UML Tutorial for Beginners
Blog containing resources for uml like lecture notes, lecture videos, lab manual, uml diagrams, objective bits, important questions and more.
Subscribe to Startertutorials.com's YouTube channel for different tutorial and lecture videos.

Categories: Architectural Modeling. 2 Comments on Deployment Diagrams
4
(31)

Introduction

 

Deployment diagrams are one of the two kinds of diagrams used in modeling the physical aspects of an object-oriented system. A deployment diagram shows the configuration of run time processing nodes and the components that live on them.

 

We use deployment diagrams to model the static deployment view of a system. A deployment diagram is a diagram that shows the configuration of run time processing nodes and the components that live on them.

 

1-deployment-diagram

 


Subscribe to our monthly newsletter. Get notified about latest articles, offers and contests.


Common Properties

 

A deployment is just a special kind of diagram that shares the same properties as all other diagrams like: a name and graphical contents. What distinguishes a deployment diagram from the rest of the diagrams is its content.

 

Contents

 

A deployment diagram commonly contains:

  • Nodes
  • Dependency and association relationships

 

Like all other diagrams, deployment diagrams may contain notes and constraints.

 

Deployment diagrams may also contain components, each of which must live on some node. Deployment diagrams may also contain packages and subsystems.

 

Common Uses

 

When modeling the static deployment view of a system, we’ll typically use deployment diagrams in one of the three ways:

  1. To model embedded systems.
  2. To model client/server systems.
  3. To model fully distributed systems.

 

Common Modeling Techniques

 

Modeling an embedded system

 

To model an embedded system:

  • Identify the devices and nodes that are unique to your system.
  • Provide visual cues, especially for unusual devices, by using stereotypes.
  • Model the relationships among these processors and devices in a deployment diagram. Similarly, specify the relationship between components and nodes.
  • As necessary, expand on the intelligent devices by modeling their structure with a more detailed deployment diagram.

 

2-modeling-embedded-system

 

Modeling a client/server system

 

To model a client/server system:

  • Identify the nodes that represent your system’s client and server processors.
  • Highlight those devices that are relevant to the behavior of your system.
  • Provide visual cues for these processors and devices via stereotyping.
  • Model the topology of these nodes in a deployment diagram.

 

3-modeling-client-server-system

 

Modeling a fully distributed system

 

To model a fully distributed system:

  • Identify the system’s devices and processors as for simpler client/server systems.
  • If you need to reason about the performance of the system’s network or the impact of changes to the network, be sure to model these communication devices to the level of detail sufficient to make assessments.
  • Pay close attention to logical groupings of nodes, which you can specify by using packages.
  • Model these devices and processors using deployment diagrams.
  • If you need to focus on the dynamics of the system, introduce use case diagrams to specify the kind of behavior you are interested in, and expand on these use cases with interaction diagrams.

 

4-modeling-fully-distributed-system

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Suryateja Pericherla

Suryateja Pericherla, at present is a Research Scholar (full-time Ph.D.) in the Dept. of Computer Science & Systems Engineering at Andhra University, Visakhapatnam. Previously worked as an Associate Professor in the Dept. of CSE at Vishnu Institute of Technology, India.

He has 11+ years of teaching experience and is an individual researcher whose research interests are Cloud Computing, Internet of Things, Computer Security, Network Security and Blockchain.

He is a member of professional societies like IEEE, ACM, CSI and ISCA. He published several research papers which are indexed by SCIE, WoS, Scopus, Springer and others.

Note: Do you have a question on this article or have a suggestion to make this article better? You can ask or suggest us by filling in the below form. After commenting, your comment will be held for moderation and will be published in 24-48 hrs.

2 Comments

You can follow any responses to this entry through the RSS 2.0 feed.

Thanks Suryateja,

I really appreciate the tutorial.

LKL

Leave a Reply

Your email address will not be published. Required fields are marked *