throbber
..
`
`Planning and Managing
`AppleTalk® Networks
`
`by Apple Computer, Inc.
`
`• •
`• • • • • • • • •
`•
`•
`•
`•
`•
`•
`•
`•
`• •
`•
`
`, ,
`
`• • • •
`
`• • • • • • • • • • • • • • • •
`
`A
`TT
`Addison
`Wesley
`52345
`
`PETITIONERS Ex. 1019, part 1, p. 1
`
`

`
`• .
`
`Planning and Managing
`AppleTalk® Networks
`
`Addison-Wesley Publishing Company, Inc.
`
`Reading, Massachusetts • New York . Don Mills, Ontario
`
`Wokingham, England • Amsterdam • Bonn • Sydney
`
`Singapore • Tokyo • Bogota • Santiago • Sanjuan
`
`PETITIONERS Ex. 1019, part 1, p. 2
`
`

`
`" Apple Computer, Inc.
`All rights reserved. 0 pan of this publication may be reproduced, stored in a retrieval system, or transmitted, in any
`form or by any means, mechanical, electronic, photocopying, recording, or otherwise, without prior written
`permission of Apple Computer, Inc. Printed in the United States of America.
`© Apple Computer, Inc., 1991
`20525 Mariani Avenue
`Cupenino, CA 95014-6299
`(408) 996-1010
`
`Apple, the Apple logo, AppleLink, APDA, Apple hare, AppleTalk, Apple JJGS, NUX, EtherTalk, ImageWriter, Inter. Poll,
`LaserWriter, LocalTalk, MaCintosh, MacTCP, MultiFinder, ProDOS, and TokenTalk are registered trademarks, and Finder
`is a trademark, of Apple Computer, Inc. Classic is a registered trademark, licensed to Apple Computer, Inc. HyperCard
`and MacDraw are registered trademarks of Apple Computer, Inc., licensed to Claris Corp.
`Adobe Illustrator and PostScript are registered trademarks of Adobe Systems, Inc. AlisaShare is a trademark of Alisa
`Systems, Inc. cc:Mail is a trademark of ceMail, Inc. CompuServe is a registered service mark of CompuServe, Inc.
`DECnet, PATH\'VORKS, VAX, VAXshare, and VMS are trademarks of Digital Equipment Corp. EtherGate, NetModem,
`NetSerial, and TeleBridge are trademarks of Shiva Corp. EtherPrint is a trademark of Dayna Conununications, Inc.
`4th Dimension is a registered trademark of ACIUS/ ACI. GraceLAN and Technology Works are trademarks of
`Technology Works, Inc. IBM and OS/2 are registered trademarks of International Business Machines Corp. InBox is a
`trademark of Sitka Corp. LANSTAR is a registered trademark of Nonhern Telecom. Lotus is a registered trademark of
`Lotus Development Corp. MACLAN Connect is a trademark of Miramar Systems, Inc. Microsoft and MS-DOS are
`registered trademarks, and Windows is a trademark, of Microsoft Corp. etWare is a registered trademark of Novell,
`Inc. uBus is a trademark of Texas Instruments. PacerShare is a registered trademark of Pacer Software, Inc.
`Phone ET and TrafficWatch are registered trademarks, and Liaison, etAtlas, StarController, and Timbuktu are
`trademarks, of Farallon Computing, Inc. PhotoLink is a registered trademark of Photonics Corp. QuickMail is a
`trademark of CE Software, Inc. Retrospect Remote is trademark of Dantz Development Corp. StarGROUP is a
`registered trademark of AT&T. Sun is a trademark of Sun Microsystems, Inc. 3COM is a registered trademark of
`3COM Corp. UNIX is a registered trademark of UNIX Systems Laboratories.
`Simultaneously published in the United States and Canada.
`ISB 0-201-52345-0
`ABCDEFGH-DO-91
`First printing, AUGUST 1991
`
`Publication Team
`Writer: Sondra Garcia
`Editor: Steve Rudman
`Art Director: Joyce Zavarro
`Production Editor: Debbie McDaniel
`Designer: Lisa Mirski
`Project Managers: Patrick Ames and John Gorham
`Key technical contributors: Rich Andrews, Bill Berner, Craig Brenner, Dana Harrison, Gary Henry,
`Dan Iliff, Alan Oppenheimer, Priscilla Oppenheimer, Scott Petry, Scott Rohlfing, Dan Torres,
`Robert Wohnoutka
`
`PETITIONERS Ex. 1019, part 1, p. 3
`
`

