ࡱ> 6812345` Dbjbj .z<\\\8 4 z{{{$\h{{{{{4{{ [\'-"J0zZ7ZZ{{{{{{{{{{z{{{{4 4 4 DxK4 4 4 x(4\@ Active Directory Planning Worksheets taken with permission from Active Directory Planning and Design by Harry Brelsford Table 1: Business Needs Analysis (Q and A) Table 2: Business Requirements Analysis Table 3: Project Plan Table 4: Active Directory Design and Planning Team Table 5: Technical Requirements Analysis Table 6: Security Requirements Planning Table 7: Windows 2000 Server Network Infrastructure Planning Table 8: Active Directory Design and Planning Table 9: Windows NT 4.0 to Windows 2000 Migration Planning Table 1: Business Needs Analysis (Q and A)QuestionAnswerHave you clearly defined the nature of the organizations business?Has the organization developed a clear sense of direction or mission?Does the organization have a clear philosophy for conducting its business affairs?Are the organizations business goals attainable?Are the organizations objectives logically related in a hierarchy that will lead to goal achievement?Does the organization periodically reevaluate its objectives to be sure they have not grown obsolete?Has the organization developed a logical and planned approach for collecting data on its internal and external environment?Are data stored of filed in ways that allow easy retrieval of useful information?Are reports produced that are seldom or never used?Does the organization periodically review its information system to make certain it is useful and up-to-date?List four or five key strengths of the organization.What are key weaknesses in the organization?In developing the organizations final strategy, did it consider three or four possible alternatives?Are employees involved in making planning decisions?Did management take time to communicate the final strategic plan to employees and deal with their concerns?Is the timetable for implementation of the strategic plan realistic?Have definite checkpoints been schedules for assessing progress toward goals?Has the organization developed effective ways of measuring progress? Table 2: Business Requirements AnalysisAnalysis ItemSub-Analysis ItemCompletedAnalyze the existing and planned business modelsAnalyze the company model and the geographical scope. Models include regional, national, international, subsidiary, and branch offices.Analyze company processes. Processes include information flow, communication flow, service and product life cycles, and decision-making.Analyze the existing and planned organizational structures. Considerations include management model: company organization: vendor, partner, and customer relationships; and acquisition plans.Analyze factors that influence company strategies.Identify company priorities.Identify the projected growth and growth strategy.Identify relevant laws and regulations.Identify the companys tolerance for risk.Identify the total cost of operationsAnalyze the structure of IT management. Considerations include type of administration, such as centralized or decentralized; funding model; outsourcing; decision-making process; and change-management process.Analyze business and security requirements for the end user.Analyze the current physical model and information security model.Analyze internal and external security risks.OtherOtherOther Table 3: Project PlanPhaseTasksDuration / Assigned Resources / CommentsA. AD Design CreationA.1. Namespace (DNS) SelectionA.2. Namespace DesignA.3. Domain Tree/Forest Architectural DevelopmentA.4. AD Domain Naming ConventionsA.5. DNS DesignA.6. DNS Interoperability IssuesA.7. DNS Zones and Administrative Model DevelopmentA.8 OU Development and DesignA.9. Group and User DesignA.10. Security Design and DevelopmentA.11. Delegation of Authority DesignA.12. AD/Windows 2000 Capacity PlanningA.13. Design of Group PoliciesB Test Lab (Proof of Concept)B.1. Testing Server FunctionalityB.2. Core Service Testing (DNS, DHCP, WINS)B.3. Server Interoperability and Coexistence TestingB.4. Server Migration TestingB.5. Desktop Testing (Operating System, Applications)B.6. Network InfrastructureB.7. Hardware InfrastructureC. Production