Vous êtes sur la page 1sur 36

Disclaimer:

All the materials provided by the


NotesMirchi are obtained from
external resources.
NotesMirchi will not take the
responsibility in case of any
plagiarism. If the users find the
materials to be an electronic
reproduction of any copyrighted
materials, they are advised to
delete it immediately and report
the same to NotesMirchi. The
NotesMirchi logo and website
address provided in the footer
are added for only promotional
purpose and are in no way
associated with the content of
the material.

www.NotesMirchi.com
UNIT I IT 1001 - DISTRIBUTED SYSTEMS

1.1 ITRODUCTIO TO DISTRIBUTED SYSTEMS


Definition :
A distributed System is a collection of independent computers that appeals to its users as a single
coherent system.
Important Characteristics of distributed System :
(i) In distributed systems, the differences between the various computers and the ways in which
they communicate are hidden from users.
Internal Organization of distributed system also hidden from the users.
(ii) Users and applications can interact with a distributed system in a consistent and uniform way,
regardless of where and when interaction takes place.
A distributed system will normally be continuously available, although perhaps certain parts may be
temporarily out of order.
The motivation for constructing and using distributed system is resource sharing.
Resources such as printers, files, web pages or database records are managed by servers of appropriate
type.
The purpose of this chapter is to convey a clear view of the nature of distributed systems and the
challenge that must be addressed in order to ensure that they are successful. We look at some key examples
of distributed systems, the components from which they are constructed and their purposes.
Next, we explore the design of resource sharing systems in the context of world wide web and finally,
we look at the key challenges faced by the designers of distributed systems.
1.2 Examples of distributed Systems :
Let us now have a look at several examples of distributed systems.
The Internet is an example of distributed system.
The internet is an interconnected collection of computer networks of many different types.

Figure 1.1 Illustrates the typical portion of the Internet.

www.NotesMirchi.com
—Q

Figure 1.1 A typical portion of the internet

It enables the users, wherever they are, to make use of services such as world wide web, e-mail and file
transfer.
The services of internet can be extended by addition of server and new type of services.
The above figure shows a collection of intranets. Intranets are subnetwork operated by companies and
other organizations.
ISPs (Internet Service Providers) are companies that provide Connections to individual users and small
organizations.
The intranets are linked together by back bones.
A back bone is a network link with a high transmission Capacity. It employs satellite connections,
fiber optical cables and other high band width cables.
Multimedia services are available in the internet. This service enable the users to access audio and
video data.
As a second example, consider a work flow information system that supports the automatic
processing of orders. Typically, such a system is used by people from several departments, at different
locations.
For example, people from the sales department may be spread across a large region or an entire
country. Orders are placed by means of laptop computers that are connected to the system through the
telephone networks. Incoming orders are automatically forwarded to the planning department.
The system will automatically forward orders to an appropriate and available person.

www.NotesMirchi.com
As a final example, consider the world wide web. The web offers a simple, consistent, and uniform
model of distributed documents.
To see a document, a user need merely activate a reference, and the document appears on the screen.
Publishing a document is also simple: you only have to give it a unique name in the form of uniform
Resource Locator that refers to a local file containing the document's content.
1.3. CHALLENGES :
The key challenges faced by the designers of Distributed system arc heterogeneity, openness, security,
Scalability, failure handling, concurrency and the need for transparency.
1.3.1 Heterogeneity :
They must be constructed from a variety of different networks, operating systems, computer
hardware and programming languages.
The internet Communication protocols mask the difference in networks, and middleware can deal with
other differences.
The term Middleware applies to a software layer that provides a programming abstraction as well as
masking the heterogeneity of the underlying networks, hardware, operating systems and programming
languages.
Example : Common Object Request Broker Architecture (CORBA).
1.3.2 Openness
The openness of a computer system is the characteristic that determines whether the system can be
extended and re-implemented in various ways.
The openness of distributed systems is determined primarily by the degree to which new resource
sharing services can be added and be made available for use by a variety of client programs.
The first step to provide openness is to publish the inter faces of the components, but the integration
of components written by different programmers is a real challenge.
• Open systems are characterized by the fact that their key interfaces are published.
• Open distributed systems are based the provision of a uniform communication
mechanism and published interfaces for access to shared resources.
• Open systems can be constructed from heterogeneous hardware and software.

www.NotesMirchi.com
1.3.3 Security
Security for information resources has there components ;
(i) Confidentiality
Protection against disclosure to unauthorized individuals.
(ii) Integrity
Protection against alteration or corruption.
(iii) Availability
Protection against interference with the means to access the resources.
The challenge is to send sensitive information in a message over a network in a secure manner.
But security is not just a matter of concealing the contents of messages, it also involves knowing
for sure the identity of the user.
The second challenge is to identify a remote user.
Both of these challenges can be met by the use of encryption techniques.
Encryption can be used to provide adequate protection of shared resource and to keep sensitive
information secret when it is transmitted in messages over a network. Denial of service attacks are
still a problem.
1.3.4 Scalability
A distributed system is scalable if the cost of adding a user is a constant amount in terms of the
resources that must be added.
In other words, A system is described as scalable if it will remain effective when there is significant
increase in the number of resources and the number of users.
The design of scalable distributed system present the following challenges: Controlling the cost of
physical resources :
As the demand for a resource grows, it should be possible to extend the system, at reasonable cost, to
meet it.
Controlling the performance loss:
Consider the management of a set of data whose size is proportional to the number of users or
resources in them. In this case, Algorithms that use hierarchic structures scale better than linear structures.
But, even with hierarchic structures, an increase in size will result in some loss in performance.

www.NotesMirchi.com
Size : When a system needs to scale, we must consider scaling with respect to size. If more users or
resources need be supported, we are confronted the limitations of centralized services, data and algorithms.
For example, many services are centralized in the sense that they are implemented by means of only
a single server running on specific machine in the distributed system.
The problem now is that the server become a bottleneck as the number of users grows.
Even if we have virtually unlimited processing and storage capacity, communication with that server
will prohibit further growth.
Preventing software resources running out:
As an Example, the supply of available internet addresses is running out.
There is no correct solution to this problem. It is difficult to predict the demand that will be put on a
system years ahead.
Avoiding performance bottle necks :
Algorithms should be decentralized to avoid having performance bottlenecks. Because, In a large
distributed system, enormous number of messages have to be routed over many lines.
The optimal way to do this is collect complete information about the load on all machines and lines, and
then run a graph theory algorithm to compute all the optional. The trouble is that collecting and
transporting all the Input and output information would again be a bad idea because these messages world
overload part of the network.
1.3.5 Failure handling
Failures fall into two obvious categories : hardware and software.
If failure occurs, program may produce incorrect results on they may stop before they have
completed and intended computation.
Failures in a distributed system are partial, i.e., some components fail while others continue to
function. Therefore, the handling of failures is particularly difficult. The techniques dealing with failures are
l i st e d below.
 Detecting failures - Some failures can be detected. E.g. checksums can be used
to detect corrupted data in a message or a file
 Masking failures - Some failures that have been detected can be hidden or made
less severe. E.g. messages can be retransmitted when they fail to arrive.
 Tolerating failures - It is not possible to detect and hide all the failures that might occur in
large network. Their clients can be designed to tolerate failures, which generally involve the users
tolerating them as well. Services can be made to tolerate failures by the use of redundant
components.
 Recovery from failures - Recovery involves the design of software so that the
state of permanent data can be recovered or rolled back after a server has crashed.

www.NotesMirchi.com
1.3.6 Concurrency
Both services and applications provide resources that can be shared by clients in a distributed system.
There is therefore a possibility that several clients will attempt to access a shared resource at the same
time. The process that manages a shared resource could take one client request at a time. But that
approach limits throughput. Therefore, services and applications generally allow multiple client requests
to be processed concurrently.
For an object to be safe in concurrent environment, its operations must be synchronized in such a way
that its data remains consistent. This can be achieved by standard techniques. such as semaphores.

1.3.7 Transparency
It is defined as the concealment from the user and the application programmer of the separation of
components in a distributed system. Hence, the system is perceived as a whole rather than as a collection of
independent components. The main aim of the transparency is to make certain aspects of distribution
invisible to the application programmers.
• Access transparency enables local and remote resources to be accessed using
identical operations.
• Location transparency enables resources to be accessed without knowledge of
their location.
• Concurrency transparency enables several processes to operate concurrently
using shared resources. The resources will not interfere among themselves.
• Replication transparency enables multiple instances of resources to be used to
increase reliability and performance without knowledge of the replicas by users
or application programmers.
• Failure transparency enables the concealment of faults. It allows users and
application programs to complete their tasks even though they have the failure of
hardware or software components.
• Mobility transparency allows the movement of resources and clients within a
system. The movement will not affect the operation of users or programs.
• Performance transparency allows the system to be reconfigured to improve
performance as loads vary.
• Scaling transparency allows the system and applications to expand in scale.
However it will not change to the system structure or the application algorithms.
There are two important transparencies available. They are access and location transparency; their
presence or absence most strongly affects the utilization of distributed resources. They are referred
together as network transparency.

www.NotesMirchi.com
1.4 ARCHITECTURAL MODELS
An architectural model of a distributed system is concerned with placement of its parts and the
relationships between them. An architectural model defines the way in which the components of systems
interact with one another and the way in which they are mapped onto an underlying network of computers.
The overall goal is to ensure that the structure will meet present and likely future demands on it. Major
concerns are to make the system reliable, manageable, adaptable and cost effective.
An architectural model first simplifies and abstracts the functions of the
individual components of a distributed system and then it considers :
• The placement of the components across a network of computers, seeking to
definite useful patterns for the distribution of data and workload.
• The inter relationships between the components.

An initial simplification is achieved by classifying processes as server processes,


client processes and peer processes. This classification identifies the responsibilities of
each and hence helps us to assess their workloads and to determine the impact of
failures in each of them.
1.4.1 Software layers:
The term 'software architecture' refers to the structuring of software as layers or
modules in a single computer and in terms of services offered and requested between
processes located in the same or different computers. This process and service-oriented
view can be expressed in terms of service layers.

Fig:1.3 software and hardware services

www.NotesMirchi.com
 Platform
The lowest level hardware and software layers are known as a platform for distributed systems
and applications. These low level layers provide services to the layers above them. They are
implemented independently in each computer. They bring the system's programming interface upto a
level that facilitates communication and coordination between processes, eg., Intel X86/windows, Intel
X86/Linux, Sun SPARC/Sun OS, Intel X86/Solaris, etc.

 Middleware
Middleware is defined as a layer of software whose purpose is to mask heterogeneity and to
provide convenient programming model to application programmers. Middleware is concerned with
providing useful building blocks for the construction of software components that can work with one
another in a distributed system. In particular, it raises the level of the communication activities of
application programs through the support of abstractions such as remote method invocation,
communication between a group of processes, notification of events, replication of shared data and
transmission of multimedia data in real time.

