Sei sulla pagina 1di 12

Installing and Operating Carrier

Software on Networks

Carrier Corporation

Software Systems Network

Manual Published .............................. 5/2002


First Revision ................................... 12/2002

Copyright  2002 Carrier Corporation


Table of Contents
1.0 Introduction ...............................................................................................................................................1
1.1 Quick Start.................................................................................................................................................2
1.1.1 Software Capabilities ......................................................................................................................2
1.1.2 Installing the Software ....................................................................................................................2
1.1.3 Running the Software......................................................................................................................3
1.1.4 Maintaining the Software ................................................................................................................3
1.2 Overview of Network Concepts ................................................................................................................3
1.2.1 Network Compatibility....................................................................................................................3
1.2.2 Client/Server ...................................................................................................................................4
1.2.3 Data Sharing....................................................................................................................................4
1.2.4 Program Sharing..............................................................................................................................5
1.2.5 Printer Sharing ................................................................................................................................5
1.3 Installing the Software on a Network........................................................................................................5
1.3.1 Identifying Data Sharing or Protection Goals .................................................................................5
1.3.2 Installing the Software ....................................................................................................................5
1.3.3 Assigning Privileges to Network Users ..........................................................................................6
1.4 Running the Software on a Network .........................................................................................................7
1.4.1 All Project Data Shared By All Users .............................................................................................7
1.4.2 Project Data for Each User Kept Private.........................................................................................7
1.4.3 Project Data Selectively Shared Among Users ...............................................................................8
1.5 Adding Users.............................................................................................................................................8
1.6 Removing Users ........................................................................................................................................9
1.7 Adding or Updating Programs ..................................................................................................................9
1.8 Uninstalling the Software from a Network ...............................................................................................9
1.8.1 Uninstalling an Individual Program ................................................................................................9
1.8.2 Uninstalling all Carrier Software ..................................................................................................10

i Installing and Operating Carrier Software on Networks


Installing and Operating Carrier Software on Networks

1.0 Introduction
This document provides information about installing and operating Carrier software on networked
computer systems.
Network capabilities depend on the type of software involved. Currently there are three types of Carrier
software in circulation: DOS-based, 16-bit Windows and 32-bit Windows. The software is steadily being
converted to the 32-bit Windows format, but in the interim some programs are still in a DOS-based or 16-
bit Windows format. Briefly:
• 32-bit Windows Software can be configured for network operation. The remainder of this manual
explains how to install, operate and maintain the 32-bit software on a network system. 32-bit
Windows software includes:
AHUBuilder v4.0 and later. Refrigerant Piping Design v4.0 and later
Air Terminal Selection v3.0 and later. RTUBuilder v1.0 and later.
Chiller System Optimizer v2.0 and later WSHP Builder v4.0 and later,
Commercial Split Systems v4.0 and later 19XR Evergreen ChillerBuilder v3.0 and later
Hourly Analysis Program v4.0 and later.
The discussion of networking 32-bit software begins with a summary:
• Quick Start (Section 1.1) - A concise summary of how to install and configure the software for
network operation.
The remaining sections of the manual provide greater detail on each subject involving 32-bit
Windows programs:
• Overview of Network Concepts (Section 1.2)
• Installing the Software on a Network (Section 1.3)
• Running the Software on a Network (Section 1.4
• Adding Users (Section 1.5)
• Removing Users (Section 1.6)
• Adding or Updating Programs (Section 1.7)
• Uninstalling Software from the Network (Section 1.8)
• 16-bit Windows Software should not be configured for network operation. The software uses
database files for data storage and these databases have not been configured for concurrent access.
Therefore, there is a danger that multiple users working with the same database file at the same time
on a network drive will corrupt or destroy information in the database file. Thus, our
recommendation against networking this software. 16-bit software includes:
Block Load v3.x Rooftop Packaged Units v6.x
Commercial Inve$t v1.x Unit Ventilator Selection v1.x
Nu-Fin Coil Selection v1.x 30 Series Chiller Selection v2.x

rev Dec. 2002 Page 1


Installing and Operating Carrier Software on Networks

• DOS-Based Software can be configured for network operation. Please refer to Chapter 9 of the
E20-II Guide to Operations or Electronic Catalog Guide to Operations manuals for complete
instructions. DOS software includes:
Duct Design v3.x Water Piping Design v3.x
DuctLINK v2.x 42 Series Fan Coil Selection v2.x
Engineering Economics v2.x 23XL Chiller Selection v2.x
HAP v3.x

1.1 Quick Start


This section provides a summary of the information found in the remainder of this manual. Use it to
quickly install and configure the software for network operation.

1.1.1 Software Capabilities


The Carrier software has the following capabilities in a network environment. For further details refer to
section 1.2.
• The software is network aware.
• It is not client/server software.
• It permits sharing of data among users.
• It does not permit concurrent access to data.
• It permits sharing of programs among users.
• It permits sharing of printers among users.

1.1.2 Installing the Software


The following procedure must be repeated for each workstation which is to have access to the software.
For further information refer to section 1.3.
1. Verify that the workstation meets minimum requirements for the software:
• Random Access Memory (RAM): At least 32 megabytes.
• Display Monitor: VGA with 800x600 resolution or higher with at least 256 colors..
• Operating System: Windows 95, Windows 98, Windows ME, Windows NT (service pack 4 or
higher), or Windows 2000.
• A CD-ROM drive.
2. Log in as the network administrator. On Windows NT and 2000 terminals, log in as the administrator
for the workstation. Make sure all other programs are closed.
3. Follow the installation instructions on the release sheet provided with the software to begin the
installation process.
4. Carrier Configuration Services is installed first.
• Specify the network server drive as the install drive.
• Supply the company name to appear on reports. (This is only required on first workstation and
only if no Carrier 32-bit Windows program was previously installed).
• Choose the desired operating mode for the software. For networks the applicable choices are
“Network - all data is private” and “Network - all data is shared”. (This is only required on first
workstation and only if no Carrier 32-bit Windows program was previously installed).
5. The particular Electronic Catalog or E20-II program is installed next.
6. You may be asked to reboot the workstation to activate Windows system components that were
installed. This completes the installation.

Page 2 rev Dec. 2002


Installing and Operating Carrier Software on Networks

7. Assign Read, Write, Create and Destroy file privileges to the \E20-II folder on the server drive and all
its subfolders. It is possible to be more selective about assigning file privileges if you wish. See
1.3.3 for details

1.1.3 Running the Software


Use the following procedure to run the software from a workstation. For further details refer to section
1.4.
1. Refer to instructions in the program release sheet for starting the program.
2. If you installed for “Network - all data is private” mode, a dialog will appear listing the ID for the
user. The first time the software is run, this user will be registered with the software as a user and a
private project index database will be created. All projects the user creates will be held private.
Other users may not see or use these projects.
If you installed for “Network - all data is shared” mode no such dialog appears at startup. Instead, all
projects are recorded in a common index database. Any user can see and use projects created by all
other users on the system.
3. Program operation begins.

1.1.4 Maintaining the Software


For information on:
1. Adding new users – see section 1.5.
2. Removing existing users – see section 1.6.
3. Adding or updating programs – see section 1.7.
4. Uninstalling programs – see section 1.8.

1.2 Overview of Network Concepts


This section provides an overview of the capabilities of the Carrier 32-bit Windows software in a network
environment. This information is often useful to network administrators planning for installation,
operation and maintenance of the software.
The network capabilities of the Carrier software can be summarized as follows:
• The software is “network aware”.
• The software is not client/server software.
• The software permits sharing of project data among network users, but does not permit concurrent
access to data.
• The software permits sharing of programs among network users.
• The software permits sharing of printers among users.
Each of these items is discussed in greater detail in the following sub-sections.

1.2.1 Network Compatibility


Software programs vary in their adaptability to the network computer environment. As a result, programs
are sometimes classified according to their level of network compatibility. Four common levels of
network compatibility are listed below. Carrier software is classified as level #3, “network aware”.
1. Network Hostile: Programs which were not designed for network operation. These programs tend to
be very difficult to adapt to the network environment.
2. Network Compatible: Programs which were not designed for network operation, but can be adapted
to operate in a network environment. While the software is ignorant of the presence of the network,
its operating behavior does not violate network operating rules and permits some of the beneficial
features of the network environment to be used.

rev Dec. 2002 Page 3


Installing and Operating Carrier Software on Networks

3. Network Aware: Programs which are designed to detect the presence of the network and make
active use of networking features. These programs provide added benefits to the user beyond those of
a network compatible program and reduce the maintenance work required of network administrators.
4. Network Dependent: Programs which are designed exclusively for network operation and must be
installed on a network. These programs tend to make optimal use of network resources, but are often
tied to the features of a specific vendor’s network operating system

1.2.2 Client/Server
The Carrier software is not client/server software. Software components must be installed on both the
central server and the workstation. A single installation procedure run from the workstation automatically
installs the required software on both the central server and the workstation.

1.2.3 Data Sharing


One of the important benefits of computer networking is the ability to share data among users of the
network and even to permit the same data set to be accessed simultaneously by two or more users. In this
respect, Carrier software permits data sharing among users, but does not permit concurrent access to the
same data. Details are provided below:
• Data Sharing: Carrier software stores data in units referred to as “projects”. Briefly, a “project” is a
container for data from one or more application programs. Depending on how a network
administrator chooses to install the Carrier software, data can be kept private for each individual user,
project data can be shared among users on a selective basis, or all project data for can be shared by all
users automatically. By “sharing” we mean that users have access to the data and may work with it.
Further details on this subject are provided in sections 1.3 and 1.4 Further information on projects
and project data management can be found in the help system for each Electronic Catalog or E20-II
program.
Example #1: If all project data is shared among all users, the Carrier software does not differentiate
users by their network ID’s. JohnSmith can create and save project data. KenJones can later open
and work with any project created by JohnSmith or any other user.
Example #2: Users JohnSmith and KenJones are running Carrier software on a network. If project
data is kept private, JohnSmith can create and save project data, but KenJones cannot view a list of
JohnSmith’s projects nor can he open and work with data in JohnSmith’s projects.
Example #3: If project data is shared selectively among users, JohnSmith can create and save project
data using his own network ID which KenJones cannot view or gain access to. However, JohnSmith
and KenJones can create a new group ID which the Carrier software recognizes. By logging into the
Carrier software using this group ID rather than their own ID’s, they can create and work with
projects for which both users have access.
• Concurrent Access: Some software programs permit two or more users to simultaneously work with
the same data at the same time. Such programs are often referred to as multi-user database programs.
While Carrier software permits data sharing, it does not permit concurrent access.
Example: Users SarahJohnson and SusanWilliams are running Carrier software on a network. If all
project data is shared among all users, SarahJohnson and SusanWilliams can view and work with
each other’s projects so long as they do not attempt to work with data for the same application in the
same project concurrently. For example, they cannot both work with HAP v4 data in the same project
at the same time. However, if a project contains data for HAP v4, and an E-CAT application, one
user could work with the HAP data and another user could work with the E-CAT program data in the
same project at the same time.

Page 4 rev Dec. 2002


Installing and Operating Carrier Software on Networks

1.2.4 Program Sharing


Another benefit of computer networking is allowing users to share one set of program files. As a result, a
program can be installed in one location on the network server computer and accessed by individual users
on their workstations, rather than the program being installed on each individual workstation. This
reduces hard disk usage across the network, and reduces the burden of maintenance and support for
network administrators.
Carrier software permits program sharing. Two or more users can concurrently run the software using a
single copy of the program on the network server.

1.2.5 Printer Sharing


A third benefit of networked systems is the ability of users to print to common printer devices attached to
the network. Rather than having individual printers dedicated to each workstation, one or a smaller
number of printers can be connected to the network for all users to utilize.
Carrier software, because they are Windows-based programs, permit printer sharing automatically.

1.3 Install the Software on a Network


This section explains how to install Carrier 32-bit Windows software on a computer network. The
procedures are straightforward and are similar to those for a standalone computer system. Steps in the
installation process are described in the sections below:

1.3.1 Identifying Data Sharing or Protection Goals


Because the Carrier software can be installed in different ways which permit or restrict data sharing
among network users, a network administrator must identify the data sharing or protection goals before
installing the software. As discussed earlier in section 1.2, there are three different modes of data sharing
or protection offered by the Carrier software:
1. All project data is shared among all network users.
2. Project data for each network user is kept private.
3. Project data is selectively shared among network users.
During installation of the software, network administrators choosing data sharing/protection option #1
should install the software for “Network – all data is shared” operating mode. In this mode users are not
identified by user ID and any project created by one user can be used by all other users.
Those choosing data sharing/protection options #2 and #3 above should install the software for “Network
- all data is private” operating mode. This mode identifies individual users by their network ID’s and
keeps data for one user separate from another.

1.3.2 Installing the Software


The following installation procedure must be repeated for each workstation that will have access to the
Carrier software on the network server. The reason for this is that the installation procedure not only
installs software on the network server, but also installs supporting components that are required on each
individual workstation. Installation also creates a group and several program items on the user’s
Start/Programs Menu. The installation procedure is as follows:
1. Make sure each workstation computer meets the minimum requirements:
• At least 32 megabytes of random access memory (RAM).
• A VGA display monitor with 800x600 resolution and 256 colors, or higher.
• One of the following operating systems: Windows 95, Windows 98, Windows NT (Service Pack
3 or higher), or Windows 2000.
• A CD-ROM drive.

rev Dec. 2002 Page 5


Installing and Operating Carrier Software on Networks

2. Before beginning the software installation:


• Make sure you are logged into the network as the network administrator so you are guaranteed of
having sufficient data privileges to install files on the network server.
• When installing on a computer using Windows NT or 2000, make sure you are logged in as the
“administrator” on the workstation before installing the software. This is required so the installer
can update Windows system software components such as DLLs.
• Make sure all other programs have been closed. The workstation may need to be rebooted at the
end of the installation. While the reboot procedure will automatically close any running
programs and will prompt you to save unsaved data, it is usually better if you save and close
programs before starting the installation.
3. Follow the instructions listed in the program release sheet to install the software. At the end of the
installation procedure you may be asked to reboot the workstation computer to activate Windows
software components installed on the workstation.

1.3.3 Assigning Privileges to Network Users


Installation of the software creates several file folders on your network server drive. Within these folders
are files for which users will need read, write, create, and/or destroy privileges. This section describes the
required privileges.
Software installation creates an E20-II folder on the network server drive and a number of sub-folders
beneath E20-II. The simplest approach is to assign Read, Write, Create and Destroy privileges to the
E20-II folder and all sub-folders. However, privileges can be more selectively assigned as described
below, if desired.
E20-II Read, Write, Create, Destroy privileges required. Write privilege is only
required the first time a network user runs the software so the user can be
registered in the E20XYCFG.MDB database file (only if the software was
installed for “Network - all data is private” mode). The Create and Destroy
privileges are only required for opening this database. Each time the database is
opened, a companion locking (.LDB) file is created; each time the database is
closed the .LDB file is erased.
E20-II\ENVIRO Read, Write, Create, Destroy privileges required. In this folder is a database file
which contains information about the location of each user’s projects. All four
privileges are required to work with this database.
E20-II\ARCHIVES Optional: If network users will store archives of project data in this folder, then
Read, Write, Create and Destroy privileges will be needed. Otherwise, if archive
files will be stored elsewhere, no privileges are needed. An archive is a
compressed file containing all the individual files comprising a project. It is
created to safeguard data or when transferring data to external computers.
E20-II\PROJECTS Optional: If network users will store projects in folders beneath
E20-II\PROJECTS, then Read, Write, Create and Destroy privileges will be
needed. However, Carrier software permits users to store project data in any
folder on any drive the user has access to. Therefore, if E20-II\PROJECTS will
not be used for data storage, no privileges are necessary.
E20-II\TEMP Read, Write, Create, Destroy privileges required because certain Carrier
programs use this folder as a temporary repository for data.
E20-II\app\CODE Read, Write, Create, Destroy. For each Electronic Catalog or E20-II program
installed, one of these folders is created. For example Air Terminal Selection
v3.0 creates an E20-II\ATS30\CODE folder; HAP creates an
E20-II\HAP40\CODE folder. These folders contain program files for a
particular program. While most of these files only require Read privileges,
Write, Create, and Destroy privileges are required to work the database files in
the folder.

Page 6 rev Dec. 2002


Installing and Operating Carrier Software on Networks

E20-II\CSI10, No privileges. These folders contains information used when uninstalling


E20-II\CSI20, Configuration Services. Since uninstall is a procedure that should only be
E20-UU\CSI21 performed by the network administrator, no user privileges should be assigned to
this folder.
E20-II\E20DOS No privileges. This folder contains information used when uninstalling the DOS
E20-II Configuration Program. Since uninstall should only be performed by a
network administrator, no user privileges should be assigned to this folder.
E20-II\INSTALL No privileges. This folder is used during install and uninstall activities. Since
these tasks should only be performed by a network administrator, no user
privileges should be assigned to this folder.

1.4 Running the Software on a Network


This section explains how to run the Carrier 32-bit Windows software.

1.4.1 All Project Data Shared by All Users


With this data sharing strategy, all project data is shared by all users all the time. To utilize this data
sharing feature, the Carrier software must have been installed for “Network - all data is shared” operating
mode. To run and use the software:
1. From the Windows desktop, press the Start button and choose Programs.
2. From the Programs menu, choose the proper program group and item to launch the program.
3. Operation of the program begins. Unlike the other operating schemes discussed in 1.4.2 and 1.4.3,
the Carrier software does not identify or register users by network ID in this case. When running in
“Network - all data is shared” mode, there is no need to identify users since all data is shared among
all users at all times.
When opening a project in this mode, all projects created by all users on the network will be listed.
Any user can open and work with any project so long as the project data is stored in an area of the
network to which the user has read, write, create and destroy privileges.

1.4.2 Project Data for Each User Kept Private


With this data protection strategy, project data for each user is kept private. Each user can create, use,
save and destroy his or her own project data, but cannot perform similar functions with other users’ data.
To utilize this data protection feature, the Carrier software must have been installed for “Network - all
data private” operating mode. To run and use the software:
1. From the Windows desktop, press the Start button and choose Programs.
2. From the Programs menu, choose the proper program group and item to launch the program.
3. A dialog will appear identifying the network user ID for the person running the software. This dialog
asks for confirmation of the ID before continuing.
4. The first time a user runs the Carrier software, a message will appear asking if it is OK to register the
user with the Carrier software. Once a user is registered with the Carrier software, a database file is
created for the user which holds information about the storage location of projects created by that
user. Since each user has a separate database file, all information about a user’s projects is kept
private.
For all subsequent times this user runs the software, this message will not appear.
5. Operation of the program begins.

rev Dec. 2002 Page 7


Installing and Operating Carrier Software on Networks

For the highest level of data security, we recommend that users store data in areas of the network to
which they alone have read and write access privileges. As noted in 1.4.3 below, there is a way for
users to log into the Carrier software using another person’s network ID and gain access to this
person’s data. If data has been stored in an area of the network in which other users are not permitted
to read, write, create or destroy data, then the user’s data will be protected from unwarranted access.

1.4.3 Project Data Selectively Shared Among Users


This data sharing / data protection strategy is a variation of the “all data private” option. Users may keep
project data private as described in 1.4.2, or can choose to share project data by creating special user ID’s
which are recognized only by the Carrier software. This permits teams to share access to common data.
To utilize this data sharing feature, the Carrier software must have been installed for “Network - all data
is private” operating mode. To run and use the software:
1. From the Windows desktop, press the Start button and choose Programs.
2. From the Programs menu, choose the proper program group and item to launch the program.
3. A dialog will appear identifying the network user ID for the person running the software. This dialog
asks for confirmation of the ID before continuing.
If you wish to keep your data private, confirm this ID and continue. If you wish to share data with
others, replace your network ID with a group ID that you and other members of your project team
choose.
Example: Users SarahJohnson and JohnSmith are working on a project for which data sharing is
necessary. When SarahJohnson starts a particular E-CAT or E20-II program, the initial dialog
identifies her as user SarahJohnson and asks for approval. Instead of granting approval, Sarah
replaces her network ID with the ID “Team4”. This pseudo-ID will be registered with the Carrier
software as a “user” and will be allocated its own project database. Thus user SarahJohnson can run
the Carrier software using her own ID to keep data private, or can log into the Carrier software using
“Team4” as the ID to use data being shared among members of this project team. Later, JohnSmith
can log into the Carrier software as user “Team4” to gain access to the project data created by
SarahJohnson.
Note: User SarahJohnson must have write privileges to the E20-II folder on the network server in
order to successfully register the new “Team4” ID with the Carrier software.
4. The first time the Carrier software is run with a particular ID, a message will appear asking if it is OK
to register the user with the software. Once a user is registered with the Carrier software, a database
file is created for the user ID to hold information about the storage location of projects.
For all subsequent times this ID is used to run the software, this message will not appear.
5. Operation of the program begins.
When using a group ID to run the Carrier software, users must be careful to store data in an area of
the network to which all members of the team have read, write, create and destroy privileges.

1.5 Adding Users


Periodically it may be necessary to give a new user from a new workstation access to the Carrier 32-bit
Windows software. To add a user, install the software to the network server from the user’s workstation
as described in the section 1.3. This installs the necessary Windows system components on the
workstation and also creates a Start/Programs Menu item to start the software. Also use principles
discussed in section 1.3 to assign data privileges for the user to the E20-II folder and its sub-folders.

Page 8 rev Dec. 2002


Installing and Operating Carrier Software on Networks

1.6 Removing Users


From time to time it may be necessary to remove a user who was using the Carrier 32-bit Windows
software. There are only three concerns here. One is eliminating hard disk space used by the user’s
projects. The second is removing Start/Program Menu items. The third, which is optional, is removing
file privileges to the program files on the server
First, log in as the user and run the desired Electronic Catalog or E20-II program. Use options on the
Project Menu to open and archive any projects whose data must be retained for future reference. Then
use the Project/Delete option to erase all of the user’s projects.
Second, manually remove the Carrier ECAT/E20 Programs group and all of the program items this group
contains from the Start/Programs Menu on the user’s workstation computer.
Third, if necessary, remove the user’s file access privileges for the \E20-II folder on the network server.

1.7 Adding or Updating Programs


As new Carrier 32-bit Windows programs are released or existing programs are updated, it will be
necessary to install them on the network and provide network users with access to the programs. To
accomplish this task, follow the instructions provided on a program’s release sheet for installing the
software from each workstation which is to have access to the program. If Read, Write, Create, Destroy
file privileges have not been granted to the E20-II folder on the server and all its sub-folders, then these
privileges will need to be assigned to the CODE folder for the newly installed program.

1.8 Uninstalling the Software from a Network


This help topic describes the procedures used to uninstall Carrier 32-bit Windows software from a
network. Uninstall may be required as program versions become obsolete, or when reconfiguring the
software on a network.

1.8.1 Uninstalling an Individual Program


To uninstall an individual program, please use the following procedure.
1. Choose one workstation and perform steps 2 through 6 on this workstation.
2. From the Windows Desktop, press the Start button, choose Settings and then choose Control Panel.
3. In the Control Panel, double-click on the “Add/Remove Programs” icon.
4. In the Add/Remove Programs dialog, select the program you wish to uninstall and then press the
“Add/Remove” button.
5. When the Uninstall dialog appears, choose the “automatic” option. As the uninstall proceeds,
additional dialogs may appear asking if it is OK to remove a specific file. Press the Yes button in
each case.
This will remove files for the program and its file integrity verification checker from the network
server and will remove the Start/Programs Menu items on the workstation being used.
7. After the software has been uninstalled, you are returned to the Add/Remove Programs dialog. If the
name of the program you uninstalled still appears on the list of programs, this is not cause for
concern. Windows has not yet updated the list.
8. On the remaining workstations, the Start/Program Menu item must be removed manually. It is not
necessary to remove the software components that were installed to the local workstation drive.

rev Dec. 2002 Page 9


Installing and Operating Carrier Software on Networks

1.8.2 Uninstalling All Carrier Software


To completely uninstall all Carrier Electronic Catalog and E20-II software, please use the following
procedure. This procedure is typically used when reconfiguring the software.
1. Choose one workstation and perform steps 2 through 11 on this workstation.
Removing Application Programs
2. From the Windows Desktop, press the Start button, choose Settings and then choose Control Panel.
3. In the Control Panel, double-click on the “Add/Remove Programs” icon.
4. In the Add/Remove Programs dialog, select the application program you wish to uninstall and then
press the “Add/Remove” button.
5. When the Uninstall dialog appears, choose the “automatic” option. As the uninstall proceeds,
additional dialogs may appear asking if it is OK to remove specific files. Press the Yes button.
This will remove files for the chosen program and its file integrity verification checker from the
network server and will remove the Start/Programs Menu items from the workstation being used.
6. After the software has been uninstalled, you are returned to the Add/Remove Programs dialog. If the
name of the program you uninstalled still appears on the list of programs, this is not cause for
concern. Windows has not yet updated the list.
7. Repeat steps 2-6 for each Carrier application that must be uninstalled.
Removing ECAT / E20 Configuration Services Program
8. In the Add/Remove dialog select the “ECAT / E20 Configuration Services” item and press the
“Add/Remove” button.
9. When the Uninstall dialog appears, choose the “automatic” option. As the uninstall proceeds,
additional dialogs may appear asking if it is OK to remove specific files. Press the Yes button.
This will remove ECAT/E20-II Configuration Services software and its file integrity verification
checker from the network server and will also remove the Start/Programs Menu items from the
workstation being used.
10. After the software has been uninstalled, you are returned to the Add/Remove Programs dialog. If the
name of the “ECAT / E20 Configuration Services” item still appears on the list of programs, this is
not cause for concern. Windows has not yet updated the list.
11. Exit from the Add/Remove Dialog.
Erasing Configuration Services Databases
12. Run Windows Explorer from any workstation.
13. Navigate to the \E20-II folder on the network server drive and erase the E20XYCFG.MDB file. This
is a database file used by the Carrier software to coordinate software operation. It was not uninstalled
automatically in the previous steps for safety reasons - if the software is uninstalled accidentally,
network user information can be recovered as long as this file still exists.
14. Navigate to the \E20-II\ENVIRO folder on the network server drive and erase all PRJXY*.* files.
These files contain indexes of user projects. The files are not uninstalled automatically in the
previous steps for safety reasons - if the software is uninstalled accidentally, network user information
can be recovered as long as these files still exist.
Removing Start Items on Other Workstations
15. On each additional workstation, manually remove the Start/Programs Menu group titled “Carrier
E-CAT and E20-II Programs” and all its items and sub-groups.

Page 10 rev Dec. 2002

Potrebbero piacerti anche