* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Top-Down Network Design
Wireless security wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Computer network wikipedia , lookup
Deep packet inspection wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Distributed firewall wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Peer-to-peer wikipedia , lookup
Network tap wikipedia , lookup
NETWORK DESIGN AND IMPLEMENTATION EEB_7_876 For MSc TeCNE and EDS 1 Website: http://eent3.lsbu.ac.uk/staff/baoyb/NDI http://www.lsbu.ac.uk/bb/ Methods of Teaching and Learning : Lectures and Workshops Assessment of the Module : 2-hour written examination -- 50% Two laboratory work reports -- 50% Lecturer: Ya Bao and Perry Xiao. 2 Top-Down Network Design, 3rd Edition Priscilla Oppenheimer Designing and Supporting Computer Networks (CCNA) 3 BACKGROUND READING Networking Systems Design and Development 4 TEACHING CALENDAR Network Programming (Week 1 – 6)  Network Design (Week 7 – 12)       Week 7, 8 Identifying Your Customer’s Needs and Goals Week 8, 9 Logical Network Design Week 10 Physical Network Design Week 11 Testing, Optimizing and Documenting Week 12 Review Christmas vacation (3 weeks)  Revision (week 13)  Examination (week 14-15)  5 PART 1 IDENTIFYING YOUR CUSTOMER’S NEEDS AND GOALS  Analyzing Business Goals and Constraints 6  Analyzing Technical Goals and Tradeoffs  Characterizing the Existing Internetwork  Characterizing Network Traffic CHAPTER ONE ANALYZING BUSINESS GOALS AND CONSTRAINTS Systematic, Top-down network design methodology  Analysing your customer’s business objectives  Analysing the business constrains; budgets, timeframes, workplace politics.  7 NETWORK DESIGN  Good network design must recognizes customer’s requirements.  Network design choices and tradeoffs must be made when designing the logic network before any physical devices are selected. 8 STRUCTURED NETWORK DESIGN Four fundamental network design goals:  Scalability  Availability  Security  Manageability 9 HOW A STRUCTURED NETWORK DESIGN CREATES A STABLE, RELIABLE, SCALABLE NETWORK Network requirements:  Ease of management  Fast recovery  Application response time  Fast troubleshooting 10 STRUCTURED NETWORK DESIGN  Core Layer: connects Distribution Layer devices  Distribution Layer: interconnects smaller LANs  Access Layer: provides connections for hosts and end devices 11 STRUCTURED NETWORK DESIGN Steps in network design projects: Identify the network requirements  Characterize the existing network (for network upgrading only)  Design the network topology and solutions  Testing, optimizing and documenting  12 START FROM THE TOP Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical 13 14 SYSTEMS DEVELOPMENT LIFE CYCLES (SDLC)  Typical systems are developed and continue to exist over a period of time, often called a systems development life cycle (SDLC). 15 TOP-DOWN NETWORK DESIGN STEPS systems development life cycle (SDLC). Analyze requirements Monitor and optimize network performance Develop logical design Develop physical design Implement and test network Test, optimize, and document design 16 THE PDIOO NETWORK LIFE CYCLE Plan Design Implement Operate Optimize Plan Design Retire Optimize Implement Operate 17 NETWORK DESIGN STEPS  Phase     Today’s topic 1 – Analyze Requirements Analyze business goals and constraints Analyze technical goals and tradeoffs Characterize the existing network Characterize network traffic 18 NETWORK DESIGN STEPS  Phase      2 – Logical Network Design Design a network topology Design models for addressing and naming Select switching and routing protocols Develop network security strategies Develop network management strategies 19 NETWORK DESIGN STEPS  Phase   3 – Physical Network Design Select technologies and devices for campus networks Select technologies and devices for enterprise networks 20 NETWORK DESIGN STEPS  Phase 4 – Testing, Optimizing, and Documenting the Network Design Test the network design  Optimize the network design  Document the network design  21 BUSINESS GOALS  Increase revenue  Reduce operating costs  Improve communications  Shorten product development