CENG 491

SENIOR PROJECT
Requirement Analysis Report

PDC
(PROJECT DEVELOPMENT CENTER)

PROJECT TITLE: COMPANY STAFF:

VIRTUAL CLASSROOM Harun Alpak Ömer Faruk Aygün Ufuk Biçen Ali Osman Tekin 1249903 1297506 1297555
1250802

1

1. Introduction and Scope of the Project .......................................................................3 1.Identification of Customer Needs ...............................................................................5 2.Detailed Description of the Project.............................................................................7 1.The Users.................................................................................................................7 2. User Log Ons:.........................................................................................................9 3. Inside the Classroom............................................................................................11 4. Process Model and Team Organization....................................................................12 5.Project Estimation......................................................................................................13 5.1.Function Point Estimation..................................................................................13 5.2.Lines of Code Estimation...................................................................................15 5.2.1 LOC Based Effort Estimation......................................................................15 5.2.2 FP Based Effort Estimation.........................................................................15 5.3.Basic COCOMO Estimation..............................................................................15 6.Models.......................................................................................................................16 6.1.DFD & CFD.......................................................................................................16 6.4. ERDiagram........................................................................................................24 6.5.Data Dictionary...................................................................................................25 7.Technical Requirements............................................................................................31 7.1.Software Requirements.......................................................................................31 7.2.Hardware Requirements.....................................................................................32 7.3.Development Platform Analysis.........................................................................33 8.Risk Management......................................................................................................34 9.Major Milestones and Project Schedule....................................................................35

2

1. Introduction and Scope of the Project
The growing popularity of Internet and e-learning introduced new terms to education, such as “virtual classroom”. May be in the near future students will not go to anywhere in order to take diploma. The concept “virtual classroom” defines a simulation of the real classroom that enables users to attend a class from anywhere through Internet and provides a learning e perience. This pro!ect is intended to give both teacher and student the ability to do their !obs effectively and efficiently without even leaving their places. The pro!ect is simply described as modeling a real world ob!ect "i.e. classroom# into computer world. $s in the real life the students can see their teacher writing on the board or teacher can see students chatting or anyone can want permission to ask %uestion. &hen we investigate the current “virtual classroom” pro!ects we observe that they can be grouped mainly in two classes. In the first class the pro!ects are designed to work on small '$( "the product of (et)* company is an e ample of such pro!ect# that can be used in a school or any education center. The second kind of pro!ects that are designed to work through Internet that allows it to be used more commonly. "The product of I+M ,ompany is an e ample of such pro!ect#. These systems are designed according to their working environments that they have different properties due to their usage areas. $ll the systems that are introduced on the web have some common features that they e ist almost in all systems. These features can be listed as follows• $ whiteboard that teacher and students use to draw images, write functions display te t etc. $nd also teacher can play editable slides on this board. The board typically looks like “M. *aint”. • • $ Group discussion Board "a chat system that enables to communicate in real-time with the on line users# uestion and !nswer Board "it is like newsgroup system in our department that is not e actly real time communication tool# 3

There will be three actors using this system.onferencing "real-time image and voice transformation# 1istribute and collect documents from students simultaneously 0isual laboratory or course material $fter investigating many systems we observed many different implementations with different properties. $nd the third kind of user is the “student”.ontrolling the actions of the students like not playing games or preventing the students to make some events# )n the other hand there are some systems with special features that are rarely used. The first one is the “$dmin” who will be mainly responsible for creating course.• • S"ide Show #an area that slides can be seen$ Student Contro" ". in other words it will be accessible from everywhere. Mainly our system will have the following properties and functionalities• There will be a whiteboard that can be accessed by every member3 unlimited access for the instructor and limited access to the student "the student will ask permission to the instructor. when instructor gives permission he4she will access the board# • • There will be a chat tool to provide real time communication between the students and the instructor. The teacher will see all the online users and he4she can throw away some 4 . shutting down the computer# 0ideo . These features can be listed as follows• • • • • • • +roadcasting the teacher/s screen to the students screen +roadcasting media files to the classroom Monitor all the students as they work or not "it is seen on the systems that work on small '$(s# Managing all students computers "like locking keyboard. creating teacher and instructor account. 2irst of all our intended system will be web based. The second actor is the “instructor” who will login the system and give the lecture online to the class.

