Final Year Project Report

MULTIMEDIA CASTING OVER LAN
B.S. Computer Engineering, Batch 2002

Project Advisor
Mahjabeen Tahir Lecturer SSUET

Submitted by
Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100

DEPARTMENT OF COMPUTER ENGINEERING Sir Syed University of Engineering and Technology University Road, Karachi – 75300 January 2006

PREFACE
According to this report, we are going to spread a new style of streaming which will handle you in many dimensions of the communication. In term of communication, we have different bridges but there is more powerful bridge of communication like computer networks. This report is all about the information streaming over the computer networks. There is much information in the world which is easily understood by the target user. This information has the flavor of multimedia extensions which look very well with respect to target eyes. When these type of extensions come over the computer network so generate the maximum response with in communication. Multimedia is the extension of meaningful communication with respect to sender and receiver ends. Video, Audio, Visual presentations are the basic blocks of today’s and forthcoming communication. Multimedia information precise your information in very attractive and meaningful style. Multimedia streaming is the powerful bridge of communication which is doing best by computer networks. Everybody in the world wants to say attractive body and verbal language but multimedia streaming gives you attractive communication language. When we are going to communicate, we should have any medium of communication but according to this report, we are exploring the computer networks types in term of medium size of industrial pool. Computer networks join together for the near and Tele-communication phenomenon. If you have the computer network, you want to share information with attractive and meaningful styles. LAN is most powerful and high through put bridge of communication which describe you the information through multimedia casting. The only prerequisite things for this are to find some knowledge about the multimedia streaming over the computer networks. There are many hidden truth in the multimedia world because everybody is moving to attractive and meaningful communication with respect to smart machine throughput.

ACKNOWLEDGMENT
First of all we would like to thank Vital Force only ALLAH for blessing us with the mental and physical abilities with the help of which we were successfully able to go through this project and bring it to the final stages of completion.

We would like to thank our teacher Ms. Mahjabeen Tahir who guided us through out in every difficulty and provided us with the best solutions of problems through her professional approach and experience.

com Muhammad Tariq 2002-CE-106 Programming + Research + UML + Report + Database Management Immediate Contact: 0300 2716858. Email: shah_ce082@hotmail.com Muhammad Kazim Network Configuring + Research + Report integration Immediate Contact: 0321 2091481. specialist106@yahoo.INTRODUCTION TO GROUP MEMBERS Muhammad Yasir siddiqui 2002-CE-075 Network Programming + Research + Overall integration of project Immediate Contact: 0333 2109785. Email: be_yasir@hotmail.com.com Shahzad Aakhter 2002-CE-082 Programming + Network configuration + Report Immediate Contact: 021 6631529. Email: mkazim4u@yahoo. Email: specialist106@hotmail.com 2002-CE-100 .

MAHJABEEN TAHIR Assistant Professor SSUET .CERTIFICATE OF COMPLETION This is to certify that the following students Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100 have successfully completed their final year project named MULTIMEDIA CASTING OVER LAN in the partial fulfillment of the Degree of Bachelor of Science in Computer Engineering.

Dr.CERTIFICATE OF COMPLETION This is to certify that the following students Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100 have successfully completed their final year project named MULTIMEDIA CASTING OVER LAN in the partial fulfillment of the Degree of Bachelor of Science in Computer Engineering. Imran Ali Tasadduq Chairman Computer Engineering Department SSUET .

1.5 2.2.8 Administrator Managing Director Employee Teacher/Instructor Student Team Leader Stock Exchange Manager Stock Exchange Employee 2.2.2 Data Description 3.3.3.1.1 Goal & Objective 1.1.1.3 System context 1.1.2 Hardware Interface 2.5 Technology & Tools used in the project Chapter 2 Usage scenario / User Interaction 2.2 2.2 Use-cases 2.5 Deployment Interface Chapter 3 Functional & Data Description 3.1 2.2.3.3 Specials usage considerations 2.1 External Machine Interface 3.1 Major Data Objects/Signal Specification 3.1 User Interface 2.1.6 2.1 Architecture model 3.4 2.1.2 System Level Data Mode 3.3.7 2.3 System Interface Description 3.4 Theoretical Background of project 1.1 System Architecture 3.2 System statement of scope 1.3 2.1.1 User profile 2.2 Modules overview 3.2.3 Software Interface 2.3.CONTENTS Chapter 1 Introduction 1.3.4 Communication Interface 2.2 External System Interface .1.

2.Chapter 4 Subsystem/Module Description 4.1 Description for system behavior 5.2.1.2.5 Performance issues Chapter 5 Behavioral Model and Description 5.3 Actual Results and Deviation from Estimates 7.4.2 States 5.3 Control specification Chapter 6 System Prototype Modeling and Simulation Results 6.1 8.4 Prototyping requirements Chapter 7 System Estimates and Actual Outcome 7.1 Description for Subsystem ‘n’ 4.3 Special performance issues 6.4 Restrictions/limitations 4.2 Subsystem flow diagram/ desired UML diagram 4.1.4 Unit Testing Integration Testing Validation Testing High-Order Testing 8.2 Estimation techniques applied and results 7.1 Events/interrupts 5.1.2 Simulation results 6.2.2.4.1.1 System Test and Procedure 8.1 System Resources Required 7.2 State Transition Diagrams 5.1 Historical data used for estimates 7.2.1.4 System Resources 7.1 Estimation Technique 7.1 Subsystem scope 4.2 System Resources Used Chapter 8 Test Plan 8.3 Algorithmic/protocol model 4.1.3 8.1.1 Description of system modeling approach 6.2 8.2 Estimate For Technique 7.4 Test Metrics .3 Testing Resources and Staffing 8.2 Testing strategy 8.

3 VPN Environment Chapter10 Conclusion / Summary .5 Testing Tools and Environment 8.8.1 Wireless Environment 9.4.6 Test Record Keeping and Test Log Chapter 9 Future Enhancements and Recommendations 9.1 Architectural Design Metrics 8.2 Ad-Hoc Environment 9.

In every department of daily life. educationally and informational casting which build you in your desire industrial pool.SYNOPSIS In addition to being a gigantic. making some one to understand you in attractive meaningful style because you may the managing director or country manager. offices information. education and commercially we want to get some information in better style rather than hunky panky style. Now today computer networks are strongly use for communication either this is for near or far in distance. Multimedia is the collection of attractive and meaningful extensions. Of course you can communicate with these extensions over the network. There is information available on every conceivable topic. we want to share information in attractive and meaningful style. there are much attractive and meaningful information over the any medium of communication. Multimedia is the bandwidth of data when it is traveling over the network. Now a day there is high efficiency and maximum throughput over Ethernet standards. we are seeing improvement in every communication. commercial. current events information and commercial information. Multimedia communication is the master piece of information spreading phenomenon. By raising media war. Computer network provide you global services of information sharing either it is about academic information. Of course. Offices. By using multimedia casting you can interact through smart way to the people. and animation extensions. Multimedia is collection of video. images. There are many standards of computer network in term of LAN and WAN but we are considering LAN Ethernet standard for medium and small environment. meaningful and entertainment. text. you always want to like stay in better environment but It can give you better present style of your information. Everybody in the world wants to present him/her in powerful communication style. In the world of computer networks. sound. Information are getting reduction in size but getting increment in communication style. Where ever you are. There are documentary. you have the powerful communication way to present yourself stylish. LAN is the high bandwidth . Yes every department of life want to get processing by electronically. According to heavy communication we are first considering LAN environment for get Quality of services. the computer network is the world’s biggest library.

LAN has the capability of streaming multimedia with respect to quality of services. Pictures. available and intractable tool for high bandwidth of data streaming. This project provide you a co-operative medium of communication by using multimedia extensions like Video. you can communicate through multimedia extension which define your communication language very attractive able and meaningful. Animation.medium of the network communication due to its configuration. Multimedia Casting over LAN provides you streaming of multimedia extensions. Visual Text etc. Audio. it is very reliable. According to this project. By raising heavy communication extension. .

Chapter 1

Introduction

1 Introduction
In addition of the attractive, meaningful and quality of communication, there is most descent and powerful extensions for desire and quality communication. Yes we have the multimedia extensions pool to get highly attractive and meaningful style. When ever these types of extensions come over the communication medium it means you can spread your messages in very excellent communication language. Quality of communication is the part of marketing, advertising and business point of view. Whenever you are communicating over the computer networks, you should apply attractive communication language otherwise your delivered information can sink by the network traffic. Multimedia is collection of video, sound, images, text, and animation extensions. These types of extensions give you very attractive and stylish quality of communication. By raising media war, everybody wants to on-air himself by gigantic and attractive communication. In this project, multimedia extensions are the acid of communication over the computer network. We can stream video, audio in term of live as well stream real time video and voice to the listener. We can also provide live presentation of the reports and documents. Multimedia extensions enable you to spread all information over the computer network. Every communication has the medium. According to this project we adopt computer network for the communication bridge and deploy it in very secure manner. Now a day’s computer network provides different security but according this project we produced basic security in term of authorization and authentication. According to this project, authorization is term of rights which is related to server side and authentication is term to access rights by right hands. Database server is in action for maintaining access control profile. Database server provided security over the application level but in IP level we used secure socket layer (SSL) and Domain name system (DNS). Operating system has the major role to apply extra valuable services in term of network protocol, database and securities.

