Etsi Ts 103 443-3 V1.1.1 (2016-08)

Total Page:16

File Type:pdf, Size:1020Kb

Etsi Ts 103 443-3 V1.1.1 (2016-08) ETSI TS 103 443-3 V1.1.1 (2016-08) TECHNICAL SPECIFICATION Integrated broadband cable telecommunication networks (CABLE); IPv6 Transition Technology Engineering and Operational Aspects; Part 3: DS-Lite 2 ETSI TS 103 443-3 V1.1.1 (2016-08) Reference DTS/CABLE-00018-3 Keywords cable, HFC, IPv6 ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI 3 ETSI TS 103 443-3 V1.1.1 (2016-08) Contents Intellectual Property Rights ................................................................................................................................ 6 Foreword ............................................................................................................................................................. 6 Modal verbs terminology .................................................................................................................................... 6 Introduction ........................................................................................................................................................ 6 1 Scope ........................................................................................................................................................ 8 2 References ................................................................................................................................................ 8 2.1 Normative references ......................................................................................................................................... 8 2.2 Informative references ...................................................................................................................................... 11 3 Definitions and abbreviations ................................................................................................................. 11 3.1 Definitions ........................................................................................................................................................ 11 3.2 Abbreviations ................................................................................................................................................... 11 4 Considerations ........................................................................................................................................ 14 4.1 Background ...................................................................................................................................................... 14 4.2 General Overview............................................................................................................................................. 14 5 Gap Analysis .......................................................................................................................................... 15 6 Domain Functionality ............................................................................................................................. 16 6.1 End to End Network Domains .......................................................................................................................... 16 6.2 DS-Lite Domain Topologies ............................................................................................................................ 17 6.3 CPE Home Network Domain ........................................................................................................................... 19 6.4 Access Network Domain .................................................................................................................................. 20 6.5 Core Network Domain ..................................................................................................................................... 20 6.6 Data Centre Network Domain .......................................................................................................................... 21 6.7 DMZ Service Domain ...................................................................................................................................... 21 6.8 Transit and Peering Service Domain ................................................................................................................ 21 6.9 Management and Monitoring Domain ............................................................................................................. 21 6.9.1 General Considerations ............................................................................................................................... 21 6.9.2 OSS ............................................................................................................................................................. 21 6.9.3 B4 Remote Management ............................................................................................................................ 22 6.9.4 IPv4 Connectivity Checks .......................................................................................................................... 22 6.9.5 B4 Provisioning .......................................................................................................................................... 22 6.9.6 AFTR Provisioning ..................................................................................................................................... 22 6.10 Security Domain ............................................................................................................................................... 23 7 Engineering Requirements ..................................................................................................................... 23 7.1 Key Requirements ............................................................................................................................................ 23 7.1.1 AFTR .......................................................................................................................................................... 23 7.1.2 CPE Cable Gateway Device ....................................................................................................................... 23 7.2 DS-Lite Technology Feature Requirements ..................................................................................................... 24 7.3 Detailed AFTR Engineering Requirements ...................................................................................................... 28 7.3.1 AFTR Hardware Feature/Topology ............................................................................................................ 28 7.3.1.1 Role/Location ........................................................................................................................................ 28 7.3.1.2 Type ...................................................................................................................................................... 28 7.3.1.3 Memory ................................................................................................................................................. 28 7.3.1.4 Integrated forwarding and AFTR function ............................................................................................ 28 7.3.1.5 Forwarding Architecture ....................................................................................................................... 28 7.3.2 AFTR DS-Lite specific engineering requirements ..................................................................................... 29 7.3.2.1 Tunnel Identifiers/Client-Customer ID ................................................................................................
Recommended publications
  • Big Fish Games Torrent Download All Big Fish Games Keygen
    big fish games torrent download All Big Fish Games KeyGen. Founded in 2002, Big Fish is the world’s largest producer and distributor of casual games, delivering fun to millions of people around the world. Through its mobile and online distribution platforms, Big Fish has distributed more than 2.5 billion games to customers in 150 countries from a growing catalog of 450+ unique mobile games and 3,500+ unique PC games. If you are big fish fans make sure you dun miss up the keygen for more than 1000 games included. Updated 5355 Games. Visit BigFish. Keygen. 26 thoughts on “ All Big Fish Games KeyGen ” Good evening, may i know how it works after download it? step-by-step please, thank you so much. download install bigfish game that keygen have.. register via keygen for it. It is not that hard. I like Big Fish games and the keygen gives really good results for registering thanks for the file’s. Big Fish Games Torrents. Azada is an adventure-puzzle casual game developed by Big Fish Studios Europe, and distributed by Big Fish Games. The studio previously developed Mystic Inn and Atlantis Sky Patrol . Maps, Directions, and Place Reviews. Story. Hapless adventurer Titus has been trapped for years in a magical book, for a reason that is only later revealed in the game. With the last of the magical powers he acquired while trapped, Titus transports you, the player, to his study, and asks for your help to get free. The only way he can ever be released from the book is to solve the ancient puzzles of Azada.
    [Show full text]
  • Performance Analysis and Comparison of 6To4 Relay Implementations
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No. 9, 2013 Performance Analysis and Comparison of 6to4 Relay Implementations Gábor Lencse Sándor Répás Department of Telecommunications Department of Telecommunications Széchenyi István University Széchenyi István University Győr, Hungary Győr, Hungary Abstract—the depletion of the public IPv4 address pool may delegated the last five “/8” IPv4 address blocks to the five speed up the deployment of IPv6. The coexistence of the two Regional Internet Registries in 2011 [3]. Therefore an versions of IP requires some transition mechanisms. One of them important upcoming coexistence issue is the problem of an is 6to4 which provides a solution for the problem of an IPv6 IPv6 only client and an IPv4 only server, because internet capable device in an IPv4 only environment. From among the service providers (ISPs) can still supply the relatively small several 6to4 relay implementations, the following ones were number of new servers with IPv4 addresses from their own selected for testing: sit under Linux, stf under FreeBSD and stf pool but the huge number of new clients can get IPv6 addresses under NetBSD. Their stability and performance were investigat- only. DNS64 [4] and NAT64 [5] are the best available ed in a test network. The increasing measure of the load of the techniques that make it possible for an IPv6 only client to 6to4 relay implementations was set by incrementing the number communicate with an IPv4 only server. Another very important of the client computers that provided the traffic. The packet loss and the response time of the 6to4 relay as well as the CPU coexistence issue comes from the case when the ISP does not utilization and the memory consumption of the computer support IPv6 but the clients do and they would like to running the tested 6to4 relay implementations were measured.
    [Show full text]
  • Routing Loop Attacks Using Ipv6 Tunnels
    Routing Loop Attacks using IPv6 Tunnels Gabi Nakibly Michael Arov National EW Research & Simulation Center Rafael – Advanced Defense Systems Haifa, Israel {gabin,marov}@rafael.co.il Abstract—IPv6 is the future network layer protocol for A tunnel in which the end points’ routing tables need the Internet. Since it is not compatible with its prede- to be explicitly configured is called a configured tunnel. cessor, some interoperability mechanisms were designed. Tunnels of this type do not scale well, since every end An important category of these mechanisms is automatic tunnels, which enable IPv6 communication over an IPv4 point must be reconfigured as peers join or leave the tun- network without prior configuration. This category includes nel. To alleviate this scalability problem, another type of ISATAP, 6to4 and Teredo. We present a novel class of tunnels was introduced – automatic tunnels. In automatic attacks that exploit vulnerabilities in these tunnels. These tunnels the egress entity’s IPv4 address is computationally attacks take advantage of inconsistencies between a tunnel’s derived from the destination IPv6 address. This feature overlay IPv6 routing state and the native IPv6 routing state. The attacks form routing loops which can be abused as a eliminates the need to keep an explicit routing table at vehicle for traffic amplification to facilitate DoS attacks. the tunnel’s end points. In particular, the end points do We exhibit five attacks of this class. One of the presented not have to be updated as peers join and leave the tunnel. attacks can DoS a Teredo server using a single packet. The In fact, the end points of an automatic tunnel do not exploited vulnerabilities are embedded in the design of the know which other end points are currently part of the tunnels; hence any implementation of these tunnels may be vulnerable.
    [Show full text]
  • September 1, 2010, V. 2.0 Rm+Dw Page 1 of 45 Software Licensing
    For use by the OE IT Design Team only Software licensing Main questions Now ­ What licenses are held at which level? How much do they cost? ­ How do these costs compare with those that might be obtained by aggressive contract negotiation, perhaps for a larger number of seats? Going forward ­ What are the Best Practices re: software acquisition, software distribution, and contract management? ­ Where are there economies of scale? ­ What are the barriers to purchasing through negotiated agreements? Are there incentives? ­ What are the options – on campus, at other UCs, in the “cloud”? Our current campus services ­ what we do now Customer value/software license products ­ Standard desktop software, e.g., Microsoft Office Suite, Adobe Creative Suite ­ Operating systems for individual machines and servers ­ Utilities ­ Security ­ Specialized software o Cross­discipline, e.g., statistical packages o Discipline/activity­specific, e.g., CAD­CAM, fundraising Cost/price factors included in the negotiation/calculation ­ Type of licenses o New (purchase) o Renewal (maintenance) ­ License term o Annual renewal September 1, 2010, v. 2.0 rm+dw Page 1 of 45 o “License term” then renewal o “Perpetual” so no renewal ­ Media o Delivered through the Internet (most; saves 9.75% sales tax) o If hosted on campus, server and associated costs o Some require receiving a CD, DVD, or flashdrive because of the file size or problems with different operating systems ­ The target user o Server o Single­seat = one machine o Person = one person w/five machines needs only one license o “Knowledge worker” FTE ­ Operating system ­ Version of software ­ Demand/volume ­ Transaction/key management/convenience/forecasting demand/pre­sales consulting add­on o In­house, perhaps 30% (IST draft, August 2010) o Outsourced .
    [Show full text]
  • 'South Park' 'Imaginationland' Mobile Game
    COMEDY CENTRAL® and RealNetworks® Announce the Worldwide Launch of 'South Park' 'Imaginationland' Mobile Game Mobile Game Based On The Hugely Popular "South Park" "Imaginationland" Trilogy To Launch Worldwide In June LAS VEGAS - April 1, 2008 - COMEDY CENTRAL Mobile, a division of MTVN Entertainment Group, a unit of Viacom (NYSE: VIA, VIA.B) and RealArcade Mobile®, a division of digital entertainment services company RealNetworks® Inc. (NASDAQ: RNWK) focused on mobile casual gaming, announced today the launch of the new "South Park" "Imaginationland" mobile game. Based on COMEDY CENTRAL's hugely popular "South Park" "Imaginationland" trilogy, in which the doors of the world's imagination are thrown wide open and the boys of South Park are transported to a magical realm in their greatest odyssey ever. The mobile game will be available cross carrier and on a variety of handsets including the Apple® iPhone™, and various Windows Mobile and Blackberry mobile devices. COMEDY CENTRAL Mobile and RealArcade Mobile plan to release the "South Park" "Imaginationland" game worldwide in June. The player's mission in the "South Park" "Imaginationland" mobile game is to take on Butters' massive job to rescue the world in three arenas (Happy Imaginationland, Evil Imaginationland and The Battle for Imaginationland). The quest begins with the Mayor teaching the player how to bounce high by using his imagination. The player must utilize his bouncing skills to collect items and accomplish missions inside an allotted time limit. As the player accomplishes more missions, Butters gains extra imagination power to restore Imaginationland from the grasp of evil. "South Park" "Imaginationland" mobile game has more than 60 mind-blowing levels.
    [Show full text]
  • Allied Telesis Solutions Tested Solution:Ipv6 Transition Technologies
    Allied Telesis Solutions IPv6 Transition Technologies Tested Solution: IPv6 Transition Technologies Moving a network from IPv4 addressing to IPv6 addressing cannot be performed in a single step. The transition necessarily proceeds in stages, with islands of IPv6 developing within the IPv4 network, and gradually growing until they cover the whole network. During this transition process, the islands of IPv6 need to be able to communicate with each other across the IPv4 network. Additionally, it is desirable to be able to transition some network functions across to IPv6 while the majority of the network is still using IPv4. Allied Telesis provides robust solutions for IPv4-to-IPv6 network transitioning, using IPv6 tunneling and dual IPv4/IPv6 network management. The Allied Telesis IPv6 transition technologies integrate seamlessly with the complementary facilities provided within Microsoft server and workstation operating systems. The Allied Telesis IPv6 transition solution will be presented here by a detailed description of an example IPv4/IPv6 hybrid network, consisting of Allied Telesis switches and servers and workstations running various versions of Microsoft Windows Network topology The example network used in this example consists of two sections of IPv4 network, and a section of pure IPv6 network. IPv4 133.27.65.34 v4 router 139.72.129.56/24 Vista 136.34.23.11/24 133.27.65.2 6to4 host/router x600 6to4 relay XP 2002:8B48:8139::10/64 136.34.23.10/24 139.72.129.57/24 2002:8B48:8139:1001::12/64 6to4 host/router IPv6 router Server 2008 2002:8b48:8139:1003::12/642002:8b48:8139:1002::12/64 ISATAP router 2002:8b48:8139:1003::10/64 192.168.2.254 192.168.2.54 IPv6 v4 router Server 2008 192.168.3.254 2002:8b48:8139:1002::10/64 192.168.3.11 IPv4 8000S ISATAP The workstations in the upper IPv4 network are able to communicate using both IPv4 and IPv6.
    [Show full text]
  • CS 638 Lab 6: Transport Control Protocol (TCP)
    CS 638 Lab 6: Transport Control Protocol (TCP) Joe Chabarek and Paul Barford University of Wisconsin –Madison jpchaba,[email protected] The transport layer of the network protocol stack 1 Overview and Objectives (layer 4) sits between applications (layers 5-7) and Unlike prior labs, the focus of lab #6 is is on the network (layer 3 and below). The most basic learning more about experimental tools and on ob- capability that is enabled by transport is multiplex- serving the behavior of the various mechanisms that ing the network between multiple applications that are part of TCP. The reason for this is because in wish to communicate with remote hosts. Similar to moving from layer 3 to layer 4, we are moving away other layers of the network protocol stack, transport from the network per se, and into end hosts. Further- protocols encapsulate packets with their own header more, network administrators usually don’t spend a before passing them down to layer 3 and decapsulate lot of time messing around with TCP since there is packets before passing them up to applications. no programming or management interface to TCP The most simple transport protocol is the User on end hosts. The exception is content providers Datagram Protocol (UDP). UDP provides a mul- who may make tweaks in an attempt to get better tiplexing/demultiplexing capability for applications performance on large file transfers. but not much more. Most significantly, UDP pro- In terms of experimental tools, a focus of this vides no guarantees for reliability, which is unac- lab is on learning about traffic generation.
    [Show full text]
  • Ipv6 – from Assessment to Pilot
    IPv6 – From Assessment to Pilot James Small CDW Advanced Technology Services Session Objectives State of Things Business Case Plan Design Implement Security & Operations Current Trends Depletion replaced by Growth Population penetration Geoff Huston’s IPv4 Address Report Multiple mobile device penetration The Internet of Things – M2M The Internet of Everything Current Trends Global growth: Penetration doubling every 9 months US penetration: IPv6 Deployment: 24.76% Prefixes: 40.78% Transit AS: 59.48% Content: 47.72% Google’s global IPv6 statistics graph Users: 3.92% Relative Index: 6.2 out of 10 Global IPv6 growth Graphs from Cisco Live Orlando 2013 – PSOSPG 1330 • US Growth/Penetration is Double the Global Rate • Critical mass in US next year (10% penetration) Opinions on Action Gartner – Enterprises must start upgrading their Internet presence to IPv6 now Deloitte – In short, we recommend starting (v6 deployment) now “Starting sooner can give organizations enough lead-time for a deliberate, phased roll-out, while waiting could lead to a costly, risky fire drill.” Roadmap State of things Business Case Plan Design Implement Security & Operations New Trends IPv6-Only Data Centers and Networks (especially mobile ones) on the rise Internet-of-Things – many key protocols are IPv6 only (IPv4 doesn’t have necessary scale) Many new trends are IPv6-Only (e.g. IoT) Smart Factories/Buildings/Cities/Grid Intelligent Transportation System General Business Case 65% of Cisco Enterprise Technology Advisory Board members will have IPv6 web sites by the end of this year (2013) Top drivers for IPv6 BYOD Globalization Internet Evolution/Internet Business Continuity (B2B/B2C) Legal Business Cases Mobile (Tablets/Smartphones) LTE/4G an IPv6 technology Multinational Firms – Europe far down the IPv6 path, where are you compared to your counterparts? Federal – Goal for full IPv6 deployment by 2014 with some trying to eliminate IPv4 by years end (VA) Legal Business Cases IPv6 Critical mass is coming next year (2014) – B2B, B2C, M2M, and other innovation will follow.
    [Show full text]
  • REALNETWORKS PRODUCTION GUIDE with Realone Player Last Update: 1 October 2002 Realnetworks, Inc
    REALNETWORKS PRODUCTION GUIDE With RealOne Player Last Update: 1 October 2002 RealNetworks, Inc. PO Box 91123 Seattle, WA 98111-9223 U.S.A. http://www.real.com http://www.realnetworks.com ©2002 RealNetworks, Inc. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of RealNetworks, Inc. Printed in the United States of America. Helix, The Helix Logo, RBN, the Real "bubble" (logo), Real Broadcast Network, RealAudio, Real.com, RealJukebox, RealMedia, RealNetworks, RealPlayer, RealOne, RealPresenter, RealSlideshow, RealSystem, RealText, RealVideo, SureStream, and Surreal.FX Design are trademarks or registered trademarks of RealNetworks, Inc. Other product and corporate names may be trademarks or registered trademarks of their respective companies. SUMMARY OF CONTENTS DOCUMENTATION RELEASE NOTE .......................................................................................1 INTRODUCTION.....................................................................................................................5 PART I: GETTING STARTED WITH STREAMING MEDIA 1 NEW FEATURES .........................................................................................................17 2 PRESENTATION PLANNING.......................................................................................27 PART II: PRODUCING CLIPS 3 AUDIO PRODUCTION ...............................................................................................59
    [Show full text]
  • Serial/IP COM Port Redirector User Guide
    Navigation: »No topics above this level« Serial/IP® COM Port Redirector User Guide OEM Edition Quick Start Guide Version 4.9 Serial/IP is a registered trademark of Tactical Software, LLC. Tactical Software is a registered trademark of Tactical Software, LLC. Copyright © 2016 Tactical Software, LLC. www.tacticalsoftware.com This Quick Start Guide describes how to install and configure the Serial/IP Redirector so that the Windows applications can use virtual COM ports to access networked serial devices. Configure the Serial Device Server Make sure that the serial server makes its devices available on a TCP port. Install the Serial/IP Software · Log in as Administrator. · Run the Serial/IP setup program. · Use all default choices. · The Serial/IP Redirector will begin running. Windows will not need to be restarted. Create Virtual COM Ports In the Select Ports window, select one or more virtual COM ports, and then click OK. The Serial/IP Select Ports window Configure a Virtual COM Port Enter the IP Address of the serial device server. Enter the TCP Port Number that it is listening on. If the server requires a login, then select the Use Credentials From checkbox. Then in the drop-down list, select Use Credentials Below and enter the Username and Password. The Serial/IP Control Panel Run Auto Configure Click Auto Configure. In the Auto Configure window, click Start. When it completes, click Use Settings. The correct setting will be made for Connection Protocol. The Serial/IP Auto Configure window Ensure that Firewall Software Permits Connections The Serial/IP setup program will add an exception for Serial/IP in the Microsoft Windows Firewall.
    [Show full text]
  • Ipv6 Automatic 6To4 Tunnels
    IPv6 Automatic 6to4 Tunnels This feature provides support for IPv6 automatic 6to4 tunnels. An automatic 6to4 tunnel allows isolated IPv6 domains to be connected over an IPv4 network to remote IPv6 networks. • Finding Feature Information, page 1 • Information About IPv6 Automatic 6to4 Tunnels, page 1 • How to Configure IPv6 Automatic 6to4 Tunnels, page 2 • Configuration Examples for IPv6 Automatic 6to4 Tunnels, page 4 • Additional References, page 5 • Feature Information for IPv6 Automatic 6to4 Tunnels, page 6 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Information About IPv6 Automatic 6to4 Tunnels Automatic 6to4 Tunnels An automatic 6to4 tunnel allows isolated IPv6 domains to be connected over an IPv4 network to remote IPv6 networks. The key difference between automatic 6to4 tunnels and manually configured tunnels is that the tunnel is not point-to-point; it is point-to-multipoint. In automatic 6to4 tunnels, routers are not configured in pairs because they treat the IPv4 infrastructure as a virtual nonbroadcast multiaccess (NBMA) link. The IPv4 address embedded in the IPv6 address is used to find the other end of the automatic tunnel.
    [Show full text]
  • Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]