<<ISA_Array_Capacity_Planning.xls.txt>> Sometimes a jewel shines in the NG... ------------------------------------------------------- Jim Harrison MCP(NT4, W2K), A+, Network+, PCG http://isaserver.org/Jim_Harrison/ http://isatools.org Read the help / books / articles! ------------------------------------------------------- "Jason Fossen [ISA MVP]" <--@xxxxxx> wrote in message news:<eWkBmmZhGHA.3916@xxxxxxxxxxxxxxxxxxxx>... Hello Gang: Attached is a BETA version of a spreadsheet to calculate how many Enterprise Edition nodes in an array would be required for a given peak throughput, broken down by traffic type and GHz speed of CPUs. (Just remove the ".txt" extra extension.) The spreadsheet is based on the scaling numbers provided in Microsoft's article, "Best Practices for Performance in ISA Server 2004" (http://www.microsoft.com/technet/prodtechnol/isa/2004/plan/bestpractices.mspx), but you can plug in your own throughput requirements. What I hope is that some ISA admins/experts here will look at the spreadsheet, plug in the data from their live ISA array, and compare the recommendations from the spreadsheet against their actual array's performance. Feedback doesn't have to detailed, even a quick "looks about right compared to our array and traffic" would be great! Or if you have Performance Monitor log data from a high-end ISA box that is operating near its max capacity, along with info about the traffic going through it, I could use that to validate the spreadsheet too (about two hour's worth of data during busy hours, sampled once every two minutes, for all the Processor, Memory, Web Proxy, Firewall Packet Engine, PhysicalDisk and Network Interface counters please). When it's all done, I would be happy to give you credit in the spreadsheet for your time (if you wish) and then I will post the spreadsheet on http://www.ISAscripts.org for anyone to download. Send me e-mail if you want your feedback or PerfMon log data to be private: jason (at-symbol) isascripts dot org. Thank You! Jason Fossen ISA Server MVP All mail to and from this domain is GFI-scanned.
ÐÏࡱá>þÿ JþÿÿÿþÿÿÿIÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ LÍÉÀá°Áâ\pJF B°aÀ=?¯¼=?P¸3(#8X@?"·Ú1Èÿ?sArial1Èÿ?sArial1Èÿ?sArial1Èÿ?sArial1Èÿ¼sArial1 ÿ?sArial1È7?sArial1Üÿ¼sArial1ܼsArial1È8¼sArial1È8¼sArial1È?sArial1ðÿ¼sArial"$"#,##0_);\("$"#,##0\)!"$"#,##0_);[Red]\("$"#,##0\)""$"#,##0.00_);\("$"#,##0.00\)'""$"#,##0.00_);[Red]\("$"#,##0.00\)7*2_("$"* #,##0_);_("$"* \(#,##0\);_("$"* "-"_);_(@_).))