p\  ^w:8zuߞ7lo̸KƆlBaH܃Sc~:^f伛B72n4)pRg7}C!n|3rYz=ۣܳ0B[ ]4)8^6TQ%BȰ w9kalҐkkE0$+e%/lJ<lnkOfB >02ɺJ->}JV각-H;FsI=;AjHt\Jpu-ԓwo_goKoҭUN!T;cNΗ 3Ac: ,YO߽Ͳ;TGY qD>Lzߦ}|EQPRB(6if'6A-!3[ 1)? ߀t5WVRxM{-|CQbcxٜW~kߝ ل _QWu*,xw"I UYy%YeHPOk1c') 1) j\:1=ضCS ~+s%>(ȶHɜ+_.ȧr! L`mp,,+8&Va]OBXݨ@IdPniBunS謯8\L%w4urّD%-{U62̚\ߔ:B1O;8 M$@;[:2sFk*˚^o:Jd] R4/XL"n 3] -睎M)s)v:sշAh N>fb`NMp&T?'3d HSPҀvì`}U|]=K?CIh$(>]Oh5gw:smc1҅!isDIGa]4*S hUQ7g)zͧegPVZ@_!&w:C1^aK_tНYJ7+v-4 5f JI~^Nr3xMWqMt\X]OCwT#) SC=Y0;({'  8BZ&h(=(e)1=$6ηV b!+Q* fTv+[ߵ?c6špxyr_^$2^`0\y'*|Ls4VXٗJ?(c#kłQX p ĸ%jMo\eȓ+5PgM*O%ޱ}W|H:]wF"㢊shS3[ƾMdZo=⤆(Lp]`P]ցe֓| ˌzBЊH锯Ais(yZH38[9? n/ &~mftwRdE= pן̊2Q=<=On 琢KKjj My[Q:'PR; S ɷ4E1U3THWEt `ԙU[%z +QW[E ;mGP称('@{a.s[442$Wk_5i{U P(gIJB\&?{f|TP!Y: Օ2.SiޅΡϞ2c}x~axsO ##'<iQc+!|A禠cNN%a?VT@sM]/TKعL({3@7{wpI(v˙)q>{'p;ۨ0FT-BF@ )|B^7Ւs 7PHJfQi̡D gsv~|ٰo`VZu,rDwrߦr uл%g.J밻; 6ܛԃaԷ{6`z@ldD<1`lpt 7_Q6@>3 Y"HN@4IR_70~+E_&"hS>;9\,s*2DR;@ahԻnj?{4lh9Kzid4@Fm bxhK/o$4Qj;{8a$T;(3vrY)Lׄ@saw78|GFeqvV%9L+3w/;~Wˍm@oLAY=PS+zmVT?ߠot^Y L&P%gRg\̋ Py9Pޤ ~ 섍>=Io=`sVOyo9լӯ'w* 3,/q;@*#LVr(EttCuF${n㒝򁱪L;hǖ:9 +YX˅);2d ^7!A23+YrrJ6 ypvA 6ќ0Qykp@r8Pz:dž(fan48%a3>:/VT$q~xX#۱Q4Ԧ &1+p13(yaz E/uvD:ަ"hUyLĺW >IT>ap9']_BLVS+OLOQێt۾ FJA砐mڼ6lP?Po:_,)'Vٳ7Y58: CV#VK;w Poetry of Cecil County, Maryland Author: Various Release Date: May 21, 2004 [EBook #12402] Language: English Character set encoding: ISO-8859-1 *** START OF THIS PROJECT GUTENBERG EBOOK POETS AND POETRY *** Produced by Ben Beasley and PG Distributed Proofreaders

The Poets and Poetry of Cecil County, Maryland


Collected and Edited by George Johnston, Author of The History of Cecil County.


A verse may finde him whom a sermon flies,
And turn delight into a sacrifice.

—Herbert.


Elkton, MD:
Published by the Editor.

1887


Entered according to Act of Congress, in the year 1887, by
George Johnston,
In the Office of the Librarian of Congress, at Washington, D.C.


Preface.

This volume owes its existence to the desire of some of the teachers and pupils of the public schools in the northeastern part of Cecil county, to do honor to the memory of the late School Commissioner David Scott. Shortly after Mr. Scott’s death, some of the parties referred to, proposed to collect enough money by voluntary contributions to erect a monument over his grave, in order to perpetuate his memory, and also to show the high regard in which he was held by them. This project being brought to the knowledge of the editor, he ventured to express the opinion that the best monument Mr. Scott could have, would be the collection and publication of his poems in book form. This suggestion met the approbation of the originators of the project, who asked the writer to undertake the work of collecting the poems and editing the book. Subsequent investigation showed that Mr. Scott had not left enough poems to justify their publication in a volume by themselves; and the original plan of the work was changed, so as to include, so far as it has been practicable to do so, the writings of all the native poets of the county, and those who though not natives, have resided and written in it.

Owing to causes not necessary to state it was impracticable, in some cases, to make as creditable a selection as could have been made had it been possible to have had access to all the poetry of the different writers. In a few instances the book contains all the poetry of the different writers that it has been practicable to obtain. Herein, it is hoped, will be found sufficient apology, if any apology is needed, for the character of some of the matter in the book.

If any apology is needed for the prominence given to the poems of David Scott (of John.) it may be found in the foregoing statement concerning the origin of the book; and in the fact, that, for more than a quarter of a century, the editor was probably his most intimate friend. So intimate indeed were the relations between Mr. Scott and the writer, that the latter had the pleasure of reading many of his friend’s poems before they were published. The same may be said in a more extended sense, of the poems of David Scott (of James) to whose example and teaching, as well as to that of the other Mr. Scott—for he was a pupil of each of them—the writer owes much of whatever literary ability he may possess.

The editor is also on terms of intimacy with many of the other contemporary writers whose poetry appears in the book, and has striven to do justice to their literary ability, by the selection of such of their poems as are best calculated, in his opinion, to do credit to them, without offending the taste of the most fastidious readers of the book.

From the foregoing statement it will be apparent that the object of the editor was not to produce a book of poetical jems, but only to select the poems best adapted to the exemplification of the diversified talents of their authors. The work has been a labor of love; and though conscious that it has been imperfectly performed, the compiler ventures to express the hope that it will be received by a generous and discriminating public, in the same spirit in which it was done.

Editorial Notes.

It is a remarkable fact that all the native poets of Cecil county except one or two were born in the northern part of it, and within about eight miles of the boundary line between Maryland and Pennsylvania. What effect, if any, the pure atmosphere and picturesque scenery of the country along the banks and romantic hills of the Susquehanna and Octoraro may have had to do with producing or developing poetical genius, cannot be told; but nevertheless it is a fact, that William P., and Edwin E. Ewing, Emma Alice Browne, Alice Coale Simpers, John M. Cooley and Rachel E. Patterson were born and wrote much of their poetry, as did also Mrs. Caroline Hall, in that beautifully diversified and lovely section of the county.

It is also worthy of note that Tobias and Zebulon Rudulph were brothers, as are also William P. and Edwin E. Ewing; and that Mrs. Caroline Hall was of the same family; and that Folger McKinsey and William J. Jones are cousins, as are also Mrs. James McCormick and Mrs. Frank J. Darlington, and Emma Alice Browne and George Johnston.

Owing to the fact that the size of the book was necessarily limited by the price of it; and to the fact that the poems of three of the writers were not obtained until after a large part of the book had been printed, it was impossible to give some of the writers, whose proper places were in the latter part of the book, as much space as was desirable. For the reason just stated, the editor was compelled to omit a large number of excellent poems, written by David Scott (of James,) and others.

Contents.

David Scott (of John.)

Emma Alice Browne.

Nathan Covington Brooks.

John Marchborn Cooley.

George Washington Cruikshank.

  • tuples in the vacmSecurityToGroupTable does not take securityLevel into account. It is therefore important that the security administrator uses the securityLevel index in the vacmAccessTable to separate noAuthNoPriv from authPriv and/or authNoPriv access. 7.3. Conformance For an implementation of the View-based Access Control Model to be conformant, it MUST implement the SNMP-VIEW-BASED-ACM-MIB according to the vacmMIBCompliance. It also SHOULD implement the initial configuration, described in appendix A. 7.4. Access to the SNMP-VIEW-BASED-ACM-MIB The objects in this MIB control the access to all MIB data that is accessible via the SNMP engine and they may be considered sensitive in many environments. It is important to closely control (both read and write) access to these to these MIB objects by using appropriately configured Access Control models (for example the View-based Access Control Model as specified in this document). Wijnen, et al. [Page 30] Internet-Draft VACM for SNMP nov 2001 8. References [RFC2578] McCloghrie, K., Perkins, D. and J. Schoenwaelder, "Structure of Management Information Version 2 (SMIv2)", STD 58, RFC 2578, April 1999. [RFC2579] McCloghrie, K., Perkins, D. and J. Schoenwaelder, "Textual Conventions for SMIv2", STD 58, RFC 2579, April 1999. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC-ARCH] Harrington, D., Presuhn, R. and B. Wijnen, "An Architecture for describing SNMP Management Frameworks", , October 2001. [SNMP-MPD] Case, J., Harrington, D., Presuhn, R. and B. Wijnen, "Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)", , October 2001. [RFC-USM] Blumenthal, U. and B. Wijnen, "User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)", , November 2001 [ISO-ASN.1] Information processing systems - Open Systems Interconnection - Specification of Abstract Syntax Notation One (ASN.1), International Organization for Standardization. International Standard 8824, (December, 1987). Wijnen, et al. [Page 31] Internet-Draft VACM for SNMP nov 2001 9. Editors' Addresses Bert Wijnen Lucent Technologies Schagen 33 3461 GL Linschoten Netherlands Phone: +31-348-480-685 EMail: bwijnen@lucent.com Randy Presuhn BMC Software, Inc 965 Stewart Drive Sunnyvale, CA 94086 USA Phone: +1-408-616-3100 EMail: randy_presuhn@bmc.com Keith McCloghrie Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA Phone: +1-408-526-5260 EMail: kzm@cisco.com Wijnen, et al. [Page 32] Internet-Draft VACM for SNMP nov 2001 APPENDIX A - Installation A.1. Installation Parameters During installation, an authoritative SNMP engine which supports this View-based Access Control Model SHOULD be configured with several initial parameters. These include for the View-based Access Control Model: 1) A security configuration The choice of security configuration determines if initial configuration is implemented and if so how. One of three possible choices is selected: - initial-minimum-security-configuration - initial-semi-security-configuration - initial-no-access-configuration In the case of a initial-no-access-configuration, there is no initial configuration, and so the following steps are irrelevant. 2) A default context One entry in the vacmContextTable with a contextName of "" (the empty string), representing the default context. Note that this table gets created automatically if a default context exists. vacmContextName "" 3) An initial group One entry in the vacmSecurityToGroupTable to allow access to group "initial". vacmSecurityModel 3 (USM) vacmSecurityName "initial" vacmGroupName "initial" vacmSecurityToGroupStorageType anyValidStorageType vacmSecurityToGroupStatus active Wijnen, et al. [Page 33] Internet-Draft VACM for SNMP nov 2001 4) Initial access rights Three entries in the vacmAccessTable as follows: - read-notify access for securityModel USM, securityLevel "noAuthNoPriv" on behalf of securityNames that belong to the group "initial" to the MIB view in the default context with contextName "". - read-write-notify access for securityModel USM, securityLevel "authNoPriv" on behalf of securityNames that belong to the group "initial" to the MIB view in the default context with contextName "". - if privacy is supported, read-write-notify access for securityModel USM, securityLevel "authPriv" on behalf of securityNames that belong to the group "initial" to the MIB view in the default context with contextName "". That translates into the following entries in the vacmAccessTable. - One entry to be used for unauthenticated access (noAuthNoPriv): vacmGroupName "initial" vacmAccessContextPrefix "" vacmAccessSecurityModel 3 (USM) vacmAccessSecurityLevel noAuthNoPriv vacmAccessContextMatch exact vacmAccessReadViewName "restricted" vacmAccessWriteViewName "" vacmAccessNotifyViewName "restricted" vacmAccessStorageType anyValidStorageType vacmAccessStatus active - One entry to be used for authenticated access (authNoPriv) with optional privacy (authPriv): vacmGroupName "initial" vacmAccessContextPrefix "" vacmAccessSecurityModel 3 (USM) vacmAccessSecurityLevel authNoPriv vacmAccessContextMatch exact vacmAccessReadViewName "internet" vacmAccessWriteViewName "internet" vacmAccessNotifyViewName "internet" vacmAccessStorageType anyValidStorageType vacmAccessStatus active Wijnen, et al. [Page 34] Internet-Draft VACM for SNMP nov 2001 5) Two MIB views, of which the second one depends on the security configuration. - One view, the view, for authenticated access: - the MIB view is the following subtree: "internet" (subtree 1.3.6.1) - A second view, the view, for unauthenticated access. This view is configured according to the selected security configuration: - For the initial-no-access-configuration there is no default initial configuration, so no MIB views are pre-scribed. - For the initial-semi-secure-configuration: the MIB view is the union of these subtrees: (a) "system" (subtree 1.3.6.1.2.1.1) [RFC-MIB] (b) "snmp" (subtree 1.3.6.1.2.1.11) [RFC-MIB] (c) "snmpEngine" (subtree 1.3.6.1.6.3.10.2.1) [RFC-ARCH] (d) "snmpMPDStats" (subtree 1.3.6.1.6.3.11.2.1) [RFC-MPD] (e) "usmStats" (subtree 1.3.6.1.6.3.15.1.1) [RFC-USM] - For the initial-minimum-secure-configuration: the MIB view is the following subtree. "internet" (subtree 1.3.6.1) This translates into the following "internet" entry in the vacmViewTreeFamilyTable: minimum-secure semi-secure ---------------- --------------- vacmViewTreeFamilyViewName "internet" "internet" vacmViewTreeFamilySubtree 1.3.6.1 1.3.6.1 vacmViewTreeFamilyMask "" "" vacmViewTreeFamilyType 1 (included) 1 (included) vacmViewTreeFamilyStorageType anyValidStorageType anyValidStorageType vacmViewTreeFamilyStatus active active Wijnen, et al. [Page 35] Internet-Draft VACM for SNMP nov 2001 In addition it translates into the following "restricted" entries in the vacmViewTreeFamilyTable: minimum-secure semi-secure ---------------- --------------- vacmViewTreeFamilyViewName "restricted" "restricted" vacmViewTreeFamilySubtree 1.3.6.1 1.3.6.1.2.1.1 vacmViewTreeFamilyMask "" "" vacmViewTreeFamilyType 1 (included) 1 (included) vacmViewTreeFamilyStorageType anyValidStorageType anyValidStorageType vacmViewTreeFamilyStatus active active vacmViewTreeFamilyViewName "restricted" vacmViewTreeFamilySubtree 1.3.6.1.2.1.11 vacmViewTreeFamilyMask "" vacmViewTreeFamilyType 1 (included) vacmViewTreeFamilyStorageType anyValidStorageType vacmViewTreeFamilyStatus active vacmViewTreeFamilyViewName "restricted" vacmViewTreeFamilySubtree 1.3.6.1.6.3.10.2.1 vacmViewTreeFamilyMask "" vacmViewTreeFamilyType 1 (included) vacmViewTreeFamilyStorageType anyValidStorageType vacmViewTreeFamilyStatus active vacmViewTreeFamilyViewName "restricted" vacmViewTreeFamilySubtree 1.3.6.1.6.3.11.2.1 vacmViewTreeFamilyMask "" vacmViewTreeFamilyType 1 (included) vacmViewTreeFamilyStorageType anyValidStorageType vacmViewTreeFamilyStatus active vacmViewTreeFamilyViewName "restricted" vacmViewTreeFamilySubtree 1.3.6.1.6.3.15.1.1 vacmViewTreeFamilyMask "" vacmViewTreeFamilyType 1 (included) vacmViewTreeFamilyStorageType anyValidStorageType vacmViewTreeFamilyStatus active Wijnen, et al. [Page 36] Internet-Draft VACM for SNMP nov 2001 B. Change Log Changes made since RFC2575: - Removed reference from abstract as per RFC-Editor guidelines - Updated references Changes made since RFC2275: - Added text to vacmSecurityToGroupStatus DESCRIPTION clause to clarify under which conditions an entry in the vacmSecurityToGroupTable can be made active. - Added REVISION clauses to MODULE-IDENTITY - Clarified text in vacmAccessTable DESCRIPTION clause. - Added a DEFVAL clause to vacmAccessContextMatch object. - Added missing columns in Appendix A and re-arranged for clarity. - Fixed oids in appendix A. - Use the PDU Class terminology instead of RFC1905 PDU types. - Added section 7.4 about access control to the MIB. - Fixed references to new/revised documents - Fix Editor contact information. - fixed spelling errors - removed one vacmAccesEntry from sample in appendix A. - made some more clarifications. - updated acknowledgement section. Wijnen, et al. [Page 37] Internet-Draft VACM for SNMP nov 2001 C. Full Copyright Statement Copyright (C) The Internet Society (2001). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR ARLITYt Wijnen, et al. [Page 38] anion, a friend and a poet that he was best known among the people of his neighborhood, to which his genial character and kind and amiable disposition greatly endeared him.

    Mr. Scott began to write poetry when about twenty-one years of age, and continued to do so, though sometimes at long intervals, until a short time before his death. His early poems were printed in “The Cecil Whig,” but being published anonymously cannot be identified. Like many others, he did not preserve his writings, and a few of his best poems have been lost. Of his poetic ability and religious belief, we do not care to speak, but prefer that the reader should form his own judgment of them from the data derived from a perusal of his poems.

    In 1844, Mr. Scott married Miss Agatha R. Fulton, a most estimable lady, who, with their son Howard Scott and daughter Miss Annie Mary Scott, survive him.

    In conclusion, the editor thinks it not improper to say that he enjoyed the pleasure of Mr. Scott’s intimate friendship for nearly thirty years, and esteemed him as his best and most intimate friend. And that while his friend was only mortal, and subject to mortal frailities, he had a kind and generous heart; a soul which shrank from even the semblance of meanness, and was the embodiment of every trait which ennobles and elevates humanity.

    Lines

    Suggested by the Singing of a Bird Early in March, 1868.

    Sing on, sweet feathered warbler, sing!
    Mount higher on thy joyous wing,
    And let thy morning anthem ring
    Full on my ear;
    Thou art the only sign of spring
    I see or hear.

    The earth is buried deep in snow;
    The muffled streams refuse to flow,
    The rattling mill can scarcely go,
    For ice and frost:
    The beauty of the vale below
    In death is lost.

    Save thine, no note of joy is heard—
    Thy kindred songsters of the wood
    Have long since gone, and thou, sweet bird,
    Art left behind—
    A faithful friend, whose every word
    Is sweet and kind.

    But Spring will come, as thou wilt see,
    With blooming flower and budding tree,
    And song of bird and hum of bee
    Their charms to lend;
    But I will cherish none like thee,
    My constant friend.

    Like the dear friends who ne’er forsake me—
    Whatever sorrows overtake me—
    In spite of all my faults which make me
    Myself detest,
    They still cling to and kindly take me
    Unto their breast.

    An Eastern Tale

    Addressed to Mrs. S.C. Choate.

    A Persian lady we’re informed—
    This happened long, long years before
    The Christian era ever dawned,
    A thousand years, it may be more,
    The date and narrative are so obscure,
    I have to guess some things that should be sure.

    I’m puzzled with this history,
    And rue that I began the tale;
    It seems a kind of mystery—
    I’m very much afraid I’ll fail,
    For want of facts of the sensation kind:
    I therefore dwell upon the few I find.

    I like voluminous writing best,
    That gives the facts dress’d up in style.
    A handsome woman when she’s dressed
    Looks better than (repress that smile)
    When she in plainer costume does appear;
    The more it costs we know she is more dear.

    The story is a Grecian one,
    The author’s name I cannot tell;
    Perhaps it was old Xenophon
    Or Aristotle, I can’t dwell
    On trifles; perhaps Plutarch wrote the story:
    At any rate its years have made it hoary.

    The Greeks were famous in those days
    In arts, in letters and in arms;
    Quite plain and simple in their ways;
    With their own hands they tilled their farms;
    Some dressed the vine, some plow’d the ocean’s wave;
    Some wrote, were orators, or teachers grave.

    They were Republicans, in fact;
    The Persians might have called them “black
    Republicans;” they never lacked
    The power to beat a foeman back.
    Thermopylæ, so famed in Grecian story
    Is but another name for martial glory.

    A busy hive to work or fight,
    Like our New England bold and strong;
    A little frantic for the right,
    As sternly set against the wrong;
    And when for right they drew the sword, we know,
    Stopped not to count the number of the foe.

    To me it is a painful sight
    To see a nation great and good
    Reduced to such a sorry plight,
    And courtiers crawl where freemen stood,
    And king and priests combine to seize the spoil,
    While widows weep and beggar’d yeomen toil.

    The philosophic mind might dwell
    Upon this subject for an age:
    The philanthropic heart might swell
    Till tears as ink would wet the page;
    The mystery, a myst’ry will remain—
    The learning of the learned cannot explain.

    The Persians were a gaudy race,
    Much giv’n to dress and grand display;
    I’m grieved to note this is the case
    With other people at this day;
    And folks are judged of from outside attractions,
    Instead of from good sense and genteel actions.

    The dame in question was a type
    Of all her class; handsome and rich
    And proud, of course, and flashing like
    A starry constellation, which
    She was, in fact a moving mass of light
    From jewels which outshone the stars at night.

    The tale is somewhat out of joint—
    I’m not much given to complain;
    ’Tis in a most essential point
    A blank; I’ve read it oft in vain
    To find one syllable about her size,
    The color of her hair, or of her eyes.

    Or whether she was short or tall,
    Or if she sung or play’d with grace,
    If she wore hoops or waterfall
    I cannot find a single trace
    Of proof; and as I like to be precise,
    My disappointment equals my surprise.

    This Persian belle; (confound the belle)
    Excuse me, please; I won’t be rude;
    She’s in my way, so I can’t tell
    My tale, so much does she intrude;
    I wish I knew her age, and whether she
    Was single, married, or engaged to be.

    These are important facts to know,
    I wonder how they slipped the pen
    Of him who wrote the story, so
    I wonder at the taste of men
    Who wrote for future ages thus to spoil
    A tale to save time, paper, ink or oil.

    Our Persian lady, as I said,
    Decked out in costly jewels rare,
    A visit to a Grecian made—
    A lady of great worth, and fair
    To look upon, of great domestic merit
    Which from a noble race she did inherit.

    Puffed up with vanity and pride,
    The Persian flashing like a gem,
    Displayed her brilliants, glittering wide;
    The Grecian coldly looked at them:
    “Have you no jewelry at all, to wear?
    Your dress and person look so poor and bare.”

    She called her children to her side,
    Seven stalwart sons of martial mien;
    “These are my jewels,” she replied,
    “I’m richer far than you, I ween:
    These are the glory and the strength of Greece,
    Which all the gems on earth would not increase,”

    Let others shine in diamonds bright,
    Or hoard their greenbacks, bonds or gold,
    You have your jewels in your sight,
    And hearing, like the matron old;
    And should they still continue to increase,
    You’ll beat the model mother of old Greece.

    Then hail Columbia, happy land!
    While California yields her ore,
    May you increase your jewel band,
    By adding every year one more;
    And when you’re asked your jewels to display.
    Point to your score of sons saying “these are they.”

    The Market-Man’s License,

    Or The Farmer’s Appeal From a Jackass to the Mayor.

    The following poem grew out of a misunderstanding between Mr. Scott and the clerk of the Wilmington market. In the winter of 1868, Mr. Scott was in the habit of selling hominy in the market, and the clerk treated him rudely and caused him to leave his usual stand and remove to another one. From this arbitrary exercise of power Mr. Scott appealed to the Mayor, who reinstated him in his old place. Mr. Scott soon afterwards had several hundred of the poems printed and scattered them throughout the market. In an introductory note he says, “the lines referring to Mayor Valentine are intended as a compliment to that officer, as well as a play on his official title of Mayor.”

    I’ve horses seen of noble blood,
    And stopped to gaze and stare:
    But ne’er before to-day I stood
    In presence of a Mayor.

    I’ve talked with rulers, in and ex,
    With working man and boss;
    Mayor Valentine! they you unsex—
    You surely are a horse.

    For every blooded horse one meets,
    Or clever mare he passes,
    He finds in all the city streets
    A score of brainless asses.

    A Jackass, in the days of old,
    Dress’d in a lion’s skin,
    Went forth to ape the lion bold,
    And raised a mighty din:

    His ass-ship’s ears he could not hide;
    His roaring would not pass;
    The startled beasts his ears descried,
    And recognized the ass.

    The moral of this tale you’ll meet
    Each market day in town,
    With scales in hand, in Market street,
    Dress’d in the lion’s gown:

    He roars, ’tis true, but scan him well
    Whene’er you see him pass;
    Look at his ears and you can tell
    He’s but a braying ass.

    Lines

    On the death of Mrs. Elizabeth Scott.

    Ransom’d spirit, spread thy wings,
    Leave thy broken house of clay;
    Soar from earth and earthly things,
    To the realms of endless day.

    Weary pilgrim, take thy rest,
    Thine has been a tiresome road;
    Aching head and tortur’d breast,
    Added to thy galling load.

    Patient sufferer, dry thy tears,
    All thy sorrows now are o’er;
    Foes without, or inward fears,
    Never can afflict thee more.

    Faithful soldier of the cross,
    All thy conflicts now are done;
    Earthly triumphs are but loss,
    Thine is an immortal one.

    Palms of vict’ry thou shall bear,
    And a crown of fadeless light
    Will be given thee to wear,
    And a robe of spotless white.

    Thou shalt join the countless throng,
    Which, through tribulation, came:
    And repeat the angels’ song—
    “Worthy! worthy is His name

    Who hath conquered death and hell;
    Captive led captivity;
    Always doing, all things well;
    Giving us the victory!”

    My Schoolboy Days.

    The following poem was read at the forty-fifth anniversary of the marriage of Mr. and Mrs. James Swaney, on January 11th, 1883. Mr. and Mrs. Swaney’s residence is not far from the site of the school house where Mr. Scott first went to school.

    Dear friends and neighbors, one and all,
    I’m pleased to meet you here;
    ’Tis fit that we should make this call
    Thus early in the year.

    That time flies rapidly along,
    And hurries us away,
    Has been the theme of many a song,
    And it is mine to-day.

    I stand where in my childhood’s days,
    I often stood before,
    But nothing meets my altered gaze
    As in the days of yore.

    The trees I climbed in youthful glee,
    Or slept beneath their shade.
    Have disappeared—no trace I see
    Of them upon the glade.

    The school house, too, which stood near by,
    Has long since ceased to be;
    To find its site I often try,
    No trace of it I see.

    The road I traveled to and fro,
    With nimble feet and spry,
    I cannot find, but well I know
    It must have been hard by.

    The pond where skating once I fell
    Upon the ice so hard—
    I lost my senses for a spell,
    And hence became a bard—

    Is dry land now where grain or grass
    Is growing year by year;
    I see the spot, as oft I pass,
    No ice nor pond is there.

    A barn is standing on the spot
    Where once the school house stood;
    A dwelling on the playground lot,
    A cornfield in the wood.

    I mourn not for these altered scenes,
    Although it seems so strange
    That all are changed; I know it means
    That everything must change.

    I mourn the loss of early friends,
    My schoolboy friends so dear;
    I count upon my fingers’ ends
    The few remaining here.

    In early youth some found their graves,
    With friends and kindred by;
    While some beneath the ocean’s waves
    In dreamless slumbers lie;

    While many more, in distant lands,
    No friends nor kindred near,
    Are laid to rest by strangers’ hands,
    Without one friendly tear.

    A few survive, both far and near,
    But O! how changed are they!
    Like the small band assembled here,
    Enfeebled, old, and gray.

    Strange feelings rise within my soul,
    My eyes o’erflow with tears,
    As backward I attempt to roll
    The flood of by-gone years.

    This honored pair we come to greet,
    For five-and-forty years
    Through winter’s cold and summer’s heat,
    Have worn the nuptial gears.

    The heat and burden of the day
    They honestly have borne,
    Until their heads are growing gray,
    Their limbs with toil are worn.

    In all the ups and downs of life—
    Of which they’ve had their share—
    They never knew domestic strife,
    Or, if at all, ’twas rare.

    They now seem standing on the verge
    Of that unfathomed sea,
    Just waiting for the final surge
    That opes eternity.

    When comes that surge, or soon or late,
    May they in peace depart;
    And meet within the shining gate,
    No more to grieve or part.

    The Donation Visit.

    The following poem was read upon the occasion of a donation visit by the Head of Christiana congregation to their pastor, Rev. James I. Vallandigham.

    Fair ladies dear, and gentlemen.
    I thought not to be here to-day:
    But I’m a slave, and therefore, when
    My muse commands, I must obey.

    I’ve struggled hard against her power,
    And dashed her yoke in scorn away,
    And then returned, within an hour,
    And meekly bowed and owned her sway.

    I know the ground on which I stand
    And tremble like an aspen when
    I see around, on every hand,
    Such learned and such gifted men,

    Who really have been to college,
    And know the Latin and the Greek;
    And are so charged with general knowledge
    That it requires no little cheek

    In an obscure and modest bard
    To meet a galaxy so bright,—
    Indeed, I find it rather hard
    To face the music here to-night.

    Dear friends, we’ve met, as it is meet
    That we should meet at such a time,
    Each other and our host to greet,—
    Or guest, ’tis all the same in rhyme.

    No king nor queen do I revere;
    The majesty of God I own.
    An honest man, though poor, is peer
    To him that sits upon a throne.

    I long to see the coming day
    When wicked wars and strifes shall cease,
    And ignorance and crime give way
    Before the march of truth and peace.

    That welcome day is drawing near;
    I sometimes think I see its dawn;
    The trampling of the hosts I hear,
    By science, truth and love led on.

    I see the murderous cannon fused,
    With its death-dealing shot and shell,
    For making railway carwheels used,
    Or civil railway tracks as well.

    And small arms, too, will then be wrought
    Into machines for cutting wheat;
    While those who used them will be taught
    To labor for their bread and meat.

    God speed the day,—’tis bound to come,
    But not as comes the lightning’s stroke;
    But slowly, as the acorn dumb
    Expands into the giant oak.

    Now, reverend sir, I turn to you,
    To say what all your flock well know;
    You, as a pastor kind and true,
    Have led the way we ought to go.

    You have rejoiced in all our joys,
    And sympathised with us in trouble;
    You have baptized our girls and boys—
    And often you have made them double.

    With all your gifts and talents rare,
    You meekly take the servants place,
    And guard the sheep with jealous care
    And hold the lambs in your embrace.

    In all the ups and downs of life
    We’ve found in you a constant friend;
    You’ve counselled peace, discouraged strife,
    And taught us all our ways to mend.

    For eight-and-twenty years you’ve stood
    A watchman on the outer wall;
    Repressing evil, aiding good,
    And kindly watching over all.

    Though age may enervate your frame
    And dim the lustre of your eye,
    No lapse of time can soil your name,
    For names like yours can never die.

    Lines

    On the death of Miss Mary Hayes.

    Another star has left the sky,
    Another flower has ceased to bloom;
    The fairest are the first to die,
    The best go earliest to the tomb.

    That radiant star, whose cheering ray,
    Adorn’d her quiet, rural home,
    Went down, in darkness, at mid-day.
    And left that quiet home in gloom.

    That lovely flower, admired so much,
    In all its loveliness, was lost,
    It withered at the fatal touch
    Of death’s untimely, killing frost.

    The mourners go about the street,
    While children tell their tale of woe
    To every passer-by they meet,
    In faltering accents, faint and low.

    “Dear Mary Hayes is dead,” they say,
    While tears roll down their cheeks like rain,
    “Her eyes are closed, she’s cold as clay,”
    And then their tears gush out again.

    And stalwart men are dumb with grief,
    And sorrow pales the sternest cheek,
    While gentler women find relief,
    In tears—more eloquent than speech.

    Surely there is some fairer land,
    Where friends who love each other here
    Can dwell, united heart and hand,
    Nor death nor separation fear.

    Dear sister, dry thy flowing tears;
    Fond father, raise thy drooping head;
    Kind brothers, banish all your fears;
    Your Mary sleeps—she is not dead,

    The care-worn casket rests in dust,
    The fadeless jewel wings its flight
    To that fair land, we humbly trust,
    To shine with ever glowing light.

    For, on that ever-vernal shore,
    When death’s appalling stream is cross’d,
    Your star will shine forevermore,
    Your flower will bloom, untouch’d by frost.

    Lines

    On the death of Miss Eleanora Henderson.

    She is not dead, but sleepeth.

    —Luke 8:52.

    She is not dead, she’s sleeping
    The dreamless sleep and drear;
    Her friends are gathered weeping
    Round her untimely bier.

    She is not dead, her spirit,
    Too pure to dwell with clay,
    Has gone up to inherit
    The realms of endless day.

    She is not dead, she’s singing
    With angel bands on high;
    On golden harp she’s singing
    God’s praises in the sky.

    She is not dead, O mother,
    Your loss you will deplore;
    Kind sisters and fond brother,
    Your Nora is no more!

    No more, as we have seen her,
    The light and life of home,
    Of christian-like demeanor,
    Which ever brightly shone:

    Of youth the guide and teacher,
    Of age the stay and hope—
    To all a faithful preacher,
    To whom we all looked up.

    She is not dead, she’s sleeping,
    Her loving Saviour said;
    Then friends repress your weeping,
    God’s will must be obeyed.

    She is not dead, she’s shining
    In robes of spotless white;
    Why then are we repining?
    God’s ways are always right.

    She is not dead—O never
    Will sorrow cross her track;
    She’s passed Death’s darksome river,
    And who would have her back?

    Back from the joys of heaven!
    Back from that world of bliss!
    Call back the pure, forgiven,
    To such a world as this?

    A world of grief and anguish—
    A world of sin and strife—
    In which the righteous languish,
    And wickedness is rife,

    She is not dead, she’s shouting,
    Borne on triumphant wing,
    “O grave, where is thy vict’ry,
    O Death, where is thy sting?”

    Lines

    On the death of Mrs. Burnite who died February 2, 1878.

    Thou, my friend, in dust art sleeping,
    Closed thine eyes to all below;
    Round thy grave kind friends are weeping,
    Ling’ring, loath to let thee go.

    Husband fond and children dear,
    Crushed and stricken by the blow,
    Banish ev’ry anxious fear,
    While we lay the lov’d one low.

    For the angel’s trump shall sound,
    And the bands of death will break;
    Then the pris’ner in this mound
    Shall to endless life awake.

    Then the spirit which is gone
    Will return and claim this dust,
    And this “mortal will put on
    Immortality,” we trust.

    When that glorious day shall dawn,
    And the bridegroom shall descend
    With a gorgeous angel throng,
    The glad nuptials to attend,

    Oh, the rapture of that meeting!
    We of earth can never know
    Till we mingle in the greeting,
    Of our lov’d, lost long ago.

    Let me like the righteous die,
    Let my last end be like his;
    When I close, on earth, my eye,
    Let me wake in realms of bliss.

    Stanzas

    Read at the celebration of the Seventy-second Anniversary of the birthday of Joseph Steele, Dec. 13, 1884.

    Dear friends and neighbors, one and all,
    I’m pleased to meet you here to-day;
    ’Tis nice for neighbors thus to call,
    In such a social way.

    We meet to celebrate a day,
    Which people seldom see;
    Time flies so rapidly away
    ’Tis like a dream to me;

    Since I, a lad with flaxen hair
    First met our friend, so gray;
    We both were free from thought and care,
    But full of hope and play.

    Well Joseph Steele, we may be glad
    That we are here to-day,
    Although it makes me somewhat sad
    To think of friends away.

    Of all our schoolboy friends but few
    Alas! can now be found,
    Not many but myself and you
    Are still above the ground.

    I count upon my fingers’ ends
    About the half, I know.
    Of all acquaintances and friends
    With whom we used to go;

    To Humphreys and Montgomery
    To Cochran and to Dance,
    And some, who slip my memory,
    That used to make us prance,

    Whene’er we missed a lesson
    Or placed a crooked pin
    Just where some one would press on
    Enough to drive it in.

    O, it was fun alive, I vow,
    To see that fellow bounce
    And hear him howl and make a row
    And threaten he would trounce

    The boy that did the mischief,
    But that boy was seldom found,
    And so, he had to bear his grief
    And nurse the unseen wound;

    But time and rhyme can never tell
    The half our funny pranks,
    And that we ever learned to spell,
    We ought to render thanks.

    Poor Dance! I always pitied him
    For he was just from college,
    And never having learned to swim,
    Was drowned with all his knowledge.

    Of Cochran, I but little knew,
    He was a stranger here,
    ’Twas always said he would get blue,
    And acted very queer.

    Montgomery I knew right well,
    He was rather kind than cross,
    He taught the willing how to spell,
    And always would be boss.

    He wrote a very pretty hand
    And could command a school:
    His appetite got the command,
    And that he could not rule.

    One day he took a heavy slug
    Of something rather hot;
    He took that something from a jug,
    And shortly he was not.

    Who “took” him, though, I never can
    Nor need I ever say;
    But when the Lord doth take a man,
    ’Tis seldom done that way.

    Poor Humphreys was a sort of crank
    (Folks said his learning made him mad,)
    But this I know, he always drank,
    And that will make the best man, bad.

    Excuse this rather long digression,
    My pen has carried me astray;
    These schoolboy days make an impression
    From which ’tis hard to get away.

    Then let me turn, and return too,
    For I have wandered from my text,—
    Well, Mr. Steele, how do you do?
    I hope you are not vexed.

    ’Tis pleasant in our riper years
    To have our children come
    And bring their children—little dears,
    They make it seem like home.

    An old man’s children are his crown,
    And you may well be proud
    When from your throne you just look down
    Upon this hopeful crowd.

    But now my neighbors dear, adieu;
    “The best of friends must part;”
    I’ll often kindly think of you,
    And treasure each one in my heart;

    And if we never meet again
    On this poor frozen clod,
    O! may we meet to part no more
    Around the throne of God.

    To Mary.

    The following lines suggested by the beautiful story of the sisters, Martha and Mary of Bethany, (Luke, 10:38-42,) were addressed to Miss Mary M., of Wilmington, Del.

    In Bethany there dwelt a maid,
    And she was young and very fair;
    ’Twas at her house that Jesus stayed,
    And loved to stay, when he was there.

    For Mary seated at his feet,
    In rapture hung upon His word:
    His language flow’d in accent sweet,
    Such language mortal never heard.

    Her sister, cross in looks and word,
    (The cares of life have this effect,)
    Came and accused her, to her Lord,
    Of idleness and of neglect.

    “Martha, Martha,” He kindly said,
    Forego thy troubles and thy care—
    One needful thing, a crust of bread,
    Is all I ask with thee to share.

    “Mary hath chosen that good part,
    To hear my word and do my will,
    Which shall not from her trusting heart
    Be taken.” It shall flourish still.

    Dear Mary, in this picture see
    Thy own, drawn by a master hand;
    Name, face and character agree
    Drawn by Saint Luke, an artist grand.

    Impromptu

    To Mrs. Anna C. Baker.

    Composed in the top of a cherry tree when the wind was blowing a gale.

    In fishing for men, I should judge from your looks
    You’ve always had biters enough at your hooks.
    And whenever you dipp’d your net in the tide
    You had little need to spread it out wide.
    To encircle so many you wish’d for no more
    And like the old fishers sat down on the shore,
    Casting all the worthless and bad ones away—
    Preserving the good and the true to this day.
    May the promising youth, I saw by your side
    All blooming and beaming, your hope and your pride,
    Be a pillar of state, so strong and so tall
    As to make you rejoice, that you made such a haul.

    Lament for the Year 1887.

    Read before the Jackson Hall Debating Society.

    My tale to-night is full of woe,
    I would that it were one of gladness;
    I would not thrill your hearts, you know,
    With notes of grief or sadness.

    My friend and yours is near his end,
    His pulse is beating faint and low,
    ’Tis sad to lose so good a friend,
    His time has come and he must go.

    His life is ebbing fast away,
    His mortal race is almost run,
    He cannot live another day,
    Nor see another rising sun.

    While watching round his dying bed,
    The tears we shed are tears of sorrow,
    We’ll close his eyes for he’ll be dead,
    And carried hence before to-morrow.

    His frame, so fragile now and weak,
    Was late the seat of vital power,
    But now, alas! he cannot speak,
    He’s growing weaker every hour.

    Old seventy-seven, your friend and mine,
    Has done his part by you and me,
    Then friends, let us unite and twine,
    A bright wreath to his memory.

    His reign has been a checker’d reign,
    While some have suffered loss and wrong,
    We have no reason to complain,
    So come and join me in my song.

    He found me in the lowly vale,
    In poverty with robust health,
    And sweet contentment in the scale,
    Outweighing fame and pomp and wealth.

    Destroying war beneath his reign,
    Has drench’d the earth with blood and tears,
    Which ever flow, but flow in vain,
    As they have done through countless years.

    When will the reign of peace begin?
    When will the flood of human woe,
    That flows from folly, pride, and sin,
    Subside, and ever cease to flow?

    God speed the time when war’s alarms,
    Will never more convulse the earth,
    And love and peace restore the charms
    Which dwelt in Eden at its birth.

    Old seventy-seven, again adieu,
    We’ll ne’er again each other see.
    I’ve been a constant friend to you,
    As you have always been to me.

    “Step down and out” you’ve had your day,
    Your young successor’s at the gate,
    Let him be crowned without delay,
    The royal stranger seventy-eight.

    Verses

    Presented to my daughter with a watch and a locket with a picture of myself.

    Receive, my child, this gift of love,
    And wear it ever near thy heart,
    A pledge of union may it prove,
    Which time nor distance ne’er can part.

    I’ve watched thy infant sleep, and prest
    My eager lips against thy brow,
    And lingered near thy couch, and blest,
    Thy tender form with many a vow.

    But O! the rapture of that hour,
    None but a parent’s heart can know
    When first thy intellectual power
    Began the germ of life to show.

    I’ve marked the progress of thy mind,
    And felt a thrill of joy and pride,
    To see thy youthful steps inclined
    To wisdom’s ways and virtue’s side.

    And when this fiery restless soul,
    Has chafed the thread of life away
    And reached, or high or low, the goal,
    And fought and won or lost the day,—

    Then cherish this bright gift, my dear,
    And on those features kindly gaze,
    And bathe them with a filial tear,
    When I’m beyond all blame or praise.

    Lines

    On the death of a young lady of Wilmington.

    Chill frost will nip the fairest flower;
    The sweetest dream is soonest pass’d;
    The brightest morning in an hour,
    May be with storm clouds overcast.

    So Josephine in early bloom,
    Was blighted by death’s cruel blast,
    While weeping round her early tomb,
    We joy to know, she is not lost.

    Fond mother, dry that tearful tide,
    Your child will not return, you know:
    She’s waiting on the other side
    And where she is, you too may go.

    Youthful Reminiscences.

    Their schoolboy days have form’d a theme,
    For nearly all the bards I know,
    But mine are like a fading dream
    Which happen’d three score years ago.

    My memory is not the best,
    While some things I would fain forget
    Come like an uninvited guest,
    And often cause me much regret.

    I see the ghosts of murdered hours,
    As they flit past in countless throngs,
    They taunt me with their meager powers,
    And ridicule my senseless songs.

    ’Tis useless now to speculate,
    Or grieve o’er that which might have been,
    My failures though they have been great,
    Are not the greatest I have seen.

    In school I was a quiet child,
    And gave my teachers little fash,
    But as I grew I grew more wild,
    And hasty as the lightning’s flash.

    Of study I was never fond,
    My school books gave me no delight,
    I patronized the nearest pond,
    To fish or swim by day or night.

    And when the frosts of winter came,
    And bound the streams in fetters tight,
    It gave me pleasure all the same
    To skate upon their bosom bright.

    I was athletic in my way
    And on my muscle went it strong,
    And stood to fight or ran to play,
    Regardless of the right or wrong.

    In wrestling I did much excel
    And lov’d to douse a boasting fop,
    Nor cared I how or where we fell
    Provided I fell on the top.

    I loved my friends with all my might,
    My foes I hated just as strong,
    My friends were always in the right,
    My foes forever in the wrong.

    A sportsman early I became,
    A sort of second Daniel Boone,
    And bagg’d my share of ev’ry game
    From cony, up or down, to coon.

    No tawny chieftain’s swarthy son,
    Was ever fonder of the chase,
    Than I was of my trusty gun,
    Although I had a paler face.

    I shot the squirrel near his den.
    The silly rabbit near her lair;
    And captured ev’ry now and then,
    A pheasant in my cunning snare.

    And many things I think of here,
    Which time forbids me now to say,
    That happen’d in my wild career,
    To me, since that eventful day

    When my fond mother wash’d my face,
    And combed my flaxen hair,
    And started me in learning’s race,
    And breath’d to heav’n a silent prayer,

    That I might grow to man’s estate,
    And cultivate my opening mind;
    And not be rich or wise or great,
    But gentle, true and good and kind.

    My mother’s face, I see it yet,
    That thoughtful face, with eyes of blue,
    I trust I never shall forget
    Her words of counsel, sage and true.

    She left me, when she pass’d away,
    More than a royal legacy,
    I would not for a monarch’s sway,
    Exchange the things she gave to me.

    She gave me naught of sordid wealth,
    But that which wealth can never be,
    Her iron frame and robust health,
    Are more than diadems to me.

    She left to me the azure sky,
    With all its countless orbs of light,
    Which wonder-strike the thoughtful eye,
    And beautify the dome of night.

    The deep blue sea from shore to shore,
    The boundless rays of solar light,
    The lightnings flash, the thunders roar—
    I hold them all in my own right.

