <t>This type of simulation focuses on simulating specific networking protocols (IS-IS, OSPF, BGP, SR) to understand
how they perform under different conditions. It models the protocol operations and interactions among devices in
the network. For example, simulation can be used to assess the impact of changing a link metric. Moreover, specific
features of the networking protocol can be tested. For example, how fast-reroute performs in a given network topology.</t>
          </section>
          <section anchor="traffic-simulation">
            <name>Traffic Simulation</name>
            <t>This simulation focuses on modelling traffic flow across the network, including packet generation, flow control,
routing, and congestion. It aims to evaluate traffic's impact on network performance.</t>
            <t>The main use is to model the impact of different types of traffic (e.g., voice, video, mobile data, web browsing) and
understand how they affect the network's bandwidth and congestion levels. It can be used to identify bottlenecks and
assist the capacity planning process.</t>
          </section>
          <section anchor="simulation-of-different-topologies-under-normal-and-failure-scenarios">
            <name>Simulation of Different Topologies Under Normal and Failure Scenarios</name>
            <t>This type of simulation focuses on the structure and layout of the network itself. It simulates different network
topologies and their impact on the network's performance.
It can be used, together with the traffic simulation, to evaluate the most efficient topology for a network under
normal conditions and considering factors like fault tolerance.</t>
          </section>
        </section>
      </section>
      <section anchor="postmortem-replay">
        <name>Postmortem Replay</name>
        <t>For the postmortem replay use case, the client application will use the SIMAP APIs for the purpose of analysis of network Service property
evolution based on recorded changes. A collection of relevant timestamped network events, such as routing updates,
configuration changes, link status modifications, traffic metrics evolution, and Service characteristics, is being
made accessible from and/or within a SIMAP to support investigation and automated processing.
Using a structured format, the stored data can be replayed in sequence, allowing network operators to examine
historical network behavior, diagnose issues, and assess the impact of such events on Service assurance.</t>
        <t>The mechanism supports correlation with external data sources to facilitate comprehensive post-mortem analysis.
Beyond centralizing and correlating such various sources of information, the SIMAP can provide simulation of
the network behaviour to assist investigations.</t>
        <t>In essence, this use case builds upon a collection of other SIMAP use cases, such as inventory queries,
intent/service assurance, Service KPIs, capacity planning, and simulation, to provide a thorough understanding of
a network event impacting Service assurance.</t>
        <t>Note that this use case may serve as a component of Service Disruption Detection fine tuning as described in
<xref target="I-D.ietf-nmop-network-anomaly-architecture"/>.</t>
      </section>
      <section anchor="network-digital-twin-ndt">
        <name>Network Digital Twin (NDT)</name>
        <t>Per <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>, Network Digital Twin (NDT) is a digital representation that is
used in the context of Networking and whose physical counterpart is a data network (e.g., provider network or
enterprise network). Also, as discussed in <xref section="9.2" sectionFormat="of" target="I-D.irtf-nmrg-network-digital-twin-arch"/>, network element
models and topology models help generate a virtual twin of the network according to the network element configuration,
operation data, network topology relationship, link state and other network information. The operation status can be
monitored and displayed, the network configuration change and optimization strategy can be pre-verified and
historical data can support e.g. postmorem replay (<xref target="postmortem-replay"/>))</t>
        <t><xref section="9.4" sectionFormat="of" target="I-D.irtf-nmrg-network-digital-twin-arch"/> further elaborates on the requirements on various
interfaces:</t>
        <ul spacing="normal">
          <li>
            <t>Network-facing interfaces are twin interfaces between the real network and its twin entity.
They are responsible for the information exchange between a real network and NDT. SIMAP APIs can be used within
such interfaces.</t>
          </li>
          <li>
            <t>Application-facing interfaces are between the NDT and applications. They are responsible for the information
exchange between Network Digital Twin and network applications. SIMAP APIs can be used for specification of
hypothetical network and service states for 'what-if' analysis, e.g.. for feasibility checks
(<xref target="sec-feasibility"/>), simulation or emulation (<xref target="sec-emule"/>)). Such analysis may be used in support of
e.g. network capacity planning (<xref target="network-capacity-planning"/>)) or network design (<xref target="network-design"/>)).</t>
          </li>
        </ul>
        <t><xref section="9.4" sectionFormat="of" target="I-D.irtf-nmrg-network-digital-twin-arch"/> recommends that these interfaces are open
and standardized so as to avoid either hardware or software vendor lock and achieve interoperability.</t>
        <t>While network emulation (<xref target="sec-emule"/>) can be a component within an NDT, the NDT itself is a broader construct
that integrates multiple modeling techniques, including emulation, simulation, and analytics, to support intelligent
network operations. NDT uses network emulation and includes network emulation use case, but it also interacts with
the real network to support intelligent operations, including predictive analytics, intent verification,
and full lifecycle management of network and services.</t>
      </section>
    </section>
    <section anchor="simap-operator-requirements">
      <name>SIMAP Operator Requirements</name>
      <t>The SIMAP operator requirements are split into three groups for different target audiences:</t>
      <ul spacing="normal">
        <li>
          <dl>
            <dt>Functional requirements:</dt>
            <dd>
              <t>These requirements are collected from the operators and derived from the operators' use cases.
Some of the more specific semantic requirements were identified as <xref target="RFC8345"/> gaps during the Hackathons
with operators and added as specific semantic requirements to the operator use cases.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Design requirements:</dt>
            <dd>
              <t>These requirements are derived from the operator requirements. Although there is some duplication,
these are focused on summarizing the operators' requirements for the design of the data model and API.
These are functional requirements translated into low-level requirements for the model designers.
The rationale for adopting this approach is to ensure that the data model is designed according to the operators'
requirements and that they could be used for both design and review of the candidate data models.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Architecture requirements:</dt>
            <dd>
              <t>Architectural (non-functional) requirements are captured as well, as operators identified performance needs,
large scale support,  and network discovery. These are not data model requirements, but are requirements
either to drive the APIs design itself (e.g., to better optimize performance) or for the SIMAP servers
that expose a SIMAP API. Although, they may be common sense requirements
not specific to SIMAP API,  they are listed here for completeness.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <section anchor="functional-requirements">
        <name>Functional Requirements</name>
        <t>The following are the operators' requirements for the SIMAP. Note that some of these requirements are supported by
default by <xref target="RFC8345"/>.</t>
        <dl>
          <dt>REQ-BASIC-MODEL-SUPPORT:</dt>
          <dd>
            <t>Basic model with network, node, link, and termination point entity types.</t>
          </dd>
          <dt/>
          <dd>
            <t>This means that users of SIMAP
must be able to reconstruct a topology at any layer in an unambiguous manner via these core concepts only,
without the need to understand layer or technology specific information.</t>
          </dd>
          <dt>REQ-LAYERED-MODEL:</dt>
          <dd>
            <t>Topology layers from physical layer up to Service layer.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide views for all layers of network topology, from physical network
(ideally optical), Layer 2, Layer 3 up to  Service and intent views. It must provide flexibility
to support both the same network topology instance with multiple layers (e.g., Layer 2 and Layer 3)
or separate network topology instances with supporting relations between them (e.g., separate Layer 2 and Layer 3).
Multiple topology layers can be grouped into the same network topology instance, if solution requires.</t>
          </dd>
          <dt>REQ-VIEWPOINTS:</dt>
          <dd>
            <t>SIMAP should provide different views to different client applications. For example, one client application
may need to see Layer 2 and Layer 3 layers in a single network topology instance, while another client application may need to see
them as separate network topology instances.</t>
          </dd>
          <dt>REQ-PASSIVE-TOPO:</dt>
          <dd>
            <t>SIMAP must support capability to model topology of the complete network. If the implementation requires
passive topology to be part of the complete multi-layered topology, then SIMAP must support
the capability to model the passive part of the network (in addition to the active part).</t>
          </dd>
          <dt/>
          <dd>
            <t>For access network providers the ability to have linkage in the SIMAP of the complete network (active + passive) is
essential as it provides many advantages for optimized customer Service, reduced MTTR, and lower operational costs
through truck roll reduction.</t>
          </dd>
          <dt/>
          <dd>
            <t>The passive topology must be either implemented in the SIMAP (what cannot be discovered can be added using the write API)
or accessible from the SIMAP. Whether the passive topology is included as part of the SIMAP or
accessible from the SIMAP is left to the solutions.</t>
          </dd>
          <dt>REQ-PROG-OPEN-MODEL:</dt>
          <dd>
            <t>Open and programmable SIMAP.</t>
          </dd>
          <dt/>
          <dd>
            <t>This includes "read" operations to retrieve the view of the network, typically as application-facing interface of
Software Defined Networking (SDN) controllers or orchestrators.</t>
          </dd>
          <dt/>
          <dd>
            <t>It also includes "write" operations, not for the ability to directly change the live SIMAP data
(e.g., changing the network or Service parameters), but for offline simulations, also known as what-if scenarios.</t>
          </dd>
          <dt/>
          <dd>
            <t>Running a "what-if" analysis requires the ability to take
snapshots and to switch easily between them.</t>
          </dd>
          <dt/>
          <dd>
            <t>Note that there is a need to distinguish between a change on the SIMAP
for future simulation and a change that reflects the current reality of the network.</t>
          </dd>
          <dt>REQ-STD-API-BASED:</dt>
          <dd>
            <t>Standard-based SIMAP and APIs, for multi-vendor support.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide the standard APIs that provide for read/write and queries.
These APIs must also provide the capability to retrieve the links to external data/models.</t>
          </dd>
          <dt>REQ-COMMON-API:</dt>
          <dd>
            <t>SIMAP and common APIs, for multi-domain.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP and its APIs must be common over different network domains (campus, core, data center, etc.).</t>
          </dd>
          <dt/>
          <dd>
            <t>This means that clients of the SIMAP APIs must be able to understand the topology model of layers of any
domain without having to understand the details of any technologies and domains.</t>
          </dd>
          <dt>REQ-GRAPH-TRAVERSAL:</dt>
          <dd>
            <t>Topology graph traversal.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must be optimized for graph traversal to support both network path queries and other specific use case queries.
This means that the SIMAP must provide an efficient means to retrieve network paths,
to accommodate the difficulty operators experience when retrieving network paths
via the chain termination-point-&gt;link-&gt;termination-point, without having a direct adjacency relation.
Additionally, SIMAP must enable efficient retrieval of the data required by other use case queries.</t>
          </dd>
          <dt>REQ-TOPOLOGY-ABSTRACTION:</dt>
          <dd>
            <t>Navigation across the abstraction levels.</t>
          </dd>
          <dt/>
          <dd>
            <t>A network (even a single layer network) can be represented
in multiple ways providing different abstraction views of the same network. In such a case, it would be beneficial
being able to navigate amongst the different levels of abstractions (e.g. to understand which set of nodes in the native
topology are actually represented as a single node in an abstract topology being built on top of the native topology).
This navigation is different and orthogonal to the multi-layer navigation where we need to report which Layer 2 path is
supporting a given Layer 3 node or link. Nevertheless, it would not be the best practice to expose it via different
topology APIs and model. Please refer to the <xref target="sec-topology-abstraction"/> for some background on the
topology abstraction.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide a mechanism to navigate across the abstraction levels.</t>
          </dd>
          <dt>REQ-LIVE:</dt>
          <dd>
            <t>Live network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must enable retrieval of multi-layered topology of a live network.</t>
          </dd>
          <dt/>
          <dd>
            <t>Live network is the latest snapshot of the real network.</t>
          </dd>
          <dt>REQ-SNAPSHOT:</dt>
          <dd>
            <t>Network snapshot topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must enable retrieval of multi-layered topology of different snapshots</t>
          </dd>
          <dt/>
          <dd>
            <t>Snapshot is the view of the network at any given point in time.</t>
          </dd>
          <dt>REQ-POTENTIAL:</dt>
          <dd>
            <t>Potential new network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must enable both retrieval and write access to a potential network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>A potential new network topology  is a provisional view at a given point in time that incorporates
modifications relative to the current snapshot. It may represent the full topology or
only the differences from the snapshot.</t>
          </dd>
          <dt/>
          <dd>
            <t>The view is needed for what-if analysis, pre-configuration, and simulation.</t>
          </dd>
          <dt>REQ-INTENDED:</dt>
          <dd>
            <t>Intended network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must enable both retrieval and write access to the intended
network topology that cannot be discovered from the real network
(e.g., intended Layer 2 Topology, intended Layer 3 Topology, and
passive topology that cannot be discovered).</t>
          </dd>
          <dt/>
          <dd>
            <t>The intended topology represents the desired topology, without always detailing the intermediate hops,
devices or detailed links that the current live topology contains. It can be used to verify if
the live topology complies with the intent.</t>
          </dd>
          <dt>REQ-SEMANTIC:</dt>
          <dd>
            <t>Network topology semantics.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide semantics for layered network topologies and for linking external models/data.</t>
          </dd>
        </dl>
        <t>The following requirements are more specific requirements for semantics:</t>
        <dl>
          <dt>REQ-LAYER-NAVIGATE:</dt>
          <dd>
            <t>SIMAP must provide capability to navigate both within a topology layer and between topology layers.</t>
          </dd>
          <dt/>
          <dd>
            <t>Within-layer navigation means that SIMAP client applications should be able to move among entities that belong to the same layer.
For example, in the IGP layer, the navigation should allow moving between OSPF/IS-IS management domains, OSPF/IS-IS areas,
OSPF/IS-IS processes, OSPF/IS-IS interfaces, and OSPF/IS-IS links.</t>
          </dd>
          <dt/>
          <dd>
            <t>Between‑layer navigation is the navigation across layers that should display the dependencies of entities in one layer on those in another.
For instance, an IP interface that is supported by an Ethernet interface should be visible when moving between the corresponding layers.</t>
          </dd>
          <dt>REQ-EXTENSIBLE:</dt>
          <dd>
            <t>SIMAP must be extensible with metadata. As examples, a controller or the client application could add a custom "location" attribute
to a node to record its physical site, or a controller could attach a "vendorId" field to a device node.
This demonstrates that arbitrary key‑value metadata can be appended to any element in the model without altering the core schema.</t>
          </dd>
          <dt>REQ-PLUGG:</dt>
          <dd>
            <t>SIMAP must be pluggable. That is,
</t>
            <ul spacing="normal">
              <li>
                <t>Must connect to other data models for device configuration, inventory, configuration, assurance, etc.
The SIMAP does not contain the detailed device configuration, so a mechanism is needed to be able to link it from SIMAP.
