Troubleshooting Macintosh Networks

Total Page:16

File Type:pdf, Size:1020Kb

Troubleshooting Macintosh Networks Troubleshooting Macintosh Networks Kurt VanderSluis The Network Group, Inc. Table of Contents Introduction..................................................................................................... 1 A World of Abstraction........................................................................................................................1 Using your Pre-Computer Expertise to Overcome the Difficulty.................................................1 Read and Learn Both Practice and Theory......................................................................................2 Troubleshooting Requires a Willingness To Be Both Impulsive and Methodical.....................3 Overcoming the Difficulty—Using this Book...................................................................................3 Two Ways to Read the Book..............................................................................................................4 What If This Book Doesn’t Have the Specific Example I Need?................................................4 The Layout of the Chapters.............................................................................................................5 Troubleshooting Preview.............................................................................. 6 Troubleshooting Requirement 1: The Normal Network................................................................6 Troubleshooting Requirement 2: Tools.............................................................................................7 Troubleshooting Requirement 3: Understanding..........................................................................7 Troubleshooting Algorithms..............................................................................................................8 Random Troubleshooting................................................................................................................8 Hunch-based Troubleshooting.......................................................................................................8 Setup-Oriented Troubleshooting....................................................................................................9 Layer-Oriented Troubleshooting.................................................................................................10 Process-Oriented Troubleshooting..............................................................................................11 Choosing the Best Troubleshooting Mode..................................................................................12 Summary..............................................................................................................................................13 Network Concepts for Troubleshooters...................................................14 Layered Protocols...............................................................................................................................15 Functions of the Layers.................................................................................................................16 Network Addressing...........................................................................................................................17 Group and Individual Addressing................................................................................................17 Hardware and Protocol Addresses................................................................................................18 AppleTalk Addresses and Ethernet Addresses...........................................................................19 Address Numbering Systems........................................................................................................19 Address Fields..................................................................................................................................20 Broadcast and Multicast Addresses..............................................................................................20 AppleTalk Addressing........................................................................................................................21 Network Address.............................................................................................................................21 Extended Networks..........................................................................................................................22 Network Numbers...........................................................................................................................23 Node Address....................................................................................................................................23 Node Address Numbers...................................................................................................................24 Duplicate Node Addresses..............................................................................................................24 Node Addresses in Extended Networks........................................................................................24 Socket Addresses.............................................................................................................................25 Socket Numbers...............................................................................................................................25 Network Relationships......................................................................................................................25 Control of the Relationship—Client-Server and Peer-to-Peer...............................................25 Configuration of Computing Elements.......................................................................................26 Flow Limitations—Finding the Bottleneck..................................................................................28 