Sir Syed University of Engineering & Technology

1

Chapter 1

Introduction

1.1 Goals and objectives
According to this project objective, we have to provide a vital communication over the local area network. In term of communication information we have to on-stream attractive and meaningful information which describe quality of communication language. On-stream information has to give excellent view to the target user. Either target users belong to company or education or commercial, they should want good looking information for interaction. Multimedia extensions have the attractive and meaningful style. Every communication language surround by these extensions. Multimedia extensions should have minimum resources but have stylish presentation over the any communication medium. The most crucial objective of this project is that apply the any communication language with minimum resources. Communication medium has to more reliable and available with respect to target users. According to this project, we have to develop a secure and errorless network for heavy communication extensions. This network has to follow security in term of authentication and authorization. Network has to without any virus or threat. The carriers (protocols) of information have to more reliable and errorless over the bulky communication. According to project goal, there are some major terms related to on-stream information and the on-communication medium. On-stream information has to travel over the medium with out any tolerance and delay. Information will not loose required bandwidth and frame rate with respect to multimedia extensions. Multimedia extensions should have the same quality rate to the target user. Quality of service will be considered over the on-stream information by using some medium statistics and calculations. Local area network will use as a communication medium, to apply maximum throughput over the on-stream information. Ethernet is the tool in term of local area network management. This network standard will handle the security and performance issues during communication. Ethernet will provide operating system services in term of performance, integration and supervision.

Sir Syed University of Engineering & Technology

2

Chapter 1

Introduction

1.2 System statement of scope
System scope will explore in different flavor with respect to input, processing and outputs. This project is quit looking different with respect to its requirement. This project will allows you to gather multiple of information with respect to scope.

Communication Medium
Medium of communication is the input and process unit for performing different functionality in term of project life cycle. Communication medium shows like local area network with respect to security and quality purpose. Communication medium is the tool to stream information to the desire target.

Address Naming
This is the processing over the transmission medium addressing. This project will deal heaving transmission of information that needs some extra-ordinary operation during streaming. Address/IP naming is operating addressing of on-stream information. There is not static IP addressing due to heavy streaming. According to handle quality of streaming, we will refresh destination addresses and put special addresses for specific clients. This will help us for security purpose with respect to authorization and authentication.

Multimedia Extensions
Multimedia extensions are the major inputs of the project life cycle. In multimedia we have several extensions of information for communicating in right and desire way. Multimedia extensions are the on-stream extensions which have to operate in both end of Communication Bridge. These are the inputs as well as the outputs in different scenarios. Multimedia extensions are the block of on-stream information which will deal by the project processing unit.

Process Units
Project processing unit has some sub units which will take their own functional department. The real functionality of this project is to stream multimedia extension over the local area network in term of quality factor. There are many sub system for processing like authorization, authentication, streaming, controlling and measuring. Process unit can be the embedded form of different units which interconnect and communicate to each other with respect to the requirement.

Sir Syed University of Engineering & Technology

3

They are very accurate and update by using the presentation of desire goal of team management. reliability and integrity with respect to domain and market scope. market. Client or End User According to this project. system has attractive extensions that up the market presentation in stylish manner. Client will behave as a technical and co-operative employee of any industrial pool rather than a user will behave as a commercial and entertainment. According to business point of view. Student will completely converge him/her self over the lecture.Chapter 1 Introduction Quality of Streaming This is the major output of this project with respect to get quality of on-stream information. availability. 1. Sir Syed University of Engineering & Technology 4 . commercial and product domain scope. In this project quality measurement is operated by the process unit and applies other tool for getting desire and actual stream of information. we are considering the advertisement behavior by this system. Output should be in acceptable skeleton according to project life cycle. This system is classified into many places of departments. system will give the quality of interaction between the company employees. we have big picture with respect to business. This project will deal communication between the persons by suitable medium. client/end user is the most important part in term of project life cycle. According to education point of view. Teacher will concentrate to his/her lecture rather than to control student at the front of white board. According to market point of view. system creates a handsome and noiseless environment for teacher and student. According to co-operative point of view. You may market your product or anything by showing its all benefit by using attractive presentation. This system has better scope.3 System Context According to system context view. This system will give the attractive and good looking of advertisement for getting full response of target user.

This project has solid background with respect to history because there are so many applications are behaving like it. However. evolving standards and techniques and the internet transport protocols being deployed. According to this project. plugins and firewall penetration are discussed. Therefore it will remain a very heterogeneous network. Progressive Networks' RealAudio has a wide following. Ideally. The client plays the incoming multimedia stream in real time as the data is received. RSVP with the ability to control Quality of Services (QoS) and mobile networks with widely varying QoS. Then we describe the major research projects currently underway.Pictures. In particular. The idea of streaming video over the network has been gaining a lot of interest. unacceptable transfer times and playback latency. In addition. In this project we have covered a powerful application system over the network. The current Internet is a best effort network and interconnects sites with widely varying bandwidth capabililties. In the future the Internet will see the rollout of ATM. there are so many white papers and research behind its development. There are many commerical streaming video products becoming available as well as many research projects in this area.Chapter 1 Introduction 1. There are so many terminologies in this project in term of research and learning point of view like.4 Theoretical Background For a long time now. We then review the currently available commercial products which purport to provide video streaming capabilities over the Internet and out line their current limitations. Although streaming audio programs are considerably further along than video. In this report firstly we present a brief review of the current video compression standards. Current web browsers and servers support full-file transfer mode of document retrieval. Finally we compare and evaluate the SuperNOVA project with respect to other research projects and the cur rent commercial products. video and audio should be streamed across the Internet from the server to the client in response to a client request for a Web page containing embedded videos. they are still nowhere near typical computer-sound quality. full file transfer means very long.Audio. Audio streaming is becoming widely accepted and deployed.Animation etc) from the Internet. which are attempting to solve some of these limitations. First we have Sir Syed University of Engineering & Technology 5 . issues such as the need for servers. its been very easy to download and play back high-quality multimedia files (Video.

By raising media war.Chapter 1 Introduction introduced multimedia extensions in this project. Multimedia extension provide stylish and good looking preview for its listener or target user.1 Multimedia Casting Server By using multimedia extension. Sir Syed University of Engineering & Technology 6 . marketing and education environment you have to communicate in meaningful and attractive manner otherwise your target person ignore you. Now a day there are so many improvements in communication language by mean of multimedia extensions.4. Multimedia is collection of meaningful and attractive data/information. we have improved communication language by mean meaningful communication. everybody wants to communicate in stylish and attractive manner. Either you related to business. Local Area Network Multimedia casting over LAN Switch Multimedia receiver Clients Multimedia casting over LAN Figure 1.

. sound. It comes to you in a stream of digital bits. Multimedia streaming very accurate in LAN environment because there is no lost of data/ information due to high data rate and bandwidth. ready to hear or view in real time.Chapter 1 Introduction Multimedia is collection of video. protocols. Streaming media technology allows you to see or hear the content in just a few seconds. The every network environment derived from the LAN because it is the basic environment of computer network. these extension are the basic block of today’s communication. A key characteristic of both the commercial products and research demonstrators is the diversity in technological infrastructure e. According to theoretical background. without having to download all of the content before you can enjoy it. It stream over heavy bandwidth that’s why we considered LAN environment that provided desire area of bandwidth. configure and support. voice. According to this project we have consider LAN (Local Area Network) environment for Communication Bridge."This is evidenced by the eight primary commercial and thirteen research organisations involved with this technology in various ways. animation. It is easy to interface. Multimedia files can be very large. Your only wait is a few seconds for a "buffer" to be built up that helps avoid interruptions caused by Internet traffic problems. pictures and text etc. Computer network is the largest environment in this world. LAN environment is very reliable and available for heavy transfer rate over computer network.0. In the majority of cases streaming media is used to maintain control over the Sir Syed University of Engineering & Technology 7 . we have collected information of multimedia streaming in many applications like Windows Net Meeting 3.. networks. It's called "streaming" because the sound and picture data flow in a digital stream from a server computer to your computer. LAN is single administrator environment with the range of 1 Km it may exceed upon specific conditions. compression standards supported. hence the term "streaming. We considered Ethernet standard for multimedia streaming because of its high data rate and bandwidth. Streaming multimedia extensions across networks is an effort that is attracting many participants. Multimedia is the heavy and consumes space extension because it is so visualized and attractive. instead of having to wait for it. You would spend many minutes or even hours waiting for them to be downloaded to your computer if they weren't streamed.g.

