<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tailhardat-nmop-incident-management-noria-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="Knowledge Graphs &amp; Incident Management">Knowledge Graphs for Enhanced Cross-Operator Incident Management and Network Design</title>
    <seriesInfo name="Internet-Draft" value="draft-tailhardat-nmop-incident-management-noria-01"/>
    <author fullname="Lionel Tailhardat">
      <organization>Orange</organization>
      <address>
        <email>lionel.tailhardat@orange.com</email>
      </address>
    </author>
    <author fullname="Raphaël Troncy">
      <organization>EURECOM</organization>
      <address>
        <email>raphael.troncy@eurecom.fr</email>
      </address>
    </author>
    <author fullname="Yoan Chabot">
      <organization>Orange</organization>
      <address>
        <email>yoan.chabot@orange.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="29"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>knowledge graphs</keyword>
    <keyword>incident management</keyword>
    <keyword>anomaly detection</keyword>
    <abstract>
      <?line 224?>

<t>Operational efficiency in incident management on telecom and computer networks requires correlating and interpreting large volumes of heterogeneous technical information.
Knowledge graphs can provide a unified view of complex systems through shared vocabularies.
YANG data models enable describing network configurations and automating their deployment.
However, both approaches face challenges in vocabulary alignment and adoption, hindering knowledge capitalization and sharing on network designs and best practices.
To address this, the concept of a IT Service Management (ITSM) Knowledge Graph (KG) is introduced to leverage existing network infrastructure descriptions in YANG format and enable abstract reasoning on network behaviors.
The key principle to achieve the construction of such ITSM-KG is to transform YANG representations of network infrastructures into an equivalent knowledge graph representation, and then embed it into a more extensive data model for Anomaly Detection (AD) and Risk Management applications.
In addition to use case analysis and design pattern analysis, an experiment is proposed to assess the potential of the ITSM-KG in improving network quality and designs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://genears.github.io/draft-tailhardat-nmop-incident-management-noria/draft-tailhardat-nmop-incident-management-noria.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tailhardat-nmop-incident-management-noria/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Management Operations Working Group mailing list (<eref target="mailto:nmop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nmop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/genears/draft-tailhardat-nmop-incident-management-noria"/>.</t>
    </note>
  </front>
  <middle>
    <?line 235?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Incident management on telecom and computer networks, whether it is related to infrastructure or cybersecurity issues, requires the ability to simultaneously and quickly correlate and interpret a large number of heterogeneous technical information sources.
Knowledge graphs, by structuring heterogeneous data through shared vocabularies, enable providing a unified view of complex technical systems, their ecosystem, and the activities and operations related to them (see <xref target="I-D.marcas-nmop-knowledge-graph-yang"/> and <xref target="NORIA-O-2024"/>).
Using such formal knowledge representation allows for a simplified interpretation of networks and their behavior, both for NetOps &amp; SecOps teams and artificial intelligence (AI) algorithms (e.g. anomaly detection, root cause analysis, diagnostic aid, situation summarization), and paves the way, in line with the Network Digital Twin vision <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>, for the development of tools for detecting and analyzing complex network incident situations through explainable, actionable, and shareable models (see <xref target="FOLIO-2018"/>, <xref target="SLKG-2023"/>, and <xref target="GPL-2024"/>).</t>
      <t>However, despite potential benefits of using knowledge graphs, these are not mainstream yet in commercial network deployment systems and decision support systems (see <xref target="NORIA-UI-2024"/> for more on the decision support systems perspective).
YANG is a widely used standard among operators for describing network configurations and automating their deployment.
Using YANG representations in the form of a KG, as suggested in <xref target="I-D.marcas-nmop-knowledge-graph-yang"/>, would minimize the effort required to adapt network management tools towards the unified vision and applications evoked above.
The lack of alignment between various YANG models on key concepts (e.g. for describing network topology) is, however, hindering this evolution <xref target="I-D.boucadair-nmop-rfc3535-20years-later"/>.</t>
      <t>Furthermore, although <xref target="I-D.netana-nmop-network-anomaly-lifecycle"/> addresses the capitalization of incident management knowledge through a YANG model, it can be observed that the overall scope of YANG models does not naturally cover the description of the networks' ecosystem (e.g. physical equipment location, operator organization, supervision systems) or the description of network operations from an IT service management (ITSM) perspective (e.g. business processes and design rules used by the company, scheduled modification operations, remediation actions performed during incident handling).
As a consequence, the continuous improvement of network quality &amp; designs requires additional data cross-referencing operations to properly contextualize incidents and learn from remediation actions taken (e.g. analyzing intervention technicians' verbatim, comparing actions performed on similar incidents but occurring on different networks).
As a result of these additional efforts of contextualization, the capitalization of knowledge typically remains confined at the level of each network operator.
This, in turn, hinders the sharing of information within the community of researchers and system designers regarding failure modes and best practices to adopt, considering the concept of overall improvement of IT systems and the Internet.</t>
      <t>Realizing an ITSM knowledge graph for network deployment, anomaly detection and risk management applications has been studied for several years in the Semantic Web community (i.e. knowledge representation and automated reasoning leveraging Web technologies such as <xref target="RDF"/>, <xref target="RDFS"/>, <xref target="OWL"/>, and <xref target="SKOS"/>).
Among other examples: the DevOpsInfra ontology <xref target="DevOpsInfra-2021"/> allows for describing sets of computing resources and how they are allocated for hosting services; the NORIA-O ontology <xref target="NORIA-O-2024"/> allows for describing a network infrastructure &amp; ecosystem, its events, diagnosis and repair actions performed during incident management.
Assuming the continuous integration into a knowledge graph of data from ticketing systems, network monitoring solutions, and network configuration management databases, we remark that the resulting knowledge graph (<xref target="fig-incident-context"/>) implicitely holds the necessary information to (automatically) learn incident contexts (i.e. the network topology, its set of states and set of events prior to the incident) and remediation procedures (i.e. the set of actions and network configuration changes carried-out to resolve the incident).</t>
      <figure anchor="fig-incident-context">
        <name>Learning an incident signature seen as a classification model that is trained on the relationship of the incident context (i.e. a subgraph centered around a Resource entity concerned by a given TroubleTicket) to the problem class defined at the TroubleTicket entity level. Arrows are for object properties (owl:ObjectProperty), double line edges are for object class relationships (rdf:type).</name>
        <artwork type="ascii-art"><![CDATA[
┌───Incident context────────────────────────────┐
│                 ┌────────────┐                │
│                 │skos:Concept│                │
│                 └─┬┬─────────┘                │
│                  <server>                     │
│                    ▲                          │
│                    │                          │
│                 resourceType                  │
│         ┌────────┐ │                          │      ┌─────────────┐
│         │Resource│ │                          │      │TroubleTicket│
│         └──────┬┬┘ │                          │      └─────┬┬──────┘
│                ││  │                          │            ││
│        <ne_2>──<ne_1>◄──troubleTicketRelatedResource──<incident_01>
│           │      │                            │            │
│           │      │                            │      problemCategory
│<ne_5>──<ne_4>────┼──<ne_3>────<log_2>         │            │
│           │      │    │                       │            ▼
│           │      │    │                       │       <packet-loss>
│       <log_3>    │  <ne_6>                    │            ││
│                  │                            │       ┌────┴┴──────┐
│     logOriginatingManagedObject               │       │skos:Concept│
│                  │                            │       └────────────┘
│                  ▼                            │
│               <log_1>──────┐                  │
│      ┌─────────┴┴┐     dcterms:type           │
│      │EventRecord│         │                  │
│      └───────────┘         ▼                  │
│                    <integrityViolation>       │
│                       ┌────┴┴──────┐          │
│                       │skos:Concept│          │
│                       └────────────┘          │
└───────────────────────────────────────────────┘
]]></artwork>
      </figure>
      <t>By going a step further, we notice that a generic understanding of incident context can be extracted and shared among operators from knowledge graphs.
Indeed, a knowledge graph, being an instantiation of shared vocabularies (e.g. RDFS/OWL ontologies and controlled vocabularies in SKOS syntax), sharing incident signatures can be done without revealing infrastructure details (e.g. hostname, IP address), but rather the abstract representation of the network (i.e. the class of the knowledge graph entities and relationships, such as "server" or "router", and or "IPoWDM link").</t>
      <t>The remainder of this document is organized as follows.
Firstly, the concept of an ITSM-KG is introduced in <xref target="sec-itsm-base"/> towards leveraging existing network infrastructure descriptions in YANG format and enabling abstract reasoning on network behaviors.
The relation of the ITSM-KG proposal to the Digital Map <xref target="I-D.havel-nmop-digital-map-concept"/> is notably discussed in this section.
Secondly, strategies for the ITSM-KG construction are discussed in <xref target="sec-kgc"/>.
This include YANG models transformation in <xref target="sec-yang-to-kg"/>, implementing alignments of models with the ITSM-KG in <xref target="sec-gluing-techniques"/>, and knowledge graph construction pipeline designs in <xref target="sec-etl-kgc"/>.
The <xref target="sec-etl-kgc"/> notably focuses on addressing the handling of event data streams and providing a unified view for different stakeholders, also known as the data federation architecture.
Finally, an experiment is proposed in <xref target="sec-experiments"/> to assess the potential of the ITSM-KG in improving network quality and designs.
The implementation status related to this document is also reported in this section.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="sec-itsm-base">
      <name>An ITSM-KG for learning and sharing network behavioral models</name>
      <section anchor="principles">
        <name>Principles</name>
        <t>As evoked in <xref target="sec-intro"/>, a detailed characterization of network behavior requires combining several facets of data related both to the configuration of the networks and to their lifecycle, as well as the ecosystem in which they are operated.
In this document, we will consider the following fundamental definitions as a means to achieve the combination of all these facets of data in a convenient way, regardless of their origin, for operational efficiency in incident management and change management with the aid of AI tools:</t>
        <dl>
          <dt>ITSM-KG:</dt>
          <dd>
            <t>A knowledge graph in RDFS/OWL syntax tha enables change management activities, anomaly detection, and risk analysis at the organizational level by combining heterogeneous data sources from the configuration data of the network's structural elements, events occurring on this network, and any other data useful to the business for the effective management of the services provided by this network.</t>
          </dd>
          <dt>ONTO-ITSM:</dt>
          <dd>
            <t>For a given ITSM-KG, the RDFS/OWL ontology that structures the ITSM-KG.</t>
          </dd>
          <dt>ONTO-YANG-MODEL:</dt>
          <dd>
            <t>For a given YANG model, its equivalent RDFS/OWL representation.</t>
          </dd>
          <dt>ONTO-META:</dt>
          <dd>
            <t>An ontology that contributes to structuring some ITSM-KG, regardless of the specifics of a given application domain or ITSM-KG instance, in the sense that it provides an abstract IT Service Management model (i.e. it holds generic concept and property definitions for realizing IT Service Management activities).</t>
          </dd>
          <dt>ONTO-LINKER:</dt>
          <dd>
            <t>For a given (set of) ONTO-YANG-MODEL and a given ONTO-META, the implementation of the equivalence relationships between the key concepts and key properties of the (set of) ONTO-YANG-MODEL and ONTO-META.</t>
          </dd>
        </dl>
        <t>Based on these definitions, which will be discussed in more detail later in this document, <xref target="fig-incident-context"/> can be seen as an illustration of ITSM-KG from which a subgraph has been extracted, allowing for incident situation to be analyzed through querying.
For example, close to ideas from <xref target="I-D.netana-nmop-network-anomaly-lifecycle"/>, querying the evolution of network entities states from the ITSM-KG during some incident remediation stage could bring to identify the causal graph underlying incident resolution.
As the querying would go through the ONTO-ITSM, the causal graph would de-facto be an abstraction of the situation, thereby enabling knowledge capitalization and sharing for similar incidents that could occur later.</t>
      </section>
      <section anchor="sec-digital-map">
        <name>Relation to the Digital Map</name>
        <t>Similar to the concept of ITSM-KG discussed in this document, the concept of Digital Map discussed in <xref target="I-D.havel-nmop-digital-map-concept"/> emphasizes the need to structure heterogeneous data describing networks in order to simplify network management operations through unified access to this data.
The ITSM-KG can be seen as a meta-knowledge graph that extends the Digital Map concept by adding information about the lifecycle of infrastructures and services, as well as the context of their usage. These additional pieces of information are considered essential for learning shareable activity models of systems.</t>
        <t>To clarify this positioning, the following lists (<xref target="sec-digital-map-core"/>, <xref target="sec-digital-map-design"/>, and <xref target="sec-digital-map-archi"/>) reflect the compliance of the meta-KG concept with the Digital Map Requirements defined in <xref target="I-D.havel-nmop-digital-map-concept"/>.
A symbol to the right of each requirement name indicates the nature of compliance: <strong>+</strong> for compatibility, <strong>/</strong> for partial satisfaction, <strong>-</strong> for non-compliance with the requirement.
A comment is provided as necessary.</t>
        <section anchor="sec-digital-map-core">
          <name>Core Requirements</name>
          <dl>
            <dt><strong>+</strong> REQ-BASIC-MODEL-SUPPORT:</dt>
            <dd>
              <t>nothing to report (n.t.r.)</t>
            </dd>
            <dt><strong>+</strong> REQ-LAYERED-MODEL:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
            <dt><strong>/</strong> REQ-PROG-OPEN-MODEL:</dt>
            <dd>
              <t>Partially satifying the requirement as the concept of meta-KG mainly relate to the knowledge representation topic rather than to the platform running the Digital Map service on top of the meta-knowledge graph.</t>
            </dd>
            <dt><strong>/</strong> REQ-STD-API-BASED:</dt>
            <dd>
              <t>Same remark as for REQ-PROG-OPEN-MODEL.</t>
            </dd>
            <dt><strong>+</strong> REQ-COMMON-APP:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
            <dt><strong>+</strong> REQ-SEMANTIC:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
            <dt><strong>+</strong> REQ-LAYER-NAVIGATE:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
            <dt><strong>+</strong> REQ-EXTENSIBLE:</dt>
            <dd>
              <t>Knowledge graphs implicitly satisfy this requirement, notably with OWL <xref target="OWL"/> and SKOS <xref target="SKOS"/> constructs if considering RDF knowledge graphs for the meta-KG (e.g. <tt>owl:sameAs</tt> to relate a meta-KG entity to some other entity of another knowledge graph, <tt>owl:equivalentClass</tt> to link concepts and properties used to interpret the meta-KG to concepts and properties from other data models, <tt>skos:inScheme</tt> to group new items of a controled-vocabulary as part of a <tt>skos:ConceptScheme</tt>).</t>
            </dd>
            <dt><strong>+</strong> REQ-PLUGG:</dt>
            <dd>
              <t>Same remark as for REQ-EXTENSIBLE.</t>
            </dd>
            <dt><strong>+</strong> REQ-GRAPH-TRAVERSAL:</dt>
            <dd>
              <t>This capability is naturally enabled as the meta-KG concept involves using a graph data structure.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-digital-map-design">
          <name>Design Requirements</name>
          <dl>
            <dt><strong>-</strong> REQ-TOPO-ONLY:</dt>
            <dd>
              <t>Requirement not satisfied as the meta-KG involves to have more than topological data to interpret and contextualize the network behavior.</t>
            </dd>
            <dt><strong>-</strong> REQ-PROPERTIES:</dt>
            <dd>
              <t>Same remark as for REQ-TOPO-ONLY.</t>
            </dd>
            <dt><strong>-</strong> REQ-RELATIONSHIPS:</dt>
            <dd>
              <t>Same remark as for REQ-TOPO-ONLY.</t>
            </dd>
            <dt><strong>+</strong> REQ-CONDITIONAL:</dt>
            <dd>
              <t>Native, notably considering the expressiveness of SPARQL <xref target="SPARQL11-QL"/> if using the Semantic Web protocol stack to run the meta-KG concept.</t>
            </dd>
            <dt><strong>+</strong> REQ-TEMPO-HISTO:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
          </dl>
        </section>
        <section anchor="sec-digital-map-archi">
          <name>Architectural Requirements</name>
          <dl>
            <dt><strong>+</strong> REQ-DM-SCALES:</dt>
            <dd>
              <t>This capability applies as we can use data aggregation at the graph level (<xref target="fig-stream-mixed"/> and <xref target="fig-stream-mixed-kr"/> compared to <xref target="fig-stream-kg-only"/> and <xref target="fig-stream-kg-only-kr"/>), aggregation without loss of information (<xref target="fig-stream-mixed"/> and <xref target="fig-stream-mixed-kr"/>), and load balancing (horizontal scaling) by partitioning the meta-KG (<xref target="fig-multi-store"/>). Further, ease of integration is enabled thanks to existing standard graph data access protocols (e.g. SPARQL Federated Queries <xref target="SPARQL11-FQ"/>, as illustrated in <xref target="fig-multi-store"/>).</t>
            </dd>
            <dt><strong>/</strong> REQ-DM-DISCOVERY:</dt>
            <dd>
              <t>Same remark as for REQ-PROG-OPEN-MODEL.</t>
            </dd>
          </dl>
        </section>
      </section>
    </section>
    <section anchor="sec-kgc">
      <name>Strategies for the ITSM-KG construction</name>
      <t>In this section, we firstly define in <xref target="sec-yang-to-kg"/> two YANG-based data transformation scenario, namely the YANG-KG-SEMANTIC-EQUIVALENCE and YANG-KG-SEMANTIC-GENERALIZATION scenarios.
The YANG-KG-SEMANTIC-GENERALIZATION scenario is then used as a basis in <xref target="sec-gluing-techniques"/> to illustrate strategies to reuse YANG models transformed in RDFS/OWL syntax in a higher-level ontology that would structure the ITSM-KG.
Finally, two Extract-Transform-Load (ETL) pipeline approaches and a data federation architecture are presented in <xref target="sec-etl-kgc"/> to meet the needs of constructing and exploiting the ITSM-KG.</t>
      <section anchor="sec-yang-to-kg">
        <name>From YANG-based configurations to meta-knowledge graph</name>
        <t>In the following, we consider the use of Semantic Web technologies as the foundation for representing data in the form of a knowledge graph.
We also assume the ability to transform a description of configurations and network infrastructures expressed accordingly to a given (set of) YANG model(s) into a knowledge graph representation.</t>
        <t>For the realization of this data transformation, we identify the following scenarios:</t>
        <dl>
          <dt>YANG-KG-SEMANTIC-EQUIVALENCE:</dt>
          <dd>
            <t>The ontology structuring the target knowledge graph is an exact equivalence of the many YANG models organizing the configuration data.</t>
          </dd>
          <dt>YANG-KG-SEMANTIC-GENERALIZATION:</dt>
          <dd>
            <t>The ontology structuring the target KG is a generalization of the YANG models organizing the configuration data.</t>
          </dd>
        </dl>
        <t>We note that the YANG-KG-SEMANTIC-EQUIVALENCE case requires a significant knowledge engineering effort to align all YANG models into a coherent ontology with a sufficient level of abstraction to enable the discovery and analysis of emergent behavioral models of networks independently of local configuration specifics.
However, this case has the advantage of being relatively easy to implement based on the available configuration data of an operator, for example, by implementing <xref target="RML"/> rules for constructing a knowledge graph from this data.</t>
        <t>For the YANG-KG-SEMANTIC-GENERALIZATION case, we observe that the transformation effort involves:</t>
        <ol spacing="normal" type="1"><li>
            <t>Being able to transform YANG models into their RDFS/OWL equivalent to provide a consistent interpretation of configuration data in a knowledge graph that aligns with each data source.</t>
          </li>
          <li>
            <t>Being able to provide a generalized interpretation of these transformed YANG models by identifying alignments between key concepts in these models and those in a more expressive ontology.</t>
          </li>
        </ol>
        <t>As an example, the YANG-KG-SEMANTIC-GENERALIZATION case could involve wanting to integrate Service and Network topology data, matching the Network Topologies <xref target="RFC8345"/> and Service Assurance <xref target="RFC9418"/> YANG data models, into a knowledge graph structured by the NORIA-O ontology <xref target="NORIA-O-2024"/>.</t>
        <t>Although identifying alignments in the YANG-KG-SEMANTIC-GENERALIZATION case may appear non-trivial for "constructor" YANG models, it is worth noting that the design of YANG models generally relies on principles of concept hierarchies and reuse of common concepts between models to promote model interoperability, as is the case with the Abstract Network Model of <xref target="RFC8345"/>.
Therefore, the task of identifying alignments can theoretically benefit from these design principles.</t>
        <t>In continuity of the above RFC8345 / NORIA-O example, providing an alignment may mean asserting a semantic equivalence between the RDFS/OWL representation of the "node" concept from <xref target="RFC8345"/> with the "noria:Resource" concept from <xref target="NORIA-O-2024"/>.
Examples of approaches for linking ontologies are provided in <xref target="sec-gluing-techniques"/>.</t>
      </section>
      <section anchor="sec-gluing-techniques">
        <name>Implementing alignments of model-specificities to a multi-faceted knowledge graph</name>
        <t>Building on the previously defined YANG-KG-SEMANTIC-GENERALIZATION scenario, this section presents two approaches to construct the structuring ontology of the ITSM-KG by combining YANG models translated into RDFS/OWL and a meta-ontology enabling the analysis of the operational context of the network lifecycle.
As techniques for identifying alignments between data models is beyond the scope of this document, we refer interested readers to specialized literature in this field, such as <xref target="ONTO-MATCH-2022"/>.</t>
        <t>To present the approaches, we assume the ability to convert a given YANG model into its ONTO-YANG-MODEL (i.e. its equivalent RDFS/OWL representation).
The code snippet in <xref target="snippet-ietf-network-node"/> is a fictional example of translating the "node" concept from <xref target="RFC8345"/> into its RDFS/OWL equivalent.</t>
        <figure anchor="snippet-ietf-network-node">
          <name>Snippet of the ONTO-YANG-MODEL describing the 'node' concept from RFC8345 into its RDFS/OWL equivalent, in Turtle syntax.</name>
          <artwork><![CDATA[
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .

<urn:ietf:params:xml:ns:yang:ietf-network#node>
  rdf:type owl:Class ;
  rdfs:comment  "The inventory of nodes of this network." ;
.
]]></artwork>
        </figure>
        <t>The following sub-sections build on the ONTO-YANG-MODEL example from <xref target="snippet-ietf-network-node"/>.</t>
        <section anchor="the-network-of-ontologies-approach">
          <name>The network of ontologies approach</name>
          <t>The network of ontologies approach is a common practice in the field of knowledge engineering and Semantic Web technologies.
The principle involves assembling vocabularies from different domains to form a coherent set, for example to infer - through graph traversal or reasoning - relationships between entities in the graph, starting from a concept defined in one of the vocabularies and leading to an instance of a concept from another vocabulary.</t>
          <t>In our example, the code snippet of <xref target="snippet-onto-itsm"/> implements the ONTO-ITSM by importing concepts from the ONTO-YANG-MODEL (<xref target="snippet-ietf-network-node"/>) and concepts from the ONTO-META (<xref target="snippet-noria-o-as-it-is"/>).
An additional import in <xref target="snippet-onto-linker"/> relates to the ONTO-LINKER.</t>
          <figure anchor="snippet-onto-itsm">
            <name>The implementation of the ONTO-ITSM to structure the relation of ONTO-YANG-MODEL(s) with ONTO-META, in Turtle syntax.</name>
            <artwork><![CDATA[
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .

<https://example.com/ontologies/itsm/>
  rdf:type owl:Ontology ;
  owl:imports
    # ===> Import of one of the ONTO-YANG-MODEL <===
    <https://example.com/ontologies/ietf-network-topology> ,
    # ===> Import of the ONTO-META <===
    <https://w3id.org/noria/ontology/> ,
    # ===> Import of the ONTO-LINKER definitions <===
    <https://example.com/ontologies/ietf-noria-linker> ;
.
]]></artwork>
          </figure>
          <figure anchor="snippet-noria-o-as-it-is">
            <name>Snippet of the ONTO-META describing the 'noria:Resource' concept from NORIA-O v0.3, in Turtle syntax.</name>
            <artwork><![CDATA[
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .

@prefix seas: <https://w3id.org/seas/>.  # Smart Energy Aware Systems
@prefix bot:  <https://w3id.org/bot#> .  # Building Topology Ontology
@prefix observable:  # Unified Cybersecurity Ontology (UCO)
  <https://unifiedcyberontology.org/ontology/uco/observable#> .
@prefix log: <https://w3id.org/sepses/ns/log#> .  # a.k.a. SLOGERT

@prefix noria: <https://w3id.org/noria/ontology/> .

noria:Resource
    rdf:type owl:Class ;
    rdfs:label "Resource" ;
    rdfs:comment """General resource record of the Communication Device
      kind from the logistics park. It is a managed entity that can be
      either Physical or Virtual."""@en ;
    rdfs:subClassOf noria:StructuralElement ;
    rdfs:subClassOf
        seas:System,
        seas:CommunicationDevice,
        bot:Element ,
        observable:Device ,
        log:Host ;
    rdfs:isDefinedBy noria: ;
.
]]></artwork>
          </figure>
          <figure anchor="snippet-onto-linker">
            <name>Snippet of the ONTO-LINKER to relate ONTO-YANG-MODEL definition(s) with ONTO-META definition(s), in Turtle syntax.</name>
            <artwork><![CDATA[
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix noria: <https://w3id.org/noria/ontology/> .

noria:Resource
  owl:equivalentClass <urn:ietf:params:xml:ns:yang:ietf-network#node> ;
.
]]></artwork>
          </figure>
          <t>As a result, querying any ITSM-KG structured by the ONTO-ITSM, as shown in <xref target="snippet-sparql-equivalent"/>, enables retrieving entities of the ITSM-KG using ONTO-META concepts, even if entities are described with ONTO-YANG-MODEL concepts.</t>
          <figure anchor="snippet-sparql-equivalent">
            <name>Snippet to retrieve entities of the ITSM-KG assuming the relatedness of ONTO-META concepts with ONTO-YANG-MODEL concepts, in SPARQL syntax.</name>
            <artwork><![CDATA[
PREFIX owl: <http://www.w3.org/2002/07/owl#>
PREFIX rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#>
PREFIX rdfs: <http://www.w3.org/2000/01/rdf-schema#>
PREFIX noria: <http://data-noria.securite.fr.intraorange/ontology/>

SELECT ?res

WHERE {
  # Pattern for the base class from ONTO-META
  # or any equivalent class from ONTO-YANG-MODEL
  ?resClass (owl:equivalentClass|^owl:equivalentClass)* noria:Resource .

