ࡱ>  ( !"#$%&'ndPgdgPNG  IHDR\(sRGB pHYsnu>kIDATx^Q D1騰ڪ> X+{  @ @ Wg7@2 @{~ @ @@?=| @ ,`v6'; @$@ @@ܞ @0;+ @fgs{ @ @ ^쌯H@ @4 N @x3"  @ ,`v6'; @$@ @@ܞ @0;+ @V 'zbIENDB`nQ*,@_a1("aPNG  IHDRlaLsRGB pHYsnu>)IDATx^muy}q닚Txљ0Iڄ2c`hy0&v>D1èM#Ӥ3$L!3CZ423}IEŪnwrzz^kss}]΄ YZǷ?tx|k_}~e[w >^D.x|//Yc=ͯ7?qiI#'G~Bv{|uȅta..|Os~sD."p'so_gMO"g%f{?jv;qL#31WG`/e~?sH{_}ΕDwžN7#~K.p˹$e>˘$mR3: 7 :6_;C ?o 6?~Q6w?_fs(4Ti}GD.#YJ9#OyVG"[ J`Y̍w#+D.l%0g1{fc H:z)D>y/hKC|rD.ANډc3/4k["p)oly͗;;Y禲;(l6}'ȥZ}{y{Gԧ?׼57뮻G~}эc峣>_|mo{frSO=||;~|[o=`6Ol9׿▃ !orD_ڬH)[D3ßİ{8Rm)2} _x;q0O?]gW?Ksxg% _{s<7NyјsO>yb$rXc>K>яȿo oxgFo}駳~zhvqJe汷{<=wt>oNw>[nc? 3`Gzz/fmP@`V=2 +ӷ`(fibߞ9=>N$9}WJS0kV=̈́l3;))PGsrs2)sw!,hD{>Ͻ▃oCeΛi69_^Go}5,ŚÁi|T vϑ3~k㓲C? g]ah}Gs4^DhKG"kǫ.>v?G oy[$x[&S^r3^{pڗB<ՙ=hhŘc*qy鎲q#3r43zGxG"sXc^8Xzl6g@+S![̌!WƜTb,=/x+o{\>jwɜ%=wL̼l;[˼v_ۖNksG"lJ$2g듩(l efRY9Y1ȵ9c_Ϳ/ro9:6 ,dѿ< .ft4e%9 =27L і[K޳zt¹-mP^rWXf}7k?}ksqPb߅yn-wCw0G"8/,%2{azɗ~U0<;+_m7Ͽl|4a6M"٠ŚocVn'9%be6xGl9LXdHn0ӨϏNps⮐#X\AХye|.m3sDpn#~>P?ʝǙ/MN죻QdOl?RX+{7x Ul׏DY%\8({YLXs+2:gIY|G;0v,-W>Կ[L]˒vr:s֎lN$ dv,M8o_tƳK>ٝq?RC3Ȍ~$;K!c`K3#[nQ{f],,2g›Į%$r=6흛8wɚoi,i>u!t%a߻҉W}f3ӱ>9s9,݆`<ۻ[µ`&VoD'\XOuͼ;N=/LAK{{m+3A摙sP0tL~ߏ5˚dN$- ̌AgU71fkvΣqGr${; yp^[UhYzk$-s G}.1GAA[R4xdˮgd[l\ӈDM47?m39ٙK#e^O9ώ/vbȬ:'/oÚYy}m\H5yabX_Ty r49+ˠ-j3%}?MV<2 sMdT2'>/G+k/UYhy >eA7'ɗA~ؙՈOBH;:>>&o:2S{Wc OIv\͊gϿe|W0G"]8|AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#@"u @CH]e#ED:$RWd >AU&0YH$i#LKTIENDB`n%Q0{`PNG  IHDRfsRGB pHYsnu>IDATx^ o+Y-+v'r- (. rcGmYv}y.W%9CrrYB}~5q_ ygW+yz[ܯz\><*0oсx4 ɘ?swjzZ=G iLh)`fXG[-chr{^!Q@>7?0fJ*-bNgv4aEl'K{Fnyul ЌbtU#8b:n}.q~d:89N ;/zp~6W`cjoY֚;OӷVy7+} h {<MN%e =ؼ:}:L-={WMdyv^t=S;ý+ MN gRrN^o7t'(}ނoo=xR\ 990`_np n,|s܉?r?s(vP(gӓD*JgbA):=<#>/=}qUt>k~< |$jL- -qnb_B}^˵j(6>?24'bԴ >Rr ?~39:)Ἔ{Zt~uI{;wsow!5Tm>'X jY/?.뱧sI>ØZ`Wt)[ʏYU:e oRq_{ߥo} ɴI8z~;EODc/A&.|/z''Rd>KLn`W`yS:6"u:;Iin00VLJ{1R*#Fb'p:yak\j]!z|A+%v=U^~khK .W"i_O2vjY># h9k~6#/-ŷ̄k`Y[>+FQo@dTա*UlzQ,=ߟ؃};".Yi%6NFl>{Ӎ>3$(MbK* SY_=~Ȗ/vE C`X +%3_=TW쀹 e6DHn5c8gK1L~572Y88 S/+"Yǽpu?;mQwhB/e#grug{d[ ^uHee1^j.t v1̧}'cZ(cp+bMh||M(jݘwͰ|WJIMkRVg#c_$N~+p_¿9ؠf*2ir4ʟ2KL6ϠV'eGךipTs#X#bfqQv]AjSN`oӃ;')7ϞUӳb:DL~ {U{BOyXU~sIQiNEGB҄=wW"g$ #_3&9 ;y|:4A-mr%5&̚sOLjuZo=b ]y싋Tns-oo:m-mZdCEoc-*2IqS{X}kۀYi3wA4۹ !d8i߲P!772}' _I}Nwx@d턫넎$*.Ş;}e\}Kp_ULp)u-#Rr xh540{y笔·Kaߓ'#1aƾ lMd+5"p$g>9zhlQMk1k/]LÁW-  j }G&Y cmⶨÞD>zHQWrT=)?'bVujf{I,^0 APۗO57l>Md_^H;ךX;a> lWX ֦^XF_ MO#F->ګN T‚Q=^M3iOɚ`y#}$o_#^v7Ј7e oH=c33 F_v7| !; dgHb}ku]~WgɨQr|Zګ?~ڊG傃? >-O#tfR ^MP.){xԺ-<յ+fWe{.46֚*ÓDe2Yک1 o"uS-IԳP‘S@(΀bhS0 [{.#'+%kt;\)\DDe`KYQԦ*`v) 17cONdwbH]Lئ?uÉ )žh[bpzB+QF=f¾(CPN^X̻-=rnjQ}O gkEW ~- ɓhzޭip {iтߨZ /{n'` -?aLdI+ xbpǶ731G[$ev$)Lk/b@Q.F8lۨ\x*X?X6p2XM,<9TNuO!jŰ+b>SiR k3 @.}=ê!F~r͐$u)2xJEG_e?~N{~0s|>+2o=c=Stĩ&GYIʲ$e $53{=*_GÞ+WA:bo>^3`d=Ԥ'TW߲cdXЄ_.5EznI*e w[giy*per,Wc<sL//7;$.w U̫gwd?dޚ6lثu!tk1g^=a63VBIf[EۙM5ثϨ-@aR%xIm099?l>q Ш-u5b-= +5Y3D:jA,C4wXy:5TRf,;g⚴bc?m/,iLQkSǣpڋLF nPorZ$Φ8 NM#0nY[K__[ExH09!{xN߿_YZ0pS/F&bF\[?DO┬;~{$ePj}=uJwhXfQQMI r{x8Dl{Wcmz*Mݰ\o\ģ!}~NSŞ&ǣ5W`<ݣ6-k6؊6r00-}j/N2΢\U sXfϟ}wJuIԕzUZW鵖<2|/jm&A=K  H=8o$b"@\pdI~qdA IENDB`nO:2lgdATFPNG  IHDRZF{bsPLTEZccckc h k!9ZH^!{CZ!!)!!!)!1)))1)111)9)95=BJZZccko|ksup{{{%v9vGpB{RkRoRsbs#x')+>~R{7[s '9$21#/ILHRBDANawe{]]lzakks{s{uĈڞҠч%)111111999?BBJJJJRFJNVRVZZW]cg^ckkgkksospsu{{؃БސҘۖޜޠ֭ީ秪筵ֹܽﵱֵ޵ IDATx}Pw5f⩼ E^%! iL]ʔVWkJ[=b%pJn䰝szXܙ6wo7`@Ͳ{gs"?x^ԏQǥox*M{}0O]'BejD?6. |cEp0!7$YfX,^%W/xMSvBhe!$Az%3jQk2kj[Hȣ ${#>`E"xWY[TE(W:&=]E7v0VKl^߆ ψHQ5MB^hfK%DI &"Z6<"IO0Ǘaeο!%<4###**4#*<4 =]͚r7HV&MoB!ul̩1?gi W焦GX .YSSϢ);)N>6 %umf[sDsNNnTzNz`Y?l*4?")n;:f<-d8_آo9͹sQ[~n>4=0' wnAk06OQب7 F8/A" V3Lb[ 6qV.hئ777qWz,6M F0{(6>a0zA&::,::#SQgڴC_ 5%m/I eer*1+qQvץøXED^Ƌczl֚ а"nՖX7HKjU\RF6eSb^`0l(*[̈5^0h&7*K˳NMIQq3pFQQѠzbn^xaM13,"V*j uyX.Vgg'd'XpGL[j;:,~kϐrvtX;NM6Ԗd5ʂRReY7:-Vb4Y'e Ϛ#DX[-*`t:MC_}2C[-MFkOei`r^ f͓>^W+ TRKJNIVyI<>q/O+zʗ[Cf.,?YNKt%s1_5j8E7m{&ke[iI))ՂV4vĉlTOlSc_  2`@^p\W(5%-MAU ^, /{=<?Q'Enu+T*1.;ƻX2z׽˝<>v]J7sk0Vq]$=S认Tx:E "4SS#KחUS}xb#py[H3s;]n;H}.oB/d 0.UbRʺ;Mxbt65HۛM6B_ IUZkZ-jN[B(`E]#8aV)1ϡH&ZPV&.MJʂni z>;'*,:"eer h n~hmUe0 CxsFOfvhrHIXuru >w4߯ C;YYThw;GЇ2}hCh;8lT45AAיpe!5?z: S`N:n+6dT+꿝7 SPГK_n##PU%ǽh /U] H*-46 %y<66?@;;aj9ğhl5o-mEECc/CqÊ^-\.=Jǝ7. &̸ e (A3?eM#%FOeDǝSB_D\ 2 80FJFm %Zn⟉pnsg/?HB^I7wHy/ޘؘE/+3.;|x| npR5zD*'b"3GL%UN=@GvR&>DWXݹ,6&WxC &H6Ob  %\U=-`jIzVI )rxSh6s^_F-ܨ Cf/a[X3/_4-FMY^HkO t7/&!],zOe Y3; {a8*߳$$$&f߁ hu"7I$y>Lq2 UI~^4!;0`9"1o "!s^2[.( 48Xt0#YZ{?FgS#alr%? ?V{`/d'&`U4w!_CwhFs𕓆Ž$4H^"cAwPyr\øiרϳRdyOo}sY0)<=]5u3w7[;ylspފf͍fŻ ̄i0G1΃ݝo~{%8s]x8! &p4Le0r9a5<.}NBZ 2&0N L8q$[it7K6WCVhkIFÑ͖ #uj;&<Qa lՑ9= XH-B(>ʀsHO3`Ek"P|3aNVd2+Vd.ӂDVB5|Gu^h < z4C% |T t*&kP&P¾@\f]siKK H8B]$䬡JwSy.e~]}]] 4yP\@R?4aq=@D{ʅ ZpL<=d#}]~mGVcP 햪.c'͚I^Z.AbIENDB``!Pbj1 L.kPAxly=JQPOBH23FP\6Aa!nZ1N *EBaōXqR/VJYQWCBPP)*EetBQ)*a{q/}rc?=wq>ݒ˕rrcrr|{o[^^$W8 ϽNs ~r{{{i{g֗t|{n ft]Kooߟ {>0p }?6`ʗ[׻?.m96;.޽{.>*!v:m_;ŏtg} l}qB~ ,J~T}^gtT}^gt_e*U }WmJ5HuF-C@e)HuF-@eHuF-#@e9HuFXS@:VX@eHuFZ3@:,(PzRy} }4}^gt_eWF[m }ݷƲ*k@>3oe*@>3oe 3۲* }cٽ@:Yu:[ :XMr:Z@ HuFw!;l }wIJ*G@>3eT}^gtI˞*'A>3e TN}^gt˾T΀}^gtYs)P9y}-3r:.X@HuF]@"HuF a@e(HuF 2:,4Pi<>tF5[ 2x|lgfks@djJ+S3Ͳ/6Ngt_e_* O-"Py}[-%::,2P3ܲTA>3oeo*A>3oeo*@>3oe }7ԲÀPߏp:[vP2NgtH~Q Py}-{P y}c,@e HuF82:[x` }7Ѳ }7ɲ*@>3oe }7ղӀTn@e:HuFʹ@e&HuFͲ]@eHuFͶ }7Dzw9 }Wa?* }7ϲ*@>3oe,~=3oe?T ~ݷȲ T}^gt_e?T*A[lٿ*A>3oe*K@>3ʲ*@:Z!:Ya :[:j,)Ry}+,i:j-R y}u}ԁ}^gt_eWzk@:- 4}^gt~l~83oelM} l:3ɲO&Cf>TAu:6[YdP3ŲCV>TZAu:,"Pikym(jdFqUcܚ>?pcmn1mڌ)fN;ɝYoʗ27(9^;K/iu2^hr;M]=*= =XR=L˭*)f=SRuu1w^-)#en^+)K,rg_07r,)a G,7L;|r(C̾rOɄYbrz!yoIZbrF!dbrf!PR,dSI7,/䝅dgISbrV!SRWbBxIFy]HwI)5G p%'09%%Β U%?QL6T]R9K>VL6XR+B1PsI7-J1пw+/H o{!X047+~nV=Z8)o#iUʽ(|67{'˞,_aT#r0m\cOtG#W%?wVpƽ}soWN^27;{iv?h`!br9%A6}( >(XW(D90xY]HW>#j*Ii6u#UQ0m>d["UShZ5 i(RJ_/ĒJ(޳8݁~=w3*"^$yTЭk  26Z:(}H8*W\Q8~]a e[ʧʐ%R La_rW^E.g{2R'8gTX_j+TNwi8T9¾ :$fQ y^{@>Cp~s9ʞ5ENuD &m[glefa,͘ ~o~(AΊHO`M3v*hnI6Ɔf cW 1v]vk24ģ9Xa4KX惾uP=|W2^\oƥsPQTn!pnd^VX=cۤ1]Q42cˌ06X44pZl_%Ub_%Ub_%Ub_%Ub_%Ub_%Ub!Z)֔3t3+WIẞqwh(?R[tls%6ZDdhFdF:FJQDJ9+6 S\ydu.\Mco]hQ+6z+6+:dDJ}BޝFaN띆g:h^fny3|QVH#&9$;{ӳ_Eg 5Za1qL3;}}zbzgu5lo%רINFUJ6D/\ɚ,ԂISٖJb_Q\Pl*WF#CN_LGF'#t~|j_{+R)'Ԗڢyᵧ^HV/(csP;32`wg{2xoORrm3wdE~d8|_K o*>y{_:t"c~+atռj_IRRCg?zo|69}!y{uV{nfxY~p,kM?`!JjFd2 + #>(XW(D9xklUϙ Epy[X`(эon&Z Bh4P[$&A6!4J M4~ 1Gs=;mgv!Ý{Ν{ܙX{) (4uTmǗi *oߘ"*odXEi~7d9ՄmAt*g`&cք?EDžG>(ٲr$Ό6*}RϥEyࠥ/̳wR9KBB&ցkU0kCl!~ j|K(ZW+%D:L"("(~:YdVjY=a0+RP6]`k'X;yγvMBGB`e-cm%k+YFvCb$k'Ynv2Mie|Yg-wefy;::\cSGy^vq#l:=&0AP6s~6_.8Vքݥ.R.TvVZ?kuZ+kB+%}6Н3@wXk;c tg5Н3@wXk;c tg5Н3@w,c\<#gls!1l1sܬ Lv2n d Lg dـ LvdaǠP L0Hda![+,y5~۲ecdV& da Lv-QlLUV ״ 0 _яs޳C؜Ǧ{ݱnvW:wsRnԨ~h:i&&˩yaYRM:gV( ʩYe#YH`1s _r;f#S0>+THl?0D=&j'7Yf#{qGBGe`Cq,BGe0cБx,~$X @,{BGe$^B6e:/ŏ$ڲR<:/ŋB}T;;b֖gdl Y!t_ykso?o?GZ<Kؓ'џT{>wq+j+5u#8#de@;xM0LhϐaoM^lSp_ˡ}LV=E)Y#Ͼm+G6̿\˘Ki_Ә=j &Q9=: =f"VjU{uT*Ը~M-Vמ~k ߾h>^Y6[7Xhcdqx ek,GB^Q*qơRO?|/'~zKC8I*$."iH[<"1M,Z$"|J.Hb/R>$~no?q.cR>8B h=6Su?n>>g`T=QƕL_QQLJeϪK5w`aS \ySxuƍ<LZ%qp(x|Ĉ<2__>av G{'L㋰ '<8QUyԟ]wHkvKd; ]䌱e?>grxxiMUEK͹霊/|A#^Ej+YwGJjKUMhp(J?&u6"_r|f+P ҩۙʾ*^;e[Ig'QES*yz̪'qӔP$+s٘/[w Ȫ W)$^G>v*RgZ~f ԗc3Uњ@g ѕKʁj篟UB_f$y[Oiw"*yUȪ[a|ev \ ͦ5G%=R+%xv-`%ɋ~`iDSo^C /*L>Դ~DE$`>{i6oo(M[N[C3Hx]-ˉb@v% UYWf˜c!/y ȫDDſhdykOגּݯ葾Y ͺC1D+Qg!5FƅҪ `n.CJ5KSGvk3LK'*TRY'8@w:XՕKu#!qaWr%iv<27=xS<B)R𢑠tDşM4KCҹ(H@8l䖣}y#)BDES{ޔUQdoa-WN%t߮NW\PHl;7u]FV'"OXN;E)= ONCr#xZg_R.‹^{ɸįJ Q缶o:,m|FP5^[zQ3"OHI+hY'SOo ]5Iql! ],etFB(~D_r(NU (J5Xi-+Q͖G(e Ѕ\j_AHaZI=QGS/07jgElaxU%GFytnjq\̡0S:Ziz((]5Wn-?U2=A0,0nBf0Q$B1ၪrN<J+::jmYswG@׺"^RGQX?Gg}I-JQߢȤ4뀌*]6ֳj(PFQ=:iGy_Ə*KGUQPYuAyW'BwQTWVS4 PE{t tfuV$)D5Kc-?>WxYAGѩ]dtf%QE0Fx~Q?Գ2;PxAOʨ0CyNTE=e(:FeucatX5Du*FIQũq Ge%>GQ&rSG06݉0+հ>iDFkAu0ч(Zs->?EysW((і)`N}^g#`Xxk¨4 #nlѱ0E60X ((Yx7Jw␋YQyHa mYxYЋ(g[a& 0yt4NFuGAyz^}04Ģ.p)hA}UYh$#CA%ҦZ Ny<#(m^DahlxN IJX$  G+GWj`#x-TE(<;~_Du֦I#T]ѥPME*Pc$GlID5[YfpL< 9Qj]. ]ˡ*La4-]ŋ(r S ;F3. f{ru+|/  FP<':_-TEw)#C|wkf%3U# ,4Q=\dwtupV*Z&"/PGt #Ѭc`KL9\TI#Oy6Q"q#8:qHAf`0ˤPf#idI:X:"uHµ(4 >}bq!e.حŪhwR{03ޠ],nsd~SGLPMxC^#&CG?(@1<78odρ;4JWӯQqIuQoHy ըˆG ŏ<"%҈.;3^OQ igH>Ec4L0'«A MY_9T$ cDb[81b ʣ}-ˊZ'HQ6D_[34NyԔ卨Ca(Zm[v[9\ij2sEƌ$ekuھ5K0v-$g2ͺ0M2 vs(")h\h"VFCP!E|f\nɡ"H#r#4xV1o@~g+Jlj#G,n)d ,QR'b`a‚n]*y."1S$sgrtzw}l3cWaג7zټf1mց6Ę hgYV2{ϷD|BώEb㣿8bD'S*I*(=t s/ < br0ujs^,(()J.2V(Kӏ~Kj=.XWV࿔9reֽSӘiC\夂8]}}L5nv~V9y+3ږˣ5=:ћMj0{l{pO)J.2kX([(lY=8/QHmf>+V*;la{-(Vm3綞ޒU HuRN>PQ/~sΝ}*ܡfnf'q;dgon`!C)T0# ^ 9#Pc1mxypǟ'ծ]!ikm 0ibIɤp( 9)&ʑƘPrlߌ~i~F^3# 2aP h#z/:'6F#Gf#jbC= "* ]׏tu?>kDvR`6x4!Ecv;˘qbaa̵˫:kKp7JUҔse zC9Jx-l4Q卫=ou,zI @ _'ay8f'~+شXomtMr+<7ȋ]C| hIw7wVoB5xUzEP)Lw?(NK_r0 :9\G9ce?\Xt!WBn-vͶ%b]yKCXjWp<>S!<`O1Slt{DZua/QC6)k~U&ǽllg\f9~cWLXnm3qxj> P̤FWEn5NAc5h5Dv 1FHtmMf&Hs`LjYMa"tC:;⢞":$&# [Y҇K,J2r}g/xО)PX(K!9aů:'&|<~#]0״+4I(֎hA6 )"4xZ0P Vg .Xe*5+TXn=b;-Wt>Q1B3Ra)%>>7wSHS D̆C%8-J0ӆ \eaҧߠoWw+>^[CYۨխTp尶HYR:.MKh<B7Dap?DȺdʬ2q_f 'f܀_U &l6@GVS*ppT@RV7 SX s.nr(9,)a. = :'ӹ㖱Ŗ2<93g{s.S9MԎQ9wMJn?hzR=OƷF!Ŀ$H;Ԡq$Pn?BeҺ %AZ^ޔjޒmkRWz θfs7gdf?g_gDɾ. Ba++̿lwPzN:㘥.p,UWUʾU}ۢ\֨^T߳NW[G' B,)e`!2T3P4^  0 xT1K1~/`ϫ"Z(N: ֣\o KW'A( 䚻]Zyɻ 2^UeA_L4&L#0wQ6NO:D-\Px\"k˝) ` SwtvSde|7Pz(0+e 9ON²All4ֈT}ok3Øml̲9;3l43gK.>vx_(''L69$H Cn25O9Ri8"ӔKSک#4xV1o0~΋uWrSN,1[ SRՁօV]RuaA"KbgJ)98qr>S.m$g'a8GTaQ?~0]]1C #oџy$6O1ߑd>kqSO!fn O-4=r-PC~Qy&@ܷalo(XQRQd X,>htr^OzS:G=/{U&JGv6[+3qˮ0:x6`Qۆʿ8<Y~ ˕DۆĹgd3Ϛ]x\3]<zwN|j۰e@ 8瞥xQ[5 k뙉sUX*ޮdo{{(!^T jjb9HqxP9fJ ņr6&Φr?i`!7ycd0# ^ 9#Pc1mx{Tܙ}>ffgvay j((j""I{IyTF$(Gm$hlNHC Z4 XX.cGO3~=s @@>+nS#ABދ̉|2*,눮G#"hБwdT wG<&##]" ߚ%HQmsgN& F;RsJ)꺨 zGek ԩ;qB6NE ;8ɼNs]<ʷ!hCV"')`W߃w}h`&N &F7& ~丧Vq"@\08&L0Wu`"wvucRև\gt[Bvc^?d)xHFޣjj(5hf2:0u[a8 Wh8-;4x#ZE'Ս}U/ѩST F}XFUWXCx Nњϵ1Vg!6\׺1M}z6<+զ!,V%xXn3öxH9bxо"lq054<لW:㇝^bYEs>U'WT|z*LhviNVMN# |J?KV@$˄P*|m/S3/<Ԙ%\59&B1]'Vk. ?FVi6R"8&>V#_>*tk!M^+{勚&VyfkGՅJuȷT;TŪҠO$33Wp؝qx^ץ^$" H=aC5 R&/O +`5IaU!<8 cc&珐c=YYPIӔJS^k}bL1rt`'ڝc;}mr}ݿ;BǏiFz,};{RpR\K}Oz)}Fڥ.ifNI_'uŗKs $'Ej\eQUnOԸI'ĺZ|r2W_p]yIQ/2j,aceєXqgNkc}lr>)V$n"x񥤋YԠ:$n`Z3jQأ@\˄hr)pV==^%eDa MF74&aA=܁{[P^ nZmfYY|ܪo ueyvQ`k2%5vU`#;ώYr;=V7d Xo V{`JENⴘN*1<Ш1idQ$28(_}Z'i|Z<ʯ$.>ܨbΧȧMwϮيϠ}Eh +>مBjh+ywhB-eT4DpF^Bao@_D|{߻ Rr  ۂZADPfBz V;P &({!krzv&CKjt oC;p#2ACC9(OV ͸ppH&'^8D(\Qg$elu4ji (<̀Y7IrVnqQVuTI%U_^zY(0ⰘDvN0h;Dq]ݢIYu/ssJEJD|ĀXD+D GU?J/ G,/taWCX$fEm':6u~avη!x'j b kVP%(j/AǑ-7jO$UX?szc-GG_pDegԒvVK~bytn3Dv ^Rh%bQFLz VRN>by%Ζ_ x>dՎ_Eqy?ƣv1g=V5 iwBy9B3<ܻtTHg?}v??q3{f{t^i,ZQ~ۧtqʟ_3nv%\';rPNG  IHDRKm),IDATxca8?A 0^gY@fT a`Y0R@$OvIENDB``!.y"2E# | # `xU}hUqJ8u q'Oa%jw+!%t,0*j]nD6.FZ4ѹ~XA\˽9h=މ@+:eQ\E\snuM̒snejd'~jH7tF;߬.oXutu6>)ψXHǒb%!Ñ^y_7&>ZC d1v.pX^X:zeg>JN?ؠ}볆γ1n񛬓;|l}Gi/'y\%|gpRF1р&ZYh2_Y[7Sh'!#_ubNlu2B3ۀh;x[Xn&)Odrfe'7-\IkU){6YUrS SYUT^mUGչj\Ƃjݔ㡫=<$% x4%!e:Vrb.r;#:lL_t~'9]zsLǜ/mߗ\7 &ՄzI୫BWvZe/w5{4C>rL"]z#IkFl|?>ߎ+0OI} 2:mFp$Z"7z 0zCa,ZùSPxj#TGW2ç:ܤS ۜU0h?){#YO<{ >tL pހ( ~m&ͨ_F!'(@ ܀cgag6H.R}$HHZZ/-p4,԰x)k@_2Eⵦv>6a_>$MNV/&XZt=?(z{BZ9gDi9/JΈpG}VE^ @A Dk=1<(C{x(-z8%Z"jɰ+putl$.xS2;Ƙ~5,][zL9skznRhjjgVܝݞ=v1ܣ?cջIS䌝J^Tv^ۼKA^bp6?+@(D5H& d'vh~nwD=j=/߹2O|]ss $3YďVѷ"nSEyOgK<06T<$_ `\ Tѽ"~;UE[U{:K_jS̿tϸ+bf<&3/|3 ]x(k>-<;ʱeC;Dllh?xeCv-e+OFR\K<=v/W 9ir_W9 2y{ (    0 00 00 J/ 0|DTimes New Roman| )0Y 0DHelveticaRoman| )0Y 0 DHG Mincho Light J| )0Y 00DArialcho Light J| )0Y 0 @DStarSymbolight J| )0Y 0d .  @n?" dd@  @@``   X, n     "$&(*,0.02468:<>@BDFHJ,LNPRTVXZ\^`bdfhjl nprtQvxz|~+JMZ642 +      !#%')+-/13579;=?ACEGIKMOQSUWY[]_acegikmoqsuwy{} b$dPgdgb$,@_a1("aY*b$Q0{`-8,b$:2lgdATFWe<2$Pbj1 L2$r9%A6}( j]2$JjFd2 + 'cb$0]a! Uj2$LE`WD nԃ2$PH%FQ  B2$C)T0# 2$T3P4^ :2$h?6#E nڑ2$7ycd0# *H2$: ]Wuk b$%\';r~С2$.y"2E# !Nc $@8\ g4JdJd )0ppp@ <4 0Dg4;d;d )0(p@ ppuʚ;2Nʚ;<4dddd 0<4BdBd 0jb___PPT9D/ 0(7IPv6: What it is and What it means for the Enterprise8H8  8+Marc Blanchet CTO Marc.Blanchet@hexago.com $,(%, ,Plan IIntroduction Addressing Transition and Deployment Case Studies ConclusionJZJ J Credentials Hexago: Solutions provider for IPv6 deployment. Flagship product=Migration Brokertm, a tunnel broker. Spin-off of Viagnie: Consulting in IPv6 and security Operates: A backbone node of the 6bone since 1997. A well known tunnel broker (http://www.freenet6.net) IPv6 services: IPv6 routing registry, NTPv6. CA*Net2-3 IPv6 backbone with Dalhousie University 6TAP first IPv6 Exchange Point, with Esnet Converted applications to IPv6: quake1, quake2, NTP, & Blanchet: Co-chair of the IPv6 exchange adhoc wg. Co-founder of IPv6Forum. Member of North-American IPv6 Task Force. Co-chair of the IETF internationalized domain names (idn) wg Author of Migrating to IPv6, Wiley, 2003 Author of IETF drafts and RFCs on IPv6 and idnH/ZuZTZHEZ7Z H/ZH@ZI !