Vous êtes sur la page 1sur 2

CHAPTER 1

INTRODUCTION

A. Background of the Study

College life has never been easy. Others have to live in dormitories for their

homes are far from universities. Such adversities brought about series of changes for

students. It is the only time in a life of a student that he will be living with people of the

same interest, goals and, fears.

As a students begin to live independently. Struggle and stress usually occurs.

Adjusting to college life is the first step in understanding how to live and face challenges

on a daily basis.

On this study and research of the group is about the POSO TRAFFIC

VIOLATION MONITORING SYSTEM is all about to monitor the transaction of the

violation of the driver, this monitoring system can access the database of the POSO, it

can update, delete, retrieve data that has being lose from the database, can generate

record for the report.

The performance of the monitoring system has two aspects:

• Impact on system domain or impact on domain functionality: Of course any

element of the system that prevents the main domain functionality from working

is in-appropriate. The risks between implementations and their. Ideally the

monitoring is a tiny fraction of each applications footprint, requiring simplicity. The

monitoring function must be highly tunable to allow for such issues as network

performance, improvements to applications in the development life-cycle,


appropriate levels of detail, etc. Impact on the real goal for the system must be

considered.

• Efficient monitoring or ability to monitor efficiently: Monitoring must be efficient,

able to handle all monitoring goals in a timely manner, within the desired

periodicity. This is most related to scalability. Various monitoring modes are

discussed below.

There are many issues involved with designing and implementing a system monitor.

Here are a few issues to be dealt with:

• configuration

• performance

• data access

And on this system it will require the POSO office to have a server and a client so on

where in the client will generate the report on the server and the database of the

monitoring system is on the server so it will be secure and on this system will require

the user or the administrator to have a use and password for the security of the system

and no one can use the system so that the authorize person only can use the system

and the administration use and see the database of the report.

Vous aimerez peut-être aussi