1.4.2 System Architectures:


In this section, Let us discuss the principal architectural models on which distribution of
responsibilities is based. The main types of architectural models are given below.
• Client - Server model:
In the basic client-server model, processes in a distributed system are divided into two groups.
(1) A Server (li) A Client
A server is a process implementing a specific service. For example, a file system service or a database
service.
A client is a process that requests a service from a server by sending it a request and subsequently
waiting for the server's reply. Figure 1.4 illustrates the simple structure in which client processes interact
with individual server processes in separate host computers in order to access the shared resources that
they manage.

Figure 1.4: Clients invoke individual servers

Servers may be clients of other servers. For example, a web server is a client of a local file server that
manages the files in which the web pages are stored. Web servers and other Internet services are clients of
the DNS service, which translates Internet Domain Names to network addresses.

www.NotesMirchi.com
• Services provided by multiple Servers:
Services may be implemented as several server processes in separate host computers interacting as
necessary to provide a service to client processes as shown in Figure 1.5. The servers may partition The set
of objects based on the service and distribute them between themselves, or they may rv-smtain replicated
copies of them on several hosts.

The web provides a common example of partitioned data in which each web server manages its own
set of resources.
Replication is used to increase performance and availability and to improve fault tolerance. It
provides multiple consistent copies of data in processes running in different computers.

Service

Figure 1.5: A service provided by multiple servers

• Proxy servers and caches:


A cache is a store of recently used data objects. When a new object is received at a computer it is
added to the cache store, replacing some existing objects, if necessary. When an object is needed by a client
process, the caching service first checks the cache and supplies the object from there if an up-to-date copy is
available. If not, an up-to-date copy is fetched from the server. Caches may be co-located with each client
or in a proxy server that can be shared by several clients.
Web proxy servers provide a shared cache of web resources for the client machines at a site or across
several sites. The purpose of proxy servers is to increase availability and performance of the service by
reducing the load on the WAN and web servers.

www.NotesMirchi.com
Figure 1.6: Web proxy Server

• Peer Processes

In this architecture, all of the processes play similar roles, interacting cooperatively as peers
to perform a distributed activity without any distinction between clients and servers. In this model,
code in the peer processes maintains consistency of application-level resources and synchronizes
application-level actions when necessary. The elimination of server processes reduces inter-process
communication delays for access to local objects.

1.4.3 Variations on the client-server model


Several variations on the client-server mode' can be derived from the consideration of the following
factors:
 The use of mobile code and mobile agents

www.NotesMirchi.com
 User's need low cost computers with limited hardware resource that are simple
to manage.
 The requirement to add and remove mobile devices in a convenient manner.

• Mobile code - Applets are a well.known and widely used example of mobile code. The user running a
browser selects a link to an applet whose code is stored on a web server, the code is downloaded to the
browser and runs there. An advantage of running the downloaded code locally ss thai is can give good
interactive response since it does not suffer from delays or variability of band width associated with
network communication.
• Mobile agents; A mobile agent is a running program including both code and data that
travels from one computer to another m a network carrying out a task on someone's behalf
such as collecting information, eventually returning with the result. Mobile agents might be
used to install and mainioin software on thu* computers within ar; organization or to compare
the prices of products from a number of vendors by visiting the site of each vendor and performing a
series of database operations. Mobile agents are a potential security threat to the resources in computers
that they visit. The environment receiving a mobile agent should decide on which of the local resources it
should be allowed to use, based on the identity of the user on whose behalf the agent is acting.

• Thin clients: The term thin clients refers to a software layer that supports a window-
based user interface on a computer that is local to the user while executing application
programs on a remote computer. Instead of downloading the code of applications into the
user's computer, it runs them on a compute server (a powerful computer that has the capacity
to run large numbers of applications simultaneously).
The main drawback of the thin client architecture is in highly interactive graphical
activities such as CAD, and image processing, where the delays experienced by users are increased
by the need to transfer image and vector information between the thin client and the application
process, incurring both network and operating system latencies.

• Mobile devices and spontaneous networking:


The world is increasingly populated by small and portable computing devices, including
laptops, handheld devices such as PDAS, mobile phone and digital cameras, wearable computers
such as smart watches, and devices embedded in everyday appliances such as washing machines.
With appropriate integration into our distributed systems, these devices provide support for
mobile computing, whereby users carry their mobile devices between network environments
and take advantage of local and remote services as they do so. The form of distribution that
integrates mobile devices and other devices into a given network is best described by the term
spontaneous networking.

The key features of spontaneous networking are


• Easy Connection to a local network - wireless links avoid the need for pre-installed
cabling and avoid the inconvenience and reliability issues surrounding plugs and
sockets. A device brought into a new network environment is transparently

www.NotesMirchi.com
reconfigured to obtain connectivity.
• Easy integration with local services: Devices that find themselves inserted into existing
networks of devices automatically discover the services that are provided there, with no
special configuration actions performed by the user.
Limitations of spontaneous networking:
 Internet addressing and routing algorithms are difficult to implement
 Limited connectivity - users are not always connected as they more around (eg.
through tunnels)
 Security and Privacy
Discovery services:

Spontaneous networking allows client processes running on portable devices to access services on
the networks to which they are connected. The clients may not know about the services that are available
in the network to which they are connected. The purpose of a discovery system is to accept and store
details of services that are available on the network and to respond to queries from clients about them.
A discovery service offers two interfaces:
• A registration service - accepts registration requests from servers and records the details that
they contain in the discovery service's database of currently
available services.
• A lookup service - accepts queries concerning available services and searches its database for
registered services that match the queries. The result returned includes sufficient details to enable
clients to select between several similar services based on their attributes and to make a connection
to one or more of them.

Network Computers

The OS and application software for desktop computers typically require much of the active code and
data to be located on a local disk. But the management of application files and the ma;r.fenance of a local
software base require considerable technical effort of a nature that most users are not qualified to provide.

www.NotesMirchi.com
The network computer is a response to this problem. It downloads its operating system and any
application software needed by the user from a remote file server. Applications are run locally but the files
are managed by a remote file server. Since all the application data and code is stored by a file server, the
users may migrate from one network computer to another.

1.5 FUDAMETAL MODELS

Fundamental models are concerned with a more formal description of the


properties that are common in all of the architectural models.
All communication between processes is achieved by means of messages. Message
communication over a computer network can be affected by delays. It may suffer from a
variety of failures. It is vulnerable to security attacks. These issues are addressed by
three models.
• The interaction model deals with performance and with the difficulty of setting
time limits in a distributed system.
• The failure model attempts to give a precise specification of the faults that can be
exhibited by processes and communication channels.
• The security model discusses the possible threats to processes and communication
channels. It introduces the concept of a secure channel, which is secure against
these threats.
Let us discuss these models in detail:

1.5.1 Interaction model


Interacting processes perform all activities in a distributed system. Each process has
its own state, consisting of the set of data that it can access and update, including the
variables in its program. The state belonging to each process is completely private, i.e., it
cannot be accessed or updated by any other process. Two significant factors affecting
interacting processes in a distributed system are:
• Communication performance is often a limiting characteristic
• It is impossible to maintain a single global notion of time
Performance of communication Channels:
Communication over a computer network has the following performance characteristics relating to
latency, bandwidth and jitter.
Delay between the start of a message is transmission from one process and the beginning of its receipt
by another is referred to as latency, the latency includes:
o The delay in accessing the network.
o The time taken by the OS communication services which may vary according to the load on
the OS.

www.NotesMirchi.com
Bandwidth is the total amount of information that can be transmitted in a given time. When a large
number of communication channels are using the same network, they have to share the available
bandwidth.
Jitter is the variation in the time taken to deliver a series of messages. Jitter is relevant to multimedia
data. E.g., if consecutive samples of audio data are played witli different time intervals then the sound will
be badly distorted.

• Computer clocks and timing events


Each computer in a distributed system has its own internal clock, which can be used by local
processes to obtain the value of the current time. Therefore, two processes running on different computers
can associate timestamps with their events. However, even if two processes read their clocks at the same time,
their local clocks may supply different time values. This is because computer clocks drift from perfect time
and their drift rates differ from one another. The term clock drift rate refers to the relative amount that a
computer clock differs from a perfect reference clock. Even if the clocks on all computers are set to the
same time initially, their clock would eventually vary quite significantly unless corrections are applied.

• Two variants of the interaction model


In a distributed system it is hard to set time limits for process execution, message delivery or clock drift.
Two opposing extreme positions provide a pair of simple models, the first has a strong assumption of time
and the second makes no assumption about time.

(i) Synchronous distributed systems:


It is defined as one in which the following bounds are specified:
o The time to execute each step of a process has known lower and upper bounds.
o Each message transmitted over a channel is received within a known bounded time.
o Each process has a local clock whose drift rate from real time has a known bound.
It is possible to suggest likely upper and lower bounds for process execution time message
delivery and clock drift rates in a distributed system. But it is difficult to arrive at realistic values and to
provide guarantees of the chosen values. Unless the values are guaranteed, any design based on the
chosen values will not be reliable.

(ii) Asynchronous distributed system


An asynchronous distributed system is one in which there are no bounds on process execution
speeds, message transmission delays and clock drift rates.
This exactly models the Internet, in which there is no intrinsic bound on server or network load. For
example, to transfer a file using ftp. Actual distributed systems are very often asynchronous because of the
need for processes to share the processors and for communication channels to share the network.

www.NotesMirchi.com
1.5.2 The failure model
The failure model defines the ways in which failure may occur in order to provide an understanding of the
effects of failures. There are three types of failures and are explained below:
• Omission failures: The faults classified as omission failures refer to cases when a
process or communication channel fails to perform actions that it is supposed to do. There are two
types of omission failures. They are:

(i) Process omission failures: The chief omission failure of a process is to crash. The design of
services that can survive in the presence of faults can be simplified if it can be assumed that the
services on which it depends crash cleanly, i.e. the processes either function correctly or else stop.
Other processes may be able to detect such a crash by the fact that the process repeatedly fails to
respond to invocation messages. However this method of crash detection relies on the use of
timeouts. A process crash is called fail-stop if other processes can detect certainly that the process
has crashed.

(ii) Communication omission failures:


As an example, consider the two communication primitives namely send and receive. A process P
performs a send by inserting the message m in its outgoing message buffer.The communication
channel transports m to q's incoming message buffer. Process q performs a receive by taking m
from its incoming message buffer and then delivers it.

www.NotesMirchi.com
The outgoing and incoming message buffers are typically provided by the operating system.
The communication channel produces an omission failure if it does not transport a message from
p's outgoing message buffer to q's incoming message buffer. This is known as 'dropping messages' and is
generally caused by lack of buffer space. The loss of message between the sending process and the
outgoing message buffer is called sending omission failure. The loss of message between the incoming
message buffer and the receiving process is called receive-omission failure and the loss of messages in
between is called channel omission failure

• Arbitrary failures:
The term arbitrary or Byzantine failure is used to describe the worst possible failure semantics, in
which any type of error may occur. An arbitrary failure of a process is one in which it arbitrarily
omits intended processing steps or takes unintended processing steps.
Communication channels can suffer from arbitrary failures, e.g. message contents may be
corrupted or non-existent messages may be delivered or real messages may be delivered more
than once.
• Timing failures:
Timing failures are applicable in synchronous distributed system where time limits are set for all
operations.