    And lastly that there be no lack,
    Of any good thing by her given,
    She left to me the shining track,
    Which led her footsteps up to heaven.

    Stanzas

    To a Little Girl on Her Birthday.

    My dear, the bard his greeting sends,
    And wishes you and all your friends,
    A happy birthday meeting.
    Let social pleasures crown the day,
    But while you chase dull care away,
    Remember time is fleeting.

    Then learn the lesson of this day,
    Another year has pass’d away,
    Beyond our reach forever.
    And as the fleeting moments glide,
    They bear us on their noiseless tide,
    Like straws upon the river,

    Into that vast, unfathomed sea,
    Marked on the map “eternity,”
    With neither bound nor shore.
    There may we find some blissful isle
    Where basking in our Saviour’s smile,
    We’ll meet to part no more.

    To Miss Mary Bain.

    My cousin fair, dear Mary B,
    Excuse my long neglect I pray,
    And pardon too, the homely strain,
    In which I sing this rustic lay.

    My muse and I are sorted ill,
    I’m in my yellow leaf and sere;
    While she is young and ardent still
    And urges me to persevere.

    She reads to me the roll of fame,
    And presses me to join the throng,
    That surge and struggle for a name,
    Among the gifted sons of song.

    Of that vain stuff the world calls fame
    I’ve had I think my ample share.
    At best ’tis but a sounding name
    An idle puff of empty air.

    For more than once I’ve been the choice
    Of freemen to enact their laws,
    And patriots cheered me when my voice,
    I raised to vindicate their cause.

    And more than this I’ve brought to pass,
    For I have made a lot of ground
    Produce the second blade of grass,
    Where formerly but one was found.

    But now I love the calm retreat,
    Away from tumult, noise and strife,
    And in the works of nature sweet
    I learn her laws, the laws of life.

    The monuments which I erect
    Will hand my name for ages down,
    While tombs of kings will meet neglect,
    Or worse, be greeted with a frown.

    My trees will bloom and bear their fruit,
    My carp-pond glitter in the sun;
    My cherished grape-vines too, though mute,
    Will tell the world what I have done.

    Now lest you think that I am vain,
    And that my trumpeter is dead,
    I’ll drop this graceless, boasting strain,
    And sing of you, dear Coz, instead.

    Of all my Cousins, old or new,
    I love the prairie chicken best,
    I see the rising sun in you,—
    Although you’re rising in the west.

    The picture you are working on,
    I’d almost give my eyes to see,
    I know it is a striking one,
    For it is of the “deep blue sea.”

    But how you ever took the notion
    To paint a picture of the sea
    Before you ever saw the ocean,
    Is something that surprises me.

    I’m glad you have the skill to paint,
    And pluck to labor and to wait;
    And too much sense to pine and faint,
    Because the world don’t call you great.

    True greatness is achieved by toil,
    And labor for the public good,
    ’Tis labor breaks the barren soil,
    And makes it yield our daily food.

    Then cultivate your talents rare,
    And study nature’s lovely face,
    And copy every tint with care;
    Your work will then have life and grace.

    When fame and fortune you attain,
    And more than royal sway is sure,
    ’Twill be the majesty of brain,
    A majesty that must endure,

    Till thrones of kings and queens shall tumble,
    And monuments of stone and brass,
    Shall into shapeless ruin crumble,
    And blow away like withered grass.

    The world moves on with quickening pace,
    And those who falter fall behind,
    Then enter for the mental race,
    Where mind is pitted against mind.

    While we are cousins in the flesh,
    In mind I think we’re nearer still,
    Your genius leads you to the brush,
    But mine inclines me to the quill.

    And now, my cousin fair, adieu,
    My promise I have somehow kept,
    That I would write a line for you,
    I hope you will these lines accept.

    Stanzas

    Addressed to Mr. and Mrs. T. Jefferson Scott, upon the occasion of the 24th anniversary of their wedding, March 2nd, 1882.

    Kind gentlemen and ladies fair,
    I have a word or two to say,
    If you have got the time to spare,
    Sit down, and hear my humble lay.

    No tiresome homily, I bring,
    To chill your joys and make you sad,
    I’d rather hear you laugh or sing,
    Than see you solemn, dull or mad,

    A bow that’s always bent, they say,
    Will lose its force and wonted spring,
    And Jack’s all work and never play,
    Makes him a dull and stupid thing.

    Man’s greatest lesson is mankind,
    A problem difficult to solve,
    I’ve turned it over in my mind,
    And reached, at last, this sage resolve:

    That when I know myself right well,
    I have a key to all the race,
    Thoughts, purposes and aims that tell
    On me, are but a common case.

    There is a time to laugh and sing,
    A time to mourn and grieve as well;
    Then let your song and laughter ring,
    This is no time on griefs to dwell.

    We’ve met to greet our friend, T.J.,
    And tender our congratulations,
    Without forgetting Phebe A.,
    In our most heartfelt salutations.

    For four-and-twenty changeful years
    They’ve worn the bright hymenial bands,
    And shared each other’s hopes and fears,
    And each held up the other’s hands.

    He, like a stately, giant oak,
    Has spread his branches wide and high,
    Unscathed by lightning’s fatal stroke,
    Or tempest raving through the sky.

    She, like a tender, trusting vine,
    Twines round and through and o’er the tree;
    Her modesty and worth combine,
    To hide what roughness there might be,

    Beneath this cool, refreshing shade,
    The wretched quite forget their woes,
    The hungry find the needed bread,
    The weary wanderer, his repose.

    Long live this honored, worthy pair!
    May fortune come at their command!
    And may their sons and daughter fair,
    Grow up to grace their native land!

    And when their earthly toils are o’er,
    And they repose beneath the sod,
    Theirs be a home on that bright shore,
    Illumined by the smile of God.

    Birthday Verses.

    Written for a little girl on her ninth birthday.

    In the morning of life’s day,
    All before is bright and gay,
    All behind is like a dream,
    Or the morn’s uncertain beam,
    Falling on a misty stream.

    In the morning of thy youth,
    Learn this sober, solemn truth;
    Life is passing like a stream,
    Or a meteor’s sudden gleam;
    Like the bright aurora’s blaze,
    Disappearing while we gaze;
    Soon the child becomes a maid,
    In the pride of youth arrayed,
    And her mind and form expand
    To proportions great and grand;
    Then she changes to a wife,
    Battling with the ills of life;
    Thus we come and thus we go,
    And our cups with joy and woe,
    Oft are made to overflow.
    Each returning bright birthday,
    Like the mile-stones by the way,
    Will remind you as you go—
    Though at first they pass so slow
    That behind there is one more
    And, of course, one less before;
    Watch the moments as they fly,
    With a never tiring eye—
    Since you cannot stop their flow,
    O! improve them as they go.

    Roll Call.

    Written on the death of William Sutton, a member of the order of Good Templars.

    Call the roll! Call the roll of our band,
    Let each to his name answer clear,
    There’s danger abroad, there’s death in the land,
    Call the roll, see if each one is here.

    The roll call is through, one answers not,
    Brother Sutton, so prompt heretofore,
    Has answered another roll call; the spot
    Which knew him shall know him no more.

    He’s at rest by the beautiful river,
    Which flows by the evergreen shore,
    Where the verdure of spring lasts forever,
    And sickness and death are no more.

    O alas! that the righteous should die,
    While sinners so greatly abound,
    In the world that’s to come we’ll know why,
    The latter incumber the ground.

    This mystery we’ll then comprehend,
    And all will be plain to our sight,
    Then dry up the tears which flow for our friend,
    In full faith that God doeth right.

    In Memoriam

    Rensellaer Biddle.

    A noble heart is sleeping here,
    Beneath this lowly mound;
    With reverence let us draw near,
    For this is holy ground.

    The mortal frame that rests below
    This consecrated sward,
    Was late with heavenly hope aglow,
    A temple of the Lord.

    His charity was like a flood,
    It seemed to have no bound,
    But reached the evil and the good,
    Wherever want was found.

    The poor and needy sought his door,
    The wretched and distressed,
    He blessed them from his ample store,
    With shelter, food and rest.

    Giving his substance to the poor,
    He lent it to the Lord;
    While each returning harvest brought
    Him back a rich reward.

    Thus passed his useful life away,
    Dispensing good to all,
    Till on the evening of his day,
    He heard his Master call.

    “Brave soldier of the cross, well done,
    You’ve fought a noble fight;
    Come up, and claim the victor’s crown,
    And wear it as your right.”

    “For all your works of christian love
    And heaven-born charity,
    Are registered in Heaven above
    As so much done to Me.”

    Stanzas

    Written on the Fly Leaf of a Child’s Bible.

    Dear Mollie, in thy early days,
    While treading childhood’s dreamy maze,
    Peruse this book with care:
    Peruse it by the rising sun;
    Peruse it when the day is done,
    Peruse it oft with prayer.

    Search it for counsel in thy youth,
    For every page is bright with truth
    And wisdom from on high.
    Consult it in thy riper years,
    When foes without and inward fears
    Thy utmost powers defy.

    And when life’s sands are well nigh run
    And all thy work on earth is done,
    In patience wait and trust,
    That He whose promises are sure
    Will number you among the pure,
    The righteous and the just.

    Christmas Greeting, 1877.

    Read before the Jackson Hall Debating Society.

    The rolling seasons come and go,
    As ebbs the tide again to flow,
    And Christmas which seemed far away
    A year ago, is near to-day.
    And day and night in quick succession,
    Are passing by like a procession.
    While we like straws upon a stream,
    Are drifting faster than we deem,
    To that unknown, that untried shore,
    Where days and nights will be no more,
    And where time’s surging tide will be,
    Absorbed in vast eternity.
    Where then shall we poor mortals go?
    No man can tell, we only know
    We are but strangers in the land.
    Our fathers all have gone before,
    And shortly we shall be no more.
    This hall where we so often meet
    Will soon be trod by other’s feet,
    And where our voices now resound,
    Will other speakers soon be found.
    And thus like wave pursuing wave,
    Between the cradle and the grave
    The human tide is prone to run,
    The sire succeeded by the son.
    May we so spend life’s fleeting day,
    That when it shall have passed away,
    We all may meet on that blessed shore,
    Where friends shall meet to part no more.

    Anniversary Poem.

    Read at the anniversary of the seventieth birthday of Mrs. Ann Peterson.

    No costly gifts have I to bring,
    To grace your festive board,
    This humble song, I’ve brought to sing,
    Is all I can afford.

    Then let my humble rhyme be heard
    In silence, if you please,
    You’ll find it true in ev’ry word,
    It flows along with ease.

    We’ve met in honor of our friend
    Who seventy years ago,
    Came to this earth some years to spend,
    How many none can know.

    The world is using her so well,
    I hope she’ll tarry long,
    And ten years hence I hope to tell,
    “I have another song.”

    The Peterson Genealogical Tree.

    I’ll sing you a song of a wonderful tree,
    Whose beauty and strength are a marvel to me;
    Its cloud piercing branches ascend to the sky,
    While its deep rooted trunk may the tempest defy,
    Like the tree which the great king of Babylon saw,
    Which fill’d him with wonder, amazement and awe.
    This vision the wise men all failed to expound,
    Till Daniel the Hebrew, its true meaning found.
    What the king saw in vision, we lit’rally see,
    In the Peterson genealogical tree;
    It was feeble at first, and slowly it grew;
    Its roots being small and its branches but few.
    The whirlwinds and tempests in fury raved round it,
    And the rains fell in floods, as if they would drown it.
    Though slow in its growth it was steady and sure,
    And like plants of slow growth ’tis bound to endure.
    While the seasons roll round in their wanted succession,
    And the ages move on in an endless procession,
    While the sun in its glory reigns over the day,
    And the moon rules the night with her gentler sway,
    While the planets their courses pursue in the sky,
    And far distant stars light their torches on high,
    May this family tree grow taller and stronger
    And its branches increase growing longer and longer.
    May every branch of this vigorous tree,
    Increase and spread wider from mountain to sea,
    And under its shade may the poor and distressed
    Find shelter and comfort and kindness and rest,
    And when the great harvest we read of shall come
    When the angels shall gather and carry it home
    May this tree root and branch, trunk and fruit all be found,
    Transplanted from earth into holier ground,
    Where storms never rise and where frosts never blight,
    Where day ever shines unsucceeded by night,
    Where sickness and sorrow and death are no more,
    And friends never part. On that beautiful shore,
    May we hope that the friends who have met round this board,
    And greeted each other in social accord,
    May each meet the others to part never more.

    Lines

    Written on the death of Jane Flounders, a pupil of Cherry Hill public school, and read at her funeral.

    The mysteries of life and death,
    Lie hidden from all human ken,
    We know it is the vital breath
    Of God, that makes us living men.

    We also know, that breath withdrawn,
    And man becomes a lifeless clod,
    The soul immortal having gone
    Into the presence of its God.

    Here knowledge fails and faith appears,
    And bids us dry the scalding tear,
    And banish all our anxious fears,
    Which cluster round the loved ones here.

    The deep, dark, cold, remorseless grave
    Has closed o’er lovely Jennie’s face,
    No art, nor skill, nor prayers could save
    Her from its terrible embrace.

    Home now is dark and desolate,
    And friends and schoolmates are in tears,
    While strangers wonder at the fate,
    Which crushed her in her tender years.

    Death never won a brighter prize,
    Nor friends a richer treasure lost,
    Another star has left our skies,
    But heaven is richer at our cost.

    We mourn but not in hopeless grief,
    In tears we kiss the chast’ning rod,
    This sweet reflection brings relief,
    That all is good that comes from God.

    Through and beyond this scene of gloom,
    Faith points the mourner’s downcast eyes,
    While from the portals of the tomb,
    They see their lost loved one arise,

    In blooming immortality;
    As she comes forth they hear her sing
    O! grave, where is thy victory!
    O! monster death where is thy sting!

    What is Matter?

    Dedicated to His Friend George Johnston.

    How are you, George, my rhyming brother?
    We should be kinder to each other,
    For we are kindred souls at least;
    I don’t mean kindred, like the beast,—
    Mere blood and bones and flesh and matter,—
    But what this last is makes no matter.
    Philosophers have tried to teach it,
    But all their learning cannot reach it;
    ’Tis matter still, “that’s what’s the matter”
    With all their philosophic chatter,
    And Latin, Greek, and Hebrew clatter,
    Crucibles, retorts, and receivers,
    Wedges, inclined planes, and levers,
    Screws, blow pipes, electricity and light,
    And fifty other notions, quite
    Too much to either read or write.
    Just ask the wisest, What is matter?
    And notice how he will bespatter
    The subject, in his vain endeavor,
    With deep philosophy so clever,
    To prove you what you knew before,
    That matter’s matter, and no more.
    Well, this much then, we know at least,
    That matter’s substance, and the beast
    And bird and fish and creeping thing
    That moves on foot, with fin or wing,
    Is matter, just like you and me.
    Are they our kindred? Must it be
    That all the fools in all creation,
    And knaves and thieves of every station
    In life, can call me their relation?
    But that’s not all—the horse I ride,
    The ox I yoke, the dog I chide,
    The flesh and fish and fowl we feed on
    Are kindred, too; is that agreed on?
    Then kindred blood I quite disown,
    Though it descended from a throne,
    For it connects us down, also,
    With everything that’s mean and low—
    Insects and reptiles, foul and clean,
    And men a thousand times more mean.
    Let’s hear no more of noble blood,
    For noble brains, or actions good,
    Are only marks of true nobility.

    The kindred which I claim with you,
    Connects us with the just and true,
    And great in purpose, heart and soul,
    And makes us parts of that great whole
    Whose bonds of all embracing love
    A golden chain will ever prove
    To bind us to the good above.
    Then strive to elevate mankind
    By operating on the mind;
    The empire of good will extend,
    A helping hand in trouble lend,
    Go to thy brother in distress,
    One kindly word may make it less,
    A single word, when fitly spoken,
    May heal a heart with sorrow broken,
    A smile may overcome your foe,
    And make his heart with friendship glow,
    A frown might turn his heart to steel.
    And all its tendencies congeal,
    Be it our constant aim to cure
    The woes our fellow men endure,
    Teach them to act toward each other
    As they would act toward a brother.
    Thus may our circle wider grow,
    The golden chain still brighter glow;
    And may our kindred souls, in love
    United live, here and above,
    With all the good and wise and pure,
    While endless ages shall endure.

    Anniversary Hymn.

    Written for the anniversary of the Jackson Sabbath School, Aug. 23rd, 1870.

    The ever rolling flood of years,
    Is bearing us, our hopes and fears,
    With all we are or crave,
    Into that fathomless abyss—
    A world of endless woe or bliss,
    Beyond the darksome grave.

    One year of priceless time has passed,
    Since we in Sabbath school were class’d,
    To read and sing and pray;
    To hear the counsels of the good;
    Have we improved them as we should?
    How stands the case to-day?

    How have we used this fleeting year?
    Have we grown wiser? O, I fear,
    And tremble to reflect,
    How sadly it has gone to loss,
    How I have shunn’d my daily cross,
    Some idol to erect.

    To gain some trifling, selfish end,
    It may be I have wronged a friend,
    And turned his love to hate;
    How many idle words I’ve said;
    How many broken vows I’ve made;
    How shunn’d the narrow gate!

    O Lord! forgive our wanderings wide,
    Our oft departures from thy side,
    And keep us in thy fold;
    Be thou our Shepherd and our all;
    Protect these lambs, lest any fall,
    And perish in the cold.

    On this our Anniversary,
    Help us to put our trust in Thee,
    And lean upon Thy arm;
    Direct us through the coming year;
    Protect us, for the wolf is near,
    And shield us from all harm.

    Our Superintendent superintend;
    On him Thy special blessings send,
    And guide him in the way;
    Enrich our Treasurer with Thy grace,
    So that he may adorn the place,
    He fills so well to-day.

    Write on our Secretary’s heart
    Thy perfect law; and O, impart,
    To our Librarian dear,
    The volume of thy perfect love
    Which cometh only from above,
    And casteth out all fear.

    In pastures green, O lead us still!
    And help us all to do thy will,
    And all our wants supply;
    Help us in every grace to grow,
    And when we quit thy fold below,
    Receive us all on high.

    Then, by life’s river broad and bright,
    Our blissful day will have no night;
    On that immortal plain
    May all the Jackson scholars meet,
    And all their loving teachers greet,
    And never part again.

    The Intellectual Telegraph.

    Addressed to Miss C. Casho.

    Dear friend! O, how my blood warms at that word,
    And thrills and courses through my every vein;
    My inmost soul, with deep emotion stirr’d—
    Friend! Friend! repeats it o’er and o’er again.

    I’ll make a song of that sweet word, and sing
    It oft, to cheer me in my lonely hours,
    Till list’ning hills, and dells, and woodlands ring,
    And echo answers, Friend! with all her powers.

    ’Tis truly strange, and strangely true; I doubt
    If any can explain, though all have seen,
    How kindred spirits find each other out,
    Though deserts vast or oceans lie between.

    Some golden sympathetic cords unseen,
    Unite their souls as if with bands of steel,
    So finely strung, so sensitively keen,
    The slightest touch all in the circle feel.

    Their pulses distance electricity,
    And leave the struggling solar rays behind,
    The slightest throb pervades immensity,
    And instant reaches the remotest mind.

    ’Tis an inspiring, glorious thought to me,
    Which raises me above this earthly clod,
    To think the cords which bind our souls may be
    Connected some way with the throne of God.

    I sometimes think my wild and strange desires,
    And longings after something yet unknown,
    Are currents passing on those hidden wires
    To lead me on and upward to that throne.

    These visions often do I entertain,
    And, if they are but visions, and the birth
    Of fancy, still they are not all in vain;
    They lift the soul above the things of earth.

    They teach her how to use her wings though weak,
    And all unequal to the upward flight—
    The eaglet flaps upon the mountain peak,
    Then cleaves the heavens beyond our utmost sight.

    Lines on an Indian Arrow-Head.

    Rude relic of a lost and savage race!
    Memento of a people proud and cold!
    Sole lasting monument to mark the place
    Where the red tide of Indian valor rolled.

    Cold is the hand that fashion’d thee, rude dart!
    Cold the strong arm that drew the elastic bow!
    And cold the dust of the heroic heart,
    Whence, cleft by thee, the crimson tide did flow.

    Unnumbered years have o’er their ashes flown;
    Their unrecovered names and deeds are gone;
    All that remains is this rude pointed stone,
    To tell of nations mighty as our own.

    Such is earth’s pregnant lesson: through all time
    Kingdom succeeds to kingdom—empires fall;
    From out their ashes, others rise and climb,
    Then flash through radiant greatness, to their fall.

    Acrostic

    To Miss Annie Eliza M’Namee.

    My much respected, fair young friend
    In youth’s bright sunshine glowing:
    Some friendly token I would send,
    Some trifle, worth your knowing.

    A lovely bird; the garden’s pride;
    Nurs’d with the utmost care,
    No flow’r, in all the gardens wide;
    Incited hopes so rare:
    Each passing day develops more
    Each beauty, than the day before.

    Lovely in form, in features mild;
    In thy deportment pure:
    Zealous for right, e’en from a child,
    A friend, both true and sure.

    May thy maturer years be bright,
    Cloudless and fair thy skies;
    No storms to fright, nor frosts to blight,
    And cause thy fears to rise.
    May thy last days, in peace go past,
    Each being better than the last;
    Eternally thy joys grow brighter—
    So prays D. Scott the humble writer.

    Minutes

    Of the Jackson Hall Debating Society, Dec. 5, 1877.

    My muse inspire me, while I tell
    The weighty matters that befell
    On Monday night at Jackson Hall
    December fifth. I’ll tell it all,
    Day and year I’ll tell you even,
    ’Twas eighteen hundred seventy-seven.
    The Jacksonites were out in force,
    No common thing was up of course,
    But something rare and rich and great,
    ’Twas nothing short of a debate;
    What was the question? Let me see,
    Yes; “Can Christians consistently
    Engage in war against a brother
    And at the same time love each other?”
    But first and foremost let me say,
    My muse has taken me astray,
    So I’ll return to the beginning
    Digression is my common sinning
    For which your pardon I implore,
    If granted, I will sin no more,
    That is no more till the next time,
    For when I’m forging out a rhyme,
    The narrative which I would fix up,
    I somehow rather oddly mix up.

    A president must first be got,
    So they elected James M. Scott,
    He said he’d serve; (and that was clever,)
    A little while, but not forever.
    A paper called a “constitution,”
    Was read and on some person’s motion,
    Was all adopted, at a word,
    A thing that seemed to me absurd.
    Then instantly to work they went,
    And filled the chair of president,
    And William Henderson they took,
    They knew their man just like a book.
    A scribe was wanted next to keep,
    A record of their doings deep.
    On looking round they cast the lot,
    And so it fell on David Scott.
    A treasurer was next in order
    When looking up and down the border,
    For one to hoard the gold and silver,
    The mantle fell on Joseph Miller.
    The executive committee
    Was now to fill and here we see
    A piece of work I apprehend,
    May lead to trouble in the end,
    For while they only wanted five,
    Yet six they got, as I’m alive,
    First they installed Peter Jaquett,
    Then John Creswell, two men well met,
    James Law, but they were not enough,
    And so they added William Tuft.
    One more was wanted that was plain,
    That one was found in John McKane,
    But when the five were call’d to meet
    There were but four came to the seat;
    There are but four, said one so racy,
    So they elected William Gracy.
    Now you perceive this grave committee
    Which numbers five both wise and witty,
    Has got into a pretty fix
    With but five seats and numbers six.
    The question for the next debate
    Was then selected, which I’ll state
    If I have only got the gumption
    To make some word rhyme with resumption,
    “Should Congress now repeal the act
    To pay all debts in gold in fact.”

    The speakers now were trotted out
    Their sides to choose and take a bout
    Upon the question, which I stated
    As having been so well debated,
    Namely, “Can christians go to war,”
    The very devil might abhor
    To contemplate this proposition
    Offspring of pride and superstition
    That brothers by a second birth,
    Should make a very hell of earth.
    The war of words waxed loud and long,
    Each side was right, the other wrong;
    The speakers eager for the fray,
    Wished their ten minutes half a day;
    But time and tide will wait for none,
    So glibly did the gabble run,
    That nine o’clock soon spoiled the fun,
    And all that rising tide of words,
    Was smothered never to be heard.
    The fight is o’er, the race is run,
    And soon we’ll know which side has won,
    But this is not so easy done;
    Indeed I have a world of pity
    For the executive committee
    Who hear in silence all this clatter
    And then decide upon the matter;
    To give each speaker justice due,
    And sift the error from the true,
    Is not an easy thing to do.
    To decide what facts have any bearing
    Upon the question they are hearing,
    And generally keep in hand
    The arguments, so strong and grand,
    And draw from them a just conclusion
    Without a mixture of confusion;
    The negative got the decision
    Unanimous, without division.
    The speakers then took their position,
    Upon the doubtful proposition
    Of the repeal of gold resumption,
    Upon the plausible presumption,
    That those who pay must have the money,
    That laws of Congress, (that seems funny,)
    Are not above the laws of trade,
    And therefore cannot be obeyed.
    Here now my muse, poor worthless jade,
    Deserted, as I was afraid
    From the beginning she would do;
    So I must say good-night to you,
    And these long rambling minutes close,
    In just the dullest kind of prose.

    Retrospection.

    The phantoms have flown which I cherished;
    The dreams which delighted have passed;
    My castles in air have all perished—
    I grieved o’er the fall of the last.

    ’Twas bright, but as frail as a shadow;
    It passed like a vapor away—
    As the mist which hangs over the meadow
    Dissolves in the sun’s burning ray.

    The joys of my youth are all shattered;
    My hopes lie in wrecks on the shore;
    The friends of my childhood are scattered;
    Their faces I’ll see never more.

    Some are estranged, some have gone under;
    The battle of life is severe.
    When I stand by their graves, the wonder,
    The mystery, seems to be clear:

    They were vet’rans more noble than I;
    And placed in the van of the fight,
    They fell where the hero would die,
    When he bleeds for truth and the right.

    The battle of life is proceeding—
    The rear will advance to the van;
    I’ll follow where duty is leading,
    And fall at my post like a man.

    Acrostic

    To Miss Florence Wilson M’Namee.

    Maiden, lovely, young and gay,
    In the bloom of life’s young May!
    Sweet perfumes are in the air;
    Songs of gladness ev’rywhere!

    Flowers are springing round thy way,
    Lovely flowers, bright and gay:
    Over head and all about
    Rings one constant joyous shout!
    Earth is carpeted with green,
    Nature greets you as her queen.
    Call the trees and flow’rs your own,
    Each will bow before your throne.
    While in youth’s enchanting maze,
    Incline thy steps to wisdom’s ways!
    Lead a quiet peaceful life;
    Swiftly fly from noise and strife;
    Own thy Lord before mankind;
    ’Neath his banner you will find
    More than all this world can give;
    Contentment while on earth you live,
    Nearer to your journey’s end,
    All your aspirations tend:
    May you end your days in peace;
    Earthly ties in joy release;
    Eternally thy joys increase;
    That this may be thy joyous lot
    Ever prays thy friend D. Scott.

    The Book of Books.

    Written on a blank leaf of a Bible presented to Martha Cowan, June 1st, 1868.

    Esteemed young friend
    This book I send,
    I know full well thou wilt receive;
    For thou canst read
    Its shining creed,
    And understand it and believe.

    Oh could I say
    As much to-day,
    What joys would thrill this heart of grief,—
    I do believe.
    Oh Lord, receive
    My prayer—help THOU mine unbelief!

    This book though small,
    Is more than all
    The wealth of India to thee;
    Oh priceless treasure!
    Rich beyond measure
    Are all who build their hopes on thee.

    The Lesson of the Seasons.

    Written for a little girl on her eleventh birthday.

    Fleeting time is on the wing—
    Surely Winter, joyous Spring,
    Glowing Summer, Autumn sere,
    Mark the changes of the year.

    Late the earth was green and fair,
    Flowers were blooming everywhere;
    Birds were singing in the trees,
    While the balmy healthful breeze,
    Laden with perfume and song,
    Health and beauty flowed along.

    But a change comes o’er the scene;
    Still the fields and trees are green,
    And the birds keep singing on,
    Though the early flowers are gone;
    And the melting noon-day heat,
    Strips the shoes from little feet,
    And the coats from little backs;
    While the paddling bare-foot tracks,
    In the brooklet which I see,
    Tell of youthful sports and glee.
    Hay is rip’ning on the plain,
    Fields are rich in golden grain,
    Mowers rattle sharp and shrill,
    Reapers echo from the hill,
    Farmer, dark and brown with heat,
    Push your labor—it is sweet,
    For the hope, in which you plow,
    And sow, you are reaping now.
    Corn, which late, was scarcely seen,
    Struggling slowly into green,
    ’Neath the Summer’s torrid glow—
    How like magic it does grow;
    Rising to majestic height,
    Drinks the sunbeams with delight,
    Sends its rootlets through the soil,
    Foraging for hidden spoil;
    Riches more than golden ore,
    Silent workers they explore:
    With their apparatus small,
    Noiselessly they gather all.
    When their work is done, behold
    Treasures, richer far than gold,
    Fill the farmers store-house wide—
    And his grateful soul beside.

