Rockwell Automation 57C650 AutoMax Programming Executive Version 3.8 User Manual

Page 276

Advertising
background image

NĆ8

AutoMax Programming Executive Version 3.x

When another user is working at a lower level than the level you are trying to lock

(e.g., editing a task in the rack you are trying to transfer), the AutoMax system

must search for the lock file in order to identify the user who is blocking your lock.

If the offending lock is removed before it is found, it may not be possible to

identify the user. In this case, your lock would still fail and the message would

look something like the following:

Database Lock Time/Date Stamps

In order to create display screens for the user, various AutoMax applications read

information from the databases and store the information in memory. An example

is the rack diagram displayed by the Rack Configurator. In a network

environment, users A and B both might read RACK2 into memory. User B

modifies the information and writes his changes to the database (which releases

the lock) before user A attempts to also modify the rack. User A may then make

modifications based on old information. The result could undo user B's changes

or result in erroneous information. As long as user B was finished making his

changes and had written his changes to the database (released the lock) before

user A attempted to take the lock, the locking scheme alone would not prevent

problems.
For another example, suppose that user A has selected the Rack Configurator

and is viewing a 16Ćslot rack. User B then modifies the rack from a 16Ćslot rack to

a 10Ćslot rack using the Modify command on the Rack menu in the System

Configurator. User A then proceeds to add a module in slot 15, which is perfectly

valid according to the information he has in memory. The result is a module

assigned to a slot which no longer exists in the rack.
To avoid this problem, each lock has a time/date stamp that is updated every time

the lock is issued. Whenever data is read from the database, the time/date stamp

of the lock that protects that database will be saved. When changes are made to

the source copy, the lock covering the files will be taken. If the time and date

match the time/date stamp saved when the data was read, then no one else has

taken this lock and the files have not been changed. If the time or date on the

lock is more recent than the time/date stamp that was saved when the files were

Advertising