+y this way students and instructors can do their works efficiently without even leaving their places that both sides benefits. of the “. The system will have the “voice transmitting” property. $s it is seen this system can be used in any school or education center without any big re%uirement. • • • • • • • The teacher will have chance to make online pop up %ui55es during the course. images etc. The teacher will have chance give assignments to the students. These are the basic properties of our intended system. slides.lass” in *hysics department of M9T:. we made a contact the administrator. . $nd thirdly in order to have well working system the courses will have capacities that will enable the system to work properly. video files. The teacher will have chance to upload some lecture notes that will be available offline to the registered students. &e asked some %uestions about the system and tried to identify the possible customer needs. The teacher will have option to upload useful course materials in order to use during the lectures like audio files. )ur system will be reachable from everywhere via Internet.mart . 2irst of 5 .econdly there will be a credit constraint on students that they cannot !oin every course available in the classroom. so we will put a pre registration constraint in order to avoid everybody to access the virtual classroom "only pre registered users will access the virtual classroom#. 6alil 7ams85.users due to their bad behaviors during the course. In order to make an efficient and well working system we will define some constraints. The teacher can also follow the students participate by observing statistics. 1% Identi&ication o& Custo'er Needs $s for a possible customer to our pro!ect. 1ue to the slow connection speeds in Turkey we do not add video transmitting property. The details of the system will be e plained in the ne t section.

. *ower*oint and he can show the slides to all students. )nly the lectures are broadcasted to distance classrooms and students follow the lectures from a distant class. These are the main components of this system. some of them surf on the web throughout the courses that reduces the efficiency of the lecture. < &hat are the basic features of this system= $ < The system mainly based on video conferencing system that a camera records the actions of the instructor and system broadcasts these records to a distance place. $nother option of the system is instant messaging system. There is the option of sharing the entire screen. The instructor and students may send te t messages to each other by this tool.all we asked general %uestions about the working flow of the system and then we asked the defects of the system. +y this tool the teacher. so students cannot focus on lectures efficiently.urrently. . .ard is used. )ur %uestions and his answers are recorded as follows.erver and for recording purposes Matro . < In order to handle video conferencing properly what kind of Internet connection speed is re%uired= $ < video conferencing is the most important module of the system therefore the connection must be very well. < &hat are the hardware and software re%uirements of this system= $ < The system uses the 'otus software and I+M 1omino . the instructor does not teach his4her lecture by blackboard the students cannot follow the courses from Internet. . < 1oes all the functions of the system is working now= $ < (o. for e ample. The system re%uires at least >?@A+4sec connection speed to work properly. the system does not work full functionality for the time being. starts a program like M. It sometimes is not able to start streaming.apture . $lso there is no student control during courses. 2or e ample some of them play games. $nd 6 . < &hat are the defects of the system according to you and what kinds of problems do you face= $ < There may be some problems about streaming. $nd also there e ists a “poll” tool that this tool follows all %uestionnaires and %ui55es. . $lso there is a blackboard in the system and the teacher gives his lecture by this tool.