Video Streaming Audio Streaming Real Time Voice Streaming Real Time Video Streaming Live Presentation Streaming Remote Streaming Secure Shared Files Streaming Table 1. This project provided Qos (Quality of Services) in term of on-stream data because there are some critical issues about on-stream data quality. There is no application available in front of it by mean of these types of services. There are so many applications available for streaming but there is some problem when you are streaming at cooperative environment. This project is the powerful tool in cooperative environment by mean of security. Multimedia clients really dependent on the multimedia server that make it cooperative with his/her team leader.4. By using central multimedia server. Every on-streamed data is provided by multimedia server by mean of secure streaming. Multimedia clients restrict over one central multimedia server.Chapter 1 Introduction distribution of the media files (because it is difficult to capture streaming video and audio). CEO. we covered many multimedia extensions for streaming. According to this project. Director and Teacher etc.1 According to this project. Sir Syed University of Engineering & Technology 8 . They all operations conducted by multimedia server for organizing a better communication environment by mean of security. You will stream that type of information that you want to send to your target user. This application is very cooperative in such type of environment where some secure multimedia streaming required. There is central multimedia server that controls his multimedia client according to his/her privilege. we considered many history applications about multimedia streaming that’s why we found a new look and style of multimedia communication. Video and audio is the major on-stream extensions but there is live presentation of documents as well remote streaming of files. we have streamed informative information to different multimedia client and obviously they would concentrate at the on-streamed information. This project is supported following streaming.

3 Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802.3 header. application tool. in which the link distance is limited by the minimum MAC frame size.5 Technology & Tools/hardware components According to this project. Technology embedded in to many environment either it belong to operating system.3. 7 1 2 or 6 2 or 6 Preamble Destination Source address Start of frame delimiter address Length of data field Table 1. we have used different technology and tool/hardware with respect to project management. Technology and tool emphasis into network and software which are describe below. there are two modes of operation: half-duplex and full-duplex modes. In the half duplex mode. Like in 802. Therefore.2 2 0-1500 Data 0-46 4 Pad Checksum Sir Syed University of Engineering & Technology 9 .4. configuring tool and third party software. development tool. This restriction reduces the efficiency drastically for high-rate transmission. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. LAN Standard 802. The main disadvantages of the half-duplex are the efficiency and distance limitation. data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a shared medium.Chapter 1 Introduction 1. In the Ethernet standard.

server. backbone. low latency Increase in large files Large bandwidth required Publications 100s of Increase in large files Imaging MB Large bandwidth required Internet Audio. manage. and a simplified administration to help enterprise customers across all industries. 3. reliability. server. server. Windows Server 2003 operating systems ship with Windows Server Service Pack 1 (SP1). A set of medium access control rules embedded in each Ethernet interface that allow multiple computers to fairly arbitrate access to the shared Ethernet channel.Chapter 1 Introduction LAN Environment Figure 1. increased reliability. server. availability. An Ethernet frame that consists of a standardized set of bits used to carry data over the system. backbone Higher bandwidth desktop.3 Microsoft Windows 2003 Server Windows Server 2003 operating systems take the best of Windows 2000 Server technology and make it easier to deploy. and scalability. Increase in large files Intranet Video Large bandwidth Extranet 1-100 required MB Low latency necessary Data TB Increase in large files Warehousing Large bandwidth Net. Windows Server 2003 SP1 provides enhanced security. low latency Higher bandwidth desktop. low latency Higher bandwidth desktop. Windows Server 2003 includes all the functionality customers need today from a Windows Server operating system to do more with less. backbone. such as security. The result: a highly productive infrastructure that helps makes your network a strategic asset for your organization. 2.2 1. Windows Server 2003 is a Sir Syed University of Engineering & Technology 10 . backbone Higher bandwidth desktop. The physical medium used to carry Ethernet signals between computers. and use. Application Scientific Modeling Data Type/ Size GB Network Traffic Impact Network Requirements Higher bandwidth desktop.5-4 Class of service Whiteboard Mbps required High volume of data Ethernet Standards Table 1. Backup required Fixed time of transmission Conferencing 1.4. backbone.4. server.

in either a centralized or distributed fashion. Windows 2003 Services Table 1. and line-of-business applications.4 Windows Server 2003 contains core technologies that build on the strengths of Windows 2000 Server to deliver a superior and cost-effective server operating system. Dynamic Host Configuration Protocol (DHCP) server. Sir Syed University of Engineering & Technology 11 . Learn about the many new features and technologies that make Windows Server 2003 an ideal server platform for organizations of any size. Directory services. Domain Name System (DNS).Chapter 1 Introduction multipurpose operating system capable of handling a diverse set of server roles. • • • • • • • • • • Availability Scalability.4. Mail server. Remote access and virtual private network (VPN) server. Windows 2003 has a lot of supreme tools for business and communication environment but we found some of them for this project management. Terminal server. Web server and Web application services. Streaming media server. extranet or Web single sign on (SSO) capabilities. public key infrastructure (PKI) deployment. depending on your needs. The common language runtime Active Directory Management services Storage management Networking and communications Windows Media Services Microsoft Active Directory Service Originally inspired by the emergence of LDAP-based solutions in the mid-1990s. Security. and Windows Internet Naming Service (WINS). white pages or yellow pages access. organizations have had success in deploying directory-enabled business solutions for key problems such as network operating system (NOS) user support. File and print server.

it does not require deployment on a domain controller. Because Active Directory Application Mode is integrated with the Windows security model. and helps organizations avoid increased infrastructure costs. additional licensing. You can use Active Directory Application Mode effectively in the following scenarios:  Application-specific directory scenarios  Application developer scenarios  Extranet access management (EAM) scenarios  Migration scenarios Developers. reinstall. or remove the ADAM application directory. and. Active Directory Application Mode represents a breakthrough in directory services technology that overcomes the previously mentioned obstacles.Chapter 1 Introduction Active Directory Application Mode achieves this goal without the burden of expensive training. scalability. You can easily install. end users. any application that is deployed using ADAM can authenticate access against Active Directory across the enterprise. and Sir Syed University of Engineering & Technology 12 . and ISVs can easily deploy Active Directory Application Mode as a lightweight directory service on most Windows Server 2003 platforms and on Windows XP Professional. maintains flexibility. while continuing to use the identity information and credentials that are stored in the organization’s NOS directory. Active Directory Application Mode is a new capability in Active Directory that addresses certain deployment scenarios that are related to directoryenabled applications. as such. An application owner can easily deploy directory-enabled applications without affecting the directory schema for the entire organization. Running as a non-operatingsystem service means that multiple instances of ADAM can run concurrently on a single server. Applications that use Active Directory Application Mode have the same reliability. making it the ideal directory service to deploy with an application. or operational costs that can be incurred by the installation of an additional directory technology to support directory-enabled applications. ADAM runs as a non-operating-system service. This allows rapid restoration to a clean state during the application prototyping and development process. Active Directory Application Mode is easily installed or uninstalled on developer workstations. and each instance can be configured independently.

security. licensing. enhanced monitoring and statistical reporting for DHCP servers. new vendor-specific options and user-class support. Organizations. most importantly. Figure 1. without having to face the increased costs associated with deploying multiple technologies for both an NOS directory and an application directory. and rogue DHCP server detection. Microsoft DHCP Server The Microsoft Windows 2000 Server network operating system includes an enhanced implementation of Dynamic Host Configuration Protocol (DHCP). for the first time you can employ a single directory technology in multiple roles. and. operations. while preserving investments that you’ve made in administrator training. multicast address allocation.4. Also Sir Syed University of Engineering & Technology 13 .Chapter 1 Introduction performance that they have with deployments of Active Directory in the NOS environment. and developers can use Active Directory in multiple roles.3 With Active Directory Application Mode. ISVs. This includes integration of DHCP with domain name system (DNS).

an open. supporting Requests for Comments (RFCs) 2131 and 2132. TCP/IP is the global network protocol of choice. configuring and administering TCP/IP network clients have traditionally been time-consuming and costly. as well as change settings while the host is attached. was an early advocate for having dynamic IP addressing technology and worked closely with other IETF members to create the DHCP solution. industry standard that reduces the complexity of administering networks based on TCP/IP. gateways. This lets all available IP addresses be stored in a central database along with associated configuration information. DHCP frees network administrators from having to configure all of the computers by hand. especially for corporate intranets adopting Internet technology. Each host computer connected to a TCP/IP network must be assigned a unique IP address. DHCP for Windows 2000 is open and based on industry standards. Figure 1.4.Chapter 1 Introduction included is a discussion of Windows Clustering. DHCP can automatically configure a host while it is booting on a TCP/IP network. as defined by IETF Requests for Comments (RFCs) 2131 and 2132. a part of Windows 2000 Advanced Server. such as the subnet mask. This is why Microsoft. However. and address of DNS servers. DHCP is open and standards-based.4 The Microsoft® Windows® 2000 Server network operating system builds on the longstanding Microsoft support for Dynamic Host Configuration Protocol (DHCP). as a member of the Internet Engineering Task Force (IETF). Sir Syed University of Engineering & Technology 14 .

