`
`Planning and Managing
`AppleTalk® Networks
`
`by Apple Computer, Inc.
`
`• •
`• • • • • • • • •
`•
`•
`•
`•
`•
`•
`•
`•
`• •
`•
`
`, ,
`
`• • • •
`
`• • • • • • • • • • • • • • • •
`
`A
`TT
`Addison
`Wesley
`52345
`
`PETITIONERS Ex. 1019, part 1, p. 1
`
`
`
`• .
`
`Planning and Managing
`AppleTalk® Networks
`
`Addison-Wesley Publishing Company, Inc.
`
`Reading, Massachusetts • New York . Don Mills, Ontario
`
`Wokingham, England • Amsterdam • Bonn • Sydney
`
`Singapore • Tokyo • Bogota • Santiago • Sanjuan
`
`PETITIONERS Ex. 1019, part 1, p. 2
`
`
`
`" Apple Computer, Inc.
`All rights reserved. 0 pan of this publication may be reproduced, stored in a retrieval system, or transmitted, in any
`form or by any means, mechanical, electronic, photocopying, recording, or otherwise, without prior written
`permission of Apple Computer, Inc. Printed in the United States of America.
`© Apple Computer, Inc., 1991
`20525 Mariani Avenue
`Cupenino, CA 95014-6299
`(408) 996-1010
`
`Apple, the Apple logo, AppleLink, APDA, Apple hare, AppleTalk, Apple JJGS, NUX, EtherTalk, ImageWriter, Inter. Poll,
`LaserWriter, LocalTalk, MaCintosh, MacTCP, MultiFinder, ProDOS, and TokenTalk are registered trademarks, and Finder
`is a trademark, of Apple Computer, Inc. Classic is a registered trademark, licensed to Apple Computer, Inc. HyperCard
`and MacDraw are registered trademarks of Apple Computer, Inc., licensed to Claris Corp.
`Adobe Illustrator and PostScript are registered trademarks of Adobe Systems, Inc. AlisaShare is a trademark of Alisa
`Systems, Inc. cc:Mail is a trademark of ceMail, Inc. CompuServe is a registered service mark of CompuServe, Inc.
`DECnet, PATH\'VORKS, VAX, VAXshare, and VMS are trademarks of Digital Equipment Corp. EtherGate, NetModem,
`NetSerial, and TeleBridge are trademarks of Shiva Corp. EtherPrint is a trademark of Dayna Conununications, Inc.
`4th Dimension is a registered trademark of ACIUS/ ACI. GraceLAN and Technology Works are trademarks of
`Technology Works, Inc. IBM and OS/2 are registered trademarks of International Business Machines Corp. InBox is a
`trademark of Sitka Corp. LANSTAR is a registered trademark of Nonhern Telecom. Lotus is a registered trademark of
`Lotus Development Corp. MACLAN Connect is a trademark of Miramar Systems, Inc. Microsoft and MS-DOS are
`registered trademarks, and Windows is a trademark, of Microsoft Corp. etWare is a registered trademark of Novell,
`Inc. uBus is a trademark of Texas Instruments. PacerShare is a registered trademark of Pacer Software, Inc.
`Phone ET and TrafficWatch are registered trademarks, and Liaison, etAtlas, StarController, and Timbuktu are
`trademarks, of Farallon Computing, Inc. PhotoLink is a registered trademark of Photonics Corp. QuickMail is a
`trademark of CE Software, Inc. Retrospect Remote is trademark of Dantz Development Corp. StarGROUP is a
`registered trademark of AT&T. Sun is a trademark of Sun Microsystems, Inc. 3COM is a registered trademark of
`3COM Corp. UNIX is a registered trademark of UNIX Systems Laboratories.
`Simultaneously published in the United States and Canada.
