MSCFN,d v,O0Summit WLAN AdapterSDCd (|1((+CLLi SUMMIT~1.000XCH SETUPDLL.999&IDk 0CAB6901.014K/Fb SDC_HELP.013K/Fb 00000SCU.012&IDk 00000SCU.0114Hŝ SDCAPP~1.0104H 0SCUTRAY.009Fb 00README.008HJx SDC30W~1.007JJx SDC30SRU.0060JJx SDC30P~1.005J SDCSD3~1.004SKn 0SDCSUPP.003 H 0SDCGINA.002 H{ SDC_GINA.001" LLi _setup.xml:C`C`MSCEC |T|dx|Summit WLAN AdapterSDC%CE2%%CE11%SummitCerts%CE2%HelpComm SDCSD30AG Linkage SDCSD30AG1 Parms Drivers SDCARDClientDriversCustom MANF-0271-CARDID-0108-FUNC-1 MANF-0271-CARDID-0109-FUNC-1 MANF-0271-CARDID-010a-FUNC-1 MANF-0271-CARDID-010b-FUNC-1 MANF-0271-CARDID-0201-FUNC-1 MANF-0271-CARDID-0200-FUNC-1TcpIp SoftwareSummit Client Utility.lnk@sdc_gina.exe@ sdcgina.exe@ sdcsupp.exe@sdcsd30ag.dll@sdc30patch.bin@sdc30sru.bin@sdc30wlan.bin.z77@ readme.txt  @ SCUtray.dll  @sdcApplet.cpl  @scu.exe  @SCU.lnk  @sdc_help.htm scu_30.exe               )DisplayNameLaird 30 Series WLAN Adapter GroupNDISImagePathsdcsd30ag.dll WirelessRouteSDCSD30AG1)DisplayNameLaird 30 Series WLAN Adapter GroupNDISImagePathsdcsd30ag.dll  Wireless  tcmd  eepromfile Dllsdcsd30ag.dll  PrefixSSIDllsdcsd30ag.dll PrefixSSIDllsdcsd30ag.dll PrefixSSIDllsdcsd30ag.dll PrefixSSI Dllsdcsd30ag.dll PrefixSSI Dllsdcsd30ag.dll PrefixSSI TcpInitialRTT )TcpMaxConnectResponseRetransmissions ConnectDampingInterval DisconnectDampInterval BuildVersion21.3.1.10?   MZ@ !L!This program cannot be run in DOS mode. $ſUIUIUIشI]I䫌IRIUIIRIQIUIQIKCITIKEITIK@ITIRichUIPE/1W!  8 !0 98(ph`0@.textP  `.rdata& 0 $@@.data@0@.pdata`H@@.rsrchpJ@@.reloc N@B$8O-D ЍP01004AoAO0 `p @<[+ 8?@`p⊏?   `@P  0 mP AA 0  p[0ˠ4 Ѝ0`V$8O- Ѝ 10ʍ$2AozOP0 `p @Pi<Z @_`0  pUPA0 @P`HZ $̠( Ѝ $`Vp@-M@P80 1P@"800`0 ` ``P @9P P@@Ѝp@-p`@ t0 \ Pu 80o|xphXTLD40(  |tlW V H @0@ ! PV(0  ! I  0H004h484 4333X3,3322x2H22111h1<1 100lZhV4445- `hV0A- Mj@5 p0 ppb`VP PL0 | `v X?080 pp;U* Ѝ054445-  <5@-,0 -@t  *5C-M@`p0 Pu|0 @  0W0X0@D0000  @@0S@ЍF@6$80@-,MP10(0 P/U(@,P !\!P P(@P 0@S:X PP 0@T(@,Ѝ0(O60N4O`V$80@-BM@P001 gPUT P T P U00T Bߍ00ONO`V$8@-8M0040{@Z48Ѝ0 0. UP 48Ѝ =JC 0  @%P 0S*TS T4, 84p8Ѝ4k8ЍNTO`Vp@-M`P 0 0@0 @P @0 @+P 00ЍpЍp -0P- M@ 0 00 PP$0 PP Ѝ0 Ѝ0$8p@-MP`002,0 0@0 @P @0 @P0 0Q R tߍpmߍp`V$80@-M@P002x0 d^ ~ T @ 4 (  @ߍ060767N`VQ  0S P:@-$@P000 J00Z@-|@0S000\DPp88,0030 0.877$8Z/@/@/ @/$@/(@/,@/0@/4@/8@/<@/@@/D@/H@/L@/P@/T@/X@/\@/`@/d@/h@/p@/t@/x@$8 X-  0B/h/ -00P/`VA-p`|PV0S /@ Z @V 0S  /P@A/Zp@-@P`P 0B0P*Q0 P@ 00BC1!@ p@/ZZ-P/0@-8@0P0S SP0@/P0@/d`V0@-\@TP0S/@T:,@$P0S/@T:0@/@@@@A-pQ0pPP `0@C0S /@DT*j0 0 x@pP0S/@T:H@@P0S/@T:W0B/A/@@@@ZZZ- /-Q< /-00 0b00C 0//!@- @ /@/p$/|@/@/@/ @/@/@/@/l@-L./1Wj<8<,Comm\SDCCF10G1_tempComm\SDCCF10G1_temp\Parms\Configs\Comm\SDCCF10G1\Parms\Configs\ThirdPartyConfig\Windows\sdcsd40n.dll\Windows\sdcsd40n0.dll\Windows\sdc_gina.exe\Windows\sdc_gina0.exe\Windows\sdc_bt.dll\Windows\sdc_bt0.dll\Windows\sdc_btss.dll\Windows\sdc_btss0.dll\Windows\sdc_bttray.dll\Windows\sdc_bttray0.dll\Windows\HCICOMM.dll\Windows\HCICOMM0.dll\Windows\HCIDRV.dll\Windows\HCIDRV0.dll\Windows\SS1BTVEN.dll\Windows\SS1BTVEN0.dll\Windows\SS1VNDS.dll\Windows\SS1VNDS0.dll\Windows\SS1VCOMM.dll\Windows\SS1VCOMM0.dll\Windows\SS1VWAVD.dll\Windows\SS1VWAVD0.dllDeregisterServiceSCU0:GetServiceHandlecoredll.dllSBT0:Comm\SDCCF10G1l q v { <Pdx|0DqSuppStopEventl q v { <Pdx|0DqSSI1:GlobalConfig%s\GlobalConfig%s\ThirdPartyConfig%s\Config%02d%s\DefaultConfigSettings&amp;'apos;"quot;>gt;<lt;GetFileVersionInfoSizeWGetFileVersionInfoWVerQueryValueWCOREDLL.DLLRSDSrXQEl/Vc:\Jenkins\workspace\Release-Setup\sdc_setup\bin\CE5\Armv4i\Release\sdc_setup.pdb    8x9@$S#!"W)),*TCOREDLL.dll/1W9999`8(99::SDC_SETUP.dllInstall_ExitInstall_InitUninstall_ExitUninstall_Init$S#!"W)),*T"4.BuildVersionsdcApplet.cplAppletlrdbtc.dllBooTpatchsdc_bt.dllBT Patchsdc_btss.dllBT StackLrdBTLib.dllBT Native LibraryLrdSDKBT.dllBT SDK Librarysdc_bttray.dllBT Traysdc_gina.exeGinasdcgina.exeGina Credentialslrdibs.dllInfo-Broker DriverLairdIB.dllInfo-Broker Librarylrdiblogger.dllInfo-Broker Loggerscu.exeSCUscuTray.dllSCU Traysdcsd10g.dllSeries 10 Driversdcsd30ag.dllSeries 30 Driversdcsd40n.dllSeries 40 Driversd50n.dllSeries 50 Driversd45n.dllSeries 45 Driverlrd6003_nwf.dllSeries 45 Driverlrd6k_nwf.dllSeries 50 Driversdcsupp.exeSupplicantLrdWiFiLib.dllWiFi Native LibraryLrdSDK.dllWiFi SDK Librarybtwrlmgr.dllWireless Bluetooth ManagerSOFTWARE\SDC\SupplicantSOFTWARE\LairdSOFTWARE\Laird\SupplicantDriverComm\SDCCF10G1\ParmsComm\SDCCF10G1\Parms\Configs\Comm\SDCCF10G_SSISDCCF10GSSIActiveConfigNumConfigsDriverVersionInstallKeyInstallDirSpawnPathConfigNameSSIDClientNameTxPowerAuthTypeEAPTypePowerSaveWEPTypeBitRateRadioModeSave1Save2Save3Save4FragRTSRxDiversityTxDiversityRoamTriggerRoamDeltaRoamPeriodRoamPeriodmsPreambleGShortSlotBTCoexistPingPayloadPingTimeoutPingDelayFCCtestTestChanTestPwrTestRateRadioStateRegDomainTxMaxAdminOverrideLEDusedtxTestTimedisplayPWDScertPathadminPWDkeepAlivetrayIconaggScanTimerauthTimeoutautoProfileOPMKdefAdhocChannelsilentRunningscanDFSTimesuppInfoTxMaxAadminFilesinterferenceModeAuthServerTypeTTLSInnerMethodBeaconMissTimeoutuAPSDsdcCardCCXfeaturesWMEDFSchannelsbLRSaLRSavgWindowprobeDelayPowerCycledpolledIRQdriveONImportActiveConfigRadioChipSetTXPOWER_MAX_VALUEignoreNullSsidOOOOO PP0P@PPPdPpP|PPOPO@PPPPPPPPPQ8QLQdQxQQQ777777|7t7l7d7dUdL3@`@ @(D@8@T@5@lK/dBl+@$@9*D @t @#@  @!@ !&@!+@d"@"@"@8#A@<$@X$@p$@$ @4.@L.@0 H`p4VS_VERSION_INFO7xxdStringFileInfo@040904B0,CompanyNameLairdNFileDescriptionCAB File setup.dll2 FileVersion55.3.5.2FInternalNameCAB File setup.dllBLegalCopyright(c) 2006 Laird^OriginalFilenamesdc_setup.dll (CE5 ARMV4I)JProductNameLaird Wireless Suite@ProductVersion5.0.1400.1400DVarFileInfo$Translation 00T1\1`1255555555555555555555555555555555 6$6$7(7,70747P77\8`8d8h899999999H:L:P:T:X:\:`:\;`;d;h;<<===,>0>4>8><>@>> ?$?(?,?0?@?P?`?p????????? \00 000@0P0`0p000000011\2`22(3,30343 4$4(4,404448444455$545D5T5d5H>08888@ 00P\5555555555555555555666 66666 6$6(6,6064686<6@6D6H6L6P6T6X6`L0000 0(00080@0H0P0X0`0h0p0x0000000000000000011 ~MZ@ !L!This program cannot be run in DOS mode. $h3 ] ] ] ] ]: ]L ]GY޹ ] ] \]GYٹ ][ɹ ] ʹ ][̹ ]Rich ]PE/W  6P   P*0,P D.text46 `.rdataP:@@.dataq <@.pdata0,.:@@.rsrc*,h@@@ A >0@-@Pᮮ30$P -pX-`P` 4P0@0՛80 0x |PKp-KT,PP!Q@Q -X-@@yAK-K;0+g w\ O- ЍP104x0S@@S |0S1 0 S819 AdpJ 8d`? ㆯ↟0 'd?  ex0S 0 d? ^ 0dP 0  [@c`ကcc nˠ Ѝ谔tQ|QQWC-`x0p@S:3Q0 jTY%P @Q0 0R^ R0 S^^ 0 ‐pز@W .P0 7T&P @^0 0RQ R0 SQQ 0 ⴭp@W WВ000000SC-Px0@S5p`0 V'⨭P @Q0 0R^ R0 S^^ 0 j뀀@`T T0@-@P0C- MPs +0g@ @:x0S  kr0 @0 r0 @0"x@"Q1O <0 "1d@`0@` d"0`@ 1d<"100J70 c000 6]x0S1  Vx0p@S:0a0 ATWP @Q0 0R^ R0 S^^ 0 ⾬뀐p@W .`0 T&ˬP @^0 0RQ R0 SQQ 0 ⍬p@W  ЍВQQR颋.Q0@-@P$0@-@|0 0D H LR 00RR X-M@P  0 x00P0P  0 k00 T0{PD 0 qTH 0K-<-8A-,M@ < 0 xaP 0Sܰ c <( 0 i v xB⫹  iL0pSPက0 APhNL0pPW@0 P,N@D@P@PP㠰,Ѝ00@-QP@TP 㳰ⰰ᭰㩰⦰ᣰ0@蟰p@-P@` < 0 T1P`0 @U@t ڄừ⸫$ p p[p@-`P@TPPPPp@^P < 0 KPp0@-@P000R@-@9008S -W-4M`@p$hlV6`FPT T T T0 0 0A00 0( 0, 0C0$0  0 0 V4Ѝ -_-0M`rhlX$ @ P H| peV V ( 0@N ,$0@@PA0 P@eX0Ѝ -S-0M@X@P` !( 0\pUBPEF@/0 0 D 0HN.p@U0Ѝ-P P P "P PP on[-:18PT룺@-pP`%@   T *0Q0@T*0S@0@-@P$20! P0 0@p@-@P`sT 00 p@00 R:R<00BS$00SSᔔ<0 R R <0R <0R$$0  R <0R$p@-P`T@ ׮pp@-P`F@ ɮᔮp@-@|6P T  0@N L0@-M@0 P@PP l @0 @P @ @0 @P0SP|Ѝ0SS00S[p@-@P`H0 0P uP 0  jpH[p@-@P`@0P 0 [P0 SpH[\ 0@-eM@\001빛P <  eߍ0W\ @- Ѝ@P@똛`' < "̍|0 00 ̍9  0> 22ǭ@w̠D ЍSW@-D0@(00ST$-Q J0 C0Q0 Ӂ0а hW-:1cA-Pp0@C`00 VP P0  `P0P0@- P10S R 0@P000@-@lPP @S0@-@P¾0T pX-M`V0H0$HV p6  T- ; 0Tʫ ;0T ;0T ; 0T ; 0T ;0T;0T ;0Ts ;0T ; 0TL嫅|5th@ K@ +^0Sp< ??vPI *0 3"45%65"875"<85+030303F04 04040 40404044 0,404? 40,4d0040$40D40H40L40 (4"4$4"84"<4 45 85?. <5?℃ 3,4Sk 0j:0T ;0T ;0T ; 0T ; 0Th{\yPw: 0Tr : 0T ;0Tmi: 0Tc : 0T^ ; 0T ; 0TV ; 0T ;M ; 0TL ; 0TH ;C; 0TA ; 0T= ; 0T9 ; 0T5 90; 0T/ ; 0T+ :&0 0is0S H s'A`uP" ` "4 0"80"< 0"4 0"80"< 0"4 0"80"< 0"4 0"80"< 040 K0 )^P0S1  M%N5$O5(P5<0S0  P$ KⰬ KزP  0 KD@@T 0T0K⵬Kp-K⯬-'$TUUUUUUU(UHU0UtUVVH[@-@q0S c@@-Q@1 K0 00p@-P0@C0`S 0S000 0SP0  0 p gP00 00pW- 0C0S 0S0000S SƒQ0@-@0 0S0000P P*00 P~0 0000@-@.P1 0 00@-0@C P0\K0 PЍpp@-0@f`p0P0C 0 B0c0AAK0 dpA-P`@A Vp!0@ 0F B0c 0pAAKW0 % AW|V -pX-M@@P00 00 {`P 00C 0 b0C0Z 0D0`S\VP Kp-K0  000 [V\ p@-eM`P0010@T < 0 @ l P@  D@oeߍp[WV pX-MP`U@ ةKKឩ0@C P0Kp-KV pX-MP`q+@ KrK0 lJ ? 