SIMAP should also be linked to a 'logical configuration inventory'. Several examples of the type of logical information
to be linked from SIMAP: inventory of logical interfaces, inventory of ACLs, inventory of routing policies, or geographic location.</t>
              </li>
              <li>
                <t>Given that not all involved components can be available using YANG, there is a need to connect
SIMAP with other modelling mechanisms.</t>
              </li>
            </ul>
          </dd>
          <dt>REQ-BIDIR:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model bidirectional
links. While data flows are unidirectional, the bidirectional
links are also common in networking.  Examples are Ethernet
cables, bidirectional SONET rings, socket connection to the
server, etc., where a link is modeled as bidirectional, which in turn
might be supported as unidirectional links at the lower layer.</t>
          </dd>
          <dt>REQ-MULTI-POINT:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model multipoint links. A topology model should be able to model any topology type, including point to multipoint, bus, ring, star, tree, mesh, hybrid and daisy chain. A topology model should also be able to model any link cardinality, including point-to-point, point-to-multipoint, multipoint-to-multipoint</t>
          </dd>
          <dt>REQ-MULTI-DOMAIN:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model links and nodes between networks when the implementation
requires multi-domain topologies, topologies with multiple IGP areas or any network partitioning.
This requirement is about covering connectivity between different networks, sub-networks, or domains.</t>
          </dd>
          <dt>REQ-SUBNETWORK:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model network decomposition into sub-networks.
The requirement is about modelling hierarchical networks , Autonomous Systems (ASes) with multiple areas, or a network
with multiple domains (e.g., access, core, data center).</t>
          </dd>
          <dt/>
          <dd>
            <t>The network can be partitioned by providing capability to have multiple child network instances as part of a
single parent network, with a relation between the parent network and child networks.</t>
          </dd>
          <dt>REQ-SUPPORTING:</dt>
          <dd>
            <t>SIMAP must provide a mechanism to model supporting relationships between different types of topological entities
(e.g., a termination point is supported by a node or a node is supported by a network). This may be required
to model supporting relationships for termination points which are supported by physical devices (e.g., a loopback interface on IP router).</t>
          </dd>
          <dt>REQ-STATUS:</dt>
          <dd>
            <t>Links and nodes that are down must appear in the topology. The status of the nodes and links must be either
implemented in the SIMAP or accessible from the SIMAP. Whether the status is included as part of the SIMAP or
accessible from the SIMAP is left to the solutions.</t>
          </dd>
          <dt>REQ-DATA-PLANE-FLOW:</dt>
          <dd>
            <t>Provider data plane (Flow) needs to be correlatable to underlay and customer data plane to overlay topology</t>
          </dd>
          <dt/>
          <dd>
            <t>An SRv6 example:</t>
          </dd>
          <dt/>
          <dd>
            <t>In an SRv6‑enabled network, the sourceIPv6Address field appears twice in the IPFIX data‑template/data‑record
for a captured flow on an SRv6‑enabled provider interface. Once in relation to provider data plane in the
underlay, and once as relation to the customer data plane in the overlay.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP must provide the semantic capability that each sourceIPv6Address can be mapped to the overlay and
underlay network topology. Both topologies might not be uniquely addressed, the VPN context
(in SRv6 these are the SID's, <xref section="3" sectionFormat="of" target="RFC8986"/>) needs to be considered therefore as well.</t>
          </dd>
          <dt/>
          <dd>
            <t>IPFIX protocol, defined in <xref target="RFC7011"/>, is the protocol for the exchange of flow information from
an Exporting Process to a Collecting Process. <xref section="8" sectionFormat="of" target="RFC7011"/> describes the management of
Templates and Option templates at the Exporting and Collecting Processes, and states the following:</t>
          </dd>
        </dl>
        <blockquote>
          <t>If an Information Element is required more than once in a Template,
the different occurrences of this Information Element SHOULD follow
the logical order of their treatments by the Metering Process. For
example, if a selected packet goes through two hash functions, and if
the two hash values are sent within a single Template, the first
occurrence of the hash value should belong to the first hash function
in the Metering Process. For example, when exporting the two source
IP addresses of an IPv4-in-IPv4 packet, the first sourceIPv4Address
Information Element occurrence should be the IPv4 address of the
outer header, while the second occurrence should be the address of
the inner header. Collecting Processes MUST properly handle
Templates with multiple identical Information Elements.</t>
        </blockquote>
        <dl>
          <dt>REQ-CONTROL-PLANE:</dt>
          <dd>
            <t>Control‑plane routing state must be correlatable to the corresponding data‑plane topology. For example, the underlay control‑plane routing
state must correlate to the underlay L3 topology, while the overlay control‑plane routing state must correlate to the overlay L3 network topology.</t>
          </dd>
          <dt/>
          <dd>
            <t>A BMP/BGP example:</t>
          </dd>
          <dt/>
          <dd>
            <t>The BMP peer distinguisher (<xref section="4.2" sectionFormat="of" target="RFC7854"/>) needs to be correlateable to the VRF
of a node and the next-hop attribute of the NLRI in the BMP route-monitoring (<xref section="4.6" sectionFormat="of" target="RFC7854"/>) encapsulated
message to the underlay network topology while the path attribute of the NLRI in the BMP route-monitoring
encapsulated message to the overlay topology.</t>
          </dd>
        </dl>
      </section>
      <section anchor="design-requirements">
        <name>Design Requirements</name>
        <t>The following are the design requirements for the SIMAP data model:</t>
        <dl>
          <dt>REQ-TOPO-ONLY:</dt>
          <dd>
            <t>SIMAP should contain only topological information.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP is not required to contain all models and data required for
all the management and use cases. However, it should be designed to support adequate pointers to other functional
data and models to ease navigating in the overall system. For example:
</t>
            <ul spacing="normal">
              <li>
                <t>ACLs and Route Policies are not required to be supported in the SIMAP, they would be linked to the SIMAP.</t>
              </li>
              <li>
                <t>Dynamic paths may, depending on the solution, be either inside or outside of the SIMAP. If outside of SIMAP,
dynamic paths could be linked to the SIMAP.</t>
              </li>
            </ul>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP should ensure that it is possible to represent the paths/routes and leave the choice of what level of dynamics
to represent to the specific solution/implementations. The model needs to be rich enough to represent any level of dynamics.
However, from experience, we suspect it can be the same model for all level of dynamics.</t>
          </dd>
          <dt>REQ-PROPERTIES:</dt>
          <dd>
            <t>SIMAP entities should mainly contain properties used to identify topological entities at different layers,
identify their roles, and topological relationships between them.</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP entities should also provide information required to define semantics for layered network topologies, such as:</t>
          </dd>
        </dl>
        <ul spacing="normal">
          <li>
            <t>link directionality,</t>
          </li>
          <li>
            <t>whether the links are multipoint or not and, if so, are whether these links are point-to-multipoint or multipoint-to-multipoint,</t>
          </li>
          <li>
            <t>role of the termination points in the link (source, destination, hub, spoke), and</t>
          </li>
          <li>
            <t>some generic mechanism to add metadata.</t>
          </li>
        </ul>
        <dl>
          <dt>REQ-RELATIONSHIPS:</dt>
          <dd>
            <t>SIMAP should contain all topological relationships inside each layer or between the layers (underlay/overlay)</t>
          </dd>
          <dt/>
          <dd>
            <t>SIMAP should contain links to other models/data to enable generic navigation to other data models in
generic way.</t>
          </dd>
          <dt/>
          <dd>
            <t>The SIMAP relationships should also provide information required to define semantics for layered network topologies,
such as providing:</t>
          </dd>
        </dl>
        <ul spacing="normal">
          <li>
            <t>underlay and overlay relations between different types of topological entities,</t>
          </li>
          <li>
            <t>additional information that helps with navigation inside a layer and between the layers, for example, easy
identification of resources at the physical layer in primary versus backup paths, if the underlay
resources are used for load balancing or for backup,</t>
          </li>
          <li>
            <t>capability to model nodes, termination points, and links contained in a network, but also nodes and links shared between networks, and</t>
          </li>
          <li>
            <t>relationships between networks, either for modelling of underlay and overlay or modelling network that contains
multiple networks.</t>
          </li>
        </ul>
        <dl>
          <dt>REQ-CONDITIONAL:</dt>
          <dd>
            <t>Provide capability for conditional retrieval of parts of SIMAP.</t>
          </dd>
          <dt>REQ-TEMPO-HISTO:</dt>
          <dd>
            <t>Must support geo-spatial (geographic coordinates, region, zone, etc.),
temporal (when some fact is true, e.g., the topology or topological entity created at 12:00 UTC),
and historical data (time-stamped historical changes, e.g. all changes from 2019-01-01 to 2023-06-30).</t>
          </dd>
          <dt/>
          <dd>
            <t>The geo-spatial, temporal and historical can also be supported external to the SIMAP.</t>
          </dd>
        </dl>
      </section>
      <section anchor="sec-arch">
        <name>Architectural Requirements</name>
        <t>The following are the architectural requirements for the SIMAP server implementations
that provide SIMAP API, they are the non-functional requirements for
the SIMAP APIs and SIMAP server implementations:</t>
        <dl>
          <dt>REQ-SCALES:</dt>
          <dd>
            <t>The SIMAP APIs and SIMAP server implementations must be scalable, it must support any provider network, independent of its size.</t>
          </dd>
          <dt>REQ-PERFORMANCE:</dt>
          <dd>
            <t>The SIMAP APIs and SIMAP server implementations must be  performant, and have acceptable response-time. Although we are not to define the response time here.</t>
          </dd>
          <dt>REQ-USABILITY:</dt>
          <dd>
            <t>The SIMAP APIs must be simple and easy to integrate with the client applications, whose developers
may not be networking experts.</t>
          </dd>
          <dt>REQ-DISCOVERY:</dt>
          <dd>
            <t>A network SIMAP server must perform the initial and on-demand discovery of a network in order to provide the layered
topology via the SIMAP APIs to a client application.</t>
          </dd>
          <dt>REQ-SYNCH:</dt>
          <dd>
            <t>The SIMAP server must perform the sync with the network in order to provide up to date layered topology
via SIMAP APIs to a client application</t>
          </dd>
          <dt>REQ-SECURITY:</dt>
          <dd>
            <t>The conventional NACM control access rules <xref target="RFC8341"/> should apply. This includes module control access rules,
protocol operation control access rules, data node control access rules, and notification control access rules.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="positioning-simap-in-the-context-of-the-ietf-work">
      <name>Positioning SIMAP in the Context of the IETF Work</name>
      <t><xref target="RFC8199"/> advocates for a consistent classification of YANG modules and introduces two abstraction layers for
YANG modules:</t>
      <ul spacing="normal">
        <li>
          <t>network element YANG modules</t>
        </li>
        <li>
          <t>network service YANG modules</t>
        </li>
      </ul>
      <t>The IRTF <xref target="RFC7426"/> defines the SDN layers and architecture and proposes the following interfaces:</t>
      <ul spacing="normal">
        <li>
          <t>southbound interfaces between the network devices and controllers/managers</t>
        </li>
        <li>
          <t>service interface between controllers/managers and applications</t>
        </li>
      </ul>
      <t><xref target="RFC8309"/> defines where service model might fit into the SDN Architecture, although the service model
does not require or preclude the use of SDN. It shows the following models at different layers of abstraction:</t>
      <ul spacing="normal">
        <li>
          <t>device model, between network elements and controllers</t>
        </li>
        <li>
          <t>network model, between controllers and network orchestrators</t>
        </li>
        <li>
          <t>service model, between network orchestrators and service orchestrators</t>
        </li>
        <li>
          <t>customer service model, between service orchestrators and customer</t>
        </li>
      </ul>
      <t><xref target="RFC8453"/> describes the ACTN architecture in the context of the YANG service models. It shows how ACTN interfaces
relate to device model, network model and customer service model.</t>
      <t><xref target="RFC8969"/> describes a framework for Service and network management automation that takes advantage of YANG
modelling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a
data model. <xref target="RFC8969"/> introduces "network service models" and describes the layering and representation of models
within a network operator as follows:</t>
      <ul spacing="normal">
        <li>
          <t>device model, between device and controller</t>
        </li>
        <li>
          <t>network model (operator oriented), between controller (that includes network orchestration function) and
service orchestrator</t>
        </li>
        <li>
          <t>service model (customer oriented), between service orchestrator and customer, this is network service model</t>
        </li>
      </ul>
      <t>The SIMAP can be used at different layers of abstraction and SIMAP can provide topology at
different interfaces. Although the SIMAP and APIs is primarily positioned as northbound multi-layered topology
model from (SDN) Controllers, it can also be positioned as follows:</t>
      <ul spacing="normal">
        <li>
          <t>In the context of <xref target="RFC8199"/>, SIMAP can provide multi-layered topology YANG module as part of both network element
and network service YANG modules</t>
        </li>
        <li>
          <t>In the context of <xref target="RFC7426"/>, SIMAP can provide multi-layered topology interface as part of both Southbound and
Service Interfaces</t>
        </li>
        <li>
          <t>In the context of <xref target="RFC8309"/>, SIMAP can provide multi-layered topology model as part of device model, network model,
service model and customer service model</t>
        </li>
        <li>
          <t>In the context of <xref target="RFC8453"/>, SIMAP can provide multi-layered topology model as part of SBI (southbound interface to
network), MPI (interface between multi-domain service coordinator and network controller) and CMI (interface between
customer network controller and multi-domain service controller)</t>
        </li>
        <li>
          <t>In the context of <xref target="RFC8969"/>, SIMAP can provide multi-layered topology model as part of device model, network model
and network service model</t>
        </li>
      </ul>
      <t>Appendix A documents some other IETF activities related to topology modeling, it does not want to prescribe how SIMAP
should be modeled or which base models should be used, and it is added for illustrational purposes only.
Therefore it is not included in this section, but added to the Appendix.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document covers the SIMAP concepts, requirements, and use cases, there is no specific security considerations other
that those discussed in <xref target="sec-arch"/>.</t>
      <t><xref section="8" sectionFormat="of" target="RFC8345"/> discusses security aspects that will be useful when designing the SIMAP solution.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3444">
          <front>
            <title>On the Difference between Information Models and Data Models</title>
            <author fullname="A. Pras" initials="A." surname="Pras"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3444"/>
          <seriesInfo name="DOI" value="10.17487/RFC3444"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC9417">
          <front>
            <title>Service Assurance for Intent-Based Networking Architecture</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document describes an architecture that provides some assurance that service instances are running as expected. As services rely upon multiple subservices provided by a variety of elements, including the underlying network devices and functions, getting the assurance of a healthy service is only possible with a holistic view of all involved elements. This architecture not only helps to correlate the service degradation with symptoms of a specific network component but, it also lists the services impacted by the failure or degradation of a specific network component.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9417"/>
          <seriesInfo name="DOI" value="10.17487/RFC9417"/>
        </reference>
        <reference anchor="RFC9408">
          <front>
            <title>A YANG Network Data Model for Service Attachment Points (SAPs)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="V. Lopez" initials="V." surname="Lopez"/>
            <date month="June" year="2023"/>
            <abstract>
              <t>This document defines a YANG data model for representing an abstract view of the provider network topology that contains the points from which its services can be attached (e.g., basic connectivity, VPN, network slices). Also, the model can be used to retrieve the points where the services are actually being delivered to customers (including peer networks).</t>
              <t>This document augments the 'ietf-network' data model defined in RFC 8345 by adding the concept of Service Attachment Points (SAPs). The SAPs are the network reference points to which network services, such as Layer 3 Virtual Private Network (L3VPN) or Layer 2 Virtual Private Network (L2VPN), can be attached. One or multiple services can be bound to the same SAP. Both User-to-Network Interface (UNI) and Network-to-Network Interface (NNI) are supported in the SAP data model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9408"/>
          <seriesInfo name="DOI" value="10.17487/RFC9408"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="5" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-14"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-terminology">
          <front>
            <title>Some Key Terms for Network Fault and Problem Management</title>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>   This document sets out some terms that are fundamental to a common
   understanding of network fault and problem management within the
   IETF.

   The purpose of this document is to bring clarity to discussions and
   other work related to network fault and problem management, in
   particular to YANG data models and management protocols that report,
   make visible, or manage network faults and problems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-23"/>
        </reference>
        <reference anchor="RFC9522">
          <front>
            <title>Overview and Principles of Internet Traffic Engineering</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes the principles of traffic engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks and the networks that support IP networking and to provide a common basis for the development of traffic-engineering capabilities for the Internet. The principles, architectures, and methodologies for performance evaluation and performance optimization of operational networks are also discussed.</t>
              <t>This work was first published as RFC 3272 in May 2002. This document obsoletes RFC 3272 by making a complete update to bring the text in line with best current practices for Internet traffic engineering and to include references to the latest relevant work in the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9522"/>
          <seriesInfo name="DOI" value="10.17487/RFC9522"/>
        </reference>
        <reference anchor="RFC5136">
          <front>
            <title>Defining Network Capacity</title>
            <author fullname="P. Chimento" initials="P." surname="Chimento"/>
            <author fullname="J. Ishac" initials="J." surname="Ishac"/>
            <date month="February" year="2008"/>
            <abstract>
              <t>Measuring capacity is a task that sounds simple, but in reality can be quite complex. In addition, the lack of a unified nomenclature on this subject makes it increasingly difficult to properly build, test, and use techniques and tools built around these constructs. This document provides definitions for the terms 'Capacity' and 'Available Capacity' related to IP traffic traveling between a source and destination in an IP network. By doing so, we hope to provide a common framework for the discussion and analysis of a diverse set of current and future estimation techniques. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5136"/>
          <seriesInfo name="DOI" value="10.17487/RFC5136"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-anomaly-architecture">
          <front>
            <title>A Framework for a Network Anomaly Detection Architecture</title>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Wanting Du" initials="W." surname="Du">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <date day="18" month="January" year="2026"/>
            <abstract>
              <t>   This document describes the motivation and architecture of a Network
   Anomaly Detection Framework and the relationship to other documents
   describing network Symptom semantics and network incident lifecycle.

   The described architecture for detecting IP network service
   interruption is designed to be generic applicable and extensible.
   Different applications are described and examples are referenced with
   open-source running code.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-anomaly-architecture-07"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   Digital Twin technology has seen rapid adoption in Industry 4.0.  The
   application of Digital Twin technology in the networking field is
   meant to develop various rich network applications, realize efficient
   and cost-effective data-driven network management, and accelerate
   network innovation.

   This document presents an overview of the concepts of Network Digital
   Twin, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-12"/>
        </reference>
        <reference anchor="RFC8986">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
            <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
            <author fullname="J. Leddy" initials="J." surname="Leddy"/>
            <author fullname="D. Voyer" initials="D." surname="Voyer"/>
            <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
            <author fullname="Z. Li" initials="Z." surname="Li"/>
            <date month="February" year="2021"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC7854">
          <front>
            <title>BGP Monitoring Protocol (BMP)</title>
            <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
            <author fullname="R. Fernando" initials="R." surname="Fernando"/>
            <author fullname="S. Stuart" initials="S." surname="Stuart"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7854"/>
          <seriesInfo name="DOI" value="10.17487/RFC7854"/>
        </reference>
        <reference anchor="RFC8199">
          <front>
            <title>YANG Module Classification</title>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="C. Moberg" initials="C." surname="Moberg"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
              <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
              <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8199"/>
          <seriesInfo name="DOI" value="10.17487/RFC8199"/>
        </reference>
        <reference anchor="RFC7426">
          <front>
            <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
            <author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis"/>
            <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"/>
            <author fullname="S. Denazis" initials="S." surname="Denazis"/>
            <author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces. SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane. This separation allows faster innovation cycles at both planes as experience has already shown. However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other. This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7426"/>
          <seriesInfo name="DOI" value="10.17487/RFC7426"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8453">
          <front>
            <title>Framework for Abstraction and Control of TE Networks (ACTN)</title>
            <author fullname="D. Ceccarelli" initials="D." role="editor" surname="Ceccarelli"/>
            <author fullname="Y. Lee" initials="Y." role="editor" surname="Lee"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>Traffic Engineered (TE) networks have a variety of mechanisms to facilitate the separation of the data plane and control plane. They also have a range of management and provisioning protocols to configure and activate network resources. These mechanisms represent key technologies for enabling flexible and dynamic networking. The term "Traffic Engineered network" refers to a network that uses any connection-oriented technology under the control of a distributed or centralized control plane to support dynamic provisioning of end-to- end connectivity.</t>
              <t>Abstraction of network resources is a technique that can be applied to a single network domain or across multiple domains to create a single virtualized network that is under the control of a network operator or the customer of the operator that actually owns the network resources.</t>
              <t>This document provides a framework for Abstraction and Control of TE Networks (ACTN) to support virtual network services and connectivity services.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8453"/>
          <seriesInfo name="DOI" value="10.17487/RFC8453"/>
        </reference>
        <reference anchor="RFC8969">
          <front>
            <title>A Framework for Automating Service and Network Management with YANG</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Geng" initials="L." surname="Geng"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
              <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8969"/>
          <seriesInfo name="DOI" value="10.17487/RFC8969"/>
        </reference>
        <reference anchor="RFC7926">
          <front>
            <title>Problem Statement and Architecture for Information Exchange between Interconnected Traffic-Engineered Networks</title>
            <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
            <author fullname="J. Drake" initials="J." surname="Drake"/>
            <author fullname="N. Bitar" initials="N." surname="Bitar"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <author fullname="D. Ceccarelli" initials="D." surname="Ceccarelli"/>
            <author fullname="X. Zhang" initials="X." surname="Zhang"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>In Traffic-Engineered (TE) systems, it is sometimes desirable to establish an end-to-end TE path with a set of constraints (such as bandwidth) across one or more networks from a source to a destination. TE information is the data relating to nodes and TE links that is used in the process of selecting a TE path. TE information is usually only available within a network. We call such a zone of visibility of TE information a domain. An example of a domain may be an IGP area or an Autonomous System.</t>
              <t>In order to determine the potential to establish a TE path through a series of connected networks, it is necessary to have available a certain amount of TE information about each network. This need not be the full set of TE information available within each network but does need to express the potential of providing TE connectivity. This subset of TE information is called TE reachability information.</t>
              <t>This document sets out the problem statement for the exchange of TE information between interconnected TE networks in support of end-to-end TE path establishment and describes the best current practice architecture to meet this problem statement. For reasons that are explained in this document, this work is limited to simple TE constraints and information that determine TE reachability.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="206"/>
          <seriesInfo name="RFC" value="7926"/>
          <seriesInfo name="DOI" value="10.17487/RFC7926"/>
        </reference>
        <reference anchor="RFC8795">
          <front>
            <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
            <author fullname="V. Beeram" initials="V." surname="Beeram"/>
            <author fullname="T. Saad" initials="T." surname="Saad"/>
            <author fullname="H. Shah" initials="H." surname="Shah"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8795"/>
          <seriesInfo name="DOI" value="10.17487/RFC8795"/>
        </reference>
        <reference anchor="I-D.ietf-teas-te-topo-and-tunnel-modeling">
          <front>
            <title>TE Topology and Tunnel Modeling for Transport Networks</title>
            <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
              <organization>Individual</organization>
            </author>
            <author fullname="Vishnu Pavan Beeram" initials="V. P." surname="Beeram">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Tarek Saad" initials="T." surname="Saad">
              <organization>Juniper Networks</organization>
            </author>
            <author fullname="Xufeng Liu" initials="X." surname="Liu">
              <organization>Volta Networks</organization>
            </author>
            <date day="12" month="July" year="2020"/>
            <abstract>
              <t>   This document describes how to model TE topologies and tunnels for
   transport networks, by using the TE topology YANG model [I-D.ietf-
   teas-yang-te-topo] and the TE tunnel YANG model [I-D.ietf-teas-yang-
   te].


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-teas-te-topo-and-tunnel-modeling-06"/>
        </reference>
        <reference anchor="RFC9179">
          <front>
            <title>A YANG Grouping for Geographic Locations</title>
            <author fullname="C. Hopps" initials="C." surname="Hopps"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document defines a generic geographical location YANG grouping. The geographical location grouping is intended to be used in YANG data models for specifying a location on or in reference to Earth or any other astronomical object.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9179"/>
          <seriesInfo name="DOI" value="10.17487/RFC9179"/>
        </reference>
        <reference anchor="RFC8944">
          <front>
            <title>A YANG Data Model for Layer 2 Network Topologies</title>
            <author fullname="J. Dong" initials="J." surname="Dong"/>
            <author fullname="X. Wei" initials="X." surname="Wei"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="A. Liu" initials="A." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8944"/>
          <seriesInfo name="DOI" value="10.17487/RFC8944"/>
        </reference>
        <reference anchor="I-D.ogondio-opsawg-ospf-topology">
          <front>
            <title>A YANG Data Model for Open Shortest Path First (OSPF) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Open Shortest
   Path First (OSPF) information.  This document augments the 'ietf-
   network' data model by adding OSPF concepts and explains how the data
   model can be used to represent the OSPF topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-opsawg-ospf-topology-01"/>
        </reference>
        <reference anchor="I-D.ogondio-nmop-isis-topology">
          <front>
            <title>A YANG Data Model for Intermediate System to intermediate System (IS-IS) Topology</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Victor Lopez" initials="V." surname="Lopez">
              <organization>Nokia</organization>
            </author>
            <author fullname="Daniele Ceccarelli" initials="D." surname="Ceccarelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Everything OPS</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document defines a YANG data model for representing an
   abstracted view of a network topology that contains Intermediate
   System to Intermediate System (IS-IS).  This document augments the
   'ietf-network' and 'ietf-network-topology' data models by adding IS-
   IS concepts and explains how the data model can be used to represent
   the IS-IS topology.

   The YANG data model defined in this document conforms to the Network
   Management Datastore Architecture (NMDA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ogondio-nmop-isis-topology-01"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
        <reference anchor="I-D.ietf-ivy-network-inventory-topology">
          <front>
            <title>A YANG Network Data Model for Inventory Topology Mapping</title>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="28" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a YANG data model to map the network inventory
   data with the topology data to form a base underlay network.  The
   data model facilitates the correlation between the layer (e.g., Layer
   2 or Layer 3) topology information and the inventory data of the
   underlay network for better service provisioning, network maintenance
   operations, and other assessment scenarios.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-topology-06"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-ntw-attachment-circuit">
          <front>
            <title>A Network YANG Data Model for Attachment Circuits</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., VPN, Network Slice Service).  A
   companion service model is specified in the YANG Data Models for
   Bearers and 'Attachment Circuits'-as-a-Service (ACaaS) (I-D.ietf-
   opsawg-teas-attachment-circuit).

   The module augments the base network ('ietf-network') and the Service
   Attachment Point (SAP) models with the detailed information for the
   provisioning of attachment circuits in Provider Edges (PEs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ntw-attachment-circuit-16"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-teas-attachment-circuit">
          <front>
            <title>YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACaaS)</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Richard Roberts" initials="R." surname="Roberts">
              <organization>Juniper</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Bo Wu" initials="B." surname="Wu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="23" month="January" year="2025"/>
            <abstract>
              <t>   Delivery of network services assumes that appropriate setup is
   provisioned over the links that connect customer termination points
   and a provider network.  The required setup to allow successful data
   exchange over these links is referred to as an attachment circuit
   (AC), while the underlying link is referred to as "bearer".

   This document specifies a YANG service data model for ACs.  This
   model can be used for the provisioning of ACs before or during
   service provisioning (e.g., Network Slice Service).

   The document also specifies a YANG service model for managing bearers
   over which ACs are established.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-teas-attachment-circuit-20"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-incident-yang">
          <front>
            <title>A YANG Data Model for Network Incident Management</title>
            <author fullname="Tong Hu" initials="T." surname="Hu">
              <organization>CMCC</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
            <date day="13" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help reduce troubleshooting
   tickets and resolve network incidents for the sake of network service
   health and probable cause analysis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-08"/>
        </reference>
      </references>
    </references>
    <?line 1022?>

<section anchor="related-ietf-activities">
      <name>Related IETF Activities</name>
      <ul empty="true">
        <li>
          <t>Note: The models cited in this section are provided for illustration purposes. It is out of scope to recomend
which models will be used as base to build the SIMAP.</t>
        </li>
      </ul>
      <section anchor="sec-ntw-topo">
        <name>Network Topology</name>
        <t>Interestingly, we could not find any network topology definition in
   IETF RFCs (not even in <xref target="RFC8345"/>) or Internet-Drafts.  However, it is mentioned
   in multiple documents.  As an example, in Overview and Principles of
   Internet Traffic Engineering <xref target="RFC9522"/>, which
   mentions:</t>
        <blockquote>
          <t>To conduct performance studies and to support planning of existing
   and future networks, a routing analysis may be performed to determine
   the paths the routing protocols will choose for various traffic
   demands, and to ascertain the utilization of network resources as
   traffic is routed through the network.  Routing analysis captures the
   selection of paths through the network, the assignment of traffic
   across multiple feasible routes, and the multiplexing of IP traffic
   over traffic trunks (if such constructs exist) and over the
   underlying network infrastructure.  A model of network topology is
   necessary to perform routing analysis.  A network topology model may
   be extracted from:</t>
          <ul spacing="normal">
            <li>
              <t>Network architecture documents</t>
            </li>
            <li>
              <t>Network designs</t>
            </li>
            <li>
              <t>Information contained in router configuration files</t>
            </li>
            <li>
              <t>Routing databases such as the link state database of an interior gateway protocol (IGP)</t>
            </li>
            <li>
              <t>Routing tables</t>
            </li>
            <li>
              <t>Automated tools that discover and collate network topology information.</t>
            </li>
          </ul>
          <t>Topology information may also be derived from servers that monitor
   network state, and from servers that perform provisioning functions.</t>
        </blockquote>
        <t>Another example is <xref target="RFC8453"/> that defines native topology, abstract topology, black topology, and grey topology,
   but all in the context of actual topology and physical topology that are not specifically defined.</t>
      </section>
      <section anchor="sec-topology-abstraction">
        <name>Topology Abstraction</name>
        <t>Please refer to the following documents for some background on topology abstractions:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="RFC7926"/> defines topology abstraction.</t>
          </li>
          <li>
            <t><xref section="5" sectionFormat="of" target="RFC8453"/> describes the topology abstraction methods and discusses topology abstraction factors,
types, and their context in the ACTN architecture.</t>
          </li>
          <li>
            <t><xref section="3.13" sectionFormat="of" target="RFC8795"/> defines abstract TE topologies.</t>
          </li>
          <li>
            <t><xref section="4.1" sectionFormat="of" target="RFC8795"/> defines native TE topologies.</t>
          </li>
          <li>
            <t><xref section="4.4" sectionFormat="of" target="RFC8795"/> describes how to deal with multiple abstract TE topologies provided by the same provider.</t>
          </li>
          <li>
            <t><xref section="1.3" sectionFormat="of" target="I-D.ietf-teas-te-topo-and-tunnel-modeling"/> gives some background on topology abstraction.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-core">
        <name>Core SIMAP Components</name>
        <t>The following specifications are relevant to the core functions provided by the SIMAP:</t>
        <ul spacing="normal">
          <li>
            <t>IETF network model and network topology model <xref target="RFC8345"/></t>
          </li>
          <li>
            <t>A YANG grouping for geographic location <xref target="RFC9179"/></t>
          </li>
          <li>
            <t>IETF modules that augment <xref target="RFC8345"/> for different technologies:  </t>
            <ul spacing="normal">
              <li>
                <t>A YANG data model for Traffic Engineering (TE) Topologies <xref target="RFC8795"/></t>
              </li>
              <li>
                <t>A YANG data model for Layer 2 network topologies <xref target="RFC8944"/></t>
              </li>
              <li>
                <t>A YANG data model for OSFP topology  <xref target="I-D.ogondio-opsawg-ospf-topology"/></t>
              </li>
              <li>
                <t>A YANG data model for IS-IS topology <xref target="I-D.ogondio-nmop-isis-topology"/></t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-add">
        <name>Additional SIMAP Components</name>
        <t>The SIMAP may need to link to the following models, some are already augmenting <xref target="RFC8345"/>:</t>
        <ul spacing="normal">
          <li>
            <t>Service Attachment Point (SAP) <xref target="RFC9408"/>, augments 'ietf-network' data model <xref target="RFC8345"/> by adding the SAP.</t>
          </li>
          <li>
            <t>SAIN <xref target="RFC9417"/> <xref target="RFC9418"/></t>
          </li>
          <li>
            <t>Network Inventory Model <xref target="I-D.ietf-ivy-network-inventory-yang"/> focuses on physical and virtual inventory.
Logical inventory is currently outside of the scope. It does not augment <xref target="RFC8345"/>.</t>
          </li>
          <li>
            <t><xref target="I-D.ietf-ivy-network-inventory-topology"/> correlates the network inventory with the general topology via RFC8345 augmentations that reference inventory.</t>
          </li>
          <li>
            <t>KPIs: delay, jitter, loss</t>
          </li>
          <li>
            <t>Attachment Circuits (ACs) <xref target="I-D.ietf-opsawg-ntw-attachment-circuit"/> and <xref target="I-D.ietf-opsawg-teas-attachment-circuit"/></t>
          </li>
          <li>
            <t>Configuration: The L2SM <xref target="RFC8466"/>, L3SM <xref target="RFC8299"/>, L2NM <xref target="RFC9291"/>, and L3NM <xref target="RFC9182"/></t>
          </li>
          <li>