i TROUBLESHOOTING MACINTOSH NETWORKS Speed Factors...................................................................................................................................28 Effect of Errors................................................................................................................................29 Loss of Connection..........................................................................................................................29 An Example of a Client-Server Relationship.................................................................................30 An Example of a Peer-to-Peer Relationship..................................................................................31 Signaling and Transmission.............................................................................................................31 Network Transmission Theory.........................................................................................................32 Signals Decay over Distance.........................................................................................................32 Loss of Power...................................................................................................................................32 Frequency Distortion.....................................................................................................................32 Reflections.......................................................................................................................................33 Electrical Noise................................................................................................................................33 Network Bandwidth and Utilization................................................................................................34 Calculating Bandwidth...................................................................................................................35 The Effect of Packet Size................................................................................................................36 LocalTalk Bandwidth-Calculation # 1.........................................................................................37 LocalTalk Bandwidth-Calculation # 2.........................................................................................37 Utilization—Using a Stopwatch.....................................................................................................38 Utilization-Calculation #1.............................................................................................................39 Utilization With PacketCrunch....................................................................................................39 Utilization With NetStats................................................................................................................41 Summary..........................................................................................................................................42 Setup Troubleshooting................................................................................43 Troubleshooting LocalTalk Setups: General Information...........................................................44 The Relationship Between Design and Troubleshooting........................................................45 Conceptualizing the LocalTalk Setup..............................................................................................46 The LocalTalk Connector...............................................................................................................46
Recommended publications
  • 09/10 Ed IPP Price List
    Apple Computer, Inc. Apple Education Individual Purchase Program Price List September 10, 2002 For details on the Apple Education Individual Purchase Program, customers may visit our web site at <http://www.apple.com/education > or call 1-800-780-5009 (Specific eligibility rules apply). All pricing includes 5 day ground shipping. Local sales tax applies to all orders. iBook™ All iBook models are equipped with a PowerPC G3 processor, 12.1" TFT or 14.1" TFT display and either a CD-ROM or DVD-ROM/CD-RW combo optical drive. iBook includes two USB ports, a FireWire port, VGA video out,16-bit CD-quality stereo output and two built in stereo speakers. Built-in communications include 10/100 Base-T Ethernet, 56K modem with v.90 support and built-in antennas and internal AirPort Card slot for optional wireless networking capability. All systems come with both Mac OS 9 and OS X installed. For more detailed information, please refer to product data sheets or the iBook web site (http://www.Apple.com/iBook). Bundled software includes: iMovie, iTunes, AppleWorks, Internet Explorer, Outlook Express, Netscape Communicator, Adobe Acrobat Reader, FAXstf, AOL Instant Messenger (preview), WORLD BOOK Mac OS X Edition and Otto Matic game software. Apple offers build-to-order capability for the iBook products listed below. To take advantage of this capability, visit the Apple Store at http://www.apple.com/store M8600LL/A iBook (12.1"TFT/600MHz/512K L2/128MB/20GB/CD-ROM/VGA-out/Enet/56K/Mac OS X) 1149.00 M8602LL/A iBook (12.1"TFT/700MHz/512K L2/128MB/20GB/DVD-ROM/CD-RW Combo drive/VGA-out/Enet/56K/Mac OS X) 1449.00 M8603LL/A iBook (14.1"TFT/700MHz/512K L2/256MB/30GB/DVD-ROM/CD-RW Combo drive/VGA-out/Enet/56K/Mac OS X) 1749.00 iMac™ With iMac you have a choice of models that feature either a PowerPC G4 processor and Flat Panel display or PowerPC G3 processor and CRT display.
    [Show full text]
  • Designing PCI Cards and Drivers for Power Macintosh Computers
    Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages.
    [Show full text]
  • Macintosh Ilsi Overview