PilotC.1. Launch Pilot PhaseC.2. Pilot Planning TasksC.3. Pilot FeedbackD. RolloutD.1. Develop Implementation PlanD.2. Perform WorkD.3. TroubleshootingD.4. FeedbackOtherOtherOther Table 4: Active Directory Design and Planning TeamTeam MemberRoleCommentsEnterprise or AD ArchitectCorporate Standards Implementation LeadDeployment Site LeadDeployment Team LeadHelp Desk LeadNetworking LeadServices/Product/Technology LeadDeveloper LeadEnd User LeadSenior Management/Executive RepresentativeLine Manager(s)OtherOtherOther Table 5: Technical Requirements AnalysisAnalysis ItemSub-Analysis ItemCompletedEvaluate the companys existing and planned technical environment and goalsAnalyze company size and user and resource distributionAssess the available connectivity between the geographic location of worksites and remote sitesAssess the net available bandwidth and latency issuesAnalyze performance, availability, and scalability requirements of servicesAnalyze the method of accessing data and systemsAnalyze network roles and responsibilities. Roles include administrative, user, service, resource ownership, and application.Analyze security considerationsAnalyze the impact of Active Directory on the existing and planned technical environmentAssess existing systems and applicationsIdentify existing and planned upgrades and rolloutsAnalyze technical support structureAnalyze existing and planned network and system managementAnalyze the business requirements for client computer desktop managementAnalyze end-user work needsIdentify technical support needs for end-usersEstablish the required client computer environment standardsAnalyze the existing disaster recovery strategy for client computers, servers, and the networkAnalyze the impact of infrastructure design on the existing and planned technical environmentAssess current applicationsAnalyze network infrastructure, protocols, and hostsEvaluate network servicesAnalyze TCP/IP infrastructureAssess current hardwareIdentify existing and planned upgrades and rolloutsAnalyze technical support structureAnalyze existing and planned network and systems managementOtherOtherOther Table 6: Security Requirements PlanningAnalysis ItemSub-Analysis ItemCompleteDesign a security baseline for a Windows 2000 network that includes domain controller, operations masters, application servers, file and print servers, RAS servers, desktop computers, portable computers, and kiosksIdentify the required level of security for each resource. Resources include printers, files, shares, Internet access, and dial-in accessDesign an audit policyDesign a delegation of authority policyDesign the placement and inheritance of security policies for sites, domains, and organizational unitsDesign an Encrypting File System strategyDesign an authentication strategySelect authentication methods. Methods include certificate-base authentication, Kerberos authentication, clear-text passwords, digest authentication, smart cards, NTMLM, RADIUS, and SSL.Design an authentication strategy for integration with other systemsDesign a security group strategyDesign a Public Key InfrastructureDesign Certificate Authority (CA) hierarchiesIdentify certificate server rolesCertificate management planIntegrate with third-party CAsMap certificatesDesign Windows 2000 network services securityDesign Windows 2000 DNS securityDesign Windows 2000 Remote Installation Services (RIS) securityDesign Windows 2000 SNMP securityDesign Windows 2000 Terminal Services securityProvide secure access to public networks from a private networkProvide external users with secure access to private network resourcesProvide secure access between private networksProvide secure access within a LANProvide secure access within a WANProvide secure access across a public networkDesign Windows 2000 security for remote access usersDesign a Server-Messaging Block (SMB)-signing solutionDesign an IPSec solutionDesign an IPSec encryption schemeDesign an IPSec management strategyDesign negotiation policiesDesign security policiesDesign IP filtersDesign security levelsOtherOtherOther Table 7: Windows 