  # Pattern to retrieve instances from the ITSM-KG
  ?res rdf:type ?resClass .
}
]]></artwork>
          </figure>
        </section>
        <section anchor="explicit-linking-in-the-onto-meta">
          <name>Explicit linking in the ONTO-META</name>
          <t>In this approach, we assume that we have the means to evolve ONTO-META, which allows for the implementation of equivalence relationships between the concepts of ONTO-META and ONTO-YANG-MODEL directly within ONTO-META, as shown in <xref target="snippet-noria-o-extended"/>.</t>
          <t>In this sense, ONTO-ITSM is part of ONTO-META, and ONTO-LINKER is within ONTO-META.
The query in <xref target="snippet-sparql-equivalent"/> applies here as well and will yield the same results.</t>
          <figure anchor="snippet-noria-o-extended">
            <name>Snippet of the ONTO-META describing the 'noria:Resource' concept from NORIA-O v0.3 with added linking to ONTO-YANG-MODEL, in Turtle syntax.</name>
            <artwork><![CDATA[
@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .

@prefix seas: <https://w3id.org/seas/>.  # Smart Energy Aware Systems
@prefix bot:  <https://w3id.org/bot#> .  # Building Topology Ontology
@prefix observable:  # Unified Cybersecurity Ontology (UCO)
  <https://unifiedcyberontology.org/ontology/uco/observable#> .
@prefix log: <https://w3id.org/sepses/ns/log#> .  # a.k.a. SLOGERT

@prefix noria: <https://w3id.org/noria/ontology/> .

<https://w3id.org/noria/ontology/>
  a owl:Ontology ;
  # ===> Import of one of the ONTO-YANG-MODEL <===
  <https://example.com/ontologies/ietf-network-topology> .

