07 - Features of The ProSafe-RS
07 - Features of The ProSafe-RS
Workbench software
Figure 7-1
Figure 7-2
The numbers in the next paragraphs refer to the numbers in Figure 7-2.
1. Two options are available: the cover page and the table of contents
o Cover page:
It is possible to create a bitmap for the cover page. If you omit this then automatically
the Comment of the project, the directory name and the SCSddss name will be
printed.
2. If this option is not selected then all information (in Figure 7-2 balloon 3 and 4) will not be
printed
o The project can theoretically contain more then 1 configuration which can on its turn
contain more resources. All descriptions are the comments defined in the properties in
the workbench.
3. This option displays the configuration specific information.
Information like:
Figure 7-3
The Database Validity Check Tool checks the consistency between the three databases.
Of course is this procedure only useful if all three components have been connected to each other.
Figure 7-4
Figure 7-5
Figure 7-6
In practice:
You connect a new PC to the Vnet where the SCS is connected.
You can only get the information from the SCS if you have the Master Database on the new PC.
After this action you can use the Master Database Restoring Function to make the Work and Master
Database consistent with each other.
Figure 7-7
Version Control Tool manages the history of changes of SCS projects and assists the user with system
upgrading tasks. Version Control Tool allows saving project data of an SCS project at a certain point
with a version number (check-in) and restoring project data of a certain version (check-out).
The user can perform the following operations in Version Control Tool.
o Checking in project data
o Checking out project data
o Deleting versions
o Deleting all check-in data related to a project
o Viewing version information
Figure 7-8
Figure 7-9
2. If a new version control system has to be set up, the figure above doesn’t contain any
information (in the case above you see on the left side ‘All SCS projects’ and on the right side
the versions).
3. Create a Folder (preferably on another drive than where the RS projects are located).
This can be done by selecting Tools from the version control tool (a), b and c as shown in the
figure below.
4. Make sure that the folder where the RS projects (the work databases directory) are located
have been set as Shared.
This can be done as shown in the figure below. From Windows Explorer select the directory
where the RS projects are stored, click with right mouse button (a), select properties (b),
select the tab Sharing (c) and select the option “Share this folder”. Then select the tab
“Security” (d) and change the security for everyone to Allow
Figure 7-12
1. The following steps should be executed (see also the next figure):
a. Activate the Check-in button (or from the menu edit -> check-in)
b. File in the pop-up menu. The version number can also be changed.
c. Press the Check-in button
d. The result will be a generated version (e). Errors will be displayed in the message
area (f)
Figure 7-13
1. Versions which have been checked-in (from Work -> storage) can be checked-out (from storage -
> work). Use the next figure for activating the check-out procedure.
a. Activate the Check-out button (or select from the menu edit -> check-out)
b. Select from the Version control Tool the version you want to check-out (restore to the
work database)
c. Select a Project Folder (or select “Other Folder” with the Browse option).
o If you select “Project Folder” then this folder will have the same structure as
the structure in version you want to restore (check-out). Actually the folder
will be cleared before check-out.
If you select “Other Folder” then a Merge of folders will occur. Files which
have the same names will be overwritten.
Note:
o If you create a new folder, please remember that folder names should not
contain spaces. Not correct is: My Documents
d. After pressing OK two messages (e) will be appear after each other. This is to warn you
that certain files will be overwritten.
e. Watch the Message window for errors.
If the Analyzer detects such a situation it will report this. If this has been done unintentionally, the
application logic must be modified. Make changes to the application logic, perform a build operation
and then analyze the application logic with Integrity Analyzer again.
If there is a program that intentionally makes use of functions normally prohibited from use in terms
of safety, you can approve their use. (Of course, such approval can only be made based on the
professional judgment of the engineer, who is presumed trained and qualified to make such judgment.
The Integrity Analyzer simply warns the engineer and requires that he must make specific approval
for such usage)
o Downloading to an SCS cannot be performed before the analysis by Integrity Analyzer and
Cross Reference Analyzer is approved (Cross Reference is explained in the next sub
paragraph).
o Simulation (virtual test on a PC without connection to a SCS) can be done without using the
Integrity Analyzer, although bypassing the Integrity Analyzer is not recommended.
Figure 7-15
Figure 7-16
3. If the Integrity Analyzer does not find any errors it will respond a screen similar to the figure
below. You can unfold the SCS0102 to see details.
Figure 7-17
Figure 7-18
Figure 7-19
6. You can only continue with a warning if you authorize it. Authorizing can be done by selecting
Figure 7-20
7. After clicking the option in the list above the system will respond with a list of Non-compliances
which are acknowledged. If it has been approved , the program can be downloaded.
Figure 7-21
If unintended program changes or dependencies are evident, the application logic must be re-
modified. Modify the application logic, perform a build operation and then analyze the application
logic with Cross Reference Analyzer again. If no program is found for retesting, retesting will not be
performed. However, since certain modifications on items may not be discovered as requiring
retesting, these modified items need to be tested accordingly.
o Downloading to an SCS cannot be performed before the analysis by Integrity Analyzer and
Cross Reference Analyzer is approved.
o Cross Reference Analyzer detects the differences between the application currently running in
an SCS and the application to be downloaded. It does not detect differences with an
application running in a virtual test. In a virtual test, it is possible to execute and test an
application logic on a PC without having to perform analysis by both analyzers.
Figure 7-22
Figure 7-23