2000 Server Network Infrastructure PlanningAnalysis ItemSub-Analysis ItemCompletedModify and design a network topologyDesign network services that support application architectureDesign a resource strategyPlan for the placement and management of resourcesPlan for growthPlan for decentralized or centralized resourcesDesign a TCP/IP networking strategyAnalyze IP subnet requirementsDesign a TCP/IP addressing and implementation planMeasure and optimize a TCP/IP infrastructure designIntegrate software routing into existing networsIntegrate TCP/IP with existing WAN requirementsDesign a plan for the interaction of Windows 2000 network services such as WINS, DHCP, and DNSDesign a DHCP strategyIntegrate DHCP into a routed environmentIntegrate DHCP with Windows 2000Design a DHCP service for remote locationsMeasure and optimize a DHCP infrastructure designDesign name resolution servicesCreate an integrated DNS designCreate a secure DNS designCreate a highly available DNS designMeasure and optimize a DNS infrastructure designDesign a DNS deployment strategyCreate a WINS designCreate a secure WINS designMeasure and optimize a WINS infrastructure designDesign a WINS deployment strategyDesign a multi-protocol strategy. Protocols include IPX/SPX and SNADesign a Distributed file system (Dfs) strategyDesign the placement of a Dfs rootDesign a Dfs root replica strategyDesigning for Internet ConnectivityDesign an Internet and extranet access solution. Components of the solution could include proxy server, firewall, routing and remote access, Network Address Translation (NAT, connection sharing, Web server, or mail serverDesign a load-balancing strategyDesign an implementation strategy for dial-up remote accessDesign a remote access solution that uses Routing and Remote AccessIntegrate authentication with Remote Authentication Dial-In User Service (RADIUS)Design a virtual private network (VPN) strategyDesign a Routing and Remote Access routing solution to connect locationsDesign a demand-dial routing strategyOtherOtherOther Table 8: Active Directory Design and PlanningAnalysis ItemSub-Analysis ItemCompletedDesign an Active Directory forest and domain structureDesign a forest and schema structureDesign a domain structureAnalyze and optimize trust relationshipsDesign an Active Directory naming strategyEstablish the scope of the Active DirectoryDesign the namespacePlan DNS strategyDesign and plan the structure of organizational units (OU). Considerations include administration control, existing resource domains, administrative policy, and geographic and company structure.Develop an OU delegation planPlan Group Policy Object managementPlan policy management for client computersPlan for the coexistence of Active Directory and other directory servicesDesign an Active Directory site topologyDesign a replication strategyDefine site boundariesDesign a schema modification policyDesign an Active Directory implementation planDesign the placement of operations mastersConsiderations include performance, fault tolerance, functionality, and manageabilityDesign the placement of Global Catalog ServersConsiderations include performance, fault tolerance, functionality, and manageabilityDesign the placement of domain controllersConsiderations include performance, fault tolerance, functionality, and manageabilityDesign the placement of DNS serversConsiderations include performance, fault tolerance, functionality, and manageabilityPlan for interoperability with the existing DNSOtherOtherOther Table 9: Windows NT 4.0 to Windows 2000 Migration PlanningAnalysis ItemSub-Analysis ItemCompletedChoose the type of migration. Types include upgrade, restructure Windows NT to Windows 2000, restructure Windows 2000 to Windows 2000, upgrade and restructure, inter-forest restructure, and intra-forest restructurePlan the domain restructureSelect the domain to be restructured and decide on the proper order for restructuring them. Decide when incremental migrations are appropriateImplement organizational units (OUs)Select the appropriate tools for implementing the migration from Windows NT to Windows 