|Introduction|Terms|A-E|F-K|L-P|Q-T|U-Z|$|1|2|2.1|2.2|2.3|2.4|2.5|
|Introduction|Scope|Target Audience|List of FOSS Products|Free Open Source Software Credits and Copyrights|License Information and License Texts|GNU Lesser General Public License, version 2.1 (LGPL-2.1)|GNU General Public License, version 2|GNU GENERAL PUBLIC LICENSE, version 3|MIT License|MIT X License|PyCrypto License|GNU Lesser General Public License, version 3|Boost Software License 1.0|FreeBSD|BSD|OpenLDAP|Apache License|Free Open Source Software Source Code|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|3|
|Trademarks Used in Library|$|1|
|Introduction|Compute Requirements|Network Requirements|Storage Requirements|Security Requirements|$|1|2|3|4|5|
|About This Document|Deployment|Software Delivery Package|Deployment Preparations for the Cloud Administrator|Prepare and Configure Cloud Hardware and Software|Compute Hosts|Compute Hosts|Compute Hosts|Configure Project and Users|Create Flavor|Configure Heat Stack Domain Users|Deployment for the End User|Set Up Command-Line Access and Security|Set Up Access and Security for Instances|Create Subnets|Image|Prepare Initial Configuration Data (Optional)|Prepare Deployment Parameters|with One VM|Scale Out to Full VNF Size|Status|$|1|4|4.1|5|5.1|5.1.2|5.1.3|5.1.4|5.1.6|5.2|5.3|6|6.1|6.1.2|6.2|6.3|6.4|6.5|6.6|6.7|6.8|
|Introduction|Configure SSL Connection|Enable the Customer Security Layer|Disable the Customer Security Layer|Update SSL Certificates|Configure the NeLS Connection|$|1|2|2.1|2.2|2.3|3|
|Function Overview|Architecture|Audio Conferencing|Audio Announcements|Detection of Dual Tone Multi Frequency (DTMF) Tones|Forwarding of DTMF Tones through Audio Conference|Playing Tones|Emergency and Priority Call Handling|Shared Storage|Media Stream Processing Services|Adaptive Multi-Rate (AMR) Speech Coder Service|Adaptive Multi-Rate Wideband (AMR-WB) Speech Coder Service|Announcement Service|Audio Mixing Service|DTMF Receiver Service (DTMF-R)|DTMF Sender Service (DTMF-S)|G.722 Service (G.722)|G.729 Service (G.729)|Jitter Handling Service|Pulse Code Modulation Service (PCM)|Tone Sender Service|User Plane Frame Handler Service (UP FH)|$|1|1.1|2|3|4|5|6|7|9|10|10.1|10.2|10.3|10.4|10.5|10.6|10.7|10.8|10.9|10.10|10.12|10.13|
|Introduction|Related Information|Key Features of ECLI|Prerequisites|ECLI Concepts|ECLI Modes|ECLI Session|ECLI Transaction|ECLI Position|ECLI Prompt|ECLI Help|Auto-Completion|Case Correction|Escaping of Special Characters|Visibility Levels|Automatic Correction of ManagedElement ID|Limitations|ECLI Commands|Summary of ECLI Commands|Success and Error Indications|Display Information|Change and Display the Position in MO Tree|Display MO Instances|Change MO Attributes|Create MO|Reset MO|Delete MO|MO Actions|Copy and Paste Configuration Data|Change Password Command|Display ECLI Version|Pipe Utility Commands|Deprecated Actions|Deprecated Options|ECLI Commands Limitations|Terminal Properties|Terminal Types|Default Key Bindings|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|4|4.1|4.2|
|Introduction|Event Description|Information|Usage|Configuration|Subscription|$|1|2|2.1|2.2|2.3|2.4|
|$|
|Introduction|Related Information|Key Features of ECLI|ECLI Modes|Start an ECLI Session|Use ECLI Online Features|Static Help|Information Model Help|Context-Sensitive Help|Auto-Completion|Navigate in MIB|Display ME Status|Change ME Configuration|Execute MO Actions|$|1|1.1|1.2|2|3|4|4.1|4.2|4.3|4.4|5|6|7|8|
|Introduction|Functions and Concepts|Modes of Operation|Autonomous Mode|Emergency Unlock Mode|Integration Unlock|Locked Mode|Normal Mode|LM Managed Object Model|Configuration Management|Fault Management|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|3|4|5|
|Introduction|CPI Library Types|Document Formats|Active Library Explorer Variants|Active Library Explorer Functions|Active Library Explorer Window|Frames|Library Collections|Active Library Explorer Toolbar|Context Menu|Basic Functions|Back and Forward|Search|Navigation|Library Front Page Images|Filter Displayed Contents|Add Bookmarks|Copy Links to Clipboard|Create and Display Annotations|Provide Feedback|Print|Save Document to Local Disk|View PDF Version of Current Document|Open a Document in Separate Window|Get Help|Find Active Library Explorer Version|Active Library Explorer Server|Active Library Explorer for Windows|Download Latest Active Library Explorer Version|Access Active Library Explorer Libraries Using URL Hyperlinks|General|Open Libraries|Search for Documents|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|
|$|
|$|
|Overview|Compute Resource Threshold Value Exceeded Alarm Description|$|1|1.1|
|Introduction|Functions and Concepts|NBI User Authentication|NBI User Authorization|Transport Layer Security|Types of Operation|Managed Object Model|Rules for Default Roles|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|3|3.1|4|
|Introduction|Command Access Restriction|mrf_appl Commands|announcement-counters|announcement-status|h248-counters|h248interface-counters|compute-resource|context-info|sctp-pm-counters|sctp-status|service-pm-counters|status|internals|overload-control|ipp Commands|ipp ping|ipp conf|ipp debug-counters|ipp pm-counters|ipp discard-counters|ipp error-counters|ipp signal-counters|ipp ethdev-counters|ipp dpdk-counters|ipp internals|Utility Scripts|_cluster_status.py|verify_vmrf_node_status.py|collectData.py|mrf_export_conf.py|mrf_import_conf.py|Linux Commands|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|5|5.1|5.2|5.3|5.4|5.5|6|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Description of Changes|New and Changed Documents|Library Overview|Product Overview|Planning|Installation|Initial Configuration|Operation and Maintenance|Emergency|Interface|Removed Documents|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.1.7|2.1.8|2.2|
|Introduction|Purpose|General Impact|From vMRF 1.0 to vMRF 1.1|Impact on vMRF Features|Impact on vMRF Features from vMRF 1.0 to vMRF 1.1|$|1|1.1|2|2.1|3|3.1|
|Overview|Service Level Agreement Violation Alarm Description|Cease the Service Level Agreement Violation Alarm|$|1|1.1|2|
|Media Stream Recording|$|1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|$|1|
|Introduction|Prerequisites|Tools|Conditions|System Overview|Hardening before Installation|Hardening during Installation|Product Security Maintenance|$|1|1.1|1.1.1|1.1.2|2|3.1|3.2|4|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|License Management, Emergency Unlock Reset Key Required Alarm Description|Procedure|Prerequisites|Documents|Conditions|Cease the License Management, Emergency Unlock Reset Key Required Alarm|$|1|1.1|2|2.1|2.1.1|2.1.2|2.2|
|Automatic Backup and Restore|Manual Backup and Restore|When to Make a Backup|Backup Procedure|When to Restore|Restore Procedure|Restore During Deployment|Restore After Deployment|Post-restore Checks|$|1|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.4.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|Correct NeLS Configuration Issues|SSL Certificate Issues|Correct Issues When the Customer Security Layer is Disabled|Correct Issues with the Customer Security Layer|$|1|2|2.1|2.2|2.3|3|3.1|3.2|3.2.1|3.2.2|
|Introduction|Functions and Concepts|Traffic Separation|O&amp;M Traffic Protection|O&amp;M Administrator Access Control|Idle Session Time-out|Brute-Force Attack Protection|Security Configuration|O&amp;M Administrator Access Control|Recommended Periodic Operations|Handling of Patches|$|1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Procedure|$|1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Documents|Conditions|Tools|Check Cloud Environment|Instance|Check IP Configuration in the Active SC VM|Verify VNF Status|Recover the VNF by Deploying a New Instance|Problem Solved|Contact Cloud Administrator|Consult Next Level of Support|$|1|1.1|1.1.1|1.1.2|1.1.3|2.1|2.2|2.3|2.4|2.5|3.1|3.2|3.3|
