Notesmirchi: Disclaimer
Notesmirchi: Disclaimer
www.NotesMirchi.com
UNIT I IT 1001 - DISTRIBUTED SYSTEMS
www.NotesMirchi.com
—Q
It enables the users, wherever they are, to make use of services such as world wide web, e-mail and file
transfer.
The services of internet can be extended by addition of server and new type of services.
The above figure shows a collection of intranets. Intranets are subnetwork operated by companies and
other organizations.
ISPs (Internet Service Providers) are companies that provide Connections to individual users and small
organizations.
The intranets are linked together by back bones.
A back bone is a network link with a high transmission Capacity. It employs satellite connections,
fiber optical cables and other high band width cables.
Multimedia services are available in the internet. This service enable the users to access audio and
video data.
As a second example, consider a work flow information system that supports the automatic
processing of orders. Typically, such a system is used by people from several departments, at different
locations.
For example, people from the sales department may be spread across a large region or an entire
country. Orders are placed by means of laptop computers that are connected to the system through the
telephone networks. Incoming orders are automatically forwarded to the planning department.
The system will automatically forward orders to an appropriate and available person.
www.NotesMirchi.com
As a final example, consider the world wide web. The web offers a simple, consistent, and uniform
model of distributed documents.
To see a document, a user need merely activate a reference, and the document appears on the screen.
Publishing a document is also simple: you only have to give it a unique name in the form of uniform
Resource Locator that refers to a local file containing the document's content.
1.3. CHALLENGES :
The key challenges faced by the designers of Distributed system arc heterogeneity, openness, security,
Scalability, failure handling, concurrency and the need for transparency.
1.3.1 Heterogeneity :
They must be constructed from a variety of different networks, operating systems, computer
hardware and programming languages.
The internet Communication protocols mask the difference in networks, and middleware can deal with
other differences.
The term Middleware applies to a software layer that provides a programming abstraction as well as
masking the heterogeneity of the underlying networks, hardware, operating systems and programming
languages.
Example : Common Object Request Broker Architecture (CORBA).
1.3.2 Openness
The openness of a computer system is the characteristic that determines whether the system can be
extended and re-implemented in various ways.
The openness of distributed systems is determined primarily by the degree to which new resource
sharing services can be added and be made available for use by a variety of client programs.
The first step to provide openness is to publish the inter faces of the components, but the integration
of components written by different programmers is a real challenge.
• Open systems are characterized by the fact that their key interfaces are published.
• Open distributed systems are based the provision of a uniform communication
mechanism and published interfaces for access to shared resources.
• Open systems can be constructed from heterogeneous hardware and software.
www.NotesMirchi.com
1.3.3 Security
Security for information resources has there components ;
(i) Confidentiality
Protection against disclosure to unauthorized individuals.
(ii) Integrity
Protection against alteration or corruption.
(iii) Availability
Protection against interference with the means to access the resources.
The challenge is to send sensitive information in a message over a network in a secure manner.
But security is not just a matter of concealing the contents of messages, it also involves knowing
for sure the identity of the user.
The second challenge is to identify a remote user.
Both of these challenges can be met by the use of encryption techniques.
Encryption can be used to provide adequate protection of shared resource and to keep sensitive
information secret when it is transmitted in messages over a network. Denial of service attacks are
still a problem.
1.3.4 Scalability
A distributed system is scalable if the cost of adding a user is a constant amount in terms of the
resources that must be added.
In other words, A system is described as scalable if it will remain effective when there is significant
increase in the number of resources and the number of users.
The design of scalable distributed system present the following challenges: Controlling the cost of
physical resources :
As the demand for a resource grows, it should be possible to extend the system, at reasonable cost, to
meet it.
Controlling the performance loss:
Consider the management of a set of data whose size is proportional to the number of users or
resources in them. In this case, Algorithms that use hierarchic structures scale better than linear structures.
But, even with hierarchic structures, an increase in size will result in some loss in performance.
www.NotesMirchi.com
Size : When a system needs to scale, we must consider scaling with respect to size. If more users or
resources need be supported, we are confronted the limitations of centralized services, data and algorithms.
For example, many services are centralized in the sense that they are implemented by means of only
a single server running on specific machine in the distributed system.
The problem now is that the server become a bottleneck as the number of users grows.
Even if we have virtually unlimited processing and storage capacity, communication with that server
will prohibit further growth.
Preventing software resources running out:
As an Example, the supply of available internet addresses is running out.
There is no correct solution to this problem. It is difficult to predict the demand that will be put on a
system years ahead.
Avoiding performance bottle necks :
Algorithms should be decentralized to avoid having performance bottlenecks. Because, In a large
distributed system, enormous number of messages have to be routed over many lines.
The optimal way to do this is collect complete information about the load on all machines and lines, and
then run a graph theory algorithm to compute all the optional. The trouble is that collecting and
transporting all the Input and output information would again be a bad idea because these messages world
overload part of the network.
1.3.5 Failure handling
Failures fall into two obvious categories : hardware and software.
If failure occurs, program may produce incorrect results on they may stop before they have
completed and intended computation.
Failures in a distributed system are partial, i.e., some components fail while others continue to
function. Therefore, the handling of failures is particularly difficult. The techniques dealing with failures are
l i st e d below.
Detecting failures - Some failures can be detected. E.g. checksums can be used
to detect corrupted data in a message or a file
Masking failures - Some failures that have been detected can be hidden or made
less severe. E.g. messages can be retransmitted when they fail to arrive.
Tolerating failures - It is not possible to detect and hide all the failures that might occur in
large network. Their clients can be designed to tolerate failures, which generally involve the users
tolerating them as well. Services can be made to tolerate failures by the use of redundant
components.
Recovery from failures - Recovery involves the design of software so that the
state of permanent data can be recovered or rolled back after a server has crashed.
www.NotesMirchi.com
1.3.6 Concurrency
Both services and applications provide resources that can be shared by clients in a distributed system.
There is therefore a possibility that several clients will attempt to access a shared resource at the same
time. The process that manages a shared resource could take one client request at a time. But that
approach limits throughput. Therefore, services and applications generally allow multiple client requests
to be processed concurrently.
For an object to be safe in concurrent environment, its operations must be synchronized in such a way
that its data remains consistent. This can be achieved by standard techniques. such as semaphores.
1.3.7 Transparency
It is defined as the concealment from the user and the application programmer of the separation of
components in a distributed system. Hence, the system is perceived as a whole rather than as a collection of
independent components. The main aim of the transparency is to make certain aspects of distribution
invisible to the application programmers.
• Access transparency enables local and remote resources to be accessed using
identical operations.
• Location transparency enables resources to be accessed without knowledge of
their location.
• Concurrency transparency enables several processes to operate concurrently
using shared resources. The resources will not interfere among themselves.
• Replication transparency enables multiple instances of resources to be used to
increase reliability and performance without knowledge of the replicas by users
or application programmers.
• Failure transparency enables the concealment of faults. It allows users and
application programs to complete their tasks even though they have the failure of
hardware or software components.
• Mobility transparency allows the movement of resources and clients within a
system. The movement will not affect the operation of users or programs.
• Performance transparency allows the system to be reconfigured to improve
performance as loads vary.
• Scaling transparency allows the system and applications to expand in scale.
However it will not change to the system structure or the application algorithms.
There are two important transparencies available. They are access and location transparency; their
presence or absence most strongly affects the utilization of distributed resources. They are referred
together as network transparency.
www.NotesMirchi.com
1.4 ARCHITECTURAL MODELS
An architectural model of a distributed system is concerned with placement of its parts and the
relationships between them. An architectural model defines the way in which the components of systems
interact with one another and the way in which they are mapped onto an underlying network of computers.
The overall goal is to ensure that the structure will meet present and likely future demands on it. Major
concerns are to make the system reliable, manageable, adaptable and cost effective.
An architectural model first simplifies and abstracts the functions of the
individual components of a distributed system and then it considers :
• The placement of the components across a network of computers, seeking to
definite useful patterns for the distribution of data and workload.
• The inter relationships between the components.
www.NotesMirchi.com
Platform
The lowest level hardware and software layers are known as a platform for distributed systems
and applications. These low level layers provide services to the layers above them. They are
implemented independently in each computer. They bring the system's programming interface upto a
level that facilitates communication and coordination between processes, eg., Intel X86/windows, Intel
X86/Linux, Sun SPARC/Sun OS, Intel X86/Solaris, etc.
Middleware
Middleware is defined as a layer of software whose purpose is to mask heterogeneity and to
provide convenient programming model to application programmers. Middleware is concerned with
providing useful building blocks for the construction of software components that can work with one
another in a distributed system. In particular, it raises the level of the communication activities of
application programs through the support of abstractions such as remote method invocation,
communication between a group of processes, notification of events, replication of shared data and
transmission of multimedia data in real time.
Servers may be clients of other servers. For example, a web server is a client of a local file server that
manages the files in which the web pages are stored. Web servers and other Internet services are clients of
the DNS service, which translates Internet Domain Names to network addresses.
www.NotesMirchi.com
• Services provided by multiple Servers:
Services may be implemented as several server processes in separate host computers interacting as
necessary to provide a service to client processes as shown in Figure 1.5. The servers may partition The set
of objects based on the service and distribute them between themselves, or they may rv-smtain replicated
copies of them on several hosts.
The web provides a common example of partitioned data in which each web server manages its own
set of resources.
Replication is used to increase performance and availability and to improve fault tolerance. It
provides multiple consistent copies of data in processes running in different computers.
Service
www.NotesMirchi.com
Figure 1.6: Web proxy Server
• Peer Processes
In this architecture, all of the processes play similar roles, interacting cooperatively as peers
to perform a distributed activity without any distinction between clients and servers. In this model,
code in the peer processes maintains consistency of application-level resources and synchronizes
application-level actions when necessary. The elimination of server processes reduces inter-process
communication delays for access to local objects.
www.NotesMirchi.com
User's need low cost computers with limited hardware resource that are simple
to manage.
The requirement to add and remove mobile devices in a convenient manner.
• Mobile code - Applets are a well.known and widely used example of mobile code. The user running a
browser selects a link to an applet whose code is stored on a web server, the code is downloaded to the
browser and runs there. An advantage of running the downloaded code locally ss thai is can give good
interactive response since it does not suffer from delays or variability of band width associated with
network communication.
• Mobile agents; A mobile agent is a running program including both code and data that
travels from one computer to another m a network carrying out a task on someone's behalf
such as collecting information, eventually returning with the result. Mobile agents might be
used to install and mainioin software on thu* computers within ar; organization or to compare
the prices of products from a number of vendors by visiting the site of each vendor and performing a
series of database operations. Mobile agents are a potential security threat to the resources in computers
that they visit. The environment receiving a mobile agent should decide on which of the local resources it
should be allowed to use, based on the identity of the user on whose behalf the agent is acting.
• Thin clients: The term thin clients refers to a software layer that supports a window-
based user interface on a computer that is local to the user while executing application
programs on a remote computer. Instead of downloading the code of applications into the
user's computer, it runs them on a compute server (a powerful computer that has the capacity
to run large numbers of applications simultaneously).
The main drawback of the thin client architecture is in highly interactive graphical
activities such as CAD, and image processing, where the delays experienced by users are increased
by the need to transfer image and vector information between the thin client and the application
process, incurring both network and operating system latencies.
www.NotesMirchi.com
reconfigured to obtain connectivity.
• Easy integration with local services: Devices that find themselves inserted into existing
networks of devices automatically discover the services that are provided there, with no
special configuration actions performed by the user.
Limitations of spontaneous networking:
Internet addressing and routing algorithms are difficult to implement
Limited connectivity - users are not always connected as they more around (eg.
through tunnels)
Security and Privacy
Discovery services:
Spontaneous networking allows client processes running on portable devices to access services on
the networks to which they are connected. The clients may not know about the services that are available
in the network to which they are connected. The purpose of a discovery system is to accept and store
details of services that are available on the network and to respond to queries from clients about them.
A discovery service offers two interfaces:
• A registration service - accepts registration requests from servers and records the details that
they contain in the discovery service's database of currently
available services.
• A lookup service - accepts queries concerning available services and searches its database for
registered services that match the queries. The result returned includes sufficient details to enable
clients to select between several similar services based on their attributes and to make a connection
to one or more of them.
Network Computers
The OS and application software for desktop computers typically require much of the active code and
data to be located on a local disk. But the management of application files and the ma;r.fenance of a local
software base require considerable technical effort of a nature that most users are not qualified to provide.
www.NotesMirchi.com
The network computer is a response to this problem. It downloads its operating system and any
application software needed by the user from a remote file server. Applications are run locally but the files
are managed by a remote file server. Since all the application data and code is stored by a file server, the
users may migrate from one network computer to another.
www.NotesMirchi.com
Bandwidth is the total amount of information that can be transmitted in a given time. When a large
number of communication channels are using the same network, they have to share the available
bandwidth.
Jitter is the variation in the time taken to deliver a series of messages. Jitter is relevant to multimedia
data. E.g., if consecutive samples of audio data are played witli different time intervals then the sound will
be badly distorted.
www.NotesMirchi.com
1.5.2 The failure model
The failure model defines the ways in which failure may occur in order to provide an understanding of the
effects of failures. There are three types of failures and are explained below:
• Omission failures: The faults classified as omission failures refer to cases when a
process or communication channel fails to perform actions that it is supposed to do. There are two
types of omission failures. They are:
(i) Process omission failures: The chief omission failure of a process is to crash. The design of
services that can survive in the presence of faults can be simplified if it can be assumed that the
services on which it depends crash cleanly, i.e. the processes either function correctly or else stop.
Other processes may be able to detect such a crash by the fact that the process repeatedly fails to
respond to invocation messages. However this method of crash detection relies on the use of
timeouts. A process crash is called fail-stop if other processes can detect certainly that the process
has crashed.
www.NotesMirchi.com
The outgoing and incoming message buffers are typically provided by the operating system.
The communication channel produces an omission failure if it does not transport a message from
p's outgoing message buffer to q's incoming message buffer. This is known as 'dropping messages' and is
generally caused by lack of buffer space. The loss of message between the sending process and the
outgoing message buffer is called sending omission failure. The loss of message between the incoming
message buffer and the receiving process is called receive-omission failure and the loss of messages in
between is called channel omission failure
• Arbitrary failures:
The term arbitrary or Byzantine failure is used to describe the worst possible failure semantics, in
which any type of error may occur. An arbitrary failure of a process is one in which it arbitrarily
omits intended processing steps or takes unintended processing steps.
Communication channels can suffer from arbitrary failures, e.g. message contents may be
corrupted or non-existent messages may be delivered or real messages may be delivered more
than once.
• Timing failures:
Timing failures are applicable in synchronous distributed system where time limits are set for all
operations.
Timing is particularly relevent to multimedia computers with video and audio channels. Video
information may require a large amount of data to be transferred.
To deliver such information without timing failures will make demands on the operating system as
well as communication system.
www.NotesMirchi.com
1.5.3 Security Model
The security of a distributed system can be achieved by securing the processes and the channels
ch used for
their interactions and by protecting thee obje
objects that they encapsulate against
unauthorized access.
Protecting objects : Protection is describe
scribed in terms of objects. Objects are intended
ed to bbe used in different
ways by different users. For example,, some objects may hold a user's private data and other objects may hold
shared data such as Web pages. Too sup support this, access rights specify who is allowed
allow to perform the
operations (read/write) of an object.
Fig : Obje
bjects and Principals
www.NotesM
otesMirchi.com
sender. This lack of reliable knowledge of the source of a message is a threat to the correct functioning of
both servers and clients. E.g. Spoofing
Threats to communication channels: An enemy can copy, alter or inject messages as they travel
across the network and its intervening gateways. Such attacks present a threat to the privacy and integrity
of information as it travels over the network and to the integrity of the system.
All these threats can be defeated by the use of secure channels, which is described below:
Secure Channels:
A secure channel ensures the privacy and integrity of the data transmitted across it. Encryption
and authentication are used to build secure channels as a service layer on top of existing communication
services. A secure channel is a communication channel connecting a pair of processes with the following
properties:
Each of the processes knows reliably the identity of other processes.
It ensures the privacy and integrity of the data transmitted across it.
Each message includes a physical or logical time stamp to prevent messages from
being replayed or reordered.
Other possible threats:
Denial of service - This is a form of attack in which the enemy interferes with the activities of
authorized users by making excessive invocations on services or message transmission in a network,
resulting in overloading of physical resources.
Mobile code - Mobile code raise new and interesting security problems for any process that receives and
executes program code from elsewhere, such as the e-mail attachments, such code may easily play a
Trojan horse role.
1.6.1 INTRODUCTION
www.NotesMirchi.com
receiving process. The independent packets containing these messages are called datagrams. In the Java
and UNIX APIs, the sender specifies the destination using a socket - an indirect reference to a particular
port used by the destination process at a destination computer.
The API to TCP provides the abstraction of a two-way stream between pairs of processes. The
information communicated consists of a stream of data items with no message boundaries.
www.NotesMirchi.com
0
0 0
6675
6!"#0!
4544"70$
60%679&'6%05407!!4
50"96'576
(6
04
'9$594'09'05604)06956
06
45608654%0
*'(4$594'0+8,-04
06
4560.
46%
60/$""00./-201
4!0
"59$750!
4544"70$
60%679&'6%05407!!4
50&
4!0
4
'9$594'201
4!0
"59$750970$0)4
09'56
!
467704
'9$594'09'01904'60!
467709'0$0&
4!04)0
!
46776705
$'7
9570560
677$&60540$""0
6
26
704)0560&
4!20
3456789:;69<<8;;=;>??????
??56=6@@==;:<A;==;<=@;<0
8677$&60!$779'&0265166'0$0!$9
04)0!
4677670$'02607!!4
56%02#05140
677$&604
'9$594'04!6
$594'7B0000000
CDEFGHEFGIDJDKLDM0
*'04
%6
0)4
04'60!
467705404
'9$5601950$'456
N04'60!
4677076'%70$0
677$&60540%6759'$594'0$'%0$'456
0
!
46770$50560%6759'$594'0
669(670560
677$&620O970$59(95#09'(4"(6704
'9$594'04)0%$5$0)
4
056076'%9'&0!
46770
540560
669(9'&0!
46770$'%0
$#09'(4"(607#'
4'9P$594'04)05605140!
46776720
Q0660970$7749$56%019506$0
677$&60%6759'$594'20R6'%9'&0!
4677670$760
677$&6705402600$%%6%0540
6
4560
6670$'%0
669(9'&0!
4677670
6
4(60
677$&670)
4
0"4$"0667204
'9$594'0265166'076'%9'&0$'%0
669(9'&0!
4677670
$#02606956
0CSEJTIUEUVCG4
0HCSEJTIUEUVC0
*'07#'
4'470)4
04)04
'9$594'N056076'%9'&0$'%0
669(9'&0!
46776707#'
4'9P6020006
#0
677$&620*'0
5970$76N0245076'%0$'%0
669(60$
60WXUJYKEZG4!6
$594'720[6'6(6
0$000076'%09776%056076'%9'&0!
46770970
2"4\6%0'59"05604
67!4'%9'&0
669(609709776%20[6'6(6
0
669(609709776%N0560!
467702"4\70'59"0$0
677$&60$
9(6720
*'0$7#'
4'470)4
04)04
'9$594'N05607604)0560CDEFGU]DIH^KUEGKCGEUE_WXUJYKEZMO6G76'%9'&0!
46770970
$""416%0540!
466%0$70744'0$70560
677$&60$70266'04!96%0540$02))6
0$'%05605
$'7
97794'04)0560
677$&60!
466%70
9'0!$
$""6"0195056076'%9'&0!
467720669(604!6
$594'0$'0$(60WXUJYKEZGHEFGEUE_WXUJYKEZG($
9$'5720
000008677$&670$
6076'50540+*'56
'650$%%
677N0"4$"0!4
5-0!$9
720Q0"4$"0!4
50970$0
677$&609')4
$594'01959'0$000
4
!56
N07!69)96%0$70$'09'56&6
20Q0!4
50$706`$5"#04'60
669(6
02500$'0$(600
$'#076'%6
720.
4677670
$#0
760
"59!"60!4
570)
4
0190540
669(60
677$&6720R6
(6
70&6'6
$""#0!2"99P60569
0!4
50'
26
70)4
07602#0
"96'5720
0
abcdefg0
h450)4
704)04
'9$594'0+ij.0$'%0O/.-076056074\650$275
$594'N0190!
4(9%6706'%0!49'50)4
0
4
'9$594'0265166'0!
46776720*'56
!
467704
'9$594'04'7975704)0O
$'7
9559'&0$0
677$&60265166'0$0
74\650
04'60!
46770$'%0$074\6509'0$'456
0!
467720k4
0!
46770540
669(60
677$&67N0957074\650
750260
24'%0540$0"4$"0!4
50$'%0560*'56
'650$%%
67704)05604
!56
04'0190950
'720.
4677670
$#07605607$
60
74\650)4
076'%9'&0$'%0
669(9'&0
677$&6720Q'#0!
46770
$#0
$\607604)0
"59!"60!4
570540
669(60
677$&67N0250$00
!
46770$''4507$
60!4
5701950456
0!
46776704'05607$
604
!56
20.
467767079'&0lmG$%%
6770$
60$'0
DnJD]^KUEG9'05$5056#0%407$
60!4
5720
0 011123456789
924
0
0
0
0 0
!"#$$$$$$%&'$()*)+,)-$./--012.)*2/10
3045556
5
076750890:;<09705
577
955640=
4
05076749760>
4677054050
669?9760>
467701954@50
5A741B6466
67504
0
65
96720C=050=59B@
604@
7D0560
6775660
59074505
9?620E40767404
0
669?60
6775667D050
>
46770
@750=9
750
655605074A65084@740540570C756
7650544
67704=0560B45B04750574050B45B0>4
5203076
?6
019BB0
89740957074A6505405076
?6
0>4
50F047605550950
5A670A74170540B9675707405550569057076740
67756670540952030B96750
897470957074A6505405790=
660B45B0>4
520
G610977@670
6B55976054045556
5
04
@795594705
60H0
IIJKLLMNKIOPQKRE60
669?9760>
46770766405407>69=905705
5904=08956704=050>5
59@B5
079S620C=0560
67756609700000000
5440896000=4
05605
59D09509705
@7556404705
9?5B2037905>>B9559470
6T@9
9760
67756670B5
66
05570560
5U9
@
0
@750
=
56
675056
097540@7A704=0555079S620
IIIIIVVVVVVVVWXYZ[P\NR]4A657074
5BB90>
4?9460747F8B4A976076747057408B4A9760
669?670=4
045556
5
00000000000
4
@795594720
IIIIIIIIIIIIIIIIIII^P_KY`aLRE60
669?6055508B4A70=4
06?6
09707@9558B60=4
0@7608905076
?6
0555097015959760540
669?60
6T@67570=
4
09570B9675720b@5097074
60>
46
5
D095097074505>>
4>
95560555050>
467705550570@764050
669?60
4>6
55947074@B40159509746=97956B90970795@559477016
60560>4567595B076749760>
46770570576404
05606U>65640
677566057086670B47520E405BB4107@0
6T@9
6
6757D059
64@570570860765047074A65720
00000000cdedfgdVhijkVlmn0F0E60
669?60
654404467074507>69=905704
96970=4
0
677566720C775654057097?45594704=0
669?606657050
6775660544
677640540957074A650=
4
057904
969720
opqrsr=4
0:;<045556
5
07@==6
0=
4
0560=4BB419760=59B@
67H0
t
9779470=59B@
670F0
67756670
5908604
4>>6404579475BB920
t
46
9760F0
6775667057074
659
67086046B9?6
6404@504=076746
04
46
20
uvdV4=0uwxy0
E60;4
597035
60]6
?960z;3]{D0190B44A70@>0;3]075
670970560C756
765D09709
>B6
6756404?6
0:;<20
:;<045556
5
705
6074
659
670570555
559?604960865@760569044074507@==6
0=
4
04?6
6547057749556401950
6@5
5756640
677566046B9?6
920
|)})$~'$/,$%&'$()*)+,)-0
E605?503<C0>
4?9467045556
5
04
@79559470890
657704=05140B57767H0qqqq
q
qqqs
0
wllilkxledyVE970B5770>
4?94670504775
@54
05550
5A670570977557604@504=05705
5904=08956704
>
97976050
677566D0560B676504=0560
67756605740560C756
7650544
67705740B45B0>4
507@
86
04=056046759755947074A650570
74170970G96@
60220E970B5770>
4?9467057456
0
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
924
0
0
000000975
95607756
0000000000000000000000000000000000000000000000 200000000000000000000000000000000000000000000
!"#$#"%&#"$'(###()(!*$#"
#+,"*%
-./01234567389:9/19;3<9=>2:0
0
?@A@BC@DEFGHIJAKEL*,#''M+"#+!"NOP+##"#$%&'!+#
*##M#'$)##"$Q)(#'*#+#'#,#'%&#,'!+#R
#"$*##,,S*($*#,#,'%0
L*,#O##"#$TM'!+*,,S"$*+U0
EVJWXE@WXECJHJYZJKEL*$*+##$ "+##"#$)S#'#M%
VJAFG[YDJG\AKEL*$*+#,,S#$)%] *#$Q*!$*+S,,),M*$
'+#+**S#&'+,^_`'%
HGWWJHAKEL*$*++"#'#,#$'#+&#++%0
abcdbefghijahklmnop0
9
q4
5rsts2u652vw09
q4
50xstsy0942vw0qz90zs770{|}~96u500
qz9075s590t490
s9u05
9u0s
700
005
00
s5s
s
04650s46500u610s5s
s
465
w0
05600
0s
7265567
w0
0~u65
6770s4750~u65
6772653s
6s
7
w0
09u5076
t6
q4
5000000000w0
s5s
s
|s650
6675000u610000s5s
s
|s65
ys
72z6u5
ys475y76
t6
q4
5
w00
s465276u0
6675
w0
56006
00u610560w0
s5s
s
|s650
6qz0u610s5s
s
|s656
y06
2z6u5
w0
s4652
669t6
6qz
w0
0 011123456789
924
0
0
0 0
!"#$%&'()*+$,++-./0*'/,.0
1622345054056016407
4544807
499:670560;<75
;594=04>0;075
6;
04>0<?5670540190:;5;0
;?0<601
9556=0;=:0
>
4
0190:;5;0
;?0<60
6;:20160>488419=@0;
;56
9759704>0560=6514
A0;
609::6=0<?056075
6;
0
;<75
;594=20
B CDEEFGDHEIJDKH160;7789;594=0;=044760410
L0:;5;09501
95670540;075
6;
04
0
6;:70>
4
09520
B MNEOHPDEEFGDEKH1601640L7670;=0;A=4186:@6
6=5076
6205>056076=:6
0:4670=450
669960;=0
;A=4186:@6
6=501959=0;059
64L5Q0950
65
;=7
9570560
677;@620
B RSNTHUNVOWNSKH1640;556
7570540
;505607766:04>05607
46776705;50
6;:0>
4
0;=:01
9560540;0
75
6;
20
B CDEEFGDHNWXDWIVGHFVXHXYZSIUFOINV[08677;@609:6=59>96
70;
60;7749;56:019506;05407;A65Q0
1906=;<8670560
69796=50540:65650;=:0
6\650:L789;567Q04
0540
64
:6
0
677;@6705;50:40=450
;
99609=076=:6
04
:6
20
B CDEEFGDHXDEOIVFOINVE[0307;9
04>04
L=9;59=@07
4677670675;<897670;04==6594=0
<6>4
6056?0;=04
L=9;560496
0;075
6;
20]=60;04==6594=0970675;<8976:Q05607
46770
79
78?0
6;:0>
4
0;=:01
9567054056075
6;
01954L50560L7604>05=56
=65Q0;::
6770;=:074
5720
1603450>4
075
6;
04
L=9;594=0;77L
6705;5016=0;07;9
04>07
4677670;
60675;<8979=@0;04==6594=Q04=604>0
56
078;?70560896=50
4860;=:0560456
078;?7056076
96
0
486Q0<L5056
6;>56
056?014L8:0<60766
720160896=50
4860
9=9489670
6;59=@0;075
6;
074A650<4L=:0540;=?074
50;=:056=0
;A9=@0;04==650
6^L6750;7A9=@0>4
0;0
4==6594=0540;076
96
0;50957076
96
074
52016076
96
0
48609=9489670
6;59=@0;089756=9=@074A650<4L=:0540;0
76
96
074
50;=:01;959=@0>4
0896=570540
6^L67504==6594=72016089756=9=@074A650
;9=5;9=70;0^L6L604>0
9=4
9=@04==6594=0
6^L675720_6=056076
96
0;67570;04==6594=Q0;0=61075
6;
074A650970
6;56:0>4
0560
76
96
05404
L=9;5601950;0896=5Q0
6;=19860
65;9=9=@0957074A650;5056074
50>4
089756=9=@0540456
0896=5720
`,+),-'&'*.a/.b/&&-)&()c*')a',&'()*+0,++-./0*'/,.*()0
d8;59=@04>0:;5;0956
7[011404
L=9;59=@07
4677670=66:0540;@
660;70540560
4=56=5704>0560:;5;05
;=7
9556:0496
0;075
6;
20e2@2Q09>04=607
467701
95670;=0f9=5f0
>488416:0<?0;0f:4L<86f056=0560
6;:6
0;50560456
06=:0
L750
6;:0;=0f9=5f0>488416:0
000000000000000<?0;0f:4L<86f20
dg84A9=@[0_6=0;07
46770;556
7570540
6;:0:;5;0>
4
0;=09=7L50;==68Q095019880@650
:;5;09
4=Q0560^L6L604
095019880<84A0L=5980:;5;0<64
670;9;98;<8620
1607
467705;501
956
0:;5;0540;075
6;
0
;?0<60<84A6:0<?05601640>84104=5
4800
6;=97
09>0560
74A650;50560456
06=:0970^L6L9=@0;70
L0:;5;0;705607
454480;8841720
1
6;:7[0_6=0;076
96
0;67570;04==6594=Q0950@6=6
;88?0
6;5670;0=6105
6;:0540
4
L=9;5601950560=610896=520
0
0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
924
0
0
2 0
!"#$%&'($!)0
*407+597,-05609.56/
95-00
406
5-10*23047606574
70540665650+.60
676504
40500+56570+.6076846.60
.4
96
70540665650+.60
67650640:9+5600+565720;.04
66
05407+597,-0560<+:9695-00
406
5-1059
644570+.60
65
+.7
97794.70+
60476609-0*2320
=>$%'?%@AB)%8+.-0,
6846.5:-04766076
<9670
4.04<6
0*2304..6594.01950
676
<66004
50.4
96
720*6760
9.:4660C**310D*310*6:.650+.60E8*320
FG%HBI%?'#%@AB%>J#$K>)%*60L+<+09.56
,+60540*23075
6+
709700
4<966609.0560:+77670E6
<6
0E45650
+.60E456520
M$#G$#%M'NO$J)%*970:+7709709.56.6660,4
047609-0+076
<6
0540
6+560+0745650+50+076
<6
004
50,4
0:9756.9./0,4
0
4..650
68467570,
4
0:96.5720;570PQQR
65460/6570+04..650
6846750,
4
056084646104
09,0560846460970
6
05-109509:45704.59:04.60+
9<6720
M'NO$J)%*60:96.504767059704.75
454
0540
6+560+07456507069,-9./0560S3E0475.+
60+.6004
504,0+0
76
<6
20*60E45650:+7700
4<96670
654670/65:.045E5
6+
0+.60/65T45045E5
6+
0,4
0+6779./05605140
75
6+
70+7749+56601950+0E456520
@AB%N!$UJ%V#'W#K)0
9
04
507+<+2.652XY0
9
04
507+<+2942XY0
049:90:+770*232;96.50Z0
049:9075+590<4960
+9.0[E5
9./0+
/7\0]^0Z0
5
-0Z09.5076
<6
04
50_0̀abcY0
E456500_0.610E4565[+
/7\]1076
<6
04
5^Y0
S+5+:.045E5
6+
09.0_0.610S+5+:.045E5
6+
0[02/65:.045E5
6+
0[^0^Y0
S+5+T45045E5
6+
04450_0.610S+5+T45045E5
6+
0[20/65T45045E5
6+
0[^^Y044521
956d*D[+
/7\e]^Y0E5
9./0
6+5+0_09.2
6+6d*D[^Y0E-756
244520
9.5:.,f669<66g0h0i06+5+^Y0
j0+50[d.5.41.C475kl60594.06^0Z0E-756
244520
9.5:.,745g0h0i062/658677+/6[^^Y0
j0+50[kTDkl60594.06^0Z0E-756
244520
9.5:.0[hkTDgh0i062/658677+/60[^^Y0j0+50[:Tkl60594.06^0Z0
E-756
244520
9.5:.0[h;Tgh0i062/658677+/60[^^Y0j0,9.+::-0Z9,0[0m_0.4::^05
-Z02:476[^0Yj0+50[;T0
kl60594.06^Y0
0 011123456789
924
0
0
0 0
!"#$!%&'$"!()*+),-.!"#$!,)+/-$"0!*1!"#$!-,'!-$"#*2!0/((&3!,!-$00,+$!,2!"#$!456!,-$!*1!"#$!0$)7$)8!
9#$!%&'$"!%)$,"$0!,!0*%:$"!;*/2!"*!"#$!#*0",-$!,2!0$)7$)!(*)"!<=>?8!"!-,:$0!,!4,",&(/"6")$,-!,2!
4,",@/"(/"6")$,-!"#$!A)'"$0!"#$!-$00,+$!"*!'"0!*/"(/"!0")$,-!,2!A,'"0!"*!)$,2!,!)$(&3!1)*-!'"0!'(/"!0")$,-8!
B9C!'0!,!$%*2'+!"#,"!)$()$0$"'+!'!,!(,)"'%/&,)!1*)-,"80
9#$!0$)7$)!()*+),-!*($0!,!0$)7$)!0*%:$"!*!'"0!0$)7$)!(*)"!D<=>?E!,2!&'0"$0!1*)!%* $%"!$0"08!F#$!*$!
,))'7$0.!'"!-,:$0!,!$A!"#)$,2!'!A#'%#!"*!%*--/'%,"$!A'"#!"#$!%&'$"80
GHIJHIKLKMINOIPQR0
9
S4
5TUVU2W652XY00
KKKK9
S4
50TUVU2942XY00
0000SZ[\90\U770]^_`6
V6
0a0
SZ[\9075U590V49b0
U9W0c`5
9Wdefghiij
kIlKa0
9W5076
V6
S4
50m0nopqY0
`6
V6
`4r650\97740m0W610`6
V6
`4r65c76
V6
S4
5sY0
19\60c5
Z6s0a0
`4r65070m0\97742U6S5csY0
tU5U\WSZ5̀5
6U
09W0m0W610tU5U\WSZ5̀5
6U
0
c72d65\WSZ5`5
6U
0cssY0
tU5UuZ5SZ5`5
6U
04Z50m0W610
tU5UuZ5SZ5`5
6U
c72d65uZ5SZ5̀5
6U
0cssY0
0`5
9Wd0\9W60m09W2
6Ubcv]wcsY00
0000000000000000000004Z521
956x]wc\9W6sY0
y0U50czuwz{6S594W06s0a0̀|756
24Z52S
9W5\W0c}zuwR0}0~0
62d658677Ud6cssYy0
U50c\uz{6S594W06s0a0`|756
24Z52S
9W5\W0c}R0}0~0
62d658677Ud6csYy
9WU\\|0a5
|0a0\97742\476c0sYyU50ac\uz{6S594W06sy0
0 011123456789
924
0
0
0 0
20000!"#!$3%&0'%#%0$!($!)!3#%#*+30%3'08%$),%&&*3-0
#609./4
0594.0754
6109.0
2..9.304
43
0
70970
64
676.56100701050075
252
67016
60705609./4
0594.0
9.0
677036704.7975704/076526.6704/06756720*
980:20
#60
64
676.50594.04/010500956
7019//6
70665166.00
95652
6720%.456
097726097056076504/04167027610540
64
676.500
056
70/4
06=0
4:690>3*"077756
02760%)?**00
056
0[email protected]
00
056
90
16
6070560>.94160750.10
100::4170/4
0560
64
676.50594.04/056=509.0
0.70:0.32036700.1050@670514067567046
0
0
056
20
+.604/0560/4::419.30
6541700.0660276105406.06:600.7051404
4256
705406=0.3601050080:26720
AB #6080:26700
604.86
56105400.003
66106=56
.0:0/4
05066/4
605
0.7
97794.00.104.86
5610
540560:40:0/4
04.0
6694520
AB #6080:26700
605
0.7
9556109.056076.16
C70/4
0590543656
019500.09.190594.04/0560
/4
0502761900.10560
69496.504.86
57056080:26709/0.66770
720
#4072444
50$8)0;$6
4560865410*.840594.<04
0$(?0;$6
4560(
4612
60?0::<00.70105005746050500.0
66040776100700.00
32
6.504
0
652
.61007000
672:50
275066006:60540660/:0556.6100.105609.1989120:04
9
95986010500
80:2670
64
676.56109.00.003
6610/4
0520%.003
6610750.10
10/4
0560
64
676.50594.04/01050075
252
6700.10
4
9
95986080:26709700::6100.0DEFGFFHEFIE0
JKLMNKOOPQRSKQTSUQVKLMNKOOPQRW0
XFYFGGEZ9705604
467704/[email protected]4::6594.04/010500956
709.54000/4
0729506:60/4
0#
0.7
97794.09.000
67703620[EFYFGGEZ09705604
467704/019776
6:9.3056
04.00
980:05404
412600.0652980:6.504::6594.04/0
10500956
7005016759.0594.20#270
0
70::9.304.7975704/056036.6
0594.04/04
9
95986080:26709.5400.06=56
.0:0
10500
64
676.50594.20)9
9:0
:7902.
0
70::9.304.7975704/036.6
0594.04/04
9
95986080:2670/
4
0569
06=56
.0:010500
64
676.50594.00.10560
6629:19.304/01050075
252
6720
0#1400:56
.059860044
406705406=56
.0:010500
64
676.50594.00.10
0
70::9.300
6\0
]00000?+$^%C704
4.010500
64
676.50594.0
]00000_080C70466̀5076
90:9a0594.00
0
bcdcbSefghijMSklVVlQSmKnKSgopLoMoQnKnPlQqemgrS
?+$^%0?'$09705606=56
.0:010500
64
676.50594.016/9.6101950?+$^%0s2t20?'$00.0
64
676.500::04/0560
1050057467050500.0660276100700
32
6.5700.10
652
.080:26709.0
6
45609.840594.709.0?+$^%20*504.7975704/0
u04
9
95986057467050509.:216074
50;2vw695<90:4.30;xsw695<902.793.61074
5902.793.610:4.390/:4050;xsw695<90
1426:650vyw695<900
20^44:60.0;#$>!04
0z%&)!<9045650;{w695<00.100.704.75
25610574670070741.09.0
z932
602t0
0 011123456789
924
0
0
0 !0
"#$#04%&6570#'04'5#9'0
6(6
6'670540456
04%&65720)6'04'04%&65097076
9#*9+6,-05606'59
604%&6505#50950
6(6
6'670#
6076
9#*9+6,054.656
019509520/6(6
6'670#
6076
9#*9+6,0#70012345678960#',*60970#0
6(6
6'60540
#'04%&6501959'056076
9#*9+6,0(4
20
94076
9#*9+60#'04%&65-09570*#7709'(4
#594'09701
9556'04:5-0(4**416,0%;05605;<670#',0'#
6704(095709'75#'60
$#
9#%*6720=(05609'75#'60$#
9#%*670%6*4'.0540'610*#7767-056'0569
0*#7709'(4
#594'0
:750#*740%601
9556'04:50
(4**416,0%;05605;<670#',0'#
6704(0569
09'75#'60$#
9#%*67209970
6:
79$60<
46,:
604'59':670:'59*0560*#770
9'(4
#594'0#',09'75#'60$#
9#%*6704(0560'6677#
;0*#77670#$60%66'01
9556'04:52>#0*#770970.9$6'0#0#',*6-0
#',0'40*#7709701
9556'0
4
605#'04'6054056075
6#
04(0%;567?0560#',*670%69'.01
9556'016
60'6677#
;20
>.@0A6
74'0A0B0'610A6
74'0CDE
95F-0GH6#,6'G20IJKLMN0
96076
9#*9+6,0(4
04(0560.9$6'06O#
<*60970741'09'0P9.:
60I2IQ20RS0#',0R0I0#
60
#',*670
000A>/ES30 U?%;56$6
794'0':
%6
0 R40
T
0 K0 9'50;6#
0 75
9'.0'#
60 75
9'.0<*#60
0 IJKL0 V?7
950 W0H4',4'0 R=0
XYZ[\58]7]^_8̀5\Y14Ya538bc\d8cb8e5\6c28fgh5ij0
kT A
9
959$605;<670#
601
9556'09'0<4
5#%*60(4
#50:79'.0
654,704(8fgh5ijf[jl[j`j\51d8
*#7720
kT E5
9'.70#',0#
#56
70#
601
9556'0%;09570
654,0#**6,01
956m9P20Cm'9$6
7#*09
#'7(6
0
P4
#5M0
kT 94076
9#*9+605604%&650C62.20A6
74'M-0
000000000n
6#560#'09'075#
$604(0560*#770fgh5ijc[jl[j̀j\51d8#',09'$4o609570p\Yj5fgh5ij8
654,0%;0<#779'.0560<6
74'04%&650#70#
.:
6'520
k0 94076
9#*9+60#'04%&650(
4
0#075
6#
04(0,#5#-04<6'0#'0S%&65S:5<:5E5
6#
04'0560
75
6#
0#',0:7609570\513fgh5ij8
654,0540
64'75
:505604
9.9'#*04%&650
E6
9#*9+#594'0#',0,676
9#*9+#594'04(0560#
.:
6'570#',0
67:*5704(0
6
45609'$4#594'70#
60.6'6
#**;0
#
0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
924
0
0
!
0 20
"#56
#650 &4
50 59
60 )(*650 9#56
+,604+0
$%%
6770 #'
(6
0 #'
(6
0
6
45604(*650
-.(9/70 -.(9570 -.(9570 -.(9570
01234567879:6;5<45=5>?@?1A>6AB6@645CA?56ADE5F?645B545>F50
GHI!!!JKLMNOPMQRMQ!JSTTUNLJVOLSN0
W970+4
04+04
'#9,594#0970%679X#6%05407'YY4
50560
4/670,#%0
677,X606Z,#X67009#05[Y9,/0/96#5.76
\6
0
9#56
,594#720"#0X6#6
,/]0
6^'675.
6Y/[04
'#9,594#09707[#
4#4'70(6,'760560/96#50Y
46770(/4_70'#59/0560
6Y/[0,
9\670+
4
056076
\6
20"50,#0,/740(60
6/9,(/60(6,'760
6Y/[09706++659\6/[0,#0,_#41/6%X6
6#50540560/96#520
W60/96#5.76
\6
06Z,#X670
677,X6709#056
704+076#%0,#%0
669\604Y6
,594#709#0560`,\,0$&"20$0Y
4544/0
('9/504\6
0%,5,X
,
70,\49%70'##6677,
[04\6
6,%70,7749,56%01950Wa&075
6,
0Y
4544/20
2b2000W60c6^'675.c6Y/[0&
4544/d0
0
W970Y
4544/0970(,76%04#05
660Y
9
959\67d0%4)Y6
,594#]0X65c6^'6750,#%076#%c6Y/[20"50,#6(60%679X#6%0540
Y
4\9%606
5,9#0%6/9\6
[0X',
,#566720"+0ef&0%,5,X
,
70,
60'76%]0560%6/9\6
[0X',
,#56670
'750(60Y
4\9%6%0([0
560
6^'675.0
6Y/[0Y
4544/]0190
,[0'76056076
\6
0
6Y/[0
677,X60,70,#0,_#41/6%X6
6#504+0560/96#50
6^'6750
677,X620
0
W60%4)Y6
,594#0
654%0970'76%0([0/96#505409#\4_60
6
45604Y6
,594#720"570,
X'
6#5707Y69+[0560
6
45604(*650
,#%0190
654%05409#\4_6]054X656
01950,%%9594#,/09#+4
,594#0
6^'9
6%0([0560
654%20"50970,77'
6%05,50560
/96#50,//9#X0%4)Y6
,594#0
,
7,/70,
X'
6#5709#540,#0,
,[04+0([5670,#%0'#
,
7,/70560
67'/570+
4
0560
,
,[04+0([56705,50970
65'
#6%0
0
g[#5,Zd0
Y'(/90([56h0i0%4)Y6
,594#jc6
456)(*65c6+04]09#50
654%9%]0([56h0i0,
X'
6#57k0
0
W60%4)Y6
,594#0
654%076#%70,0
6^'6750
677,X6054056076
\6
014760"#56
#650,%%
6770*0Y4
50,
607Y69+96%09#0560
6
45604(*650
6+6
6#60X9\6#0,70,
X'
6#520$+56
076#%9#X0560
6^'6750
677,X6]0%4)Y6
,594#09#\4_670
669\60540
X650,0
6Y/[0
677,X6]0+
4
01909506Z5
,570
67'/50,#%0
65'
#70950540560,//6
20
0
l65c6^'6750970'76%0([0,076
\6
0Y
46770540,^'9
6076
\960
6^'675720m6#056076
\6
0,709#\4_6%0560
654%09#0560
7Y69+96%04(*65095056#0'767076#%c6Y/[054076#%0560
6Y/[0
677,X60540/96#520m6#0560
6Y/[0
677,X60970
669\6%0([0
560/96#5]0560%4)Y6
,594#0970'#(/4_6%05606Z6'594#04+0560/96#50Y
4X
,
04#59#'6720
g[#5,Zd0Y'(/90([56h0i0X65c6^'675j0kn0
Y'(/90\49%076#%c6Y/[j([56h0i0
6Y/[]0"#65$%%
6770/96#5o475209#50/96#5&4
5kn0
0 011123456789
924
0
0
012341563789
23799 9
9
9
!"#$%&'#()*+,--./0&,.9
1792736723492756972278792346364791298197:91:9;186479
<9
9999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999372141
0
20
000965996
040560!965054019095017076520"570#$
#4760970540!!41056076
%6
005
7
950
6#!&0
677'670160!9650#
4677670
6($67509502)0#
4*!6
0774956019505609754
&09709570
6
4
&20
0
+20,000-./060'60#
4544!7010
2604!!419'05
660#
4544!70
60$7604
09
#!6
659'0%
94$705𐗠-./05
660#
4544!70#
4$60
96
9'0*6%94
7090560#
67660404
$959409!$
6720
3456789:;;<;=>"50
&0*60$76016056
6097040%!$60540*60
65$
60
4
0560#
46$
600560
!9650
6($9
6704049
5940550560#
46$
6070*660606$5620
34567?:=899@:;;<;=>"50970$76$!04
0
4750!965A76
%6
060'6720B#69!0C41!6'6
650
677'670
60450
6($9
6D0*6$760076
%6
E70
6#!&A
677'60970
6'
60700C41!6'6
6520
34567:=?F<GH;I=JH899K@:;;<;=L950970*7604060'60400
677'6710
6($675D0
6#!&00C41!6'6
6520260C41!6'6
65045970560
6($6756019019!!06*!6056076
%6
0540
97
065
9670
4
095709754
&20
0
+200M760402/.075
6
705409
#!6
650560
6($675A
6#!&0#
4544!0
260679
60540%4909
#!6
659'0
$!59A#C650#
4544!709704604560
674704
0
$79'02/.075
6
70!!419'0
'$
65700
67$!57040&079N6540*605
7
955620"0560
2/.0970$76D095067$
670550560
677'670
606!9%6
60
6!9*!&2056
60970406604
0
2
7
97794040
677'67009!56
9'040$#!956704
0195D09754
967202604%6
60$6050
)C41!6'6
650
677'670970
6$601600
6#!&0
677'604!!4170;;HF56
00
677'60
6($6750
0
0
+2O000P22.010060
#!60400
6($675A
6#!&0#
4544!010
000000000P22.0QP
0260502
76
0.
4544!R09700#
4544!05507#699670560
677'6709%4!%600
6($6750A0
6#!&000
60'6D0560
65400
'$
65700
67$!5700560
$!6704
0
6#
67659'0056
0090560
677'6720"507$##4
5700
9060765040
65470QST220.M2D0.SB2D065R05506*!60540!!0409570
674$
6720"0959405409%4C9'0
654704016*0
674$
67D0560.