***`]7    IPv6 RationaleH    Plan IPv4 address space allocation IPv4 current situation IP address needs in the near future NAPT IPv4 upgrade IPv6 short history Summary References   Current IPv4 Allocation   IPv4 Allocation Each Recent Year !  IPv4 Allocation Growth   Real Shortage? 6A country with 60 000 schools requested address space.7Z7 7 IPv4 Allocation per Region 770% of the allocated address space is in North-America. 8  Directions Broadband and wireless means devices often always on, compared to dialup. Dialup => one IP address per 25 devices? Always on => one IP address per device. More people on the net: Internet availability low in Internet-late and under-developed countries. Still people to connect in Internet-early countries. New applications requiring reachability for devices (i.e. global/unique address) VOIP, interactive multimedia (videoconferencing), gaming, peer-to-peer, & tKSQJKSQJ   Directions (cont.) ,New networks and services: Ubiquitous wireless: 3G 802.11 Bluetooth, & Any electronic device will be connected  Soon, we will be entering the true age of broadband networks, a time when electronic products will be linked by high-speed, high-capacity networks. With these advances will come IPv6 (Internet Protocol Version 6), which will assign a unique IP address to everything from TVs and PCs to telephones and AV products. Distinguishing individual devices over networks will become possible as a result. Sony Annual Report 2001.((   )%&    Industry, Governments and Market !vIndustry: Commitment from a large majority of vendors: Microsoft, Sun, Cisco, Juniper, Ericsson, Nokia, Nortel, Lucent, Motorola, etc& IPv6Forum: ~150 members, worldwide: vendors, providers, enterprises, R&E, & Government: Japan has a tax incentive for IPv6 European Commission made a clear direction statement on IPv6 and gives major grants to IPv6 Market More hum in Asia, Europe. Less in North America. Wireless is an important driver. -PL V -PL   V   NAPT (NAT) Issues Network Address and Port Translation (NAPT) or NAT is the current patch for the address shortage. However, there are many drawbacks: Breaks the end-to-end model of IP When a new application is not NAT-friendly, NAT device requires an upgrade Application-level gateways (ALG) are not as fast as IP routing Mandates that the network keeps the state of the connections Makes fast rerouting difficult Routers are fast, NAT+ALG will always be much slower&== NAPT (NAT) issues (cont.) Drawbacks: Inhibits end-to-end network security Merging of private-addressed networks (two 10.x.x.x networks) is difficult, time-consuming, and costs a lot. (double NAT or renumber) When there are many servers inside who need to be reachable from outside, NAT becomes a very important issue. Applications that need end-to-end reachability cannot be used Provider VPNs with same routing entries Need a route distinguisher that is effectively extending the IPv4 address space In case of misconfiguration, easy to leak routes and get VPN networks together! Excellent readings: RFC 2775 about Internet Transparency by Brian Carpenter RFC 2993 about Architectural Implications, by T. Hain H /H @H =I /H /nH @   #  NATs and Secure VPNs Uses: Remote network management Working at home Mobile user Linking two enterprise networks for some services Issues Same routing realm NAT breaks the reachability and the securityLh@h@ Troubleshooting Description Often, multiple NATs are in the path Issues From source to destination, no single identity. No global view No easy way to trace the trafic Network Management costs` %_ %_ (Applications without client-server model )Some applications are Not based on a simple client-server model peer-to-peer VoIP many multimedia protocols Nodes have to be reachable Between all parties involved NAT disables reachability v*,*,    %Applications with embedded IP address &Some application protocols Embed the IP address inside the protocol ftp sql*net VoIP ... NAT must change the IP address inside the protocol packet Based on his own translation of the IP address Needs to know the application protocol: each new application protocol (or new version) does not work until all the NATs are upgraded Slows down the trafic Single point of failure (no alternative routes) Cannot work with encrypted application protocol):W]v): W]v #Folding New Services in IPv4 Design $IPv4 was designed in the early 80s Many needed add-on to the protocol: Mobility QoS Security Autoconfiguration & These functionalities were not designed in IPv4 from the start. Issues like: Interoperability and conformance issues Multiple drivers at the same time -> conflicts. Find a stack that supports mobileIP, IPSec and QOS on the same node without any conflict. No default support in all devices (ex: IPsec) Protocol designer cannot influence IP or cannot use features not available in IP (ex: mobileIPv6 with route optimization) All these current issues are barriers to wide spread deployment of those features #H0/Z'H0@Z*H0=ZMH0/ZZH0@ZRH0/ZI0/Z#'*M  Z  S   nIPv6 Short History What Happens to IPv5?  IPv5 is the IP protocol number of the Stream Protocol (ST) As it uses the same link-layer framing as IPv4 Experimental protocol Other protocol numbers are already assigned: 7, 8, 9 (assigned to candidates of IPv6 before IPv6 came out) but may be changed to unassigned6</</ 6bone and IPv6 Internet 6bone test network started in 1996. uses 3ffe::/16 address space fading away (6/6/2006) IPv6 Internet production network started in 1999. uses 2001::/16 address space Tier-1 providers get addresses from the registries Advice: use IPv6 Internet (2001::/16)`Rt&Rt& Summary  We have an IPv4 address shortage problem Growth of Internet/IP is sustaining and will probably explode soon with wireless and new devices Only question is when the complete exhaustion of IPv4 address space Current and future applications need globally scope reachable addresses Current and future applications need new functionalities not available by default on IPv4 IPv4 was designed more than 20 years ago. We stretch it as much as we could. Need an enhanced version of the protocol, but still want to keep IP. => IPv6 Z   References RFC1519, Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy, V. Fuller, T. Li, J. Yu, K. Varadhan, IETF, 1993-09-01, http://www.normos.org/ietf/rfc/rfc1519.txt RFC1715, The H Ratio for Address Assignment Efficiency, C. Huitema, IETF, 1994-11-01, http://www.normos.org/ietf/rfc/rfc1715.txt The Recommendation for the IP Next Generation Protocol, Bradner and Mankin, IETF RFC1752, January 1995, http://www.normos.org/ietf/rfc/rfc1752.txt RFC2775, Internet Transparency, B. Carpenter, IETF, 2000-02-01, http://www.normos.org/ietf/rfc/rfc2775.txt RFC2993, Architectural Implications of NAT, T. Hain, IETF, 2000-11-01, http://www.normos.org/ietf/rfc/rfc2993.txt Internet-draft, The case for IPv6, King et al, IETF, June 2000, http://www.normos.org/ietf/draft/draft-iab-case-for-ipv6-06.txt IP protocol numbers, IANA, http://www.normos.org/iana/assignments/version-numbers H0ZI0 Z""8] ""J" "#"E"""^"A  IPv6 FeaturesH   Plan HLarger address space Efficient IP header and datagram Mandatory features I Larger Address Space {From 32 bits to 128 bits addresses enables: Global reachability: No hidden networks, hosts All hosts can be reachable and be "servers" End-to-end security can be used Flexibility Multiple levels of hierarchy in the address space Autoconfiguration Use of 64 bits for link-layer address encapsulation with warranty of uniqueness Multiple prefixes and addresses per network/hosts,h 2P2,h 2 P 2  |!Larger Address Space (cont.) "Plug and play" By autoconfiguration Aggregation Enforcing provider-based allocation Multihoming Multiple prefixes for the same site enables multihoming without cutting holes in the aggregation Renumbering By using autoconfiguration and multiple prefixes, renumbering becomes doable $ a M $ a M "&Efficient and Extensible IP Datagram 'Less number of fields enables: Routing efficiency Performance Forwarding rate scalability Extensibility of header Better handling of options No checksum 64 bits aligned Flow label`;';' #Mandatory Features Security (IPsec) Mobility MobileIPv6 is much more optimized than MobileIPv4 Multicast use No broadcast Efficient use of the network and less interrupts on NICs Scoped groups Transition richness Seamless transition Software change Mechanisms and tools for IPv4-IPv6 interactiont2TS2TS  $Summary Larger address space enables many new features More clean and efficient header Mandatory features Lessons learned from 20 years of IPv4. IPv6 is optimized everywhere it could be. %  References RFC2460, Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden, IETF, 1998-12-01, http://www.normos.org/ietf/rfc/rfc2460.txt PH I  "1"V" &! IPv6 Header Hr    '"Plan 7IPv4 Header IPv6 Header Header Fields Extension Headers8 8 8(# IPv4 Header 'IPv4 header = 20 bytes without options "'  ( ()$ IPv6 Header * IPv6 header = 40 bytes without extensions"+0]* +*%1Version (4 bits) 6 for IPv6 Traffic Class (8 bits) ~= TOS in IPv4 Identifies different classes or priorities (diffserv) Flow Label (20 bits) New in IPv6 Not yet fully defined Used by a source node to label sequences of packets Payload Length Similar to the Total length in IPv4, but computed differently.   E  V  ?  EV ? 2 Header Fields +&Next Header (8 bits) ~= Protocol field in IPv4 Used to identify the inner protocol TCP, UDP ESP, AH (confidentiality and authentication in IPsec) ICMPv6 Extension headers@ > X >X Next Header Field ,'Header Fields (cont.) Hop Limit ~= TTL in IPv4 MTU must be at least 1280 bytes (1500+ recommended) Nodes should use Path MTU discovery UDP checksum required>:  : :: -(Extension Headers HNew way of doing options Added after the basic IPv6 header Daisy chainedI I I.)Summary Comparison of IPv4 and IPv6 headers shows a longer header, but less number of fields Header processing is simpler Options are handled by extension headers  /* References RFC2460, Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden, IETF, 1998-12-01, http://www.normos.org/ietf/rfc/rfc2460.txt FH BI , "1"W" 0+IPv6 AddressingH   1,Plan rIPv6 addresses Format Unicast Multicast Anycast Required Node Addresses Address Selection Addressing Architecture rs s2- Addresses [IPv4 = 32 bits IPv6 = 128 bits This is not 4 times the number of addresses This is 4 times the number of bits ~3,4 * 1038 possible addressable nodes 1030 addresses per person on the planet As with any numbering scheme, we will be using only a portion of the full address space Written in hexadecimal. ex: 3ffe:0b00:c000:0000:1111:2222:3333:4444f , Y, \3. Address Types Structure Unicast Unicast Global Scoped addresses: Link-local Site-local Unspecified Loopback Transition mechanisms: IPv4-compatible 6to4 Multicast Broadcast: none in IPv6 AnycastZ"ZZ,ZZ ZZZ",  4/ Structure WSome fixed boundaries are defined in the current addressing architecture: A site receives a /48 independent of the size of the site: a home network, a car, a plane, a worldwide corporate network A link (subnet) receives a /64 64 bits for the host part of the address Called interface id/node id Which leaves 16 bits (48->64) for subnettingvJcE1JcE1 X50 Structure No need to Estimate