0Q:0@C zP0Kp-Kd@- @,00WD|pXC-@P`0ECp?TT@0  C0`0AAK W0P C0@-@P <0#  P("(0X -0X-PP@3P1 0 00PT K0-Kp@-M@0 < H0 l[ U    Ѝp^\X X- N 0 8; M 0 1 0 `8 ? ` 0 @ 0 ` 0 p [0 0  0 F 0|0YЍp a __DHa8aWPa 0X-MPGYP  Q@@T 00 aK0-a 0X-MPG0P  (@@T 00 8K0-a X-M00S$;Fѝ@K&K( @@0S RJ0Rʲ0 00R00 'P0K-KWD b X-MP|0SM \10SI<㓝@ K K$ [ \0$]0(^0@<SS0S RJ0Rʲ0 00Rppk `@P 0@0s xpT0x0 0@C P0K- KW@bpHaLb 0X-M@7PK1x0SKᇎ @@0S RJ0Rʲ0 00R00 P0K0>-KnW _b X-M<@KPKR @@0S RJ0Rʲ0 00R00 QP0K -K9W_b X-M;NƜ@KK @@0S RJ0Rʲ0 00R00 P0K-KWHac\ p@-M@000.;!ሜl@P0PS <0  l0 00PS00Ѝp脗W0@-M@0 @PPP h @0 @P < @0 @P0SPЍ08dPd\ A-|Ÿ ЍPl20ʍ2X0  0  i< &̍` x[I |PO4 50$60(70<SC ̈́PP2pS@گoIU IPFᵄP@8S2@AoTx I2@SگoI6 IPFⓄP5p2@AoTwx l&\ T.@-,0+ @d  "̠ Ѝddddddde(e@e_deXeWH0@-@4 50$60(70<S P+s\Z4osT0@xedee_e\ O-dȟ ЍppP80$6@0  0 GM;@ 2/)g,  op0p@q0@r0q04 D88@ +D  Dk l0$m0(n0g h0$i0(j0 [ \0 D$]0(^0< tl@ X+D  <DTc d0_ D$e0(f0<` a b ,@ +D  D,-, .+0 /  DgLD@ 0+D  D '*P)@(&0%  D P@Ct@ +D  he_DHG IF0p J  D!4,R@ +D  FC=DBEPD@CA0@  D P@.@ +D  "lD`  D80@ +D  Dba0  D@ +D  dD^< H5@;P$?`48(45687,< ,p  8"L, "4 $.,< D@ +D  xDkA@ ED0BF@CP$G`4@(<=>8?,< ,p  8"L, "4 $.,< D,  @ +D  lD (54")(26*B7R$%+b4$0(1&28'r3,< $  8"D, "< ,.$4 DGx@ +D  lticD=<"A@2>BB?R$Cb4<(89:8;,< $p  8"D, "< ,.$4 D :@ +D  .|+%@Dx,   D<4P ,+D   D9"82:-,48 1r0P.;54B6$2 4H3 ((b,)/r d70 4L.PX*2+$$<"$!4$4L0$<., D@ +D  @D<0 q0 P `0P  4`0 4 LP    > 40  4K0 4 7P0 00) PV  DHyP +D  mxjdDTPHa@ 4X$UO$̠( Ѝieiiieef% fDfPflfffffl7f gg4gDgTghggggg@-@, @jji\ O-MpP209` `$`0 @4TP@(`}0Sf|T= 0  0A 0 b0C0Z 0  0@ 0b0Z  0 `VT4@C 'P0($K- mmmmmWn\ p@-M`H100̩ፐ@ 0 :0S6PIH0GF 000uِ w#mHI@G0F P@) e 0  0 B} 0 x`ЍpndYW@-@(0㢰00o\ O-M:000 23o0&  0i;< `p Y唹@@2 0S Őᤐ\徐ᝐ !0T PU Pu< P P LF0 0@U 0 FP@ ;= ԍ@V 0S XP X D,,UTЍphpp,q4q[.H&]-W0@-P;:㦍@ 0 b 0@00^ 00Sx00S ቍP 0 @ 0  0 0 60[H&Й@-P`@pnP@, U U U U U UPPPPPPSPPNP 0R 9R100pCPAU:@@-@0@a@\ A-0M@00,00* 0^;:` 0 a<xpP ! 0 0 0+PU:$ ?P00, 0Ѝq%Wp@-P@T l * K; %  !  p0@-@P00Ū0op@-P᳑ < =᷌``i@< ```` tW PS \O K0 Fx0h A!1XD$1(1,7!10h$1(1,-0@2@pri_p@-@ S0S< p@,;<_ 0 G2`!1R000Xhx<8XD0<<x<<<<<40P` 0P` }P{ yPw uPs q(oXmdkm!n1$o1(p1<P` 4mn1 8o1 1$?1(@1<P` 4=>1 8?1 <@1$P P P:A ;! < "4)!*1"8+1"<,1 4AB1 8C1 墈v9@ᘈz/l0d@ ገ0 z 0 x 0 yP-TЍpXy^yHypyW-x0S0x0q -x0S0x0j0@-@d < [s  v  ?I0y@- @ 00/0 x0| y0@-@0PC <P00@)\z pX-<ɟ Ѝ`,900  0K3 嬇yKK N0S R%J0R"ʲ0 00Rx0 S 3!KlRP h :K3@C P0 <r 0 P3<{0#00K3 ;sb 0 Pg?200K3 ;vR 0 {P1<0#0K3 KKWP+ @ 㶏:K3@C PA0;:K3 K# S3S 㛏:K3@C P&0 :K3Si :K3Se :K3Sa XD3, " 8? 0 )PK K$PPE  g:K3@C [P05*K#00S O:K3@C CP0PR 1L@$@]P QK"PX QK]PQ*K#P<Uo@:*K#r8*K#:K3SR S ]PJx/PPF:K3S*K# KKQP Q !^PH(3PPDKQ:K3S*K# KRV ST 3 { ]PC  :K3@C Pr0l ֎:K3@C Pa0[X Ŏ:K3@C PP0J 㴎:K3@C P?09< 3{!qKQ KP Q g]P t ㎎:K3@C P0(g! LƇ:K3@C lP0 Kp< 0 P10K3 ;sޅ 0 Ph10K3 ;vЅ 0 P%(1 !0K# 3 <KKP@T ):K3@C P0:K3 SK#  3ST  :K3@C P0-H||a^_p|(}x}}|78~~~ ~WHWT\x X-ZMP@20 0 aK[aKvIK @A0S R0J0R-ʲ0 00Rx0 SZ 01 0KIK|1 5@PP:{v3z0!l@]Kɿ]Kᎅx%|1[@]KS ($P帿]K}ky{1[@]KS]Ko 0 z 0 x0y< ㋍ Kz0 0 x0y @A UP0 K-aK=WW0@-@P0\ p@-FMP00\4LL 0x LLAOk 0R @4` ʿ꨿P @T ᔄ\FލpP(W᐀@-@(000(, X-M`AuPp0S00x㞾P  @@T 0pW00T00 AS<  Li!j1$k1(l1<S0  K- _[0@-@0S6P004 50 $60(70<S<  i "44 50"860"<70EGP [ Y "44 50"860"<705GP [<׾Y000_@-M40 @06P0S@Ѝp X-MxP  @@T 00K-̂ 0X-MPP  @@T 000K0-@-@{~㙃P㕃01` 0S"I!J1$K1(L1<0  㯽 0 㪽;?0+ 㤽 0 㟽;?0 0 㖽 0 㑽 [?0  0 ~ 0  0 0} @_\ G-HMpQ,20D0R 0@ 0{BQ: ra0S4L ;?" 0 KI1 JD 0Q?0S: 0 J3 0Q. <Yo@AJ0S0S00J  ٻႆt"l00O;ᅁP [0 /yP܁ ;d0 #AmaqP< =0$>0(?0<S 0 A< P 0A0 AS<P 0i!j1 $k1(l1<S0S;0; 0  0  bI;90S S S S S L@4(g`sߍHl܃^[_^Wp@-@;? 0 G`P JHP- XP41S; O941S6 < @341S0 < @-41S* < @'41S$ O"41S <@<%@dO4 50$60(70<S 0S<@ @<)@<*@ k9 K 0 d*W5 W3 "H( @P ڤKJKKK' P#00 (4@HT`ltt<@<@N<@<@EO<@ <@ <@FO<@<@Ke;P  @lP 0~ w 0 EYA W= [0[$0[(0[ [0[$0[(0[<4#44!,eR R# R R R dR1N R <0R <0R <0R < @ <&@ <+@<@<@<@  E*>0001@C IP0($K-MK/Ѝ_k\a<ԙW@-@<0(00S g @괔@\ @-H Ѝ<008 0¸@KC嬻ˠ ЍW\ p@- ЍP`⪸@KC0 Tˍ01 T:HηP:0 }ˠ ЍpWWP  0S R0 A-p@Q@LPW` (PU`0   (@-p@0C?W@PW`  PPU` @-@(0|000\ O-HM@50D00> 0J||` 0 K!U0S }}DHЍD50SB { 0 0M  0N  0$0(0< S& S" "4 0"80"<000pDl} ,埴(K-te謒\ؙa^$<([W\ O-LMP30H03pdv;%^v L0 Kㅰ`3 J〰 0Q{4,C0S%:c|0 V 0Q R 0 Ja 0Q\ 0NW <Xo`p; v00vDb0Sp?  vv v0Sv; u0Svu 0$0(0<S 0S0Sv;u 0$0(0<S S S S S S0S0Syv| sv<u0S0Shv;u0S0S]v00S ;A0 PՎ@H孳LЍ44 50$60(70<S;A0  _[aؙ^$@WA-` B0PS 2P0S< }A"<bup 0 G㉯1U1!Q U> U+ U U l }S"4 0"80"<0K 0 Gj 0e0S 40 80 <07%&0 8'0 <(000S"4 0"80"<0&! "0"8#0"<$00S"4 0"80"<0 0"80"< 00S"4 0"80"< 00"80"<0A#P1[ؙ0@-P;t 0 b@0 S000Sx00S tP 0 @ 0  0 0 zu0[.ؙO-MH0S < 9}^Ѝ<tqQ0LS 0 G㾮0P``S 0$0(0,` 0 G㪮 0$0(0,R0SO RM 0 G㗮P 0$0(0<S00@<0! !0!圮00! ᗮL{0S&4`0&80&<  0 Gi 40 80 <01t 0$0(0<S 0S0StЍD_ؙ#$F[@-Pa0S< |@;t0@S00<G S Ph3`shhP00" 00 PP 00 Pr20 P00 Pb  b00Pp Ppdr0000P<; 00<P  R; 00n  ; 1 1 @ 1 1P P 巩P  PPU 000S=D10S (00sA 㱩00! 㬩00<! 㦩0S 0S  0S 0000! 00⏩x00S00<; X 00! ဩ00U0,D(K- В،_Ha _p(D<ؙWA-Pb0S< wA{Qn@np 0 b#P j P* PhAdw K0 DS 4 K00 0Q R $ KK #.sP P0S 3@C P0,帨\3@C P0ᚥP8 ᖥ P4L50SH%0*K.3K!4,3K@!8$+3K!<<K*3K 4(3K 8'3K <&3K0A3K0=3Kp0'T'h**93K$'|*0$L6sKs3K2Kt53K;K:CK8SK7cK4K1#K-K)KKAPDcワ 0 ?~^0|^\ O-*Mp p5020  ̍00  ̍?0O 00O  1눴 0 @S@( $,008 0˗$*%$C0^3,o 2#CL%k-m]P( e d0fg4a``8e@,bpc$4dP" 8 < #<@4 p@@C0k, 0S  fe0d c000000S k l0$m0(n0<S(8 90$:0(;0,R000 $ 0P4 8@<$4(#<#<40S S SO<#@<"@P O:P < @5P < @0P < @+PO(PP%P<@!00O5P ,4 50$60(70<S <@ _@k\a<W<)@<*@ \ 0-ծ <ka0k010  ѱ6S < +㞮 g40 , +㽱 X0 0 \Z]XeP 048 P@<$4(#<#< eLꬭ 0P48嶰屐$@  P 巐`$@ p峀 @<4DP#t0\ (0寠l!4 , \#D`0" _  p$a0(b04$,&<%,, (h 0P4 8@<$4(#<#<4 eS0$0(0 0$0(0<4#44!,D8RB8 [CH<[C\ 0@4 8P<$4(#<#<$=C*;1[C[ 0$0(0 0$0(0<4#44!< S t PRP ú R?< C;2V[C[ 0$0(0 0$0(0<4#44!,r _r^ "40"80"<0 C3+[C[ 0P4 8@<$4(#<#< ba@`P_`^0]  @P`幕C7[Ce[륬0P S⨕0 ➕C ;8`0C/`墬Sp⍕fed0c H⃕Cp ;8`0C/`凬8SXC 儕 偕 YXCxC ;.ZC[X9 h([@0@` 0 5M( 0]@U 0 GB' 0^@J}|{z@y0x @.C6vZCZ '0`/}|{z@y0x L@C ;50C/`@ ~000,0 @CK6=ZCZ 0 6& 0`& 0` 0@4 8<$4(#C+<YCY;.YXY9 80:;48<S 0P4 8@<$4(#<#<4X#$@ C;1QYCYX #005 X`0 "` "K0 "06`x"`h" K0` 0"06`ݪ9 80:;48<S 0$0(0 0$0(0<4#44!< S 㭓? ᨓ奓C;2XCPY  $9 80:;48< ba`@_P^0]  @P{ChK7XC&Y 08`{X 00]p X0 0 GZX< 00^]00尖*ލ,L`tĢr@hT`dkl\\ O-Mp$p 3020  ̍1ᬒ0  ̍0ᣒ0O 0坒0O  1啒0 @0 @ `P {L0S80@ 0~RB0^1,o 2#C- Xnm0l k0000 0 0S0S k l0$m0(n0<S@ A0$B0(C0,R00000 P 0P4 8@<$4(#<#<40S S SO<#@<"@0S S VXI 0幐4pÀ8 P徰@$  4H (`,p0 !d4PL᷀X0!$$<x4|"$\0`0_ @@$a0(b0'<$p%,    0P4 8@<$4(#<#<4 eS0$0(0 0$0(0<4#44!,8R8 `L00 ,  0@4 8P<$4(#<#<$|-E;1tVEV 0$0(0 0$0(0<4#44!< SQH Q 0 \V A @0BC48<4 0P4 8@<$4(#<#<4 eS0$0(0 0$0(0<4#44!,8R8 pѐ PRP R$@ŐE(u0 , {;.VXdVA @0BC48<S 0P4 8@<$4(#<#<4#$⑐T⍐Ez;1UE8VX )005刧 X`0 (` (K0w (06`qL(`m<( K0`f X(06``A @0BC48<S 0$0(0 0$0(0<4#44!< S 0? +(40 , 2 P 0 \ A @0BC48< jih@gPf0e  @PEK7;UEU &08`Xp& 00] X0 0 GӦX & 00^֦oPRP s Rq⾏p? ṏE,i0 , 2o 0$0(0 0$0(0<4#44!,r _r^ "40"80"<0 (⊏Ew3TE5U 0P4 8@<$4(#<#< Vji@hPg`f0e l @P`_EL7TE U0S Qnml0k GE4 ;8`0E/`K8SXE H E XE<E͏;.oTETX9 H#[@0@$ 0 5 # 0]@ 0 G" 0^@@0 @E6:TET |"0`@0 D@֎E ;50E/`Rvۥ@ 0000 @庎EK6TEeT 0 6㭥x! 0`嵥\! 0`宥 0@4 8<$4(#<#<$⊎Ew]SE6T 0 ]~ 04 X0@48<4#$<#0X0\`dh0@-P@ FPT0S  3TP0L PA-M@p 4P4 DD@؊P@D 0BL 0`BP0 @ p0`NPT0 @00X0^  XЍ!!!!0@-@P00L0蠦\ 0X-D Ѝ8100 (10'[{K0-MBK⳥T0, @0 PBK u@@?|u:  X 4@C ⨊P00Ѝ-MBK⋥Ѝؚ|\W 00( 00 -0X-@P^Y0t 00 ,@(@0000K0-K3Z-K0(Ш`p@-M,(@$P ` @P`XЍp-MTЍ$ -X-M``00@0S 40<0P8@0N, 3w00A   @P`}(0SY000\00+YK-KMYЍ-KM0pЍ(Ш0@-@P0\ [-$MpP30(0 P L0R K⎉P@D 3BL 3`BP0 @KPZKK@2`@P0 D0 0 ` @ ` @ d 0@H2\ 0KK0 p0` KK0 pT0S_ AK|AK~@1 0S1 @Y8 1 AK K XQ00 Q 0 c K(ZKK\XhK X0%`@@ 0KK` KY0 I KZKKBXdKW0K@@ 0K` KY KQ ^1@C >P0KKSY(،$K-MKKYЍ-MKЍ-MAKЍ-M KЍ!!!!W0@-@P)00@-@P000(0@-@P000/$/ $/$/$/$/$/ $p@-M`P 0 0@0 @ވP @0 @׈P 00ňЍpЍp -0P- M@ 0 00 㸈PP$0 P塈P Ѝ0蝈 Ѝ0P  0S R0 \ p@-MP`002,0 0@0 @偈P @0 @zP0 0Q R aߍpZߍpW\ @-!Mp`00 20@000P ˆ0P  0@S R0 000  8P 0 P"P" 宋!ލ 娋!ލW\ 0@-M@P002x0 d^ ~ T @ 4 (  h@偋ߍ0`f7W\ 0@-M@P002x0 d^ ~ T Ո@ 4 ( Έ @Uߍ0`f7W\ O-M`px100 000 00$0!0(0#0,00000400800@P  @<0@ P坈ᗈ@@P␈ 0@T0#0:@@@P0@T!00@ 0Q0#0 @@0C 00BC44B P: @hЍW\ O-M`p100 00 000 00$0!0(0#0,00000400800@  @<0P@ 5@@0@ B00BC4B$4@$AP T:@ 0Q0#0@@@P0@T!00 @@P 0@T0#0: @ЍW\ @-)MP`@00p2 0t هdT ԇ @Ї000  цP  χ j @0 @峆P?)