4544!0!!41704
0456506'45959400#7714
A75&!60$565959420
34/456506'45959410/!965E70
6($6757009!$6094
59407054015050
6#
6765594056&00
6#5D06*!9'056076
%6
054044760560
6#
67655940550970
4750##
4#
95604
0560$76
20
34)$565959410.7714
075&!60$56595940970#
4%960540#
4%6056096595&04056074$
60
0
P22.09709
#!6
65604%6
02/.20U0!965076
%6
0956
59404797570405604!!419'0756#710
0 011123456789
924
0
0
0
0
2 0000000!60"96#50
6$%67570&#'056076
(6
0&6)50&04##6594#0&50560'6*&%"5076
(6
0)4
504
0&50&0
0000000000)4
507)69*96'09#0560+,-20
.2 000000000!60"96#5076#'70&0
6$%6750
677&/6054056076
(6
20
02 000000000!6076
(6
076#'70&0
6)"10
677&/60540560"96#520
22 000000000!604##6594#0970"476'20
3416(6
40560#66'0540675&5"970&#'0"4760&04##6594#0*4
06(6
10
6$%6756
6)"1067&#/6097067)6#79(640
54509#04(6
"4&'9#/056076
(6
0&#'09#076#'9#/05440


677&/6704(6
0560#6514
8209#04
'6
05404(6
4
60
9540&0"&56
0(6
794#04*0560)
4544"0%7670:;<=>=?;@?ABC@@;B?>C@=ADA4##6594#705&50
6
&9#04)6#04(6
0&076
96704*0
6$%6756
6)"1067&#/670565166#0"96#50&#'076
(6
20
0
,6$%67570&#'0
6)"9670&
60
&
7&"6'09#540
677&/670&70EFG9905675075
9#/7405%50
674%
670Ȱ
6)
676#56'0&705156076$%6#670&#'0
&105604
)
6776'20,64%
76709
)"6
6#56'0&70'&5&0&
607%))"96'0&70
8%"59)%
)47609#56
#6508&9"0H756#794#0I898HJ0"986075
%5%
6709#0&
/%
6#570&#'0
67%"5720898H0970&075&#'&
'0*4
0
76#'9#/0
%"59)&
50'&5&04#5&9#9#/405675409
&/670&#'074%#'09#066
&9"0
677&/6720K&5&0970)
6*976'019509570898H0
51)607405&50560
69)96#5019""08#410410540&#'"609520
0
LMMNOPQRSTUV0
WXH!060
6$%67570560
674%
67014760+,-0970/9(6#0&70&
/%
6#520
W3HEK09'6#59&"0540XH!405%50950'4670#450
65%
#0
'&5&203416(6
0950'4670
65%
#0&""05609#*4
&594#0
&54%5000560'&5&07%0&7056059
604*0"&750
4'9*9&594#40957051)60Y079Z620
[\]^_0̀9507)69*9670560+,-04*0&0
674%
605&50�'6&"01950560'&5&07%))"96'01950560
6$%67520!60)
46779#/0000
&
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
924
0
0
0
0 0
06!"0
677#$60769%9670560
4544!0&6
794'(0#075#5)704*6(0#'*0+
6#74'+(074
606#*6
70#'*0
#'04594'#!0
677#$60,4*"20
-../01234256072558920:759;<0
654*0000=>04
0#5'#
60 ?@@A0&6
794'000006#*6
700000
7$0,4*"0
BC@0 55DEE1112"#4424
0 ?@@AEF2F0
0
GHIJKLM0
-../012NOP0759<0
?@@A0&6
794'0000075#5)704*60 6#74'0000000006#*6
70000000
7$0
,4*"0
?@@AEF2F0
0
"9'$04)50560
6W)675D075#5)704*60970#0X0*9$950
')
,6
0%4
09'56
65#594'0,"0#0
4$
#
0#'*0
6#74'0970#056Y5)#!0
#760)'*6
7544*0,"0#06
74'20
Z[\0000]^_`/0a_bb`cdae.d_c0
@60#9
0197606Y#'$604%0
677#$670970'450560,6750
4*6!0%4
04
)'9#594'0%
4
04'60
46770540#0$
4)04%0456
0
467767200
)!59#75046
#594'0970
4
60#
4
9#56(09262(0#'0
46
#594'05#5076'*70#079'$!60
677#$60%
4
04'60
467705406#04%0560
6
,6
704%0#0$
4)04%0
46770)7)#!!"09'07)0#01#"05#50560
6
,6
7904%0560$
4)09705
#'7#
6'5054056076'*6
20
8)!59#750
677#$670
4&9*60#0)76%)!09'%
#75
)5)
60%4
04'75
)59'$0*975
9,)56*07"756
70560%4!!419'$0#
#56
97597D0
f0 g#)!5054!6
#'60,#76*04'0
6!9#56*076
&9670
f0 g9'*9'$0560*974&6
"076
&6
709'074'5#'64)70'6514
h9'$0
f0 i6556
06
%4
#'605
4)$0
6!9#56*0*#5#0
f0 A
4#$#594'04%06&6'50'459%9#594'70
jA0
)!59#750970,)9!504'05404%0560j'56
'650
4544!0jA200
)!59#750$
4)0970769%96*0,"0!#770k0j'56
'650#**
67720@60
6
,6
790970*"'#
9(0#!!419'$04
)56
70540l49'04
0!6#&60#50#'"059
620@60m#�Aj0
4&9*670#0*#5#$
#
0
9'56
%#60540jA0
)!59#7505
4)$0560!#7708)!59#750V4h65(0190970#07),!#7704%0k#5#$
#
0V4h6501950560
#**9594'#!0##,9!95"0540l49'0
)!59#750$
4)7200
46770#'0l49'0#0
)!59#750$
4)01950#0$9&6'0
)!59#750
46770,"0
9'&4h9'$0560l49'0B
4) 0
654*04%095708)!59#750V4h65200
46770#'0!6#&60#0769%96*0$
4)0,"09'&4h9'$0560
!6#&60B
4)0
654*04%095708)!59#750V4h6520
0 011123456789
924
0
0
0
0 00
!"#$%&0
9
'4
50()*)2+652,-0
9
'4
50()*)20./2,&0
'012902)77080259)75366
040
'0129075)590*4950
)9+0675
9+80)
8790:;405
<040
=+65>55
67708
40'0?02+65>55
6772865@<3)
66)
879.:;-0
80259)7574A65070?0+61080259)7574A6506BCDE;-0
0 72(49+F
40'068
40';-0
1<5690:0
0?0)
879G:H865@<5676;-0
I)5)8
)
3)A650
677)860?0+610I)5)8
)
03)A6506
H0
+26+85H08
40'H0
BCDE;-0
7276+506
677)86;-0
1<56090:010JJ6
0?0+6101<5609.///:-0
00000000000J4
069+5090K/-0L0+0-09M0M0;040003404J0
6
16
709+0)08
40'0I)5)8
)
3)A650
677)862+0?0+610I)5)8
)
3)A65060
10JJ6
H010JJ6
226+85;-072
669*66
677)862+;-0
N0
72026)*6F
40'68
40';-0N0)50674A650OP6'594+06;0407<756
H0405020'
9+50=+06Q74A65&Q0M0
6208650
677)86060;;-0
N0)506=GOP6'594+06;047<756
24052'
9+52+6Q=G&0Q0M0628658677)8660;;-0N0J9+)22<0409J0670R?0+022;0722476J0;-0N0
=+0560)14*60'
48
)
H0560)
80
6+570540560
)9+0
654507'69J<0)0
677)860540160
0259)750)+50560
0259)750)55
67704J0)08
40'20>J56
0(49+9+805)50
0259)7508
40'H0560'
46770
)A670)+09+75)+604J0
I)5)8
)
3)A6504+5)9+9+80560
677)860)+5076+5709505
40809570
0259)75074A650540560
0259)750
8
40'20>J56
05)5H0950)556
'570540
669*60+S0
0259)750
677)8670J
4
09570'66
70*9)0957074A65H0190)2740
1624+8705405608
40'0TUV5607)
60'4
5H0
WXWY%Z[\]%\^_`ab%cd^]eefZ]\\%Zfgg_dcZ[^cfd%cd%_dch0
i60=03j0'
9
959*6709+0@7I0k2P0*6
794+704J0560l3=mn0)
60'
4*95650)707<756
0)22705)50)
609
'26
6+5650
)70)02)<6
04*6
0560=+56
+650ij30)+50lI30'
454427208677)86056759+)594+70)
607'69J9650)7074A650)55
677670n0)0
74A650)55
67704+7975704J0)+0=+56
+650)55
6770)+50)024)20'4
50+0
16
20i609+56
'
467704
0+9)594+0
4'6
)594+70)
601)76504+056074A650
0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
924
0 0
0 0
0
0 !"0
#$75
%594&7208677%'670%
60()6)6*0%5056076&*9&'074+650)&59,0560&6514
+9&'0-
4544,0%705
%&7
9556*056
.0%&*0
)&59,0%&0%+&41,6*'6
6&50%
9/67.0900560-
4544,0
6()9
6704&62016&0
677%'670%
9/605620%
60()6)6*0%50560
669/9&'0
74+650)&59,0560
669/9&'0-
46770
%+670%&0%--
4-
9%56072756
0%,,0540
669/6056
20
#&20-
46770%&0
6%560%074+6505404
)&9%5601950%&456
0-
4677203970970*4&60$209&/4+9&'0456789:72756
0
%,,.014760%
')
6&5707-690205604
)&9%594&0*4
%9&.056052-60%&*074
659
670%0-%
59),%
0-
4544,20360
-
4544,0970-%
59),%
,2076,656*0$2056072756
0%4
*9&'05401656
05604
)&9%594&0970;<9<=><?:4
049>8<?@0
ABBCDBEFGHIEBIFH0
J&04
*6
054076&*0*%5%'
%
7.0%074+650-%9
09709*6&59096*06%059
60%04
)&9%594&0970
%*6203970970
%96/6*0$2076&*9&'0-
46770)79&'09570,4%,074+650*67
9-54
0%&*056074+650%**
6770400560
669/9&'0
74+6506%059
6095076&*70%0
677%'62000K9')
60L2LM09,,)75
%5670560-%+6570)76*004
0*%5%'
%
720N,96&50
#**
6770%&*0O6
/6
0#**
6770%
6074+650%**
6776720
70P074+65Q#KRJ3S3.OTNURVWX#80.Z[0 70P074+65Q#KRJ3S3.OTNURVWX#80 .Z[0
Y0 Y0
YZ00$9&*Q7.N,96&5#**
677[0 0 Y0$9&*Q072O6
/6
#**
677[0 0
Y0
Y0
76&*54Q7.\
677%'6\.O6
/6
0#**
677[0 0 Y0%
4)&5P
6/0
4
Q7.$)006
.00
4
[0 0
]^=_>8:̀@`ab:c567894:_48;:d5>:e<9<=><?4:
0
f450-
4677670)760560456789:%,,0540
6%560%074+650%&*0'650%0*67
9-54
004
0952036009
750%
')
6&5040074+650
7-69096705604
)&9%594&0*4
%9&0%70560J&56
&650*4
%9&0%&*0560764&*0%
')
6&509&*9%56705%50*%5%'
%
0
4
)&9%594&0970
6()9
6*20360,%750%
')
6&5054056074+650%,,0
%20$60)76*05407-69020%0-%
59),%
0-
4544,.0
$)5076559&'0950540g6
40%)767056072756
054076,650%07)95%$,60-
4544,hiVj09&05970%7620
0
f450-
4677670)760560k^l;:%,,0540$9&*0569
074+657054074+650%**
677672036076&*9&'0-
46770$9&*70957074+650540
%074+650%**
6770
606
9&'0540%&20%/%9,%$,60,4%,0-4
50&)
$6
20360
669/9&'0-
46770$9&*70957074+650540%074+650
%**
67705%504&5%9&70957076
/6
0-4
50%&*0
)750$60
%*60+&41&054056076&*6
20
0
36076&*9&'0-
46770)767048l;95:%,,01950%
')
6&5707-69029&'056074+6505
4)'000000000560
677%'60970540$60
76&5.0560
677%'609576,00%&*056074+650%**
6770400560*6759&%594&2036076&*540%,,0%&*70560
677%'60540560
)&*6
,29&'0iVj0%&*0Jj0-
4544,70%&*:
65)
&70560%5)%,0&)
$6
0400$2567076&520#70*%5%'
%
076
/960970
6()6756*0560
677%'609705
%&7
9556*05409570*6759&%594&01954)50%&0%+&41,6*'6
6&520J00560
677%'609705440,4&'054$6076&5.056
60970
%&06
4
0
65)
&20
0 011123456789
924
0
0
0 00000000000000000000000
0000060
6699!"0#
46770$7670560%&'()%*+,-..01950-
"$
6!5707#69/09!"0560.4-.07416504!0190540
66960-0
677-"60-!20
6
4
00.4-594!709!0190540754
60560
677-"60-!20560741650-22
67704/056076!29!"0
741652060
6/
4
0-..04..6570560/9
750
677-"609!05603$6$60-5056074165404
09/05603$6$609706
#50095019..0
1-950$!59.0-0
677-"60-
96720
54
$!9-594!04$
704!.0016!0-06&789*,9!04!60#
46770-22
6776709570
677-"60540560741650$7620:00-0
%&'()%*+,9!0-!456
0#
467720;!0.96!5<76
6
04
$!9-594!056
60970!40!6620/4
076
6
70540-60#
94
0
1!41.62"604/0.96!57=0741650-22
6776740:6-$760560%&'()%*+,4#6
-594!07$##.967056076!26
=70-22
67701950
6-0
677-"6095026.96
72060#
4#6
596704/02-5-"
-
04
$!9-594!09!0>3;?0-
605607-
60-7054760
267
9:6209!0@6594!0A2B20
CDEFGHIJKHHLMNJGDNKMOP
;!04
26
0540$76056075
6-
0#
4544.405140#
4677670
$750/9
750675-:.970-04!!6594!0:65166!0569
0#-9
04/0
7416572060-
-!"6
6!50970-0-70
65
90:6-$7604!604/0560741657019..0:60.9756!9!"0/4
0-0
63$6750/4
0
4!!6594!0-!20560456
019..0:60-719!"0/4
0-04!!6594!20Q!60-0#-9
04/0741650-70:66!04!!6562405600
-00
:60$7620/4
05
-!7
9559!"02-5-09!0:4504
06956
029
6594!20-5097205600:6-60.916075
6-
709!05-50-!00--9.-:.60
2-5-0970
6-209
629-56.00
05607-
604
26
0-709501-701
9556!0-!2056
60970!409!29-594!04/0560:4$!2-
004/0560
677-"6720R4166
056
60970-0:4$!26203$6$60-50560
6699!"0741650-!20560
6696
0:.41709/05603$6$60970
6
#50S056076!26
0:.41709/0950970/$..20T9"$
60A2AU09..$75
-567075
6-
04
$!9-594!409!0190560265-9.704/0560
-
"$
6!570-
6079
#.9/962S095024670!450741056076
6
0.479!"05607416504!0190950.9756!72034
-..00-076
6
0
14$.20/9
750.9756!0-!20-6#50-04!!6594!0-!2056!0/4
10-0!610#
467705404
$!9-5601950560.96!520
86-!19.64095019..04!59!$60540.9756!09!05604
9"9!-.0#
46772060#
4#6
596704/075
6-
04
$!9-594!09!0
>3;?0-
605607-
60-7054760267
9:6209!0@6594!0A2B20
0
VW@6
6
04
0.9756!9!"0#
46770/9
750$76705606*'X&9,4#6
-594!0540
6-560-075
6-
0741650-!20560YZ78,4#6
-594!0
540:9!20957074165054056076
6
7=0741650-22
6772060764!20-
"$
6!5054056074165070756
0-..0970"96!0-70
@Q5[\@]^_8405409!29-5605-5075
6-
04
$!9-594!0970
63$9
6220;/056059
20-
"$
6!50970.6/50-70
`6
4405605ab;a0#
4544.019..0:6076.65620-$54
-59-..020;50$7670560cZ69&7,4#6
-594!0540.9756!04!09570
741650/4
0.96!50
63$67570/4
04!!6594!72060764!20-
"$
6!50540560cZ69&7,70756
0-..07#69/9670560
-d9
$
0!$
:6
04/0
63$67570/4
04!!6594!705-50-!0:603$6$620-5059707416520
VW6076
6
0$7670-6#5070756
0-..0540-6#50-04!!6594!0
63$675620:00-0.96!50-!204:5-9!0-0!610
741650/4
04
$!9-594!019505-50.96!520604
9"9!-.0741650
-00759..0:60$7620540-6#50/$
56
0
4!!6594!701950456
0.96!5720
VW60.96!50#
46770$76705606*'X&9,4#6
-594!0540
6-560-075
6-
0741650-!2056!0$76705604!!65070756
0-..0
540
63$6750-04!!6594!09-0560741650-22
67704/0560.9756!9!"0#
467720_705604!!650-..0-$54
-59-..00:9!270
-0741650!-
60540560-..6
7=0741650#
94
0:9!29!"0970$!!6677-
020
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
924
0
0