Class of failure Affects Description


Clock Process Local clock exceeds the bounds
Performance Process Process exceeds the bounds
Performance Channel Message transmission takes longer
than the bound

Timing is particularly relevent to multimedia computers with video and audio channels. Video
information may require a large amount of data to be transferred.
To deliver such information without timing failures will make demands on the operating system as
well as communication system.

• Masking failure: Each component in a distributed system is generally constructed from a


collection of other components. It is possible to construct reliable services from components that
exhibit failures. For example, multiple servers that hold replicas of data can continue to
provide a service when one of them crashes. A Knowledge of the failure characteristics can
enable a new service to be designed to mask the failure of the components on which it depends.
A service masks a failure, either by hiding it altogether or by converting it into a more
acceptable type of failure.

www.NotesMirchi.com
1.5.3 Security Model
The security of a distributed system can be achieved by securing the processes and the channels
ch used for
their interactions and by protecting thee obje
objects that they encapsulate against
unauthorized access.
Protecting objects : Protection is describe
scribed in terms of objects. Objects are intended
ed to bbe used in different
ways by different users. For example,, some objects may hold a user's private data and other objects may hold
shared data such as Web pages. Too sup support this, access rights specify who is allowed
allow to perform the
operations (read/write) of an object.

The server is responsible forr veri


verifying the identity of the client behind d each
invocation and checking their accessss righ
rights on the requested object. The clients in turn
can check the authenticity of the server.

Fig : Obje
bjects and Principals

Securing processes and their interaction


actions
Distributed systems are deployeded and used in tasks that are likely to be subject
ct to eexternal attacks by
hostile users. This is true for applications
ations such as financial transactions.
For these applications, secrecy or int
integrity is crucial. Integrity is threatened byy security
secu violations and
communication failures. In order to ident
identify and defeat threats we have to analyzee thosethos threats. We will
explore a model for the analysis of securit
ecurity threats in the following paragraph.
Processes interact by sending messages.
mess The messages are exposed to attack ck because
bec the network
and the communication service aree open
open. Servers and peer processes expose their heir interfaces,
in enabling
invocations to be sent to them by any otother process. To secure the messages passed
assed over the network,
cryptographic algorithms (encryption)
n) is aapplied to the message, to provide confidential
entiality, authentication
and integrity.
The threats from a potential enemy
emy are discussed under the following headings:
Threats to processes: A processs that is designed to handle incoming requests may receive a message
from any other process in the distributed
ibuted system and it cannot necessarily determine
ine the identity of the

www.NotesM
otesMirchi.com
sender. This lack of reliable knowledge of the source of a message is a threat to the correct functioning of
both servers and clients. E.g. Spoofing
Threats to communication channels: An enemy can copy, alter or inject messages as they travel
across the network and its intervening gateways. Such attacks present a threat to the privacy and integrity
of information as it travels over the network and to the integrity of the system.
All these threats can be defeated by the use of secure channels, which is described below:

Secure Channels:
A secure channel ensures the privacy and integrity of the data transmitted across it. Encryption
and authentication are used to build secure channels as a service layer on top of existing communication
services. A secure channel is a communication channel connecting a pair of processes with the following
properties:
 Each of the processes knows reliably the identity of other processes.
 It ensures the privacy and integrity of the data transmitted across it.
 Each message includes a physical or logical time stamp to prevent messages from
being replayed or reordered.
Other possible threats:

Denial of service - This is a form of attack in which the enemy interferes with the activities of
authorized users by making excessive invocations on services or message transmission in a network,
resulting in overloading of physical resources.

Mobile code - Mobile code raise new and interesting security problems for any process that receives and
executes program code from elsewhere, such as the e-mail attachments, such code may easily play a
Trojan horse role.

Drawbacks of security techniques:


The use of security techniques such as encryption and access control incurs substantial processing
overhead and management costs.

1.6 INTER PROCESS COMMUNICATION

1.6.1 INTRODUCTION

Inter process communication is concerned with the communication between processes in a


distributed system, both in its own right and as support for communication between distributed objects.
The Java API for inter process communication in the internet provides both datagram and stream
communication.
The Application Program Interface (API) to UDP provides a message passing abstraction - the simplest
form of interprocess communication. This enables a sending process to transmit a single message to a

www.NotesMirchi.com
receiving process. The independent packets containing these messages are called datagrams. In the Java
and UNIX APIs, the sender specifies the destination using a socket - an indirect reference to a particular
port used by the destination process at a destination computer.
The API to TCP provides the abstraction of a two-way stream between pairs of processes. The
information communicated consists of a stream of data items with no message boundaries.

www.NotesMirchi.com
0
0 0
6675
6!"#0!
454 4"70$
60%679&'6%05407!!4
50 "96'576
(6
0 4 '9 $594'09'05 604)0695 6
06 4560865 4%0
*'(4 $594'0+8,-04
06 4560.
4 6%
60/$""00./-201
4!0 "59 $750!
454 4"70$
60%679&'6%05407!!4
50&
4!0
4 '9 $594'201
4!0 "59 $750970$0)4
09'56
!
4 6770 4 '9 $594'09'01 9 04'60!
4 67709'0$0&
4!04)0
!
4 6776705
$'7 95705 60 677$&60540$""0 6 26
704)05 60&
4!20
3456789:;69<<8;;=;>??????
??56=6@@==;:<A;==;<=@;<0
8677$&60!$779'&0265166'0$0!$9
04)0!
4 677670 $'02607!!4
56%02#05140 677$&60 4 '9 $594'04!6
$594'7B0000000
CDEFGHEFGIDJDKLDM0
*'04
%6
0)4
04'60!
4 6770540 4 '9 $560195 0$'45 6
N04'60!
4 677076'%70$0 677$&60540%6759'$594'0$'%0$'45 6
0
!
4 6770$505 60%6759'$594'0
6 69(6705 60 677$&620O 970$ 59(95#09'(4"(670 4 '9 $594'04)0%$5$0)
4 05 6076'%9'&0!
4 6770
5405 60
6 69(9'&0!
4 6770$'%0 $#09'(4"(607#'
4'9P$594'04)05 605140!
4 6776720
Q0660970$774 9$56%0195 06$ 0 677$&60%6759'$594'20R6'%9'&0!
4 677670 $760 677$&6705402600$%%6%0540
6 4560
6670$'%0
6 69(9'&0!
4 677670
6 4(60 677$&670)
4 0"4 $"066720 4 '9 $594'0265166'076'%9'&0$'%0

6 69(9'&0!
4 677670 $#0260695 6
0CSEJTIUEUVCG4
0HCSEJTIUEUVC0
*'07#'
4'470)4
04)0 4 '9 $594'N05 6076'%9'&0$'%0
6 69(9'&0!
4 6776707#'
4'9P6020006
#0 677$&620*'0
5 970 $76N0245 076'%0$'%0
6 69(60$
60WXUJYKEZG4!6
$594'720[ 6'6(6
0$000076'%09776%05 6076'%9'&0!
4 6770970
2"4 \6%0'59"05 60 4

67!4'%9'&0
6 69(609709776%20[ 6'6(6
0
6 69(609709776%N05 60!
4 67702"4 \70'59"0$0
677$&60$

9(6720
*'0$7#'
4'470)4
04)0 4 '9 $594'N05 607604)05 60CDEFGU]DIH^KUEGKCGEUE_WXUJYKEZMO 6G76'%9'&0!
4 6770970
$""416%0540!
4 66%0$70744'0$705 60 677$&60 $70266'0 4!96%0540$02))6
0$'%05 605
$'7 97794'04)05 60 677$&60!
4 66%70
9'0!$
$""6"0195 05 6076'%9'&0!
4 677206 69(604!6
$594'0 $'0 $(60WXUJYKEZGHEFGEUE_WXUJYKEZG($
9$'5720
000008677$&670$
6076'50540+*'56
'650$%%
677N0"4 $"0!4
5-0!$9
720Q0"4 $"0!4
50970$0 677$&609')4
$594'0195 9'0$000
4 !56
N07!6 9)96%0$70$'09'56&6
20Q0!4
50 $706`$ 5"#04'60
6 69(6
02500 $'0 $(600 $'#076'%6
720.
4 677670 $#0
760 "59!"60!4
570)
4 01 9 0540
6 69(60 677$&6720R6
(6
70&6'6
$""#0!2"9 9P605 69
0!4
50' 26
70)4
07602#0
"96'5720
0
abcdefg0
h45 0)4
704)0 4 '9 $594'0+ij.0$'%0O/.-07605 6074 \650$275
$ 594'N01 9 0!
4(9%6706'%0!49'50)4
0
4 '9 $594'0265166'0!
4 6776720*'56
!
4 6770 4 '9 $594'0 4'7975704)0O
$'7 9559'&0$0 677$&60265166'0$0
74 \650 04'60!
4 6770$'%0$074 \6509'0$'45 6
0!
4 67720k4
0!
4 6770540
6 69(60 677$&67N0957074 \650 750260
24'%0540$0"4 $"0!4
50$'%05 60*'56
'650$%%
67704)05 60 4 !56
04'01 9 0950
'720.
4 677670 $#07605 607$ 60
74 \650)4
076'%9'&0$'%0
6 69(9'&0 677$&6720Q'#0!
4 6770 $#0 $\607604)0 "59!"60!4
570540
6 69(60 677$&67N0250$00
!
4 6770 $''4507 $
60!4
570195 045 6
0!
4 6776704'05 607$ 60 4 !56
20.
4 67767079'&0lmG$%%
6770$
60$'0
DnJD]^KUEG9'05 $505 6#0%407 $
60!4
5720

0 011123456789
92 4 0
0
0
0 0
!"#$$$$$$%&'$()*)+,)-$./--012.)*2/10
3045556
5 076750890:;<09705
577 955640=
4 05076749760>
4 677054050
6 69?9760>
4 6770195 4@50
5 A741B6466 67504
0
65
96720C=050=59B@
604 @
7D05 60 6775660 59074505

9?620E40767404
0
6 69?60 6775667D050
>
4 6770 @750=9
750
655605074 A65084@740540570C756
7650544
67704=05 60B4 5B0 4750574050B4 5B0>4
5203076
?6
019BB0
89740957074 A6505405076
?6
0>4
50F047605 550950 5A670A74170540 B9675707405 5505 690 57076740 67756670540952030 B96750
897470957074 A6505405790=
660B4 5B0>4
520
G610977@670
6B55976054045556
5 0 4 @79 5594705
60H0
IIJKLLMNKIOPQKRE 60
6 69?9760>
4 6770766405407>6 9=905705

5904=08956704=050>5
59 @B5
079S620C=05 60 67756609700000000
5440896000=4
05 605

59D09509705
@7 556404705

9?5B2037905>>B9 559470
6T@9
9760 67756670B5
66
05 5705 60 5U9 @ 0 @750
=
56 67505 6 097540 @7A704=05 55079S620
IIIIIVVVVVVVVWXYZ[P\NR]4 A657074
5BB90>
4?9460747F8B4 A976076747057408B4 A9760
6 69?670=4
045556
5 00000000000
4 @79 5594720
IIIIIIIIIIIIIIIIIII^P_KY`aLRE 60
6 69?605 5508B4 A70=4
06?6
09707@9558B60=4
0@7608905076
?6
05 55097015959760540
6 69?60

6T@67570=
4 09570 B9675720b@5097074 60>
46
5 D095097074505>>
4>
955605 55050>
4 67705 550 570@764050
6 69?60
4>6
5594707 4@B40159509746=97956B90970795@55947701 6
605 60>4567595B076749760>
4 6770 570 57 6404
05 606U>6 5640
6775660 57086670B47520E405BB4107@ 0
6T@9
6 6757D059 64@570 570860765047074 A65720
00000000cdedfgdVhijkVlmn0F0E 60
6 69?60 65 4404467074507>6 9=905704
96970=4
0 677566720C775654057097?4 5594704=0

6 69?606657050 6775660544
677640540957074 A650=
4 057904
969720
opqrsr=4
0:;<045556
5 07@==6
0=
4 05 60=4BB419760=59B@
67H0
t 9779470=59B@
670F0 67756670 5908604
4>>6404 579475BB920
t
46
9760F0 67756670 57074 659 67086046B9?6
6404@504=076746
04
46
20
uvdV4=0uwxy0
E 60;4 597035 60]6
?9 60z;3]{D01 9 0B44A70@>0;3]075 6709705 60C756
765D09709 >B6 6756404?6
0:;<20
:;<045556
5 705
6074 659 670570555
5 59?60 49 6086 5@7605 69044074507@==6
0=
4 04?6
654705774 955640195 0
6@5
5756640 677566046B9?6
920
|)})$~'$€/,$%&'$()*)+,)-0
E 60‚5?503<C0>
4?9467045556
5 0 4 @79 559470890 657704=05140 B57767H0qqƒq„q…†q‡
qqƒqs…†0
wlˆl‰ilkxleŠdˆyVE 970 B5770>
4?9467050 4775
@ 54
05 550 5A670570977557 604@504=05705

5904=0895670 4 >
97976050
677566D05 60B6765 04=05 60 677566057405 60C756
7650544
67705740B4 5B0>4
507@ 86
04=05 6046759755947074 A650570
7 4170970G96@
60‹2Œ20E 970 B5770>
4?946705745 6
0

000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
92 4 0
0
000000975
95607756 0000000000000000000000000000000000000000000000 200000000000000000000000000000000000000000000
!"#$#"%&#"$'(###()(!*$#"
#+,"*%

 
-./01234567389:9/19;3<9=>2:0
0

?@A@BC@DEFGHIJAKEL*,#''M+"#+!"NOP+##"#$%&'!+#
*##M#'$)##"$Q)(#'*#+#'#,#'%&#,'!+#R
#"$*##,,S*($*#,#,'%0
L*,#O##"#$TM'!+*,,S"$*+U0
EVJWXE@WXECJHJYZJKEL*$*+##$ "+##"#$)S#'#M%
VJAFG[YDJG\AKEL*$*+#,,S#$)%] *#$Q*!$*+S,,),M*$
'+#+**S#&'+,^_`'%
HGWWJHAKEL*$*++"#'#,#$'#+&#++%0
abcdbefghijahklmnop0
9 q4
5rsts2u652vw09 q4
50xstsy0942vw0qz9 0 zs770{|}~96u500
qz9 075s59 0t490 s9u0€5
9u‚0s
‚70ƒ0„…005
00
s5s‚
s 04 †650s4 †650‡0u610s5s‚
s 4 †65€…w0
056ƒ0„0 0‡s
‚7ƒˆ„2‚65‰567€…w0
0~u65Š
6770s‹475‡0~u65Š
6772‚65‰3s 6€s
‚7ƒ„…w0
09u5076
t6
q4
500000000‡0ŒŽw0
s5s‚
s |s †650
667500‡0u610000s5s‚
s |s †65€ ys
‚7ƒˆ„2z6u‚5 €…ys‹475y76
t6
q4
5…w00
s4 †65276u0€
6675…w0
56ƒ0„0‘‘6
0‡0u610560ƒ’’’„w0
s5s‚
s |s †650
6qz0“u610s5s‚
s |s †65€‘‘6
y0‘‘6
2z6u‚5 …w0
s4 †652
6 69t6€
6qz…w0

0 011123456789
92 4 0
0
0 0
!"#$%&'()*+$,++-./0*'/,.0
1 62234505405 6016407
454 4807
499:6705 60;<75
; 594=04>0;075
6; 04>0<?56705401 9 0:;5;0 ;?0<601
9556=0;=:0
>
4 01 9 0:;5;0 ;?0<60
6;:201 60>488419=@0 ;
; 56
9759 704>05 60=6514
A0;
60 9::6=0<?05 6075
6; 0
;<75
; 594=20
B CDEEFGDHEIJDKH1 60;7789 ;594=0 ;=0 44760 410 L 0:;5;09501
95670540;075
6; 04
0
6;:70>
4 09520
B MNEOHPDEEFGDEKH1 601640L7670;=0; A=4186:@6 6=507 6 6205>05 6076=:6
0:4670=450
6 69960;=0
; A=4186:@6 6=50195 9=0;059 64L5Q0950
65
;=7 95705 60 677;@620
B RSNTHUNVOWNSKH1640;556 7570540 ;5 05 607766:04>05 607
4 6776705 ;50
6;:0>
4 0;=:01
9560540;0
75
6; 20
B CDEEFGDHNWXDWIVGHFVXHXYZSIUFOINV[08677;@609:6=59>96
70;
60;774 9;56:0195 06; 05407; A65Q0
1 9 06=;<86705 60
6 9796=50540:656 50;=:0
6\6 50:L789 ;567Q04
0540
64
:6
0 677;@6705 ;50:40=450
;

99609=076=:6
04
:6
20
B CDEEFGDHXDEOIVFOINVE[0307;9
04>0 4 L=9 ;59=@07
4 677670675;<897 670;0 4==6 594=0
<6>4
605 6?0 ;=0 4 L=9 ;560496
0;075
6; 20]= 60;0 4==6 594=0970675;<897 6:Q05 607
4 6770
79 78?0
6;:0>
4 0;=:01
956705405 6075
6; 0195 4L505 60L7604>05=56
=65Q0;::
6770;=:074
5720
1 603450>4
075
6; 0 4 L=9 ;594=0;77L 6705 ;501 6=0;07;9
04>07
4 677670;
60675;<897 9=@0;0 4==6 594=Q04=604>0
5 6 078;?705 60 896=50
4860;=:05 6045 6
078;?705 6076
96
0
486Q0<L505 6
6;>56
05 6?014L8:0<60766
7201 60 896=50
4860
9=9489670
6;59=@0;075
6; 074 A650<4L=:0540;=?074
50;=:05 6=0 ;A9=@0;0 4==6 50
6^L6750;7A9=@0>4
0;0
4==6 594=0540;076
96
0;50957076
96
074
5201 6076
96
0
48609=9489670
6;59=@0;089756=9=@074 A650<4L=:0540;0
76
96
074
50;=:01;959=@0>4
0 896=570540
6^L6750 4==6 594=7201 6089756=9=@074 A650 ;9=5;9=70;0^L6L604>0
9= 4 9=@0 4==6 594=0
6^L675720_ 6=05 6076
96
0; 67570;0 4==6 594=Q0;0=61075
6; 074 A650970
6;56:0>4
05 60
76
96
0540 4 L=9 ;560195 0;0 896=5Q0 6;=1 9860
65;9=9=@0957074 A650;505 6074
50>4
089756=9=@054045 6
0 896=5720

`,+),-'&'*.a/.b/&&-)&()c*')a',&'()*+0,++-./0*'/,.*()0
d8;5 9=@04>0:;5;0956 7[01140 4 L=9 ;59=@07
4 677670=66:0540;@
660;705405 60
4=56=5704>05 60:;5;05
;=7 9556:0496
0;075
6; 20e2@2Q09>04=607
4 67701
95670;=0f9=5f0
>488416:0<?0;0f:4L<86f05 6=05 60
6;:6
0;505 6045 6
06=:0 L750
6;:0;=0f9=5f0>488416:0
000000000000000<?0;0f:4L<86f20
dg84 A9=@[0_ 6=0;07
4 6770;556 7570540
6;:0:;5;0>
4 0;=09=7L50 ;==68Q095019880@650
:;5;09
4=Q05 60^L6L604
095019880<84 A0L=5980:;5;0<6 4 670;9;98;<8620
1 607
4 67705 ;501
956
0:;5;0540;075
6; 0 ;?0<60<84 A6:0<?05 601640>8410 4=5
4800 6 ;=97 09>05 60
74 A650;505 6045 6
06=:0970^L6L9=@0;70 L 0:;5;0;705 607
454 480;8841720
1
6;:7[0_ 6=0;076
96
0; 67570;0 4==6 594=Q0950@6=6
;88?0
6;5670;0=6105
6;:0540
4 L=9 ;560195 05 60=610 896=520
0

0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
92 4 0
0
2 0
!"#$%&'($!)0
*407+597,-05 609.56/
95-00
406
5-10*2304760 6 574 705406656 50+.60
676 50 4

40500+ 56570+.6076846. 60
.4 96
705406656 50+.60
676 50640:9 +5600+ 565720;.04
66
05407+597,-05 60<+:9695-00
406
5-1059 644570+.60

65
+.7 97794.70+
60476609-0*2320
=>$%'?%@AB)%8+.-0,
6846.5:-04766076
<9 670
4.04<6
0*230 4..6 594.0195 0
676
<66004
50.4 96
720* 6760
9. :4660C**310D*310*6:.650+.60E8*320
FG%HBI%?'#%@AB%>J#$K>)%* 60L+<+09.56
,+ 60540*23075
6+ 709700
4<966609.05 60 :+77670E6
<6
0E4 5650
+.60E4 56520
M$#G$#%M'NO$J)%* 970 :+7709709.56.6660,4
047609-0+076
<6
0540
6+560+074 5650+50+076
<6
004
50,4
0:9756.9./0,4
0
4..6 50
68467570,
4 0 :96.5720;570PQQR 65 460/6570+0 4..6 50
6846750,
4 05 6084646104
09,05 60846460970
6 05-109509:4 5704.59:04.60+

9<6720
M'NO$J)%* 60 :96.50476705 970 4.75
4 54
0540
6+560+074 5650706 9,-9./05 60S3E0 475.+ 60+.6004
504,0+0
76
<6
20* 60E4 5650 :+7700
4<96670 65 4670/65:.045E5
6+ 0+.60/65T45045E5
6+ 0,4
0+ 6779./05 605140
75
6+ 70+774 9+5660195 0+0E4 56520
@AB%N!$UJ%V#'W#K)0
9 04
507+<+2.652XY0
9 04
507+<+2942XY0
049:9 0 :+770*232;96.50Z0
049:9 075+59 0<4960 +9.0[E5
9./0+
/7\0]^0Z0
5
-0Z09.5076
<6
04
50_0̀abcY0
E4 5650 0_0.610E4 565[+
/7\]1076
<6
04
5^Y0
S+5+:.045E5
6+ 09.0_0.610S+5+:.045E5
6+ 0[0 2/65:.045E5
6+ 0[^0^Y0
S+5+T45045E5
6+ 04450_0.610S+5+T45045E5
6+ 0[ 20/65T45045E5
6+ 0[^^Y044521
956d*D[+
/7\e]^Y0E5
9./0
6+5+0_09.2
6+6d*D[^Y0E-756 244520
9.5:.,f6 69<66g0h0i06+5+^Y0
j0 +5 0[d.5.41.C475kl 60594.06^0Z0E-756 244520
9.5:.,74 5g0h0i062/658677+/6[^^Y0
j0 +5 0[kTDkl 60594.06^0Z0E-756 244520
9.5:.0[hkTDgh0i062/658677+/60[^^Y0j0 +5 0[:Tkl 60594.06^0Z0
E-756 244520
9.5:.0[h;Tgh0i062/658677+/60[^^Y0j0,9.+::-0Z9,0[ 0m_0.4::^05
-Z0 2 :476[^0Yj0 +5 0[;T0
kl 60594.06^Y0

0 011123456789
92 4 0
0
0 0
!"#$!%&'$"!()*+),-.!"#$!,)+/-$"0!*1!"#$!-,'!-$"#*2!0/((&3!,!-$00,+$!,2!"#$!456!,-$!*1!"#$!0$)7$)8!
9#$!%&'$"!%)$,"$0!,!0*%:$"!;*/2!"*!"#$!#*0",-$!,2!0$)7$)!(*)"!<=>?8!"!-,:$0!,!4,",&(/"6")$,-!,2!
4,",@/"(/"6")$,-!"#$!A)'"$0!"#$!-$00,+$!"*!'"0!*/"(/"!0")$,-!,2!A,'"0!"*!)$,2!,!)$(&3!1)*-!'"0!'(/"!0")$,-8!
B9C!'0!,!$%*2'+!"#,"!)$()$0$"'+!'!,!(,)"'%/&,)!1*)-,"80
9#$!0$)7$)!()*+),-!*($0!,!0$)7$)!0*%:$"!*!'"0!0$)7$)!(*)"!D<=>?E!,2!&'0"$0!1*)!%* $%"!$0"08!F#$!*$!
,))'7$0.!'"!-,:$0!,!$A!"#)$,2!'!A#'%#!"*!%*--/'%,"$!A'"#!"#$!%&'$"80
GHIJHIKLKMINOIPQR0
9 S4
5TUVU2W652XY00
KKKK9 S4
50TUVU2942XY00
0000SZ[\9 0 \U770]^_`6
V6
0a0
SZ[\9 075U59 0V49b0 U9W0c`5
9Wdefghiij
kIlKa0
9W5076
V6
S4
50m0nopqY0
`6
V6
`4 r650\9774 0m0W610`6
V6
`4 r65c76
V6
S4
5sY0
1 9\60c5
Z6s0a0
`4 r65070m0\9774 2U 6S5csY0
tU5U\WSZ5̀5
6U 09W0m0W610tU5U\WSZ5̀5
6U 0
c72d65\WSZ5`5
6U 0cssY0
tU5UuZ5SZ5`5
6U 04Z50m0W610
tU5UuZ5SZ5`5
6U c72d65uZ5SZ5̀5
6U 0cssY0
0`5
9Wd0\9W60m09W2
6Ubcv]wcsY00
0000000000000000000004Z521
956x]wc\9W6sY0
y0 U5 0czuwz{ 6S594W06s0a0̀|756 24Z52S
9W5\W0c}zuwR0}0~0
62d658677Ud6cssYy0
U5 0c\uz{ 6S594W06s0a0`|756 24Z52S
9W5\W0c}€R0}0~0
62d658677Ud6csYy
9WU\\|0a5
|0a0\9774 2 \476c0sYy U5 0ac\uz{ 6S594W06sy0

0 011123456789
92 4 0
0
0 0
20000!"#!$3%&0'%#%0$!($!)!3#%#*+30%3'08%$),%&&*3-0
# 609./4
0594.0754
6109.0
2..9.304
43
0 70970
64
676.56100701050075
2 52
6701 6
60705 609./4
0594.0
9.0 67703670 4.7975704/076526. 6704/06756720*

6746 598604/05 60/4


04/0 4 2.9 0594.02761905 6010500
75
2 52
670 2750660/:0556.610; 4.86
56105400076526. 6704/067567<066/4
605
0.7 97794.00.10
6629:504.00

980:20
# 60
64
676.50594.04/010500956 7019//6
70665166.00
956 52
6720%.45 6
09772609705 6076504/0 4167027610540

64
676.50 0
0 56
70/4
06=0 4:690>3*"077756 02760%)?**0 0
0 56
0 419.39050@9.304.606756046
0 0
0 56
90
1 6
60705 60>.9 4160750.10
100::4170/4
05 60
64
676.50594.04/056=509.0 0.70:0.32036700.1050@670514067567046
0
0
0 56
20
+.604/05 60/4::419.30 65 4170 0.0660276105406.06:600.705140 4 4256
705406= 0.3601050080:26720
AB # 6080:26700
60 4.86
56105400.003
66106=56
.0:0/4
05066/4
605
0.7 97794.00.10 4.86
5610
5405 60:4 0:0/4
04.0
6 694520
AB # 6080:26700
605
0.7 9556109.05 6076.16
C70/4
059054365 6
0195 00.09.19 0594.04/05 60
/4
0502761900.105 60
6 9496.50 4.86
5705 6080:26709/0.6 6770
720
#4072444
50$8)0;$6 4560865 410*.84 0594.<04
0$(?0;$6 4560(
4 612
60?0::<00.7010500574605 050 0.0
66040776100700.00
32 6.504
0
652
.61007000
672:50 275066006:60540660/:0556.6100.105 609.1989120:04
9 95986010500
80:2670
64
676.56109.00.003
6610/4
0520%.003
6610750.10
10/4
05 60
64
676.50594.04/01050075
2 52
6700.10
4
9 95986080:2670970 0::6100.0DEFGFFHEFIE0
JKLMNKOOPQRSKQTSUQVKLMNKOOPQRW0
XFYFGGEZ9705 604
4 67704/050@9.3000 4::6 594.04/010500956 709.54000/4
0729506:60/4
0#
0.7 97794.09.000
67703620[EFYFGGEZ09705 604
4 67704/019776 6:9.305 6 04.00

980:05404
412 600.0652980:6.50 4::6 594.04/0
10500956 7005016759.0594.20# 270 0
7 0::9.30 4.7975704/05 6036.6
0594.04/04
9 95986080:26709.5400.06=56
.0:0
10500
64
676.50594.20)9 9:0
:7902. 0
7 0::9.30 4.7975704/036.6
0594.04/04
9 95986080:2670/
4 05 69
06=56
.0:010500

64
676.50594.00.105 60
6629:19.304/01050075
2 52
6720
0#1400:56
.059860044
40 6705406=56
.0:010500
64
676.50594.00.10 0
7 0::9.300
6\0
]00000?+$^%C70 4 4.010500
64
676.50594.0
]00000_080C70466̀ 5076
90:9a0594.00
0
bcdcbSefghijMSklVVlQSmKnKSgopLoMoQnKnPlQqemgrS
?+$^%0?'$09705 606=56
.0:010500
64
676.50594.016/9.610195 0?+$^%0s2t20?'$0 0.0
64
676.500::04/05 60
105005746705 050 0.0660276100700
32 6.5700.10
652
.080:26709.0
6 45609.84 0594.709.0?+$^%20*50 4.7975704/0
u04
9 9598605746705 0509. :21607 4
50;2vw695<90:4.30;xsw695<902.793.6107 4
5902.793.610:4.390/:4050;xsw695<90
1426:650vyw695<90 0
20^44:60.0;#$>!04
0z%&)!<904 5650;{w695<00.100.70 4.75
2 56105746700707 41.09.0
z932
602t0

0 011123456789
92 4 0
0
0 !0
"#$#04%&6 570 #'0 4'5#9'0
6(6
6' 67054045 6
04%&6 5720) 6'04'04%&6 5097076
9#*9+6,-05 606'59
604%&6 505 #50950

6(6
6' 670#
6076
9#*9+6,054.65 6
0195 09520/6(6
6' 670#
6076
9#*9+6,0#700123456789 60 #',*60970#0
6(6
6' 60540
#'04%&6 50195 9'05 6076
9#*9+6,0(4
20
94076
9#*9+60#'04%&6 5-09570 *#7709'(4
#594'09701
9556'04:5-0(4**416,0%;05 605;<670#',0'# 6704(095709'75#' 60
$#
9#%*6720=(05 609'75#' 60$#
9#%*670%6*4'.0540'610 *#7767-05 6'05 69
0 *#7709'(4
#594'0 :750#*740%601
9556'04:50
(4**416,0%;05 605;<670#',0'# 6704(05 69
09'75#' 60$#
9#%*67209 970
6 :
79$60<
4 6,:
60 4'59':670:'59*05 60 *#770
9'(4
#594'0#',09'75#' 60$#
9#%*6704(05 60'6 677#
;0 *#77670 #$60%66'01
9556'04:52># 0 *#770970.9$6'0#0 #',*6-0
#',0'40 *#7709701
9556'0 4
605 #'04' 605405 6075
6# 04(0%;567?05 60 #',*670%69'.01
9556'01 6
60'6 677#
;20
>.@0A6
74'0A0B0'610A6
74'0CDE 95 F-0GH6#,6'G20IJKLMN0
9 6076
9#*9+6,0(4
04(05 60.9$6'06O# <*609707 41'09'0P9.:
60I2IQ20RS0#',0R0I0#
60
#',*670
000A>/ES30 U?%;56$6
794'0': %6
0 R40
T