`
`Contents
`
`Foreword by John Sculley ix
`
`Part 1 Overview / 1
`
`1 Introduction / 3
`Who is the network administrator? / 4
`What's the best way to use this book? / 7
`
`2 The AppleTalk Network System / 9
`What is the AppleTalk network system? / 10
`The AppleTalk protocol architecture / 10
`The OS! protocol model / 13
`etwork components / 15
`Computing and peripheral devices / 15
`Connection hardware / 16
`Networking software / 17
`AppleTalk addressing / 18
`Dynamic node assignment / 20
`AppleTalk's naming service / 21
`etwork types / 22
`Conclusion / 23
`
`PETITIONERS Ex. 1019, part 1, p. 4
`
`

`
`Part 2 Planning Your Network / 25
`3 Assessing Network Services / 29
`How are network services provided? / 30
`AppleTalk print services / 30
`Using Apple printers / 31
`Using printing devices from other companies / 31
`Shared printing / 32
`Printing with a server / 34
`Background printing or print server: Which one to use? / 36
`AppleTalk file services / 37
`AFP: Computer-ta-server communication / 38
`Centralized file service and distributed file sharing / 39
`The AppleShare File Server: Centralized file service / 40
`Registering users and creating groups I 41
`Using the server I 42
`File security I 44
`AppieShare management features I 46
`Macintosh File Sharing: Distributed file sharing / 47
`Turning on File Sharing I 47
`Using File Sharing I 48
`Monitoring File Sharing I 49
`AFP file servers from other companies / 49
`Using electronic mail / 53
`Is a server needed? / 54
`E-mail features / 55
`Dialing in to your network / 56
`Sharing modems / 58
`Conclusion / 59
`
`4 Selecting the Right Medium / 61
`
`Some factors to consider / 62
`Twisted-pair cable / 64
`Coaxial cable / 65
`Fiber-optic cable / 67
`Infrared media / 68
`Conclusion / 69
`
`iv
`
`Contents
`
`PETITIONERS Ex. 1019, part 1, p. 5
`
`

`
`5 Topology-The Shape of Your Network / 71
`
`The bus / 72
`The star / 74
`The ring / 76
`Combining topologies in an internet / 77
`Conclusion / 78
`
`6 Network Types / 81
`LocalTalk networks / 82
`Shielded, twisted-pair cable systems / 83
`Unshielded twisted-pair cable systems / 85
`Infrared connections / 86
`AppleTalk over Ethernet: EtherTalk / 87
`The Apple Ethernet Cable System / 89
`Thin coax cable systems for Ethernet I 90
`Twisted-pair cable systems for Ethernet I 92
`Thick coax and other cable systems for Ethernet I 93
`AppleTalk over Token Ring: TokenTalk / 94
`Conclusion / 95
`
`7 Design Guidelines / 97
`Planning for network traffic , / 98
`Creating a balanced network / 99
`Determining shared resource needs / 101
`The network type / 102
`Shared devices-how many? / 103
`The type of computer to use as a server / 103
`The type of disk drive to use / 104
`Running multiple services on one server / 104
`Shared disk space / 104
`The amount of server memory / 106
`Extending and connecting networks / 107
`
`Contents
`
`v
`
`PETITIONERS Ex. 1019, part 1, p. 6
`
`

