Professional Documents
Culture Documents
Software Deployment Views 12
Software Deployment Views 12
-Shows how the various executables and other runtime entities are mapped to the underlying platforms or
computing nodes. -Addresses issues such as:
•Deployment
•Installation
•Maintenance
An architectural view called the deployment view illustrates the distribution of processing across a set of
nodes in the system, including the physical distribution of processes and threads.
Deployment diagrams are used with the sole purpose of describing how software is deployed into the
hardware system. It visualizes how software interacts with the hardware to execute the complete functionality. It is
used to describe software to hardware interaction and vice versa.
This view describes the environment within which the system is executed. It describes the geographic
distribution of the system or the structure of the hardware components that execute the software. It
documents workstations, processors, network topologies and channels, as well as other elements of the
The deployment diagram shows the hardware for the system the software that is installed on that
A node is a physical element representing a computational resource, generally having some memory and
processing capability.
•Nodes are used to model the topology of the hardware on which the system executes: processor or
device on which components may be deployed.
Node Node Node
Communication path
SERVER/LAN Pc 1
Application SERVER/LAN Supervisors
server N Police
Pc 4
administrator
server
Data base
Server
( polices)
They manage police staff, coordinate and provide guidance and assistance when necessary. They
also assign cases to staff members. Since they are working at an administrative level
Supervise and coordinate the investigation of criminal cases, offering guidance and expertise to
investigators, and ensuring that procedures are conducted in accordance with laws and
regulations.
:
Pc2 Police officers: register suspects through a server using a pc. By this networking server the police
Taking statements.
Writing crime reports.
Dealing with paperwork.
Gathering prosecution evidence.
Giving evidence in court.
Fostering good relationships with the public.
Pc 3: Registry police: register for criminal suspects via PCs that are connected directly to the
application Server via LAN. These local PCs are also used by super visors to control, edit and see the
files. The Registrar uses these local PCs to maintain criminal files and supervisor information’s
The Registry Officer assists in the preparation of material for the hearing room and undertakes
general registry duties such as document delivery, photocopying and filing. The role also assists with
The Registry Officer is responsible the entry, storage, retrieval and maintenance of material into the
police commission records system and the registration and summarization of all internal and incoming
police commission material including emails, letters, reports, tapes, transcripts and exhibits. The Registry
Officer assists in the preparation of material for the hearing room and undertakes general registry duties
such as document delivery, photocopying and filing. The role also assists with aspects of Security and
Provide clerical and administrative support to other functional areas that come under the control of the
Pc 4 administrator server: Viewing the complaints, viewing reminders, generating the reports.
Using the application server
A server is simply a computer that grants other computers access to centralized data or resources
Server administrators install, configure, and maintain hardware and software, which often involves
creating user accounts, carrying out backup and recovery functions, and monitoring the performance of
servers at all times. They need to configure, manage, and implement operating systems
Database Servers
Database servers are used to store and manage databases that are stored on the server and to provide data
access for authorized users. This type of server keeps the data in a central location that can be regularly
backed up. It also allows users and applications to centrally access the data across the network