Chapter 1 Introduction DHCP makes life easier for network administrators. accessible. IP addresses must be managed to avoid duplicate use. discover patterns. OLAP analysis. and the larger the network. These advantages include integrating multiple data sources with Integration Services. SQL Server 2005 provides many new and enhanced business intelligence (BI) features designed to give you a competitive advantage. Microsoft SQL Server 2000 Microsoft SQL Server 2000 is a full-featured relational database management system (RDBMS) that offers a variety of administrative tools to ease the burdens of database development. Gain an integrated view of all your business data as the foundation for your traditional reporting. Without dynamic address assignment.NET Framework is designed to fulfill the following objectives: Sir Syed University of Engineering & Technology 15 . and it is difficult to get a view of all client configurations.NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet. and writing. Microsoft . managing. we'll cover six of the more frequently used tools: Enterprise Manager. extensible. and apply these patterns to business operations with an easy-to-use. maintenance and administration. Configuration information is not centralized. Explore data.Net Frame Work The . Easily integrate data from a wide range of operational and enterprise data sources. and delivering rich reports with Reporting Services. enriching data and building complex business analytics with Analysis Services. The . clients have to be configured one by one. In this article. scorecards. Service Manager. SQL Profiler. Query Analyzer. Changes must be applied to clients by hand. Deliver the information employees need to make better business decisions—in virtually any business environment. and flexible platform. and data mining. Review the following product and technical resources and other information designed to help you improve BI in your organization. and gain competitive advantage through a holistic view of your business. the greater the benefit. Data Transformation Services and Books Online.

such as Web Forms and XML Web services. or executed remotely.NET Framework has two main components: the common language runtime and the . The . Code that targets the runtime is known as managed code. including code created by an unknown or semi-trusted third party. such as Windows-based applications and Web-based applications. To provide a code-execution environment that guarantees safe execution of code. is a comprehensive. To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments.NET Framework can integrate with any other code. The class library. • • • • • To provide a code-execution environment that minimizes software deployment and versioning conflicts. the concept of code management is a fundamental principle of the runtime. To build all communication on industry standards to ensure that code based on the . thread management. and remoting.NET Framework.NET Framework not only provides several runtime hosts. The common language runtime is the foundation of the . executed locally but Internet-distributed. thereby creating a software environment that can exploit both managed and unmanaged features. providing core services such as memory management.NET Framework class library. object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP. while also enforcing strict type safety and other forms of code accuracy that ensure security and robustness. while code that does not target the runtime is known as unmanaged code. Sir Syed University of Engineering & Technology 16 .NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code. The . the other main component of the . You can think of the runtime as an agent that manages code at execution time. In fact. but also supports the development of third-party runtime hosts.NET. To make the developer experience consistent across widely varying types of applications.Chapter 1 Introduction • To provide a consistent object-oriented programming environment whether object code is stored and executed locally. The .NET Framework.

Chapter 1

Introduction

Internet Explorer is an example of an unmanaged application that hosts the runtime (in the form of a MIME type extension). Using Internet Explorer to host the runtime enables you to embed managed components or Windows Forms controls in HTML documents. Hosting the runtime in this way makes managed mobile code (similar to Microsoft® ActiveX® controls) possible, but with significant improvements that only managed code can offer, such as semi-trusted execution and secure isolated file storage.

Figure 1.4.5 The .NET Framework class library is a collection of reusable types that tightly integrate with the common language runtime. The class library is object oriented, providing types from which your own managed code can derive functionality. This not only makes the .NET Framework types easy to use, but also reduces the time associated with learning new features of the .NET Framework. In addition, third-party components can integrate seamlessly with classes in the .NET Framework. • Console applications.

Sir Syed University of Engineering & Technology

17

Chapter 1

Introduction

• • • •

Windows GUI applications (Windows Forms). ASP.NET applications. XML Web services. Windows services.

Microsoft Visual C#
Visual C# .NET 2003 is the comprehensive toolset for creating XML Web services and Microsoft .NET—connected applications for Microsoft Windows® and the Web. This robust development package, which uses the component-oriented C# development language, offers beginning and intermediate developers with C++ or Java experience a modern language and environment for creating next-generation software. Visual C# 2003 delivers superior functionality for streamlining business processes, including: • • • • Rapid design, development, and deployment support for creating and consuming Web services. Form designers and visual controls for creating rich Windows-based applications. Authoring tools and services for building powerful Microsoft .NET server-based solutions. Migration tools for converting Java-based projects to the Microsoft .NET development environment. With Visual C# .NET 2003, developers can build solutions for the broadest range of clients, including Windows, the Web, and mobile or embedded devices. Using this elegant programming language and tool, developers can leverage their existing C++ and Java-language skills and knowledge to be successful in the .NET environment. Visual C# .NET 2003 includes a powerful remote and multi-language debugger, enabling developers to test applications and build reliable multi-tier solutions that span process boundaries and are written in multiple programming languages. Note: Remote debugging is available only in Visual Studio .NET Professional Edition and higher. Employ "unsafe" code to call native Windows APIs, use pre-built COM components, and leverage existing ActiveX® controls to seamlessly integrate existing applications and components.

Sir Syed University of Engineering & Technology

18

Chapter 1

Introduction

Microsoft ADO.Net
With ADO.NET, developers gain access to more powerful components, such as the Dataset class and a strongly typed programming model that provides IntelliSense and statement completion for data access code. Unlike classic ADO, ADO.NET is optimized to provide the very best performance and scalability for both connected and disconnected data-centric applications. The Data Set class is a great way to query and update data while minimizing the time necessary to hold onto a costly connection to the database. Classic ADO was great for sending and receiving data; however, there were limited ways to work with the data once the developer closed the connection. This lead many developers down a path that limited the performance, responsiveness, and scalability of their system. The Data Set acts like an in-memory copy of the database, including multiple tables, relationships, and the ability to track the original and new values. In this way, a portion of the database can be brought down to the client via the Data Set class, updated with new data, and then sent back to the server to be merged back into the database. Using Visual Basic .NET and ADO.NET, developers can quickly be productive and create a data management application with minimal coding involved. The Data Adapter Configuration Wizard can generate all of the code necessary to select, insert, update, and delete data from any table in the database. Further, unlike classic ADO, it provides the developer with the ability to customize each SQL command and can even create the stored procedures.

ADO .NET

Sir Syed University of Engineering & Technology

19

The API has been extensively updated to make it even easier to use and to support the latest graphics hardware.0 has received major new features that greatly enhance the capabilities of DirectX. ADO. DirectShow® is a part of DirectX. it provides the power and productivity required by developers. Video Conferencing – Each computer participating in the conference is both a client and a server.Chapter 1 Introduction Figure 1. audio. And since it is tightly integrated into the . This can provide a performance boost since the Visual Basic .NET Framework and the Visual Studio . This makes database calls faster and far more efficient. The most compelling new feature is support for programmable shaders (a shader is a piece of code written in a shading language that is designed to be used in either the programmable vertex pipeline or the programmable pixel pipeline). DirectX Graphics component.4. And for the first time. Three components have had major rewrites: graphics. Live Presentations over the Web – Capture screen activity on a server and send to one or more clients.NET builds upon previous versions of data access models. you would have the Server application running on one computer and the Client application running on one Sir Syed University of Engineering & Technology 20 .NET code doesn’t need to traverse through multiple API layers before it gets to the actual database.0 or greater.NET includes new data providers that were specifically created to talk directly to databases such as SQL Server 7. To implement a Security Server or Web Cast type application. and networking. DirectInput® includes new configuration functionality. There is also a data provider for OLEDB-supported databases and even some new data providers that offer direct access to other databases such as Oracle. and better international support. Lead Technology Tool The LEADTOOLS Video Conferencing SDK can be used to create Client Server applications such as: Security Server / Web Cast – Single sever sending to multiple clients. action mapping.NET IDE.6 ADO. both in the runtime and in the SDK. Microsoft Direct X Every component of DirectX 8.Briefly.

Once the Clients connect to your server. then Client#2 would have missed the first 5 minutes of the video. For example. its IP address will appear next to “connection”. When you run the Client application. the machine(s) to receive the video must know that IP address in order to be able to connect to the server. For example. To conference with more than one person. it will ask you for an IP address to which you wish to connect. it will ask you for an IP address to which you wish to connect. and have a 2nd party do the same. a viewing station could monitor multiple security camera locations. When you run the Server your IP address will appear next to “connection”. each machine in the conference should run the server. you can run both the Client and Server applications on each computer that will participate in the conference. You can run the Client application on one machine and connect to as many servers as you wish from the same client. they will be able to see what is happening on your desktop and they will hear Sir Syed University of Engineering & Technology 21 . When you run the Server application. using the same client you can connect to as many IP addresses as you want. if Client#1 connects at 10:00 and Client#2 connects at 10:05. The Client computers would all be able to receive and see the video data being captured and sent from the Server. It is also possible to have one Client application receive data from more than one Server application. You can run both the Server and Client applications on your machine. the party with which you are conferencing must have that address in order to be able to connect to you. The Client computers would see the data from the time that they connect. you need to have their IP address in order to connect to them. You can create and broadcast live presentations over the web using using the LEAD Screen Capture filter as the video device on the Server side and the LEAD Screen Capture encoder to compress the video data.Chapter 1 Introduction or more remote computers. all you need is the IP addresses of all the servers to which you wish to connect and monitor. In other words. each computer plays the role of both client and server. When you run the Client application. meaning to as many servers as you want (one client can connect to many servers). And. For this. To implement a Video Conferencing application.