|Overview|MRF Next Hop Router Unreachable Alarm Description|Cease the MRF Next Hop Router Unreachable Alarm|$|1|1.1|2|
|Overview|Procedure|Analyzing the Alarm|Clear an Alarm when SCTP Association Is Down|Clear an Alarm when Protocol Negotiation Failed|$|1|2|2.1|2.2|2.4|
|Introduction|LDAP Client|LDAP Transport Layer Security|LDAP Schemas|Standard Schema|Extended POSIX Account Schema|Ericsson Role Aliases Schema|LDAP Account Management|Extended POSIX Account Management|LDAP Lookup Behavior|LDAP Authentication Behavior|LDAP Authorization Behavior|LDAP Referral Chase|LDAP Object Classes and Attribute Types|$|1|2|2.1|3|3.1|3.2|3.3|4|4.1|5|5.1|5.2|5.3|6|
|Introduction|Scope|KPIs and PIs for Accessibility|Session Setup Success Ratio KPI|KPIs and PIs for Retainability|Session Completion Ratio KPI|CPU Steal Time PI|Allocated Memory PI|Swap Memory PI|Allocated Disk PI|$|1|1.1|3.1|3.1.1|3.2|3.2.1|4.1|4.2|4.3|4.4|
|Introduction|Target Groups|Managed Object Model|MOM Concepts|MOM Overview|MIB|Managed Objects|Managed Object Creation and Deletion|Managed Object Naming|Setting Attributes|Attribute Data Types|Calling Actions|Relationships between Managed Objects|Model Element Life Cycle|Presentation of MOM|Classes|Attribute Properties|Common Attributes|Deprecated Elements in MOM|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|4.1|4.2|4.3|4.4|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Measurement Report File|File Location|Filename Format|Time Format|File Format|Supported XML Elements and Attributes|Example File|Example File in UTC Format|$|1|2|2.1|2.2|2.3|2.4|3|4|5|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|About This Document|Deployment|Software Delivery Package|Deployment Preparations for the Cloud Administrator|Prepare and Configure Cloud Hardware and Software|Availability Zone|Compute Hosts|Compute Hosts|Compute Hosts|Configure Project and Users|Create Flavor|Deployment for the End User|Set Up Command-Line Access and Security|Set Up Access and Security for Instances|Create Subnets|Image|Prepare Initial Configuration Data (Optional)|Prepare Deployment Parameters|with One VM|Scale Out to Full VNF Size|Status|$|1|4|4.1|5|5.1|5.1.2|5.1.3|5.1.4|5.1.5|5.1.7|5.2|6|6.1|6.1.2|6.2|6.3|6.4|6.5|6.6|6.7|6.8|
|Overview|Procedure|$|1|2|
|Introduction|Related Information|Key Features of Ericsson NETCONF Interface|Prerequisites|NETCONF Session|Start a NETCONF Session over SSH|Start a NETCONF Session over TLS|Session Inactivity Timer|Session End|NETCONF RPC Messages|Message &lt;hello&gt;|Message &lt;ok&gt;|Error Messages|NETCONF Data Model|Model Definition|Namespaces|Configuration and State Data|Distinguished Names|MO Attributes|MO Instances|MO Actions|NETCONF Operations|Operation &lt;get&gt;|Operation &lt;get-config&gt;|Operation &lt;edit&ndash;config&gt;|Operation &lt;action&gt;|Operation &lt;create-subscription&gt;|Operation &lt;close-session&gt;|Operation &lt;kill-session&gt;|Operation &lt;copy-config&gt;|Operation &lt;delete-config&gt;|NETCONF Notifications|Notification &lt;replayComplete&gt;|Notification &lt;notificationComplete&gt;|Non-Standard Notifications|NETCONF Validation|Create MO Instance|Delete MO Instance|Change Single-Valued Attributes|Delete MO Attribute Values|Change Sequence Attributes|Change Struct Attributes|System-Created Property|NETCONF Visibility Control|NETCONF Transaction|Transaction Start|Locking|Transaction Commit|Abort|Transaction Time-Out|NETCONF Capability &lt;action&gt;|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|NETCONF Capability &lt;notification&gt;|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|New Notifications|XML Schema|RFC Compliance Latest|NETCONF Statement of Compliance|NETCONF Capabilities|NETCONF Compliance to RFC 4741 and RFC 6241|NETCONF Compliance to RFC 4742 and RFC 6242|NETCONF Compliance to RFC 5277|NETCONF Compliance to RFC 5539|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|6.1|6.2|6.3|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|11.3|11.4|11.5|11.6|11.7|12|13|13.1|13.2|13.3|13.4|13.5|