`
`Which connection device do you need? / 108
`Repeaters / 109
`Bridges / 110
`Routers / 111
`Where to place a router / 115
`Creating redundant routes / 116
`Dividing your internet into zones / 117
`Zone names and zone lists / 118
`Assigning network numbers and ranges / 119
`Gateways / 121
`When to use a backbone / 122
`Selecting the backbone network type / 124
`Connecting networks of different speeds / 124
`Where to place shared resources / 125
`Creating a network map / 128
`Conclusion / 133
`
`8 Factors Affecting Installation / 135
`
`Local building and fire codes / 136
`Electrical considerations / 136
`Electromagnetic interference / 137
`Environmental factors / 137
`Cable distribution and layout / 138
`Handling cable / 139
`Labeling cables / 139
`Laying cable in a single room / 140
`Laying cable in a multiroom or multifloor site / 140
`Ceiling systems / 141
`Riser systems / 143
`Floor installation / 143
`Conclusion / 147
`
`9 Security Considerations / 149
`
`Your network security needs / 150
`Backing up data / 151
`Educating users about security / 152
`Physical security / 153
`
`vi Contents
`
`PETITIONERS Ex. 1019, part 1, p. 7
`
`

`
`Controlling access to data / 154
`Using passwords / 155
`Protecting information on workstations / 156
`Protecting information on file servers / 157
`Remote-access concerns / 159
`Preventing interception of network signals / 159
`Computer viruses / 160
`Conclusion / 163
`
`Part 3 Managing Your Network / 165
`10 Network Maintenance Guidelines / 167
`
`Keeping logbooks / 168
`The administrator's primary monitoring tools / 171
`Identifying missing devices / 172
`Identifying system versions and other information / 173
`Testing network integrity / 174
`Monitoring traffic activity / 176
`Remote administration / 178
`Generating network reports / 180
`Backing up and restoring shared files / 183
`Types of backups / 183
`Backup media / 185
`Backup schedules / 186
`Backing up the server locally and over the network / 190
`Backing up user files on individual computers / 191
`Supporting and training users / 191
`User training scenarios / 193
`Upgrading system software / 195
`Adding users and network services / 197
`Adding users / 197
`Adding network services / 199
`Managing your servers / 200
`Organizing information on the file server / 200
`Freeing up disk space / 202
`Checking security / 203
`
`Contents vii
`
`PETITIONERS Ex. 1019, part 1, p. 8
`
`

`
`Using applications on a file selVer / 203
`File selVer compatibility / 203
`Determining launch and access characteristics / 205
`Copyright and licensing issues / 207
`Optimizing network performance / 208
`Examples of performance analysis / 212
`
`11 Network Troubleshooting / 217
`
`Administrative tools / 218
`Common network problems / 219
`Missing device / 220
`Intermittent loss of selVices or devices / 222
`Performance degradation / 224
`Troubleshooting strategies / 226
`Troubleshooting scenarios / 230
`Getting additional help / 240
`Conclusion / 241
`
`Appendix For More Information / 243
`Trade journals on networking / 244
`Apple User Groups / 245
`Electronic communication / 245
`BMUG / 246
`AppleLink / 246
`CompuSelVe / 246
`BITNET / 246
`APDA CApple Programmer's and Developer's Association) / 247
`The Apple Communications Library / 248
`Apple product documentation / 249
`Other Apple documents / 251
`Books about Macintosh networking / 252
`General networking books / 252
`
`Glossary / 253
`Index / 263
`
`viii Contents
`
`PETITIONERS Ex. 1019, part 1, p. 9
`
`

`
`5 Topology-The Shape
`of Your Network
`
`At its most basic, topology refers to the physical arrangement of devices and cable in a
`
`network. The three most widely used designs for local area networks are bus, star, and
`
`ring topologies. But topology is really more than just a matter of geometry-in addition
`
`to describing the physical layout of a network, topology is related to the method that
`
`devices use to access the network and to send information to each other. On a ring
`
`network, for example, each device takes turns transmitting data, whereas on a bus
`
`network, devices usually must contend with each other to access the medium.
`
`The network type and media you choose may determine the topology of your network.
`
`For example, if you use the Ethernet network type with twisted-pair cable, your network
`
`will be laid out in a star. If you select coaxial cable for your Ethernet network instead,
`
`your network will be arranged in a bus. Just as you can combine a variety of network
`
`types in an internet, so can you combine different network topologies, which means that
`
`your internet may consist of several different physical shapes.
`
`This chapter examines each topology and weighs the pros and cons of each.
`
`PETITIONERS Ex. 1019, part 1, p. 10
`
`