            <t>Incident Management for Network Services <xref target="I-D.ietf-nmop-network-incident-yang"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Many thanks to Mohamed Boucadair and Reshad Rahman for their valuable contributions, reviews, and comments.
Many thanks to Adrian Farrel for his SIMAP suggestion and helping to agree the terminology.
Many thanks to Chongfeng Xie, Dan Voyer, Brad Peters, Diego Lopez, Ignacio Dominguez Martinez-Casanueva,
Alex Huang Feng, Italo Busi, Wu Bo, Sherif Mostafa, Christopher Janz, Rob Evans, Danielle Ceccarelli,
Sergio Belotti, Aihua Guo and many others for their contributions, suggestions and comments.</t>
      <t>Many thanks to Nigel Davis for the valuable discussions and his confirmation of the
modelling requirements.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Ahmed Elhassany">
        <organization>Swisscom</organization>
        <address>
          <email>Ahmed.Elhassany@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA929a5PbRpYg+h2/AitHrKrcJGXJstuqvbdnqFJJ5na9pliy
x/fG/YAis0i0QIANgFWmHYrYv7B/cX/JnmfmSQCU5OmZiRs70WMVSSAfJ0+e
92M8Hidt3hbuJH0yn11Mr0/S06pcuG07Sm/c33d57TaubJtRmpXL9H3j0tOs
cc2TJLu7q93DSUov6Tvpf00vnVs2ybJalNkGBl3W2X07zl17Py431Xbc5Jts
O17w4+Pn3ySLrHWrqt6fpHl5XyVJs7vb5E2TV2W738IAs7Pbt0m529y5+iRZ
wsMnCbzduLLZNSdpW+9cAquAgbLaZbCJq62rsxZeb2jFF1mZrWgLT5LHqv6w
qqvdFh67dC1+NL+n4c0nyQe3h5+XJ0k6TueufsgXDvY2K+/rrIE5F+2udvDu
trEPuM2uoAHwy+murTb+k04Xf3tVL9YOxvNf6EhLV+QPrt7b77Z19ZAjXPJy
Zb+/L9yv+V1e5G30OAB6W+T3+aK3BnkCv3qTr/I2K3An+PHMbmCe20+31bYq
qhVNcbEr2nxcZHtXJ0m2a9cVHE2ajuH/0/R+VxR89FfFKkt/zB5cQT9U9eok
/XGXPbqcPrtNlhcnaQVPTdb41D+v6cfJotokA8O9dmWVt+lpkeWNCyOeIZza
NQAlvbqe25Hv6IV/dv6BcbVtJqVrh0a/ahZZnb6ryt+ywv0GBwCwqZowza0r
3D3AfpFFi8e3Jit5a+mW8M4/t/7RQ1u5XQMSNOk7uBthhvkjoD2+YMZv6cHJ
Ch7850Z+50HhDrR1fgfoBLAfmGK63rhlelass6bJyv2np6GHJ/7hzlRJWdWI
sw9w9RK8pOHTeDxOszvE4AVA9XadNync/B1dp6W7z0vXwB5cKvc9re4/fZvS
IyInx3R18yUMAxgMY2Rp4/ht/DmpDWGiR3dAlxZIlyYAWyc06RFAvAUalVe7
ptinH8rqsUzhO4P0E3nUPVTFg6zVZXWRuzp9ap57mugO7vbpJvuA2OZ+hfu1
AIzEl1pc5R1cMOdKWCtvkTYRb5IuDRDTRZHV+f1exnGL1i2TatcCvGEcgHBa
xWQs83SDCXG2XNYOqCS8n23u8tUObj/srakWOZDIZfqYt2temKs36dMlb2Xy
FA/JhTPKy9aVS9h3BYtHKC4RQFlau3tXuxKpC6wFx4GxYT56CY4Bv3mAHQBk
4V2mDOmmWu4KR4NtHNwyBq09qwljzCZfLguXJF8BCrQ1vLUgKvPvjT8AzwJH
SAxcPoE5iSw4RwAAo8lwQ66A+bOWie+SMFH2C9e7SB9y96jw4BOr6qdNWjKl
5RkEG5oR3J1FsVvima2rxxQwB6aCnZV0/Ai2CsapeVrYipusJiM4ogdYLDBI
3pT7FU60hKlphU21q2Fofba6w8kyZgb0BGFL4pEJ3sNrULjlyh3jXYEV8C5r
B1elYbCkm0DgaWFC+gmo94AZ8JJbrLMybzZ03GX2kK8AvoCLVblqWkFzWvCi
qmtX4I96PWCTmwkfNkMENiAv3NfVJt2u9w1B12MWTKF3Sr+TAXjxeGRbvI3Z
XeEI/3AD2wIxHSgc3KGjbAFwwotX1W7EwFvAbl09Sl27mBBwkxZ2VdLhIkyv
ti0uY5TOruUhxBG4rMRVi2I/onNnrKGFFHi2Md7WLkIYpGhEKwCnXLZY88ZH
Se9BQDg4NHyUL7z9jeCJpGGdI8rfAdoAJBvATzMmnZYBuYD4eITwQekJJjx0
0nAjSiQItUNRi26YW47gxhf5kq4Rjv33natzhxQOPia7kukQUgSmewBbwjs8
kk0GWF5PiPh8Aib4AzyxyUuQEgul+dXd3+CGNHp36aZ4dIU90OqfGkIkt0Fu
IfwBZzMiSpiXBLh0W8H6GLBwZh+OD6wsHIJfGyARrhd+zFpmwPhjn/ACWfH7
0ptM/KxFtPGIDSLuiB/cJ3UFkAJo6q8jYNBL2PCCby69CeIGEBD5wNeraZ+B
1LRat8c4EoCbmAI8A7eoQfghscGlCzzSQDIzuMwIWSVRfMM955mkb4H6u18z
kCTdqIOCWUOSKKFKVjaPQLgAIxpmWc0O0DAD+fzp7J4gnP5reg+iBiDzI5JT
nZDACoJqhgj2T09BQkme/owP5Hx/UJ6BTS3HbTWGf/jebjMAsRDdxgvB1eM/
PZ0wewPmmAu1E8YBcKjtgR3JAmH1MDcB09LIpoWzHKXwDQk7yAc3Dl5ewPph
IE+SaT3HtAm+/464Dt1EFVZGiScEiM+ekfCJIFHKYKBwJkjrdtttVbeKRkDx
y4bAisgF46dFxZwf1IccaBa8x1uFA4dnF3uBQ5cyZUVTefJEWFGlTBeF83jm
wiwoIXKcBZqbGg5pscEwSvgNz9vys/tdKSicCGtjxCXGR4CASQoQQ+GreyAh
tcg5SLlhOwj+EV4x+AFP4uiv1zM4BzyjHfy7dlnRrvkyNPvNFuQkIHLJLYjM
QKbHZ+UKtguUCvZ/dHsGd2SZ35NwA7KcA70jr4RRZbRIHNkrPqOg0uFycKUZ
8QQv9NIbyXQGGwAlFo5n0zCvQDkUDi/i6KCnAW80CBLYBy0ATr+sVPABZN/R
qjunGJ0t8zE+eLrrwAZahBJ90AtvpBB/bMyCAiyYOxAdRGzO9kj/UezeZjUy
b0+ydAaSDAO7ITbA7OR//Y//qQxFSXCC1y9FpC2GhiLMAcStgBKgnBn4ty5r
nuNzwwJapoRBwIwUaeVKR+ueArKkv//+TzdvT799+fLlx4/8959ffffNx498
N3nUIOHxjQD0bUkexZEf8gwRrlwC+eUhcffEeIESMj98hON3qcoZQNlZSNBL
RApbBSQCJA5iEsg/90SASF6jExF+1ITLYzcmfEQl4Km/ErCYZIZ3pR3fZSjE
i6pPSD+fzi6PBQSvXj7/M2w7DNG2cIIkbl8jS0QBenrdhMe/+QGhNPMED76f
jd9MyJ6TP+zHcsBjTxLH+6xc4RS4l23VMrME9Qv3hetBcbEqx79ML9/Jvo4j
lCYi5Q+DgWqUIa/YNKDmqoQwJYqAdwdGR8F05QzZEgStWAy6hyMhHQe02nZ9
V+1UWLnPEJJ4WKJx+OMCnhHOuypRqUhFFqa/A8EAWnAHuj+yVpBHSb2jwWhJ
glOBESNW0WdkMoWZ0vLgJHktaFYEiUYWYSnV8IIYWUWcu9vlRatwIPgF7GIJ
yM6Cr6IiWBCVBlq3wzXKTnIexIM4Q/EMmRYgH6jI4Voh3UHJ76q7YpbYkRHt
t4jqTFc7kFrsaqZO+YNTLlOJLgpyw8YtUeoSCaJJVND6vMyxzJt6t4XVHo88
VwU+wnyi7UACVt8H7OeWDwQje0B5oOaBS1wobWGUgNIJkg3h1LYA0RgmBYpR
A7+jv5Cwgqy9g4lQwJIxBbGWbltUe7yyk+QMya9RBJE0+mMgJId9wiCLtk90
Ga0f16AdwEVjubqLAaQ79g6OmQ6j1MbVK9IBeMcHCDyeQF6wAN3H0aR2rKQp
s2Ejjjxg1RLPMHT2rF2skVOSlFzsPdqgztlsqxKV7STakh8LgU8Mp85BkhVd
GA61rhCopF3UD4TpAHGQPckaovoUDYnQCYskqPA2vRROfB6uA/2rIvmkZ+io
YBokXg3plnCZlNGh3I2PeIzjxRG3QZQOoh1g0WqXrUh8BOyaJFMgoyO2M0Sj
MPpHVgfPVeMnx8xYPbqNZX35Anbwsz/PyKICmLQAGRvGRTECiAQKEvKENxjR
qvFgyPLtVqTj4lBL9+CKaqtGJpLRhfWhJiNyExGvBVBIlqAMJCdoUrolNY8N
FkTTPrh9irb8Jn1y8X5++2TE/6aXV/T3zdm/vJ/dnL3Bv+c/Ts/P/R/8RAIf
rt6fy+/4V3jz9Ori4uzyDb8M36adry6mvzxhC8yTq+vb2dXl9PwJk057/hlL
/XeO+RCgnlzfAE145/XpdfL8JTDg/wKM+cXz568+fpQPPzz/M8g1dJWFDZRw
FfgjAGuPiOMyltCKIgGJA22BaFeAK7dGoygeVg8tN9kHwEu0j4mkeg+8qXok
Agkwbk7gBblMJ8mJdxCw7bDH6wZkUFBT0nTav5lWQ/G2ILitqm2gOg+rZ0EJ
gZv2dXtGczY8LUW6rpGOLicw5byzEDsljKbrRPJQlYTYwll+ur4MIjZo47sG
1A0SfkWAYGsNjOF/omUee8rhv2/yVvVffNksFd72i0XAkkSekf4IrBTtYvst
C/hBmD/hbaOezLYNGOQO1aOaOAqsuEYO44AUb1wD6tJ6f1fny5EIz3mzRz6T
l5NwksjcRA/YlbkxRKRHgEYC/viXYzymu0PPRj8cE5tDkQdmRUjf6fnBvjrz
kSUr+oYGBIy9GDRfITpOD5m2hKDENjQ9naAPxcJjg/B8pIMwKk9kMxWSmj+w
JR5t+npxBMPxXI09mLWeEt2lcv1V/0VbmxcGGXs3VZmDeI0YkabE9jvS7Tpr
rLpW5PdusV8UeK1PRJr/4duX3wGdIAHbXtK8OQSrzBjV1jngXr1Y79MjwKbF
h+NJOmtxSzjcrgk2XBUpkHQRE2RrBv7pgZ4eBQNeR1c0SH2MUAf53NXwzLPq
gf71dj2mA6wz4RA4gfdOIUePdk0mHYE52RhJmGQ5AmdBrQlFAr8uj4yH19eH
LYCS3bEFawg4vlpzSHvwkneP6nnZhjScjgKs9OeczvoFjc1/f3ucoGMvnPzB
gUV3GjwOa5rXufyIQ5MiGhJhuid7ul9u59qooEZed5UTPw8DEuGbqtjRGYj8
QIJTNDzf885FMJfSP521QTj11grCgkG8F6rbHZksnXx5FHcfu1d4Q+EEpAOh
o1glJsSvmgge6AzI8tlbwZrbfTCy0qJm767NjHeO7TrAI1zTKltVZxPyPoAt
4Btw8opOlZyHbb7Jf/O6DIhOxAaMFM6+DZmHyTwiUn8mWjltS4fTd712dJLO
gaX1zp5lP3L9LIqqcSyfX81n3gta5B8UvZ4HN1PKilHXCxSwH38mBS8QqoCa
9Ovs+uGlsFL48/vozh5YbThUK7b4pwAyOoGQZjRStNWiKnQjV/Prt6N0Nh/P
5sTcXr+7VkxSiaKHoqQoy4/WmWi5yYipFiID8yey96SWWalAMPc6bsnkLDwj
JpW6eaYXq9HVGWx8hob04WXq8nyMCio8+HjTW8+iYDMeCvHy9DjF2UEleajU
NU4DtGynFXpiUUf2ytoXIbYYLmT5QKEYQ4GwtmhiY0mw2tpBUK26c4HkZIu6
ahqUg9MAhvRn1ijzotixToIDxW7nLrrcoUWrab2Fp9oAiyZ71Dgl+olBGV97
LD5Jz5+j2cYhYnSIO1E79HTsrRfRAzO6qrDY98qqfp5fXY7Sq9tLfYQ/iK+f
mOfXDGS8LLACvjlnaFcE/Ib7NH3HmPLT+fSSHxe8h4fji0TXiB8B8vTs7N31
CbNLJi3qfkTxT1jJdN6MevZlekc5OusqytVptjleHb5HOV6f1MF/edp2Bzei
4FnhjMqGXST0Le8C/UIND3RxfT6n7+Y3umxBxJPOtZD5g5deiNILlPXhE8CB
/2gK/nn+ZvyzQstcHB73kzjOl2WCiPFj9Yiy/IilL0Qk0r8V/9DahUrcf5Mg
AcTijGwSIFRt6WejduPdeeM35NGa8D9bAm54AxS+6GWlZgHM3jUshqP4rfho
r3Kxn1g+/4jiSVGkllRmdwBDsjaVno2h1xbG28JdQ1kIOaG/tcyEPji31ctD
2hd57IL05Mpqt1qLhwovFzqew8+6C/TIy8GSMKDkxtAuJeWRgN7YoLqlYzxE
o7DSffZIoPMa9XBBjWbftG7DTkAf49FWCS5whwFfrZMgDTFCs1EIxS5SG8ik
j3Jz7AbkC7EXAdbGtJDo70MtkuAvJJkBhKU7wJ018XbylqkFkd5Tnq0bt4Je
uABAXFljZguwnqC1liLpgEuAl4H+OaP//gR3DP/78xxo3Y1jCySewhvxX4GM
Zd0FFP7ZBuvMx48gzxm9nRwQ/fe9cE32CrZBNCfCudT90IlB8vq8cQKs6my7
Fs+jV+vJ3A8ICWdDNy2h34DAnqiVASNlNASjZ2SYpOklKSFH3m/whPfK63oi
6zkO+JjwOh4wrGARuXyCAMKP0Mx+BhI8VV0eMHcQwoLsvOZ4rUQ0ZLwTuBPR
D4nSIDc7NEAtUWAo/MkzTrTtdBrd76w/SLrBMISEHIdDhhui2BVQvQ0astlF
R2E0yHvVgjJJzpEAZxK1MTQN8WqAwq4m8Vg0GpG6S3udBmI+BIaMXwgpoxAR
pEQC81zKi7md2Dkb59M3jX1RmBqi8X9w0Fk6EHSW/GcEnaUHgs6SWevVInIM
hl0aEzfGcBEgDlkm0KInz29rcgJ5Omkj0pIvj0hL//8SkdaYkLT0cyFpiVoI
mUFLWMCXhKCRcThHEU7CjgI9HfXeSrrxaB372WAIWjocgkYoQAh/lwFYByJJ