In order to prevent redundant people to enter the classroom.for this reason we did not set up students/ computers in the class. therefore we assigned some duties of the instructor to the admin like creating course. the second kind is the “instructor” and the last actor is the “student”. These two constraints are the minimum re%uirements for our intended system. $ user needs only a *. editing e isting courses etc. the students must preregister to the system by admin. In our system we assumed that the instructors does not need to know the system and technical details very well. (% )etai"ed )escription o& the Pro*ect $fter a wide investigation and identifying customer needs e plicitly we reached a consensus on our system.The Users !d'in+ $dmin is the master of the system that he4she handles so many events. The first is the “admin”. )ur system will be working through Internet3 therefore there will be many redundant possible users who want to enter the virtual classroom. $fter that the student will log on the classroom with these username and password. The !obs of the admin can be listed and e plained as follows• The admin will create the users. )ur system will be a web-based system that will enable users to do their duties without even leaving their places. $nd similar conditions will be valid for the instructor. There will be three kind of user of this system that they will interact with. $n instructor account must be created by admin before instructor/s entrance to the system. $s stated previously we assumed that the instructors would not need to have detailed knowledge about the system. The roles of these actors will be as follows- 1. therefore 7 . &hen the student is accepted to use the virtual classroom the admin will create an entry in the database by giving a username and a password. • The admin will create the courses. that is connected to the Internet and a web browser that is working properly.

8 . • The admin will also edit the courses. 1eleting some users from system or modifying e isting people is another duty of the admin.the courses will be created in the database by admin.Instructor is the second type of the possible user. • The instructor may check pending members. • The instructor may give homework to the students. • The instructor can make pop up %ui55es during the lectures. In these cases the admin will make the modifications in the database. The teacher then checks the userBs info and according to it he4she can accept the re%uest so the user is then put in students list of that course or he4she can ban the user so the user is added to banned students. The teacher can see if there are any re%uests to enter the course. graphics. )ne of the duties of the admin is the assigning the instructors to the courses that some courses can be given by more than one instructor. • The instructor may send messages to the courses announcement group bo . • The admin will assign the instructors to the courses. • The instructor can view the list of the students that are enrolled his lectures and he4she can edit these lists. • The admin will also inform the users about the system by sending mail to the discussion group or the user/s mailbo . 2or each course there will be an option of uploading some documents related the lecture. sound or audio files. $fter some time some lectures may be old and need refreshed or some new courses may need to be added to the system. and te t files etc. • The admin will also edit the users. The duties and responsibilities of the instructor can be listed and described as follows• &hen instructor log on to the system he4she will able to start the online lecture. • The instructor may put some restrictions to his lectures like banning some students for attending his lectures. Instructor. • The instructor will upload course materials if e ists. These may be lecture notes3 image files related to lecture.

$ student can do the following events in the system• The student may edit his4her own profile.The third type of the user is the student. User Log Ons: !d'in . the users must be created by admin. &hen admin creates a student an entry will be created in the students table and a temporary password and username will be assigned to this user in order to first log on to the system. 2. As stated before the main responsibility of an admin will be database dependent tasks. • The student may log on to the system and download available documents related to his4her enrolled courses. • The instructor may edit his4her own profile Student. • The student may follow the discussion groups. When admin log on to the system he/she will mainly interact with the database. &hen the student first log on to the system the system will want user to fill the other parts of the student information and warn the student to choose a new 9 . When admin successfully logs on to the system a main menu will meet the admin. 6e4she can change the time of the ne t lecture.o. The admin is the only actor to create users to the system.On+ Like all other users the admin will log on the system from the main log on interface that will be reached through Internet with a specific address. • The student may chat with his friends and with teacher during the lecture • The student can ask %uestions to the instructor during the lectures.• The instructor may update the schedule. so creating user will be a one of the ma!or options of this menu $s stated before in order to prevent redundant people to log on to the system. In this menu there will be some events for admin to do.