noria:Resource
    rdf:type owl:Class ;
    rdfs:label "Resource" ;
    rdfs:comment """General resource record of the Communication Device
      kind from the logistics park. It is a managed entity that can be
      either Physical or Virtual."""@en ;
    rdfs:subClassOf noria:StructuralElement ;
    rdfs:subClassOf
        seas:System,
        seas:CommunicationDevice,
        bot:Element ,
        observable:Device ,
        log:Host ;
    rdfs:isDefinedBy noria: ;
    # ===> Explicit linking to ONTO-YANG-MODEL <===
    owl:equivalentClass <urn:ietf:params:xml:ns:yang:ietf-network#node>
.
]]></artwork>
          </figure>
        </section>
      </section>
      <section anchor="sec-etl-kgc">
        <name>Extract-Transform-Load pipelines for the ITSM-KG</name>
        <t>Based on <xref target="I-D.marcas-nmop-knowledge-graph-yang"/> and <xref target="NORIA-DI-2023"/>, which present the technical means to implement a pipeline for constructing the ITSM-KG, this section focuses on two complementary viewpoints:
<xref target="sec-etl-kgc-streams"/> the management of streaming data such as alarms and logs,
and <xref target="sec-etl-kgc-fq"/> the deployment of a federated data architecture when various technical foundations or business units are involved in providing the ITSM-KG.</t>
        <t>From the perspective of the Digital Map Requirements (<xref target="sec-digital-map"/>), the <xref target="fig-stream-mixed"/>, <xref target="fig-stream-mixed-kr"/> and <xref target="fig-multi-store"/> particularly address the REQ-DM-SCALES requirement.</t>
        <section anchor="sec-etl-kgc-streams">
          <name>Handling event streams</name>
          <t>The following figures illustrate different scenarios for constructing a ITSM-KG through an Extract-Transform-Load (ETL) data integration pipeline.</t>
          <t><xref target="fig-stream-kg-only"/> illustrates a common design pattern providing the capability to record event streams into a knowledge graph, such as an ITMS-KG if considering that event data are mapped to ONTO-META concepts and network entities to ONTO-YANG-MODEL concepts.
The <xref target="fig-stream-kg-only-kr"/> provides an example of the resulting representation in the form of a knowledge graph.</t>
          <figure anchor="fig-stream-kg-only">
            <name>KG-only data integration architecture for event data streams.</name>
            <artwork type="ascii-art"><![CDATA[
          ┌──────┐  ┌─────────┐  ┌──────┐  ┌────────┐  ┌──────┐
┌──────┐  │      │  │ Stream  │  │      │  │ Stream │  │┌────┐│
│Events├─►│E.S.B.├─►│ mapping ├─►│S.S.B.├─►│ loader ├─►││K.G.││
└──────┘  │      │  │         │  │      │  │        │  │└────┘│
          └──────┘  └─────────┘  └──┬───┘  └────────┘  └──────┘
                                    │
                ┌───────────────────┴──────────────────────┐
                │(event/LOG_login_03)=>(object/RES/router1)│
                └─┌──────────────────────────────────────────┐
                  │(event/LOG_login_03)=>(object/RES/router1)│
                  └─┌──────────────────────────────────────────┐
                    │(event/LOG_login_03)=>(object/RES/router1)│
                    └──────────────────────────────────────────┘
]]></artwork>
          </figure>
          <figure anchor="fig-stream-kg-only-kr">
            <name>Resulting knowledge representation for the KG-only data integration architecture for event data streams</name>
            <artwork type="ascii-art"><![CDATA[
                         <object/RES_router3>
<object/RES_router2>          │
               │              │            ┌────────┐
             <object/RES_router1>─rdf:type─┤Resource│
                       │                   └────────┘
                       │
          logOriginatingManagedObject
                       │
             <event/LOG_login_01>             ┌───────────┐
               <event/LOG_login_02>──rdf:type─┤EventRecord│
                 <event/LOG_login_03>         └───────────┘
]]></artwork>
          </figure>
          <t>As event streams can be high-paced, it could be beneficial to leverage input/output (I/O) performance optimizations specific to each type of database management system (DBMS), such as Time-Series DataBases (TSDBs) for streaming data and graph databases for knowledge graphs.
<xref target="fig-stream-mixed"/> illustrates the capability to handle both a knowledge graph and a time-series representation of the network's lifecycle while maintaining a link between the two representations (<xref target="fig-stream-mixed-kr"/>).
Each serve different purposes, such as context analysis with the knowledge graph representation and trend analysis with the TSDB.
Thanks to the linking between the two storage systems, users browsing aggregated data from the knowledge graph can access the raw data within the relevant time span for further analysis, and vice versa.</t>
          <figure anchor="fig-stream-mixed">
            <name>Mixed KG/non-KG data integration architecture for event data streams.</name>
            <artwork type="ascii-art"><![CDATA[
                  ┌────────────┐
                  │  Complex   │
                  │   Event    │
                  │ Processing │
                  └────┬──┬────┘
          ┌──────┐  ┌──┴──┴───┐  ┌──────┐  ┌────────┐  ┌──────┐
┌──────┐  │      │  │ Stream  │  │      │  │ Stream │  │┌────┐│
│Events├─►│E.S.B.├─►│ mapping ├─►│S.S.B.├─►│ loader ├─►││K.G.││
└──────┘  │      │  │         │  │      │  │        │  │└────┘│
          └──┬───┘  └─────────┘  └──┬───┘  └────────┘  └──────┘
             │                      │
             │  ┌───────────────────┴──────────────────────┐
             │  │(event/AIS_login_01)=>(object/RES/router1)│
             │  └──────────────────────────────────────────┘
             │                             ┌────────┐  ┌──────┐
             │                             │ Stream │  │┌────┐│
             └────────────────────────────►│ loader ├─►││TSDB││
                                           │        │  │└────┘│
                                           └────────┘  └──────┘
]]></artwork>
          </figure>
          <figure anchor="fig-stream-mixed-kr">
            <name>Resulting knowledge representation for the mixed KG/non-KG data integration architecture for event data streams.</name>
            <artwork type="ascii-art"><![CDATA[
                                <object/RES_router3>
       <object/RES_router2>          │
                      │              │            ┌────────┐
                    <object/RES_router1>─rdf:type─┤Resource│
                              │                   └────────┘
                 logOriginatingManagedObject
                              │                    ┌───────────┐
┌──────────────────►<event/AIS_login_01>──rdf:type─┤EventRecord│
│                    │             │  \            └───────────┘
│                duration          │   \
│                    │             │ dcterms:type
│  "P0Y0M0DT0H3M30S"^^xsd:duration │     \
│                                  │   <Notification/
│                          loggingTime   EventType/inferredAlert>
│                                  │                   │
│        "2024-02-07T16:22:42Z"^^xsd:dateTime       rdf:type
│                                                ┌─────┴──────┐
│                                                │skos:Concept│
│  KG knowledge representation                   └────────────┘
│  ==============================================================
│  Time series database (TSDB) data representation
│
│  Timestamp             Origin                Event
│  2024-02-07T16:22:42Z  <object/RES_router1>  Login Attempt
│  2024-02-07T16:23:13Z  <object/RES_router1>  Login Attempt
│  2024-02-07T16:26:12Z  <object/RES_router1>  Login Attempt
│                                 ▲
└──shared─identifier──────────────┘
]]></artwork>
          </figure>
        </section>
        <section anchor="sec-etl-kgc-fq">
          <name>Federated data architecture</name>
          <t>The <xref target="fig-multi-store"/> illustrates the principles for providing unified access to data distributed across various technological platforms and stakeholders thanks to Federated Queries <xref target="SPARQL11-FQ"/> and the use of a shared ONTO-ITSM across data management platforms.</t>
          <figure anchor="fig-multi-store">
            <name>Unified access to data distributed across various technological platforms.</name>
            <artwork type="ascii-art"><![CDATA[
  ───On-premise────────────────────────────  ┌─┐  Scope-based querying
  ┌Dom.─A─┐                                  │ │
  │┌─────┐│  ┌──────┐           ┌─────────┐  │ │           ┌───────────┐
─►││ KG  ││◄─┤KGDBMS├───────────┤SPARQL EP├─►│ ├─Network &─┤  NetOps   │
  │└─────┘│  └──────┘           └─────────┘  │ ├─Usage─────┤Application│
  └UG.─2──┘                                  │ │           └───────────┘
  ┌Dom. B─┐                                  │ │           ┌───────────┐
  │┌─────┐│  ┌──────┐           ┌─────────┐  │ ├─Network &─┤  SecOps   │
─►││ KG  ││◄─┤KGDBMS├───────────┤SPARQL EP├─►│ ├─Security──┤Application│
  │└─────┘│  └──────┘           └─────────┘  │F│           └───────────┘
  └UG.─1┬─┘                                  │E│
        └────────────────────────────────────│D│─────────────┐
  ───On-premise / public-cloud─────────────  │E│             │
  ┌Dom.─C─┐                                  │R│             ▼  Usage
  │┌─────┐│  ┌──────┐ ┌───┐     ┌─────────┐  │A│           ┌────scope──┐
─►││ RDB ││◄─┤RDBMS ├─┤VKG├─────┤SPARQL EP├─►│T│           │*          │
  │└─────┘│  └──────┘ └───┘     └─────────┘  │E│   Network │   *  *    │
  └UG.─1&2┘                                  │D│   scope───│────────┐  │
  ┌Dom.─D─┐                                  │ │       │   │ *  *   │  │
  │┌─────┐│  ┌──────┐ ┌───┐     ┌─────────┐  │Q│       │  *└───────────┘
─►││NoSQL││◄─┤RDBMS ├─┤VKG├─────┤SPARQL EP├─►│U│       │  ┌───────────┐
  │└─────┘│  └──────┘ └───┘     └─────────┘  │E│       │* │ *  *    │ │
  └UG.─1──┘                                  │R│       └──│─────────┘ │
  ┌Dom.─E─┐                                  │I│        ▲ │     *     │
  │┌─────┐│  ┌──────┐ ┌───────┐ ┌─────────┐  │E│        │ │ *       * │
─►││ LPG ││◄─┤GDBMS ├─┤QL tlt.├─┤SPARQL EP├─►│S│        │ └──Security─┘
  │└─────┘│  └──────┘ └───────┘ └─────────┘  │ │        │    scope ▲
  └UG.┬2──┘                                  │ │        │          │
      └──────────────────────────────────────│ │────────┼──────────┘
                                             │ │        │
  ───Public-cloud──────────────────────────  │ │        │
  ┌Dom.─F─┐                                  │ │        │
  │┌─────┐│  ┌──────┐           ┌─────────┐  │ │        │
─►││ KG  ││◄─┤KGDBMS├───────────┤SPARQL EP├─►│ │        │
  │└─────┘│  └──────┘           └─────────┘  │ │        │
  └UG.┬1&2┘                                  └─┘        │
      └─────────────────────────────────────────────────┘
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="sec-experiments">
      <name>Experiments</name>
      <section anchor="experimental-plan">
        <name>Experimental plan</name>
        <t>In terms of experimentation, we consider the YANG-KG-SEMANTIC-GENERALIZATION case defined in <xref target="sec-kgc"/> as the reference approach and recommend implementing a data processing pipeline that performs the following use cases:</t>
        <dl>
          <dt>Y-MODEL-FROM-DATA:</dt>
          <dd>
            <t>Based on a dataset of configuration data expressed in YANG models, the goal is to enable extracting the list of models involved for their conversion to their RDFS/OWL equivalent.</t>
          </dd>
          <dt>Y-MODEL-DEPENDENCIES:</dt>
          <dd>
            <t>Based on a given YANG model, the goal is to enable identifying and retrieving all the YANG models that the model refers to, in order to build a complete corpus of models for their conversion to their RDFS/OWL equivalent as a coherent set.</t>
          </dd>
          <dt>Y-MODEL-TO-RDFS-OWL:</dt>
          <dd>
            <t>Based on a YANG model and the associated model corpus (i.e. Y-MODEL-DEPENDENCIES), the goal is to enable producing a semantically equivalent RDFS/OWL representation (i.e. ONTO-YANG-MODEL).</t>
          </dd>
          <dt/>
          <dd>
            <t>Ideally, a YANG to RDFS/OWL/YANG projection algebra would be used to provide a formal proof of semantic equivalence; testing mechanisms should be implemented as a fallback to provide a proof of equivalence.</t>
          </dd>
          <dt>Y-INSTANCE-TO-KG:</dt>
          <dd>
            <t>Based on a dataset of configuration data expressed in YANG models and the related (set of) ONTO-YANG-MODEL, the goal is to enable constructing a knowledge graph from the configuration data, with the knowledge graph structured by the (set of) ONTO-YANG-MODEL.</t>
          </dd>
          <dt>Y-MODEL-META-KG-ALIGNMENT:</dt>
          <dd>
            <t>Based on a corpus of YANG models transformed into RDFS/OWL (i.e. Y-MODEL-TO-RDFS-OWL) and a reference ontology structuring the ITSM-KG, the goal is to enable querying of the configuration entities present in the graph (i.e. data derived from the Y-INSTANCE-TO-KG case) through the concepts of the reference ontology.</t>
          </dd>
          <dt/>
          <dd>
            <t>In addition to identifying the class and property correspondences between the resulting Y-MODEL-TO-RDFS-OWL models and the reference ontology, this capability requires implementing a necessary and sufficient number of class equivalence relations and property equivalence relations.</t>
          </dd>
          <dt>META-KG-BEHAVIORAL-MODEL:</dt>
          <dd>
            <t>Based on the ITSM-KG, which results from the composition of the Y-INSTANCE-TO-KG case with Y-MODEL-META-KG-ALIGNMENT and additional operational data structured by ONTO-META, the goal is to learn behavioral models (e.g. incident signatures) in a formalism that can be interpreted through the lenses of ONTO-ITSM and shared with other stakeholders with minimal discrepancies in the underlying configuration data.</t>
          </dd>
        </dl>
      </section>
      <section anchor="implementation-status">
        <name>Implementation status</name>
        <t>This section provides pointers to existing open source implementations of this document or in close relation to it.</t>
        <section anchor="noria">
          <name>NORIA</name>
          <t>The NORIA project aims at enabling advanced network anomaly detection using knowledge graphs.
Among the components resulting from this project, the following ones serve the use case described in this document:</t>
          <ul spacing="normal">
            <li>
              <t>NORIA-O <xref target="NORIA-O-2024"/>, is a data model for IT networks, events and operations information.
The ontology is developed using web technologies (e.g. RDF, OWL, SKOS) and is intended as a structure for realizing an ITSM knowledge graph for Anomaly Detection (AD) and Risk Management applications.
The NORIA-O implementation is available as open source at <eref target="https://w3id.org/noria/">https://w3id.org/noria/</eref>.
Its use for anomaly detection is discussed in:
              </t>
              <ul spacing="normal">
                <li>
                  <t><xref target="SLKG-2023"/> with a model-based design approach (i.e. query the graph to retrieve anomalies and their context) and a statistical learning approach (i.e. relate entities based on context
similarities, then use this relatedness to alert and guide the repair).</t>
                </li>
                <li>
                  <t><xref target="GPL-2024"/> with a process mining approach to align a sequence of entities to activity models, then use this relatedness to guide the repair actions.</t>
                </li>
                <li>
                  <t><xref target="NORIA-UI-2024"/> a Web-based knowledge graph exploration design for incident management that combines the above <xref target="SLKG-2023"/> and <xref target="GPL-2024"/> techniques for broader coverage of anomaly cases and knowledge capitalization.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>A knowledge graph-based platform design <xref target="NORIA-DI-2023"/> using Semantic Web technologies and open source data integration tools to build an ITSM knowledge graph:
              </t>
              <ul spacing="normal">
                <li>
                  <t>SMASSIF-RML, a Semantic Web stream processing solution with declarative data mapping capability. Available as open source at <eref target="https://github.com/Orange-OpenSource/smassif-rml">https://github.com/Orange-OpenSource/smassif-rml</eref>.</t>
                </li>
                <li>
                  <t>ssb-consum-up, a Kafka to SPARQL gateway enabling end-to-end Semantic Web data flow architecture with a Semantic Service Bus (SSB) approach. Available as open source at <eref target="https://github.com/Orange-OpenSource/ssb-consum-up">https://github.com/Orange-OpenSource/ssb-consum-up</eref>.</t>
                </li>
                <li>
                  <t>grlc, a fork of CLARIAH/grlc with SPARQL UPDATE and GitLab interface features to facilitate the call and versioning of stored user queries in SPARQL syntax (e.g. for anomaly detection following the model-based design approach). Available as open source at <eref target="https://github.com/Orange-OpenSource/grlc">https://github.com/Orange-OpenSource/grlc</eref>.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>SemNIDS <xref target="SemNIDS-2023"/>, a test bench involving network trafic generation, open source Network Intrusion Detection Systems (NIDS), knowledge graphs, process mining and conformance checking components.</t>
            </li>
          </ul>
          <t>Note that the NORIA project does not currently address the Y-MODEL-FROM-DATA, Y-MODEL-DEPENDENCIES, and Y-MODEL-TO-RDFS-OWL use cases.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document covers the <em>ITSM-KG</em> concepts, and use cases, there is no specific security considerations.</t>
      <t>However, as the concept of a meta-knowledge graph involves the construction of a multi-faceted graph (i.e. including network topologies, operational data, and service and client data), it poses the risk of simplifying access to network operational data and functions that fall outside the knowledge graph users' responsibility or that could facilitate the intervention of malicious individuals.
To support the discussion on mitigating this risk, we suggest referring to <xref target="fig-multi-store"/>, which illustrates the concept of partial access to the meta-knowledge graph based on rights associated with each user group (UG) at the data domain level.
We also recommend referring to <xref target="AMO-2012"/> for an example of implementation of access rights in a content management system that relies on Semantic Web models and technologies.
This implementation uses the AMO ontology, which includes a set of classes and properties for annotating resources that require access control, as well as a base of inference rules that model the access management strategy to carry out.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="OWL" target="https://www.w3.org/TR/owl2-overview/">
          <front>
            <title>OWL 2 Web Ontology Language Document Overview (Second Edition)</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2012" month="December"/>
          </front>
        </reference>
        <reference anchor="RDF" target="https://www.w3.org/TR/rdf11-concepts/">
          <front>
            <title>Resource Description Framework (RDF): Concepts and Abstract Syntax</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2014" month="February"/>
          </front>
        </reference>
        <reference anchor="RDFS" target="https://www.w3.org/TR/rdf-schema/">
          <front>
            <title>RDF Schema 1.1</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2014" month="February"/>
          </front>
        </reference>
        <reference anchor="RML" target="https://rml.io/specs/rml/">
          <front>
            <title>RDF Mappling Language (RML)</title>
            <author initials="A." surname="Dimou" fullname="Anastasia Dimou">
              <organization/>
            </author>
            <author initials="M. V." surname="Sande" fullname="Miel Vander Sande">
              <organization/>
            </author>
            <author initials="B. D." surname="Meester" fullname="Ben De Meester">
              <organization/>
            </author>
            <author initials="P." surname="Heyvaert" fullname="Pieter Heyvaert">
              <organization/>
            </author>
            <author initials="T." surname="Delva" fullname="Thomas Delva">
              <organization/>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="SPARQL11-QL" target="https://www.w3.org/TR/sparql11-query/">
          <front>
            <title>SPARQL 1.1 Query Language</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2013" month="March"/>
          </front>
        </reference>
        <reference anchor="SPARQL11-FQ" target="https://www.w3.org/TR/sparql11-federated-query/">
          <front>
            <title>SPARQL 1.1 Federated Query</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2013" month="March"/>
          </front>
        </reference>
        <reference anchor="SKOS" target="https://www.w3.org/TR/skos-reference/">
          <front>
            <title>SKOS Simple Knowledge Organization System Reference</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2009" month="August"/>
          </front>
        </reference>
        <reference anchor="NORIA-O-2024" target="https://doi.org/10.1007/978-3-031-60635-9_2">
          <front>
            <title>NORIA-O: An Ontology for Anomaly Detection and Incident Management in ICT Systems</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="R." surname="Troncy" fullname="Raphaël Troncy">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="SLKG-2023" target="https://doi.org/10.1145/3600160.3604991">
          <front>
            <title>Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="R." surname="Troncy" fullname="Raphaël Troncy">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="NORIA-DI-2023" target="https://ceur-ws.org/Vol-3471/paper3.pdf">
          <front>
            <title>Designing NORIA: a Knowledge Graph-based Platform for Anomaly Detection and Incident Management in ICT Systems</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="R." surname="Troncy" fullname="Raphaël Troncy">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="GPL-2024" target="https://doi.org/10.1145/3589335.3651447">
          <front>
            <title>Graphameleon: Relational Learning and Anomaly Detection on Web Navigation Traces Captured as Knowledge Graphs</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="B." surname="Stach" fullname="Benjamin Stach">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <author initials="R." surname="Troncy" fullname="Raphaël Troncy">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NORIA-UI-2024" target="https://doi.org/10.1145/3664476.3670438">
          <front>
            <title>NORIA UI: Efficient Incident Management on Large-Scale ICT Systems Represented as Knowledge Graphs</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <author initials="A." surname="Py" fullname="Antoine Py">
              <organization/>
            </author>
            <author initials="P." surname="Guillemette" fullname="Perrine Guillemette">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="SemNIDS-2023" target="https://github.com/D2KLab/SemNIDS">
          <front>
            <title>SemNIDS, bringing semantics into Network Intrusion Detection Systems</title>
            <author initials="D." surname="Ferrero" fullname="Dario Ferrero">
              <organization/>
            </author>
            <author initials="Y." surname="Agarwalla" fullname="Yash Agarwalla">
              <organization/>
            </author>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="T." surname="Ehrhart" fullname="Thibault Ehrhart">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="FLAGSM-2021" target="https://doi.org/10.1016/j.future.2020.10.015">
          <front>
            <title>FLAGS: A Methodology for Adaptive Anomaly Detection and Root Cause Analysis on Sensor Data Streams by Fusing Expert Knowledge with Machine Learning</title>
            <author initials="B." surname="Steenwinckel" fullname="Bram Steenwinckel">
              <organization/>
            </author>
            <author initials="D. D." surname="Paepe" fullname="Dieter De Paepe">
              <organization/>
            </author>
            <author initials="S. V." surname="Hautte" fullname="Sander Vanden Hautte">
              <organization/>
            </author>
            <author initials="P." surname="Heyvaert" fullname="Pieter Heyvaert">
              <organization/>
            </author>
            <author initials="M." surname="Bentefrit" fullname="Mohamed Bentefrit">
              <organization/>
            </author>
            <author initials="P." surname="Moens" fullname="Pieter Moens">
              <organization/>
            </author>
            <author initials="A." surname="Dimou" fullname="Anastasia Dimou">
              <organization/>
            </author>
            <author initials="B. V. D." surname="Bossche" fullname="Bruno Van Den Bossche">
              <organization/>
            </author>
            <author initials="F. D." surname="Turck" fullname="Filip De Turck">
              <organization/>
            </author>
            <author initials="S. V." surname="Hoecke" fullname="Sofie Van Hoecke">
              <organization/>
            </author>
            <author initials="F." surname="Ongenae" fullname="Femke Ongenae">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="FOLIO-2018" target="https://www.ceur-ws.org/Vol-2213/paper2.pdf">
          <front>
            <title>Towards Adaptive Anomaly Detection and Root Cause Analysis by Automated Extraction of Knowledge from Risk Analyses</title>
            <author initials="B." surname="Steenwinckel" fullname="Bram Steenwinckel">
              <organization/>
            </author>
            <author initials="P." surname="Heyvaert" fullname="Pieter Heyvaert">
              <organization/>
            </author>
            <author initials="D. D." surname="Paepe" fullname="Dieter De Paepe">
              <organization/>
            </author>
            <author initials="O." surname="Janssens" fullname="Olivier Janssens">
              <organization/>
            </author>
            <author initials="S. V." surname="Hautte" fullname="Sander Vanden Hautte">
              <organization/>
            </author>
            <author initials="A." surname="Dimou" fullname="Anastasia Dimou">
              <organization/>
            </author>
            <author initials="F. D." surname="Turck" fullname="Filip De Turck">
              <organization/>
            </author>
            <author initials="S. V." surname="Hoecke" fullname="Sofie Van Hoecke">
              <organization/>
            </author>
            <author initials="F." surname="Ongenae" fullname="Femke Ongenae">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="DevOpsInfra-2021" target="https://doi.org/10.1007/978-3-030-88361-4_26">
          <front>
            <title>A High-Level Ontology Network for ICT Infrastructures</title>
            <author initials="O." surname="Corcho" fullname="Oscar Corcho">
              <organization/>
            </author>
            <author initials="D." surname="Chaves-Fraga" fullname="David Chaves-Fraga">
              <organization/>
            </author>
            <author initials="J." surname="Toledo" fullname="Jhon Toledo">
              <organization/>
            </author>
            <author initials="J." surname="Arenas-Guerrero" fullname="Juli{\'a}n Arenas-Guerrero">
              <organization/>
            </author>
            <author initials="C." surname="Badenes-Olmedo" fullname="Carlos Badenes-Olmedo">
              <organization/>
            </author>
            <author initials="M." surname="Wang" fullname="Mingxue Wang">
              <organization/>
            </author>
            <author initials="H." surname="Peng" fullname="Hu Peng">
              <organization/>
            </author>
            <author initials="N." surname="Burrett" fullname="Nicholas Burrett">
              <organization/>
            </author>
            <author initials="J." surname="Mora" fullname="Jos{\'e} Mora">
              <organization/>
            </author>
            <author initials="P." surname="Zhang" fullname="Puchao Zhang">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="AMO-2012" target="https://doi.org/10.1007/978-3-642-25838-1_3">
          <front>
            <title>Ontology-Based Access Rights Management</title>
            <author initials="M." surname="Buffa" fullname="Michel Buffa">
              <organization/>
            </author>
            <author initials="C." surname="Faron-Zucker" fullname="Catherine Faron-Zucker">
              <organization/>
            </author>
            <date year="2012"/>
          </front>
        </reference>
        <reference anchor="ONTO-MATCH-2022" target="https://doi.org/10.1007/978-3-031-11609-4_29">
          <front>
            <title>Ontology Matching Through Absolute Orientation of Embedding Spaces</title>
            <author initials="P." surname="Jan" fullname="Portisch, Jan">
              <organization/>
            </author>
            <author initials="C." surname="Guilherme" fullname="Costa, Guilherme">
              <organization/>
            </author>
            <author initials="S." surname="Karolin" fullname="Stefani, Karolin">
              <organization/>
            </author>
            <author initials="K." surname="Katharina" fullname="Kreplin, Katharina">
              <organization/>
            </author>
            <author initials="H." surname="Michael" fullname="Hladik, Michael">
              <organization/>
            </author>
            <author initials="P." surname="Heiko" fullname="Paulheim, Heiko">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="I-D.marcas-nmop-knowledge-graph-yang">
          <front>
            <title>Knowledge Graphs for YANG-based Network Management</title>
            <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Lucía Cabanillas Rodríguez" initials="L. C." surname="Rodríguez">
              <organization>Telefonica</organization>
            </author>
            <date day="5" month="July" year="2024"/>
            <abstract>
              <t>   The success of the YANG language and YANG-based protocols for
   managing the network has unlocked new opportunities in network
   analytics.  However, the wide heterogeneity of YANG models hinders
   the consumption and analysis of network data.  Besides, data encoding
   formats and transport protocols will differ depending on the network
   management protocol supported by the network device.  These
   challenges call for new data management paradigms that facilitate the
   discovery, understanding, integration and access to silos of
   heterogenous YANG data, abstracting from the complexities of the
   network devices.