future address usage do complicated address plan No VLSM There is essentially no subnet mask in the current addressing architecture. Always /64. Only requirements are: Other administrative entities below for assignments IGP aggregationL D D 61Unicast Global $Generic use. Globally reachable. Allocated by IANA To Regional Registries Then to Tier-1 Providers (Before called Top-level Aggregator (TLA)) Then to Intermediate Providers (before called Next-level Aggregator (NLA)) Then to sites (before called Site-level Aggregator (SLA)) Then to subnets41+,,41+, ,   %72Unicast Global xStructure: 128 bits as the total 48 bits prefix to the site 16 bits for the subnets in the site 64 bits for host part( ky y83Unicast Global (cont.) pConsists of the following (left to right): 3 bits: 001 (10% of the total address space reserved) IANA gives space to RIRs RIR gives /32 to Tier-1 providers 16 bits for the site subnets 216 subnets per site = 65536 subnets 64 bits for the interface identifier Total = 128 bits. The use and allocation of the first 48 bits are based on policy (i.e. can change over time)x+%7\+"7\  q94 Link-local KScoped address (new in IPv6) Scope = local link (i.e. VLAN, subnet) Can only be used between nodes of the same link Cannot be routed Automatically configured on each interface Uses the interface identifier (based on MAC address) Format: FE80:0:0:0: /64 Gives every node an IPv6 address to start communicationsDH /AH @+H /5H @H /&H @9H /DA+5&9 L:5 Site-Local UScoped address Scope = site (a network of links) Can only be used between nodes of the same site Cannot be routed outside the site (i.e. the Internet) Very similar to IPv4 private addresses Not configured by default Format: FEC0:0:0:: /48 Subnet id = 16 bits = 65K subnets Enables an addressing plan for a full site z1"J+I1"J+  V;6Site-Local (cont.) ;Usage example: Number a site before connecting to the Internet: Do your address plan using site locals and use the renumbering functions (or keep the site-local) when connecting to the IPv6 Internet Private addresses: eg: Local devices: printers Management network NOTE: march 2003: ipv6 wg discussed to deprecate.1+I*2H*1+ 3 <<7 Multicast Multicast = one-to-many No broadcast in IPv6 Multicast is used instead, mostly on local links Scoped addresses Node, link, site, organisation, global No TTL as in IPv4 Format: FF::Lo9$o9$ =8Multicast Assigned Addresses !Some reserved multicast addresses ">9Addressing Architecture  ?:Addressing Architecture (cont.)  @;Summary IPv6 Has a much larger address space Has specific formatting for addresses Introduces new kind of addresses (scoped) IPv6 nodes have many addresses and need to select which one to use Addressing architecture has a lot of space available for future use dpp A< References RFC2373, IP Version 6 Addressing Architecture, R. Hinden, S. Deering, IETF, 1998-07-01, http://www.normos.org/ietf/rfc/rfc2373.txt RFC2374, An IPv6 Aggregatable Global Unicast Address Format, R. Hinden, M. O'Dell, S. Deering, IETF, 1998-07-01, http://www.normos.org/ietf/rfc/rfc2374.txt Default Address Selection for IPv6, Richard Draves, IETF internet-draft, May 2001, http://www.normos.org/ietf/draft/draft-ietf-ipngwg-default-addr-select-04.txt H I  "&"S" "4"^"" B= IPv6 Transition Main Mechanisms !H!  ! C>Plan Context Dual Stack Tunnelling IPv6 over IPv4 Configured tunnels Automatic tunnelling IPv4-compatible addresses (Annex) 6to4 6over4 (Annex) Tunnel Broker/server ISATAP Teredo Tunnelling IPv4 over IPv6 DSTM n-(Y-(Y  D?Plan Translation at IP or transpor t layer SIIT NAT-PT Bump-in-the-stack (Annex) Bump-in-the-api (Annex) Transport-layer Translator (Annex) Application-layer Gateways Proxy Socks (Annex)L&a&a E@Transition in IPv6 When moving to another technology, the transition has to be discussed and is generally very important. Often it is where most of the money is put Many new technologies didn t succeed because of the lack of transition scenarios/tools IPv6 was designed, at the beginning, with transition in mind: no D day IPv6 is transition-rich, as you will see$YM YFA Strategies For end-systems, there is: Dual stack approach For network integration, there is: Tunnels IPv6-only to IPv4-only: some kind of translationL#9#9 GBDual Stack Host ;Node has both IPv4 and IPv6 stacks and addresses IPv6-aware application asks for both IPv4 and IPv6 addresses of destination DNS resolver returns IPv6, IPv4 or both addresses to application IPv6/IPv4 applications choose the address and then can communicate With IPv4 nodes using IPv4 Or with IPv6 nodes using IPv6&:: <HCDual Stack Host (cont.)  IDTunnelling IPv6 in IPv4  JETunnelling IPv6 in IPv4 IPv6 encapsulated in IPv4 IP protocol 41 Many topologies possible Router to router Host to router Host to host The tunnel endpoints take care of the encapsulation. This process is  transparent for the intermediate nodes Tunnelling is used by most transition mechanisms If security gateways are present in the path, then they need to let through IP packets transporting protocol 41 Problem if NAPT is in the path Can also be accomplished by GRE tunnels xZZZ-ZYZZ-Z KFTunnelling IPv6 over IPv4 LConfigured tunnels Automatic tunnels 6to4 6over4 Tunnel broker ISATAP Teredo MLGConfigured Tunnels qTunnel endpoints are explicitly configured Tunnel endpoints must be dual stack nodes The IPv4 address is the endpoint for the tunnel Require a reachable IPv4 address (no NAPT) Tunnel config implies: Manual configuration of: Source and destination IPv4 address Source and destination IPv6 address Between: Two hosts One host and one router Two routers (for two networks)U[H AU[H A rMHConfigured Tunnels  NIConfigured Tunnels  OJ!Configured Tunnels Considerations "Tunnels cannot go through a NAPT If site uses a NAPT, then one scenario might be to end the tunnel at the NAPT box A possible transition: when IPv4 addresses are scarce, deploy private IPv4 addresses using a NAPT and deploy IPv6 end-to-end PK6to4 Applicability: interconnection of isolated IPv6 domains over an IPv4 network Automatic establishment of the tunnel No explicit tunnels By embedding the IPv4 destination address in the IPv6 address Under the 2002::/16 reserved prefix. (2002::/16 = 6to4) Gives a full /48 to a site based on its external IPv4 address IPv4 external address embedded: 2002:::/48 Format: 2002::::/64 bs>bs>b QLWho Needs to Support 6to4? 3Egress router: Implements 6to4 Must have a reachable external IPv4 address Often configured using a loopback interface address Is a dual-stack node Individual nodes: Nothing needed for 6to4 support. 2002 is an "ordinary" prefix that may be received from router advertisements Doesn't need to be dual-stack <4<4 4RM6to4 Network to Network  SNIssues with 6to4 Bound to the IPv4 external address: If egress router changes its IPv4 address, then it means that you need to renumber the full IPv6 internal network Only one entry point (no easy way to have multiple network entry points for redundancy) If everybody is using 6to4, it effectively puts IPv4 Internet host routes into IPv6 routes When a dual-stack node in a combined IPv4/IPv6 network has 6to4 support, if the destination is a 6to4 address, does it send the packet to the router or does it make the tunnel itself?6$$ TO Tunnel Broker tAutomated tunnel configuration Uses a Control protocol for the tunnel setup Tunnel Setup Protocol (TSP) client send a request for tunnel Broker based on policies, sends the appropriate tunnel info and configures its tunnel end Client then configures its tunnel end Client receives a stable IPv6 address a stable IPv6 prefix Popular free service: http://www.freenet6.net L>HxT6+.L>T6 +/ uUP Tunnel Broker  VQTunnel Broker with TSP 4Client requests: A tunnel for one host A tunnel for a network (routing implied) With a prefix delegation Without a prefix delegation (I have mine, but please announce it) With routing information: I use RIP, BGP, OSPF, & With domain name information The host name will be: Inverse delegation Server can respond: Here are the requested info I'm full, cannot give you a new tunnel, please go to this other tunnel server (referer) I can give you a host tunnel, but not a network tunnel Here is the prefix, here is my bgp info (as number) & HKZAHZZ[ZHZZZHZZ*ZHKZHZZA[  * WRTunnel Broker with TSP xEnables Changes of data to be negotiated between the two parties: i.e. IPv4 client address change IPv4 mobility but IPv6 stability of address and prefix Generic Authentication: use a password, a Securid card, a public-key& Is implemented In the boot sequence of a host In host OS and router OS Combined with other tunnelling protocols DSTM as the Tunnel Setup Protocol with UDP encapsulation for authenticated/controlled way to go through NATsZZHZ7FHZ8HZ)mZ7F8  ) m  XS$Tunnel Broker with TSP Applicability %Host or Routers (networks) over an IPv4 network With or without NAT in the path In a corporate network In a provider network On the Internet Gives control, authentication, security Gives a permanent address space. YTISATAP  Intra-Site Automatic Tunnel Addressing Protocol Automatic tunnelling from ISATAP nodes to the ISATAP routers in a corp network Creates a virtual IPv6 link over the IPv4 network Special bits in the Node identifier part of the IPv6 address identify an ISATAP address.    ZUISATAP Example  [VISATAP Applicability QInside a enterprise network No NAT in the path Not between providers Not global R\WTeredo  NAPT prohibit the use of direct tunnels. Uses IPv6 in UDP in IPv4 External mapping of IPv4 address and port are discovered by the Teredo server (on the external side of NAT) Teredo uses a specific prefix. The address includes the IPv4 and port number of the host.@H0/ZI0/ZZH0/Z ]XIPv6 in UDP in IPv4  ^YTeredo Applicability 1Hosts behind an IPv4 NAT that wants to go through the IPv4 NAT. Tax for UDP encapsulation. Effective MTU is smaller. Automatic tunnels: Teredo servers and relays are subject to attacks. Can be combined with TSP for controlled deployment, fixed addresses and prefixes, and less subject to security attacks. 2_ZSummary Many transition tools exists: To tunnel between IPv6 islands To translate between IPv4 and IPv6 Others are available, others will be define None is for all possible scenarios Not all will succeed on the market Choose the right one for your scenario6BB `[ References RFC2766, Network Address Translation - Protocol Translation (NAT-PT), G. Tsirtsis, P. Srisuresh, ETF, 2000-02-01, http://www.normos.org/ietf/rfc/rfc2766.txt RFC2767, Dual Stack Hosts using the "Bump-In-the-Stack" Technique (BIS), K. Tsuchiya, H. Higuchi, Y. Atarashi, IETF, 2000-02-01, http://www.normos.org/ietf/rfc/rfc2767.tx RFC2893, Transition Mechanisms for IPv6 Hosts and Routers, R. Gilligan, E. Nordmark, 2000-08-01, http://www.normos.org/ietf/rfc/rfc2893.txt RFC3053, IPv6 Tunnel Broker, A. Durand, P. Fasano, I. Guardini, D. Lento, IETF, 2001-01-01, http://www.normos.org/ietf/rfc/rfc3053.txt RFC3056, Connection of IPv6 Domains via IPv4 Clouds, B. Carpenter, K. Moore, IETF, 2001-02-01, http://www.normos.org/ietf/rfc/rfc3056.txtH  "="V" "@"l"1"[""s","U" a\ References PRFC3068, An Anycast Prefix for 6to4 Relay Routers, C. Huitema, IETF, 2001-06-01, http://www.normos.org/ietf/rfc/rfc3068.txt draft-vg-ngtrans-tsp-xx.txt, Tunnel Setup Protocol (TSP), M. Blanchet, R. Desmeules, A. Cormier, draft-vg-ngtrans-tsp-v6v4profile-xx.txt, IPv6 over IPv4 profile for Tunnel Setup Protocol (TSP), M. Blanchet, R. Desmeules, A. Cormier draft-blanchet-ngtrans-tsp-dstm-xx.txt, DSTM IPv4 over IPv6 tunnel profile for Tunnel Setup Protocol (TSP), M. Blanchet draft-ietf-ngtrans-introduction-to-ipv6-transition-04.txt, An overview of the introduction of IPv6 in the Internet@QH  "*""s Qb] Case Studies H   c^Plan Isolated host without IPv4 NAT Isolated host with IPv4 NAT Mobile host Small network without IPv4 NAT Small network with IPv4 NAT Mobile network Large corporate network without IPv4 NAT Large corporate network with IPv4 NAT Provider network Exchange Points/NAPs ,I d_Considerations Always use native IPv6 if you can. (together with IPv4: dual stack approach) If you can t, then transition mechanisms are used. Tunnelling IPv6 in IPv4 works if no NAT in the path. A user or a network manager do not necessarily know in advance if there is one NAT or not in any possible path. UDP encapsulation is important considering the NAT installed base. he`Isolated Host without IPv4 NAT 3Dual-stack host on an IPv4 network without IPv4 NAT 4faIsolated Host without IPv4 NAT IPv6 in IPv4 Tunnelling is used: Configured tunnels: need manual changes everytime IPv4 address change. 