    But the scene must change again,
    Hill and dell and spreading plain,
    Speak so all can comprehend
    Summer’s reign is at an end.
    Forests, gorgeously arrayed,
    (Queens such dresses ne’er displayed)
    Grace the coronation scene
    Of the lovely Autumn queen.
    Birds, with multifarious notes,
    Ringing from ten thousand throats,
    Shout aloud that Summer’s dead,
    And Autumn reigns in her stead.
    Now another change behold—
    All the varied tints of gold,
    Purple, crimson, orange, green—
    Every hue and shade between,
    That bedecked the forest trees,
    Now lie scattered by the breeze.
    The birds have flown. Faithless friends
    Love the most when they’re best fed;
    And when they have gained their ends,
    Shamefully ha [Page 2] Internet Draft CE Auto-Configuration July 2002 that shall be used by two CEs for encryption and authentication (for IPSec). The (pre-shared or CE's private) key for IPSec tunnels must be pre- configured on the CE. Other VPN service related configuration which do not change as sites are removed or added to a VPN may also be configured a priori or remotely (and manually) configured if the parameters do not change frequently. The intent here is to define a minimal set of VPN service parameters that should be auto-configured. Hence, this draft shall focus on the auto-configuration of tunnel(s) to remote CE(s). If necessary, the transform sets for IPSec and other service parameters shall be defined to be auto-configured in future. It is assumed for now, the transform sets configured on a CE shall be applicable to all the IPSec tunnel(s) to other CEs of the same VPN. The scope here are VPN service parameters, other service parameters related to managed Internet service, firewall configuration are not within the scope of this draft. 4. CE Auto-Configuration requirements The CE auto-configuration solution should: - minimize the number of parameters that must be pre-configured - minimize the number of parameters that shall be auto-configured - allow configuration of CEs within one AS (Autonomous System) or network provider - allow CE to auto discover/request tunnel endpoint information - be able to auto update CEs with new tunnel endpoint information - allow a CE to self-provision the tunnels to other CEs - allow a provider to provision tunnel information for a CE independent of whether a CE is up and running - allow authentication of the tunnel endpoint information - not allow a customer to tamper with configuration of a CE - allow a provider to explicitly add or remove sites of a VPN e.g. a tunnel setup or removal does not necessarily imply a site should be added or removed from the VPN Expires January 2003 [Page 3] Internet Draft CE Auto-Configuration July 2002 The CE auto-configuration solution may: - allow configuration of CEs in different AS (Autonomous Systems) or network provider - leverage providers' existing AAA infrastructure - hide or encrypt the tunnel endpoint information [Note: If a CE uses a private key/certificate pair tunnel authentication, the remote end CE can use the corresponding public key when authenticating the other end CE. In this case, the private key may be configured on CEs a priori, and not sent as part of the tunnel endpoint information. Alternatively, if [PIC, XAUTH] is used, a CE may request credentials from an Authentication Server instead, and there is no need to pre- configure a CE with a private key, instead the CE ID and the password may be pre-configured on the CE. "It is assumed then that the CE possesses (e.g. by pre-configuration) the public key of the Authentication Server, or it has the means to obtain and validate a certificate for the Authentication Server (e.g., by pre-configuration of a CA (Certificate Authority) public key)" In this case, the CE credentials must be encrypted if sent as part of the tunnel endpoint information. Otherwise an independent key distribution protocol may be used to distribute keys, instead of sending the key as part of the tunnel endpoint information.] - automate IP address association with a CE of a VPN [Note: a provider may have to be informed of a CE location offline and has to manually associate an IP address (that the CE is reachable from a provider's network) with a CE of a VPN. Hence it is useful to allow a CE to authenticate itself to a VPN Configuration server and then to "register" itself. This allows a VPN Configuration server to associate the CE with its current IP address or alternatively, if the CE is within the service provider's network, the VPN Configuration server may be able to assign the IP address to the CE (on the port facing a network provider), associate the CE with the assigned IP address and at the same time provide the remote CE IP addresses [See Appendix]. 4.1 General Ideal Solution Ideally on bootup, a CE should be able to automatically perform procedures to gain network access if needed and obtain an IP address to allow it to communicate with other CEs in the IP network, e.g. via [DHCP] or for PPP links via IPCP. Subsequently the CE shall request Expires January 2003 [Page 4] Internet Draft CE Auto-Configuration July 2002 tunnel information from a VPN Configuration server. CEs need only be pre-configured with : a) a shared key or private key/certificate pair or a password, to allow it to authenticate itself to the VPN Configuration server and b) a shared key or a CA's public key to allow it to authenticate the VPN Configuration server If a shared key is used, a CE may additionally be pre-configured with a CE Identification (ID) in some service deployment scenarios, e.g. where the service provider is not able to infer the "location" of the CE or infer from the IP address of a CE which CE it is communicating with. CEs may be pre-configured with the VPN Configuration server name if the CE is not able to discover the VPN Configuration server or if the server involved in the network access configuration process (e.g. DHCP Server or NAS (Network Access Server), see [L2TP]) cannot be leveraged as a VPN Configuration server. If the CE is pre-configured with the VPN Configuration server name, the CE may find out the VPN Configuration server IP address via e.g. the DNS. A CE shall query or retrieve the tunnels information of a VPN it belongs from the VPN Configuration server. The VPN Configuration server shall authenticate the CE and provide the tunnel endpoint information to the CE, encrypting any information if necessary. [To leverage existing AAA infrastructure, the VPN Configuration server may choose to authenticate the CE via e.g. RADIUS and obtain the tunnel information from the RADIUS Server as well. In this case, the VPN Configuration server is acting as a RADIUS client, and shall send the CE Identification and password to the RADIUS server See the Appendix for further discussion]. The CE shall authenticate the tunnel information provided by the VPN Configuration server, before provisioning the tunnels. 5. Protocol choices and features Some candidate protocols that could be used for CE auto-configuration and the extensions that are required are identified here. A combination of these approaches may also be considered. 5.1 SNMP It is not recommended that an operator configure CEs directly via Expires January 2003 [Page 5] Internet Draft CE Auto-Configuration July 2002 SNMP, as this is labour intensive. A new auto-discovery framework is required on CEs and SNMP "manager" code which allows a CE to "get" VPN service parameters (a defined IP VPN MIB) from a VPN Configuration server is required to be implemented on a CE. Normally a Network Element (NE) has an SNMP "agent" which allows a Network Manager to "get" MIB objects from the NE. If it is not feasbible for a CE to "get" VPN parameters, the VPN Configuration server may have to send SNMP traps to the CE to trigger the CE to do a "get" VPN parameters from the VPN Configuration server. An new auto update framework is required on a Network/VPN Service Provisioning Manager. SNMPv3 may be used to automatically update CEs. SNMPv1/v2 over IPSec may used to configure CE, but this cannot prevent a customer from tampering with a CE. 5.2 LDAP/DNS A CE could retrieve tunnel endpoint information (to add new tunnels) from a (DNS or LDAP) server, and may be located in a different provider's network. However, a provider is not able to inform a CE to explicitly teardown a tunnel to a site unless the CE poll the DNS or LDAP server for VPN update information or a message is sent from another server using a different protocol to trigger the CE to pull information from the DNS or LDAP server. If another messaging/protocol is required to inform a CE to remove a tunnel endpoint, that same protocol could be used to inform a CE to add a tunnel endpoint, instead of LDAP/DNS, i.e. the use of LDAP/DNS for CE auto-configuration would be redundant then. 5.3 IKE When a CE attempts to setup tunnel to a remote CE (which may be located in a different provider's network), the remote CE is implicitly being informed of the tunnel endpoint. The remote CE may still need to contact the VPN Configuration Server (using another protocol) to download other tunnel endpoint information. This implies a provider is not able to explicitly teardown a tunnel to a site, unless a message is sent from a server using another protocol, as in the LDAP/DNS approach. 5.4 COPS COPS allows a CE to retrieve tunnel endpoint information as well as to be updated of tunnel endpoint information from a PDP (a server). CEs may be located in different providers' network and SSL/TLS may be Expires January 2003 [Page 6] Internet Draft CE Auto-Configuration July 2002 leveraged to provide secure commnunication between CEs and the VPN Configuration Server. The PDP (Policy Decision Point) must maintain a large number of TCP sessions if there are a large number of CEs. 5.5 XML and HTTP/HTTPS May require another auto-discovery and update protocol, on top of http/https, unless the "gets/sets" are simple and the outcome of a "get/set" is either a success or failure. May require an auto- discovery and update framework on the CE and the VPN Configuration Server. 5.6 DHCP Auto-discovery and auto-update framework already exist on DHCP client and server. Automate CE address association with CEs of a VPN and faciliate CE address management and reuse. Lightweight when CEs of a VPN are within a provider network. In the case where CEs span inter-domain networks and hence the network access configuration process may not be leveraged, an approach where a front-end Authentication Server [See PIC, XAUTH] is used to authenticate CEs in another provider's network and request VPN information from a back-end server (e.g. a RADIUS server or DHCP Server), may be required. The CEs in another provider's domain cannot be updated with new VPN information, unless the back-end server is able to provide VPN information update to the front-end Authentication Server, and the front-end Authentication Server is able to inform CEs of the VPN information change. This approach is discussed in the Appendix. 5.7 RADIUS This allows a provider to leverage existing AAA framework for IP VPN. Currently this approach does not allow a server to update CEs of VPN information. This approach is discussed in the Appendix. 6. Conclusion To facilitate CE auto-configuration, the following alternatives may be considered: a) specify the MIB required for CE auto-configuration. This MIB may be part of the IP VPN MIB for CEs, which can be used to perform remote manual provisioning of other parameters that do not require Expires January 2003 [Page 7] Internet Draft CE Auto-Configuration July 2002 auto-configuration, as well. Vendors may build proprietary auto- configuration framework independently and configure the MIB objects on CEs via SNMP. b) specify the tunnel information to be carried in a suitable protocol, which ideally should meet the requirements of CE auto- configuration and allows existing network device configuration framework to be leveraged for CE auto-configuration 7. Acknowledgments The authors would like to thank Andrew Krywaniuk and Pierre Bolduc for providing helpful technical information, Craig Sheppard, Phil Nelson, Cliff Wang and Eric Rosen for CE configuration discussions. References Bradner, S., "The Internet Standards Process -- Revision 3", BCP 9, RFC 2026, October 1996. Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997 [CE-VPN] A Framework for Provider Provisioned CE-based Virtual Private Networks http://search.ietf.org/internet-drafts/draft-ietf- ppvpn-ce-based-01.txt [CE-VPL] CE-based Virtual Private LAN http://search.ietf.org/internet-drafts/draft-lee-ce-based-vpl-00.txt [DHCP] Dynamic Host Configuration Protocol, http://www.ietf.org/rfc/rfc2131.txt [DHCP-AUTH] Authentication for DHCP Messages, ftp://ftp.isi.edu/in- notes/rfc3118.txt [PPP] Simpson, W., Editor, "The Point-to-Point Protocol (PPP)", STD 51, RFC 1661, July 1994. [IPCP] G. McGregor, "The PPP Internet Protocol Control Protocol (IPCP)", RFC 1172, May 1992 [XAUTH] Beaulieu, Pereira, "Extended Authentication within IKE (XAUTH)", draft-beaulieu-ike-xauth-02.txt, October 2001. [PIC] Sheffer, Y., Krawczyk, H., Aboba, B., "PIC, A Pre-IKE Credential Provisioning Protocol", Internet draft (work in progress), draft- ietf-ipsra-pic-05.txt, February 2002. Expires January 2003 [Page 8] Internet Draft CE Auto-Configuration July 2002 [DSL_autoconf] Technical Report TR-044, "Auto-Configuration for Basic Internet (IP-based) Services", DSL Forum, November 2001 [HTTP-BCP] http://www.ietf.org/rfc/rfc3205.txt?number=3205 [PPVPN-REQ] http://search.ietf.org/internet-drafts/draft-ietf- ppvpn-requirements-03.txt Appendix 1. Overview of CE Auto-configuration solutions A CE shall be automatically configured with an IP address to allow it to communicate with the provider's network. Different protocols (depending on the network access method and VPN service deployment requirements) which allow CEs to discover and/or be updated with VPN service information are described here. Both the automatic configuration of IP address on the CE and provisioning of services on the CE should be authenticated to prevent malicious users from tampering with CE configuration. 2. Auto-configuration of IP address of CE If a CE is located in the VPN service provider's network (also the network provider in this case), a CE may use DHCP to automatically obtain and configure its IP address (facing a provider's network). Otherwise the CE IP address is assigned by the CE's network provider, and VPN service provider must be informed of the CE IP address offline, or when a CE contact the VPN Configuration Server as described in later sections. The CE shall obtain an IP address from a DHCP server using the procedures defined in [DHCP]. The DHCP server and CE shall be configured with a shared key a priori. The CE and the DHCP server shall use the Delayed Authentication protocol defined in [DHCP-AUTH] (instead of Configuration Token). A CE should authenticate a DHCP server to ensure the DHCP server is the provider's DHCP server and not a rogue server. A DHCP server should authenticate the CE to ensure the CE is a legitimate DHCP client. No changes to [DHCP] and [DHCP-AUTH] are required during the auto- configuration of IP address of CE as described above. 3. Auto-configuration of VPN service - leveraging DHCP Expires January 2003 [Page 9] Internet Draft CE Auto-Configuration July 2002 Once the CE has obtained an IP address, the CE shall send DHCPINFORM directly to the DHCP server to solicit for other configuration information. The DHCP server shall respond with a DHCPACK and the following VPN related DHCP option(s). If a VPN site is removed or added (or the CEs must be updated with new VPN configuration information), the DHCP server may send DHCP FORCERENEW to the CEs belonging to the VPN. The CEs shall send DHCPINFORM as described in the previous paragraph to obtain new VPN site information. This section lists the new DHCP option(s) required. 3.1 Peer CE DHCP Option The Peer CE option specifies the VPN ID (a unique number identifying a VPN or VPL within a service provider's network) and a list of Peer CE(s) which the client may connect to. The CE should setup a tunnel to every Peer CE listed. The code for this option is to be assigned by IANA. The minimum length for this option is 4 octet, and the length MUST always be a multiple of The VPN ID is 4 octet and the CE addresses are IPv4 addresses. The Reserved field is 1 octet - the 1 "O"peration bit to indicate if these are additional CEs to be added or deleted, if the "A" bit is set to 1 or to 0, respectively. 4. Code Len CE Address 1 CE Address 2 +-----+-----+------+--------+-+-----+-----+-----+-----+-----+--- | TBD | n | VPNID|Reserved|O| a1 | a2 | a3 | a4 | a1 | a2 ... +-----+-----+------+--------+-+-----+-----+-----+-----+-----+---- 4. Auto-configuration of VPN service - leveraging PPP If a CE is connected to a provider's network via PPP, the remote CE addresses of a VPN may be configured via the IPCP Configuration Options which allow negotiatiation of desirable Internet Protocol parameters. The most up-to-date values of the IPCP Option Type field are specified in the most recent "Assigned Numbers" RFC [6]. A new TBD IPCP option can be used to configure remote CE addresses of a VPN if a CE is connected to the provider's network via PPP. However this requires NAS (Network Access Servers) to support this new IPCP option. A forward looking extension may be to define an opaque IPCP option to allow some configuration options to be relayed to or from a back-end server transparently. Expires January 2003 [Page 10] Internet Draft CE Auto-Configuration July 2002 4.1 VPN-IP-Addresses IPCP Option This Configuration Option list the remote CE IP addresses of the VPN. By default, no VPN IP address is assigned. The IP-Address Configuration Option format is shown below. The fields are transmitted from left to right. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Length | Reserved |O| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | VPNID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CE-IP-Address1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | CE-IP-Address2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ........... Type TBD Length 6 + n*IP address length, where n is the number of CEs Reserved The Reserved field is 1 octet: the 1 "O"peration bit to indicate if these are additional CEs to be added or deleted, if the "A" bit is set to 1 or to 0, respectively. VPNID the VPN Identification, allowing CEs to distinguish between the different VPNs they may belong to CE-IP-Address The CE-IP-Address is the address of a remote CE. Default No CE-IP-Address is assigned. Expires January 2003 [Page 11] Internet Draft CE Auto-Configuration July 2002 5. Auto-configuration of VPN service - using a VPN Configuration server approach The CE should be configured a priori with the name or address of the VPN Configuration server. This MAY be accomplished by pre- configuring a CE before it is being deployed or alternatively the VPN Configuration server address MAY be obtained from a DHCP server via a new DHCP option (if the CE is within the provider's network). The CE must be pre-configured with the CE's private key and digital certificate pair or the CE Identification and password (if [PIC, XAUTH] is used), and the provider's Certificate Authority (CA) and the CA's public key or the VPN Configuration Server's public key. This allows a CE to authenticate the VPN Configuration Server and the CE to be authenticated by the VPN Configuration Server (or relayed to an authentication server via the VPN Configuration Server) The CE should then be able to contact the VPN Configuration server. VPN configuration parameters may be solicited from a VPN Configuration server. If [PIC, XAUTH] is used to contact an Authentication Server (aka the VPN Configuration Server in this document), a new ISAKMP payload to carry a VPN Information request can be defined to allow the CE to request VPN Information via the Authentication Server. The VPN Information request should be sent after the CE has been authenticated. The front-end Authentication Server (aka VPN Configuration Server here) may request the VPN Information from a back-end legacy server e.g. RADIUS. See [PIC] for the rationale on using a front-end and back-end server. 5.1 Default VPN Configuration server DHCP Option (Optional) This feature may be useful if a CE network access is managed by the VPN service provider as well. The new DHCP option required is the VPN Configuration server option. The VPN Configuration server option specifies a list of servers available to the client. VPN Configuration server should be listed in order of preference. The code for this option is TBD. The minimum length for this option is 4 octets, and the length MUST always be a multiple of 4. Code Len Address 1 Address 2 +-----+-----+-----+-----+-----+-----+-----+-----+-- | TBD | n | a1 | a2 | a3 | a4 | a1 | a2 | ... +-----+-----+-----+-----+-----+-----+-----+-----+-- 6. Security Considerations for DHCP Expires January 2003 [Page 12] Internet Draft CE Auto-Configuration July 2002 The addition of DHCP option(s) for VPN auto-configuration does not affect the security of DHCP. The security issues of DHCP are described in [DHCP-AUTH] and as it pertains to the auto-configuration of CEs, the security issues are described in this draft. If an unauthorised CE configure its own IP address, the CE may not be permitted to use any services unless the CE has been authenticated for the particular service. For e.g. a device or the default filter at the ingress to the network can be configured to discard all traffic except DHCP messages from the client (port 67) unless the client has been authenticated for services as described in Section 3. In addition all DHCP messages on port 68 from the client should be discarded (a network user should not be sending DHCP messages from a DHCP server into the provider's network). This measure which is applicable to Section 3, does not prevent a malicious user from launching a DoS attack on DHCP servers in the provider's network. [Note: If Layer 2 authentication is available, (e.g. 802.1x), it may be used to provide authenticated access to the Layer 2 network. In this case, unauthorised users are not allowed to send traffic]. To reduce DoS attacks, the DHCP server may choose to "quarantine" CEs which have exceeded the pre-defined number of communication attempts allowed with the DHCP server within a given period. Subsequent messages from these CEs may be discarded. If these measures are necessary, the text in DHCP-AUTH would need to be modified accordingly. Full Copyright Statement Copyright (C) The Internet Society (2001). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an Expires January 2003 [Page 13] Internet Draft CE Auto-Configuration July 2002 "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Authors' Addresses Cheng-Yin Lee Email: Cheng-Yin.Lee@alcatel.com Jeremy deClercq Email: Jeremy.deClercq@alcatel.com Expires January 2003 [Page 14] Network Working Group C.Y Lee Internet Draft A. Farrel Expiration Date: September 2002 March, 2002 Exclude Routes - Extension to RSVP-TE Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. Abstract The current RSVP-TE specification [RSVP-TE] and GMPLS extensions [GMPLS-RSVP-TE] allow abstract nodes and resources to be explicitly included in a path setup, but not to be explicitly excluded. In many systems this is fine because exclusions can be specified through a management system and passed to an offline computation engine which can generate a route that is sufficiently explicit to ensure that the exclusions are avoided. Other systems, however, rely on the use of loose routes or partially specified abstract nodes. These routes are resolved within the network as the hops of the explicit route are evaluated. In these cases exclusions cannot currently be communicated to the nodes that will evaluate the routes. This draft specifies ways to communicate route exclusions during path setup using RSVP-TE. 1. Overview We identified two main types of exclusions to apply: i) Do not include any of the abstract nodes in a given set. This is referred to as XRO (exclude route object) ii) Do not include certain abstract nodes or resources between a specific pair of abstract nodes within an ERO. This is referred to as NOT(ERO subobject). A new RSVP-TE object shall be specified for the first type of exclude route. The second type of exclude route require modification of the existing ERO or a new C_Type for the existing ERO to be specified. This type of exclude route will be added to this draft in a future version. 2. Exclude Route The exclude route identifies a list of abstract nodes that must NOT be traversed along the path. 2.1 Exclude Route Object Abstract nodes to be excluded are specified via the EXCLUDE_ROUTE object (XRO). The Exclude Route Class value is TBD. Currently one C_Type is defined, Type 1 Exclude Route. The EXCLUDE_ROUTE object has the following format: Class = TBD, C_Type = 1 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | // (Subobjects) // | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Subobjects The contents of an EXCLUDE_ROUTE object are a series of variable- length data items called subobjects. The subobjects are identical to those defined in [RSVP-TE] and [GMPLS-RSVP-TE] for use in EROs. The following subobject types are supported. 1 IPv4 prefix 2 IPv6 prefix 32 Autonomous system number The defined values for Type above are specified in [RSVP-TE] The L bit that denotes a loose hop when the subobject is used in the ERO has no meaning in the XRO and should be ignored. 2.2. Semantics of the Exclude Route Object The exclude route is encoded as a series of subobjects contained in an EXCLUDE_ROUTE object. Each subobject identifies a group of nodes in the exclude route. An exclude route is thus a specification of groups of nodes NOT to be traversed. In [RSVP-TE], a node may be an abstract node, which is made up of a group of nodes (as in an Autonomous System).Hence an exclude route that consists solely of Autonomous System number subobjects specifies the Autonomous Systems not to be traversed. 3. Security The new exclude route object poses no security exposures over and above [RSVP-TE]. 4. Acknowledgment This draft reuse text from [RSVP-TE] for the description of EXCLUDE_ROUTE. 5. Authors' Information Cheng-Yin Lee, Cheng-Yin.Lee@alcatel.com Adrian Farrel, afarrel@movaz.com References [RSVP-TE] ftp://ftp.isi.edu/in-notes/rfc3209.txt [GMPLS-RSVP-TE] Generalized MPLS Signaling - RSVP-TE Extensions, Internet Draft , November, 2001 #4\/Q(n(or̀V?:5Hugc4VVܒ*,T?|ԻSƷ4 ׭;kIh6KOvZxKxs N>iuu @N YPm^A`MvՇ%S(m5tᾛ嬽̏/5DTd uڊD~h 2%;j~m6h~{G'/ >;Jg0haxfobqr/xVu<ܩMNMUC8τ>fj5ݾY]Ph2) ǎ!_e(_!_H.Y0w!u}sc @HM[}M)`Udc&%$Gmk7o t`sCo^G j$/ӹ,ަ z`$.t:GԣhD0*w/~{QwʡUOy:uZ _ @{F4ksj@Ql|i< )^ZK(Rz~S_Y&dDU6nj,MdL7良ɆU  1ua~f#m#ߓnu?l< sUH8pM`Ir uP6޵ v.(tǯ&K k^3A؝z9{x4,ܛ@K T* %8byۮ7~#v^%mEsms g05 - [;i"y4h"u~׮5oP{|#y gތ#W>c$6UՓZE?J9:floRK|,.7'I f՗ Ms Pr>YAp{苾x}.>xWl?k׸RT]M,,~67uMchp zu˧Q3Q =@mg1mkVcy+0Oz7ԁ)[`8B5ܶ~}fι|0AI fC]Nr6McBz:.OZ1] t19X~46+҃ψi=ZYZ&,ē@ν&)ntfU͞|wi.Zl,p$ud1mǏ2pX2=UTXow2h9-qQoE- 2$]J~Ņ^|jn s $2KEs( >/d F72w|g_pff(4vp>2G_~=+%/yfR5NjIu᮶C4yC~'nn!p:&$ OMk٘ >n'@&3ҐE򌟨W@v9W0qxЏ;մxe~h݅ ;.^1|̗\S0K :ˁ@s0n/+$)mX+[j^0?4iUg}0\'QTftWOr,iJ>w !:v_n//_Q*WIZaj _DYq؞Kݻ'b- j3T |l[7~Rp=%(ʗg݇1՛ZKfzK$mm >tʇd_C[ HRe(}ëĴEa&9e`7+T+l+K:V;m* o-I'2Q|kv5?M`ܵaG*'`*?h)%ZA"OC XҁIff%kJsiK:$-W?ϊ:T7] |sg#;v*w Up['ܐj$[{2FzƄu{V%%>|q]VVQxմk³X;@h-B{Rs9F{1NyK&H>ҜUwZ.W+t3 a5;vBtݱ]߹P6 0# D6ҎܠeZl S\W{K+ Y.C]Qi쪎 :WGk|o$Ԕ@nivKf XR]^OH><9_F_g hĜ>G} _F}F0\NYp* }f`//s;Eެ ־^%5j9IBثkz33JMT%/!y]ՓӭrM]E.ePToDp(ͭ!-뾢y0j\?`遣xvW^CS>1[5rр8jNtZ9he1y`%Qn1Tavq Am'fYuI/,ZhO$)h ɇcW=|fip$J,1%AbCZ`uvJNE-d\T͇g#phϝvQՓuN+LC=g`ͲPãC ߦgHlg cU9*,-̭m'R`EB[݄ly)+ Z 99[Ӆ66]g#w j.o;Ӑ(L\{Qm8Hz@?8B4+ 1r 378fow5 +B ̚ePHóʝFp׾;jW>:g$b/]=oz}WglAEFbO Q( XK ܬHQ6g=S冞' ngvGd/E`mm i-% 'dO܆LJmwa-0Ȩ2)E=b_ԗ+jd6/wF(߲?-QCYxٴ^054;$}vHݓšwRy}Kڎi]iܝ>56/0vE؈ޗ?QBq?[5 <;=hYB< 'w" cL4WWStϽh[^/ L;Dg_(w)}.#7]- h+g'x*/q>N2u6إTD/+Tlڠ3qoNWiF KMϘْ7JHX%MoE-hjq FjvxPѵT710=݆U5zCz劮wHlpG~b Z4taXפ ?} z/%M0`t< eًcy6/ {s~C ~_Df/3^BU/lx뒼_AN9GPLPlXՓ:t{X%^:$ 1F46MZsUg5l6X0j?,}Y̕8sI 2P\DusP3MUЃI}W`hЂ9m@n!C&m s0kӊ{Z^H!֌i@8 vGiָ]b msyb`u <܉n#pu$$O׻ )/}/^i|T\%hQQ.`l 5~;!uy 64E1&c"]9"(+E1WGJ]\H,:s[=TXd5M}ǬS?Ի_8;%&]tпSlfD,AAwQFU\,/ 鲫;' ,״e}XlTY4/>c;8MtSÞg51ރ _0jAJt k泳T:Y`P{ F~`lϞHWO_8ItAZkhwS?IJ,,$'׌mB:JmQ( ÃCPU&N81;;NDd$8]SX[s::=0<(!3XR,nZLښC,BfJwQpdl/'SB+p] G4UG0c1Vo4C8?L7a(?:ZO)+[_!%/*ا-2LPӂ{vx9|AMRdrR vl!x([>2Nv_aH]䎈htQ^PЦ̓Q7}?`^!uP0nNٚcRZ;GGkm\+>bI:%>P{P@TrRh' <TT3$ 5I4MDl]z_—z`ғhVd*><*4cʻҧ5SO1|{A.'PI7F3%L7svбˋP9((+iq"? wQ2]c(گz9;h¸^i}B6椯)ӻ.WgF+4;%1FV2K#{{ 1V j#Ъz@YFx#u"4Z-[8aa &o`e"u?7xX5Q/gcӽV:j?lN(xw+ֳUbNܮfE)EI:|r}'n9իg1p,ESu*t4`.xO*Vd'teڢ X=j2ES/Wf9.dG //Uo3-`Bvx*Qle5WfbRZ}NA!;vBF g>9;\a~og[󽣆A:`;QpbW+o 1-vxױH}z9f,4<!=Ռx9v5EG<7mygru΢οNN Z}|hs+S;1pS@ghSܶv+찵Yݧ$ڪ bM}X ͩK32( F^9ݭg'ՄBZL\w ƮCrfg h*^1ûbSK]cB)Ŭ\?:IXR뎒n< ;wh cgpJ_V$^-U e=6Db4~(d8 3[L3zn-r@pg(Bq&ٛ!}XAٿuȰ(1;y{!#3zlwZ[1>\R9T@y.. M9y"m,Ÿ_}) bm}g \V?Ǔ&3뷈XOT[T\k_+EWGͫg~+e:xz-=9Ec??ύ1;|-u0<i̚/K 6ypx25h<ם.QMnc!R INTERNET-DRAFT Jiwoong Lee Expires: July 2002 KTF January 23 2002 Explicit Multicast over Ethernet Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsolete by other documents at anytime. It is inappropriate to use Internet Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. All remarks may be forwarded to author's email address or Xcast IG(Incubation Group) mailing list: xcast@public.alcatel.com CHANGES This section briefly lists some of the major changes in this draft relative to the previous version of this same draft, draft-lee- xcast-ethernet-01.txt - Xcast host MAY receive multicast-addressed Ethernet frame of Xcast packet, because Xcast host does not toss the incoming Xcast packet erroneously. - For the same reason, the edge router of a leaf network MAY transmit multicast-addressed Ethernet frame of Xcast packet. - X2M section is removed. - Slight editorial changes are provided. Jiwoong Lee Expire Jul 2002 [Page 1] INTERNET-DRAFT Xcast over Ethernet Jan 2002 1. Introduction Explicit multicast(Xcast)[XCST] is a new kind of Internet multicast and complements the Host Group Model multicast in the sense of multicast benefits. Xcast encodes addresses of destinations within its packet and requires neither any routing information exchange nor state management. Xcast routing utilizes legacy unicast routing information managed at every node and is expected to have performance good enough for small size multicast groups. Since Xcast is originally designed on the assumption that delivery path is made of point-to-point style links, it shows erroneous delivery problem over conventional broadcast media including Ethernet. This document specifies how to deliver an Xcast packet over Ethernet, eliminating erroneous delivery problem. The problem and the candidate solutions are explained in detail in Appendix. 1.1 Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119. In addition, this document frequently uses the following terms: Ethernet A link layer technology including either CSMA/CD and full- duplex subnetworks based on ISO/IEC 8802-3 or CSMA/CA based on ISO/IEC DIS 8802-11 with various data rates Xcast Explicit Multicast Xcast packet IP datagram which carries legitimate Xcast header structure The definitions of terms that are not defined here can be found at references at the end. 2. Address mapping The destination address of an Xcast packet is a predefined link local multicast address known as All_Xcast_Routers [XCST]. When an Xcast node maps All_Xcast_Routers into an Ethernet link layer Jiwoong Lee Expire Jul 2002 [Page 2] INTERNET-DRAFT Xcast over Ethernet Jan 2002 address, it does NOT follow the address mapping rule defined in [1112][2464][0894]. That is, All_Xcast_Routers SHOULD NOT be mapped into a multicast Ethernet address. Instead, the target link layer address MUST be the designated Ethernet address of the next routing hop on the Ethernet link that the source node resides. 3. Transmitting an Xcast packet over Ethernet If a next hop toward which an Xcast router transmits a processed Xcast packet resides in an Ethernet link that the router shares, the Xcast router can send the packet in one of three ways. 3.1 By using unicast Ethernet address The target link layer address SHOULD be the designated Ethernet address of the next hop. Note that Xcast packet itself does not include any information addressing the next hop. Therefore the Xcast routing module should have some way to transfer the appropriate information to the link layer module so that it can acquire the link layer address of the next hop and transmit the Ethernet frame to that link layer address. If next hops which have different IP addresses but share a single Ethernet address, Xcast router MAY transmit a single Xcast packet to a next hop. In this case, 'next hops' are distinguished not only by IP address but also Ethernet address. This situation occurs when proxy ARP messages[MLAN] or proxy Neighbor Advertisements[NADV] are used. See Appendix C for further discussion. 3.2 By using IP encapsulation Before the Xcast router sends a processed Xcast packet, it MAY perform IP-in-IP encapsulation [IPIP] [TUN6] over it. The destination address of the tunnel header MUST be the unicast IP address of the next hop. After the encapsulation, the Xcast router handles the packet as normal outgoing unicast one. 3.3 By abiding by Host Group Multicast address mapping rule If an Xcast router has a Xcast packet to be forwarded to a leaf network which is built over Ethernet and has hosts only with no more router except itself, it MAY send a single Xcast packet addressed to the receiving hosts. In this case the link layer address of Ethernet frame MUST be constructed by the address mapping rule defined in [1112][2464][0894]. 4. Receiving an Xcast packet over Ethernet If an Xcast router receives an Xcast packet encapsulated by the Ethernet frame which is addressed to multicast Ethernet address, it Jiwoong Lee Expire Jul 2002 [Page 3] INTERNET-DRAFT Xcast over Ethernet Jan 2002 MUST discard this packet. From the viewpoint of implementations, the subject that discards incoming Xcast packet is the network layer module of the implementations, rather than link layer module. The network module of the implementation will successfully discard this Xcast packet because there SHOULD be no entry for the predefined multicast address, All_Xcast_Routers, in its Multicast Forwarding Information Base of any node. If an Xcast host receives an Xcast packet encapsulated by the Ethernet frame which is addressed to multicast Ethernet address, it SHOULD NOT discard this packet before it checks whether this packet is addressed to itself. If the Xcast packet is addressed to itself, normal Xcast operations SHALL be performed as described in [XCST]. If an Xcast node receives an Xcast packet encapsulated by the Ethernet frame which is addressed to unicast Ethernet address, normal Xcast operations SHALL be performed as described in [XCST]. 5. Security Considerations The addresses of the recipients carried in an Xcast packet can be easily exposed to malicious attackers who are connected to the Eth- ernet links on the delivery path. There are no known means to con- ceal the recipient information. As happens in generic transmission of Internet datagram, a mali- cious node can send false proxy ARP messages or false Neighbor Advertisements, which result in mistaken delivery of Xcast packets. Appendix In this section, the rationale for section 2, 3 & 4 will be given. Section A describes the Xcast routing problem when applied to Eth- ernet link without the modification of delivery mechanism. Section B lists up the conceivable solutions to the problem in A and chal- lenges and conquers each of them. Section C discusses the effect of proxy ARP/proxy Neighbor Advertisements when the proposed protocol of this document is applied. A. Discussion The current version of Xcast basic specification [XCST] assumes that all links en route are point-to-point ones. However, the general Internet architecture does not consist only of point-to- point links, but consists also of shared links. In particular Ethernet has acquired its popularity and has been widespreadly deployed as WAN technology as well as LAN. Some Ethernet technology including only two nodes in its segment Jiwoong Lee Expire Jul 2002 [Page 4] INTERNET-DRAFT Xcast over Ethernet Jan 2002 will not be different from the normal point-to-point link. One example of this kind of configuration is 10 Gigabit Ethernet. This document does not deal with following Xcast technical items; - Xcast-awareness test of a node on the shared link - How to elect a designated Xcast router - Interoperability between Xcast and Host Group Model multicast A.1 Why we need to newly invent how to transmit Xcast packets over Eth- ernet Assume Xcast basic specification [XCST] is applied to Ethernet link of (Figure A-1) while conventional kernel supports only the Host Group Model multicast. Sender creates an Xcast packet whose List of Addresses includes the addresses of E, F and G. When A receives the packet, it performs Xcast routing as specified in [XCST] and generates two Xcast packets #1 and #2. #1 is for E and F, #2 is for G, if no premature X2U was applied. Both are addressed to All_Xcast_Routers. Since they will be encapsulated by multicast addressed Ethernet frames, they reach B and C respectively. Note that Xcast routers does not perform any multicast tree construction or status management. When B receives #2, B does not perform Reverse Path Forwarding check and believes that this packet should be forwarded to C. Therefore B will toss #2 to C over Link X. The 'tossed #2' will be heard by A also and A's routing module will start to process it since A cannot distinguish 'tossed #2' and '#2' that it previously sent. A sends another #2 to Link X. B listens 'another #2', and so on. Therefore the Link X will be flooded with #1, #2 and their descendants until their lifetime expires. Duplicatively received packets will not be discarded en route (including even end hosts) if the redundancy check is not applied. For this reason, a new solution must be provided to deliver Xcast packet over Ethernet. Link X | /------E |---B------D #1 | \------F Source-----A-------| #2 | |---C------G (Figure A-1) Jiwoong Lee Expire Jul 2002 [Page 5] INTERNET-DRAFT Xcast over Ethernet Jan 2002 Example network topology Note also that this phenomenon only occurs on the shared link of Xcast routers; no Xcast host generates 'tossed' packets. B. Solution candidates It has been deemed that there are various solution candidates to realize the error-free delivery of Xcast packet over Ethernet link. They may work logically in a technical sense. They are a) Building a Multiplexed form of Xcast packet, abiding by RFC1112 rule. b) Transmitting a Xcast packet with one-hop tunneling. The tunnel header is unicast-addressed to the next hop. c) Building an variant Ethernet frame which carries multiple target link layer addresses. d) Utilizing IEEE 802.1Q VLAN tag header to indicate legitimate next hops e) Transmitting an Xcast packet in unicast Ethernet frame, which is destined to the next hop. B.1 Challenge and conquer a) Building the Multiplexed form of Xcast packet, abiding by [1112] rule. On an Ethernet link, the source Xcast router does not perform replicating the packet per next hop. Rather, it inserts some field into the Xcast packet to indicate who are the legitimate next hops and which receiver addresses they should process. One convenient form of this particular packet will be [ S:source, D:All_Xcast_Routers, NextHops: N1 for L1 / N2 for L2, List:L1+L2 ] , where S stands for Source address field, D for Destination address field, NextHops for an extended version of List of Addresses field, N# for an address of a next hop, L# for a list of addresses that N# should process. The link layer module maps the destination address, All_Xcast_Routers, into a multicast link layer address as described in [1112], and transmits this frame over Ethernet. The advantage of this form is that the Xcast can obtain the high bandwidth utiliza- tion at least as much as the Host Group Model multicast can do over Jiwoong Lee Expire Jul 2002 [Page 6] INTERNET-DRAFT Xcast over Ethernet Jan 2002 an Ethernet link. One obvious obstacle is that this requires the modifications in encoding scheme of Xcast since it inserts a new kind of field: NextHops. The worse one is the fact that the length of this new field can vary hop by hop. In IPv6, one 'next hop' requires 16 bytes for the address of next hop and at least one more byte for list index. Hence increased overhead. For example if there are four next hops in one Ethernet link, the required additional overhead will be ( 16 + 1 ) * 4 = 68 bytes. b) Transmitting the Xcast packet with one-hop tunneling. The tunnel header is unicast-addressed to the next hop. This seems the easiest solution to implement. The Ethernet modules of Xcast nodes does not have to be modified at all. One disadvantage is multicast bandwidth gain with this scheme is inferior to that of the Host Group Model multicast, since the link sees Ethernet frame as many as the number of the next hops. (Note, however, the number of next hops can be much smaller than that of recipients. Therefore the bandwidth gain of this scheme is not same to that of unicasting.) Another possible drawback is the performance degradation at Xcast routers due to the repeated IP encapsulation / decapsulation. c) Building a variant Ethernet frame which carries multiple target link layer addresses. There are at least (or approximately) 900 independent Ethernet vendors in this world[VEND] and this technology has been deployed since A.D. 1980. Ethernet is already too widespread to make some non-standard modification over it. d) Utilizing IEEE 802.1Q VLAN tag header to indicate legitimate next hops In I998 IEEE created 4-byte VLAN tag header and added it prior to the Length/Type field of the Ethernet frame. Since only 4 bytes are available, it is not possible to include any Ethernet address in this field. Provided special purpose ID numbers are given to Xcast nodes in that Ethernet segment, the VLAN tag can be used as a bitmap indicating an arbitrary set of Xcast nodes. Note that this still requires another kind of signaling between Ethernet nodes and additional modifications of IEEE standards are required. e) Transmitting an Xcast packet in unicast Ethernet frame, which is destined to the next hop. Since the Ethernet frame is destined to a unicast address, the frame will be delivered to the intended destination without erro- neous frame congestion. Address mapping process belongs to link layer, it is performed after Xcast routing process defined in [XCST] at transmissions. The advantages of this scheme are that it Jiwoong Lee Expire Jul 2002 [Page 7] INTERNET-DRAFT Xcast over Ethernet Jan 2002 requires no extra signaling or state management. One major obsta- cle is that it is not possible that the link layer module deduces the link layer address of the next hop from the network layer data- gram, because every Xcast packet carries an link-local multicast address, All_Xcast_Routers, in its destination field and carries no information regarding to the next hop in it. This implies that an implementation of 'Xcast over Ethernet' should have some way to deliver the next hop information from the network layer module to link layer module. C. Proxy ARP and Proxy Neighbor Advertisement (Figure C-1) shows an example of last-mile network. Assume Source sends an Xcast packet addressed to two IP addresses, MN1 and MN2. An Xcast router XR, which is the gateway router of Link Y, makes two copies of incoming Xcast packets, generating Ethernet frames #1 and #2. #1 is addressed to _MN1, which is an Ethernet address of MN1. #2 is addressed to _MN2, which is an Ethernet address of MN2. Each Ethernet frame carries the Xcast packet addressed to MN1 and MN2 respectively. Link Y |---HA | Source-----XR------| #1 #2 |---MN1 |---MN2 (Figure C-1) While mobile nodes are at home If MN1 and MN2 are mobile nodes, they can leave its home link Y and register themselves with their home agent, HA (Figure C-2). On behalf of MN1 and MN2, HA becomes a proxy node that receives incom- ing packets addressed to MN1 and MN2. To this end, HA sends proxy ARP messages in IPv4 or proxy Neighbor Advertisements in IPv6 to link Y. On response to this link layer information update message, XR correlates MN1 and MN2 with _HA, an Ethernet address of HA. When XR receives an Xcast datagram addressed to MN1 and MN2 from Sender, it generates two Xcast packets and encapsulate them in each Ethernet frame addressed to _HA. Even though the real next hop on delivery path is only one, the routing module of XR generates Xcast packets as many as the number of the nodes that HA acts as a proxy for. Jiwoong Lee Expire Jul 2002 [Page 8] INTERNET-DRAFT Xcast over Ethernet Jan 2002 Link Y |---HA #1 #2 | Sender-----XR------| | | (Figure C-2) While mobile nodes are away home This is believed to be OK since the number of packets XR sends into link Y while mobile nodes are away home are equal to that while mobile nodes are at home. NOTE: If HA is capable of Xcast routing , the preferable scenario is that XR transmits a single Xcast packet to HA rather than multiple ones because they physically have the same 'next hop' and the same link layer peer entity. However, doing so requires XR routes the incom- ing Xcast packet based on link layer information - the mappings of _HA from MN1 and MN2. References [XCST] R. Boivie, Y. Imai, W. Livens, D. Ooms, and O. Paridaens, Explicit Multicast Basic Specification, IETF draft-ooms-xcast-basic- spec-01.txt, March 2001 [1112] S. Deering, Host Extensions for IP Multicasting, IETF RFC 1112, August 1989 [TUN6] S. Deering, Generic Packet Tunneling in IPv6 Specification, IETF RFC 2473, December 1998 [IPIP] C. Perkins, IP Encapsulation within IP, IETF RFC 2003, October 1996 [ETHR] C. Spurgeon, Ethernet: The Definitive Guide, O'Reilly & Associates, Inc., February 2000 Jiwoong Lee Expire Jul 2002 [Page 9] INTERNET-DRAFT Xcast over Ethernet Jan 2002 [0894] C. Horing, A Standard for the Transmission of IP datagrams over Ethernet Networks, IETF RFC 894, Symbolics Cambridge Research Cen- ter, April 1984 [0826] D. Plummer, An Ethernet Address Resolution Protocol, IETF RFC 826, Symbolics Cambridge Research Center, November 1982 [2464] M. Crawford, Transmission of IPv6 Packets over Ethernet Networks, IETF RFC 2464, December 1998 [VLAN] IEEE Std 802.1Q-1998 Virtual Bridged Local Area Networks [MLAN] J. Postel. Multi-LAN address resolution. IETF RFC 925, October 1984 [NADV] Thomas Narten, Erik Nordmark, and William Allen Simpson. Neighbor Discovery for IP Version 6 (IPv6). RFC 2461, December 1998. [VEND] http://standards.ieee.org/regauth/oui/oui.txt Author Address Jiwoong Lee KTF Advanced Lab 1321-11 Seocho-Dong Seocho-Ku Seoul Korea, Republic of Phone : +82-2-3488-0416 Email : porce@ktf.com Jiwoong Lee Expire Jul 2002 [Page 10] \_?Ў;Oj0CSrp0tЍPDϫϱɸ7|0>ƫik;^*iPs\E&+tU;j{~#Kužh_su{()q-f*u@7P-Ө f<ra܉~H];\ >'F# Zpr <ї(<)]t+G`9 ^ z7v!z^p.#<O'3 R0<_ԶDc e 7ܻ-2fowh}N =QҐۀH7X ycH| a4:&пHh*=K4sJx5pr|(a,a D)~Jwp =&ֱhSj8['N5 j2(7v:֍Rne 8:Z?q`uhg N9^-9 Oqv-1 ՠ. ZMqI< MoCmdq!%)a2)y0k Jj|;gFt;^UXd^(Po:Aw7b}g9!/uYgԁ&CNV* ,iGWJx|@*N'=ׁ1l T/&)"dMwk?T8r12Y@݄" 13aL^OJsW?ނ;*$OZ|Ku໶EՖ='`mq뮯q_/i+`q (p/1 EאnTAvE&PF%[@9 :@4rly<5 4Gx n3H&^Qh0i@1n~EUaf9#w|̋PHeV9DzxiZ+{mk  6j'%/A&Ur@|cSdϚd墕Mh/[*:Zf<=7*QAy='^X*.#*x4 uE'rJeѽIF&g ce%D'z3$⾹P .)'@ޔ@P_̀=̳@sm_ /VoAh;/ 7)MͲIWm1qp;ד RKct+ҵ1u> &#S7_&]vOWʝWdƘ@Tr=4rn;C>ܒBVyx()בI(?N} B,Ȏ)V>wg{-_MuOP7zhtJڱ,9dZE$ź3$VYm2tIkm ^~bFG] h5׭$\x@)ȅn0 j x?:01&be-3!Aj+bi^9L#JP0Ws׍recz(Qz3ޜ^x ԍ=sc dm D:&8lD9'"a RxTo]GOE 6A4f]V0hqn4sbFóN݄ܺfJ5-{%nMVa/s鵱1-!aG;gn*WE|#1CD^`{TvonȹjO{{8\ o$ |ʻGĸbR:,%cE΁"vv֕~ludgT_NyVWo&J'?!`c3U~6ڴ&iG=W*xeP]ЭMaKOIx@55:Q,CXgݨtY|m@"Bc#Vn~kxWPnCx`^>`Ӆ *RO pLs$a 9DGmVz~twzWg{[ ,X[#0Y?*_35Jɴ?{~Vdzj}\+-%D:9:XF!$NXS[~\fJ(7,Qޒ o3!`wC&AF7tIǤKdQz`y|@[evۏBE;ŪU~u:;G|rh{WX4Qåb"j$VL =iu)2p~b/"n-%WF`r2b(%]$UR[ƚft߫ą4 p=E6~ Y|d\]#!P- gh'^b ؊q^4 93J݁b{\ W ygDF={֒Z;#2XE kk%pvp z^;n g ǖ,GU v޾;XMǥ_S*zX+dv{qD}-/~U E^_bCN^,OEŸme6Ō>sԔ;% .Τ|)a@#Pzo> ~ Ρ1tWo>:,.t"AkͩX֘YwÏ*vFF,MzvrNT[GP~ni#+N٧jj 3#OHFR#4%7%?l gĮo$w]G'c@6`3q1}unE,EuFm%]CI}O;2h~SdLC\zQf,*ݬ'L*m 5u.@_CTLG Y]2BYζLgLA޾tTwV9ġİL* .K˷+O7\M6R QuGmMUMfs]Տjy_ݿjb-Uݨw_o}ޱ)iaUg]Mhی;9eHctN4sfS7}6m' y7gBڄ5jq!:G_ g{b~cj x~7ռtե CD=5*?'Jՠj1R<^1f;eɾ;^fQ# VB/ Dh(vOo5OFVj|.쪫 mS5ð{6?5y2_cUĜz:jλaww opl3[])-_cf]VEւa Kw1rq1^j-o{no) NPUi{sKUqNi3ͼ0=p^lTI~ 1FVݏYzF yr`Q OyZFg"3ggMBBprXb+h9Nh9~=;kKOLӴ#ɍ!^Lݥca+̯+xx{yTۅ5wD2ViV3*lÔcbo_J22c尾Ky5\1_86q|Y۹3zώ"+w5峿 z0p c }Gati+ 5#d) rh A֊M;~ %>0I˾x\&Cm}9~A{![Kم!a%YeO!̾l|:j2j*3tGE#Zz;sTl 7{yL:R6F$}G1̭ 7XI값qcSnhٯ)MYs9>\dž%-]cj/}<͒GKqu-nɡ~w"FXtiqN2~~2<4mZ_4?`"0k|!=rV\m>|ljN}!QgfbCZЈS-:6bӴ"Ub{Lje?pmu"#zAa.ͱnC^or^+Jw51dfy6tD7%Y7b"yb2jTYFTW i&.m D_H+=HװDˬa {n<13JZk?k+'YƢ8 m\ǯ/]>6v!(ĕ0o&ZmDhpnXxUF8-(!OyoGݚ;ê[&j298 X7R3G];f;S8FJWq}R7ͯVݑޞ5evzɡLbe=8]5í, 4o$mkrV`nymQG@-|8dmg YX,Sˆr^bqSygC,}Y?Rt%-߀J5lڐ8> C#05 Ͽkm,;{CVh|mnϪ@o Zu O<6˙L}_9KjKߙp2(_`@βyU = tV I&? T>1g{ok ʳ}-qҮP DbK&g6vuqMvԳ{n/M G>Z`KZ6q $U ,7dnXh6OHD1(_|MUAӥLl/cXQ6U\Ml##(!ĢC(]ا%8F`|.yz-1hS#\ "t+M㚺ָQ*P*NUTDD@g DA26T-"DEdL6!2F!HBd7{Ϸs·wד3 This Internet-Draft has been deleted. Unrevised documents placed in the Internet-Drafts directories have a maximum life of six months. After that time, they are deleted. This Internet-Draft was not published as an RFC. Internet-Drafts are not an archival document series, and expired drafts, such as this one, are not available; please do not ask for copies... they are not available. The Secretariat does not have information as to future plans of the authors or working groups WRT the deleted Internet-Draft. For more information or a copy of the document, contact the author directly. Draft Author(s): M. Shin: porce@m018.com M. Shin: MKSHIN@PEC.etri.re.kr INTERNET-DRAFT Jiwoong Lee Expires: Feb 2003 KTF 13 August 2002 Explicit multicast reachability test Status of this memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsolete by other documents at anytime. It is inappropriate to use Internet Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. All remarks may be forwarded to author's email address or xcast IG(Incubation Group) mailing list: xcast@public.alcatel.com Abstract It can be important to know which node has Explicit multicast receivability and routability before sending a large amount of data traffic in Explicit multicast. This document provides how to test the receivability and routability, in short, the reachability of Explicit multicast packets to a particular node. 1. Introduction Explicit multicast(xcast)[1], which is a new Internet multicast, is placed between IP unicasting and IP host group model multicasting Jiwoong Lee Expire Feb 2003 [Page 1] INTERNET-DRAFT Xcast Reachability August 2002 in the sense of morphology of packet structure and routing algorithm. Xcast inherently does not provide signaling mechanism between two or more xcast nodes, therefore it lacks of 'HELLO' message as well, which could have been used to identify the presence of neighbors and their xcast ability - such as xcast receivability and xcast routability. Xcast basic specification, on the contrary, does provide neither 'HELLO' message nor any other kind of signaling. And people affiliated with xcast does believe that designing and creating xcast-specific signaling might impair the excellence of xcast, which can be achieved by no signaling burden and no stateful feature. However, the features that can be provided by 'HELLO' stuff are still useful and sometimes regarded necessary; a sender node may wish to confirm that the intended destination node can receive and handle legitimate xcast packets before it starts to send a barrage of xcast data packets. Besides the sender node may wish to confirm that the transit network between itself and the receiver nodes can route and forward legitimate xcast packets before it starts to send a barrage of xcast data packets. To achieve those purposes this document specifies how to test a particular node's receivability and how to test a particular node's reachability which depends on xcast routability of each transit router, without newly creating or extending protocol operations. Instead, receivability / reachability test can be made heavily dependent on previously established protocol operations, especially including - ICMP Destination Unreachable, Protocol Unreachable error mes- sage - ICMP Destination Unreachable, Port Unreachable error message - ICMP Time Exceeded, Time to live exceeded in transit error message - Inference of packet discard in transit routers by timer expi- ration. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119[7]. In addition, this document frequently uses the following terms: Jiwoong Lee Expire Feb 2003 [Page 2] INTERNET-DRAFT Xcast Reachability August 2002 AXR All_Xcast_Routers address MX AXR-addressed xcast UX Unicast-addressed xcast MX2U Conversion of MX into Unicast UX2U Conversion of UX into Unicast Xcast receivability Ability of a node with which it can receive an xcast packet and passes the payload to the subsequent upper layer handler. Xcast routability Ability of a node with which it can perform xcast routing over an incoming xcast packet and forward the packets produced as a result of the routing. Xcast reachability Ability of a transit network with which it can deliver the committed xcast packet to destination nodes. Xcast reachabil- ity refers to the ability of set of nodes while xcast routability refers especially to the ability of a particular node. Sender node Node which is supposed to send xcast data packets Receiver node Node which is supposed to receive xcast data packets Tester node Node from which the probe packet is generated. Testee node Node for which the probe packet is heading. Probe packet An experimental packet which travels from the tester node toward testee node. A probe packet may elicit ICMP error mes- sages from an unexpected node while traveling. 3. Test 3.1 Assumption of test operation The nodes on the traveling path of a probe packet MUST satisfy the following assumption. Jiwoong Lee Expire Feb 2003 [Page 3] INTERNET-DRAFT Xcast Reachability August 2002 - All nodes are alive, that is, IP/ICMP sane. - All transit nodes are capable of unicast routing - All hosts are UDP sane. - The sender node is able to generate xcast packets and is capable of xcast encapsulation, which is defined in [6]. - The receiver node, if it is able to receive xcast packets, is capable of xcast decapsulation, which is defined in [6]. - All xcast hosts that can legitimately handle MX packets also can handle UX packets. 3.2 Xcast receivability test A receiver node's xcast receivability MAY be tested before a sender node sends initial xcast data packets to it. With this end, a tester node (which is the sender node in most cases) sends a probe packet to the testee node (the receiver node). The probe packet is essentially a UX packet carrying UDP header and its payload, while the Destination Port of UDP header is randomly given. Packet format of a probe packet MUST obey the following values: IP header Source Address: A unicast address assigned to the tester node Destination Address: A unicast address assigned to the testee node Protocol: PROTO_xcast. Xcast header X bit: MUST be set to 1. P bit: MAY be set to 1. NBR_OF_DEST: MUST be set to 1. PROT ID: MUST be set to 17. (indicating that the following header is Jiwoong Lee Expire Feb 2003 [Page 4] INTERNET-DRAFT Xcast Reachability August 2002 for UDP) Channel Identifier: Random number for identification purpose. List of Addresses: The same address as used in Destination Address in IP header List of Port Numbers: If P bit is set, this value MUST be the same as Destination Port of UDP header. UDP header Source Port: MAY be any number assigned by the tester node. Destination Port: 33434 by default. MAY be changed by the testing configuration. Payload 4 Byte random string for debug purpose. If the testee node does not have xcast receivability, the testee node does not recognize the Protocol number given in the IP header of the probe packet. Therefore, the testee node returns, on receiving the probe packet from the tester node, an ICMP Destination Unreachable, Protocol Unreachable error message to the tester node. Otherwise, the testee node does recognize the Protocol number given in the IP header of the probe packet. However, it does not recognize the given Destination Port number given in the UDP header since it mostly does not have an open socket for that Destination Port number. Therefore, the testee node returns, on receiving the probe packet from the tester node, and ICMP Destination Unreachable, Port Unreachable error message to the tester node. On receiving an ICMP error message elicited by the probe packet from the testee node, the tester node MUST check the TYPE and CODE of the ICMP error message. If TYPE and CODE indicates that the ICMP message is caused by Destination Unreachable, Protocol Unreachable problem, the tester node regards the testee node as not having xcast receivability. If TYPE and CODE indicates that the ICMP message is caused by Destination Unreachable, Port Unreachable problem, the tester node regards the testee node as having xcast receivability. There is a chance that the default UDP Destination port number used in the probe packet happens to be already being used on the testee node when the probe packet reaches it. In this case the tester node Jiwoong Lee Expire Feb 2003 [Page 5] INTERNET-DRAFT Xcast Reachability August 2002 can receive neither ICMP Destination Unreachable, Port Unreachable, nor ICMP Destination Unreachable, Protocol Unreachable on return. For a proper test, the UDP Destination port number SHOULD be changed. The Channel Identifier in the xcast header of the probe packet is used for the identification purpose that is to identify the probe packet causing a returned ICMP error message. This is useful when one application sends multiple probe packets to the same testee node before it receives any of ICMP error message on return, or when multiple application sends their own probe packets to the same testee node at the same tester node. X bit MUST be set to 1 since a transit router SHALL NOT perform UX2U over the probe packet. 3.3 Xcast reachability test Most xcast data packets are addressed to AXR address. The transit routers on the delivery path between the sender node and the receiver node MAY recognize any incoming packet as an xcast packet if it is addressed to AXR. Xcast reachability means the ability of transit routers placed between the sender node and the receiver node on the one-way delivery path. To be successful in the reachability test, all the transit routers MUST not discard the incoming packet only due to the fact that it is addressed to AXR and MUST be capable of xcast routing; if one or more transit routers are incapable of xcast routing, the test will fail. Xcast reachability test MAY be performed before a sender node sends xcast data packets to the receiver node, so as to confirm that the provided transit networks can deliver them to the receiver node successfully. With this end, the tester node (the sender node in most cases) sends one or more probe packets to the receiver node. The probe packet is essentially an AXR-addressed xcast packet carrying xcast receivability probe packet inside. Packet format of a probe packet MUST obey the following values: Tunnel IP Header Source address: A unicast address assigned to the tester node Destination address: All_Xcast_Routers. Jiwoong Lee Expire Feb 2003 [Page 6] INTERNET-DRAFT Xcast Reachability August 2002 Protocol: PROTO_Xcast. Tunnel xcast Header X bit: MUST be set to 1. P bit: MUST be set to 0. NBR_OF_DEST: MUST be set to 1. PROT ID: MUST be set to 4. (indicating that the following header is IP) Channel Identifier: Random number for identification purpose. List of Addresses: The same as Destination Address in original IP header. Original IP Header Source Address: A unicast address assigned to the tester node Destination Address: A unicast address assigned to the receiver node Protocol: PROTO_xcast IP options: The probe packet MUST NOT carry IP options; therefore the length of IP header of the probe packet is exactly 20 bytes in IPv4. Original xcast header X bit: MUST be set to 1 P bit: MAY be set to 1. NBR_OF_DEST: MUST be set to 1 PROT ID: MUST be set to 17. (indicating that the following header is Jiwoong Lee Expire Feb 2003 [Page 7] INTERNET-DRAFT Xcast Reachability August 2002 for UDP) Channel Identifier: Random number for identification purpose. List of Addresses: The same as Destination Address in the Original IP header List of Port Numbers: If P bit is set, this value MUST be the same as Destination Port of UDP header. UDP header Source Port: MAY be any number Destination Port 33434 by default. MAY be changed by the testing configuration. Payload 4 Byte random string for debug purpose. If all of the transit routers on the delivery path are capable of xcast routing and the testee node is xcast reachable, the probe packet will reach the intended receiver node successfully. On receiving the probe packet, the receiver node MUST decapsulate the probe packet and acquire the original packet, which is essentially a probe packet for xcast receivability test. Therefore, the receiver node will return an ICMP Destination Unreachable, Port Unreachable. If one of the transit routers on the delivery path is incapable of xcast routing or the testee node is not xcast-receivable, it MAY discard the incoming probe packet since the probe packet for testing xcast reachability is addressed to AXR, which is a link local multicast address. If it discards the incoming probe packet, it will keep silent with generating no ICMP error message as an indication of discard. If the tester node does not receive an ICMP error message as return of the probe packet for PROBE_TIMEOUT seconds, the reachability test SHOULD be regarded as failure. The failure of xcast reachability test means that at least one transit router on the one way delivery path between the tester node and the testee node is incapable of xcast routing or that the testee node itself is not xcast-receivable. It does not notify the tester node of which transit node is incapable of xcast routing. 4. Identifying the xcast routability of each node on the delivery path Jiwoong Lee Expire Feb 2003 [Page 8] INTERNET-DRAFT Xcast Reachability August 2002 This section describes not protocol specification, but possible extended applicability of protocol. Xcast routability test is a test of the Xcast routing ability of a particular transit node placed on the delivery path to a specified testee node. The purpose of xcast routability test is to determine how far a normal MX packet can reach without undergoing premature MX2U. The xcast routability of each node in the delivery path can be tested by adjusting Time-To-Live(TTL) value of the tunnel IP header of the probe packet during the xcast reachability test. As exactly in the same way as 'traceroute' uses, the tester node may increase TTL value of the probe packet from 1 until it finally gets a result of the xcast reachability test. Xcast reachability test has two kinds of results; one is an ICMP error message generated by the testee node, and the other is 'no message returned.' During the xcast routability test, the tester node will receive one or more ICMP error messages generated by the transit nodes before it finally obtains xcast reachability test result. Example scenario is given below. A ----- B ----- C ----- D ----- E tester testee Node A wishes to test xcast reachability to node E. 1) Node A sends the initial probe packet to E, with TTL = 1. Node B receives the initial probe packet and returns to node A an ICMP error message - Time exceeded, time to live exceeded in transit. Thus, node A identifies the first hop node on the path leading to E is node B. 2) Node A sends the secondary probe packet to E, with TTL = 2. Assume node B is capable of xcast routing. Then node B will forward the probe packet to C. On receiving the probe packet, node C will return to node A an ICMP error message - Time exceeded, time to live exceeded in transit. When node A receives an ICMP error message from node C, it can identify the second hop node on the path leading to node B is node C, and the first hop node is capable of xcast routing. Otherwise node B will discard the probe packet without generating any ICMP error message. In this case node A will not receive any return message from the network for PROBE_TIMEOUT seconds. Since the xcast reachability test fails at the first hop node, node A can identify that node B is incapable of xcast routing. Jiwoong Lee Expire Feb 2003 [Page 9] INTERNET-DRAFT Xcast Reachability August 2002 Node E is not reachable from node A. No further probing is necessary. 3) Assume again that both node B, node C and node D are capable of xcast routing. Node A subsequently sends the probe packet to E, with TTL = 3. Node B and C forwards the probe packet toward node E, and node D will return an ICMP error message - Time exceeded, time to live exceeded in transit. Thus node A identifies the third node on the delivery path. Increasing one more TTL value will cause an ICMP error message - Time exceeded from node E, and additional TTL increment will elicit the result of xcast reachability test. In this way, the tester node can identify which node on the delivery path is capable or incapable of xcast routing. The Channel Identifier in the original xcast header of the probe packet is used for the identification purpose that is to identify the probe packet causing the ICMP error message. This is useful when one application sends multiple probe packets to the same testee node before it receives any of ICMP error message on return, or when multiple application sends their own probe packets to the same testee node. 5. List of default values PROBE_TIMEOUT 5 by defaults. This value MAY be adjustable, preferably, by the command line interface. 6. Security considerations A probe packet does not contain any user-sensitive information within itself. However there is a possibility that a wicked node eavesdrops the probe packet and returns unsolicited ICMP error message to the origin of the probe packet, while one of the transit routers does discard and returns no error message. This can make the tester node misconstrue the result of xcast reachability and may trigger the sender node to start transmitting a barrage of user data packets. The reverse situation is also possible. A Man-in-the-Middle attacker can knowingly impede the progress of probe packet or the returning ICMP error message. This kind of attack can cause abrupt cessation of xcast transmission or blocking the commencement of xcast transmission from the beginning. Jiwoong Lee Expire Feb 2003 [Page 10] INTERNET-DRAFT Xcast Reachability August 2002 References [1] R. Boivie, Y. Imai, W. Livens, D. Ooms, and O. Paridaens, Explicit Multicast Basic Specification, IETF draft-ooms-xcast-basic- spec-01.txt, March 2001 [2] Postel, J., "Internet Control Message Protocol", STD 5, RFC 792, USC/Information Sciences Institute, September 1981. [3] Conta, A. and S. Deering "Internet Control Message Protocol for the Internet Protocol Version 6 (IPv6)", RFC 2463, December 1998. [4] Reynolds, J. and J. Postel, "Assigned Numbers", STD 2, RFC 1700, October 1994. See also: http://www.iana.org/numbers.html [5] F. Baker, "Requirements for IP Version 4 Routers", RFC1812, June 1995. [6] J. Lee, Explicit Multicast Tunneling, IETF draft-lee-xcast-tunnel- ing-00.txt, Dec 2001 [7] S. Bradner, Key words for use in RFCs to Indicate Requirement Lev- els, RFC 2119, Mar 1997. Author's address Jiwoong Lee KTF Advanced Lab 1321-11 Seocho-Dong Seocho-Ku Seoul Korea, Republic of Phone : +82-2-3488-0416 Email : porce@ktf.com Jiwoong Lee Expire Feb 2003 [Page 11] A_hFAz/S0/rT۷K< }-j>2J%9#6?V-#Y Lg$"c"Pa[B%.h,/iyqph"k7W 8 Öֳ=v?v@2GƼߧˢM^).?(`iЃz#"1rtNXy+DkWAycة5{O l9RAs?*mV{CXW)軅ۋ9j/l'hׄfǶ>;hY\oho#]MD8UJT=&z2]3)@>Q]h4[>V \ZH$}ejh3}CINafm4=-&tJ%̡̞`QWӗǗo0OztW{:`3i,D ^bIS\/bzkh-M-YD.z%_ u{{Sq'ӗhI*g/u=f#Ӎ༥0~.Y6֎ j5^zr 垮!ݝQ4ؾR[9Wa9zr|USì3Z'dK14̧Y/9'tNΙ%tG_AFg]vy`07SRdӷ+˾d;!RF=ߒy5r+0D*&q|fATę05UП0l|O4+\yH >t1Op5Q[? 8%\&@nۇ@\ty=>%#FQqko'>" b!dW xؗ$^93Iwo.PS%2f?[{yNKcIy&#bdW"<(55Lm5FP)e^1#G}u}ޣbUc)*{?-)uo~>n{#ŻM<ۮΨ7-KTZ6~MMWZ?*BYdğvk4TʢR/o$\o"t4]5\2L,lRD~Y4#vAb0Vrh H-6(h,@zтn *MCۭIШIռKLC{agY>O=kP9c5?rQQ: ߊj8b6G46E8&v 'd|PO>~]Gכ ۖ0?$*Z4 #2+OjJ$95G{ 8ID ڽĶzlRl[tH]pc4;[Yr@mwO$NR3+^1>U';(KZ搒FgMd"W%/%ߎHUUkv(t;GUzD-Z7Tg-=#;nI ><"fɦ19@~O1/hjaȦjgzDJ8W12J> ү;BVwޣfO޷5qTZ届ˮڊH@ږ"-AKe^4P!-JB"DU dTbk@B2 d2'vug_9gLɼ]~wE aѧv?F}i]*xE%}'#c˝1>HNɂ;9, S07WP+(m IH#? -@ ]ă9 )wupE9p:Oceˊ;BXl|n\M&2L}YĀN+;uJN|^kY&ҝ;9a2j2pq!n3%)c4jTul?Fa X4<`kw4+܎(ȍ mǿs:ZwEﯼN%_i痚Bmqʌk%;t,ɬT]OyOBrus-^ws/` W6|qZ|kذK@Q6r9niWU1BTdӴ/.Qcד5?c 4㚯J̨`3z #t.?d/hl+A2;prL@gvCUYY7~aqhy㘙P|TX~ BD|/H^/?Uޤ[WƨI,u}Vr|jR7ĺ:(&4;fwLkr'YQv56ir8J%^YHya$=y68'`e{+g>rzLZ`pjSNd X+  +;=bb:ŇQGLvbaA^@ӞeT_`L܃kǴ߰:T?㷯ۯAJsTԓc+ly17 ?^q#u|QrE7WTިkK-h|HW# c>Nz!A wۉ9 y݊/uxgjky |:e>1vb;|QSme] Y~a=}XCiPlLqooX4"-'wB[W1z4ukJ ~ +ZJ\<׺ q){$ikC1$t8f?df(Y]c:'~ ˪/W" 66]I ?|T~dCHfܶm=ࢁġU@˨%E9[D+ԉ!35hTБ)ɌO7&KT?&X֙C4os)]TӊERWb##htOE?Gr8y*J7Yaz4>Ѽs ㏹ZN8! p~W⒘ (Lz7{H%]fOѨx#@FK-nNSl^YUIhepVΔ ,xک43ܙ*jE\ L #u,/0K5y3c>|2XKз]azLvhRګ<ݿZn6=a]';kθK>bGz`HycR̞Ù\ЏΣ)@< g푭ex %k!t]~a';e*ۂXHy'b+-= Ġ9aɪɮp%h^WԫQ:ԕ0Xanu5fvvDfvЭc_UkCC~Ļ8ƾ8 N;FÔt8|N}\E%k 4zHd3$U۳$mo3T$K%\,3R S|6?}$a[c/ıC>Jۏ^!:t (~3o|_/P[|A~Ob dsy$1 q-_f*feSQÌ;6:b#.<`Wbz3 {#vw-ȸ)[D^ĭtпB6Fj#fo>Yuw(Yie,SlZӨ{r e_'8-MVYK:Сd@HbjҔ^' }ݵ8E?q"EW`T$ׇKٙchjC[bak:ܵI=dz 4Nռ3b zO4JmTk^nM5Z1H6l`~C]wZ귁yN^:*$ f&*T- *LQP[nQNE!ȳ6W(gҨ)?c|Є=er(mn-,ck~{Zݩ9 <`g^ngxwoYyi5NNLB=f~#j;1`_d,4{*y-RK:ymX4QXP7Vok6E`cu 0͞$hd:VWt̙Ci2Qk-m(fx7XE|dvvz͂Ҍ=ּf'lztN5KV~zH\6t~Ј>NFKKGpx<脰q1*.[lm3{Z(n@JN*|)AqPwٳ/ ,^٦[,D^j+_aqm(:Iihfa?OqAbx5+rج.}}LQ>*)LuʙxN@QFw,nePUxg `q? 0jvsJK9O{}K| 8gS;_"_Y 3sc!ocK8},`|D$Wb w}ǍKr>|{M}\|6}„)dgfmBk{E5 4ĺ~Ov /QF> #pQ7.KS-(͈w.$t+ 7ʨOrCgEp#v#z)[JTywɻD>?xK_bZx18^PޜRxhǍ?в6n=#SJWk=*'雌)@$Ř$%ƍxTh{-D.(ksd) mTg'奡X; 9VZy2~ۛr4Ϸ~<8%^+N:@Ę[ INTERNET-DRAFT Jiwoong Lee Expires: Feb 2003 KTF 09 August 2002 Explicit Multicast Tunneling Status of this memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsolete by other documents at anytime. It is inappropriate to use Internet Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. All remarks may be forwarded to author's email address or xcast IG(Incubation Group) mailing list: xcast@public.alcatel.com Abstract Explicit multicast(Xcast)[1], as a new kind of Internet multicast, encodes the list of destinations within its packet. This document specifies tunneling scheme of xcast packets. Since a single xcast tunnel has multiple egress-nodes, the original xcast packet can be encapsulated either within a xcast packet or within a unicast packet. When tunneled by Xcast-in-Xcast encapsulation, the bitmap of the original xcast packet is overwritten with the bitmap of the tunnel xcast packet at tunnel egress-nodes, in order to guarantee the active destination set. Jiwoong Lee Expire Feb 2003 [Page 1] INTERNET-DRAFT Xcast Tunneling Aug 2002 Table of Contents Status of this memo . . . . . . . . . . . . . . . . . . . . . . . . 1 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Xcast-in-Xcast encapsulation . . . . . . . . . . . . . . . . . 4 1.2. Xcast-in-Unicast encapsulation . . . . . . . . . . . . . . . . 4 2. Terminology and semantics . . . . . . . . . . . . . . . . . . . . 5 2.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2. Semantics . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.1. Xcast-in-Xcast tunneling . . . . . . . . . . . . . . . . . . . 7 3.2. Xcast-in-Unicast tunneling . . . . . . . . . . . . . . . . . . 9 4. Encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4.1. Xcast-in-Xcast encapsulation . . . . . . . . . . . . . . . . . 11 4.1.1. Message format in IPv4 . . . . . . . . . . . . . . . . . . . 13 4.1.2. Message format in IPv6 . . . . . . . . . . . . . . . . . . . 14 4.2. Xcast-in-Unicast encapsulation . . . . . . . . . . . . . . . . 16 5. Decapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . 16 5.1. Xcast-in-Xcast decapsulation . . . . . . . . . . . . . . . . . 16 5.2. Xcast-in-Unicast decapsulation . . . . . . . . . . . . . . . . 17 6. Transit node operations . . . . . . . . . . . . . . . . . . . . . 17 6.1. Tunnel branching node operation . . . . . . . . . . . . . . . . 17 6.2. Nested Xcast tunneling . . . . . . . . . . . . . . . . . . . . 17 7. Multicast-in-Xcast tunneling . . . . . . . . . . . . . . . . . . 17 8. ICMP message processing . . . . . . . . . . . . . . . . . . . . . 18 8.1. Xcast-in-Xcast tunnel . . . . . . . . . . . . . . . . . . . . . 18 8.2. Xcast-in-Unicast tunnel . . . . . . . . . . . . . . . . . . . . 19 9. Tunnel soft state management . . . . . . . . . . . . . . . . . . 19 10. Security Considerations . . . . . . . . . . . . . . . . . . . . 19 CHANGES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Jiwoong Lee Expire Feb 2003 [Page 2] INTERNET-DRAFT Xcast Tunneling Aug 2002 1. Introduction This document specifies generic mechanism by which an Explicit multicast packet is encapsulated and decapsulated. An xcast packet can be encapsulated within xcast or unicast packet. The main goal of the encapsulation is tunneling packets. A tunnel is a virtual forwarding path on which the payloads of packets are original packets between one encapsulating node and at least one decapsulating node. Within a tunnel, the tunneled packet is not tampered by transit nodes. Experimental virtual links, Virtual Private Networks, Mobile IP networks and etc. require tunneling between involved nodes for their normal operations. Tunneling mechanism used for encapsulation of unicast packets are well defined in [7][6][9] and has been widely used throughout the Internet. Explicit multicast[1] is a new kind of Internet multicast, in which every packet carries plural unicast addresses of all the destinations within it. Since xcast packets are addressed to more than a single destination, the definition of tunnel, decision of tunnel egress-nodes, processes of encapsulation and decapsulation should be different from those of unicast packet tunneling. When an xcast packet is received by a tunnel ingress node, the ingress node encapsulates it within xcast, or unicast packet, and sends the encapsulated packet to the tunnel egress-nodes. When an encapsulated xcast packet is received by an egress node, the egress node decapulates it and routes the original packet. This series of operations is called xcast tunneling. In particular, the tunnel has one or more tunnel egress-nodes and one tunnel ingress node. A tunnel can be identified by a pair of node information, ( I, E* ) where I stands for the tunnel ingress node and E* stands for the set of tunnel egress-nodes. The cardinality of E* is at least one. That is, an xcast tunnel has the form of one-to-many mapping while the cardinality of E* in a unicast tunnel is generally one, therefore, in the form of one-to- one mapping. The set of tunnel egress-nodes for an original packet can be determined either statically or dynamically. In a static manner, the tunnel ingress node has a manually configured table or database with which it determines the tunnel egress node for each destination of the original xcast packet. In a dynamical manner, the tunnel ingress node MAY use one of Neighbor Cache or Binding Cache in IPv6 or Mobility binding list in IPv4. The table being referenced when the tunnel ingress node determines the set of tunnel egress-nodes is called xcast Tunneling Information Base(XTIB), or simply Tunneling Information Base(TIB). Jiwoong Lee Expire Feb 2003 [Page 3] INTERNET-DRAFT Xcast Tunneling Aug 2002 There are two kinds of xcast tunneling. They are classified by the type of encapsulating packet - Xcast or Unicast. 1.1. Xcast-in-Xcast encapsulation In most cases, the original xcast packet is encapsulated within an xcast packet addressed to the tunnel egress-nodes, and is sent to inside of tunnel. Since both the original header and the tunnel header are xcast headers, this is called X-in-X tunneling, which means xcast encapsulation within xcast. The ingress node MAY internally route and replicate the original packet in prior to encapsulation. Inside the tunnel, the transit routers route the received packet on the basis of information of the outermost header only. List of Addresses of the tunnel xcast packet is constructed as follows: - List of Addresses of the original packet is scanned in forward manner, from the first address to the final one. - Create a new blank list. - The address of tunnel egress node for the scanned address is appended to the new list. - Repeat the previous step until all the addresses of List of Addresses of the original packet are scanned. The result list becomes List of Addresses of the tunnel packet. This list has following characteristics: - The number of the destination of newly generated list MUST be equal to that of the address in List of Addresses of the original header. - Address duplication in List of Addresses is allowed in tunnel destinations. That is, the same address MAY be listed several times in List of Addresses. At a decapsulating node, the bitmap of the tunnel xcast header MUST be inherited to the bitmap of the original xcast header. Without bitmap inheritance, a routing error might occur. 1.2. Xcast-in-Unicast encapsulation Jiwoong Lee Expire Feb 2003 [Page 4] INTERNET-DRAFT Xcast Tunneling Aug 2002 If the number of the tunnel egress-nodes is relatively small than that of the destinations of the received xcast packet, it is RECOMMENDED that the tunnel ingress node routes it and encapsulates every original packet within a unicast packet addressed engaged tunnel egress node. A tunnel egress node will receive a unicast packet encapsulating an xcast packet. This is called X-in-U tunneling, where U stands for unicast. If there is no xcast router on the tunnel path, the tunnel ingress- node SHOULD use X-in-U tunneling instead of X-in-X tunneling. Otherwise it can convert the received xcast packet into multiple unicast packets as many as the number of the destinations of the received packet, and perform unicast tunneling, causing bandwidth consumption on the delivery path and processing burden at the tunnel ingress node simultaneously. 2. Terminology and semantics 2.1. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119[11]. In addition, this document frequently uses the following terms: Xcast Explicit Multicast. Defined in [1]. IP packet An IP datagram. Defined in [2]. IP header Header of an IP packet. Defined in [2]. Xcast packet An IP datagram carrying xcast-specific routing information. Xcast header A set of xcast-specific routing information fields. Destination of an IP packet The address filled in Destination Address of an IP packet. Destination(s) of an xcast packet The set of destination(s) filled in List of Addresses of an xcast packet. Jiwoong Lee Expire Feb 2003 [Page 5] INTERNET-DRAFT Xcast Tunneling Aug 2002 Encapsulation Prepending separate routing information over a packet. Decapsulation Taking off the prepended routing information from the encapsu- lated packet. Original packet A packet that undergoes encapsulation. Original header The header of an original packet. Tunnel A forwarding path identified by a pair of a encapsulating node and a set of decapsulating nodes. The number of a set of decapsulating nodes is a positive integer. Tunnel end-node A node where a tunnel begins or ends. Tunnel ingress node The tunnel end-node where an original packet is encapsulated. Tunnel egress node The tunnel end-node where decapsulation results in the restoration of the original packet. Tunnel branching-node A node inside the tunnel where the tunnel branches off. Tunnel packet A packet that encapsulates an original packet. Tunnel header The header of a tunnel packet. Tunnel IP packet A tunnel packet as an IP packet. Tunnel IP header A tunnel header as an IP header. Tunnel xcast packet A tunnel packet as an xcast packet. Tunnel xcast header A tunnel header as an xcast header. IPv6 main header IPv6 header excluding Extension headers Jiwoong Lee Expire Feb 2003 [Page 6] INTERNET-DRAFT Xcast Tunneling Aug 2002 Xcast Tunneling Information Base (XTIB) A kind of database or a table being referenced when the tunnel ingress node determines the set of tunnel egress-nodes. X-in-X Xcast encapsulation within xcast packet. X-in-U Xcast encapsulation within Unicast packet. 2.2. Semantics Some of the frequently-used expressions are stated clarifying their meaning and usage. - The source of an xcast packet is equal to the source of its IP packet. - An xcast packet is said to be addressed to (a set of) destinations, which are listed in its List of Addresses. - In general, the destination of an IP packet is different from any destinations of the xcast packet carried in the IP packet. 3. Overview This section overviews the protocol operations of X-in-X tunneling and X-in-U tunneling with typical topology. Let [X,Y,Z] be a notation to indicate a list of destination addresses of an xcast packet. The bitmap of this packet, which is used for faster router processing, is expressed as [#,#,#] where # is binary bit 1 or 0. The bitmap is used to indicate active destinations in the list of destination addresses of an xcast packet. For example, if an xcast packet has bitmap of [0,1,0] while its list of destinations are [X,Y,Z], the active list of destinations is expressed as [0,Y,0]. This result can be obtained by AND-like operation between the bitmap and the list of destinations. 3.1. Xcast-in-Xcast tunneling (Figure 1) briefly explains X-in-X tunneling protocol operations. Assume A of (Figure 1) is a source sending xcast packets to destinations F, G and H. B is the tunnel ingress node, and both D and E are tunnel egress-nodes. C is a tunnel branching node at somewhere in the tunnel. Note that the existence of C is virtual; that is, C can be integrated into B or plural nodes on the path simultaneously. Tunnel path is drawn with thick arrows. The following letters after the colon in the figure means the Jiwoong Lee Expire Feb 2003 [Page 7] INTERNET-DRAFT Xcast Tunneling Aug 2002 destinations of the packet. {1} {2} {3} {5} +-------------+ +-------------+ | Xcast:D,E,E | | Xcast:D,0,0 | +-------------+ +-------------+ +-------------+ +-------------+ | Xcast:F,G,H | | Xcast:F,G,H | | Xcast:F,G,H | | Xcast:F,0,0 | +-------------+ +-------------+ +-------------+ +-------------+ | | | | | | | | | | v v | | ++==========> D --------------> F | | // v v // A ------------> B =======^>C'~;N<r^WjB2=ttxI),Vjx@e q=)-lxNLƎtȴ#&˺C{}\m6!8O*QgFg_|?+}Xtlk?r\䡃/K6'[j7qNk68-)N߰#+<?@ua!АiE2}CHnT|WS&nCnUbh1 A%Tŷ2Ęlc9Ƃ#⹖Rz<PH~zwϗ"S%`"pW\eEKD(5uֵs\_hVH{:{w&Ge|i['c7[پ&n)lP) bq'Td]3 g2Iۨ+jN?d4\,h u]_Ӈ9>IޑbaMW-E1 ?p'1&Z^/݉2l^-tJ5*\l[pPVeEs+8z"qٸoEXQ 93n6A~GND9}XgGǏ<(*)1; 1h:,0Z)_~6!鋉()$ ъrY\IH!cC$:T'ڱ\[ 23B}]BVm$?^rl,^%@ǹ&jɒRbK5"$,\*"I&Ye\-(bMCk7U&vII2[ ̕j(كȈ sYl4 :@ä9,sSJhK%]辜kw{ vfiԚ͍k{N\(oZZA4}kL!61D&ۏd3evL;?Wɣ7=TCq2uN)& mUW A~ k룫jG;:0l݀ځwcӘ4#>z9uSCoǂMPraHiLg0Pi0eG(Y m@ ~Pf "pl,9[寮(Sp 8C ^? lWi#ikwhSH4]5ԃ?yF*z"\ I g p?f &mi?eg0P3˿g1A.Gv!gblA䍪 Q:ET-fXachHz4VTe{a&rHs0 $U( O:t$?.<^p_r5c%枮soaMW0NUim%-3C}Aպ(19`N/3}GSv nG Iӕ_z{?wKS}ڽeA*T>`Sps|Sz[gKI$A'7>/\?w&}9ϋجAx8`nf3"u=y~͸m@0_r7}-xq8]eK83|:! p@MU]f(qjN)_ gCMhf6̩T|=MWX<<܎L HG|8p3qȊ$s̀rٻfD(x3m^m9ry:l:g!@t'wOøw5{!I2Rt>!#_j||_߬i5vwf"YE#AZN(.YCTXAR@b œHY$FxcAG?OJRlcu~Gz:D[m~E9\<-=C:ļ*=Ǩ?l-5/Q^ok5ָ4o1U@{G T*Jl}OcZ vTu&ARMOd{cŮ)m|9[fXڏN,*nmu+1A*+hi4HiϤdH`ӄZ\It#r<*SOZڄ*C)sO呓Dx=~99742z&$diR*Q,w:8'[==mtrz{3O+BI=BE"KtuUuj釿oyjAOad)@~6mygnqXiW9𐨅[5f%i簙!g ©5Cirt=Jzx2=𱅟ә92۝T11'9FNLz^Ep4.Th0ęh9$UZV3n>&N{f<~uczu>G%nٌs>Ipr#_tvSa-԰CD6 AB)Wmsđ4B,G3R>zGG>n {lfa1T(Oπ={ VX'cͶO57\㐉QCNLsy(:hfհSqg>s>&//m'}R.x | ccʂoh_\hkׇ6.om"{b@'v;mb[O,l?3]=$eD% MŔ2b٘=WͲ\1>~pw?TW#&q׻>1u=VuV;k$sf` tbm#fϦhѡWE]G;,%1_ek9pjﯝ \«(+8בe1|W1}vcɒM$Z܆5٘1!2^ WRh3kzyxש++eN6klaZvq[p qfSSmk'ծkkj р F'JD)Jȳ5w^6㹪'[Ł 5MbIfPJुY(DɢhI'`M˓&3|Cff`1zSiz;N0­ňd] x]^z_Dž3-4=4J.]PskP0O%ܕ΍K=&GGݍŘ:1^TlHdAF78_ÙԵ=E>vF LrS~LA_.tպҪas-1&>x_α ۬h,P"d$=OO8ep縢@^A}#sм ^OXgCPeG^T%9 \S]cLw;  }Sr /NW.ie?ݟcZ5:\}jXWJEˤ?lLdV%W >_,M qh{߭0`vK1ޟ{3;9A Mm2ZD?LaN]Qꛀݡ=jW`a  ssoP`!Np%)t9C1!Q*]_o7k2«tt~EhM6~SC&>*Vz/BP% g=Y$vl.MY>U"iabrDg_߃[\gLx3^ @7_rxgf{j@ReUQ׍װ<3{@{>eM ð,GBB 334ؚlm3m[z-ldw*I3_gg^),}?+Yg]V)~́걟-"B[!~#YW9 W͸ ? $~jZLD!w4T/cfI0"҆&$R̊(!K& xD~Ō'.34cyf E9DvGŤ'X3ZZןEzg Ҷ9#t; p>h^Ym@< -}PLHG{if?}[:o {|33dIP**?e+ԇ*/PZ໶\a4*'oxL[ Tm_XVEl56Ec`L|1!TOj?&lW,%e'*%m `IkQ8HEy2?VӧK1?2\jS*D=k:+i#|H4Ak&O7ifJDH35"?3ijqeן9BKfR=T/ f~ɛiIdY8z!,e~?7[ xxyf0ҤS5Oϟ5Zz-*Խvi L<6м")TkWne4Be_K%bn!qYhe.`pԚ c\8ָ=!ZK_Df-&4ہeBμSL]xj4Ul #'BZhSOP!D= r~GwߕG\#0V1YDT ^;C NJ ص*~ZbRq&|Vw zDIy`sCD@?~n0b 'TfO;uU|zVlnlWF2c?Z}h/Sn6E#giFAFMFÔ" ';4o-zLҹgi fyHe%]V"@!< 4UeDV7d|fЃyG,>] }|Z f@)f笮ئ#vPI#0!M>yfH4X.)f^ [y3m5A#Tk'5mFrXƏ76:&![Ogw9ʿz:~u}Qd֮f(e:pik$iLCX1N +;ױrD$P50w jCt*nY+m- FF}׬#KP=b&mL؋t;|zl6ξSL* m*k xOShaăb0AM|JҼ ~cPPΧ4RW\ƥ(wćf c9}9c(cvaqJg\kRɞBq+EX+1,ls}O`#M#l̤W$i'cRr'-[Z7,1 (2/P"_~o9r H( LLJ4 ")BB+ԿwX0 7f S+ͧ *(S,:! bG[ʇL~e, ZSy/M\\n,(Tx,۞Xit nFgfDR= zzl]%Rҏkc?#Bx֖U4OC#SV200skY/[^;h)P-1Pc5Zj I8* r4|IZ!dmf4,&Ԯ%U -( Ƃ);-T/I.ATE)jTQH\D ~AQ$SG iD-fG<"E_PeNvC$ضAR++fJtA-/97ZڙoׅT0p"hx% #{x޻p K:QfpEmEKAIlj>,0f <uaj!ؑ׷$?%r OޮYGgsKCrC>)b+2':^eFbZrBFd|f2C3v~z{lEF2(lpN R:+_)Z][ gʹ[+3_i`8,8el٬h'՛\\'bKo˽1f@֋8[PaAI& ׿2+Y(O!']ak1rfWO]Uc#a!ƩfɸVɱ WFxAo8Xe RעiLGWȃoD=?|zG|/Ei[NijWZ:jkF]t΁LCtp1Tl(K#Rݿ11flP͘}7䝹,|K`.YT.gDVZRDs]_3QÍlۏ?FֈFL,ˆ w &]LۈQBQD8*]Tˣh*eDJZ%f+i*J$ c4z:,%^g1+BTHNl+nU;"eU#f=iZciG Zx !Ki"/wIDcǃTNyH覮dt <Pʀ3wG$ufx y! ewuî, 4Emw)mxE F6t8X?嶂i485=QDrv&';?h!%):^Y0k;z[J}p+k ^D# oҐfsY FXt |l`%~*Y(݆H7 ߣɂ4QAI]TtE#N=kap1R3 Re_gەjDEPk1w&:Χ]L7{HcԳPBiP- f䩣3cULG2 8 HRn-E@4s-wo I7pcrI(E;Lvަ-J q># ˸ 6C[b w`CcV`xpOW "1=RUE SrE} C~^RȂ׃aJdH/_z qϻ PC)' c0xF["{/Uڄ v@6_͒[zW\q(D:BE b>ES% DD G"=>9Èݞ 9˃,s{iD]n.7;Ԍ= !@8 }dCPsjx:TlALs(JfLɬC v3> <0Cs#^z/~ͦ>yP1$43C˦3Jb>J If?b /A} ? ;kov w;Xh%!QY0-n\>mp="57n`q6 D>FF́,+\?˶ԑA?CQPHm6W`tIc= x?[}Ekcypp6(A.9Ϡ]c뻾Jixty)i͇4;ibE("4>kR4?E)Bj6[O6)jpؐd2 N`b7"FZE-J\bP8!%ąf&`2+cu(uX:"-h\Pue >uݩR`C(ԉ1"\S %@#HV n-?egb`>Skg{d#S-zJSuEyQ86d hf\,@-,ֵGMNz7,}M\]mFk  ՊWAqz"n/D6S%>D`ZF(fmhuSGj3>i0՛ָ l[d#9^0gb9"p1)nJmʇəwExCsK (0VW?mR>]eZp@L3̒BkfҼ- ؗ)wj>(U @GD+Ȁ ?9jY'mo.[æi<.c/$=!W%L+eB%SD0PhөlF^$z #Go /d6aÜBCt8^6vs\6D;^7J_U@R|M=Úm9*Lno :V"ǬkK"W@.׼0"V/bH64IaZIu}ͥkF(9_vx;;9ЎK^%`e(IW*(v]!0L`3'""uaYhc ?-pi*&}xu޸4ko]̟sUx.GP5B4tU[O^?qor\a ᏰNT#í荶+ew>kR!Zl !lclCǗ&,%\1!HǛ5LEFHR P^S™h75ki{,F019z/<0AwI.)oξك0Z:|xm1o?)Mօ;z*b PA]C#ѳ)١ uH1u``V5((090^o9szW^\Wis3U2WŤ1Jn)1hƛ&YDFfǖh#wy=_BGF\Jhx "7s#zo>$tLWl[ñǒTqPT ffE/c^2b:3b Tʘ!A lV7F_$/N[l P:ay[#mTH8Џw+>f^`|cU6k;@']Ȣ?_ Z\ Bp) }?{0YWKIf/=3e0,]YmvٺkgQ?Yo ݏw<=? nlRecz~~rޔOAgMW<™Aˌ\n1dZ15=LjJ F 99.$\^zx۩[r[2ݣ5 bc}F٫4 8LB R3T"{:앱cU^QDDTQQ}ϹqC{}t>{퍈b< g6yeZ*65Q m Ge\^Ը肚FVL4B]Ɍ`^˰ chChbëZEvW }-CLcJQt3]@K .DR@$Ya[@qrZgQ~ܢb&̶R|[wSS b, Œ6 *? W~deHPF&;2[ ߏF#08ؽARr!t #SIzt@zN^IJ^Ǡq-A^BH}ez> )A(%%(R0` brxG-#N꺍:Q3G==fMF{MR͹NR귓Y ۬_J|n䛙Kcw\m" jFcn>Oq LE-%уcRA*Tē{nEĦ/Sv 2.p BLT2A#2Y+~&d7m1pF H PEY 6%d@!d ʒc (Y*AH@a&&)d!HbjE&цfYpQA22MH1M,4HBfY$1T$6 RiTJ=d h|lM¨A4A7!nƑC!iUvo qU%X|6kR[ӳeK-*'짰CKaׅF"S{4sI} TCP:3gu(x#Dh/  HMZ'sz̙NL7wcR;s~ƛH'._r_ Q+)H/2%2Gj&BLB `ϼ3CW?t/f*5Q YjD{E kGYEﷷsJ^׈nX? p#sbMG7޸ *tl&=`h3. X&erƦ4t҂0W4^Ook8Z; X ҮgODz)iMiA`Q1Py,q~N6»X]*F` bE Q3$i˞q8mk͇[:@γXŠ `F;T5(0#WPCc]['5+'B{9gHC7|W=hẆj ✌NSohrO?O'nw_z2b}v;ږ| G[,}@Bqpm,8c3ݐa:w' LSc!0`=(דw CT'gevWa|C&HDx/ N/g40}9Sk4S?`Yx _K Qֻ׻}g$ng# |j뗮B,;eG鑘+K#<&hqdj^mx@'6 c~;Y~D~ aC/.Bͷ8\.xZˏPDkI,=hHp9Iy ,E-Fی.%8݅>ZPߩs#XR.YEb @*[k09jj*^]ʰwSsKK=gWse"b5cp_YSW^9yR3x0 .@L(=cEipy]QAaG/2[@=MnYKN}[vHv3vYS:c~NۭQ2X y42ڇ <;/;A;oY~@4XiaYB6P>!2Eu;tOAUgMnѡY'ltmf'E@ƸP빚t{^p[A.%*}piǭ~a#|vsZ'Hf [v+E7g}/x<6pn; e 7U2=KcPI-O)$-kaԂ|?k**9!/T:LyNdiL$>Vż}zF HB. juOlwiUbd\HxGA&Cw\8{`-zE[q0tDDg-g'^;]fT3/cR 9(*G'^RWGn an,U ̓"T# I%P)6moyI/dz3ўw6vf`H2 c4]{S@ N1g1 5 h,Rw8RO>;l KhCt;X8󪥭zL@60(Tƃ_~D'qӐ*w>x??OZ%.EMžs\i+^NX}.ej;ZW&̚ T85똢 %c@~Y/q/wvg?G?9Hpgu؄9v]xم5 ӴZ3Щ!zQOICw9do^fѲ|\ @f8ݼ,ɎtP{LYNF+Qv9 iQ#qʾX׀h$G^yAq[%DB [Ӗ'U'[T^kpl?4%W}D ˞wŌPGwGgbfc2{KW}0YPF}q$5LK-vgUHK>=|8z lr ԩΝIWۣ vhpe)X:3eM$mI>gr El[~ 1>S2!ܵWXfғ,ףmt^z٫Q!kxfpۍӏy+3H"K=vj5Ԭ!rP\N8U2VĂ,$#7rC_U&wKz|ZI{4~ᇟe2 #!֊mv4F> ׍^;=R%FBDP.&U@QAXu}~9]> Vʊ }.>HU HxŇ =E5z;(Mn`h=p4ZBk^k^8^&L-%PPcVfg# ppKvϒ;:4 wVEʰ4Vg8!x74zeS1%SL^p ZD(7b\t\s 7˒y^_sn$;NpHH9_{9,S_ ~;.ye?qL[^129+dxp(;!Wk:HO}ô~QEOLwXc [㾁 à X ą*ܥ4HVIn_Ld3#İ>#cYġHIÍ>In4r>:}_@c(읇ff0Dbx#\ sK{+N `ĹF[b|H?6@sӞuX`It;sj\5qsNQ0bZn7Qv3͜BSᜒBƱf\8PA k$z~ B|ϋ9P?x oB 老ȶK'&s]<\!`BRxɈ`j̱ƧWxb mV:5O.$~K |猧Զߓr,9ff_e.gX/jδ8pvwWWq@z_yę} ii:{|[ ˠ;ya5.f7r%w""l3{weh|[wO۔=PˀE5ENW'SpS|a!!E`#6Xw! 4C3> !G1Y%bw9OC}X#[e.QkZWUE, af^ld5 @.=mT}{d;Q;0}2<78yKQN 5X4+G(]N߭^v/@iM<okdɗ7rc][Ž;q`pFO0Z8fgm؈vԾ;RcO;CCɒTU,&KKYb ƂKrqNԃ |Hpe:+3bرW/Սn6ޠVmO BW9y.3qu&vq}lymOO#ڶO=ݢbԕ* d;%Gڹ'B›l>>V&Ŀc9k&e9@+@A #J o^"(炘*2;rŗ 5luMڮI@&|@`+O\L̈́NY&,{Ϯ?#*f:}Ǹ<{ѥgf5p[q(8[KYu]Je ȇxNuW/!ly  pd;<W =6R >X.F\o )[z\2윯Wr/nգyH(6OӷiǤq%M;r(1XsC~>۞"@a$1ƅ<;j}#O3M&'U(<ߥhV#Hc@&2j?{=vZ;Kn:=ewafwEPp|-߻\8ǒc-$eWwUzj@fiU(AGy|fg?'TrwpþwiGJ" 理F3x f'0ѪػNnEߴ-[9Ww[>{s>95p3Vav\Αy+zE FCH^>bW&l=m3涌ɞ$2nDz{g4-:$! T(ZCVG1PUOs~+}z؊3F$Z3qK rc&R4ZT,XϾb:Y~.쒍n6 `zjҝ/Is?1aښ~L7x:>>L8=+Y`&O%GA[wRl!1.ݣά#vla~(ݏ*̜~7[(Xpށzt[ !mM|Rh``/ G!6ȣ{i}GK <b f%-BK׈ @%qȓ3 =n}Qa KwTe&@ZƦV9X` 'iY6Jdn~I>tA'(P:~Q#zNí3׷fp5e&o,&;p`&q/[K&_{2.Q&/聻>'@eyhn,d)"h =E nxeӘdldp0֢FfB !yO~Ga, ܚ]v'yR"Z#vVcFӒ r QpW~Nxfq}7KŢg=E+͌-Nd(HL^^2%ѻ 7Nfop15Qs{`I$[cYm*-&)BIKp1.JWC~"#BwL~+ A۴~< #FRq&y9>8ekuKFjpZh)~}o^hXU%OڕD`czKV*5Gai(93zn͌8⟧NZa55t qQ͜\1ZvV,} '@,39Wraeu`}o*r-Iՙ?۾c%&"No՟Vtu@t-y3SlDD32~/'KQ4nO #3|On-x4~">W~iwGT(/LigQB[hna[h/Geĸ. 6 %0G`C6;y-S0oS)fَ29c?L?IRaA6Gڂ)Ïah^utHQp\XbUv9~&mLLrכ(jN{KLr~A-%v܏DCGLQ%<4U?!l)ՠ"KC;&Q񬿅Ilް0bOn R.ʊp(vK8Rlv[m,/>I}\M7?ڢH8w1l\V3m :3oC0Ca2Ihr8?ĸcڐ>UU92T ut-|l',:śX`vf6L'WiBFzHgfs;M\Cx"``y;@:-*9 xQ6tɽ XdI$t_v-Om`^Yac [|ZrcK>[,k:߉a^4G( Sч{n-~vSYژ_oqn]&Qoko[d7۰Wi~ooX_ W>Ю@O?E_̋3([U`߽+,)?"o7*+8]H{2}.ӷ$  7Yh^*1ؽ{ b{k ڀ>?լ:HD {Sܤ2%VC}#.sT?h_VFQg ݞiɹZBɈ[DIy9w A-ᱲlT0cHV( #x}gs4ބWfoF_uӁwL X|DY J80.X)gۦˋGeyeJZv j\S><\C뵴{Nƽ)' ilidb3x֫hݗ=29ROU̙OE=W RO#yQ76FɈaUV܏ RDq8ykڬu+o8 2'U5d(8.FΖu\wMh8KfZ@ ?F:ī5Uj2oJSyx2~@bVwLz2XŧZJ35SgFV^rMVCSyJH98 BZ.'EΥ76]&eSD&MI> NxkvNeRu3>_\|t3jzu=}"v桤ϖM&Fr `0dj˞_2[M­??!ӵ^X9J2S4JwrB3PQe\<Fv, ^Hc; x 3 ؖR} ij'8/ BbnjM#w$|']EGm& vEg/+^FOB $f2!zS mb8/߶OcHP" jfc$Z%RaRv݆3_iT`՛b! D[bMdg2K )Kߧa3[/H4VV>{XZf>܇r 8s1Ң=s_&mzPåj'0.턪> ]}.WZQ杖c.殸Y/|69Vc*#6}  })6 `j+Gh9݉+#Q`΋4ʹ9@JQiڑu"twu~+Dn.e- t:y/U{rg\ynJ2F}! 0gy9k_<#q^#F1-VYP+1ֆ(@[46 q.x֗vAo:F.PŀLy-lYŽ:r}OOT"ĻF]#0!(|chͼl1}PCϧwv ;,_2WRYg F$CM0Zy0jHH Il-?,65RBڝ;~w(LF)VA^T6' FHx"AL}`@%.0Hu={Q۾bnm6v5F045~k9 hm>#` h^T{BDYp1ty^X3=VQFŸ;_37=PN;G 8 g Sn\a3#8"6O\9G5QQ~c2!Zu'YUTX@eZlZI*I>t-r ({<)Zʼn((:݆aѧ#;

  • ޞ>gqKJK ÿ~20&Z JF赆%1@EI Ho0L)M?1g)ة,`{*)&*2݁l1[b ǭ=>y'Xϸ1:;];quhf8geTRшM0e^>z:~W{ ;O#E%#ǡCuI57_|kO! ]T?mG͊~\OžNUJw0EhغA !ҟ|Iy`[䗱 EhU55nF ie jgQՓH}'C.S2f̶A@&\Pvpl;_ zkV7Hc=cLp5!H M#W0Jޛo5 +1?Z~h܀~lnQ& 2P@́.a9g_hQ# ϶m wz-tVU #ݲaP5 sHq"^L V =uU}palί~Uzo:OxCM>lD ս݈eN?Q'OkFW%g8 ̌ja"qA=EѪX?a¯zٟiȽ[<{s"$,}-!n>sc. {rg9)C;tBd4[lc6]rM#0C3W*<\p-bBӲ~\$`;ӑ!봮n֫to7 :Ϩu҅úHXZ<[>Yb)s123 ueZ H3O?X7,lݢQcڂLPn=bjg!Mi'X}_NE2fOZ3&aܸx▜06I[r ̨[ X>{=n@ jˮ8{:Oiv! ro%w+w,r \N14Q&5E Ysպd)؎aގ2Vdž.Hl4EL؁Lx5|Nf &2l}[N+M8.m9p5| PL)xٷzGG7nJ'>խ׌dF9?? S$R3RR=: txM^`:(6~eϊ%Zxl/eهfB#<G=t>;_ 0%/( ktP?FSXZƓmErǶǬcO5 .L"HiŪIlM S&,OzǵA=4\B29f9xU4Ńnisb:;<k F=(cw#kG?c@fEQ 0I}GSYo9H0ȯ̇䲧~5ɤ{O;Қ$;ˎu֛ضEDcTYgSLV}O2zq}]̋$b͐(r1 {Xw?t?㐑yzWWWbbGc>ׇoKGogaю2Fdt!MkB (AiOydpXխ!RV!ٴc![2?puk?˳ :>o[ ?1e +OY%w2j$gO&k{_}ڿ~ϫAq0P!I Gg⺳,kYiŽ}gQ~NR'Fc(*yڍX/?ʘ@Aj8>k8:L$eJqz^6"mdZ(UE!t Š6دBo{d@WpFB3}1cdgLơif@þ`}ܒ-kADߍy뫸0w LcSZ=nSn#4?x3̶ϴz?Ϝyk H i(uH.X\ʎ7=ej~9})Dd3~;0~3yK1]_jvf~~>Flj7o:O ZURL=0_xr03? r_ؓAi Qۜ7&5vRRvm9S}c|صsc:nw_A'^ŧGإ{/S^ŁF7 h K`I9*EㄬÁV`p@"( 1ks[X˃贛~ ]>Y}8-[Ù@#}IE b`52t?HZB&# , @$BQJw@^Wݸ^tRMJӾ{|Q,YfdkրR~egqnN}I/p'2ۇ8/wǞ6DžSEO)K(ТBHN~uqˆ%$IK $H2 )j3mEޮ;2q˛@N#7!;:q$Kc弐J4eZ o ?^5}mZZB" zr3Sosll\ڽg_c<T0 4vzOO*uH D@.Ё HobI=V>}қܧNnXfZQj}a>$=שd%fH~$i= pZi-Ր+t܌1?sgǐ09y7'=?+M)_&zeگ2|xm-XoC6р|@u9ݝF'Y2*D)d<]T $ZqpS2um~4h[ bPI77Ozbկ=oD~!Per <?RvX{_=}?MMx"6Q=8eFQ{62#C @M)I>GB@2Y^\E_{; >q/R`w)068HfhB ~d>TmmoѼ~ h"7Ɔ4=b#pOI1Xz1}7n8QL~ b&tN;>|ڭ2„zPUkmJY(f ?!,1ɌTz@6?e':\kitqؤ\#N;ؔ-V96z7'wVĐA9KKFwyfk~~GJrú-6i7} x_HbH RI;9:#pTgBe>Tʊ,xlSZv%b OpazޮcV" ,2* G_կEsɎ^klx~9Ia^!4 oK[ȆM4jo|v:iaGXʝP;uBr+.E >FZ掻|SL.>Rkg?q !xu@Qz{e9ODkj-Ύ^" -9ks<~K@ yqܫZwPi}$ 5i"ȑw LpQa%1*80V;x߲qNB CQ/Wm >7] 1YeSv ?shGmҸK]t/L>a*vx`mϮ 'ֺpc?,aR-_J_?v!V4w'6?S - euOsPA{,LH:؋Y+63H ԞUk}oҥH̑p1BQbNう*Z+5 ZsmVu~sbeɆ7UQ{-AU @!?pnp$9/6pAHqvRzckp(g]u-O>!DsZٓC?4g*wס%F8I i0(2zH]lWOG!i*8ԹMZ'oѪxҪ"0C~׻ =QC~?8$U?ϡ> l;芪Q6ZW,ELM2{ qLfZ d4H>SA%JcS8"9 9 ̔4+VZg)ʹ~T\>mrP+<+y u2$C.P|~'gqB^pzw1otl}\\g^,F9U<3m7Fzfz[`1~@~bT"H?u 4eޜ0zRu޲`\F߰l1 GqzlwR˙K%iW+t֛T 󮘬hEqí<>uح{ɻf !0lTo;"M_5,; !l6Xy翏갳rP;i)EG˿?JICa-9XUxJ:3_R?qm罭xvEMܣC"<ʺOLe> eЃ\{F$ڬj 6Ϟϖ?g#J1)`u!o|z[`~ekgWx&Z 32AbЯYGOd=s#\>2{D1>dgp6S"Uz{y|'-rQ~=.gTg̐h??Mcʼ!&'RLȋRB?aJٙA]rl$4Oȣ2Yw) XTV"z%ؿz׵KKӟfDQp\`"ijqfUq'޲MR[X b>?WL-e1||;&> ̋'돵]RCQ):NGy0^+=OT?6:{<6I)5&$0MX1iۮZMh(NNCJ! 7 9D~.2H$"F ]Tfn%vru)=cPy;jZ |w54^mӧlg*7'5.B7HSD5@7M &=eEe2\w0i ,v 0>5˱lɸtwqORBEDPSnZŬMal-Q8+ݖbmhOӉ&wM9X} L*f_oC@|Glov t r؊ZJ̮^ZDV2Dƶf 0j)K+֫ߥoE5,ʙQ]U5Q2+B6>Mv65>P2l;Sc_!0xc} %SZ'o}ۺ~vej a!-@Bⶰ2rOqw?$*myBZkvl6OW\?-ӓ{Ug:,00Z`͸FF1?cVP,DS~ Kb"(KѣqW9mo_?A7=TDLB?wHI~ѺI'(SwT y_{xvXpFddw)Cg = v\=xqy'_}mCA(x̲,s*6vlSzW?FbN;S9ԧ ++gH_ov-?<cݼ1re O |!ДQd*1`CE(#c1*-H1i O5j~i'1$MPy'E R~̙2Z_[lpgJD4 :}ZM勁W nEu,oڧU>Fkݿ?|")E3)Td&m4:^[)tV\IÂ=VFwe?;R>q11>9rN~?)ŔUa-nXqԯS"o:Lv>:ۛ">x~s)Z<[*^m5,HdO߆a','GOg0~z2Z+u0ڨ#ig ~e]^\,^(E?,aTǠ1@92)<){YHTj_x5*PGZ Y$)0@P=E=/濝@֔Le$0(F>/OE[1Ջ.] hpDfx"?v)E'f\q2%F=F$>U X~ӿ>A HP۬!L(}`H4,~ s:,g7y~&m7sZ :fjnkQxJȆ~첧iww00m?.(pV 85YxIquAHLII u _G]J[d,M5!HI,2 lMfAyuq`Ÿ@c> .Q$H褀E$._?.S!ayJWIź8J d^J:_K7čj Mk:oPm/21:7TU ?}gwFAZ(9ِ **'Ac˾;ϹM{?##.(Q+l= ZV28w6 c#^coC/̱εw4z{w4V 8P`"=fܕ_:rF`fنֆB$T6n}qT:roeP;gEc a 8^4>Vƥm)h.'='n*,eutK6H67mRA%jAPH)ZAV-6v?W ݟ-2neqggp7VTBm\t#0Ke[|fKï 4^{TVED;جpudna&'srt&D[?.RyGd;#ɝ:9;0kÅ=w "mCf"9 |PMBJn:#?xw1ѻ$7p{:AR'K:@~rTq\2 u⓱=xN2iO['@3#)aBs,{+QW駋AcX-swå%NLe-}Bv zP`[{/v?dhE AZlZ`iB# 1|ٜu, 3؋4-43nC Aˆ][^R;ZC33͹4D(B{6i=8?|{]ڊV>@wgEGiIUwx\mm?cTFt%  A#"@ 2:܆cWwz/qɴ`y8k.ۋUuopS7R;T "H ByDM^5?}b15MLj ż.pZL˭p`7ٜz n?OuS۝R@S&-W T$||~?퇷h&i-=X``(}@B:X#PR4L#dx̬/vG!Y8E2ssT0s +P,R}2Aж K+9,B ,XV1PS꿇ݮF~Sd-ADD\Hň2FL #٤ ) ~VaB wy-^&> qHa,*#fICv!6G))JqZ6:8&3UX 5&C51A@)1{<91M̒f eDYoA{RQnE#>Ώny%\#dj_t?R'A27g&J#U/Ks4 G#[pH9tՁ~:g#ωP';}'֑H4ܓˀ!G#A ] 2QV@Sx.ࠨQ%h-FV@byS4*#/Fu&Fv V(kejC [(h^O G}wUEoڽPV6UX` 90G/ KU f}&*0VQ }mݹ.(<:FJ5j'Yxi;4wgק{-ΎMjttpahZ3 !R>d֝uzZ+ȈYYdDFFXqW|P~–*憭~ nkKxm7|ja瘾g 0 ~L)N91O FYu'>cpq;RA0ܑJE }mER?A^ĆA60&RW~17 7\d~s^3l;!1vesz⯘+$4dj* 18̟ 8F/;S@ODBuJ@=M|wmUUUU5\v1IR H}!ml>ן멐@QpM#)$rtݪMVf 8T=tchD[9UhzVjkg7h]>؆ϢO$>4@oYv᰿@Uujهޣs45!UIDOmj˅sAVh%>!M6V]%R[=F~&n7UjZCkaVtWSYǬZm|~f ^ȆG"[5Cz[T{Uc$GS6K($@TU#CH}뭄pq9 x屶6?V|] C*.zRl1YL ܅b!VM`BD㬢sǐ:H%j5[Aw6~usCEion-+gΝ[7 j ;$C{z T'FoZ#/$: M55x?pѲT9P}~Z)ܸ &_qDz(/>J@yE'q!Yd4 u]8'<R+;+ӁsJr*:*;PB&snv x'An<|zc:>jd@gplDu:[JadcV`W;e)qh8bqK?'Y&z}]ATh?{;K52%g;[ݖb=4u~oW$Ðtr `^pQ*mJUWzOGޮ]!_YT{7J8;9eժF'/YxV 㦤2F(KDwh],D뼜hz1ټ_K\kp$`y:^^jGR?=.i&%#e5B`kZTN=ꭶ۶!#gt1g쨡:y HT($D1S*Dw?(Fje}[9;k]DVh'')mb$~c[\znvJ@AmvG}{=z2#R)B(i I uT 5A1?b2,^)ųa<@r j`jTSSouQ? f|#2092gZp1y :Եkt#|NR@ڇAlF>= ZA5PL|k%&@8x! &'q |zϢp) 6eGEa^e &M蹁`Ř:(o!x.?%ragۑ˺abC,k4T m^##ŵ]s(j[كÂ?0P:ҁ8İݗ;P*aCm f )^|ZjAvbLx}/h ̥):^S<#ʾdw;M<=0135gtt``LDaDX/FM\ ~Kq*X/uv z.X((k"3:Ceiõ8  6YZ$ll~5l(lRNѾӪtT]uw=\p?AɟCF ?//Q^ZUUb_ @IIy`S3dWX8s8[cűkU[}ek?|:ֳPQ`mL,G@p/n[Y]Ҫ {K,1ir3{ H%L6W-E7GaM}шiKG "~=_?s~GTo済 *bІWsǣno}_/ /=F$ !<+ž&]l!܃*&vAXS{5b2I%J6T`ӆrp "\gTu"d?a j56Ȏ$L>ϼ"eR iLD̿nf>xs;r c^O-Jޡ/e~"y tد{C,HID?n]@'8va7!D@"6~?]+:KK9ߥUaoi8Vt md/7s:P0`#Q˖/eo2:X?gSn_?_؅'n~rFum#/յ_|[F~oKXt%r\m_'rhbw<2޻#A'KԔE;L ^=amR`^omT"bNM_nU$dL%ۦ}&> H%@Od}&u}2KRഒM"Au $ "@2pFG`.!h]k ÷fch(+.}kó ܂J:/ar3@$u10RgηMғ+Ӷko9 Fڈɚ7{ ) rCFwsQ58}SOGEQ( chQ-HvЂG;ԊS'uJZ }\?qp ֖ETRjY02"7oy ַIP-~E[iux&%fr2ee˾z"TUvX j"""9Ds$n iVXp>hI0#cNm&_D8)dR7`}b|[wq%F([Б_nE34!AEVT>ٱ˩XsI:Ԡ?G1MW9mLIUqq#C? TMIK8\iQ. >~5mq92m0=>]D`CWd>9o<u6Tݾ]ط$kµCb "tH_pI#Tb~IDrgZEQ )3>Y}2GOAe"'zcGZ ]]Gjt٢$K2b!JB! ")AI`&6 j;'4KKR?LJIhV-: TOTs '(ebI&zox+mn|SD{>}|Z| QS~3`,^UJJ1.I,5J%j30,jdj&I3cñ_W^voD:(oGG U^-I$7 (l];9!N9 Fp>V[]ڐhD$ސbqR!a,ۛ^G}c*_Lt.L4W6Tr IIdX.zػJRNjLN@>pm)F6b}_ɿOƐvGmbN]]S?n|EfD/pNj2B(N1" `|Ɏ41}n#1:\f irȫ`9A-pbuM%MS5FY+z)XZŋwELG:7KlFOiZ xCaT93E$_c2^nߙbnL>򦓗_TWJ2M¨ҬUފ  Vи`$*D&/:W}Tܡ{ISXQFq_N tca7#^a~ 轝pmk@mH0}SjL1 AB7@p@YuXǍb#|>Z[jUb>`aj e7mt|R~y5ƟsWː؉ D7Hš{ƨD-Ft LԲ :BE>^2iYiA,`$Ocg5x|AWjw 4 rj3_ub [:g}AqI"IUUhu&?u[?til!?q@T%ä2dk{kɿh^fUUU[m(RׂCߺ|O˃बYMiA"9#E0ڱwz+ >owgn+)X #LXʿew55R`H#NNzHNXYaBx/{JM+ďrcO : FMfD~ٗJ/]1h-c$G!A`(JmއOkgCGI}}./zj`D Κ?s-WrzN|S.7:H:r&ymuX23^"IY$h ZBb|%xP2C (Š> 'u1^+ls}^ ճހ5 #mDŽv /#o=V_+OpJ MXdkV?7N]tph\;uM$H >{P}%ka.Zg<lj4*‚={#Le!)ƥz-e+QZ~ExdVWJ݂CQ3$*uRAD\JQFԽ?|YQh3z2@MaPT@JޘW|o@$aqu5b,'>DI)ypEax`3u WoẨz010na]T8 OB54JKOhrb87Cͻ#1iV mff,J3oZ6%ڸav[x@$1YܲcGwA~~MFڇguxq 3a=)oы!f./Hק  AJpG=Q9[Q$N'WW~o|~uaK#T[϶ǘ8{XA5- of\ * zkWVP/ZnG)3DC,ZXt2rozlUuw-Vef|#B=ޞO_`ާ`},* 9~ P#ZNJ<7˃Zf6 ̞ܿ(/2{SR;/S"lB-M8,  y^_CAmP L P1"θ;?VNa}V14QK [҆D+~Y)fM~#\ZI|]ӞPpH0=ޝCxyDsf.`@Ba!˿qGb7xk{%ⴻHCAp3NhN_0a05xN|`U J^nzA#rf\y͂5 gLy' +GHVA=Gv6g4?iɀ$Dzd̷ж,WNcA%|Ua1B_2#m1$o"Gh {)ӟzrSJD1-oBXy[ZY#`jjm a`$ A ?Nk1i*_Nb7@*`w^D8h \0@9nX9Hzyv+5aD gʉOM4f|Hp u]]t$#Q=TQ:T)DF[`1$Rt=9- qb6VElE6qj+avL7Z$6V34kiI-Y#[-*^|ZH`](:B?a{y$%o KuR,Vw{,SN"[,`AAux*}V\-3 ")u 9LCE-a"<)Q˯_ \&"43:)OuoxۅAذCDHUe4Aʤ4¥Fqox8zu&zS[CI™㝊( [uG0R/>\Y͇!| Vtrn{ڙcPBj9~Iɼ*<#u_ގ"w_ )h؏&ޛynLl&3U#nm{kRg ?dv_O{F`) P }c"#1 # Cܠ!c/F\Qw_{HEB™aa]\zΛLՍ4G|Z&Fܘ64 n=sw`x 3W)jY5*Xx "vqweѤ@hnNO;(gtv{9Jo[4s+\MflTBW~UO,  `ޗzu-1Qҿ+޺|淲qo紷YI烃sTk@dPL[ j{Unʇ'cJ~ f\]LQz7YlFfY7 98}@}bY >ݣp 6GӞXn15zmQx|b2Q12Vp1 {G[Àk L&YFJaU `ƓCFьA\oB/*Ύ}d=M¦-f,CVG9xeP7φ7NSlFfbF0'~YH>-υ.k=}l %}BrBcwxo QXiV.SI,2OUj>QH#_L8aqk"9H+UqUkc.ۖ|4 k[fKwk>SC>D/w\Z4yˈbFX ,UѼ8^<{]v/Xw6oG!&DKo*eqȆ$s @BSPf"EՎE),oN͵2kvaiZX:ҊRV}?7*3>% zZ^+xc*JþAX<@M1>d CQ\Q|z>I|! )i Vxm>;`m,m_d`O E17G-A @] 7phٽP"Мi]G;øN{PiXo8ŊFuqj*OIGǒ;o!]Srެ^/u1Q ÇY?|OPgrz&sO"Y`h畂uS^NV9Ak>`  _k~نPBs$E@UV0,X(,@gIPX1QV @YAb,R,D(H` c @F*YOg,Sr@Th,ޫFۢ ",`gz~.O4FdPe(ʲdfJ]z-)%g' je|@ `A oFc(0|?9R6OL*y<;wFD)p߂SnrZҙurHHxH$N7cot" $ b DE""IIR,dX)X,+2E Ȉ H"2* XAadY V A*3IXlLH_KazݙMEe)E rb!R-#^vzMF\kV@1t@( r'!ZQoo(:b"6d @ 8aR!PyX`K}!Ԁy;HbXvL$2m fx*q/РR]_*h [b؏ 02$u܆i AHWXJ["=AGGgTS'~KZ4g75H_[B# S /x{Ԫ:SaEeO銵>,f<%44}DߗI _EѶץX5Ēƕ52`cPH½8mUUt՜~ ۺ$yA=>l$6IIlq3!u*) C'9`2Fx9":?)o<n7(gpYvV(8"u6 SIaaۘPdhk: 6.s`ML+t 6#'. $)nN[ljfš*BR` "rfY;N>eMɱu0 {әm-?X}-xVP{ec*[ ޳j=*Bc1! )I1ٌ|ꁨ7Fcċzo-2BL Jc~SP2!eht1 s3F\~!δ$ 3m0HI٢ɏ ]$ST3Y^˘LHvX7K&2^vA/#(f#Oj%rAB A؞g29%) |~& c(ee*\G ! ~,PL޹atN\w(.In7yooMX~ɬZ3O~ݗZhKy?awh#]zŒhᆔ !2zw2[X"a5:g@LP~6)dBāh#e8^G,m C'P9Wޣv6wq}^ҳuvW_Tvg|5v*9Scyq\nZ6T|<չZR Bn!6X{HFD` }r#)w:k7VףFZ 썺Q0Cʟ$e}ݭX r$ssNӧ_F(p¬ 8 $ d~`x)g_)#owskЦ@Ch=ʌmH+!T[%Iu^-0w AC8{E2T![څpMޏF u5u|\ ,usQ pD}"֨Cټ1t}Y'x>wM=7u^/} NĀL'=j6t'th}egki[ZOZtiѯ`b<4߄ q Ȑ*7 ^CaM $vgRcSNMj'%e$=`v@ڰdD(i:D8PT"XXѻN1VI8T !YX,@O*2Vc#ZSOALBEz-F 5+Ǵ?K 'w*}LDP)T"1B;Ҿ iAJPg/[H4cX b"~j(#  `VC2$QAbU*H " ̈́\镶[bV%g<Iڢco,8IXm.I (Ȣ $%g?+@A""A#!龮ӓEK*(nۑ",q _Ė{ &HCg:lƠ^&hFcj2T#(ũQ+Z.0iJ KG"#.:i=` Kտ [CPzJE)0s3KCgxXʟ! 1~zw 7L7gdw?{'YQa;r)}iȲlMS6?z~ܔa)#ye݈&^zy!BV ɛ \ӿrJ.y|=BDFy^@a Ҏ-#! g6=]p-pQˎt>&15gC0( ĕeb%GA7~)w̲| CՃ7n* 1(![6\|̈UFؒ VgʰWq. r AJ#>i.UN|Ƿ^!Q{d~:?޶G9أ/?czJUzk[idsUTh2@Dm_؞ιDY^i"ȹLU*x,̘6~ ص,LKHD" 6J%\DM # ɪ 4?K4P ;&K[6, kw]~ws/oT$b"PrE@"۳jp;Ǣm[}Zaf#LL&@@\Pʑ<_嵾qdOւ⣁ՌG?aX j;[ b[Cx3zKԈOC~K ~{;vi3XޙTgFɆ; /Aչ8zؙ}Xê=m "ݡ z#_^mnSڲPU 嫡rz-AVA3{3Pb<_)o&j]\8.x CĐ`ΓD8}+C kQ\q7m/6= CM 2< $ASBzO;'dft]d+c)YdEbB"L8(>DB=*kE.jc_+o$4t_:fw@qbGY ,|t/8#SXW>j:J/dFh%?EH췹!\6 d|"8GtY推 W;YFP/l,FH/#\ph#明LXE@8d &=YҖ] aSk{GQ(,-☥B[ۙMH15YH"εl"ϰ yUA_$vL{@C܋ 3s K5 (RÇ KQx+vp|o<܁RT^ sWux:L(@B B(JնB6u { dw2aHFW-UUwem"չ}|N *2%B<I:d}L"qÅK=oAKΌbSg,TB`WF?{ ˀP<9ń$x^bE+g%} y!)R3v`<_9 jQMDtsG>8u~ ]U|7~ۧTPa(]C[[C\W&3#5 P& %, LwW$mo뛜uzhE D`=ꯓC T7%4KlBdĕiԺk%r IH ZC-UQ.h{J- kkFƬ TCsyRKg6_.k߽»sY&ՖUz!o(ˣ|4$1miJ%3P+A}#y2ٿrHbmÏm-"4 Di/^4֦$O1MvYG;_oo1^{O|X. w8K|N }Cdwq KشJ;tgR+ul,r%Hq1X*+{)?ojKc93;@څ_f=h'i~sy( T`^AL*3P0- kj.[54650pB&N}&Ɨp.h%qC c @-EQo78p>: ͑ΩK Su0xES8lO<s-UUUh2bؤ=vs\%!g0EBTTLGjoRbX-le\jKtl--*jrr\;P9w~Oz>uJ@4>PaVѫlkZ%\6Pؕ_y--o27A ҰRM\sG]'[V,qji};}̙tccc޷Skf &v㿬ep_ vxGi!?B#N>$1mMnq٩(x[fL krNK&lcr*=Q*@!b?_|1zֱy:j? X.6N x$ nCw(=eyhU|GJW۷g +sey$ B sc@8n |_P+nз)6+lg1FwE,{ yr<āy.iUX!*ä 1y ˉiD،tEaIlȤQ}M?{wO}mv{1tBjY O>&}]}'#aZowj7f۩Ia.VueK8n/A]69CO1PH \SBtJ:5Uv .XL2;򷹼 vNF51j^T@BJRt;W? =0"kouZ#2>) $ T h֊ u8 IC)dm1n+;` I Kߘ\L QvgQPaZ!f|/&$ KBZ$92QY[EZ>,Gvv=I4UCc`pg}SY5~`|h}v 1H#.U^ʕ m A)| -Jl6wl߫g0?0$`Ú@Gc@@O,i1dQ,q'rFE\Kd hB(L >1nBpvޣvb+]tyhz{Nhk_/>| h BB#~I"U`XT;vs<},86J T!UЂx?<_֓S H$H%oK L?8]S*.dq e6`1Bs4#"6Іxޤo5b T?ڪ Uc|tZ;37&j&mAOOZ+>xjr9M,|VZ:7rG,~Fs]^kǃ\ϓW}W*m_+)(<vX><\kQ}DЈ&5ug3Yp'"! D|5쳺VKhu%ac/Ʋlo6&Y˺ĒfV0wS,8Rb =h^Z [؇L-D_M+YWUny|> op@:FU|?zmy-6!`S\Fd1 ?Btϸ8CEUyy^+{BE0`6?Q꓄-?ww ÀzI> Ɯv)F@22TV`2{=XM_|/blr}knxxٽgZ6[ʣKi}1]~S缟)\[ja" ^Zҳ㮋uUm9gq]{JIzwk}QArT.D%;su;ԗT-e">я*G6Һу0>η$#Cd`Aeplj@ݳl-Ǖ m/zss(s;cj@Ue*G&9?}kH a? j G\leM\| &j֠b3DN6'~q-* a۔ ي0@ s*+ci+iҔi/u^,繓.:&PwKcccãB_%wW#a$A+r!i.{κ0XW 1Cd*09`tj@4kN98A`Y>$-UUUW'Y嗧OLD#M<rL8 beW"ps,Z..926gD1 h)sιgh;INJom!&Zi6TRbk)Z,V γESARv~BT~?LW uR8; R#N_ءk ΁4BP) CC`mRQ qxf'u25Bm"]d?9wɡ.rkuIfk0w3f軝<<:+ p*b"oB@:GAZ6{7%Csz#0TX@NUÛY{#h1bN}څ'@Ox> ]12YuFhUM(ՖBP@2cT0, rV0R"pf` 114u;q vIle"kJE>NߨkM~ƽ\@#n8H4A 班xKqV=WL-~tƅH*uXN%WW~.bə5! |d2NJM1ݫE<^2C@"C>yitvZ3W &*[u<82/7uπg,lvօm`SSWW i?=_8435;CQn?6 +[x]=`T0;چ{¹Hp5?H13ѐt M2 VA#5qH  Ȱ91>ANJ[li+o5)lISd5*X30;pvkSKe{}8z1Dznb62csn{ ;K`R@Fmɸ'_NT/ǁA"FIbvҴSEks.?ol#{?L9RJ^/REQEQEQERC=V:q!U=0b-3]C/\㟊 ?!tI Df^זv웛sr>g>sZ<>*| \gBb=kلyx@ Nw*1=Fl - 0x -' ͺch9jloq~b.: v\['.f4ia_ iN=}~gS^''UU[kٝoDb@<( 𸆢L .Fsqu:7 AJ-Sgz8PIYP0SPy-T\l.w#ңHFmʶ#0d퉿j"9ps#Jd-{ޱnJ]/ƿ;~W*PhJPc[*obXҌm6 f+.kߔ cl7C1S9&%]_e,mYc,g`ۿOg>NCmMU-qB+[C-d?婢n(C(p!5XR͏j GֳPI("PƮ%]vW=DR=[YyX*U]f _uº?w'e6qb0paOò F"$ r@'5Qp0(.xHOz/ZhHƱTo`֐"1R1{v!sbjGzx?>s`ݏ rF*l~,#N^vHmM#]Zu5괣v* #uo O'0ɍtH:nj)8^2xcĪ .hm)im\nS[}QEQEQEQEb~}/` @M2@"-G,yzmkrƤŘ7d _NqXNߤgAA?(G0m X[o>w$_3`]SD* )*"@ FhI/kV8xttn/A笸?&R4inwCbj{Z:Բ[R}p#a~̯AG:*w sVQspa:>|?((>.nvE! u䰭RO{;q!S0*Oq٣gtݫf0$–U)L8t\7rl ں\l aXUL J%ah2))͸=C8> ()lG˽ wz% =ӗnitA"S).!le3\ߍun&L2dɓ&L2dɓ&L2dɓOJhm [9í,"K˨\Dc5fHPݗDAlo&/l{W߯Ғ7-'~[շz~GGǹGǺGǻGǼGǽGǾGǿGGGGG3g"I9Frٷ\0dHA8s)xzX۱Reu*VAW `ĭ Uii^󾟓 ?16}K;ShݚQEQEQEQE&Ҍ5Te51b`zr8 C7}t"~';eIl#WWIarGCm1V{)K*){+ݕ~z2ʾ>dvMMMMMMMMMMMMNNN NNNNNN"N&N*N.N22Oy·zNNg+CRGbI BmUʵ #f*Lљ>5fCEsZy2% =Vkc(/?U r5;ʎf?6cy )lOҵ[.sstu((((v{= n80L&^j_UZZijWǥf7ڥ`1oacw-C {`!p61761{!WҖĻNoqz+M,hzgͺr; )ޞtz+O`>RX#@tTL-[}]֢((((D\x՝{hU ?¯>I#U)~v&RNIb xWt_ p ݚ]+10N2X,CS߀;[%*/\. AU=3h-Y<-    A9&rlʳg KaD(`ǠjPF㹓@MHC,$@b .SPo*|-3lIbcz驣vqV6HPOj;ggRg9QjuȹVZ7z+36qEQEQEQERzYF<^D`WآG?Z^Y;1lٳ&O_/S'dV8h S='k lw1\$lQi_ Az0CQps[? + 8tAeuWQ$.ɻ_>ǎ"db24>g-b?TĬ"M38a>{1ـ^t_cJun mȲL߭𾱘-+YRPj_aUJung 6ebumh0ioڋn&_6^YKov>UzR]-7H!G8^8l2>hca*p.nOqx臛MMY[Z6[Uߎ\&Y "Nzf7og+8fpijg1k8lȳg&Q6rF3Ou()Cm/i$~&@0C0 #*j$SU$ Mv LW9䧿/e*Z`2Թ=Xd$,^Ӎlٟ0g.(LL0没ʀ% M׊u>'ax%zzgk\6b*78mcYÎ<1\&2@ȄE1;\TVw|}MWR*Ԧ1V?"@*"`S@}̟{]Dlcx4-/l&wCz㬀9Mz؏١Ԣ(qϬg( LpO"rϏ˜R1_rf<5C W$F{\S.g)20ԡtoA߽&gwϥf|JD;7!PQ$$Y#!y`oyڪ/)[a)Y<Og(:aq5 SփPѽUy]c1 H㕫3CT_20b$ciQp>^o xwӆ%j-Z9o]qM#JAyx2PQr693m#X E Œ$6sj1vQ{ManHz9 %lvBs<ՒMW]|ס]e@rrَ0sh!IZ (̤L!iN85FC-=~4/ "*TC3kpd /Rܽt-ݑD)Y:ZBgF$=I-|ց~s`w\4ﺔca0NTF_#1 W6I4önQBd$ ihd@Ǵ2"Z H_{V4;&I Β\|U:h=8`gOF{NV;>lN PT|VO.l;u}HDwy 3)L,;&&&: @SM`δNqmdljXm}Z8:Ja>o5h+r,${dGRP'T1"vL2EP,%eBamBTTHP+&C$[yLA"DB 1 KS:;Rb(V'>I@u37yz̧E1H33 xVDZ %d<}T (jD$k3!x'n.wE{}Xl]%1`*LR0p]+hGQΪ:-^H)C4̳88sFiU|5!}O/>Fǡ-U (@\B <2C"0BXb0GP`ў.fEQ+$C3b'C60=K:hap䁃ٟ ~t: Vo͉Q"Zu8gCu}=l3ϓO5p, g{odW ;K+8LxjιM]">.w!n`utϻ1("<h^N@ KԋۺP:9j1Dk=%W=~ڊiޛ˦i5x775bE=*1Z qY0ݛ}]Lya4 Zj];V\ބ59!|b)XP1FTbb;`USK^ yAFCwr =Uu`N(AJ3 a"I<.YÝP|iåkO Vxz)/DJ%raC82DWYao~NT%+ʪ-f8M*+*听u)N7_&N8UEuE/. ! 1:v]G3@j'uxϡlh=AYK`?&.V;MXJ+ Dr62[D={~/&7+E&hd ZM[r[0{ 8y>gMHTFP^egyl inݤ:'*=oOC$YFU$`ü7δѯNC^_g JPdt$ծ?2A#vg_P?oztwP.YkCVW<]+8ߦ<;0xM|3wWK[ͨ3{{v0p>|}0ÕðТܲ)RkSQE6<5 0K"y=ÓtHǥh :NF\\l[(xOq Hh֕cuucR)AaApرprh 9@&>DTICHN۩d4а;`,$ 2#`'Kb7:R"0 ^YB]96Y" &Xssj5F/ L6>'/-ơPu;etak !/:K#ɔ3:` 8)Q|fӬ( Ej\kzR3Nn8Zb/NlP);#s]0Eq/yYVvA iA pv**z3WW#6~Wݎdaa?R}bFD?{ߨGpDČez/`F~,˹_KM r@T&lDb'pVg(Zp6u?Տv0+FdxT@#Ӛ peX.z\ts[Ig J)cE lEOݑ'd.I$={c xɋٰc")Cauf9`zqʮeյg4Ǒ:cJiDj{W }Y=Ow+g/ hGFz_:J ǽP}  /n"=Q&W7d`y-ev1 4oq9<,`&CdZwC_BM@HĖeY=&i?hKoF7z'9l/cpKT_XfXռPj㷊BmP62rVxԐ^Q.v .kHv5HH2nhrt8/xLi*A-}Y=IFEȱZ귳xc>`ne,^T>!&< Rr(0dDbj)_6séUUZ[7 ve(7U;yJG3ށ7&63BP7{glWvad_CH|kRuԿӲV͞We/^02R @z$Mq/):!47Ml2ˁiߛ=?-#ΊF>?c\0Ssz" LAih>y5R]Y`5ri~fήd*01lj%cH8!R(gfyVϠ # @5_Ӵw6饭pE40t:H$vY~m)#@!6ers%g5dko^ س: keՍtT ?ZwjتҮ\njdmK;4Le@.D;NoI4Īٛ^in?Ca;l$ڛu[n-g+{'e]wn9o\-+XMHMM}X 7-fᗰ43lX氓xhq,^necX!GZ8Nvo5mVZU7{ x)J o`G@ꅺq%1hPQՐxQX *[~ݨ75O65ߣ{fMctB5޿,%VTd_'tmr\t{ Т((()㙑RO`m<ήwelUؕĒp{ U%uI NO/Xa`޽k6N7KET}f'Kk_']& z|77pUE/aKl*% !!!!!!!!+b&j:O,@6pxyVùtRB埼q@T#-29גħrƆUC~*a3 8%G>`U#M$K >A:"* Ť a%EJ"0vpX"0fbwp0f(/uj0nw?-ls_&"ˉMkuڷ̮S%/lT珵퍎Ah_R>x4PD:zM*6 #G^7Zi+1V(X.9ІzEj K[ٙ9kWXղVSx`{jf]*_cH=~sITjw~u'_sUm],lٷܢ F9:D`th?=P^زK;Jn>cuߪݟ#vm-Rhy}Nτ)>n9}iΊz?|}tZ+^L7T=_j' uhg3I p *S<& .e6`^G 0ƃ0tA7WF+.2\PG5M<(Ue^Kj< Pݔe>HkR[M`vLE7еky56^|$~_{SZlZc-}\ xg "" Hnkf Ƌ ;"2r$G =vg@0!>YNAV&CZW3X(pgVb6X`n 鯵ls!&󄐬Do",ص e N(U*#dL.Khb͎25xcL)#-8mu+ۻoSU +9ʾrQEQEQEQER<g}an%wլZUK>Z3pt/ZF k+Ovf.,k5>BM>ox]I886s6v/c,FBsoUGuthh12ŢHl~^ M(Rƃ'2Zx9j+mo~",V u "Ntpo;e {qxzQsSd_./Óx.!$#>y;k~cOZkpU& 6((()>}T=uª&r񡝰oƣ mH=b'_CG1^j 붽鸜yչ͵Ű RM yښ- s\;Nj^ᡟa҄xŬ^M.5mI\~f+c[ϙgc<уi)&@eD(BuD DJEX w˂Ws׊؋w-:L5㑗 y9{#vej5U istUQj(((([{5SWs;cwy52ǐq>:mE`, j1\E^ _]c*4rZザ2BT&,~wt}wdXT"bX9=h>?-gTLL'. Tk`´~7uUȰ*i%^׏o ,?|6oZ܏IQE͢ZbbV=mhmVQEQEQEQJN& qtS:N#wӹ`;çI";=8 Ld1|7=o;#Å#b8HQ @s;>NsUOpȤj8ose׏4++8u97 .]wXH@YiJuUUUQ((((` r@M`&ߍA!ݏB|c=^Ħm`W.W0;a&3(CA`uߵj /'o(z($^2.?@̓.'H#%] Y%7$ur dz{]XKyJ%C/wB8ӃD(njjőLa)r:۠^ 7f1J1.렷w5ai]+Rږ2b**$P]'~!#A̱3vΩyGu6įN :VkL?k៮'dOض֜v0 XwT(j>qDZ2l޴aEP!iTs^2Z2 3|vM`};=eC`-x"A,ԥAh+D;U4Y:w^ʯ/F>v>k^U/^ג"1F#L.EEQEQEQER;pg0ju;S*ޱz_/u{yosOBeT~dG,E.OG#6}՟~ugf#:c-@ hƿIb7kly.GE9u7c5@Uk||$MYwAf;1OXiU뚪TyVem>q/!NKKڮEQEQEQES]tc4fptOu2EL i0+$S~Vsx R(H0wb"x~0(T'" b jYi1`CaE ;ME}m%l/W҉ުCG3TR=r2q ) ***&tR((((siܬX͞QCA%!oeQ 4.숿\c0Maev]Xc#\bIӐekα qb ;Qf mUd%jٴ'6,giqO^ 6~R$C_txY!{x +mJ((()D6q2F5 mmӠYG*D;r ąi1gD;~9!59cvd7s8D6ǿ&檤/2iʛiʵH$=l*QaEWɉZKd(")H?glc6,$X!CD'ԛ;!RSy0shC 0J~cfօ$Q v|!W oU<԰]kSȂ a$QDO,/f}q6ʇ*jp2,"HE,(DG~s?Gv>]7o5|=䔝]eCuck}>((((‡>ZD%vOzX")bc7C0R'=ksŞNޕ2xR Z7|$#dF+0TG9vTY_g3w(jhn)+k0l!uw &?T;UMކQMTTNTO7(((M0~Eٛ2YQdq?2,E\"`!$yǽYYi*G c:ȇËG6N[kFK|f_ٝf,}BQ =Qn{`ja9f]R46RR2T%l,M芃"nVN)UV*UX<ґYxHgdNiF'"LIQsx}36MOr1h6%f-XƎ*EoL#x'? Uo>7ް|oޣr_BK?_Zhup։sQEQEQEQEYV $MK*MYM}>O xlYWuW-th|:<]a\5'Q%_[#tjQqy[+im/N]nYLwfkUo{j-'Y^쬯l5]QEQEQEQE)s~tTNЊ E]jv!n!nL1}sKY$rCc&E/UY`]K$Jd;_cg=Y2XyMPB!F6DSg( O (#ҞЙ?qAT9"P"\׶t譯J륜0i> }B;FuaE,6X ~<hJ%0 3ȭ9ٟ1v)P93&EńHio/1 17|hQdEDCC"RXI4R %V(TB( ef~ȷ$]@< Jim۰[ptX~/waRxys.<!Gľ2/&nE5eNm`@[a ufe ABD"ɀr3tjKDSbDfNz3 Ye[\Kג?xCl񷶙l7=n*((((wwx?Koܒp;]]x 'y71y36@Ag@0 X5+?zYFT+ԙcgBb}J)SvБ,[9qbn؂ 62P&nP}gOz|kC~ Gy)/cΒo_3srݟ~}]=X.k!^ Cc,?êh~.Ocyf۴zڋՌvlTQEQEQEQE+ZV\WlnM_ F8Gz)778aTZ 4Masߴj9X~CYтN󭕙_P1UBZ/㛚ˆWϠVRP/\尼Պsm<^5;{Gͅh{tqkz<"D#^_2ߔrSË}& ο`7~_%d6wWb3Wx雥v.[)5|\M)G3֜iueD Ļo,V4]pi=T6/=սQEQEQEQMb&_rוف.23us5u+A52ҚSS٧ot MTsyCΔ ssc[UBWtEPʑ,?/}ed((((rΖX@A5@ZfVsbCjO$ t-7qHOfI:}[un Ob:Lc1"~[߉e3N5ԧEuͦǐG??^<?mbP?:zԲ0?-lo\x b&Ƃ#c$AbAB""00E2+EX1"E ""aHE=*1ѓ陵<&3')*M'z w&B$J|7rAQ{MOFI/U$M[W{<>ϟp&soY:Z\Efͯ19m_B`ь Dp\!rDsy\wrkZ|=Q]T._c>KxLQysl(]xl(v?>Gɕ},3foq%gv[W|=fM2ma|07W<'N,|?waq{1ͮ#Srt6v}[yviso E 'v1Q?gL%µ&}lR݈`0 o+?gq]\/6.giQEQEQEQE>;Db# zLx_fuc}^]1ެCmpS, 9UgV-|/Ldo^|{ &K cC<}Ł TEh:fᆇlૌu|[_?>vx7e`5Ht}w*ߚShv5} zBl%Oy*[(OqU_3:ڶy3srvh^3n-[;T1N8qYRzޜ鏭Em+ՠ$xkIL;M_yoҰjx[ WSSqfccs3M]t~,zy<i*u)1L\Z}cUiK_A <3j^x8U𝲩*yMf~u&vyj aѪ6vNV**M,|{1uc-*IJGH+I+ixhoպz,;iNs~z R Cg λ_t:2L0֋ U|,E՛gk6؝^BĸBNM0"aX?2Ǹ&_N+޷TN.>3f}$,EM3Ŀ·ҹ2񜋔r[jgF5f36sM{VXԶ["-32|Ta^5]IZە$˟41fm̐Y? .yhv˯'O'nsF6mB4WHtԱ6?y#Iߛ-{ݵ{ַQD㻲N57F\|)'Ыa"]Y.I9ۢlR ( jVWTs,l$mpNBh!|+Pܒ`&(溃Ο+[f5dCcSw,^Zm|ُ,'zm;{wu=3kf<d3KVȮwnYm?W(UբY BM_ ,CwҲ{~̼k_n a2yKkW`w)]7x~gps^>)jN>}3YzퟫM6#za'/! {o5 oPd"Cy{l,`1 +&9} CϮۉyNi-|OU7gjk*O)xv-܉]T)t#[+_f6ӱgҥgG}>Jr$\﷨u566>#q_>r!cE)((((Y#/ܙ<3{.JRf#do=OU%\ΊW0{  9k8=o39PՒ>?عQhu4paZqcdfh^zMY RAͲ,*_66yD|dEcgj;%e`|?n`-y ,5Wsݎ{?وơ0ⷉtçnʪ:gi~<+hkad~6 }YGINǛyva^m^Mئ!8-էSY{]h&/Bwu~USoC5-9}ݔ8 oO3nTS dK+KV#c'coLJ.ֆFOY'wG\}Xl} s$5@pwb܉KVB*Sl0i:=8 iOCIn_wvW=JeD%_^1tv}Y-D7i2H)*U}Hp;ۃ$ٝVf^t?e)][gk3Xa}ͥW6%e۽ҙnwmdxxzcAO>/MWpY)^'DZMm{nd)߬Ogi99U|S?+mye~ױ\K]o~~ jxFʇF7&x,fwem8;ߜTv><6Z㔾 +V; pa|L6qp]D~߱OTh-\.%+n}|/- UZl^YMgaW|4ݥUz"s9\bEĺkA7:lOqfYW++4$ԥ^~Տ2)(jjXiڛ]-Yq Ý%u-n*[g_> |N]l|J_oV9稌VWSrl_&Rhk2'U [hW\͍Mša;3p4o|dhinNO^k۠[.>M\ex^/׽Ok?wmk$`WϭvݶXIπ9GiZ/`x毿ocKp[}Ki:XMmw8خ֖>:pFSjܲ߃T:&S<>V˝=illmlA*wi!vN6} U^;1JKw(BrF՟c.w|:્pnn7 ~k)ŞEFM`E;J=8ߏ׏{ŶV/ظlsPU\Ջ=,7B'?Od1|._q1*pR*Ȣ >G-\!SȪ]Y#)7ȫcym?Gx=5,a^L=krr6|'y]m_\#͊nZ6I(y f__MPkrV&++|Z=9GC61Ҷ8tr0&SWq.xB:K}LJlՄjEJm 4_)Q0K o +^c4Q;=>U roOٌ0扎N2Q]0lRPob YE$}Uvl?){Yrrf,>7Kn8/\.Xs' L* D7O*gk&M `Wtb]t#P,#{^|?r22R!$m4UD V%RLJ.L+3?)[ķc @L[33No|3WS10-Mc%MNB(VE;AFn%4i94?~ 38hhr2yg^Q[|sszNF7:]?ϔxgsy+֠ΫZF]9/:quhv'NyIY뗉0!8U2  5шh=>8(aG܄bǓ6V&Մ;ݐ]t>cgE%C"h] N:=Ce#tJu#v뛯2-'VNA6tH ::Mq6eRc,d,!]pulكiN44w~g*O[H'|SVѳM""*Ի6HTWާ묛?7Q; =;[MAOt4IZ 'KV㼛oN%pv5D rdDvs!wbBC| @$w7 =؞b{:焀ʓ,7lm7*׼D9!auZ}&K]]].s+y `=]O0 n˗϶?NƮoUexWXu؝_?cYD/C= *Mʇ0g`r,x|=RkcY:b 4—.U:1-׀ţgaK6_Vb?&"J-PYj]U]ȿ 2N7ĪzzIXB caW%"!M'j|lvV6B½O =H3*[(sR2sHN1hW?z GyU,|f. Jt!ˡ S 8وkʏv#P'vE{qR6MY$&dHݶv ^xA~ďh@2ťbE23MZ_ۓwX)Z ?e}oYa5Η/{Z,o=ER?f{%Bp0* jjvMaS&9fOk6\_o2}H C˺A"2_I^V9C]W%z!͓`>3hV_]mٷޯ%>9.f~5.v7?s:s*/Dn;zgVLkPk)Fb}▴Ie*/q7@-C6vڀ_z=omJ}CiV=MZoUծAX/VZTΏK{. B?ϐֺZVL6Y~x\b9 XSbޖͭSQ?bidŃv/s_?q_ϩ[4m>q׉?l:'-[03E8Xu1.·p1c ڨ!evk6}j% ”ꪢ; {~o)鑷NNup֨Fn͵M \9.\ k ,rh ՝҈t2y5 -$8.s gD`2Лxjiܢbݺ~YSP7[')_W݅!uPBw++n;j^ݤgHZ5Ͽ~ 3xN%1.)bOIܲ*o#\. AbARMkM~ѹWEq9MѢ!Y,Gq0\%K@s` ٷ6'Vyv`bDyELЅTb  )nM(qOK_i7_~E?ͮ'nZ' ' ]ðՃ)OcSGr@o̩˟?YeYeYeYet:ky#""/?R$'@n*Bk]n?/O'"( !Cye!(*9O=7:ʺ! D)` H":Y}y_>! 2_rKCb5 qQVSB<W&Ey$) Xũ.ObQAeQFE(UT("ɴb @H)5( C~ٕOt{٭%}Ϟۛe~[S6bB!!"%x4o^DEd+ X֒}.D$B 9XczNι6`)AFDUn,R@؇ T؄fH6R)h3tBD.#o?o=J4e@A\\ X$l $_dQ$bH"PTUƥ*QF"--FTDF(єde(I C I"bl!B!P0PXE" Thᄮ+R,*eV ʂaUYQJ+*J±`,!UaBDaXRVWLZl%J"1#[R Z)PF% ZU)XPQq**RJȦ5+P*HId,)LdH`°RR˜ C@QAT$F(`Y+ lEe~Ƀ(TLVZ(5 %£V aEL`I,Y 0SlT (C@Ct8d  (ʲRB,-KHlJ-"1EV+ *e ĂLȐ1EJph `I(BR Z:r (RYZFbPXP4rDa'K*TR-B:'H(  Q&Z\(buBT3(hH9BŊ9 [@B Ē*ȅPhQbFVE;2SXƈ(K1S$TXVCBaXBF-M L*lȢVA' *B XIFKlTDQ ,PR#6If`,Qd `F HvIFـ%JEQUYs)REAH SV UDQ,fQHS,%HVAd)lZªPVP%i [J.  2S/r@LIm+RY Y  &![HV%BҊS0PlE@LJZ2 A)P5%JֵaĊ#[*#6KEDd#D0dKBJCAeTE҅T\DE!0PR(ap1`6R-1*$**1Q@U%JīV +-(LrP%ICQQDZ0 JFlX(c$01 b4AQ$b BJUF2DDe@PDet@K$c$R,<ZY* -B1 2"@Eb2bA V"CiAH21BbH$b bӦ  -(JZ*0bR2al$FY+*PDdQ`dRI7[ΈP P?H\ȫR %)J@JLj aR Ȉ,\U(Ғ6[X+"R# ܅,A0&jEQE U iB؈"(Oa+RB6 R"RUHCa FDaDX,0I Em 2TRadd0@@R!DPFe] D$Z) `Ad.ZHKTEVdH1!1 0CE KiX ("lY%2XAn8*$%D1^LPbgcq##50BQyҧ_ @-.gз̹DRHHyhQ"hQ]Q[eedvvV 3𼐉J?f d9OǮ f*[6FL w~R1SPk*xfUSEZN)~WQpVEu-bZȸF ;S6,Lc` {G;[iׯC]SNncIQh2 I>)CHm ?@m ax Q4}:뢭R?; [O)c/CEUV`A'w·_ϜB%a1HA f>Xs|+ޘ(AHK"4 R/ ob"98 |c@H&+Q@A `@yY ov. kd S?4suZ- U?Mm°s>cvmA;uvvlp" P[J|DaQ7k;fW>#i= ] oG"nxYWipz=OD|No>|2T;4N7͸H:q#uY:^j i<.*8¸9^TL{(=?:.mTxר6.g$ \!?$25k,%G1uKiOU@??Gc2[zƳH*j2J;vL-(ɡ90'Z$uV„o]C3f x ` 01$L$>4N_"1nÝ'Ŵ8_kݝmƁPm9 j8V]'3ӿ> * *2`((_Xb(~0E_Ƶ ) Ňd6ET1'K`dnhwS?e%k*Qm1 +bJƖUbʕERk*n%Kr2e*R--,̲3+eEmPve-DDUj:E%V`G #}"Bx?V'>[f 2v{GM5οݨCM~X ץN=s<&}#;$ԈI85QXLRTD]gAWٱԌM֖dU(o0$uՏgZ-gWw&c;^S]~|7r6tMNn~/[5M;%,/>W^EU iGsIVڴ㬫+TCcAwVQjm~:|y}g=yM}$=|oGex˯*kp]6ɉdO&/*mTPPE`=eY"X(aj4q6iAǿ6i1W_t?ɕ@4/+Ә\_2\#,_QF!ȱ KR]`vD~>"v7ɕȱqH#I^/`Ah,+)UDw{\p>\ǪQQ !h;Գhx+qujBkpyzsTr8B/P+c`I` 1kXP/l,GarTXQX*4 [X=ֈaH>PGszG0\ >t9D'ngi:ijKd'@\tf*uS_{}śo`'vϋZ7Yyz^3ٽr~Wa+3M.ѮG 7uzT^cթkTtBjS;!OԄ~ޥ&~ Kf 먬ҫ ZM!*Ԭ$"?`}/13E`9kc`w?//wڹ.ϟ]s+ZҌ88"Qg|X0F(լ\пf5+ֱVZH O._3g3GVyaCNt0L`4k`g#~̅'0|xx_?.XcL?ߏ囤V˱]vx~/?Q?b:aΣ%9쩐85X0Pt^#˿7u^ ˈk>5t>>._m!],f<:LuT^>)RP?oǏh@fmGU-/T= -"x@#UI޴1]XnjLr?[!$&4 m҉=Gӻ˷KLxݾ~Ͷ2 r^RYe u?;YRPM6$H~#8Ct5NK ۱\ꏌM߿Ec?j@ DDDb@Xg7Z&$á?T!&;QKzeC8trU ޷i͚N0k9a7pcjYԤ*;o'pq~Ffc& @V:ͻĮ)\B^GYDp Da.X0>a!&QTCm{h~{W\ۜ𾇐!zY A-_k{L #>aU1*֎ '^B$V*+Ί)GD9-|3P?7O[ֆܵ3V0)w]Ë!.{ :i+8̿`BBDF xf͡7H}T?/j,-_annfzץܟ ws7_*1: 4G\c2No)q4r?Sy,ƳܞD޶ת~+G#c*Cg[ fKTHg.%Н267|TQ~94_ U`f챥k{ڟFg/ZA!wLU+n`;GX݌TFƿn0n~J&"Ky9Ko44Aahm: β^3I"&#:oǕ死k{ 75 ֽj$ErBucIU(WҢ6`\ԤNQ1.BYՏ">״c"`]Wg;Xc+̦o§+yԹ_示O7۶~(.J |g^'&:bv%!  ,G ~&?-MA9pbb +2QëWo$Ш|%kY@n w.nݐ޳U}{pnni0PJR@l *6|$H2~OL}\aQtgBdiZ$9 "c`2͗+1ȥ7o>ݞ('ҡwx]~ JmCGw=WgHll![oS +U b篭=~7а%F/׾Ÿ>LLDRc?g~Z).;ggs_~ Cf&s q\A}c +D*H$'0~HC\Ss>MYH@_KK w ΨWrwTG㟡^"+ֹSo檏5}3>Qj|]O8QzCsZ hb#1}8>W')?NG_.5oiPp jj$g StQQ!&PݝBr!e.Kߣ@Q eФM$Ȃ$9M۶z AؘLmc@|ɨSWȂ=>b[x_+$%P$VT.feoX׵yb.ݶ #1r"}ׄ "R㐡TpF 9sTơoHr(ʗUݢDanl{_L8 u]-QM ⾬-x|U89}\2?\v RJ=BKiʴ į\ 0-9 X *UhN7f 43(xA*@gŹeax paLjA׏fʫD`f8YJ5)qm ۞{.LfLpr1 DE]mAh8?Z"VݴF# (f |OŨp3/b~jt#f{]7A3? '*QƜ fO(`q=aS`~;N]Vs9s9s9s9s9s9s9}q;Vs9s9s9s9s9s9s9ѣF4h9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s>G_?wNs9s9s9s9s9s9s9F4hѣD9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9mmmmmmmm_}}}}}}}}}}}}}}}iiiiiiii_}}}}}}}}}}}}}}}}}|9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9s9sg9s9s9s9s9s9s9sF4hѣE}}}}}}}}}9s9s9s9s9s9s9s9s9s9s9s9s9s9s9]`$NfIʈ4Fq㴭V^ugi0FDN18v30J觹f5?7QؓgfN?P $0يcB A9P,X;~$ .ZClV\?p`!0-!*[E @;>z.Xl j erhdɰ!>6P 9m[O z .|_ qO!X,ڳ05\O)RH`+wED=AHAʪi`Ɠat7 8yrMQ83S]݈0S9.M(;(&RO!4BE.0#/u@$`(\ӺIKM@{YzFrP/3;O?E}p4(7km;:-NoW@FC5hzH]x>==WsZ.%=a8 hZH QU7JH+i;iuOچq}.ͥ6p/`٦p?񎞤?У ѦWIlϺ<[Mô@c !prFtMVrnnDXh`/9uKmZqJ^`L5r,˥nzB@fgoz ׎ޏlznN:N]G @[ssn@O(TcT+j6n [C;FS7DEw'*t R(;HƪX10BZ mܶL)LjwEk_ yM v[՞ouAG6ɠeOLdJnհbld.8ZE^Ro׵RҨ1wtx\ASkT/&c/6LcIFNl%ذjdPN;݇q i\DFHYWՍ"(-UI#;M2aG tyIB?׹O6KI (0lk}L_n Vתwl2 2?9 $ߜC-*jZ1;05:skeyD%9XRo l%u 9ois}"_bTI!#fTD/RDI`*U=%ßq7=٧xT'Os.|o,-2h X[C>뫀jt ǥl]k[#l\&]`np(w6/n-Lw5s=AUf]CޝBR9-zoR4/w[;tislߍ~ľ.e5 ciOF?ZB+كHz]ff8Ksp}XV|&̧-ZDlV J/x&Vw8UWDN֩ ȡDۆ^=ERuW0tUC%W!N6iH.o :rx41b3;uyDO(*J'h-B U`is0Ad0Rz]mB3҂+QMg]ނ"]4 WLZCwA*j*!n^a5nP_jO(wfx@};`3|+@ftH*My9|JQegUk˜665;uRVoN7qo]ܾcvtO+{y^}jOt:{[oq^!wqyx9<:n-4>`uC(큠t v`'.ewygUIQ[[94B7w:BJDPPUF(!@$^@((3t/ur h`hb!)(hPP) *M PP H((gا}h's)\LVހ{t:ld.|E9=t>g:6՚|(}>(b +MP%}.fw:7;qw]ۮ'  ZuhPT=>zpw=> tw;pԾ2l `xvrw`mk]]-;v6cwq_}oyW*s3zӻxl󋱴PPZm=)l 15(vms۹cCvt] kK!(>}>=yhB@@  H }o{Z%-g>0e@>zx}ޛkzvqs}}s>/rq6emX{:=9u冀Ϟcί{7>ϺH}sλk޻ny|_{Ǿ,||=zwkL|>\{H5|w N>>x{{Z\lETu磌j{͒ךf$q;>aSn'6}/Fo.Þ [kZ}0C5/Tmoϻ}ƧC\W/Wrڀl)$﻾&yi۞{rl;p`|NGg־mm>րfMh.۰_^|5}&ׯgopnՒ @O{>bs4f}}vx٪&f" dʰ1>fе(H18* A6Pc 5Zx5{VUbLD-kwX l_ ;JN}s {0hVXm=`sYb[ {cG*iY@ )c԰ *pu,<x[AihE(ԋC;#{ w4շx۾]0(#ucmN4y,jnz3 Of+֪ږL }V|ݞo5E_Och> Qޟ]ƭ7/@8ZGv\-sl׷}ѝcChU(PP=P4Z(RͶR{jDr[dE{OY/,{۞PU]j^׷7)S=7@zNvzwYVOL'vGcM`E׻ϛGeݻInow׻ޡ޽]iՏu/c{y{ ۶SwgKns`6,{3@Uw{g mSyw)FR|(Ń{m>>Ϸ c}pt:g@}uކu`:+{렣(0SW]CN.wt=ۂ+ǭ^CccOGݞJ}ˊ[4t:/=Tލ^8@L{=4;{o u&^@  ӠO{9gJ4E{}`Ф@P}@!}OWݜ| <Ž }@i :2Q/{VDn嬽g,8`Z9  }D@ F~@4i&M24@L=4244idh@Кz =0ѢLBBiGOƉ44ѐ SڞBiGj{Iy\ &O5E3{Yj'cE>KFyi Ub[!+y&ֵvOR !n]D#i۹IL 0JHwÀ]I:@bE!霔ګ*/'t5ѷ23WJQp10#D=hnHr)ّ" &t!M b>1WfA:l$ZzUL!oѯ]@tٰƞy=dO_QU¸*4 '9MhDX䭹-yUڍ}-->h==[eSa 5?m>%] ErK4*F++VUݮ $Lƃ[oz#7evN?+\#{nv.FrJ4PuSgq䝗ngշ+ٿEoaW.{GoyD/]ڠ@ܟt.*+}W-˒9aZݜ=v yt?!a\&kuw~>aO ƁX<\K,$|fsն6&31SE) g3<`39ҌQTD'5EDiWQ`T?)CAa`*s R38paSjDcNryD3iq<+9]+ b T#r^?rc"U8M:P4 [q!Dt͊Ƃ%-r| ƁA=_*Ɗ"AN( }(HO=@n5x'm4ZΐPG< B@Ad<}W@/M^dBvy܈ӟn9l?"h""I"dv" pOG@`Qa|?mVC=Ep4U")~Su_귮۾'eN,q~WӖ5nݠ?䯻SԦEMM"Tޓ4*C $P7Sqi՟P/2ix;^헩ɹ9!C;abޒ@rlEojͰX)-Э8Ἄ}wPl{dqE{U[)6-ۇ~2FUJ]azmk=e Ho|4=s=W Ip_ gDZ|A׭T9:_u(kd jZ`v ߃EZZk]Ğ }CkD0;Jo\۪[,i_ω;u!t8 fu)VDL0"W?8Z )ǿD[TTNJ; "Gm N6uG`Ez2[cn8+CziuZ}n`n+9)uصWOUyOvK|ˌ3}t >  H\ 0H6S˦)$nګ]Vg[֭rZ4I`Ys5-8#6tjZ=9 4m*UzY*y |Z^\Bg#<=329pxziƫ_|ޞhM2A@iC=9)/&t_?;^'Wo6[Z"bY/hn/QՍ"SKQ25>lq-(MnD kOiEM} PsR]1AY-lJ:DjUYe~^9Dͩm lmbHTKYɢwj616^:1#}QSo)Eߤ|9Q&EY_P3ra}sfr 5|ŗKWl!0REC&}I8ėJguZ/+G=E 3nbb lRnR󖓕, Lq?(.HiqE_<cƾ-G):qɯD/0)0&4!ЩÊ:|3\߅;&jGWC_IW*g,MuQٙ~uF0ߦ?Uߣs_O(DaibJCk۫;H3 {6] - sA~=xi]ܦ+7UV MREZJOc& e [XVЦwFs-g/g,("] MZ̪}Ŝf6 UlU,t{Brq &PLsj϶dP>".b={iUM>Ku»gX (#J1 DC˛׻v,E sl 2nRyёARHC5u0$DRje $'xt8G#[uTR{M/G+:%䀍|Y}*L1Ẍx/Ǚ{4%C>?!~~h57t>D3qctJHO$"h{èʦz_xq1N>]RPkt~]:Qg,rTD8r -u>CP۸Ơ jYԦȲk8 PfsWhDJ({jP@ݪV‘y`*, [lO9FhYV/L>b3^s93ڗװhgEן5Wrf]GE ,|DԢ0\ҿ.MBdXn,{<ӛ:JWz-8ĽWG$[@;ߗcG=%'UlI?_{)+: Cl?f~ [S]EIZ"p|K WJ\*_-^Z_=oV9"EINk;XL%J90*? `}jNjҟ陡٢-P|&J5T{ysN9臑tUutL ԽD?C`Y:8flIȣLY$ٗ>@_6Pgl !(a$ԃ kADZD(Omv[fkdSFIk)JR`Β4uy I/7qCd!!e}aXP0F@(rYow31i"~EOIpz!(ݹF` 's"rC>}NrT@A]v4hgvFŕЁAJ6"cI?ׇn[y?˱o(UD!ޚ\܏)\%8w$>g}tV5U$d}RD!9ٲᒄ'y2;(i𦣟VkIh@T/{Qڴ"-6&a} UR n&]dte[v2th 'C"3DŽ2cP& >lbc" ϰI/401i;ۋa O+0WR3pGlh"ͼ(ϯ>Rzow'qꫵf_0 )&5; t9)1[~[8`4;tx&/|(iU@ [jH!.J& bYwDGǐOu}o$<2q߲} >orTc(ԀPa!^xwY8@r*PtNޫ6=*B|11ȏDĚV__}CfyzM3xLelT 䪑EחYߡ,Y}?J,aEk`OM6 |=` ?b`dh T1 {ژT=fjS|)ؓ?X??\.msQ^_mIHJO}=7trz`GKQgKX48بgglkN-t;̖|hͼzYes#wAϽ[6T_#{sآ]1Gs[(PcL<,{fzVH4C^C^v>O[-tpfO''Z/d3wN9f䅕iWnX(/׮AcF5lͩUٱWڴɵw?3Ss9ߟ9;}7Sn\=O.6*^D=i7˪|H7WMkNpWAɋXOM?Ow_ωpH$:-!#& 6<5!BՕ=b _>vhex_pT:Z IUA~K”ATw#"hK6P('5z5PMU7s {E >E^GCt0ժwuyQ"QrjK!Ch#!+ۧjN^Z1DJ}@s-|ѱ@ڋj/M >)#~2Ef11i@: X␢" zܐ᚛(j9+nBc\-A6@!0i;ҡLТJd9O<'{UGN$'vpEN9H>xffQ9O?,/k8 bB` {߯[mT_w,PPYN[8IוN֞l1PWY yJ Tma5>@XdMdi U`b|7i hŅa1=IPԭx̡X*h m<%VtH\vC蹝;$QHR)XT*+:I;e&PZ4aUX45& :q*V[AeJ*aYP5Ƞ*YX.3Yl,%dfRc$Q + +U4IYճ:NȤ^TԒ0=kU"}=B)2q&0E쇡9Rq1פ* Ma*s&1X 2.YQMHc1 vX2A1%Jy5!<21(w@bg[LTj$Hsq-EwΩqPc<ߤ j-ѐ1`qqܤ"|TqRMo{ ՁuչqXyask z"XwJ? Ag*R! w'J#tP7l/`0眢5߬^&0ֆZ )9sUE>94`'&&\4ǜ6[P8-B+N!(A7BM`jS_mΘx'*!"<T5}7M<~֝÷}Ob` &@i  >q nڻ*M3+&n>9F0߬٪y" Hk&pWxYJ҃@ "@ "%ABօH}*Hb1!RALa +",X"@+ga5 /I!Ec B,$J¤d T@Qa OgZO[{:ZWZ;  T(OV Yy+湞=Ҷgfڏ D_ !%~ F(z7uꈍ_kc8#(Z{^]d9jlL zXౘ ZP\ <0d_նfD:R 01],K[Ȳ|BwAˢ737%r MO[sjOoF<7U ?H?{,G P0:Csy92v < <0 qbIFM7c a}.k6׸ 12s.KibnqA"9Y΄`|a1lxĄ31 }O< x՜pF4|#{fdoӱFxC3IBCv/{ʵ鄙҉ u:(tsnOñ4҇ܺsÊ8<E UᄅJaLF($H E < A$|1)Kk@;/K6fQǰtg͓,CO.&./>۷ٟ:#CWTl͵rfyFɦWO<&ELZSpņ6azA6D%V>x"B'3p}<גp3~?Σ'zG*2RTeB$ !4+2\r_6WUqǙR"OSp!` 8x(3 !,1 ~jB0J韾`d=OQ/ E?k={Np8u)`&'k~6WzmT8d7~`Muk'P Hhqyޘ/^<;*+8rX{CՌ>K@#,9TQ^6g?PeQʛÔb38;}yZ#((La=3`YTNj/@Qr^1g3w "WtZ|#<ь ލfOe0OEp5:q1SyBׁ5M~1W@Ff5@١#bG!@P$>ޏ?p|@?~ÂX AAABBBBBBBBBBBBBBBBڰV$$$$$$ "$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$BBBBBBBBBBBBBBBBBBBBB!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! $$$$$$$$$$$$$$$$$$$$$$$BBBBBBBBBBBBBBBBBBBBBBC C1 C1 C1 C1 C1 C؆!b!b!b!b!b!K1b!b!b!b!b!bX1 C1c1c1c1c!b!HHHHHHHHHHHHHHHHHHtF!b!Ljb!b!b!b!|$$$$$$$$$$$$$$$$$$$$$$BBBBBBN9 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"؇2 2 2 2 2 2 HHHHHHHHHHHHHHHHHHHHHHW`0hTJfq3pHO)"A^?|zcSWT o+"f f:>x1s$|yI] 7o[ \k"R>g/nN9%!!5 =Una "i:>q7nkoǗN =SCF؍VB?p9L̀X^kJap:p ) ;`\Ǡϵ&a=<N*ZJ&``ij&3lB/xGtP n-2##Z0j$0nj\qO-K036"9!Yr]8FdQcg;§)(ݟܧ=6 )*3Ay Ĺh]k%fSǧرf Ͼ [ccppU Q\;ӣ?GƼ`}e[xVf]^jGo ˽goNkf|;?J)XXczQ?.7d}ZW''''%f T|]~b]p^1l;sO׎xxw7777;2;h83rNS3z7f/v~&~YW[I5|o7YQ 1Y'?0=x:o?燣L,Tpt똎\CRb?Ne*mY 0ͨpS FadfbSc(1RJ 2B̈dIհ4L@i+@0dvrف,:X$,}8`x~H L~̴X,1BN2(g;>bKh\Y9D|䯯1fdgk*C`!X,$;ec25,B%DA (&}nۦښQnfeMݵА+$ZP-@Ȅd%`N=֌+mRXn#GB '$%gBY*@PFvLSYvΩg 3XOȠ#jJS_$>;{A?װtH'fAdX1!W.b!V)ttр?آ3щ0,1=!csg(YY' Ebnou3G˜AQ p|te&-6'R\ Hd2B5NFx]Ιĝ!!3dH @aN(y}o"3GZ6ޖѾ&w+̸iyC(n8IZ.R3OlBlHE z? ,;aꏡ厐n.{6wv={^okNDҢ9Izj7 7م̥=CK@#V)#Yj`e4j0ʅ8+i9@XGAPK=bC"}7^x'jclq8™*F+B1q\9Ô "J$ N7ǂXn#рF++sf*23LqӉ4C촇>J/ĽT+@UbBWN=9;"9O3M(F)T3cL @5̛nuPHd Xm6{w;;6Bt{C}Q"i! WȗD-s>G%k̚HT60R-s6>dQLjPZu'Zg~ո1X*$ %/s<|"=5X XdxCCB@CHZE49Η: 4zL:0>O34|D(CYH{3` eTW&"sr͌kahoGt:<_U` (miY#  A,%ɕ;*>1`Έ5s>;'γBDx7CHy?1[/W:v$ŏ 'j3rd#)vL0ygg|FPdjФ?v3EP̀M' ޛm ~r8$ዄh }1E 9BB,|`t<* >X٠]~ ={T |y x|8bgЁzn͠ĐQGf*$"ikA$Jw5 x9) gD4}}jWuG4mL%{Y`a,C bD1{Oe_^(Q 3WuVVK;XBBW4 )c >L)x;Jyt(c('vߝqL?SVpo凤b+Fh70 2d]@*n3i9!$" 0 q↜E*%E@*PASv6[_g/}qWI TOzzՅ\VNTMWP腲g(q nExcSxo(sC#|A!"jjd1  Qv7K<;ȹQӰ|͛WVg|^ުan>0R>\  B1 "H2 ȣ"u=Iu(YRNۘ"3 z /DT=~~D<'(  HASPD33.sLJ-=xH/`xÉ#&O7ObV2s~28Yk$"g8Q)RR0.nk| $ѠFJ.ִ2sb@$1ZYSyԼ.sN +Y('oOǪUD< T<S|5H0'뎵NgPۓWGy'vӧ nd0C:XFVm y<<.YCX|H n1۩- s]'Xyy{>9ˆO4\}kWՠ CD0$zvdАH tZ>3M;^H"M|֧.N|iss^5g[֜`c:HB($.`YS)gQ6zf5L!Т!!z<x7*+^ ;CY\TϴDDInәc7XniD\Ʋ`Q` x6gu`Je< V]zbMrWALAQhPTxDXld" }I6 P{Bdk/a6;:,}. =~g8][l`h+z0R+WwKKQwGƆqVKBnq8X1bGq\DX[v)F!!D(3XfuD3 V@|JbA'ώ`B$N9wשn@7¹>+u~L9#D.t=v4U̹[,tI$GYVFsg9gYG!p63cc#$z l'='DZ*x7;wr$glDkQeB!.[|-w] +uSMO|L +yYqxԩMy-;MVs5^|DaGRj4&^C>=t-K48=2*=gok}45إA+dO'gfe('7Hז.g$dC&Nyx.M%Mu3( ^zU+i"lJ5r6I˜-n$Mɖh7;hq8`Mhp9  HdF+=`HgX`REIP ("1QDDQQXXXVIX EY*ZAJVH AP`SV, (RVV kJ$Y"%JmbUD ;P$EQ`|c^F@[|6C_A Sx=5zgd A$~ 3#cNV4_3]o;X}6)ԾDkJ'mrYE+Vj냄ʼn`r4:p$z]Q<"yqvME$b1{i/<02 $u rLӪ035-Q}fDyTܷ$oEW 'b$PF}>P}V@l*_."^=*{Ob Uȏb)9%#IrWt,$0YE ,r8SG߽ߩ<>s3$ipɲ YFe`eF'+&(Av[9(JX!Ib܋c $|F0 ɐ{7hE" ̙L:(b@s[0 "LfGQ tN-Ge30IsDYI,3*ТxRR Bu$5/Ϋ8J&Ns*)#E,`Yh#:2M˂{$Y4퇚 AR^4A$IR8o%`´V*v[mڷ'g3jVA!FAΞ 9G 4&5M ɔed#%Jm3#{*_+.qj4 L$8\Uk sl:!K=k/3X"%=cit1{yC1(j9I!{V.7u2i*T@fh!C˗r:zܭo]) |n-+9Q$7D*e3E]8h,UL3v"R*mMeF:pxVK : ѲRnHYu_`$O;BA?-':CwC#SsH=LbSlfBک"H$ TOXB$g!dDfVuTdNR4)n)+CdNP<G+ƨZ$I&ɓ' La;UW@aOL3=B!d–8&t]xT{o>bq9 F'ij r1WuD.^r)$+{ԑbֺYߍxd7QSg-I ֱVյ@ ?F )213RȒ<<"v_"i'd=xRPT " Mo:\I-dq { ;YD)-/K~g#@3Uc;ے;"vZdupk#"UK/쑨U|l#@+n _[:ul4l4no tPK w4A % (H@D)BW#mQ984l0C eAngTaU}z6D83 (Zɦ{Cf„ft )9bU:LRd#UX<㍁CG< ]K AO( $r5Ѳ6b,Lb J& p(gΖyJxH㔎mqhʵ o~O7K{Z:|)&5Ѿwy<:UI{/<+1Ď(F)@IQ%&KMSoU⺦I0@2zHO,A>MNp!_H@̚uS.k'BF2DMxSRQDlPB [yMYz&;c̽4ƔՕ:̇ɖQ{;c]yNc~(6X yg#B6(E ;1'eb2JrM|&]e=Rq3h?ٚis\'5+2j_XDTT:cX'n̓@})e=g¸ϥ 4:|X* C SMyϐn*xTJ {\M `]%%M hwdѪP2H&>ywiV0_W t3A]\u/ gEa"\3rkNp6;:9= IA)(|JEBAi㲷}i 9mۥ(ZDz+=qb4i46d$+XdkBǞUmyW.i^xv)|l":B$w^S@ehс=9og{n55Y8'+g|s,LyVr,vIaey \Z9Zab#<:GܲH C)YWPܶ"8(q*%b,m?J$LEemlU1*°O+d;[Rq|&l""HZ c'"yt&ON9k:@Lr? uHtA"j[  S .XAP7jb̝maRm9BfKk&Qk2V$Ң(ބ>& 1HܷB.QF:b;Ұī^ɉw Y2/c6)̥mM麶b!#$0$C0fXAPԘXȩ}2ZQJE$TX8,Y@$SC#!L,$g֤ݜO O)1$+<þLI=HV\ :,@% t!3xdO):lR5NZ "sXs;;5ЬP6U9( ˭ULdr$gkȓ[/kg^{uC -H3P}k*I4zzbyI u2sgwŭtV5Ƭ|ng':{uWdoH"<燉|O,{8zl}V^X"HETT4b @ $`u6{1*񝣝9\g/=,mȼĺ>oyᓧQ#A !6hUsM eݹLA$XK"l6p5yÿ9 Izxﻧc{J->G|OY0@;s#뤬qm :̎an@YUtڞskՊㇹ_Gsu:Czքw 1w=]PcDT(V1Y|=We좺c8/])rbFs*PJ^FtwֹaSBLc( *a*LBK Ix;7<UQbv/wܧzr'Jqf\ { A>=qbvB8sR =v>рxW{Udcmimk H$=;l鎰w}RuvNc<]VxTg"xii3/rJq|Kd3{6 loP rL@`jQ W9{oywδV" *6<ii "x4W7Bo.XQ'{[³k| 3(39"qH"N $e RE\+IpVL0`cch'r:@ 1Ҁ?;q^\mH2 ;T^<|}aT$``.X; $U jCϊs ^NvVy"t;sϡ!;[0Hn]cKZ½'Nژ!A97YfkP1CV;F9 {Xkd+L"ԵeIzhIy !h7 g;djE0>DUVJ !",zeCJԁU^TS?lu/aV ]J,s*KPT/ :{ז>[~ GQ'o N|7͙HV|VJD1d BUE| Mdͨ5̸ٙuYmq_c:ٞ('/pj=pX֕ Uٴɬ@T#ʠjz)Vg. 3Cf@t\iEU{ c*b3RBW22΅X"Qy}Hgc Evk*{aYmUUEMN D-ANb)i]i:@GC3_6wvl\MSl8:4oC{zڴM^<ƿeq?l]3mk_~}82@> j$H 1#m"I ȰRVQdH(V@ZQHFE1W?J=h"c!%7/ "L,L@&!Y,d㩌Mc-JÀلm4Ch|j6+ }?NismΈ¦Eff Vubsv!@1b;s~Y> <6裏M=rwi)[6Q1H&Tc+K-{Y?su ;[u'ޚ*~iTJS {~GtZ.V(Ldl+e,;5v)pݲ{"^HdkeJ=$w~ص{Ee =?9ޫ^߳dO#% x{е/_=AtY3~_=Ug{nkU|,,dRob,#`JH An]u"x֫%?}ohCLJV"EԮ<RMwB~mO^ p=o;FASye"duA[E}ӂf\TcMCM'ߛ yNS|z\}9[XPA!c Nߨl6to8<?avרfJJy;css=50xPRSpm ͫ:`~$} &jDgX\.L_p=EM}sgVGW=C5?B(b? ,RLE+ °HT*HAb "!" d+$AH( EXU@Ć0" $QIEb$REPcRCJc!YHMBdPX(AbT@ IYYT*ŚIVĆ 3(,!/ƱAI$Ԃ$D}ށ? ? BɆʃ!:Lv #6nRq~RoB*஗kBWO|:_wKL `#{W0#eΐ̫"̿wd9v7k˔ڍu۾kTm*>&YZ[dǕۯKeJ\}] Lu~مnVbww/K7kVC*" z?_;AEj"\Rn3j>zq%K d9xd> '2(LN!H=bx< lR7QqVKUͽ+uWoCm^4}db-R'a0u= ZS},M]3|ڗG jW/^6'~7}2<;3ݏ_}-ҩ#^ k@So-Lj7߱/@tVM gCԚVSW16 7N7Ijx4H~)]lLvtxx'/Ki`f*ҿh8!**Ǖ_TwT A-)I(!3)f-U<[wV\d_\0g 7zvjq -MpΆ~\+O:'s';AÜ qUS?ғÀ_C9dew<>W^{-;|݂LLOf~Jp!rK=SsCf/I]mr%l%1od t{&^*:<{~QqGqFoMr٬w/lg|Qjn߱j933pv;+<9!f7 $H`IBBMܜ=5<DSS۹MjI†)>h=pgg&xl~kQ?11mq~v&/&5ЃN38`gG='wJO)D}'n. ǽ7l+iLy~QL61l B3 B|@\<UrxFf~~ǵ癝5jOu: Ùf.mP"ؐ]{ۿ^Q !MX`SgE.DS,Z6̙emڵ.G{d 0EdaREbtBDAF G*9"؊ 5 @U<[r^ Ȃ^Ȁ(/h Q@m3ADPPr@xQDj4Mhenw|rAHxyߧŸ s0J^.&1-(Blf!!r <N 0F~atL0S,w P5R MOtc?+ג`QЄMz` LH20c-tLdgJ9[؃&Wwѳ+ x1<2 " d"#P^Z*QC]!Q@_ٴ"?11;,PCBQf=ˆ/K 4`_L1ϑ.@aEq _V[ :v~@Y Eƈ>!𶬲!E7g-孥5&B0G*D8E^+k@vjkc(" "/ׁ#F|ΦGvҵ%J.t?VJ,(%``w ="<S@@ 08鴠N"f_knUעu:z<+Iw%tt<_.o{Z'U)yWc^/YFstK{Ut8+xqk^?y $>/Dq80A أr!o1F7>lW}]'Z~f;^z(惘D"1o~Hnܶi;E{%Qv^5:L\F;#P!a a8`?ߚ;G` 7sߏ:m^_{; 4:w aI'uJH Z~3ٖ;[0 Z۟8QQH -lj3N<[3̀`w>$w=1OK &߇wcL` P%0 jՕ>}ac;>^'([#B>}\#J1q?^ӟH}C[t7nlڻT`{NV[H,ImOb3?bT~nq;ƭ; cYpbmM#=x9|l(BYݼ߈ W  Ydu@2OA/S< Y'!S(2 \sJ(q;[Pgd,R2np˴~bO4Qp|g(SC0,dN =? ,_yaOO۔ftE(X6HUh4NcQrו43ZDCӞ|ih0mw K'җ=V}B2\.SSI%t>;C8"iτ%ua1p;,~7MZ9N5QV8NN_&L 4kͥ(y<s?WNK>a;N06P;jr"v^ܗ\  3N,i\x/q;=>wHίcˋzs*\,?.As <~=*'70'p yb);--_):}KaSoߎP"aЅԉf#\unh^2 3[sZ߼3Η>d!T_F eX3"m/kCw߽svMAxZ7_}ZP4$>f>=;%Or& i|=^Ȯ;Vc5>p7.Nz׾6;HXqO-lZàދB5TAџ@l{BB1FW:X&*gG+9B^Fਁ(B T@j)`jeC^v:V\,$,#e P 2##䇟Y^MaJ HT)HeOiOb0pd5AuK|]!˾O4x.dȘ8U *!7zgkD:3-l`+rSGۤ[$Q  ( #J6FߌdAdP) Aa0>MG,>':k) 6ﹴ)TP"xѺqi1#yOAф_@=~ª'*5u_i9KŜd3~߷{ǭ-FQwUVWss瞽#uߞ#Wzhk0uvFF'}I|p֙lC33 (%'wa}Wv:ۘ[ia}dQGaYYX߽Raa_ox|l\ud: :xsf;e^~1fn_^'#o߱Y;dt0*2'&ލIρ70.X.{Ls[_ۗnqe}Ccz3]jZ";{0^7Ny s8|qoAn=vG=Ǝ L1I{8 /m6E~j9{-Pa7!O|l2/4M_l5&Nz#l5 l׾9i旵f=>&ez|C^e'?ҟĭ??WCq|C%-lUCsuqiW`^KGS uAa 5}ccH0;P ϻi2!I(>WIecD5c;pӃ[X7-66}qi;3;A{H8%c8P.7-"R}HClk 5qNMՒ;?'8de'frH#s0”bJhq$<_W83y̎Ϟ<ږ9ww#C抑4x”mօ#eRǀc{v~2ןB.BI877f׷bK][xO;Z>$Iv iiwqm2=Y;|XNĉM{-Giqۯ3Xnp:*}/򚯙n+p:46]1։IAr}v\/{@ n<md ,~-^6nja*ٜ~ 5qM>ߝ9D—U)o? ~oGC$]x/]Sة\lO`k=&b)@;y5mj$ GN.=ޒ||M> "ÍDylG 6-:3@# KO.گedW7,L1ari01/ 9 1xW£hT/]1i=' <O)P5EPcs=ߍ:U>is乥^b 8+/^Y*eEx5s~C"A _% x_ًZB"BDDHRAo{ZcT)y#f=eGrb1|a9[I%3au 6/ߌ>sפTIHnCKDHhiuD T `~ :޾r-|n2"qz|+Co4{K(K- w^_cx܆Ϻ;|tiy{}om(ܾnk׻y݅n_t$[E_Gy/?HuSʹF\WƗR~Fqz.[Lx*MP.wW',,#'pU9`8?O}<}QXl%L0?rqҤr j k-?юQRAQUBۓ{)F$Xc08yʂo%yـH{7XDwS{zC9{>ϠٞfvtjT_x3'IѼ@6`eֳ 0)kSkTς(q V⺺9Ć.#NR?Py>^U;.kqZ /nB %XR\5LoG:*)&XB3P8wQ`܌9!0uFm~3 B!྾J"·Dع58/]~ 6 T;n\4ޕh*΁q rD!_{Nn`O .'*ErAs: %_@q.WGߜ:{R/)ߢl5Wx텔5Z@{檫K.ak?BBPf 0ﳬa73PVzOJϔ՗ Gp6՟$zm`b"!Bi5EPYw ($kiŘBR)qmK(Zyt$sw3"fo4f10-J&Z韬b[yi}Y:^[{[@Dt賦CqYˡDsiz̥:"wv*IK%1!  [LdBo~?~h _~ДG]~i۟H_ߥ2'=n:YOsQLQz3/H;w %"P.MALYDh>/y} g_A(a(<^Gm +~<~Y)ǘH Vo q@/ ri!O־a>gȮ_o]~5d|E_ݚhЕMbF,e* 40`"ـq m> kt*?yGo9[F۬RHOz|?"[ڝU6*A")}I]l*E@#$$뱟YY3:X9ydixTM3ѷ`QLò鯜͜[4+.@ &T l6 Ik Rdf%V6` Qs=fm%@āgTc?X'$@#e_|=NR7:A+ILH"A@(Q IM[!we$@|1YQ[B|assRT zO$]=I}̺v4I4Iz̝!S&$<}j}[{26@)qOx@gGx )QrDw4YǮ<'ͨYۑ]Jp64;crW"T)¬(i!EI@` % (B ,F (IE@@"TBCb z TF 1 t0( `A4Ra! gꀍm[)8,X]yW;9墘BtPCtbpqSkR q|p 0-*?M}}FˑMzz𗺏vA[֒~^XG9oGn|nn Bw[R} 4 L0LÍc= cnPI:YKc9_{eerei+v[n,@BHc6r-~G 4,wj={.D [T^+{=;烁n>xNNWn<NCj5/OwG_d.cq QyE/3]&##bZZ}?s+0KwZ0-/#W5sQN?4㹄lM OHU0 ؁fϛċ a޶R K[i6̉pi@YQĴ'_ #y LJ $:ƴ߉{^C=a*(my&wog!(^/v u e13IQzSU5~ڲ: L;!"1}'.Z_'w+5ݩS~fvge````~9CHpnimg͌'l1DŽ "<-Oϲε[S}`ZO$t E_ٖ>6bF}6 -K ^t .;w`{5ʇw3s%p\W -7wld@ ^rvWWl30x|\|ON~7JHFE ч|yFC<"hQvfՃgNpSfii0D&4 KMG^8<b5}I8EZ{fNu (ĠQx`J)_ )F/FI.?)": G?-ڸAU|_i@r$]L1pB.S`0=sΑCͿXyCMA@Ba{7Ƀ}|0-N/Y'(?{{?oպ3W){8o@RS6/OP5xq;pw]M>=j܀Q1c%&C'(q{ FָQLj5p5ox3`x4~'8F!䇌0@Z4yE-=4콆5seN[ld*Kƶ5Kd9~ wʣ8{F0*/ys c%ϱi0 Nsnf_ݰxJ)3\7?.PF%!`b3=`5} zc4˖T/jM?NͅˈS'm'o=NIK%d,`!g|4]|z^K}X>7VTVgt~A*|#Vw&^>۹is fSo`A9ߛaEgs]?QG?-ֺ]np]w9};L>ɓg#4u[wNS7ǵ}ތgA?zכwQfwg/3w"iğa&yg#q`f+qYdVǙŨcx?ocir-P=%\|-'N>~o߬w;ݿ3z;?dzE;56_ ߩg97>ahogтᵦt18'zKVx=|gS>wȝ~oJND=<7` 9ÜSPoxZƗsXRSl[FP&0;3 Gc~qN$IU\pY;q{$ yJA^F<tnPZ?g?[*<&_wb  =f"ź!F>E}VPI;zT>OL\VqL!_yMJ9YEqJS ׬k1}t#ЫX"X!):rtIl\;؇jg~ì~Pa@x>V+2=~^!Z#U~AkWD~N±t $ ~^`9Y̲:؋i|1jia&=V2=s}bJ"j'OB,m^P -+@Aa|UyKUԼhE͒-&aSN Je6]hHrqa?=$1ҹ"&$wIǑQ?MͿ$ ?9_xɦWP:@dR|r0_\XɈH{ai-wt11mFQL<!`Й93H\4yL>=J VHl>FF~ )~s-z&}>};tph8Pq d8Kb?1_S0\F>'a#xzrjE]٬>-D8l{%y6)(Cn4C6>R`}<_?xzp2x (Cn2-~?o!S$uy/B"CDKΰr<9>݃sV2zr+87(r}d$%t2 p# !6Ⱦ&.MKm.)!'}?/QwCrQM{ad941=#cw@m_9m|n@=ވ$+HQX?_h@2 _a|,-2T 졑gcT7H0 DIX2XPHB*-%FJ@"$K)@0HS,$"*A 4dtV:",% I dUMn𶨂I5GHD>~w%hA/=%0!r(QEDQD`5?/sN8v?oooeM-]\]k}뛮v "b}}1@ a/a|pwq|'ytʆw+ݿ[߬5?lj M.szgSOwDZ}tq{ZOIZvSn9>c6&\G@6,|^2]_sT՜;sY[أxZz1\@Se#0Q{I؄,1ƁN}z[9ȁaG&+ ^F /xfp 1w=$GSm|]}uA5Fo*9Z< Bܗz\vvC91*{rcy<?(M%`k<кP#Aw|A{hmWEI#P d)}S5\XېPJ pe~mL]xZ( X\Ip}= 'M`Y*[Cep8#J@)Kq o8E¨)qfck x"3`Q;[B;娍La#Hr1e;A lx`q! F-3Vop;y=Us0ֶpnKe/E%>H& ۰hþċʡOm~1XqVPkŸ!1@')؟7z0{[ޮG|k7M3-_Oz748hS)}F6w ~ؽ'jnի<-G?8l̕􍨁Mbf_D6xB@ FZ7ޢB}ңP{Vj)46\f-Zh)?s4gpKyؽ_tt}[L7}_v;m3m6w,&_m+,'BvR:'0|ڇcI$04Dp/OAϬ 8'xOdYqUDJ0((J`C[UQxl<ʾ%v%,JMWŤ}󸞌j+q7oy 0B,84H(ibTʻwǟt5nqj|{KC}{{__׊'_7ƛ_}P||/Ᾱ Tz;3/bgi/b/q_?P\^GwЃ&PL/`6Szr0`VNM{C\\-G7c)W 0lKP@֐Ԃ|R~m5$zڥgDCT5}Y.i4H4v5Cml!֦cm{ށZ}9sT>D h<y`6 $˜H'oSXp,%&kkm$9x#1QWZ[[rd$Ῐp y`>0ZJjk<^Wr|-ߏܳȏ҈ۊPNux >&lȩ ^s8K!:e\i3=<9-FЃ=֊5_|߆'wi)5N"pS ؠkuj}c%ۨY'}(}` K-x2Nw{X d4-_tA͆[SB {VL6v_di#`&wgu(y!ϫ&yT PV n7s2]ǐ{LP Rn_@Jcd$n(<4%{Ph UNΓ!\0l<0N<l!}u56ѓ'fT; Țav5LC%4Xs:Vx_%x')}\sn{r/x'(`YKJiFiž>h o%~F/_j}(lKj=[m,G/xǩ*'U⡴QJиCw Ql|OZ|+8'2L^_\bAjy'0@G/utIb֑&|LښbF&4o±З,)|C㬋H4z@R|`Zd1E.<ׯ&AN=uD*1aVDe8ԬJ DeIPmĬNH(@%V,PR-H4AAJ`ATFŁVNDN7bNv UGiA(RQ@UE 1H(,F bȠ,X`#QPdXbTX*beXDPJF *EP0UAdF,PIޡVÅѶx>,"p 7d4mq 4V@XO~dB(gC1G)a1D4z> 4TQV4z[*Hor( /ܙ -;20J<£ c-U:{!#JU[lF;b1d־Gh)RpٞBxKCto@TF"G˙CK4 ϝL%`8 AM@a#&ƅY Ve+dFEzCC ĐX̰A9$ll3FS,Tw[a٢9 8Tm#Q&P⽳T,(>Z# dP+ IY 1 $EX>Wv<"4Yw f#OGI-Eܓ(% DVdAu;x,1,c~8ݚH~ߔΙ9odx5'ӏaHz=K={Xۅb\p[RTbgqvӮ.s'1HP - 3*pgY6ݛ>]rpmXPZR 8p*éIR٦jY/X^Ɏhj6(jhW($sefFfc1Fgjf_uBv&mė6IVpAipx.0cȔ[!np;EXM4װQ EzwAh- : +7rdՃ1KL 0`#7hÅ>sj}]}o{Z׸R#TMifiyپ38l-;?ܟ5E>&S_k-0^f]u< Zï}u=qfHiK'+`_e56:VGҦ}u9-_ ҃_-Xq7NC+=okQymhhVTz9 n_v~)r{i;xl>~owwjh;~/[x9M{>pޏN/^Ϗ_XఔgL^:!drٜs;ܶ[19w}~桃ڗ&oP)JVc(F6ݲ)IIqfrw%lgW;~IȠ6[oCg2!$'?SG'Po4?e'z[&T~)haKA̸='L0^/ӧqjC% f5i kZ{^ `ENB338]V EJX!vOiZh7/C ,˽zt!L4 4|B_Ή/ uٞVZHS@ґp-i-؇Z`ؿvhy ysj&dzAZԑ1B4C,?2`,440JRHƳy :㒆SRX,;o퉢"hJX]7zcyܫjhF0Ηql"ΆK~ ,a 36tQ^z=Y^V3ߖ>>)"kW%r|I[qcH,_^]σ/0 (CM.d`D!b.!{9 )>BOo~[/Cow3/!E}Фb 7X=0D~7. oHSLex:ͤyz+4_ C^OL^cY?ViN 46XhF",$b1@Yy .LP92=~VQ2U mJ C6@˻![,$!l D*S, BHmFPP~dAr  XYIJψ~s>Rp;2VY^n#w˿xbT_F%zF%,t;{Js:c K^U'nyiCW(xULQ@Jf@0T\fթ'anV]伭{mcL67ЧJqQ=ޣ#]Ƿé}/wɇT ywc`PNL}'c/w|םYQq倪g0~)︛˽D|_u9} ^õ{< Fck.+Pu?އ|?eV^t-Y*~>xWd7,xohzt~s=k<~ljnǿd*i9}ǫmvV`Zk} IfkGô\P\"3u Q nGnM* Y !?nu[|{'uPeMd\]>{ Υ S[ Z}y_cTO=[;@%{yJ߉\To`OrG۪wSMHpiCw_=3RaNS:qүoY>ר[$Aef Gd>aH)9Eq(& .US8~f.+UccR}E37B@ %9+U $a@E;[Ke@z#O#}4Ű#}Nڲ~,:zgоnh?Wq?V!"ٟ_O1הGB[՛Wǵe䪪?|+y}#伔SįWYm'ހ?Pr]uj)&5(jr]#A"pR #RyhtNn@yś[!x^Ҥ -RvXOQt^IG@#{~N,^@$W0SDH .,9swd瑤}?Js_^xB?c(WהG쑭 rϽi8f*?Z7t= y?'>Ȝh?n_Tsš}tn"sVAc?㻛s.!5UH C| 6_g8@DP}ؔ0%-ҟ|-^ϊ'\UuN'=R}PH4}((6!OGɤy xnnXc?.&Uԣ |CEF1U9+Wwt'> _I4O<'c+PO􇺈ox{s ̾h؀|r>%P։_r'C9*-o|._6S19vI+faDD a}(qH  ؏|μb_7"+1 80SCgb嶧{=y7s$pG5eO}.a}nM0Ty(O<{L4fQ ? g ±S̰ Z q{E D=1IЙh5j0@cjʌ~>_U)'/D0wFy_n"V5Ў|t1+H< , ,X4 *gwCyY z͞$'r3G-*fM;6&V8A8hc%X\u STOI\~[FcγJ 5LJH`TqOB4yg_sH|ĭAaD*IV%dRzo?8:}l\̓ C^*("8DΰW5Y[ C}/ .{>o+sXFHuA[#EDC%E`YH 0a@+P P1$/<{q!Ku=8($[SE|>׋y'{EEEUAWu,g&4;&x:EFJɌ Hasdm))ۮE\>ﯧz=)<0J$"v(- '6TE]#>n&XPI `V!'h{IqYؿO~Ϝ_b $Vem3,KYu V70lJ1m6KFc۸=/}\ _ocL#MA3FyrĄ`Cq^#RUF ={ + I+ԅbUb?0NUS==Ǟ4?)"HH\(;ɬ>0^& :Mv- А19m@g! 4r q*'{Rh'" QR }"* 0Qb>L<W:R6Hsƕ>P׋X3+MWy)`)Hd@IaɡƋyZ&4i=;6d3G kG"o9 }zGٟU&XQ*QQ=qklyc,݇-L{>y*#&P8@-}Z92 @M h4F$I ́Q @TxoQ5}bn4Q:@IFzTѥ!RϜA ۃo}xH U BDE(QCgQUAoc7h]0}">rcJ?JDU,(\xL%O;#kB?3@^jL] 0Z[mBpBk=>^> B9"PFE$m N|' 9[c>rtĆ 0;vUDCk{̮ajh?'DFyAn 53+B8|'^"<C((:}L}ZofT@IZ\F}S۾Tlrc ok]j ]+IE*Qa-Z_ >ϻ>8C.u!&kv^o4͓ oxFV+OUqoz4"]_ss#"S!0 BHC۪DQU21I/~=OǡzЊiS66CTaosCl?] {ѓTf2$ }N#};kQ S3 S c[EyYM}M'-| 1ٜE0dZ dOĦe嘮E邛z62p_)7uX9BCS>DMu09eA؀@}|jk7T_4?\zzzWs,<}_J녝z=G dڧp-7^Gϟtm,f3/xz'܂}r}?yÝ??|s+[sߟ|jC|ft]yz9%׏Ej-OcC/vw18yô/Njrcb;= ?_o'w{?<_{^{:߯~Y+5P~ptNRr>vkm\Qa?x_ٓmȳ5F'(d@a)HQ(9M &EmHlXuסDQN<`YhkT 0{k"A}'0I|?[B?kX;/Şd>-a, /Q8OO7b"ՙ-KCOU~ _* M%~TF#tV3Diuzfs'^T pq XFǽ/w{Թ1w`zr ӀË+?nQt"ސ79w'X(gX;G_l .×A0M4s?{X5X;?̌Ǐy'!Rz3(8^俇MJf1\̻E4YՃL4Bqn Q<$FmX"$îViN>1/;hS)LP 3O_At}b@@DD@73_a0tm˚Իnc6/%/Bß\杯D xp_˜![m\_mp@BE(P HB+ǵ󣧀eښlۯY ~eCxm\uN~OM:=%X$X>Ą'gUׁeoqo[޹F+x?YI}^e5 =un[gvwc~=Wx2ݬhp2+qƻe:Zoi2glٻ>?"'A4?GEc{poLD M9( :?F82__|?6|}|^>7=-t'|$+O?QUj~8Wϵ]{acsYf`_`UpxL6}0c..o17#m_uo{:>icw9D[g&컎3ϊE]]{nxث> \s^+V~4?.r^aBkѬUsZo,$ܺ/'#=w 7\Ç'z#`F %҄/h_F/w1\x}')PGM*N<=nBvEYQunujbabbaōaV&!"bcWآC-M::ĹCRƺe$l\T(U{1xXfM±dKTazbD$Z[%U'O(Я!Q;1n5D}\jRl, SNI;/F8M7.323+E1MI'.QyYaY2>nUnfnmb]a+dVXXiiZZ\\hhܝ__)ߘb܊ `i____[___________aa8iiqqqJ*Vj)%B®9}UQ;334r;JnE-RJVV:MZZ.F6J*)q^**9 4DK.+GJJG'cLz>f~Ell䔔D윜l(S)(>4ĢTl_&cD/J:Z3ϛl2ny^kumeN\VZYY[jF"~}<)s3L,sJSgeiVnv&qNjRimmia9^yBz>=95ґʑOL-*IIIIIIIIIKI5I5I?MMʽ$I0ISSIY!YYYaNBƒk1G/HҴKA@_BBCB9CBBACKKKJcQ ?Z[=G+0`K%y$z*-VNNNNNNJ:tӧN:tӧN:tӧN:tӧN;\:ܿe/P++*VVVVVVVVVVVVӧNܝ:vӧDS#US<;{LLLDCSK70}2 ͒ վa֎NRj =f.a&.6~*ʯӊԏ Ўo0񑑍 LPM!-Qm]VčdUmTK4r3<kmeC,||,|⼌GJ`\V]sO0U.j""&njnnrrBqrrrrrrq<S&LA͡ uqJYMJEF=EA]jrmm#cbVFEŶ66Jjy)'9(g8J'W*'ؘ)8)cѴ!L3эu-mRǙVjAӼbc[,{:}=TdJ6$HDgSM!T^Fξ/-,* Wgh#5~}˹ᐏ________wwwwwwwwwORʁF \bjeOM=FwYburtejhx)cLM,ר%_nprhD"9a:IWHXUffi'6ffdWNHC;[Zt|cg|TO*Կ===aS셱#}JeUEؘ&i*C+E"d_F:xxPА%\" 2 b*^#V*jb#bjijV%c#"bbbbbPķžNIK@I9M9(8U8(4SIMOBCCCCOCCM+F51ԭ=:C9-wYwwnnnVQQllllkXZljjfPaoj@#hXZ oYT~a_OeQ0Y!>T1'pUVUPbmmnN޳($޼i74(=+434}KLMccccc;kjkkp\VsmmVQwggO6mnmnnnnbnrrir~~nm>>>=~:<<4LMhG0ow HǩgECgKEH<>-*Pp**********2m+ MMMk qѳOJ11MqsnS Nsss󓋊sh}qZ *uqqrqmnnnnnnZnnf]nyZZ}YaYZuZbin~u–™™‰~~NZz*4Ll, MhqWVaf\WnlCHHԈK!VSyqUXBMrue]M XT"2b`Lʴ̤,ϻwddrdddddddddddddddddddlru0 |z|:BB::::B:B""Yr c4$A1#F(FFFF9&u\>$HR=ɯ>/.D5RPҸʛGXVz] ۪'HIH !J P$TTTTSaXcnYR<ڂniV"jj*f-jbbaba" ^&n*aZMʢn}nBA*>2%z*FenvRrrr"z~qq]u sI.+HȸLR3rbmn]dO;J+:::85C7SJQL!DD%4>99:65222AuuuIIIF, 2/l-l /ˊNm\QqYmnfeeeyZzB=VzzI͑Q:Lf1S$ $&x' : zs܈stYwP:-i4nn<|\^1+]'}_W/"gtf+A?XsoY5Y޲z;5gYeNwa]FVs'Y⛬pw3i)׭~}}mjpkkklånѣF)FMLo˗8pɩ\/e&lQ6LxQX-{mMlh[ZkeÇ>kɟ__&M,r}==:KKKKKF+hv|8p͛4_>\sC6Yf͛6lٵpe˃:1Qǩ6Idɓ&LcŋV1xŋTUHɓW.\o˯KFL2bѣY}4ikQm3͛6m3f͛{5՚|eFJs՗.M;y`͗O6l8o˗O6L2Sxǟ82hі6e$rjM[>4h4ou65u߽L1Ǐz,Y)F8l.ZkY퍍-m==mm&Lrӽz4կOONZZZp=W>lkӫ5Yϟ>|gχ[RZkcNj>|Q֌ZZZ4iW֢le˗,yr˗.x2dFIϟ.ztϟ=gϟKF14hϛS6~_m#>el88*{Lg6ַr|5`BOrhD 7 0q]e@hs+4o?|[=ڂ *2 ?6C~2?` >?GǏs#U~ij|Њ}l9L峁=WB۵{(P j_')̊s(1T*0@@cNN~o:BAI<.prQǾ*Ǹ7We2Jpi5>I,{OuW5JlA0~<cVX`+= lXc 55۹gco|N{ܝmZ&Ⱥ d,,X*" :0ľ-Tl;=2G$ y!o`L VFHcjS&: MD@5>CHDәjyü"`"S0P)D[ V+碂dāK;[cZ,p>=اNr 1͠uzDl%fY-q ?0;y<hCd DUNF ~(Lġt.๒f®M9 4}= y龮 ZJhO".րWj !OLÖBffL533-Ia6A$$˙*a1Aۗn7j) Ls1\*-\UUAVڶ-ҭkUKjUKQ-fQV[֪ cEF**,TF"AV&(Ƕ_Oy('5Q@^ Gi?b̊d7d` :yi܍/yUT^@d0vq0kbaxG˶~уW/ϟu@>fl/쇏ߢCw7#s'OEx5>J{AOzxE<{L K<Ǜࣈ{Frh`{WOs[Bi#_oe{ Ide.a-2e I*Y@9Ե`=\~6g)xȝO),A"duuiz"2m5hRa;% a:[itK[&}KW&g͏Zw4h<0h"5VQ{qbdJ)ԑ$Z$39N_v}=oeN2%c>zU]ީq4?Q}fW|koیUJ-"@؀B@޼<ڬ6)$'7<[4W|>ǧpwń}s%VVaw;"#\b! TՕ֖חؘӳ468:<>@/133Yf[U+〥HaT6%`W;yǮ~y}-F PI&2@X*~!t3pM(H" " è4yM=)WV`2aA #0Z4l:Spc?H ;w7377370.쌷174t4̷755W755Ҵ2Q74PsW270? kwTUXY\]`adeghklopstwx{|bcNƒ+;"ŎpYwnw'l۔ķLRUhEE}.sE￉C2`}~b :m̦'NI=,==?)ػ=xC YIe#n5__h)^9aO'Kn:2f`:!G\; 4s^'7?3?UԫWKURj J+0™)e O5Kښ49VA ~|OtooYl1ƵX{_70GJ 0&y g`|L %M}Ai̩I&"?b%RT+~}P{FSW߈1S>c Q6_U _o.y=W>)D#.TS( Ň-1&ǜ&u h)IC|#2m.7kD3V3=>LkCD%$ 0(S +z+ϔx_q-w<=ZT`8Uѣ0TztAe}Nx R<>Ηꚣ/3=z6ʵ49a4$=C͏@#(oּ8T}MJ=^'ҁ>>"obw;ptr#뺛R Ni7JwP<>IUCf;n{|7J7+QNzC~?Ȧ]eeஜ́qњ8?:lnGڨK95y@ùԘ?m181M!,#E:Ѹ+{&0 op9`i'G B+@k|{[e1-_ͯdT̋o @  C6" 2ha(W'|I^! g8$ , |?02 HxlI8[ŠU4_Sg2|Ozw&fsL5Ū)xHut7&5 7ƾ@!UR  $! :1:λ>amX֔(`b44w:ކ}<%f*8RSR?}kxR*u^'R%H?N 4i}ƧҶ3@&P$7X~ҨTAP "csv~0|pnuz}>i7=z.gڐ~xsl*Gr~SP :kѱC hhfja _R{H >0MV+~N*zggm=*fs,~4T!=Xb(@wz1*%[b]Y6{R@R9/ɖKPdYѷF(X je:qe лb¬9|דmͭ8a&vɴv8K5#1XQ,L@$'yQdy$P01`7dy3;!-[o{H$B,yfK= guD{>[E`*J Df#DJLLL,||g{bxxi4QKof_EEQTV,Ŋ3s+=(kRc#hEe/{`ɭ(, {;{?%~okࢊ*?Wğ>ǭhX̾A=}9.hQb嶘`}H(9U͌ܧF&-Q0BKkg;߫GكwDmT^Y+{JC%y{Y_X7JYZ%dX6 %{+=௨1 "TJjKkLiٚZ[\]^_XYJΥ-A&wS_>C@ I{F5*gcZOƐCǷlZJ@8^<>&J4=X¥n%FeO ['Q/HZ3D7)J$*If<E֡~ Y-;B٢~ewۆ7CyƳ[՘wL,l|0SPbV Q( PqkQRxZupp{hJIMY]imy};2fGWյ6K#AS/hKLK ڤ Y}avSRR~Ea0@ cq)7i!^&A,(H ``DHa )""$ (2|}Ӟ8pF;_&w ikx.;dn4J3-;z5/N@|BKXM4<C2JkZf{GF :7 ۋ G9wj) 9+7[{e5Eeu&4-M.N/O˫,L+c6v0.ykem)p=3՜8JCEp}?7e9F|zrhH-Up(FÂt>*^?t2]ngV oϝ[1*~M@iefq7926(69h"  PC0@df zUʪ ,b\-u~Fo f²ai.p4Z.Wtu40rW 5xTUVXYYԛܜݝޞߟחؘӳ/cy<2֡~ax1)`i<" G56H`WzBkohdf~h VmQ|{i`}2KCkGのd$bB9r8y WP&7cas? g#8 34LEd(8їl Cno (  6{ч%6Cu6'8!b@ DgG tl%@< 9YtUP"&dE"lcZ(> D|JRA !B"h!1/y78^p`GO{G`əKu.>6hJotM4|@`  (L&{~Yr g>Bw!d'-..lru-y C!KOtdp i {QuY /!_Ew95Eu6Ffv'7gw(6&T <3 Gc2XDQp3q SLg >ܐϓ1((8p*ދ ,5E N"z׍WSb@@@ "1Y}KBZ@jx+kʫ))LT0) s CB?eu.&)n&2"|L dŝ坜,{:+;7z[;:;;8YG9G:h /rgIMY]imy};3KSks *v]N|$igüRh0%QPw? Mm$DS?vn0sg,dpj"yquDF`  eeNV'n$7}Sy~=OSGH;jyxP?3ˠ}/z]P=~%@;AH@'c=ȆaV֕A:lN;֪iy.Wa{MA^ c kP-|,.gQ2%|kT &S ;tҨɈPH@7`1APjAE4Ur0Qk)GCEV^synu`P;~ ~|Mݺ޳nY&C4#mU4Ța|lQHtHI3wGtn8c;xnG}w}dSA#pZrsP R= ^9Ӻ} Z 0 `n8sEv ?/ɹlFG x͚36$bFPpoF1r R@[&ED8.DO>lSGL}^R VdE`N@VB|a!AoҎ7ƶiD*?e!s@B_߇'Ii۲ھӊ,`C_Рz>H~>!!(,k>Q/¤Ɓ?$N9|O9}58tj=~|Yi#F)p"_K cg!] M03i @iDB@_qso1vn󒠪?:a#ڜ.;2_ Ąz b#|Glr>fmA9tXN&#.0G>??eˋ='vm{Ri^HjA\5P3Y mq>$o U &&=QnWjͻԗc]YWgXNQD艒6xߠ3Bjȩc∰hl?Ra?.bMqƩQ(I ( 70^uY((%yi5/a?yQKZyV;6$~4FB ~;BZ2}=MMET<>NֺymA\ { cmӣ2Jۂmc{k# m.kפ>+#dUTe O]_ogۿ+cy;ۊ̆ѐMP(> }2LA]4  NUCuOl^:5HY9x"--† Xσk! ;Go(&jG8ىJ њЄ{?E {S,g@_3HNc=7h^6sho%ʚ;vlfyZ[$i&1CqIS )P$$0r7X>A)D/1B r_iBߢ F ñM~" AUb H( ׊1$m6/DOG{c^7X wg,R!zDBrP_Iͪr;Kw_vo˫ձ3)A ǐV =zE9x yzΧjK^p92QUN!B|Q4\,?MǞc5s[Eq7P2B'D ?h%C ?^H" qֈ$Wv[5Y6Zg7J'| =oM%Eqnw@4E|^#gDq~f67H;G1Zڵе4ڽLcNSW}~$/)y#Lӹ{sy?sd<{eeedt6 -K5 ;*B[.,nq`[hf`xsgfy`Kym㾤D.ahّ ˘A^sI Rwʾlp[ۏ$uG1 TsEwW{g k|I:5QEt|;;6(NSg˧˩nͰ{TA<$P[7?]Wo$P$/ >-T(͔=c*]<ԭETԬ+JԹ>KԾԔHB@Rݣ#?+06(ᯆt~׺LȈj~q>D?>y;z۩q0dmVskxy=7= p @A݂@QPg\omL^s{@&C&!-8<Z]/k^U_%&L6mKrI$p@#W,SDAP{\9,0@Gb5ěTTb9b aj(H!݀hWQDJc !!YRQED$۱l VDɊuJ`l'$TPHPLS*E!1@~uۗXGcW^ p1b|6!ap,F3J-IA(`I R2ETE;}a)_}QV O|<1VvQA*QYcl @HYAU"`5_^}笀oTl`M}{q 4GٔƙL1<\"&vuLL`V D`4@XEF((bAܴksv`N6͘~ 0Ri!I J` !׽qt`$E9t )#Րh9UqN@JV{i,j !*jmR@j+6ŷɘA\\ru Ah{'艀/K36k.'ˊawA|Hۣ?wr74Eۯvzogg HO6h+|OiFx6,nnAdX MC\@~}KcDMto8ڜ`1ͮ٪ƺtALUI~<Ң:oGniʌ5`* 0ngU } 6ssjEZ*?<& !" E$0JDZA2УjZ XѬDQPdEA+PUbJXZR TF-D)b"ģDQ `UATUT20H(媱UQDXFQ ŋ%jKla*jĶU9qCXȠ"S)bV b  B : lA>{lEۚ!V31c79>m!Y<;M`QH$3NT NBnOI;,L p#lR JĮ>,qwV0mgq"a'pP6pbqٵ&Pr HV`q9g)!>0\aGfլ\e?!J6z0g1`Luf?ɛB͍$ӶMI7uö9kP/- is-v xAm8 *́8LɢyD(1ƟT/3_sB5}Ss|&KQ  {Tiv?Z mÐ'b`r"š WD=Ә^"rURȥsdc/] &Ti4+-I;4e9MFozt,;93\w*c *1fh6)λ!fն([hP2`3}cR<E%QF`U LV4 VM &92=~s"81w'@/5' K`/ {vV]KgfܵQC9EdF$j"!I>_"P+:N#'G#8i{@(6qpD$M,Zhi:xܜզ *ݟy9v "kcBrNyi}ClۛU5$jICК 51dB2Y.CBlȁ~̹5:C[?x\z7;|㗕.DPwvNWl%0ť By>&m<-bٝJ1'/Iw6 u8BH_mڔY1AVplaij_2C0S-5c<)HILB, :>=>w۬! la!d6B7$Xʨ1Ntc8MMtVhkZ@FK-ЙO 0;Vb9qd<qZ._Gv0g9UFV &P w3dah5T{_h Y#qĮJ5:G5s_xXBNY9-&Mz^]r`UÔKbo ltIQ{O?  O*< p}/4*, O=q`xkE|1Fgj Ӿ B*0N3pay?\ECi5&Ruqu!ǿaMˎ[<|At$oTCzMcطMAaɸF @¢ ,lW.1թPfbdrx2%w&/$! 8!=xtSlFȑ6xgZ^gpaXn=rK/{ܘ1/ҔNC0КmA$WxM۲ǿvq5xsǗDOE\sqchFu3W1'|<$yP'y vu8'ˆ9$ CHvj#x̗Bk(OJ"  I `}Xx6Vfdy\BE"o*6@yc%@N+38KTB9D ~08Hv9x'lodIOt>*GdAL`{쏊-{p3x#|Uk  "2eRc,T#VZ5+Ғ)$ض3@ p>?Q t8n3#$Ɖ_;t!x [K' jxi{}pMV+oE51OQ|P` Et*I$I;U^M8:֏iqcn[0ahiBP(A|mHՐ$0E򙹽O;^9닁3(Oa|xMϖBc.Pcs Hx ǡy܏{f5~|X3 ئ@Yy:(:vnTEyp4Ƹ&)HLH=ֶk=&~8:t U!Q:FשYk#eG˓ʻ+#>,gAJ=QB/J;gK )dzs0=2!UM ЫG,L~"ix ࿜*6 v>'I9mkkУ_gc8sbڌa0]޸925b/ĸgmOiW5mV(06@$c.C8("H TIg~>+qMğ2(J)bVá^#@Tg }~/WY@Pq^cϫюg!z.yCc^v}U|_;7p;7:ȝb9_pGFd'׬ڗ!O5u[a45LS MSr7=\Icc߶&G/?|WwbF@D ̬ev7vD{ubJ",<]DTB1?<(_|GϷ:'gx_ N;7o&ejgmL̀@wgAX["܀UeUs5j *wȿg@d>—2ϐ#bf$A։2LTgaN.Ӄ5#鎌ʲǣɢg iHH %N])0*Q,)L9G&@R23YH HM+pQ9c`n0O}}Ux\h}6BmɁA@ 05v#Rs)N>oxdُr-G7˔U*d0V`;WX9Ki#b#A,="7I) Nؒ>=ht?. @=0 ̎:j0-G:k>ƸP4bYdg ^$db>pNOg|aO1+^T%L`Ƴ, d4_y_U`v~ H%߳R,nnH˹K"=ʉx1)06x>gg!,uP~!@LQ u(2c۔=/Sj<,v\GBx#5(w(=멗  +kqpDƸ{g`f2OuB|2Qf=I |R U w"r+~d.1Ry| Ίa{<9'Cd9sc5?iG`DOqi*0mn0UQDΈa01L'ƚg` |B0QyBp|VWi@MR.X,K~xErAT Ԭjq`qO ' oם 8ӞU^Wy^" }ąD>ArWýu偮"Y.㕮{a %L, tԏ8{pU8C z>ӟ(ٸчk?Q;|^ɸ+":Lʣ`Q$Z?H\|^D=Q}WDaڑ+i9ц9^DodX8 0/Foۑxy7?HdGdW:f'Ϭ9z#WS>N4Ea<'WCyOvt86c{ 7cU8?ehCJ1>F1H{HO Q>7F!)3%Y CC@7DqJ>\f9#<=@6`BIQOC/8}>x`M /0ƣY4l0ޘ5kJ[O޷6:aϺiEU1? ߽LzQ7hDu9Ae1U3+$#~;;$sytI.:~)!,l,K kT`ѣgG5mxõ Ҫrn[Qꗌ31A6CϝM܁ rmh8cazu\{TPQzC!zL3ĎG A'zUVFDv Ty՘r: HFIΜD X؝>ȡ&/٨el*?2w&7ϼB]-wmu+qp*NDAk?5=S,up>1~†G8&yڮ}| fdw0{|cWvz; gRtGGBD \k)bREyp4s D/c KZ< bZG{&Gr'"O) PRN8ͻGwChl9]]D>?="@#H=2-H&Tk!iv G͇o+fͤkת ߎI¦P0%8P9?7yvfP)~y" lt;Ίi&Q(/v3\u@yߝ Ջ2:8Nnh1Kb |G)BA`,9͖>r'zB }=dJ+ Xu#;;a;|M3RQ(.9אvЀoSXYH(]rEeZh0>߇~_|}a(B$v34e4&퓢Na"}Fò`eLnŊՠ̵M2Y\8ѽ;>| D k"ڀǍkh~ u} ҽU3c҈C0' 5S+檭`CL) THg I hS (eLM@7̚0 5}܁+0Icc!Q6OYV;F %( P}A63XK-'S;cWyďIkG d 3FY*>[~0 j#L#de〷"'@0мp6;xD (eho;v~+_w`DaU$̈́R4I"]xfe93s/|` P0I@WlS!>E4bGޡdxA14HC8 /fAByB3ﲞBVx{W ֮HJ&fKs'>΢}5%c7ؽQ.Jmh"g0iD |H/|t3_rxݶuM4>@wd^u-UpNuVdI#}`&c@`|)m/I0ϕ)=ok,;i ;;⛓3Kc6]w\ S\ˎ r2:#_N4|wh`x_l%\%4< [y{<1@+6Qm9 +HJ3jq >3p ٷ{TB.OHAJIVux@Zz}}$ Dlknf='G޻N>m{hX7LㄜTsRƂ8(Ĭ:Z8  =NE&<1#@A1;sjQV3wQ~Y%/5_QAD4]w}|q9ۣ-7q'I?mٜSۑֳ|VxLko'giAǝ_1ݮ1" x쓭XZw]k-# ɘQ2E"@ϝ: L4=~9_!Ybޭb>ǵ-8qzvr%Ğd1$J$Wu2Mgсl|O &ܡB ID_G~OȌb;Eǟ_Wu|:U5=q9a \Hx`O_kު{ 1_T/dwʏ\J`wCl 4O<ƫǷ0H}`̏YVmLD> $nCxAQQ'=Ql! ]!&׉;_ԏ c#"goL'1,H&cYGjHP.wxRT H$K]k@WupF&Hjwl,4<^ :*DBf4")sDJCa.cO7uAOV֚g]򂝓1k {O4Ԏ09\"$kBv?IA@\{3q!uLWh]l>B~F O& 5c4ns;oA_xq tg\F)F54t}U^h3}z7=oŋw$[!*|;1@yo y汁" x7\=C@CyC6j֠BkJGMJaa cv'°q%\iw"p><C)k TSZ 2֊B ~d l5^w~0/PCxRy`8ǰF{adI+ɦOyP#ف9Аs c\90dHݔ5u&^e1EJB]c[ -͈4D;ݎ<`ao`sq^F%D>dD@OΓ!.`f }Ʀ>PRD[# $wX5 ^cXNI}NAy;qrf$!F6sDk,JZhK)D| kKuAl!θeg#4tw⾳W.ݦ(e kuy ~7>s1h71>J]QG@^I1AcmOg'+B0D ؃38b ))"):bGWɏVN3>I{blsc8=QF 5t¹LTckI׷p;gACG*r(k2 <8>{L%7b|J*l}kR68 ;UnmcӦE 6a:Fڰ2Fd(͗5"fbRO&,9<=8:G(p[*TDS`,'\_Zaai#܁;\|Pl4P7J }ep~kCDحFoDLQVS F5|yPЬc]ZHOT2^500Z6-)PTFCY+<5$){)]؞wczK)d5ӪtW ,X~1A 6 $1 1 VՂN )XC0=|x|CvS=G2UCfvpgNkNC\" SaCApƝD Ac  }_+Pޖ=Xb@h̜Ɉ,_wobiD +idklQET5AhjWl毪6<ˡmt7T$QZ(  4U~?o>l||oC}dz~w$>}ic)d,W%/9gbc pxZ;1D*_5~/U*AA }4gjG`}T.;D Wچy%qMg?/鳝 2#4/C]Cצߘho|\p# :2|aI01l[Ј}AUS:)LHbOt[<|. {]z '{T`" l91g N>i"7ꏆ'#0[_BC3dJY5{w"XAC+k(E6.w{{Fߕbȁ NeU߬ B YE\DŽI.Y+IEcbTJKK]Æ/1_1efg8a=3b3>xEǍTvہ% PS@ϚmI{?g4[]^x_٘ΖI'5z6PǠ|UL&ŵ=p9-;XG( D CJ q\r@QHL@.YbǕ}alhXj73FyS[[]b͟dI{o+5">FCnf) ӬG(|aKFEIKI+KKKKKKIU&iKKKKKKD? @Ay\U$~qVL@y¶1xw۠mN8?FaLG\PfKx.$!k(~)x Q"( 'XkUSxs6/\߄CIL=.yQBه HU ^lzURUT]US UUS"ڽUS-SmUTUUS5QW_USL>8v SEhZa4Ҩ  &2(MP_ ]daR 1hc Q\Mww.\3G+mˮh4LLKJ˃mQiK[+#\Yq3q(֒&[&2LVEeDm1l˚ B2H %THC LdSPȲbŀ%a P LIPR`[@!A!RHZ)Z;TTPU3RBbEkib"EQ`(()R" KRb2ٌjKҠUV(9acY"("0QdRڎ QaSe3)3(e2HL)>ppV ȲK1dͱQ )e5Z1يiRfSReDk25QKNZTRX?`Њlr140a0KmU,EP beKR%TJ,Z92FRcZZRY.E\L{C^&"AH*+X  AdY"i%XU # x :h+');Sq}~І],.P&(*H[,c"  -(4~&@x!HJ+Sb`]N#Ɗ2;ܪn@PN R#'P<s0BCΝ}8 ZXw˅.\.Yҷ*"vkhnU.]GS- mmLUpLVbmj ʣ˻Mwb\-3&S7C&wC(Ik[՘" bZm̭Ժ͙K[#qfULĵirr#])mXkl06c6eZ۵r-,ܷ-Z`)q c[mێPh;Eu.9ZᑷFcle[FҰ7M0hˑM#3.նfp[QLr)MsmqrkiLj Vpe)[iۂIf lL(NR"TijfS ŭjb仆TͣS(7.nqUJZ%r2a)G-uܭ-aZ*mwsu-ڎ6Tܗ%.fMsiVeUq.\CicEP˘\̛qw0$JݻVS(ŪZa*WqrPb&c%q-s *R˂caWv1v][w.6ۃw cEvw\ ݹ*S Zttwms )¶"ͷZAM 夥2ۄ EIE£Tv5Dڭ.WUEjenf캃ZQL1Lc؅iSۍ*ff hV9ۻ2蛔)JeU]J*RE F\r㶙kw2%ɍp#cV.cnYnGsr"\ s0-CmM\sݹaW4ܕ20Ƶ +).U(ah(Tmn1B+Zrٕr㙎0mrwjj ȵn5 LWm3Yb9hL2[!pdJ2&[IIlM0MGfڔElijہM3n#[lK[UfF&1*.f;ШdNZQE3*s!fYH0I9M¦ۖm07* c t2kS.L3%bbVMf]3kmB¥-wpLٙmi̖ff2ssJn 73mjfcF&f f䣖-Lm-,cLQ3.`[c]UV f\ks #s.+EŶU.ŽZ(e%i hU1͸WiWuۖud163+jln-[TifƁ5ۙE,miF#n T܆c+[fbTGaGs*f&V8ap˸Q kK2U5ݥwq\(%U68a[]\n+)u Gws  ʰQZ%uFlTtwwjcWs r1固mێ+K[am+JQ]s](c]-Գs BTA%)C\qneks)W-6n-V:ܹwMWW0Lݥ71[e#hpW-]L1n[Qnc-ıAvcLVܩKlC1l -Ž3 m)f2uY17kEq .\n5Ue[5m mJ-1rܥ.u]D.m*TKE,;u 2ۍk.bT1XeTUZW574Etpcp-1ec-ֻiʫE"LKu+mheŗ3Zr-2*)Ew3hʫєw݅E*˜8n[ln֖˅̳3pS+ qYUfw]MN1Ỵ3cJZ1\m npAnZ)&e&У0V9Q+kQKS(nF([rզ\\ZP%[2ZẒJf2ݻ-[m,+01vSsMKc+M]Mum[l)S+\,9TJLj[rkW-9\U uͩ9p.ZVai\w4˸fG-RS5kJk %s(.  4PٖVS3+(bpJ ˜LW5b*na咴u\˷ffQq4Kʕ5Dq̥1 lw.dj5qLJe+n9mRfنPqZڙVjn2]n%Uik5ҹ)\q%w& kr+q9R݊VmfRb"%dRMXI2I"ė0JNdK, KberhjK 6 CGu[3u֓m3Z96ܻ[pLcnwhc]j\1eۋnQ7uL`8KJje3"c- 8bTu+\`Vإ̸r-33e 80%K,-9RD  I3- )&]1\cl1LmZ8gfo")f~ʦG \~Aѩ/'-ȯ=ᨶL5yBb6̂Z2B`E+-pZ}\ @fܲfe)R$VP4Uh"\% --*(U?;_\ F &zٗ}uK;?wss{U/o/o/p,a][# ?wn НŵַkUԯ~4<D9է}/`g-f4Պ}󧂞 pfақgm꧷ޙ願S{~)?iylVDFAPdEP@;bv{dlO>:OOOOEO4OG(OFƱ/CJIOOO09G@ћJ2 46\d +QQ@g΀Նvu/ \pKuΆr)E)@D@Og(pɐ\>6GѺZْod9̌p$>Γ8 oաRU)  O7 %d@$ aV`.F{3x^?uYiy -uS,Y1"! \?f' [C%j<<ڧY**J556f@ҋS&"WbÝ:D8pTDu翻 禍Fu]rCQaF)YoF [ wotk:T-$ 5-O_oQ;p⼿ƾmU`]Ԭl|:㡆|qֳpǥ' rk]Of1{{)GR6VVVSvJ kVVORvRVVOVU6Il`|ӨA>OgD|D s+ Ƽߝ:0lK?_]` ĉ٫NxG#5?{$I$<MJb5QY?P]/rZ,oQa.g&dO4{ U~{~^iAc\pU؏g'WJ} ֟ pp)ΊOL=&7k!xl UoU !D 0`x]!ssO<فz:nigc}kp8| ~p/1g]%|u9؀  %Vr>bw&0`8I/f<;́LLV*ⴡ`zy30hCM gv?ڬ|VM(szF]ae"A4CzfTa1xW_" {"Xt5NUVHϷ.P80}ZGh!zg=ѫފ.V= { ulmsJ3T'ܐǰx3^^j9{<! PQ3b<G1^4>7T]ݏℒ A_cˆ8d&;wd7g`Z"(Rq5\ w޿ЂD='8'_=ǧ@) !"$!L(P$I@|>zox Q[a'_pH$CS3 4ʋɰ@:˼o ͚rWg"igwt$$B I$$PE# "D ;E$v $X,@X*,@ $JY`6Y+" ",bE`#AEX*ҝ~޷{; |DF,Z#¢YIµ( do$^o9-rle7RNsJjOZ]FIB"־=!%sa6nr.|.뙲|Mf-{g6=kqd+IAوp:f#ӝx6o~&Za7Bh} 5rah6PE$~Sv')_v'-E)"|h=[~uoq|5~}|s*Ef"T}Uȥ4B\̎\^+4[W-Y<*Jn|\ZXM W y_EE;ϮI{K$TD#0O*LaH)tE$TL(M[lF), LH?^P$[ʵT ?Ʒ"HΒ7?%{N"=p'сt6$__fA/*żnC˚*].4]* Pj#p:d9M_s㇢O3BP!I ;RUwrJ??l{du.z\~UHF>4$cpUn@ d)ՑA@#@ $z}Aʘܻ>ߛG{ױUUya5h}c{<ώ=| 3X^<_ǫ֞Lbqs&߭ a /mھ䄶KUqݾ Z)W۾Y{sM_k*?Duأ"E#^x6yd!HJ0$JxcF| ͖hM}nӿ}d.d3յ\yjU =\tEv}nX QFew@P9s reOc<)C ==\ӤR :?@QO+V7ǯxs௘|d *]_ڄ{`D1T2ȋG*X">B> `MaM(0b+,H fRC",DE`,$-E(MmR?8ݍa`DUZ)!] ?CЈibBrx1A(q L'5\Z}"d"k*eneTDSߵbbZ(X*E[j멙EPEUm*AOZZ4u((/:)x]7-LZ$@[ i 'u @z8vڰ[/=7;ȕTTK\?_~ǘV:^$h>$3^K"܉ g0 vWּ0xCp{gI֠|Jj~ LOu0'[^`.3rV]O,SҨ4HE  A$ Y ȰDH,E #QQB( "ȉDd!A swdX@YdffI2L~ pm0J\4b*ą0A(L~N~xmTPnpO!٢Y/V5|47[w{ H5{Ȳ b$9r"D wrff@ۉκxO/d!bK=fĵDfO5H#ȨDK"Ȱ37MAhdO9ƤH=v]R~*a^>o78jJ|MA 1頠=EOU{5\ hwL$u~GeeIPCK'gԃ>aveĊqK CI|#+{$e!Xژw*fU**-z?~~< $331||˄?}k,De!VOh-b12UӇ8_"Mλz#iL uO7ȶ w5nE7$ l2H"H *X#TUXHA!DPQa)A Sm~?nYDa}ÎNf2N2%jAH#"6X}Qa2oTu&&::g{0 \f2lr?ꞣ/cCɐgќ`PP:x+Dx,+(4vO'NPQF% @>B6chpOMh:T>@vS#'OWZ!Y `ɒ{Uԁ}zC OOD ~m ?wsN9(LDLCDh)1cXYYt+6 U4I,idY/ N D=mL }9!nq*Ѕce2Ww(D9iZ~SgCs_XmUnCp.AQ ߉R )N0B`:c&R޶5#bac$ |p Q.c8AKF*ve<>ġ!T̸{jq5uP˽\ߑؤãpSc8m+1 wgb T m|-mM>aˢ^c5tm||t7d^up8|r<MPO_13GrgvF0P!BSVɈRbi|E! O\x gDDg~N5U.I Y4!be˶rw%OS=a0s]wYCH*mU?_ob ސa[E){)֬ΰ{(/ma†)V>BP,̷xH"D(1 {WP}_j02/l D2/e VVظ}]ǯh"y$b<hxo@1c@5|E$<ۆy5}]u]`4&1 &ϩ^zZ[0:cD,  ͣ"-ł$E>(A$ˀJ53nbl=TXn!^$3oWFTR(_ Ԝa}qx{oѻӬz~C#nsVOgv0$ 7T +=TS gT6穲&FrYograA1Mn'e'@qeI NߑC|e|L>šSr>SS-zw SJ>TK@5)%< `SȪJ] h+Oi f~ݞ'P# EKeqp wU[f0A AM)7mسQ 8v /%EЂM;T&j끿I|+ZE `09fĻDD"P= 26tSJ>£uX7 )0ǖc[ݰŃ3+zKn ⑹ H`sM澟ts/N(2 w^'Hh @9nGk܂Ks]r}Tn[&HS{z+E'Xz%CuH"{A)O v @fP`)0O!ᘮmnOsu?՚E(O1P)L}[mAָV+pC$cɕiby8BXqq@~!M>4xjm|]eá~Vs'ɧ<]woa| `B, fq14ưݵ"6K ݒ&-?wxZK $Wk?WuR72G:п䮻DqARvˋ;З`Y{)UT@ UQDCJG䛃V_*2j[n>Do`(2rȎVHaT9l~zvz*גӭ;';SG ӊ_}o+~c=?-N}>?Ad$$:Xub,@%cd U}[d.x_E&7KpX0\/ |g8MWIVuE( &DOZtp@/?_>^3rs b #Of۷G1d= qmdfrgѽ%1o ޛ=soܗk+"Ѵkַxk4נTG昵8F o#y{~u=cW'}璎yX/@]:˾kQ?6\Կg5Q,jO* yA~[g`Ă` #[nd=Yã;Ó)SXl{=M^ l 1Ȗh@&*S"a TмC56?{!gV?Sb/?d9,>Ԁ.O JݩֽHyy87څ%K$P6m<ϒɑ$IEd:w( vٝtJ Y*2Y.I XhX,DUAD?wg3AݚԇN-Z%Fؐq&ɈCVa$IxC TQa$dT`ȈB"^qʰTЁ;nXtruCa6(Jtr!`s@5AI Uy/:{dEXR+e3ri_'u3!jY㒋F9(hR+HU k-i uuf)(#o60@Y Y/{b>/=Xvf*+Q 6rt ~G2oJʢnGg9iXěJD}/E},YF*3 o MSK*hO(ɘ!Ig\ "fXCrđ3,IUR( H +{DjOEFpΠ.|ϕy_uŸ9ԅ_ۏ)e .b~+-y ﹾu̷*8^b%!l+t8P/MUp&~o= 6?n{j=VlR+YB ܿ)]+ܿ!1Y7|,[*Io޷>L!oaƃ :Cm gt0!.W=ꨙ'7ZsOO*z0?YyՉ (x~?Ե?l@jOl $o \M=70#:\9{ODF1{~7{lf}oޫ~'${HKJ5 sOҼ0ԙ3w`$„i"‚ڜ^-onSvH%OVfS俁(Vߓ Z%b׈OI 5:M:Bc 鼯or?DeC@g9fOD+;$  ϝgiCx9R&sYNq:l zOV$ЯIyRT K_{ ¾hCX=BTR ""IxJ"U{5H w˃cV1j֒:\\Y}۬Rjo|.떔ViJ }bY * ~03$Ǧmnjy]z?]T"xhu?+?N^z$8>IE=Ա1~U,&\VW.wfLzZp8{SFsxg -o}E?qqg <i`,R4ݽMܧ)=(`[-X1E }߿rQS$ H Iv"_>+xld][(&7 zoh13$aE2T-M[4r(`?qĜ4ċC? ?R?+FGKmQMTE9Sw={_AkD8F=Ce9o^ HU(hj0(v J" Qg !V>-73GE\Ƌ<|Yk5F"^7W݁u1uԽ~^$A䔍 Pkٔ)FB )#2@ J COd-*aCJT|U>S*Aye fhjZ Ytgk8|EJ/9[~ e3鴓Ȩǘ]r`c2SЀ Hmu*`0bp`.:G8|vr2 "wNr `ЦVWٴ2(Fer QD ?l-t7s"/zEccL*"A}9qUZ!wg'$iwsrYM\tdfBvI•REQ+ωJ__Y"&ըd$/ >gz</Ok< \5>˶,gxڻn!QHtȭ5j@y*0w;?kp}Sx! n Q6WŊ<@ە‰j^&lv TCg"CA?` GH) [w97.h֢I2Fjo-Ϋ~̞5hy^q.zn[gG\1v6vT7eI%͆^D ~e 51dɯ?߿]_܎p*ls۟o>exc{ʙ{ZZ[񽙚:RH@ 16} MKk 'ixO!fTrnys| NS,=ה{ v-3hk$eFטSC%C%'s=;}7]9ߡgϴrN udy ,ˡ@ 5\?4TaG}׏ȅRnFMl[}v$R<=0DŽ+Mޗ/nk^ Lc/K|dU9vխ޲~5|1|ur`b%*,U*S@K؟/(Zw(;!: PLDK$¢Wmnt=L )_٤V3uMV ?G?: }iMm^x?OO6s<$SL1 &Om^y{`pI lH4}I9L 6_֡: rA$@ Z)ŰՏǪ`}`5*O2AOH\D{UhRvLn?2^1AL͂'yX(2'fz>pzY>|hJ57VQ5tL{F蹰'J1c" V"*ZX2*&]*HolgY 3)4cxÑ0@ϩx'qGd+)@LrMfxSg\_jRTS>=~|`S+]^\ a): 52>x! !xqߗW`Ȩg^^L~ 7t!aH7%pϿ"_CK-I Aݖte:6i0o_x$" 3'Z eOgwLZ6ԭ1S1 tM%P}/?_~4>4rb1= !҂al Y-Ue-~nшUѱJ[mVDơJʶʔd$(oՃhwA0LI!!CZTh LmRBi+fZDz*-v7K LN'פ?Ob9P{rKĄ59YSS~wJZbF#܅XbUc>ܐjTYɒs6mm32mz@=0H2$9#&l3+,.@Cuu h|Dzq|>Ӫ1wwwuWvy'W4\swɻ[Nq2FP5N\1cEmҩ19s @Xn"k7wwwwwwi_ڀ I s/"q, H8tȁ3cN2]7ek Mʵ|QoEG2Cr*ub!҉}VԚ_dCFj\ T!-nn ޭ7EdP>ױTj)k TS)on6Cq7Ï|VChQTRP:aI.kxHpNG&rzyPLGf7قh9ibW2.IOg}vy=}(bz/|6ٖIiC,ņ(ҹJҙ bZHI ,U2 bjpBXTRmA9DLRԺx!]C-iT$$ҩAA"e7!0*JAnF D (+# DCS"ih ̪Ys嶷B} F"*oodz@<=ueg)u͆dJrvl1CVrNBeua;dY$u l;Kf-aUH(YXNEcDX*bMO;qr`ޢγ{[?1$*7>u~ZFaKq%I?Y㥭[`8ӏiuGB,yFϪ踺AJFDNvִGnpWw?.n~s_,LE3@ *hoYW1LyݯuS07f#ClutWK ߯ B'^&A ҍ!Y`rEJ\5|co~ԫ PێOO}kӞxg9'yw^Y;]*f_tw5o7۲ZBa`LɜQYd`?w2thJ` :+G_f<1[=WKĂHR HEI ˆAI!@+IR @vIm 8 H 2 P)E xe'XCc$C((#g4JrQ*>vQrto(g :V0 LYmsX~?Vy!c,x$vRT2ĄgK ~S2{gIp3ǖ0dUbK?UB(9Tiȫ0675"&CcA[\f @ \}Dǎ&[mፕ7@M6][oó?{zm 9x-Zxfi:Ч쿁[2N3jSTrbǦ:@wfALN <.2lG<% K)/4eS":C0P?88z1 I "ca ־ 6aCx"*7(Oǂ}+SYa)u/}I_0p8Wὴ- 8ŏn j߽].3Qզ@Fli|ֹY`b!sZ],cKˉ"ZÜ@}gr<h x+'"t=NSUR=Okm2G0W 7[ݰŇ'Ϲ'_!E둣?3 `CMv`q7bx&4121&i޷z`-U=U |nEf~0yGF i~n)&H0(0v`K2~aMR_VW45Xe$ndlxZ߅$$3**""**TV=?;=8VLpc:\7ۚ}\ 9W@9&`cʐ“>]8XͤBXBa㺍iYT+Z(R.hf> Dy 'j;UGէ֚0Zmv <,O5TB(*ڳIhu` /Q 98m871 ԟ$y_m4t_/s+(e{$kl Vug+tVUr[5Qǎ˭g'^x9i3W٤/=ctϭQKRw3,МLGiSXF&RH)DU86l'IR^E+<5~J{9[xc#.sh@țr3k]|Js9-˛uj)w),5M }vCU2wUUS"IsLʭs;ށ,bh,Z#YXÔzx鍹M*-mm<7!y0^I-KmmܬBqa*2c+xGh2IT$#Vg!g”W# S'z'`PR((w)Z(읎i;CND EX*,X(V+(@$ eDV % etH */rzL6Ey`TPJEI*GR$H"ID忿Mk`l͐)iJHV,ݐY p3nC,e Ð?(;rd<8JE 1b*Yb14~Ϸ`x yWE!b HB= ( ~[0Eb0;#H'YI3ۚg0MS&b¸)f't-B #!/ӆi<8hzL%"[  H$R Q l- VipFM'tg$I6ōbG`CPȋ( Ru2 U AM`K@P) ܩ}Ko87U:OC:x"EԌ⮎+($4ᑹ& Tt^}ރzۣ3mkV4R] tlGPxϬD' di(EOz^Mql0ڛP#,B"2)0 U_\s55dS]4t26Bf@)GĤFvT.i``Ń5.]X0$H#R2D̦.!N BmPbu_N?C)1OZF}1+K(@=e-ns?8/zԭQ]v>NչldD5Ix9"Fxz7#}y \[AߍC#MjYP@ga GР Q(5UP U@}V@(@T~5*U2ADĐX`BJu' ڨwT_v m iokMȟUm;_ pC8{qAOjCIL :XarV;oev7ԣf I IƇogy7Pіx Fk%mP/?3/z'(0DV?G`KtGʁ*zO]I^&9$Z'|QD[<rz0m~Lc0b7?^E/B0c)d~tG)SX0hoX'hs%(4h2etl`b_QSx.e=fm0 SZ)w_ߗ'O=D,)0sͼ؛ءYTHZL"`BB-{绫,}Gzx*{,YHYn%¤MOcgIWc' ) ^L}iR0fQNJ :/+u\caiY1EeKl!stxҵo#]2o=dU>$d 0QUU@Pŋ-YQO)9آ*,*=Hmf " II~[ >b'%" ٛ"@:=sz zlB\SԼqCb!#:)@AYT#MBd<\q3)F>nQm%-Rqn;B SZYtERƙYqu3ZJ[n*f\Lʢm7iI|=OYRm3 @ߜ pC{Ed#TO$ÅD-<:M-aM|aߏlb)7#+@˛*p`nք(fҾpT'=_ע-7co/dU;6k:NkHB ?sOo39*~)lH cD!DžDb M8L\څlrA +Byp@hSLi%y%Lyu&[""*" Q ڔw}v߽}{'90ƒvvrlGo=<$(=*D0!^<_@'?_vxڶ*D{0B,ZQP$* 0h)R(,%@T@aeJA ZȈ%X2!1PT( |zO'>ܯޚg }eGA_`))lKP3BlaCR"Z"|G`j.ܐOlBëŒrK@d"JKDlieFH`c#Ck[a` C=^@5-k+4E&8 r^D ө,-!H$bV8$lo$\̒C_t&Jocr{ D.!FU^\]t`X/ ۄp}[ ͒ndW cB$BչPΐDFXCl MaΦɹf߷nJ7Ht0'=5ŽNj^\ nj94\$)/2LJPp!5VT.6B)[2 aoiP h@B7S6 g@;1S H%)<6c=T9QdHd#e*î{j]؈X ycIN!./LSПDaRb??bTtY`]VmL _{,G~7v~d&?0O=OQE蚊!$_`])I#ejxa E( sYngƥJ6:Oh=z.x@QC׿XSxCG #~P8CfNitbt >#MNGIیu|'J F͛!aM{Vn0C-= g[[I:=&LKץ-PƼ#eNfB(V-AB-;rz=uل= o8~u1##Z-DVE <13=2jh&/n{_𿯸ڿi<ʯB1 `PVvfȠrh & 콎EICo˯_eҪUX>WH~i1l[?XZS}PvB}Ѕ$H#F_*asg~0Y5djOz{pmUճ3vv "@@b (A#Ee*.svٕF' h.A / ~fUWJ9+&G?n3~p~Sxb(~\L2_/by4ύ *;>*z 5]< ]6E#M gd3LTġFE C%g2lCqdKjR5%8 RŴD€%!@'ybU-̲B0Mw7(Ps]\Yy1zݯ\Tiz -¢o' N Q/w$ͼ.ˑ;Gs}/7QI<\(v> BE$I$|Vod&s$ ]КM]M]IwrF솮 jd s s 32s!33$ E"QHL" %EQBU dYT ?t`RI xbI $W^Nס9 E,v[LXƲEEICCƒ)rI3O퇪;O %1nGo;0Y ҟ<$raNK)pz`׋P|uHxPdޯaUSr6x^S;vXq jE눊~⪯l''?J (wVĉ\DG@.=cH\_ZrհjeYq`@.DLGl)>LDu/=NA6nSA$b"""q2_9JWyK=rǸ0 Jhvs-uBx/?^{-ϵ:Io G/\KF|hR@J^頀I;PSRӉc)˺׍h| !0jr${RQ%Lz}({y9f9q2&O-^;FQ`?$S!ggBw,)M(O_LB*(",`F$GZZ"wPM1E.d VvIrliɃۗ\XA;tŚfB*KA{1"s`jW7l<;o52!':HJCrvٵ_gi'K3_Jiu\(GL^MYCcf׮UzfBh7K)4OAB hPuo:arTw?E)_02VDZP1g^~ףqs)ݪx5+^'K r!x{VCf6ߴh 8$I/9^[ PC3mS3ÿqj)/Ja9„TJ"pw{ 1v3AV4DƀZ@c{:(HRފU!G@SGp #Q eNt^u-VPrwQ1G;s]w I=FKْ(:=,(ۡb\}{ù<˽@ 3Wb=QLtރsjlž.n*e+ Y16"|&nlL/O{ثjmI h ڛmi@0?aLa sv| Z2>^k{&i&&.|g{K",Ys4a1 ,  X PS1c<ߐɌB,~SVp5m?sa9(P\T;nKXdHvBwDi:C@ՌojḞks(^i)Xt0,"δ3wp8 Z2uz`;Gylz`O O?+|033J6H62МxZ}GX({ۺ;wp؃׊ ZcB%Κp8G0!tP$dLY*_3,P%0fj~yi@ypd4Nߌ$I Aޱ^X֟8ԁrTǪ"T 5B%w_-BD=¤V%QgڨLK7޲6Mg߾ "y(aVkE:FLXsZZSJq΄՚Y!.X]Ti%ӸyS3 >g419y֘1$g:Dś$x^2gMNCj,BhiFMw+/{^SK؆7vG]i|@gUV-hjB tnAEr<pPf6}=g|U=s'y tfvO EEQEQDC}?ԡ0"kI̵^uӗfF6Ƞ`tXLJԒ!0&Oi6X*NǑ| N߆x\ughAP 8: *I E0kURڢĭVUJa xZg p%͇.cQ해,fyKՀ0HIRJ(,Q"߃ # ڂdZڊ0w=g?(7 18Õ Wds ̤gZjmR(kPMVjpu1K1INa.9.bR(^'velm3yz\3\sKoo9Qo};` ]m { @v?e$B>Cm@" D?c>CzkOa>Ô/ojyY1TD nB7dWte}.Ns|)v$!"˂@1" |p)X3'':7pʩ)1 m?V Wޢk((CNN_ZFmkkmimmmU+~"4lK|_;3I#$>N= GcX1!^GΉQaPY, T+!XARmD1I I g>^A㭩I=tfUhU?y̦@ tG:bܥ܉B)H 9byUTf`}jo^}~ء<<ޞ][|n \[_Ҹ6c|4s<3>)F͒BA UAI*OdCgvThRDD9I ofI $(T雳 ù8uh=v@ zn֐!y@V!eK R5$tVn7(?/W3}0$Eu) dzR*- y0 `:AEQӀ2`}_᠊bX0&4E0D-W*;Jĭ.pr*P r|6.9S*Cy$X`)>>î-ƣ0?qYd@s"88Ep@F6L,;^ >,"|APU ̪Ɍģ;_M=Y(vJ*Yc1C]Oxw % A! D9P6X$ ,^f<. k"^Yg>O' H*~AAJ#*WD ,Pb 8_C$Q `$aPŒ9CR`,Zj! X!xłY92}#XWŠIٰ+%BBk{{VyIe!XDBA.bőXm!,a;a&M0"N*PB@Zd𡬎YP/ȧ )/'o}?i:k`<Y̞N'$^RgPO=S_ Jz?8aox羟:D /p`$q${ϽnY>.>/MۃFoShDNTT9r/͆b! '/cpC=lVHG(P礚_SFj$"~ HmPK l+ YE_qRo9&~CG-o$':@Z n ~fp~ޱb0*1Q*HY d'ʎlݞeR}Ϗ @=x$ oEh .-3/|rv<7tܻGt T!ϱe89rgՈρ[~2rF릡@? 8D 6+}~,&syl4{:YmSL'55'Sk~֭-8@8 i NQv0-heqKwOfn94: =8ƍD€[đdDUROw91{޿'oKin2rHD mDPm2*hlPm[-nfeUkdƿO'r1O2hߎ4˕Πhe7lxrjX9=ĊAC آ$1R #1 fd 'Aq? lkzfNhl-9ɋeDF"v62b@oJNA0 uC0_=šfE/|z?ˢ/sm3{փ 6~gΡ|EgbEVC?'}m[jw(bc?ORмg[̹Ly:.fbv^:Xè =mV~O։]S7K |>!wcXw}a~[=   HEUG,4an2%VMJ;v( $\'95)/-{znFI}?}&u$ P]KUl߶D@#a)bX)dPBj7nXhz4ho=a߮Nv^_Wew`kv#H4?2 \˚s̔s g L"x.ZžSP¨R3̷>Rfz/us(Z'=߹#!,|>o'ԡfJӪѠUWt_Fn9ۼF?=z-$J_mB8%י NjDc>$iJ\'rqw\?ƦwTvn p0$Aor/*7-uwȞfYjU7mbѐ*P ۹^S-8TX1-&q/+eOg>6w;˜Vi1@ 78"~+xv>β4j 0xm^ RoPȣ>J~c4Yk@ {Taģ\սBu~W}0ϵ<s ȧ.Ykb¡YJQ&.택,H6aՂLd4 U?dYݹ_N"ağJPk:N;?*'j"vz0֡d a}fl)L08㇅{lYW0 QZF J&`!NmBc)cX%[zd:``jSn'b?~7:`l,?Fmԁ3j#7 I\=JF25ւ*࢑G5 h@HB"%!Le&SjH*JH^]ueoϳ?հ} gߨ]RHDzfГ<1#ܔa IHS]JjR!-hXAXV8Cs?W4x~VAb2MEcP "`D SwY?.I !FhAn N? \Rca2} neD)H,>ʃ #eE=""%0EyXS"|Tذ=ӪgZ?{Yw_VpqWvn\a={8ơ-p4r6CΊ C?!,?H>+R  '-QV֖%b' JmiX,(`bC6ē 4W-J2DbA`Tb "Z hEQn\-,URprLJHA%"e&dJEm R1dPŒfdL &ÅEX񬂧kcpg)} Wf!9\TR.Xbi ,0JLZPl DXQ gq L3j('l1e*(Ƕwv;-fe2E0FB阯7z|eu2䄶ۥ<^hcU aћ6 1N8cl*$Ab,R1 "D:Q*TXŀ{<A=y Ud"*Q"B(@kr9O?羧.b~#Eo[fuSə33$gei06{]#\lnZ`2sw=&DԅTh>}DrTRϔ%uy GW<󷇑\dʟ~="-PE/h`,b2 ݤ!PT$sUgb N!( DD[G[Lf ;]VKv:?pQEQ YOT Q!$?5utw3H+QXx*p{d7q4$~s˛p0 " d%}?ſXTO?tQѧ}8፶~CB͞DZ=3b?fj?MfpkZݩsXmar! }V# CEsldAqMtdw1c6;`yv9=|Z<.\cm6L\ޝ`F@ W皽'!8;mWF;nPG"(|0B\!u[=㏖Gűɜ|"^OuÛȀ6lf.oF _1DK;U|@ @/ׂ HLtT %<08x~<%gB̔#+y Ķ͞ `۫M&Hb|܈)~zLc}nX?faP2PT0N?"zYn`jEEZZEƪ}yB& )%OzJf"V NSEPC ֞jєXJhaS 4Tl_\gK)7muS9Yu.{o< 'M;u? 4K|XU~z#6@_-*E,Uԫ{UTUjZ(,Ŋ[KlYmEX[Kj,S(Vڢ*|V |)y7x 8s-+\{ZUZ\-J Dr |'4 SeP QTBW-rUEP_M_}tTHnIN1& AϊE&eCfp|iͥX0)LyOS`D y!..YAԮDd죮neڙڪ/Yڰۧ;K+ۿ'ۯݳA ?`j AN$<D+IAD51"2EDT BTFI[%y$EHϏ9Ͻ3u71CV#1/ o !h! }ẙ<1!݉I5>:"1jO+kk>L1DMUZ)̧rA?Κ]^PR$Ivni pn JVV,,,dir& b>K=S|Os:oLNّ(Z{)A01PXbDd~l 0ugF5?\ON'b}̳:皻s=F NsW4RLb|=`$ҕ ୠȄ`~ D S@B  !zT{ zbʪ."Slwh=%p_h~U%E4! C=3"H}O'x"Eoo:f03mV"3Sc4Ox!ݶ*&v!AO,d-aX131N l3,(v8 B,6ʎaiK#3%rXvHN%I:'OA`$ND= 6({vQO-|FZA0(Ze>qbpHQmDc"J!y>iUQ{e0Twͩbg ;dˮjZQސNxz!Ip, kAXD1U"Ȳ!V"A!#B.JeS($!`EE" @H$@D`I,,;%a>?1$Y,;_X2lbLәM[U,2*ņeB(2@3p2HbKj8`V¢ m[CpǮS`o,YQUR@UUY1(H`p*AbY UX&VP ,eLE JT0*QokaLㄳ d-iH/ d4 AbX AHC) XC9h ] G(hsTm Fx'e>'ta8 $>Ob*("H1AbMG94LDB@"%D \8% y .bFʕ "ȀZX2Z5$;YSz@wP xI(F,`B/fC]S̜\qy WzjلC6"2dl'p>EFB!)b$0. fNX%(T- Ü% Ρƒhuβ&'(H3ǽr/`79@E9 \AAM=`l{Ӯ]q;'`4D M^ 8eNrM.WAv-@ A 68]6QS R";;ӠŒ&uD#T5WiVX,e,YI%-A+H HY>뺟OQ]bc"05`+I-DM9sBGdVd^МP\yPD1LOyNЩЀPOd h1IǓObBn^Q6U!rHEW!Z" RRUTe`Q[5cEFDۗ~XEPb@D$R HY" O`0ѿOwsK882mSOizSw9ED;)!#Cٗ.mfd.;sNXT'D>]xzwm'7ءRP=>x6"A^ og04H ,=MM@s0A뒊deq]#rTy j+Urv#AQ7ὂq&c$dP"aadVACJMCa$ߵ`H|OA@0e8arI#$Uݙ "o17 ktlX{+?s6*M_UeA፧ۺ'BDH wg[F^ GWmU-/R>槌ҚD}^zd0T-(<~Hgb>?T`VdID 8V5@3gQD#4D p;4~qv.\9;^6f?j S7CUZJe` jr*8lOK엖uYب*W!_~b1sl[)ysk?WC Ŭ~L`@1Oq>7J7KK#*Mn%+>{x8g uN$)"Q z#4 ҨV>lF`S.}=c<ԆyPx@E!# HȰb ͊~ǿ}`!`HL H)&.@ws_|ȇ_},K=[W&yKMs|EC*\9vr Aag/x #@"eshG@tQdO2ayd60|PQ"ãއ!QE7__2$XsF@en!7!z|rv*MQKX2=JzM߼_K^_z!F5u߱= ?+4RoQ,xfG39V0 v2pԚK{*eb>TmEAnq8]2n204KS)?*2K:_02q<#sMobBiS~k~dd?;&Һ:A@WKT-RXs_aԀdAd=OAd=?(azBBtd;(JA} y|Tb1`@z p9!trz#B/h)(`TzSl٭;Fd!$S 1E0Ċ0^[>3A.p!,H킘ɀTB&G gw*OT'Z"[*IZ֖ 1CdD i"h" jaHd" DI*0R*E E"YSH"x[gcj:a̦PFWt$qx Ŋ#DVB BEE`@`H")*,PQb,XAb&=@?+Bv`sWt<$?G-,Dd Y&0+EP 2, Q@`[0E H,KA !ilPBLe[-#c*1Z ԡ . D*6h&4d"ͤ"%(Ka@¤+ Q`(#QJ,cBDdd%y#x/n~Lr1'<{Fں|s>W3=r(ӗvlQ{>eo2h7l)&yS afryN@32O7t˞//OwLxq_$!XthJ+vn9[3sh07@ }`IW|qjpa0$ʹ9򝈾g_ >>y+!!4˻zi{a 3Xn7TL@Ks539.=rI 7kܹ^B6CϽm„=\]fehMl\s gfu|}J2.8ڰB@roPfeS2˒ppC0KN$1?Vu7)v$oɐԁ>W '@،X|=8ʁ5`2 "CDXA"z@!!́0eHQmZ$ FŸw, B12BD4Ij=Z49pN%VpLMV$Aye5 #>K]#2y_9``D 뻏y>ܐ@H# Sv#"+C jǁt :SU+,bjLI,,|V8BVEV@ n)ܙ H7'x7u"a(XZTr;y Ic-wMߔDb$!Px34}׷٦d5ރ! bǙ̩וw/ 9IHV,1`32 IOρY# qo\cV2F]fc< B)p^@ 1(V4=.d CКwH yhr-l~ǘKPu&IAT - B(Rkg)-H 'gB2#!?cI< c, >P Ȳ8Ko;dR@r&$5q96!u1Mh m"lH0# 9Ӓ(yMkܘNDBH0{Y@T7!= 3`cbt|!?oȁt͇̕1)ۻsIݍ!(r GTPlRZõI#b " vrP |Rv=!E:"7S@UHF>O`D`v>o×6hsWs3[ӒSclSL`Q))B.馚B #!R+Ȝ0Q_G:Cۿm) }7@M v/#nCɄGø^PP_M6]έ/b!$hY 2;fPiQ"0;C& "$L68S-rCbAZڊ{ptiq rGmđGaHn,ws59 PϪ)XRL-lDqo܆GA|S2|aYf`fSrD>׷֝NŦYE DP=?`bU42 J8uD\ \D)DD}3K-X le [;mWp.k6B'@sFu2Tq--&⨄RMx H33%Z(Ex jyvs E[ڬRي364˩上QQyn.$ D2s-&Ɠ5X6%,@L$RL9xHFK>ŀͽW=VJ9c`3SrƱI2&E\5çK%Iؽ:N3sZf]TiydwNf!P FL3(NpйHK2 ZUu2 CiIlniAe3 <*L6橇i&f0I3Df.q2)j,u("`I&6 Mءf`5]g1IYX-I^ -P^zf$P>rUM-oga.κ췔@P5 H$SΊ*'YG%5mwI 3t$H!'|ZvEdBBbtmu Ok_2`C6D ɵdf-Mϸzg m6@GWTx1SgP{lcԌ̕۴ T&_>q40`Ϛ񠹬xQd+\gq9@p:Xcf35rӜCxdC,(r{P, !4n>Bv: [%en,N@D7#(=vH6l(@HOy潄" $bRGlFj,jȰL2Ħ"OK%TAXH""AdTbAT**"ҶADG1bX #A@!R #HB,EBEH,EAB$J)$/Ww7C[<_ BBa>xREEZT U3r5Fab!2YjVN Ն' q3`!VӶBE` E PTTEH Ȫ(d@`2PKQD$`{hZHB "U Ҍ BEX KQ$@ނqJ6,#hZ#G(1: K  &`:1G 겳S7az~=8NP d!(F(*́OlVPD`! $b(*(}~ مHBUCVZy@FA(QI `V,0@ ѧfm$*0ĥ752!Qdڜe1k*Q1,,`X H*YdcX*ʔJE`H"0R5 &RG#J2ۻhj 1EV1V1Uat}?׉JxS65pyeIJSIf))^B?UVJpynNzD 423|:) 1R(Rև2i\J*"zÜ՜ s ~L1_TUHmUI.ٯ]CS,(y H9N0?v_#F'KYd:gKi`T( [*[Pi>g#yWM8Z{ u-l_؜ȐYY 1ȀL\0Dcn\DD7Kb/29 u# edl1fb]16~G#S>㮜EPNd`鐡oa#8HHx'!7 c߰'em,Gb.>n`  J*=`:S Vd*Y+i@VVXP`* (E`MkPYK1hkKRL&"2(ET)b@e)5dQUL)$X 2 ȉ1TAeh1b @ M"UAeIU`"(7@E#U&;)D`^LBhMӖee`g,#pZ7œYPlP !<"Sb*cGv}} " %J_oA3,=y/YF<~EG2vH,1d$X)"B0 1= $@ET!"@c H(~Q$D+q@YEL!( DT 1N R$#ECқ kZt/}^"ފAD"" Rθ5$>SL:>%2$q.{{@vP{,e)l0vu"%$VGɠ;9!hQTxq:%ciU y2~)~o~lr[,͊H`2K7f] 2&YT9`ϚwSOH"_>i@8>PP(k>^42'̍؛ћX«W g DaO[ޞNii Npi)PYZJ[.٨햣m\q ,L } h.kl# ;k1XV^/B+!4u8 @![jj+? ?a n͇d1()۴$2@>}ށaVh-pHrIXdMh"AEbc$QDF5Y"ΏBID E*0荭: Mm$Xԍ%쌢 _)z,*|js||?>!!"2,D0/fg33L1dPg;t1T?N%EE$XʍDA,V Fh,Ȉs$!dR $QPAE"()AQ A@HR #PDPUQI FIY$Y )"ŀ Uc!J*dXHD`#H( "1*Da"DQU H*T R @`$ H"H(1E+@Q1P_8x_ƳêHr!`,?~EA$=LHC YRॣ1+$cxS:)ً'oj?Q-Pe~W j"H %DB*rT(xJb•Q*1*A=x{  $$, $ -.CAOlDd d,b`IX E (Y'B*UUTUUUTUUUUY<́;-NO ^)J;ߩ>"@RuIT0B ("H5!0Ik l?uaw)Rif SDRS 4(D[$S_" :WdEAx#XGd#vIR,f4Կ"NH`Kʸ%2l,?>̑`BE?-E7q9W1j9ȁs; [pɉ#ӄS58 @ !rĜ&.dgⰄ'=yCo7xcy@ SL& g٥8| zO+q[C#ݭa:V*3hd8OY]q䋄4cy 6|^ iB=pFG XZRmй儳L%PH$'' Bx|Jv#yrxR `mQ 4$]$409!XwyY=9Ưƹbvۣ8< <;jdS}X9=ѵ7j!}dC!z5Pz%~ "MdQLK",|)IjcC_{$"'WĢNWoeݯ_f6†;O$߬FKg t@c :=-YbϵEk%g-5>5p߭SaڝSR CVGl+ hЦi 8 ?)#@`L[je_i+X -$AW14 L-mՌrWmF=G('W>ֈ@D@# IFET lJ U?X hŜ ,Pb,b!ED  DU"*)P ^L'H$EX !'| bx"B1#SF<`'T9UB2y1L bt}##A/XxtLbH+pXpR9$ '};@S UF+8 fr̼9\\E&[St3}ظ A ֟( v9Nxט^sory,r1?핖aGܩ{_]ň9sC3+Jـe*sOkC7M _1{?itd@ys.bACP9/OaĕUb TOeœ` _[Ybs9N.ܮ.[9cUP} |T_cE.J0١d֤Xhwa_fgZ`} cM5>HCL39Cʌ#q(2Q-RZ,!C)ڹm RKK26SY%Rc m*eSs ,*) Vv81) X$+!" )`3[:xClObniQNk=OԵr "T2xR@2)l*Sh G)2vډE>|٠tD4 ^ȅ.N31"eB+i6|PP^ Vz3 ]$h~TdQdGHgL6ɺ[$E=R` HbdA YE( E"` *`A/u ?_ \a,bsZ2Ҍ1%Q*?g÷7̧I07C\3 11h;~}۵7N3euYgFaUd{hdHbf7n4m|Qk`c$Ps bdTXH@$$!6ˈx( &}bNIy}q#Q 5 8ݸc X~<y"uCЬU$^AL1$7w<~K|$+,R+&y8K=[-Wu ;39@d>TUB U"EdvhIC?;J~/7kՐ5 56T,U@@ ߱)17"HX(A` (e,T+AOJ dQ6eQ!D" U !B^Y+ 0#k]cxI,2s:o|Ɉ91pQ'b * Iw2@x0`BO:O_P )F@^ $dT6}O*4=+onȓqقC25S"DdU\IXQ2 T(hxItP\?J_TANh5?oB%<]Ms`$8M!iAj7 t;isFH@~\JHtRHbJ!mAHv`@, T$'t!ݻhRQq}G,\;d ;!x!ewa_qO @'?)rOY?Nľs!ifֲn7oDMI 7-ÏefibRX?Zh'AHΪf{kQDTWE!nzz*zʾRn۱ ; ǏZ^)d`I `3 2Ϝ _/%08h`_pL#lgc" ?c"UDla`b a & 01J[m$0@ppO2')a5$c(o>vg I ;Nrwrۤo7:y anYS10XFhrwjdvG8g&?zH!zn%!̳) XTd&#[6a3Etiig+otyI0d҆w͆5(8R/\ p/JSNPXEeL@b9Bd tx3 Tn#(n8F*"L(̉ڸ0( n9!JZ0,23+(H:H%Pm3 ()f6BҋF°y{kZ,7d89(qx^135w!PƘ8u{?gXlV|(Re 2ƾ{&e0ph$X=曘!0 i4w:=d̤&"[{Q!1Jl)_-w) #P a7`"tU@@if&A1kƾ'HAARvNmQᅖdc`e=,&Ioqp.k_0r Am'cDkJnP›,!2 E0ci[(i0"ȱ JA̔x\V){Q4Dqƾ{&{gjV&gJ |# ၒ)ᅌE?wZm2+"!1A)%$N=A'`8JSH ` NrKJDVH0aZ9 q6ȤXX" #xTK7lͫ1VC,xAR[URPrCbs)#6 L2 $6LMrtX1fKicn@)⒑q,Ř%2eO6)YQD1 aa,d肆YIJF0,LVS8L/u EI HӿC~M(RjPP'D5} AwtZa, I#l .' DM9dS}̆t؋f9,USL뫓zL1E/1X}BBAHof."5uq!I!(B,*l4*dU$P,eeI l+fd(a&[!ʨҵ TT&QPŰ D fX1FMJ¢,#+aHQ0A!AAela-HVJªT`1HQb0T#BaD4HUVAE7DƲIR"I(R΃l:BJeI Ɂq&d & "l-0L)"`l7p*ґJHSt-VB4}L#HT'e  "En@BS dD/!u/%1$FA !AWV*E`y:|,(yt>"SVJ(5#nb|BB*PJVy6Gй7}M/w߼.v!,[:ϺY໚`7HKI`Ps% )LR -7XoQ"iGj,fW"nmQK'T+]تXlo!p3vVO׳N'j , Ow@<>U:(h*B@ :(r+" w>e G- ="T9^䴇dVCY5::2bxvΝ$5FZNx`bvj)wGM/;!L@ "9Q@XvŅ(v15)ԕ?\*@MI d)ޜ1dL&2 E"ʂC,!" P<`BLX8%CL t"ƕ &Cty[wp"BK-Mߩшx4HʝƓ" #l%B2(H'8e]9`"@b#PP@Y$@R()UX"" DTE24=τ M +*v#v"bR(Tz !ǒ)"@A.FEc|]*%o_GHf:5 *T ,$$ mk0f9(8P!,BAB eDSzЍ#h, HHxúPե`/PF,@s;\b> Pώ~I; I I%0=UL@'l@  d*`L`RĊd,PD'x* A(`v AxX0RCPUD Aj+"jMʗ0kv!&xe#J11R?-/mg<(,H" :D{ S4؈qKL IbF$ XXXPDD#"""(F21#>ݙ֖/8 `y" D6eSH"D\XEXEN9S"I !J|$LEP~|<&$e#&TiAF"S {0 eOP,~${(vTūLeK`w-NaN 90) B n+- P)2[ V_a+YG0DF (Ah7mԐwۣ@n',Br& "'$&uxOяTH#hh)ax/;r?kI-@>-v}@3v @>-@>-57Y&:*7@>-4.+4*;s<;qX;vX;r?n;;s<;sCDb0;sB ;s@ 6y6}9A@e@>-@>-vx@3ve@>-@>-.o;?@>--w4*;s@ ;q;v;r?N;!;s@;sGD$ -@>-vs@3vD@>-@>-&;M<@>-% @4*;sC;qX;vX;r?n-@>-vn@3vF@>-@>- Z%<|@>-)4*;sG ;q;v;r?F;(;sG;sND8b0;sMX ;sJ 6y6}9C @>-@>-vi@3v@>-@>-d9Y*@>-3jآ4*;sJ;qX;vX;r?o;$;sJ;sQDBb0;sP ;sN 6y6}9Cz@>-@>-vd@3vz@>-@>-on:9@>-ȃذ4*;sN ;q;v;r?ci;/;sN;sUDL b0;sTX ;sQ 6y6}9D`@>-@>-v_@3v@>-@>-y9Y*@>- ]Qط4*;sQ;qX;vX;r?J_;$\;sQ;sXDV 8b0;sW ;sU 6y6}9E@>-@>-}vZ@3vΐ@>-@>-R9@>- g؇4*;sU ;q;v;r?F;6;sU;s\D`b0;s[X ;sX 6y6}9E@>-@>-xvU@3vΐ@>-@>-\2#9Y*@>-+؏4*;sX;qX;vX;r?Jf;2;sX;s_Dj b0;s^ ;s\ 6y6}9F@+@>-@>-svP@3vΐ+@>-@>-5[< @>-57_؝4*;s\ ;q;v;r;=.@;s\;scDt +b0;sbX ;s_ 6y6}9FA@>-@>-nvK@3vΐA@>-@>-0r; >@>-/AvWk4*;s_;qX;vX;r;x; 5;s_;sfD~#Rb0;se ;sc 6y6}9G@>-@>-ivF@3vΐ@>-@>-)1<@>-)KJl4*;sc ;q;v;r;o=.G;sc;sjD "b0;siX ;sf 6y6}9H @>-@>-dvA@3vΐ@>-@>-%wa>2@>-$P|4*;sf;qX;vX;r;;;sf;sm6Db0;sl ;sj 6y6}9HA@>-@>-v<@3vLA@>-@>-=Qg@>-_94*;sj ;q;v;r;\;%!;sj;sq;DOb0;spX ;sm 6y6}9I`@>-@>-v7@3vL@>-@>-cl<@>-8 A4*;sm;qX;vX;r;;$;sm;st<Db0;ss ;sq 6y6}9J@>-@>-v2@3vL@>-@>-t:>gn@>-ByB4*;sq ;q;v;r?r]=.j;sq;sxD 7b0;swX ;st 6y6}9J@>-@>-?v-@3v`@>-@>- <ْg@>- 4*;st;qX;vX;r?v.=,p;st;s{D Db0;sz ;sx 6y6}9K@@>-@>-:v(@3v`@>-@>-W$:(@>-ޞ4*;sx ;q;v;r?rd=1j;sx;sDb0;s~X ;s{ 6y6}9K@>-@>-5v#@3v`@>-@>-8 9&@>-82F4*;s{;qX;vX;r?n=,w;s{;sDb0;s ;s 6y6}9LP@>-@>-0v@3v`P@>-@>-2-1Ѝ4*;s ;q;v;r?A;(;s;sDGb0;sX ;s 6y6}9M @>-@>-+v@3v`@>-@>-(f=P@>-&-@>-&v@3v`@>-@>-#UM==m@>-"$4*;s ;q;v;r;xۀ;@;s;swD qb0;sX ;s 6y6}9N`W@>-@>-v@3v\W@>-@>-j=-@>-<ע4*;s;qX;vX;r;0;$;s;s|Db0;s ;s 6y6}9O@>-@>-v @3v\@>-@>-9Y*@>-i׬4*;s ;r;v;r?O ;D;s;s}Eb0;sX ;s 6y6}9y@>-@>-v@3v\y@>-@>- 9Y*@>-t ׯ4*;s;rX;vX;r;o=/Y;s;sE b0;s ;s 6y6}9@>-@>-v@3v\@>-@>- ^9Y*@>- ~.׺4*;s ;r;v;r;x; ;s;skE+b0;sX ;s 6y6}9@v@>-@>- v@3v\v@>-@>-ﶂ9Y*@>-א4*;s;r X;vX;r;>; ;s;spEȧb0;s ;s 6y6}9@>-@>-v@3v\@>-@>-9 9[@>-9cuט4*;s ;r;vX;r;x; ;s;sqE( b0;sX ;s 6y6}9 b@>-@>-v@3v\b@>-@>-2\9Y*@>-1 ?י4*;s;rX;v;r;À;";s;s%E2b0;s ;s 6y6}9(@>-@>-v@3vL(@>-@>-,5=@>-,F  4*;s ;r;vX;r;G;2a;s;sE< b0;sX ;s 6y6}9`@>-@>-v@3v@>-@>-&Pm=@>-%Y4*;s;rX;X;r;5;0;s;sEFb0;s ;s 6y6}9@>-@>-v@3v@>-@>-/=@>-pa4*;s ;r;;r;Q;-;s;EPb0;sX ;s 6y6}95@>-@>-v@3v5@>-@>-3)=@>-b4*;s;r!X;XL:TZ4;sX;I ti;s=#i<  SEGDX4;sXl;Eti;s;s< ASTFSNODE;s:4@@4 c;s;s;HJASTFSNODE;s;c4@4 c;s;s;cSEGD;HF^4;sX;H ti;s;s< ASTFSNODE;s=RR4@C4 c;s<>/ASTFSNODE;s=f4@B4 c;s=-<ASTFSNODE;s;4@4 c;s;;tASTFSNODE;s;c4@ 4 c;s;s;sSEGDV4;sX;F ti;s;s< ASTFSNODE;s;64@ 4 c;s;F:= SEGDT4;sX;Fti;s;s< ASTFSNODE;s:4@"4 c;s;:6;sASTFSNODE;s;c4@4 c;s;t;sSEGDR4;sX;G ti;s;s< ASTFSNODE;s:4@4 c;s<>uC8OBJD;s0} 5ޭ:4' 5n;s|7Th>;;s7 ;sC7 7;s;s0@4 c;s;s;pC8OBJD;s0} ޭ=4' ;s|9 t=&;s;A71d-2 ;sC77گ;s;s0@4 c;s;s;pC8OBJD;s;s0} #ޭ;t4'ܤܤ #n;s|7<Ϟ;c;7;sC7 7R`;s;s0@4 c;s;s;pC8OBJD;s;s0} Qޭ<;4' Q;s|=R=;;s7 ;s C79+;s;s0@4 c;s;s;pC8OBJDϫ;s0} Gqޭ<ȴ4'++ Gqn;s|=k~<T4;s;s7-I. ;s/../C7 8pxconfig;s0ig/sx52.h ./config/rs6000/xcoff.h ./defaults.h ./defaults.h insn-constants.h insn-flags.hMACHMODE_H=machmode.h machmode.def ./config/rs6000/rs6000-modes.defLIB1ASMSRC=MAKEOVERRIDES=COLLECT_GCCC8OBJD;s0} ޭ=a94' n;s|7?v>;s= H77.01 ;spc-iC7 8Ϻ-3.3.3;s00.0/ '-O2' '-DIN_GCC' '-W' '-Wall' '-Wwrite-strings' '-Wstrict-prototypes' '-Wmissing-prototypes' '-isystem' './include' '-g' '-DHAVE_GTHR_DEFAULT' '-DIN_LIBGCC2' '-D__GCC_FLOAT_NOT_NEEDED' '-I.' C8OBJD'-I.;s0} @ޭ '-:D4'ܡܡ @n;s|7oR=WN;s;s7g/%L;sg/enC7 8p~>;s0Ӓ@4 c USTNLU'IYHTANKB5;s;YM} SC8OBJD";s0} *ޭ:4' *;s|6=;s54' ln;s|= T>L>7_19_;sC7 =C ި5;s0Ӓ@4 cpXQEL47s>>R;s;s;YMӒASTFSNODE;s><4@ 0Y4 c;s=q=UASTFSNODE;s;C4@ 4 c;s;;s}5 SEGD*4;sXti;s7>;;}%ASTFSNODE;s<ɼ4@ O4 c;s>_=٪ASTFSNODE;s<`H4@4 c;s:?% ASTFSNODE;s04@ <4 c;s;}(8ASTFSNODE;s44@4 c;s!!=܎<)SEGD* <و4;sXti;s:>" sx4;sXÀti;s?+?ASTFSNODE;s=j4@74 c;s=ް4@ q4 c;s =`=iASTFSNODE;s(4'ݔݔ;s|6==d=d7;sC79;s0C8OBJD;s0} ޭ:L4'ܡܡ n;s|6>uB;s;s7;sC7 8q;s0C8OBJD;s0} 7ޭ:4'ܡܡ 7;s|7=f;s;|7;sC79|K;s0C8OBJD;s0} ޭ=x4' n;s|7> b;s;s7;sC7 8y;s0C8OBJD;s0} ޭ;F4' y;s|6=#:;F7ge-3;sC789;s0C8OBJD;s0} ޭ84' n;s|8p<=7ge-0 ;sC7 7;s0C8OBJD;s0} aޭ:4'ܡܡ ay;s|7o4;s;s7;sC79|C;s0ASTFSNODE;t=4@4 c;t>g=a4ASTFSNODE;t=r4@4 c;t?t;USEGDqR&@4;tXdc@ti;t;t=s)atf4;tXdrti;t==sSEGDqR'snb4;tXdfti;t;t=sASTFSNODE;t;4@4 c;t =4<,SEGDqR(snd4;tXdpti;t;t=sASTFSNODE;t$4@ 4 c;t kk;d8ASTFSNODE;t<.F4@)4 c;t;t :ASTFSNODE;t <4@4 c;t ;t ;dASTFSNODE;t 4@I#4 c;t ;d:ASTFSNODE;t <.H4@ 4 c;t  33;p;tASTFSNODE;t <4@ X4 c;t ==ASTFSNODE;t <4@ ,4 c;t ;/;t ASTFSNODE;t:aJ4@g4 c;t;p;t%ASTFSNODE;t<(4@â4 c;t{>^STFSNODE;t4@4 c;t<8]f} sSEGDHTANKb;tXtrp7 ̀;t?*4@4 c;t6? }GASTFSNODE;t;s4@j4 c;t II;/:bASTFSNODE;tASTFSNODE;t#<4@ 44 c;t#<=4SEGD>ښ4;t$X+trp;t$?ɞ7c+ASTFSNODE;t%:b4@4 c;t%;t;t&} yASTFSNODE;t&:`4@ 4 c;t&;t%:STFSNODE;t'4@4 c;t';t">STFSNODE;t(4@4 c;t(;t'>TASTFSNODE;t)4@4 c;t);^;!ӒASTFSNODE;t*4@ 4 c;t*;_=5STFSNODE;t+W4@4 c;t+> ?HASTFSNODE;t,8I4@4 c;t,<;t.h.gzASTFSNODE;t-<04@ 4 c;t->q?IASTFSNODE;t.<`(4@ v4 c;t.;t,> STFSNODE;t/W4@4 c;t/> ?HASTFSNODE;t04@H4 c;t0=p>&XASTFSNODE;t164@=4 c;t1;Q;OASTFSNODE;t2;m4@4 c;t27i 9|ASTFSNODE;t324@4 c;t3;;t6;t47ƮB4@4 c;t4<5 ;ASTFSNODE;t5;af4@ 4 c;t5;,;3ASTFSNODE;t64@ 4 c;t6;t3:SEGD4;t7X trp;t78;t0ASTFSNODE;t8<>4@4 c;t8=S;Q_gASTFSNODE;t9_old_buffers-2.2.10-A.gzASTFSNODE;t:4@*4 c;t:;:ASTFSNODE;t;:44@qF4 c;t;8< ASTFSNODE;t<Ƹ4@4 c;t<8j8 >ASTFSNODE;t=M&4@4 c;t=98ASTFSNODE;t>ASTFSNODE;t?7@4@ 4 c;t?vv8y9C8OBJDǹ;t@0} ;ޭ<4'!! ;Q;t@|;l<:V7;t@]C77l;tA0C8OBJD;tB0}ޭ;4'^^n;tB|=hn;tJ;fN7;tBC7 9);tC0C8OBJD;tD0} <ޭ<-4'22 <n;tD|9L;tN9*7.99-;tDC7 8`;tE0C8OBJD;tF0} ޭ<34' ;tF|= 8;7high;tFng.pC78Q;tG0C8OBJD;tH0}oޭ;q4'ҿҿon;tH|6?;tL;al7;tHC7 8";tI0C8OBJD;tJ0}ޭ;4'^^n;tJ|8׶7R;.;tB7_upd;tJC7 9;tK0C8OBJD;tL0}fޭ84'ҿҿfn;tL|6޴ 7T;tH7;tLC7 8,;tM0C8OBJD1;tN0} <ޭ=g4'22 <S;tN|8 <8T;tD7;tNuC78i;tO0ASTFSNODE;tP6Ж4@4 c;tP7 9*9ASTFSNODE;tQ94@ v4 c;tQ8"4@4 c;tT;t_9 ;tU4@4 c;tU>%>m-1ASTFSNODE;tVti;tZ;tU>!SEGDD4;t[X?ti;t[8>!ASTFSNODE;t\L4@ 4 c;t\8a%=~ASTFSNODE;t]4@ ,4 c;t];tY4@ 4 c;t_7N;tTic-1C8OBJD;t`0}~ޭ7u4'>>~n;t`|>4n;tf|>2D;m;tj7;tfC7 8;;tg;tg0@4 c;tg;th;mC8OBJD;th0}Hޭ<$_4'Hn;th|89&:F7ckin;thC7 9;ti0;tiXN^ts7C8OBJD9+f;tj0}ޭ8h4'>>y;tj|<;tf;t`7;tjC78Ͳ;tk0;tkXN_ts7C8OBJD;tl0} 5ޭ9n%4' 5;tl|7| >t9_8T7;tl3C77;tm0;tmX {Sts7C8OBJDu@;tn0} ?ޭ:]Z4' ?;tn|8:5F9^9x7apho;tn C7<_;to0;toXJ>ts7C8OBJDt;tp0}ޭ8w4'ёё;tp|87A|;tv6p7;tpC78;tq0C8OBJD.;tr0} 6ޭ;\4'ٍٍ 6n;tr|>=D<+47bal- ;trC7?>;ts0C8OBJD};tt0}lޭ8,4'ёёln;tt|87#88;tv7;ttC7 7;tu0C8OBJD;tv0}Xޭ72P4'ёёXn;tv|=;tt;tp7;tvC7 7;tw0C8OBJD;tx0} dޭ74.17;txC7 :>;ty0C8OBJDT;tz0}x:ޭ84;~~x:z;tz|7=b8l67;tzC7 7;t{0C8OBJDs;t|0} wޭ>4'  wn;t||?=t8:r7.47-;t|C7 7;t}0C8OBJD;t~0}sޭ84'88s";t~|7|7^J;e:!z7;t~C79;t0SLAB:;`;t|II5j%;t<@Y;e;\;t -< b0;tX ;t 6y6}:W"@>-@>-v!@3vո"@>-@>-7~:F@>-54*;t;m;{;t<8\<_$;t;t 6<=b0;t ;t 6y6}:X Z@>-@>-v@3vոZ@>-@>-2-1Ι4*;t ;qX;{X