|Introduction|Functions and Concepts|Types of Operation|Ericsson Definition of 3GPP Perceived Severity Values|Managed Object Model|Managed Object Model &ndash; SNMP|Managed Object Model &ndash; Fault Management|Configuration Management|Fault Management|File Management|$|1|2|2.1|2.2|3|3.1|3.2|4|5|6|
|$|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|License Management, Autonomous Mode Activated Alarm Description|Procedure|Prerequisites|Documents|Conditions|Cease the License Management, Autonomous Mode Activated Alarm|Correct NeLS Configuration Issues|SSL Certificate Issues|Correct Issues When the Customer Security Layer is Disabled|Correct Issues with the Customer Security Layer|$|1|1.1|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.2.2.1|2.2.2.2|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Events|Information|COM SA, CLM Cluster Node Unavailable|Information|COM SA, AMF SI Unassigned|Information|$|1|1.1.1|1.2|1.2.1|1.3|1.3.1|
|Emergency and Priority Call Handling|Configuration of Priority Pool|Manual Scaling|Manual Scaling in OpenStack|Scale-out Procedure|Scale-in Procedure|Announcement Configuration|Announcement Storage|Announcement Storage Server|Local Storage|Basic Announcements|Create a Basic Announcement|Variable Announcements|Logic File Type Examples|Lua Restrictions in Variable Logic Definition|Logic File Validator Tool|Check Logic File Syntax|Verify Logic File Behavior|Create a Variable Announcement|Handling of Announcement Files|Convert Existing Audio Files to vMRF Supported Format|Modify the Default Language Code|Configuration Export and Import|Configuration Export|Configuration Import|$|1|1.1|2|2.1|2.1.1|2.1.2|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.3|4.3.1|4.3.2.1|4.3.3|4.3.3.1|4.3.3.2|4.3.4|4.4|4.5|4.6|5|5.1|5.2|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Troubleshooting|$|1|2|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Introduction|Documents|Conditions|Troubleshooting Procedures|Common Procedures|Status Check|Trouble Cases|Deployment Related Trouble Cases|VNF Does not Start|Image Extraction Problem|Cyclic Kernel Restart|VM Stuck|No Console Connection in Openstack|OpenStack|Wrong cloud-init Syntax|Scaling Related Trouble Cases|Signaling Related Trouble Cases|No Connection to NextHop|No Connection to O&amp;M IP Address|No Connection to Client|Load Related Trouble Cases|Disturbances in Traffic|Speech Quality Problem|Bandwidth Limitation|Packet Loss in vSwitch|Packet Loss on Site|Announcement Related Trouble Cases|vMRF Cannot Play Announcement|$|1|1.1|1.1.1|2|2.2|2.2.1|3|3.1|3.1.1|3.1.1.1|3.1.2|3.1.3|3.1.4|3.1.5.1|3.1.6|3.2|3.3|3.3.2|3.3.3|3.4.1|3.5|3.5.1|3.5.2|3.5.2.1|3.5.2.2|3.5.2.3|3.6|3.6.1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|Procedure|$|1|2|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|About This Document|Manual Upgrade Process|Deploy the New Version|Rollback Procedure|$|1|2|4|7|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|MRF Announcement File Missing Alarm Description|Cease the MRF Announcement File Missing Alarm|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|MRF Announcement Storage Unavailable Alarm Description|Cease the MRF Announcement Storage Unavailable Alarm|$|1|1.1|2|
|About This Document|Initial Configuration Tasks|Application|Importing Configuration Data from NETCONF Template|Create and Import Configuration Data|Additional Security Configuration|Configure Security|User Plane|Signaling|Create a Basic Announcement|Application|Configure the networkManagedElementId Attribute|$|1|2|3|3.1|3.2|3.2.1|3.3.1|3.3.2|3.3.3|3.3.4|3.4|5|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Installation|Actions for Renewal|Actions for Repairing Automatic Configuration|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