2000. Tools include Active Directory Migration Tool (ADMT); ClonePrincipal and NETDOM (for inter-forest type), and Move Tree and NETDOM (for intra-forest type)Perform pre-migration tasksDevelop a testing strategy for upgrading and implementing a pilot migrationPrepare the environment for upgrade. Considerations include readiness remediationPlan to install or upgrade DNSPlan the upgrade for hardware, software, and infrastructureAssess current hardwareAssess and evaluate security implications. Considerations include physical security, delegating control to groups, and evaluating post-migration security risksAssess and evaluate application compatibility. Considerations include Web Server, Microsoft Exchange, and line of business (LOB) applications.Assess the implications of an upgrade for network services. Considerations include RAS, networking protocols, DHCP, LAN Manager Replication, WINS, NetBIOS, and third-party DNS.Assess security implications. Considerations include physical security, certificate services, SID history, and evaluating post-migration security risksIdentify upgrade paths. Considerations include O/S version and service packsDevelop a recovery plan. Considerations include Security Account Manger, WINS, DHCP, and DNSUpgrade the PDC, the BDCs, the application servers, and the RAS serversImplement system policies as Group PoliciesImplement replication bridges as necessaryDecide when to switch to native modeIf necessary, develop a procedure for restructuring. Create a Windows 2000 target domain, if necessaryCreate trusts as necessaryCreate OUsCreate sitesReapply account policies and user rights in the Windows 2000 Group PolicyPlan for migrationMigrate groups and usersMigrate local groups and computer accountsVerify the functionality of Exchange. Considerations include service accounts and mailboxesMap mailboxesTest the deploymentImplement disaster recovery plansHave a plan to restore to a pre-migration environmentPerform post-migration tasksRedefine DACLSBack up source domainsDecommission source domains and redeploy domain controllersOtherOtherOther     %@e L Te+!O"?**2Y3B99zD{D}D~DDDDDDjhHvU hHv5\ hHv6]hHvhHv5CJ$\%xy @ h   : ; D lkd$$Ifl44,"" t0644 laf4$IfzDDD K L zkd$$Ifl440,"LL t0644 laf4$If ~~$Ifzkd$$Ifl0,"LL t0644 la - . ~~$Ifzkd$$Ifl0,"LL t0644 la. / a b ~~$Ifzkd$$Ifl0,"LL t0644 lab c ~~$Ifzkd$$Ifl0,"LL t0644 la 2 3 ~~$Ifzkd"$$Ifl0,"LL t0644 la3 4 ~~$Ifzkd$$Ifl0,"LL t0644 la   ~~$Ifzkd*$$Ifl0,"LL t0644 la  : ; ~~$Ifzkd$$Ifl0,"LL t0644 la; < ~~$Ifzkd2$$Ifl0,"LL t0644 la ~~$Ifzkd$$Ifl0,"LL t0644 la ~~$Ifzkd:$$Ifl0,"LL t0644 laxy~~$Ifzkd$$Ifl0,"LL t0644 layz~~$IfzkdB$$Ifl0,"LL t0644 la~~$Ifzkd$$Ifl0,"LL t0644 lade~~$IfzkdJ$$Ifl0,"LL t0644 laef~~$Ifzkd$$Ifl0,"LL t0644 la~~$IfzkdR $$Ifl0,"LL t0644 la(|$Ifzkd $$Ifl0,"LL t0644 la()7IS$IflkdZ $$Ifl44,"" t0644 laf4STmggg$Ifkd $$Ifl44F ,"   t06    44 laf4qkkk$Ifkdt $$IflF ,"   t06    44 laqkkk$Ifkd $$IflF ,"   t06    44 la^_`qkkk$Ifkd $$IflF ,"   t06    44 la`aqkkk$Ifkd $$IflF ,"   t06    44 laqkkk$Ifkd $$IflF ,"   t06    44 laqkkk$Ifkd0$$IflF ,"   t06    44 laqkkk$Ifkd$$IflF ,"   t06    44 laDEqkkk$IfkdH$$IflF ,"   t06    44 laEFGmnqkkk$Ifkd$$IflF ,"   t06    44 lano@ABqkkk$Ifkd`$$IflF ,"   t06    44 laBCqkkk$Ifkd$$IflF ,"   t06    44 laqkkk$Ifkdx$$IflF ,"   t06    44 laqkkk$Ifkd$$IflF ,"   t06    44 laqkkk$Ifkd$$IflF ,"   t06    44 la   qkkk$Ifkd$$IflF ,"   t06    44 la  qkkk$Ifkd$$IflF ,"   t06    44 la.qooi$Ifkd4$$IflF ,"   t06    44 la./5;d$If_kd$$Ifl44,""064 laf4de{|}ysss$IfkdH$$Ifl44F ,"   06    4 laf4}~~xxx$Ifkd$$IflF ,"   06    4 la~xxx$Ifkdo$$IflF ,"   06    4 la~xxx$Ifkd$$IflF ,"   06    4 la~xxx$Ifkd$$IflF ,"   06    4 la$%~xxx$Ifkd$$IflF ,"   06    4 la%&'HI~xxx$Ifkd$$IflF ,"   06    4 laIJK~xxx$Ifkd:$$IflF ,"   06    4 la~xxx$Ifkd$$IflF ,"   06    4 la~xxx$IfkdX$$IflF ,"   06    4 la~xxx$Ifkd$$IflF ,"   06    4 la~xxx$Ifkdv$$IflF ,"   06    4 la:;~xxx$Ifkd$$IflF ,"   06    4 la;<=\]~xxx$Ifkd$$IflF ,"   06    4 la]^|}~~xxx$Ifkd#$$IflF ,"   06    4 la~~xxx$Ifkd$$IflF ,"   06    4 la~xxx$IfkdA$$IflF ,"   06    4 la  ~xxx$Ifkd$$IflF ,"   06    4 la   *+~xxx$Ifkd_$$IflF ,"   06    4 la+,-cd~xxx$Ifkd$$IflF ,"   06    4 ladef~xxx$Ifkd} $$IflF ,"   06    4 la~xxx$Ifkd !