_(* #,##0_);_(* \(#,##0\);_(* "-"_);_(@_)?,:_("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_)6+1_(* #,##0.00_);_(* \(#,##0.00\);_(* "-"??_);_(@_)¤"Yes";"Yes";"No"¥"True";"True";"False"¦"On";"On";"Off"]§,[$¬ -2]\ #,##0.00_);[Red]\([$¬ -2]\ #,##0.00\)àõÿ À àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ àõÿ ôÀ à À à+õÿ øÀ à)õÿ øÀ à,õÿ øÀ à*õÿ øÀ à õÿ øÀ à À à À à A @+ à @ à @* à @) à D) à#P* à!P+ à H à @À à DÀ à P à+!X à @ à H à H à H* à @7 à H à H ??ÿ??ÿ??ÿ??ÿ??ÿ??ÿ`?®1-ReadMe? k2-Follow The Green Steps?±k3-Notes?®(ExternalData_1; !ÁÁ"¾ëZðRð3ð¿?AÀ@@ñ ÷üfT5ScenarioTransparent Web ProxyForward Web ProxyStateful filteringSSL-to-HTTP: OWASSL-to-HTTP: WebSSL-to-HTTP: RPC over HTTPSSL-to-SSL: OWASSL-to-SSL: RPC over HTTPSSL-to-SSL: Web SSL Tunneling#Web Filter Enabled: L2TP over IPsecWeb Filter Enabled: PPTP$Web Filter Disabled: L2TP over IPsecWeb Filter Disabled: PPTP=Megacycles per Megabit of Throughput (Decompressed, for VPNs)MSDE logging is used. #No Web authentication is performed.2HTTP Web filter is enabled with default settings. 5ISA Server is loaded with characteristic Web traffic.YISA Server hardware is tuned as described in Tuning Hardware for Maximum CPU Utilization VAll numbers for VPN megacycles are per deencapsulated and decompressed tunnel traffic.Dual Xeon CPUsSingle Pentium 4 CPU NLB Nodes Additional NLB Overhead Factor =No NLBTraffic To HandleBroken Down By PercentageJAdditional Load Factor For Given Number of Nodes (Assume 1.75 Load Factor)Minimum GHz per CPU per Node =Minimum GHZ per CPU per Node =First:Second:Third:0Web Filter Enabled: Site-to-Site IPsec Tunneling%Web Filter Enabled: Site-to-Site PPTP1Web Filter Disabled: Site-to-Site L2TP over IPsec&Web Filter Disabled: Site-to-Site PPTP1Web Filter Disabled: Site-to-Site IPsec TunnelingStateful Filtering Megacycles/Mb1Megacycles/Mb of througput assumes the following:3Go to the correct table below (see red highlights).Traffic To Handle,KNote that it assumes 100% CPU utilization, so round up and plan for growth!SFourth: Read the minimum GHz speed of each CPU in each node to handle that traffic. Version = 1.00Enter the peak Mb/s of traffic to be supported =0Are you using single-P4 or dual-Xeon mainboards?bMaximum number of nodes is 8 in the tables because that is what Microsoft's whitepaper recommends.NOTESÿ:õ ? ?¯! 8ù îp?ccò LÍÉÀj¾ dü©ñÒMbP?_*+??%ú?Á??¡"úà?à?U} º#úý %0$×,ìÂðÂððªð( ð ððr¢ ð ?ð0?@ ??¿ ?A¿À@ÿð × 4?ð]`@ ïì ð¶ý`<þThis spreadsheet is intended to help predict how many ISA Server 2004/2006 Enterprise Edition nodes in an array would be required to handle a user-defined assortment of traffic types. The scaling factors and other weighting data were drawn from Microsoft's whitepaper entitled, "Best Practices for Performance in ISA Server 2004", last seen at http://www.microsoft.com/technet/prodtechnol/isa/2004/plan/bestpractices.mspx As in the above whitepaper, only single-P4 and dual-Xeon hardware configurations are considered in the spreadsheet; dual-core CPUs are not (yet) accounted for, so it's probably best to interpolate the results for dual-core CPUs as being half-way between the single-P4 and dual-Xeon configurations in the spreadsheet (or less than half, if you want to be on the safe side). To use this spreadsheet, go to tab #2 and follow the instructions in the boxes highlighted in green: 1) Enter the peak bandwidth in megabits per second that must be handled by the array. 2) Choose between the single-P4 or dual-Xeon tables, as your hardware dictates. 3) Edit the yellow cells to indicate the percentage of your traffic that will be of the specified types; for example, your total expected throughput might be 90Mb/s, of which 60% is for forward web proxying, 20% is for transparent forward proxying, 15% for outbound SSL tunneling, and 5% for inbound OWA with SSL-to-HTTP bridging. Each of these traffic types has a different CPU utilization rate (measured in millions of CPU processor cycles per megabit of that type of traffic). 4) In the lightblue cells, read the minimum GHz speed of each CPU for the indicated number of nodes (in that column) that is required to handle that traffic breakdown. These GHz speeds are for 100% CPU utilization, so you must round up at least to the next higher GHz speed when you actually purchase the hardware or, even better, add an additional node and get a higher GHz speed too. It's better to be pessimistic, and don't forget to plan for future growth. DISCLAIMER: This spreadsheet is provided "AS IS" without warranties or guarantees of any kind. USE AT YOUR OWN RISK. This spreadsheet is not endorsed by Microsoft and may contain bugs or errors in data or formulas. This spreadsheet is provided for informational purposes only. <`Ó·\íJ)¤| :??¬&â í< ûý>¶@ï7 LÍÉÀEE!'Bpgj dü©ñÒMbP?_*+??%ú?Á??MHP LaserJet 6L on LPT1Ü4Cï?ê odXXLetterÿÿÿÿDINU"4ò°`f¡"dXXà?à?U} ?}Ñ}.)}Ñ} º}º }. ?Column DXE 6 ú 6 ú ú 6 ú ú ú ú ú ú ú ú ú ú ú ú ú ú ú ú ú ú ú úý &!ý 1~ ?V@ý &"ý 2ý ,ý !¾ ~ "À\@ý &# 'ý '¾ ''''''ý ý -}?5^ºIò?-²?ï§Æó?L7?A`åô? +?ÙÎõ? d;ßO??ö?~ 0b@ÙÎ÷Sã÷?ý ý ý ý '¾''''''ý ý *ý ½6 ð?'@'@'@'@'@'@' @ý ½ @ ÿ¼!LþÀDLÿÀ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½>@.@Py@ ÿ(!°rhÑ¢?@ÿD?DD(t?Vý?@ÿD?DD(-²?ï'?@ÿD?DD( ?5^º?Ö?@ ÿD?D D( '1¬??@ ÿD?D D(GázT-?@ÿD?DD(»I ëº?@ÿD?DDý ½?B@N@8?@ ÿ(ä??Í??¤@ ÿD?DD(uOê/¦@ ÿD?DD(&Â?§?q§@ ÿD?DD( Vì/»?w¨@ ÿD?D D( 8ÖÅm´X©@ ÿD?D D(ßO??Nª@ ÿD?DD(UÁ¨¤î̪@ ÿD?DDý '½?E@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý (½?E@ ÿ("ÿD?DD("ÿD?DD("ÿD?DD( " ÿD?D D( " ÿD?D D("ÿD?DD(" ÿD?DDý &½I@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½@Q@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½?R@4@Ð?@ ÿ(?ZÓ¼c[?@ÿD?DD(H¿}8??@ÿD?DD(Þ ?B?@ÿD?DD( äòÒ¯O @ ÿD?D D( %ä??Íå @ ÿD?D D(@5^º?i¡@ÿD?DD( 9ÖÅmôÝ¡@ÿD?DDý ½ÀR@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½@S@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½T@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½ÀT@ ÿ(!ÿD?DD(!ÿD?DD(!ÿD?DD( ! ÿD?D D( ! ÿD?D D(!ÿD?DD( !ÿD?DDý ½ÀV@@?y@ ÿ(N@a#Ò?@ÿD?DD(±.n£?0?@ÿD?DD(9EGr98?@ÿD?DD( eâX÷?@ ÿD?D D( öuà??Ç?@ ÿD?D D(Ôxé&?i?@ÿD?DD( ò°Pkºø?@ÿD?DDý ½X@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý %½@\@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½^@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý $½@_@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½?`@ ÿ(ÿD?DD(ÿD?DD(ÿD?DD( ÿD?D D( ÿD?D D(ÿD?DD( ÿD?DDý ½ Àj@ ÿ( ÿD ?DD( ÿD ?DD( ÿD ?DD( ÿD ?D D( ÿD ?D D( ÿD ?DD( ÿD ?DD×>G 0,< Nd?wwwwwwwwwwwwwwwww! ú" ú# ú?$ 6% ú& ú?' ú?) 6* + , ú- ú. ú/ ú0 ú1 ú2 ú3 ú4 ú5 ú6 ú7 ú8 ú9 ú: ú; ú< ú= ú> ú? ú@ úý !½!@o@!! ÿ(!ÿD!?DD(!ÿD!?DD(!ÿD!?DD(! ÿD!?D D(! ÿD!?D D(!ÿD!?DD(! ÿD!?DDý " "2"?ÙÎ÷?@A ÿ%!ÀÀ?è2"Ù3:Ö{Ê@"ÿ%!ÀÀ?è2"³D +kÿ?ÿ%!ÀÀ?è2"Î?`úæø?ÿ%!ÀÀ?è2" ¢úÿÄÉô?ÿ%! À À?è2" Û>? <òñ? ÿ%! À À?è2"Á>¼ë³ï? ÿ%!ÀÀ?è2";¯L®vì?ÿ%!À ÀÙ?è¾# ý $&/¾$ ý %.¾% ý )&#)'ý )'¾)''''''ý *ý ***}?5^ºIò?*-²?ï§Æó?*L7?A`åô?* +?ÙÎõ?* d;ßO??ö?~ *0b@*ÙÎ÷Sã÷?ý +ý +ý +ý +'¾+''''''ý ,ý ,*ý ,½6,ð?'@'@'@'@'@'@' @ý -)½-$@-- ÿ-¼-@LþÀDLÿÀ(-9ÿD-?D*D(-9ÿD-ÀD*D(-9ÿD-ÀD*D(- 9 ÿD-ÀD* D(- 9 ÿD-ÀD* D(-9ÿD-ÀD*D(- 9ÿD-ÀD*Dý . ½.?A@.@.?}@. ÿ-(.Ð"Ûù?h?@?ÿD.?D*D(.¬Zäü?@?ÿD.ÀD*D(.ßO??.-?@?ÿD.ÀD*D(. u?ö$?@? ÿD.ÀD* D(. W9´Èöù?@? ÿD.ÀD* D(.ö(\?â´?@?ÿD.ÀD*D(. V-Z?@?ÿD.ÀD*Dý /½/?E@N@/$¢@/ þ-(/§èHNا@-ÿD/?D*D(/Á9#JûÈ©@-ÿD/ÀD*D(/üs×Ò>«@-ÿD/ÀD*D(/ üöuà<o¬@- ÿD/ÀD* D(/ Ù¬ú\ít@- ÿD/ÀD* D(/?Ä °?Z®@-ÿD/ÀD*D(/ Fx?%¯@-ÿD/ÀD*Dý 0(½0J@00 ÿ-(03ÿD0?D*D(03ÿD0ÀD*D(03ÿD0ÀD*D(0 3 ÿD0ÀD* D(0 3 ÿD0ÀD* D(03ÿD0ÀD*D(0 3ÿD0ÀD*Dý 1'½1L@11 ÿ-(10ÿD1?D*D(10ÿD1ÀD*D(10ÿD1ÀD*D(1 0 ÿD1ÀD* D(1 0 ÿD1ÀD* D(10ÿD1ÀD*D(1 0ÿD1ÀD*Dý 2&½2?O@22 ÿ-(21ÿD2?D*D(21ÿD2ÀD*D(21ÿD2ÀD*D(2 1 ÿD2ÀD* D(2 1 ÿD2ÀD* D(21ÿD2ÀD*D(2 1ÿD2ÀD*Dý 3½3?U@4@30?