<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ivy-network-inventory-software-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Network Inventory Software">A YANG Network Data Model of Network Inventory Software Extensions</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-software-03"/>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization>Huawei</organization>
      <address>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Zhou" fullname="Cheng Zhou">
      <organization>China Mobile</organization>
      <address>
        <email>zhouchengyjy@chinamobile.com</email>
      </address>
    </author>
    <author initials="Q." surname="Wu" fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Boucadair" fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="15"/>
    <area/>
    <workgroup>Network Inventory YANG</workgroup>
    <keyword>Automation</keyword>
    <keyword>Network Inventory</keyword>
    <keyword>Network Operation</keyword>
    <abstract>
      <?line 44?>

<t>This document extends the base Network Inventory YANG model to support
 non-physical network elements (NEs), such as controllers, virtual
 routers, and virtual firewalls, as well as software components
 like platform operating systems and software modules. In addition to
 the software revisions and patches already defined in the base model,
 this extension introduces software status and time stamp information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Inventory YANG  mailing list (inventory-yang@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-ivy-wg/network-inventory-software"/>.</t>
    </note>
  </front>
  <middle>
    <?line 53?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Network Inventory consists of the physical and non-physical
      network elements (NEs), hardware components, firmware components, and
      software components on a managed network domain. The non-physical
      network elements (NEs) are network devices that support network
      protocols and functions, e.g., routers, firewalls, and controllers,
      which can reside in any network or compute devices, such as servers in
      Data Center (DC), server-based virtual machines (VMs), or server-based
      containers.</t>
      <t><xref target="I-D.ietf-ivy-network-inventory-yang"/>  defines the base
      Network Inventory YANG model for physical network element (NE) and
      hardware components of NEs. Examples of hardware components could be
      rack, shelf, slot, board and physical port.</t>
      <t>The management of non-physical NE and software components information
      is similar to the management of physical NE and hardware information.
      For example, inventory data, including product names, serial numbers,
      etc. are also applicable. This document defines a network inventory
      software extension YANG model. In addition to inheriting the common
      inventory attributes of the base network inventory model, this document
      also adds some software-specific attributes of non-physical NEs (such as
      controllers, virtual routers, and virtual firewalls) and software
      components (such as operating system, software modules, BIOS, and boot
      loader).</t>
      <t>The Network Inventory software extension model is classified as a
      network model (Section 4 of  <xref target="RFC8309"/>).</t>
      <t>The YANG data model in this document conforms to the Network
Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
        <t>This document contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this I-D</t>
          </li>
          <li>
            <t>AAAA --&gt; the assigned RFC number for <xref target="I-D.ietf-ivy-network-inventory-yang"/></t>
          </li>
        </ul>
      </section>
      <section anchor="terminology-and-notations">
        <name>Terminology and Notations</name>
        <t>The following terms are defined in <xref target="RFC7950"/> and are not
redefined here:</t>
        <ul spacing="normal">
          <li>
            <t>client</t>
          </li>
          <li>
            <t>server</t>
          </li>
          <li>
            <t>augment</t>
          </li>
          <li>
            <t>data model</t>
          </li>
          <li>
            <t>data node
The following terms are defined in <xref target="RFC6241"/> and are not redefined
here:</t>
          </li>
          <li>
            <t>configuration data</t>
          </li>
          <li>
            <t>state data
The tree diagram used in this document follows the notation defined
in <xref target="RFC8340"/>..</t>
          </li>
        </ul>
        <t>Also, this document uses terms defined in <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP 14
        <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="relationship-to-other-yang-data-models">
      <name>Relationship to Other YANG Data Models</name>
      <t>The base network inventory model supports the software versions of
      NEs and software versions of hardware components. This document adds
      more software component identifiers (e.g. platformos, software patch)
      and more NE types (e.g. software NE, virtual NE) to provide enhanced
      software information on the NE to facilitate software compatibility
      check.</t>
      <t><xref target="fig-ni-sw-mod-relation"/> depicts the relationship between
      the Software Extension model and the base network inventory model. The Software Extension
      network inventory model enhances the model defined in the base network
      inventory model with more software specific attributes.</t>
      <figure anchor="fig-ni-sw-mod-relation">
        <name>Relationship of SW Extension Model to the Base Inventory Model</name>
        <artwork type="ascii-art" align="center"><![CDATA[
+----------------------+
|                      |
|Base Network Inventory|
|                      |
+----------^-----------+
           |
           |
           |
           |
+----------^-----------+
|                      |
|  Software Extensions |
|    e.g.,SW module    |
|                      |
+----------------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="model-overview">
      <name>Model Overview</name>
      <t>The tree diagram in <xref target="full-tree"/> provides an overview of the data model for "ietf-network-inventory-sw-ext"
      module.</t>
      <figure anchor="full-tree">
        <name>YANG Tree of Software Extensions</name>
        <artwork align="center"><![CDATA[
module: ietf-network-inventory-sw-ext
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:software-rev:
    +--ro status?              identityref
    +--ro installation-time?   yang:date-and-time
    +--ro activation-time?     yang:date-and-time
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:software-rev/nwi:patch:
    +--ro status?              identityref
    +--ro installation-time?   yang:date-and-time
    +--ro activation-time?     yang:date-and-time
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:components/nwi:component
            /nwi:software-rev:
    +--ro status?              identityref
    +--ro installation-time?   yang:date-and-time
    +--ro activation-time?     yang:date-and-time
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:components/nwi:component
            /nwi:software-rev/nwi:patch:
    +--ro status?              identityref
    +--ro installation-time?   yang:date-and-time
    +--ro activation-time?     yang:date-and-time