$$IflF ,"   06    4 la~xxx$Ifkd!$$IflF ,"   06    4 la~xxx$Ifkd*"$$IflF ,"   06    4 la~xxx$Ifkd"$$IflF ,"   06    4 la ~xxx$IfkdH#$$IflF ,"   06    4 la  ~xxx$Ifkd#$$IflF ,"   06    4 la:;~xxx$Ifkdf$$$IflF ,"   06    4 la;<=OP~xxx$Ifkd$$$IflF ,"   06    4 laPQRgh~xxx$Ifkd%$$IflF ,"   06    4 lahijxy~xxx$Ifkd&$$IflF ,"   06    4 layz~xxx$Ifkd&$$IflF ,"   06    4 la~xxx$Ifkd1'$$IflF ,"   06    4 la~xxx$Ifkd'$$IflF ,"   06    4 la~||v$IfkdO($$IflF ,"   06    4 la$If_kd($$Ifl44,""064 laf4ysss$Ifkdf)$$Ifl44F ,"   06    4 laf4./~xxx$Ifkd *$$IflF ,"   06    4 la/01FG~xxx$Ifkd*$$IflF ,"   06    4 laGHI^_~xxx$Ifkd@+$$IflF ,"   06    4 la_`apq~xxx$Ifkd+$$IflF ,"   06    4 laqrs~xxx$Ifkdv,$$IflF ,"   06    4 la~xxx$Ifkd-$$IflF ,"   06    4 la~xxx$Ifkd-$$IflF ,"   06    4 la~xxx$IfkdG.$$IflF ,"   06    4 la~xxx$Ifkd.$$IflF ,"   06    4 la  ~xxx$Ifkd}/$$IflF ,"   06    4 la  ~xxx$Ifkd0$$IflF ,"   06    4 la~xxx$Ifkd0$$IflF ,"   06    4 la &'~xxx$IfkdN1$$IflF ,"   06    4 la'()+T~||v$Ifkd1$$IflF ,"   06    4 laTUcu$If_kd2$$Ifl44,""064 laf4ysss$Ifkd 3$$Ifl44F ,"   06    4 laf4 ~xxx$Ifkd3$$IflF ,"   06    4 la   kl~xxx$Ifkd34$$IflF ,"   06    4 lalmn~xxx$Ifkd4$$IflF ,"   06    4 la~xxx$IfkdQ5$$IflF ,"   06    4 la'(~xxx$Ifkd5$$IflF ,"   06    4 la()*~xxx$Ifkdo6$$IflF ,"   06    4 la~xxx$Ifkd6$$IflF ,"   06    4 la&'(~xxx$Ifkd7$$IflF ,"   06    4 la()*ST~xxx$Ifkd8$$IflF ,"   06    4 laTUV~xxx$Ifkd8$$IflF ,"   06    4 la~xxx$Ifkd:9$$IflF ,"   06    4 la~xxx$Ifkd9$$IflF ,"   06    4 la:;<~xxx$IfkdX:$$IflF ,"   06    4 la<=>Z[~xxx$Ifkd:$$IflF ,"   06    4 la[\]~xxx$Ifkdv;$$IflF ,"   06    4 la~xxx$Ifkd<$$IflF ,"   06    4 la- . / ~xxx$Ifkd<$$IflF ,"   06    4 la/ 0 ~xxx$Ifkd#=$$IflF ,"   06    4 la ~xxx$Ifkd=$$IflF ,"   06    4 la ~xxx$IfkdA>$$IflF ,"   06    4 la !!~xxx$Ifkd>$$IflF ,"   06    4 la!!!$!%!~xxx$Ifkd_?$$IflF ,"   06    4 la%!&!'!?!@!~xxx$Ifkd?$$IflF ,"   06    4 la@!A!B!v!w!~xxx$Ifkd}@$$IflF ,"   06    4 law!x!y!!!~xxx$Ifkd A$$IflF ,"   06    4 la!!!!!~xxx$IfkdA$$IflF ,"   06    4 la!!!!!~xxx$Ifkd*B$$IflF ,"   06    4 la!!!!!~xxx$IfkdB$$IflF ,"   06    4 la!!!!!~xxx$IfkdHC$$IflF ,"   06    4 la!!!!$"~||v$IfkdC$$IflF ,"   06    4 la$"%"3"E"N"$If_kdfD$$Ifl44,""064 laf4N"O"&#'#(#ysss$IfkdD$$Ifl44F ,"   06    4 laf4(#)####~xxx$IfkdE$$IflF ,"   06    4 la#####~xxx$IfkdF$$IflF ,"   06    4 la#####~xxx$IfkdF$$IflF ,"   06    4 la##b$c$d$~xxx$Ifkd3G$$IflF ,"   06    4 lad$e$$$$~xxx$IfkdG$$IflF ,"   06    4 la$$$$$~xxx$IfkdQH$$IflF ,"   06    4 la$$$s%t%~xxx$IfkdH$$IflF ,"   06    4 lat%u%v%%%~xxx$IfkdoI$$IflF ,"   06    4 la%%%%%~xxx$IfkdI$$IflF ,"   06    4 la%%&&&~xxx$IfkdJ$$IflF ,"   06    4 la&&&6&7&~xxx$IfkdK$$IflF ,"   06    4 la7&8&9&[&\&~xxx$IfkdK$$IflF ,"   06    4 la\&]&^&z&{&~xxx$Ifkd:L$$IflF ,"   06    4 la{&|&}&&&~xxx$IfkdL$$IflF ,"   06    4 la&&&&&~xxx$IfkdXM$$IflF ,"   06    4 la&&&&&~xxx$IfkdM$$IflF ,"   06    4 la&&&''~xxx$IfkdvN$$IflF ,"   06    4 la'''H'I'~xxx$IfkdO$$IflF ,"   06    4 laI'J'K'm'n'~xxx$IfkdO$$IflF ,"   06    4 lan'o'p'''~xxx$Ifkd#P$$IflF ,"   06    4 la'''''~xxx$IfkdP$$IflF ,"   06    4 la''+(,(-(~xxx$IfkdAQ$$IflF ,"   06    4 la-(.(](^(_(~xxx$IfkdQ$$IflF ,"   06    4 la_(`(a(((~xxx$Ifkd_R$$IflF ,"   06    4 la(((((~xxx$IfkdR$$IflF ,"   06    4 la(((((~xxx$Ifkd}S$$IflF ,"   06    4 la(()))~xxx$Ifkd T$$IflF ,"   06    4 la))L)M)N)~xxx$IfkdT$$IflF ,"   06    4 laN)O)h)i)j)~xxx$Ifkd*U$$IflF ,"   06    4 laj)k)l)))~xxx$IfkdU$$IflF ,"   06    4 la)))))~xxx$IfkdHV$$IflF ,"   06    4 la)))))~xxx$IfkdV$$IflF ,"   06    4 la)))))~xxx$IfkdfW$$IflF ,"   06    4 la)))**~xxx$IfkdW$$IflF ,"   06    4 la**** *~xxx$IfkdX$$IflF ,"   06    4 la *!*'*(*)*~xxx$IfkdY$$IflF ,"   06    4 la)***0*1*2*~xxx$IfkdY$$IflF ,"   06    4 la2*3*9*:*;*~xxx$Ifkd1Z$$IflF ,"   06    4 la;*<*=*?*|*~||v$IfkdZ$$IflF ,"   06    4 la|*}****$If_kdO[$$Ifl44,""064 laf4*****ysss$Ifkd[$$Ifl44F ,"   06    4 laf4**+++~xxx$Ifkdo\$$IflF ,"   06    4 la++,+-+.+~xxx$Ifkd\$$IflF ,"   06    4 la.+/+0+c+d+~xxx$Ifkd]$$IflF ,"   06    4 lad+e+f+v+w+~xxx$Ifkd^$$IflF ,"   06    4 law+x+y+++~xxx$Ifkd^$$IflF ,"   06    4 la+++++~xxx$Ifkd:_$$IflF ,"   06    4 la+++++~xxx$Ifkd_$$IflF ,"   06    4 la+++(,),~xxx$IfkdX`$$IflF ,"   06    4 la),*,+,_,`,~xxx$Ifkd`$$IflF ,"   06    4 la`,a,b,,,~xxx$Ifkdva$$IflF ,"   06    4 la,,,,,~xxx$Ifkdb$$IflF ,"   06    4 la,,'-(-)-~xxx$Ifkdb$$IflF ,"   06    4 la)-*-A-B-C-~xxx$Ifkd#c$$IflF ,"   06    4 laC-D-E-n-o-~xxx$Ifkdc$$IflF ,"   06    4 lao-p-q---~xxx$IfkdAd$$IflF ,"   06    4 la-----~xxx$Ifkdd$$IflF ,"   06    4 la-----~xxx$Ifkd_e$$IflF ,"   06    4 la--...~xxx$Ifkde$$IflF ,"   06    4 la...;.<.~xxx$Ifkd}f$$IflF ,"   06    4 la<.=.>.Y.Z.~xxx$Ifkd g$$IflF ,"   06    4 laZ.[.\...~xxx$Ifkdg$$IflF ,"   06    4 la.....~xxx$Ifkd*h$$IflF ,"   06    4 la.....~xxx$Ifkdh$$IflF ,"   06    4 la.....~xxx$IfkdHi$$IflF ,"   06    4 la...//~xxx$Ifkdi$$IflF ,"   06    4 la///E/F/~xxx$Ifkdfj$$IflF ,"   06    4 laF/G/H/j/k/~xxx$Ifkdj$$IflF ,"   06    4 lak/l////~xxx$Ifkdk$$IflF ,"   06    4 la/////~xxx$Ifkdl$$IflF ,"   06    4 la/// 0 0~xxx$Ifkdl$$IflF ,"   06    4 la 0 0 00010~xxx$Ifkd1m$$IflF ,"   06    4 la1020V0W0X0~xxx$Ifkdm$$IflF ,"   06    4 laX0Y0Z08191~xxx$IfkdOn$$IflF ,"   06    4 la91:1;1\1]1~xxx$Ifkdn$$IflF ,"   06    4 la]1^1111~xxx$Ifkdmo$$IflF ,"   06    4 la11111~xxx$Ifkdo$$IflF ,"   06    4 la1117282~xxx$Ifkdp$$IflF ,"   06    4 la8292i2j2k2~xxx$Ifkdq$$IflF ,"   06    4 lak2l2222~xxx$Ifkdq$$IflF ,"   06    4 la22222~xxx$Ifkd8r$$IflF ,"   06    4 la22222~xxx$Ifkdr$$IflF ,"   06    4 la22222~xxx$IfkdVs$$IflF ,"   06    4 la22222~xxx$Ifkds$$IflF ,"   06    4 la2222-3~||v$Ifkdtt$$IflF ,"   06    4 la-3.3<3N3X3$If_kdu$$Ifl44,""064 laf4X3Y3333ysss$Ifkdu$$Ifl44F ,"   06    4 laf433333~xxx$Ifkd#v$$IflF ,"   06    4 la33333~xxx$Ifkdv$$IflF ,"   06    4 la33344~xxx$IfkdAw$$IflF ,"   06    4 la44/40414~xxx$Ifkdw$$IflF ,"   06    4 la142434_4`4~xxx$Ifkd_x$$IflF ,"   06    4 la`4a4b4w4x4~xxx$Ifkdx$$IflF ,"   06    4 lax4y4z444~xxx$Ifkd}y$$IflF ,"   06    4 la44Q5R5S5~xxx$Ifkd z$$IflF ,"   06    4 laS5T5U5s5t5~xxx$Ifkdz$$IflF ,"   06    4 lat5u5v555~xxx$Ifkd*{$$IflF ,"   06    4 la55555~xxx$Ifkd{$$IflF ,"   06    4 la55666~xxx$IfkdH|$$IflF ,"   06    4 la66A6B6C6~xxx$Ifkd|$$IflF ,"   06    4 laC6D6E6c6d6~xxx$Ifkdf}$$IflF ,"   06    4 lad6e6f6}6~6~xxx$Ifkd}$$IflF ,"   06    4 la~66666~xxx$Ifkd~$$IflF ,"   06    4 la66666~xxx$Ifkd$$IflF ,"   06    4 la66777~xxx$Ifkd$$IflF ,"   06    4 la777]7^7~xxx$Ifkd1$$IflF ,"   06    4 la^7_7777~xxx$Ifkd$$IflF ,"   06    4 la77777~xxx$IfkdO$$IflF ,"   06    4 la77888~xxx$Ifkdށ$$IflF ,"   06    4 la888o8p8~xxx$Ifkdm$$IflF ,"   06    4 lap8q8888~xxx$Ifkd$$IflF ,"   06    4 la88888~xxx$Ifkd$$IflF ,"   06    4 la888"9#9~xxx$Ifkd$$IflF ,"   06    4 la#9$9*9+9,9~xxx$Ifkd$$IflF ,"   06    4 la,9-9394959~xxx$Ifkd8$$IflF ,"   06    4 la5969<9=9>9~xxx$IfkdDž$$IflF ,"   06    4 la>9?9@9B9}9~||v$IfkdV$$IflF ,"   06    4 la}9~9999$If_kd$$Ifl44,""064 laf499:::ysss$Ifkdm$$Ifl44F ,"   06    4 laf4:::::ysss$Ifkd$$Ifl44F ,"   06    4 laf4:::2;3;ysss$Ifkd$$Ifl44F ,"   06    4 laf43;4;5;Z;[;ysss$Ifkd5$$Ifl44F ,"   06    4 laf4[;\;S<T<U<ysss$Ifkd͉$$Ifl44F ,"   06    4 laf4U<V<r<s<t<ysss$Ifkde$$Ifl44F ,"   06    4 laf4t<u<v<<<ysss$Ifkd$$Ifl44F ,"   06    4 laf4<<<==ysss$Ifkd$$Ifl44F ,"   06    4 laf4==8=9=:=ysss$Ifkd-$$Ifl44F ,"   06    4 laf4:=;=w=x=y=ysss$IfkdŌ$$Ifl44F ,"   06    4 laf4y=z={===ysss$Ifkd]$$Ifl44F ,"   06    4 laf4===6>7>ysss$Ifkd$$Ifl44F ,"   06    4 laf47>8>9>>>ysss$Ifkd$$Ifl44F ,"   06    4 laf4>>>|?}?ysss$Ifkd%$$Ifl44F ,"   06    4 laf4}?~??@@ysss$Ifkd$$Ifl44F ,"   06    4 laf4@@f@g@h@ysss$IfkdU$$Ifl44F ,"   06    4 laf4h@i@@@@ysss$Ifkd$$Ifl44F ,"   06    4 laf4@@AAAysss$Ifkd$$Ifl44F ,"   06    4 laf4AA@AAABAysss$Ifkd$$Ifl44F ,"   06    4 laf4BACAnAoApAysss$Ifkd$$Ifl44F ,"   06    4 laf4pAqAAAAysss$IfkdM$$Ifl44F ,"   06    4 laf4AABBBysss$Ifkd$$Ifl44F ,"   06    4 laf4BBBB Bysss$Ifkd}$$Ifl44F ,"   06    4 laf4 B!B"B-B.Bysss$Ifkd$$Ifl44F ,"   06    4 laf4.B/B0B=B>Bysss$Ifkd$$Ifl44F ,"   06    4 laf4>B?B@BBBysss$IfkdE$$Ifl44F ,"   06    4 laf4BBBBBysss$Ifkdݖ$$Ifl44F ,"   06    4 laf4BBBBBysss$Ifkdu$$Ifl44F ,"   06    4 laf4BBBBBysss$Ifkd $$Ifl44F ,"   06    4 laf4BBHCICJCysss$Ifkd$$Ifl44F ,"   06    4 laf4JCKCLCZC[Cysss$Ifkd=$$Ifl44F ,"   06    4 laf4[C\CpCqCrCysss$Ifkdՙ$$Ifl44F ,"   06    4 laf4rCsCCCCysss$Ifkdm$$Ifl44F ,"   06    4 laf4CCCCCysss$Ifkd$$Ifl44F ,"   06    4 laf4CCCCCysss$Ifkd$$Ifl44F ,"   06    4 laf4CCCDDysss$Ifkd5$$Ifl44F ,"   06    4 laf4DDDDDysss$Ifkd͜$$Ifl44F ,"   06    4 laf4DDDZD[Dysss$Ifkde$$Ifl44F ,"   06    4 laf4[D\DbDcDdDysss$Ifkd$$Ifl44F ,"   06    4 laf4dDeDkDlDmDysss$Ifkd$$Ifl44F ,"   06    4 laf4mDnDtDuDvDysss$Ifkd-$$Ifl44F ,"   06    4 laf4vDwDzD|D}DDDDDDDDDDywwwwwwwwwuwukdş$$Ifl44F ,"   06    4 laf4 DDDDDDDDDDDD ,1h/ =!"#$% $$If!vh5"#v":V l44 t065"f4$$If!vh5L5L#vL:V l44 t065Lf4$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5L5L#vL:V l t065L$$If!vh5"#v":V l44 t065"f4$$If!vh5 5 5 #v :V l44 t065 f4$$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5 5 5 #v :V l t065 $$If!vh5"#v":V l44065"4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5"#v":V l44065"4f4$$If!vh5Q 5 5W #vQ #v #vW :V l44065 4f4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5Q 5 5W #vQ #v #vW :V l065 4$$If!vh5"#v":V l44065"4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5"#v":V l44065"4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5"#v":V l44065"4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5"#v":V l44065"4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5 5 5 #v :V l065 4$$If!vh5"#v":V l44065"4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4$$If!vh5 5 5 #v :V l44065 4f4@@@ NormalCJ_HaJmH sH tH DAD Default Paragraph FontVi@V  Table Normal :V 44 la (k@(No List 4@4 HvHeader  !4 @4 HvFooter  !<!z%z 9xyz<f?%xy@h:;DKL-./abc234:;<xzdef<<<!!!!!!!!!!!!!!ttttYttYttttYttttttttYttYttttYttYtttYttttYttYttY!!!%xy@h:;DKL-./abc234:;<xyzdef()7IST    ^ _ ` a     D E F G m n o @ A B C          . / 5 ; d e { | } ~  $%&'HIJK:;<=\]^|}~    *+,-cdef  :;<=OPQRghijxyz./01FGHI^_`apqrs    &'()+TUcu   klmn'()*&'()*STUV:;<=>Z[\]-./0$%&'?@ABvwxy$%3ENO&'()bcdestuv6789[\]^z{|}HIJKmnop+ , - . ] ^ _ ` a !!!!L!M!N!O!h!i!j!k!l!!!!!!!!!!!!!!!!!""""" "!"'"(")"*"0"1"2"3"9":";"<"="?"|"}"""""""""####,#-#.#/#0#c#d#e#f#v#w#x#y#############($)$*$+$_$`$a$b$$$$$$$$'%(%)%*%A%B%C%D%E%n%o%p%q%%%%%%%%%%%%&&&&&;&<&=&>&Y&Z&[&\&&&&&&&&&&&&&&&&&''''E'F'G'H'j'k'l'''''''''' ( ( ( (0(1(2(V(W(X(Y(Z(8)9):);)\)])^))))))))))7*8*9*i*j*k*l***********************-+.+<+N+X+Y++++++++++++++,,,/,0,1,2,3,_,`,a,b,w,x,y,z,,,,Q-R-S-T-U-s-t-u-v--------....A.B.C.D.E.c.d.e.f.}.~........../////]/^/_/////////00000o0p0q0000000000"1#1$1*1+1,1-131415161<1=1>1?1@1B1}1~1111122222222223334353Z3[3\3S4T4U4V4r4s4t4u4v444445558595:5;5w5x5y5z5{55555667686966666|7}7~77888f8g8h8i888889999@9A9B9C9n9o9p9q99999:::::: :!:":-:.:/:0:=:>:?:@::::::::::::::::H;I;J;K;L;Z;[;\;p;q;r;s;;;;;;;;;;;;;;<<<<<<<<Z<[<\<b<c<d<e<k<l<m<n<t<u<v<w<z<<<<<<y0hy0y0y0y0y0y0y0y0y0y0y0y0y0y0y0 y0 y0 y0 y0 y0 l y0y0y0y0`(K8 y0 y0 y0! y0! $y0$ y0$ t:!v:v:y0' y0' Hy0* y0*  X !y0- y0-  y00 y00 $y03 y03 y06 y06 @cy09y09\y0<y0<y0?y0?y0By0B@(!y0Ey0E$y0y0y0J  y0L y0L y0L  y0N y0N y0N  y0P y0P y0P  y0R y0R y0R  y0T y0T y0T  y0V y0V y0V  y0X y0X y0X  y0Z y0Z y0Z  y0\ y0\ y0\  y0^ y0^ y0^  y0` y0` y0`  y0b y0b y0b  y0d y0d y0d  y0f y0f y0f  y0h y0h y0h  y0j y0j y0j  y0l y0l y0l  y0n y0n y0n  y0py0+y0p  y0r y0r y0r  y0t y0t y0t  y0v y0v y0v  y0x y0x y0x  y0z y0z y0z  y0| y0| y0|  y0~ y0~ y0~  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0 y0 y0  y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0 y0 y0  y0Jy0%y0% y0(y0(y0( y0,y0,y0, y00y00y00 y04y04y04 y08y08y08 y0<y0<y0< y0@y0@y0@ y0Dy0Dy0D y0Hy0Hy0H y0Ly0Ly0L y0Py0Py0P y0Ty0Ty0T y0Xy0Xy0X y0\y0\y0\ y0`y0`y0` y0Jy0ey0e y0hy0hy0h y0ly0ly0l y0py0py0p y0ty0ty0t y0xy0xy0x y0|y0|y0| y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0Jy0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0 y0 y0  y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0 y0 y0  y0J y0J y0J y0(y0(y0(``( y0,y0,y0,``( y00y00y00``( y04y04y04``( y08y08y08``( y0<y0<y0<``( y0@y0@y0@``( y0Dy0Dy0D``( y0Hy0Hy0H``( y0Ly0Ly0L``( y0Py0Py0P``( y0Ty0Ty0T``( y0Xy0Xy0X``( y0\y0\y0\``( y0L y0L y0L ``(y0N y0N y0N y0P y0P y0P y0ly0ly0l y0py0py0p y0ty0ty0t y0xy0xy0x y0|y0|y0| y0y0y0 y0y0y0 y0Ry0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0R y0R y0R y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0T y0T y0T y0V y0V y0V `y0X y0X y0X  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0  y0  y0   y0$ y0$ y0$  y0( y0( y0(  y0, y0, y0,  y00 y00 y00  y04 y04 y04  y08 y08 y08  y0< y0< y0<  y0Zy0A y0A  y0D y0D y0D  y0H y0H y0H  y0L y0L y0L  y0P y0P y0P  y0T y0T y0T  y0X y0X y0X  y0\ y0\ y0\  y0` y0` y0`  y0d y0d y0d  y0h y0h y0h  y0l y0l y0l  y0p y0p y0p  y0t y0t y0t  y0x y0x y0x  y0| y0| y0|  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0Zy0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0 y0 y0  y0Z y0Z y0Z y0\ y0\ y0\ y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0y0y0 y0^ y0^ y0^ y0y0y0$ y0y0y0$ y0y0y0$ y0y0y0$ y0 y0 y0 $ y0` y0` y0` $y0(y0(y0(y0,y0,y0,y00y00y00y04y04y04y08y08y08y0<y0<y0<y0@y0@y0@y0Dy0Dy0Dy0Hy0Hy0Hy0Ly0Ly0Ly0Py0Py0Py0Ty0Ty0Ty0Xy0Xy0Xy0\y0\y0\y0`y0`y0`y0dy0dy0dy0hy0hy0hy0{0ܣy0{0 P` l` ` ` y0%xy@h:;DKL-./abc234:;<xyzef()ST  ` a   E F n o B C     . / d e } ~ %&IJ;<]^~  +,de  ;<PQhiyz/0GH_`qr  '(TU  lm()()TU<=[\/0%&@Awx$%NO()detu78\]{|IJno- . _ ` !!N!O!j!k!!!!!!!!!"" "!")"*"2"3";"<"|"}"""""##.#/#d#e#w#x#######)$*$`$a$$$$$)%*%C%D%o%p%%%%%%%&&<&=&Z&[&&&&&&&&&''F'G'k'l''''' ( (1(2(X(Y(9):)])^)))))8*9*k*l***********-+.+X+Y+++++++,,1,2,`,a,x,y,,,S-T-t-u-----..C.D.d.e.~......//^/_/////00p0q00000#1$1,1-15161>1?1}1~11122223343[3\3U4V4t4u44455:5;5y5z555768666}7~788h8i88899B9C9p9q999:: :!:.:/:>:?:::::::::J;K;[;\;r;s;;;;;;;<<<<[<\<d<e<m<n<v<w<z<|<}<<<<<<<<y0Xy0y0y0y0y0y0y0y0y0y0y0y0y0 y0y0! y0y0  (  y0 y0  Q |T T T  y0y0Hy0y0y0y0 S ܿ YԪy0!y0!,y0$y0$y0'y0'y0*y0*y0-y0- y00y00 P[y03y03P[Fy06y06L"{09:H=d===={0;<>>>?@\{0=>Xt{0?@04Pl{0ABhHdԉ{0CDЊ$@\{0EF؜`t{0GHX {0IJ {0KL 6{0MN e `{0OP8 ((7{0?@`(7{0AB(7{0CD(7{0EF)7{0GH@)7{0IJx)7{0KL)7{0MN)7{0OP *7{0QRX*7{0ST+7{0UV,7{0WXT,7{0YZ,7{0[\,7{0]^,7{0_`4-7{0abl-7{0cd-7{0ef-7{0gh.7{0ijL.7{0kl.7{0mn.7{0op.7{0qr,/7{0std/7{0uv/7{0wx/7{0yz 07{0{|D07{0}~|07{007{007{0$17{0\17{017{017{027{0<27{0t27{027{027{037{0T37{037{037{037{0447{0l47{047{047{057{067{0,77{0d77{077{077{0 87{0D87{0|87{087{087{0$97{0\97{097{097{0:7{0<:7{0t:7{0:7{0:7{0;7{0T;7{0;7{0;7{0;7{04<7{0l<7{0<7{0<7{0=7{0L=7{0=7{0=7{0=7{0,>7{0d>7{0>7{0>7{0 ?7{0D?7{0|?7{0?7{0?7{0$@7{0\@7{0@7{0@7{0A7{04I7{0?@lI7{0ABI7{0CDI7{0EFJ7{0GHLJ7{0IJJ7{0KLJ7{0MNJ7{0OP,K7{0QRdK7{0STK7y00 y0y0y0y0`xy0y0$y0 D#D . b 3  ; ye(S`EnB .d}%I;]~ +d ;Phy/G_q 'T l((T<[/ !%!@!w!!!!!!$"N"(####d$$$t%%%&7&\&{&&&&'I'n'''-(_(((()N)j)))))* *)*2*;*|***+.+d+w++++),`,,,)-C-o----.<.Z...../F/k/// 010X091]11182k222222-3X3333414`4x44S5t5556C6d6~6667^7778p888#9,959>9}99::3;[;U<t<<=:=y==7>>}?@h@@ABApAAB B.B>BBBBBJC[CrCCCCDD[DdDmDvDDD$&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABD%8@0(  B S  ?nwY!^!v!{!!!$$''((((U3X33388):,:z<<z<< z{23VVF"G"++I1J1*:,:/:w<y<<y<z<<Hv:;DKL-./abc234:;<xyzdef()7IST    ^ _ ` a     D E F G m n o @ A B C         . / 5 ; d e { | } ~  $%&'HIJK:;<=\]^|}~    *+,-cdef  :;<=OPQRghijxyz./01FGHI^_`apqrs    &'(+TUcu   klmn'()*&'()*STUV:;<=>Z[\]-./0$%&'?@ABvwxy$%3ENO&'()bcdestuv6789[\]^z{|}HIJKmnop+ , - . ] ^ _ ` a !!!!L!M!N!O!h!i!j!k!l!!!!!!!!!!!!!!!!!""""" "!"'"(")"*"0"1"2"3"9":";"<"?"|"}"""""""""####,#-#.#/#0#c#d#e#f#v#w#x#y#############($)$*$+$_$`$a$b$$$$$$$$'%(%)%*%A%B%C%D%E%n%o%p%q%%%%%%%%%%%%&&&&&;&<&=&>&Y&Z&[&\&&&&&&&&&&&&&&&&&''''E'F'G'H'j'k'l'''''''''' ( ( ( (0(1(2(V(W(X(Y(Z(8)9):);)\)])^))))))))))7*8*9*i*j*k*l**********************-+.+<+N+X+Y++++++++++++++,,,/,0,1,2,3,_,`,a,b,w,x,y,z,,,,Q-R-S-T-U-s-t-u-v--------....A.B.C.D.E.c.d.e.f.}.~........../////]/^/_/////////00000o0p0q0000000000"1#1$1*1+1,1-131415161<1=1>1?1B1}1~1111122222222223334353Z3[3\3S4T4U4V4r4s4t4u4v444445558595:5;5w5x5y5z5{55555667686966666|7}7~77888f8g8h8i888889999@9A9B9C9n9o9p9q99999:::::: :!:":-:.:/:0:=:>:?:@::::::::::::::::H;I;J;K;L;Z;[;\;p;q;r;s;;;;;;;;;;;;;;<<<<<<<<Z<[<\<b<c<d<e<k<l<m<n<t<u<v<w<<@?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      "#$%&'(*+,-./07Root Entry F [9Data D]1TableZWordDocument.SummaryInformation(!DocumentSummaryInformation8)CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q