ލ譆9)ލf7W\ @-MPp@ 0 0`5 0t 劇dT 兇 @假000  ゆP @0 @{Pk 0S  mߍ[ߍf7W\ 0@-M@P002x0 d^ ~ T <@ 4 ( 5 @弉ߍ0`f7W\ 0@-M@P002x0 d^ ~ T @ 4 (  F@吉ߍ0`f7W-\ @-"M`@202 0D SV R"0@ކ |"0@Ն0 0 0  ̅P ׆Ԇ]цaΆfˆjȆnņE†K⿆N⼆s⹆vⶆyⳆSp0 p咅W0 p劅[0 ]p傅_0 apzc0 fprg0 jpjk0 npbd E! K B Nl0o sfT0 va<0,o y[ 0, UΈ"ލxxV4f7W\ C-Mp4020 0 P Wc#0p000  P @0 @P @ 4 ( ST0U V0 @P @ 4 ( WX0Y Z0 ]@P @ 4 ( [\0] ^0 a@P @ 4 ( _`0a b0 f@ЄP @ 4 ( cd0e f0 j@径P @ 4 ( gh0i j0 n@嬄P 4 ( kl0m n @0 E @善P 0 0P R  @0 K @P !0 0P R  @0 N @hP B0 0P R Nl0o sT0 v<0,o y 0, ćߍxxV4f7W\ A-M4020 0 P c#0000  P @0 @P @ 4 ( ST0U V0 @P @ 4 ( WX0Y Z0 ]@P @ 4 ( [\0] ^0 a@ڃP @ 4 ( _`0a b0 f@ȃP @ 4 ( cd0e f0 j@嶃P @ 4 ( gh0i j0 n@夃Pp 4 ( kl0m n @0 Ep @厃P 0 0P R | @0 K p@wP !0 0P R | @0 N p@`P B0 0P R Fl0o sdT0 vd<0,o yd 0, d弆ߍxxV47WQ  0S P:\ p@-BM101@圆Bߍp! ÂXQ0` ````0````````` `P Y` P (   4 L0P (   4 p0P (   4 0P 4 ( 0  @Bߍp8W@-Mp 8㽃P @0 0P@[T@ @`0 U~TЍܪq $\ A-M`10 20 0 PF < %a 0 gP @0 Ep@^P A lp A `a A0S1S A Up 8A `J0SO 峅ߍdYP`l7W\ O-&M20\20  0 P\囅&ލ< *0+ 0 0 F pd00H  q傁 !"#$%&'DEFGIJKPQRSLMNO<=>?@A 0X(0,p-0 `@`p)0*0+0.0/02030506070U0V0W0X0Y0Z0[0^0_090:0;0000%1&1'1(1BC0 14pT\]@8`嫁0)1*1}1~11d0@a0b0c0-A`pefg+,們./0123`xY 꼪7(UWd945678=q0\>?@AqBCDEAFGHIJKLMNOPQqRSTUVWXZ[\]^_`abcdefghijkl:; ?0 @P@ 4 ( T U0V W0 @P 4 ( X [Y0Z @=0 @pP@ 4 ( \ ]0^ _0 @^P@ ; 4 (8 90: 0 @LP@ c` 4 (` a0b 0 @:P@  4 (g d e0f 0 @(P@ p 4 (m n1o!0 @P@ 4 ( ) *1+!,0 b@P@ 4 4 (} ~1!0 @~P@ 4 ( - .1/!00 @~P 4 ( 1 4213!@g0 @~P@ 8X 4 (5 617!0 @~P@ <  4 (9 :1;!0 @~P@ 4 ( = >1?!@0 E@~P@  4 (DpA B1C!0 @~P@ H, 4 (E F1G!0 @t~P@ L 4 (I J1K!0 @b~P@ P 4 (M N1O!0 @P~P@ TH 4 (Q R1S!0 @>~P 4 ( XU V1W!@0 @,~P@ \ 4 (Y Z1[!0 @~P@ 4 ( ] ^1_!`0 @~P@ 4 ( a b1c!d0 Q@}P@ 4 ( f1e 0g!h R@}P@ l 4 (i j1k!0 @}P@ t@ 4 (q r1s!0 @}P@ x 4 (u v1w!0 @}P@ | 4 (y z1{!0 @}P0 1} rP1S h~h$0 \&ލ;.4==<<<|<`<@<4<<<;;===t==\ p@-"MP102 A!`0`L~0 0 0  C}P% 00`0 `0}0 a`(}0 j` }0 n`}} N墀"ލp`7W\ p@-"M@x702hW`'`0`}0 0 0  |P `0 `@|0 `|0 !`| 0 `|0 `|0 `|0 `|<000 `|0 *`| 000 `|(0 .`|,0 `|00 1`|D0 `y|H0 `q|P0 `i|L0 `a|40 `Y|<0 `Q|X0 `I|T0 `A|@0 `9|$0 `1|\0 =`)|80 `!|`0 `|d0 `|<m000 `|w 2(S @!(0x ,! !!! (x00@0 (@ @@@@xP vv!P P5S p (P0A w000  @ @@@@wPvPPH[zߍphtȫ7W0P P P P00P  PJP P P  P P P00S S@-M@00Ѝ(0 0P00ЍT>\ p@-<ğ Ѝ040T6 D0P, `0$,PP ,|PP #,0 TZw00 0 0 T OvPHv  , ,8#,0 T9w000 T 8vPHP`0 _P`vP0 cP`vP0 P` vP0 P`vP0 qP`uP0 uP`uP0 yP`uu!!V!Y,A`,0SS yP$ $0S PUC ( 0 , 0 PPU ,P( ,P(0SU  ,`U:yy`VXrP XXy4m` 4?4 Ty̠X ЍpdY4fl7W0@-PP |@}0~ 48<s @0 48< .U 00p@-P@P `0 48< <PS`V@TUU TppPJP P  PQR RQ Q Q Q Q Q Q QQP! P P P P P P P P P P P P P P P P P00       0000QQQC-M@`p0 LuPu|0 @  0W0X0@D0000  @+u@0S@tЍF\Lج\ 0@-,MP10(0 P/U(x@,uP !V!P tP(x@tP 0@S:X OPtP 0@T(w@,Ѝ0(w8k748W@-P!!P P PpmtP !!!P B P ST0U V48< S S S S S 2SWX0Y Z48< S S[\ cd0]e@$^f`8xL P_`0a b48< S Sgh0i j48<5 S3 S1 S/ S- S+ S) S' $S% 0S# HS! `S lS S S 'S 4S NS hS uS S S S S *S 8S VS rSikl0m n48 ,{P] T Ao4PV [\0] ^48< A'PI cd0e f48<S SPT `P1 pU _qP# ptЍBW 00- 0P9P00@ APFP70@aPfPW0@N0Q9Q00A AQFQ70AaQfQW0A,B,2 @ \ 0@-MP@@000"P qPsЍ0W\ 0@-MP@8000 PpsЍ0W\ C-eM@P @p`VPpPUj oseߍWA-@`XpPUppvp  @ .ppA@-p@`:pP[tp @mpPp@g\ C-MpP`Pp@Ap00000001Jp P oh@` <o p@T.:sЍ W@-@P T YoP K`| TP p !4 $ 0 6Ppp0Pp+P l8P p 4 ( 0 0 48<S00ą0ą0ą0ąCk\ O-MP40100pr pUrp0 48< 0 48<Srp 0 48   wPrp 0 48   P 0 48<" 0 48< `S @0 48<P 0 48,<`o@V:: ",n, Oo `q 0 48 ?4P8, J 04 8 XY0Z [48, 9 0 48TU0V W48, ( 0 48@A0B C4x8,  0 48$%0& '408,  0 48\]0^ _48, 0 48890: ;48, 0 48`a0b c4X8, 0 48mn1o!p48, 0 48de0f g48, 0 48=>1?!@48, 0 48AB1C!D488, 0 48EF1G!H48, ~ 0 48IJ1K!L48, m 0 48MN1O!P4`8, \ 0 48QR1S!T48, K 0 48UV1W!X48, : 0 48YZ1[!\48, ) 0 48]^1_!`4@8,  0 48ef1g!h48,   0 4(0iAj1k!l48, 0 48qr1s!t4h8, 0 48uv1w!x4 8, 0 48yz1{!|48, 0 489:1;!<48, 0 48<\h 0 48,,6$ 0 48)*1+!,48, 0 48}~1!48, y 0 48-.1/!04P8, h 0 481213!448, W 0 48mݍx9|9p9d9xV409 9P9@9988888,8rk====;.;;=<<<<<|<`<@<4<<<;;t===;h;d:0;;X;<;;::::::x:L:O- MP Y 00 x  0 48 o < i, f 0 480 48, ^ 0`4p8''H'\, p@PL 0  `4ph8''H'\, p@P: 0`4p8''H'\, p @ P( 4 (  00   48,  0`4p8''H'\, p@P 0`4p<8''H'\, p@PA!P%%4% $0P 0@4P8%, Q 4 ( 0!0 "  #4`8, ( )0*+`4p08''H'\,  p!"@#P, -0./`4p8''H'\, (p)*@+P0 1023`4p8''H'\, ,p-.@/PD E0FGP4`8H&1&&L ,0`23@~H I0JK`4p::::x:L:8:::9999998''H'\, DpEF@GPZP Q0RS`4p8''H'\, HpIJ@KPHL M0NO`4p8''H'\, PpQR@SP64 5067`4p48''H'\, LpMN@OP$ 4 ( ?50=06 > 7<448, X Y0Z[`4p8''H'\, @?PT U0VW`4pT8''H'\, XpYZ@[P@ A0BC`4p8''H'\, TpUV@WP$ %0&'P4`8 &A&&L ,@`BC@\ ]0^_`4pp 8''H'\, $p%&@'P8 90:;`4p$ 8''H'\, \p]^@_P` a0bc`4p 8''H'\, 8p9:@;Pd e0fg`4p 8''H'\, `pab@cP 4 e0n1gm (pf o!4d( 8, r=!>1?@a4p 8''H'\, mqnoApQ`A!B1CDa4p 8''H'\, =q>?A@QNE!F1GHa4p` 8''H'\, AqBCADQ8k====;.;;=<<<<<|<`<@<4<<<;;=t==;h;d:0;;X;<;;::-M0 0ЍD\ 0@-!MP00 200u Lh@)@U 0Uʘ0u  U x Ped X e000  dPeP@d@  h!ލ0輪`f7W@-M@P@H0 dPeP@td@Ѝ70 \ @-M@100a0 0 P0@0 eЍ0AW-M00PЍЍ\ -IM00 1E/a EaE?0bP 0S:8 EP 1S1(S  S  S  S  0 dIߍXLW@-@0S00XL\ 0@-FMP@D0010E/00 PbP0 0 dFߍ0Wp@-M`@P`0000 ``Ѝpp@-,M@P` 0 @P(``Pg @P0  @PPP`@R0SM!x!p`$P`0 $P``(0PS0( (P:````P(0 (P``(P0 (P``|(P0 (P``P H8 0|` `T,Ѝp,Ѝp贮pT4(̮ܮ4$qq8 10S 0("(=R:1@\ p@-\Ÿ ЍP204 <`bP0S t u0$v0(w0x y0$z0({0<4#44!,R R <0R <0R`0!  0_D00 L0\0S 0CS0X0X 00ST 0|S0:p0 - 0tt0 R': @" 00S 0P(U0SR : ^PP0T 00SP0T $ @0S:0 p[\:V]Ѝ0V00] Ѝ訰Mb  0@-PP@@T t]P 0@0C-`PpA 0@> 0S   \]P P 1S1S  0 0 D@P0S ` 0?]P P 1S1S @ 0 .]P p 1S1S\  -pP-M``Ph0008@0@ ^0T:4 ` ^0 N^[`ЍpWO-Mp@0 `S  P P0 S5] ]0 S 0S`P0 &P %P%W ]P0S0@ cWA  6]P;0xS  X]^- 00;S)^Ŵ 0?0 B0O0d 3 `^2 B^2@T?0 00;]\@;] a]0P0&T&W W *W %TC%WA0@ \ \P @11 S, \;~]@ D0HS@ڣ\ @E0V\\\Z]`P;e]@@\ ] u\ZPY W *W']P 0\*W0@t>]P j\ \0 S 0S0S DR:0 S00Ѝ4gfff8@-p`P(0@ 0S [P 0(0 0@<C-p@P0S &S @PS" %\  I\P 0` \ >\P `1 1S  PG-`@@Pp\0S \0` [P\Pn  \0  \Pd04H00S[HH0S 0 z[P H0P!0S1S0{\0 H0s[H 01H01H01H01}\H01H00S H01 0pS0W\H0H011O\H0110SH0<41100C[H011H01a\`ldp|O-M@P`$[xp0pU00#400#800#<0q 0;p<S %S 0S0@d  i[PR \0P\ \ p[ 0p"W 'W > [P;pU? 00%S@@@0S  0S0[P@Z 0p%S@@ p@[P % pp pP  [PT [0S <[P0>S D@p0S 0 ZP D0p!0S>S  [P0S [0@ ZP㌣ ZP\u[0@0(S)q[@(y[@T c[P ZPY[0P#Q a[ 0PC RT @ "Q 'QU F[PP @@D1SW&Z0&[0D0ZD0D01D01@D01@D0@0S D01 0@S0[D0YD011 D011 @ D011D01PXZ0S[ !  >ZPZP 3ZP @ZP"  EP<T>ZP%TP4S WYX 0 z< 0 sY4S00@Ѝ舱бıȱ 4 (O- MPP0@0s sl rY0p`0CS\<<[0 00 0T6;ES0`0CV *[0 040 040 5X Y  DZPp4Y Z:UPǷ@ 0U ?0 0B00n 3 U20@  BU2^?000@0`P0CV:@Z Ѝ Ѝgfff@-@! 0T 0S  0S1p0S `P0X0@X0PSXXC-@P`VE r0Y0 0S"Q Q1 Q Q QWWW&Q <Q >Q 000 D8,0 }X00`V04<DLPX\idlO-MP@p` ^008PB 0kYX0 00S0 @X0000S<  0 00P+ 0CY0 {X0 00S0 X 0   PE 0X000 0S<0XP 1S 1SB  0S; 0S 03 00y 0P+0X0%X0 00S0 W 0  P 0lW0000 S< 04W0000 0 ) 0 P0XW0 00S0 xW000 0  0S Z:0 0 Ѝ0 PЍt`L|O-$MP P U@@0+ @0 WW` `U 0S 0 0 XVpH 0SK  0S  0S07 1 00S>S- PfW@ cW"X` ` W `H00PSW@ PW0 00S00 S22V0 `H0 1p P@ D0  a`p ` @XXPH 0SR  0S  0S0> 100S<S4 00V@ V0 00SW` ` V `H00 V@ Vp0 00S0 lS`0X0yV0 `ppH01P0W$Ѝ40@-@ xPV@@ VP e 0Q0#0: 0WoV@PV0蠲@-@p  0S]@ P(0S (080P:<0P4V@ P0S@,VD00p `P0 0 80P:<0PV0SVD0`0pD0S VH P0S ` 0S1UH0UPH0a 0SH0SU00s,U 40SU2@U2UU0@-@U UUT0PN@(P0)V,U(, @KU0@@0H0D00`LA-@0000 0`D 0S 0 0S000@`@PpUP 0pPU 0S0 0S0PS00@WU0 0P 0S0 ``R @@p@-@P`p(eU( T$0 0  Pp@C-pPP`@0S :UP 0`!0S1S3Xu 1T4U00HV00-V0q0101@]UpV0 1 01 0 2  0 1 0 2 T@1S 0!0@S1 ?p0@T2 01 0@0@0X001 100T0D0!U0U1? gU2 02P202@-p`P(@0S T >@`p(@C-p(@/ ^, R* @ PT0SP 2@ T` UT` TT00TUnT0S2@02 -_-MP@4P0@`UX',@ 40400@40<08@ѠSC0<S 0S0S& @,܆ p*UPP_U :U UJ/UpOU@P>Zo PP UP< T)U@7X {TP<*U@ 0>S SS%>Z# &f dTP UP> @0D Cc0G  RTP*X>U]UdT00>S DT@P[UU0S>ZX [Tp D@P' ?U ?T@ 0S >S0S>Z0D C(0S hTTP0P /U >U D00S0 {SP D00РȃUu /Ur >Up Y 0 tTmSY 1/0hTaS? 0 DPPP@sT=P :TP; PXTP"U 'U2@@0S 0S0S 000S P0S SP P 1S00 0@,B,P:P 0/@SP0PРP/U000S >SUS>ZQ 7  >U UC>ZA %PT 0S 0pS <S <S 0S0S &0 D~S|(0 ) 0S    p  \ 0x Y 0( o j`ЍIJ8DLT\`lp(| A-M PvR@* `0+SpP W :jS`V@XR@T  W U e 0P0#0:000ЍЍ0@-0_RP @PR0@0蔳@-$@P000 qR00 @-|@0S000\ RPQ8cR,00^R0 0YRȳ /<$/8$/4$/0$/,$/($@-@_00 0( , 0 4 8 < @ @/0@-@PL00 @0( , 0 4 8 < @ 0@/@- MP@p`R  P R 0S 000 9Q Ѝ@/-M0 Ѝ/-M0 Ѝ/- 0S0 \0//0//0/@-@P PPT: T0S@/G-Mp`@P@/P0 @ /ЍG/@-,M@, P,00xR0 {RPPRP 0S ,Ѝ0@/00(//@-@0  0#= S000~4S10QBR 0<"~40#0@/@-@p`GPT\20 R@/-  R:BR R:< 0R //,0//-Qz!00/-Rq!00// X- MY7P  L" Kh/-7-O/-Q(P 0l0///0@-@0 0S  00S QOPP PP:P0@/p@-`@P0S O00V t!OP!!O@p@/-P Q 0R/ O-(M0$0 P T 0 ^\pX@LP  BX`0C$ 0 0p@P/(ЍO/O-$MP0 0H L 0 ^T`P@  BXp0CQ 0 0`@P/$ЍO/@-`@ pWP(Q9P 0S P P PU@/9@/p@-PR`@i$ T 0Qp@/@-MP`@OpT 0S% O OO PP0 TA@ O00NЍ@/X pX-$M`0$0 , (` p"@PPzO@wO0 @YPU  @P$(p@  Pp dN eN@BN ?N0 ̾YNP @P$(p4 ,08B?00/€C ?N R? I@AX0S@G!P P 0T@0@000 <ЍG/O-M@p P P N,00,0y&<, `W 0 OPU R &OPpU 0 OP 0 S:S S OP0 O'P% U 0FS AS% NP0l0/P P&P0 pOP,040,0#ЍO/- ,04 0,00 IN/ -0P-M@P P 0 ,0(0 0000  (0/P T 00 (0/Ѝ0`/ X- MDYMP  Kh/-_ȶ -X- MP  Kh/-KS@-@0S @OPMP000@/0@-P@0S000 M000@/0@-P@0S000 M000@/0@-MP@0S`/Ѝ0@/@-M>"p@0SO/Ѝ@/@-@p 710@/ -P-P0` 0!r0/1 0SP0`@`/0000 0@0S 0 `/  -P-p`Pl!