Sie sind auf Seite 1von 6

[Previous] [Next]

Y Y2K Also called the year 2000 problem or the millennium bug (even though it is not actually a bug), a computer problem that was expected to affect older hardware and software on January 1, 2000. Similar problems were expected to arise on related dates, particularly September 9, 1999, and February 28, 2000. How It Works The Y2K problem had the potential to affect hardware, operating systems, applications, run-time libraries, date-sensitive documents, data interfaces, and almost all other aspects of the computing environment. Potential Y2K problems arose from three primary sources:

Until recently, most software (and the BIOS on most PCs manufactured before about 1996) had been written to store date information in a format that uses only the last two digits of a year to represent the year. For example, the year 1960 is internally represented as 60. This date representation issue is most commonly identified as the year 2000 problem because the year 2000 is represented internally as 00, which is the same as for 1900. Most older software does, in fact, interpret the internal date 00 as 1900 instead of 2000. The problem arises when calculations are performed using dates. For example, financial software might calculate that an employee born in 1954 is actually 00 - 54 = -54 years old in the year 2000, and this negative age could lead to such problems as missed paychecks or pension contributions. On a large scale, such problems could have disastrous social consequences. The year 2000 is a leap year because it is divisible by 4

, but some older software applications and hardware BIOS programs do not recognize this fact and, as a result, produce dates that are off by one day after February 28, 2000. Many older software applications use special dates to represent special situations. For example, many older COBOL applications give the date 9/9/99 a special meaning such as this item is to be saved forever or this item is to be deleted after 30 days. Such applications had the potential to produce unpredictable results after September 9 , 1999.

In the early days of programming, system and disk memory were expensive and had to be carefully optimized. Saving 2 bytes by representing the date 1954 internally as the two-digit number 54 yielded significant savings on a system with limited RAM. This type of good programming practice continued even into the mid-1990s. And even though early programmers were probably aware of potential Y2K problems, no one expected programs developed in the 1970s and 1980s to continue being used into the next millennium. An estimated 180 billion lines of COBOL code have been written for mainframe environments in business, industry, and government, and much if not most of this code had the potential to be affected by the Y2K problem. The problem was not limited to the mainframe arenait also affected server and desktop operating systems and applications on UNIX, Macintosh, and Microsoft Windows platforms, affecting hardware BIOS programming, operating systems, application software, custom code, macros, and data files. The problem was enormous in scope and well publicized. Government and public agencies, enterprise-level businesses, and software and hardware vendors have devoted extensive resources in recent years to ensure that systems functioned properly on and after January 1, 2000. NOTE

The most common PC hardware-related issues associated with Y2K related to the real-time clock (RTC) chip, which in most PCs uses only two digits to represent a year, and the BIOS routing, which is stored in flash ROM. If the BIOS did not contain code to roll over the century from 19xx to 20xx on January 1, 2000, the operating system would see the date 1900 when the user first turned on his or her PC in the year 2000. In some systems, this problem could be fixed with a BIOS upgrade, while other systems have had to be replaced with Y2K-compliant hardware. TIP Some experts might have advised you to test a systems hardware compliance for Y2K by setting the date to 11:59 p.m. on December 31, 1999, and observing what happened when the date rolled over. This approach might have been acceptable for testing certain kinds of desktop systems, but it could be extremely dangerous on a network server. For example, on a server that incorrectly rolled over its date, date-licensed software might have expired or administrators might have been locked out of the system. Y-connector A type of adapter that can be used to connect a single device or cable to two devices or cables. Examples of Y-connectors include the following:

RJ-11 Y-connector: Allows two or more telephone devices to be plugged into a single RJ-11 wall plate. Some vendors call these adapters modular coupler splitters. This arrangement allows only one of the devices to work at any given time.

SCSI Y-connector:

Allows a Small Computer Systems Interface (SCSI) device to be added to the middle of a chain of SCSI devices. A typical SCSI Y-connector has one 50-pin Centronics male connector and two 50-pin Centronics female connectors. One use for a SCSI Y-connector is the connection of a single RAID-5 SCSI array to two nodes of a cluster when Microsoft Cluster Server (MSCS), which is included in Microsoft Windows NT Server 4, Enterprise Edition, is used.

Graphic Y-1. A SCSI Y-connector. See also Y-splitter Y-splitter Also called a Y-cable, a type of cable adapter that is arranged in a Y-shaped formation and is used to connect one device to a pair of other devices. Examples of Y-splitters include the following:

PS/2 Y-splitter: Typically used to connect an external keyboard and mouse to a single PS/2 port on a laptop such as the IBM ThinkPad. This type of splitter typically has cables that are about 1 foot long.

Internal power Y-splitter: An adapter used inside a PC to connect additional internal drives to the internal power supply of the PC. This type of

splitter comes in various arrangements for connecting different combinations of hard drive, CD-ROM, and floppy drive.

Graphic Y-2. A PS/2 Y-splitter and an internal power Ysplitter.

External power Y-splitter: An adapter commonly used with high-end Ethernet switches to connect them to two redundant external power supplies. If one power supply fails, the other immediately takes over the load, and the failed power supply can be hot-swapped with a replacement.

RS-366 Y-splitter: Used for some videoconferencing systems running in dual port mode over Integrated Services Digital Network (ISDN) connections.

TIP PS/2 Y-splitters should use shielded cabling for best operation in noisy electrical environments. See also Y-connector

Das könnte Ihnen auch gefallen