&hen the instructor first logs on to the system. The admin will create the courses according to the demands of the instructors. semester etc. There will course related options.o. courseCid. images. some menus will meet the instructor. e-mail address etc. $nother option will be editing own profile.On+ The instructor will enter the system from the main menu. video files. $nother option will be giving assignment to the students. 9diting the e isting courses in the database or deleting the courses from the database will be another responsibility of the admin. $nother event that admin can do is sending mail to the discussion group or to the mailbo es of the users if needed.password and a username. The instructor will update his4her 10 . 2rom these options the instructor will edit the course properties. The same events take place for creating an instructor user. 2or e ample if an instructor is assigned three courses in the system than there will be three submenus under the courses menu. $nd lastly the instructor has option to start the lecture "enter the classroom#. 2rom this option the instructor can ban some students to enter the class due to their bad behaviors during lectures. If instructor chooses one of them another interface will meet the instructor. . 'ike all other users. some %uestions or another lecture notes. $dditionally the instructor can upload some course material to the database that can be used during courses like audio files. :nder this option there will be submenus each of them is a link to assigned courses of the instructor. )ne of the possible menus will be about courses. password. $nd also the teacher will send mail to discussion group of the lecture. Instructor . course name. The second option is the creating courses in the system/s database.ome courses may be given more than one instructor3 therefore the admin will also assign some instructors to the lectures. like any other user. 6e4she will also assign the attributes of the courses like credit. Managing the schedule of the course will be another duty of the instructor. the admin can also edit his4her profiles like changing username. view the students list that are assigned to the course.

And finally a student can reach discussion groups and view the messages and send message to the discussion groups from this page.information or change username or password. One of the ma or options will be about courses. From these options the students will select an event that they want to do. Inside the Classroom &hen a student and instructor log into the virtual classroom.On+ When students log on the system a list of options will meet them. $nd lastly the instructors have option to reach the discussion group related to the assigned courses and general discussions.o.hiteboard. !nder the courses option the student will see the enrolled courses and there will their status ust near them "online# offline$. Student . 2or e ample instructor can write a mathematical e%uation and want a user to solve the e%uation. )n the upper part of the 11 . they will see almost the same view with some small different properties. Also the lectures that student is banned by the instructor or admin will be indicated. The basic components and their properties that will e ist in the virtual classroom can be listed and described as follows. Like all other users the student can change own profile like password# username# e'mail# address etc. The instructor will e plain the topics on this tool and the students will see what he4she writes on the board. $nd if instructor gives permission to the students they can also write on the board. After selecting the desired course from the list# there will be course specific events for student like downloading available lecture notes# viewing course schedule# viewing instructor# downloading the assignments or any other supplementary material and finally %enter virtual classroom& option if available. 3.&hiteboard is the one of the main components of the system and it will allow participants to use drawing tools to create images or graphics that can be seen and edited by users.

Moreover the instructor can disable chat at the studentsB side so students canBt chat with each other anymore. color.. The student or the instructor can select another student in the class and view his4her info. make pop up %ui55es. They will only be able to send messages to the instructor. e-mail. These %uestions may be private or public. pen si5e.This bo will show all online users with their usernames.# 4% Process 1ode" and Tea' Or-ani2ation 12 . "2irst and last name. display slides. ask a %uestion and chose a student to answer the %uestion. chat with students. $nd it will be disabled4enabled by the instructor during courses.whiteboard there will be navigation field that will be used for to go a specific web page. 0sers . !ccess Contro" Bo/. +y this tool the instructor will be able to remove some students from the course due to their bad behaviors. kick a student out of class. $s for the student the student follows what instructor does.There will be some tools for instructor to monitor the students.:nder the whiteboard tool there will be chat toolbo that will enable users to talk in real-time via te t-messages.Too"bar. allow his voice to broadcast to the students. some geometric styles. uestion !nswer Bo/. Chat Too".This property will allow students to submit %uestions to the instructor directly and allow instructor to reply directly. display a specific web page. The users will be seen by their usernames in this chat environment and they will communicate by each other. This option will help instructor to teach the lecture effectively.This toolbar will be located !ust near the whiteboard and there will be drawing options like pen style. If voice broadcasting is enabled he4she can hear the instructor also. &hile following the course he4she may ask any %uestion to the instructor. display any supplementary material. In the classroom the instructor can write on the whiteboard. control access to the class after start of the lecture. )rawin.ist Bo/..