PERSON A Initialize Connect OnStatusEvent: 51 (51 = CONNECTING) OnConnectionEvent AcceptIncomingCall OnStatusEvent: 51 (51 = CONNECTING) OnStatusEvent: 53 (53 = CONNECTED) OnStatusEvent: 53 (53 = CONNECTED) AddInConf OnStatusEvent: 59 (59 = ADDING) OnAddConferenceEvent AcceptAddInConf OnStatusEvent: 59 (59 = ADDING) OnStatusEvent: 60 (60 = ADDED) OnStatusEvent: 60 (60 = ADDED) OnStatusEvent: 60 (60= ADDED) OnStatusEvent: 60 (60 = ADDED) PERSON B Initialize PERSON C Initialize Successfully connected and having Voice Conversation Successfully added and all of them having Voice Conference Table 1. It is NAT and other firewalls friendly. VaxExtended Tool VaxExtended SDK is the best peer-to-peer VoIP solution. during the conference each end receives multiple voice streams and mix them into single voice stream and play it over the sound device. Extended SDK is a perfect solution to have small private conferences. WAN or Internet. Screen activity and sound are recorded and encoded using the LEAD Screen Capture encoder and then transmitted to the Client applications. WAN or Internet.Chapter 1 Introduction what you are saying. Enable the port forwarding at the router end in order to receive incoming connection requests. Due to client side voice mixing. Two or more persons can connect to each other on the direct IP-to-IP connection to have real-time voice conference over the LAN.5 Sir Syed University of Engineering & Technology 22 . where 8 to 10 persons can connect and have Real-Time voice conference over the LAN.4. It supports client side voice mixing. in which. If the client is behind the NAT/router then there is no configuration required to connect to listening end.

2. User interaction is totally independent in term of project scenario and interaction based on the target and mange user. Especially in laboratory education he/she Sir Syed University of Engineering & Technology 23 . He/she is also the cooperative with the other users of the system. Teacher/Instructor According to the teacher point of view. Employee In every industrial pool we have a lot of employee. They work together but how they can interact directly to their team leader or the director.1 User profiles The different types of users with their hierarchies and their description are given as follows: Administrator He/she is the most powerful user according to system maintenance and support. Administrator is the controlling user in term of system flow.Chapter 2 Introduction 2 Usage scenario / User Interaction This project is really a market oriented. business oriented and education oriented tool for communication. He/she announce any announcement for his/her employee. There is some special scenario about the user and his requirement. If they all went to director or team leader so there is huge bulk of employee at the door of director/team leader room. He/she provides help to other users on how to use the system and troubleshoots the system. According to this system. Managing Director Managing director is the upper level management user. announcement and circular by using this system approach. He/she is also able to spread his/her command directly to his/her employee desktop. he/she will able to update his/her employee directly through multimedia communication and present some thing live to his/her employee by mean of multimedia communication. Every employee updated with respect to any command. he/she will get the powerful tool for teaching and spreading information to the students. He/she makes sure the system is working properly and the system is secured with respect to system availability and reliability. Usage scenario based on the project’s target user as well the manage user.

Student will get their notes/lectures directly through the teacher system. Stock Exchange Manager Stock exchange has the lot of employee and stock partner. Stock exchange manager will update his/her stock partner and employee by mean of live reports and documentation. Sir Syed University of Engineering & Technology 24 . They will able to get statistics and calculation very quick because all information at their desktop. Students will have deep look on their lecture at their computer screen. This system gives the noiseless education environment with respect to teacher point of view. There is no need for team member to go through table to table of each team mate member. Team Leader Team leader will operate his/her team member directly under the one building. Stock Exchange Employee Stock exchange employee will very update and accurate by mean of live transmission. Teacher will concentrate over his/her topic rather than to control student. Team leader will directly get the task execution by his/her team member and deliver to the director.Chapter 2 Introduction will enable to give lecture at the desktop of the students. Student Students will easy to get their lecture with out any confusion because there is no white board in term of lecture and presentation.

2.2 Use-cases Video Streaming Audio Streaming Real Time Video server Real Time Voice User Remote Streaming Share File Live Presentation Overall Use Case Figure 2.Chapter 2 Introduction 2.1 Sir Syed University of Engineering & Technology 25 .

2 Streaming Video Streaming Audio Managing Director Loggin Real Time Voice Remote Streaming Live Presentation Managing Director Use Case Figure 2.2.3 Sir Syed University of Engineering & Technology 26 .Chapter 2 Introduction System Support Streaming Video Streaming Audio Real Time Video Administrator Loggin Real Time Voice Remote Streaming Testing Share File Live Presentation Administrator Use case Figure 2.2.

2.2.4 Streaming Video Streaming Audio Real Time Video Teacher Loggin Real Time Voice Remote Streaming Share File Live Presentation Teacher Use Case Figure 2.5 Sir Syed University of Engineering & Technology 27 .Chapter 2 Introduction Streaming Video Streaming Audio Real Time Video Employee Loggin Real Time Voice Remote Streaming Share File Live Presentation Employee Use Case Figure 2.

6 Remote Streaming Team Leader Loggin Live Presentation Share File Team Leader Use Case Figure 2.7 Sir Syed University of Engineering & Technology 28 .2.2.Chapter 2 Introduction Streaming Video Streaming Audio Real Time Video Student Loggin Real Time Voice Remote Streaming Share File Live Presentation Student Use Case Figure 2.

Chapter 2 Introduction Streaming Video Real Time Video Stock Exchange Manager Loggin Remote Streaming Live Presentation Stock Exchange Manager Use Case Figure 2.2.2.9 Sir Syed University of Engineering & Technology 29 .8 Real Time Video Remote Streaming Stock Exchange Employee Login Live Presentation Share File Stock Exchange Employee Use case Figure 2.

Hardware Interface In hardware interface. Sir Syed University of Engineering & Technology 30 . Software Interface The basic building block of the software interface is the operating system. There are some operating system services have used in this system like security and socket.3 Special usage considerations There is some special consideration for system quality. We have used Microsoft based operating system. In communication interface we have consider reliable and pre-request LAN card for communication.U and LAN card and network switch etc. mouse and trackball are the parts of input and monitor and printer are the parts of output. Key board. According to graphically user interface (GUI). Software interface should have the compatibility with the operating system and the third party software. There are some third party tools for maximum system throughput. Some specifications are described by hardware and some by software. we have considered all prospects with the user friendly terminology. Communication interface has the flavor of both software and hardware interface.Chapter 2 Introduction 2. We have also considered the medium which is wired. Server system should have any server product of Microsoft operating system. GUI is easy to use and very good looking for the target eyes. we have considered all hardware tools like system and other third part hardware like input. Special usage of consideration lies in different scenario of the system usage.P. We have used central and server based database system for security and streaming. Client system should have the same specification but it is not necessary to use server product at the client side. In this section special requirements that will be used during the process development & usage of the overall application that includes the following User Interface This is the basic building block of this system because system will never become a market oriented product when ever it is not very friendly to target user. We have used Ethernet standard for LAN. User interface included all the benefits according to target user. process and output interface. Communication Interface Communication is the tool of this project. Process part divided in two many sub part like C.

Deployment has done by the same operating system environment at the both end of medium. System configuration has the major role in deployment interface. During deployment we have to consider the operating system compatibility with the other third party software. Sir Syed University of Engineering & Technology 31 .Chapter 2 Introduction Deployment Interface This is the major interface because project is becoming product by using deployment interface.

The multimedia data pointed by sub-data object which are the cause of multimedia communication over the network. The relationship of data object with respect to functionality is quiet observable with respect to execution. Following table shows some brief idea about functional and data description. This system is working upon different functionality and data description. The major theme divides into two systems which are server and client. The overall system connected with similar theme of modeling which based on different sub-functions and data description. Functionality is all about data processing over the network. we have a lot of functionality and data description of different level of execution. System Description Functionality Main functionality Sub functionality Internal functionality External functionality Control functionality Figure 3. Every system has its own functionality and data modeling with respect to execution. The major characteristic is about the data object processing in term of multimedia extension.Chapter 3 Functional and Data Description 3 Functional and Data Description According to this project. Functionality is based on the data object either they used as sub-system or sub-executable.1 Data Description Data entity Data Object Data Behavior Data relations Data operations Sir Syed University of Engineering & Technology 32 .

1. Administrator Managing Director Teacher Instructor Multimedia Casting Over LAN Video Streaming Audio Streaming Real Time Voice Streaming Real Time Video Streaming Presentation Streaming Remote Streaming Stock Exchange Manger Employee Overall System Architecture Figure 3.1 System Architecture This is the overall architecture for both application like Multimedia Server and Multimedia Client.1 Student Sir Syed University of Engineering & Technology 33 .Chapter 3 Functional and Data Description 3.

Chapter 3 Functional and Data Description 3. This is the first basic module of this system. It checks user privileges from the directory services of operating system. Multimedia Server Login Synchronize Cock Maintain Database erver Multimedia Client Login Streaming Multimedia Block Diagram of the System Block Figure: 3.1.1 Architecture model The project block diagram is shown here as a brief context level model of the system architecture. Server Configuration Module This is the module that gets the network address of the server and applies it over all application for multimedia streaming. Sir Syed University of Engineering & Technology 34 .1.2 Modules overview Authentication Module This is the major module for the security in term of authorization and authentication. This module provided a secure login at the both end of application. It gets simple a complete IP address and the system name resolve by network class.1.2 3.

we have considered a central database system for communication.Chapter 3 Functional and Data Description Database Module This module communicates with the database server for signaling.2 Data Description According to this project. There are the lists of sub modules which lie in this section. There are the lists of sub modules which lie in this section. • • • • • • Listen Video Listen Audio Listen Live Listen Camera Listen Remote Listen Shared Files Multimedia streamed Module This is the complete module of multimedia streaming. Data objects are behaving as signals for multimedia clients. It provides a major back end operation with respect to multimedia streaming. It is the initial connection to produce synchronization between multimedia server and client. The overall system connected with similar theme of modeling which based on different sub-functions and data description. It has sub-module with respect to connection and action. It has sub-module with respect to connection and action. All multimedia extension is streamed by this module with respect to current operation with in the span of time. Multimedia extensions Module This is the complete module of multimedia streaming. • • • • • • Listen Video Listen Audio Listen Live Listen Camera Listen Remote Listen Shared Files 3. The major characteristic is about the data object Sir Syed University of Engineering & Technology 35 . All multimedia extension is streamed by this module with respect to current operation with in the span of time.

2 Present_Connect Attributes Present_Index Present_Name Present_Path Table 3. It stream valuable data/ information in the manner of security. It generate clock for signal accessing by mean of data objects.2.1 Major data objects/signal specification Video_Connect Attributes Video_ Index Video_Stream Video_Name Video_PlayList Video_Duration Video_Position Is_Video_skip Table 3. It is provided a full management of multimedia streaming over the network.2. business and education environment.2.1.1. 3. Security is also provided by the database server.1 Voice_Connect Attributes Voice_Index Server_Name Server_Ip Table 3. Data description is the all over flow of signals by mean of multimedia extensions. Data objects and their instance values accessed by the multimedia clients by mean of security. This project is the great tool in cooperative.1.2.Chapter 3 Functional and Data Description processing in term of multimedia extension.3 Type decimal varchar varchar Type decimal varchar varchar Type decimal varchar varchar varchar varchar float float Sir Syed University of Engineering & Technology 36 . Functionality is all about data processing over the network.

2.1.2.6 Client_Info Attributes Client_ Index Client_Name Client_Pass Table 3.4 Shared_File Attributes Index_File File_Name File_Path Table 3.2.Chapter 3 Functional and Data Description Remote_Connect Attributes Remote_Index Remote_Name Remote_Path Table 3.1.2.1.7 MultiMedia_Info Type decimal varchar varchar Type decimal varchar Type decimal varchar varchar Type decimal varchar varchar Attributes MM_ Index MM_User MM_Ct MM_File MM_Path MM_Stime MM_ETime Table 3.1.8 Type decimal varchar varchar varchar varchar varchar varchar Sir Syed University of Engineering & Technology 37 .2.5 Status_Table Attributes Status_Index Status_Of_streaming Table 3.1.

Chapter 3 Functional and Data Description Server_Config Attributes Host_ Index Host_Name Host_IP Table 3.1.2.10 Video_Actions Attributes Type Changed_ Index decimal Changed_Video varchar Changed_Position float Is_Stoped int Is_Played int Is_Paused int Table 3.2.2.12 Type decimal varchar float int int int Type decimal varchar varchar varchar float varchar float Type decimal varchar varchar Sir Syed University of Engineering & Technology 38 .1.11 Audio_Actions Attributes Changed_ Index Changed_Audio Changed_Position Is_Stoped Is_Played Is_Paused Table 3.2.1.1.9 Audio_Connect Attributes Audio _ Index Audio_Stream Audio _Name Audio _PlayList Audio _Position Audio _Duration Is_Audio_skip Table 3.

Multimedia Server Multimedia Server Database Server Client 1 Client 2 Client 3 Figure 3.3 System Interface Description This project has the flavor of both networking and software.Chapter 3 Functional and Data Description Voice_Action Attributes Voice_Action_ Index Voice_Signal Table 3.1. There are some interfaces by mean of networking such as a desired LAN card for connecting system over LAN environment. Sir Syed University of Engineering & Technology 39 . the major components and hardware are shown in the form of DFD.2 System level data model Under this section.13 Type decimal varchar 3. Every system that wants to communicate with multimedia server then it should be providing desire user name and user password for multimedia streaming.2.2 3.2.3. Other thing is about the network switch which is used for the same network family.

we considered a lot of active X control for development. We considered a lot of control and classes provided by development environment.1 External machine interfaces Member Server Member server is the client machine which is driving by any server product operating system.2 External system interfaces  Combo Box  Button  Checked List Box  Menu  Data Grid Sir Syed University of Engineering & Technology 40 . There are some operating system services by mean of control interfaces and some third party tool be considered. 3.Chapter 3 Functional and Data Description According to software interfaces.3. Web Camera Web camera is the other external machine used for real time video streaming because it is the part of multimedia extensions. Multimedia client may be a workstation it is on customer.3. Ethernet Switch Ethernet card has used for multimedia bridge because we have a lot of system requirement over LAN. We have windows 2003 server machine as a multimedia client so windows 2003 server made it a member server. 3. Work Station Work station is simply a client machine which is connected to the server. Member server may use as a backup of multimedia server or its said to be a backup server. Web camera has interfaced by development tool like C#. Ethernet make a single administrator network environment which belong to our requirement. Work station has not any server product like Windows 98/XP.

Sir Syed University of Engineering & Technology 41 .Chapter 3 Functional and Data Description  Label  Text Box  Group Box  Panel  Main Menu  Tool bar  Vax-Extended object  Lead Control object  Media player 9.0  Web browser control  Rich text box buffer  Status bar  System performance control  Image list.

Member server may use as a backup of multimedia server or its said to be a backup server. Sir Syed University of Engineering & Technology 42 .Chapter 4 Subsystem Module Description 4 Sub-system module Description According to this project we have both network and software flavor and their subsystem and module. Work Station Work station is simply a client machine which is connected to the server. Web Camera Web camera is the other external machine used for real time video streaming because it is the part of multimedia extensions.3 It is used for connection based on LAN standard Ethernet. Ethernet card based on 802. Member Server Member server is the client machine which is driving by any server product operating system. According to hardware/network sub system. Ethernet Switch Ethernet card has used for multimedia bridge because we have a lot of system requirement over LAN. Ethernet make a single administrator network environment which belong to our requirement. Work station has not any server product like Windows 98/XP. We used wired Ethernet card due to its high bandwidth and data rate. we have considered following component. We have windows 2003 server machine as a multimedia client so windows 2003 server made it a member server. We used 100 Mbps configuration Ethernet card for multimedia communication. Web camera has interfaced by development tool like C#. Multimedia client may be a workstation it is on customer.

Server Configuration Module This is the module that gets the network address of the server and applies it over all application for multimedia streaming.  Listen Video  Listen Audio  Listen Live  Listen Camera  Listen Remote  Listen Shared Files Sir Syed University of Engineering & Technology 43 . It gets simple a complete IP address and the system name resolve by network class. This is the first basic module of this system. All multimedia extension is streamed by this module with respect to current operation with in the span of time. It checks user privileges from the directory services of operating system. It has sub-module with respect to connection and action. Database Module This module communicates with the database server for signaling. It provides a major back end operation with respect to multimedia streaming. Multimedia streamed Module This is the complete module of multimedia streaming. It is the initial connection to produce synchronization between multimedia server and client. Software modules belong to development modules and third party tools that are interfaced during development. Authentication Module This is the major module for the security in term of authorization and authentication. This module provided a secure login at the both end of application.Chapter 4 Subsystem Module Description According to software we have used several modules for development. There are the lists of sub modules which lie in this section.

 Video Action  Audio Action  Live Action  Web Camera Action  Voice Action Vax-Extended Module Vax-Extended module belongs to third part tool for voice streaming.Chapter 4 Subsystem Module Description Multimedia action Module According to this module. Some hardware scope is defined by the development domain. According to hardware. Lead Module Lead control module also belongs to third party tool for real time video conferencing. After all client should have any operating system of Microsoft family rather than Windows 95/98 etc.1 Description for Subsystem We considered subsystem scope in the manner of reliability and availability of the system. 4. It is responsible for voice streaming on the specific port that provided by in term of hard cord. Server should have any server product of Microsoft based operating system. the overall action that is performed by multimedia server is noticed here because client has to synchronize with the specific operation that applied over multimedia extensions. we considered communication system over network like server and clients. It is responsible for voice streaming on the specific port that provided by in term of hard cord. we considered some special subsystem or module for communication. It communicates over IP addresses of the systems but it is not hard corded. It creates real time voice session between multimedia server and clients. It captures the real time video in the file and then stream over the network. we consider network switch that support minimum eight client machine for communication and support high bandwidth of Sir Syed University of Engineering & Technology 44 . Multimedia action modules carry signal to database server and client automatically get actions with in span of time. It communicates over IP addresses of the systems but it is not hard corded. According to multimedia server.

10 Gbps Ethernet (IEEE 802.3. The major subsystem is about the network based component called Ethernet card based on IEEE standard 802. In the Ethernet standard. The several types of queries execute in the span of time for multimedia communication. It should be capture 30 to 40 frames per second for desire quality. data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a shared medium.1 Subsystem scope Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802.3)  100 Mbps . Third party tools provided some restricted operation but we have interfaced them in extra ordinary style.10Base-T Ethernet (IEEE 802. This is the tool for security purpose with respect to authentication. Each Ethernet-equipped computer operates independently of all other stations on the network: there is no central controller. There are some third party tool interfaces with respect to project services. In the half duplex mode.3. The other module is about the data base server which is very important for communication because database server behave like a bridge for signals of multimedia extensions. All stations attached to an Ethernet are Sir Syed University of Engineering & Technology 45 .3u)  1000 Mbps . Four data rates are currently defined for operation over optical fiber and twisted-pair cables:  10 Mbps . Database server uses its services in term of queries in the desire span of time.Chapter 4 Subsystem Module Description data. there are two modes of operation: half-duplex and full-duplex modes. Third party tool applied in the extra scope of utilization with respect to project scope.3z)  10-Gigabit . Ethernet card considered high bandwidth and data transfer rate. There are many subsystems like the authentication system interact with directory services of the operating system.Gigabit Ethernet (IEEE 802.Fast Ethernet (IEEE 802.3ae). According to real time streaming we considered a quality capture web cam for real time streaming.1. Database server directly communicates with multimedia server and client on the specific request. This is the high bandwidth supported LAN card for heavy communications. 4.

To send data a station first listens to the channel. or packet. and when the channel is idle the station transmits its data in the form of an Ethernet frame.Chapter 4 Subsystem Module Description connected to a shared signaling system. The medium access control mechanism is based on a system called Carrier Sense Multiple Access with Collision Detection (CSMA/CD). all stations on the network must contend equally for the next frame transmission opportunity. Sir Syed University of Engineering & Technology 46 . also called the medium. Access to the shared channel is determined by the medium access control (MAC) mechanism embedded in the Ethernet interface located in each station. After each frame transmission.

2 Subsystem flow diagram/ desired UML diagram Start YES Install Multimedia application Multime dia streamin g NO Login to directory service of OS Wait for streaming End Server initialization Login to directory service of OS Client joins the server Server found YES NO Connected to server Figure 4.1.1.1 4.3 Algorithmic/protocol model Sir Syed University of Engineering & Technology 47 .2.1.Chapter 4 Subsystem Module Description 4.

including initiation of frame transmission and recovery from transmission failure Even though the media segments may be physically connected in a star pattern. if you have too many applications open. Sir Syed University of Engineering & Technology 48 . The MAC sub-layer has two primary responsibilities:  Data encapsulation. it helps to understand the topology of the system.4 Restrictions/limitations The main disadvantages of the half-duplex are the efficiency and distance limitation. 4. The logical topology of an Ethernet provides a single channel (or bus) that carries Ethernet signals to all stations. If you notice things are sluggish.5 Performance issues  A slow computer. in which the link distance is limited by the minimum MAC frame size. It provides a secure communication in term of security issues. the ISO data link layer is divided into two IEEE 802 sub layers. to distinguish it from the actual physical layout of the media cables.Chapter 4 Subsystem Module Description As with all IEEE 802 protocols. including frame assembly before transmission. with multiple segments attached to a repeater. Just keep your Web browser and your media player open. When it comes to how signals flow over the set of media segments that make up an Ethernet system. the Media Access Control (MAC) sub layer and the MAC-client sub layer. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance.3 physical layer corresponds to the ISO physical layer. the logical topology is still that of a single Ethernet channel that carries signals to all stations. The restriction over multimedia streaming is about to over flow because if we consider multiple multimedia extensions so it may effect on your system performance. The signal topology of the Ethernet is also known as the logical topology. and frame parsing/error detection during and after reception  Media access control. 4. it could slow down your media streaming.1. The IEEE 802. 802 protocols support our desire protocol like TCP/IP for errorless and lossless communication.1. This restriction reduces the efficiency drastically for high-rate transmission. close all unnecessary applications and windows running on your computer. Therefore. Even with a fast computer.

in which the link distance is limited by the minimum MAC frame size.  The main disadvantages of the half-duplex are the efficiency and distance limitation. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance.) In any case. This restriction reduces the efficiency drastically for high-rate transmission.  Noisy phone lines. Sir Syed University of Engineering & Technology 49 .Chapter 4 Subsystem Module Description (If you're just listening or watching. Disconnect any phones that cause a buzz or hum. Therefore. crackling). you can even close your browser. speedy computers are better. that's not good for streaming (or Web browsing). Of course. Have your phone company check your line to get rid of humming or other line noise. a cable modem or DSL connection is best for streaming media. If you have a phone line that isn't free of noise (humming.

Clock event Call itself in specific span of time like recursion. Multimedia streaming is the basic behavior of multimedia server but there are some other behavior included for controlling.1 Description for system behavior According to the system behavior. Multimedia client has a powerful control by mean of its communication with respect to multimedia streaming. According to multimedia server. The login event deals the security in term of authentication and authorization. Multimedia server should be in the hand of authentic person of any industrial pool. After authorization multimedia server is got its listening address by the network. Multimedia server called database services in the Sir Syed University of Engineering & Technology 50 . 5. Multimedia client has several behavior states with respect to server acknowledgement due to central database system. The next major event is about to synchronize with database server. The basic behavior is about to get multimedia streaming from the multimedia server but it can change with in second. Multimedia server behavior is controlled by some operating system services and third party software. Multimedia server has some major behavior with respect to multimedia streaming but it is not least according to system performance. there are a lot of flavors with respect to states and events. Multimedia client has also used some operating system service and third party tool for desire execution. The major event is about to generate a clock for synchronization. There are several states of event from ideal state to busy state. Multimedia client converge its attention to its server because in every second multimedia server can get different state with respect to multimedia streaming. According to multimedia client. We used an event for authentication with the directory service of operating system. optimizing and integration. Multimedia server has a powerful control behavior with respect to system states because there are heavy data transfer rate over the network by mean of multimedia streaming. There are so many behavior characteristics which are the cause of system action and performance. we have some same behavior states with respect to multimedia server. we have different behavior with respect to its states of execution.Chapter 5 Behavioral Model and Description 5 Behavioral Model and Description According to multimedia server. we have considered a strong security mechanism with respect to login state. Listening address got globalize for its multimedia clients.

 Stream multimedia extensions. Internally operating system grants his/her connection by mean of login application of this project.Chapter 5 Behavioral Model and Description span of time with respect to requirement. first event is about the authentication of clients. The administrator or the team leader can stream multimedia extension over the network. multimedia is on the state of communication.  Get multimedia streaming.  Connect to database server. After connection.  Close all operation and services related to project.  Calculate network statistic. There are complete library of multimedia extension ready for streaming. 5.  Listen clients for assigning address.1 Events Multimedia Server  Login to directory service and DNS. Multimedia client has an synchronized clock to database server for signaling about on-stream multimedia extensions. Sir Syed University of Engineering & Technology 51 .  Interface third party software with operating system.  Generate clock for synchronization. Multimedia client has to login with the directory service of operating system. multimedia clients have to wait on-stream multimedia streaming that is controlled by multimedia server.1. According to multimedia client. After connected database server. Multimedia clients are dependent on the multimedia server otherwise they will not able to get any information.  Maintained record for multimedia clients. Multimedia Client  Login to directory service of Multimedia server.  Generate a clock for synchronization.  Using operating system services.  Assign communication port.  Contact to central database system like multimedia server.

 Calculate network statistics.  Authorization by Windows Directory services.Chapter 5 Behavioral Model and Description  Using operating system services.  Call third party services.  Maintaining database.  Calculate network statistics.  Calculate network statistic.  Initialized Main Form  Enable menus and controls.  Display database form. Multimedia Client  Initialize login form.1.  Access central database.  Call third party services.  Close all operation and services related to project.  Authentication  Enable controls.  Monitoring database.  Finish. 5. Sir Syed University of Engineering & Technology 52 .  Authentication  Enable controls.  Interface third party software with operating system.2 States Multimedia Server  Initialize login form.  Initialized Main Form  Enable menus and controls.  Finish.