]]></artwork>
      </figure>
    </section>
    <section anchor="non-physical-network-elements">
      <name>Non-physical Network Elements</name>
      <t>In the base Network Inventory YANG model, "ne-type" is a YANG
      identity that describes the type of the network element and only the
      "physical-network-element" identity" is defined. This document adds
      non-physical NE identity, such as "ne-software", "ne-virtual", and
      "ne-container".</t>
      <t>The base Network Inventory model also defines common inventory
      attributes, including the software version, patch versions, product
      name, and serial number. The data is also applicable to non-physical
      NEs.</t>
      <t>The Network Inventory software extension mode defines some new
      software attributes, consisting of software status, installation time,
      and activation time.</t>
    </section>
    <section anchor="software-components">
      <name>Software Components</name>
      <t>Software components refer to the software installed on the NE, such
      as operating system, software modules, BIOS, and boot loaders.</t>
      <t>Similar to the common inventory attributes of NEs, the common
      attributes of software components (such as software revisions, patch
      revisions, product name, and serial number) are also applicable to
      software components. For software revisions and patch revisions, the base inventory
      (Section 4 of <xref target="I-D.ietf-ivy-network-inventory-yang"/>)
      defines the "list" of "software-rev" and the "list" of
      "patch". For example, on a router, software components may
      include a routing protocol package
      (e.g., " foo-rt-protocol-suite"), or a firmware module for a
      line card (e.g., " foo-lc-fw-21.5.3").</t>
      <t>If more detailed installation and activation
      information is needed—such as whether a component is active, pending-reboot,
 or rollback-eligible, along with its install time or activation
 time stamp, the extension attributes of software components
      can be used.</t>
    </section>
    <section anchor="yang-data-model-for-network-inventory-software-extensions">
      <name>YANG Data model for Network Inventory Software Extensions</name>
      <t>The "ietf-network-inventory-sw-ext" module uses types defined in <xref target="RFC9911"/>,
   <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      <sourcecode type="yang" markers="true" name="ietf-network-inventory-sw-ext@2025-10-20.yang"><![CDATA[
module ietf-network-inventory-sw-ext {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext";
  prefix nwis;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-network-inventory {
    prefix nwi;
    reference
      "RFCAAAA: A YANG Data Model for Network Inventory";
  }

  organization
    "IETF Network Inventory YANG (ivy) Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/ivy>
     WG List:  <mailto:inventory-yang@ietf.org>

     Editor: Bo Wu
             <lana.wubo@huawei.com>
     Editor: Cheng Zhou
          <zhouchengyjy@chinamobile.com>
     Editor: Qin Wu
             <bill.wu@huawei.com>
     Editor: Mohamed Boucadair
             <mohamed.boucadair@orange.com>";
  description
    "This YANG module defines a model for network inventory software
     extensions.