@/ R 1 0RP0@@`/ @-@86@N 88(C8B(p0l X@/᰸T0@-P<46Pd0` @\/0@/᰸TP pX- MP!@0SU 8P`CLP `0X P ``70008Kph/-MLЍ `0@-@PK8@0@/@-@( 5P~0S@@/᰸T-805Pp0S00/᰸T@-MP`p@0^  0 PM0|0/0S 0 M 0x 0 PMЍ@/p@- M0`\T0 `5P*0\ P20@B@0 / Ѝp@/᰸Tp@-M`PD<D5Pd0` @\`/Ѝp@/᰸T@-@80S 00/P@/@-S@ P @/@-M@P Ѝ@/p@-MP`@ pN0S p[P @=ScMЍp@/ -P-@P 8%8P 0P`/@-pP0`  6 02C00@ RZ0`@ (K@0 0 0p@/0@-MP@  K 0R 0R LP cP00/PHЍ0@/ _-(8Mp\p @`t4P`P =DKX JX@\d`pX80S 0\0/X@@)T PPpp7P 7T D0S@ @WTp TKpJ\  0@/@W TK{\@`PXDK J(Ko/-`0X@X"T\ v$Tp@-@ 0`P 0S  `<`p@/p@-M`"@P 0S 0S0TE7P I P$0S$P8000/ 8PKP K@P0T 0|0/0S  K00/Ѝp@/@-MR@ \PЍ@/@-P 0 00/P I@@@/@-@ 0S 00/P@T @0@@/p@-@P9P2`. T 0S @  @0/P 0P@0p@/"P 0l0/P  J0@0 @00/Pp@/0@-P@00C 0 B0c0hdK@b0@/0@-MP@0 P0S 0S10 00100Ѝ0@/@-M@0 0 PЍ@/A-M@pP6W@ ` 0S0 @P@W <0 "I4 J0 4K@ЍA// @-@8000/@0 8 S9@/0@-M@ 0<0SP PP b0] 0 E 0<0S <0SK<0T0/PЍ0@/p@-P`<0S J@:  J0SQEap@/<00/p@/@-@UP (0S H P@ @/eJ H@/aJ@/@-P @0 @0_@/@/@-Pp`H@ AJP  PUD@/ P P$J@@/G-MP`pJ,@" (Y P 0 P]0 3HX IP0 I@P P @ `4P D0 Y P 0 P+0 HЍG/O-0M p`\`0 ,V(0$  @P `@ `P GT iV000 `I@7 9; 0`0JPupp?PUlp h4P D0pS p U U: UWa0 GrI@ `T`VX XI.X$0( 0 %[# Y! eVXp0 P ` @0 N@D0  @9  S 0 d0/ _0ЍO/p@-`P0@ P 00/PT aG@p@/p@/@-M@pPH ` T }HP V 0T 00 00 0008L`( 4Px0Hdt0P$Htt$<`p4Tx00 S 0 G@0/00 S000(Ko/'8(B(A/////// ///("('8/ /K0lK0 w@L qP 80S L$0K KP00S00 lK 0K/0 0 L lKHKK0 K0 /00 Kt !(8/y!((/rc("('8/h/c /].0!((/S /L/F /?/:/4 /-!((/%'8(B(A/("('8/("('8/  //q./i.'88(C8B(///("('8/'H(8B(C8/ / !(8/(H(Q (0B(A/(B(A// / /} /w'8(B(A/n/j/d!0((/['88(C8B(/P'8(B(( (8!C8B(/P@2/P: ,* /1- /(- / - / / / @ .10 0 /0S-MK2Ѝ-MKЍ-MlKЍ-MKЍ0 pX-LM`P`0@@4d0K` KBPP'B`0Kd K6P00S 80S $`0Kd K)P@@T \K\K @ P0@@<0 \KU @Kph/-\KJp@-M@`P+U:/UB9U@ NU1 <U <U<0U2<2 0ES @/E0 @` 0SЍp@/48&(0LP 0S   / N8 P0@P8 0 /a@-M@0S 0S@9 S 0  Ѝ@/᰺@-M@P 0l0/PH9 3 0  Ѝ@/᰺O-MPF ;p@2 0}t2 @0`b 0 00,`lP@  0 00, aP @ 0A ,0$UP@  <0 $,0GP@  \0 $,09P@ 00t@]@ 0@0k@ 00c@  00[@  00S@  00K@  00C@  ;0;@ <03@0 = S0 @00S0Ѝ@/0T@-@(0SG 0(0@/0\0 X-8M@P10 0 0S00(`T KAP7 ( 0,K,0 ( ?P00 :C)(|?pPuJ?0 P  0H3V00( E0H,V\0PPTKP0 P0$?P00(0 CKh/0TشhWO-MP`p ^7P}0 @开@0< 840,@(LpH`DPR0 @$0`  @/PQ vPM _P#@0 !8 10 P<0>00P0B,@0P /P ` X0T0B40d0\ 0C0C00 $@(P,`0p48<@0D HL@P` p@ @ P0 0/T 0 0/ЍO/ -X-@@000#Kh/-K,O-(MXT@LPP`\p` 0 L @P` p$`>(ЍO/@-(M@  :+0 @Q>(Ѝ@/@-(M @ :t0@B>(Ѝ@/0@-(MP@( O> :K0 P.> (Ѝ0@/@-M@+Q +00/Ѝ@/G-MPp 0@4P`0  @/ЍG/ -X-@@000Kh/-KTG-MPp 0@4P`0  @/ЍG/C-M`p$P 0@P /PX0  ЍC/D -X-@@000FKh/-K?|@-M@+Q 00/Ѝ@/p@-M`P,0@ 0>@P `|=Ѝp@//ᘼ/ᴼ/м0@- MP,@ 0 t@r000 :a 0 Y= Ѝ0@/G-(MpHL@PPT` 0 M @P `p>=(ЍG/A-M@<@8P4`0p @P`pЍA/P -Y- ,MPP@`p0( HKL0 /=@@ qW0L0 @@0@  H0K s4 =0DP0S FU Ki/-KL0 L 00L0  X@-M@U$0 0 8PЍ@/0@-@P :0 <P :0 <0@/@-@_@/@-@ <0 <P <0 <@//|/p@-PP0@S!@b05 C R]000 0<Lp@P/Q/@M/J/@F0S /=0S /@3 R 0 /* R 0 /@ `V /0S0@@0`V  ///@@p@/C- M@ptw8 R r8(P 0 @P/t $hH$H<`0(0/ 0 P 0/P0S ЍC/( 0  K/J///P/l@-@ &0 0/P  &00/@//|,0 0  $     /O-,MQ@00/ 0 ! 0S 0Q: ,0@P`p0 @P`p $(0 =,ЍO/C- MP`0* <8#^% X pp0 @p/pU 0S0 P@0 @/00/p ЍC/p@-,M@P`, Q; ,0   0 0 =P ,Ѝp@/A-0M@Pp , 4;,0 0 0 `<P 0S `0 <PV PK U=P H0 H=0ЍA/@-@F0 0  0 @/@-@0S0/00@/0@-P@ 0  0S# 0Q:9 U00+ =0S. U ; 0P: 0 (:1000@/0@-P@ 0  0S 0Q: U00+<0@/0S 0 : 0  :0@/0@-MP@ 0  0S+* 0 ,Q: 0+P80S !Ѝ0@/@-8T@/@/<0SP/-80S 00///-80S 0P0///-80S K:/80p0//@-@80S ::@/8 0l0/@/0@-P@,0  ^8 0(0/0@/ d<0@/-<0S ;/<0t0//-<0S ;/<0x0//@-<^ @/<@/@/0@-P@5 ;<0PS- S %<0@/<00/0@/0@-M<^@ @9<PP@/Ѝ0@/-<0S </<00//-<0S ;/<00//-<0S m9/<00//-<0S ;@/<00//-<0S80S00//A- M@<^ ,0( Q$  0 0 ]9 <,`(p $P0@ `pP/ ЍA/0@-MP@ <0S .90 uP  R80S0 0/Ѝ0@/-Q8%P 00//// -X-@@p04 D08W PP0D00 HD08 0H0Kh/-Ki4$ -X-@@800 0SWKh/-KP4\` X-`M@\000 pKq pKTP 2pK<Kh/-pKW@-9@9P@/@@/t/t/@-@ PP0D0@/0D0 H8 0H0@/0@-P@,00p0/ :0@/@-M@Pp, ^p0S( S& S SgX|1   6PX0C $4P00/@PpT`LPW U 08K0/00/P00/U ,05PVR6U$Kk/-KMHP0 L4 Ѝ-KMXKNЍ-KMDK+Ѝx -_-( M@@dp`PX0 S  X 3 3PUpWu P0P b`8 <` 4 U( 6U% f5P! Q38 P 0l0/``<` V 00/P P 4    0P ,0 p. p 0S 000 @0P8<`4XY3U 4 0P5 0\0/34(Ko/-K M,P0 4 Ѝ/p@-PR`@ O P l / 0hPqp@/-MЍ/@-Mp`P<0#T0X`S8#8T0  @ 220 @Ѝ@/-M000Ѝ/0@-MP@ sPOP0 0PЍ0@/p@-M@`P 0S&(P" PQ P0S u2 0S P  Ѝp@/- P 0l0/P00//@-`p@L1S @  P 0l0/P@ @T 3 22@P0T P)20WT 3@V U 4P U P100@/-/\ A-!M@P00 2`pW10S0CS @0@0ULP0A/P{4AP0̍08 3V@1k 5!ލA/Wp@-@P` 0 0 @/p@/p@/-/ pX-M@`PKALPK CMt@ P0@C 1P00/Kph/-KL/00/00/0@-P0@S 4@0P 4P@0@/0@-P@ 0R40S P 3P0@/0@/0@-@P 0R30S30@/0@-@P 0R30S30@/0@-@P 0R20S20@/-3//|//////$-M00-3 @-M00$3L X-00//0  0   /0@-@P 0R T30S T{30@/0@-P@ 0 00 0 0@/-0P ,0  0   //-0P0  0/P0  0    /P 0  0/ pX- MP@0SU P`c0P `0X P``000Kph/-M>0Ѝ`@-@l@/4 pX- MP@ 0SU P`)0P `0X P``00 0 Kph/-M0Ѝ@`@-@2@/0@-@0P l0S%00/000@/-0 0R 2/@-2@ @/p@-`2 0P@R 2@0S 2@p@/p@-@`0PP Tz2P0S Tq2Pkp@/p -X-@@\00m2<0 0R W2Kh/-K0@-@0P  0S000@/-0S/0/0@-P@,0 0R Z(2M/0@/0@-@PB/0@/@-Q@@/@0 0/@/ -X-M@@ 000 000l00 001P800K0 T1Kh/-K @@-Q@@/@@/-0S00//@-@/@/\ p@- ЍP`|0040, @/P U: P)@2ˠ Ѝp@/W////@-@0  0 P000@/-M000 O-M000 P-M000 Q00//@-`P@ V pSp 0S 0S 0  8^E@/p@/@/@-@00O.@/D/ 0X-MP [_ K.@@  80  0@KP@ {0-@\ p@-MSP@`` ; `` 1P` 07E 0Ѝp@/@-@00.@/-/0@-@ C.P0P 00/P0 00/P0@/0/pG-p`Q0@Mt 0  0@Q :>0P\0 0/ R*0P R:P0000G/ 0@-@00SP PPPPP0@/ 0 0040T0L P/\ p@-5MP20L320.@`T h.00c.h00^.0T0Y.0S0T.(0 0O.0$0J.0(0E.0,0@.00S0  S0000S 0S 0S $0S (0S ,0SP@ ```` `$`(`,`0`.E/0B-E?000.@0S50S0 40S:<0Q/A0P) Q".P0" Q.P00S:80S:0 -000J,@0 /P0`00L05ލp@/lP0W@-@$0 0R -00@/0@-P@ $0R0V-n0@/0@-@Pc0@/4 X- L 000840( Kh/0 0 0 txPD-/-0S/-/- /-< P 80 ,00X00 (//w(@- 0@S00000 0 0S 0 @/-P/᰸Tp -X-@@00h0 0D 0/h000/p000/l40@C f,P00/Kh/-K04LG-K0l@-@ 1R000/000/000/ 000/$000/80S 8 0S q+0000/4000/8000/@/(@-@ P0R0,0S ,0@C +P00/@/0@-@PZM0@/0@-@PC0@/@-@4000CF00000 00@/ 0X-M@ KHK0PC +P00/0 0  $ ( , 0 4 8 < @ D H L P T X \ ` d h l p t x | K0h/-KiF0@-@Pi0@/l -pX-MPP@X1 `00``$``k4E0<` `H L```d` 0 (0 `@400C 0 b:C0Z4E0 00@ P  kPpKph/l-K PT-K04 F-K0l-Ks X-Mt^@@  (00@Kh/-V-XPGP0S,$y0S/ᬸ,T-l,P/0O-M` Q000 S 2 p 0 p*P"@0 p0 *P 0S 0 S0000 p0p*0SЍO/\T@-@p R T0S0T 0T0 0 0/$0 00/@/XT@-@p0S 0S S e0Sl000/`0S *0`0@tP q@@/@-@eP<0S/,@/p@-PSRPQ& Q$ <0 Q`@ 0@S< `xP 0 00/@P 0 0/@p@/0@-M@PTʺT0 S 00/P T00/00/0STTЍ0@//p@-@WJ+@0PS .SP0SU `T \P /P c,P`FV@p@// \ O-M10D2@[+P,*P# /8,#8`@?;H,00D,800@*P /8#8@?;4,0 00,@0+p!WP'<` P ~2@0 ,P 0  F+p P* )@@T PU`D,@ߍO/D,8qW-]/0@-@0t0/00/P`P '0 P`+0@/,\ @-"M002@A/i+P AP 7L0  (W@,,@"ލ@/lW@-@ 0SP@/ -pX-@@P@0`U0 +LL`PlP7Ѝ-M#K>Ѝ-MK>Ѝ\W@- M@ , @0 @@[ Ѝ@/tp@-P@ U u l`<0S^d00d0S<N$Ud0Shh0d0C$np@/᰺-T0S 0 0///-Ql0S00//-T0ST00//-T0S0$0//- l0S00//l0 0//- 0 +#/0@-Pl0 <Q*0<0Q:@QJ0T0 0/Pl00/0@/tp@-P`@ U S :P00@ @E Q@10+90 p@/S-8 /@-pP@` @/PE &P @U&P T "P~=P0@P*0 +90S+4;@//TU0@-@PZ0@/01#P 0 0 P@0@/-#/@-@Z@/0$P @@/@-@"@/p@-@P`1 k9UT \e90 0/P:00:0 $+p@/WA-Mp0 ,@(PP`$ @Pp/ЍA/l -X-@@000+Kh/-K@-M@+Q 00/Ѝ@/A-M`0p(@,PP@ `p/ЍA/ -X-@@000Kh/-K0@-M@P+Q1 ,Q) -Q! .Q /Q 9Q )00/0 0%(0!/0%(0!/00/ 00/00/Ѝ0@//4/P\ -FMh001E/!E?0#0S:0S:h%d%Fߍ/W` X- MQ QU_ Kh/`?x/0@-@P(@!Px d!x0@0@/@-@80 t0 00/t!0t0@/0@-P@!t8t 00/0@/p@-@`0 P   U!P& L!P! U i80S P0 P00p@/-00//-00//-0S00 /-P/-/@-MP@`p,P0 Z Ѝ@/@-@P`;PU U(@/:  @" w"@/UU 04p$P8lV 0 48( <S@/@@@ 4 ( 0 (.4.(.0 @/-0 4 S 0\0///-00//@-MP@`pP0  Ѝ@/// - 0R0< /0@-P@ $0R00 - 0@/A-@` V0T tP1R#!$T:@TaA/T tP1R#q WT:@T`A/t"@-`PZlR0 UV @S @ @@@/ @V@0!0 @/ VV)0F!#0S0S0B1S0 S;pVpW20 1@(60F!@ p`@/p@-P`@1,S@ 0S0S@ 0S0S0 48<@ @0S0  <@ 1S@ 0S0S@ 0S0("(08#HDkPp@/0D D7(T6p@//p@-P`@-P0 0S _0S p@/0sB s8 s0 s% s s J+ P ,00S000/P 00p@/00/00/P000/ <F 000/P0 -/p@-`P@( D(0 D0H \PH0D !<H00hX0`` lPH0P<H0p@/Bp@-P@P p@/`  "P 0S ;v0 P  !PO!0\0/0 S!PZ0 S !S "S ;u0 Pmp@/U@-@yP ;v0 P@/@/- 0t/;t0 oMP <0 e/- 0`/;t0 W5P < 0 M/@-@0S 0\0/@/ ;q0 @/-<0 `0R4 0S 0 $//@-`P@P P @/x'xW%8 0S %040"V S0 :0 0 S S S 4p]P vP@/p@-`@PZG0T 0ap@/0@-P@0S000 000@/0@-MP@0S/Ѝ0@/0@-P@0S000 g000@/0@-MP@0S/Ѝ0@/0@-P@0S000 C]000@/D0@-MP@0S/Ѝ0@/0@-P@0 P 0@/A-PP$ 0@sB! 0pS` 00 0S 0P 0 0 ;00p(`W:xp@A/C-M@00/f0p 0 S PLP P @ P0 ,00,04 0D0H0;H0H0`;H0V v,00,004`l0/P ` `` 0S 000 kXU  0PR 0\0/W PЍC/A-`p@?Pv `!$ P$  $ $ '$ $`(M00/H0㌀0p0@T:p  pG. *@@WЍ@/- 0 /V/d X- MP 0S 00 0/ Kh/d-7Tx-PQP 0//@-@P00/P}@/@-@ P@@/-R,0S/@-@H0@@/-C0/@- 0T@0/P 00/P@@/0@-@PB <0RG P 0@/0 S :BS 00/  >P0@/-P00//p@-P`@P /p@/@-@T @/@/p@-@0S 0S00S 0`S P0P0l0`Q0S`00p@/@-@(0S)0(0 0 9 0@/ጴ@-@P0S S P 0  >@/0\0/@/P0\0/@/-0S //000/@-Q Q Q Q @@/@-@P0 0 @//0@-@P  P10L10LA0PQ0@/0S 0L1 0P1/@-`pP0 @01 CTJ0^0 @Z0<00 00 0@/0@-@P MPT0@0@/0@-MP@ ,0 0/ P 0037<0# 0R U 0S0, 0,0/,  0 0, /T P0 u Ѝ0@/C-0Mp0S` T(0, 0 0"@PP5  p@/P`0ЍC/0@-@P 0S P0S T0S,P0@/0@/p@-P`@pp@/0 0/P : 0b00/vP  00vP00p@/p@-XM@`PL !r@ 0 (0(`0H`/P0S 7P P 0S  0ZXЍp@/0@-@P 00/P 00/@P@ P$@0@/p@-MP0S/00/@ 00/PP 0` 0ST00/P@ 4P50S 0S+T$ L0S! 0\0/P 0`0/P gP0S0x0/ 00/0\0/Ѝp@/\ [-$M`pP0K< 0 @/P , R00L1( ,0P!0 P t0 0 @/P , R00L1( ,0P!$Kk/-M0KЍ@-0@ { 0 E@/@-0@ o 0 @/0@-PѿT 0S000/0 0 @/ @/0@-@$lP9@/0 Y- Mp000SE||t1 @P40 0@ $ ( ,P tP 0l0/P  `#  P P MP 0  P  4K,P `U0@T  Ki/50s 0@0T1)1 "-4KA [-$MpP`0,唐@@0,0/, @(KD&W@U <0U0S:P0( K0/(@|PPP(0@C P00/єPP $Kk/-(K&H -pX-@@,1 !l0 0`D ````0%0P\Hh`T`````````X``PD`PU U @ 0U0`Kph/-K-K0l-K0E&Hp@-@`00C 0`0C0CA%KP,P -P000Ss#p@/ X- M P  y Kh/-\ 0X-lŸ Ѝ@\200 L2 D 0jL1S P0 )0L1 0P10S  D0PC P00/Ѭ1l05~K0h/-MB:%T0, @/(1 !PB @@;e6e$ $4@C P00/00/tЍ-M Ѝ-M 4lЍ-M 4w%Ѝ-MBo%Ѝ脚|\hHW _-( M00 @pጀ{4K$9P 4K %P4 0 2 0`C%, `0tA `0`P(`2 @/P@I . P00/40@C # P00/' 峽P$00P0 Z 0 t @I  P00/40@C P00/(Ko/-M4K$Ѝ-M,K$ЍV0@-@P 0@/O-$M0 0  `%L0H X@S  0`p 0C BXP@T@ 00 @`p/P$ЍO/\ 0X-M@P|100 K$[  T | K,&L RK Kp KK &j  K&0 0K &T Y  K &S K&L RxXK XKG XKK% b0@C P P00/ K0h/-K6$TLWl X-MPiPd嘿@` P[ D0`X |PD $6$K#lP$K $0S1 $j P000'  KDD0 D% 0`C P00/0Dp` D%0DP@ Ht$D0$KH_g$0@C P00/Kh/-$K#- K#0@-P@  00/UP  0@//@-@= 0A(0 0Q,0 0I00 040 0=80 0$0 @/0@-P P 0 0L 0 0H X@00C 00 X@$ 0Z0 00 0@/᰺0@-@P$P<0<00@00PPDP0@/\p 0X-P ЍD100 P K0h/p-MOBK"T0, @/0 PBK 8@@b8b   4@C P00/00/Ѝ-MBK"Ѝ0|\WP/@-@0, 4S  0 40 48<@@/-0S. /0 / 04S0S 0S0S 0S0S/@-P 0p4S``@P V00@0@V 040 ! 0V000S 0S0S 0S0 V<0 < (0"(@D@/-< 04S 140 140010/\ O-M pܠ X\ Z lA_@e!G 0/@^` t0 XhPo`X8 `  @  , 0pP04 PPv 0 " C2_ e X%Xb x  0[? ?!F%1 / 00>1.! ЍO/ONP #Wp@-`@@Q *p@/@} PP  0bP000p@/O-M 0Sp@< 04SPPU00`U 0 48<@ 4 (  0  0 48<@ 4 ( 0 [ p P0pWZ a0 0 0 U0 40W S  0BQ0 4 0 G00G ,0   0C00ЍO/\ A-`MPp00\0` @P P \P `0ZS0cB0E0l H@ ?/ H0$HUP G@\ `ЍA/ #W0@-P@00000@/B P p@-`P@Pp@/0,0 04S00@ f!p@/ 0X-MP@0S T 8#8 8@BD B1  K 0$ K K2KK90 [ PJ 0@C P00/K0h/-M K ЍO-`Y0P@0%S01S:9SAS:ZS 9S80C10C@ S1S RP@P0S00C 0 B0c0AAK0pS) ? %R01S:9SAS:ZS9S80C10C SᲰǠ` @1S " @_PEp `PE0S00GO/ X-MP`@p- KP  K P 0 v 0@C P00/ 0@C P00/Kh/- K -P-0 `/@-@ Q 0S 0S0S R P@/@-@ Q 0S 0S0S RP@/@-@P`pPCT1@C0eS0 C0R@CU@UTL00 J0 @/?WL -0X-PP@4!PTT K0h/-KQG-@P`ZT 0S 0p W*e0 P*@y0000 0 0YI0 00IG/W 0X- M)@ 0K K4 0 0S000 j 0KK4 K|b0PC P00/4e 0@C P00/K0h/- K-Km-0S<0S//G-MP`lU 0( ,0@CX@10= Z(0pX0(0S X1 0/G P@$ 000/P@PE UpW: T80S 0S @W@0P$ 000/PP@D T U:0 0,0 $ ,P00D@P/0 ,0 @CW@10( (0pG0(0HЍG/ p@-M`0 ,0( S $ B0/$@/,0%00S (0S $ C040/( R $P B0D@P/$ ,P00D@P/00(0Ѝp@/A-MP`0,( 0@ApS'0R;TA0 00,0( 0S 0PEPC$ 000/P@PE U T:0 0,0( T $ d0/$@/$ ,P00D@P/00(0, (00BS*ЍA/0@-P@0 (0, 0SV( %4P0(00(00@/0@-P@0 l(0, 0S=(%4%(P0%< 0(00(00@/0@-P@0O( ,0S0B](0 040(00(00@/0@-P@03( ,0S0BA(0 48<0(00(00@/C-MPp`J WH 0 (,0 CU@1@!0 (0PU0(02 0 0/$E@0 40/0 pES $ ,P00D@P/00(0 0W:'(00P "0  (00(0ЍC/ 0@-P@<U*!.0@/+A0@/@-M@W<0PkЍ@//D Y- M`pP@ ^0<00,K 0Ch@(@ 0S000 y  (K(@0 ,K<, 0 ?@D P00/,0@C ~P00/ Ki/D -,K_-(K[` -X-``P@d0p 0mU@9 Kh/-K0 5@- 00 @C 5P00/@/0@-@P0@/ 0X-M@PP   00K0 -y Q3R@ 0 0/@-@00 0@/@-@ 0S 0 C01!RJ 0 R00 AZ 0 0@/@-@P0 \S /S :S0S^ P @/@/ 0 f@/\ p@- Ѝ@106@0`A/0@0 0@ P APlPh 0A/0P^X0S SPXL0S , 2PXD0SL0̠ Ѝp@/Wp@-P`@v@ @sQ@@D`HPk0S p@//$ /( /, /0 /4 /8 /< /@ /D /H /L /P /T /X /\ /` /d /h /l /p /t /x /| / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /!/!/!/ !/!/!/!/!/ !/$!/(!/,!/0!/4!/8!/ 1/0T8 0/0 0R00/0 0R(0/0S# T! 0/0S t0/0 0ST0/0 0S 40/(0@/ 0S P0@/H  -X- P 00S /,0/ Kh/-K0Sp@-P@`00/U0E@ 0Sp@/@-@,0/00S 0@/@-@,0/00S 0@/@-@ 0 RR ^:0 @/0 00@/\  -_-(8Mp``@C\ /@,SX@ /@T@ /0 P0 /0`/p2PV2 Q0 ^00P5 TPp  p~00S  R 00S  R ^^pR~0pCPP "PX@0 pp/ P,@P0 /PЍ@/$0@-P@t0/@0 /pp0/@T0/P80$@/P 0/0@/WO-S Ѓ p/FFxGO/0@-P@00/00S@ 0 0@/0@-@P40/ TR 0P 0@/ (0R: 0(0$ 0B0@/"@-0@  0T:Q :Q1@/@/@-M @/Ѝ@/P@-@0 7/@/@-@Q p0S /P L0@@/Q 0 0S  /P@/`(0@-@0P 0/PPP0@/x  X- ML0/ :1  Kh/-00_S@-@00 /0 (   @/@-@$0/0(/@/(0@-@0/x04 Q\0/D0< \0 P/P0E C E0@/[Xx(-T/-y/\ @-AMp`10 4TP2 A/fP- P(xPt@P lP,PP@P @TP:` r nAލ@/PW\ C- Ÿ ЍPp`@@0 EPh T 00/P_ P P;A/!P 0!/@ \^@P00  @ P L,!>0W`PZ0S ,M,HP(UF0L0/P 0S0\0/0d0/ y.0P0/p ˠ ЍC/W/ / / / / / / / /" @-0 @00@C(W@-$@00@8CSȔ-DC@-d@|T0 0 0(,00000400800<00@0u@/HC0@-d@_T0 0 0(,00000400800<00@0X@/`Ct@-d@BT0 0 0(,00000400800<00@0;@/xC@-d@%T0 0 0(,00000400800<00@0@/C@-D@v ,0  0"01 @/C`@@-D@a ,0  0$01@/C|X-/C-/C-/D-/ D-/8D-/hD-H0/ -,$0/ 0//D<,-0  00/d@-@P 00,Ȕ܎-/0- /t-/ḵ-/ 0 /@D 0 /XD 0 /OD 0 /PD 0 /QD-/᰸-8/ᬸ-X/x-#/᰺- 0//,/W\\\"PHP0@H/,/ԃ8X(L\ԃL,8 Tԃԃ"8QdQCARootMYQNgg9No cert. selectedIssued ByIssued ToLH/D,/ԃ8XL\ԃ/ԃ"RS`x@SN9,Summit Client UtilityDisabledComm\NetworkPolicy\Wi-Fi%s%s,(/(,/)"x,p-x),(ԃ/37t7H<76"!D/T/"TT`-d-../4/configMaskCF10G45.3.12.14SUMMITInstallKeyComm\SDCCF10G1\Parmsscu_es.dllscu_fr.dllscu_tw.dllscu_cn.dllscu_pt.dllscu_ru.dllscu_kr.dllscu_jp.dllH3"4VdVt2036"tVVp5???7"VV|77l8"VW 8\8Global\{DEADDEAD-CAFE-DEAD-CAFE-DEADCAFEDEAD}@H/8,/ԃ8XL\ԃL,8 :ԃ8ԃxX0G+80:"XX9 ="X$Y:=SDK Version: v%1d.%02d.%02d.%02dBuild Version: BuildVersion@H/?,/ԃ8XL\ԃL,8 |=ԃ >tIԃ>"ZZ|>>?"ZZ?|??[JJ5>0G|@@@"`[[H@X@h@pB@H/E,/ԃ8XpAL\ԃL,8 Dԃԃ A8ATA"\\@A AAD"\(]LCDProfileP]  5B5A%d%sEE"]]`EpEHI@H/DQ,/ԃ8X8FL\ԃL,8 lIԃԃFF"^ _EEEMiddle@_5Hhh5MTH@H/j,/ԃ8XL\ԃL,8 `VԃUԃ[Installed cert.][MS cert. store][Full trusted store][Installed cert]User Cert:******@d"Hataccd"aadde"aa?{******GetServiceHandleDeregisterServiceSCUtrayActivateServiceSCU0:coredll.dllServicesnoPromptForCreds%dInvalid Frag Threshold Range is %d - %dInvalid RTS Threshold Range is %d - %dInvalid Ping Timeout Range is %d - %dInvalid Ping Delay Range is %d - %dInvalid Auth Timeout Range is %d - %dInvalid DFS Scan Time Range is %d - %dPower-cycle for diversity changes to take effectPower-cycle for DFS changes to take effectPower-cycle for DFS and WMM changes to take effectInvalid default ad hoc channel. In outdoor use mode, ad hoc channels must be 1 - 14. 5GHzOutdoorMaskInvalid default ad hoc channel. Ad hoc channel 14 is not allowed in the current regulatory domain. Invalid default ad hoc channel. Ad hoc channels 12, 13, and 14 are not allowed in the current regulatory domain. "ww̴"wx`Է"xDx̶4hl"txxDܹGx::5<<555Э0GExport[%d in SCU]ImportProfiles\Windows\Programs\Summit\SummitSettings.sdc,@H/D,/ԃ8XL\ԃL,8 pԃ8ԃT"z"{Tt h<x 8d|@l`HError in exporting fileNothing to export!Error in importing third party config settingsError in importing global config settingsError in importing third party settingsError in importing global settingsError in importing profiles (144)Too many profiles. Delete profiles or use Replace option.Error in importing profile settingsImportActiveConfigError in importing fileNothing to import!Invalid config file"p[absent][present][%d in file]\Windows\Programs\Summit\SummitSettings.sdcSDC files*.sdcAll files*.*5p585T  5Xww5C@H/,/ԃ8XGAL\ԃL,8 ԃԃԃԃA> ?4?\?h?DD EDEhEEEEEF0FPFpFFFF"xA|AAAAAB(BDBm\B xBB BB B,C PCC CCC(DLD@H/@I,/ԃ8XL\ԃL,8 4Gԃԃ*******$I"h\H II5,H0G@H/J,/ԃ8XL\ԃL,8 xIԃ8tIԃJ"JJJ85I0GKK"lK|K O@H/Z,/ԃ8XPLL\ԃL,8 Yԃ8ԃL4L"LLL%s_%dscanIntervalT" POlT%s\%sNoneLEAPWXX0XHX" ؛0UDUdUUUV,VVVWWUnable to Configure an SSID with both WPA2 and TKIPCreate a new profile? SSID: %s Encryption: %s EAP Type: %s You may be prompted to enter credentials or keys.Error: Maximum amount of profiles reached.SSIDRSSISecureAA5pZZZZ5ZNXX9tMNXX9M0GNXX9TNXX9NSignal Strength: %d dBmSignal Strength: -- dBmSignal Quality: --Signal Quality: %d %%Signal Quality: -- %^_"П^^Clb@H/Ў,/ԃ8XG`AL\ԃL,8 bԃԃԃԃA@d|fhlnptvx|~&0DNq{8L`tPPPP@@@@PPPPP@@@@P%02x:%02x:%02x:%02x:%02x:%02x&amp;'apos;"quot;>gt;<lt;[error near line %d]: %s &#unexpected closing tag <> ='"yesstandalonexml unclosed Summit Client Utility Help
Main

The Main window displays the following properties or options:
  • Admin Login/Logout button - To log in as an administrator, click Admin Login and enter the administrator password in the dialog box. The default password is SUMMIT (case sensitive). Click Admin Logout to log out as an administrator, leaving access to end-user functions only.
       Note: The administrator password can be changed through the Admin Password function on the Global window.
  • Enable/Disable Radio button - When the radio is enabled, select Disable Radio to disable it; when the radio is disabled, select Enable Radio to enable it.
  • Active Profile - Displays the name of the active profile. Use the drop-down menu to select a different profile. If ThirdPartyConfig is selected (and after the device goes through a power cycle), WZC (Windows Zero Configuration) or another application is used to configure the SSID, Auth Type, EAP Type, and Encryption settings. See "ThirdPartyConfig" for more information.
  • Status - Indicates if the radio is associated to an AP and, if not, indicates the radios current status. Potential values include: Down (not recognized), Disabled, Not Associated, Associated, or <EAP type> Authenticated.
  • Radio Type - Indicates the device's radio type including:
    • BG - Summit 802.11g radio (supports 802.11b and 802.11g)
    • ABG - Summit 802.11 a/g radio (supports 802.11a, 802.11b, and 802.11g)
    • ABGN - Summit 802.11n radio (supports 802.11a, 802.11b, 802.11g, and 802.11n)
      Note: Currently only applies to the PE15N module for XP
  • Regulatory domain - Indicates the regulatory domain(s) for which the radio is configured. The domain(s) cannot be configured by an administrator or user. For more information on regulatory domains, see Section 5.0 of the Summit Data Communications, Inc. User's Guide for 802.11g and 802.11a/g Radios (for Windows XP).
  • Auto Profile - Enables the user to activate or deactivate an automatic profile selection facility. Click List and use the dialog box to select a created profile. When the facility is active and the Summit radio makes its first attempt to associate to an AP (after a device startup or resume), SCU tries each profile, in order, until the radio associates to an AP. That profile becomes the active profile and remains the active profile until one of the following occurs:
    • The device is suspended and resumed, power-cycled, or restarted, which causes the automatic profile selection facility to restart the selection process.
    • The user turns off the automatic profile selection facility and manually selects a different profile on the SCU Main window.
               Note: The profile list should not include any profiles with an Ad Hoc Radio Mode setting.
               Note: Auto Profile is not available for the MSD30AG and SSD30AG modules.
  • Driver - Indicates the current version of the device driver.
  • SCU - Indicates the SCU version currently running on the device. Displays only if space permits.
  • Import/Export - Displays only if the radio is programmed to allow import/export functions and if you are logged in as an administrator.
    Click Import/Export and use the dialog box to do one of the following:
    • Export global settings, all standard SCU profiles, and the special ThirdPartyConfig profile from the SCU area of a devices registry to a file that can be transferred to another device.
    • Import global settings, all standard SCU profiles, and the special ThirdPartyConfig profile from a file (created using the Export facility) to the SCU area of a devices registry to enable SCU to use the information.
Note: When importing information, select Add to existing to merge new information with current registry information. Select Replace to overwrite the current registry information with the newly-imported information.
  • About SCU - Click About SCU to view SCU information including driver and the SCU version.



Profile

Profile settings are radio and security settings that are stored in the registry as part of a configuration profile. When a profile is selected as the active profile on the Main window, the settings for that profile become active.

Notes: When the ThirdPartyConfig profile is selected, a power cycle must be performed. See "ThirdPartyConfig" for more information on ThirdPartyConfig profiles.

If the Default profile is not modified, it does not specify an SSID, an EAP type, or a data encryption method. As a result, if the Default is the active profile, then the radio associates only to an AP that broadcasts its SSID and requires no EAP type and no encryption.

From the Profile window, an administrator can:
  • Define up to 20 profiles, in addition to the special ThirdPartyConfig profile.
  • Change profile settings.
  • Delete any profile except the special ThirdPartyConfig and the active profile.
Profile changes are not saved to the profile until you click Commit.

The Profile window displays the following properties and options:
  • Edit Profile - Use the drop-down menu to select the profile to be viewed or edited. Only an administrator can edit a profile.
  • Actions - Actions included New, Rename, Delete, and Scan. New, Rename, and Delete are only available to an administrator.
    • New - Create a new profile with default settings. Assign a unique name (a string of up to 32 characters). Edit profile settings using other Profile window selections.
    • Rename - Change the profile name to one that is not assigned to another profile.
    • Delete - Delete a non-active profile. You cannot delete an active profile.
    • Scan - Click to view a list of APs that are broadcasting SSIDs; select an SSID and create a profile for it. See "Using Scan to Create a Profile" for more information.
  • Radio - Select a radio attribute from the list on the left to view its value or setting in the box on the right. Only an administrator can edit these values or settings. See "Radio Settings" for more information.
  • Security - Values for the two primary security attributes, EAP type and encryption type, are displayed in separate drop-down lists with the current values highlighted. Only an administrator can edit these security settings. See "Security Settings" for more information.
    • Encryption - When the administrator selects an encryption type that requires the definition of WEP keys or a pre-shared key (PSK), the WEP keys/PSKs button becomes active. Click WEP keys/PSKs to define WEP keys or a PSK.
    • EAP Type - When the administrator selects an EAP type, the Credentials button becomes active. Click Credentials to define authentication credentials for the selected EAP type.
  • Save Changes - To save changes for the selected profile, you must click Commit. If you make changes without clicking Commit and attempt to move to a different SCU window, a warning message displays and provides the option of saving your changes before you leave the Profile window.

Radio Settings
  • SSID - Service set identifier for the WLAN to which the radio connects.
    • Value - A string of up to 32 characters
    • Default - None (WARNING! Thissetting allowsassociation to thestrongest unsecured detected network.)
  • Client Name - The name assigned to the Summit radio and the client device that uses it.
    • Value - A string of up to 16 characters
    • Default - None
  • Power Save - Indicates the radio's power save mode.
    • Value:
      • CAM - Constantly Awake Mode
      • Maximum - Maximum power savings
      • Fast - Fast power save mode
    • Default - Fast
  • Tx Power - Indicates transmit power. Transmit power can be overridden by a Cisco AP if the CCX Support global setting is set to Full and the AP defines maximum transmit power for the client as a lower value.
    • Value:
      • Maximum - Maximum defined for current regulatory domain
      • One of the following values in milliwatts (mW): 50, 30, 20, 10, 5, 1
    • Default - Maximum
Note: The device manufacturer should use the Summit Manufacturing Utility (SMU) to ensure that the transmit power value reported by SCU is EIRP, or the total effective transmit power of the radio (including gains that the antenna provides and losses from the antenna cable).
  • Bit Rate - Indicates the bit rate used by a radio when interacting with a WLAN AP.
    • Value - Auto (rate negotiated automatically with AP) or one of the following rates in megabits per second (Mbps): 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54.
    • Default - Auto
Note: If you select a specific bit rate, then the radio connects to an AP only if that AP has the specified SSID configured with the selected bit rate as the only required rate.
Note: This feature is not supported when using the SDC-MSD30AG and SDC-SSD30AG wireless LAN modules. When using the SDC-MSD30AG or SDC-SSD30AG modules, the Bit Rate option is unavailable. It defaults to Auto.
  • Radio Mode - Use of 802.11a, 802.11g, 802.11b, and 802.11n frequencies and data rates when interacting with AP, or use of ad hoc mode to associate to a client radio instead of an AP.

When SCU operates with a Summit 802.11g radio, an administrator can select from among the following Radio Mode values:
    • Value:
      • B rates only - 1, 2, 5.5, and 11 Mbps
      • G rates only - 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
      • BG rates full - All B and G rates.
      • BG rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps. This should only be used with Cisco APs running IOS in autonomous mode (without controllers). For Cisco APs that are tied to controllers and for non-Cisco APs, Summit recommends BG rates full.
Note: BG rates optimized is not supported when using the SDC-MSD30AG and SDC-SSD30AG wireless LAN modules. When using the SDC-MSD30AG or SDC-SSD30AG modules, BG rates full is used.
      • Ad Hoc - See "Ad Hoc" for more information. Rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps.
    • Default - BG rates full
    When SCU operates with a Summit 802.11a/g radio, an administrator can select from among the following Radio Mode values:
    • Value:
      • B rates only (see above)
      • G rates only (see above)
      • BG rates full - All B and G rates.
      • A rates only - 6, 9, 12, 18, 24, 36, 48, and 54 Mbps (same as G rates)
      • ABG rates full - All A rates and all B and G rates, with A rates (the .11a radio) preferred. See "Preferred Band for 802.11a/g Radio" for more information.
      • BGA rates full - All B and G rates and all A rates, with B and G rates (the .11g radio) preferred. See "Preferred Band for 802.11a/g Radio" for more information.
      • Ad Hoc - See "Ad Hoc" for more information. Rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps.
    • Default - ABG rates full
  • Auth Type - 802.11 authentication type, used when associating to AP
    • Value - Open, shared-key, or LEAP (Network-EAP)
    • Default - Open
Note: See http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml for a Cisco explanation of 802.11 authentication using Open and Network-EAP. The Summit Client Utility refers to Network-EAP as LEAP.

Preferred Band for 802.11a/g Radio

The radio has a Preferred Band for the following radio modes:
  • ABG rates full - 5 GHz (preferred band)
  • BGA rates full 2.4 GHz (preferred band)
When attempting to associate, the radio first considers APs in the applicable preferred band. The radio will attempt to associate to a non-preferred band AP only if the radio is not currently associated and there is no AP available in the preferred band.
Note: When roaming, the radio only considers APs in the band to which the radio is currently associated.
When an administrator attempts to create or edit a profile, SCU determines which radio is operating in the device and populates the available radio mode values according to the radio type.
Example: Suppose an 802.11a/g card profile is loaded onto a device with an 802.11g card with a set radio mode of A rates only, ABG rates full, or BGA rates full. SCU will display a radio mode value of BG rates full. If the administrator does not save any changes to the profile, then the profile does not change. If the administrator saves any changes to the profile, SCU saves the radio mode values as BG rates full.

Ad Hoc

If the administrator selects Ad Hoc for radio mode, then the Summit radio uses ad hoc mode instead of infrastructure mode. In infrastructure mode, the radio associates to an AP. In ad hoc mode, the radio associates to another client radio that is in ad hoc mode and has the same SSID and, if configured, static WEP key.

Security Settings
  • EAP type - Extensible Authentication Protocol type used for 802.1X authentication to AP.
    • Value - None, LEAP, EAP-FAST, PEAP-MSCHAP, PEAP-GTC, PEAP-TLS, EAP-TLS, EAP-TTLS
    • Default - None
    • Value:
      • None - No encryption.
      • WEP - WEP with up to four static keys (40-bit or 128-bit in ASCII or hex) defined under WEP/PSK Keys.
      • WEP EAP - WEP with key generated during EAP authentication.
      • CKIP - WEP with up to four static keys (40-bit or 128-bit in ASCII or hex) defined under WEP/PSK Keys, plus Cisco TKIP and/or Cisco MIC, if configured on AP.
      • CKIP EAP - WEP with key generated during EAP authentication, plus Cisco TKIP and/or Cisco MIC, if configured on AP.
      • WPA-PSK (WPA Personal) - TKIP with PSK (ASCII passphrase or hex PSK) defined under WEP/PSK Keys.
      • WPA-TKIP (WPA Enterprise) - TKIP with key generated during EAP authentication.
      • WPA CCKM (WPA Enterprise) - TKIP with key generated during EAP authentication and with Cisco key management protocol for fast reauthentication.
      • WPA2-PSK (WPA2 Personal) - AES with PSK (ASCII passphrase or hex PSK) defined under WEP/PSK Keys.
      • WPA2-AES (WPA2 Enterprise) - AES with key generated during EAP authentication.
      • WPA2-CCKM (WPA2 Enterprise) - TKIP with key generated during EAP authentication and with Cisco key management protocol for fast reauthentication.
       
       Note: For ABGN radios, CKIP and CKIP EAP are unavailable.

    • Default: None

Using Scan To Create a Profile

When you click Scan on the Profile window, SCU opens a window that lists APs that are broadcasting their SSIDs.
Each row in the list shows an AP's SSID, its received signal strength indication (RSSI), and whether or not data encryption is in use (true or false). You can sort the list by clicking on the column headers. If the scan finds more than one AP with the same SSID, the list displays the AP with the strongest RSSI and the least security. Every five seconds, the Scan window updates the RSSI value for each of the APs in the list. To scan for new APs and view an updated list, click Refresh.

If you are authorized as an administrator in SCU, you can create a profile for any SSID in the list. To do so, double-click the row for the SSID or click the row and click Configure. SCU displays a dialog box that asks you if you want to create a profile for that SSID.

Ic^f you click Yes on the dialog box, then SCU creates a profile for that SSID, with the profile name being the same as the SSID (or the SSID with a suffix such as "_1" if a profile with the SSID as its name exists already). If the AP is using WEP, then SCU opens a dialog box in which you can specify WEP keys. If the AP is using EAP, then SCU opens a dialog box in which you can specify login credentials for the EAP type (which SCU assumes is LEAP). After you enter information on a dialog box, SCU returns you to the Profile window where you can view and edit profile settings. If you edit the profile, then you must click Commit to save the changes.

EAP Credentials
  • LEAP:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
  • EAP-FAST:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
    • PAC Filename - Protected Access Credentials filename (up to 32 characters)
    • PAC Password (up to 32 characters)
  • PEAP-MSCHAP, PEAP-GTC, PEAP-TLS, and EAP-TTLS:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
    • CA Cert - Filename of root certificate authority (CA) digital certificate (up to 32 characters). Leave blank if the Use MS store checkbox is selected.
    • Validate server checkbox - Select this checkbox if you are using a CA certificate to validate an authentication server. When this box is selected, you must enter a certificate filename in the CA Cert field or select the Use MS store checkbox.
    • Use MS store checkbox - Select this checkbox if the Microsoft certificate store should be use for a CA certificate. This is applicable only when Validate server is selected.
  • EAP-TLS:
    • User - Username or Domain\Username (up to 64 characters)
    • User Cert - Click the ... button to select a user (or client) certificate from the Microsoft certificate store. You may not enter a filename because the user certificate must reside in the Microsoft certificate store. When you browse for a certificate, the pop-up box displays two fields: Issued By and Issued To. Click on a certificate to highlight it and click Select.
    • CA Cert - Filename of root CA digital certificate (up to 32 characters). Unavailable if the Use MS store checkbox is selected.
    • Validate server checkbox - Select this checkbox if you are using a CA certificate to validate an authentication server. When this box is selected, you must enter a certificate filename in the CA Cert field or select the Use MS store checkbox.
    • Use MS store checkbox - Select this checkbox if the Microsoft certificate store should be use for a CA certificate. This is applicable only when Validate server is selected.
Note: There are no default values for credentials. If the credentials are not specified in the profile then, when the radio tries to associate using that profile, Summit software displays a dialog box that prompts the user to enter the credentials. Summit software populates the dialog box with the username and password supplied for the previous EAP authentication.
When entering credentials for EAP authentication:
  • If the credentials specified in the profile do not match those in the authentication database, the following occurs when that profile is used:
    • For EAP-FAST and EAP-TLS: Authentication fails.
    • For LEAP, PEAP-MSCHAP, PEAP-GTC, and EAP-TTLS: Summit software tries the credentials three times and then prompts the user to enter valid credentials. Once EAP authentication is passed, Summit software stores the valid credentials in the profile.
  • When prompted with a dialog box, the user can do one of the following:
    • Enter valid credentials and click OK - The radio associates and authenticates.
    • Enter invalid credentials and click OK - The radio associates but does not authenticate. The user is prompted to re-enter credentials.
    • Click Cancel or clear the credentials fields and click OK - The radio does not attempt to associate with that profile until the user performs one of the following actions (while the profile is active):
      • Causes the device to go through a power cycle or suspend/resume.
      • Disables and enables the radio or clicks Reconnect on the Diags window.
      • Modifies the profile and clicks Commit.
The user can also select a different profile as the active profile and then switch back to the profile for which the EAP authentication was canceled.
  • If the password stored in the profile or provided in the dialog box has expired in the authentication database, then the authentication server may send an "Expired Password" (RFC 2759) message to the client. If the EAP type is PEAP-MSCHAP, PEAP-GTC, or EAP-TTLS, then Summit software handles that message by displaying a dialog box that prompts the user to enter the expired password and a new password. Summit software then uses the entered information to respond to the RFC 2759 message. If EAP authentication succeeds and the expired password was saved in the profile, then Summit software updates the profile with the new password.
  • Any password provided for EAP authentication, whether in a profile or in an authentication dialog box, should not contain parentheses. Neither SCU nor the dialog box flags a parenthesis as an invalid character, but the integrated supplicant treats parentheses as delimiters and interprets the characters between a left parenthesis and a right parenthesis as the "true" password.

Encryption - Cisco TKIP

If the active profile has an Encryption setting of CKIP Manual or CKIP Auto, then the Summit radio successfully associates or roams to an AP that is configured with:
  • The SSID and other RF settings of the active profile
  • The authentication method of the active profile
  • For Manual WEP, the static WEP keys of the active profile
  • Any of the following encryption settings:
    • WEP only (no CKIP or CMIC)
    • WEP with CKIP
    • WEP with CMIC
    • WEP with CKIP and CMIC


Summit radios support two special AP settings:
  • WPA Migration Mode - WPA Migration Mode enables both WPA and non-WPA clients to associate to an AP using the same SSID, provided that the AP is configured for Migration Mode (WPA optional with TKIP+WEP128 or TKIP+WEP40 cipher). In other words, WPA Migration Mode means WPA key management with TKIP for the pairwise cipher and TKIP, 128-bit WEP, or 40-bit WEP for the group cipher. When WPA Migration Mode in use, you can select WPA TKIP or WEP EAP for your Summit radio encryption type.
  • WPA2 Mixed Mode - WPA2 Mixed Mode operation enables both WPA and WPA2 clients to associate to an AP using the same SSID. WPA2 Mixed Mode is defined by the Wi-Fi Alliance and support for the feature is a part of Wi-Fi certification testing. When WPA2 Mixed Mode is configured, the AP advertises the encryption ciphers (TKIP, CCMP, other) that are available for use and the client selects the encryption cipher it wants to use. In other words, WPA Mixed Mode means WPA key management with AES for the pairwise cipher and AES or TKIP for the group cipher. When WPA2 Mixed Mode in use, you can select WPA2 AES or WPA TKIP for your Summit radio encryption type.

ThirdPartyConfig

If the profile named ThirdPartyConfig is selected as the active profile, then SCU works in tandem with WZC or another third-party application for configuration of all radio and security settings for the radio. The third-party application must be used to define the SSID, Auth Type, EAP Type, and Encryption settings. SCU can be used to define the Client Name, Power Save, Tx Power, Bit Rate, and Radio Mode settings. Those SCU profile settings, all SCU global settings, and the third-party application settings are applied to the radio when ThirdPartyConfig is selected as the active profile and a power cycle is performed.
On some devices that run Pocket PC or Windows Mobile, the radio will not associate if WPA with pre-shared keys, or WPA-PSK, is used with WZC. If that is the case for your device, then to use WPA-PSK you must use an SCU profile other than ThirdPartyConfig.

EAP-FAST

The 802.1X authentication types PEAP and EAP-FAST use a client-server security architecture that encrypts EAP transactions within a TLS tunnel. PEAP relies on the provisioning and distribution of a digital certificate for the authentication server. With EAP-FAST, tunnel establishment is based upon strong shared-secret keys that are unique to users. These secrets are called protected access credentials (PACs) and can be created automatically or manually. With automatic or in-band provisioning, the PAC is created and distributed to the client device in one operation. With manual or out-of-band provisioning, the PAC is created in one step and then must be distributed to the client device separately.
SCU supports PACs created automatically or manually. When you create a PAC manually, you must load it to the certs directory on the device that runs SCU. Be sure that the PAC file does not have read-only permissions set or SCU will not be able to use the PAC.


Main | Profile | Status | Diags | Global | About


Status

The Status window displays the following radio status information:
  • Name of active profile
  • Status - Potential association status values include: Down (not recognized), Disabled, Not Associated, Associated, or <EAP type> Authenticated
  • Information on the client device with the Summit radio:
    • Client name, if defined in active profile
    • IP address
    • MAC address
  • Information on access point to which the Summit radio is associated:
    • Name
    • IP address
    • MAC address
    • Beacon period - The amount of time between access point beacons in Kilomicroseconds, where one Ksec equals 1,024 microseconds
    • DTIM interval - A multiple of the beacon period that specifies how often the beacon contains a delivery traffic indication message (DTIM), which tells power-save client devices that a packet is waiting for them (e.g. a DTIM interval of 3 means that every third beacon contains a DTIM)
  • Information on the WLAN connection between the Summit radio and AP:
    • Connection Channel
    • Data (bit) rate
    • Transmit power
    • Signal strength (RSSI), displayed graphically and in dBm:
      • A green color indicates that the RSSI for the current AP is stronger than -70 dBm, which means that the Summit radio should operate consistently at 54 Mbps
      • A yellow color indicates that the RSSI for the current AP is stronger than -90 dBm but not stronger than -70 dBm, which means that a Summit radio will operate at 802.11g or 802.11a data rates that are less than 54 Mbps
      • A red color indicates that the RSSI for the current AP (to which the radio is associated) is -90 dBm or weaker, which means that a Summit 802.11b/g radio will operate at 802.11b data rates only
    • Signal strength (%) - A measure of the clarity of the signal, displayed graphically and in dBm.
Note: This value will be lower with a ThirdPartyConfig profile (under Windows Zero Config) than with a standard profile.
Radio association state is shown on both the Status window and the Main window. The following status items display on the Main window but not on the Status window:
  • SCU software version
  • Driver software version
  • Regulatory domain for radio: FCC, ETSI, TELEC, KCC, or Worldwide
When a ping initiated on the Diags window is active, the Status window displays a ping indicator consisting of two "lights" that alternative in "flashing" green (for a successful ping) or red (for an unsuccessful ping).


Main | Profile | Status | Diags | Global | About


Diags

The following functions are available from the Diags window:
  • (Re)connect - Disable and enable the radio, apply or reapply the current profile, and attempt to associate and authenticate to the wireless LAN, logging all activity in the output area at the bottom.
  • Release/Renew - Obtain a new IP address through DHCP release/renew and log all activity in the output area at the bottom.
  • Start Ping - Start a continuous ping to the address in the edit box next to the button. Once the button is clicked, its name and function change to Stop Ping. Pings continue until you click Stop Ping, move to an SCU window other than Diags or Status, exit SCU, or remove the radio.
  • Diagnostics - Attempt to (re)connect to an AP and provide a more thorough dump of data than is obtained with (Re)connect. The dump includes radio state, profile settings, global settings, and a BSSID list of APs in the area.
  • Save To... - Save the diagnostics output to a file.


Main | Profile | Status | Diags | Global | About


Global

Global settings include radio and security settings that apply to all profiles and settings that apply to SCU itself. An administrator can define and change most global settings on the Global window in SCU.

Note: If SCU displays Custom for a global setting, then the operating system registry has been edited to include a value that is not selectable on the Global window.
         If you select Custom from the drop-down menu (and commit the changes), SCU reverts to the previous value. Selecting Custom has no effect to the Global settings.

The following radio global settings, which apply to all configuration profiles, can be changed in SCU:
  • Roam Trigger - When moving average RSSI from the current AP is weaker than Roam Trigger, the radio performs a roam scan where it probes for an AP with a signal that is at least Roam Delta dBm stronger.
    • Value: -50, -55, -60, -65, -70, -75, -80, -85, -90, or Custom (see note on Custom below the list)
    • Default: -70
  • Roam Delta - When Roam Trigger is met, a second AP's signal strength (RSSI) must be Roam Delta dBm stronger than moving average RSSI for current AP before radio will attempt to roam to the second AP.
    • Value: 5, 10, 15, 20, 25, 30, 35, or Custom (see note on Custom below the list)
    • Default: 15
  • Roam Period - After association or roam scan (with no roam), radio will collect RSSI scan data for Roam Period seconds before considering roaming.
    • Value: 5, 10, 15, 20, 25, 30, 35, 40, 45, 50, 55, 60, or Custom (see note on Custom below the list)
    • Default: 10
  • BG Channel Set - Defines the 2.4 GHz channels to be scanned when the radio is contemplating a roam and needs to determine what APs are available.
    • Value: Full (all channels); 1,6,11 (the most commonly used 2.4 GHz channels); 1,7,13 (for ETSI and TELEC radios only); or Custom (see note on Custom below the list)
    • Default: Full
  • DFS Channels - Support for 5 GHz (802.11a) channels where support for dynamic frequency selection (DFS) is required. Supported in v2.0 and later.
    • Value: On, Off, Optimized
       Note: When set to Optimized and scanning for the first time, the radio scans all active channels and all available DFS channels. From this scan, the radio creates and maintains a list of up to three DFS channels where beacons were detected. During subsequent scans, the radio still scans all active channels but only scans the DFS channels listed from the first scan (where beacons were detected).
       When the radio loses or resets the connection, the radio returns to scanning all available DFS channels as it did when scanning for the first time after being set to Optimized. From this scan, the radio again creates a list of DFS channels where beacons were detected.
       Note: The Optimized setting is not supported in the MSD30AG and SSD30AG radios. If DFS Channels is set to Optimized directly in the registry, the setting will function as On (versus Optimized).
    • Default: Off
  • DFS Scan Time - Because passive scanning consumes a longer period of time, this feature enables you to determine the dwell (listen) time when passively scanning on a DFS channel.
    • Value: A number between 20-500 milliseconds (ms)
    • Default: 120 ms
Note:  When decreasing the scan time (to a value lower than the default) for DFS channels, corresponding changes in the infrastructure's beacon period are recommended. For optimal performance and reliability, Summit recommends a dwell time that is 1.5 times that of the beacon period. For example, if the DFS scan time is set to 30 ms, the beacon period should be adjusted to 20 ms.
Note:  If you adjust this parameter directly in the registry, and configure it to a number outside of the 20-500 ms range, the setting value will return to the default (120 ms).
  • Ad Hoc Channel - The channel to be used for an ad hoc connection if the active profile has an Ad Hoc radio mode value.
    • Value: One of the 2.4 GHz channels (1-14) or UNII-1 channels (36, 40, 44, 48). If you select a channel that is not supported by your radio, then SCU uses the default value for this setting.
    • Default: 1
  • Aggressive Scan - When this setting is On and the current connection to an AP becomes tenuous, the radio scans for available APs more aggressively. Aggressive scanning complements and works in conjunction with the standard scanning that is configured through the Roam Trigger, Roam Delta, and Roam Period settings. Summit recommends that the Aggressive Scan global setting be On unless there is significant co-channel interference because of overlapping coverage from APs that are on the same channel.
    • Value: On or Off
    • Default: On
  • CCX Features - Use of Cisco information element (IE) and CCX version number; support for CCX features.
    • Value:
      • Full: Use Cisco IE and CCX version number; support all CCX features
      • Optimized: Use Cisco IE and CCX version number; support all CCX features except AP-assisted roaming, AP-specified maximum transmit power, and radio management
      • Off: Do not use Cisco IE and CCX version number
    • Default: Optimized
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled. The default is Optimized.
  • WMM - Use of Wi-Fi Multimedia Extensions, also known as WMM.
    • Value: On or Off
    • Default: Off
Note: For ABGN radios, the ability to change this parameter is disabled. It is always set to Enabled.
  • Auth Server - Type of authentication server being used for EAP authentication
    • Value:
      • Type 1 - Cisco Secure ACS or another server that uses PEAPv1 for PEAP with EAP-MSCHAPV2 (PEAP-MSCHAP)
      • Type 2 - A different authentication server, such as Juniper Networks Steel Belted RADIUS, that uses PEAPv0 for PEAP-MSCHAP
    • Default: Type 1
  • TTLS In{B^/^/ner Method - Authentication method used within secure tunnel created by EAP-TTLS:
    • Value:
      • Auto-EAP - Any available EAP method
      • MSCHAPV2
      • MSCHAP
      • PAP
      • CHAP
      • EAP-MSCHAPV2
    • Default: Auto-EAP
  • PMK Caching - When WPA2 is in use, type of Pairwise Master Key (PMK) caching to use -- See the section on PMK Caching.
    • Value: Standard or OPMK
    • Default: Standard
             Note: When switching from Standard to OPMK, you must initiate a suspend resume of the device. Only tapping Commit does not cause the change to take effect.
  • TX Diversity - How to handle antenna diversity when transmitting data to AP.
    • Value:
      • Main only: Use main antenna only
      • Aux only: Use auxiliary antenna only
       Note: Summit does not support the AUX antenna as a single-antenna solution.
      • On: Use diversity
    • Default: On
Note: To enable diversity (for MSD30AG and SSD30AG radio modules), set Tx Diversity to On. To disable diversity, set Tx Diversity to Main Only.You must power-cycle for these changes to take effect.
  • RX Diversity - How to handle antenna diversity when receiving data from AP.
    • Value:
      • On-Start on Main: On startup use main antenna
      • On-Start on Aux: On startup, use auxiliary antenna
      • Main only: Use main antenna only
      • Aux only: Use auxiliary antenna only
       Note: Summit does not support the AUX antenna as a single-antenna solution.
    • Default: On-Start on Main
Note: To enable diversity (for MSD30AG and SSD30AG radio modules), set RX Diversity to On. To disable diversity, set Rx Diversity to Main Only.You must power-cycle for these changes to take effect.
  • Frag Thresh - If packet size (in bytes) exceeds threshold, then packet is fragmented.
    • Value: An integer from 256 to 2346
    • Default: 2346
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled.
  • RTS Thresh - Packet size above which RTS/CTS is required on link.
    • Value: An integer from 0 to 2347
    • Default: 2347
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled.
  • LED - Use of LED; available only with MCF10G.
    • Value: On, Off
    • Default: Off

The following SCU global settings, which apply to SCU itself, can be changed in SCU:
  • Tray Icon - Enabling of System Tray icon, which is described in detail in Section 4 of the SDC User Guide. Note: This option is not available for the XP version.
    • Value - On, Off
    • Default - On
  • Hide Passwords - If this is On, then SCU as well as EAP authentication dialog boxes mask passwords and other sensitive information, such as WEP keys.
    • Value - On, Off
    • Default - Off
  • Admin Password - Password that must be specified when Admin Login button pressed.
    • Value - A string of up to 64 characters
    • Default - SUMMIT
  • Certs Path - Directory where certificate(s) for EAP authentication are stored.
    • Value - A valid directory path of up to 64 characters
    • Default - Depends on device
  • Auth Timeout - Specifies the number of seconds that Summit software waits for an EAP authentication request to succeed or fail. If authentication credentials are specified in the active profile and the authentication times out, then association fails. If authentication credentials are not specified in the active profile and the authentication times out, then the user is prompted to re-enter authentication credentials.
    • Value - An integer from 3 to 60
    • Default - 8
  • Ping Payload - Amount of data in bytes to be transmitted on a ping
    • Value - 32, 64, 128, 256, 512, 1024
    • Default - 32
  • Ping Timeout ms - Amount of time in milliseconds that transpires without a response before ping request is consider a failure
    • Value - An integer from 1 to 30000
    • Default - 5000
  • Ping Delay ms - Amount of time in milliseconds between successive ping requests
    • Value - An integer from 0 to 7200000
    • Default - 1000