121 6. Window Diagram Management Edit RKA
LOGO HEADER
FOOTER Home
Management XML Management RKA
Search Logout
Update Cancel
Data Bound DB
Data Bound Data Bound
Data Bound Government Business
Organisation Program
Activity Year
Location Data Bound
Sum n-1 Data Bound
Data Bound Data Bound
Sum n Sum n+1
Program Goal input
Output Result
Sugestion Data Bound
Data Bound Data Bound
Data Bound Data Bound
Data Bound Data Bound
Data Bound Data Bound
Figure 4.3.2.6 Window Diagram management edit RKA
This page displays the user edit form that can allow a user to update data.
4.2 Architecture Design
4.2.1. Design Criteria.
In an architectural design is necessary to determ mine criteria to set priorities in the design of applications that will be displayed in tabular form, it aims to produce
122 high quality applications and to help prioritize system development strategy,
support the evaluation and assist in assessing the completeness of the proposed system. Design criteria in designing web secure system can be seen in Figure
4.21.
Table 4.2.1 Criteria proposed system
Criteria Very
Importan t
Importan t
Less Important
Irrelevan t
Easily Fullfield
Usable √
Secure √
Efficient √
Correct √
Reliable √
Maintainable √
Testable √
Flexible √
Comprehensib le
√
Reuseable √
Portable √
123
Explanation:
1. Usable : Usefulness of the proposed system in accordance with the
requirements 2. Secure
: Secure access from people who do not have right 3. Efficient
: Efficiarncy of the system 4. Correct
: Fulfill requirement with needed 5. Reliable : Fulfillment of the results from the execution of existing
functions. 6. Maintainable
: Pengalokasian biaya dan perbaikan sistem yang rusak 7. Testable
: system which delevopled match with the function 8. Flexible
: esiest to modify system . 9. Comprehensible :Effort
required to
gain an
understanding clear from the system.
10. Reusable : Potensial used in another system
11. Portable : Transfer to another platform
4.3.2 Deployment Diagram
Deployment diagram provides an overview of how the system as a physical and visible. The system consists of nodes where each node is represented by a symbol
or a cube. In this system uses the client and server programs using the Internet network since the system is used in one area. Therefore in the application of this
system is used in the form of an application server XAMPP also called CPanel virtual server that can serve to make the application accessible offline.
124 Information can be accessed using a web browser internally. The system is web
secure system can retrieve data from the previous system from the outside safely.
Webservice Aplication Server
Database Server Public Internet
PC Client Websecure
MYSQL RKA SKPD
Browser Firefox, Internet Explorer dll.
Figure 4.32 Deployment Diagram web secure system
4.3 Component Design