6to4: IPv6 address will change everytime IPv4 address change Need to find a 6to4 relay. May be far. ISATAP: Yes if on a corporate network. No if mobile. Will renumber when full IPv6 deployment is done. Not for servers. TSP Tunnel Broker: If available, yes. Could be mobile later or behind NAT and keep its IPv6 address (space).!3^oZ!3^ o Z gbIsolated Host with IPv4 NAT 0Dual-stack host on an IPv4 network with IPv4 NAT 1hcIsolated Host with IPv4 NAT IPv6 in IPv4 Tunnelling is used: Configured tunnels/6to4/ISATAP do not work. Teredo: If available, yes. If mobile and not behind a NAT, encapsulation tax and will change IPv6 address (renumbering). No prefix for any subnet behind the host. For the provider of the service, no authentication/control of service, no possible billing. TSP Tunnel Broker: If available, yes. Could be mobile later or not behind NAT and keep its IPv6 address (space).b!5^!5^  id Mobile Host  je Mobile Host Use IPv6 if home network is IPv6 native. Use MobileIPv6 if visiting network is IPv6 native if implemented and configured in stack Not efficient if source routing is prohibited in the visiting network Needs MobileIPv6 configuration on the home network No solution with native and MobileIPv6 if the visiting network is not IPv6 Since high probability of IPv4 NAT in some visiting network, then need a NAT-friendly transition mechanism: Teredo: same issues as before. TSP Tunnel Broker: If available, yes. Keeps its IPv6 address (space).L\e\e kfSmall Network without IPv4 NAT ?Network could be IPv6 only or IPv4/IPv6. Gateway is dual-stack @H0/Z@ @lgSmall Network without IPv4 NAT <IPv6 in IPv4 Tunnelling is used if external network is IPv4: Configured tunnels: need manual changes everytime IPv4 address change. No IPv6 prefix for the network behind 6to4: IPv6 address will change everytime IPv4 address change Need to find a 6to4 relay. May be far. ISATAP: only for inside. Does not help for outside. TSP Tunnel Broker: If available, yes. Could be mobile later or behind NAT and keep its IPv6 address (space). Hosts inside the network could be IPv6 only if gateway sends router advertisements. If external network is IPv6, then native IPv6 is used.=ZZYZZ^ZGZ[ZZ=Y^G [ =mhSmall Network with IPv4 NAT ]Network could be IPv6 only or IPv4/IPv6. Gateway is dual-stack. If gateway is the IPv4 NAT. ^H /^ ^niSmall Network with IPv4 NAT aGateway is dual-stack. If gateway is the IPv4 NAT, then it could be an IPv6 router. IPv6 in IPv4 Tunnelling is used if external network is IPv4: Configured tunnels: need manual changes everytime IPv4 address change. No IPv6 prefix for the network behind 6to4: IPv6 address space will change everytime IPv4 address change Need to find a 6to4 relay. May be far. ISATAP: only for inside. Does not help for outside. TSP Tunnel Broker: If available, yes. Could be mobile later or behind NAT and keep its IPv6 address (space). Hosts inside the network could be IPv6 only if gateway sends router advertisements.VZ=ZZYZZdZGZ[ZTZV=Y d G[T bojSmall Network with IPv4 NAT _Network could be IPv6 only or IPv4/IPv6. Gateway is dual-stack. If gateway is not the IPv4 NAT`H0/Z` `pkSmall Network with IPv4 NAT Gateway is dual-stack. If gateway is not the IPv4 NAT, then it needs NAT-friendly mechanism. IPv6 in IPv4 Tunnelling is used if external network is IPv4: Configured tunnels/6to4/ISATAP does not work Teredo: do not provide prefix for the network behind. A host-based solution, not for the network. TSP Tunnel Broker: If available, yes. Could be mobile later and keep its IPv6 address (space). Hosts inside the network could be IPv6 only if gateway sends router advertisements.b_=MT_=M T qlSmall Network - Inside .If possible, deploy native IPv6. If not, then need tunnelling: Configured tunnels: manual, do not scale 6to4: rely on IPv4 external address for IPv6 prefix. Renumbering when IPv4 address change. ISATAP: good. TSP Tunnel Broker: would handle all cases (for example, if a NAT is used inside the network).&?? /rmMobile Network @Network could be IPv6 only or IPv4/IPv6. Gateway is dual-stack. AH /A AsnMobile Network nUse IPv6 if home attached network is IPv6 native Use MobileIPv6 if attached network is IPv6 native if implemented and configured in stack Not efficient if source routing is prohibited in the visiting network Needs MobileIPv6 configuration on the home network No solution if the visiting network is IPv4 Do not give IPv6 prefix for the network behind. No known implementations of MobileIPv6 networks. Since high probability of NAT in some visiting network, then need a NAT-friendly transition mechanism: Teredo: same issues as before. No prefix given. TSP Tunnel Broker: If available, yes. Keeps its IPv6 address (space). TcZ.ZgZwZc.gw oto(Large Corporate Network without IPv4 NAT )NSimilar to small network without IPv4 NAT However: 6to4 have many scaling limitations for large networks (eg: only one exit/entry point, large network renumbering). Multiple kinds of islands if incremental deployment: Isolated hosts Isolated networks ISATAP is only for hosts. TSP Tunnel Broker works in these multiple configurations.N3!T3!T Oup%Large Corporate Network with IPv4 NAT &vSimilar to Small network with NAT However: 6to4 have many scaling limitations for large networks (eg: only one exit/entry point, large network renumbering). Multiple kinds of islands if incremental deployment: Isolated hosts Isolated networks ISATAP is only for hosts and would not help to reach external (since NAT) TSP Tunnel Broker works in these multiple configurations.N+!+! wvqProvider Network Deploy native IPv6 if possible If not, incremental deployment with tunnelling To reach customers: Configured tunnels works but very painful for large scale 6to4/ISATAP/Teredo could not be used TSP Tunnel Broker enables the incremental deployment without upfront costs of native deployment Could offer IPv6 services: TSP Tunnel Broker for customer hosts and networks Teredo server/relay for customer hosts 6to4 relayLbdbd wr Address Plan 2If you are a top-level (tier-1) for assignments, start bits from left to right. 0000, 8000, 4000, C000, ... If you are an intermediate level for assignments: If you want maximum flexibility with maximum aggregation in the future, use centermost bits identify the best target prefix length (ex: /40) start using bits growing on both sides of the boundary If you are a end-level for assignments, start bits from right to left. Subnets always have /64. should be able to allocate all bits. routing aggregation is the only concern, if it is in your case. See RFC3531P2\hG~ P2\h G~  3xsSummary iUse IPv6 native whenever possible If transition mechanism are used, then choose the most appropriate one. jyt Conclusion H    zu Conclusion IPv6 is an upgrade of IPv4. It fixes many limitations and introduces new features needed. IPv6 is still IP. Basic mechanics are kept as is or enhanced. IPv6 is transition-rich. IPv6 has strong industry support. IPv6 market seems more active in Asia and Europe for now.  {vAcknowledgments dCanarie (http://www.canarie.ca) who partly funded our IPv6 projects Dalhousie University (http://www.dal.ca) who co-manage the CA*net2-3 IPv6 networks. ESnet (http://www.es.net) who co-manage the 6tap exchange. Sun who provides us equipment for 6tap and RPSL work. Various vendors for providing equipment to test. Florent Parent, co-author of this course.(:*e e|wFeedback rThis tutorial is not bug free, nor complete. Please send any comments/suggestions to Marc.Blanchet@hexago.com sZs s}xAnnexH   ~yIPv6 Routing ProtocolsH   zPlan UInterior Gateway Protocols (IGP): RIP OSPF ISIS Exterior Gateway Protocols (EGP): BGPL"""" V{RIP XRIP (Routing information protocol) in IPv6 Based on RIP-2: same design: distance-vector, 15 hops diameter & IPv6 prefix, next-hop IPv6 address Uses multicast (FF02::9 = all-rip-routers as the destination address for RIP updates) Uses IPv6 for transport new UDP port version number restarts at 1. Most (if not all) IPv6 router implementations support RIP IPv6 Most IPv6-enabled Unix OS have the IPv6-RIP routed daemon available.&++ |OSPF JOSPF (Open Shortest Path First) for IPv6 Also known as OSPFv3 Important rewrite to remove IPv4 dependencies. Now it is network protocol independent Link-local addresses are used Uses IPv6 for transport The important rewrite on the protocol has delayed the implementations. Implementations are now available by most router vendors.&)")" K}IS-IS uIS-IS is the OSI IGP protocol. It is network protocol independent Compared to OSPF, IS-IS for IPv6 is easier to implement and modify 2 new type-length-values (TLV) were defined: IPv6 Reachability (with 128 bits prefix) IPv6 Interface Address (with 128 bits) New protocol identifier for IPv6 Router vendors supporting IS-IS for IPv4 have or are going to have an IPv6 versionj-PH N!S-P!S  v~Deployment of Routing Incremental deployment for routing? Different topologies different topology databases Ships in the night IS-IS, by default, is integrated: one topology database. IPv4 and IPv6 topologies must be identical. Some implementations provide ways to get around it. n$0`0`00`0`0`$0  Deployment of Routing (cont.) pOSPF: OSPFv2: IPv4. OSPFv3: IPv6. Younger than ISIS Ships in the night RIP: RIPng: based on RIPv2. Usual caveatsT A  % A% qBGP XBGP4+ Includes multiprotocol extensions for BGP, for new address families (ex: IPv6, VPN, & ) IPv6 address family: Can use scoped addresses in the NEXT_HOP NEXT_HOP and NLRI are expressed as IPv6 addresses and prefix Most IPv6 router vendors support IPv6 BGP. It has been used on the 6Bone since 1996hWfH xTWfT -Summary All routing protocols are available for IPv6 No real difference in the mechanics RIPv6 is based on RIP-2 OSPFv6 is a major rewrite IS-ISv6 includes few changes BGPv6 is based on Multiprotocol BGP  References RFC2080, RIPng for IPv6, G. Malkin, R. Minnear, IETF, 1997-01-01, http://www.normos.org/ietf/rfc/rfc2080.txt RFC2545, Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing, P. Marques, F. Dupont, IETF, 1999-03-01, http://www.normos.org/ietf/rfc/rfc2545.txt RFC2740, OSPF for IPv6, R. Coltun, D. Ferguson, J. Moy, IETF, 1999-12-01, http://www.normos.org/ietf/rfc/rfc2740.txt RFC2858, Multiprotocol Extensions for BGP-4, T. Bates, Y. Rekhter, R. Chandra, D. Katz, IETF, 2000-06-01, http://www.normos.org/ietf/rfc/rfc2858.txt Routing IPv6 with IS-IS, draft-ietf-isis-ipv6-xx.txt RPSL extensions for IPv6 and Multicast Routing Policies, F. Parent, draft-parent-multiprotocol-rpsl-xx.txt H I  l"" " "h"""i" /T      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~  P ` ̙33` ` ff3333f` 333MMM` f` f` 3d?" dd #,~?" dd %  %" @ ` v?" dd    " @ `@p?" dd    @@``PV! !   `Z,  @@ ``pV! !   V! !     