@3 ÿ-(3ÒÞàË?@ÿD3?D*D(3?&Â?§0¡@/ÿD3ÀD*D(3ýe÷äá)¢@/ÿD3ÀD*D(3 ¨¤N@Óô¢@/ÿD3ÀD* D(3 æ§èH££@/ ÿD3ÀD* D(3?ÀÊa<¤@/ ÿD3ÀD*D(3Ú¬ú\ä@/ÿD3ÀD*Dý 4½4ÀV@44 ÿ-(4;ÿD4?D*D(4;ÿD4ÀD*D(4;ÿD4ÀD*D(4 ; ÿD4ÀD* D(4 ; ÿD4ÀD* D(4;ÿD4ÀD*D(4 ;ÿD4ÀD*Dý 5½5Z@55 ÿ-(54ÿD5?D*D(54ÿD5ÀD*D(54ÿD5ÀD*D(5 4 ÿD5ÀD* D(5 4 ÿD5ÀD* D(54ÿD5ÀD*D(5 4ÿD5ÀD*Dý 6½6Z@66 ÿ-(6.ÿD6?D*D(6.ÿD6ÀD*D(6.ÿD6ÀD*D(6 . ÿD6ÀD* D(6 . ÿD6ÀD* D(6.ÿD6ÀD*D(6 .ÿD6ÀD*Dý 7½7?]@77 ÿ-(7>ÿD7?D*D(7>ÿD7ÀD*D(7>ÿD7ÀD*D(7 > ÿD7ÀD* D(7 > ÿD7ÀD* D(7>ÿD7ÀD*D(7 >ÿD7ÀD*Dý 8 ½8^@88 ÿ-(86ÿD8?D*D(86ÿD8ÀD*D(86ÿD8ÀD*D(8 6 ÿD8ÀD* D(8 6 ÿD8ÀD* D(86ÿD8ÀD*D(8 6ÿD8ÀD*Dý 9½9`@@9?@9 ÿ-(9ðHPü¨?@5ÿD9?D*D(9??ͪÏ??@5ÿD9ÀD*D(9ñ?ÉTÁ?@5ÿD9ÀD*D(9 ÖòAÏ6?@5 ÿD9ÀD* D(9 h"lx:?@5 ÿD9ÀD* D(9t?V?@5ÿD9ÀD*D(9 ?3¢´ç?@5ÿD9ÀD*Dý : ½:`@:: ÿ-(:7ÿD:?D*D(:7ÿD:ÀD*D(:7ÿD:ÀD*D(: 7 ÿD:ÀD* D(: 7 ÿD:ÀD* D(:7ÿD:ÀD*D(: 7ÿD:ÀD*Dý ;½;Àa@;; ÿ-(;8ÿD;?D*D(;8ÿD;ÀD*D(;8ÿD;ÀD*D(; 8 ÿD;ÀD* D(; 8 ÿD;ÀD* D(;8ÿD;ÀD*D(; 8ÿD;ÀD*Dý <%½< b@<< ÿ-(<=ÿD<?D*D(<=ÿD<ÀD*D(<=ÿD<ÀD*D(< = ÿD<ÀD* D(< = ÿD<ÀD* D(<=ÿD<ÀD*D(< =ÿD<ÀD*Dý =$½=Àb@== ÿ-(=2ÿD=?D*D(=2ÿD=ÀD*D(=2ÿD=ÀD*D(= 2 ÿD=ÀD* D(= 2 ÿD=ÀD* D(=2ÿD=ÀD*D(= 2ÿD=ÀD*Dý >½>àd@>> ÿ-(><ÿD>?D*D(><ÿD>ÀD*D(><ÿD>ÀD*D(> < ÿD>ÀD* D(> < ÿD>ÀD* D(><ÿD>ÀD*D(> <ÿD>ÀD*Dý ?½?v@?? ÿ-(?@ÿD??D*D(?@ÿD?ÀD*D(?@ÿD?ÀD*D(? @ ÿD?ÀD* D(? @ ÿD?ÀD* D(?@ÿD?ÀD*D(? @ÿD?ÀD*Dý @½@°x@@@ ÿ-(@:ÿD@?D*D(@:ÿD@ÀD*D(@:ÿD@ÀD*D(@ : ÿD@ÀD* D(@ : ÿD@ÀD* D(@:ÿD@ÀD*D(@ :ÿD@ÀD* D×B%XwÈ$$< Nd?wwwwwwwwwwwwwwwwwwA úC 6D úý AA2A??C?¬@tE&ý%-@ÀÀøÔè2AÔÚIÜù?Aÿ%-@ÀÀè2A¢T ¡¤ò?Aÿ%-@ÀÀ?è2AÇÂÆ«b?í?Aÿ%-@ÀÀ?è2A %¾Eí?«è?Aÿ%-@ À À?è2A áB :Lå?A ÿ%-@ À À?è2A_ItÓ§Ïâ?A ÿ%-@ÀÀ?è2A?? B¿ãà?Aÿ%-@À À?èý C&/¾C ý D.¾D × L(È$>¶@ #ExternalData_1-Ü DÍÜÙfile:///C:/Data/SANS/Day%207%20--%20SEC520%20--%20ISA_Server/www.microsoft.com/Best%20Practices%20for%20Performance%20in%20ISA%20Server%202004%20Microsoft%20Internet%20Security%20and%20Acceleration%20Server%202004.htm#ExternalData_10-#"EZBAA"ï7 LÍÉÀ?o q dü©ñÒMbP?_*+??%ú?Á??MHP LaserJet 6L on LPT1Ü4Cï?ê odXXLetterÿÿÿÿDINU"4ò°`f¡"dXXà?à?U} º}º#}L#} º#?úúúúúú úý )4ý (+ý #ý #ý #ý #ý #ý #ý #3×2 >¶@ï7 þÿà??òùOh«?+'³Ù0?@HT` x ??äJFJFMicrosoft Excel@?³ÊrÆ@?*a£??ÆþÿÕÍÕ?.??+,ù®0@ PXlt|?? ?äCamp Wisdom¨ 1-ReadMe2-Follow The Green Steps3-Notes*'2-Follow The Green Steps'!ExternalData_1Worksheets Named Ranges !"#$%&'()*+,-./012345678þÿÿÿ:;<=>?@þÿÿÿBCDEFGHþÿÿÿýÿÿÿþÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿRoot Entryÿÿÿÿÿÿÿÿ ÀF ·É¦??ÆþÿÿÿWorkbookÿÿÿÿÿÿÿÿÿÿÿÿ^qSummaryInformation(ÿÿÿÿ9DocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿA