Teknik Informatika FILKOM UB Semester Genap 20152016

  Adam Hendra Brata

Teknik Informatika FILKOM UB

Semester Genap 2015/2016 APS

TUJUAN PERKULIAHAN

  • Memahami pemodelan perancangan dengan pendekatan terstruktur

  T E K N I K I N F O R M AT I K A F I L K O M U B

AGENDA PERKULIAHAN

  • Pemodelan perancangan terstruktur

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

  APS

METODE PEMODELAN PERANCANGAN TERSTRUKTUR

  • Functional Design
  • Berorientasi pada fungsi
  • Structured Design (Constantin & Yourdon, 1979), Step wise

    Refinement (Wirth, 1971, 1976), Jackson Structured

    Programming (Jackson, 1975), dll.

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

FUNCTIONAL DESIGN APPROACHES

  • langkah perancangan untuk tipe DFD
    • Transform Mapping

  transform flow

  • Incoming flow : aliran/jalur informasi eksternal masuk ke sistem untuk ditransformasikan menjadi informasi internal
  • Transform center : pusat transformasi di dalam sistem yang akan mentriger informasi keluar dari system
  • Outgoing flow : aliran/jalur informasi internal keluar dari sistem menjadi informasi eksternal
    • langkah perancangan untuk tipe DFD

  • Transaction Mapping

  transaction flow

  • Transaction : data tunggal yang mentriger satu atau beberapa aliran data
  • Transaction center : penghubung antara aliran-aliran data hasil pentrigeran dengan data trigernya
  • Action path : aliran/jalur informasi hasil triger

  T E K N I K I N F O R M AT I K A F I L K O M U B

FUNCTIONAL DESIGN APPROACHES

  • Transform Flow • Transaction Flow

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

  a b c d f g e h incoming flow transform center outgoing flow a c b d e f g h transaction transaction center action path APS

TRANSFORM MAPPING

  • Langkah-langkah Transform Mapping
  • Incoming flow : aliran/jalur informasi eksternal masuk ke
  • Review dan refine DFD sampai ke level paling bawah

  • Tentukan apakah DFD tsb. memiliki karakteristik tipe

    transform flow atau transaction flow
  • Tentukan batas antara incoming flow, transform center dan outgoing flow
  • Bangun first level factoring
  • Bangun second level factoring
  • Refine first iteration
  • Contoh Transform Mapping : SafeHome Security Software

  T E K N I K I N F O R M AT I K A F I L K O M U B

TRANSFORM MAPPING

  • DFD Level 1

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

  1* Interact with user

  2* Configure system

  3 Activate /deactivate sytem

  4 Display messages and status

  5* Process password

  6* Monitor sensors configuration information user commands and data

  Control panel Sensors

  Control panel display

  Alarm Telephone line configure request configuration data start stop password valid ID msg.

  A/D msg. configuration data configuration data sensor status sensor information alarm type telephone number tones display information

TRANSFORM MAPPING

  • DFD Level 2 : Monitor sensors

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

  6.3* Format for display

  6.2* Assess against setup

  6.4 Generate alarm signal

  6.1 Read sensors 6.5*

  Dial phone configuration information sensor information sensor status sensor ID, type configuration data alarm type telephone number tones telephone number alarm data sensor ID, type, location APS

TRANSFORM MAPPING

  • DFD Level 3 : Monitor sensors

  sensor configuration formated ID, information

  9 information type, location Generate

  6 display telephone number

  Format configuration tones display data sensor status

  7 alarm type sensor ID, type,

  Generate location alarm

  8 signal

  1 Generate Read

  2 alarm data pulses to sensors

  Acquire line

  3 response sensor ID, type

  Establish info tone ready

  4 alarm telephone

  Select alarm cond. conditions

  5 number phone list of code, sensor ID,

  Set up numbers number timing conn. to information telephone phone net number

  T E K N I K I N F O R M AT I K A F I L K O M U B

TRANSFORM MAPPING

  • First level factoring : Monitor sensors

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

  configuration information

  8

  9

  6

  7

  1

  2

  3

  4

  5 Monitor sensors executive

  Sensor input controller Alarm conditions controller

  Alarm output controller

TRANSFORM MAPPING

  • Second level factoring : Monitor sensors

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

  Monitor sensors executive

  Sensor input controller Alarm conditions controller

  Alarm output controller

  Format display Generate alarm signal

  Set up conn. to phone net Generate display

  Generate pulses to line Establish alarm conditions

  Select phone number Acquire response info

  Read sensors APS

TRANSFORM MAPPING

  • Refine first iteration : Monitor sensors

  Monitor sensors executive

  Establish alarm Alarm output

  Acquire conditions controller response info

  Produce Generate Set up conn. to Read sensors display alarm signal phone net

  • Incoming controller dihapus :

  Generate

  data input tunggal, cukup sederhana pulses to line

  • Transform controller dihapus dan digabung dalam satu modul : ada penurunan tingkat kohesifitas
  • Format display dan generate display digabung : sederhana

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

TRANSACTION MAPPING

  • Langkah-langkah Transaction Mapping
  • Review dan refine DFD sampai ke level paling bawah

  • Tentukan apakah DFD tsb. memiliki karakteristik tipe

    transform flow atau transaction flow
  • Tentukan batas antara incoming path/transaction, transaction center dan action path
  • Bangun first level factoring
  • Bangun second level factoring
  • Refine first iteration
  • Contoh Transaction Mapping : SafeHome Security Software

  T E K N I K I N F O R M AT I K A F I L K O M U B

TRANSACTION MAPPING

  • Transaction Structuring

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

  r s

  a b d

  p q

  Transaction control b a d c1

  q r s p

  Dispatcher Reception path APS

TRANSACTION MAPPING

  • DFD Level 2 : User Interaction

  raw user commands configuration and data

  7

  8 data Read Build configuration

  1 configure system configurat data

  Read user request data ion file command

  2 Invoke configuration command information command type processing configuration configuration data data

  5 start stop Activate/d password

  A/D msg.

  6 eactivate Display system message & status

  3 Read password display four digits information 4 valid ID msg. Compare password w/ file

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

TRANSACTION MAPPING

  • First / Second level factoring: User Interaction

  User interaction executive

  Invoke Read user command command processing

  System Activate Password /deactivate configuration processing system controller controller

  Build Display Compare Read system data

  Read password configuration file messages & password w/ status file

  T E K N I K I N F O R M AT I K A F I L K O M U B

TRANSACTION MAPPING

  • Arsitektur SafeHome Security Software

  User interaction executive

  Read user command System configuration controller

  Invoke command processing

  Activate /deactivate system

  Password processing controller

  Read system data Build configuration file

  T E K N I K I N F O R M AT I K A F I L K O M U B APS

  Display messages & status

  SafeHome Security

  Monitor sensors executive

  Establish alarm conditions Alarm output controller

  Produce display Generate alarm signal

  Set up conn. to phone net Generate pulses to line

  Acquire response info Read sensors

  Read password Compare password w/ file APS

TERIMAKASIH V^^

  To Infinity and Beyond !