`
`The bus
`
`A bus topology connects devices in a sequential line, one after the other, as shown in the
`following figure. A bus always has two distinct ends, each of which must include a
`terminating resistor. Devices are attached along the length of the cable by connectors
`called taps or drops. LocalTalk networks using shielded twisted-pair cable and Ethernet
`networks using coaxial cable are laid out in a bus topology.
`
`Bus topology
`
`On a bus, there is no central device controlling transmissions on the network.
`Instead, devices contend with each other to access the medium, a scheme that
`distributes network control. In order to transmit information, devices use a method
`called carrier sensing. Each device "listens" to the medium before transmitting and, if it
`senses a signal on the medium (which means another device is transmitting), it backs off
`and tries again later. Transmissions on a bus are broadcast to all devices connected to the
`medium. To receive a transmission, a device must be able to recognize its own address.
`(Note that token-passing busses are an exception. Because there are currently no token(cid:173)
`passing busses for AppleTalk networks, they are not discussed here.)
`
`72 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 11
`
`

`
`Address recognition on a bus
`
`"A" sends a message over the cable. Each message
`begins with the address of the destination
`followed by the sender's address.
`
`"B" listensforactivity, and compares the message's
`address with its own. Addresses match
`and ''E '' accepts the message.
`
`"C" checks the address, but since it does not
`match, "e" ignores the message.
`
`1ThTI~
`
`~
`
`Because devices closest to the sending device receive a stronger signal than devices
`further away, the transceivers used by the network must tolerate a wide range of signal
`levels. Signal-strength problems are often handled by limiting the length of the cable
`segments and the number of devices per segment. On some bus networks, such as
`coaxial Ethernet networks, amplifying devices (known as repeaters-see Chapter 7) are
`used to connect cable segments.
`A distinct advantage of bus networks is that they are easy to configure. The modular
`design encourages a plug-and-play installation where devices are quickly and easily
`added to the network. In addition, the distributed nature of a bus provides a certain
`amount of reliability; the failure of a single device will not affect the rest of the network.
`Bus networks do have some disadvantages, however. A break anywhere on the
`network can disrupt services for all the devices on the network. Problems can be difficult
`to locate and, depending on the size of the network, the bus may require test equipment
`to isolate faults. In addition, cable taps may need to be separated by a prescribed
`distance to avoid signal reflections that can interfere with data transmission.
`
`Chapter 5 Topology-The Shape of Your Network
`
`73
`
`PETITIONERS Ex. 1019, part 1, p. 12
`
`

`
`Carrier sensing: Collision avoidance and detection
`
`Since two devices on a bus could conceivably check the medium at exactly the same time, find no signal,
`and begin transmitting packets, causing their transmissions to collide, additional precautions are added to
`carrier sensing. One is called collision avoidance, the other is called collision detection. In collision
`avoidance, the protocol attempts to minimize the occurrence of collisions. All nodes wait until the
`transmission medium has been idle for a specified minimum amount of time plus an additional random
`period before attempting to transmit. If a collision occurs, the packets are retransmitted. In collision
`detection, the access protocol specifies a method of detecting collisions and retransmitting the data if a
`collision has occurred. LocalTalk networks use carrier sensing with collision avoidance. Ethernet networks
`use carrier sensing with collision detection.
`
`The star
`
`Unshielded, twisted-pair LocalTalk networks (such as Farallon's PhoneNET cable
`system) and unshielded twisted-pair Ethernet networks allow you to set up your network
`using a star design. A star consists of branches that radiate from a central point, called
`the hub. A branch can contain a single device or several devices arranged in a bus
`topology. A passive star has a fairly low limit on the number of branches allowed and
`the total length of the cable. An active star, which has a controlling device at the hub of
`the star, allows a greater number of branches and total cable length. The controller in an
`active star is connected to each device through a dedicated channel, and sends
`information to the appropriate device rather than broadcasting it to the entire network.
`Star networks generally use unshielded twisted-pair cable (telephone wire) as their
`transmission medium; the center of the star is usually located in a telephone wiring
`closet. Wires radiate out to users' offices from a wiring distribution block, such as a
`telephone punchdown block, as shown in the following figure.
`
`74 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 13
`
`

