Design Criteria. Deployment Diagram

121 6. Window Diagram Management Edit RKA LOGO HEADER FOOTER Home Management XML Management RKA Search Logout Update Cancel Data Bound DB Data Bound Data Bound Data Bound Government Business Organisation Program Activity Year Location Data Bound Sum n-1 Data Bound Data Bound Data Bound Sum n Sum n+1 Program Goal input Output Result Sugestion Data Bound Data Bound Data Bound Data Bound Data Bound Data Bound Data Bound Data Bound Data Bound Figure 4.3.2.6 Window Diagram management edit RKA This page displays the user edit form that can allow a user to update data.

4.2 Architecture Design

4.2.1. Design Criteria.

In an architectural design is necessary to determ mine criteria to set priorities in the design of applications that will be displayed in tabular form, it aims to produce 122 high quality applications and to help prioritize system development strategy, support the evaluation and assist in assessing the completeness of the proposed system. Design criteria in designing web secure system can be seen in Figure 4.21. Table 4.2.1 Criteria proposed system Criteria Very Importan t Importan t Less Important Irrelevan t Easily Fullfield Usable √ Secure √ Efficient √ Correct √ Reliable √ Maintainable √ Testable √ Flexible √ Comprehensib le √ Reuseable √ Portable √ 123 Explanation: 1. Usable : Usefulness of the proposed system in accordance with the requirements 2. Secure : Secure access from people who do not have right 3. Efficient : Efficiarncy of the system 4. Correct : Fulfill requirement with needed 5. Reliable : Fulfillment of the results from the execution of existing functions. 6. Maintainable : Pengalokasian biaya dan perbaikan sistem yang rusak 7. Testable : system which delevopled match with the function 8. Flexible : esiest to modify system . 9. Comprehensible :Effort required to gain an understanding clear from the system. 10. Reusable : Potensial used in another system 11. Portable : Transfer to another platform

4.3.2 Deployment Diagram

Deployment diagram provides an overview of how the system as a physical and visible. The system consists of nodes where each node is represented by a symbol or a cube. In this system uses the client and server programs using the Internet network since the system is used in one area. Therefore in the application of this system is used in the form of an application server XAMPP also called CPanel virtual server that can serve to make the application accessible offline. 124 Information can be accessed using a web browser internally. The system is web secure system can retrieve data from the previous system from the outside safely. Webservice Aplication Server Database Server Public Internet PC Client Websecure MYSQL RKA SKPD Browser Firefox, Internet Explorer dll. Figure 4.32 Deployment Diagram web secure system

4.3 Component Design