iGP6GNTmGV1dsVdF6DocSJL8Q4EkGkQiAB558c2FUJJRMhBF8m+IHEkHIkc0
DtXrAoFKBPVA4qPE/w03oFwgdsEQq11O7hU9KIAF3mXi/v5Wef8sSXd7eAjF
H6SGaRCBSKk8Mhen2d35IEKOWeOH/CdEJRQfjz4feicqfBjJIBiMYNFLVqKI
FMIFe2jo0UOf8cDE6xXg+OVhM/OhsJkkTfuRM2mHfgwN2YxErMARvP9igBt3
g+0GbNU4RNcTMsTX5VZmIRYnTQ9Yv8OS71xRlSsJ1whb9dsI6/cgx6AOu2g2
D0j0eBi5y2BoqM597d7EYzVU2NNj0xiAHEZhmohO2XGbbxxh1/2O2K1fxlO0
1Y3z+6eg+AAtqPMqYMf0ehaQA8Me4usVvDsiJSGzZ+LaM+cRRBawFAwgxNig
UbrbLukTu1ML18qq2KpTbdBk7f1lfCt1Yf3xcZ2nMM0OfUhRCBmsm2Q087BO
QY83nWeJEVP0P+qSDm8COfFt3AZuYeFy9IOzQ71RskIWf/b/ohymDnBElxrV
zBwv1mPJsh+wRg6Hkg35a+Lv2iakYRkly2RHwchkaRNHCJlIsmZ9V2X1Epmo
xHHageypcARaCYpfdd8+cjCvNd1SFFdFfAU98FFsi3Eq+Ng8G+MiwcN8VLmH
FOmpiHn4Nq6XwqcJvVDwQY4DgOTAzB0MVrZqg+OUqvw3uQ7brG7YXK8nQHG6
ZAQpMm+CEkESLewKfELcMis6Xg2PXnzIiFLXYh38PEpxJB+dkUR8atQA4wPu
z+uUFGv+K2pUZlQr5lZBthQ0RV8bBiqRyAriKglgFP8T4pdRdkOfR4hJCXfa
21tR/lhw8K9F8OG7yfeSCAfH5UXkO6zdG6MTDYZHXN5i9NAKxTo2iZgdkpUl
o1hi5jYaznOU3yNCHqs4hbfI3DJ/dRF7IuJAEPYSNJ9n2PPTbhiHmOGJCXhe
YKPbwjVD1YxtHSMv3fJ9osfo/jCxtxZjxoVxVbPix2GSBZp/Bp46aM21wczO
bojWT1knqN7mRUHh0mqd0Dju+AbB6bLeusnZ8fGA0K/YNgLHtwpGEk9OEOta
ujkgTW1wEhaMh3EYQ/dAYgFNfbMhEd/or8lX6ZzVZH7WJ82yAhl0RZCnGjXM
iBZEem85dr+us13D9jpR2Xksn64kQaTI2xa7RqGpUQSHuEcUrUNUJCdiDGsX
kZSHjXlAjrceiQNfV3w0gGKsc0aBQEdz3lj6EqM7v/oKeBYZyM/IpCaGYE7m
Y7VJADGY9Of0JW+jAPGhwhhz8jUz6JQMapTR3a5BIbgBxEQoeKCYhK9bSdOQ
0XFgdVSSqx/Z4UOVYyS2hyDt5isvF47/kqrpywax2qhLXStxmRYWg9bSogi+
mnty3xaskHutEmXeSTI9fJTsyq7z1QoXzxdBKR1bafE+ivrpZ444WzSzrifR
sFSzFcCUUYiNVSI1QvrcncnngsEs4yVyISFegPQYDsPqhMyRDHmjUeT3dtmh
YNI0nQEnrugKVTaGewBK3eUtHcvIjn23QcRWqwZgQUImsDsKxGOgTNg7Neg7
N9tTO8Pok+sf0aKStSu26SfX3l+uN0RE601lvYnxJmpAI+eJukZwQy4onzwL
WuK5VgApIYpMLTod2Z6sXw9lkSiNAEP46AGj5wKbbWIp5f+9OXt7kp7dzmfp
/zO/SL95/grzuvFqfv//TZK/lmJLg+eHduwvCQmhaqX3ImAIqb3PdgWKZJVq
4lFGTyD9kv+x2BHbuMs10YKuut5vvOuaOv+pe4nX3l8Cf2d0H96LTRxVXcrW
rmQOUSheja7z3RbFHGH7iYdGN0crduf20J9vu95iBWhJeCqLVsgHZE+iq8nu
1vFui7qL66w4VZ4iqulQYJ5avDXicIhYEnuQITm628fPRgETQo4l2yftZvsk
yaFfNMPhuxcvOG4n+H4kekLuINrfciCqFCW9KpmQu3JNOKSvGLxKovsCsk2h
Q93tidMCcq3Is+alMIU4+d7h6rAN1YaFwKs+qHi5L7MN7AjdnQmfJ41OiR+I
f5SymRGsVTy6g0U95ksUGB6yvBBjLchCGeWLhUxIyids0EUV5KBVlRWSAFkl
mFBvTAE424qz/kYwS8HpPALzosqWoi5KwqnD7+nGSFxpWBi7BTFxHDdpAdrJ
IL/loBRm4hzG3b/51hLn9QYTvF+GeC5jqKMwFQBEVW17CSwJSb5o5FtXu2LJ
5iMUim7P0H8fYvc6tlTB0FMe+hyGRurhwRdmNDF5aNnmhH8J/zN4o7oXRyMG
nA3lAji+G8C4o8IHiY8dHPEd+s0t1UJPiM5LppB2tJ7A4mvyvd6DcnyXLT4Y
D6RwFcC6+3G2/NuOAyAo0FCOuEl8iJ2uTRCWjP3ZMtuKHsZ60IjuChVfyJsG
ZJeUPAAo+hZ7dWSyZ7PhBaMjyWCHZm/AJ0xQIVlWDJ4A+r+6fXq6zpARwd2H
5S6YOQ0dwEmSfA3UXoxIhj+gxaXgNBg2JyFR97tT53Dk5ReW0rELkV6bZOSB
rN0a0zofQmCNjsjmL8a/sNEJLG5qkIKJ4Uk6Y4EZ+TT8VpCBHgZf5kAyPfpS
IgyeDnEdFCoWaPwBhkdG3DXqxMDKLckpKNiYbIBopKZzAA0NowRcVpfEIL9G
uwEflqRPnvgKN3zeXj4lpws/uXFZw2tR8kR55nR9OIFeXVfMuIEBEcCqTY5H
5Y0LtJfaaQiKjyT6Gg1kgv4RMT9BVawJeM2+HakQwlgsxiA08gTiXmGdD+GT
OS7kwal50evrUQ7bF8ihQRXohhmya8v7HZ8hJ33W46PPiFp7K0XiBQ0raabD
onxfkh8S5DcZi6eK1z6lHLgAfh/S232uo7FE46m4+pjoc9ZDW7bSDOBE+kjE
9U6kGKBUicvJ5NDN8dHTudvH0YlS0MUv7g+B8RjNhDDifV6DLC8mnhDj1V0u
1z4YSrs7apxEnUVMJxnwJQVmJqpyyLb8Fyqx0FiGEXLPDbvoEBS8TjWZM5Fc
oWCgyiJgPR+PerE5FM4GqZvoCDZYsyCKZFZ2W6+AGfCNetqks9tO0IpQXeeN
gh477iXZ0pDfsB2xCBMR/jGrl2SkBUqFGXwcFSLBT0hL0eelioGu0BMTwjw0
sHnPNzs6vTXUbDHUASAz8pZ0VJR8gW/ugP7jd8VutSIV4xgoFsABzWUjuWFN
EC/I1Rs53NkCyLXL+A0kxf6zBOns7jOCW51E0eviTQqmZ7qf8CyKbmTdqhaM
m6bcgcBLbZZrhaOGO5vZVP1jW7Kid6FzSaz6FqTYdUYI2mZApEJ8KgjlJRYa
+Dqdq0mdSEteb/ADHtlPbHWj5YiAgiq72vcHbP9i5LcDpfWOZDoUbTs8d5Jc
Vq3gdtb5kRQKLCtmT1u3BciAholmaOG0pXMYoWw6GQW4pbdiBi3oAbTX6BjE
V1UUMPQpYDgdIN1BfT3ggvt1m3M9ieC3xfptzPkH779P8ehkXAEpW7mmDxDJ
dyRQgExPyqUIesAOEjEE+nJMXTq7A4pakGoHonj1wJE9tQORe8FRiBjWZnP4
Q9015jfZAsT4JvekMGQWMrcxPvrddlVnS3GZkb6xIwKydBhpx9UBUQDh6n1K
nz8BosQrHjAKVl0CWkViEbp8QuAcmRZAKIKZQ9GKUGdl7KheivFF0NE8gmg+
1lFMokhYB5p6mohwCi72r8CoG89PEQtOiDfZqVVuM5oVh/kpwmj8xEqz0uls
KIKMV5KjwyQrOoAbef1JD0A8TSGXFk9KxHQ4zMUHDA9FY5w3Dxv6RORDB2SH
VZyoAILUgm1THJUUohtji1RsTOlDFx/phusb3/2/XTTrh/38m6Ss5FNSVmSY
9ROGzZH7eZk/5Mud4XWcW0RmL0++JbHQchGKLA9xSJ8DhCbroh1TpK5uxHo3
DP5LBczk05Zi41ryvrOmWymFYpJiN1wEQQpC8iAki4ZYdz04AQJEwbnEhxfw
NTVC4pk5kg2GJv6BEiJmVgsP5QUYNkgOfR3qSLShP6VIBeGvY8RsUzSKkN2H
vG1w39nyISuZaN+H5B0gJD5XVDAZdWWgzvDLhQPudota6m0FKus2A452dHF7
e8PuxIRt7TYCj+w6nuKjrPYBHVwFD8nacmRJ1MhCjiMnGZWWM4aVGk8MulFz
VOzZriQu78yvfYwUwSt1xBpLdrEmHBiiiO7tVyyqZkRrQqge4Y8IJeElQf6S
lJW87fCsZ0MheigFbbdKk6zQgxIDDaalEDnVgBRYet4EG6ptEmTBxQelMLOf
fkm17Ao5ktiuuKqqpRZooOscZLr7qJqUlf9IE9BZrpXJpm9B8ZBir+kpzZ3+
/hUwhPF9+OFjiD713Dk1v8uiWWxQkAkxJndbqD3xuHbs7w2ZbH7nbLBlLu6W
pnQY6ujKKJHdory/gr+9/NYNteTr2HXgoaBasVgj1kO1LCV6riwSC6emu0X1
LGEBEmYUkEr0LusAsHbFY18FZJGxs8JLT1wpBNloQqelooQ3CchmUUQlYIUk
rAJvxz5U7lUEt/IDJaNphr1uWWNTuNQJ1/pyRtMINYNC/CJ5uyXaxRigG6Rd
ZFMwll++CP4oVec21Sx2vhLKAOagFKBmp5yWLhnqSM6C0YklBZ4LbcFp68Rg
qBMukb/gATPKueh8KAIbK6MBcsgNaz6P11/G2iM3KEXOq/llkMUf8Il+mSHl
M3yu6DK65HOMLgxiaQniC1p2g1HNosCoY/lXrOGIU7I64LE96xWXSpJLL3G1
JDGYsMgQTCvi14rpRf/OhqjKIl+p+Ks+enUxoIFEn/e3yLtS0TfAHHpVw17H
5BHTlZyj4zGd4i8agXA+DaWlhkpmyZbHr7sls6YmFGWoflYIU3ebLWjHwKyb
g1Zdo36ic6t4YHN7t9K3tRt01FzGNKFyIJIjcA19FTt1ZCr3w7MteRIqoXAx
TYro0/IpNvImNsNUlOK4CMFAwSQOuvDrvXeCcHXBIhh9Pr1VOkQ7q/pw8ZJV
LKJEBYc9xff7QSNvYN02LdWh6uIVdlR8Go68gqVoETLPHw25Eb0GnaTK64KT
S89wFDQcVmHgSZRuJWpl4ZdDrueGFjoT/6XfkGYvxYAPgS+ckBTYiK/UGeIJ
xJ7PVge/YbKLZZhZBGS8ToaWn3GkTI5hMznGnXOaOLJBrKWFgwByVTWt/WeU
hrLgiG1kMiQzdEfhasS7INq3zlfrAlOBxEkFIC2q6oNK0IFo6MCU8DTCsmzV
ltKv8JVVxUkrW9wz/oOSilEhWRTEQ5skF0gx5TB8Xd7hxflarSYdSgONAZz5
iuzD5Yot6kHswdEoYEs98xVnOnjg+NoFUfUplmI9CYgrgmgIkrW5YhASCowg
Xy0lwJDdMsDz2EjBYXMqTmZDmP9/njciBMKQYZNdZCis4hnoxEkniqEKiGCP
TmMU9NhjYfvsxRk9cQ3KC20L00T+HeDZlzKyfz8zQixjLGNZ4a9asNLHevlF
cfIFA0D5/Km606/VevP7V5poqa72sVp2Pgb5oOeG7xgmjYrBfmiybomv0ofh
eHtWT3LAFMZmp4a8xE8nsj5z6O+ef/v9x4/HQQIWc2onsVZq1PsCg8xiOWPA
AT9Yss1M2Bho8EEnMkt62sTWgnJJkaAYYkxCu3FBYHrWAhbglsdYJX0nxIBD
PUQ78ZH1dfM0yXz1B4mMsGZKimumsw8BV4aX4e6L3Mt6nBDIRkOhDP2zstEe
GvVqRDjjMbc1bVSAC/EHozjunoQ6f/NUyeKSV6JWUfR1tlffdOBmOVoKqNa1
aIxaCcbKCaQlUNAxaWAsQYfz0QOWks6AQmiupVRi9eB2OgKA5v6IhqS6+psE
54pHi4s6RSlCfTBa+em24zk9SS9C9gITVrkGwYCpemrWorMqVrVAEyrJS+Wy
D6LYAdjzSoNssAMOKKn3JiinEx4G9FEq47K1m9P8ZE7QI+r8V5bMZ9dvZ//K
AUniTZS6ud88fw4CMB0U2Y2AUWoe5q/5hihQPJyn7kRLbTwU4v6EQi76wVLY
1yW6cb23xZSF2GSJhGYc6bnzbbZgTDCArQAoqC80KKz/Us0HREJc4ztGCr3F
FBRy7SmX4pIuQlDIWx/8NQEunlEtb/R+PXZuCjpofHnVhMmAzy7ERfzMGUwh
2eEkPcXIDe9rZG8wV0eNfOQyiKjUIVzTjxTURiFfbumpUqLC5gJFGvZeHOF5
jMTXiiufrzOMfbrJmw/hQN+hEUwyHDr7NYUlTTl2pDKPCYZv4OreiMLgORMP
O+LH4KRY8dBi/vSlyaOdTLBjw9fpe3Zm+DsaYmbEsJI1Iqiq24OSHZa6Vza9
oHL9Kb0WySI1LgBtkGiQKGlELlBoIgwOcTiYmkAcm5CuroCYS2UJ6tzEKcZC
ZhGf2IjKrIm0n6Yd3wEW3+etITCdW8NWX07DpUeJevE2c64VhfskAvRoIkJ7
AtcGBko6PjBTRygBXdCnnTBpgR3tmnaQ0VSc+Bz7wwB+RDTPGL53Dgmgh67h
Z0BFFcwYXk6xWibEsHcwqOEWj8BfjI2a8gb4TCesoVFQj7n7J+mV2OHNGgx4
uhxwvEBdihwPNugr9kN9HQalkzlJp5RfgEVs1PeFmbhj2+vLtBxicw+a51DT
oQk8jUHEH1PuHSVyovpFM867rJqJ00k6h8W6CFIqFBkJRjBO0n87I3lqdlCo
+E/UOdiL/Z8VAZXaCKjkUxFQo2Dc5MgD5UyGmZlnWPdXOwraeuCC9mKegq/E
KbMxrEkDKEqur8BITc+GJFil6X5Pd3stZqzEw/v5uZz2UUMVCZ5J1SdX4xdS
8HhQOo6jF62G8YZCqY1awbHVRpfgL7z8LSWC8DJoFUX17XmZPrAwrayQrVa1
WwmExdsTim6xtdE4XeEH2Jc1xFkDnIasz7iSOHV9wRIGxc5h+n07kuAbrbTR
cnJRMIgBxKRUAZNX4m3izxKvRZdfJ9by5wXhgQh/3+4gC3aDnlN8FOMNlVwi
nzKCOoQBCXp23/5vbCw8PHzwn5GUsapg5TV7jxTHWFNLFCOjkFlbRT+Servi
GjosyyUglXVHCPHHPEfUzhfuWOqlJ3dOgkPLRognFytnmGrqHquAIxNsMjIS
ivYGITo3JHY+bUKsidayJgSusSNa4jZ3brmU7kDkD+t2WrIB26HPUkd650Ju
NCaX2vEVw0VFC5WeEl9vuJL4JnMZfIE8ZNDk4yZrCDE3ueW4/lbILX5FwWZh
A2SC8g0ERNxKpqW2keEQ4lwECWx259VIb1HjCo77rdOIeipbzT1SdPWnuPr/