   This document introduces the knowledge graph paradigm as a solution
   to this data management problem, with focus on YANG-based network
   management.  The document provides background on related topics such
   as ontologies and graph standards, and shares guidelines for
   implementing knowledge graphs from YANG data.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-marcas-nmop-knowledge-graph-yang-03"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   Digital Twin technology has been seen as a rapid adoption technology
   in Industry 4.0.  The application of Digital Twin technology in the
   networking field is meant to develop various rich network
   applications, realize efficient and cost-effective data-driven
   network management, and accelerate network innovation.

   This document presents an overview of the concepts of Digital Twin
   Network, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-06"/>
        </reference>
        <reference anchor="I-D.boucadair-nmop-rfc3535-20years-later">
          <front>
            <title>RFC 3535, 20 Years Later: An Update of Operators Requirements on Network Management Protocols and Modelling</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Reshad Rahman" initials="R." surname="Rahman">
              <organization>Equinix</organization>
            </author>
            <date day="22" month="July" year="2024"/>
            <abstract>
              <t>   The IAB has organized an important workshop to establish a dialog
   between network operators and protocol developers, and to guide the
   IETF focus on work regarding network management.  The outcome of that
   workshop was documented in the "IAB Network Management Workshop" (RFC
   3535) which was instrumental for developing NETCONF and YANG, in
   particular.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-boucadair-nmop-rfc3535-20years-later-04"/>
        </reference>
        <reference anchor="I-D.netana-nmop-network-anomaly-lifecycle">
          <front>
            <title>Experiment: Network Anomaly Lifecycle</title>
            <author fullname="Vincenzo Riccobene" initials="V." surname="Riccobene">
              <organization>Huawei</organization>
            </author>
            <author fullname="Antonio Roberto" initials="A." surname="Roberto">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Wanting Du" initials="W." surname="Du">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   Network Anomaly Detection is the act of detecting problems in the
   network.  Accurately detect problems is very challenging for network
   operators in production networks.  Good results require a lot of
   expertise and knowledge around both the implied network technologies
   and the specific service provided to consumers, apart from a proper
   monitoring infrastructure.  In order to facilitate network anomaly
   detection, novel techniques are being introduced, including
   programmatical, rule-based and AI-based, with the promise of
   improving scalability and the hope to keep a high detection accuracy.
   To guarantee acceptable results, the process needs to be properly
   designed, adopting well-defined stages to accurately collect evidence
   of anomalies, validate their relevancy and improve the detection
   systems over time, iteratively.

   This document describes the lifecycle process to iteratively improve
   network anomaly detection accurately.  Three key stages are proposed,
   along with a YANG model specifying the required metadata for the
   network anomaly detection covering the exchange of information
   between different stages of the lifecycle.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-netana-nmop-network-anomaly-lifecycle-03"/>
        </reference>
        <reference anchor="I-D.havel-nmop-digital-map-concept">
          <front>
            <title>Digital Map: Concept, Requirements, and Use Cases</title>
            <author fullname="Olga Havel" initials="O." surname="Havel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines the concept of Digital Map, explains its
   connection to the Digital Twin, and identifies a set of Digital Map
   requirements and use cases.

   The document intends to be used as a reference for the assessment
   effort of the various topology modules to meet Digital Map
   requirements.

   Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/OlgaHuawei/draft-havel-nmop-digital-map-concept/.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-havel-nmop-digital-map-concept-00"/>
        </reference>
      </references>
    </references>
    <?line 839?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Benoit Claise for spontaneously seeking to include the work of the NORIA research project in the vision of the NMOP working group through direct contact.</t>
      <t>We would also like to thank Fano Ramparany for his initial analysis of the possibilities of defining a model conversion algebra for going from YANG data models to OWL ontologies.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+19y3Ij15XgHl+RQ0VIZA0SfJVKJbpUNkiCLLj4EoGSWm63
5QRwAaSZyITyZpJF19SEQjHLXmih8NRiFrPwbrzq6FWHVzN/4i+Z87ivfAAE
q8qS3WEFQ0Vm5n2de+5533N8329kYRaJPW/teZzcRGI0Ed5xGsyn0hsnqdeJ
p0E8FCPvIE2k9M/nIg0yeN6Nh+FIxJl3GsTBRMzw1yAeeWciu0nSK+9QyHAS
rzWCwSAV13W9f1jXx1pjGGRikqS3e14Yj5NGY5QM42AG8xulwTjzsyCMpkE6
CjI/niVzP1R9+DPThx8naRj4W9sNmQ9moZRhEme3c+ii2+kfed4HXhDJBKYU
xiMxFzE2X2t6a2IUZtgywj+67X34Bxa61r3sH601Gh/E+Wwg0j1va6vxAQwP
3e1s7Tz0tx75O580GsMkliKWudzzsjQXDVjybqMRpCKAgRhqMA1JMHKXi8Ca
pEk+h8807ByQ2pZrjStxC69Hew3fuzLAnBAw4ZEGhGcBAU+DOJkF0a03EpkY
Yj+NaxHnYq/heSuO6nkMu7Uv4aMwnsD2QTt8PoOtgOe4Db8IRTZuJekEnwfp
cArPp1k2l3ubm/gZPgqvRUt/tokPNgdpciPFJnawiQ0nYTbNB9B0ImIRpHLz
nluOfUSwMzJzhld9tbjzVpjct9f7ft+aZrMIECbIs2mSAqR9mJbnjfMoYkQ+
AcCKyOubDuk9QCWIw98T2Pe88zSIJ4JeCAXniJq17Dx+kdBHrWEyW6uOcgl4
Efy//wPjpEk8vK0Zo/PisnNwfuoOgsgU4CDU5hciTwX03hqn1f6/SoLYO5gG
g2S1+d/C960hfe9MvNEAmM2g0TXgZANPvPnL886/PNmjLjSFggfejvelGHjn
cZZEyeTWO4GecoC/d5gMc0bea5Feh+LGW+/B5OG4deBcw6Q21qgvsy1eddZf
7h7weEE6EYBEGodubm5aN7uEuP3LTTh6O36iRtmkBkwPDsVQII0AwrC904AX
l4dHxQVcCpnk6VAgeRym4RyH9Y5SACgdwXVosLHnHQDwxTxjYtEeyCwNhpnX
u42z4OX7WkQ6Gm9v+0M1kruKIzFI8yC9xVU8VKvolZZxeOT1hlPYWW+7tf0e
p+RL6nX5dE5PqrM5DebzCKmTwYd1+K52y32PEbgdBzILZBh4h+EsyUtvT0M4
ol/ABsB29vCf0vt9EcMmeqcCqI1ISy8vgM5Bu2fi9joQaVZ6258CTZbQOroO
asGSziKkU3IuhhL/cMHxyzwWxHgQFL2L9uXnJ7CPn5dAwi9wc7zPc5HaY/K+
9krOg/SbCEb+Brt3J3iKpB03a7cww6PPF87wSIyQ3YCMQXN971Mc6/7vnOzz
8xKi4xOvF87mkfCsAHPuzAaOJSDAzLsUY5EKOE3vbfpXifRT3as76e3HXjuf
5DKDiW99ihM/O7/stv1zH/FibwnK13Me+76OZ9i3ZYqvgaRGxxNl6TLKjm0l
fBxq4YMIWp3kGMZe96CvYCnXnMUSqtdBa5SEBKrtrdb21tYnm59+8tjf9bd2
t/1HW492P/Y//ZpIcO/k+THCZffHh8uJAB4RTJAqVYTfIwDPQRSAbDq+xQ8M
UHphlitRcSlQdu8EyvbDjzd3H21tbT/aasG/Dz/9dNviymH3JwIK6wW4ZJrI
nheUgeMPAgm04AIkOZQG3icm1QNtCGKOfyMJcF8kkb/78JPtzXkAMvBuaz4a
I9COL07e+XABx/hdMIP59bJgOL0DXMvBrIFJ8IKvIoF05VJEhDlB5J2AyEtA
JgmiAjz4QSHqLLgOJ0zF+iBiCOkdBPMMZL6RB/ypjLP3PpWEgB8//nR392NA
wI+3Hz78xCLgi+47A3QxzNpAhULgkxdlrLwQaYovjvMwigBhskxUSZn3ogvC
8XgcDkPEqDosA4id4Mr93jAA1uBgHOzCPBWgCmbvE4qPHgHwHgEUP9l6uPuY
6JqYnXUPe3ee4sMgDRNgsWkq0qQMwEBOvfYkSG+CKAruCf3+NBwEeZR5nWkK
HxRPuZpd0xsAuIkCShDr4iwcIlnLEmMm6MagLaOC7mDnfc6u0upAk9g83Hl+
Egw21dAIo6OT9nHvFEG0vQxE+yB/w6EUIr4Bpe5KRGUQsjQH0t5FIOZlQbDH
MiKJirH3DIbIyp8sFwdPEzzCI6QPmRinYfm9an2aiFjeS4TdT/M4wYnB1GNv
P5EoXJe+OQqjcI5L64NaclVeWjIOBXXwLBEAmHJbMbsCYQg0uTgoHiMCPEwP
xGMA+MiRCEZAYEC7W0DQL5MkAxqUS/wAXstQ4lHrwcqh8WGQBbBPqQjgmA1u
vSNAHMCszkug1Jlz0G4AJ+CwDqd40jUlLGHT9t0yxfajzd+1xjnSwxa0wEet
re2PCbHOT7oobW0/fhe8Wo4Wy7HuPApB+0y9XwaxlFXEWAEpl+POXwcv+skN
kBL5NmgA+93OM/ga6WrnJanExMrGzs6P0wQk8VBeqXaiRES2Hy8UvMtCwM7O
9i4LATtaCDgU1+dz2Y3HaXAnTTmXwwAkvATUizLVPQSuO0K+dS2kD7r/pEx5
fzlFhpzAkspNf5lH4atffxS8jr02qAWB9I/zWsp+EKRRIr39ALYfRjmPZtXO
TuFUvMyF9yWohqVXz3LglJWnZyEsBmRWbz+HMbMywv4ykTA38RooVVpe0kU+
nAaJ96upHktjRNt7Fk6mPorKkVUeNHdAkoG8lWAugVMM8TSWOcMKZ9nRD7b8
x493H237D7/eeYS72j6lk7yzbDdPYeUwv/18PC6v7CDIpoJkiqMABDT/Vzkc
iLSwRr0sf58E2/YQJC2QE2DdmSzYgguounOPVT16uOPvfPx497G//TVpsudn
/XP/tN0/eIaYunRtF0mahcAZmkhLyotLgEQ0SVqCRc4qrA/4Fei1Te85LD0K
y62fpwJtMvg6AwkhjMuwexYFo/CqSeANquQRpIupCGdNoJDhVVILUgBfhnR+
AuJImuSTKZrLkijPUElH6S3QRKIzG4jRCL/szVHULeHQfaCNOuY2aFWfIg6B
/u37vhcoK12jYWznIIYLJUQOb1EvqbHQI3fLQHwH+YUoH/w7z5Hsx3wCpJeK
b/IQcB5ewaFDAV9J9SBGiRRETXoQ4cS9a1j5DD6F5U6ReSRo+05yCUMMp3EI
oqpnLKxJ3Go8L3kRvCGQ9HmaAH0SoJflcQh0fuSRMRX6xMlF4qUnlaSbKZBL
2Fz8LBkGgxxmEgrZanzVPjtG8AbeLBmJSHpArgYgKo/I8DnASas1Qr/xOJzk
rockYFKPX8HxClNoNo+SWwRZq/EsuUHNGoTLBBh9MIcZA7OHdY9hYz1AJRDt
gfmQAm0mdesFESiexk8VjBKyvja9KbqBUEx1vCrDYB5m0EDZeLCBJBSe4I7p
iY9Il+UZD4TMAHbIlYa4/n4CQ4xSPOnZNJRNXIenzK0IzMDrgs6ANmSYs6NZ
rHf7vdONstrgrT8/3vBCEp7TZJSjQw6k6IgtDMITL0OZuTANCxRTQX1u7Aq0
O4wJNHu1ORqLAesCmcSl5Q4E8KwwSXF1sJgrcQsLRqRG6xjMBiUumJBeKY+u
jp8EBuDh0vznx7gO+BxGiiVp+DSbVOtNCg2gUf1ilAYBqIpH4xr0LwBbySFW
6q1Ji4R5QRukA16YqU4AO1MEXwYyFAokFmMX2B3W24cbLKSgmOE6P9EAPeTJ
txrdGLef/A64VhRlhkD9oaWSZ7ALxh9vHoB0lsbmXZPWhlJtyCYNiYdynkje
9AAEPsIq4c0TmHcWwrkGaOEDA2GgNjM6yQ5OfJMDRme3ztAwUSZfs3A0ikSj
8QEpZIhgNPNXH0gx9AnnXjca3begX03vBkgRMA8COZKziCQ4WEcJRQHaw9uB
SGHEPMVphlLmAjowFBAXGAxCWgO0l+EM1M+AKFzEq4IPh1fwu6aVokgpYbuZ
ULIrd0U66bHLRlbpZROlUr0ChHSxN8KlJUSyqY8dk1wi7AuJrp2aIr9NRRkB
9vzEILmHROgacE8wmiXW++yAHz6ceetSCO/Vq593/cPWLEgBRdm5aY6TTyv1
b0Fue/2aenv1yrU2v3690Wq8ID2MjjhBLXKOY/EgAhGOkhuOLAhwB+HM0HLN
HhmGbTigWhUsVRMgRfmxE5AUQSb3PgRSOsRfMlIOicCDWIPclzYTcBSoPxrS
4QB34QBHkwSQbArfrovWpFX1kwPeoRYyJC3EnsxRGExikIrCoReEoyYsQZlr
YfkzgKDiGBu8GXOU8WlLboLbJp7KCCVFUlDxqQmWCCfIbrz+DbKskOwhalfC
NBvDnqQTXwHEH/HHfgYf++i/eP26SbDAHkcoSCdzPptAE5IkYmirhSnhgRb0
e/xL45elteqQS2uI1jgMNCkKQsLZpsf6l/pd8UdB6KwYvsItqyvjPF+9MgZ5
/JMRSltXCZksewcaBVzYpXIDOFnjMCPmwMp/ORCCTgXuGFCUOEFSFSIjAqzw
bgVZh2HBM5ESXlg+roULI9swjRzyVsh8Pgcp2bxUKysYMuF0IJiJnSBRpL1Y
0B7OI/r2UAPeUJIScgTACwDcLTILACdQthEoy14wS5ANq7gbvZnvLETxma3l
vCFPn1gzSSrPj5toypT5ZILeTjytqxMN4ABJHo2AxcThLPw9iwcgGCNAFGln
toY2AbMch8UwDmfKdICtLY2UWjpzua8nrpMrtL4OkmvBskoUDK9oLUYGHMBA
AuSBa7SPArEmSCjMhT5RuNHOcUUiFgA+A86MqgiKZyBMauS1UiWKfzgl0Eqc
cz1I8iEsOUwZdul4uPvx7seASrcYreIjmU5fv4bjcJSnyD8RsWAXIlDh8Ciq
XmASACjuQtMHRcp8oKxieDuMBBJuFkUVMSpJtwCXOtXEHi19/gMHSk1k6Kgv
DADfBxIEWdzGKciTOAJGRwCp9+QQEBcHcME7SmAeeDjjAPgmfIaghgbq0NjA
CCXUaE7wkeV1akvmU6DKyBMRj5joRclQiXz6yBS8r008jCh188HkA7nhJbWD
6y12GChZmGDVILxLJbzPKsK7c77VRAdIrVBqA1Y/5I1wBMA0j+ABHXsQKFh8
ns2DGFgGmmxH8HqEwEN+prbMzAjlo5kAtsTsdcjThNd4fKHZiCUTs8FTGBcD
JYDwtJHmUNzaNzmyRqOjAMnI8UywCCk0MynLkR8aBciIaFrmhS0h6WdIQYPa
ix0aQsZsJSG5VqSEAMCjX2bYM5AIPVuGUoQmXIZ83Vqz4ArOsWbjmq+RQHGN
fINEVBKeQlA4PvIA0wbQA8hLBGUCTxVuiB1Ar0BSc2YzyAEQQ5BPtSYIW0JL
M4RLargCNNA5wiiMDMlChomfZOnOLlvhZ/0BdQ7j7RxRHmCWCuJuTPpjJHh8
+CIypkEjARpZCYmTFAkiUiqk8nlq9F+mDEbJHRckYBRYFFdA9gn0F7YfvkG2
gRIINicZgA8nowU+TMUEqDb2OA7CCMV8pAF1GjOzANDJm4SSoSGeBa1Z05US
ZuJpdBg3aUK4/7B2oKCXAkHJog9pSBVtEUl7VRhoVqVC6j5FzW9Wr/nB+QI0
QcYis3yETAr7lqSnRx7Rds1fe8ojRq5YC9b1sCVaSwRoy9ihc6unRzbYAPsj
jEe+hEoASeYwr1evLg+PWArDmC7+7fzLEyuJYbwLSWFtljpIcxMvA5QRMbJ1
KlwrOJwAZYZ79apsHEemY2V9h29KoVEfVUV8kqqgON484KA4zi2JcNjFkFaK
vUwTNnIoyit/xkI0qyPuZIoayoKJBIuMJR+6OhVKmwLpiBX+lfYOGwPsewWS
a1EFaQPoCQ5iG1IL6DphwqgtE2UkBZgRTSVCCHhzxaY/ow4a0QkQAuOY8Z0S
OiTvb62s6GIy9o/RF6i2C6IvKOBops4krUbq9tZfvYIObUisImuASR6peEMQ
4+EYTZNISXCxQC6IVjmXzMCy17XQSiRuQ9F+A0rVsVSnxJEOjBzGWwZYRman
DMOBmTbxE95LNFwhzyc12HS/ofbV8hhi1yMyOtkRVU964xdDdojuDjTdBsAw
xMhPcpRmCd8jZSczQwOd+u/wHxzTYRj66E//yw//+pcfvuWfbgkA5sV7/fke
xvzOK//nzmN582rL7xb0+B1Gt+2pONeaTxa3/IGG+hP9LJnLm1V79J6Q7Jo+