cycle  Expand into worldwide markets  Build partnerships with other companies  Offer better customer support or new customer services 22 RECENT BUSINESS PRIORITIES  Mobility  Security  Resiliency (fault tolerance)  Business continuity after a disaster  Network projects must be prioritized based on fiscal goals  Networks must offer the low delay required for real-time applications such as VoIP 23 BUSINESS CONSTRAINTS  Budget  Staffing  Schedule  Politics and policies 24 COLLECT INFORMATION BEFORE THE FIRST MEETING  Before meeting with the client, whether internal or external, collect some basic business-related information  Such as Products produced/Services supplied  Financial viability  Customers, suppliers, competitors  Competitive advantage  25 MEET WITH THE CUSTOMER  Try  to get A concise statement of the goals of the project What problem are they trying to solve?  How will new technology help them be more successful in their business?  What must happen for the project to succeed?  26 MEET WITH THE CUSTOMER  Get a copy of the organization chart This will show the general structure of the organization  It will suggest users to account for  It will suggest geographical locations to account for  27 MEET WITH THE CUSTOMER  Get a copy of the security policy How does the policy affect the new design?  How does the new design affect the policy?  Is the policy so strict that you (the network designer) won’t be able to do your job?   Start cataloging network assets that security should protect Hardware, software, applications, and data  Less obvious, but still important, intellectual property, trade secrets, and a company's reputation  28 THE SCOPE OF THE DESIGN PROJECT  Small  Allow sales people to access network via a VPN  Large  in scope? An entire redesign of an enterprise network  Use  in scope? the OSI model to clarify the scope New financial reporting application versus new routing protocol versus new data link (wireless, for example)  Does the scope fit the budget, capabilities of staff and consultants, schedule? 29 GATHER MORE DETAILED INFORMATION  Applications   Now and after the project is completed Include both productivity applications and system management applications  User communities  Data stores  Protocols  Current logical and physical architecture  Current performance 30 SUMMARY  Systematic approach  Focus first on business requirements and constraints, and applications  Gain an understanding of the customer’s corporate structure  Gain an understanding of the customer’s business style 31 REVIEW QUESTIONS  What are the main phases of network design per the top-down network design approach?  What are the main phases of network design per the PDIOO approach?  Why is it important to understand your customer’s business style?  What are some typical business goals for organizations today? 32 CHAPTER TWO ANALYZING TECHNICAL GOALS AND TRADEOFFS 33 Copyright 2010 Cisco Press & Priscilla Oppenheimer TECHNICAL GOALS  Scalability  Availability  Performance  Security  Manageability  Usability Your lab report should reflect some of these goals of your own designed network.  Adaptability  Affordability 34 SCALABILITY  Scalability refers to the ability to grow  Some technologies are more scalable  Flat network designs, for example, don’t scale well  Try     to learn Number of sites to be added What will be needed at each of these sites How many users will be added How many more servers will be added 35 36 37 AVAILABILITY  Availability can be expressed as a percent uptime per year, month, week, day, or hour, compared to the total time in that period  For example: 24/7 operation  Network is up for 165 hours in the 168-hour week  Availability is 98.21%   Different applications may require different levels  Some enterprises may want 99.999% or “Five Nines” availability 38 AVAILABILITY  Availability can also be expressed as a mean time between failure (MTBF) and mean time to repair (MTTR)  Availability = MTBF/(MTBF + MTTR)  For example:  The network should not fail more than once every 4,000 hours (166 days) and it should be fixed within one hour  4,000/4,001 = 99.98% availability 