     Copyright (c) 2026 IETF Trust and the persons
     identified as authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision 2026-04-15 {
    description
      "Initial version";
    reference
      "RFC XXXX: A YANG Data Model for Network Inventory Software
                 Extensions.";
  }

  identity ne-nonphysical {
    base nwi:ne-type;
    description
      "Any network element implemented purely in software.
       It performs protocol or forwarding functions but
       does not correspond to a distinguishable hardware
       chassis. It can be hosted on a bare-metal server,
       VM, container, or cloud instance.";
  }

  identity ne-software {
    base ne-nonphysical;
    description
      "Software NE that runs directly on a host OS
       (a.k.a. bare-metal deployment) or hypervisor.
       Examples of software NEs are network controllers.";
  }

  identity ne-virtual {
    base ne-nonphysical;
    description
      "Virtual NE instantiated inside a virtual-machine
       (VM). Provides virtual network function (VNF) implementations
       such as vRouter, vFirewall, vPE.";
  }

  identity ne-container {
    base ne-nonphysical;
    description
      "Container NE packaged as CNF (Containerised Network
       Function). Runs under Docker/K8s.";
  }

  identity software-component {
    base nwi:non-hardware-component-class;
    description
      "Base identity for software components in a managed device.";
  }

  identity operating-system {
    base software-component;
    description
      "Operating system software type.";
  }

  identity bios {
    base software-component;
    description
      "BIOS or UEFI firmware image responsible for hardware
       initialisation and secure boot.";
  }

  identity boot-loader {
    base software-component;
    description
      "Software layer responsible for loading and booting the
       device OS or network OS.";
  }

  identity software-module {
    base software-component;
    description
      "Installable unit smaller than a full OS image,
       e.g. feature package.";
  }

  identity software-status {
    description
      "Base identity for software status.";
  }

  identity software-installed {
    base software-status;
    description
      "Software status is Installed.";
  }

  identity software-activated {
    base software-status;
    description
      "Software status is Activated.";
  }

  grouping software-info-grouping {
    description
      "Specific attributes applicable to software.";
    leaf status {
      type identityref {
        base software-status;
      }
      description
        "Software status.";
    }
    leaf installation-time {
      type yang:date-and-time;
      description
        "Time when the software or patch revision was
         first installed.";
    }
    leaf activation-time {
      type yang:date-and-time;
      description
        "Time when the currently installed revision became active
         (i.e., was rebooted into).";
    }
  }

  /* Main blocks */

  augment "/nwi:network-inventory/nwi:network-elements"
        + "/nwi:network-element/nwi:software-rev" {
    description
      "Adds installation-/activation-time, status, etc. to the base
       NE software revision.";
    uses software-info-grouping;
  }

  augment "/nwi:network-inventory/nwi:network-elements"
        + "/nwi:network-element/nwi:software-rev/nwi:patch" {
    description
      "Adds installation-/activation-time, status, etc. to the patch
       level.";
    uses software-info-grouping;
  }

  augment "/nwi:network-inventory/nwi:network-elements/"
        + "nwi:network-element/nwi:components/nwi:component/"
        + "nwi:software-rev" {
    description
      "Extends components, such as line-card/CPU/etc.
       software revision with timestamp and state information.";
    uses software-info-grouping;
  }

  augment "/nwi:network-inventory/nwi:network-elements/"
        + "nwi:network-element/nwi:components/nwi:component/"
        + "nwi:software-rev/nwi:patch" {
    description
      "Applies the software-info attributes to component-level
       patches.";
    uses software-info-grouping;
  }
}

]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section uses the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
      <t>The "ietf-network-inventory-sw-ext" YANG module defines a data model that is
designed to be accessed via YANG-based management protocols, such as
NETCONF NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. These YANG-based management
protocols (1) have to use a secure transport layer
(e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>) and (2) have
to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.</t>
      <t>Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments.  It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. Specifically, the following
subtrees and data nodes have particular sensitivities/
vulnerabilities:</t>
      <ul spacing="normal">
        <li>
          <t>"/nwi:network-elements/network-element/software-rev"  </t>
          <t>
This subtree reports the software information for all the network
elements and their hardware components deployed within the network
as well as of the software modules being active on these network
elements and components. This may reveal software versions or
unpatched vulnerabilities.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
URI:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext
Registrant Contact:  The IESG.
XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group:</t>
      <artwork><![CDATA[
Name:  ietf-network-inventory-sw-ext
Namespace:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext
Prefix:  nwis
Maintained by IANA?  N
Reference:  RFC XXXX
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="5" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-14"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC9911">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schönwälder" initials="J." role="editor" surname="Schönwälder"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document defines a collection of common data types to be used with the YANG data modeling language. It includes several new type definitions and obsoletes RFC 6991.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9911"/>
          <seriesInfo name="DOI" value="10.17487/RFC9911"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
      </references>
    </references>
    <?line 504?>