`
`Active star topology
`
`Central controller device
`
`..... r Punchdown
`
`block
`
`'.
`
`The greatest strength of star topologies is their ease of maintenance and
`troubleshooting. Because devices do not share a single cable, it's a relatively
`straightforward process to isolate faulty cables and devices. If the wiring already exists in
`offices, it's easy to reconfigure the network by simply reconnecting wires in the
`telephone wiring closet. Adding or moving devices is not disruptive to the network
`because each device is isolated from the rest.
`If you're planning an active star, you'll need to purchase a central controller device or
`hub. Probably the biggest weakness of an active star is that if the controller fails, all of
`the devices connected to it fail as well. Performance in a star is good for moderate
`amounts of traffic, but the size and capacity of the network varies according to the
`capability and expandability of the hub. Each controller has a limit to the number of
`devices that can be connected, so you'll need to add more controllers as your network
`grows.
`
`Chapter 5 Topology-The Shape of Your Network
`
`75
`
`PETITIONERS Ex. 1019, part 1, p. 14
`
`

`
`The ring
`
`There are several kinds of ring topologies possible on a local area network, including true
`rings, loops, and star-wired rings. In a true ring, devices are connected in a closed circle,
`with each device wired directly to the next by means of the shortest physical path. Control
`is distributed, with messages traveling automatically from one device to the next. A loop
`looks the same as a true ring; the difference is that there is a controller directing
`transmissions on the network. A star-wired ring, which is the topology popularized by
`IBM and used in Token Ring networks, transmits data like a ring, but is shaped like a star.
`As shown in the following figure, each device on the star-wired ring is connected to a
`central wiring concentrator called a multistation access unit (MAU). A number of
`MAUs can be interconnected to form the main ring of a network. All information must
`travel through the central MAU, but, unlike star networks, this central point does not
`control network transmissions.
`Ring networks usually use token passing to control access to the network. A special
`sequence of data representing the token is passed around the ring from device to device.
`When a device is holding the token, it has sole access to the cable and can transmit
`freely without risk of collision. To accept messages, each device must be able to
`recognize its own address. If the receiving device is the intended destination, it accepts
`the message; otherwise, it resends the message on to the next device in the ring.
`
`76 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 15
`
`

`
`The star-wired ring has several advantages. For one, it is extremely reliable and easy
`to maintain. The MAU contains automatic bypass relays that enable the ring to continue
`operating even if a device on the ring fails. The MAU also facilitates maintenance by
`providing a central location for monitoring and reconfiguration. Another plus is that
`every device is guaranteed a chance to transmit within a certain period of time(cid:173)
`regardless of how busy the network is-so the ring is ideal in situations where network
`response characteristics must be guaranteed. For example, the ring is useful for real-time
`applications such as process control and medical monitoring.
`On the minus side, star-wired rings can be difficult to install. In addition, the costs for
`the MAU and for installing the star-wired ring can be quite high and beyond the means
`of a budget for a small network.
`
`Combining topologies in an internet
`
`In an organization with several connected networks, it's common to encounter a mix of
`different topologies. For example, one network might be connected to an IBM
`mainframe through a ring, another network may be set up as a star to take advantage of
`existing telephone wire, while a third network might be designed as a bus. These
`different topologies are connected together by using routers, which are discussed in
`Chapter 7. An example internet combining different topologies is shown in the following
`figure.
`
`Chapter 5 Topology-The Shape of Your Network
`
`77
`
`PETITIONERS Ex. 1019, part 1, p. 16
`
`

`
`An internet combining different topologies
`
`.
`
`• ' Bus
`
`• • •
`
`Conclusion
`
`Because the topology of your AppleTalk network will often depend on the network type
`and media you choose, topology probably won't be the overriding criterion in planning
`your network. However, by becoming familiar with the characteristics of each topology,
`you will know what to expect during installation and when you need to reconfigure or
`troubleshoot the network later on. Each topology has inherent strengths and
`weaknesses, summarized in Table 5-1.
`
`78 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 17
`
`

`
`Table 5-1 A comparison of network topologies
`
`Features
`
`Bus
`
`Star
`
`Star-wired ring
`
`Uses
`
`Ideal for small networks.
`
`Ease of maintenance and
`troubleshooting.
`
`Performance
`
`Excellent under light loads;
`may degrade rapidly if load
`reaches saturation point.
`
`Good for moderate activity.
`Performance depends on the
`capability of the central controller.
`
`A good choice for applications
`that require predictable
`network response. Part of
`IBM's Systems Application
`Architecture (SAA).
`Less delay under heavy
`network load than other
`topologies. Under light to
`moderate loads, delays can be
`longer than other topologies.
`Very reliable. The failure of
`one device does not affect the
`rest of the network.
`
`Easy to add or move devices
`without disruption.
`
`Chapter 5 Topology-The Shape of Your Network
`
`79
`
`Reliability
`
`Failure of one device does not
`affect the rest of the network.
`However, a Single break can
`disrupt the network.
`
`Ease of adding and
`moving devices
`
`Easy to add or move devices.
`May cause network disruption.
`
`Failure of one device does not
`affect the rest of the network.
`However, in an active star, if the
`controller fails, the entire network
`goes down.
`Easy to reconfigure the network
`if wire already exists in offices.
`Adding or removing devices is not
`disruptive.
`Ease of maintenance Becomes more difficult as the
`Easy. Because devices do not share Generally easy. The MAU
`and troubleshooting
`network grows. Problems can be a Single cable, it is fairly easy to
`provides a central point for
`hard to locate, but are usually
`isolate faulty cables and devices.
`monitoring.
`easy to repair.
`
`PETITIONERS Ex. 1019, part 1, p. 18
`
`

`
`AppleTalk over Ethernet: EtherTalk
`AppleTalk protocols can operate on industry-standard Ethernet technology, supporting
`the 802.3 standard defined by the IEEE (Institute of Electrical and Electronic
`Engineers). Ethernet can use a variety of media, transmitting data at 10 megabits per
`second (Mbps). It is useful for networks that carry heavy traffic; for example, in work
`environments that have many users or that transfer large files (such as CAD files or other
`files that include graphics or color), have multi-user database activity, or where
`applications are typically launched from a file server. Ethernet is also used in
`environments that require very quick response times.
`You can connect most Macintosh computers to an Ethernet network by installing
`EtherTalk software and an interface card (such as the Apple Ethernet NB Card or Apple
`Ethernet LC Card) in each computer, or by using an external SCSI box. You can connect
`LaserWriter printers to an Ethernet network by using a product such as EtherPrint (Dayna
`Communications).
`An Ethernet network can be set up in various ways. Using thin coaxial cable, you can
`easily connect devices in a bus topology. Ethernet also enables you to connect devices
`using unshielded, twisted-pair cable (telephone wire), laying out devices in a star(cid:173)
`shaped design. In addition, an Ethernet network often functions as a high-speed
`backbone-using thick coaxial or fiber-optic cable-to connect several LocalTalk
`networks by means of a router. (See the following figure.) Using Ethernet as a backbone
`and placing heavily-used devices on the backbone improves access to these devices.
`
`Chapter 6 Network Types
`
`87
`
`PETITIONERS Ex. 1019, part 1, p. 19
`
`

`
`Ethernet can seroe as a backbone,
`improving access to heavily used shared
`devices such as file seroers.
`
`LocalTalk
`network
`
`Ethernet
`••• backbone
`
`server
`
`network
`
`Devices using EtherTalk software can also c<;>rnmunicate over the same Ethernet
`cable with devices obeying non-AppleTalk protocols, such as TCP/IP and DECnet. This
`means that, with the appropriate software installed (such as MacTCP®), Ethernet users
`can communicate with non-AppleTalk devices, such as Sun workstations, and take
`advantage of non-AppleTalk network services, such as those on a DECnet network, as
`shown in the following illustration.
`
`88 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 20
`
`

`
`Macintosh computers can communicate over
`an Ethernet network with non-AppleTalk devices.
`
`~ Sun workstation using
`
`TCP l IP protocols
`
`"Ethernet
`
`Macintosh computer using
`AppleTalk, TCP/IP, and
`DECnet protocols
`
`The Apple Ethernet Cable System
`The Apple Ethernet Cable System is a family of products from Apple Computer that
`provides connectivity to Ethernet networks. This family of products combines the
`modular ease-of-use familiar to LocalTalk users with the high performance and
`extensibility of Ethernet networks. All Apple Ethernet products conform to the IEEE
`802.3 standard for Ethernet, so they work with Ethernet products from other vendors.
`Apple Ethernet media adapters, shown in the following figure, allow you to connect
`to any standard Ethernet cable system through the Apple Ethernet port. This port is a
`universal connection point provided for your computer through the installation of an
`interface card, such as the Apple Ethernet NB Card or Apple Ethernet LC Card. Because
`Apple Ethernet separates the transceiver from the interface card, you can use the
`appropriate media adapter to switch cable systems without having to replace your
`interface card.
`
`Chapter 6 Network Types
`
`89
`
`PETITIONERS Ex. 1019, part 1, p. 21
`
`

`
`Apple Ethernet media adapters
`
`Apple Ethernet
`Thin Coax Transceiver
`
`Apple Ethernet
`AU! Adapter
`
`Apple Ethernet
`Twisted-Pair Transceiver
`
`Thin coax cable systems Jar Ethernet
`The Apple Ethernet Thin Coax Transceiver connects computers and peripheral devices
`equipped with Apple Ethernet ports to a thin coaxial cable Ethernet network.
`The Apple Ethernet Thin Coax Transceiver kit consists of an external transceiver with
`an Apple Ethernet connector. The kit also includes a 2-meter length of self-terminating
`cable, which you can use to connect to another transceiver on the network. (You can
`also purchase cable in 5-meter lengths and 13-meter lengths to connect devices over
`longer distances.)
`The Apple Ethernet Thin Coax Transceiver brings the plug-and-play approach of
`LocalTalk to thin coax networks. By providing a Thin Coax Transceiver for each device,
`you can quickly build your own network. You simply connect the network cable to the
`transceiver and plug the transceiver into a device's Apple Ethernet port. To extend the
`network, you connect a transceiver to the new device, then use the 2-meter cable to
`attach to another transceiver already on the network.
`
`90 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 22
`
`

`
`Both the Apple Ethernet Thin Coax Transceiver and Apple Ethernet cable are self(cid:173)
`terminating, unlike traditional Ethernet hardware. This means that if a cable becomes
`disconnected for any reason, both halves of the network will remain functional
`(although the separated networks won't be able to communicate with one another until
`the cable is reconnected).
`In addition to creating a network with all Apple Ethernet components, you can use
`the Apple Ethernet Thin Coax Transceiver to add devices to existing installations. The
`transceiver works with any standard thin coax cable system.
`
`Apple Ethernet Thin Coax cable system
`A true "plug-and-play" Ethernet network
`
`Apple Ethernet
`Thin Coax Transceiver
`,-----------.
`- - - - - - - - - - - .
`,
`,
`,
`,
`,
`,
`,
`'
`
`,
`
`~
`
`Q
`
`...
`
`~
`
`~
`
`""'Apple Ethernet
`2-meter cable
`
`Chapter 6 Network Types
`
`91
`
`PETITIONERS Ex. 1019, part 1, p. 23
`
`

`
`TWisted-pair cable systems for Ethernet
`The Apple Ethernet Twisted-Pair Transceiver connects computers and peripheral devices
`equipped with Apple Ethernet ports to a twisted-pair Ethernet network. The transceiver
`conforms to the IEEE 802.3 lOBASE-T standard for implementing Ethernet over
`unshielded twisted-pair cable.
`Ethernet cable systems that use unshielded twisted-pair cable are arranged in a star
`topology and can take advantage of existing telephone wires that radiate out to work
`spaces from a central controlling hub. Because the Apple Ethernet Twisted-Pair
`Transceiver fully supports the lOBASE-T standard, it can be used with any vendor's
`10BASE-T hub.
`
`Ethernet twisted-pair cable system
`
`Central controller
`
`Apple Ethernet
`Twisted-Pair Transceiver
`
`92 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 24

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket