<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="/rfc2629.xslt" ?>
  <!--
    Generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.1)
    Using PIE Tools 0.1.0 from https://codeberg.org/interpeer/pie_tools
  -->

<!-- Entities -->
<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<!-- Processing instructions -->
<?rfc docmapping="yes"?>
<?rfc comments="yes"?>

<!-- Document -->
<rfc ipr="none" docName="PIE.f92f09.problem-statement-00" category="info" submissionType="independent" updates="draft-jfinkhaeuser-interpeer-00" tocInclude="true" sortRefs="true" symRefs="true">


  <!-- Front matter -->
  <front>
    <!-- Title -->
    <title abbrev="Interpeer">Problem Statement &amp; Use Cases for Human-Centric Networking</title>

    <!-- Series info -->
    <seriesInfo name="PIE" value="PIE.f92f09.problem-statement-00" stream="independent" status="experimental" />

    <!-- Authors -->
        <author initials="J." surname="Finkhaeuser" fullname="Jens Finkhäuser" asciiFullname="Jens Finkhaeuser">
      <organization abbrev="Interpeer">Interpeer gUG (haftungsbeschraenkt)</organization>
      <address>
        <email>ietf@interpeer.org</email>
        <uri>https://interpeer.org/</uri>
      </address>
    </author>

    <!-- Date -->
    <date year="2026" month="January" day="19"/>

    <!-- Venue related -->
    
    <workgroup>The Interpeer Project</workgroup>
    <keyword>next generation internet</keyword> <keyword>human-centric networking</keyword> <keyword>human rights</keyword> <keyword>problem statement</keyword>

    <!-- abstract -->
    <abstract>


<?line 227?>

<t>This documents describes issues with the current Internet's design with regards
to human centric use cases. It examines existing network architecutres and their
respective disadvantages in meeting the requirements of those use cases. The
document is intended to serve as a problem statement for a novel, human centric
networking architecture designed to better serve human needs.</t>

<t>Its companion documents are <xref target="INTERPEER-REQUIREMENTS"/> and
<xref target="INTERPEER-ARCHITECTURE"/>.</t>


    </abstract>

    <!-- Note #1: status info -->

<note title='About This Document'>

<t>This document is a draft PIE and so adheres to the
publishing process and naming described in <xref target="PIE.f92f09.00"/>.</t>

<t><list style="symbols">
  <t>This version is published at <eref target="https://specs.interpeer.org/PIE.f92f09.problem-statement">PIE.f92f09.problem-statement</eref></t>
  <t>The latest version can be found at <eref target="https://specs.interpeer.org/PIE.f92f09.problem-statement/PIE.f92f09.problem-statement-00">PIE.f92f09.problem-statement-00</eref></t>
</list></t>

<t><strong>Contributing</strong></t>

<t>Responsibility for this document lies with The Interpeer Project.</t>

<t>Source code for it can be found at <eref target="https://codeberg.org/interpeer/draft-jfinkhaeuser-interpeer">https://codeberg.org/interpeer/draft-jfinkhaeuser-interpeer</eref>.</t>

<t>Additional coordination and discussion occurs on a mailing list:</t>

<t><list style="symbols">
  <t>Address: interpeer@lists.interpeer.org</t>
  <t><eref target="https://lists.interpeer.org/archives/list/interpeer@lists.interpeer.org/">Archive</eref></t>
  <t><eref target="https://lists.interpeer.org/mailman3/lists/interpeer.lists.interpeer.org/">Membership management</eref></t>
</list></t>

</note>


    <!-- Notes #2: from sections -->

  </front>

  <!-- Main document content -->
  <middle>


<?line 240?>

<section anchor="sec:intro"><name>Introduction</name>

<t>This document describes issues with the current Internet's architecture and
design. The focal point for this examination are the ways in which the current
architecture fails to serve human needs, or fails to serve them well. This is
addressed in <xref target="sec:problem"/>.</t>

<t><xref target="sec:use-cases"/> provides use cases for the existing and emerging Internet as a
guideline for what a forward-looking architecture needs to support.</t>

<t>This document is referred to as <xref target="INTERPEER-PROBLEM-STATEMENT"/> in its companion
documents:</t>

<t>A gap analysis framework, as well as an analysis of alternate network
architectures is provided in <xref target="INTERPEER-REQUIREMENTS"/>. This
document also lists the properties desirable in an architecture in order to solve
the discussed issues; they can be considered requirements.</t>

<t>An architecture aimed at fulfilling these requirements is presented in
<xref target="INTERPEER-ARCHITECTURE"/>.</t>

</section>
<section anchor="sec:problem"><name>Problem Statement</name>

<t>Technology can never fix problems of society. At the same time, technological
and societal change tend to occur hand-in-hand in history: either the solutions
to pressures in society require technological advancement. Or the invention of
some technology enables a societal change, the need for which may only be fully
understood later.</t>

<t>The currently primary Internet-enabled technology -- the World Wide Web (WWW) --
so contains problems that require solving. The issues discussed here are
fundamentally societal in nature, or they are acerbated by current social
pressures.</t>

<t>It is easy to dismiss such non-technical issues in a technical forum; one
should only focus on the hard facts. One such hard fact is that technology is
created by and for humans. Another hard fact is that humans are not infallible.
The fields of psychiatry and psychology deal with common failure modes of
humans, and assign names for commonly identified behavior patterns.</t>

<t>"Cognitive inertia" <xref target="COGNITIVE-INERTIA"/> describes the difficulty in changing
mental direction, analogous to how inertia in physics is the idea that objects
keep moving in the same direction and at the same speed until something compels
them to change. Similarly, "decision fatigue" <xref target="DECISION-FATIGUE"/> describes the
effect that a rested mind finds it easier to assess facts and perform such changes
in direction -- making decisions --, while being faced with decision after
decision fatigues the mind. Having to come to a decision is akin to a kind of
mental crisis that requires resolution for well-being. So when fatigue sets in,
the mind may prioritize quick resolution over the most desirable long-term
effects.</t>

<t>It is therefore well understood that, as a matter of probability, humans tend
to follow the path of least resistance. The implication for engineers is that
"a system is what a system does". That is, when acting within the constraints of
a technical system, humans are prone to making certain decisions; it follows that
the system's architectural constraints "induce" this behavior.</t>

<t>While this section started with stating that technology can never fix problems
of society, the above strongly suggests that it can contribute to these
problems. It is no stretch to imagine, then, that it can also contribute to the
avoidance of the self-same problems by adjusting the system's architectural
constraints.</t>

<t>The issues listed in the following sections are concrete examples of the impact
properties of Internet technology have on the physical world and human beings
living within it. They all relate to human rights in some fashion.</t>

<t>A more complete list of the impact of protocol design decisions is maintained
by the Human Rights Protocol Considerations within IRTF. In particular,
documents such as <xref target="RFC9620"/> provide practical considerations for protocol
design.</t>

<t><xref target="INTERPEER-REQUIREMENTS"/> will refer to this document in more
detail.</t>

<section anchor="sec:prob"><name>Issues</name>

<t>The issues in this section may be societal in nature, but they also provide the
context for technological issues outlined in
<xref target="INTERPEER-REQUIREMENTS"/>. In particular, they provide a lens
through which to view the relationship between architectural
constraints of a system, the properties it induces, and a focus for evaluating
whether those properties are desirable.</t>

<section anchor="sec:prob-survcap"><name>Surveillance Capitalism</name>

<t>The term is popularized in the 2019 book "The Age of Surveillance Capitalism"
<xref target="AOSC"/>, and is defined on Wikipedia as follows:</t>

<ul empty="true"><li>
  <t>Surveillance capitalism is a concept in political
  economics which denotes the widespread collection and commodification of personal
  data by corporations. <xref target="SURVEILLANCE-CAPITALISM"/></t>
</li></ul>

<t>Surveillance capitalism can only thrive in a system where personal data is
easily available. Additionally, "data" is relatively worthless in itself until
it is linked to other data, such as linking a name to the purchase of some
medication. Once the link is established, one can infer further information,
such as that the person making the purchase likely suffers from a condition that
the medication is commonly prescribed for. It is then feasible to exploit this
link by e.g. targeting advertising or deals at audiences with the highest
probability of a "conversion" (i.e. sale).</t>

<t>One cannot link data without collecting it, which means that data collection is
the activity that fuels the establishment of more links, and thus the opening of
more potential revenue streams.</t>

<t>Attempts at curbing surveillance capitalism through policy tend to focus on
company size or monopoly position. However, as Tarnoff notes in "Internet for the
People" <xref target="IFTP"/>, it is competition that drives data collection. Specifically,
it is the competitive motivation to discover new or better monetizable links
between individual data points.</t>

</section>
<section anchor="sec:prob-infowar"><name>Information Warfare</name>

<t>According to Zuboff, data collection is not necessarily problematic in itself.
The problems arise during usage: when personal profiles are used to target
advertising to the recipient, they can also be used to target disinformation, and
thus drive decision making processes. Either is monetizable, and the logic of
capitalism dictates that such monetization avenues must be exploited.</t>

<t>Surveillance capitalism, in other words, enables power brokerage to become
indistinguishable from demagogy. It is no longer necessary to target specific
powerful politicians to influence them, when instead one can manipulate their
electorate.</t>

<t>A plethora of political events in recent years demonstrate not just the
possibility of this, but the practice as well. Psychographic profiling of
Facebook users, allowed and continues to allow for voter manipulation at a
massive scale. And yet, the FTC response to one such event
"has been criticized as failing to adequately address the privacy and other harms
emanating from Facebook’s release of approximately 87 million Facebook users'
data, which was exploited without user authorization." <xref target="CAMBRIDGE-ANALYTICA"/></t>

<t>Meanwhile, these tactics are further expanded upon in so-called "hybrid warfare"
that bridges the battlefield and disinformation campaigns <xref target="HYBRID-WARFARE"/>.
The basis, however, remains the same: access to user information that permits
to identify demographics vulnerable to disinformation attacks.</t>

</section>
<section anchor="sec:prob-central"><name>Centralization</name>

<t>Where surveillance capitalism describes the market mechanics that lead to data
collection en masse, it fails to describe the more technical effect this has: the
Web becomes increasingly centralized.</t>

<t>Web centralization has multiple contributing factors. One of the more fundamental
ones, however, is that it is significantly easier to collect more data and establish
more impactful links, the more data is funnelled through a centralized service.
Competitive advantages are gained when one provides this service.</t>

<t>This is essentially equivalent to any other factor contributing to the emergence
of monopolies; the key differences are that:</t>

<t><list style="symbols">
  <t>Antitrust laws are more effective in other markets outside of electronic
mass data collection, and</t>
  <t>centralization of data collection can be sold more easily as a feature than
a bug; so-called "platforms" ostensibly create new markets while enabling the
platform owners to skim a significant share of the proceeds.</t>
</list></t>

<t>The "centralization" term, however, is hotly debated. For every argument that
a system is centralized, counter-arguments can be raised. The somewhat surprising
realization in this is that most of these arguments are either due to</t>

<t><list style="numbers" type="1">
  <t>An instance of the "layering problem", whereby participants in a debate view
distinct layers of the system stack (e.g. the World-Wide Web vs. the Internet).</t>
  <t>Participants have an unclear definition of how one should measure
"centralization".</t>
</list></t>

<t>For the purposes of this document, we define the "centralization" as more or
less identical to the definition of "betweenness centrality" in network or graph
theory. "Betweenness centrality" examines communication flows between nodes in a
communication graph, from all nodes <spanx style="verb">A</spanx> via any number of intermediary nodes to all
nodes <spanx style="verb">B</spanx>. For every node <spanx style="verb">C</spanx> (that is not part of <spanx style="verb">A</spanx> or <spanx style="verb">B</spanx>), it counts the
number of communication flows it is part of along the path, i.e. it is "between";
higher counts mean higher centrality.</t>

<t>The measure is useful because it can be applied to any layer of a communications
stack, and may yield different results at each layer. For example, an <xref target="OAUTH"/>
provider may sit "between" an identity management system and many applications,
even if at a lower network layer, traffic is routed to each of these parties
along entirely non-overlapping paths.</t>

<t>Centralization as "betweenness centrality" illustrates the dangers of such
centralized designs -- the highly centralized node becomes a single point of
failure for a much larger system:</t>

<t><list style="symbols">
  <t>It can disrupt many services when the centralized node experiences disruption.</t>
  <t>It is easier to gain access and maliciously manipulate or harvest data on one
centralized node than in a widely distributed system.</t>
</list></t>

<t>The above describe failure modes of centralization. Proponents of centralization
argue that mitigating against such failures also becomes easier with
centralization. While true to an extent, similar effects can be achieved with
processes and tooling, without introducing the risk of these specific failures.</t>

</section>
<section anchor="sec:prob-oppression"><name>Oppression &amp; Genocide</name>

<t>The Internet is a great enabler for communities to come together; this is in
particular the case for minority communities that have no other representation
in popular media. The Uyghur of China are such a minority, whose usage of the
Internet to keep their identity alive has been well documented <xref target="UYGHUR-INTERNET"/>.</t>

<t>Equally well documented, unfortunately, is the "cultural genocide" of the Uyghur
<xref target="UYGHUR-WAR"/>. The role of the Internet in this is just as central as it was in
bringing the community together in the first place. Reports indicate that China
is using artificial intelligence operating on personal profile data to identify
Uyghur and to target them methodically <xref target="UYGHUR-AI"/>.</t>

<t>Similarly, the Amnesty International report <xref target="AUTOMATED-APARTHEID"/> illustrates
already in 2023 how Isreal's use of facial recognition "fragments, segregates
and controls Palestinians" in the Occupied Palestinian Territories. A year
later, the organization updates the situation specifically in Gaza, calling it
"genocide" (<xref target="GAZA-GENOCIDE"/>) - a view informed by the ongoing and updated
case 192 of the International Court of Justice against Israel
<xref target="GAZA-GENOCIDE-ICJ"/>.</t>

<t>From the perspective of Internet engineers, it is not necessary to understand
the ins and outs of a specific political situation. What is required is the
broad understanding that collecting large amounts of personally identifiable
information (PII) in a central location enables devastating misuse. The
consequence then must be to protect PII and avoid centralization to counteract
this.</t>

</section>
<section anchor="sec:prob-ml"><name>Machine Learning</name>

<t>The role of artificial intelligence in <xref target="sec:prob-oppression"/> is one use where
access to PII can be abused. The article "Artificial Intelligence, Advertising,
and Disinformation" <xref target="ML-DISINFORMATION"/> lays out the overlap between these
technologies in more detail.</t>

<t>It is one thing where machine learning is used to impersonate a politician as
part of a disinformation campaign. But images and videos of politicians are
public goods, as such persons partially give up their right to privacy in being
public figures.</t>

<t>Given access to PII, the exact same technology can be used in more personal
cyber attack scenarios: for example, access to voice recordings can allow an
attacker to use a cloned voice in an attack scenario <xref target="ML-VOICE"/>.</t>

<t>The ramification is that with more PII available, ML-based attacks or attacks
making use of ML techniques evolve to exploit this access.</t>

</section>
<section anchor="sec:prob-censor"><name>State Control over Media &amp; Censorship</name>

<t>Whereas previous examples focused to a large degree on availability of
personally identifiable information which may be acerbated by centralization,
centralization poses an additional risk all by itself: centralization aids
censorship.</t>

<t>The CensoredPlanet project <xref target="CENSORED-PLANET"/> monitors censorship of the
internet around the globe, using a variety of techniques. However, they all
revolve around measuring access to parts of the internet, such as the parts
serving a news site, or an entire country's network.</t>

<t>It's worth highlighting that access is not necessarily binary here. Rather
than blocking access, a particular path may merely become slowed down to the
point where Internet users prefer to turn to other resources instead.</t>

<t>In either case, censorship relies on identifying targets to censor. The more
access to targets is funneled through centralized choke points, the easier it
is to apply censorship in those locations.</t>

<t>In many cases, this can be as simple as government buying media outlets
outright, a practice that has led to the establishment of the Media
Development Investment Fund (MDIF) <xref target="MEDIA-INDEPENDENCE"/>. In this latter form,
centralization affects media production in any given outlet than access to the
results.</t>

<t>It is necessary to consider the entire pipeline from media creation to
consumption, however. Arguably the role of media outlets has historically been
to collect potential news, filter this for some notion of "quality" to bring a
subset of this source material to production, and then to distribute it again.</t>

<t>In a fully digitized world, collection and distribution find equivalences in
ingress and egress traffic, while the news production itself is a data processing
task. In other word, the media outlet model is centralized largely because the
data processing tasks would historically have been impossible to distribute.
This centralization, however, is also the cause for its vulnerability to state
control and censorship.</t>

<t>It is imaginable, then, that if data processing tasks are easy to distribute,
and the Internet offers the infrastructure to do so, that media censorship
would become a significantly harder endeavor.</t>

</section>
<section anchor="sec:prob-loss"><name>Information Loss</name>

<t>Previous problems were for the most part focused on data collection and
centralization of critical services. A different, yet technically related issue
also plagues the Web, that of so-called "link rot".</t>

<t>The term describes the fact that when a web page links to some other page or
resource on the web, the target may disappear at any time. For the most part,
this is an unfortunate feature of decentralization - namely decentralization
of editorial control, in this case. As the site hosting the target resource
of a link may undergo redesign, and redesign often (unfortunately) goes hand
in hand with reorganization of URLs, once valid URLs may become invalid. It
follows that any link pointing at this URL equally becomes invalid.</t>

<t>The web is not the only system to link information. Scientific publications
often reference each other. For purposes such as this, the Digital Object
Identifier (<xref target="DOI"/>) scheme has been standardized. In order to remain relevant
in hyperlinked systems, the DOI scheme also includes mechanisms for resolving
a DOI to a URL that "owners" of the DOI can update. A specialized service by
the DOI foundation resolves URLs with a DOI, and redirects to the current target
URL. In this fashion, DOIs represent stable identifiers and can be used to
create stable links on the web that resist bit rot.</t>

<t>However, as the example of <xref target="NIST.IR.8366"/> tragically showcases, nothing
prevents the target website from keeping URLs intact, but alterting the content
or redacting it entirely.</t>

<t>While all the reasons that make centralized control over information resources
apply (see issues with e.g. mis- or disinformation above), lack of truly stable
identifiers for information resources also make the building and maintenance of
information networks significantly harder. Additionally, restricting access to
once available information can be used to influence just as much as not granting
access in the first place.</t>

<t>When considering the preservation of the total body of human knowledge, resilient
to accidental or malicious loss, stable identifiers to information resources are
a key ingredient that DOIs unfortunately fail to solve.</t>

<t>In addition to stability, identifiers should also be verifiable. That is, it
should be possible to verify that a piece of information, a sequence of Bytes
encoding some knowledge, is actually the sequence of Bytes that is meant to be
indicated by an identifier. There are several technical means at our disposal
to verify such things, but they require an information theory approach that
URLs completely lack; URLs are not in themselves verifiable in this fashion.</t>

<t>Finally, if sequences of Bytes can be linked to identifiers, then the storage
location of that sequence of Bytes on any particular server is no longer of
paramount concern. Such sequences of Bytes can be infinitely copied and archived,
and still be identifiable. In this way, verifiable identifiers become the
engine of knowledge preservation that the current web lacks.</t>

<t>It should be mentioned that several attempts have been made to create stable
identifiers on the web, but the efforts largely failed. The most noticeable
remnant of these efforts is visible in the distinction between URIs and URLs,
i.e. Uniform Resource Identifiers and Locators. The idea has been for a long
time to introduce resolvers to the web that resolve from URIs to URLs, but a
standard for such resolvers has not become commonplace.</t>

</section>
<section anchor="sec:prob-intermittency"><name>Intermittency</name>

<t>Equally unrelated to problems of data and centralization, but equally linkable
to such issues is the fact that neither the Internet nor Web truly deal well
with intermittency, that is delay or disruption in communications.</t>

<t>The Internet is designed to be a synchronous communications network for
computers. Its mechanics allow for short delays, and a fair few efforts are
directed at making such delays as short as possible (e.g. <xref target="RFC9330"/> and
related work).</t>

<t>The general approach to intermittency on both the Internet and Web is to
introduce timeouts for queries, which then potentially result in renewed
attempts to perform the query, or ultimately errors displayed to the user.
While this is a valid approach for basic machine-to-machine communications,
several use cases present rather more stringent requirements; these include
e.g. command and control of vehicles in remote locations.</t>

<t>It's also worth highlighting that this approach to intermittency is actively
exploited in censorship (see <xref target="sec:prob-censor"/>), that is, access to resources
is deliberately slowed down to incur errors.</t>

</section>
</section>
<section anchor="sec:prob-context"><name>Additional Context</name>

<section anchor="sec:prob-interweb"><name>Internet vs. Web</name>

<t>In the above text, and the rest of this document, the term "Internet" and "Web"
(referring to the World Wide Web, or WWW) are used more or less interchangeably.</t>

<t>It is clear to the author(s) that these are distinct technologies, and that from
the Internet's point of view, the Web is but one of many application protocols.</t>

<t>At the same time, in practice the Web is used almost ubiquitously from the point
of view of Internet users. This therefore raises the question why this has come
to be?</t>

<t>The arguments for or against this state of things are too numerous to list here.
To provide a simpler lens, consider the following statement: "The Internet
connects machines. The Web connects people."</t>

<t>In fact, no parts of the Internet protocols are particularly concerned with
people. Addressing happens on a per-machine basis -- ignoring for the moment the
ability to address more abstract things such as multicast groups or more concrete
things such as the link on the machine that is configured to respond to a
particular address.</t>

<t>Web technology, on the other hand, is concerned with what it terms "resources",
a malleable concept that can represent digital or physical "things" as well as
oneself or other people's digital identities. Furthermore, through user based
authentication methods, the Web firmly establishes itself as being concerned
with bridging between the purely digital and the physical or hybrid worlds.</t>

<t>If this statement is true, then the prevalence of Web-based applications may
simply be explained by the fact that humans are trying to solve human problems
with technology, and this often involves having a notion of how a human may
be represented in the digital realm.</t>

<t>Arguable, then, from this human perspective the distinction between the Internet
and the Web is moot, even if the engineering perspective differs. This "end-user
perspective" demands that future Internet evolution is free to adopt concepts from
the Web, such as relating to e.g. resources and user identification.</t>

<t>Doing so may not only open avenues for evolution that the current stricter split
of concerns keeps firmly closed. It also permits the Internet, rather than one
of its applications, to become the substrate for transporting people's actual,
real world concerns.</t>

<t>On the other hand, as <xref target="sec:prob-intermittency"/> on intermittency highlights,
this in no way implies that all characteristics of the Web's design should be
adopted as they are in future Internet evolutions. In fact, the strong
suggestion here is that neither the Internet nor Web can be the complete answer
to current and foreseeable use cases for the Internet.</t>

</section>
<section anchor="generative-systems-vs-tethered-appliances"><name>Generative Systems vs. Tethered Appliances</name>

<t>In "The Future of the Internet" <xref target="FUTURE-INTERNET"/>, Zittrain describes what he
calls "tethered appliances" and "generative systems". In this definition, a
tethered appliance, like a kitchen appliance, fulfills a strictly limited set of
functions, determined by the manufacturer. It may be "tethered" in the same way
that telephone sets used to be distributed by Bell/AT&amp;T, intrinsically linked
to the purchase of a phone line.</t>

<t>Zittrain contrasts this to "generative systems" such as the Personal Computer
(PC). Here, a semi-finished product with no particular purpose other than to
provide compute resources was brought to market -- and flourished, and in so
doing changed the world.</t>

<t>He argues that the Internet is such a generative system. When it came to be,
few could envision the impact it would have on the world today. He identifies
as the reason that, having no specific purpose, the Internet was open to be
used for whichever purpose its users desired.</t>

<t>Generative systems not only offer incredible flexibility, and allow for
providing solutions to age-old problems. Human ingenuity will also be able to
monetize such solutions. Zittrain observes that the businesses that profit
most from the generative nature of a system eventually reach a point where
innovation no longer matters; instead, the logic of capitalism dictates that
efforts now need to be expended to shut out competition. In effect, it is in
the same businesses' interest now to turn the erstwhile generative system into
an appliance tethered to their business model.</t>

<t>This view is picked up and largely confirmed in the latter "Internet for the
People" by Tarnoff. Where the earlier book predicts the direction the Internet
may evolve in, the latter confirms its evolution.</t>

<t>Both authors agree, each in their own terms, that the way to "save" the Internet
is to re-focus attention on what made it generative in the first place: it served
as a substrate for nothing specific, and so for everything and anything.</t>

<t>Where the Internet is perhaps more focused on the problems relating to
establishing machine-to-machine communications, the Web has shown us that this
"anything and everything" refers to human concerns.</t>

</section>
</section>
<section anchor="sec:prob-summary"><name>Summary</name>

<t>The Internet and Web both started out as generative; this has led to their
respective dominance at the layer each occupies.</t>

<t>But generativity also carries a two-fold danger:</t>

<t><list style="numbers" type="1">
  <t>Any generative system can and will be abused to create or acerbate societal
issues as explored throughout this section. This lies in the nature of
systems that allow "bad" uses as well as "good" ones.</t>
  <t>Both market forces, political motivations, as well as misapplied good
intentions will lead towards turning erstwhile generative systems into
tethered appliances, often for the "protection" of some part of its user
base.</t>
</list></t>

<t>At the same time, locking down generative systems -- for any motivation --
is strongly reminiscent of the categories in which the abuses outlined in this
section fall. Here, three major categories can easily be identified:</t>

<t><list style="numbers" type="1">
  <t>Centralization, either by itself or as an amplifier the following points.</t>
  <t>Unwarranted access to personally identifiable information (PII).</t>
  <t>Denial of access to data in general (which may include PII).</t>
</list></t>

<t>The latter category explicitly locks down a generative system by reducing
its genericity to those uses that are permitted. The second category establishes
the data set required to make any kind of decision on which data flows
to prohibit. Finally, centralization -- as shown in prior parts of this section
-- is a key contributor to enabling either.</t>

<t>The section also briefly explores that meeting these abuses with legislation
can only be part of the answer. One of the reasons is that legislation is slow
compared to technological advancement -- but far more sinister is that fact
that legislation can itself work against people's best interests.</t>

<t>A clear goal of any future architecture with the aim of re-invigorating the
generativity of the future Internet must then be to work against these three
components that drive of abuse -- while at the same time avoiding measures that
would lock down this network in this pursuit.</t>

<t>We'll explore properties of the Web and other architectures that contribute to
these issues in more detail in <xref target="INTERPEER-REQUIREMENTS"/>.
Before that, <xref target="sec:use-cases"/> focuses on how the Web and Internet are
currently used, which need to be preserved in any alternate proposal.</t>

</section>
</section>
<section anchor="sec:use-cases"><name>Use Cases</name>

<t>This section presents use cases to consider, or rather use case classes. While
actual use cases are a powerful motivator, we limit ourselves to one or few as
a proxy for an entire class.</t>

<t>In <xref target="sec:prob"/>, we saw that while the human problems with the Internet occur at
several layers, the Web is the layer at which human-to-human interaction is
mostly modelled -- a new system must therefore necessarily capture use cases of
the Web in order to be a viable alternative; this is reflected in <xref target="sec:uc-web"/>.</t>

<t>Additional consideration, which the Webd oes not fulfil well at this time, are
contained in <xref target="sec:uc-add"/>.</t>

<section anchor="sec:uc-web"><name>Web Use Cases</name>

<t>The Web started out with a fairly simple idea -- but the generative nature of
it then quickly prompted new uses other than the originally envisioned. We
identify three relatively distinct classes of use cases for the current, modern
Web.</t>

<section anchor="sec:uc-web-doc"><name>Document Web</name>

<t>The original use of the Web was dissemination of knowledge in the form of
publication of documents. This is effectively what the PUT, GET and DELETE
methods of HTTP (<xref section="4.3" sectionFormat="comma" target="RFC7231"/>) embody: a means to store, retrieve
and delete documents from a Web server.</t>

<t>The scope of these operations is an entire resource. HTTP permits optional
Range requests <xref target="RFC7233"/> to target sub-resources, but here an interesting
dynamic prevents its use across a wide variety of use cases.</t>

<t>On the one hand, the <xref target="REST"/> architectural style that HTTP implements requires
that data transferred be "representational". The idea is that it is up to the
service implementor how to persist data, which representations to send, and which
to accept. However, it is explicitly not implied that the byte sequences that
the service sends and receives are identical to the byte sequences it persists.</t>

<t>On the other hand, the Range header operates on byte ranges. Mapping byte ranges
of a data representation that differs from the byte ranges of a data storage
format onto each is no easy task; it should therefore not be surprising that Range
headers are most often used when the representation matches the storage format, i.e.
the methods operate on what's commonly described as Binary Large Objects (BLOBs).</t>

<t>In summary, the Document Web use case class is best described as one offering
simple operations for manipulating entire resources (or their representations).
This is likely why the "RESTful" design style (not to be confused with <xref target="REST"/>
itself) is characterized by mapping the PUT, GET, POST and DELETE methods
directly onto Create, Read, Update and Delete (CRUD) operations. Even though
HTTP offers other uses with such extensions as the Range header, it is an
uncomplicated mapping, and therefore easily and widely adopted.</t>

</section>
<section anchor="sec:uc-web-api"><name>API Web</name>

<t>The next use case class treats the Web as a remote procedure call (RPC)
protocol, in which resources or resource collections are mostly referred to as
application programmer interfaces (APIs) today.</t>

<t>The API Web is not fundamentally distinct from the Document Web in the HTTP
methods it employs. But API endpoints (resources) no longer represent a document
or document type, but a functionality the client wishes to invoke. As such,
the data representation format chosen tends to reflect the needs of APIs,
where structured data is transmitted, which may refer to multiple other
resources ("connect 'foo' to 'bars' <spanx style="verb">A</spanx>, <spanx style="verb">B</spanx> and <spanx style="verb">C</spanx>"). More rigorous approaches
in the API web identify abstract objects via their resource locators (URLs).</t>

<t>APIs, as the name suggest, provide interfaces also between distinct engineering
teams. As such, common standards have been created and discarded across the
existence of the Web, such as <xref target="SOAP"/> and the currently popular <xref target="OPENAPI"/>.
These provide interoperability by layering a protocol for specifying RPC
invocations onto the HTTP protocol.</t>

<t>In reality, services will usually provide a mixture of API and Document Web
functions. The main conceptual distinction between the two use case classes
lies in the expectations around the meaning and freshness of a response.</t>

<t>Documents are by nature fixed and self-contained. They can be revised, and refer
to other documents to understand them. But each revision is effectively a new
document, albeit sharing a history with its predecessors.</t>

<t>An API response, on the other hand, is ephemeral. It describes the result of
an operation. The same operation performed at another point in time may yield
a different result.</t>

<t>In HTTP, this difference is expressed in caching. The standard provides many
headers relating to the longevity or freshness of a response. In Document Web
use cases, it can typically be assumed that a response has a fairly long
validity -- while in API use cases, this is not a valid assumption.</t>

<t>API Web then differs from Document Web in that the resources one accesses
represent functions rather than documents, and the responses it produces are
ephemeral and contextual rather than self-contained and long-lived.</t>

</section>
<section anchor="sec:uc-web-rt"><name>Real-time Web/Streaming</name>

<t>Beyond the Document and API Web, there exists also a class of use cases related
to data streaming.</t>

<t>Streaming is itself a term with somewhat ambiguous meaning. In our case, let's
interpret it as one party in a network transaction consuming some related data
(such as a resource), before the other party has finished producing it.</t>

<t>Consuming and producing can be understood as receiving and sending data over the
network, but may also include processing on either side to create or display
the resource in some fashion. That is to say, the sending party does not need to
<em>generate</em> data in this view, but may simply not be finished <em>sending</em> it -- live
data generation, however, is <em>also</em> included in this defnition.</t>

<t>In principle, this can be mapped onto HTTP in arbitrary ways. Range header usage
is predestined for a subset of this sort of use, but it is equally possible to
structure the resource into individual documents that are requested in sequence.
This latter use, for example, is how "HTTP Live Streaming" <xref target="RFC8216"/> segments
a streaming resource into individual media segments.
Finally, repeated calls to the same or different API endpoints may produce the data
incrementally.</t>

<t>The precise mapping onto HTTP mechanics barely matters. The main point of this
use case class is that there is a real-time component to it in a processing
pipeline. Producers of data can produce data only at a certain pace. Transmission
is bounded by the available throughput rate of the network path. Consumers may
also only render data at a given pace.</t>

<t>What distinguishes the Real-time Web use case class from the previous two is that
it includes attempts at matching the network throughput rate and latency to the
capabilities and expectations of either of consumer, producer or both. This is
distinct enough from the other use cases to warrant its own use case class.</t>

</section>
</section>
<section anchor="sec:uc-add"><name>Additional Use Cases</name>

<t>There exist a number of use cases for which the Web is not typically adopted,
or where adoption poses additional challenges that are not intrinsically
resolved within its architecture or implementation. This section explores these
in brief.</t>

<section anchor="sec:uc-add-res"><name>Resilience</name>

<t>Preceding the birth of the Internet, Paul Baran described different communication
architectures in <xref target="RM3420"/>, which he terms "centralized", "decentralized" and
"distributed". He comes to the conclusion that the "distributed" model offers
the highest resilience against communications failures, which led to the packet
switching paradigm of the Internet.</t>

<t>In the "distributed" model, communications nodes have connectivity with multiple
other nodes. In order to communicate with any node, the data packets they send
can traverse many intermediary nodes. When one such node fails, a different path
can be taken.</t>

<t>By and large, the Internet remains distributed in nature. A number of incentives
may push towards more centralization, but this is less to do with the Internet's
architecture than the interests of Internet service providers.</t>

<t>The Web, for similar reasons, shows much stronger trends towards centralization.
Works such as <xref target="RFC9518"/>
assess the specific reasons, as well as what standards can do about them in far
more detail than this document can.</t>

<t>Centralization introduces real-world risks, as explored in <xref target="sec:problem"/>,
some of which directly relate to notions of resilience. One such example would be
that centralization often weakens resilience against censorship. If the Web shows
tendencies towards centralization, it follows that heightened resilience is a use
case that is not typically captured by Web technology -- and yet may help mitigate
issues raised in the first part of this document.</t>

</section>
<section anchor="sec:uc-add-remote"><name>Remote Locations</name>

<t>There is no particular argument for physical location to factor into Internet
or Web usage -- but underlying protocols that facilitate connectivity may
suffer in some geographical locations. This has follow-on effects for performance
and user experience of the Web stack as a whole, which may negatively affect
its suitability for a particular use case.</t>

<section anchor="sec:uc-add-remote-uas"><name>(Commercial) Drones</name>

<t>Vehicles (drones) operating in Unmanned Aircraft Systems (UAS) commonly fall
into several categories; EASA has standardized these categories within Europe.
On one end of the spectrum lie small drones operated via remote control. On
the opposite end lie large drones with high payload capacity, typically military
in nature. Autonomous vehicles carrying humans are treated in yet another
fashion.</t>

<t>Projections predict commercial innovation to occur predominantly in between
these extremes; under EASA rules, this would be termed the "specific" category.</t>

<t>In this category, drones are characterized by several factors. On the one hand,
they must be large enough to have a useful carrying capacity, which renders them
heavy enough to be dangerous when they fail. On the other hand, they must
typically operate Beyond Visual Line of Sight (BVLOS), or else their usefulness
is questionable compared to sending a person. Finally, they must be reasonably
cost effective to purchase and operate, which strongly suggests that Commercially
available Off the Shelf (COtS) components should be used in their manufacture.</t>

<t>This proves to be some conundrum to maintaining Command, Control and
Communications (C3) links to the vehicles. Suitable technology such as found
in mobile devices does not provide the safety requirements mandated for such
links by regulators. To mitigate this, failover solutions between such link
technologies appear to be the most likely solution <xref target="DRONECOMMS"/>.</t>

<t>Connectivity of an individual link can fail for a variety of reasons, such
as through spectrum interference or physical obstacles -- or simply due to
distance. In remote locations, for example, it is reasonable to assume that
802.11 connectivity is not a given, while satellite based systems may be
available.</t>

</section>
<section anchor="sec:uc-add-remote-iot"><name>Internet-of-Things (IoT)</name>

<t>In accessing Things on the Internet, <xref target="RFC7252"/> is modelled after <xref target="REST"/>.
This is due to a combination of two assumptions, one being that
communications with the Thing itself underlies constraints that do not
occur on the rest of the Internet. The other is that REST is the default method
for accessing resources.</t>

<t>As such, it is not surprising that most IoT architectures envision the Things
to be accessed via a gateway node that translates from e.g. HTTP to e.g. CoAP
and back. A common scenario is that a number of constrained sensor devices
communicate over a limited range to some gateway via a protocol such as CoAP.
The gateway then is either permanently or intermittently connected to the
cloud, where other machines can query it for (aggregated) sensor data.</t>

</section>
<section anchor="sec:uc-add-remote-space"><name>Space Communications</name>

<t>Deep space, as the ultimate remote location, has prompted the development of
<xref target="RFC4838"/>, the Delay-/Disruption-Tolerant Network (DTN) Architecture and
related implementations.</t>

<t>Space communications has fundamentally different approaches
to latency and intermittency of communications than most earthbound solutions.
Whereas in near space such as Low Earth Orbit (LEO), DTN can be used to merely
encapsulate regular IP-based traffic to its destination, the same approach may
not work when latency exceeds the expectations of the application -- in other
words, different approaches for designing applications are needed, which then
put into question the use of Internet technology altogether.</t>

</section>
<section anchor="sec:uc-add-robotics"><name>Robotics</name>

<t>Robots have many things in common with UAV, whether terrestrial or in aerospace,
and can in some cases also be compared to moving IoT devices. There is, however,
good reason to list them as a separate use case.</t>

<t>The first is merely to acknowledge that robotics applications are on the rise;
therefore, any application that is best classified as general robotics needs more
attention.</t>

<t>More concretely, however, robotics present an interesting design challenge,
which is met by a specific design approach. It should be noted that this is not
in practice significantly different from the design of other modern vehicles,
but that robotics as a field represents a more modern and generalized approach
to the same kind of design approach.</t>

<t>Specifically, robots are typically composed of a relatively large number of
low-powered compute devices, which themselves are connected to actuators and
sensors of various kinds. While the automotive industry produces vehicles in a
similar fashion, it employs different standards such as automotive ethernet (part
of <xref target="IEEE-802.3"/>) and the older <xref target="CAN"/>, etc.</t>

<t>In robotics, the de-facto standard today is <xref target="ROS2"/>, the "Robot Operating
System". It itself builds upon <xref target="DDS"/> for networking. An interesting
observation here is that ROS2 leverages DDS as a generic message bus, while it
is in the purview of the DDS implementation whether these messages are delivered
locally or globally via the Internet.</t>

<t>In particular, ROS2 builds heavily on a publish-subscribe paradigm which in
terms of Internet technology is best represented by IP multicast. In fact, DDS
implementations would likely resort to multicast for networked communications.</t>

<t>However, deploying IP multicast solutions at global scale remains an ongoing
challenge (<xref target="IP-MULTICAST-CHALLENGES"/>). Similarly, automotive ethernet is a
localized solution with no capability for being routed over the Internet (and
does not provide native multicast solutions anyway).</t>

<t>In practice, robotics systems designed along this paradigm will often work in
a specific manner: nodes attached to sensors may regularly publish sensor data,
while processing nodes subscribe to such sensor data. Meanwhile actuator nodes
might subscribe to commands, which controller nodes may send. Finally,
service nodes serve higher level and longer term goals (such as navigation to
a particular location), and combine information from processor nodes instruct
controllers.</t>

<t>These are likely be very localized operations. However, global information such
as traffic or weather observation might provide, should be available to such
systems in a "native" fashion. Meanwhile, remote pilot assisted systems (compare
<xref target="sec:uc-add-remote-uas"/>) rely on sensor inputs being forwarded to the remote
pilot.</t>

<t>In summary, robotics present a challenge where their operation crosses into the
territory of autonomous vehicles: the design paradigms along which robotics
systems are composed are not well served by current Internet technology, because
it falls short in providing globally routable publish-subscribe mechanisms in its
standardized stack.</t>

</section>
<section anchor="sec:uc-add-remote-general"><name>Generalization</name>

<t>The generalization of the issues above, as exemplified by the drone example, is
well expressed in DTN: to communicate with "remote" places, communications needs
to tolerate high delay as well as high intermittency. The Web does not tolerate
either well.</t>

<t>As an additional challenge, automation relies on publish-subscribe mechanisms
which are not as well supported as point-to-point operations at this time.</t>

</section>
</section>
<section anchor="sec:uc-add-energy"><name>Energy Usage</name>

<t>Of growing importance is the energy usage of any networked environment. Using
renewable energy for e.g. hosting <xref target="GREEN-HOSTING"/> is commendable, but one
cannot require green energy usage in a networking protocol; no practical means
of enforcement of such rules exists. However, at the protocol design level, it
is possible to consider how much energy may be used.</t>

<t>The approach, dubbed "green coding", is gaining attention in recent years
(<xref target="GREEN-CODING-1"/>, <xref target="GREEN-CODING-2"/>, <xref target="GREEN-CODING-3"/>, etc.). In the realm
of networking protocols, the design approach reduces to a relatively simply
method: reduce transmissions.</t>

<t>In practice, things are not as simple as that: measurements are needed to
determine energy usage in a variety of scenarios. But each packet transmitted
induces energy usage not only for the transmission itself, but also for the
processors performing packet switching decisions. It is clear that reducing
the packet transmission rate by design will have an effect on reducing energy
usage.</t>

<t>One approach to this is to treat caching of remote data as a first class problem,
such that transfer can be avoided as much as possible.</t>

</section>
<section anchor="sec:uc-add-data"><name>Data Protection</name>

<t>Increasingly, digital rights are seen as variants of fundamental human rights;
in the European Union, the European Parliament and the Council of Europe jointly
signed a European Declaration on Digital Rights and Principles, which some
researchers consider "transformative" <xref target="DIG-RIGHTS"/>.</t>

<t>This relatively local legislation reflects a larger trend in tending to digital
rights of citizens worldwide, which inevitably influences data protection
practices.</t>

<section anchor="sec:uc-add-data-gdpr"><name>PII and GDPR</name>

<t>In the European Union, the General Data Protection Regulation <xref target="GDPR"/> has
set the standard for data protection laws worldwide, with several legislations
adopting comparable frameworks. It is focused on protecting Personally
Identifiable Information (PII) <iref item="PII" primary="true"/> <iref item="personally identifiable information" primary="true"/>
and requires, amongst other things, that such data may only be collected with
"informed consent".</t>

<t>A future architecture must be structured such that data sharing occurs with
informed consent, or else risks running afoul of such requirements.</t>

</section>
<section anchor="sec:uc-add-data-whistleblower"><name>Whistleblower Protection</name>

<t>Similar to the GDPR, in some legislations there exist whistleblower protection
laws, such as the German <xref target="HinSchG"/>.</t>

<t>Using this example, the law requires confidentialy of whistleblower identities,
and additionally requires that reports are handled anonymously -- the distinction
implies that the report must be devoid of references to a reporter's real world
identity. Although such an identity may be confidentially managed in a separate
data store, it may not be linked to the report.</t>

</section>
<section anchor="sec:uc-add-data-journa"><name>Journalism &amp; Source Protection</name>

<t>Aside from the protection of whistleblowers, the protection of sources of
journalists is generally considered to be a fundamental component for press
freedom. In Europe, courts have regularly held that reavealing sources would
constitute a violation of Article 10 of the European Convention on Human Rights
<xref target="ECHR"/>, which is concerned with freedom of expression.</t>

<t>From a technical point of view, source and whistleblower protection has strong
similarities. But it is worth highlighting that the legal frameworks they may
refer to can be different, and so impose different requirements.</t>

</section>
</section>
</section>
</section>
<section anchor="summary"><name>Summary</name>

<t>By way of examining current classes of human rights issues that are acerbated or
caused by Internet/Web connectivity, this document identifies three main drivers
behind such issues in <xref target="sec:prob-summary"/>. These are:</t>

<t><list style="numbers" type="1">
  <t>Centralization</t>
  <t>Unwarranted access to personally identifiable information</t>
  <t>Denial of access to data</t>
</list></t>

<t>The section concludes that a human-centric networking approach must work against
these drivers.</t>

<t><xref target="sec:use-cases"/> by contrast explores how the current Internet/Web is used, but
also some of the use case classes for which the current Internet/Web stack
provides no solutions. These are often, but not always, closely related to the
issues raised in the problem statement section.</t>

<t>The Web use cases can be broadly summarized in three classes:</t>

<t><list style="numbers" type="1">
  <t>The document Web</t>
  <t>The API Web</t>
  <t>Real-time Web/streaming applications</t>
</list></t>

<t>Classes of uses that this stack fails to address adequately are:</t>

<t><list style="numbers" type="1">
  <t>Resilience, in the face of accidental failures or malicious manipulation.</t>
  <t>Intermittency and latency, i.e. use in remote locations</t>
  <t>Energy usage</t>
  <t>Data protection concerns.</t>
</list></t>

<t>The <xref target="INTERPEER-REQUIREMENTS"/> document, provides an analysis
framework for networked architectures based on these findings. It then applies
this framework to a variety of existing architectures, identifying any gaps that
might exist. Finally, it formulates requirements for a human-centric architecture
such as put forward in <xref target="INTERPEER-ARCHITECTURE"/>.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="PIE.f92f09.00" target="https://specs.interpeer.org/PIE.f92f09.00/PIE.f92f09.00-00"><front><title abbrev="PIEs">PIEs - Proposals for Interpeer Enhancement</title>

    <author asciiFullname="Jens Finkhaeuser" fullname="Jens Finkh&#228;user" initials="J." surname="Finkhaeuser">
      <organization abbrev="Interpeer">Interpeer gUG (haftungsbeschraenkt)</organization>
      <address>
        <email>ietf@interpeer.org</email>
        <uri>https://interpeer.org/</uri>
      </address>
    </author>

    <date day="14" month="March" year="2025"/>

    <abstract>


<?line 76?>

<t>This document specifies a document identifier format and creation process
that does not require centralized management, yet is sufficiently unambiguous
to be interoperable across loosely organized participating entities.</t>

<t>It was created for use in the Interpeer Project. This document is itself
published using this identification system, i.e. it adheres to
 [PIE.f92f09.00] .</t>


    </abstract>

    </front><seriesInfo name="PIE" status="standard" stream="independent" value="PIE.f92f09.00-00"/>

    </reference>
<reference anchor="INTERPEER-PROBLEM-STATEMENT" target="https://specs.interpeer.org/PIE.f92f09.problem-statement/PIE.f92f09.problem-statement-00"><front><title abbrev="Interpeer">Problem Statement &amp; Gap Analysis for Human-Centric Networking</title>

    <author asciiFullname="Jens Finkhaeuser" fullname="Jens Finkh&#228;user" initials="J." surname="Finkhaeuser">
      <organization abbrev="Interpeer">Interpeer gUG (haftungsbeschraenkt)</organization>
      <address>
        <email>ietf@interpeer.org</email>
        <uri>https://interpeer.org/</uri>
      </address>
    </author>

    <date day="22" month="July" year="2025"/>

    <abstract>


<?line 320?>

<t>This documents describes issues with the current Internet's design with regards
to human centric use cases. It examines existing network architecutres and their
respective disadvantages in meeting the requirements of those use cases. The
document is intended to serve as a problem statement for a novel, human centric
networking architecture designed to better serve human needs.</t>


    </abstract>

    </front><seriesInfo name="PIE" status="experimental" stream="independent" value="PIE.f92f09.problem-statement-00"/>

    </reference>
<reference anchor="INTERPEER-REQUIREMENTS" target="https://specs.interpeer.org/PIE.f92f09.gap-analysis/PIE.f92f09.gap-analysis-00"><front><title abbrev="Interpeer">Gap Analysis &amp; Requirements for Human-Centric Networking</title>

    <author asciiFullname="Jens Finkhaeuser" fullname="Jens Finkh&#228;user" initials="J." surname="Finkhaeuser">
      <organization abbrev="Interpeer">Interpeer gUG (haftungsbeschraenkt)</organization>
      <address>
        <email>ietf@interpeer.org</email>
        <uri>https://interpeer.org/</uri>
      </address>
    </author>

    <date day="19" month="January" year="2026"/>

    <abstract>


<?line 121?>

<t>Whereas  [INTERPEER-PROBLEM-STATEMENT]  describes issues with the current
Internet's design, this companion document describes an evaluation framework
for networked architectures derived from those problems. It then performs a gap
analysis on common and some uncommon network architectures.</t>

<t>The second companion document is  [INTERPEER-ARCHITECTURE] .</t>


    </abstract>

    </front><seriesInfo name="PIE" status="experimental" stream="independent" value="PIE.f92f09.gap-analysis-00"/>

    </reference>
<reference anchor="INTERPEER-ARCHITECTURE" target="https://specs.interpeer.org/PIE.f92f09.architecture/PIE.f92f09.architecture-00"><front><title abbrev="Interpeer">Architecture for Human-Centric Networking</title>

    <author asciiFullname="Jens Finkhaeuser" fullname="Jens Finkh&#228;user" initials="J." surname="Finkhaeuser">
      <organization abbrev="Interpeer">Interpeer gUG (haftungsbeschraenkt)</organization>
      <address>
        <email>ietf@interpeer.org</email>
        <uri>https://interpeer.org/</uri>
      </address>
    </author>

    <date day="19" month="January" year="2026"/>

    <abstract>


<?line 78?>

<t>This document follows on from  [INTERPEER-REQUIREMENTS]  to
outline an architecture for a future Internet that has all of the desired
properties laid out in that sibling document.</t>

<t>The requirements are derived from a problem statement contained in
 [INTERPEER-PROBLEM-STATEMENT] .</t>


    </abstract>

    </front><seriesInfo name="PIE" status="experimental" stream="independent" value="PIE.f92f09.architecture-00"/>

    </reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">


<reference anchor="SURVEILLANCE-CAPITALISM" target="https://en.wikipedia.org/w/index.php?title=Surveillance_capitalism&amp;oldid=1166575963">
  <front>
    <title>Surveillance Capitalism</title>
    <author >
      <organization>Wikipedia contributors</organization>
    </author>
    <date year="2023" month="September" day="08"/>
  </front>
  <seriesInfo name="Wikipedia --" value="The Free Encyclopedia"/>
</reference>


<reference anchor="COGNITIVE-INERTIA">
  <front>
    <title>Cognitive consistency and attitude change.</title>
    <author fullname="W. J. McGuire" initials="W." surname="McGuire">
      <organization/>
    </author>
    <date month="May" year="1960"/>
  </front>
  <seriesInfo name="The Journal of Abnormal and Social Psychology" value="vol. 60, no. 3, pp. 345-353"/>
  <seriesInfo name="DOI" value="10.1037/h0048563"/>
<refcontent>American Psychological Association (APA)</refcontent></reference>
<reference anchor="DECISION-FATIGUE">
  <front>
    <title>Decision fatigue: A conceptual analysis</title>
    <author fullname="Grant A Pignatiello" initials="G." surname="Pignatiello">
      <organization>Case Western Reserve University, USA</organization>
    </author>
    <author fullname="Richard J Martin" initials="R." surname="Martin">
      <organization>Case Western Reserve University, USA</organization>
    </author>
    <author fullname="Ronald L Hickman" initials="R." surname="Hickman">
      <organization>Case Western Reserve University, USA</organization>
    </author>
    <date month="March" year="2018"/>
  </front>
  <seriesInfo name="Journal of Health Psychology" value="vol. 25, no. 1, pp. 123-135"/>
  <seriesInfo name="DOI" value="10.1177/1359105318763510"/>
<refcontent>SAGE Publications</refcontent></reference>

<reference anchor="AOSC" >
  <front>
    <title>The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power</title>
    <author initials="S." surname="Zuboff" fullname="Shoshana Zuboff">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="ISBN" value="9781781256855"/>
</reference>
<reference anchor="IFTP" >
  <front>
    <title>Internet for the People</title>
    <author initials="B." surname="Tarnoff" fullname="Ben Tarnoff">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="ISBN" value="9781839762024"/>
</reference>
<reference anchor="FUTURE-INTERNET" target="https://dash.harvard.edu/handle/1/4455262">
  <front>
    <title>The Future of the Internet -- And How To Stop It</title>
    <author initials="J." surname="Zittrain" fullname="Jonathan Zittrain">
      <organization></organization>
    </author>
    <date year="2008"/>
  </front>
  <seriesInfo name="ISBN" value="9780300151244"/>
</reference>


<reference anchor="CENSORED-PLANET">
  <front>
    <title>Censored Planet: An Internet-wide, Longitudinal Censorship Observatory</title>
    <author fullname="Ram Sundara Raman" initials="R." surname="Sundara Raman">
      <organization>University of Michigan, Ann Arbor, MI, USA</organization>
    </author>
    <author fullname="Prerana Shenoy" initials="P." surname="Shenoy">
      <organization>University of Michigan, Ann Arbor, MI, USA</organization>
    </author>
    <author fullname="Katharina Kohls" initials="K." surname="Kohls">
      <organization>Ruhr University Bochum, Bochum, Germany</organization>
    </author>
    <author fullname="Roya Ensafi" initials="R." surname="Ensafi">
      <organization>University of Michigan, Ann Arbor, MI, USA</organization>
    </author>
    <date month="October" year="2020"/>
  </front>
  <seriesInfo name="Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security" value="pp. 49-66"/>
  <seriesInfo name="DOI" value="10.1145/3372297.3417883"/>
<refcontent>ACM</refcontent></reference>
<reference anchor="CAMBRIDGE-ANALYTICA">
  <front>
    <title>Cambridge Analytica’s black box</title>
    <author fullname="Margaret Hu" initials="M." surname="Hu">
      <organization>Penn State Law and School of International Affairs, Institute for Computational and Data Sciences Pennsylvania State University, University Park, PA, USA</organization>
    </author>
    <date month="July" year="2020"/>
  </front>
  <seriesInfo name="Big Data &amp; Society" value="vol. 7, no. 2"/>
  <seriesInfo name="DOI" value="10.1177/2053951720938091"/>
<refcontent>SAGE Publications</refcontent></reference>
<reference anchor="HYBRID-WARFARE">
  <front>
    <title>Hybrid warfare and disinformation: A Ukraine war perspective</title>
    <author fullname="Sascha‐Dominik Dov Bachmann" initials="S." surname="Dov Bachmann">
      <organization>University of Canberra  Bruce Australian Capital Territory Australia; Stellenbosch University  Stellenbosch South Africa</organization>
    </author>
    <author fullname="Dries Putter" initials="D." surname="Putter">
      <organization>Stellenbosch University  Stellenbosch South Africa</organization>
    </author>
    <author fullname="Guy Duczynski" initials="G." surname="Duczynski">
      <organization>Edith Cowan University  Joondalup Western Australia Australia</organization>
    </author>
    <date month="August" year="2023"/>
  </front>
  <seriesInfo name="Global Policy" value="vol. 14, no. 5, pp. 858-869"/>
  <seriesInfo name="DOI" value="10.1111/1758-5899.13257"/>
<refcontent>Wiley</refcontent></reference>
<reference anchor="UYGHUR-INTERNET">
  <front>
    <title>Don’t lose your moustache: community and cultural identity on the Uyghur internet in China</title>
    <author fullname="Rebecca Clothey" initials="R." surname="Clothey">
      <organization>Department Of Global Studies And Modern Languages, Drexel University, Philadelphia, USA</organization>
    </author>
    <author fullname="Alysha Meloche" initials="A." surname="Meloche">
      <organization>School Of Education, Drexel University, Philadelphia, USA</organization>
    </author>
    <date month="August" year="2021"/>
  </front>
  <seriesInfo name="Identities" value="vol. 29, no. 3, pp. 375-394"/>
  <seriesInfo name="DOI" value="10.1080/1070289x.2021.1964783"/>
<refcontent>Informa UK Limited</refcontent></reference>
<reference anchor="UYGHUR-WAR">
  <front>
    <title>The War on the Uyghurs: China's Internal Campaign against a Muslim Minority</title>
    <author fullname="SEAN R. ROBERTS" initials="S." surname="ROBERTS">
      <organization/>
    </author>
    <date month="September" year="2020"/>
  </front>
  <seriesInfo name="DOI" value="10.2307/j.ctvsf1qdq"/>
  <seriesInfo name="ISBN" value="[&quot;9780691202211&quot;]"/>
<refcontent>Princeton University Press</refcontent></reference>
<reference anchor="UYGHUR-AI">
  <front>
    <title>The Chinese approach to artificial intelligence: an analysis of policy, ethics, and regulation</title>
    <author fullname="Huw Roberts" initials="H." surname="Roberts">
      <organization/>
    </author>
    <author fullname="Josh Cowls" initials="J." surname="Cowls">
      <organization/>
    </author>
    <author fullname="Jessica Morley" initials="J." surname="Morley">
      <organization/>
    </author>
    <author fullname="Mariarosaria Taddeo" initials="M." surname="Taddeo">
      <organization/>
    </author>
    <author fullname="Vincent Wang" initials="V." surname="Wang">
      <organization/>
    </author>
    <author fullname="Luciano Floridi" initials="L." surname="Floridi">
      <organization/>
    </author>
    <date month="June" year="2020"/>
  </front>
  <seriesInfo name="AI &amp; SOCIETY" value="vol. 36, no. 1, pp. 59-77"/>
  <seriesInfo name="DOI" value="10.1007/s00146-020-00992-2"/>
<refcontent>Springer Science and Business Media LLC</refcontent></reference>
<reference anchor="ML-DISINFORMATION">
  <front>
    <title>Artificial Intelligence, Advertising, and Disinformation</title>
    <author fullname="Sonia K. Katyal" initials="S." surname="Katyal">
      <organization/>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Advertising &amp; Society Quarterly" value="vol. 20, no. 4"/>
  <seriesInfo name="DOI" value="10.1353/asr.2019.0026"/>
<refcontent>Project MUSE</refcontent></reference>
<reference anchor="ML-VOICE">
  <front>
    <title>AI Generated Fake Audio as a New Threat to Information Security:  Legal and Forensic Aspects</title>
    <author fullname="Elena Galyashina" initials="E." surname="Galyashina">
      <organization>Department of Forensic Expertise, Kutafin Moscow State Law University, Sadovaya-Kudrunskaya Str., 9, Moscow, Russia, --- Select a Country ---</organization>
    </author>
    <author fullname="Vladimir Nikishin" initials="V." surname="Nikishin">
      <organization>Department of Forensic Expertise, Kutafin Moscow State Law University, Sadovaya-Kudrunskaya Str., 9, Moscow, Russia, --- Select a Country ---</organization>
    </author>
    <date year="2021"/>
  </front>
  <seriesInfo name="Proceedings of the International Scientific and Practical Conference on Computer and Information Security" value="pp. 17-21"/>
  <seriesInfo name="DOI" value="10.5220/0010616700003170"/>
<refcontent>SCITEPRESS - Science and Technology Publications</refcontent></reference>

<reference anchor="AUTOMATED-APARTHEID" target="https://www.amnesty.org/en/documents/mde15/6701/2023/en/">
  <front>
    <title>Automated Apartheid</title>
    <author >
      <organization>Amnesty International</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="GAZA-GENOCIDE" target="https://www.amnesty.org/en/documents/mde15/8668/2024/en/">
  <front>
    <title>Israel/Occupied Palestinian Territory: 'You feel like you are subhuman': Israel's Genocide Against Palestinians in Gaza</title>
    <author >
      <organization>Amnesty International</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="GAZA-GENOCIDE-ICJ" target="https://www.icj-cij.org/case/192">
  <front>
    <title>Application of the Convention on the Prevention and Punishment of the Crime of Genocide in the Gaza Strip (South Africa v. Israel)</title>
    <author >
      <organization>International Court of Justice</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


<reference anchor="MEDIA-INDEPENDENCE">
  <front>
    <title>What Can We Learn From the Short History of Independent Media in Serbia? Radio B92, George Soros, and New Models of Media Development</title>
    <author fullname="Janet Steele" initials="J." surname="Steele">
      <organization>School of Media and Public Affairs, George Washington University, Washington, DC, USA</organization>
    </author>
    <date month="May" year="2023"/>
  </front>
  <seriesInfo name="The International Journal of Press/Politics" value="vol. 29, no. 3, pp. 646-666"/>
  <seriesInfo name="DOI" value="10.1177/19401612231170092"/>
<refcontent>SAGE Publications</refcontent></reference>

<reference anchor="REST" target="http://www.ics.uci.edu/~fielding/pubs/dissertation/top.htm">
  <front>
    <title>Architectural Styles and the Design of Network-based Software Architectures</title>
    <author initials="R. T." surname="Fielding" fullname="Roy Thomas Fielding">
      <organization>University of California, Irvine</organization>
    </author>
    <date year="2000"/>
  </front>
  <seriesInfo name="doctoral" value="dissertation"/>
</reference>
<reference anchor="OPENAPI" target="https://spec.openapis.org/oas/v3.1.0">
  <front>
    <title>OpenAPI Specification v3.1.0</title>
    <author initials="D." surname="Miller" fullname="Darrel Miller" role="editor">
      <organization></organization>
    </author>
    <author initials="J." surname="Whitlock" fullname="Jeremy Whitlock" role="editor">
      <organization></organization>
    </author>
    <author initials="M." surname="Gardiner" fullname="Marsh Gardiner" role="editor">
      <organization></organization>
    </author>
    <author initials="M." surname="Ralphson" fullname="Mike Ralphson" role="editor">
      <organization></organization>
    </author>
    <author initials="R." surname="Ratovsky" fullname="Ron Ratovsky" role="editor">
      <organization></organization>
    </author>
    <author initials="U." surname="Sarid" fullname="Uri Sarid" role="editor">
      <organization></organization>
    </author>
    <date year="2021" month="February" day="15"/>
  </front>
</reference>
<reference anchor="SOAP" target="https://www.w3.org/TR/soap12/">
  <front>
    <title>SOAP Version 1.2</title>
    <author >
      <organization>World Wide Web Consortium (W3C)</organization>
    </author>
    <date year="2007" month="April" day="27"/>
  </front>
</reference>


<reference anchor="RM3420">
  <front>
    <title>On Distributed Communications: I. Introduction to Distributed Communications Networks</title>
    <author fullname="Paul Baran" initials="P." surname="Baran">
      <organization/>
    </author>
    <date year="1964"/>
  </front>
  <seriesInfo name="DOI" value="10.7249/rm3420"/>
<refcontent>RAND Corporation</refcontent></reference>
<reference anchor="DRONECOMMS">
  <front>
    <title>Reliable Command, Control and Communication Links for Unmanned Aircraft Systems: Towards compliance of commercial drones</title>
    <author fullname="Jens Finkhäuser" initials="J." surname="Finkhäuser">
      <organization>AnyWi Technologies B.V., Netherlands</organization>
    </author>
    <author fullname="Morten Larsen" initials="M." surname="Larsen">
      <organization>AnyWi Technologies B.V., Netherlands</organization>
    </author>
    <date month="January" year="2021"/>
  </front>
  <seriesInfo name="Proceedings of the 2021 Drone Systems Engineering and Rapid Simulation and Performance Evaluation: Methods and Tools Proceedings" value="pp. 22-28"/>
  <seriesInfo name="DOI" value="10.1145/3444950.3444954"/>
<refcontent>ACM</refcontent></reference>
<reference anchor="GREEN-HOSTING">
  <front>
    <title>Web Communication: A Content Analysis of Green Hosting Companies</title>
    <author fullname="Minos-Athanasios Karyotakis" initials="M." surname="Karyotakis">
      <organization>School of Communication, Hong Kong Baptist University, Hong Kong, China</organization>
    </author>
    <author fullname="Nikos Antonopoulos" initials="N." surname="Antonopoulos">
      <organization>Head of New Media Communication and Usability Lab, Department of Digital Media and Communication, Ionian University, 28100 Kefalonia, Greece; Department of Business Administration and Organization, Hellenic Open University, 26335 Patras, Greece</organization>
    </author>
    <date month="January" year="2021"/>
  </front>
  <seriesInfo name="Sustainability" value="vol. 13, no. 2, pp. 495"/>
  <seriesInfo name="DOI" value="10.3390/su13020495"/>
<refcontent>MDPI AG</refcontent></reference>
<reference anchor="GREEN-CODING-1">
  <front>
    <title>Greenspecting Android virtual keyboards</title>
    <author fullname="Rui Rua" initials="R." surname="Rua">
      <organization>University of Minho, Portugal</organization>
    </author>
    <author fullname="Tiago Fraga" initials="T." surname="Fraga">
      <organization>University of Minho, Portugal</organization>
    </author>
    <author fullname="Marco Couto" initials="M." surname="Couto">
      <organization>University of Minho, Portugal</organization>
    </author>
    <author fullname="João Saraiva" initials="J." surname="Saraiva">
      <organization>University of Minho, Portugal</organization>
    </author>
    <date month="July" year="2020"/>
  </front>
  <seriesInfo name="Proceedings of the IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems" value="pp. 98-108"/>
  <seriesInfo name="DOI" value="10.1145/3387905.3388600"/>
<refcontent>ACM</refcontent></reference>
<reference anchor="GREEN-CODING-2">
  <front>
    <title>GreenHub: a large-scale collaborative dataset to battery consumption analysis of android devices</title>
    <author fullname="Rui Pereira" initials="R." surname="Pereira">
      <organization/>
    </author>
    <author fullname="Hugo Matalonga" initials="H." surname="Matalonga">
      <organization/>
    </author>
    <author fullname="Marco Couto" initials="M." surname="Couto">
      <organization/>
    </author>
    <author fullname="Fernando Castor" initials="F." surname="Castor">
      <organization/>
    </author>
    <author fullname="Bruno Cabral" initials="B." surname="Cabral">
      <organization/>
    </author>
    <author fullname="Pedro Carvalho" initials="P." surname="Carvalho">
      <organization/>
    </author>
    <author fullname="Simão Melo de Sousa" initials="S." surname="de Sousa">
      <organization/>
    </author>
    <author fullname="João Paulo Fernandes" initials="J." surname="Fernandes">
      <organization/>
    </author>
    <date month="March" year="2021"/>
  </front>
  <seriesInfo name="Empirical Software Engineering" value="vol. 26, no. 3"/>
  <seriesInfo name="DOI" value="10.1007/s10664-020-09925-5"/>
<refcontent>Springer Science and Business Media LLC</refcontent></reference>
<reference anchor="GREEN-CODING-3">
  <front>
    <title>On Understanding Contextual Changes of Failures</title>
    <author fullname="Francisco Ribeiro" initials="F." surname="Ribeiro">
      <organization>HASLab/INESC TEC University of Minho,Braga,Portugal</organization>
    </author>
    <author fullname="Rui Abreu" initials="R." surname="Abreu">
      <organization>INESC-ID &amp;#x0026; FEUP University of Porto,Porto,Portugal</organization>
    </author>
    <author fullname="João Saraiva" initials="J." surname="Saraiva">
      <organization>HASLab/INESC TEC University of Minho,Braga,Portugal</organization>
    </author>
    <date month="December" year="2021"/>
  </front>
  <seriesInfo name="2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS)" value="pp. 1036-1047"/>
  <seriesInfo name="DOI" value="10.1109/qrs54544.2021.00112"/>
<refcontent>IEEE</refcontent></reference>
<reference anchor="DIG-RIGHTS">
  <front>
    <title>The Transformative Nature of the EU Declaration on Digital Rights and Principles: Replacing the Old Paradigm (Normative Equivalency of Rights)</title>
    <author fullname="Cristina Cocito" initials="C." surname="Cocito">
      <organization/>
    </author>
    <author fullname="Paul de Hert" initials="P." surname="de Hert">
      <organization/>
    </author>
    <date year="2023"/>
  </front>
  <seriesInfo name="DOI" value="10.2139/ssrn.4341816"/>
<refcontent>Elsevier BV</refcontent></reference>

<reference anchor="GDPR" target="https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32016R0679&amp;qid=1661512309950">
  <front>
    <title>General Data Protection Regulation (GDPR)</title>
    <author >
      <organization>Council of the European Union</organization>
    </author>
    <date year="2016" month="April" day="27"/>
  </front>
  <seriesInfo name="EU" value="Regulation 2016/679"/>
</reference>
<reference anchor="HinSchG" target="https://www.gesetze-im-internet.de/hinschg/">
  <front>
    <title>Hinweisgeberschutzgesetz vom 31. Mai 2023 (BGBl. 2023 I Nr. 140)</title>
    <author >
      <organization></organization>
    </author>
    <date year="2023" month="May" day="31"/>
  </front>
  <seriesInfo name="DE" value="Hinweisgeberschutzgesetz, HinSchG"/>
</reference>
<reference anchor="ECHR" target="https://www.echr.coe.int/documents/d/echr/convention_ENG">
  <front>
    <title>European Convention on Human Rights</title>
    <author >
      <organization>European Court of Human Rights; Council of Europe</organization>
    </author>
    <date year="1950" month="November" day="04"/>
  </front>
</reference>


<reference anchor="RFC9620">
  <front>
    <title>Guidelines for Human Rights Protocol and Architecture Considerations</title>
    <author fullname="G. Grover" initials="G." surname="Grover"/>
    <author fullname="N. ten Oever" initials="N." surname="ten Oever"/>
    <date month="September" year="2024"/>
    <abstract>
      <t>This document sets guidelines for human rights considerations for developers working on network protocols and architectures, similar to the work done on the guidelines for privacy considerations (RFC 6973). This is an updated version of the guidelines for human rights considerations in RFC 8280.</t>
      <t>This document is a product of the Human Right Protocol Considerations (HRPC) Research Group in the IRTF.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9620"/>
  <seriesInfo name="DOI" value="10.17487/RFC9620"/>
</reference>
<reference anchor="RFC9518">
  <front>
    <title>Centralization, Decentralization, and Internet Standards</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="December" year="2023"/>
    <abstract>
      <t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that, while standards bodies have a limited ability to prevent many forms of centralization, they can still make contributions that assist in the decentralization of the Internet.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9518"/>
  <seriesInfo name="DOI" value="10.17487/RFC9518"/>
</reference>
<reference anchor="OAUTH">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6749"/>
  <seriesInfo name="DOI" value="10.17487/RFC6749"/>
</reference>
<reference anchor="DOI">
  <front>
    <title>Information and documentation�� Digital object identifier system</title>
    <author>
      <organization/>
    </author>
    <date month="June" year="2015"/>
  </front>
  <seriesInfo name="DOI" value="10.3403/30177056u"/>
<refcontent>BSI British Standards</refcontent></reference>
<reference anchor="NIST.IR.8366" target="https://specs.interpeer.org/archive/NIST.IR.8366.pdf">
  <front>
    <title>Guidance for NIST staff on using inclusive language in documentary standards</title>
    <author fullname="Kathryn Miller" surname="Miller">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="David Alderman" surname="Alderman">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Lisa Carnahan" surname="Carnahan">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Lily Chen" surname="Chen">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Jim Foti" surname="Foti">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Barbara Goldstein" surname="Goldstein">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Mike Hogan" surname="Hogan">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Jennifer Marshall" surname="Marshall">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Karen K Reczek" surname="Reczek">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Nathalie Rioux" surname="Rioux">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="Mary F Theofanos" surname="Theofanos">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author fullname="David Wollman" surname="Wollman">
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <author>
      <organization>National Institute of Standards and Technology (U.S.)</organization>
      <address>
        <postal>
          <country>US</country>
          <city>Gaithersburg</city>
        </postal>
      </address>
    </author>
    <date day="29" month="April" year="2021"/>
    <abstract>
      <t>This document provides guidance to NIST staff regarding the use of inclusive language in documentary standards and documents which support the realization and dissemination of physical standards; Standards Developing Organizations' (SDOs) policies and procedures; and standards development participation. The document is intended to be used as guidance by NIST standards participants seeking to be impactful in addressing these issues.</t>
    </abstract>
  </front>
  <seriesInfo name="NIST IR (Interagency/Internal Reports)" value="8366"/>
  <seriesInfo name="DOI" value="10.6028/NIST.IR.8366"/>
  <annotation>
    Archived copy; this document has been withdrawn by NIST due to
    <eref target="https://www.federalregister.gov/d/2025-01953">Executive Order (E.O.) 14151</eref>
    of the President of the United States of America.
  </annotation>
</reference>

<reference anchor="CAN" target="https://www.iso.org/standard/86384.html">
  <front>
    <title>Road vehicles - Controller Area Network (CAN)</title>
    <author >
      <organization>ISO/TC 22/SC 31</organization>
    </author>
    <date year="2024" month="May"/>
  </front>
  <seriesInfo name="ISO" value="11898-1:2024"/>
</reference>


<reference anchor="IEEE-802.3">
  <front>
    <title>IEEE Standard for Ethernet</title>
    <author>
      <organization/>
    </author>
    <date month="July" year="2022"/>
  </front>
  <seriesInfo name="DOI" value="10.1109/ieeestd.2022.9844436"/>
  <seriesInfo name="ISBN" value="[&quot;9781504487252&quot;]"/>
<refcontent>IEEE</refcontent></reference>

<reference anchor="ROS2" target="https://ros.org/">
  <front>
    <title>Robot Operating System</title>
    <author >
      <organization>The ROS Community</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DDS" target="https://www.omg.org/spec/DDS/">
  <front>
    <title>DDS™ - Data Distribution Service</title>
    <author >
      <organization>Object Management Group</organization>
    </author>
    <date year="2015" month="March"/>
  </front>
</reference>



<reference anchor="IP-MULTICAST-CHALLENGES">
   <front>
      <title>Multicast Lessons Learned from Decades of Deployment Experience</title>
      <author fullname="Dino Farinacci" initials="D." surname="Farinacci">
         <organization>lispers.net</organization>
      </author>
      <author fullname="Lenny Giuliano" initials="L." surname="Giuliano">
         <organization>Juniper</organization>
      </author>
      <author fullname="Mike McBride" initials="M." surname="McBride">
         <organization>Futurewei</organization>
      </author>
      <author fullname="Nils Warnke" initials="N." surname="Warnke">
         <organization>Deutsche Telekom</organization>
      </author>
      <date day="17" month="October" year="2025"/>
      <abstract>
	 <t>   This document gives a historical perspective about the design and
   deployment of multicast routing protocols.  The document describes
   the technical challenges discovered from building these protocols.
   Even though multicast has enjoyed success of deployment in special
   use-cases, this draft discusses what were, and are, the obstacles for
   mass deployment across the Internet.  Individuals who are working on
   new multicast related protocols will benefit by knowing why certain
   older protocols are no longer in use today.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-pim-multicast-lessons-learned-06"/>
   
</reference>

<reference anchor="ISOC-FOUNDATION" target="https://www.isocfoundation.org/">
  <front>
    <title>Internet Society Foundation</title>
    <author >
      <organization>Internet Society Foundation</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="NGI0-Discovery" target="https://doi.org/10.3030/825322">
  <front>
    <title>NGI Zero Discovery</title>
    <author >
      <organization>Stichting NLNet</organization>
    </author>
    <date year="2018" month="November" day="01"/>
  </front>
  <seriesInfo name="DOI" value="10.3030/825322"/>
  <seriesInfo name="Grant Agreement ID" value="825322"/>
</reference>
<reference anchor="NGI-Assure" target="https://doi.org/10.3030/957073">
  <front>
    <title>NGI Assure</title>
    <author >
      <organization>PNO Digital Srl</organization>
    </author>
    <date year="2024" month="August" day="31"/>
  </front>
  <seriesInfo name="DOI" value="10.3030/957073"/>
  <seriesInfo name="Grant Agreement ID" value="957073"/>
</reference>


<reference anchor="RFC9330">
  <front>
    <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
    <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
    <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
    <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
    <author fullname="G. White" initials="G." surname="White"/>
    <date month="January" year="2023"/>
    <abstract>
      <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
      <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9330"/>
  <seriesInfo name="DOI" value="10.17487/RFC9330"/>
</reference>
<reference anchor="RFC7231">
  <front>
    <title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems. This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7231"/>
  <seriesInfo name="DOI" value="10.17487/RFC7231"/>
</reference>
<reference anchor="RFC7233">
  <front>
    <title>Hypertext Transfer Protocol (HTTP/1.1): Range Requests</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="Y. Lafon" initials="Y." role="editor" surname="Lafon"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines range requests and the rules for constructing and combining responses to those requests.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7233"/>
  <seriesInfo name="DOI" value="10.17487/RFC7233"/>
</reference>
<reference anchor="RFC8216">
  <front>
    <title>HTTP Live Streaming</title>
    <author fullname="R. Pantos" initials="R." role="editor" surname="Pantos"/>
    <author fullname="W. May" initials="W." surname="May"/>
    <date month="August" year="2017"/>
    <abstract>
      <t>This document describes a protocol for transferring unbounded streams of multimedia data. It specifies the data format of the files and the actions to be taken by the server (sender) and the clients (receivers) of the streams. It describes version 7 of this protocol.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8216"/>
  <seriesInfo name="DOI" value="10.17487/RFC8216"/>
</reference>
<reference anchor="RFC7252">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>
<reference anchor="RFC4838">
  <front>
    <title>Delay-Tolerant Networking Architecture</title>
    <author fullname="V. Cerf" initials="V." surname="Cerf"/>
    <author fullname="S. Burleigh" initials="S." surname="Burleigh"/>
    <author fullname="A. Hooke" initials="A." surname="Hooke"/>
    <author fullname="L. Torgerson" initials="L." surname="Torgerson"/>
    <author fullname="R. Durst" initials="R." surname="Durst"/>
    <author fullname="K. Scott" initials="K." surname="Scott"/>
    <author fullname="K. Fall" initials="K." surname="Fall"/>
    <author fullname="H. Weiss" initials="H." surname="Weiss"/>
    <date month="April" year="2007"/>
    <abstract>
      <t>This document describes an architecture for delay-tolerant and disruption-tolerant networks, and is an evolution of the architecture originally designed for the Interplanetary Internet, a communication system envisioned to provide Internet-like services across interplanetary distances in support of deep space exploration. This document describes an architecture that addresses a variety of problems with internetworks having operational and performance characteristics that make conventional (Internet-like) networking approaches either unworkable or impractical. We define a message- oriented overlay that exists above the transport (or other) layers of the networks it interconnects. The document presents a motivation for the architecture, an architectural overview, review of state management required for its operation, and a discussion of application design issues. This document represents the consensus of the IRTF DTN research group and has been widely reviewed by that group. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4838"/>
  <seriesInfo name="DOI" value="10.17487/RFC4838"/>
</reference>



    </references>

</references>


<?line 1149?>

<section numbered="false" anchor="sec:ack"><name>Acknowledgments</name>

<t>Development of this document started as work
undertaken under a grant agreement with the Internet Society Foundation
<xref target="ISOC-FOUNDATION"/>, but has since seen a number of revisions. Some revisions
are inspired by work undertaken under grant agreements from Horizon Europe,
specifically <xref target="NGI0-Discovery"/> and <xref target="NGI-Assure"/>.</t>

</section>



    <!-- Copyright notice -->
    <section anchor="copyright" numbered="false" toc="include" removeInRFC="false">
      <name>Copyright Notice</name>
      

<t>Copyright (C) the document authors.</t>

<t>This work is licensed under a <eref target="https://creativecommons.org/licenses/by-sa/4.0/">CreativeCommons Attribution-ShareAlike 4.0 International License</eref>.</t>


    </section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA6W923IjSZI2dp9PkcKYTZNjAHiqc9tqxSJZVRirIvmTrOnZ
lUk7CWQAyK5EJiYzQTamrGS60EvoVqY30Zv8TyL//BARCZI9I9Pa7jYLQEZG
eHj48XOP0WiUzOq8qBbv0k03H71JuqIr3bt0cN3U09Kt0tsu69zKVV36x/Rr
69KzrHVtOq+b9NNmlVWjM/qqKWbppese6uYbjTRIsum0cfc0yKTqXLN2rhkk
eT2rshWNfD25GM/fHs8P347X8o5Ra+8YHR4mm3VO/2rfpXmTzbvRr/Oi+rbM
3KZ1zaiw8fDDGf1sUTfbd2lRzeuk3UxXRdsWddVt1w4f5m7t6P9VXfKH9K9/
/Wvaui59WLoqpSGzkj7Ei96lx4fHL0eHL+h/E5pIlf9XVtYVfb51bbIu3Lsk
TdeNmxe/0aTo7xQrkD/SdNOUrf2dpo1b1+/SZdet23cHB0RXN3XNYlw3iwM/
84PfWxa9710ySrt6Rv+/rZuO3tviz+1K/yIyrrL1mshM/5jVK1CtTf+Q3l2d
X9H7V/W98x8nyTe3pU3JaYajtHK/denCVa7JOiJSyi+tXIfvlryVM93Kym+l
/y5tisWSRqR/66alftOSJNt0y7rBW4gURUV79+dx+iEskD6db8pS9v/Prmrl
y//n/9Yvs3ZWFB+e+IV/nEj4LvXclC6+fkz3lkTHTbVop66dLZvMVd+6fQym
zOd/TZ/9IW1qcLXLi66WD5hgWZ6nq6woaan4u3EtLTF1+IgYyHXz/8lvDXYx
wYYXYYd7Xx4kSVU3KyLuPfPM5PLu4ub64uJmdH1z9f7zxZfR7d3p3cWXi8u7
f34I4sdvLv7b18kNP3jbe3KRrUcZcfK2Ldrdh05vzj5N7i7O7r7eXPQeyprZ
sujcrNs0Dg8lODzRtG+/3vzlYvL58+nl2cXo7PR6cnf6eXL7RZjchMPtprl3
RVlm1QwSYV10WVm0qwH/iHascC2GtZPxS/GtWBPts3Q0epfeLV36oXEuvahm
21lZ8zf8S89H/D+854Pw7KwGe043tIOtvMmf35PR4dvR4RuZY9YsXBc2yVXj
BxuD9+nhAKLht/F6uf53XtC/xcv5r5lfzh/rMi/yfzs6evXq5euXb1+d0Phn
Vx8vJ3eTv1yMJpcXN3eT03fp+dVkfHRI/3vy+mB5ePjizUv+5fnF2eR2cnU5
+nB6N/n49SL88Oj164Ojk5dvjw5fnhy9ef3q5OURNu/06vasT2ZQ6nTh0nqe
PkNxpSYOJ8vkTKRy+mGD/U2zLu3o+0v3QBQn8hV0dmiw6/oBInmX5CM5u7fj
9D8303o+132QQ3m7rNslcVv8ndH/6O0zGz+5fX/5Ln37+s0R/e/xy1dvXr4E
l364u+4vdKKyiNeAGV+7el26Z6f4fpzeZU21O8f3JNvjzz1/HP/T+b05efv6
Ff3yBX3z4StOzYgP0+XF3eM9UeoSJTFXP/nRKD2t8vRT/ZDe1aQ463U66Z5d
A4nI/yy6rsmKqreIP9dV1hGl+9/aUpTJf2cphyeHh0cvj45fvHjyOORZuxwv
s+Y+a/KxyzcH9Kq8dAdHBy9evHx5/AqkOru4vL26uTgfXZMYIAIEzn3x8uDk
5PXx8dvX45MXtKlv+Eycfnl/Mzn/eDE6vTz9/B93k7PTPrMfE6O/fXn0+vjw
7cmbw7dH9Myn/8Ajo19Obz6c3sRn4+jo4Oj1yzejl2/evh0fnRy/fE2//vof
Hz99vQk7Es7cm8ODo8PXh8dv3v51TNt3ND56++rFa56WPkSv8L8/Pjl8ffDr
eNbdt/Ojv+d/D786nUSD0o9aIuKLV6PD40MSkm/fHo9Aly+fR+d0pi8/XN18
oUN9dRmeOXl5cpC1zRiHYXx4ePxKfv6Xq8lZWN3L4+PDAxr48NXRq9eH9D8n
R6/55H+9u6IBieCn16c3d58uJuc9pjslmUcS2uXp6TpriOeK/AmuYnl5uqpc
222VKVnTk6nTF5ZP8sXDw8M4k4dZSrrqgGyNDRsSB6vcHb08oDkfHWAAfEmD
fDz9z9PRx4vLq7PJ+cXOgW5JIZcHV7PZhkyoPL3OShq5qAri6zvXNFDDZLj9
9B/1Jp07V6Zl8c2lW/pXRgeLTDm2On4iLc4D/dSmH11Vz4ocApHORNvFQ7Z0
otKP2T+ypw7bv0qWp4/Lv0CWN69evQFZXjxFltHk7M990pyu12UxExtMJchZ
Xd3TgPxJJfKPTBj9hI5ner2pinbJVrg90hQrlkCeLoU8CTKQ7GmKdbp3WxMl
0tM5GXVZej9WYu4/S6UedWhWm4bf9+cN0XnmnqVPMft1NCt+ZfrMyD04OHrL
p+XifHJKZ/b84vqC/t/l2a4KfPvi8OjV0fHxCf2TDhmeubm47cvb02Cu0JRu
uy1tOpMEaz0nEbhgKqr3MZrS6/P0tp53D2Ck6GnXPieIb0iZwFx1Zc4mbySL
b+otKVg6e+3u90yvrxUZTU1bEGPRHM5II5P+IoYcppPmvqhcX3IfPiO5iZ/o
NGRkcebkv7im4w14RG1P7Ha8mRUsuv+3uU7qYL2Ztgfx4wekfcbLbkXDXBH5
yY7rkfWKPCP6LL1du1kxN3a8PxkfjQ/TJwgl5DjPmobO6heyQ9isxv8wCc/H
/Q93rO0wwp8d+Sjb9BfalbKefYvHIH248/Gzo3zJmnZJnN7Q2vsT+TLe/fj5
QSBxbrJyvWzrameMnY+fHeOGiHaTdfV9+20bD3Ez3v342SG+NkV6mzUq0fX5
r+PeZ48e9kLriDTU6Ojlk0ezpb0dk3VdkbXY8uGss/ZA9hiG/tVp3wrDB+lf
wM+0qqPx8XMm+S91U+Zk05PM+cVNIbzgqRabVbr3y8nZfp/pX8OzPn79rOx4
OOGZ3d0ctHW2PjqGAL35cvLi+NALi9fHL94eyGcwq2+uLi/Orr58ud0xS168
ePH25eFY/gth/vHm4uJy9Onq9m5y+dH/+OTk7eFBuzk6IdVOP/S/O7s6p5+N
jnaNnTev3x6+pKfevHnFJ7j36+Mdo4E0+6sXYjSQzfBy9Gj4k2j4w7cH/+3m
9uWLly9eiOlClsERqH4++Ti6mXz8dBeWeHx08vagbZtq/ILsrjdHr3BIP55f
3/R1y0d270s6qF1GOqSG6MNu3rjFppQzvoennlAB5m+R1K9mRWl65mLTEAuR
1iZZV1d9t+voVbS5j+Xaxdd38YvxezIh3vZYYeC9tE0zKskpc3hfRv85KN0i
K0dw+kjtHVxcHpx+/nzw7+R//9vZxeeLv747wYA3hzTiH/8OL+3VK1i9J0T4
l4eY56eiup0tP/YJRB8+uKJdIDDTzpab7h8L17ruH+l9vUpPjkiMZQXbSOne
+4/vy7H8PUkvm3F69OJw/7Hf+XJ0cvQMAcgoSp974dDm9+zJkN+5UbEaWahm
nLuDJQmI2XKBc3Jx9qm//36z+gaFuIQ3GsF5et+jR1Xrx0/9nEZsIT+NCHFE
FB8dHSGA9txi3GzZjGe1G9NSIgMqP8AXBzM/3f+6uARFbj6cvSVv7J3++fLo
Df68Ijv50zt88ur1C/ARHY5wrl8cnhycHJJhcfjy1Ya+vJzc3o0nN+M3J69e
kWlzjYjIOP6QPZfLHgFv6ixP792ymMHMGIGOHQlfUmxkSrjMzIx0jx7cf46U
k9urg7uz9Pj44PYsVeYIViZxzLMe3BXR8ujN2zckhX7XIC3amqUmhytJ3ZEJ
evLmBdQ9bNrJxcXF6M3h8XhH2ODz27tzyJrj8ds3JCdPQIObq9vjHSJM6w4W
AgKF1SK93badWz23WvjDNASRarUiK7XbPjnrphYNhE07v+29jv793/+P/4uI
zULrvGglyAPevXVkRqnh+cSrr6a/knyjI1tlCwlRf2zqzbovo16ODp93eOqV
RGehKg9oIpjf5Hr05etnOLG3d6OzTyR1iCcvSBRPRudjCd4iMjha08FcbUqy
jLO2I9nVkr3Q0n8zOqlQ3H9IP2wqtRhpa89GH66+Xp6L29j3lSx+cEuGvCNb
8gOdtZyF5vNi+p8+9AzfzOb+d7Yhlx8nhyOi+6wmY3bbnxt9l/6na+rUf/9c
jI/PIs7h4cnhwZvjlycadCE11WS0NaeLxskmkXObRj94anW3RNUlM9/lZzpz
O2rnDQuboyeXmdcFr+vRTGglo9O2JUfg8Qrl839pZW9fvj58ffI7K4t+8MTK
ri+viJQLRO/S22bXAx0dvjFt8s/Wpa9JktFolGZTOjTZrEuS//l/nRe/rdz/
gnNZtCmiBSn9d7Yhw73qym3KKRKia92klXN5m5KjWcDiGycJP+KFc5q7dkZH
kQQhPbOh/zwU5E3CKNDhfOTrJ/4xXDH+SUOau8nbpKs1eWCJhU1LzyJ/RK5o
l7rfshUZ6i39UbS82Zp4SC1Gvema4O0VTUL/WsOiuXdwlbL8nshPR5/d/5Vz
PAbm17i/b4rGyTLYkKnpzdHbSWgltlDQBwq2yslzpCkTA9D45PFlj1MdGmOt
6CSUw/7ikpA1SeMYu1JGxp66jiimr5DHeReI+BOa6qxerTPYWdEuwI39/v3p
bMCPHyBOEn8dx/1//BgLf6yKPC9dkvwBO9bU+Uaswu9/aN3sXYGPfuzs/v+3
ze+tFzOSNTOdiWQzYvZ1XVQW3i1a3XsxDLFCDPyQbXknH0j99l6V9MafZ0XZ
ho2KqDgEV+98TcOs0gdXlmM5EUWbaKKHdoRe9v07aKAbzQSTT4hZRswsRGP6
9p68nTZwkI9Te9YFkxKLNAv8wwtncFGy2NDDJXE6P/WwzOhz/PlAh2RU1vVj
lpGTiTVs1mvyrXbPJli2cXNH1GG2otfEPPAo30RroKUWMYd59m/fJclpusjW
qaWS0nlDnil4eYiRQTxeSBV+QWcqKyVW5OzU9nYJhDa6KZ2fY2HZmHAcs7Kt
05LI2jKF1zA2yb10ImOajDYKA2I6Mc3oo7rJ6XCBbHV57xI8TWJitpG9Zjb+
GWNuaRMrOovIKLU0QVAxFhlE7tOd0bNiRT+inZtvynlRlipp2h1Zw4umT6uO
V/37J/MP6eMcuxxJY0fadrKPq7qsFzLnypEKTknEm2jirWjFBBinp5LuaWn7
SL+t3DDt7HmyUsoETCo/phM5W2bVgn7nKuahekanLUUygNyNEf4LktLOSKTW
0fF3wvNEXTbPWMBjua1seGUTMZr0356yvJ7xOsfplYxVBD9lnrT1Knpmm7oK
mw1BvDPpIT+LU6JHCgJjlW3J2SEVRxuLbPM2IUOHnK6urvOUfFDX8DFykTJc
N8Uqa7b+vI7kjXk8CRKfeNlO0GPvl19+2afvaM6cl0RIOuxJhzNuRAAzEruI
MFRhGtiSiOogAZM5zDLQJqOphwUTVemQEYFZuDHzQl5mM9dMOSMw3XqJjIdo
l/2WsFYBT7qs3WKP6bXQ/yRWiF5VXY14nbw5OjEcrDR8StTdrH4msrqkXdYb
ogBTmET6prVQ9ZLEGEndGZ2b9KpyMrj/EK9nckQkpdM+I29KZw9Owy6yIKcx
TquaWe3xEPILXj/9BqgPolVBJB/zvnIwlA/Eut3S2c26Rkbnf8qrc0erYlUG
kAStAOoCB3xVQ8ATE8pLhvxg1rJRg0CdiHx5iChQAFZSzJHamLpldl/Ql+sM
yr0C2Qdn9YJ8IRgqCEV2RTYgCfgod0xyOehZEVfzeTEjp2KLnWBmhwMhbEHf
NhLPGbIkrhf1hrXEsn6w1+Cx9ZJk9KwVsjlMNRP61ewvtck359a0YHClZQ1Y
ZPjxZfGRMCGzi1a6oSWXKU4p6XB6FsrElW3COpbmIYdznN4Wq6LMmnI7TAe5
m7F5SYTuisXGgQ67mfFdMiRuPodj14mqJE4Gq5C9kAO5Q1tcdGDpQoQ9bRLx
u3CgbLdrgGgQRpQ5tQmtMywPJlHGatemR87+aAhBQspl6vANjUcvZVbxayDf
zzXJ7pKEzJjeOP2UMVVBDBZmNL3wOG0I3iqffsNyiN90b2n1bdGXHNDxJmtF
zpEmHvHsiMa1QplkDsA24fQOE5sLy0MScHVDfPgPl9KQs2/xiPDmZOZ120W6
tayrBQmGZqXbEMQIjqWjiTixCSLximkPxWZe8SngU0jiMJsWZdFth3Z2oW2g
NuZ1WRLXsoLPiMT0c/KcW6ydyNBBT6jAXIVsGWjgcCIcvdekQjIg9cARCnyi
1pV+kNeuHWCcDPMfCsWIT7BF2FllfpgBnGlnbyGJBaAMNIxFDy2r4p1VFpoh
5QL2Mlb6GfwpC9Qp8jnikfrGMvY9eveAtm0zoyPCJrLJFSL/L8yX/GmrLEw0
ajpjUPgnYpH0Be3TJkMSTAZRpNkUqDGaBu08dM9mQSemU2aktWAYD77hpbPp
k9iA7M3R3Koag7gO1ntNO5dhq/gV1bA3GJt4j0ZMsvu6yBngosHn1pXzEQsg
r1qhMPJfN6339Z6maxLRVdW+ajhYlmKSduycYJswlhJW9pieJg3VOfZT1qVr
bUbEjvCzI6OUvvDmfkR62jtnGlIEMhQPGxGQUeK18Fluk7K4jziy6JjzaZ10
xhoHyyX1nrTA8MTWWsEXapfiu5/SMeaJY7r0BJbZn7Qeya6e1aW560H80fat
QC36P5cnRGU8GIeAOZ3Az56p1ZwJvXTak5u7D8QIFcccoMOyZhicDBHG7Kdo
bDf4VfRfnMmZnoZoaBx4m7L5lEnyO97wQ8E0m4tm6Po+U8UkonFokSXsb3KH
hSeC1f2jxyvMJNGhg0iduieNM+Jjtc7A27YycDVnMH5T37dnEOtb6k0H7/CR
w7DrJvVpK2+zF2UkPmGQL5t6s1iaC12n94V70JCIpGGIX9YIQzw4Vz1/ZNjB
88Jvxw0rQEsIKrOS1B5k8XyflRsWRgkJW3UZEHyJns80KMLqhvfhD8/B26Kd
GZFJez/L1rpDUFDsbtVrkIM0nD/TgOCkU/Kr/xUA3YBIDuDdjx+yGHCMm/N2
0IYH8GHWmkgnf/l/7I8WEIOs4ll6uDVz3Lom9ce+V5o6+rxewTKT7SETsu7U
enhAfIEM9yynp8syMsPY5MxDjh6nmNSf4ldyxMzhAtTNutZjM6ZD9gyK8wdR
77mpQzCzbUtMJIZrUKQP7KbYe+WtZMXDCKMHsns6ULyZ6WmeFwIfEeuPfjiQ
aEXJCFP6NQnBbolwucYkSMaLZZkUrEXoLHyTsIb4ARhj6OUHvuV4CVvlqjnS
9YY4OWudeMMrR1ZVrgSDUzKTABOeZXeI9OWU1rx0+RC+DS+dvAnoyU3DL/Wg
WDK2E3u3qNelEcIMgN4EgGNiHUq2U4NQSr0SjhC6BHsgzJADtOZYwHljS5id
ItOsHZt6IDcsNFq0+21d1kXH4inhdRETuDEZhhI4FkDzPU6chXvh+rSw6rNN
XjiiSRTTW5KIJ6okkckmImDAqTmGBAzSvWJMW9xmpdunY3slhIMnxhNgpsCI
JM88E8PD6IbmoTs2AUFF/nHE6QV7EWyb3ePl/KP5xpVyPPyOGQSKlR1eqzKo
W27kl8A78ILJssZv1jXSx+QWp4yo2rCd47IVB3nIUl2tOyYK+dBTNgOeOR0m
WXGgZ1sfNTFPOJHAGm08bG2iNu1mTb+lDa3bQvjwU/0AW4ztZEWppiIB6CA8
gsAmCoFF5OzD3TXkk5wP9rq6wE1pjuPa7pJ0HLA9OIt6uMTc1QHuYfvTf4QL
JT7ASR4yGh+wCA1X01ro9/8Q7wA0T0yBkB6g/co3JhM4ytuqTJ+EM5T+kjVz
jmQHeY4j9pA1JJFOZyS+cvWbBF48fIJD2OmvHDFuSwKfzwobhfSGWZAlEgvw
9iL9kk5lvmkw/KbNFu6duAFemNFP50WpemnTiuiRU5TER0hFDfmQxZrOTzcM
oUTW+dPdp0HOWI5wZJwZlXcs+IUqR2giWBvyExcSbYNRFmg/9Lg3NiDA4hGD
kjRBFFHPF4sse1Z0CXM/DUi2M+aqEsTl42dVwpCDqjwTVJHQUbOI3BoA8nTa
1N/IVls4SW3A403AEWycb+i0MsewCMxpmxZkF0euAvxMZjXZ0G1EuFY5N+H3
zDel6VHGesK3qOblxqlcX6ljB1QoFKhJdLJdCxgHndP0kQMvQUs6NphhKC/p
n6xSTU+njLvkI0k7DWmzdVkDo2Al5lEnwSe4IHxM6XyTVPYiEwLZW4Nm2TqL
o4/Ta45FLZpsTSJReU/l1Yds5thsQc0L5BrMDZerFUBCjPcPwQP2nSEn7ms+
n7ZQ3mcS8MkKkSv4dLQiaGUaYeuEY9MPd2fwste0HN642mJ2vPJkQGqMNpPo
OWuY5LCsYP1omQzen7u/k5EHPae5FF0siZKZhNx8CI/cTdr6SvxTZgVb5n//
3/9Ptguc6u1sTdT4rVjJwG9epyvE2WlFfbr8lIhBICrlIWsDJ3vtgx9q9lXZ
f8zxt8c4dRhEX0gtceRnqCH9jjdNBIIZBPSSjDOEmzXXTpGZMYJkpU8Gy+20
KejtIuMGCZ9AfLRQ626adV3pOD7J1OkLBmJW0h3k28A76uPikSe44wFasNXS
NEiDEqWq9QG6d6Q5Z7wPtSw+Hp6nQ+JuRQISsReNXW6Zp5UT2/R+UwI7pvbF
zgxp/tnsmwl2LvkjCaGSJZLpM/nmB0IWjoHcT2vTftRzlTXf6NSvHIJ1mAvP
uMRZxlRou5NIETicbBKTrA99ts9G1IiWJR/kSFs4kQQPcfc7PreI4ovMwmFH
PBpSnjhvZqtj0YifzfrrxQFh4AcJkBDF0JghipMkDq7ON88lCu4ndN7irSxC
nAWeJrEB62zOT4Qgp65fRmPVyAlHM4vE1hE/H+JSLSP/fjXYMY/KMdOaPZPF
6+WcKYmrcXIW2QhRnh0nYsEhAhG5kB0+O6quso6QaLo1hUpjCwwL+vuGZEQJ
sQo5QvaSCAohXJ+Yqm85qQpRn7DZx1ZVoYm89BspYMTMidfYoJVUctaRj4Za
HFpAAzldZg/yHRND2EFdHHm/cCC74og/YO9YWTQ1cRC5WWC4XYtE9Plolzvo
0V3TRbONbU3HX2agfhOcRbLqOcOIkh96E3lzm8XPsXRZk2DHSWwHaU0KroIP
QFzKCRQ21GzyEr1mFa1uCY1nT6f1QwWHBNnRbwV8kojVUlLVoZ6J7RABJUD2
DPoLHLDr3WfgZQ1uzR1npMbpBw4EOGRfmoUEX9jtiQO1EdcNiVYbWL8j+3lr
JGsyst5yiQTDr3sQ26ZZN2yTJUQET3gL1tiB4rC2LKl1aRgaK9VsZr6BsEuS
I6hIth/i6OOgzLauUcsM1uRgKI4wuVoSiClIJ3SaNJPVc8AFAB6xgmbgvS3o
bhFNIUALcZruicNm2cWRzy7et/Kx+QTkbtEUr+N3cnyRiLSpZoCcSdCiMA5E
Roj1uiTtyPFCQhDz2t1N2uQPimUgH5aMGYt1RqEzWrbTqIgQZpcjIBDB13WT
iGPPGgaiVw9xf3YDdR8q/NbG6rYDjqcpBIjmxKoJbmHdkN04eP/MQx5GNBME
oiULOPxujkrF6T1sVNL/Gb9kqH56WeoP/3b6N9rJjCVUtVlNJaHBMFz47bBW
5YdijSX61Pu/xcyPD9O/nf0t3RMBLw4MQ7JoMLyCfkrP7LMm4zMg6a/wxqeW
JIrChkGt+sLnUWgkuOjyEyPz4OeE/fvG3gE/PLWPPCX1uCuvYACyJKBMSEtm
QL5o8J6OZYYSJoWeEIWYxSVe0JtwmzCfi9+C2OmWLSAT2JzsIT3K/rfLyJrj
gZSEEnjHs2QVMfKXbDXVNQ2PRn51WCN+J2xHdvgqIEL1wMkMaK5ZqL5qhwlM
3rSYs9GcluzUGAPyXEiFNhlSshzDIu0gi+bJetHCssC1iWwFptDAgkV+Hc50
KeX6vD+QqTvWU9b+znkoy434HJoeRi5ThAks9iRW3RIebw2vgO3tGzPCj2by
QP6TueMUmEXuh2XCBeK22vB+NHDRhIasUyfCAyTdms26E5Kqym/FJOAIw+5b
yXoGrJJ1tD7LaYtR6gEKaujAujBjVjaNtquoN225jR26mp2Le9dqKImB7hBw
j17NpbQsoRFjhZoyhDHsHV6Zcr6kwbwhuYsM2FH0YyREyBcwjGH/2wT6xqki
IsG3EAco09pF9rf0Ba2FD2RjlBRwZZLdN2oesNlIZpls4d86ls+tZNzVtPHq
k9i0IBYXxyjx8QWJI9Q1zIShd5oKhQZ6EGXRfgtMbi65n7X6AldrhpuAk/8Y
ahEjl6D2P9DIvQ90cax8ATtG4wqNx1gASF6IeNU8+oKTCT97FV9USUiGCNPB
j8QApA2Q9N72R2IACZRmZYHlxilWS3aMo/WcTODYbCZWx9ftYrlh4Xa2LKpM
y1MRD/bvgVUg+NJsYcZDEnKCdcp4Cw5BBBFFuwrwovnanFA3fUsb9v37Tskz
I8YuyO2GGb3z6yFZAbTwblOx7zy0QN8ASBLOMi90YwZmh8iyEv8a8jcFiee4
2OxRaXtkXHHkI/OCCn+SIIYjTnsyhb1kHGT03/r982nXoqFByDZFmv/GAePY
cjBxJtEa2ismd8JaSPCRgNsA38RquCwLdgoQ79UyhfpxTE9kQ+TyJrqdcgAs
3MT4FYBa6lyipYH8pxMmfIRowfSfrCbm7i+klL9/f6KcGwjMIMxJVSDVwyAf
LjCCvTZpYc3+JChToj/5RBK2ngmWiNY3mDfZgq1YOvJuAZw1j6YBItq5tlcW
PTB6/24ddoGI4ynHuRLGycki62ZB8la1lDblERu26DbyaRtFmK0Em6z5TPCR
RZcMAuPtff/eK4z+8WM/HdEp4gylxBoED8bvrha1oWrl1XnC5/vo7XGfN58r
VvaiVmqek523oyybd/YDDD/L6Ri4PM7pe8CJxd/jKDQHLRUHI9FdOJUiYOFL
ah7VZGeIMnoaQqhnCuhl1E+up5eOEoqRwuAe4BHlVlhBp9lK7LooNRhB1CBZ
kziYs3c9meyLSrQzXNZqYlqAN3f3maFKVkVLLCmgeeSIaZ4Weq18OJmhoFxv
mNLwkhcGnGPXPWaJzt4ecBSQKapIvkBZkYPxGQU0eG2kQ1al6g6TTc9Jgx6g
O1Y9P0BVeEQ4XOzEJSFihgmbxpxuvMPJ6oXeNzgNb5tEbxumpyE9MORTeN4L
myHm+KhlBE2lBNC91hCxmojeUxFoTQAKaHUDR3EMuSBGE8OQGIgn6dmVUrA0
CooJnwsYRzmjA1YgRNNJeifelXguLjlO38M+WEkIiJYJG7xuo7h5oeCoZL2Z
kr2WLuoa6YJMcR/ybnFaJBC0wDHbmFZkVIuwkISQC8XG2HjzYqE2x8fi3lVp
b+9EXJHDQLwn0Oc+AsoSM0ZGnz6fbeFmSWwzbYlRs6ao23cCZPD+h38VsfOM
8z+SrGo19YNYfEYGHw8jRiyYjA4X2ojl+pgi1vvvEv7gHiEsjJjFyZudR5lh
PvKcqOXJ8+GyfPsQLUak5YFGaGEY65+JppVUnXz5rBHRvyOL4O4Bkd/NJOti
aSYCykBCyWogBS/4hcEQf0QIuK0bBpP0w7/0qUV/MwbD38N4DzgqTpiq66ji
K4cmY7CULsySKckz0qwX3Q7g7+kuLLoneYY71nQqsQ5siscsiM2LMAA9LunE
d7sCLCvyNpn55euuCT1cfl1mUBpEDS5N/P59p5UOnf5VXUHrsgFlNFSjsfB1
Iw2q9JivF2U9pY1WKyi9J75xmmry2xnllhWDVCaNbrEOJW49j+EZGscxINv0
3QFqIUEF+knCHp6ALtwDgtSdwNHhgbC7KzK92ZL1ov4zSyn6J6M9xBvFIfdK
TGfxRFZ3SnYfKVZwEHdRoD8SduKmaA0RVjCEIAsuAMNIwQYrx+63+FNpKzm0
vH6oDGYoHq/ITK/mObfEff4UO7ZpqoBBAWx208xYFnOSEcurLIwIy2QYbydN
gKGBlTc8ed1sbYpTw78VNcOgtLAp9isfrY+C9bFzO1vW39R710i/eo5kdhUS
mFqvJQJg02JjEJ6KqftWlsFePNc1DUUMmDLEVuPY4q8Fzn/FMZXphtfDXhKj
12i+Cf2XxThvi6U91etq01IT409hOfAhy5XknHi4rNdSS1nBu+c/UUeb7n05
n3zYh8R81FZGwXE89VLgx5APj058pt6xTHwdCuFYOItSqnRBEjeItoUYR8NV
XgH3rECDLsoa5VSsi7UWfsHKlNdy4F4sIbamNqu1ZBM0oE6meLPYZNNSLGGz
eHrEZpJKaY4a33AikyhPFGAvOLFDUqAo1xISQb0xepROnkVk4VhyyAmZfBET
aKiJjpkWDZYTAHy3awoJ7QYSemyC4UgM2kuahS1x4bRMKnPoBwtGpecCiR3u
gt7yuAocmP+QOZJDSKJy0ViMyMmfGqozGH/HJUIPbW+jBW7GkQcBrEhMBKZG
l7XfmI8C4kEzaBHpORpU7iQwRI+JzOFIKZhlZ/gUw0McIh7f2zoOSnAQgM4a
gwl8ClaJOJZc2o4+62VgOIQkUZCNhkFQ7mdJXdGoyP1ApSfqLAqyIFZlwteC
3BYDo4vA2/NdmumiMklpbfuzFou4F0WoBRQn6oZ8WfrpRurr8CTq9vRVelT8
1BKhm8r0bCdNikohpOjJVSKfo3kCfvSZ6BobKiX9m8yUazNPPFzowWkEtLPC
CLaOzWpBZe5Ocg9u3+MUoGAn4OhpcBQetg98D4HGCAnqcqs4b61STARDXGa+
uOQXN1XKMMDR5wYZeEdu12AcoWL7yXWuoBIjkqsfaIlTWtRCoVxSLolWYsz1
/EXNldZy3BXC/iATcBYygaJFCfZ6jeQT9DnJT5QcSvS+R71hYqEjzlf5SJVP
fSJl6nZoKO2ROKu4E1lFbpY7IRUCGAcnD32ACmqMaO0jFY6OSSgW0Nnb6hL2
epiIWBD72ouavpZgugg1+xdNk2RquteLte2TXnQtl00igMhlk1oD34uf0Iu+
3nxGhTLcVBJk5BnjAzVcma2Lij8HRCqJy0ckx4JJsrZn4az2Og0ByagqwMAM
MoxwBHZbjSwJrACcKjmRrlZEbDgo4/R2VoihPUvF99JMjiyezSP2tCUFAp6R
HffJw2A9FmqXWL8DadeRTKx0rkFM6PxqgkhQO1u6VRQPtc4mjMJgoWy1vQJ9
YeAQYAlM9S05CgoblrXZm68mNjIfqaKalRtE8xVq0q5EG3JVFCzcJONn2DkB
bZn8A0md+9gpfgELSQJTONgc4OlDKMiDSOzHoeWGvsm1svnMKfxKz2pco2YW
h6/sVDgiPRQsHa39GOLxNgSzUzavXKhQbERJxp4wTA/BD+iPRRSEs55qHRpq
scgg7yBjiKFiBKv63GweEmG+f49b65CbQ0d2ocKtJU2l5iVqO9mvbxRnF51K
ei8fWDaWEDMHpzOdUJcy6wRWx3XnXQgxc3uohDcxzwxx7LNwvngKTh3bU6So
akMhk4fcT1bNYl839jK9A5CIVb3XOl8lwrvIqfxV0Y4Yar2DnkJiaX9IZsJM
MirNBlTpJDIX7ROr7afeKuzL02U82abgtn+aIePuFYpc6EX61BfbhRWJvtwF
66PMkmySrucjJiyvfMAh7YeHYo6KMJmWIVipKIDwWaBVCp8wdfweJwI4bFB5
Q9pD68HXzX2vYWZXQ6BM65wdYSmN+lbVD6QUUR0Oxi0hx2AS0wuZxvQAkkOW
T0xhAwyfOi2ylqc2AY4aY47Y+gSKXlUrH8GeYuA8me9FoNZvbkUAbIhZaWT8
bgVsGKCY2FBjHlEVIzl4+rMpHMBgMfKvFTtPZlrhBMvSxyCnPn5LX73fIn9A
/+IrAMQQiOjIEaFO1Avr091HU0M2AFLQCQw4sTyOVndH62OHV+rdaax7blUX
YHpSHgAbZ8NHiJaWlUlYF2sWFh9tVG9lZfZSwhGBHgEbEVBpxs9lLD9bXyJX
bvlA/iwiJhSVczqI3ARI6UB/b2CEkrsPhZ4cMoyNMm0gjR6PUM4S7fNQXSXQ
FIjkhUt8CJ5ZHDCnR8SuxU2Ngh7c46TpA6oRN8sayQlIKVIDvQ7iPT9LIh0A
OiDKrOZMEUfwUR9273Ix5cmMQmTM9WJxQR89ZESKmGARW6uFA79I8imYgGe0
/hH3VTam/KCPSoWfTro08P5KWke43AgmHJVZWUfwrFZZziekp/V6oje2cw29
7eZzTkyae4cjbckBtm7hQM8cj0VmSZVVEeDMHibKoMGSZyHnoWFYrEX9v95M
RE2zlZgwiudrVTBy78Zs8cmOSv8MlmG8KWbEdf7egBIUB1gigVkuQk0S/M6s
kMbbGbHK56gh62CeFP1CLFdWvokZZhJFAFOFwZYq63W3pabJZLu4ZB3DkEld
zbb9WpDoix8h0b2pzDGSaINveeIhsLtOMWZpFjGOHm8Od9KhqVpZ565nVEXd
TbyzWtECAcYTbS2NI1xZJqzuexMeejGY02y3agEoyIUbOfRQUePHOIh+jyiu
u6tmy6auoKj6T3uAEm0AVx2Rq91wCXYbIahDiQAdl6aTiYV6zaxoyPt68EwK
zSamp3S50dQBE00e5WAgD4WwvikdQTB+//7vKOo9OTnUhlS2aZjnvi53oa1J
g0Su+1TEEZzWWpAWOijRhH8RH4askcDCYGrOsGKNJNWQxR6G1lFViICxd43A
ndR0VO7B5YmXEeAr7ReB92KkLce2AfDWWgTXNIjXQyUBFeYjmYgZj+PifI4r
iXPnl4n5Ab4/s/zcqKtHlqrrb+0wMREWGk2ZVd9wIFxyQLDTSNRXvlMEQwJ+
VsGjTk7CW4MX8J5XkXE7Dy0umSSrutuJCXNTL9ggz4XvJVv07FaK4cD1nkko
zyiqOBrNJnSUrdXk0Y99f5zi5FswwOWYFVPgPrjUsh/hp+WT+SBbJomsyM7l
ZBaKseOklXz0IxJRYDxgcMF4u1KKROUPtuY6DxnD46E4C3b0ExDazsIzvtJv
wI8M6CWDZE/aeUW4937DIWZJ7jnkq9QUcZtqKS2NKb1OEDr2oTwBB+uQUhGz
1+57HduKLebBynHa2VaEQkzSBkl8LH9qPW6QARxDi1LhnRDBtaj4Xcilr+aX
8ksxgEK3KkCwQurAD8jLzUpWuZtpQSzfCSBw7sEbmEyik+nBNzivo73fOt+/
hHHlrZ34VhOJ29RKRBh1lrAw/ncFB3r8OA40lKviSyQ2zplS2XRkhrkOoa6B
HXaNdunhjgyc1UruQoeATFMsDRfwD/tphKg7hXUI0xtIbH0I5VaS1BCRosYA
l63YV2uuJB0PmG3n7ElXO9k/Ty+/QdLrxJuabBiyLenhhDIqTlej4eAl4oGV
GKoQq17Ocf0SoKmk5Wrm8hBj1foAcq1CmNrKypjHrbulEdciTL75KjmX9Wbd
Stlt1L0j2XkA7+OIlxp7NjvT3vScAA1ylTjrWnBiWYw11LlpbVDAGgxtWKt9
q/KhjhqRTTrUIN9OsqBNB16uDcjIhndasj3pewgI4gedP3yAJ9d4GqJu1llk
IEsdRA37uNAI2Q7wqwR3ecfQrFNHUDQiA8A+SKEbCDj0CUeuJWOAAd/xJah+
aYXBcLk2HHzy5FfQlb62vrVsC5uk0i9KKSE2FFfI4fMI+oI4orMEUVZ6oeoX
CuCvlttBQLK2mkeH0NojAiQbeVmIN0n2CBxP8zXYRAQHRyw24dO4tQJZKXVS
UFqwF6NuQF2zVaEthrPEInyrHamwj3hEFsQtFDuuWb2XeOAyswy7T8oBFJjp
gJga6mFc3F5QvQmhFMCDQDJr9tCnblRGQq7J1CKc23PeSCwRfBZHhfGqrkl+
GHBekp2CkGOQezS6pDtM+A5clY/4NrfoNwMuDEZLLy3453xAwN7dW7Mq7krp
BPac1+vOzkcbdBNrSTvq0m9CNoYNoSiKA0wh10iqO6V9IpLkvJYgCAfl4chw
tBwdBXz1tPQ4sVk9clUlggbIPLEVKyTl+ZYDmq2dkllZM8xsou0utTqzR/ih
2XyciQa6HbGcru2XMITSa1Gmm6kWKbOAbYhNAUqVrdHTLyGdIRdPaUsimyW3
dXgkxLhtzzO+2o/UrhL0xp+3FlvL/KD+BvEB6eZlYSOEZMlkgWgn5mm55FbV
Ee1l6CnsHf6Et17KkTvrhEiDP8s2LUcnRONJrAUtrhJtcMW1nE5KXf65G6iB
Egk6a5Mlou4D0Cm1ZwBtZkhnVMT4446xNrCBrD7qjYx0YKTResum5x3jpfnG
JyIZgrstq+/fuX8McMOdq8vQNcKuEYvygqyDgOakLaCT2dm7Mv8utU0XYXKa
WBmEgE8o6iIWSR4PMpRLndDqrptx7jF8o21UuQ6Fzwy76yt2EwR0gIaYM+Xx
3DF/RbKYhMYG+0pkkCYpCgDza/HQZzYvifcSbY5WuvWSS+OAo7DY9dT1ykLo
Je9JiR6c3v3xbshxEzL1NJkh8bzkicYzZPLwyEB80O56urPflUlDNUHmPEXX
npVybUD2M3Xwk73rs/1x+slBOyOGuypGoD562BjAQewLtewMFSVpOT3OLEnI
jTbjU8MHkXAEjH/Kur+TFndcmY0W42Dskn6lbXO0P2xbJzlLTfE9RFOwTEG6
SMxmO++9Y1WYWZY+ogUg0dAusHtW2ltimCBcMWNB4CrpWM4Dam8zVCAItCLq
uyayravzbAvShYhkmyidJRuUSvtCVcHoYucB20K+YX/uIBJrBYl3MxP5PrTc
bs/IXgiPNdq7mCvKPz7a+0jXQGNKOXrOAZZ56X4rLFHAjrwFdnQTRWOpuGP1
uHAjFBqH5nzSxY0jBhvY19wkzTIMWvCfaK8QLW5pgwD1bFxPOdocbeYUoESp
KJIeA6i66BL207xrFm1v5dP9vhKYs4AbDdJkzA8RPC8pqqrWsHAIcEuHSbRZ
FCye7I71REmf64mSWLCrIgJy72A5+KhN873fl/BduX+Rb7LDAk8Kq6wEoKgS
L1oCEX4SPeg4MPwQQIQwkZq2E1TSI27HQ3WSRdIx9aJUhEzR+JcI/MiK66V0
gvy7YvaNO1Mwh1i0mr0ZLqpQSajQuOc7DZHY075EfAS1Lbsj5w/Jem7BsQZj
zjrrVmsNVXsGI0Sxgk+Lahi/WqfEnkHQ0rSc94j7SXiCVALgwENBGMjUiQIc
3YHLNAz8B4sC0rTN7rlpZjSHQoNGI2nQhNf763AeJPWbMzgt2o/HKcl3+AVz
fZ5wsX7fvNJkthcXckLbWq1E12zlewnAyT/G1hpjVxqSCUjus7q8Ed5IvBeN
fEdmbeI9LcZi/tPYorfhlxLJJXpu/Fku2mRgMxRInZ/9QEAfbehBGRmL3Llv
xT20e536+KPdej8L5XKQ1/qX4rABXeq34ecQhCmjI9C7+6HG3QGcmO6UvVCA
LJAUqXTC5FC04MeVmju0Hc2ahrsQpt1DTeyBgmQuq32nfQC2T5xRRvoztEcy
YFImEmWUEBBS7LlvD4lye804WJeaJoB5pf4jNJdUN6ksnE+Oe3mJkUxXmOlM
EmYwzcjO2bTyAuvTP0DxxQAOQ8ttA/hsqSInxuS2jaEQKTQAa3vd/lcM7uIq
b4zHa6n0ELVCB23QgmsMWhZ1YJ7fkXStiDpcbvLY4ByqQ2xm8mDtby8bWFc/
X/RuahVjwY9/MphoaHEODD8xGTJqOElGGx51QRuNEg4laC/chgwtsrJmEVRZ
r53XfQqXVTBP9Lp5ysGy5qFoVm4WHPGAgxH7K+pdw3hgM+0NEqVZXS6sebaT
6lJvxZcqMBNKRQPcLEZY9aOI1p7tCMlF2jdgMrALoSLgXyi44PIxHuPcVcDg
QZ/7EaTTTOXTPXuhPkMTE6k8z7LB9IKQYMuHpJgV7A3UKGfhzXvCRsSqiYG4
WjkBO/Av8Kj0EbMLX+y8SNkPu6jWTgTtOPPo1SFwJTdHYCGt8zmWXOxhODTE
Mdq9O/Rw85Uo/Bx3apDrEeol2W8d7hdVtMAu0HGUeoHM8W9pJe9js0FCJIif
QnABgRJdhs4xDuv6Ikyh5DXWE2OPWGxebk0QGQQqXJvTeh5mR6J0i6KVpmKJ
7w06DYeQeZ4d4F6/IwNYmVMdDcNGP1FGmiWagfPcHRGgDFIJ88zSXjiJncAd
JFwkJYQ7L+FmnnIg5DIhDdT7+McUFpqZapyI0DTJolZupg3WmELvEhDfLjMr
VvgdmRcF+SKLurH22y7pKRwlyW58YqW94yotnOxNUzaCBQTTSTsMhE6PPEPs
EwgkojbbEX5Seik1GpnczsEWsLhIOFmaLlsWIZ9sABfyXVryEzi+/ROJeeWX
uINviNJEzd76179opWrU4jvR9KRvrRzVNKa/f0NM8l7SNuKnPb6gR8wlzjss
tau8zS1YH+ROhJs/oL4tXRz5AgpEEenNuSt/yw2WD0ASX9zytUUP4da3jg6T
UdPcTp6Ga+Org6JaEc7qaZTPfkC8mEkTSE4sJxKti57n6z9S3xlRdVfdcJce
jqEAQKUAJu3vV0u6PyPHFwv5bauqz5dv4Z0CUguRPgSPHsBVD6nix62soh/k
DuciAP35MhniOEtoSxekXpowGG4yNm4NwbiwYZfqskqZsIgO9ivRBQQuEExD
SE5ugKUqwY6V5vjimjLyCfkIBiqSUeXnEqGLGXxxL0rP9j4YpVylPS8FJuFr
jTezEZLCKOCMMs29VuYRMgGvpCPjxOuXOJhaXWoQivnC/FprQ/bey7I8l/uD
/sDTf8SLMh3RAPhBbGor4hgAEKTOpbqLkUMqbZ9z2ZNCRRbfIyHNV1ccjMUO
yOmLYkyIIDfFQnSej9hA9/7icVdbNYOi3tA+Ea2HAJLmcQhVj/GQWaGpkIdT
gNG5NXsPmXshxyivZ0oSm5cVxhobIKrDN2j7i8l6GDV/YQB6qc2TCBzPdoA1
uvfXjIU2c2jYYS7r9de7Yfrx4o5l0/nF54u7i0RTaRjm093dNVDxwNO8Pj45
Gqa3KkhejE+Ak3crgF7fofuI016oABAy5pVELZ02ztfQCUF8OrTf1z7UzA6M
GTQLYUZCPYDWtJuG6u8gHyxAOJYZWrqiXguzJzd8lRQsJb44wi/gBEDw0NZ1
Mx35UKNAtQQOWnl1DHMu31bZipujWi9WlZ/ZrEEdj3TyiSthw81+IX9ROc1e
4F/fv+NieaCTepdvtLhOXoQbr4uPgxDM7mBJQrtqzqbopWsINff7x2TlIMLh
9bs6otBdSgitOsC/CflMCRbB9i60n5HJi/4r9Fq7SsOv/BNFOLt1FxUBy1sj
Y5qRrStt2uXDd9vORZDQcFOJzhFvarUuYea4xzQnXHabu+2MU3S2lGfSSfi3
MMySPEggVpnrRH/zYA3f2YPLmKV1VvShlOzwfvSJoxZSEfVd95OTR9PwqIFu
xauh91pTL0HSSjFb1n7jq1w0/xRpFsY4Rn0I5d28pkTWZO0mGQoEv5bjBb5B
1s7UaQ6zpXVXkamlMjVp6KYN41VMCLUskvVT1Dw+973jSZa9lzrqz1xjL7U3
bbr3/vPV+3ZfVL3GabRWJhadfWOEQT2u7frjC8RnznnfRDVJJD+4E5NvTOwb
o0W5hj0R58VuJyZMz4SottMXbA6dORxj0pkDnxvkE7zH5U21Xuk3F1pD09m5
T8Qh2Gc8hk85/kNSPSvlslg+D9Prq9tYShv5FSaJWD2Y5ozDP8P0huPQX7ki
SJ4SCbx3dvP1fD+iyzi9uGcmQAwoYamjVZG1mYFqUElP5t+44yffS9M+Ojl2
0rMq2VSclVTgvS7Jg9KUca3vKEeycunfzBlVVZ+n15PHmjNbF6o5KyDndlgD
zfQ7X6QoLU0VUch1ojnMB2TO0r2b67P9xPBFwxA8CRxRh0r7qMQynCUOyMTX
XiY72LJFk61WnEGh/cUNXsRltCgg3jgLJOuwZRZmg8U373kTxIuQ3slQMwAb
5xU36o2I9vW2lU4pGJ9kp0Rb0j2/vv0oiRHgPJlX06hi8tfVdNu1XiuDomlJ
hWaCj4IJxOUttIsMtGHY4339TSofwTjDEMPYkTUq8maIkFR8j4GGytmulbgj
Xz9K0hKkGybSKcHX6ua+mzArRImpDKM+HL6Hgm+SzKydRCd/oNi09Kd5Xf+E
3/40zZr2J3TFHKInJvPo387+NtgnLcCIPbjZQNIZ6FTudOt0O7nM0cxKDxjT
C++4ladJGmWvUrHz6R7Q7RCIvFg7ZXy5iOIEhh6sF7GV5s8EL+N5JoLCJB3f
MuE3xC4cNAB9XJ5gtyFq6fsM9Vm5mTswG/iaWUMvdbtgl+/fb69OrwV7HRvI
fPuEdLT7/v3q+uKSlqgdxVvXXxQLKMXfTbWjp+CR/JVRDCbnTAcjnug0J2A6
A0+xOLSj4Z8SRcNtepHBDK0iEUDetJL5C1jIVfGbpQixqyxIo9MXMAFahKHp
dZg/fAfFM1im7qF+5F8ncaQdOcCZGVlR8xUY2ZYSmRPvLDkJx3aEtdBn3FB8
WTORT72mefGbbipfZOa9Ob3fy3oc4wJuS6nz2Ul835FgwPf6jGFuK5E1bLXY
Hd67bge7x0nAIGfl1BXS7Vk2V693FYUDMxv5PfabBT19WvE+2Fqfgzi6NWps
yaJmKEa//lyx97hXrwp6UGOwOGX+MwPiSwlCpteASjoY+4TAlu8im2SP+sgK
r4H9tI1J6Ayu5nC49nnGSTK9lNXXtPhW5sAte0suxpJJppkkuMT3mme5Aknj
Hut6H2VojXRJwvvuHbjFcrMy6zyMw3kw769zOQ/XF+DtPvxXyC5Fb7BoBdSb
r0hordeICDspblmy+IqM5sfaTt2FSE1XTiP+dIyCIvOHswdc8yzcQ8jz4sRX
kIIOqUHxjOQLFsjkwMmOR+wfJsl5485KdNQ0S4bssXLEHEPLOLjlK39CUzm1
bBqA/t+7ba3z8kvHkEqhoZhPctG3iv1MbZ9ecEJrXhLLgbT2TrSP9O8vAipW
qgHE1LPW5tlqWiw2UHMqeaT2fWM9hkpA76VNFFGd3Uu1xBGV30pTPwvosnrW
8Jl0mvE1nlagw3cr7Jkeyfwe75PlYSHX0BoCbwA/7gCPpOQanY39S/gaVv+l
FQqH+0IZoQmf0n4MX5OTddzMV28mTXQlYgbh6MdV/HEfktr3YuL2/b28rJbt
JDEPp7sXKFp1LXvYmbpENilZeW4xO40XJ3/SOJn7k896dQbLCFNWQLH6jJ50
f9LB/4Q9pJMM5pWeMRZ9223x8ics/k+2ep9fBAxPUHgi/8glrWbFWgDAoZcT
PAIGFNACJdaB6/+mBTEJ5H8G27XnlHM3W+RCWSVAryrKSVAQvcZAkhDatGqw
avhBq/CiCuUkavjS3w22YMNdUkHtWfZOY0uybgs2qJ+oWUR+f693H3AEyJPz
gj8zxNJO4kCDVG+Oj9CtoHXSVzWJDu7z85P2NPbMOFQCkzAUS06QlaowRM01
kcLqewhyU6/WtanZnjAIzLwSdVzWuHyqdd5jDbsZKv/IjnbcK7vrXBPbSb5g
h7PSjz18E/QCiM3YaBMR6tNQ7Gh0ImWizknW5opbYmMVTajRnEmigNemnbph
mHTcfFQuzl1zF+A7cSa4XSfYbgojLAA+QwsCxU+sN1wU5y1ik3roAzdORRRh
IkDOs9jgFzeAejVaPopJSM+vtfUf4BCSv79KTZieMtl1gEMNkjUTgrWp9ORb
16zpSBZdN8cRHws6eIG9szJBcwmoWuOHs2wtZnqhSPae5YrWOCIGBXnOJBga
/blsCeAbH6NOIseF6z38YnwwIiStFC/AZqKgh2I6jHcr7Z5ISyBxwYxs+hTK
yt910I/z9/IlvoONt5g0bjFM+KccRM4lGm19HaNMzBJVNdUiBgNIqX+E6020
jDkP1/C2/ewvenNY1NbbsFGqL8qro4MrWpgi4+4NEmlJMXM9eiAeLo2oZi43
fpgWTWf3C0TlANfZpkzfZ01WRYG4IFN6eK+kn43l9NHNl5MXuHfXfPWlsyKk
qAXKQO5sjz7git5BBI8eMJhWmg1Zn5oaTN72aiJ6j2jfNAl1sSrWKyd9r46o
ZfNOwbN1nLd5R70E12i52iXtQ6HHCZ0P8mKx2qXe2JdsPjGt4aMSa275z/65
Biokny9tWDWqkcgZ4d/2WxSF0RQzwNeI0O+GXrzrzLWOAbYAYyyI6Kikd1I4
+fi+EYVG+yvb+IYDvgNrmMYOEYRgYhUL2TfHGMttgIfuAJrtOrEYA+/vNkaD
o/gOFPAGkgGM81xv2qXHgEnx3RMF+eaOlAYSqh/njMmu7R03n0f0SI1eXacl
KexGEKuqZ5OdQxV6JYLiUYYMsdGeNALvwmY1Gv+SBezct5D8Is1zeldXvzx6
8+NHwiEEDdgbWNy/KYLRyYVFPuTDd2fUKBveaNt5lK9kTRJjIXTlUfUwnnt8
c4gvhm9FVwvcHS1sZQ4ecdjrik0CjERAIj3f5gZasqB2uG9c6tBawbnYERWk
j0ampfeTdeaTRNmjTngdX24AFmyfPOqh+2A6CblY3qsEwUn6tVwE8dQOyRVw
cau0pUPhkYOtGr2N7RnSL9JDPr6NJ2gUhQiwwdEv7LTyh632vVu6cm2XesBC
ZjyL3FS1gyH2SKloL70+4Bj5Zx8/29EK+NYrS8lKxTWodq/WPC4C9S1kaPv0
RjW2XD0qWkuZ5KIKTfizV1Zu9Zorrf01eBUsDfBDTwpymeRGKxXEjVo4u0gw
moblwpf+7uxRXfkrSnjmEvAB4ivxZXnhrpg4Oy83ZrGT+rCsYdyHgHOFexA0
4sWjMyIQICYLaYrfEhHQjA3ZjT+ke2c1Egfo4rafnjcAzz61I6NNBnX9F2uf
sJfzT/ejayiIJF8rWhJY8LRoZk0273xl197X09v9kK8DJDThLTKcTACD/pxe
nN6eClo7aoanifoINKr2ysUGQdwxEq5QD07wiSagyO9aAVuctigxTmXalkrM
OUCuWRvtEoGTznq6XvMNxjIiRtCm3TICi3GociLutsSFBbBQZxzsDWdrxXzU
bJNYqWw6XIcOg9l3owA2mzmxV2ArHhU9unU+LJiENkzX0mubD5GWJzCFZTfT
qIQEYVUGJuFngiHvSm02z8Fihai53zq4XrQFfDhkI5pN6SNrJvNS0c9iV5ge
GHhMqRkd7IXLR0MjHJb2KBNpXBDdI9kHMyRsLtidC7ITaroDns93wtm1XZ6Y
YUcs38aBGNY/CHLeb6MxpnbLFDbG8tXS+ihMp5/MlwklYbstQ62htb8UiPOT
/y0g0Vtu9r/3/i+fr273GQHnylav6NW5I54KH9B6M2hFfACNWmQmU8RyBK/t
UUhUMjpiJDPk4sPVjwBcWO0eYxhlzkYjDwDXHJCKxCAlaMTgkl7N5aTdLhHZ
2zu76uSUG3gztKzaBCVRNHEVo9X0wJ4Ru3oqVx7iQBIb4vwyALnguCcWfya9
XYa+Qz8M9bO+Jbt3drIfGr1ijnbY0BKskOZ3kaozW4dbViYM0pzyRTpO8jY+
CGY5G4lvzAHEiZvRYGl8bYvvE5XILBi3vQAmQBpX1V6TptIxFJzGAcBQ1Wap
HJ4chulfj6FNaIVknLXBVitywEYhC+j85ury4uzqyxeGlCJaGXQao37jEA/3
iYC5xn38RH9EiKNgVWJpnDSUjgle2EquUNMPsZaup9BlEHcjbhapAUK9ixIm
eMaW1uRxa57d8JbeG6M8LtXxnEeQ4MObw+Px0VFfefukAAc+rFd2m/G1Jp2T
Zg++RkKqagOnm7o0i2JUz0d30mRjb1Lf7T+pM4u6k445kjMA6+ozO5VjQw8c
e3ksN7Z4rCcpUdd4OEfAh+R6FRpO2zTC7SEGExIe3HfXaRcKJs2Ow+e9EZ6Y
hejFNOLCDLn7uwhIbDaQE1EntYF6/IWjwe/k+JsITIuxYQ0GgM3dPEN6TKAE
CfOZp5LPuCBhY2nkcAnRLv6I2Z52YQeJ3SuXFcIninSVHI6of+IIYoKHbOuv
zeskg1AyNIsjQ9xJgeON1lbhrD69ZtNtSuYZPEXLctsNJ7boONLjqcnF3nAA
TL4ksevMUiDzZeEM4vLtqm2yMnWfpDb5hXnJ1dn2Q850ISwtATJAGLNKkuR1
E3cw6KR2shKUr8XdynqT6/Wv/s5gabjDUoL7hok30qR72ULv5sr3/QLJ6bfT
c4twY7ojqZ86OS1+SGfnHBfI8T88QMHak+3KiCFbjB6cKzwWblWo54mcsRdv
Tt4gFMR5L3R4Gx2c+551ozuysDnYd6mhyb3zu8v99DR20ONGb/3AGPhV1rhz
zNgT2EHbWMgiwnWgWZKGPaXMvNclbr47KvvLzPykBrolB46jCmZ/GQ3fLoum
mTw145TP9UN6gefSK6RD0r3PF1dkltB6dxvcysUi6JaarVu5hlJUWZNOrrWf
jF0XyoFyrvruVCoNQyrA902DJ4WTzCRmY8vW7X7jK5gfgxOs8CbCPaEsSG8t
SHBrARomPEFWZk2BzbHpFHe+4ZAovTAAeXBckrVcC1mHJlnMem3/hrTIfMhK
u+nPeP2mntbc2aPP3/op8Tb/QINtHPXSpk3aNhEoRwjnr6d/4eMnaWBAwBCq
koZAyEeQwSoHJLFm1+abatWE1rvHVuSq5vwjRKbKH2tQW0Q3tCeof/SdArSP
F8dupCTYIebYudilvPMhAG6NywkZxukGOLl02zTiPNoMUylF635OOgPwDdPd
fmoWy2B4JgfiuWAwlNSW4SUC65LrZqwemib7JW6ZBQvaJx39kx6q1gNqGwbT
x9cBFSsEREv6jLv/huiY/tj4kZEiwS6mUxCgyR67kMQN4fo9rAOH+5yFb9Nv
ApqrA7zBO0wkFNmjO4Mr+FZij2PARxyO0+fBT0pL9tNsBdYChI90qAfsrxKC
MNyRqCRVxzaEnuApcLm3QEh8OYQ4eF5xJgihcOEPtyqX3h3KudG5tebFWeP6
ioxLiRj0BtktioklCgxb+HtYReuvmV1yx8CaC4wQhs1xfeU2ADbiJpJZYvFW
35Y+oCKjzQqhUA86CK/gww2JsodITcJd5ScXFxcjGLJc/mAIkrrM2Rw8O72E
EnPdTIFmurEaaHcj9qQDwIdRoGAusiSvbo9NAQ5YCKVXFsRJJF4zYCZVY5B7
rgPKL77E+S3Xnfn7ohmrcdovZJCOGdnjRkN4d1qys4+sFA0mnKhFrHR6Wg7R
TTetWehyq1Phm6RZo0PW3/R8XwMHSckBDR1PWALNM+/BQtxyuhT7B7eM8d8K
ldxJnITI2VAmr9RA9KBgLDSMsA3Xz44AD5ArlH02RuVClUjC6RntYXIs7nJG
QmRyHVr9RQ2daNXJjt2hgRl1/WA+N50HonKnwGjH5Az1+/L6CorcgXNZO0Rv
j3xS2kWhGZm6Wel8CoULZfny0sTLRVT0kIXw5evnu8nZ6e3d6OzT6efPF5cf
L4iJ9skRD7fLPnUaEL2WvZILJsyjtXY/PicscU7xcvSycoPSBHrv4ew/cuOl
zO3plVZbsp/3DV0i0jhSDuYr+h7GdiV90UYMALynZgOk2DSJdAOHS5t3mnfj
+wuXPtDDQkpwxQvtRKmcFtvWrHvKHihIRgvcaF2gY4s8/eKySotoVTrKc8mK
w1S9p7WZrpe1GiotLQsoeB9X5SEc5Qt+dDKovZLUZ8MCoPTwNTFrVlyETN60
iceKDtjCXxjWi2Gbyb8/VLQcPOB+rT7rRiWJrYzb5gCGk4T5a/ZM28Hq+ZH7
B7gSX1kvLmPwR0WPQfxaHxRRaxhJeicIvlgmComVBYeRNRCBPWTPktBBggTN
QLh1ENBbfheHvvigKBHmaFGHFAU09tT+S+Jqyji4T0qGzTWsQvikqNboMy3H
itb4IOhs1f7yaMKv26mqeWw+BVNJPUkJAwYELCO+nTTKYL+z0zuaJUL1OGT+
LrZ87LS1egQ13KvT8DQUu0BNDgNDcMJSa59xd6b2s3tCTA/tmjOAW+aMc5LG
4GysWU8qr1AgiHgrH6uH6BYeAVwkvUwHp3zMj/hoFpgQ6ilvWY20H71+49EF
TJxM1n4s6NusSVKnzTI81Igj9DGILGHi9PDD5B6+ezLVP5DJDKSBUPsYWgAj
nE1HdrE7kQbaOD5KHPOnPc83NPb10tvGSDSogYclVtS/1jRY6KJg7GITu6Xy
97ZGbXrjE5tiu1mjsaS4GgwtQ922YsxCFVhc02wdDy9oY0jbf2UTp7eRjr+h
Dbyao6cv9yzBpXgNh0QtZia/0iymtmsIOh3hLtpATrXSO6CIuek786A+ylFU
hK/sbrDv3z/eXFxcjj5d3d5NLj9K8JGTSMSO3ExVm1oDVAEy2K0jaFVV9WcU
Y3DjrOrPnMMV/Wm3nfBlZhV35bHbMOVOBSSbFHMciVpF1vhol557ViRDNRHj
C2F8M2mgIBn5oDPVbol817X2t1aPhUyfzRTAooEsTW6GGTCWcqGJh9BNi9vH
c3Mc3B7fJntGyLOrc6Lj6AgW9s5nx098dmJW/L62l3TSzxb0eYKU3r7vOVvS
EEaSJz03SiLsWq71Tn9m1UsMOGx3rZuoj7dyfbgJFSb8O+usEeo+JH7CMXxr
V/kEY0Q5BH/jdFTJIbCguLIK1+nwqnpj+Y6BVhMfr0ZdFrsvSxuSQZ14U6C1
3LuApvilAUVlXW1acYB8G3m5IUS77gT8Vf/lLNSmW9sdtvwkM2nJ/5SFj4LD
ZVkJL4vrhV3vXgGLBuBPZIKtckOSMKzqBcwpnnxjYRDrTkEW2Eav//EF3P5+
W3RJEQlmV1XZ6bF+Ahj62nei6ksrvJcTG8CaQ9DAgPftmLkBrt50hN6nLW99
VgmOKYqCajcNeeBnK2qTdH4GMIEPHvrPrtGSL/OlCvjurN5Us4Lb18jP0l8h
i0t0tBarPDx+7ohEanHQ/9r9fDc6ZRrx2kDk3tZFKA0YSYfkArLHXrYMhKxi
/MEqI+948nF0M/n4SZq3SLImDmvUDBOJevZo9WFrd4IrMov9XU31AjYmE02U
togE8y2y7Pg1Zf7AZqT5mijR4Wt0/cVkrb+/VPczsQPfmpnB16vTiz+eX988
3u3RIl834faHp/ZI7ZRHnHMjSU/JRGJ00jHLDN3BtHdPfK/OzjSJJg/9JXLR
iLVWCXRspUOy9FqHnctKb94Qq/A9cHaco/aC9hZ65No3//J3NPLzk93mX+ne
3t7/gD/25c9/oWsY/TSR+jZpq0C6bEUmKhJmGqeQa73kIqeN9dGCnrK+U1oQ
bNcPDGR09uIrmNcD7uT0VN8mQwNEJaxBKEixjlbEcT5P0oHJ7vgBqsAQO9LR
lWjDObktQXNHSXBjql9QZle6KS4qaX5XnIwe4p8Sp2lowLwNMM7QR7bjnU+7
CFbdGyXmdzBS/4L3j5wHI578VFS3s+VHPrBfNanIVXNqBuPH9LjfQWnmmcsd
O1uFEkZvDXcLSEg+iy4bDIOoSlnbLUSMKuGEb1VX25Vc8zEaiboP1Z1Jr5G4
mAsYw2917iDbRUloEt7bBWy3Nj8JalKOlbak6cjIPi2lNl+pZNfXdd5oitfN
hRZVttCGUT4ZkPguE5Kmt4byvfvgwrSNUf5cb5pKWtf+Mb2V2pPfZZdf+YEf
MPkRxYlqEfxDuxujtlP/F76yb578anOQu8vUjZKcKAt83ywr62mxUCTCyD64
Sgla9uf1im06EZbwhzaN5XtCRGfpytyYgb7JSilV06bUiAvwZem0D4h5o0VT
XXrH7hQhEZI3R4fm5nnJfFZX96Hzq3RCFj2XfP9+cfbpJsDhH1/VodPnsgpx
/iRj8kGa6YSbC3fuwtGqIe3R8uRJVFyftKOXM673cLz3BVTP373ERx84MS/Z
FfaUoY5Bq+/VyIkundbutHzNuOuVz/ZllvV0Zcw4cudMANREsWbR0EDUoim2
YMzF9qUW1hc1x73SHDiQqK5GFg6iq2oYomLFu4Z9Dl27U2ubiWb2aIVHHsfU
LZF66V3vFsOdfTPaH+w/S4TrqX6a/7+aYv5eN8x+K0aplMg9gbTnGeOai1ns
7IQsMWRa3CNQYYpKAtqxxx3xplvfdj4UplhvvN3gzkF0zxI7DVIwZRBxy/nG
1fM7NTpPjsjxG+s1zwjmqK14iDZyVFh8FXa1yge+qY6vyIhuRteA2JNwa7X1
oxtgrKlu6IIWyov0YEyJujkj/MAgHHHi4cBiukrhE4yQx6Xc+plWCOOf/XLj
UEEY53WT5KzX1CxqvqzoZi7kiK8/ynIUUfItZ55rQyHR0KPNM8FKRzfdWs1M
/8rb0I8HpDke71zIGNWbSd8hJtoTV8QlJ2OL4kiZ6IuxGLyRgIu6RINYz3d3
jO5I87zC7ZbJrGgLKBEVcjvJmz7KSeAXkjZvuc4WXoNYvJ2/fIL7efFdMjYm
2wSRU84GFG9dPLy/pHcrBcvbdIFe3Qwlkyg2PxfBUAUKtNoIeqoHjRQwYf/c
x29LzD4D/EIDzrsNMk9vzj5N7i7OcNsHm2wjwPlx3kh8n3qcgbxQ7Ab68kfy
/Z1kk13+b4M5nXI3YHhRDBDaEb/WPTBjhfQtYVAc1xQpOjqTu52lbftKutLs
9oO85ZbY2/SDvwmdZNbk9ups9OHq6+X56d3kihO53BKOgy3VzBznCDhmfS4A
XpUydv13IjfBtOtCKzh4bx9NdWeiimr7VNPpr72FkrRRxh73mn+cHI7Oi3aG
XNpWu6zwx6PTFiEg0P//BW7ILS9I2QAA

-->

</rfc>