&e will use these metrics to determine progress and to estimate future pro!ects. $nd also we thought that the “1emocratic 1ecentrali5ed” "11# model could be time consuming for our team.Function Point Estimation 1easure'nt Para'eter (umber of Inputs (umber of )utputs (umber of In%uiries (umber of files Count >E >E ?E ?E Si'p"e !4era-e F Co'p"e/ @ G Sub5Tota" 6 F H 78 188 688 638 13 3 F IE 7 I? 9 ..ontrolled 1ecentrali5ed” ".# model. it is the most suitable model for our team. If we can make our plans according to these estimations then it will be easier to manage risks and increase efficiency.ode . Then we restore the estimates with the help of metrics.entrali5ed” ".ontrolled .&e are planning to use the oldest and most widely used software engineering paradigm that is called “'inear . The pro!ect is not so huge so we did not choose “. It is very important for our model to state all the re%uirements e plicitly3 therefore we spent very long time to find out all the re%uirements at the beginning.1.e%uential Model”.1# team model. 3% Pro*ect Esti'ation 9stimations are essential to have a general idea about the schedule. These are re%uired in the early phases of the pro!ect.Test# of this model we will make duty distribution among team members. . 5. cost. &e made customer contacts and searched through Internet in order to remove the uncertainties at the beginning. $t each step "$nalysis < 1esign < . $lthough it has some weaknesses. $s a team organi5ation system we choose “. therefore we chose .1 model. effort. 6aving a permanent team leader is most suitable for our team spirit.ince our team is a small team we cannot use D$1 and incremental methods.

files are comple = Is the internal processing comple = Is the code designed to be reusable= $re conversion and installation included in the design= Is the system designed for multiple installations in different organi5ations= Is the application designed to facilitate change and ease of use by the user= T)T$' "we referred these %uestions from the Doger/s . 1818 I1PORT!NCE 4 4 6 3 4 3 4 4 6 6 ( 6 8 ( 47 14 . 918 < =8%73 > 8%81<47@ .oftware 9ngineering"*.JI## :P#:unction Point$ . outputs.(umber of Interfaces . count5tota" < = 8%73 > 8%81<?:i@ . 8: (ot important or applicable 1: Insignificant influence (: Moderate influence 6: $verage influence 4: .ount Total - >E 3 G IE 188 918 &e evaluated the %uestions according to the following criteria table.ignificant influence 3: $bsolutely essential 0ESTIONS 1oes system re%uire reliable backup and recovery= $re data communications re%uired= $re there distributed processing functions= Is performance critical= &ill the system run in an e isting operational environment= 1oes the system re%uire on line data entry= 1oes the on line data entry re%uire the input transaction to be built ove multiple screens or operations= $re the master files updated on line= $re the inputs.

!asic COCO"O Estimation ab >.#I.E M "IH.? (%3 >.E?F? M IEIE K FI.F 6%8 H.I@ "+ailey-+asili Model# K ?.).ommunication 2unctions In%ury 2unctions TOT!.E?F? M 2* "$lbrecht and 7affney# K -IH.H? 9ffort K H.I@ K >E.OC Based E&&ort Esti'ation 9ffort K ?.E? 1%1( I. .H> Or-anic Se'idetached E'bedded &e use semidetached .)M) model.? M "9ffort#E.3.> cb >.?#I.Lines o Code Estimation :unctions 7raphical :ser Interface 1esign 1atabase 1esign &hiteboard 2unctions .HJ L E.H? K 18%1A 'onths (K941 15 .I> K 33%64 person5'onths 1uration K >.GHM"IH.2.HJ L E.OC 3%(%1 .@? person 4 month 5.? L E.HF#E.#I.I> 1uration K >.GHM"A'). therefore 9ffort K H.FF person 4 month 3%(%( :P Based E&&ort Esti'ation 9ffort K -IH.? M "??.HN 8%63 E.?#I.ines o& Code ?EEE IEEE >?EE >EEE HEEE 16388 .? db E.? L E.@ bb I.5.E M "A').

K ?? 4 IE B 3 peop"e 7% 1ode"s #.$F$ % CF$ 16 .1.

17 .

18 .

19 .

20 .

21 .

22 .

23 .

E'$iagram 24 .&.#.

5.Together with :sername forms the key. (ame. $dmin "output# .Together with *assword.$ata $ictionar( (ame..onfirmation *age "input# .Type of person 25 .tudent.onfirmation *age "input# .ontent 1escription.#. Instructor.*assword &here46ow :sed.ontent 1escription.upplementary Information.tring . $dmin "output# .. Instructor.upplementary Information. (ame.:sername &here46ow :sed.tudent. forms the key.tring .

ontent 1escription.tudent *age "input# 26 .ontent 1escription.ontent 1escription.. 1elete. forms the key (ame.ontent 1escription.:sername ..reate.Together with :sername. 0iew..urname .tring .ontent 1escription. Instructor. 1rop.(ame .ontent 1escription(ame. forms the key Translation "output# Instructor *age. forms the key (ame..upplementary Information.$ddress .*hone (umber .ourse Id &here46ow :sed.upplementary info.upplementary info.&here46ow :sed- .earch (ews "input# .onfirmation *age "output# Translation "input# ..Int (ame.*ersonal info &here46ow :sed..ourse "input# 7ive $ssignments "input# .tring ...ontent 1escription. $dmin *age.tring ..*assword .tudent.ontent 1escription.tring (ame.tring (ame.tring (ame.tring (ame.Together with *assword. $dd .Together with instructor name. . $dmin "output# .ontent 1escription.

Instructor.urname .tring (ame.$dd De%uest &here46ow :sed.(ame.ontent 1escription(ame.ontent 1escription.upplementary info. forms the key (ame..tring .ub!ect O Title &here46ow :sed$ddition "output# *ost (ews "input# .tring (ame.*hone (umber .ontent 1escription. Instructor.+oolean (ame. $dmin "output# $ddition "input# .. $dmin "output# 9dit *rofile "input# 27 .tring (ame.*assword ..ontent 1escription.ontent 1escription.ontent 1escription..upplementary info..Int (ame..ontent 1escription.Together with *assword.:pdated Info &here46ow :sed.tudent.ontent 1escription.(ame .tring .tudent. forms the key (ame.ontent 1escription..Together with :sername.$ddress ..tring .:sername .

.:pdated .0iew De%uest &here46ow :sed.ontent 1escription.tring (ame. Instructor.ourse Id ..+oolean (ame.ourse (ame .1elete De%uest &here46ow :sed$dmin "output# 1elete :sers "input# .Instructor (ame &here46ow :sed$dmin "output# .ourse "input# 28 . $dmin "output# 0iew *rofile "input# .$ssignments &here46ow :sedInstructor "output# 7ive $ssignments "input# ..(ame.apacity .ontent 1escription.tring (ame.*rimary Aey (ame.Int (ame.ontent 1escription.tring Instructor "output# :pdate .ontent 1escription.ourse Info &here46ow :sed.tudent.ontent 1escription(ame..ontent 1escription.+oolean (ame.ontent 1escription.reate ...ontent 1escription.ourse "input# .

ontent 1escription.*hone (umber .(ew Instructor Information &here46ow :sed.tring $dmin "output# .tring (ame.upplementary info.ystem "input# Instructor "output# .:sername .*assword .1rawing &here46ow :sed&hite +oard ..Together with *assword.ontent 1escription.ontrol +o "input# .$llowance &here46ow :sedInstructor "output# .urname ...... forms the key (ame.tring .ontent 1escription.ontent 1escription(ame.tring (ame.ontent 1escription.(ame ..ontent 1escription.Together with :sername.ontent 1escription..(ame.$ddress .tring (ame.tring .reate (ew Instructor "input# 29 .Int (ame.tring (ame.+oolean (ame.ontent 1escription.ontent 1escription.upplementary info. forms the key (ame.ontent 1escription.1ocuments &here46ow :sedInstructor "output# $dd 1ocuments "input# .

ontent 1escription.tring (ame.1ocument &here46ow :sedInstructor "output# &hite +oard .Message &here46ow :sedInstructor "output# .tring (ame.ystem "input# +rowser "input# ..(ame..ontent 1escription..uestion4$nswer .election "output# .ystem "input# .end *rivate Message "input# ..:D' &here46ow :sedInstructor "output# &hite +oard ...hat "output# .tring 30 .tring (ame.elected Tool &here46ow :sedInstructor "output# 1rawing Toolbar "input# .ontent 1escription.ontent 1escription.tring (ame.ystem "input# 1ownload 1ocument "input# .ontent 1escription.hat Tool +o "input# 7eneral Message "input# :ser .hat "input# .$nswer &here46ow :sedInstructor "output# .

* .eb Ser4er.(9T programming language for main development $.(9T >EEH as development tool. )ur development platform will be . we are planning to use II.(9T 1evelopment .tudio >EEH -Microsoft &indows .' ..*o t+are 'e..ince we will use Microsoft .' . 31 ..$ proper working web browser and a good working operating system. for web server or any other Microsoft/s &eb server.9% Technica" ReCuire'ents ). .erver>EEE are the possible solutions. M.tudio .erver >EEE -$ny +rowser C"ient Side.&hen the development platforms are thought the )racle.(9T and we are planning to use the following tools and languages.     • 0isual .P ..erver >EEH -Microsoft .mart1raw for diagrams or time charts • -&indows J?4JN4(T4>EEE4M94Q* -Microsoft 0ision or *lanner "for 'inu # -Microsoft *ower *oint -Microsoft .1. Other )e4e"op'ent So&tware+  &indows Q* operating system  M. )ffice *acket for reports or any other documents  Microsoft 0isio for diagrams  .' .(9T databases and M. $s stated before we chose ..(9T for &eb side solutions QM' web services Microsoft 0isual .(9T products. )B1S.(9T for development platform3 therefore we will use any $1) .erver >EEE will be our database choice that we thought it will be the best solution for us.uirements • • . • )e4e"op'ent+ 2or development phase of our system we decided again on Microsoft/s products.

. $t least FE7+ storage capacity is needed for this system. -*entium H NEE M65 4 $M1 NEE M65 or higher -Mouse O keyboard -Monitor supporting NEEM@EE pi els with 6igh .ince our system re%uires a huge amount of data to be stored. $ny I+M. • )atabase Ser4er. $nd this machine must also be a high performance machine. that is connected to Internet and also having a sound card may be enough. This machine must be fast and must show high performance in all situations.eb Ser4er. with at least *entium F >EEEM65. $n I+M machine like series HN> may be a suitable choice for this purpose.pace "for server# 32 . $nd also the other re%uirements like mouse. )e4e"opers.2. a *.eb ca'.olor ->E 7+ 1isk .' Internet connection ->?@ M+ Memory -.).lient *. -$ video camera -$1. $t least ?I>M+ D$M and *entium F >EEEM65 processor seems to be the minimum re%uirements for this machine. >?@M+ Dam and >E7b 6ard disk having machines. .To develop the system each group member needs a good *.2or a client.for video transmitting a web cam will be needed also.&e need a reliable web server for our system. 6* machine can be selected for this purpose.uirements • . keyboard etc. • • • C"ient side. we will need an apart machine that will serve as a database.-ard+are 'e.

(9T-compatible language.(9T application in any . allowing programmers to concentrate on their specialties without having to implement every component of every application. ta refunds.(9T strategy e tends the concept of software reuse to the Internet. a new user e perience emerges. companies can buy &eb services and devote their time and energy to developing their products. loans and investments. a single application could manage bill payments. 0isual . te t bo es and scrollbars. The strategies of . the . *rogrammers can contribute to the same software pro!ect.(9T strategy incorporates the idea of software reuse.(9T strategy further e tends the concept of software reuse to the Internet by allowing programmers to concentrate on their specialties without having to implement every component. because it enables programmers to create applications easily.Dather than forcing developers to use a single programming language. security. developers can create a .(9T strategy involves a new program-development process that could change the way programs are written and e ecuted. .(9T programs.elo/ment Plat orm 0nal(sis &e will use . It is a very young technology that has a broad new vision for integrating the Internet and the &eb in the development. writing code in the . further e tending the portability of . 0isual programming has become popular. In addition. Instead.(9T and many others# in which they are most competent. leading to increased productivity.  The .3.$e.(9T architecture can e ist on multiple platforms. engineering and use of software. The . programmers may create an application using &eb services for databases. 0isual +asic . Microsoft announced .(9T as for our development platform that it will ease our work. data storage and language translation without having to know the internal details of those components.). $n online merchant could buy &eb services for online credit-card payments.(9T can be categori5ed as follows The . )ne key aspect of the . using &eb services from various companies. using such prepackaged components as buttons. &hen companies link their products in this way.LL .(9T languages "such as .(9T strategy is its independence from a specific language or platform.imilarly. authentication. The . 2or e ample. user 33 .(9T in Rune >EEE.P.(9T.

• The number of people in the pro!ect may not be enough for the pro!ect. data could reside in one central location rather than on separate systems. $fter a deep investigation we identified the following possible risks of our pro!ect. because it would be fully up-to-date in a central area. • The team members may not be suitable for group work. which would then be formatted appropriately for use or display on the accessing device. a situation that could lead to errors.ome team members may not focus on the pro!ect deeply. $ny Internetconnected device could access the data "under tight control#.. A% RisD 1ana-e'ent Disk is an inevitable concept of software pro!ects and it mainly concerns future happenings. Thus. 34 . a cell phone or other device. :nder . the same document could be seen and edited on a desktop *. network security and inventory databases to create an ecommerce &eb site.authentication.ustomer may not appreciate the product3 this is supervisor for our case. • . they are unsynchronized. 2irst of all we have to define possible risks and develop a management style for each of them. • The motivation of team members may not be sufficient. If two copies of a file e ist "such as on a personal and a company computer#.(9T. • $ team member may leave the group. a *1$. &e want to produce a well working system therefore we have to consider all the possible defects and une pected conditions.  Universal data access is another essential concept in the . If the separate versions of the file are different. • The tasks that are planned in the schedule may overflow • . :sers would not need to synchroni5e the information. • The development tools may be difficult for team members to learn and these tools may not be the best solution for some cases.(9T strategy. the less recent version must constantly be updatedSthis is called file synchronization.

)ur risk management strategies are planned as follows• &e will make a strict schedule for our meetings. $ccording to our risk table the most effective risks are about team members.• 2or our pro!ect. • In order to meet the customer re%uirements effectively we will follow the supervisor meetings seriously. 9% 1a*or 1i"estones and Pro*ect Schedu"e 35 . 2or the risk management we select the most catastrophic risks of this list and we developed special several strategies in order to handle or block these une pected situations. • In order the motivate team members we will arrange some social organi5ations. we will be using incremental-model as process model and hence the re%uirements and identification of customer needs may not be very well understood and this may cause serious problems in the later steps of the pro!ect. motivation of the group and understanding the customer re%uirements. • If one of the team members does not !oin a meeting without a reasonable e cuse we will give e tra work for the ne t week as a punishment.

Sign up to vote on this title
UsefulNot useful