39 AVAILABILITY DOWNTIME IN MINUTES Per Hour Per Day Per Week Per Year 99.999% .0006 .01 .10 5 99.98% .012 .29 2 105 99.95% .03 .72 5 263 99.90% .06 1.44 10 526 99.70% .18 4.32 30 1577(26 H) 99.999% AVAILABILITY MAY REQUIRE TRIPLE REDUNDANCY ISP 1 ISP 2 ISP 3 Enterprise  Can the customer afford this? 41 SERVER FARMS Many enterprise networks provide users with Internetaccessible services, such as email and e-commerce. The availability and security of these services are crucial to the success of a business. Managing and securing numerous distributed servers at various locations within a business network is difficult. Recommended practice centralised servers in server farms. Server farms are typically located in computer rooms and data centres. 42 43 44 BENEFITS OF CREATING A SERVER FARM 1. Network traffic enters and leaves the server farm at a defined point. This arrangement makes it easier to secure, filter and prioritise traffic. 2. Redundant, high-capacity links can be installed to the servers and between the server farm network and the main LAN. This configuration is more cost-effective than attempting to provide a similar level of connectivity to servers distributed throughout the network. 3. Load balancing and failover can be provided between servers and between networking devices. 4. The number of high-capacity switches and security devices is reduced, helping to lower the cost of providing 45 services. NETWORK PERFORMANCE  Common performance factors include Bandwidth  Throughput  Bandwidth utilization  Offered load  Accuracy  Efficiency  Delay (latency) and delay variation  Response time  46 BANDWIDTH VS. THROUGHPUT  Bandwidth and throughput are not the same  Bandwidth is the data carrying capacity of a circuit, fixed.  Usually specified in bits per second-bps  Throughput is the quantity of error free data transmitted per unit of time Measured in bps, Bps, or packets per second (pps)  Depend on offered load, access method and error rate   Throughput < Bandwidth 47 BANDWIDTH, THROUGHPUT, LOAD 100 % of Capacity T h r o u g h p u t Actual 100 % of Capacity Offered Load 48 OTHER FACTORS THAT AFFECT THROUGHPUT The size of packets  Inter-frame gaps between packets  Packets-per-second ratings of devices that forward packets  Client speed (CPU, memory, and HD access speeds)  Server speed (CPU, memory, and HD access speeds)  Network design  MAC Protocols (ALOHA 18.4%)  Distance  Errors  Time of day, etc., etc., etc.  49 THROUGHPUT VS. GOODPUT  Are you referring to bytes per second, regardless of whether the bytes are user data bytes or packet header bytes  Or are you concerned with application-layer throughput of user bytes, sometimes called “goodput”  In that case, you have to consider that bandwidth is being “wasted” by the headers in every packet 50 PERFORMANCE (CONTINUED)  Efficiency   How much overhead is required to deliver an amount of data? How large can packets be? Larger better for efficiency (and goodput)  But too large means too much data is lost if a packet is damaged  How many packets can be sent in one bunch without an acknowledgment?  51 EFFICIENCY Small Frames (Less Efficient) Large Frames (More Efficient) 52 DELAY FROM THE USER’S POINT OF VIEW  Response   Time A function of the application and the equipment the application is running on, not just the network Most users expect to see something on the screen in 100 to 200 milliseconds 53 DELAY FROM THE ENGINEER’S POINT OF VIEW  Propagation  delay A signal travels in a cable at about 2/3 the speed of light in a vacuum (3×108 m/s)  Transmission delay (also known as serialization delay)  Time to put digital data onto a transmission line  For example, it takes about 5 ms to output a 1,024 byte packet on a 1.544 Mbps T1 line  Packet-switching  Queuing delay delay 54 Average Queue Depth QUEUING DELAY AND BANDWIDTH UTILIZATION 15 12 9 6 3 0 0.5 0.6 0.7 0.8 0.9 Average Utilization   Number of packets in a queue increases exponentially as utilization increases Queue depth = utilization/(1- utilization) 1 EXAMPLE A packet switch has 5 users, each offering packets at a rate of 10 packets per second  The average length of the packets is 1,024 bits  The packet switch needs to transmit this data over a 56-Kbps WAN circuit    Load = 5 x 10 x 1,024 = 51,200 bps Utilization = 51,200/56,000 = 91.4% Average number of packets in queue = (0.914)/(1-0.914) = 10.63 packets 56 SECURITY  Focus on requirements first  Detailed security planning later (Chapter 8)  Identify network assets  Including their value and the expected cost associated with losing them due to a security problem  Analyze security risks 57 MANAGEABILITY  Fault management  Configuration management  Accounting management  Performance management  Security management 58 USABILITY  Usability: the ease of use with which network users can access the network and services  Networks should make users’ jobs easier  Some design decisions will have a negative affect on usability:  Strict security, for example 59 ADAPTABILITY  Avoid incorporating any design elements that would make it hard to implement new technologies in the future  Change can come in the form of new protocols, new business practices, new fiscal goals, new legislation  A flexible design can adapt to changing traffic patterns and Quality of Service (QoS) requirements 60 AFFORDABILITY A network should carry the maximum amount of traffic possible for a given financial cost  Affordability is especially important in campus network designs  WANs are expected to cost more, but costs can be reduced with the proper use of technology  Quiet routing protocols, for example 61 MAKING TRADEOFFS (EXAMPLE)  Scalability  Availability  Network performance  Security  Manageability  Usability  Adaptability  Affordability Total (must add up to 100) 20 30 15 5 5 5 5 15 100 62 SUMMARY  Continue to use a systematic, top-down approach  Don’t select products until you understand goals for scalability, availability, performance, security, manageability, usability, adaptability, and affordability  Tradeoffs are almost always necessary 63 REVIEW QUESTIONS  What are some typical technical goals for organizations today?  How do bandwidth and throughput differ?  How can one improve network efficiency?  What tradeoffs may be necessary in order to improve network efficiency? 64 CHAPTER THREE CHARACTERIZING THE EXISTING INTERNETWORK 65 Copyright 2010 Cisco Press & Priscilla Oppenheimer WHAT’S THE STARTING POINT?  According  to Abraham Lincoln: “If we could first know where we are and whither we are tending, we could better judge what to do and how to do it.” 66 WHERE ARE WE?  Characterize the exiting internetwork in terms of:  Its infrastructure Logical structure (modularity, hierarchy, topology)  Physical structure  Addressing and naming  Wiring and media  Architectural and environmental constraints  Health  67 DIAGRAM A PHYSICAL NETWORK AND DOCUMENT THE EXISTING NETWORK Network documentation:  Logical and physical diagrams  Floor plans  Complete lists for equipments and applications  Current network configuration files GET A NETWORK MAP (PHYSICAL) Medford Fast Ethernet 50 users Roseburg Fast Ethernet 30 users Frame Relay CIR = 56 Kbps DLCI = 5 Frame Relay CIR = 56 Kbps DLCI = 4 Grants Pass HQ Gigabit Ethernet Gigabit Ethernet Grants Pass HQ Fast Ethernet 75 users FEP (Front End Processor) IBM Mainframe T1 Web/FTP server Eugene Ethernet 20 users T1 Internet 69 DIAGRAM A PHYSICAL NETWORK AND DOCUMENT THE EXISTING NETWORK  Identify and document the strengths and weaknesses of the existing network  Focus on finding ways to overcome weaknesses 71 CHARACTERIZE ADDRESSING NAMING AND  IP addressing for major devices, client networks, server networks, and so on  Any addressing oddities, such as discontiguous subnets?  Any strategies for addressing and naming?  For example, sites may be named using airport codes San Francisco = SFO, Oakland = OAK  In LSBU, T-tower block; K-keyworth building; BBorough road building; L- london road building  72 DISCONTINUOUS SUBNETS – make problems for some routing protocols Area 0 Network 192.168.49.0 Router A Area 1 Subnets 10.108.16.0 10.108.31.0 Router B Area 2 Subnets 10.108.32.0 10.108.47.0 73 CHARACTERIZE THE WIRING AND MEDIA  Single-mode fiber  Multi-mode fiber  Shielded twisted pair (STP) copper  Unshielded-twisted-pair (UTP) copper  Coaxial cable  Microwave  Laser  Radio  Infra-red 74 ARCHITECTURAL CONSTRAINTS  Make       sure the following are sufficient Air conditioning Heating Ventilation Power Protection from electromagnetic interference Doors that can lock 75 ARCHITECTURAL CONSTRAINTS  Make sure there’s space for: Cabling conduits  Patch panels  Equipment racks  Work areas for technicians installing and troubleshooting equipment  76 77 CHECK THE HEALTH OF THE EXISTING INTERNETWORK  Performance  Availability  Bandwidth utilization  Accuracy  Efficiency  Response time  Status of major routers, switches, and firewalls 78 CHARACTERIZE AVAILABILITY MTBF MTTR Date and Duration of Last Major Downtime Cause of Last Major Downtime Fix for Last Major Downtime Enterprise Segment 1 Segment 2 Segment n Mean time between failures (MTBF) Mean time to recovery (MTTR) 79 NETWORK UTILIZATION IN MINUTE INTERVALS Network Utilization 16:40:00 16:43:00 16:46:00 16:49:00 Time 16:52:00 16:55:00 Series1 16:58:00 17:01:00 17:04:00 17:07:00 17:10:00 0 1 2 3 4 Utilization 5 6 7 80 NETWORK UTILIZATION IN HOUR INTERVALS Network Utilization 13:00:00 Time 14:00:00 15:00:00 Series1 16:00:00 17:00:00 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 Utilization 81 BANDWIDTH UTILIZATION BY PROTOCOL Relative Network Utilization Absolute Network Utilization Broadcast Rate Multicast Rate Protocol 1 Protocol 2 Protocol 3 Protocol n 82 CHARACTERIZE PACKET SIZES 83 CHARACTERIZE RESPONSE TIME Node A Node A Node B Node C Node D Node B Node C Node D X X X X 84 CHECK THE STATUS OF MAJOR ROUTERS, SWITCHES, AND FIREWALLS  show buffers  show environment  show interfaces  show memory  show processes  show running-config  show version Use Cisco IOS show command 85 TOOLS  Protocol analyzers  Multi Router Traffic Grapher (MRTG)  Remote monitoring (RMON) probes  Cisco Discovery Protocol (CDP)  Cisco IOS NetFlow technology  CiscoWorks 86 SUMMARY  Characterize the exiting internetwork before designing enhancements  Helps you verify that a customer’s design goals are realistic  Helps you locate where new equipment will go  Helps you cover yourself if the new network has problems due to unresolved problems in the old network 87 REVIEW QUESTIONS  What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements?  When considering protocol behavior, what is the difference between relative network utilization and absolute network utilization?  Why should you characterize the logical structure of an internetwork and not just the physical structure?  What architectural and environmental factors should you consider for a new wireless 88 installation? CHAPTER FOUR CHARACTERIZING NETWORK TRAFFIC 89 Copyright 2010 Cisco Press & Priscilla Oppenheimer NETWORK TRAFFIC FACTORS  Traffic flow  Location of traffic sources and data stores  Traffic load  Traffic behavior  Quality of Service (QoS) requirements 90 USER COMMUNITIES, a set of worker who use a particular application or set of applications. User Community Name Size of Community (Number of Users) Location(s) of Community Application(s) Used by Community 91 DATA STORES (SINKS), an area in a network where application layer data resides. Server, or any device where large quantities of data are stored. Data Store Location Application(s) Used by User Community(or Communities) 92 TRAFFIC FLOW, involves identifying and characterizing individual traffic flows between traffic source and stores. Destination 1 MB/sec Destination 2 MB/sec Destination 3 MB/sec Destination MB/sec Source 1 Source 2 Source 3 Source n 93 TRAFFIC FLOW EXAMPLE App 2 App 3 App 4 App 9 Total 20 96 24 80 220 Library and Computing Center 30 Library Patrons (PCs) 30 Macs and 60 PCs in Computing Center Server Farm Kbps Kbps Kbps Kbps Kbps 10-Mbps Metro Ethernet to Internet App 1 App 2 App 3 App 4 App 7 Total 108 60 192 48 400 808 25 Macs 50 PCs 50 PCs Arts and Humanities Administration App 1 App 2 App 3 App 4 Total 30 PCs Business and Social Sciences Kbps Kbps Kbps Kbps Kbps Kbps 30 20 60 16 126 Kbps Kbps Kbps Kbps Kbps App 1 48 Kbps App 2 32 Kbps App 3 96 Kbps App 4 24 Kbps App 5 300 Kbps App 6 200 Kbps App 8 1200 Kbps Total 1900 Kbps Math and Sciences 50 PCs 94 TYPES OF TRAFFIC FLOW  Terminal/host  Client/server  Thin client  Peer-to-peer  Server/server  Distributed computing 95 TRAFFIC FLOW FOR VOICE OVER IP  The flow associated with transmitting the audio voice is separate from the flows associated with call setup and teardown.   The flow for transmitting the digital voice is essentially peer-to-peer. Call setup and teardown is a client/server flow  A phone needs to talk to a server or phone switch that understands phone numbers, IP addresses, capabilities negotiation, and so on. 96 IDENTIFYING APPLICATION IMPACTS ON NETWORK DESIGN File transfer and email applications:  Unpredictable bandwidth usage  Large packet size  Centralization of file and mail servers in a secure location  Redundancy to ensure reliable service IDENTIFYING APPLICATION IMPACTS ON NETWORK DESIGN HTTP and web traffic:  Network media  Redundancy  Security NETWORK APPLICATIONS TRAFFIC CHARACTERISTICS Name of Type of Application Traffic Flow Protocol(s) Used by Application User Communities That Use the Application Data Stores Approximate (Servers, Hosts, Bandwidth and so on) Requirements QoS Requirements 99 TRAFFIC LOAD  To calculate whether capacity is sufficient, you should know:    The number of stations The average time that a station is idle between sending frames The time required to transmit a message once medium access is gained  That level of detailed information can be hard to gather, however 100 SIZE OF OBJECTS ON NETWORKS  Terminal screen: 4 Kbytes  Simple e-mail: 10 Kbytes  Simple web page: 50 Kbytes  High-quality image: 50Mbytes  Database backup: 1Gbytes or more 101 TRAFFIC BEHAVIOR  Broadcasts  All ones data-link layer destination address  FF: FF: FF: FF: FF: FF Doesn’t necessarily use huge amounts of bandwidth  But does disturb every CPU in the broadcast domain   Multicasts  First bit sent is a one  01:00:0C:CC:CC:CC (Cisco Discovery Protocol) Should just disturb NICs that have registered to receive it  Requires multicast routing protocol on internetworks  102 NETWORK EFFICIENCY  Frame size  Protocol interaction  Windowing and flow control  Error-recovery mechanisms 103 QOS REQUIREMENTS  ATM       service specifications Constant bit rate (CBR) Realtime variable bit rate (rt-VBR) Non-realtime variable bit rate (nrt-VBR) Unspecified bit rate (UBR) Available bit rate (ABR) Guaranteed frame rate (GFR) 104 QOS REQUIREMENTS PER IETF (Internet Engineering Task Force, develops and promotes Internet standards, It is an open standards organization, with no formal membership or membership requirements.)  IETF integrated services working group specifications  Controlled load service   Provides client data flow with a QoS closely approximating the QoS that same flow would receive on an unloaded network Guaranteed service  Provides firm (mathematically provable) bounds on end-to-end packet-queuing delays 105 QOS REQUIREMENTS PER IETF  IETF differentiated services working group specifications   RFC 2475 IP packets can be marked with a differentiated services codepoint (DSCP) to influence queuing and packet-dropping decisions for IP datagrams on an output interface of a router 106 HOW QUALITY OF SERVICE IS IMPLEMENTED ON THE LAN/WAN Where QoS can be implemented to affect traffic flow:  Layer 2 devices  Layer 3 devices DOCUMENT THE NETWORK REQUIREMENTS OF SPECIFIC CATEGORIES OF APPLICATIONS  Estimate the volume of application traffic during the initial design phase.  Document projected applications and associated hardware in a network diagram. SUMMARY  Continue to use a systematic, top-down approach  Don’t select products until you understand network traffic in terms of: Flow  Load  Behavior  QoS requirements  109 REVIEW QUESTIONS  List and describe six different types of traffic flows.  What makes traffic flow in voice over IP networks challenging to characterize and plan for?  Why should you be concerned about broadcast traffic?  How do ATM and IETF specifications for QoS differ? 110 OF PART 1 111
 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                            