a/yXdNpdPa0kWbha6geHnAfiD7XUzcPpyFqJ8xyd36QPTTq/Eb8rc45jdYLc
2ph1Pr5uXs8RshPPSo5JYPmZWlQM3uPo0h/5M/8To8WxlH+TYgOChrGF0DiA
pAYkwDih1lzMPSNWZurc01VL4UixlJ1JZTcL4gk5D+nbTz5zjP0bTJADQjzj
BI5mg3Z/+eWYuyOZ9+EJHzviCxQd3ZFP3X9xPOHIexsJU1dsCP5CUHK1xfcS
Sau3iuqI7mrK3UW4CrmxySHqkuyoSCqnT4LuEfoVaMAuG8RNjfbff0dXPCaU
uI8fJ1+yJOlAEBV8/OTem+FhNbmA6tyqE9eVD3ldlRvOt2HuzEsG3P6HdtY9
rj+K+TjAtBV3cU6NKFOu3MEA4VGXeUOFaazBkqwTfrqqdHzy16bTjAnbNiNo
WKgtNdL0h6Nmbjuq18D3HK2OqM75OgWhNyaZ9s1wchV9sEkSCT3zOP1Iv/Y9
dyWQg2EcJCETQE7RJGpF1TJtzFwZYILEu9rWnOHmRRKmKpGAVLXVJ0BJLHqj
wX4OvSYaW87WhG4POV/7NpXg0NiuECwFQSrr1VanUj+dXDFvxrH5KoJhITSV
dvfow4A9LE0qlwg5zJDQMjtKMFiVajQ2Flg1O1GoeAwMUoSmVQwnMd5yzTp8
il2iXqYRhF3aMMRwZhPplDGQg0aJ+474lXbE0KQhsaVZw6CuNoDIBbxQKXkh
1qAks8VwggBpjjxQhsc10qJwoDQTFYKkdIuCq/FF/XDQgMIykmYNhMX4wjDc
oEnDo2E/K5aZu6yKG9HkrUSFUJjqndfFMZaHLmmBaMg5uov9ccL0jORepOiK
3pIOqvWQ+3cvkQ5ng/0U+qeEERLUZMckf0pOtXUTu2WvD/Frh0ItZpOT/YSk
FG51nh+aDMSJ55P0DdAsbAHCsmj084kETjXeJqOFh0m+GRyUbryWS6McBCdR
Xs6XfawQrOig8lviDKtEyPKEWw7wgnxKV6attlQg5LosUXadDzgXJ42IsNRn
5BG1Msq8kD5N3CVumy0+OAwuRFsGyQYvJjajKwbIrOQ02owrli8PAW9kRGx7
CwUymgvPdkAMQZOkct5hlE/JtdIILIpfWCl/4yjthO6LT2sdRQmyrGORArHd
tZ53U0Ua6vhi1ugDPrT4FaGQZdC+mptKwQMOCmvN5pq2RCqiDQUSTWdDEjPF
upFbhlpIUd9MYpgSRGFrcUj7Tk5S9nSFK/p4e7FOsckXdfWIBAYtnRmltWqJ
UTzrbyfoJGmxYkpdVEPYr6huDpFoDqIf0WYsI+jadbU0IAreFiOHMtcCOAv8
sICznLxZO0YXDC2osVo3aDgrTefAxYG6ucTwAVKEGq6rwDmZJN2aU4nuC5cn
T7zIbMoacc1EH5eKFmMyiEbcCPu9NB9MqMmom0bqbTWV6OlJ2L/dM9HRdxSW
dZiORtAQbOZCtVgAHoNZlv367eRg1PathlHijF+lfqprYUjpVPYm1QIGjt9w
UmPC6kbxiO1ZuNyR1OnnYuNYZRz0wmM8qOBQTETqCTa0w3KOJbOiwPDyO43c
o1o7VJzUW5nyMrGxIbHub7YrgPYCYPD3SKUE1CuQbrEhni41t6/Fu1W7imqQ
+FIS90B9KPUy1jwtuDylck3fKoFAugfyO+ZUXI/dzUDkrxWOv7KFG2LEyptP
CUqFyfZl05FU9Tert1Y8YSjq+KSWG/iWlF8AwVD7Y0i9TO87RVk55wopwYjL
E3OdLYJ2OURtxZ7gibal1/FRDbRx0M0J06Ry8iMtLr+p7lCi5MiBR3eX3gFB
RWmIe5gH9E09+nL0WMdgZWpCRNuWkALafQfVDtnkEg6xY/vhIYePHrnRg2Cr
oXC9aTv1nq7ZJbfFxNW9FWv1XOnhFxEDFkpsLXU28XZtLHmLBQ1ow6o8N/2q
l4mtAcrGUkwq9UgQQzdChRiSoxAn61MaBk0TVeQ6YHkvVNCIqjgFFsJEPbQU
9V7MMtSsIJ1GYs1JXuFCOW1VuDpY669hvg0W1t5gigmKAr9/tfXfjSn3D5MN
3oqKFn7jvMC9l1bYJHoobmoXVVbz3XVpyGApsR3Nda8+jJNrx+4TlG64nJw3
dXP4AmbTsG8d+78tuJyDoGDtAOMzhCjIdHBzNltjyGAxeRRlF3OGHOdqxrWG
Q1ULFqUoyJqLSgY/vw+Q4JbiqV/0KIqtXsRlK7AcQkrG7GSD3mxJmqCMm5rb
n6BrxluYNX7cu+0wz6Qhn7OaIEJevlxRKurwvpFMSL05JHDAcyO5UFWt1T4F
qfm02VDUYP4YF1pW7TmuUaIpHcA+8tIloYDrgKq7zLNVWTUaiCFRLkP8jo5H
VBoTFe5DTZUc+xrhApWmn/Y8XOw8zm2MQ70R8ceC+aHL52u3r/DOOdROCg6z
jVKOqAIgLFsTXnSqOEdoZO4GwlvrczWWjFrBwViBWDqg7iL28MmNVaaUlcY5
WSxZsmZBdsSG601lnasiCS7dUoQhdkRTmf7OlQtGCRuQfSaWP5DQg5qrcA/U
8CGfc0wPQ5XEg/FfSRbfXUESG/VtsSJkkMdQ2EhPGO5sYhRZE2r+xqcGpW+o
pArxHwqZ2LH7O7aiJr12GOr/5Not+7ENVyY7q3Wacl+f9BYuVXp0+eb2OEmu
4TR00JoGrVd+UGkENG7hBRoZe2gcHk16EMj3nT54XOm14cp4ou+j/ASXxegH
iuJiUlLH6gLDHV2Nkemm0UHkqfAV80LIR1Unjvuh5o1H7mMg39TZlgyKDbD6
Rg3UWnHy1eQFLumPAMUjDHtrE1Ndvts3kqr2GcUP9F1qjI3jdeUK7FxTaxC4
/UHm6dS9TryqIMJdzwdk67AZFiPdyOluBgN8VEvC9FBXriS9D311KHb75Q3T
8riIwRCTsyWkdGDq5+udmoBBY9A1WA8kfSoQe88/lD2Rv0pEiCBBHP3+e1/k
+HgMqG8P/OUfO3DvmAZw3lU1iXu+gKqJBoXvhDYnoQT4CToc0q8V5TW/1dQI
J/cFooP5znZB6LbYJu8rvaDR2Cn+3y1J7qHGkK8nzebwkPjluw3pJFl/Crjg
k4HapHSdWWTgSYmSh3VPZLPTILMd2LDdIEymlmwfCTX54v3wQnqbGiRcto5b
PNuBvVIUvK2djByDJoz6uFvQKeuSDqJxLflgeEH8nXC9717CJM9wxE40m6mL
geqWkdfGqn8U+dyOgfLNic2qHKy9eYUA6j3S/dB9OhynDKMfjumH2UyLK3WG
m1ckXgdX9Y/dxJoqelAVeg3ca1wXt4B0cXwK15YGkvobVV7h/rRSo1cKFviS
N3jQ6nwAOWBJfYgWfKRYyAxdlzQPEUZNi+24aw6ehrd2GckglEiCCzDyN4G1
S2l4UlcZ8jiOVwDxmvMdcR0rpkPe9Od9Qr4CZVRbyLi6rIzk7ZysMkTivy8h
mMQSOV8YXCopzv29s91KkrX7PwctTxw5ZAJUQxf7WJMe4RteWpRIYEw4Emr9
4OzuJGKCWYxU/paQKWo6rfVxTIGhTnuPxodmUtVuohlXoqaA0mtqZZv8H9Vj
OqkD6FACCtSm0uS2dlJOuum0HGzRVgxQgq1RexuKInkbnHR2WEkVbLp5ChSN
XUg2j48ACRoWh/CgB2Xo56e2CrZNQCcnpzecNhj8ieblaO5HZ7MVyW0R9UBe
YYMrkz/+Y7b4kIG4XjZUq7GzyIziorLmc7O2cd9buwGAngQUfiHkDgImehQl
TcxWWZGFpiYTXoOwMtXAqfh0w95ENjyRzaHZbTYgOPgGvAbw0WKU+wmBlUMw
3QMQQtSr4zZMM4wovh2EBriB8j0mS97wlDy+uDVrSdLXaiFSxAN7R/qoEZ/z
3M8N6izah5i4ZV8EDqBIepk3Otg+FAjwTJviPjUqi8IUona5PirRpNUTZkS5
3F38MD9iq3qsvB/Aezxw5bItG0QkjYjUkIDP5lJYjwu5h0cJu4gairoWyjdK
IwlGo1U4ylPOG3t/GuDaNTHBzTob04KJvhULAogEIQ2qZYYkehfVWqJYey08
YxdPcoDijA2sljqv0hjBBMWFazPisxQ5xXfILTtXMsEd+tsPy/FDjVIxX9fc
BkHr8t9LKTOsvFOyZRkVZUNC+6Q7dF3Q6KLPXUrpjxUMBE0glENUxbYhTJaO
Tap3+4g4wkpvzv5l/Ho6n52OL67enJ2P5++vr69ubimhntqhmRZo3pnBbbQ4
54ZuSq8nojP9uCaJ+ko3LitFsqJ8It9IIqHYzyga38skB5NWWbjZldnmDpRB
NFkBjpQhyL6RGk3SNrmhiM6Rr9DLCiV7EoyXgsdGoGuru31Ah7gkDsLufPrL
2c3ZG4YeEflOSaq4Yx+PvqPscbXb0HcEJGmrhrBQ0xJXuCf6V2jTZSs2hGjq
eCL1EhzlHBujTZmPTcV3LffOy4lrpossg7OzL9Euivvekoya2OQTDYanWJue
uUAjXBmZOl2n9f5rU3VchKyPqqA2DoMahuK8Q8oFjTvYFMF2VtSZ/IhDU06S
i0M1xkTU1tYcIl59btNU+8x3l9HMUUGin2ZnP19fzS5v56Hvl0QhK8iDvMYY
0VZRg/Ne36+OVxQL2/SfSqgnudwBLBE7AArdNlnx0RZffHKXnIGRSej1gapu
ZsqEjgQFrs8fsEDrejqfz346G99eXV+dxLdGMdGXJNobN6eOd6BYGqD5vZrx
bcMiPatESqhFRXDQrJTVbW/M4T6hUm+sv+BEXZW9RaPXSea1E9nYZ00NVJlG
ar7h48dEVv7PqDF3e3sjjQGGq8kln64mx1FLvTNUxiNSij/7YFfm3R89hoB3
KhUVQnlV9ybVIbQWeaRAfIzLTzz8g3/MsPSfpapZO7S+UJiMxDyLA3IsdXJw
bHy7cPe+EJ1NkaSbdHP1bnx1fXYZ2BeomyzRRu2kpLHcSadS2hMsKPbExpR0
i1pZqdiLDyE9LWssbejZ8tB65Mv5ah9uY9w/mr+5PDbdwyhT1jYQo2i1mTcB
6LLpaJ5Eyj0eq4pa5jr4Mt9i/sOfqftb6B2XCD/xMS72fpq+ISEo75glZcL8
Xq1udCviarFHMRWRe+ymWeOe0hspQ5zBbviBJ8EW5wsTdHbTZh9c0pSgEa8r
VXIqKSKdoh2w2MdNiGEm65EStTPzBByD8WAVu7xZG3OvwKoy94dq+Utaeqfx
RRZgS81l7gttn+uTvyjOud13EEmQeH77Zgy3DKXYszfED8QsN2anO5+UqK7S
roXJs9jhhAYTWAckMIklpSFZcbHdsGk4vAbP+L7jPOJtVDWZ3qEh6WDtuDHJ
j26O72caOYCfeV0St356dXFxdTmO+oWyT5eUm+5+udfzJHoUjf1hgUExoqjS
XtBJaBe9AMFiN9QuWvoUTwZkfu222W3qGCZX8d/I4xSOEnm9KAPUC8LAThJe
lS/ngf5mVvE745h65MiFombWZKLi3Ql0391Mr38c395Mfzq7mU9j4Z5KRKGR
A3XPrJjEYsidMywN4d95PO0KzZ4tZ/BB0Md40bz+4f3BBsViGAfARkiclSZU
Rx43CGfn55JuaCkBRFhqtA+iAtbxwlvoLQygbuMySKZHwUbGs1EWNKKvVwg3
HblqUBfHpC6O/4LYPv5L74dR90wzocjAbf8GDAKzLlXKnyRTX3keo4gNFLie
m4GALDREfhICC9mk0GEGfB/ehBkoeZ5fvftlPH09B/w4vZ1dXSJ6XEqxJ6Rs
IQbQtB7TYDaUykIR9SOMDAjSNeuIPoctRLWwB9wtMQ7eq09USiD0HAxX1k7r
+6R1FZUJRqxLsz42mmPiuZq7uEoDliaXvNVefSftZ68o8om2a6Lida4lJ5hL
Z0Xq0qVyF+LBg0uC7l+TaMul1w00OCJCNZNqqW0wdOpAPXgPGFDCEXLV1nMU
mss/eSz3qgznmdsQPLqZNSDmisRPka6MzG/f5Bj+x2BsgLXjxeedq8ZFNx/k
ZqO+arCqKmK0N2lUjrH+QEtg2oJyy/2piXjaUkYREQCEPmeHiXUsb8lC4rcT
QOzrERCdnaTXBZZeiSvzsuNJXxmbA0ZPNrm5NphxsPiAGnKp+d3mHMMbh4we
mYmMirDtM5eKDDKgGuJdPLc9ekOc78kAXYiowbDmxnHxtu/vpDuHpMFQuCYo
diJlKYZFCUsiuFxOr+c/XpGtzafX6Wv/Lis2lXVU6MPhdA5Z8YCMroY2RsAo
J1JVh6vbs8vbGbNFn+5IeXBfBnTie2EfRAtYgmJNFXmQqYU0NOg0+r0/cepT
FLl6CTxGe6XE74GtSVhRCTLNluMwkihWUljNg+8y6Kt5CUTZUpYZ8kSPkf8v
nEudUGq5JZlaMITps44mOiutGakRF/3BO6Y6QfD3Y3BLp299HLAm5za7hHN7
w4LyrJsm+w+fGMdO8KhJ7zjagyr0YNK4KlY+H1Zp5a03p3R++tb8hAE+fYvN
oRUcK7D9iCbKSc6y8c6x2KajIoqU9Ql1NxQaNRczdVg2FKQrTbDg1mfwrFva
JCaLWEW0elR0ST4diIUnrzOWv068imrew1YcLjScEfOu0qGziylc5VNLh/y7
6v5sJsOk2v9OeKlEqHP0Ks3eC/eiiAFVa1ijecbl1zrOkZ5XI/YI9xwlfjUn
xjo/vpz+NHs3vT07Gd5CrIR5ZkPo3q+QEWoCeU05NhAjoH6m1/qygBHUDxXv
bNTyayv/YDUozs7RIj88yJ0rquDMJMFOvAmR9Vckqtm7a20IzEKPX5dMSTHS
OBuXIODtYUrSM0pPspELoiqN7M9Uu2yUmG98T5XouRBPw0TK/CRlbU7S1zz7
//of/7MHRGFbZU/YFqWQvWO8IwkglJuLqV9SKZ/6eAsoMVSyVLmbxBUSk0o1
YzM0g40bbt7s2lipJBo1crnhQ2f4cula82g4W2RJvvZXB+RsZ7VlexW1CKvP
/hVo+Hz2+ryL0WjHhGslwWzsZgEKQ1crnTaKEM2Ii7OI1Uxz2oeaBzNaLJe+
hUb6hBt9VeUT4KOcielIYWT5VHx3NVsWvDuqybHcJbfiCBPL8G2bkQLyhA0y
s+WT9D53BaeTaaUEHF3E8qXbcIGVVu9BVt/l8LneY1FxwBnMU3F+795Cu90q
bSfpRuNetR2Z93QyNW+dDxohP2KzWAN5Ufnn/P27d33w++5s6DMnrBglHAD3
p/SCCtCFmkv9wvv3vmtXJxY3hLKPur+YEHaqGxMCg5bYVAs5nfANYwI5UIBi
RFFsRvgOUkcb9UDirOmW+bYYhyO3labN44MC8PSp1siKw3f91p5O0rmkwCui
qliqiVWhg06Iz2ztRGFBJ2nUtSi8GWhP9MD09Lz7lSbXaMdNQuCVq8iaQ0Ui
FiJayQm/I5mS22VUVNgiVJ43RbUVHX39P3Ya/DK9fDcasrIKzvAsaqPk4CVC
oZCGaFrjimt/9mZ2c4DvdbQsRv+7nA0sJC4nTI5TjkLkZrNUq4O6vJf2UWYp
A2+z3k5ZuGxZzH2CIub3pOmZnjU+qCQz0faF0Yjp/Ory7DbFa4lpHhUlUoYq
U8IHE+1rj/dhJPp3yPSnfbLZ4C7eAWvkeFF2dZlwSas7G0mRNZ1da309ltrY
MaXufAT/xfvz29mYXLt/5BDYuEOqiZzAtGsDHRISOERrb8RduDZR3CINic/6
CdAVQXna1Ka6zVA2qB28tXHNepSu93d1LrH4Wd7s2YJ3eD167/uL4nbeGC3L
peN66xq3lRr9/Ge7zvB3/IuF9Juri+ns8o+AOhRIZOOTsmCflU/8ue8WTryP
xdrWbS0ZK/zGEQ8oh3GdV2nfGIyldUsWTMp8szWmmU9hfW9qCoRKS06daxj3
sTK3X3rPak8pUXfj8AnZTGTqnr9/DRfr56ubv/4R2IWAbCJu0kyRAiLsfBLM
N7SRQLnWORB+jH8zwStNOqL+zWW1weieuRTFOJrOnXRICjBl2TO1uadJ/IR3
XUjpD6nK2HNgeFUwRKuX6uenHbJ8F0yusf5ADnQ/KWyosGWoNFTFuHKzRGyX
WLcnHBrrlZQ8Ic4yKx3Gz7LTx04VDpbCuWaXXVnlkwc7FEOzzrfNAIqFJHHB
djy/UIlUy6z0I8R68rK3b8pfAw/4pCv2enAkn1rtk88vnxy83ZVog5Nu0Fy/
pW8oGlNVW2rZbTzVpBNIkVXvmZzevp+zMTKmMr5aCZadEd8gCKdZrbKot8QQ
JkqKlNroaAhfBLQTwpAcDGH48igEme8/NPbgzfR2ClL09PJs/Pb86mcyI2rO
Hd1GTP9w6dFb4KrHUtOIRT3NWI2chajk0S3QABIzBsraD/yIwhWth2U6v3n4
XmVNqd6T8begQ7DVy9Tf4l1gUuzs+uH7qZRdYk2FT4/yphY+boar1uNCYDgg
XVu0DT+Tz6wlJdKeUCN5qRJENbQMn5DocW6SXpU8mScRISc1AgCvJ1FAsdaN
UZHcmCu8zLanPgRlQwLFA6Yggo9Gy1uiSJG5qOL1oSe0FXsgOl9XWA/L148o
sn3fRpm+pnDDwGRZYBPT3o5yVDDEhGfSFMKfri81UzTB4ClCgdaHNzP6vnna
jEwK57eURYRRs69+wG4eHWzkIgZuyaL7PVU45YBs8m8wFmjtkhHXDtYs0dDE
YKR2DV/lRMNRfO4Z9nFC/IhaNmKZabQ1/Kok71oq8pHOdSr50uH7idnYD7ox
6aOg2cFS0MvmqSS3gr9Mea44z7gNX7IIHJaBT/VnV5OPZK+11tp3kiS/n/x9
V7XuY/IXDMZDO4vZ6lnhpQfvqSV7ICBYyehMpjpdKWVDGFZFZcXE2K7NxobG
n/949f78jayLzanC17ivMJPAvOZKWWx8lD5YF06MBh7YbzFv2Nvh7qnmmeTJ
aCEY2/sacBxLPK5NgzUO02C7rv+ZDBwS6G2TvdQP6mHAIM7rpk3C/kNDdh0q
6BPWoEjvxetJhBQM7jRYHElqdh4ZdO1MABLglHotJRgDbsnDy3FejvFfgYxZ
e6AcL4VyJEMnZ3YY9COmxDCqFsqTpizcK2LtMANO41aZhGGZksNjhWGkZWzp
h5kMYnx68X5+K0VBgCBxXx5zn2IxlbM2ENsGdhgCfy5vb67OmX8i5zploxrw
CybYarrgfOwQ2xNzzr6dUZiT8k0ltdHZ4lueLC+GJ07MxKFrrkzpXzZ1fu0J
KP0/MHb6qbH1XRh6oMgT+gxfX1w/ew0amOH7KGPB19TCw8a0waejQC1fSiY/
0ssfvnvZZwSyFAvdn27eJlxSrVo6rdMDr/3ajrGHnLeg6o28PL+ZKbfFFZFA
OQ6NDuP1fN9dD6Brtm243m6ywRYOqz7Ue365AHmKQvjDi0rstGln2q7kxVUk
JEPuSxJjlv1kuk4KUDChnoT4nPHV5fkvvXB6NYWyB9aoLFFmx0kQYVGc8NyG
bXFc3LBQz5UYR2z80D0KxkXR5aKdkpw/Vo+O7FR5a0iMLe2pMWJAW/7O/Wgr
kv6aYD4OCWIJrcFHb0hLwMbZFnRGjsP1cZnJ6HpTPYE/kTWUxrqhGmrXYgH1
KWAWJJGJzGocknHlw4mCMTjoHTTbm32ZbbjN1Jr0ulG/Tl/jqxKZaO2S+9TW
3d7sotOADGF+4DWRFXUZTbj45AK7KGRTDXOSRraVaEAc3GM8/zT+M7ovorG5
TOI7F2sso4broshyzo3EmA1eGvXaMIOJEuWzUgUaz2KrFNc18OaZQJxqauNR
soxhBybTXHfuSeJxk5S6EOeHJd7gtKmyJxXJlUp86n3kmX26Un9gjTu/Pru5
nZ2ZfBfvjRMwo7Gm8D5vramFD/TKvw2ZHlAgNQFp3GQjCa+QAAfMRQVSO8aw
zaOlgOiD641ie62Ebq8Ky/5f7DT3pYwoJ5ssqMb4jEZU+Np3RW991DB5yoMN
GWsnVNJRgrKQRvSEea+xbw7YWFONIR6yzMIaEJDeV9M3sAhRoA0cadcs09Jh
lK53d1gDsvrguD8XjElxZFpROTJSoT/S+zUZo27OzqcYhTn/cXbdT6KyRPvw
QQs1IU3VZwFao5tmqiknfSa87fjQfD6G2/hpONKBiDOH1egWjT970DmYl4k+
+pjtJalSWWC8k/9IlEy0upY3gBJyRkYY5fn9BLwvNBwiTmU+mjdaO9FdLHsk
grMNDOADzIZiNNah0869FWaBQ+4H+iWH5lqi2HYyOLlhMXWoxJDuXUMRj7ut
RFBLG3oPlcSMV5s0cmpDf5eBdLuQ/meUXE5DIQyGUsLI/DcauGYjYxMUDGSG
nAUbFmVoI1p0jYgNN8zruj/0Mg6TxPCUMGSuTK82feztNoQW0UMexSg0SyKc
QslhY89WzefNDG+6RB72Y3g4Hbv0yBPFSqINM6Qdazj32QXIiz/O5reUT3hh
MwlXrho3cKgYY3hkfL+LigoJUNFFmGJFVOy3qhQ3/PEoQdtIRYn8pAwTOcMq
l2TnqXeOa/SMInMvhWJ078OeC+mjEbZNn784+eab9P3t6THXFunWsDrCQMax
lo00v/pSkBSEjZRQuzsSi3/xzfNX42+ew/8Q01588+Lb8Tffj7/95tgTGgOJ
Ueo311kDygPqAwxCoY/16khWoAjENQ+sPiANKKgyzyHdIIve/oSKIO3XOtJS
EmXymET/VvP82d5u6zD0ZjFN3nz89KcmFR1lfjo9Z/nn9o+977V5rN2AHIQU
iCj9lRqZdArYob9VI6DIjE9NlvLffEDv2c3bq5uL6eXp2T+yqFCtQYp9kz/M
dAjWDndjLlnvi5o8hvoSgSu1a9MSj0J00cQqK34/n76enc9ufxlYr4cRrZMW
gpSexEatbhTCIQei8EZSNXCJIiyKng0nS7N12RSlJtnYG2bezOanVz+d3dCa
QoZHBDo2mps2eNr6jK3yY+kR68tvxDXZqTD8kuPxreVdWHaIsx9oNUgm4f5m
1V31y+XpjzEsD6242ZeLAL5PLY1rC1AaUTdCPYm6Vx1cnQapnr6/MWcNFB4j
dfhKXk5PL9RapNHI1Nkn/f33/8LVLtC8rWIRjK0tnH1OKDCkHdfZ7w0ySvrV
04cflEqSaOoZ/p09gEbUGHoMCSNWO9ZIADVGsBRzGspckmXz7PZt+jN6uxOp
7PH81SvYa7Z8qBa+QlzGboqm5WoBXA0/SDsYeSQQ8GXhqb0NWqYfqzjZQspa
AOGzrwFV+1OvoKR9wPysJeyin4nCz25gN+IVefnie3JJICFgT8H8zaVOT4mj
tpaOpCxjgkvHrWBCvmiRIIi16ztKTTlQETHENYR+iybJ+BmbdGrckm4lOIJD
p7v+C70yhP7Qvv3mldkshyzp2BITRN6t+1DQi+FhCwph5nAoERW/n/hoQOFf
KXVtcIT+LKtyYWsYlEuPrzHQK4akGrz6qnUn14sALRGG9NKoKzOGVpQd6Bo8
6bxp87xtnaIo4ducyYGJo8ejkordgbwn9MCIg+9FXmh/vi+/+7bnX5ue3l7G
SNyvZIsf6ZpES2jMCWFVfRopIHMSTOLxGUSAjd3l0fgTv+5X37+K1p2BtJht
HI1yb5Lb7XlYiyeX9PZ6GyagN6H6g9KexDRSMDm5QqPDjBj7W2eP0tks8ERf
MA359Fb6Qefk15APAkqQUldcGDdLgm49SaPdGuL3pEuyGPxPpKCdPU26B+r4
7JQrxiQtejHxfrre0rNGLlrzicsj38ZXpntj0iM/KHZ3wkCQ46FbBLqC5DvF
pRQDOpODWSRfbucwhPLdK5ceeawamH9ohAgVQxvKQeDb0oc2B+bzRMkIsbZy
uSkulYQRTNHZqPBep5wAmX/JEIC1EzQGjuNlSkwRZUYznKKXiLUUkZlLWZwG
EjdS86rvQBYNbnFl1iMbVhQYDez5QMqgYcg24CdKUdei1PbGDzL0w+ti1v4H
1hW4a3dV88DMET2VHM0CLfwEeIjp/oFlCNkMS/gEdR0l8Z04TGw/tUJiG//I
CuevZ2Rx7Uk88I4m6MHlvLieYSmhrgwThbbqor3lQ+6tKcotuMste08vhsZM
PBD677HzanhOP/anwEX0+z/oQAcRXijSlBJL8l9B41tWix3LNVyfj8xiJKRn
HKeLLgPmz+xoitZCUdh5G1I3HjN2/iA7IWZD/J5LqgSfoYa0U2YoenruqGeA
9JJb2+qVEk7CMbhLzSfNi2KnFB/0KelzwhXzJtyikOKa+D1cmA8MJJkFYzXZ
LSEmxuUy+NEUOlLV1i12NRq1TiVwSiXhacMDKQQ5yrkxRFcL+Y06ZScjv6rJ
oCgrW8ZVpl1E0/IBJZJ4SQp/XMbfm6A+RqWlfeSUVJnVt5owkba/o7Gpswwf
wf2u4PAY9vRqeIwo3OLXIx1wNr2c9sB0G8FoTXxGG4LTWeJb8Pp4PCZDMg6U
3gjCESJOPSImyV+ovs9J8Bo26SJv+8fKjiG+TX2U8QijfeGkq1GzAElEU8Kw
rDbMxwgqcxmwcEIG4m2rzYM7pkKfnOqrsLCFsGwfqR7BR8q0ItLPXZSxCsij
E/cuFXjKiU8MhECQ5qXx6zQMQgrOt8E6rC317ggRe3zoVIyUpoPhxm/q7B6r
9EZufarNUjLXxlFt4Q5PKeCdaUMVWky+5tUDkhhMVoclX4NgucglIcpvEjML
tWHZmTTNRWziNb767sULJIYEb3xHFiIdA3ykHfz9F4Aomcyx2qYtFdu0WBQ6
FIoS86Kv2o5JlL9yuAyOw7WuSZMx/gMfttMtFR9aqpKiwg4NhwN51zkbADUN
KzT5zcl8XeF9vZc2iZghIK2McAg2onnnLiCXthUkXbfNC20TYYppGi8NFcnX
1kg5N1pyvl2mNRPA8d10dyjxvNyqGfsYONO1RnfWG4l9AWicWZVaHtxsSbJc
PQJx5f6CAeT92OuQffCrnNHs2g7D/UJlZ229Q+/PUS49i3zV1YZP9tg7bnQr
7NHZW9dNXt5jw1Ppz4ToHAo19as5EmRLh/YudJ8hcxPLYhdRaKTeAGIOyfY4
Dme81pkvPH5CCM1Y/XUgGZGa7W9e7zEmyeF7G4IXudQ40L/bbztHuVffVaRA
PRPpWuP7EnlfOAey6QMSCUkiEzaCxiz0x2wfAoKPZu+uj3vjk1k9TDv1XbTa
qiqE/agtWTTHojhQaNPEQAUw3g78TndYNZOogLnUY+Z5JUaMT1xEp5bCUolW
9J5XTPAlO6g1XGg9iwNNpbaoUEu8nJGRhTcslrROYZ9RvyoQCCwFpnKYR2Bp
q9qFkDWKGWLPaTFgo+GiREaPRFOkuovj0hPq4fA9P7CWkQSEM5PzwJ4axZX5
3GDNnSQZKtITTHZBHj1Um2egLg/Hm4iy9iq2ww6W8fnaBJV/50WjIaPX0Pu+
P666PViSGnxU+gSOEoof8DQvr/2JyAH1rGvxKr+dPA9h/X9+9Z3ZokeR2zMT
+BC//nLy/MDbgnGffPdl710FEfXIRG6YFd0Et8FVBZlMItApCkt9f/G8zyff
hnYo2POrBcSB/xBijQGQ43ZXlq4YqyqC3ROw6fWXoo0UPgeRtVZ59jRkPTMS
Y7odC2qxRzfqgtNIFXlthOgjlUO/gf7OOetbOgSx/Na3dx7gJlas0xGmbM6g
Os9EhoaTv1Xcev7nV+Fdml0dKnzzdyti6VFvik4jDmP6PEk02zusxJTdxxeH
RL+j27Nj27lUZiMs+/yIWl9noHqLKtgvX37JQFfzt9cBxNoSDqulLfNqXG2b
7HE1rprtvadpXzIqVwjxw3ZGpQZ2wDOaaExEx1AW8BBSgrr60doVbY1qYtQ9
ssr6y4hvBme4YxHQvZ5zkMP5qImgemv5lCpeED5cU3jd0Xx6fayY9PKbH1Bw
l5Ga9Ck36ONDeWqhEiHTHeU6eXWStCacczq79CM//zM86D/8gBAy0s/MFz+4
0OE9rcgf9r5zki+SMN5nRCVMk1vP+PC2aTc6/8IkOffx1joXistc7gir1Mdx
vKRAklLpLSJDFwkFg6+/YLkBM0K0ftSn2SzLe7e5u57h5Oi2lql1NVr9WCrY
ckkvu20EM3aWPOEu9qP0b3lLxVILbLCOvxqcOM3rxQ7DM46mp81xtC+5O6jy
Zv6F8YJfQLcvQH3geaL0Qy/Q1KdWimVbwPmL+YUXq74na+35t+GrF2xYPn9x
qV+9evGKktiocvy34evnP7yQWWagwlLsyUXwD+G1VuyTy9FE64/aUuYygqAd
WjamC6yTXLgl35Xk9xNueu+W//eTe5BP3RN47IKKIqwzCca8qNYZap2vq90i
W2Y5S8U3rlln8E+2BsVRo4fymtKjKHCFbJCYF8HhIdzxpdEu3RtJz+nMNV3W
OQz3NkNso1HRqCK2nt1Ke1xToIwrtlK2Nltht6YQTCuJE52xT9dVubp38Mq/
5iBRv4F5fqqoutPrGnZyTbWm4fvcrar0HC7Sb6N0tiqzRV6lb6oN5ri43+A0
MEXL/TY+zZqs3AHHHSVT0B3TH3cA5fStQ5PkrM2KKn29a/JR+vMOIDdK52us
OAbABIH+PhvBarAzcLVF0fy/ZyXMdVPdpWfAwBtaW+4KAOKpWyyAXBZFPkJj
/QqW8toVVdvCwNN8vcvSd7uK7cC4WZL0G3ManUMIIGw659AF1mW+ggN4kz3k
ITTMH63InH4YPCNS7VTbkZSx4KaMOjOB2JP8b6qlxFi5AgEA

-->

</rfc>