    Macintosh Ils i Overview The Apple® Macintosh" Hsi is the lowest­ amount of dynamic random-access such as printers, scanners, and CD-ROM cost member of the Macintosh II line, memory (DRAM) through a new feature, disc drives, as well as access the built-in Apple Computer's most powetfulline of virtual memory. networking capabilities foundin all Macintosh personal computers. Offering The Macintosh Hsi comes with built-in Macintosh computers. high performance and a wide range of support forfour Apple monitors as well One exciting new Macintosh advance­ expansion and video options, the as third-party monitors, so you can ment incorporated into the Macintosh Hsi Macintosh Hsi is ideal forpeople who choose the monitor that best suits your is sound input. The Macintosh Hsi comes need a powetfulbut very affordable needs-then simply plug it in. In addi­ with a microphone and phono jack Macintosh system that can easily grow tion, by adding a video expansion card, adapter, which let you input your voice with their needs over time. you can use any other Apple or third­ into documents, presentations, and even Like other Macintosh II systems, the partymonitor with the Macintosh Hsi. electronic mail messages. Macintosh Hsi offersexcellent perfor­ The Macintosh Hsi can be easily Best of all, the Macintosh Hsi provides mance. At the heart of the Macintosh Hsi expanded to incorporate new capabilities all of the important benefitsfor which is a 20-megahertz 68030 microprocessor or increase system performance. An inter­ the Macintosh is known-powetfultech­
    [Show full text]
  • A/UX® 2.0 Release Notes
    A/UX® 2.0 Release Notes 031-0117 • APPLE COMPUTER, INC. © 1990, Apple Computer, Inc. All UNIX is a registered trademark of rights reserved. AT&T Information Systems. Portions of this document have been Simultaneously published in the previously copyrighted by AT&T United States and Canada. Information Systems and the Regents of the University of California, and are reproduced with permission. Under the copyright laws, this document may not be copied, in whole or part, without the written consent of Apple. The same proprietary and copyright notices must be afftxed to any permitted copies as were afftxed to the original. Under the law, copying includes translating into another language or format. The Apple logo is a registered trademark of Apple Computer, Inc. Use of the "keyboard" Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple Computer, Inc. 20525 Mariani Ave. Cupertino, California 95014 (408) 996-1010 Apple, the Apple logo, AppleShare, AppleTalk, A/UX, ImageWriter, LaserWriter, LocalTalk, Macintosh, Multifmder, and MacTCP are registered trademarks of Apple Computer, Inc. Apple Desktop Bus, EtherTalk, Finder, and MacX are trademarks of Apple Computer, Inc. Motorola is a registered trademark of Motorola, Inc. POSTSCRIPT is a registered trademark of Adobe Systems, Inc. 031-0117 UMITED WARRANTY ON MEDIA Even though Apple has reviewed this AND REPLACEMENT manual, APPLE MAKES NO WARRANTY OR REPRESENTATION, If you discover physical defects in the EITHER EXPRESS OR IMPLIED, manual or in the media on which a WITH RESPECI' TO THIS MANUAL, software product is distributed, Apple ITS QUAll1Y, ACCURACY, will replace the media or manual at MERCHANTABILITY, OR FITNESS no charge to you provided you return FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Accessionindex: TCD-SCSS-T.20170830.010 Accession Date: 30-Aug-2017 Accession By: Hans-Jurgen Kugler Object Name: Apple Newton M
    AccessionIndex: TCD-SCSS-T.20170830.010 Accession Date: 30-Aug-2017 Accession By: Hans-Jurgen Kugler Object name: Apple Newton MessagePad 2000 Vintage: c.1997 Synopsis: Apple personal digital assistant (PDA) with handwriting recognition, plus keyboard and power supply, Model: H0149, S/N: ????. Description: The Apple Newton was introduced in Aug-1993 after a 6-year gestation that also involved gestation of the company Advanced RISC Machines (ARM). It began with ambitious goals but eventually was re-imagined as a personal digital assistant (PDA). Similar devices had existed for a decade, for example the Psion Organiser was introduced in 1984, but they were not called PDAs. Not only did the Newton introduce the term PDA, but it also became the first such device to feature handwriting recognition. The Newton was championed by John Sculley, and then discontinued by his rival Steve Jobs in 1998 after the latter rejoined Apple. It is very likely that the concept led directly to the iPad and iPhone. An operating system, NewtonOS , and a language, NewtonScript , were invented for it, with garbage collection, soup storage and user-interface toolkit, specifically tuned for designs with large ROM and small RAM capacities. The original Newton MessagePad (Model H1000 or Junior ) had a 20MHz ARM 610 CPU, 4MB of ROM, 640kB of RAM, a 336 x 240 monochrome display, RS422 serial and LocalTalk interfaces, and SHARP ASK infrared communications. It also had one PCMCIA-II slot (5V or 12V). It ran NewtonOS versions 1.0-1.11, and it could be powered either from four internal AAA or NiCd rechargeable batteries or an external power supply.
    [Show full text]
  • The Networker's Guide to Appletalk, IPX, and Netbios
    03 9777 CH03 5/21/01 3:42 PM Page 85 3 The Networker’s Guide to AppleTalk, IPX, and NetBIOS UNTIL THE EARLY 1990S,TCP/IP WAS REALLY ONLY PREVALENT in large govern- ment and research facilities where UNIX and other supercomputing operating systems used it as a common network communications protocol.When PCs came into the picture, they were not networked. Rather, they were used either as front-ends to big micro or mainframe systems (IBM was a big fan of this approach) or as standalone sys- tems. In the early 1980s, as PCs grew in number and in performance, three strategies emerged to provide PCs with networking services:AppleTalk, Novell NetWare, and IBM’s NetBIOS. The goal of this chapter is to give you an understanding of the various protocols that make up the protocol suites and the roles they perform. It is not intended to explain how to design, set up, and manage a network. Chapter 7,“Introduction to Cisco Routers,” and Chapter 10,“Configuring IP Routing Protocols on Cisco Routers,” discuss configuration issues for these protocols. Because NetBIOS is a ses- sion layer protocol rather than a protocol suite, it will be described in the context of its operational behaviors at the end of this chapter. 03 9777 CH03 5/21/01 3:42 PM Page 86 86 Chapter 3 The Networker’s Guide to AppleTalk, IPX, and NetBIOS AppleTalk AppleTalk was an outgrowth of the Apple Macintosh computing platform. First intro- duced in 1984 and updated in 1989, it was designed to provide the Macintosh with a cohesive distributed client/server networking environment.AppleTalk,
    [Show full text]
  • The Wireless Networking Starter Kit, Second Edition
    TheWireless Starter Kit Second Edition The practical guide to Wi-Fi networks for Windows2 and Macintosh By Adam Engst and Glenn Fleishman Peachpit Press Index 64-bit WEP standard, 299 Linksys BEFW11S4 gateway, 802.15.1-2002 standard, 36 195–201 # 802.3 standard, 444 long-range connections, 397 104-bit WEP, 298, 299 802.15 standard, 36. See also Blue- overview, 10, 12–13 128-bit WEP, 299 tooth packet overhead, 12 10Base-2 cable, 445 802.15.4 standard, 36 throughput, 10, 12 10Base-5 cable, 444 802.16 standard, 46–47 Wi-Fi certification, 11 10Base-T cable, 445–446 802.11 standards, history of wire- wireless gateway support, 178–179 100Base-T cable, 446, 448 less networking, 9–10 802.11d standard, 44, 46 1000Base-T cable, 448–449 802.16 (WiMax), 46–47 802.11e standard, 43, 44 1xRTT (Radio Transmission 802.11 Wireless Networks: The 802.11f standard, 44 Technology), 2.5G networks, 41 Definitive Guide, xxi 802.11g standard and networks 2.4 GHz band 802.15.3a standard, 36, 53 channels, 18 802.11b standard, 12 802.11a standard and networks compatibility among standards, 10, Bluetooth, 35–38 channels, 14 15, 17–18, 178–179 Fresnel zone, 431 compatibility among standards, 10, determining need for, 178–179 and solid objects, 5 15, 178–179 frame bursting technology, 16–17 troubleshooting interference, 274 cost of equipment, 15 history of wireless networking, 9, unlicensed frequencies, 4 determining need for, 178–179 ixx Wireless MAN (Wireless FCC regulations, 430 interference, avoiding and trouble- Metropolitan Area Networking) history of wireless networking,
    [Show full text]
  • Gestalt Manager 1
    CHAPTER 1 Gestalt Manager 1 This chapter describes how you can use the Gestalt Manager and other system software facilities to investigate the operating environment. You need to know about the 1 operating environment if your application takes advantage of hardware (such as a Gestalt Manager floating-point unit) or software (such as Color QuickDraw) that is not available on all Macintosh computers. You can also use the Gestalt Manager to inform the Operating System that your software is present and to find out about other software registered with the Gestalt Manager. The Gestalt Manager is available in system software versions 6.0.4 and later. The MPW software development system and some other development environments supply code that allows you to use the Gestalt Manager on earlier system software versions; check the documentation provided with your development system. In system software versions earlier than 6.0.4, you can retrieve a limited description of the operating environment with the SysEnvirons function, also described in this chapter. You need to read this chapter if you take advantage of specific hardware or software features that may not be present on all versions of the Macintosh, or if you wish to inform other software that your software is present in the operating environment. This chapter describes how the Gestalt Manager works and then explains how you can ■ determine whether the Gestalt Manager is available ■ call the Gestalt function to investigate the operating environment ■ make information about your own hardware or software available to other applications ■ retrieve a limited description of the operating environment even if the Gestalt Manager is not available About the Gestalt Manager 1 The Macintosh family of computers includes models that use a number of different processors, some accompanied by a floating-point unit (FPU) or memory management unit (MMU).
    [Show full text]
  • Cisco IOS Appletalk Configuration Guide Release 12.4
    Cisco IOS AppleTalk Configuration Guide Release 12.4 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7817505= Text Part Number: 78-17505-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • From 128K to Quadra: Model by Model
    Chapter 12 From 128K to Quadra: Model by Model IN THIS CHAPTER: I What the specs mean I The specs for every Mac model ever made I Secrets of the pre-PowerPC Mac models I Just how much your Mac has devalued Yes, we’ve already been told that we’re nuts to attempt the next two chapters of this book. Since 1984, Apple has created more than 140 different Mac models — including 35 different PowerBooks and 53 different Performas! Each year, Apple piles on another dozen or so new models. By the time you finish reading this page, another Performa model probably will have been born. So, writing a couple of chapters that are supposed to describe every model is an exercise in futility. But we’re going to attempt it anyway, taking the models one by one and tracking their speeds, specs, and life cycles. This chapter will cover all the Apple Macs — both desktop and portable models — from the birth of the original Macintosh 128K to the release of the PowerBook 190, the last Mac ever made that was based on Motorola’s 68000-series processor chip. When you’re finished reading this chapter, you will be one of the few people on Earth who actually knows the difference between a Performa 550, 560, 575, 577, 578, 580, and 588. 375 376 Part II: Secrets of the Machine Chapter 13 will cover every Power Mac — or, more accurately, every PowerPC-based machine (those with four-digit model numbers) — from the first ones released in 1994 to the models released just minutes before this book was printed.
    [Show full text]
  • Local Infrastructures for School Networking: Current Models and Prospects
    DOCUMENT RESUME ED 349 957 IR 015 693 AUTHOR Newman, Denis; And Others _TITLE Local Infrastructures for School Networking: Current Models and Prospects. Technical Report No. 22. INSTITUTION Center for Technology in Education, New York, NY. SPONS AGENCY Department of Education, Washington, DC.; National Science Foundation, Washington, D.C. PUB DATE May 92 CONTRACT 1-135562167-Al; MDR-9154006 NOTE 30p. PUB TYPE Information Analyses (070) Viewpoints (Opinion/Position Papers, Essays, etc.) (120) EDRS PRICE MF01/PCO" Plus Postage. DESCRIPTORS Communications; Comparative Analysis; *Computer Networks; Educational Change; Educational Technology; Elementary Secondary Education; *Futures (of Society); Information Networks; *Local Area Networks; Microcomputers; *Models; *Telecommunications IDENTIFIERS *Wide Area Networks ABSTRACT This paper identifies a paradigm shift that must take place in school networking. The ultimate goal is to retool the schools with a local technical infrastructure that gives teachersand students immediate access to communication systems andinformation resources, thereby supporting the implementation of advancesin pedagogy and educational technology. The current notionof telecomputing cannot address the information requirements locally within the school and, ultimately, will fragment and inhibit any move toward universal access to information resources. A technologyis needed that combines local and wide area networking(LAN and WAN), making access to remote resources part of the everyday work with school computers. This report contains the following sections: (1) The Problem: Combining Local and Wide Area Communication--facts about the current state of school networks and the dissociation of school LANs and WANs;(2) A Brief History of Network Technology;(3) A Convergence of School LAN's and WAN's--integrating and simplifying a school internetwork;(4) Current Models of School LAN-WAN Connectivity--a comparison of six models; and (5) Prospects for the Future.
    [Show full text]
  • Powerbook 140/170
    ® Macintosh PowerBook 140 and Macintosh PowerBook 170 Developer Note ® Developer Note Developer Technical Publications © Apple Computer, Inc. 1991 APPLE COMPUTER, INC. © 1991, Apple Computer, trademarks of International Typeface Corporation. IN NO EVENT WILL Inc. APPLE BE LIABLE FOR All rights reserved. MacDraw is a registered DIRECT, INDIRECT, No part of this publication trademark of Claris SPECIAL, INCIDENTAL, may be reproduced, stored in Corporation. OR CONSEQUENTIAL DAMAGES RESULTING a retrieval system, or Microsoft is a registered transmitted, in any form or FROM ANY DEFECT OR trademark of Microsoft INACCURACY IN THIS by any means, mechanical, Corporation. electronic, photocopying, MANUAL, even if advised recording, or otherwise, LIMITED WARRANTY ON of the possibility of such without prior written MEDIA AND damages. permission of Apple REPLACEMENT THE WARRANTY AND Computer, Inc. Printed in the REMEDIES SET FORTH United States of America. If you discover physical defects in the manual or in ABOVE ARE EXCLUSIVE The Apple logo is a the media on which a AND IN LIEU OF ALL registered trademark of software product is OTHERS, ORAL OR Apple Computer, Inc. Use of distributed, APDA will WRITTEN, EXPRESS OR the “keyboard” Apple logo replace the media or IMPLIED. No Apple (Option-Shift-K) for manual at no charge to you dealer, agent, or employee commercial purposes without provided you return the is authorized to make any the prior written consent of item to be replaced with modification, extension, or Apple may constitute proof of purchase to APDA. addition to this warranty. trademark infringement and Some states do not allow unfair competition in ALL IMPLIED WARRANTIES ON THIS the exclusion or limitation violation of federal and of implied warranties or state laws.
    [Show full text]