B(  :  3 AF  S F7A Q:  3 A :  3 A.  0" A ::*,n( '  Z5Pk ( C ^y)  0$-_ж_ж @ B  HEXAGO 2003,n0 ]' Z5Pk ( C ^y  HhG `k  W#Click to edit the title text format$ $  BI `X  Click to edit the outline text format Second Outline Level Third Outline Level Fourth Outline Level Fifth Outline Level Sixth Outline Level Seventh Outline Level Eighth Outline Level Ninth Outline Level&g B   s *޽h ? ̙33 "Modle par dfaut 0 3(   F  S F7A :  3 A :  3 A)  0=_ж_ж @ B  HEXAGO 2003,n0 ]' Z5Pk ( C ^yB  s *޽h ? ̙33@ 0 P(  R"  s *G$  L"  c $G  L"  c $G  L"  c $G  ^  S  ?    0/ u  0 <  c $vn ? ̙33\   (     NL_ж_ж ?   nZ5Pk ( C ^y   NDM_ж_ж    nZNi & A \ w 4O :  3 A B  s *޽h ? ̙33  `D(     N]_ж_ж `p   nZ5Pk ( C ^y   N_ж_ж   jV4Oj ' B ]xB  s *޽h ? ̙33  D(     N8_ж_ж `p   nZ5Pk ( C ^y   N_ж_ж Z  jV4Oj ' B ]xB  s *޽h ? ̙33  <(     N4_ж_ж )   nZ5Pk ( C ^yB  s *޽h ? ̙33   D(      NE_ж_ж `p   nZ5Pk ( C ^y   NM_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33`  $(  $ $  N=_ж_ж `p   nZ5Pk ( C ^yS $ 0b_ж_ж   ?* 69% of space is allocated as of 2002-03 Source: IANA registry$@n @# @Z5Pk ( C ^yZ $ S A ?!  3 $ 0_ж_ж  0N 240+ is experimental (Class E).$ n  # Z5Pk ( C ^yRB $ s *D{ 0B $ s *޽h ? ̙33 " ($(  ( (  Nt_ж_ж `p   nZ5Pk ( C ^yZ ( S A ? 4 $ ( 0D-_ж_ж @  Linear extrapolation . ! Z5Pk ( C ^yRB ( s *D{;u5 B ( s *޽h ? ̙33t    ,(  , ,  NC_ж_ж `p   nZ5Pk ( C ^yZ , S A ?P K  [ , 0J_ж_ж   K* A linear model on the first derivative gives 2006 as complete exhaustion. L. L! LZ5Pk ( C ^y? , 0|U_ж_ж H  1Cumulative using previous slide linear prediction2. 2! 2Z5Pk ( C ^yRB , s *D{K uB , s *޽h ? ̙33}   @0(  0 0  Np_ж_ж `p   nZ5Pk ( C ^y, 0  Nx_ж_ж `` 0<$D 0  jV4Oj ' B ]x2l  `6 0` 6,$D  0N" 0 S G  `,` 0 0|_ж_ж  `7 DReceived one class B. Which is ONE north-american university space."E/0 ZE! E\ #>Yt 1Lgl ` +  0` + ,$D 0N" 0 S G ` , M 0 0_ж_ж ` ,  1An Internet-late country requested address space."2/0 Z2! 2\ #>Yt 1Lg)l  `6   0` 6 ,$D  0N"  0 S G  `, W  0 0_ж_ж  `7  ;Received one class C. 254 computers for the whole country."</0 Z<! <\ #>Yt 1Lg l  [   0 [ ,$D 0N"  0 S G  \ ; 0 0_ж_ж  \  Broadband users want addresses." /0 Z ! \ #>Yt 1Lgl  [  0 [ ,$D  0N" 0 S G  \ K 0 0_ж_ж  \  /Broadband providers give private address space."0/0 Z0! 0\ #>Yt 1Lgl   0 ,$D 0N" 0 S G  A 0 0_ж_ж   %Small enterprise need 3000 addresses."&/0 Z&! &\ #>Yt 1LgLl  0  00 ,$D  0N" 0 S G  0 z 0 0_ж_ж  0  ^Can t get it. Will receive 64 addresses? Maybe."0/0 Z0! 0\ #>Yt 1LgB 0 s *޽h ? ̙33   " _ W `4 (  4 4  N`_ж_ж `p   nZ5Pk ( C ^y, 4  N0_ж_ж ` <$D 0  jV4Oj ' B ]x+l  ` 4` ,$D  0N" 4 S G  `Y 4 0L_ж_ж  ` ?North-America represents less than 10% of the earth population. @/ @! @\ #>Yt 1Lgl   K  4  K ,$D 0N" 4 S G   L A 4 0 _ж_ж   L  '65% of the earth population is in Asia. (/ (! (\ #>Yt 1Lg#l  0 {   40 { ,$D  0N"  4 S G  0 | Q  4 0,p_ж_ж  0 |  7Asia have less than 15% of the allocated address space. 8/ 8! 8\ #>Yt 1Lgl `   4 `,$D  0N"  4 S G8 ` 2 4 0Dp_ж_ж `  Discrepancy? Fairness?".( ! \ #>Yt 1LgB 4 s *޽h ? ̙33   8D(  8 8  Np_ж_ж `p  p nZ5Pk ( C ^y 8  N&p_ж_ж `]  jV4Oj ' B ]xB 8 s *޽h ? ̙33   <D(  < <  Np_ж_ж `p  p nZ5Pk ( C ^y <  Nhp_ж_ж `]  jV4Oj ' B ]xB < s *޽h ? ̙33  " @D(  @ @  NGOXb}mgwTC4'   ',4:CCTMgX}bmv!AdEm<@g#fHB L C D$!: L 3 A g L  Nm  p jV4Oj ' B ]xB L s *޽h ? ̙33F  " @ Pt(  P P  N8m `o  m nZ5Pk ( C ^y P  N"m \  jV4Oj ' B ]x: P 3 A : P 3 A 5`: P 3 A  8 ~   P~ B P 3 A ~  E# P 6$i  E  NAT"n !]" Z5Pk ( C ^y8 T   PT B  P 3 A T E#  P 6i Ed  NAT"n !]" Z5Pk ( C ^y:  P 3 A  ~ :  P 3 A g: P 3 A 9 " P 6i 0 ;   DNS server" n !] " Z5Pk ( C ^yB P s *޽h ? ̙33  `TD(  T T  NFi `o  i nZ5Pk ( C ^y T  N;i `\  jV4Oj ' B ]xB T s *޽h ? ̙33  XD(  X X  NDpi `o  i nZ5Pk ( C ^y X  N@xi `\  jV4Oj ' B ]xB X s *޽h ? ̙33  \D(  \ \  Nxi_ж_ж `p  i nZ5Pk ( C ^y \  Ni_ж_ж    jV4Oj ' B ]xB \ s *޽h ? ̙33& " &&//`%(  ` `  N4i_ж_ж `p   nZ5Pk ( C ^yRB ` s *DJl `b ``b,$D  0HB `B C Dc$ ` 0i_ж_ж Pc 1990(n( # Z5Pk ( C ^yR ` 0i_ж_ж `F 4Prediction of the exhaustion of IPv4 Class B by 1994&5n 5# 5Z5Pk ( C ^y:l PR `PR,$D  0HB `B C Dc$  ` 0i_ж_ж PS 1991(n( # Z5Pk ( C ^yB  ` 0i_ж_ж P6 $ROAD group formed to address routing&%n %# %Z5Pk ( C ^yQl @A  `@A,$D  0HB  `B C Dc$  ` 0Li_ж_ж oPB 1992(n( # Z5Pk ( C ^yY ` 0i_ж_ж @& ;Prediction of the exhaustion of IPv4 addresses by 2005-2011&<n <# <Z5Pk ( C ^y<l 02 `02,$D  0HB `B C Dc$ ` 0(i_ж_ж `P3 1993(n( # Z5Pk ( C ^yD ` 0x_ж_ж 0 &IPng Proposals solicitation (RFC 1550)&'n '# 'Z5Pk ( C ^yPl  " ` ",$D  0HB `B C Dc$ ` 04_ж_ж PP# 1994(n( # Z5Pk ( C ^yX ` 0˸_ж_ж   :CATNIP, SIPP, TUBA analyzed. SIPP+ chosen. IPng wg started&;n ;# ;Z5Pk ( C ^y3l   ` ,$D  0HB `B C Dc$ ` 0|_ж_ж ?P  1995(n( # Z5Pk ( C ^y; ` 0_ж_ж  First specification: RFC 1883&n # Z5Pk ( C ^yEl    `  ,$D  0HB `B C Dc  $ ` 0*_ж_ж  P  1997(n( # Z5Pk ( C ^yM ` 00-_ж_ж    /First attempt for provider-based address format&0n 0# 0Z5Pk ( C ^y/l    `  ,$D   0HB  `B C Dcn o $ !` 0>_ж_ж  P  1998(n( # Z5Pk ( C ^y7 "` 0D_ж_ж    First IPv6 exchange: 6tap&n # Z5Pk ( C ^yGl    #`  ,$D   0HB $`B C Dc_ ` $ %` 0O_ж_ж  P  1999(n( # Z5Pk ( C ^yO &` 0W_ж_ж    1Registries assign IPv6 prefixes. IPv6Forum formed&2n 2# 2Z5Pk ( C ^yPl    '`  ,$D   0HB (`B C DcO P $ )` 0j_ж_ж  P  2000(n( # Z5Pk ( C ^yX *` 0p_ж_ж    :Major vendors bundle IPv6 in their mainstream product line&;n ;# ;Z5Pk ( C ^y#l    +`  ,$D  0HB ,`B C Dc  $ -` 0`_ж_ж 0 P  1996(n( # Z5Pk ( C ^y+ .` 0\_ж_ж     6bone started&n # Z5Pk ( C ^yB /` s *޽h ? ̙33 " dD(  d d  N@_ж_ж `p   nZ5Pk ( C ^y d  N_ж_ж `]  jV4Oj ' B ]xB d s *޽h ? ̙33  hD(  h h  N| `o   nZ5Pk ( C ^y h  N `\  jV4Oj ' B ]xB h s *޽h ? ̙33   lD(  l l  N4_ж_ж `p   nZ5Pk ( C ^y l  N@_ж_ж `]  jV4Oj ' B ]xB l s *޽h ? ̙33  @pD(  p p  N_ж_ж `p   nZ5Pk ( C ^y p  N_ж_ж `   jV4Oj ' B ]xB p s *޽h ? ̙33  `t<(  t t  N_ж_ж )   nZ5Pk ( C ^yB t s *޽h ? ̙33  xD(  x x  N_ж_ж `p   nZ5Pk ( C ^y x  NP_ж_ж `]  jV4Oj ' B ]xB x s *޽h ? ̙33 " |D(  | |  NDq_ж_ж `p   nZ5Pk ( C ^y |  N]_ж_ж `]  jV4Oj ' B ]xB | s *޽h ? ̙33  D(     N_ж_ж `p   nZ5Pk ( C ^y   NP_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33  D(     N(_ж_ж .p   nZ5Pk ( C ^y   N_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33  D(     Nĭ_ж_ж `p   nZ5Pk ( C ^y   Ṋ_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33   D(     N_ж_ж `p   nZ5Pk ( C ^y   N|_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33   @D(     Np_ж_ж `p   nZ5Pk ( C ^y   N2_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 !" `<(     NF_ж_ж )   nZ5Pk ( C ^yB  s *޽h ? ̙33 " D(     N0W_ж_ж `p   nZ5Pk ( C ^y   N,__ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33T # '+(     Ng_ж_ж `p   nZ5Pk ( C ^y   Nw_ж_ж 0-  jV4Oj ' B ]x8 eJ eJ`"  0GK3$p?,  <}_ж_ж eK header". ! Z5Pk ( C ^y8 `n `n`"  0GZ$`o*  <D_ж_ж `o Ver.". ! Z5Pk ( C ^y8 `x   x` `"   0GZ3$` 4   <_ж_ж `x  identification". ! Z5Pk ( C ^y8     `"   0GZ$ )  <_ж_ж   TOS". ! Z5Pk ( C ^y8    `"  0GZ$ 2  <_ж_ж    total length" .  ! Z5Pk ( C ^y8  xZ  x Z `"  0GZ3$ O *  <ȷ_ж_ж  x[  flag". ! Z5Pk ( C ^y8 P x xP `"  0GZ3$P 5  <Þ_ж_ж P x fragment offset". ! Z5Pk ( C ^y8 `h h``"  0GZ$`o)  <Ξ_ж_ж `h TTL". ! Z5Pk ( C ^y8 h  h `"  0GZ$ o.  <ڞ_ж_ж h  Protocol" .  ! Z5Pk ( C ^y8  h h `"  0GZ3$ o.   <|_ж_ж  h Checksum" .  ! Z5Pk ( C ^y8 `Xw  !X`w `" " 0GZ$`p_ < # <_ж_ж `Xx  32 bits Source Address". ! Z5Pk ( C ^y8 `H g  $H `g `" % 0GZ$`` O A & <o_ж_ж `H h  32 bits Destination Address". ! Z5Pk ( C ^yX" ' 0G83$ `@ X" ( 0G8$ `@B ) 0,_ж_ж   M 0Removed or moved out of the basic header changed"1. 1! 1Z5Pk ( C ^yF" * S G 1B + s *޽h ? ̙33 $" A(     N̔_ж_ж `p   nZ5Pk ( C ^y   NP0e0e `]  jV4Oj ' B ]x8 0X>w X0>wT"  c $GZ$0p?_6  <_ж_ж 0X?x Ver... !! Z5Pk ( C ^y8 0H g H0 gT"  c $GZ$0` ON  <l_ж_ж 0H h Payload Length<. !!! Z5Pk ( C ^y8 9X w  X9 wT"   c $GZ$@p _2   <x_ж_ж 9X x  TrafficClass" .  ! Z5Pk ( C ^y8  X~w  X ~w`"   0GZ3$ p_J  <Ŕ_ж_ж  Xx  Flow Label< . !!! Z5Pk ( C ^y8  Hg H gT"  c $GZ$ `OK  <tҔ_ж_ж  Hh  Next Header< . !!! Z5Pk ( C ^y8 H~g H~gT"  c $GZ$`OI  <ߔ_ж_ж Hh  Hop Limit< . !!! Z5Pk ( C ^y8 0P~N  P0~N T"  c $G$0PO >  <8_ж_ж 0PO  128 bits Source Address". ! Z5Pk ( C ^y8 0P ~N  P 0~N T"  c $G$0P O B  <o_ж_ж 0P O  128 bits Destination Address". ! Z5Pk ( C ^yX"  0G83$ppP  04s_ж_ж  New". ! Z5Pk ( C ^yB  s *޽h ? ̙33 %" F(     NĊ_ж_ж `]  lX4Oj ' B ]x   N_ж_ж `p   nZ5Pk ( C ^yB  s *޽h ? ̙33 & F(     Nt_ж_ж `]  lX4Oj ' B ]x   Np_ж_ж `p   nZ5Pk ( C ^yB  s *޽h ? ̙33 '  F(     N`nj_ж_ж `p   nZ5Pk ( C ^y   N\ό_ж_ж `]  lX4Oj ' B ]xB  s *޽h ? ̙33% ( @S(     N8_ж_ж `p   nZ5Pk ( C ^y   NT_ж_ж `]  jV4Oj ' B ]xR"  s *G(3  P] R"  s *G(3  P] R"  s *G(3  R"  s *G(̙3f  p } R"  s *G(̙3f  R"  s *G(̙3f P]  R"  s *G(f 0= R"  s *G(f  0= R"  s *G(f  0=A  6hh f   TCP Header + Data: n :]n :# Z5Pk ( C ^yR  6/mhh    "IPv6 Header Next Header = Routing: n :]n :## #Z5Pk ( C ^yQ  67mhh  P  !Routing Header Next Header = TCP:n :]n :"# "Z5Pk ( C ^yA  6@Mmhh }  TCP Header + Data: n :]n :# Z5Pk ( C ^yN  6Smhh  IPv6 Header Next Header = TCP: n :]n :# Z5Pk ( C ^yR  6hmhh   "IPv6 Header Next Header = Routing: n :]n :## #Z5Pk ( C ^yJ  0tmhh  @   Routing Header Next Header = ESP:n :]n :!# !Z5Pk ( C ^yM  6 ymhh   ESP Header Next Header = TCP: n :]n :# Z5Pk ( C ^yA  6{mhh M 3! TCP Header + Data: n :]n :# Z5Pk ( C ^yB  s *޽h ? ̙33 )" `D(     NԠm_ж_ж `p  m nZ5Pk ( C ^y   NШm_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 * D(     N(m_ж_ж `p  m nZ5Pk ( C ^y   NDm_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 + <(     Nm_ж_ж )  m nZ5Pk ( C ^yB  s *޽h ? ̙33 , D(     N$m_ж_ж `p  m nZ5Pk ( C ^y   N m_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 - D(     NLи_ж_ж `p  m nZ5Pk ( C ^y   N ָ_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 . D(     N\ָ_ж_ж `p   nZ5Pk ( C ^y   N\_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33H  /"   v (     N_ж_ж `p   nZ5Pk ( C ^y   Nh_ж_ж 0-  jV4Oj ' B ]xL"  c $Gp  L"  c $Gp  $  0_ж_ж     Interface ID( n(  # Z5Pk ( C ^y)  0X_ж_ж  p  Prefix for a site(n( # Z5Pk ( C ^yL"  c $Gp q   00_ж_ж  @  Subnet(n( # Z5Pk ( C ^ydB  <D{) o* dB  <D{) q * dB  <D{) *   0@<_ж_ж ) A 48 bits&n( # Z5Pk ( C ^y  0C_ж_ж ) 1  16 bits&n( # Z5Pk ( C ^y  0H_ж_ж )  64 bits&n( # Z5Pk ( C ^yB  s *޽h ? ̙33 0 @D(     N`_ж_ж `p   nZ5Pk ( C ^y   Nh_ж_ж 0-  jV4Oj ' B ]xB  s *޽h ? ̙33 1 `D(     N|_ж_ж q   nZ5Pk ( C ^y   N|_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33  2"   > (     N_ж_ж `p   nZ5Pk ( C ^y   N _ж_ж `]  jV4Oj ' B ]xL"  c $Gp@` `L"  c $Gp@L"  c $Gp@``$  0॥_ж_ж @ 0'  Interface ID( n(  # Z5Pk ( C ^yL"  c $G@`L"  c $Gp@L"  c $Gp@   0Է_ж_ж @ 0 ' SLA(n( # Z5Pk ( C ^ydB  <D{`_ adB  <D{` ` adB  <D{`` `a  0 å_ж_ж `` G 48 bits&n( # Z5Pk ( C ^y  0ͥ_ж_ж `p G 16 bits&n( # Z5Pk ( C ^y  0ץ_ж_ж `@G 64 bits&n( # Z5Pk ( C ^yB  s *޽h ? ̙33 3 D(     N_ж_ж `p   nZ5Pk ( C ^y   N_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙336  4  d(     N_ж_ж `p   nZ5Pk ( C ^y   N _ж_ж `   jV4Oj ' B ]xL"  c $Gp Y L"  c $Gp Y $  0δ_ж_ж     Interface ID( n(  # Z5Pk ( C ^y"  0 _ж_ж   w   fe80:0:0:0( n(  # Z5Pk ( C ^ydB  <D{  dB  <D{    0*_ж_ж  A  64 bits&n( # Z5Pk ( C ^y  0<_ж_ж   64 bits&n( # Z5Pk ( C ^yB  s *޽h ? ̙33 5" D(     NN_ж_ж `p   nZ5Pk ( C ^y   NDV_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33?  6   m (     Nk_ж_ж `p   nZ5Pk ( C ^y   Ns_ж_ж    jV4Oj ' B ]xL"  c $GpY@ @L"  c $GpY@@$  0Xs_ж_ж Yp @  Interface ID( n(  # Z5Pk ( C ^y   0䁦_ж_ж P>7 fec0:0:0( n(  # Z5Pk ( C ^yL"  c $GpY?   0ȏ_ж_ж Y? @ Subnet(n( # Z5Pk ( C ^ydB  <D{y?zdB  <D{y @ zdB  <D{y@ @z  0_ж_ж y@` 48 bits&n( # Z5Pk ( C ^y  0<_ж_ж yP ` 16 bits&n( # Z5Pk ( C ^y  0D_ж_ж y ` 64 bits&n( # Z5Pk ( C ^yB  s *޽h ? ̙33 7  D(     N<Ȧ_ж_ж `p   nZ5Pk ( C ^y   NЦ_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33/ 8" ..@CP6.(     N_ж_ж `p   nZ5Pk ( C ^y   N_ж_ж `C  jV4Oj ' B ]x*8 @Q  @Q @ , A L  , A L N"  S GP , A M .  0_ж_ж , A M  Solicited-Node(n ' Z5Pk ( C ^y@ A ) L  A ) L N"  S GP A * M *   0_ж_ж A * M   Link-local( n  ' Z5Pk ( C ^y@ A L   A L N"   S GP A M 1   0_ж_ж A M  FF02::1:FFXX:XXXX(n ' Z5Pk ( C ^y@ , 1 <   , 1 < N"  S GP , 1 = +  0_ж_ж , 1 =   All Routers( n  ' Z5Pk ( C ^y@ 1 ) <  1 ) < N"  S GP 1 * = *  0_ж_ж 1 * =   Site-local( n  ' Z5Pk ( C ^y@ 1 <  1 < N"  S GP 1 = '  0)_ж_ж 1 =  FF05::2(n ' Z5Pk ( C ^y@ , $ /  , $ / N"  S GP , $ 0 +  03_ж_ж , $ 0   All Routers( n  ' Z5Pk ( C ^y@ $ ) /  $ ) / N"  S GP $ * 0 *  0h?_ж_ж $ * 0   Link-local( n  ' Z5Pk ( C ^y@ $ /  $ / N"  S GP $ 0 '  0Q_ж_ж $ 0  FF02::2(n ' Z5Pk ( C ^y@ ,    ,   N"   S GP ,  ! + ! 0U_ж_ж ,  !   All Routers( n  ' Z5Pk ( C ^y@  )  " ) N" # S GP  * ! * $ 0a_ж_ж  * !   Node-local( n  ' Z5Pk ( C ^y@    %  N" & S GP  ! ' ' 0l_ж_ж  !  FF01::2(n ' Z5Pk ( C ^y@ ,   (,  N" ) S GU ,  ) * 0hz_ж_ж ,    All Nodes( n  ' Z5Pk ( C ^y@ )   +)  N" , S GU *  * - 0_ж_ж *    Link-local( n  ' Z5Pk ( C ^y@   . N" / S GU  ' 0 0d_ж_ж   FF02::1(n ' Z5Pk ( C ^y@ , _ 1, _N" 2 S G1 , _* 3 0؛_ж_ж , _  All Nodes ( n  ' Z5Pk ( C ^y@ _)  4_) N" 5 S G1 _* * 6 0$_ж_ж _*   Node-local( n  ' Z5Pk ( C ^y@ _ 7_N" 8 S G1 _' 9 0 _ж_ж _ FF01::1(n ' Z5Pk ( C ^y@ , @Z :, @ZN" ; S GL , @[$ < 0_ж_ж , @[ Use (n( x% Z5Pk ( C ^y@ @) Z =@) ZN" > S GL @* [% ? 0<̧_ж_ж @* [ Scope(n( x% Z5Pk ( C ^y@ @Z @@ZN" A S GL @[' B 0֧_ж_ж @[ Address(n( x% Z5Pk ( C ^yHB C C Do@AHB D C D81_`HB E C D81HB F C D81  HB G C D81$ % HB H C D811 2 HB I C D81A B HB J C DoQ R HB K C Do@Q HB L C D81@Q HB M C D81, @- Q HB N C Do@Q : O 08ݧ 07 ,to find all nodes on the link: ping6 ff02::1-. -! -Z5Pk ( C ^yB P s *޽h ? ̙33I 9" KICI`oH(     N_ж_ж `p   nZ5Pk ( C ^yG8 0    0 @  J   J N"  S Gm  K )  0_ж_ж  K   2000-3FFF( n  ' Z5Pk ( C ^y@  J   J N"  S G^  K )  0$_ж_ж  K   1000-1FFF( n  ' Z5Pk ( C ^y@  J    J N"   S G^  K )   0_ж_ж  K   0800-0FFF( n  ' Z5Pk ( C ^y@  J    J N"   S G^  K )  0$_ж_ж  K   0600-07FF( n  ' Z5Pk ( C ^y@ )J  )J N"  S G^ )K  )  0(_ж_ж )K    0400-05FF( n  ' Z5Pk ( C ^y@ ?J # ?J #N"  S G^ ?K $)  04_ж_ж ?K $  0200-03FF( n  ' Z5Pk ( C ^y@ WJ ; WJ ;N"  S G^ WK <)  0t@_ж_ж WK <  0100-01FF( n  ' Z5Pk ( C ^y@ pJ S pJ SN"  S G^ pK T)  0@L_ж_ж pK T  0000-00FF( n  ' Z5Pk ( C ^y@  J k  J kN"  S GA  K l#  0 X_ж_ж  K l Hex(n /' Z5Pk ( C ^y@      N"  S Gm   ;   0c_ж_ж    Unicast: IANA to registries(n ' Z5Pk ( C ^y@ N  !N N" " S Gm N # # 0u_ж_ж N  1/8(n ' Z5Pk ( C ^y@ 0   $0  N" % S Gm 0  # & 0_ж_ж 0   001(n ' Z5Pk ( C ^y@    '  N" ( S G^   * ) 0_ж_ж     Unassigned( n  ' Z5Pk ( C ^y@ N  *N N" + S G^ N $ , 0_ж_ж N  1/16(n ' Z5Pk ( C ^y@ 0   -0  N" . S G^ 0  $ / 0@_ж_ж 0   0001(n ' Z5Pk ( C ^y@    0  N" 1 S G^   * 2 0D_ж_ж     Unassigned( n  ' Z5Pk ( C ^y@ N  3N N" 4 S G^ N $ 5 0_ж_ж N  1/32(n ' Z5Pk ( C ^y@ 0   60  N" 7 S G^ 0  & 8 0è_ж_ж 0   0000 1(n ' Z5Pk ( C ^y@     9   N" : S G^    * ; 0Ǩ_ж_ж      Unassigned( n  ' Z5Pk ( C ^y@ N   <N  N" = S G^ N  % > 0ڨ_ж_ж N   1/128(n ' Z5Pk ( C ^y@ 0   ?0  N" @ S G^ 0  ( A 0tި_ж_ж 0   0000 011( n  ' Z5Pk ( C ^y@  )  B ) N" C S G^  ) * D 0x_ж_ж  )   Unassigned( n  ' Z5Pk ( C ^y@ N )  EN ) N" F S G^ N )  % G 0_ж_ж N )   1/128(n ' Z5Pk ( C ^y@ 0)  H0) N" I S G^ 0) ( J 0 _ж_ж 0)  0000 010( n  ' Z5Pk ( C ^y@  ?# K ?#N" L S G^  ?$$ M 0 _ж_ж  ?$ NSAP(n ' Z5Pk ( C ^y@ N ? # NN ? #N" O S G^ N ? $% P 0_ж_ж N ? $ 1/128(n ' Z5Pk ( C ^y@ 0?# Q0?#N" R S G^ 0?$( S 0"_ж_ж 0?$ 0000 001( n  ' Z5Pk ( C ^y@  W; T W;N" U S G^  W<* V 05_ж_ж  W<  Unassigned( n  ' Z5Pk ( C ^y@ N W ; WN W ;N" X S G^ N W <% Y 00A_ж_ж N W < 1/256(n ' Z5Pk ( C ^y@ 0W; Z0W;N" [ S G^ 0W<) \ 0D_ж_ж 0W<  0000 0001( n  ' Z5Pk ( C ^y@  pS ] pSN" ^ S G^  pT( _ 0W_ж_ж  pT Reserved( n  ' Z5Pk ( C ^y@ N p S `N p SN" a S G^ N p T% b 0Hc_ж_ж N p T 1/256(n ' Z5Pk ( C ^y@ 0pS c0pSN" d S G^ 0pT) e 0 g_ж_ж 0pT  0000 0000( n  ' Z5Pk ( C ^y@  k f kN" g S GA  l* h 0z_ж_ж  l  Allocation( n / ' Z5Pk ( C ^y@ N  k iN  kN" j S GA N  l% k 0`_ж_ж N  l Size (n /' Z5Pk ( C ^y@ 0 k l0 kN" m S GA 0 l' n 0_ж_ж 0 l Prefix (n /' Z5Pk ( C ^yHB o C Do0 !HB p C D0pqHB q C D810WXHB r C D810?@HB s C D810)*HB t C D810  HB u C D810  HB v C D810  HB w C D810  HB x C Do0  HB y C Do0 1pHB z C D81N O HB { C D81  HB | C Do pHB } C Do0p1 HB ~ C Dop HB  C D81  B  s *޽h ? ̙33yQ :" Q Q{P(     NP_ж_ж `p   nZ5Pk ( C ^ycO8 k  k @  *   * N"  S G^  + )  0Ъ_ж_ж  +   FF00-FFFF( n  ' Z5Pk ( C ^y@  *   * N"  S G^  + )  0l_ж_ж  +   FEC0-FEFF( n  ' Z5Pk ( C ^y@  *    * N"   S G^  + )   0pƩ_ж_ж  +   FE80-FEBF( n  ' Z5Pk ( C ^y@  *    * N"   S G^  + )  0$ͩ_ж_ж  +   FE00-FE7F( n  ' Z5Pk ( C ^y@ ! *   ! *  N"  S G^ ! +  )  0թ_ж_ж ! +    FC00-FDFF( n  ' Z5Pk ( C ^y@ W*   W*  N"  S Gm W+  )  0_ж_ж W+    F800-FBFF( n  ' Z5Pk ( C ^y@ m* Q m* QN"  S G^ m+ R)  0x_ж_ж m+ R  F000-F7FF( n  ' Z5Pk ( C ^y@ * i * iN"  S G^ + j)  0$_ж_ж + j  D000-EFFF( n  ' Z5Pk ( C ^y@ )*  )* N"  S G> )+ )  0l_ж_ж )+   4000-CFFF( n  ' Z5Pk ( C ^y@ * $ * $N"  S GF + %#   0_ж_ж + % Hex(n /' Z5Pk ( C ^y@  g  ! g N" " S G^  h ) # 0 _ж_ж  h   Multicast( n  ' Z5Pk ( C ^y@ /   $/  N" % S G^ /  % & 0t&_ж_ж /   1/256(n ' Z5Pk ( C ^y@    '  N" ( S G^   ) ) 01_ж_ж     1111 1111( n  ' Z5Pk ( C ^y@  g  * g N" + S G^  h * , 0D_ж_ж  h   Site-local( n  ' Z5Pk ( C ^y@ /   -/  N" . S G^ /  & / 0O_ж_ж /   1/1024(n ' Z5Pk ( C ^y@    0  N" 1 S G^   , 2 0S_ж_ж     1111 1110 11( n  ' Z5Pk ( C ^y@  g  3 g N" 4 S G^  h * 5 0(__ж_ж  h   Link-local( n  ' Z5Pk ( C ^y@ /   6/  N" 7 S G^ /  & 8 0q_ж_ж /   1/1024(n ' Z5Pk ( C ^y@    9  N" : S G^   , ; 0u_ж_ж     1111 1110 10( n  ' Z5Pk ( C ^y@  g  < g N" = S G^  h * > 0_ж_ж  h   Unassigned( n  ' Z5Pk ( C ^y@ /    ?/   N" @ S G^ /   % A 0\_ж_ж /    1/512(n ' Z5Pk ( C ^y@    B  N" C S G^   + D 0l_ж_ж     1111 1110 0( n  ' Z5Pk ( C ^y@ ! g  E! g N" F S G^ ! h * G 0p_ж_ж ! h   Unassigned( n  ' Z5Pk ( C ^y@ / !   H/ !  N" I S G^ / !  % J 0_ж_ж / !   1/128(n ' Z5Pk ( C ^y@ !   K!  N" L S G^ !  ( M 0_ж_ж !   1111 110( n  ' Z5Pk ( C ^y@ Wg  NWg N" O S Gm Wh * P 0ͪ_ж_ж Wh   Unassigned( n  ' Z5Pk ( C ^y@ / W  Q/ W N" R S Gm / W $ S 0ت_ж_ж / W  1/64(n ' Z5Pk ( C ^y@ W  TW N" U S Gm W ' V 0_ж_ж W  1111 10(n ' Z5Pk ( C ^y@ mgQ WmgQN" X S G^ mhR* Y 0_ж_ж mhR  Unassigned( n  ' Z5Pk ( C ^y@ / mQ Z/ mQN" [ S G^ / mR$ \ 0l_ж_ж / mR 1/32(n ' Z5Pk ( C ^y@ mQ ]mQN" ^ S G^ mR& _ 0_ж_ж mR 1111 0(n ' Z5Pk ( C ^y@ gi `giN" a S G^ hj* b 0 _ж_ж hj  Unassigned( n  ' Z5Pk ( C ^y@ / i c/ iN" d S G^ / j$ e 0_ж_ж / j 1/16(n ' Z5Pk ( C ^y@ i fiN" g S G^ j$ h 0x'_ж_ж j 1110(n ' Z5Pk ( C ^y@ )g i)gN" j S G> )h* k 0P+_ж_ж )h  Unassigned( n  ' Z5Pk ( C ^y@ / ) l/ )N" m S G> / )- n 07_ж_ж / )  5 * 1/8 = 5/8(n ' Z5Pk ( C ^y@ ) o)N" p S G> )7 q 0B_ж_ж ) 010, 011, 100, 101, 110(n ' Z5Pk ( C ^y@ g$ rg$N" s S GF h%* t 0N_ж_ж h%  Allocation( n / ' Z5Pk ( C ^y@ / $ u/ $N" v S GF / %% w 0|Z_ж_ж / % Size (n /' Z5Pk ( C ^y@ $ x$N" y S GF %' z 0l_ж_ж % Prefix (n /' Z5Pk ( C ^yHB { C DokHB | C D)k*HB } C D81kHB ~ C D81mknHB  C D81WkXHB  C D81! k" HB  C D81 k HB  C D81 k HB  C D81 k HB  C Do k HB  C Do)HB  C D81/ 0 HB  C D81 HB  C Dokl)HB  C Do) HB  C Dok)l HB  C D81 k HB  C D81 B  s *޽h ? ̙33 ;" D(     NЁ_ж_ж `p   nZ5Pk ( C ^y   N^_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 < D(     N4_ж_ж `p   nZ5Pk ( C ^y   N_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 = <(     No_ж_ж )   nZ5Pk ( C ^yB  s *޽h ? ̙33 > D(     Np̫_ж_ж `p   nZ5Pk ( C ^y   Nԫ_ж_ж `  jV4Oj ' B ]xB  s *޽h ? ̙33 ?   D(       N_ж_ж `p   nZ5Pk ( C ^y    N _ж_ж `]  jV4Oj ' B ]xB   s *޽h ? ̙33 @ @D(     Np_ж_ж `p   nZ5Pk ( C ^y   N_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 A" `D(     N_ж_ж `p   nZ5Pk ( C ^y   N( _ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 B D(     N9_ж_ж `p   nZ5Pk ( C ^y   NlA_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33@ C n(     NT_ж_ж `p   nZ5Pk ( C ^yH  0a_ж_ж `c Application F n( y.(  #  Z5Pk ( C ^y8 P  P T"  c $GA$P '  <f_ж_ж P  TCP . ! Z5Pk ( C ^y8  +   + T"  c $GA$ , '  <@r_ж_ж  ,  UDP . ! Z5Pk ( C ^y8 P k    P k T"   c $GA$P l (   <}_ж_ж P l  IPv4 . ! Z5Pk ( C ^y8  +k    +k T"   c $GA$ ,l (  <h_ж_ж  ,l  IPv6 . ! Z5Pk ( C ^y8 P ++  P++T"  c $GA$P ,,8  <_ж_ж P ,, Data link (Ethernet) . ! Z5Pk ( C ^ydB  <D  dB  <DP Q dB  <D  dB  <DP Q dB  <D   dB  <D{ % dB @ <Dm a o dB  <Dg 1 <    62ܧ_ж_ж $ D 0x86dd$n /# Z5Pk ( C ^y   63_ж_ж   0x0800$n /# Z5Pk ( C ^yB  s *޽h ? ̙33 D" *"* (       N8¬_ж_ж `p   nZ5Pk ( C ^y    0Ŭ_ж_ж 0  IPv4 header$ n  #  Z5Pk ( C ^y   0Ь_ж_ж 4   IPv6 header$ n  #  Z5Pk ( C ^y+   6d۬_ж_ж   Transport header$n #  Z5Pk ( C ^y.   0_ж_ж   Application protocol data$n #  Z5Pk ( C ^yL"   c $GK{`J@B   C D{pq@B   C D{ @B   C D{ dB   <D{ `D dB   <D{S pPT dB   <D{ P dB   <D{ P 8 0 ]    0 ] T"   c $G 0 \ +   0_ж_ж 0 ^   IPv4 datagram&n( #  Z5Pk ( C ^y8       T"   c $G   +   0 _ж_ж     IPv6 datagram&n( #  Z5Pk ( C ^y8  <    <  T"   c $G  <  ,   0 _ж_ж  <   Transport data&n( #  Z5Pk ( C ^y8  s    s  T"   c $G  s  .   0_ж_ж  s   Application data&n( #  Z5Pk ( C ^yFB   S D{pqS FB   S D{`a FB   S D{JK FB   S D{ FB   S D{ !   0$_ж_ж   IPv6 datagram$n #  Z5Pk ( C ^y   0/_ж_ж 4   IPv6 header$ n  #  Z5Pk ( C ^y+ !  6:_ж_ж   Transport header$n #  Z5Pk ( C ^y. "  0G_ж_ж   Application protocol data$n #  Z5Pk ( C ^yL" #  c $GK{jJ@B $  C D{ @B %  C D{ XB &  0D{jkXB '  0D{JK? (  0R_ж_ж    +Encapsulated IPv6 datagram in IPv4 datagram$,n ,#  ,Z5Pk ( C ^y^B )  6D{MNB *  s *޽h ? ̙33 E" $C(  $ $  Ni_ж_ж `p   nZ5Pk ( C ^y $  Np_ж_ж `   jV4Oj ' B ]x8   $ N" $ S G  Y $ 0 q_ж_ж    Z0 %Zn0  Z'' `,5P k  (C^yB $ s *޽h ? ̙33 F  (D(  ( (  N_ж_ж `p   nZ5Pk ( C ^y (  N_ж_ж `]  jV4Oj ' B ]xB ( s *޽h ? ̙33 G  ,D(  , ,  N_ж_ж `p   nZ5Pk ( C ^y ,  NH_ж_ж `]  jV4Oj ' B ]xB , s *޽h ? ̙332 H 2x2@ <I02(  0 0  Nŭ_ж_ж `p   nZ5Pk ( C ^yl ;  0; ,$D 0\@ *  0* T" 0 c $Gz{D? ' 0 0p̭_ж_ж    IPv6 header$ n F "  Z5Pk ( C ^yT" 0 c $Gz{+? % 0 0ӭ_ж_ж +   IPv6 data$ n F "  Z5Pk ( C ^y0 0 0a_ж_ж  <  Src= 3ffe:b00:a:1::1$n0 A"  Z5Pk ( C ^yl  q  0 q,$D 0-  0 08_ж_ж er IPv4= 192.168.1.1$n0 A"  Z5Pk ( C ^y-  0 0_ж_ж c  f IPv4= 192.168.2.1$n0 A"  Z5Pk ( C ^y\  0 0_ж_ж   ,$D 0 Dst= 3ffe:b00:a:3::2$n0 A"  Z5Pk ( C ^yX  0 08_ж_ж   S ,$D 0 Src= 192.168.1.1$n0 A"  Z5Pk ( C ^yX 0 0_ж_ж   ,$D  0 Dst= 192.168.2.1$n0 A"  Z5Pk ( C ^y8l a$  0a$ ,$D  0Z2 0 s *333{ % Z2 0 s *333{gb8l u !  0u ! ,$D   0Z2 0 s *{uGZ2 0 s *{ " 8l   0 ,$D   0Z2 0 s *{ Z2 0 s *{S  6@B 0 C D{G: 0 3 A \C8 g x 0g xB 0 3 Ah y& 0 6L+_ж_ж   h IPv4$n ]"  Z5Pk ( C ^y: 0 3 A .C: 0 3 A. N 8 y G 0y GB  0 3 Ay H& !0 6`7_ж_ж :P IPv6$n ]"  Z5Pk ( C ^yl 'd "0'd,$D 01 #0 0=_ж_ж .f IPv6= 3ffe:b00:a:1::1$n0 A"  Z5Pk ( C ^y0 $0 0(G_ж_ж h ('  IPv6=3ffe:b00:a:1::2$n0 A"  Z5Pk ( C ^y+ %0 0Q_ж_ж @ 3ffe:b00:a:3::2$n0 A"  Z5Pk ( C ^yB &0 <D{  G,$D  0_ '0 0X__ж_ж  ',$D  0 3ffe:b00:a:5::1$n0 A"  Z5Pk ( C ^yB (0B <D{[  e,$D  0l  ]  )0 ] ,$D  0\@ ! o  *0! o T" +0 c $Gy{ A ' ,0 0h_ж_ж ! A   IPv6 header$ n F "  Z5Pk ( C ^yT" -0 c $Gy{pA % .0 0Ht_ж_ж p   IPv6 data$ n F "  Z5Pk ( C ^yfB /0 6D{ o 0 00 0_ж_ж  ^>  Src= 3ffe:b00:a:1::1$n0 A"  Z5Pk ( C ^y0 10 0_ж_ж  6  Dst= 3ffe:b00:a:3::2$n0 A"  Z5Pk ( C ^y8l   20 ,$D  0Z2 30 s *{  Z2 40 s *{ l kJ s  50Jk s ,$D 0@ |+ t  60|+ t f" 70 6GvA{Y| 3 ' 80 0_ж_ж |, u   IPv4 header$ n F "  Z5Pk ( C ^y\@ A | t  90A | t T" :0 c $Gv{ | 3 ' ;0 0_ж_ж A |d u   IPv6 header$ n F "  Z5Pk ( C ^yT" <0 c $Gv{ | 3 % =0 0_ж_ж  | u   IPv6 data$ n F "  Z5Pk ( C ^yfB >0 6D{kR@ J  ?0J @ f  @0f T2 A0 c $lpl fZ" B0 s *Glpl Qf  C0 BkC=DEF$I86  <E<Y0j@$|i  D0 BkC=DEF$I86  <E<Y0j@$|i Z2 E0 s *6GIɸ$Z g r F0 BB CDEF$?? |#q)f0[5Q=HF?M6V.`'j u~  #/:C K'U._6i?rHzQ[fq|@gQHB G0 C D$Hf g0 H0 0_ж_ж JB   IPv6 in IPv4, n8 ] &  Z5Pk ( C ^yB I0 s *޽h ? ̙332 I" Q2I2` BL41(  4 4  N$Ӯ_ж_ж `p   nZ5Pk ( C ^yDl  4,$D 0HB 4 C D{CB 4 3 A AB 4 3 A uAB 4 3 A ~Sc@ [Zn 4[ZnB 4 3 A[[o&  4 6l߮_ж_ж  = IPv6$n ]"  Z5Pk ( C ^y@ K^  4K^B  4 3 AK_&  4 6_ж_ж U- IPv6$n ]"  Z5Pk ( C ^yB  4 3 Atm Y@  z  4 z B 4 3 A { & 4 6_ж_ж    IPv4$n ]"  Z5Pk ( C ^yl   4 ,$D 0T" 4 c $Go{F ' 4 0_ж_ж    IPv6 header$ n F "  Z5Pk ( C ^yT" 4 c $Go{D % 4 0 _ж_ж D   IPv6 data$ n F "  Z5Pk ( C ^y\ 4 0_ж_ж   ,$D 0 Src= 3ffe:b00:a:1::1$n0 A"  Z5Pk ( C ^y\ 4 0l_ж_ж R ~ ,$D 0 Dst= 3ffe:b00:a:3::2$n0 A"  Z5Pk ( C ^yX 4 0)_ж_ж  } ,$D  0 Src= 192.168.1.1$n0 A"  Z5Pk ( C ^yX 4 06_ж_ж S | ,$D  0 Dst= 192.168.2.1$n0 A"  Z5Pk ( C ^y8l Bhyk  4hByk ,$D  0Z2 4 s *333{ zl Z2 4 s *333{BhI8l h h  4h h ,$D   0Z2 4 s *{h Z2 4 s *{S i 8l Q `   4`Q  ,$D   0Z2 !4 s *{Q F Z2 "4 s *{ `l hz=! #4zh=!,$D 0+ $4 0B_ж_ж h{A" 3ffe:b00:a:1::1$n0 A"  Z5Pk ( C ^y+ %4 0M_ж_ж {z>! 3ffe:b00:a:3::2$n0 A"  Z5Pk ( C ^yl y   &4y  ,$D 0\@  #  '4 # T" (4 c $Gy{< ' )4 0Y_ж_ж     IPv6 header$ n F "  Z5Pk ( C ^yT" *4 c $Gy{$ % +4 0d_ж_ж $   IPv6 data$ n F "  Z5Pk ( C ^yfB ,4 6D{y 3 %4 0 -4 0o_ж_ж :   Src= 3ffe:b00:a:1::1$n0 A"  Z5Pk ( C ^y0 .4 0dz_ж_ж 97   Dst= 3ffe:b00:a:3::2$n0 A"  Z5Pk ( C ^y8l k=  /4k= ,$D  0Z2 04 s *{E ~ Z2 14 s *{9k> l !F  24!F ,$D  0@ F  34F @   44 f" 54 6GA{ \ b ' 64 0_ж_ж    IPv4 header$ n F "  Z5Pk ( C ^y\@  F  74 F T" 84 c $G{]  b ' 94 0L_ж_ж     IPv6 header$ n F "  Z5Pk ( C ^yT" :4 c $G{ G b % ;4 0؞_ж_ж  G   IPv6 data$ n F "  Z5Pk ( C ^yfB <4 6D{!  R@   2 =4  2@    >4  T2 ?4 c $lpl   Z" @4 s *Glpl  u  A4 B C5DEF$I86 4 4 % @ X  B4 B C5DEF$I86 4 4 % @ X Z2 C4 s *6GIɸ$K  r D4 BBCDEF$?? {qh#^'V.M4D<<C5L.U'^!gq{  &/7?!I'S.\5e<nDvM~V^hq{@  HB E4 C D$ n 0 F4 0_ж_ж   3  IPv6 in IPv4, n8 ] &  Z5Pk ( C ^yl  s{ G4s {,$D 0' H4 0L_ж_ж  y   192.168.1.1$ n0 A "  Z5Pk ( C ^y' I4 0¯_ж_ж ) s|  192.168.2.1$ n0 A "  Z5Pk ( C ^ylB J4 <D{  lB K4B <D{w  B L4 s *޽h ? ̙33 J"  8D(  8 8  Nٯ_ж_ж `p   nZ5Pk ( C ^y 8  N_ж_ж `]  jV4Oj ' B ]xB 8 s *޽h ? ̙33 K  <D(  < <  N_ж_ж `p   nZ5Pk ( C ^y <  N_ж_ж `]  jV4Oj ' B ]xB < s *޽h ? ̙33 L  @D(  @ @  N(_ж_ж `p   nZ5Pk ( C ^y @  N8Z_ж_ж `]  jV4Oj ' B ]xB @ s *޽h ? ̙339 M #99 OYD8(  D8l  P DP ,$D  0Z2 D s *{cZ2 D s *{ P D  N/_ж_ж `p   nZ5Pk ( C ^y8l k9  D9 k ,$D  0Z2 D s *{k9 ) Z2 D s *{A : D l  D,$D 0HB  D C D{0B  D 3 A 1yB  D 3 A b1y@ KG^  DKG^B  D 3 AKH_& D 6;_ж_ж  - IPv6$n ]"  Z5Pk ( C ^y@ ;O D;OB D 3 A;P& D 6@_ж_ж Apu IPv6$n ]"  Z5Pk ( C ^y@  g  D g B D 3 A h & D 6TL_ж_ж }   IPv4$n ]"  Z5Pk ( C ^y@ dU b DdU bB D 3 AdV E( D 0W_ж_ж C d 6to4,n8 ]&  Z5Pk ( C ^y@  UYS D UYSB D 3 A UZ5( D 0 i_ж_ж  GU 6to4,n8 ]&  Z5Pk ( C ^yl   D ,$D 0T" D c $Go{4 ' D 0m_ж_ж    IPv6 header$ n F "  Z5Pk ( C ^yT" D c $Go{2 % D 0tx_ж_ж 2   IPv6 data$ n F "  Z5Pk ( C ^y_  D 0_ж_ж   ,$D 0 Src= 2002:c0a8:101:1::1$n0 A"  Z5Pk ( C ^y_ !D 0 _ж_ж B > ,$D  0 Dst= 2002:c0a8:201:2::2$n0 A"  Z5Pk ( C ^yX "D 0X_ж_ж  j ,$D  0 Src= 192.168.1.1$n0 A"  Z5Pk ( C ^yX #D 0_ж_ж C i ,$D 0 Dst= 192.168.2.1$n0 A"  Z5Pk ( C ^y8l >a[  $Da>[ ,$D  0Z2 %D s *333{ \ Z2 &D s *333{>a8l X Y  'DX Y ,$D   0Z2 (D s *{XI Z2 )D s *{A Z 8l > Pv  *DP> v ,$D  0Z2 +D s *{> 6 Z2 ,D s *{ Pwl Uj -DjU,$D 0. .D 0ȳ_ж_ж Uk. 2002:c0a8:101:1::1$n0 A"  Z5Pk ( C ^y. /D 0P_ж_ж j 2002:c0a8:201:2::2$n0 A"  Z5Pk ( C ^y8l {[s  0D[{s ,$D   0Z2 1D s *{{5  Z2 2D s *{'[t l |3  3D|3 ,$D  0@ 3  4D3 @   5D f" 6D 6GA{I R ' 7D 0˰_ж_ж    IPv4 header$ n F "  Z5Pk ( C ^y\@  3  8D 3 T" 9D c $G{J  R ' :D 0װ_ж_ж     IPv6 header$ n F "  Z5Pk ( C ^yT" ;D c $G{ 4 R % D | "@    ?D  T2 @D c $lpl   Z" AD s *Glpl  b  BD B C8DEF$I86 7 7 ( @ E  CD B C8DEF$I86 7 7 ( @ E Z2 DD s *6GIɸ$8  r ED BBCDEF$?? {qh"^'V.M3D:<B5K.T']!fpz  )29C!M'W.`5i<rDzMV^hq{@  HB FD C D$ [ 0 GD 04_ж_ж  | #  IPv6 in IPv4, n8 ] &  Z5Pk ( C ^yl ch HDch,$D 0lB ID <D{  ' JD 0_ж_ж i   192.168.1.1$ n0 A "  Z5Pk ( C ^y' KD 0 _ж_ж  ci   192.168.2.1$ n0 A "  Z5Pk ( C ^ylB LD <D{i j 8l WYD  MDYWD ,$D  0Z2 ND s *{WiZ2 OD s *{YE l f O  PDf O ,$D 0\@    QD  T" RD c $Gx{*tx ' SD 0d_ж_ж     IPv6 header$ n F "  Z5Pk ( C ^yT" TD c $Gx{rx % UD 0\ _ж_ж r   IPv6 data$ n F "  Z5Pk ( C ^yfB VD 6D{f " # 3 WD 0+_ж_ж  m  Src= 2002:c0a8:101:1::1$n0 A"  Z5Pk ( C ^y3 XD 06_ж_ж  P  Dst= 2002:c0a8:201:2::2$n0 A"  Z5Pk ( C ^yB YD s *޽h ? ̙33 N"  HD(  H H  NTM_ж_ж `p   nZ5Pk ( C ^y H  N U_ж_ж `]  jV4Oj ' B ]xB H s *޽h ? ̙33 O  LD(  L L  Ni_ж_ж `p   nZ5Pk ( C ^y L  Nq_ж_ж `$  jV4Oj ' B ]xB L s *޽h ? ̙33X_ P ^^@ vP^(  P P  N_ж_ж `p   nZ5Pk ( C ^yl @ P@,$D 0@  0 2 P 0 2B P 3 A 1 3& P 6_ж_ж  U  IPv4$n ]"  Z5Pk ( C ^yB P 3 A  AB P 3 A3 l  u Pu ,$D 0HB  P C D{ R@ h u   Ph u @ h    Ph  T2  P c $lpl j  Z"  P s *Glpl    P BhC@DEF$I86 #?A?U/g@w   P BhC@DEF$I86 #?A?U/g@w  Z2 P s *6GIɸ$  r P BB CDEF$?? }#r)g0\7R@IH@P7Y/c(n!y % 1?HQ![(f/q7z@IR\gr}@h  HB P C D$  0 P 0h_ж_ж  u   IPv6 in IPv4, n8 ] &  Z5Pk ( C ^yl 7  P7 ,$D 0HB P C D{ @  PB P 3 A& P 6_ж_ж L IPv6$n ]"  Z5Pk ( C ^yZB P s *D{L@ 7 JG P7 JGB P 3 A7 JH P BClDE F( ikii@ W; P BCDE F( =;=c==;=;@ F( P BCDE F( ;<;a;;<;<@X   P BCDE F( :;:h::;:;@Y  2  P BCDE F( ><>d>><><@G !P BCDE F( ><>d>><><@G*B "P 0D{$7 ,$D 0B #P 0D{~7 ~,$D 0l mC H $PC mH,$D 0HB %P C D{P  @  C '  &P C ' B 'P 3 A C ( & (P 6_ж_ж  [ O G  IPv4$n ]"  Z5Pk ( C ^yHB )P C D{6  @ e H *Pe HB +P 3 Ae I& ,P 6Hò_ж_ж g   IPv6$n ]"  Z5Pk ( C ^yB -P 3 A- K @ m Pu .Pm PuB /P 3 Am Qv& 0P 6ϲ_ж_ж o v  IPv6$n ]"  Z5Pk ( C ^y@  / 1P /f2 2P 6xUU  0Z" 3P s *GxU  8  Z" 4P s *GvxU  8  f2 5P 6KU   (@  k  6P k @  i  7P i  8P B9CDE F( |B8p@\ .  9P B9CDE F( |B8p@\ .  :P B9CDE F( 8,VH8,@ 7 Oh  ;P B9CDE F( 8,VH8,@ 7 Oh  P B9CDE F( 8AqF 8@W< j  ?P B9CDE F( 8AqF 8@W< j @  k  @P k  AP B6CDE F( }B5p @_ 0  BP B6CDE F( }B5p @_ 0  CP B6CDE F( 5(VI5(@ : Qi  DP B6CDE F( 5(VI5(@ : Qi  EP B:CDE F( ,~{9X,@ Y-  FP B:CDE F( ,~{9X,@ Y-  GP B;CDE F( :ApI!:@Z> l  HP B;CDE F( :ApI!:@Z> l TB IP c $DU  5 TB JP c $DU 5   KP BClDE F( jkjj@   LP BCDE F( =:=b==:=:@2   MP BCDE F( ;<;c;;<;<@   NP BCDE F( :;:b::;:;@ !  OP BCDE F( >;>c>>;>;@   PP BCDE F( >:>a>>:>:@  nl i  QPi ,$D 0@ g  i  RPg  i B SP 3 Ag  j & TP 6_ж_ж    IPv4$n ]"  Z5Pk ( C ^yB UP 3 A 7  HB VP C D{[ \ @ 5z7  WP5z7 B XP 3 A5z8 & YP 6_ж_ж 8l8  IPv6$n ]"  Z5Pk ( C ^y@ a   ZPa  f2 [P 6xUU b [  Z" \P s *GxU a S Z" ]P s *GvxU a  f2 ^P 6KU b 2 (@    _P  @    `P   aP B7CDE F( ~?6n@* bP B7CDE F( ~?6n@* cP B7CDE F( 6,VI6,@   dP B7CDE F( 6,VI6,@   eP B6CDE F( &v5T&@ % fP B6CDE F( &v5T&@ % gP B1CDE F( 0@nF0@$  hP B1CDE F( 0@nF0@$ @    iP   jP B6CDE F( }>5n@- kP B6CDE F( }>5n@- lP B6CDE F( 5)UI5)@ !  mP B6CDE F( 5)UI5)@ !  nP B7CDE F( *{{6Y*@ ) oP B7CDE F( *{{6Y*@ ) pP B;CDE F( :@qH:@(  qP B;CDE F( :@qH:@( TB rP c $DU a b N TB sP c $DU N  tP BClDE F( jkjj@ M   uP BCDE F( ;;;d;;;;;@_ r  vP BCDE F( ;<;b;;<;<@ H v  wP BCDE F( ;;;b;;;;;@ x  xP BCDE F( <:<a<<:<:@qN |  yP BCDE F( <:<a<<:<:@q|  B zP BD{` ,$D 0l , B e  {PB , e ,$D  0HB |P C D{, f R@  B .  }P B . @  ^ .  ~P ^ . T2 P c $lpl  ^ Z" P s *Glpl  ^  P BZCBDEF$I86 "A5AI1Y@ x  P BZCBDEF$I86 "A5AI1Y@ x Z2 P s *6GIɸ$ ` / r P BBCDEF$?? z&o+d2\8RAII@S7\/e(o!z ( 4AJU!`(k/u7@IR\doz@ ` HB P C D$ ^ _ 0 P 0_ж_ж  B   IPv6 in IPv4, n8 ] &  Z5Pk ( C ^yB P BD{D . O ,$D  0l 2 7( P 2 7(,$D  0HB P C D{2 8 R@  5 ( P 5 (@  5  P 5 T2 P c $lpl  Z" P s *Glpl    P B^CBDEF$I86 #A9AM1]@  P B^CBDEF$I86 #A9AM1]@ Z2 P s *6GIɸ$ 6 r P BBCDEF$?? }&r+g2\8QAHI?S6\.e'o z ' 4AJU `'k.u6?HQ\gr}@ HB P C D$ 0 P 0_ж_ж  )  IPv6 in IPv4, n8 ] &  Z5Pk ( C ^yB P s *޽h ? ̙33 Q" ` TD(  T T  N0/_ж_ж `p   nZ5Pk ( C ^y T  N80_ж_ж   jV4Oj ' B ]xB T s *޽h ? ̙33 R  XD(  X X  N|O_ж_ж `p   nZ5Pk ( C ^y X  NxW_ж_ж `]  jV4Oj ' B ]xB X s *޽h ? ̙33 S  \D(  \ \  NW_ж_ж `p   nZ5Pk ( C ^y \  N<_ж_ж `]  jV4Oj ' B ]xB \ s *޽h ? ̙33A  T   `o (  ` `  NȄ_ж_ж `p   nZ5Pk ( C ^y `  NČ_ж_ж `   jV4Oj ' B ]xL" ` c $GZ{p nn ` L" ` c $GZ{p n n`  ` 0ܐ_ж_ж  | X >   00:00:5E:FE$ n ] "  Z5Pk ( C ^ydB ` <DJ nm dB ` <DJ+ v p1 dB ` <DJ p p   ` 0_ж_ж < p  64$n ]"  Z5Pk ( C ^y  ` 0_ж_ж  | ~X  32$n ]"  Z5Pk ( C ^y  ` 0츳_ж_ж < ?  64$n ]"  Z5Pk ( C ^y:  ` 0p_ж_ж  2 G  $Link-local or ISATAP assigned prefix&%n8 ]%"  %Z5Pk ( C ^yL"  ` c $GZ{p n n`   ` 0ɳ_ж_ж  ^D   IPv4 address$ n ] "  Z5Pk ( C ^yB ` s *޽h ? ̙33' U" 'x' )5d'(  d d  N8_ж_ж `p   nZ5Pk ( C ^y: d 3 Ajo @B d C D{ @B d C D{3 @B d C D{Z @B d C D{ : d 3 A bX" d 6_ж_ж j{ IPv4(n ]&  Z5Pk ( C ^y:  d 3 A yF8  n  d nB  d 3 A o*  d 6_ж_ж  g IPv6(n ]&  Z5Pk ( C ^y8  4 2  d4 2B d 3 A 4g ( d 0_ж_ж   3 ISATAP*n ]&  Z5Pk ( C ^y: d 3 A  T H8 Z  dZ @ {  d{ T2 d c $lpl { Z" d s *Glpl {  d B CBDEF$I86  A A 1 @  d B CBDEF$I86  A A 1 @ Z2 d s *6GIɸ$w | r d BBCDEF$?? {qh$^+V0M6D><G5N.W'a!lv  *8@JU!_'j.s5{<DMV^hq{@|HB d C D${ |. d 0_ж_ж Z   IPv6 in IPv4* n ] &  Z5Pk ( C ^y8 P  dP Z2 d s *@lpl <  `" d 0@Glpl Z $  d BUCDEF$I86 @d(TFP/5@@= }  d BUCDEF$I86 @d(TFP/5@@= } `2  d 0@6GIɸ$ ? r !d BBCDEF$??#  #+4=FPZep{ !'-5<D MU!^,g6oBxLWakt~$.8BKS]elt{@I  HB "d C D$ M $ #d 0_ж_ж x+ %   IPv6 in IPv4( n ] &  Z5Pk ( C ^y8 l4  $d4l Z2 %d s *5lpl `Kx`" &d 05Glpl =Q  'd BCDEF$I86 A&A@>W  (d BCDEF$I86 A&A@>W `2 )d 056GIɸ$5`  r *d BBCrDEF$??  wla VK?3'"(/5<BHPYbkt~xmcYPI@70)#! )2:BIQX^dgm q@m6HB +d C D$6F  ,d 6p-_ж_ж -j A(n ]&  Z5Pk ( C ^y -d 62_ж_ж  ]b  B(n ]&  Z5Pk ( C ^y$ .d 08=_ж_ж xO%   IPv6 in IPv4( n ] &  Z5Pk ( C ^y /d 6G_ж_ж Y C(n ]&  Z5Pk ( C ^y| 0d 6@S_ж_ж  /  FISATAP host 192.168.1.1 fe80::5efe:c0a8:0101 3ffe:ffff::5efe:c0a8:0101@ n ];n G&  GZ5Pk ( C ^y} 1d 6a_ж_ж &I, G3ffe:ffff::5efe:c0a8:0201 fe80:: 5efe:c0a8:0201 192.168.2.1 ISATAP host@n ].n H&  HZ5Pk ( C ^y0 2d 6t_ж_ж &Q 3ffe:ffff:0:1::1*n ]&  Z5Pk ( C ^yx 3d 0y_ж_ж ~U  H3ffe:ffff::5efe:c0a8:0301 fe80::5efe:c0a8:0301 192.168.3.1 ISATAP router@n ]/n I&  IZ5Pk ( C ^ydB 4d@ <D{b RB 5d s *޽h ? ̙33 V"  hD(  h h  N_ж_ж `p   nZ5Pk ( C ^y h  N_ж_ж `]  jV4Oj ' B ]xB h s *޽h ? ̙330# W "" /3l^"(  l l  N_ж_ж `p   nZ5Pk ( C ^y l  N_ж_ж `   jV4Oj ' B ]xL" l c $GZ{ nn L" l c $GZ{ n n( l 0_ж_ж  | v Interface identifier$n ]"  Z5Pk ( C ^ydB l <DJ  dB l <DJ p p  l 0˵_ж_ж  p  64$n ]"  Z5Pk ( C ^y  l 0ֵ_ж_ж    32$n ]"  Z5Pk ( C ^y#  l 0,ڵ_ж_ж  V   Teredo Prefix&n8 ]"  Z5Pk ( C ^yL"  l c $GZ{    l 0_ж_ж    IPv4 address$ n ] "  Z5Pk ( C ^yL"  l c $GZ{ nL" l c $GZ{ n  l 0 _ж_ж   ;  Port&n8 ]"  Z5Pk ( C ^ydB l <DJ y  l 08_ж_ж  l  16$n ]"  Z5Pk ( C ^ydB l <DJ j  l 0@_ж_ж  s  16$n ]"  Z5Pk ( C ^y8   l B l 3 A  # l 6_ж_ж { A$n ]"  Z5Pk ( C ^y@B l C D{}7 : l 3 A ,  8 2  l2 B l 3 A P l 0,_ж_ж !3  IPv4 (private address space)<n ]n "  Z5Pk ( C ^y8 w (  lw ( B l 3 Aw ) & l 6t1_ж_ж _   IPv6$n ]"  Z5Pk ( C ^y8 } Z l} ZB  l 3 A} [& !l 66_ж_ж e  IPv4$n ]"  Z5Pk ( C ^yJ8   "l @   r #l  rT2 $l c $lpl  rZ" %l s *Glpl # l r &l BC@DEF$I86 %??.%@!& 0 'l BC@DEF$I86 %??.%@!& 0Z2 (l s *6GIɸ$  sr )l BBCDEF$??i P8  $+06>G|OkX\bNm@w4*    + 9*A4J@UN_\jks||  8Pi@ $sHB *l C D$ [ 0 +l 0HC_ж_ж    IPv6 in IPv4, n8 ] &  Z5Pk ( C ^y8 / % ,l/ %B -l 3 A^  * .l 0O_ж_ж / "& TEREDO,n8 ]&  Z5Pk ( C ^y8 s  /l s B 0l 3 A s # 1l 6a_ж_ж  z l  B$n ]"  Z5Pk ( C ^y 2l 6e_ж_ж   Z NAT$n ]"  Z5Pk ( C ^yB 3l s *޽h ? ̙33 X" 3+@ 1p(  p p  Nv_ж_ж `p   nZ5Pk ( C ^y  p 0_ж_ж   IPv4 header$ n  #  Z5Pk ( C ^y p 0_ж_ж ~ ^   IPv6 header$ n  #  Z5Pk ( C ^y+ p 6<_ж_ж  8  Transport header$n #  Z5Pk ( C ^y. p 0Ц_ж_ж  ( Application protocol data$n #  Z5Pk ( C ^yL" p c $GK{@B p C D{@B p C D{: ; @B  p C D{  dB  p <D{S T dB  p <D{ 4  dB  p <D{   8     p  T" p c $G   + p 0h_ж_ж     IPv6 datagram&n( #  Z5Pk ( C ^y8  <   p<  T" p c $G  <  , p 00_ж_ж  <   Transport data&n( #  Z5Pk ( C ^y8  s   ps  T" p c $G  s  . p 0ɶ_ж_ж  s   Application data&n( #  Z5Pk ( C ^yFB p S D{ S FB p S D{ FB p S D{ FB p S D{4 5 FB p S D{  ! p 0ն_ж_ж \  IPv6 datagram$n #  Z5Pk ( C ^y p 0_ж_ж  j   IPv6 header$ n  #  Z5Pk ( C ^y+ p 6_ж_ж ' P  Transport header$n #  Z5Pk ( C ^y. p 0 _ж_ж & : Application protocol data$n #  Z5Pk ( C ^yL" p c $GK{ @B  p C D{F G @B !p C D{& ' XB "p 0D{ XB #p 0D{C $p 0_ж_ж |  /Encapsulated IPv6 datagram in IPv4 UDP datagram$0n 0#  0Z5Pk ( C ^y^B %p 6D{MN N# &p 0_ж_ж   IPv4 UDP header$n #  Z5Pk ( C ^y@B 'p C D{ dB (p <D{  dB )p <D{  8  s   *ps  T" +p c $G  s  + ,p 0_ж_ж  s    IPv4 datagram&n( #  Z5Pk ( C ^y8  ]  -p ] T" .p c $G  \ , /p 0`(_ж_ж  ^  IPv4 Transport&n( #  Z5Pk ( C ^yFB 0p S D{ B 1p s *޽h ? ̙33 Y" ` tD(  t t  N7_ж_ж `p   nZ5Pk ( C ^y t  N @_ж_ж `]  jV4Oj ' B ]xB t s *޽h ? ̙33 Z  xD(  x x  N`Y_ж_ж `p   nZ5Pk ( C ^y x  Nl`_ж_ж `]  jV4Oj ' B ]xB x s *޽h ? ̙33 [  |D(  | |  Ns_ж_ж `p   nZ5Pk ( C ^y |  Np{_ж_ж `]  jV4Oj ' B ]xB | s *޽h ? ̙33 \  D(     N{_ж_ж `p   nZ5Pk ( C ^y   N_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 ]  <(     Np_ж_ж )   nZ5Pk ( C ^yB  s *޽h ? ̙33 ^  D(     N4_ж_ж `p   nZ5Pk ( C ^y   N0÷_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33 _"  D(     N(׷_ж_ж `p   nZ5Pk ( C ^y   N_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33  ` i a @   (  @B  C D{-  .    N~_ж_ж `p   nZ5Pk ( C ^y   Nl_ж_ж `  jV4Oj ' B ]x:  3 A 8 =C  C= B  3 A =C #  6 _ж_ж h>  A$n ]"  Z5Pk ( C ^y   6t߷_ж_ж c  IPv4&n ]"  Z5Pk ( C ^y    6 _ж_ж v =q#  IPv4&n ]"  Z5Pk ( C ^y    6\_ж_ж  =q  IPv6&n ]"  Z5Pk ( C ^y8      B   3 A  :   3 A     60&_ж_ж  <J  IPv6&n ]"  Z5Pk ( C ^yB  s *޽h ? ̙33 a ` D(     Np_ж_ж `p   nZ5Pk ( C ^y   N`C_ж_ж `]  jV4Oj ' B ]xB  s *޽h ? ̙33  b"    ( (     NY_ж_ж `p   nZ5Pk ( C ^y   NPa_ж_ж `  jV4Oj ' B ]x@B  C D{- . :  3 A x 8 DH  HD B  3 A DH #  6Ll_ж_ж mE  A$n ]"  Z5Pk ( C ^y   6 0 &(  ^  S  ?     S P u   " B  s *vn ? ̙33? 0 0&(  ^  S  ?     S  u   " B  s *vn ? ̙33@ 0 P2(  ^  S  ?     s *$u   " B  s *vn ? ̙33A 0 p 2(   ^   S  ?tY      s *(1$u   " B   s *vn ? ̙33B 0 $,(  $^ $ S  ?    $ c $K u   " B $ s *vn ? ̙33C 0 (,(  (^ ( S  ?    ( c $x u   " B ( s *vn ? ̙33D 0 ,&(  ,^ , S  ?    , S ` u   " B , s *vn ? ̙33E 0 02(  0^ 0 S  ?    0 s *$u   " B 0 s *vn ? ̙33F 0  42(  4^ 4 S  ?    4 s *h$u   " B 4 s *vn ? ̙33G 0 0 82(  8^ 8 S  ?    8 s *`$u   " B 8 s *vn ? ̙33H 0 P <&(  <^ < S  ?    < S dʮ u   " B < s *vn ? ̙33I 0 p @&(  @^ @ S  ?    @ S ѯ u   " B @ s *vn ? ̙33J 0  D2(  D^ D S  ?    D s *D$u   " B D s *vn ? ̙33K 0  H&(  H^ H S  ?    H S h u   " B H s *vn ? ̙33L 0  L&(  L^ L S  ?    L S % u   " B L s *vn ? ̙33M 0  P&(  P^ P S  ?    P S D u   " B P s *vn ? ̙33N 0  T&(  T^ T S  ?    T S ^ u   " B T s *vn ? ̙33O 0 0 X&(  X^ X S  ?    X S <_ u   " B X s *vn ? ̙33P 0 P \&(  \^ \ S  ?    \ S p& u   " B \ s *vn ? ̙33Q 0 p `&(  `^ ` S  ?    ` S (~ u   " B ` s *vn ? ̙33R 0  d&(  d^ d S  ?    d S ҳ u   " B d s *vn ? ̙33S 0  h&(  h^ h S  ?    h S `| u   " B h s *vn ? ̙33T 0  l&(  l^ l S  ?    l S x׳ u   " B l s *vn ? ̙33U 0  p&(  p^ p S  ?    p S 4 u   " B p s *vn ? ̙33V 0  t&(  t^ t S  ?    t S Т u   " B t s *vn ? ̙33W 0 0 x&(  x^ x S  ?    x S v u   " B x s *vn ? ̙33X 0 P |&(  |^ | S  ?    | S 6 u   " B | s *vn ? ̙33Y 0 p &(  ^  S  ?     S P u   " B  s *vn ? ̙33Z 0  &(  ^  S  ?     S k u   " B  s *vn ? ̙33[ 0  2(  ^  S  ?     s *0$u   " B  s *vn ? ̙33\ 0  2(  ^  S  ?     s *$u   " B  s *vn ? ̙33] 0  2(  ^  S  ?     s *t$u   " B  s *vn ? ̙33^ 0  &(  ^  S  ?     S hη u   " B  s *vn ? ̙33_ 0 0 &(  ^  S  ?     S  u   " B  s *vn ? ̙33` 0 P &(  ^  S  ?     S 4 u   " B  s *vn ? ̙33a 0 p &(  ^  S  ?     S  u   " B  s *vn ? ̙33b 0  &(  ^  S  ?     S \ u   " B  s *vn ? ̙33c 0  &(  ^  S  ?     S pҸ u   " B  s *vn ? ̙33d 0  &(  ^  S  ?     S w u   " B  s *vn ? ̙33e 0  &(  ^  S  ?     S  u   " B  s *vn ? ̙33f 0  &(  ^  S  ?     S  u   " B  s *vn ? ̙33g 0 0 &(  ^  S  ?     S  u   " B  s *vn ? ̙33h 0 P &(  ^  S  ?     S  b u   " B  s *vn ? ̙33i 0 p &(  ^  S  ?     S  u   " B  s *vn ? ̙33j 0  &(  ^  S  ?     S @ܻ u   " B  s *vn ? ̙33k 0  &(  ^  S  ?     S @ u   " B  s *vn ? ̙33l 0  &(  ^  S  ?     S 0 u   " B  s *vn ? ̙33m 0  &(  ^  S  ?     S ഼ u   " B  s *vn ? ̙33n 0 &(  ^  S  ?     S $Ӽ u   " B  s *vn ? ̙33o 0 0&(  ^  S  ?     S 8μ u   " B  s *vn ? ̙33p 0 P&(  ^  S  ?     S | u   " B  s *vn ? ̙33q 0 p&(  ^  S  ?     S ! u   " B  s *vn ? ̙33r 0 &(  ^  S  ?V     S A u   " B  s *vn ? ̙33s 0 &(  ^  S  ?     S W u   " B  s *vn ? ̙33t 0 &(  ^  S  ?     S i u   " B  s *vn ? ̙33u 0 &(  ^  S  ?     S | u   " B  s *vn ? ̙33v 0 &(  ^  S  ?     S Ԝ u   " B  s *vn ? ̙33w 0 0&(  ^  S  ?     S L u   " B  s *vn ? ̙33x 0 P&(  ^  S  ?     S Ƚ u   " B  s *vn ? ̙33y 0 p&(  ^  S  ?     S hٽ u   " B  s *vn ? ̙33z 0 &(  ^  S  ?     S  u   " B  s *vn ? ̙33{ 0 &(  ^  S  ?     S  u   " B  s *vn ? ̙33| 0  &(   ^   S  ?      S |* u   " B   s *vn ? ̙33} 0 2(  ^  S  ?tY     s *E$u   " B  s *vn ? ̙33~ 0 &(  ^  S  ?:     S c u   " B  s *vn ? ̙33 0 0&(  ^  S  ?    S  u   " B  s *vn ? ̙33 0 P2(  ^  S  ?     s *$u   " B  s *vn ? ̙33 0 p 2(   ^   S  ?      s *h$u   " B   s *vn ? ̙33@ 0 $(  $^ $ S  ?tY   B $ s *vn ? ̙33c*x |U6oLdPDd̠LadFf4 C$ DE(REE*Q"TDQB*T*̻읽p~׆C?g{Tċ)։q~**L@~GㄔTTT>z:{9xxH9H<""H8 C*C@.TTTԀ\ Rr9$r$  Rr.jH=H}HHCH#HcH HHSH3HsH HKH+ulϯ\giiItttttt\  222 2222 2r#&Hd d,dd<$Ʉɐ,͐)lT4t Hd&d7[ !ˑA)&OqOU_J3S)+O{/X_'!}? T$`x*_wcة2?={Fp[gdᥬs m-ˤsR8]iZN"2k % ?cII4 o^ .wY2vӻ[Gy#Ϭ/b}׻ÝN?)#&ɽ˒!O/h`x9to/є˒罷#rЪLew@2»? 9/Ď|w{ "|vΫ+91"b{8 F/oNwx) /ݶT6qܳd½]|m!+m[_|kOlN %>ѕW6]vZstثz.q̨A7<.\mjSȆpkoGdia|]Z}9nQ֏JM 'Ǧ‡mKIco!SKԿq!fwmdxKѪ>jb+JmӋe ck9]֮"ߕC 8xogJzF? ~Yurcrscyܲuyܸp|w*#y.{ ?eNx^ jpe g`pg-9^ lR\;1R_; +ޙ'%>߻7OuOzzp/YapGxoSǏ1}Qظ/|N9O Qvx8w_;F{BN3&)yjw0WW_^_oiRR 7r@TNOYR,&Ur9c)Rt{sZq1po/o7;۩n&Uvnڶgw!p,'ˑixٍ^ Hȹ*) KPvQg /Bܰ?ɻ? [*vDewkw$NIe7x ^|-K0}=kq7NW*SGE.ӷNrRwJxKc3CS"7>]!~7#7sxu!o*p?ϽGGjqWLwb3>dd= GMڴi ]OsssiVi~~>;NT}y;%y7Aj'%kq9pG|hyy̞)B>Z%# nI:[ >崀:9g:of Χ&wc:O^EWNDڞ(}=Ri{HeG m)7h{ H2L#eg(m)=RFk{ܨrGJGmp)=Rk{k{Fdh{LH2I3%S#H푒rGmlmڞ(ñRk{H܈2S#eGo=Rn܄}*Uʭ)s=R~[,N=Rj{ܦ푒2Rn6K IC;-) eکKX ,EK#nZ)h}ܫD#>Zq(k}Rk}GyX#Z)j}HyL#qZt'>Rh}^#IZ)Oi}HyZ듁Gzg>RH٠GF>P^H٤Gf?h}E#Z(h}lHyU#eGkZ)k}lHLB١GʛZ);>RH٥'>(>RGw>Rj}E#=O#}Z)h}|r@##>Qj}|GgZ)H9rX#@듅}XXZ)G>RHR#GWZ)Ǵ>7]#kZ)h}HGʷZ)Z)('>RNi}S#bɕrZ#{>RGYi}H9GM%٩'’%@XK⬩21eccY`IyK*XRђ,I$ɒJ\lIeKXr%U-Ou\j(S:rK-{1,mɕWYRך:uL}4YؒK%M-ifIsKZXҒV%Z? $ϟD{H`IGKR-dIgKXQ հ%=,iI/Kz[r%},kI?K[? $߮ [r%C,j0K[2’d%7Zr%id%,oI%Ld%,ɴĵd%YlK-j4K[2ÒKfZ2˒Xr%-Ւ9֒Y2ג,-M,ݒaKZr%,˒-Yl=kKd%[%yCKX%[rВO,r3Kj!K[R`,ܒ#|aɗ+KYwK%Xr’X%@;i)Kiw{K~%?Zr֒YrΒdE}}B N=4S=IpVğ;r%|\(ɉw=stLCo%W{T*P2'5lRSM/uwH5uզ.oR L]5.ԻU_SޣzkT_S _5<U_S>\5u;ЇU_SQ}M]k*T_SW}5ëa=ZƞblcO3 c{md^dlc/1?02c[#c0WkvǾ^]qBj5RSM1>)5ԵRW|SI-0i7gT_S׫>kU_S7N0EM/nV}Mk˪[T_SN4ԭnS}M}M5uoFv8` dl'co1?16c3c0w_{}~>`C0c3vO+c;طM2.;M}CjoJcN%ugIjoV}Mk;{T_SU}MݫT_}﫾W}M@5C~N6k'gU}M=zX-h0ח19cG/;Wc}qƾac`[ ;)wf{~` c?2v1vXc8ze\&5lRSM="u_H5KM=*5ԯzLп~z\5P}MV5PbܦT}M=OT_SO~k7U_SϪK5kyԟT_STbuL8юs~sU{~5'9ɉ$e> N0. 3^B]la=|?my 9 8}g:J{osz s+bEs/]xś/ C17'\x׬'FxUoѹԹT8x~~~ww)݉-c߲ƿ7Uknkzo{o~7&]og𓐫/r7J_#XuFGeB򗝗ob{ydwy)-̥eȟz*^:м{Rsr+ ^K׳“x Z!Կ#‡8)sl~W:{}E^zK|?9VTď j779rԽT{#!|"cr!o'eE ^ؒ_W &c^kobP̛GҜ| " TޮD~Z?R'&!/Hut0;V*r.z0^o}ؕ/UƭȎ_=Yo"2\lqg{6^ϗ:Os\ߣ8ԎQD?pe7z{^WLkCq7)~Yzl+zcv7fb\1o!0;!~ W o$̎¸b$&x?n~a&+Fcv헆{qE&x?n~`v<0q;K Wcv7f'a\1oLqE&&x?n~Y0;,L~NaVqE6&x?n~`v0q;ˁٙW`v7 fob&x?n~aV+fcv7fs1 ޏ<y~͇Woލq"L~NW,o އqL~N`A+0q;[1X ޏ }~G1X ޏ}5~g0X ޏF}㊍~mٗ0؄ ޏf}͘~mW0؂ ޏV}㊭~m1؆ ޏvǸb;&x?n~;`M+v`vf¸b'&x?n~`m+vavfb7&x?n~{`]+`vføb/&x?n~`}+avf?ĸb?&x?n~`00q;+1(~qL~NWW~q1L~N7W~q L~N a$~%N~UWTo1ދqbLdvføb & O2;[ `\o<}q*L~>j}՘(|(o50$k0QPf~ka)+bN3WDC~0Xχ2;K_R]biR/;%T ekD Yndz$M֛/Y_d "B6l0d#F&K#K#G6,,l"DLL,,llidrrf"M6lds#O6l!BEd-&[Bl)R<d6$;H)٧d!;Bv(1cdɎ ;AVHVHvidgΐ%;Kv=/}7S޷|J TLΣ\He"d)"ddwf@̱>%3#9e|cwZ^G'']GܙSg7S'5u*$ɷ(Y133++cF8=#<~lY uHd洙3U}9' ;ݜ)|3{H=yrxy5ɗ_{d+O pN;"y/S'r].q{: 8}|^>ݙ &> 8}ؼtrHE3>K: 8֐wʗL8ove\ 'yI /O]闹WN)x >mGJsM[($]?[x |ǟwv D+ b\ $ (BL0 U+A-Vm=mm֞Z VZ$}gf}|:ywfyyw'{/@`!ߚS;1V~|hl<i9OGE.]lt9r"F]>;]t0t BWn08! E7 pt#ЍDWnG7Ƣ;]1qSI&TtG 0 t3Bpͥh<e׍p^)hw%Ưב0;诣˧w=~: ~_ƻ(,L[DT=4O+֝&a}ê sjM)SjUO ;qxgX[uMM޲*jc\G'_ot/׭ۗ lvz)l0mƪʵU50d{\\64)=6]zn:v}ݺiطA%ykt#}GSnh>z=lтp)4:xYpXQӖ%w*ǖ's 5է=by[sy8V>~sqDcqsl(">M#  (J,88Y>,Uc$BFXTi5AfTrAHoK\Mj͆+1t Wj4 > > ¯rk uYn ut&0-ݦ;t'b`ߝ/Ko[wDcZޏ lg6>MA^5󐊢A7}ݖHE)C@-9O բG;f=pYgDqqόHҊQ3 uU&KuڦH1egkmei=Bqtދt*fRyv>nԦj:Q0>6Dzp2Q.Kt&9*:Zc} T eNjxBBFp۽ҪMzteVbŧñ+OUKa1-:<GQoU&j[X1"@zuv~< ft߆!,+2xmās?,LC1EK)쁂X.J!ƪdkm͠M - `u06ćؼ<ulgB;D%(i XE0f[zNg|j!lVbط4*>JL$t]yBSSri͞2Vp|1FS c3a=]0ek޿;OQu4^O 1?i*nkJ$}V3ɵqomMi Bi)ڞDq _m.v D 'DHZtp RIP I?ǹDH"JY Nq&,'sD Qa)]cw,r,9caaciޱHf;;C0gHo38#012c3ͱ,/a98er<3LȎ<9ʊQVl1#1Lþ>`Y m"C|eqnezc7mYpv'L} uXUaJ`B ,M` ,* e ,K`XX/X ء 6P`V QY[he:F6a1Fӈ3o:сoh Zh&afh6"FsfMu yD2#Zh/Mt<}N`4DFh?=0G1ziLw 3- :DgyB)$H;`>ną2D`*a.)"h.1;B`cv6N`6A`6I`6E`%*6M`6C`36 R8ҝ`e~Mٌ%#sXmN~9A~2w.[D~KQ䷔M~=11wG_NǒI~9-&匎#'G3:r:$d{,S/%8F_N" XN#N' A~2ݙ䷂Y7INelJV&y/r-cv-X x ["vN)[*Sv t}F`!N-Xmi96q:fNKIxFHxV.Ir=ѣIcHcIHw1 HӅirt|8t9=t0Ť=IӓHӓISH$F...HdFO']N?C.'$vx֗JXV#U;C`j)zZ5lX l6 l#svgv>'  R`)WZtMVYi5.et9]EA֒֑.I3Iz=5Z崁t9]G=t9m$]Nד.HtF7.g..g=t9=t9,rz.gs酤&Ml lEX`l>/K}Q` r}I`_WUmR`W k!M}K`m]#Zmv lXFf-sz N/tXKwpyK9ݜ~dd/^Nr%/~d/[ޕ^Arz%Ud/_#{9:7^N&{9&[^N~^KrMlw:]/ }O`؍I`7 E`?حM` ) .X`?OvؽO`?{@` l';ֻjV毳4&8+8&NgNoi37ZӛFo&{9-d/?${96^N {W1z'^N"{91O^NJrz7=dKrz^N'{9}Aӝdovg;,ԗ~._R`أov =)[=- {F`س$? /&<`]-+YaK&Nt/-m~enN%{5cd/!{9}td/O>Efd/Od/ϐY?g2'?=㿒9$vxP_^^{E` 5C` ) -X mK`]' }} G/VHmww.`iӿ[EKWpMlN_W-kdFAr:d/o-=d/-dZ֦%{9}_d/Kr^N'{C#{9t?i+ٛ+F S`+>}3?J5Cc1-yCoX!f0OJ'1LXjWt"\@ L#+-Z̫ E? *ܙv SxvGg9Z}g'WCa*4i ./6ϿZI񝛙3_ >ݝ'̋xl/fe}V7yj8CNlw=Ce4]Ŗсr]Վ;CnF<!G6y v q27s<:qem\uy|Gba 5Oue~qe~2dYl/]P&9ʏ F+L!pCO F|)WMW5"@W+RPC =~=| mֆMe@[obw얝nlI Cn١ѷ[~`IsYGznO7{vޫwWz{2?Bһ{D%x]0O S'=V|B`O!ըnvv/+p߮t~]yl} p/jCD1Qݓg9VsZj~p* >{s9@'->b;f=a=$]LP`F*cCZk[b'ܪl/MadKȬ[|)UM=a4,ep]Jve^r 4Bb NA:ƙ1u\uIoc#m[u+ }),U Qi:굤^j=c[=v {cevKq籥[챛=vǞczqYx,-6u,qŎ+hй aKU2l:6isa*tjZwz .skG.{c\/&еu8Ϭ_r惤,՝m`t1\]gփDXݒ WD E}XYtJ$͞O UJ.>H=25XjY|4{>%kTDSV:r)4{.%Ha}apzT8 $?NpSv%\m^ky)u|ONlk#)Uv$n?i=AoMA"fܭ}i/yr,Tw9n_n{:(qaA>UJ:yG*{}@uE?qn"{'gvc]e=T;LJ!iCEgOϮnY>>rC]xYeUm|iMeyOkcwtwnlLH|Mtu7 z{{+~{/ҿ7ַ7x88;7QM:BOPk+7S*̏~Izտ?B)w|qqqWWK*}}fOh_QTNVU8yZnM*5I'^W6KBllXqʚxê%{P*OgKe{h@~'ᣘof 1O.]c}ĺ '{1M`Z?i [6];aTWy?V!uA hR4]ٴ 1[ ȴy5kǫkUU, u{-'@y(O|׍_)KKaBޗ>Poޕ۵EOpn=s}B\L,Vw:|ZE'gb<Ý_}}v(?ş։^<>nbXyp4U&O.i{)#__jdh%5sPґu{VҍPg۷gx |ǟM~!Gx 7""/ ĒFah a(0X:Kp=0Áx 1L04 10t8~7/G@-~྘ q]' Z\zKfOR]ɿoz;En݋£"e!+`fWT*2ek"3O1Gٴeˢ?1lukFG wZ{1\=.ٹa'_!g}aǼ>c l_vؾ2 `[VAۇiUDՔXQ-[⺿LCo=GqDH-yn7|5XQ߮RM2CUz멌GЁtC˕VmT:֓ `moO=kv`7LYT[jૌmD=ȱoےr˱-绣*o~U>70#A *^)\d㛋G'#*OL8O)D=`үO>G8]1qKFXD\7,ڷȟ*$Rxb̒*#6zO':4eJK8}z\Wẘ]i& W.45 Wj4ܛ&g|D3|T3|d3<3_!\h.fݵ>hf `Ӛ6`tНt;>SJtIS׬ Ľ b=1azMK)/S Å*AaIƫAԔI7P; afٳ9]}f~krO?~nS>}9vf6Qoho4(ՃG bOv:غp:zo#KX2X- ,O` @`]`=S`[`}W`_`VV*n⧎*4H4hnL!h/6h?6D4f-b4`Fe4pFsd(Ff4L.D0ڕXF cFh3ړ~{N`Kt"GtK۟AS<ݗ`qz@G>mD2P`E$"&!G`F l? l lJ6^` E6A` l& MH>G1v"J;AvkC(-C)t0NgiS,J;Iig2FQYKi9Mig3崘JXJ;qJ{)-SC=r1:rz w"tAvӝLi3:<DŽ2U`6]`36S`6[` lء;L`s6O`@` -" H%vq[,--p 1S-q:zN[ =љ{8kH٤{sHCHCIHw!sIy|t.bp8rz.b IE[h)rz$rzrz41鱤qb=Io.KH7Ny K B`2- U lNXV ljvNXN);U` t}[`gL%e`/4RK9J=*trt9]A2ZM$]NO ]NkH8FW.IZD]Iirz2rtgt-rz rz*rz~Io.g.gF"]N&]Nבnp=$;G` Ir;ӧ_N&9}Yw%'9}y?@r"K//'0G?=㿐W8ݛB{^{C`o --w.>؇H`X`T`ؿo}&.5Ayx'vW,p1N_7,MK7q mNN!W1._N#9}_N?"9m$Ws/S/~Nr/_Nw!9m"tom#F!S`[SvTC0@a A3Lq'5yR:>I.4+'_CcYW@v~fUPS Us{ rwұS8U.}T)3*ƷS*_ooĮXzt61mLOJF9n[)W>&YlSm^3DgЎn)̤kvřtӐaX,G::;gϙouJ!aa';vvKs_Hy\ sj!PUgE`-F50tI -Ϥ,oh ]J36\:=n yӹsz}9uhZO7ZHOP5T,i[g XO/~zY:;d`r .G iiiʯ4B;ʄiBͷ.o>,VsXP`iKXBX#\ ,_`auXW[{4dz1vrzXO1wXٝ_8(3 `hMF 4+4PamMۉX9Bh9Wh`#װ\b Z9G\'God>2Kr-t傞0e冒\'++Gt+ri\'GS\=N-aҴ\+ќ.e[^#2\ O&CE\B\(.נ2\ r!OfQMr@r\oWTk>\HerMfyrYNe[L-eyr4okGrٞ\*Q.Z.KerFl'˝uƘ<$c,Ͳ*{#Ѧ!iai2LWܨ~횳']!z6Sn<& hDslnNyt s+SIlr99ۜmnNn))W䔧swsrGoynNa_N 5sr T3S)Do= ye" fI4'$6 F3x" GTO)O|+(v 27sC2ż=5ᘯ=FXA_{-0rb?>,d.pEXݑe;bug(KU%g4W7rK2bpͼ$CLC)4[Ô-oGP{5VI3w*)[%Ls| uwoc48cpC :rsPs| g*>r}9wsr'X pC{cWy** ^DT %,QPi:^=vؕc{v<ǾXw2KGUrU-6[lT%بJnQb*FUrU-6[lT%بJnQb*FUrU-6bs4pb? 6׈ZbIֶf-@m} ^h6j k Bm=V[X`RmJh-]P۬^ qŵgpiokjl-`m]/V[Xەh%ۦhۺ8u='AoL@pC@iCkiF{H7'R)^S=%Rqa5W'>; R'uf[fQsv%zA+̺gK"iv~I6#gW&~=[IK< G~.%yc^m?> %ݒ*plɣy@;-  n[ ~|bfl~D߯w~&sSh1x-:IU-ǖe)YnF˳JU}JzeI.%.R˔,?D'R IM,вo-UJb9 ?rBꛒe)Z,,k0%CR--ZhYc蜔,Dkx ]hy)Y6S~KGx 9)B}x KXUW >`Qe*ꕺcwP898/䛒tEkk"׮ZZU]/֖uJx_Oh!fJ8Y)^H| zJ];С~FZ?U_ A0.e`aӯ#Wjˑ]]]^]1fؕօa9`knO!'l\UHeUbm IXVd1YrԚ9 Aո3O}iAMFϒlޗ-zbqSӱ؟K?hҕ!]OQE'`z?m_yP/]'ֆ?Z. + I FIMxҵ )a/"2@5^8|;=@CNQ_bx{֊4tB`~ *Hf| (FdxP ( x\4  l"D$&')+|-T/,13468d:<<>?ACEdG?@ABCDEFGHIJKLMNOPQRSTVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~     )Root EntrydO)PicturesoCurrent UserSummaryInformation(PowerPoint Document(UbDocumentSummaryInformation8