20
Adam Hendra Brata Teknik Informatika FILKOM UB Semester Genap 2015/2016

Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

  • Upload
    hahuong

  • View
    220

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

Adam Hendra Brata

Teknik Informatika FILKOM UB

Semester Genap 2015/2016

Page 2: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TUJUAN PERKULIAHAN

• Memahami pemodelan perancangan dengan pendekatan

terstruktur

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

Page 3: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

AGENDA PERKULIAHAN

• Pemodelan perancangan terstruktur

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

Page 4: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command
Page 5: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

METODE PEMODELAN PERANCANGAN TERSTRUKTUR

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Functional Design

• Berorientasi pada fungsi

• Structured Design (Constantin & Yourdon, 1979), Step wise

Refinement (Wirth, 1971, 1976), Jackson Structured

Programming (Jackson, 1975), dll.

Page 6: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

FUNCTIONAL DESIGN APPROACHES

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Transform Mapping - langkah perancangan untuk tipe DFD transform flow• Incoming flow : aliran/jalur informasi eksternal masuk ke

sistem untuk ditransformasikan menjadi informasi internal• Transform center : pusat transformasi di dalam sistem yang

akan mentriger informasi keluar dari system• Outgoing flow : aliran/jalur informasi internal keluar dari

sistem menjadi informasi eksternal

• Transaction Mapping - langkah perancangan untuk tipe DFD transaction flow• Transaction : data tunggal yang mentriger satu atau beberapa

aliran data• Transaction center : penghubung antara aliran-aliran data

hasil pentrigeran dengan data trigernya• Action path : aliran/jalur informasi hasil triger

Page 7: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

FUNCTIONAL DESIGN APPROACHES

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Transform Flow

• Transaction Flow

a

b

cd

f

g

e

h

incoming

flow

transform

center

outgoing

flow

a c

b

d e

f

g

h

transaction

transaction

center

action path

Page 8: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSFORM MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Langkah-langkah Transform Mapping

• Incoming flow : aliran/jalur informasi eksternal masuk ke

• Review dan refine DFD sampai ke level paling bawah

• Tentukan apakah DFD tsb. memiliki karakteristik tipe

transform flow atau transaction flow

• Tentukan batas antara incoming flow, transform center dan

outgoing flow

• Bangun first level factoring

• Bangun second level factoring

• Refine first iteration

• Contoh Transform Mapping : SafeHome Security Software

Page 9: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSFORM MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• DFD Level 1

1*

Interact

with user

2*

Configure

system

3

Activate

/deactivate

sytem

4

Display

messages

and status

5*

Process

password

6*

Monitor

sensors

configuration

information

user commands

and dataControl

panel

Sensors

Control

panel

display

Alarm

Telephone line

configure

request

configuration

data

start stop

password

valid ID msg.

A/D msg.

configuration

data

configuration

data

sensor status

sensor

information

alarm type

telephone number tones

display

information

Page 10: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSFORM MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• DFD Level 2 : Monitor sensors

6.3*

Format for

display

6.2*

Assess

against setup

6.4

Generate

alarm

signal

6.1

Read

sensors

6.5*

Dial phone

configuration

information

sensor

information

sensor status

sensor ID, type

configuration

data

alarm type

telephone number

tones

telephone

number

alarm data

sensor ID, type,

location

Page 11: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSFORM MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• DFD Level 3 : Monitor sensors

1

Read

sensors

configuration

information

sensor status

2

Acquire

response

info

3

Establish

alarm

conditions

8

Generate

pulses to

line

4

Select

phone

number

5

Set up

conn. to

phone net

9

Generate

display6

Format

display

7

Generate

alarm

signal

sensor ID, type

configuration

data

sensor

information

alarm type

telephone number

tones

formated ID,

type, location

alarm data

alarm cond.

code, sensor ID,

timing

information

list of

numbers

telephone

number

tone ready

telephone

number

sensor ID, type,

location

Page 12: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSFORM MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• First level factoring : Monitor sensors

configuration

information

8

9

6

7

1

2

3

4

5

Monitor

sensors

executive

Sensor input

controller

Alarm conditions

controller

Alarm output

controller

Page 13: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSFORM MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Second level factoring : Monitor sensors

Monitor

sensors

executive

Sensor input

controller

Alarm conditions

controller

Alarm output

controller

Format

display

Generate

alarm signal

Set up conn. to

phone net

Generate

display

Generate

pulses to line

Establish alarm

conditions

Select phone

numberAcquire

response info

Read sensors

Page 14: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSFORM MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Refine first iteration : Monitor sensors

• Incoming controller dihapus : data input tunggal, cukup sederhana

• Transform controller dihapus dan digabungdalam satu modul : ada penurunan tingkat kohesifitas

• Format display dan generate display digabung : sederhana

Monitor

sensors

executive

Establish alarm

conditionsAlarm output

controller

Produce

display

Generate

alarm signal

Set up conn. to

phone net

Generate

pulses to line

Acquire

response info

Read sensors

Page 15: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSACTION MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Langkah-langkah Transaction Mapping

• Review dan refine DFD sampai ke level paling bawah

• Tentukan apakah DFD tsb. memiliki karakteristik tipe

transform flow atau transaction flow

• Tentukan batas antara incoming path/transaction,

transaction center dan action path

• Bangun first level factoring

• Bangun second level factoring

• Refine first iteration

• Contoh Transaction Mapping : SafeHome Security Software

Page 16: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSACTION MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Transaction Structuring

r

s

a

b

d

p

q

Transaction

control

b

a

d

c1

q r s

p

DispatcherReception

path

Page 17: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSACTION MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• DFD Level 2 : User Interaction

3

Read

password

2

Invoke

command

processing

4

Compare

password

w/ file

1

Read user

command

configuration

information

5

Activate/d

eactivate

system

6

Display

message

& status

7

Read

system

data

8

Build

configurat

ion file

command

type

start stop

user commands

and data

configure

request

password

raw

configuration

dataconfiguration

data

A/D msg.

configuration

data

configuration

data

four digits display

informationvalid ID msg.

Page 18: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSACTION MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• First / Second level factoring: User Interaction

User

interaction

executive

Read user

command

System

configuration

controller

Invoke

command

processing

Activate

/deactivate

system

Password

processing

controller

Read system dataBuild

configuration fileRead password

Compare

password w/

file

Display

messages &

status

Page 19: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TRANSACTION MAPPING

T E K N I K I N FO R M AT I K A F I L KO M U B

S E M E S T E R G E N A P 2 0 1 5 / 2 01 6

APS

• Arsitektur SafeHome Security Software

User

interaction

executive

Read user

command

System

configuration

controller

Invoke

command

processing

Activate

/deactivate

system

Password

processing

controller

Read system dataBuild

configuration fileRead password

Compare

password w/

file

Display

messages &

status

SafeHome

Security

Monitor

sensors

executive

Establish alarm

conditions

Alarm output

controller

Produce

display

Generate alarm

signal

Set up conn. to

phone net

Generate

pulses to line

Acquire

response info

Read sensors

Page 20: Adam Hendra Brata · TRANSACTION MAPPING TEKNIK INFORMATIKA FILKOM UB SEMESTER GENAP 2015/2016 APS • Arsitektur SafeHome Security Software User interaction executive Read user command

TERIMAKASIH V^^

To Infinity

and Beyond !

APS