0 K0 9'50;6#
0 75
9'.0'# 60 75
9'.0<*# 60
0 IJKL0 V?7 95 0 W0H4',4'0 R=0
XYZ[\58]7]^_8̀5\Y14Ya538bc\d8cb8e5\6c28fgh5ij0
kT A
9 959$605;<670#
601
9556'09'0<4
5#%*60(4
#50:79'.0 65 4,704(8fgh5ijf[jl[j`j\51d8
*#7720
kT E5
9'.70#',0 #
# 56
70#
601
9556'0%;09570 65 4,0 #**6,01
956m9P20Cm'9$6
7#*09
#'7(6
0
P4
#5M0
kT 94076
9#*9+605 604%&6 50C62.20A6
74'M-0
000000000n
6#560#'09'075#
$604(05 60 *#770fgh5ijc[jl[j̀j\51d8#',09'$4o609570p\Yj5fgh5ij8
65 4,0%;0<#779'.05 60<6
74'04%&6 50#70#
.: 6'520
k0 94076
9#*9+60#'04%&6 50(
4 0#075
6# 04(0,#5#-04<6'0#'0S%&6 5S:5<:5E5
6# 04'05 60
75
6# 0#',0:7609570\513fgh5ij8 65 4,0540
6 4'75
: 505 604
9.9'#*04%&6 50
E6
9#*9+#594'0#',0,676
9#*9+#594'04(05 60#
.: 6'570#',0
67:*5704(0
6 45609'$4 #594'70#
60.6'6
#**;0
#

96,04:50#:54 #59 #**;0%;05 60dY3345p1\5q8195 4:50#';0<#


59 9<#594'0%;05 60#<<*9 #594'0<
4.
# 6
20
r !sTstuvTr wxyvz0
{0
6 45604%&6 50
6(6
6' 60970#'09,6'59(96
0(4
0#0
6 45604%&6 505 #50970$#*9,05
4:. 4:50#0,975
9%:56,0
7;756 20/6 45604%&6 50
6(6
6' 60<#776,09'05 609'$4 #594'0 677#.605407<6 9(;01 9 04%&6 50970540%609'$4o6,20
>$6'0#(56
05 60
6 45604%&6 50#774 9#56,0195 0#0.9$6'0
6 45604%&6 50
6(6
6' 60970,6*656,-09509709 <4
5#'505 #50
5 60
6 45604%&6 50
6(6
6' 60970'450
6:76,20
/6 45604%&6 50
6(6
6' 60 #'0%60 4'75
: 56,0%;0 4' #56'#59'.05 60='56
'650#,,
67704(09570 4 <:56
-0<4
50': %6
04(05 60
<
4 67705 #50
6#56,0950195 05 6059 604(09570
6#594'0#',0#0*4 #*04%&6 50': %6
209 60*4 #*04%&6 50': %6
0970
9'
6 6'56,06# 059 60#'04%&6 50970
6#56,09'05 #50<
4 67720

0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
92 4 0
0
!
0 20
"#56
#650 &4
50 59 60 )(*6 50 9#56
+, 604+0
$%%
6770 #' (6
0 #' (6
0
6 45604(*6 50
-.(9/70 -.(9570 -.(9570 -.(9570
01234567879:6;5<45=5>?@?1A>6AB6@645CA?56ADE5F?645B545>F50
GHI!!!JKLMNOPMQRMQ!JSTTUNLJVOLSN0
W 970+4
04+0 4 '#9 ,594#0970%679X#6%05407'YY4
505 60
4/670,#%0 677,X606Z ,#X67009#05[Y9 ,/0 /96#5.76
\6
0
9#56
, 594#720"#0X6#6
,/]0
6^'675.
6Y/[0 4 '#9 ,594#09707[#
4#4'70(6 ,'7605 60 /96#50Y
4 6770(/4 _70'#59/05 60

6Y/[0,

9\670+
4 05 6076
\6
20"50 ,#0,/740(60
6/9,(/60(6 ,'760
6Y/[09706++6 59\6/[0,#0, _#41/6%X6 6#505405 60 /96#520
W 60 /96#5.76
\6
06Z ,#X670 677,X6709#056
704+076#%0,#%0
6 69\604Y6
,594#709#05 60`,\,0$&"20$0Y
454 4/0
('9/504\6
0%,5,X
, 70,\49%70'##6 677,
[04\6
6,%70,774 9,56%0195 0Wa&075
6, 0Y
454 4/20
2b2000W 60c6^'675.c6Y/[0&
454 4/d0
0
W 970Y
454 4/0970(,76%04#05
660Y
9 959\67d0%4)Y6
,594#]0X65c6^'6750,#%076#%c6Y/[20"50 ,#6(60%679X#6%0540
Y
4\9%60 6
5,9#0%6/9\6
[0X',
,#566720"+0ef&0%,5,X
, 70,
60'76%]05 60%6/9\6
[0X',
,#56670 '750(60Y
4\9%6%0([0
5 60
6^'675.0
6Y/[0Y
454 4/]01 9 0 ,[0'7605 6076
\6
0
6Y/[0 677,X60,70,#0, _#41/6%X6 6#504+05 60 /96#50
6^'6750
677,X620
0
W 60%4)Y6
,594#0 65 4%0970'76%0([0 /96#505409#\4_60
6 45604Y6
,594#720"570,
X' 6#5707Y6 9+[05 60
6 45604(*6 50
,#%01 9 0 65 4%05409#\4_6]054X65 6
0195 0,%%9594#,/09#+4
,594#0
6^'9
6%0([05 60 65 4%20"50970,77' 6%05 ,505 60
/96#50 ,//9#X0%4)Y6
,594#0 ,
7 ,/70,
X' 6#5709#540,#0,

,[04+0([5670,#%0'# ,
7 ,/705 60
67'/570+
4 05 60
,

,[04+0([56705 ,50970
65'
#6%0
0
g[#5,Zd0
Y'(/9 0([56h0i0%4)Y6
,594#jc6 456)(*6 5c6+04]09#50 65 4%9%]0([56h0i0,
X' 6#57k0
0
W 60%4)Y6
,594#0 65 4%076#%70,0
6^'6750 677,X605405 6076
\6
01 4760"#56
#650,%%
6770*0Y4
50,
607Y6 9+96%09#05 60

6 45604(*6 50
6+6
6# 60X9\6#0,70,
X' 6#520$+56
076#%9#X05 60
6^'6750 677,X6]0%4)Y6
,594#09#\4_670
6 69\60540
X650,0
6Y/[0 677,X6]0+
4 01 9 09506Z5
, 570
67'/50,#%0
65'
#709505405 60 ,//6
20
0
l65c6^'6750970'76%0([0,076
\6
0Y
4 6770540, ^'9
6076
\9 60
6^'675720m 6#05 6076
\6
0 ,709#\4_6%05 60 65 4%09#05 60
7Y6 9+96%04(*6 509505 6#0'767076#%c6Y/[054076#%05 60
6Y/[0 677,X60540 /96#520m 6#05 60
6Y/[0 677,X60970
6 69\6%0([0
5 60 /96#5]05 60%4)Y6
,594#0970'#(/4 _6%05 606Z6 '594#04+05 60 /96#50Y
4X
, 0 4#59#'6720
g[#5,Zd0Y'(/9 0([56h0i0X65c6^'675j0kn0
Y'(/9 0\49%076#%c6Y/[j([56h0i0
6Y/[]0"#65$%%
6770 /96#5o475209#50 /96#5&4
5kn0

0 011123456789
92 4 0
0
012341563789
237 99 9 9
9
 



!"#$%&'#()*+,--./0&,.9
1792736723492756 9 72278792346364791298197:91:9;186479  <9



72278791 579 1:39O44736723F9 944756 P9 


27367239B89 1:39 
H5Q73927@747:79 27 37H5Q7327@9 

7389B89 1:3949 7389 
L486 7:329 7447 9@95 3729 


="#$%&'#()*>&/&9
?99999999;7166479 8769@9379473672344756 95436A9
B@937934779541 131979574731:2974791 567 7:37899749CD0E98737847 2F937 926@@749@4 9379
@661:89 6:1731:9@7166472A9
G17 926@@749@4 9 1221:9@71664729
G722787297479:3986747:377893957987619747891:927:874948749
G179543697:926@@749@4 9379@7166479@954722729
197669@49721:297:9792749749729@716789497947367239494756 9 722787912984557898H574731:9
6272979&-,&7:91391297131:89398739379274974D294756 9 7227879179731:937I7:97:97931 76396429
8757:82965:93798761974 986747:3772939579@@74789
1795436912987218:78939478:1J79267221979 7227872913937927 7947367239187:31@17497:8939
@1637496398656173729B@93792749749729764778 927:393794756 97:91394771972979865617379473672391391669:7789
397K76379379574731:97871:9395371:93794726639
 79274974297:97K7637937149574731:29 47937:9
:797:895371:937927 794726632977931 79L:9M-(,&.&574731:9129:7937397:9579574@4 789475773786 9
13937927 797@@7397291@99574@4 7897K736 9:79
;492749742937394736147947347:2 1221:9@947561729136394747K7631:9@9574731:2F979N%&,* 7 9579
62789179374 9D1234 D947@742939792346364793739:371:297947489@94756 9 7227872937397979577:9
347:2 63789L:97:34 F91:9791234 9:371:297947367239187:31@174F99

9999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999372141
0
 20
000965996
0405 60 !96505401 9 095017076520"570#$
#4760970540!!4105 6076
%6
005
7 950

6#!&0 677'6701 60 !9650#
4 677670
6($67509502)0#
4*!6 0774 9560195 05 60 9754
&09709570
6 4
&20
0
+20,000-./060 '60#
454 4!7010
2 604!!419'05
660#
454 4!70
60$7604
09 #!6 659'0%
94$705&#67040-./05
660#
454 4!70#
4$ 60
96
9'0*6 %94
70905 60#
676 6040 4 $9 59409!$
6720
3456789:;;<;=>"50 &0*60$7601 605 6
6097040%!$60540*60
65$
60
4 05 60#
4 6$
6005 60
!9650
6($9
67040 49
59405 505 60#
4 6$
60 70*660606 $5620
34567?:=899@:;;<;=>"50970$76$!04
0 4750 !965A76
%6
060 '6720B#6 9!0 C41!6'6 650
677'670
60450
6($9
6D0*6 $760076
%6
E70
6#!&A 677'60970
6'
60700 C41!6'6 6520
34567:=?F<GH;I=JH899K@:;;<;=L950970*7604060 '60400 677'6710
6($675D0

6#!&00 C41!6'6 65202 60 C41!6'6 650 459705 60
6($675601 9 019!!06*!605 6076
%6
0540
97 
065
9670
4 09570 9754
&20
0
+200M760402/.075
6 705409 #!6 6505 60
6($675A
6#!&0#
454 4!0
2 60679
60540%4909 #!6 659'0 $!59A# C650#
454 4!7097046045 60
674704
0
$79'02/.075
6 70!!419'0
'$ 65700
67$!57040&079N6540*605
7 955620"05 60
2/.0970$76D095067$
6705 505 60 677'670
606!9%6
60
6!9*!&205 6
60970406604
0
2
7 97794040 677'67009!56
9'040$#!9 56704
0195 D0 9754
967202 604%6
60$6050
) C41!6'6 650 677'670970
6$ 601 600
6#!&0 677'604!!4170;;HF56
00 677'60
6($6750
0
0
+2O000P22.010060 #!60400
6($675A
6#!&0#
454 4!010
000000000P22.0QP&#6
0260502
76
0.
454 4!R09700#
454 4!05 507#6 996705 60 677'6709%4!%600
6($6750A0
6#!&000
60 '6D05 60 65 400
'$ 65700
67$!57005 60
$!6704
0
6#
67659'005 6 00905 60 677'6720"507$##4
5700
9060765040 65 470QST220.M2D0.SB2D065 R05 506*!60540!!0409570
674$
6720"0959405409%4C9'0
65 4704016*0
674$
67D05 60.
454 4!0!!41704
0 456506'45959400#7714
A75&!60$5 659 59420
34/456506'45959410/!965E70
6($67570 09 !$6094
5940705401 5050
6#
676559405 6&0 0
 6#5D06*!9'05 6076
%6
0540 447605 60
6#
676559405 50970 4750##
4#
95604
05 60$76
20
34)$5 659 59410.7714
075&!60$5 659 5940970#
4%960540#
4%605 6096595&0405 6074$
60
0
P22.09709 #!6 65604%6
02/.20U 0 !965076
%6
0956
 5940 4797570405 604!!419'0756#710

0 011123456789
92 4 0
0
0
 0
2 0000000! 60 "96#50
6$%67570&#'05 6076
(6
0& 6)50&0 4##6 594#0&505 60'6*&%"5076
(6
0)4
504
0&50&0
0000000000)4
507)6 9*96'09#05 60+,-20
.2 000000000! 60 "96#5076#'70&0
6$%6750 677&/605405 6076
(6
20
02 000000000! 6076
(6
076#'70&0
6)"10 677&/605405 60 "96#520
22 000000000! 60 4##6 594#0970 "476'20
3416(6
405 60#66'0540675&5"97 0&#'0 "4760&0 4##6 594#0*4
06(6
10
6$%6756
6)"1067 &#/6097067)6#79(640
545 09#04(6
"4&'9#/05 6076
(6
0&#'09#076#'9#/05440 &#10 677&/6704(6
05 60#6514
8209#04
'6
05404(6
4 60
9540&0"&56
0(6
794#04*05 60)
454 4"0%7670:;<=>=?;@?ABC@@;B?>C@=ADA 4##6 594#705 &50
6 &9#04)6#04(6
0&076
96704*0

6$%6756
6)"1067 &#/670565166#0 "96#50&#'076
(6
20
0
,6$%67570&#'0
6)"9670&
60 &
7 &"6'09#540 677&/670&70EFG9905675075
9#/7405%50
674%
670 &#0560

6)
676#56'0&705156076$%6# 670&#'0 &10560 4 )
6776'20,6 4%
76709 )"6 6#56'0&70'&5&0&
607%))"96'0&70
8%"59)%
)47609#56
#6508&9"0H756#794#0I898HJ0"986075
% 5%
6709#0&
/% 6#570&#'0
67%"5720898H0970&075&#'&
'0*4
0
76#'9#/0 %"59)&
50'&5&0 4#5&9#9#/405675409 &/670&#'074%#'09#066 &9"0 677&/6720K&5&0970)
6*976'0195 09570898H0
51)607405 &505 60
6 9)96#5019""08#410 410540 &#'"609520
0
LMMNOPQRSTUV0
WXH!060
6$%675705 60
674%
6701 4760+,-0970/9(6#0&70&
/% 6#520
W3HEK09'6#59 &"0540XH!405%50950'4670#450
65%
#0&#10'&5&203416(6
0950'4670
65%
#0&""05 609#*4
&594#0
&54%50005 60'&5&07% 0&705 6059 604*0"&750 4'9*9 &594#40957051)60Y079Z620
[\]^_0̀9507)6 9*96705 60+,-04*0&0
674%
605 &50 &#0'6&"0195 05 60'&5&07%))"96'0195 05 60
6$%67520! 60)
4 6779#/0000
&

96'04%504#05 60'&5&0'6)6#'704#05 60*%# 594#04*05 60)


4/
& 07)6 9*96'09#05 60+,-20
Wa+!060
6$%675705 &505 60'&5&07%))"96'09#05 60
6$%6750970754
6'0195 05 60/9(6#0+,-0&7095709'6#59*96
20
WKH-H!H060! 6076
(6
0'6"656705 60
674%
609'6#59*96'05105 60/9(6#0+,-20F6
(6
70 &10#450&"1&170&""410
5 9704)6
&594#409#01 9 0 &7605 60
6)"109#'9 &5670*&9"%
620
Wba!9b3F060! 6076
(6
07%))"96705 60 "96#50195 0&0"97504*0 65 4'70950&""41705405600&))"96'05405 60/9(6#0
+,-20
W c,EGH060%76'0*4
0'9&/#4759 0)%
)476720
0
0de]]fge_h\i^ei^]_0̀
! 60,6$%67508677&/607)6 9*96705 60#& 604*0&0 65 4'405 60+,-04*0&0
674%
6405 60)
454 4"0(6
794#4074 60
6&'6
70&#'0&#04)594#&"0 677&/6054'120j9/0I&J056"4107 41705 60 4#56#5704*0&#03!!a0,6$%6750 677&/601 4760
65 4'0970X6520

00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
92 4 0
0
0
0 0
06!"0 677#$6076 9%96705 60
454 4!0&6
794'(0#075#5)70 4*6(0#'*0+
6#74'+(074 60 6#*6
70#'*0
#'04594'#!0 677#$60,4*"20
-../01234256072558920:759;<0
65 4*0000=>04
0#5 '# 60 ?@@A0&6
794'00000 6#*6
700000 7$0,4*"0
BC@0 55DEE1112"# 442 4 0 ?@@AEF2F0
0

GHIJKLM0
-../012NOP0759<0
?@@A0&6
794'0000075#5)70 4*60 6#74'000000000 6#*6
70000000 7$0
,4*"0
?@@AEF2F0
0

QRR0 ST0 674)


60
*#5#0
GHIJKUM0
V5#5)70 4*60#'*0
6#74'0
4&9*60#0
64
504'05 607) 6774
045 6
197609'0 #

"9'$04)505 60
6W)675D075#5)70 4*60970#0X0*9$950
') ,6
0%4
09'56

65#594'0,"0#0
4$
# 0#'*0
6#74'0970#056Y5)#!0
#760)'*6
7544*0,"0#06
74'20
Z[\0000]^_`/0a_bb`cdae.d_c0
@ 60#9
0197606Y #'$604%0 677#$670970'4505 60,6750 4*6!0%4
0 4 )'9 #594'0%
4 04'60

4 6770540#0$
4)04%045 6
0
4 67767200 )!59 #75046
#594'0970 4
60#
4
9#56(09262(0#'0
46
#594'05 #5076'*70#079'$!60 677#$60%
4 04'60
4 67705406# 04%05 60 6 ,6
704%0#0$
4)04%0

4 6770)7)#!!"09'07) 0#01#"05 #505 60 6 ,6
7 904%05 60$
4)09705
#'7#
6'505405 6076'*6
20
8)!59 #750 677#$670
4&9*60#0)76%)!09'%
#75
) 5)
60%4
0 4'75
) 59'$0*975
9,)56*07"756 705 60%4!!419'$0 #
# 56
9759 7D0
f0 g#)!5054!6
#' 60,#76*04'0
6!9 #56*076
&9 670
f0 g9'*9'$05 60*97 4&6
"076
&6
709'074'5#'64)70'6514
h9'$0
f0 i6556
06
%4
#' 605
4)$ 0
6!9 #56*0*#5#0
f0 A
4#$#594'04%06&6'50'459%9 #594'70
jA0 )!59 #750970,)9!504'05404%05 60j'56
'650
454 4!0jA200 )!59 #750$
4)097076 9%96*0,"0 !#770k0j'56
'650#**
67720@ 60
6 ,6
7 90970*"'# 9 (0#!!419'$0 4 )56
70540l49'04
0!6#&60#50#'"059 620@ 60m#&#0Aj0
4&9*670#0*#5#$
# 0
9'56
%# 60540jA0 )!59 #7505
4)$ 05 60 !#7708)!59 #750V4 h65(01 9 0970#07), !#7704%0k#5#$
# 0V4 h650195 05 60
#**9594'#!0 ##,9!95"0540l49'0 )!59 #750$
4)7200
4 6770 #'0l49'0#0 )!59 #750$
4)0195 0#0$9&6'0 )!59 #750
4 6770,"0
9'&4h9'$05 60l49'0B
4) 0 65 4*04%095708)!59 #750V4 h65200
4 6770 #'0!6#&60#076 9%96*0$
4)0,"09'&4h9'$05 60
!6#&60B
4)0 65 4*04%095708)!59 #750V4 h6520

0 011123456789
92 4 0
0
0
0 00
 !"#$%&0
9 '4
50()*)2+652,-0
9 '4
50()*)20./2,&0
'0129 0 2)77080259 )75366
040
'0129 075)59 0*4950 )9+0675
9+80)
8790:;405
<040
=+65>55
67708
40'0?02+65>55
6772865@<3) 66)
879.:;-0
80259 )7574 A65070?0+61080259 )7574 A6506BCDE;-0
0 72(49+F
40'068
40';-0
1<5690:0 0?0)
879G:H865@<5676;-0
I)5)8
) 3) A650 677)860?0+610I)5)8
) 03) A6506 H0
+26+85 H08
40'H0
BCDE;-0
7276+506 677)86;-0
1<56090:010JJ6
0?0+6101<5609.///:-0
00000000000J4
069+5090K/-0L0+0-09M0M0;040003404J0 6 16
709+0)08
40'0I)5)8
) 3) A650 677)862+0?0+610I)5)8
) 3) A65060
10JJ6
H010JJ6
226+85 ;-072
6 69*66 677)862+;-0
N0
72026)*6F
40'68
40';-0N0 )5 0674 A650OP 6'594+06;0407<756 H0405020'
9+50=+06Q74 A65&Q0M0
6208650 677)86060;;-0
N0 )5 06=GOP 6'594+06;047<756 24052'
9+52+6Q=G&0Q0M0628658677)8660;;-0N0J9+)22<0409J0670R?0+022;072 2476J0;-0N0

=+05 60)14*60'
48
) H05 60)
80 6+5705405 60 )9+0 65 4507'6 9J<0)0 677)860540160 0259 )750)+505 60
0259 )750)55
67704J0)08
40'20>J56
0(49+9+805 )50 0259 )7508
40'H05 60'
4 6770 )A670)+09+75)+ 604J0
I)5)8
) 3) A650 4+5)9+9+805 60 677)860)+5076+5709505
408 09570 0259 )75074 A6505405 60 0259 )750
8
40'20>J56
05 )5H0950)556 '570540
6 69*60+S0 0259 )750 677)8670J
4 09570'66
70*9)0957074 A65H01 9 0)2740
1624+8705405 608
40'0TUV5 607) 60'4
5H0
WXWY%Z[\]%\^_`ab%cd^]eefZ]\\%Zfgg_dcZ[^cfd%cd%_dch0
i 60=03j0'
9 959*6709+0@7I0k2P0*6
794+704J05 60l3=mn0)
60'
4*95650)707<756 0 )22705 )50)
609 '26 6+5650
)70)02)<6
04*6
05 60=+56
+650ij30)+50lI30'
454 427208677)86056759+)594+70)
607'6 9J9650)7074 A650)55
677670n0)0
74 A650)55
6770 4+7975704J0)+0=+56
+650)55
6770)+50)024 )20'4
50+0 16
20i 609+56
'
4 6770 4 0+9 )594+0
4'6
)594+70)
601)76504+05 6074 A650

0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
92 4
0 0
0 0
0
0 !"0
#$75
% 594&7208677%'670%
60()6)6*0%505 6076&*9&'074 +650)&59,05 60&6514
+9&'0-
454 4,0 %705
%&7 9556*05 6 .0%&*0
)&59,0%&0% +&41,6*'6 6&50%

9/67.09005 60-
454 4,0
6()9
6704&6201 6&0 677%'670%

9/605 620%
60()6)6*0%505 60
6 69/9&'0
74 +650)&59,05 60
6 69/9&'0-
4 6770 %+670%&0%--
4-
9%56072756 0 %,,0540
6 69/605 6 20
#&20-
4 6770 %&0
6%560%074 +650540 4 )&9 %560195 0%&45 6
0-
4 677203 970970*4&60$209&/4+9&'0456789:72756 0
%,,.01 4760%
') 6&5707-6 90205 60 4 )&9 %594&0*4 %9&.05 6052-60%&*074 659 670%0-%
59 ),%
0-
454 4,203 60
-
454 4,0970-%
59 ),%
,2076,6 56*0$205 6072756 0% 4
*9&'05401 65 6
05 60 4 )&9 %594&0970;<9<=><?:4
049>8<?@0
ABBCDBEFGHIEBIFH0
J&04
*6
054076&*0*%5%'
% 7.0%074 +650-%9
09709*6&59096*06% 059 60%0 4 )&9 %594&0970 %*6203 970970
% 96/6*0$2076&*9&'0-
4 6770)79&'09570,4 %,074 +650*67
9-54
0%&*05 6074 +650%**
67704005 60
6 69/9&'0
74 +6506% 059 6095076&*70%0 677%'62000K9')
60L2LM09,,)75
%56705 60-% +6570)76*004
0*%5%'
% 720N,96&50
#**
6770%&*0O6
/6
0#**
6770%
6074 +650%**
6776720
70P074 +65Q#KRJ3S3.OTNURVWX#80.Z[0 70P074 +65Q#KRJ3S3.OTNURVWX#80 .Z[0


Y0 Y0
YZ00$9&*Q7.N,96&5#**
677[0 0 Y0$9&*Q072O6
/6
#**
677[0 0
Y0
Y0
76&*54Q7.\ 677%'6\.O6
/6
0#**
677[0 0 Y0% 4)&5P
6 /0
4 Q7.$)006
.00
4 [0 0
]^=_>8:̀@`ab:c567894:_48;:d5>:e<9<=><?4:
0
f45 0-
4 677670)7605 60456789: %,,0540
6%560%074 +650%&*0'650%0*67
9-54
004
095203 6009
750%
') 6&5040074 +650
7-6 9096705 60 4 )&9 %594&0*4 %9&0%705 60J&56
&650*4 %9&0%&*05 6076 4&*0%
') 6&509&*9 %56705 %50*%5%'
% 0
4 )&9 %594&0970
6()9
6*203 60,%750%
') 6&505405 6074 +650 %,,0 %20$60)76*05407-6 9020%0-%
59 ),%
0-
454 4,.0
$)5076559&'0950540g6
40 %)76705 6072756 054076,6 50%07)95%$,60-
454 4,hiVj09&05 970 %7620
0
f45 0-
4 677670)7605 60k^l;: %,,0540$9&*05 69
074 +657054074 +650%**
67767203 6076&*9&'0-
4 6770$9&*70957074 +650540
%074 +650%**
6770
606

9&'0540%&20%/%9,%$,60,4 %,0-4
50&) $6
203 60
6 69/9&'0-
4 6770$9&*70957074 +650540%074 +650
%**
67705 %50 4&5%9&70957076
/6
0-4
50%&*0 )750$60 %*60+&41&05405 6076&*6
20
0
3 6076&*9&'0-
4 6770)767048l;95: %,,0195 0%
') 6&5707-6 9029&'05 6074 +6505
4)' 0000000005 60 677%'60970540$60
76&5.05 60 677%'609576,00%&*05 6074 +650%**
67704005 60*6759&%594&203 6076&*540 %,,0 %&*705 60 677%'605405 60
)&*6
,29&'0iVj0%&*0Jj0-
454 4,70%&*:
65)
&705 60% 5)%,0&) $6
0400$2567076&520#70*%5%'
% 076
/9 60970
6()6756*05 60
677%'609705
%&7 9556*05409570*6759&%594&0195 4)50%&0% +&41,6*'6 6&520J005 60 677%'609705440,4&'054$6076&5.05 6
60970
%&06

4
0
65)
&20

0 011123456789
92 4 0
0
0 00000000000000000000000
00000 60
6 699!"0#
4 6770$76705 60%&'()%*+, -..0195 0-
"$ 6!5707#6 9/09!"05 60.4 -.074 16504!01 9 0540

6 6960-0 677-"60-!20 6 4
00.4 -594!709!01 9 0540754
605 60 677-"60-!205 6074 1650-22
67704/05 6076!29!"0
74 16520 60
6 /
4 0 -..0 4..6 5705 60/9
750 677-"609!05 603$6$60-505 6074 165404
09/05 603$6$609706 #50095019..0
1-950$!59.0-0 677-"60-

96720
54 $!9 -594!04 $
704!.001 6!0-06&789*,9!04!60#
4 6770-22
6776709570 677-"605405 6074 1650$7620:00-0
%&'()%*+,9!0-!45 6
0#
4 67720;!0 .96!5<76
6
0 4 $!9 -594!05 6
60970!40!6620/4
076
6
70540 -60#
94
0
1!41.62"604/0 .96!57=074 1650-22
6776740:6 -$7605 60%&'()%*+,4#6
-594!07$##.96705 6076!26
=70-22
6770195 0
6- 0 677-"6095026.96
720 60#
4#6
596704/02-5-"
- 0 4 $!9 -594!09!0>3;?0-
605 607- 60-705 4760
267
9:6209!0@6 594!0A2B20
CDEFGHIJKHHLMNJGDNKMOP
;!04
26
0540$7605 6075
6- 0#
454 4.405140#
4 677670 $750/9
750675-:.97 0-0 4!!6 594!0:65166!05 69
0#-9
04/0
74 165720 60-

-!"6 6!50970-0-70 65
9 0:6 -$7604!604/05 6074 1657019..0:60.9756!9!"0/4
0-0
63$6750/4
0
4!!6 594!0-!205 6045 6
019..0:60-719!"0/4
0-0 4!!6 594!20Q! 60-0#-9
04/074 1650 -70:66!0 4!!6 562405 600 -00
:60$7620/4
05
-!7 9559!"02-5-09!0:45 04
0695 6
029
6 594!20 -5097205 600:6 -60.916075
6- 709!05 -50-!00--9.-:.60
2-5-0970
6-209 629-56.00 05 607- 604
26
0-709501-701
9556!0-!205 6
60970!409!29 -594!04/05 60:4$!2-
004/05 60
677-"6720R4166
05 6
60970-0:4$!26203$6$60-505 60
6 699!"074 1650-!205 60
6 696
0:.4 1709/05 603$6$60970
6 #50S05 6076!26
0:.4 1709/0950970/$..20T9"$
60A2AU09..$75
-567075
6- 0 4 $!9 -594!409!01 9 05 60265-9.704/05 60
-
"$ 6!570-
6079 #.9/962S095024670!4507 4105 6076
6
0 .479!"05 6074 16504!01 9 0950.9756!72034
-..00-076
6
0
14$.20/9
750.9756!0-!20- 6#50-0 4!!6 594!0-!205 6!0/4
10-0!610#
4 6770540 4 $!9 -560195 05 60 .96!520
86-!1 9.64095019..0 4!59!$60540.9756!09!05 604
9"9!-.0#
4 67720 60#
4#6
596704/075
6- 0 4 $!9 -594!09!0
>3;?0-
605 607- 60-705 4760267
9:6209!0@6 594!0A2B20
0
VW@6
6
04
0.9756!9!"0#
4 6770/9
750$76705 606*'X&9,4#6
-594!0540
6-560-075
6- 074 1650-!205 60YZ78,4#6
-594!0
540:9!20957074 16505405 6076
6
7=074 1650-22
67720 6076 4!20-
"$ 6!505405 6074 165070756 0 -..0970"96!0-70
@Q5[\@]^_8405409!29 -5605 -5075
6- 0 4 $!9 -594!0970
63$9
6220;/05 605 9
20-
"$ 6!50970.6/50-70
`6
4405 605ab;a0#
454 4.019..0:6076.6 5620-$54 -59 -..020;50$76705 60cZ69&7,4#6
-594!0540.9756!04!09570
74 1650/4
0 .96!50
63$67570/4
0 4!!6 594!720 6076 4!20-
"$ 6!505405 60cZ69&7,70756 0 -..07#6 9/96705 60
-d9 $ 0!$ :6
04/0
63$67570/4
0 4!!6 594!705 -50 -!0:603$6$620-505 97074 16520
VW 6076
6
0$7670- 6#5070756 0 -..0540- 6#50-0 4!!6 594!0
63$675620:00-0 .96!50-!204:5-9!0-0!610
74 1650/4
0 4 $!9 -594!0195 05 -50 .96!520 604
9"9!-.074 1650 -00759..0:60$7620540- 6#50/$
5 6
0
4!!6 594!70195 045 6
0 .96!5720
VW 60 .96!50#
4 6770$76705 606*'X&9,4#6
-594!0540
6-560-075
6- 074 1650-!205 6!0$76705 60 4!!6 5070756 0 -..0
540
63$6750-0 4!!6 594!09-05 6074 1650-22
67704/05 60.9756!9!"0#
4 67720_705 60 4!!6 50 -..0-$54 -59 -..00:9!270
-074 1650!- 605405 60 -..6
7=074 1650#
94
0:9!29!"0970$!!6 677-
020

00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011123456789
92 4 0
0

Vous aimerez peut-être aussi