<section anchor="examples-of-software-attributes">
      <name>Examples of Software Attributes</name>
      <t>This appendix illustrates, by means of two typical scenarios, how to
 populate the software-specific nodes defined in
 ietf-network-inventory-sw-ext and explains the common values that can be used.</t>
      <t>Scenario 1: Whole-device base software (example-os) plus hot patches
 (P3 already activated, P4 installed but not yet activated).</t>
      <t>Scenario 2: Line-card programmable forwarding image
 (example-fpga-image) plus its patch
 (2.1.0.P1 installed and awaiting activation).</t>
      <sourcecode type="json"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-network-inventory:network-inventory": {
    "network-elements": {
      "network-element": [
        {
          "ne-id": "example:NE-01",
          "software-rev": [
            {
              "name": "example:ne-os",
              "revision": "7.9.2",
              "ietf-network-inventory-sw-ext:status": "software-\
                                                          activated",
              "ietf-network-inventory-sw-ext:installation-time": "\
                                               2024-08-01T12:00:00Z",
              "ietf-network-inventory-sw-ext:activation-time": "2024\
                                                   -08-01T12:05:00Z",
              "patch": [
                {
                  "revision": "P3",
                  "ietf-network-inventory-sw-ext:status": "software-\
                                                          activated",
                  "ietf-network-inventory-sw-ext:installation-time"\
                                            : "2024-09-15T10:30:00Z",
                  "ietf-network-inventory-sw-ext:activation-time": "\
                                                2024-09-15T10:32:00Z"
                },
                {
                  "revision": "P4",
                  "ietf-network-inventory-sw-ext:status": "software-\
                                                          installed",
                  "ietf-network-inventory-sw-ext:installation-time"\
                                            : "2024-10-01T14:00:00Z",
                  "ietf-network-inventory-sw-ext:activation-time": \
                                                                 null
                }
              ]
            }
          ],
          "components": {
            "component": [
              {
                "component-id": "example:lpu/1/0",
                "class": "iana-hardware:module",
                "software-rev": [
                  {
                    "name": "example-fp-image",
                    "revision": "2.1.0",
                    "ietf-network-inventory-sw-ext:status": "\
                                                 software-activated",
                    "ietf-network-inventory-sw-ext:installation-time\
                                           ": "2024-08-01T12:00:00Z",
                    "ietf-network-inventory-sw-ext:activation-time"\
                                            : "2024-08-01T12:06:00Z",
                    "patch": [
                      {
                        "revision": "2.1.0.P1",
                        "ietf-network-inventory-sw-ext:status": "\
                                                 software-installed",
                        "ietf-network-inventory-sw-ext:installation-\
                                       time": "2024-10-01T14:10:00Z",
                        "activation-time": null
                      }
                    ]
                  }
                ]
              }
            ]
          }
        }
      ]
    }
  }
}
]]></sourcecode>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Prasenjit Manna,Phil Bedard, Diego R.
      Lopez, Italo Busi, and many others for their helpful comments and
      suggestions.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="Y." surname="Zhao" fullname="Yao Zhao">
        <organization>Huawei</organization>
        <address>
          <email>zhaoyao.zhaoyao@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+U8a3PbRpLfUZX/MAd/sJQQFCnLsU3HSWhZTlRnPSLJ8WZv
c1VDcEhODAJcPEQzirb2R9wvvF9y3T0PDB6kKG0ut1fL2o1IYKanp6ff3eMg
CLxc5pEYMH/IfhqefsdORb5M0o/sDc85O0nGImLJxD49jq9FnCfpil0mk3zJ
U8GOPuUizmQSZ77HR6NUXAOw9eN9L+S5mMKjAcvyseeNkzDmc8BgnPJJHkiR
TwJ5vQpiBSKQBkSQaRBB74mXFaO5zHDZfLWAycdHV2+9uJiPRDrwxrDCwAsB
JcCsyAYsTwvhAV5PPJjOAT/fQ9jTNCkWrdgiKXzvo1jB8/HA8xgL2LDIkznP
YUn62ZhUeXq2EKka6/EinyWAFb5WO32dsA8F/GYsSacD9n3Bl0LSbzHnMhqw
iMe8uyxGybczetcNk7kz/3Am4in78yxxgBzOZIwHNpKRcEH9CqNCHL/6ZfVt
iIPmNKYG8gcZ34ETTIoAp3aMTpIZ/B3DzoqQj7lMS0hnKY+nFZTmanB3ZAZ/
m9AYgonHlqdyBMQGmgU0T63xE09gzzzZhOSv8H7Fk67+6yLrxUmKx3cNrOHJ
eOL8CoKA8VGWpzzMPe9qJjMGXFnM4VyZQPYeZyyfCTbimWgRBZKbOYlKnrCs
WCySNPdYnMTBYrbKZMgjprmZiUgg2IztnB5lux0YHc4YzxjtOokikWYddi3T
vOCRx4A/c3rC47F5yiYyFUseRfg4Y0sRRfjXCAdAmi+SGNfwWCQ/CraIeI67
ZYniSWCdbJXlYp4RWDsRdlBEIuvCzhgfjyVyL2zIo63bUSDfkqSdJi94DswF
3yOQq/GKjcVExsAHwE2WYESZDoIBugqjLWAIbHhchMLBPct5XijIuZzT7/mC
2cNK4q46rLkcj4HNvUeAq4KiRO1q1nY+qAhkBjQHRYZY2UPBddxTIk5ia89q
xtNxjcQdPI154yEA1rBajoXB5jmbg4hPgVJmsTHoFhl3GW5ha5wYQrYQ4GSQ
mvmM54YLzUsNZZEmeRImkSLxpIiJboCw6E67nZLdXBaDgS5zakjLmQTGDXkM
DJHJscAT5/HKIpOktGOAZ/AqeT0T6TWAgikaGNmaQ9iWSNnOm0MUCxoSIP+U
jD/nqL9ghzs/nuB5wBruOA0MkQVKwgLALOzm5t+OgzfdDVZlBarn9pZp1i0F
XYPbKO7Al2ydiOMJ7Tqc0MI9ZFmPQOKOPgGfg+zhg7ZxYVJEYzYyOIGe+gg0
moloAn+iJO+wUQLTlEgafPD8u0omFLMRVrBCRTGdHlW1gLOqI3d6YRDgTM5l
xFPUdHkDch2q3UtFhBWst0A7ofbdYfY4GNhujr/DqBijqloo8SYbkBFjSKQ1
WXrLjSIPuyQLPMoSxheLCLAYgZFjVWVuzpjbw5KO9a7Ia6moyvOuq0aYPQN8
SKUiMYB285JWdks8VwZNWA1EerGBgtaUSlEanDU0tbHxGJXlvFTHQbYQoZzI
sLZI7YhBZLTwOUJSNzd3WJvdCp9YOJZbzAoNM9NpmJgOe318dqnWGSWJ2WOU
8LFId7vr9HjL2SgxBHKFEQdvcCJBXQAKvKY11bCdS0H6jh0giUA1fHPx9vD5
k96L21uzKJ01sqCBHFdPAwmHnJwZ/tdYeielHKA2ywBhwYYpKKwcFi3gx87p
yZvhrmshQTcRAgf7t7ew/qNH7AhYKyEGP01Ac+5cJSD0oGHnyTVMGa0YjNeD
dj2Pxmg8yhcDxfOZ3qskVB0oi1QmJL6LYoRios3qVX2bqEQzdB5CMUsiOBh2
zaPC2JdYACgDmAaN2VLmM+CXmEfyV1TbajgMRgTJnqOKcFZVmMa4jayYz3kK
89CXiIycgJefQXxSkJVSCyuLJ8bgP3reeSRQklDgVzRhAjydLJH3NFZkLMHF
+5z9CT4sCL6mccgsUzwGpJtSJqTM6bDBYMD4IXzuHL+teaHTvRLpXMZJlExX
xPpwfkSHTPFeiTtIITpnqWhyy7MXT3tgrXA6UQKEJxVmFCgjQXsFcZCoO+Cb
spD4jRfTuX5Ycrj9FcMvlJqtMfly/6BfxYRZTBCQQuZz0jUTOS1UOESLEV6w
d6F+6VXzVMADyacpn7MiM16ky5YKMWWjY0095qxJyCmpPgAyddEDGILmrOlU
hJ7pvVX3tdVhoqyyC/HXAlSjcsbewfMC5B8DRdwKBI4MI8eM+SfvL6/8jvrL
Ts/o+8XRD++PL47e4PfL74fv3tkvaoTWXgwfnr1/p8fhtxLC4dnJydHpGwUE
nrLao5PhT77riAKws/Or47PT4Tu/SVg8QSXNEr2wRSpypUnHIgvBrigCvT48
Z/0DC1CRer/fBwVq6N5/dgA/lhBwKvWexCCZ6icc2gpFVYD3gN4iiHnIFzLn
OpLJZskyJrbRBI6UdMzkAnE7g/mpUtBlbkKLziZ7alzhrBrHoAdKWiWZGE/v
qBYQOUPavLK6c4HWWYOao/ZvulQMHOU4RysF3u8O+tw2OEsyx0xSVLVrLD+g
RPDAp8Jch5lpR58elSYcXU5U7WlyjU65iGc8DkUjGHHcMYxGyJAd4cQJD2Uk
STQr6MPQEb4wbhIEfeFHOKabGxDtIJZBtgyA2kGqDw14YCwWMtRUT92zHME5
CWHcJHzdzCXpo6NA8I7zVSFTE0TNBahzhSaNwk89agteq/FTHQhZvOphtzhk
QKe/wQd4PJQy4GnufRG0fr7wfmOtn9+831635h5+Wz/DWeM/K2tURm35Yy2w
9QizthQh0whTvHn5QTuEdsadO6lSC6nq3QzYo3YmZJTafOVXNAnIMqxbMtqJ
ydvgkRORS4eT3vmgHJUdAL9mGr/yQwpUfbDpqKbU/DPQFddSLJU6qlgyMiyT
IooCfAyCoYUTlQ1L9Dzj8DiuJ7oXPtmilkzoMgAf2LfaBomouUx9vM889XTA
NoL4zLN+AduLl3LQGFh5arIPn7ncwdqG0DMbpWBSWM2Bs0wTnef5pnrQSjnm
q1RM3LHghYKJUCcYoBeJ09AQDzDNG4CKoKfuFA6u73V1wropf8zm6QFp9X85
MpT2svqzZfq/NLs8kE7/5Jz1WUUpkao2mtBoZ/LorvABquaWqtJ6/fsIQig3
z6Gt45GmvOcdO5Z8UyIP/OVYBOhd+Rgwc3rlVammwk/jDyu/AWcY1V1P/1nv
F15qUL5BNahxgG9XofW1I7LBwayn8Mz0MsmKGzKM4qv9aSexEhbgc5sx9buO
O92kl/bJMBNlEmkq49XIopW+j5vKa/O/O8rZtb52xyT8zEb5XKhIopL5U04f
WUs8r2rWD615SwodM633TC3ZfVLSLQb7rkDZ4e5GdZkBdwosUatpdCpiRtkQ
E+ZRBG0Fil5RAGRl4bCs6HiXLXlakGdhE7KOj0/riXHp4SvuMMs+JFOnc3RI
yMtqIrjOCbWEJBC/08yRVse05aBtVrFZgNKsY3LizmMnZdzCO7ttmWIqdFXP
1o30MFm9qQTmLm81Tl0qqvnHbbMNJg506xN+BIzmIxTfNQa+DZjsAKt5EEu/
W826UyFKZX07rdSfc4O7kmKhx+vEPNWSgADhRz41Om5HlZJ88F+TIM0DMyzI
CpkLX5VteFk20xEAersmaxvBPlmI9YwKsCgMJstgv9992n3iY8L2eKJir7EA
9RVR4OaIWFWs7DbKwBdTj5RI/O+//5fhsuVMUJqBu0F7puAAwRYiRk0GtEZh
AAEGrDGNPgISgC6XUzlCuvIoAQJRcCipjkJo6RRoWsGqLHMqxin1z52yYUJx
CCNGghJmpDbKDEkZR2zVvqF04x0hhzkvlUGjdEQjM/jiRb9/e0vq7R4pNQqR
8ZeOXDYHLuwG/REcHmjTwfrd/kt8SJUiYErtsfhFGg8QFrhJEI9lg0/zaBBn
A3JXNm+WwC1AvcpPDPys7CU6NMBEcyqt0lzCQNHhRq2nx+OLl+oJ6WcRG4QA
JcwiI5UGqNvnpsZEh3aFsNTKt/XFGojW1gQcNy2JGe0BG9ZzaO0cYlHAP0k6
5bH8lXhWUxUbbtb5VDtw1LvsA7xBRfEddtkocORphNqn9T98xz6I0QC+fjXL
80U22NtDi45tGB/BxOOWu7Dy3nK6BwC/1luBWe9AucG0r7DnI08GVWb61sz7
WuEOH1MYob6bqkPNvmrrtfm6NrFsuHFnf7Wpt6YOQjXY1BdvNtXU5zU6a+og
NnXTfK3IrpzWhXN65Fga/xeFrayMllqjmTozWkjjYJVV1rW0PkwWq1ROZznb
CXfZfm//S+rNAg+/yHJrn8DxyGCanmPToqp4R/1StlYaAj5dxoagQAku+jtU
1BiXi16IMbAEqUuj+gsywIBxkYZC+S9wPrAHKt91lHZODDXxF9g13Dwm74jR
O6j5F1izyTEZvijSrOBgD/JEOxXF6BdhmNm4QeBOAEmELi4YzxqVo9LvF+gn
4HFevgE2prEaQCawvpGizYiZ9RS6oaFDScXHGXsnpuDPnGMmiehv6RApfw6w
ofFvdOxgBuwYQcsRkBClkGnEA7SQuyVliVGMhiVMaoyDNIIADd+hVsMq20vY
i9mVqU2CHRTRhNgKI0AW0QbiJMfWEHc5t3jyGIsmjzvqL5Y+8LspnuB3qpnY
LxqGHqcKJuW3cr6tk+DPWunkcUdDeXwy/OmxOujHpnDyePvCiYbSUj5hO0gP
rJrsqq9YM9ltLZmUNNy2cOJrE2XcURLAoHcQ9J8aW9FQBqjMY5mjg6wP2t9o
uPCItzYj1tGoqS1ScaX6qFgbG3FDbApxnI1z9QZUXp7SKGR5X67f19DpSDJx
uUTfF78pmRZAbNITCs2uxfM4R+FXxX7r6yZU9oWBFNDaBioGisdOHCeCitog
/SmoKvDWqFLO2VhFh4XMZhRymJqSnRnOsM6MHXi5cetmSZarEI7DxsHNn4Oz
G+mqbsfO/PGkUzY+kYsdRkmhPWI4wPUEto5lhboVwm8gsHUjsXyE+ZG0AGqM
ZQr6CwhLaOMW2NmlxXWHdz92edfdzlgsomSFh7KLuM/gVFNg4CQtj8NtkXJK
X1mlBc5pa1m/Y1Mre9CGf7SFNk1bkJtchR6SwiMNPdDNauWufzzZ7SqNjbl/
g4TB3LASjDt9u1syqSpcWCgmTrm+0FHb9VvdnwNfz4/Wb9oyx8O2fWinw8Z1
wEfG+vD0Lduxb8m0aR1gcX6rtwbbv0DuKGJsJgHLBE7e3r8/X3dSNrAtI7GG
AkjiwAhROSygXqANm6Eqj11n4ob2le43p0tT9TCuwdSmUQKVRqng2dzGBszO
agmZEjFUdGuWH8kke/iSmN9BmXt/9Pa4jMrlHLbNlPbKMKglMjUUllR2Q2Zl
yJ2JELudMD5ehy+8ClQe6eFoW8UT8RXAqWOK4JGMJm+l04+ljqbzZGrrRgbP
Lu9iRe3zPBjrY52gQDQLoB3L5piiw74jjuxGrhEgReQvtTvV+yeCUx+Zlr67
UNWt1BuM/gYxUJPvWqLMMLYSRAHZ5gw1rth6ZUDetbbOofyeaw8NyOradEmE
RLLc9yQJ7OMNFL5sac6spqmt22FcrkjwCaueHVNlBqd6U77ZuG+dQViDXZMI
FolbB5dGdaiGVrPq83LzolcIA93baroaO6krmVS25G7tDFQTuBGyxh9VXGtl
qd8XU1Br4Avn5C4avre4jkQIQbjOEzpY78iu6HZwK0zlDMlVyCHCquCvWW3v
c3YCdpSNIjCOGft8Tz02RUf/HlVHv0Tii9rEdUVqfxMrD7H1uMILezVqd2yl
g7qxdTyM7GlRAd+hkUS3hKCMYruMueL4BxGjrKv+r5CFIFusInEtoj+CEHtV
Sty3Ft0yfWsGOtL3qNxrMsabxYR/gAn/vcPz93tIp9LhrfOLStwgZdXlIPI5
qGHNvWPw/56W2/IfWhNRbW2kbbomB3iudI6J1+zS+v7Wfeh1q2v6WM1X2TXM
0EG8k4I/n73y8a6l777BfPyrzWWFb/d7+0+Dfi/Y73VRTVNz1SPMghUpmv3D
hMKrtGyXdjrcVSkCq/Fiju2Uopp1ubkxybQn3WcYPX5jKxKADvWLTcLnB71n
I5lRIWKbKkh76tTp3qJgWGYeoKIax1WSiIehyNSdJtVkoK84Oddo7B0tKx/e
6dHV4RkEWuav6rXVDdhgOC+OLt0Xz3vU/IzJtEy0r+KVN8F2+rvg2F+TO4JJ
U25c+DzlcUbFB/KxPV2Mu7z8Xq9zsP90//a2w67eXZqVDw6+xCcolD+8Pz7U
j1/0eoCQukCys6+W8/Ry84LiYEz6on/j3Eco6/SHlQ7yIdEQH2Ksr5NPO6fD
w5Pd8koFUMazjXbU4il4TKIAoQJIRpjrs1B3uHgKSxdYzjY0TlLPkhXwTDOV
w1mkwvSzC0oBY9oWmAqTcvyaS+XbtwEpc0jmanBmL9fBzrGinsxtNwlepyRQ
tjk/s8lHl/nmfIV8FWoBEWMP7zxLdEOQM66LCMJyAkRJrrnTpxJfyzSJ56rA
jSknvCoyKzJPlZxUqtukVAghQzLNCcjDU5F38D+BogqmnjzM6pok+q62eJm7
ky4znjGQbdWp3tzAq93YH6So42yfmNQ5KbNR+L/I9jyzVWxThgd0D6LV1oMi
runpihFTPfyoXxQeeJOk2T7uFpKpdo313ZnbL2xvauqah0xbr/ap1Je+PaM7
j0sgzgVfcyWm1qEBp0+BbqiOPNbEXoNHo3sd+Qd2LTCn2Ox7x2vcRayMxJjV
KNwlHX08PB029DM9lOjz/rUQlMAkwZvKLKdg171i8v7i2HRc+9jtBWRXI9OV
polH76ie8aeTd+xCv/W1tD/58vnz29uBtkoAbgBIP7Tm62noyP2Hqlo5UGWJ
46PL77oeIAC/T/eGL7WYmg3SNqinF3G0NeiuwupeFKmUVzRl6NkJPfNOEbjP
LJX0fZzePt4McthITTpHCgi82OdMUf/ygSbZKV2v31xvV4vijv4h6p5ToRpA
YDndw2BH18dGK+Kkb4C2cAS67ADjTMFBkxEvf2OzBXKemxG2kezQuj3aS8C6
STyWn5iMogIPlnq1YDllEFCqlgkGiFRiyEIR81TibYxZsqSmoEWyKMirqPhY
ts1f6aayB8K7o28BpVB8Aj9FxpnbOOVerqu2dFxqnFh/wD7MkkgEOntVCf1B
KSt6BEm2yxawV9hBbhw8j+2cP7G39G3ypMPOD5xwFuhGhYuVyMsxuy4K+wP2
zjjraNGww33OddbNlEUoe+WVCE0WUx7QQ40YNsXo3q2d/W6/2+ue9x00qHNn
ydW92jKc2jVNIr9kSey9qn6wunc0YI//8li1Dy1TOHhqUwLxoirbsxf7rDbp
lefdgIZb4+w14wB/wG7ITfYbEaZ503wHr/7Devo39ptqvZRjeO1rQg1Oj4Je
37n+xWrtXS6kOjQFEYTUBRgjN1QA0jATS+HQZ90X3f3mkI1MPFAhLU63+P2l
BuE+H8tr98WjkZxClO6NCQQfB0HvOdD+qr8/6PXgf3++Lya1qB/xQLAPooqD
y9N2XFRgWGcH/NRZgoa7533+pAFui+39YQe+BS7NQ78fKvpogt6LoP/0qt8b
PGk/8S1QaTn1+5Olhsw+IdOActtE7+6zPvgnOGur1/8vz7rfI4k6WCfdW6DS
POt/hCr6ExdR1Dzq2pOfvXVvf67YitK5d8xR/V2L1mjyUTm8ZqGiRbHX3+u1
0M+nqiuOlTzmtiw7UH5s24SNpm0dZjSzZubAwVDuReux1mSC/I11A7cVjAec
fLNy9TAkGhJxL1x8q/zuMHdb4VIXiQfqYYvKl5tQWW/z1KedV2hq4/zB31yz
zBa7/n3YYLNa3AqRCitsjYvrnpR6sb+JDQiXpv5rVV7qU1dh6vNzy9PmyPqo
6gj3bfnGfFNv8detd6tjxkdsGH6MkyXQeqruhd0M1E0QMX7lT3iUCcw3Y4xv
Wk+X9O8t0b+eRukrHn9k5ymEW/EvMmcnPI5553wmI/ZajEHRddgbKaYJuzD/
ttG7ZCF+7bBjOJ6EvS4yqVKic/wXshK8YJDpf22EskIiWkyKiAJBk6jRcLJi
OhUZJVUg+Pkfmo//+65RAAA=

-->

</rfc>