`ISB 0-201-52345-0
`ABCDEFGH-DO-91
`First printing, AUGUST 1991
`
`Publication Team
`Writer: Sondra Garcia
`Editor: Steve Rudman
`Art Director: Joyce Zavarro
`Production Editor: Debbie McDaniel
`Designer: Lisa Mirski
`Project Managers: Patrick Ames and John Gorham
`Key technical contributors: Rich Andrews, Bill Berner, Craig Brenner, Dana Harrison, Gary Henry,
`Dan Iliff, Alan Oppenheimer, Priscilla Oppenheimer, Scott Petry, Scott Rohlfing, Dan Torres,
`Robert Wohnoutka
`
`PETITIONERS Ex. 1019, part 1, p. 3
`
`
`
`Contents
`
`Foreword by John Sculley ix
`
`Part 1 Overview / 1
`
`1 Introduction / 3
`Who is the network administrator? / 4
`What's the best way to use this book? / 7
`
`2 The AppleTalk Network System / 9
`What is the AppleTalk network system? / 10
`The AppleTalk protocol architecture / 10
`The OS! protocol model / 13
`etwork components / 15
`Computing and peripheral devices / 15
`Connection hardware / 16
`Networking software / 17
`AppleTalk addressing / 18
`Dynamic node assignment / 20
`AppleTalk's naming service / 21
`etwork types / 22
`Conclusion / 23
`
`PETITIONERS Ex. 1019, part 1, p. 4
`
`
`
`Part 2 Planning Your Network / 25
`3 Assessing Network Services / 29
`How are network services provided? / 30
`AppleTalk print services / 30
`Using Apple printers / 31
`Using printing devices from other companies / 31
`Shared printing / 32
`Printing with a server / 34
`Background printing or print server: Which one to use? / 36
`AppleTalk file services / 37
`AFP: Computer-ta-server communication / 38
`Centralized file service and distributed file sharing / 39
`The AppleShare File Server: Centralized file service / 40
`Registering users and creating groups I 41
`Using the server I 42
`File security I 44
`AppieShare management features I 46
`Macintosh File Sharing: Distributed file sharing / 47
`Turning on File Sharing I 47
`Using File Sharing I 48
`Monitoring File Sharing I 49
`AFP file servers from other companies / 49
`Using electronic mail / 53
`Is a server needed? / 54
`E-mail features / 55
`Dialing in to your network / 56
`Sharing modems / 58
`Conclusion / 59
`
`4 Selecting the Right Medium / 61
`
`Some factors to consider / 62
`Twisted-pair cable / 64
`Coaxial cable / 65
`Fiber-optic cable / 67
`Infrared media / 68
`Conclusion / 69
`
`iv
`
`Contents
`
`PETITIONERS Ex. 1019, part 1, p. 5
`
`
`
`5 Topology-The Shape of Your Network / 71
`
`The bus / 72
`The star / 74
`The ring / 76
`Combining topologies in an internet / 77
`Conclusion / 78
`
`6 Network Types / 81
`LocalTalk networks / 82
`Shielded, twisted-pair cable systems / 83
`Unshielded twisted-pair cable systems / 85
`Infrared connections / 86
`AppleTalk over Ethernet: EtherTalk / 87
`The Apple Ethernet Cable System / 89
`Thin coax cable systems for Ethernet I 90
`Twisted-pair cable systems for Ethernet I 92
`Thick coax and other cable systems for Ethernet I 93
`AppleTalk over Token Ring: TokenTalk / 94
`Conclusion / 95
`
`7 Design Guidelines / 97
`Planning for network traffic , / 98
`Creating a balanced network / 99
`Determining shared resource needs / 101
`The network type / 102
`Shared devices-how many? / 103
`The type of computer to use as a server / 103
`The type of disk drive to use / 104
`Running multiple services on one server / 104
`Shared disk space / 104
`The amount of server memory / 106
`Extending and connecting networks / 107
`
`Contents
`
`v
`
`PETITIONERS Ex. 1019, part 1, p. 6
`
`
`
`Which connection device do you need? / 108
`Repeaters / 109
`Bridges / 110
`Routers / 111
`Where to place a router / 115
`Creating redundant routes / 116
`Dividing your internet into zones / 117
`Zone names and zone lists / 118
`Assigning network numbers and ranges / 119
`Gateways / 121
`When to use a backbone / 122
`Selecting the backbone network type / 124
`Connecting networks of different speeds / 124
`Where to place shared resources / 125
`Creating a network map / 128
`Conclusion / 133
`
`8 Factors Affecting Installation / 135
`
`Local building and fire codes / 136
`Electrical considerations / 136
`Electromagnetic interference / 137
`Environmental factors / 137
`Cable distribution and layout / 138
`Handling cable / 139
`Labeling cables / 139
`Laying cable in a single room / 140
`Laying cable in a multiroom or multifloor site / 140
`Ceiling systems / 141
`Riser systems / 143
`Floor installation / 143
`Conclusion / 147
`
`9 Security Considerations / 149
`
`Your network security needs / 150
`Backing up data / 151
`Educating users about security / 152
`Physical security / 153
`
`vi Contents
`
`PETITIONERS Ex. 1019, part 1, p. 7
`
`
`
`Controlling access to data / 154
`Using passwords / 155
`Protecting information on workstations / 156
`Protecting information on file servers / 157
`Remote-access concerns / 159
`Preventing interception of network signals / 159
`Computer viruses / 160
`Conclusion / 163
`
`Part 3 Managing Your Network / 165
`10 Network Maintenance Guidelines / 167
`
`Keeping logbooks / 168
`The administrator's primary monitoring tools / 171
`Identifying missing devices / 172
`Identifying system versions and other information / 173
`Testing network integrity / 174
`Monitoring traffic activity / 176
`Remote administration / 178
`Generating network reports / 180
`Backing up and restoring shared files / 183
`Types of backups / 183
`Backup media / 185
`Backup schedules / 186
`Backing up the server locally and over the network / 190
`Backing up user files on individual computers / 191
`Supporting and training users / 191
`User training scenarios / 193
`Upgrading system software / 195
`Adding users and network services / 197
`Adding users / 197
`Adding network services / 199
`Managing your servers / 200
`Organizing information on the file server / 200
`Freeing up disk space / 202
`Checking security / 203
`
`Contents vii
`
`PETITIONERS Ex. 1019, part 1, p. 8
`
`
`
`Using applications on a file selVer / 203
`File selVer compatibility / 203
`Determining launch and access characteristics / 205
`Copyright and licensing issues / 207
`Optimizing network performance / 208
`Examples of performance analysis / 212
`
`11 Network Troubleshooting / 217
`
`Administrative tools / 218
`Common network problems / 219
`Missing device / 220
`Intermittent loss of selVices or devices / 222
`Performance degradation / 224
`Troubleshooting strategies / 226
`Troubleshooting scenarios / 230
`Getting additional help / 240
`Conclusion / 241
`
`Appendix For More Information / 243
`Trade journals on networking / 244
`Apple User Groups / 245
`Electronic communication / 245
`BMUG / 246
`AppleLink / 246
`CompuSelVe / 246
`BITNET / 246
`APDA CApple Programmer's and Developer's Association) / 247
`The Apple Communications Library / 248
`Apple product documentation / 249
`Other Apple documents / 251
`Books about Macintosh networking / 252
`General networking books / 252
`
`Glossary / 253
`Index / 263
`
`viii Contents
`
`PETITIONERS Ex. 1019, part 1, p. 9
`
`
`
`5 Topology-The Shape
`of Your Network
`
`At its most basic, topology refers to the physical arrangement of devices and cable in a
`
`network. The three most widely used designs for local area networks are bus, star, and
`
`ring topologies. But topology is really more than just a matter of geometry-in addition
`
`to describing the physical layout of a network, topology is related to the method that
`
`devices use to access the network and to send information to each other. On a ring
`
`network, for example, each device takes turns transmitting data, whereas on a bus
`
`network, devices usually must contend with each other to access the medium.
`
`The network type and media you choose may determine the topology of your network.
`
`For example, if you use the Ethernet network type with twisted-pair cable, your network
`
`will be laid out in a star. If you select coaxial cable for your Ethernet network instead,
`
`your network will be arranged in a bus. Just as you can combine a variety of network
`
`types in an internet, so can you combine different network topologies, which means that
`
`your internet may consist of several different physical shapes.
`
`This chapter examines each topology and weighs the pros and cons of each.
`
`PETITIONERS Ex. 1019, part 1, p. 10
`
`
`
`The bus
`
`A bus topology connects devices in a sequential line, one after the other, as shown in the
`following figure. A bus always has two distinct ends, each of which must include a
`terminating resistor. Devices are attached along the length of the cable by connectors
`called taps or drops. LocalTalk networks using shielded twisted-pair cable and Ethernet
`networks using coaxial cable are laid out in a bus topology.
`
`Bus topology
`
`On a bus, there is no central device controlling transmissions on the network.
`Instead, devices contend with each other to access the medium, a scheme that
`distributes network control. In order to transmit information, devices use a method
`called carrier sensing. Each device "listens" to the medium before transmitting and, if it
`senses a signal on the medium (which means another device is transmitting), it backs off
`and tries again later. Transmissions on a bus are broadcast to all devices connected to the
`medium. To receive a transmission, a device must be able to recognize its own address.
`(Note that token-passing busses are an exception. Because there are currently no token(cid:173)
`passing busses for AppleTalk networks, they are not discussed here.)
`
`72 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 11
`
`
`
`Address recognition on a bus
`
`"A" sends a message over the cable. Each message
`begins with the address of the destination
`followed by the sender's address.
`
`"B" listensforactivity, and compares the message's
`address with its own. Addresses match
`and ''E '' accepts the message.
`
`"C" checks the address, but since it does not
`match, "e" ignores the message.
`
`1ThTI~
`
`~
`
`Because devices closest to the sending device receive a stronger signal than devices
`further away, the transceivers used by the network must tolerate a wide range of signal
`levels. Signal-strength problems are often handled by limiting the length of the cable
`segments and the number of devices per segment. On some bus networks, such as
`coaxial Ethernet networks, amplifying devices (known as repeaters-see Chapter 7) are
`used to connect cable segments.
`A distinct advantage of bus networks is that they are easy to configure. The modular
`design encourages a plug-and-play installation where devices are quickly and easily
`added to the network. In addition, the distributed nature of a bus provides a certain
`amount of reliability; the failure of a single device will not affect the rest of the network.
`Bus networks do have some disadvantages, however. A break anywhere on the
`network can disrupt services for all the devices on the network. Problems can be difficult
`to locate and, depending on the size of the network, the bus may require test equipment
`to isolate faults. In addition, cable taps may need to be separated by a prescribed
`distance to avoid signal reflections that can interfere with data transmission.
`
`Chapter 5 Topology-The Shape of Your Network
`
`73
`
`PETITIONERS Ex. 1019, part 1, p. 12
`
`
`
`Carrier sensing: Collision avoidance and detection
`
`Since two devices on a bus could conceivably check the medium at exactly the same time, find no signal,
`and begin transmitting packets, causing their transmissions to collide, additional precautions are added to
`carrier sensing. One is called collision avoidance, the other is called collision detection. In collision
`avoidance, the protocol attempts to minimize the occurrence of collisions. All nodes wait until the
`transmission medium has been idle for a specified minimum amount of time plus an additional random
`period before attempting to transmit. If a collision occurs, the packets are retransmitted. In collision
`detection, the access protocol specifies a method of detecting collisions and retransmitting the data if a
`collision has occurred. LocalTalk networks use carrier sensing with collision avoidance. Ethernet networks
`use carrier sensing with collision detection.
`
`The star
`
`Unshielded, twisted-pair LocalTalk networks (such as Farallon's PhoneNET cable
`system) and unshielded twisted-pair Ethernet networks allow you to set up your network
`using a star design. A star consists of branches that radiate from a central point, called
`the hub. A branch can contain a single device or several devices arranged in a bus
`topology. A passive star has a fairly low limit on the number of branches allowed and
`the total length of the cable. An active star, which has a controlling device at the hub of
`the star, allows a greater number of branches and total cable length. The controller in an
`active star is connected to each device through a dedicated channel, and sends
`information to the appropriate device rather than broadcasting it to the entire network.
`Star networks generally use unshielded twisted-pair cable (telephone wire) as their
`transmission medium; the center of the star is usually located in a telephone wiring
`closet. Wires radiate out to users' offices from a wiring distribution block, such as a
`telephone punchdown block, as shown in the following figure.
`
`74 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 13
`
`
`
`Active star topology
`
`Central controller device
`
`..... r Punchdown
`
`block
`
`'.
`
`The greatest strength of star topologies is their ease of maintenance and
`troubleshooting. Because devices do not share a single cable, it's a relatively
`straightforward process to isolate faulty cables and devices. If the wiring already exists in
`offices, it's easy to reconfigure the network by simply reconnecting wires in the
`telephone wiring closet. Adding or moving devices is not disruptive to the network
`because each device is isolated from the rest.
`If you're planning an active star, you'll need to purchase a central controller device or
`hub. Probably the biggest weakness of an active star is that if the controller fails, all of
`the devices connected to it fail as well. Performance in a star is good for moderate
`amounts of traffic, but the size and capacity of the network varies according to the
`capability and expandability of the hub. Each controller has a limit to the number of
`devices that can be connected, so you'll need to add more controllers as your network
`grows.
`
`Chapter 5 Topology-The Shape of Your Network
`
`75
`
`PETITIONERS Ex. 1019, part 1, p. 14
`
`
`
`The ring
`
`There are several kinds of ring topologies possible on a local area network, including true
`rings, loops, and star-wired rings. In a true ring, devices are connected in a closed circle,
`with each device wired directly to the next by means of the shortest physical path. Control
`is distributed, with messages traveling automatically from one device to the next. A loop
`looks the same as a true ring; the difference is that there is a controller directing
`transmissions on the network. A star-wired ring, which is the topology popularized by
`IBM and used in Token Ring networks, transmits data like a ring, but is shaped like a star.
`As shown in the following figure, each device on the star-wired ring is connected to a
`central wiring concentrator called a multistation access unit (MAU). A number of
`MAUs can be interconnected to form the main ring of a network. All information must
`travel through the central MAU, but, unlike star networks, this central point does not
`control network transmissions.
`Ring networks usually use token passing to control access to the network. A special
`sequence of data representing the token is passed around the ring from device to device.
`When a device is holding the token, it has sole access to the cable and can transmit
`freely without risk of collision. To accept messages, each device must be able to
`recognize its own address. If the receiving device is the intended destination, it accepts
`the message; otherwise, it resends the message on to the next device in the ring.
`
`76 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 15
`
`
`
`The star-wired ring has several advantages. For one, it is extremely reliable and easy
`to maintain. The MAU contains automatic bypass relays that enable the ring to continue
`operating even if a device on the ring fails. The MAU also facilitates maintenance by
`providing a central location for monitoring and reconfiguration. Another plus is that
`every device is guaranteed a chance to transmit within a certain period of time(cid:173)
`regardless of how busy the network is-so the ring is ideal in situations where network
`response characteristics must be guaranteed. For example, the ring is useful for real-time
`applications such as process control and medical monitoring.
`On the minus side, star-wired rings can be difficult to install. In addition, the costs for
`the MAU and for installing the star-wired ring can be quite high and beyond the means
`of a budget for a small network.
`
`Combining topologies in an internet
`
`In an organization with several connected networks, it's common to encounter a mix of
`different topologies. For example, one network might be connected to an IBM
`mainframe through a ring, another network may be set up as a star to take advantage of
`existing telephone wire, while a third network might be designed as a bus. These
`different topologies are connected together by using routers, which are discussed in
`Chapter 7. An example internet combining different topologies is shown in the following
`figure.
`
`Chapter 5 Topology-The Shape of Your Network
`
`77
`
`PETITIONERS Ex. 1019, part 1, p. 16
`
`
`
`An internet combining different topologies
`
`.
`
`• ' Bus
`
`• • •
`
`Conclusion
`
`Because the topology of your AppleTalk network will often depend on the network type
`and media you choose, topology probably won't be the overriding criterion in planning
`your network. However, by becoming familiar with the characteristics of each topology,
`you will know what to expect during installation and when you need to reconfigure or
`troubleshoot the network later on. Each topology has inherent strengths and
`weaknesses, summarized in Table 5-1.
`
`78 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 17
`
`
`
`Table 5-1 A comparison of network topologies
`
`Features
`
`Bus
`
`Star
`
`Star-wired ring
`
`Uses
`
`Ideal for small networks.
`
`Ease of maintenance and
`troubleshooting.
`
`Performance
`
`Excellent under light loads;
`may degrade rapidly if load
`reaches saturation point.
`
`Good for moderate activity.
`Performance depends on the
`capability of the central controller.
`
`A good choice for applications
`that require predictable
`network response. Part of
`IBM's Systems Application
`Architecture (SAA).
`Less delay under heavy
`network load than other
`topologies. Under light to
`moderate loads, delays can be
`longer than other topologies.
`Very reliable. The failure of
`one device does not affect the
`rest of the network.
`
`Easy to add or move devices
`without disruption.
`
`Chapter 5 Topology-The Shape of Your Network
`
`79
`
`Reliability
`
`Failure of one device does not
`affect the rest of the network.
`However, a Single break can
`disrupt the network.
`
`Ease of adding and
`moving devices
`
`Easy to add or move devices.
`May cause network disruption.
`
`Failure of one device does not
`affect the rest of the network.
`However, in an active star, if the
`controller fails, the entire network
`goes down.
`Easy to reconfigure the network
`if wire already exists in offices.
`Adding or removing devices is not
`disruptive.
`Ease of maintenance Becomes more difficult as the
`Easy. Because devices do not share Generally easy. The MAU
`and troubleshooting
`network grows. Problems can be a Single cable, it is fairly easy to
`provides a central point for
`hard to locate, but are usually
`isolate faulty cables and devices.
`monitoring.
`easy to repair.
`
`PETITIONERS Ex. 1019, part 1, p. 18
`
`
`
`AppleTalk over Ethernet: EtherTalk
`AppleTalk protocols can operate on industry-standard Ethernet technology, supporting
`the 802.3 standard defined by the IEEE (Institute of Electrical and Electronic
`Engineers). Ethernet can use a variety of media, transmitting data at 10 megabits per
`second (Mbps). It is useful for networks that carry heavy traffic; for example, in work
`environments that have many users or that transfer large files (such as CAD files or other
`files that include graphics or color), have multi-user database activity, or where
`applications are typically launched from a file server. Ethernet is also used in
`environments that require very quick response times.
`You can connect most Macintosh computers to an Ethernet network by installing
`EtherTalk software and an interface card (such as the Apple Ethernet NB Card or Apple
`Ethernet LC Card) in each computer, or by using an external SCSI box. You can connect
`LaserWriter printers to an Ethernet network by using a product such as EtherPrint (Dayna
`Communications).
`An Ethernet network can be set up in various ways. Using thin coaxial cable, you can
`easily connect devices in a bus topology. Ethernet also enables you to connect devices
`using unshielded, twisted-pair cable (telephone wire), laying out devices in a star(cid:173)
`shaped design. In addition, an Ethernet network often functions as a high-speed
`backbone-using thick coaxial or fiber-optic cable-to connect several LocalTalk
`networks by means of a router. (See the following figure.) Using Ethernet as a backbone
`and placing heavily-used devices on the backbone improves access to these devices.
`
`Chapter 6 Network Types
`
`87
`
`PETITIONERS Ex. 1019, part 1, p. 19
`
`
`
`Ethernet can seroe as a backbone,
`improving access to heavily used shared
`devices such as file seroers.
`
`LocalTalk
`network
`
`Ethernet
`••• backbone
`
`server
`
`network
`
`Devices using EtherTalk software can also c<;>rnmunicate over the same Ethernet
`cable with devices obeying non-AppleTalk protocols, such as TCP/IP and DECnet. This
`means that, with the appropriate software installed (such as MacTCP®), Ethernet users
`can communicate with non-AppleTalk devices, such as Sun workstations, and take
`advantage of non-AppleTalk network services, such as those on a DECnet network, as
`shown in the following illustration.
`
`88 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 20
`
`
`
`Macintosh computers can communicate over
`an Ethernet network with non-AppleTalk devices.
`
`~ Sun workstation using
`
`TCP l IP protocols
`
`"Ethernet
`
`Macintosh computer using
`AppleTalk, TCP/IP, and
`DECnet protocols
`
`The Apple Ethernet Cable System
`The Apple Ethernet Cable System is a family of products from Apple Computer that
`provides connectivity to Ethernet networks. This family of products combines the
`modular ease-of-use familiar to LocalTalk users with the high performance and
`extensibility of Ethernet networks. All Apple Ethernet products conform to the IEEE
`802.3 standard for Ethernet, so they work with Ethernet products from other vendors.
`Apple Ethernet media adapters, shown in the following figure, allow you to connect
`to any standard Ethernet cable system through the Apple Ethernet port. This port is a
`universal connection point provided for your computer through the installation of an
`interface card, such as the Apple Ethernet NB Card or Apple Ethernet LC Card. Because
`Apple Ethernet separates the transceiver from the interface card, you can use the
`appropriate media adapter to switch cable systems without having to replace your
`interface card.
`
`Chapter 6 Network Types
`
`89
`
`PETITIONERS Ex. 1019, part 1, p. 21
`
`
`
`Apple Ethernet media adapters
`
`Apple Ethernet
`Thin Coax Transceiver
`
`Apple Ethernet
`AU! Adapter
`
`Apple Ethernet
`Twisted-Pair Transceiver
`
`Thin coax cable systems Jar Ethernet
`The Apple Ethernet Thin Coax Transceiver connects computers and peripheral devices
`equipped with Apple Ethernet ports to a thin coaxial cable Ethernet network.
`The Apple Ethernet Thin Coax Transceiver kit consists of an external transceiver with
`an Apple Ethernet connector. The kit also includes a 2-meter length of self-terminating
`cable, which you can use to connect to another transceiver on the network. (You can
`also purchase cable in 5-meter lengths and 13-meter lengths to connect devices over
`longer distances.)
`The Apple Ethernet Thin Coax Transceiver brings the plug-and-play approach of
`LocalTalk to thin coax networks. By providing a Thin Coax Transceiver for each device,
`you can quickly build your own network. You simply connect the network cable to the
`transceiver and plug the transceiver into a device's Apple Ethernet port. To extend the
`network, you connect a transceiver to the new device, then use the 2-meter cable to
`attach to another transceiver already on the network.
`
`90 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 22
`
`
`
`Both the Apple Ethernet Thin Coax Transceiver and Apple Ethernet cable are self(cid:173)
`terminating, unlike traditional Ethernet hardware. This means that if a cable becomes
`disconnected for any reason, both halves of the network will remain functional
`(although the separated networks won't be able to communicate with one another until
`the cable is reconnected).
`In addition to creating a network with all Apple Ethernet components, you can use
`the Apple Ethernet Thin Coax Transceiver to add devices to existing installations. The
`transceiver works with any standard thin coax cable system.
`
`Apple Ethernet Thin Coax cable system
`A true "plug-and-play" Ethernet network
`
`Apple Ethernet
`Thin Coax Transceiver
`,-----------.
`- - - - - - - - - - - .
`,
`,
`,
`,
`,
`,
`,
`'
`
`,
`
`~
`
`Q
`
`...
`
`~
`
`~
`
`""'Apple Ethernet
`2-meter cable
`
`Chapter 6 Network Types
`
`91
`
`PETITIONERS Ex. 1019, part 1, p. 23
`
`
`
`TWisted-pair cable systems for Ethernet
`The Apple Ethernet Twisted-Pair Transceiver connects computers and peripheral devices
`equipped with Apple Ethernet ports to a twisted-pair Ethernet network. The transceiver
`conforms to the IEEE 802.3 lOBASE-T standard for implementing Ethernet over
`unshielded twisted-pair cable.
`Ethernet cable systems that use unshielded twisted-pair cable are arranged in a star
`topology and can take advantage of existing telephone wires that radiate out to work
`spaces from a central controlling hub. Because the Apple Ethernet Twisted-Pair
`Transceiver fully supports the lOBASE-T standard, it can be used with any vendor's
`10BASE-T hub.
`
`Ethernet twisted-pair cable system
`
`Central controller
`
`Apple Ethernet
`Twisted-Pair Transceiver
`
`92 Part 2 Planning Your Network
`
`PETITIONERS Ex. 1019, part 1, p. 24