rb5Z1gpe/eHfapvc2a7+8fJ2mkT2b0GcvrPV0h37/s4ZrNDJUsSB33WcMz5e
dbjv+qBlDCLRJ9JWXdMPdSMzIrxZeZBqJ4tQ6U3dRsAjerracG4bt7cnsfh6
5ykPhL9vP/3L//wf/GfmwuCSrXUWmNRAk4yvt7afluboQnPx/Opm+K4dAaGE
ac8O1OUd7A5X9rGzyodPiwD+s321W3j1BMg4wOftZ7t40uWu/vDn99DVk3mA
u+VHoOu4O0Lr2H1qPsaVPqqlM3dizMJPF7+unN9/p59lhxfme56GIEOS0Yh9
G6Pzwe9A9l0yTJmWv/O8aw/6igeU9vSOgWra0VZtP60Fzx193EUnGezcy2gI
SslM7mVFMl7q77sOyiiXIISmoxJdvXMuq8DO8sZaWC3hXU9YTAU15Ysw4WDT
p3e3qgPSQmRcaR7echnirparIli5xxXb/Wg/b0hkbLza8z6oE785WuKzNScY
2DXvT8j8huIsaKsB2YI4IF0bmdgNSuI/emzTgIwMyridqmBjOQ3n2lBXFtOV
zByAAjpgRWGIMY4UXwx8DjVZz9yIQlNNpoyuacymsMCbhHAWvIJksKHFdsVz
eNqg2RWMIIUmunOyjLS8dooXD0nBRJ0wYQrHtijymq2DerPHhO+Cn95ugPpH
PbILB5WfSg88ERcy0FU6GtN532itvW409m+9ScLaJ6htc2/M1l3St+IELSEM
cFi5iEUaDr2crDPoDTCGmRKUlRVWcFAcgkC7Y2q8B6g8lp0m6K4eCTFqVrXO
JvRsUAdnkYXGJlXj0lRmOLQubOJlPaWTa08kzjhNoqjcCoPi8aaNpCtuAGpt
h6qiq9TLHSXKk4ZaVQobG0TcohT4gPcl9bzQgIDBRU2ve6Ft4jAamvVSiuNS
PmYTBVEwvRTN0Y5CyPuuXpd1Y0I9DYACbjSNYWaNdZA1um8MiAtnZI1VdrqA
fJF8eXiKeHe1hnpifyqU7W/ETmzyMIz0/UeMmWWLN0egjxMyf7QaRyHgUXRb
DUWJ3cgMJ8KE3DwUAZDJGV3LeP3aOGIcg9N7iT4hLLtP/ImGZTn2gWMlgkiT
Ce1cPQ3m2m2CsZcRe020N3UWzPVtSFhkSA4KmNWtNwrlMJeSwUGQlmwLbDX4
filCFKcNnBG3WXti9XQKkTBIMAodMnyvJkP09aBhFlE+ykei4DExoTLaQKTa
oYfNzxJojyY8uqaGKECg1J4uQkzVj3E8O3Ei3NMkykPsiwzl3+RCaptgGZ0L
y5mHc0HkUDsCTH8ii+yqRPmhAe4YkBadIUmsj6O2jWk/hbHZsPFLqvBv8q4v
CpsgQ5+xzEt0EKDpCchok67+06KI55HTh4xqfEeQ92g4DdHei4HfcGhitEQt
i8mxizbvJR2U9xyqg4A0e6yCDuDfvBTWUaIFtGCgZEma1eFw4wO8bqwcJQzX
Q+Sk5KyQDRPphZkHgFCdvuj1MT0C/uudndPvl53PX3QvO4f4e+9Z++TE/NJQ
X/Senb84ObS/2ZYH56ennbNDbgxPvcKjxtpp+ytFCdfOL/rd87P2yZpZhFkm
HitY+0DYOBKifQ1l7uWF7x9c/N//vf0QNuu/XB4d7Gxvfwq7xH883v4EDcU3
U6FixZIYsJP/RGN0I5jPBbmC0Jis/TOS3eJTRCZgHoAtjQf/jJD5lz3vyWA4
3374VD3ABRceapgVHhLMqk8qjRmINY9qhjHQLDwvQbo43/ZXhb813J2HT35O
p97ffvzzp40G4lDb8hA8fZF7/0wz8zIdh7Og6JKKMzNcBnr8wLvQsYWAhW3j
1Lc8iaLSkEopJg8vhzASikCp4zkrj+pG1M4GYcwOBfbPYAApE0wiCvpYUbSR
4iZFC2/JQ83ep0SFWxgHPKHJjQDEUSTH+rFhOTfTcDi1Lg+W1cSIYggLaE5C
4k2I+Kc8ZCpOA/k7+dhAVgyIOEQsDofqUKNwPxMB+1yLYZoIArMWxG12V5Yg
gXiPowKdoDtxFM7Ezr1IGNknRF872g84Him5VyQ0yYdkMHefGo4VhCMcpd3l
eJC9RkPh214DLxqV2RQMYoRQlipRrlYBd7JmIBszV+P2a1q/nw3gVJEOTnAB
rJN9r4NbB7lqggK1v4tdORWsom+KqPWRNIGGCE3mARhByO6MglOakEa1a6pw
r1vly6OugeWOcyMfmdgELbnAXqngBTfQc6x8H+x602HiKmLBDgg0kC4f4O7g
1hxRpB+rcWrHWAAt6wi3rPg4Yb4Ol9S9olDkn54fdk7KfRcjU6QbG2xGKsrz
us/TTr9NSBSXpkLaSgjKAXun3UBPmcyEXU7lIHgY/oGKtOQAKp6i4yeGM43y
O4r3Vg5A9QqjMJR/GK91KW0wzDS8kcRYMbk+hJz1dlZPoCV73bQ6qeV+JUCR
blsgFmMikdpjXj+CPSwbGoon3bPnncvyrqyzr2zDK+0eY6X6yOwCI0ZJxFEQ
Nfs5FCUNW0dyZUpSGbrZUzhI3Sj2qrOl0zLTgaXxjR02eUjhwqmp6DbR40FJ
qqcoQOZKlJAorYgs6Hmvd5lq/daYZYBcRlFOGoaCh+G0SD54Go6NxUQgGINA
kz3gxCKS1KuGeCrhiaNnKI6LA74oXwY0AzE4MXEATdB3E0kCF3QTKCp2v4C0
pumaN9dExzkM2yjOyolriKVe/sg5i2ZNrvcWGuJdDgo/HHA4Cc0ZOh6rOKsg
R02RAUeWlui2YHcgX23O5KLNJMnMnOMaJ4kBF741xK9ZHYAbjIQP3FVD3Bxm
B9fNvlAfqQASa1Tkle6oUMxJJXpJETWcA/ELRs0WCVs6d0Ct0kzSmaMog3zW
U71bqUhbE8zuVPRmi/ulJu5gJe14NXVdzOaA9eHvhY4uYF3IWiBqeHA1lJPU
V1BzRKquF2Bw+m1dSKobxKb2XiugAd/uM5oYDMWam7EHlI43CGZZ4JflF9or
upaiIiZcGGnQoYWU77S5URTBgOIMMBBMHzgVz1W4RMMxEczNKwKqNi0auQ6w
eALspF+OZZuHGMlRjhdDOVbLqAATDHhk3begG9iIccVPbk0A7liHtaC5K0ED
W8pHFvXuRNLo0EWzJABHocTYEFYQiqiSCg53Kr9h7dpGQJXfkzUAA1lSMY7Q
yKvDM6MQubU+srSJbO2hrTFyq7tvl6x5sFVG26tXR3OgQACW2SAxoluKd0hN
pF9qu6crlND1COUNfSrY3K/vlND097wHD/7rgwe0LxQNmYV8waYJLzbVizle
pcCLJ/BWjgMlET944Kv3cRL7DkTM0p354NQp8N6YTlh4DKQNBSJChNYImGQB
UhX6w9sJyjbNHVRpf7/d6x4wD/d7Ly4uzi/7KIrESTZVZJ8tIN563MpaaWvD
bXzS/qoDqriVK/kb/GRTfXJxeX7sn190zuxHFwwVUBMQLmPDy9xdsKdJkzqN
Jyj9UQgn3VJS27kw6C9L5iC6GRN1YMj0XCfJSfM41jNwUU4HKXMnBWwtkZzC
env9Q7990UW4dg5xtT3EJxUQFrCQWAOXlgtWtC6cn0E3F0WY6ve9zmn7rN89
qH9Lm+Kftb/oHrf7nfpvOv/U75z1uvsn9L5ym1WHnqktkpqAODvUNJZIwlpU
ElREJJEDckroqEhr+oSux4UoVcxAV3aqGHVKbzm7IH6LriUJ0GzL3zJe8j01
85lyVSEHQsFGhWDyQzLW85OKn4Y6tloPJZeiEdBvUBSKHYE4l/oynr4j504Z
XixqSNKYo1My5YZpkFc2jCk9oKAJUKJROOc3oI1giC6pRMoVJEa+e0VXErHh
L37r+ndVdxuF/b84eXF8vAQ7LX4Umh1fti+e+f3L9hedy16bDjNZ3kGg0tcL
UZ81lxPYaDDSp7lM6sP4GsP5pLqRFCgOrs3VuTIkE3Hj7Fd3kTfFk3DOvppz
//zi3D8/O/kKZ3vpEvokU9gdVqdopga7gNyFFRNFQChckm5P8EVFFwm0s86G
5LueL21Ka7kzBFJw0bnsdzu9JTtillFoetk5aaONsfese7F6a0tnzg67bKLE
tmeUPtQe7HI0uXg5Jz/DtYiVwq5SEcI5t+kU0Qek75hVgrXhGGTJENgwKBjD
KzrFeVyHG4V59junMP1n3V7/3CVniBZt63KA7bgDO1gicXs+PPV7B+0ThnwZ
lcnqICRLeCR94o1G2vJgMkHTBYtsfPIZd9mKpaJ62eXiz8KXYmTugJZf+Fcp
UUi8UMEUpfDN1cRHi3pdc/WKOsBrk86ctHcXA6vKIua9J6euZEZJAMpgEAV8
HWV9mqTh7xMymcohuZA3UK4mmUdJmUUqzt3j1eMQBiG5cqPlHWk/vsBb3jRX
J6BbGhqCZ++KzqNxmpqbfg7dUFqERjTtv1aYWkyYiZvr4O7R5yTMSms10EJm
zbxdng9YdNjtHZwDVfzqXiwf7f+9FR2gjM7oBGwY+7bURlbAzzH7qJV0XO/p
9IAKkb1PZQpk8lV0kcohQDwNkyZJwhFr+9Tm+bGRPHx0wnwBB+fsoEPIUfng
uHPWuWyfdH9F9Mn0qpxxq35O4TOYfIC4LSl9MPPQcZfWuF+JIJstdD3MJDXg
Ia51EfNul43fZMCfgrogUl/dDyrYOtk0YRXmgu3V+EAR8Cr3kt/XA/oneKTW
O/2TDesQdrJysKlvmZeV9EWbNa/qRMYlz4QSTlC715enFGIpRxPeT05CfeHV
sR2jheMIBRYHa0oXZmmEGkWcEdZBP4W3jtpJiFtwyeRMAwpMo3AjR/HpMQZB
MTzY7KqAgCvQfpescBW3IrR/KdjDG+DFEqHiV0yOBJtjIyhfbqy5MLwo34Zi
mWzdSOg+V0TdV8y8FiPX5caiiywVM/yRohhsdnbMvqGsO9wE74IZz1oAzAnd
azSWHXfmlMKeAte6j11yKqCqX0lyIABa312TtFas0NNSuErM7iHnxk/Jz9Oq
mWeRjKw61efqFjlZ+kuAFPee1JcUj6b8D3cST8ptYm+BUrgWBRIW7hELTAUp
WBRTN8ARQTBShVyP7hwV7gyTKUdxmNWToobmbpOg09x3dE2pyGE5uwbFeISS
rhjf2uwHlFtw7IGYBdCjC+Flr7SbhMIpFRGRHob30qIS6IzXx8lRlLE4JgXZ
5el4jq4BLGiZhm44uo4dGtfIp0B+oKNlvCDewPFBeME1VlPAZdW7DIPYBPux
E9YY7UGoKQQIvXp1eYpiLl8+ZgOQS0+rlyTZ/m6MmubY3sUGcfV0ZtU9cYtT
JaatcEJrLXCEt1vePscfDjjHUClpkIssbKg0jM9xAPJFY5XVigi1zMgSVUk6
UgNU4py15llCXBVURQY4x7fbauyUp26nYE5obeITdjW5/NxdKm6jIn2lMC/t
Byv4wELtulLN+Xosum9oXSr7kdaIzClrUcgFUzpGn1U3WjkY1B56NwFjm9Iu
JyTLaI+iWy9GX98jIDaBkKq8bjiu/qavdFYSeClsZ/fhx9pUo/rEC5Yp2SH5
k08fYuIRr5yOrLmIORm2Z+7i33m/FIGl8zIs2BvFx1cC4CwgpQ3DjdCymqXh
tTadr5kjmqRrLlo0VXolABMgIwYSE+jUMVNpBkppGBQWshUy5CA8k89LC1hk
4ZiG8CHKayaKVQk4aNLFe44a2zQKapmUkH6GbIR90oTsRJ+0lRn1FJ2UQjq2
Y1P1wlSnoQ5gTHfnSQxPxZhyYzArlJTnY8E2oPYLnyWYNY/v0KuMMsa5KA20
LChaJPKpy7rKDMdyFrAUT03G2zSIYs6ME6AYO6lHcIMxGofCA1NFbXV+5IJU
4bq2F0Qx6MmsxQCgNbNlyifrHBID2jWqUrOnA+8rbcrI3VHXv4m9OMn20JUT
xlccdGLDvFNhzfvL9BsllnfvCFr1NVNlXzDnbCMllkKURDVClSX26oiNxn4e
RiMTJEMqx3XI2cO0N2ZVla5ZUF218iJJQ3KAxAZUPrLs2nVkN0NQShGhheih
io4XKYUeujYowSoW6S+mU+MxJlR1JB6KWnJCs4q+PqMEGOchO74NHDmEYDkL
cvM+Yu5ecZuotAwmIUw1so2yhDCJ4CxDoA5wYoqEJSvFMYFw4ORRb9Se5XEo
olHTyXNQyn9K2NZP9DYxSMwu0ej1+hOFvKVZTZQR7wBGGpVjSHTgzSoxSBts
SBhCj56MQ6D6mTo0/IePBbNMIAUecQ5OB1U6HOrQOj6fBFSFIHrb7yQKZhE1
YhPfSG/8AuY7Dl966F7wnmBm1GKpkp2trZ3NrU+wKtIHT72W+R7vvdR9v/3p
p59uQpOdHZ8K/pB9wo9lubFcNNrW5ta2UyuI2jWe5Gm8h8DamwdpMJN7L2fR
Xiz3UHHfc4H4AYLkacPz9L0cWhh5S7yf8WO5p12V3hruTkjh0UlKBzWm/CUa
gXXQ2xq0bTX0ZayFm6dvZPXUVqsjV8YgJzQBX3+ETT8q7qLmOss2kCLJ+nkK
QyozEF1B6hcV5nzgKyqG+W3CyKga5VlpPFNYtARDlVW771ATzN3iMAl19ngy
y79hdFeShk4XYwwjePCL+XFcJZMFwwVGGD56NoOpcZYgW54x7SzcUqKF23sF
HMJH5ElZWIyyKkVW0L5Uuksgb74JGFGKRBoAgcEQIQ67U7de/AUxbiYmSq1f
+f5kFrAcwempDKo4MQZ4W0qhW2FRKsHSSAnp5p4X2zSCItZp56N12bFsBIJE
UVMoEDQS2jS64A5TpDdSH837ZTF0SumqCa/JSJcmAKxCcZdi44b2ZtX1gnF+
bnsuHZn4gYRJ+qHkZDixG/LCMyuSaVoVSkOYtE35dKV20jvxkT8FTW080ems
1RZRtQx70jZxNzYrJNGk2EaqiA943Vxp4APvs88+e4rCW8LuWge9yrvzBD6l
RnfOw907rQ8+9Zr1Ixa3sDrIzW44IuBwEUctF23e3SFvVSEo9p5rICRidHha
yxnMKdAcob8w8NWeikJEG9tL7Q24EtTR/MohDTa4tpYb/P2weN1QApXcq9ln
fL75tIU725thFEEH9FvA3/YN6iSqqIzpZZBke3XYAs9xOOzFqAt9bZvQZ8JC
jCxaaOHZwxYvVBDgQSGRsTlJ6y8OzjcazqgqaJDyHhvTC87CYGs+TDbtIAUA
wvt6MMwlIGIsN+EDvZSgddUKWl7v5Py4c9m3sGRVcJVD06JKnY7eSMdhgRCl
xKgoGICgvGY1TeedFrHW1taO2RBhktx4KaU+0AfggFOjqcD5Q4FmHlUqAJTP
kSXoeAQllRgCGfCq5XX5/psK3ByZyBoKg6UoTNWNCImrXehsksCKvwhTjHxo
wfR+AXzXmTgITLTQ87GCXs/cy+goi23t1w2dS4Dwl9GxWXxYWCkv1H6BCKsH
sE8dBOQGzjtEkGeJLMwnlIcsE+zf6s2vo09lNrhMcCX6WxVZXVwpCa/aUHK9
1dpdQJb+fujS+zlKNcFb3j11msWMhjnRsj1ULM/Go1VVEs0Mq5yl+HLBhjpJ
MZ3gf3SXabNH1fLqxNKbe5YFsYtLfPoWcBj6oO94pSIDCZeu1RqxuWRp4fge
uxAtJPK9KowAsrf3zT12vE1qAeDASLdWQt7FZeeo+0+rIa/++P6Y67RcHW11
IxdnsdxJkAWqhrViXqI1Tlt40zLgks0OGjcavc5J56Dv/TzFG5pfPutcdrxX
DeQ2F6qggY4EGZBfgHCazr8BOH2N14UADRxjSflTC2NogMPx+VivOTT/7Tc1
DzceeMUDh0fQnSjhPWGLMOpP9cKJGtwyPTuVVuN15ehVkLN8AN1RF2Fo4OaL
VPdRddxaFW+X4yWdTBVC5JxMVNU7LzlU1lh0w7hI4G20jtbLi1YzDCERHGPI
0VLqsqlgN5Ajhar7SjYlZ1Yr+q5238ssvAAOc4vLJWAhSBWZCvQNC5fO6mmL
ZoF8CQOjy1puyFKMPk0rm4c2ctXtWU9E0ddQVoZnKwQRxDtpm4nlQzODvbIR
j/gW2i0ZQ8jKyqFbSGzl35UZ7x8y/k8s49/9FawtqBoI3sIg8JbmgH8oIv95
FRHHLlPhSMBMFlqW3oP0vEQJ0hzgr6cEqaCm0YjcW4vWu0hVIv5dG5SpwzGr
QbnsJNUBls5F57crBqTKiVO1D+LvrqfNli4yYoGNbgpszGglBsmZcMnf6uQN
Qo8rF7Eh+QHYKOYAmicgtcq9RiGQVAWFU3DttJzdgN+ZyEvtSwyiIFX5hgCN
ZbNhrwnqXsffqA6dOjJkOx+bOG0O6nZDXjG3jCk+YiFkI0IxTM/mZsDc8KyE
KDcFGfVtgEEx3vVIUyK3EoVC14UXEqvXJiloHtvUxdo3F94CsEH4hWhzjqkf
otsgunWK44niHYbitUGSTp/pXFCcCErngCrgsNnbsoOL4rmEGw7v5obS4aJ1
AXD6rJjyJ/Hy4GcVLmbj/jVmwzIW3Iawk3KcXKWycMVNdm52kP5ADKoIl/rI
Jusep3xvpz26IFS8x8a3jm22LcS3GcYijQw5KuobbtSwUWFqKLVVjftldHLv
fxSyXLh+7ambfb4UAHN3jHQ5s7qb17M2eev3d6d1XfzJXY2XtGws69JNTIz/
40rYzoPa1/rvSs/fqyyplGxW/uWH/4VP//Af+KTVa+233CeEBAh692Gv+hle
rgH5xX0GP89bxy2T0rg2h+qbugXYPapdX+ltpec3OJ6704tHXp7XtfjJn+7R
ePH7N87MFv9XXMFSjF3xpzbn7n1/vq+Z1HfrRDY2Qfn4GsXf+Out3Y3Pnq5z
ZtTNy05vk/Nabm/Ur4rB9C5rey8/1bW9h9X9ja/vvazwHnmV/3o/pYTIRQ6j
xffnx/xnhV0X5DOK3qjkndQu03puUvrviQXe1wy83aeN6kMn071XA9tKIutK
svhlvKbYW3VwynmulWdq8kendsOitdUn115OC5f05bxakoJ+tQ5wlRVU3n5a
arHKOawclWq/uohDEYDF9O3VaVf72XWLHayUwn0ZooMopXH9sqZkT0l80prh
uxwL5eApiqEq0Q1eOvSx5PqISwZyNiahIq+pDqdbyTqM53m2CbgJ/3jr3c3z
DV1ZiWOS5hlWkVQako4NJkszxoqxCWhsChm5Op6uHHi4f9rbsNJwP5wJv8fX
aA+hGWrCoAz1e4f7coMzKRU1Q5R57VVdKpdEn1WzatdeUXZF/qpAT2lvhaps
Xglt5jjfDGcsecZLU1R/JJ0UQKCXY23WALY24NDigFNDuPZ0VKbL5UBrblrz
hepWo4Mw5zs9Vqea5ynmxXXSW+sIYxOFbGLRl18N5Nsq0OmopiluEKoT+j41
Gd6U7aS8JNRAEblMraxcYmDxANPAEyTUpXOtqRtLXiX7MUbtqwxPqJMEN9zA
KZCXCsDlgLw9M0wEGPARU4neC0W+MV0x4DQFAC7TUu5HtxZweaLZB6rab71s
qQk7EbBa0mo+uuA6lqwTLJN4zM+fKr9UGcNKGtW/V36pfLK48X3e/0Md88rL
qTx4D+rYfTSqyid/FXVsYe2QCqqr5f6tqWR6F5RQ3+72jCS0qlCvuvgbEOlX
2xrz/i2P+j1HWfFAl1r9daC57LAjl1SHfemKqutzf13hQK/Q51sezTpJl6QQ
LeSe0h/PjzfxuuTz47dX7FbW7NR/tQrewnd36HlV0Nc+uI+6t3Aqb6f1LZqh
eno/5e8tFL2l4y8HjAOht6fWf/iPJ1V6uooGuHDG31X//vXKQHWgWzPASF9i
Lw336/vMxq1Xxu3WLra+2jrdOuxvPds93d3qrf3mNy/laM+MpntZOEzdoE/O
ksyUndpc3hLgjjVnUGvzlKSKRTE36XpNKkbtSKRZuS7i0tFrnrrN1/AerL+1
42990t9+tLezs/dw51d62aAyqJngfxoJVhu9PGoVLe8o13ev3uur9AG1XGgY
qOvlfqX5Pnun/7gPAq9Sdo1WT9r5hi7S4M66YZaGDWUWzOaFJTDNKS+M0Iib
1e12PQn1vBOkAV47A51yXt98d2979x2aP9rbvtfod2HBH/7NivxcvQt+UXd5
Q5Hehxwu4ctvZ3+avTcuji7joyWu96LfePyNchnXuazLxhonPwJlxjWu2Wr6
Z04yHUpVQgBfpZjHruDzNykYdSJXlZfZKVnk2ZRxd+Z9U+k9TAKqQNdos4GK
ahZ8Q9sax8z4dXYIs+3nsQ97NwuleEsWuvTHEkEQ1Ht4UVyl6tLh4jSVfz1M
ZqC/ftvWX65A+zyWaurE9G9ZUl9mPnB6WsEnXC54vLpcYqV2pMs82+90ZeA/
Pj9Gw6US7+/4+aOK8u1cFOwB/IfOqPEhf+phio3zufS0VFon7H/L8v4yN+rK
XOKNhhJO5gXmFa/Ov21LZehJ/fACzRbf7tQNuXzn7zE31bVFNG//nmj2Fjv/
IyJm7f73xNDu/4+Ghj0VOrtsz38MRDx6ewxRKLmtzVCroWTHVbF+dAvLd4cE
1hW//r6e+nub3jwfwG75wyjJRyt2Z1ZfhkiBrh9UsHsxKC8rnWFBY6Ipb32q
ii++v8f5ai89/pT5xML1Lz845+zycN8rnbNLPGaePmd//OL5cd2Zqz9h/fJE
vntQhffbnK3iizcrYfAbd9s17eG/HtCPnZI+Tx/urHqWDrmjAmy/XYrg31cx
7vAeGOdZ0PJv+H+1Dm0q+wlQ7/PStB6sbjmwaHiW9D4/eY9o+KI0qXvywx8f
O81hcTZVb3qJ4Ltj3IUzl27vZjrLifCbCpZ27oGlXYcAgNJnkPaB/uA9oeiq
71xUdRmAPlCaPBHki6Tx5OLYK+HkcREnAe+yKGuZv2txsVcZVW1EQQx5855w
b9V3Lg56pRl6iqyR1m6R70/vIAAX2IKVQn4iL8933tJD8Oe72q8WQ7kEFq5s
c3F/cWbFn4Uj64N9pA/HW67gx9ZpfzQtoW6lP4ZeWhlXnbzV5ZIfioP/5Eft
zp+SNc8xgmlL3ov3ZeBiG12D7hzratnaJOfUz1bXmvQD7iHmG7jok6A7wva1
yQteyMO+Ur7VQiEuU41dp2inrIR0C9kkJOMUqHxvcFSqus5QmdvoGHO7ie5W
qFA2nf1d31FBcx3OhbKWqzJWR5fnp/5hm2uTmutZPACnW6/LVmxTtYdxMUEs
pQtLMH+VdJJjqxqR+nYJFlBz6sWbu0bKSBumKiOitKUC63Mut+xCDjsXWGT6
7ECVhnHWUi3dWj/LQrpJgr5J7aBKFhfzZOrEt5ypkbYQu2sWCvxxsrtAXR7L
EHXSeS6d5d971VzbwU0D58Chf+5jEx+alMDgZJXUBtxAymQYkq2XX6jJcXLJ
OtBuLAIeIOMoHxazzHJdozvTU6rhSrd5Nlow/e5IcE0INX0nHekmPYBhf6du
6wXRRAzSQBWZGAhTdcqmxKYAzwgf4N3hcW063J/ByeeSKTOBBZxDOaOb+6pT
cxB1jY0xTHCgCvTYkcwQTs+0S92zXr99dtDBjeKy0u986sx26kriiwrPLtq7
1VKy1yWDby4OsqwmWlk0LQd78d4XklIgnsdnp52zfglA9vAsrkripqwtIrJz
NjZUlKslvAsLHxTqSVeBZ7LMqKjYIpDMdTV9VdVNqaimpwqFpiHRQA3sMqoQ
6d7w3Cqwbl6KIhexGdbhDNm8gm5lWnPVj+4xFwo1A5RhtvMECxFgihI30NVe
kKuBahUhyxMypQpMOLKp51BicaZiI/uqbCGGOJ8NgLbiGaGp1+bwKC6o9hNA
O41u+51n7S+658CzbeVFtyizxQG+d6ySXrgnY6YLhppSGHX7x8dlIbYzUtok
kG4C5WKlNzpUpZLWDm5S9dOaYhNc4MkpzTzhep1URsUQyBAzBtq0AbZ6gFO0
mfg45iexWVHY86cKBOv0RZzKs+BqpOezMA6RFmPNDGAHWCjLJhx1aiTXlg1x
M3qbIsxZLtHFWsiXre550j1tleTZVMQC4MaqjkIpM4zNvKtTR3tU0FqVpE6d
Ksahvj1MN9TZxUu/as7kBSG6WzObKZsqcwyFvdKqKldjKW81cc4YVQ31b88S
U00FEC4mqdaeSFs7Qw1erlyb4CV9XR1DGIHQSTlVrqIMouIDk0SgnLW9yQkn
bB5ukmW6fVPQhDNcqRu8Tjljp8Qa39U1xBeHxkIrCd4GZjDclMsaMRIDzWli
Kc0m1c9kek7FrlQaBWLONpNlseA8XU4GbK2wOviqrbbj0GzHevuQ+78M5VWh
Qr11JqlLxxpUpVRDCCdTUwVm5uIe4MY/L8iH8i/rC16AcNTNqK4mTbmKQQhH
p8b1HmiGPvrxT4DccA4FXeKG89+rGmd8J9zoIMyfOG2Q5VpuRikeWaf4NWIs
XsTQLBaPJiUqgdNuqjKXhlD54Ay3NNVoVF8NVWec3hJWc4FBVWnVJqyiSj+U
Sx3vz+QojDEjmgdhClBjMBxfnCgU1lBQuhSRJXd6tnIQnBsAhMpY7N5CL5WV
vmN25Tl5XElI6qkxAr3o6vkFmFFabU8ZW6kSmaaMvHWUNl+TdyfyQlVlx3z/
KsiE60oUUYJzKjjQKSXkH6Qc/ktVjlRtIY17pFlSD4uKx2MdQK9dXoVam6kx
rBZSyfmhqMGSamdMY8y5qoT2ZEnC5UKUTlZPA/io9E7bvV73yL88PUHlozAq
hwG56rdMotzUkoQVYCVxKrWkI2D4IoWVelpeexVyMIHu8gGlLDqnzHj+OXzZ
ow835Qykn3Dsp7PI0olVW6ijIOUAK3/LfObnc1zo82B8RVValbkMryvdBE6d
ByCuWKJOlHOe840m4DOlBCR8vMynuoDOPmqZvd7+hjlq7wUk7nJWBYrbRoFl
kkbDJotDlDD+4KQNuPhsE5/zkhR4Xlwctvtc1fE4zE6CActKWDTEGwsWrSh1
ezDEfacq3HQbT2VUU+q+Uh/IFDaia2NEdJVEVEimp7hfPdW3nN7YJeop+8b7
gDZCY0Ug46dUBxQx4ax7SPWu+TeT0icgxRtvbGI6frIJ4Uq0lARKHt7B5HpC
bIhzZ619vt0YWL7k1FkaLCpjm7eO4200K4JVs0L+OZW7uQ86nIrhFUujWuyC
xZwVKtcVpb5RAnuHVZOHeZpyOTc3F03F/Nastbbw9b06RcvY8lpUF1UniDtQ
dkkWSei6bFGOJcrNc3iglJoHTupGHM50TZwMcwHhSuwtWJONblgYDCZiytFV
K9IH9XUvbenoqWuGYC2qXILH1ZmBx0X5qIAfpmxXs6I38cKkUxBsGIU6rHOD
bgzTZVLmyyFXd5JU2V2ZA4092pSRKKtm2Os4j1WNC0ILNA15SZ5JzfLLy6cL
oh95rGzLUGnEZA8M9CXmEukg+oJCtQISSl9DsoSH8QjkkFEeRCiLwoblc0qT
RzmjWBakNjFgeRZOdP0WFFFgxWTWlvlkgmeQ9PZU5QeriVjVenDllrHdcErD
BLCxkOOMnTVIYIS9NJxMM+laJW3VOyKKXON9/cXxhq4kzbYTqpHBFRptrVJr
PC8tp32KCsz2DsgUTEbdJEDVHKFqBWpyYazKypcELHXvmzbOVjorsEjXOFKq
EBLK8sC5RkeYrWM9UXAn7OcamMpciKYQUTB76CrJQYxFylVOI6aWUs+TTC96
hbiqNImaNuenqiGsSk1rWw7XcqQeWOsjcZL7cCHCtYS5wlGQYmGbnLRlr9s+
a1dIVb9Ap7CMJRAd+tJIyA3f9z20tWIn7aHGI3LlNF7tsWFIjD5bg4MnBXqA
ABfYHByFV1zZEcOcvX0RJ3DmD6IgVBoUHsAsiAXX6ZJC6Ox4CtS0Rl0/xpJ7
NOqhvGPovjJgXIfSMQWdnZ5fUGPsk3FYm1E4YSyBHpbZcmZMOFyc9hFwfO8y
wOrnmMsY502Yg1mx8aiVym8BSVM0RaX85QzaZF3T5n7jcNDWc+x0khhrQrmi
IaXdAv5jM2i2Gv8fif87PN7XAAA=

-->

</rfc>