Net framework State 6 Streaming MultiMedia Extensions from Server State 3 Install Multimedia Server application State 7 Receive the on-stream by User State 4 Application icon generated on the desktop Figure 5.2.2 State Transition Diagrams Multimedia Server State 1 State 5 Administrator initiates the setup Run the application State 2 Install .1 Sir Syed University of Engineering & Technology 53 .Chapter 5 Behavioral Model and Description 5.

2 Sir Syed University of Engineering & Technology 54 .NET framework State 6 Streaming MultiMedia Extensions from Server State 3 Install Multimedia Client application State 7 Receive on-stream Multimedia Client State 4 Application icon generated on the desktop Figure 5.2.Chapter 5 Behavioral Model and Description Multimedia Client State 1 State 5 User initiates the setup Run the application State 2 Install .

Chapter 5 Behavioral Model and Description 5.3 Multimedia Server Multimedia Client Active Directory Services Generate clock Generate clock Connect to DBS Connect to DBS Stream Multimedia Get On-stream Data Control DBS Multimedia actions Calculate Network Statistics Figure 5.3 Control specification There are some specific states of control with respect to project services. The overall control of flow is given in figure 5.1 Calculate Network Statistics Sir Syed University of Engineering & Technology 55 .3.

According to this project. Simulation result gave us overall idea about system performance and execution.1 Description of system modeling approach System Development Life Cycle Model We considered most famous model like System Development Life Cycle which is also known as Classic Life Cycle Model (or) Linear Sequential Model (or) Waterfall Method. Code Generation. This system view is essential when software must interface with other elements such as hardware.1 Information about Modeling and engineering As software is always of a large system (or business). Systems Analysis and Design. System prototype gave us theoretical as well as practical description about system execution in term of desired performance. Once the ideal system is engineered or tuned up. Simulation result is about the real time process of any system that works with in its desired domain. we considered universal prototype model for simulation. Sir Syed University of Engineering & Technology 56 . System is the basic and very critical requirement for the existence of software in any entity. So if the system is not in place. people and other resources. There was some enhancement in this model according over project deployment. Software Requirements Analysis. Testing and Support. the development team studies the software requirement for the system. Information about Modeling and engineering. work begins by establishing requirements for all system elements and then allocating some subset of these requirements to software. 6.Chapter 6 Results System Prototype Modeling and Simulation 6 System Prototype Modeling and Simulation Results System prototype modeling is the approach of project simulation with respect to expected result that you want after compilation. This has the following activities. Deployment. the system should be engineered and put in place. We considered universal model but added some useful phase for system modeling. Table 6. system should be re-engineered and spiced up. In some cases to extract the maximum output.

Different high level programming languages like C. With respect to the type of application. It also includes the personnel assignments. the team furnishes a document that holds the different specific recommendations for the candidate system. Different testing methodologies are available to unravel the bugs that were committed during the previous phases. code generation can be accomplished with out much complication. Sir Syed University of Engineering & Technology 57 . the program testing begins. By the end of the feasibility study. Any glitch in the design phase could be very expensive to solve in the later stage of the software development.Net. VB. behavior. The requirements gathering process is intensified and focused specially on software. project schedule. Analysis and Design are very crucial in the whole development cycle. C# are used for coding. Testing and Support Once the code is generated. Much care is taken during this phase. the right programming language is chosen. the data structure design etc are all defined in this phase. the development team visits the customer and studies their system. the database design. To understand the nature of the program(s) to be built. Systems Analysis and Design In this phase. The logical system of the product is developed in this phase. The code generation step performs this task. the software's overall structure and its nuances are defined. performance and interfacing. costs. In this phase. Interpreters. If design is performed in a detailed manner. as well as required function. They investigate the need for possible software automation in the given system.Chapter 6 Results System Prototype Modeling and Simulation Software Requirements Analysis This is also known as feasibility study. and target dates. The essential purpose of this phase is to find the need and to define the problem that needs to be solved. In terms of the client/server technology. Code Generation The design must be translated into a machine-readable form. Different testing tools and methodologies are already available. Programming tools like Compilers. and Debuggers are used to generate the code. C++. the number of tiers needed for the package architecture. the system engineer ("analyst") must understand the information domain for the software.

Chapter 6 Results System Prototype Modeling and Simulation Some companies build there own testing tools that are tailor made for there own development operations. Software will definitely undergo change once it is delivered to the customer. 6. development tool will play the massive role to achieve high quality result. the changes in the system could directly affect the software operations. Deployment This is the major factor for achieving the desire result. packet received and packet sent. Development tool provide the massive support to develop perfect result.2 Simulation results Simulation Tools Microsoft Windows Task Manager MultiMedia Server Network Statistics MultiMedia Server Performance Counter Simulation Results Give Over all System performance in term of Usage Give bandwidth in term of data transfer rate in term of received and sent Packet lost. In this project. In addition. Change could happen because of some unexpected input values into the system.2. The software should be developed to accommodate changes that could happen during the post implementation period.1 Sir Syed University of Engineering & Technology 58 . There are many reasons for the change. Table 6.

2.2 Sir Syed University of Engineering & Technology 59 .Chapter 6 Results System Prototype Modeling and Simulation System performance Measurement Figure 6.

 We can use prototyping as a part of traditional SDLC approach.  Users never know their actual requirements until something tangible exists.  Users’ requirements can change before the process is completed.3 6.  Issues With Prototyping:  Can meet a small group’s requirement which may not be adequate for the overall system.3 Special performance issues  Issues with SDLC.Chapter 6 Results System Prototype Modeling and Simulation Network Monitoring Figure 6.  Here prototyping is considered to be an additional.2. Sir Syed University of Engineering & Technology 60 . specialized method for gathering users' information requirements.  Lengthy development time is required.  Tends to result in high cost development.

 Design and implementation. Sir Syed University of Engineering & Technology 61 .Chapter 6 Results System Prototype Modeling and Simulation 6.4 Prototyping requirements  User Information.  Know target product.  Complete analysis.  Listen user.  Support tool.

According to Multimedia server. We considered some streaming software like Media Player and Net Meeting by mean of implementation. This is the communication environment over the network. first we have considered network design analysis with respect to operating system. The overall securities apply by the software application like we considered Active Directory and DNS services. engineering efforts and the deploy efforts. Media player 9. the problem to be solved. VoIP application and Real time Video. Network Analysis with operating system Security in term of Authentication and Authorization Top class graphical user Interface with respect to user friendly Multimedia Streaming applications like Net meeting.1 Historical data used for estimates According to this project we have a lot of consideration over the historical data. This project has both software and network flavor. There were a lot of considerations about the database management system. We assumed following data for the deployment and release. Implementation of third party software Like Voice/Video Sdk and Direct X Over all Historical Data Table 7.Chapter 7 System Estimates and Actual Outcome 7 System Estimates and Actual Outcome Software estimation is the form of problem solving and in most cases.1 The historical data gave us the complete idea of project compilation. We have also considered some third party tool for system development life cycle. 7. The other most historical data is about the perfect and good looking GUI. Some time the software estimation becomes a huge below by mean of system decomposition and system resizing. Sir Syed University of Engineering & Technology 62 . The real time streaming products gave us strong support of the project compilation. Sql server 2000. Database Management system such as Oracle. Net meeting and third party product. System estimation and the actual outcome shows your scope efforts. We have considered a lot of pre-made application like Media player.

We considered integrated parts of this project by mean of lines of code. and then the appropriate domain average for productivity should be used in generating the estimate. We considered the scope of estimation technique because project resources and uses may tolerate by mean of requirement. we considered the whole scenario of our project by mean of lines of code. it should first be allocated to a domain. Now we consider following data for estimation: Sir Syed University of Engineering & Technology 63 . 7. As baseline metrics collected from past project and used in conjunction with estimate variables to develop cost and effort projections.2 Estimate for technique Loc is the estimation technique in tern of project management. This is generally no longer the case. as fewer and fewer organizations have significant numbers of new applications "written" entirely by programmers. When a new project estimated. there must be many projects of different types and sizes in a stable environment.2 Estimation techniques applied and results There are many estimation techniques for project estimation but we considered very common and effective cost estimation by mean of exact cost management. and 4GLs.Chapter 7 System Estimates and Actual Outcome 7. Current trends in which software development is going to prototyping. CASE tools. This. the oldest of the models.1 Estimation Technique Loc is the acronym of lines of code. The project planner begins with a bounded statement of software scope and forms this statement attempts to decompose software into loc function.2. Loc data are used in two ways during software project estimation: As an estimation variable to size each element of the software. The planner may choose another component for sizing such as classes or objects. is probably not going to generate much in the way of new research. In loc-based estimation. This project is about server client operations that’s why we considered it into many phased of development. changes. In order to get a model which suits the environment. make the use of LOC much less stable.2. or business processes affected. 7.

(TPSI) Flow of Control. (SI) Integration of services. (PCF) Security Implementation. (DMS) Third party Software interfacing. (RSS) Live Presentation. (SAA). (RTVV) Database Management system. (FOL) Peripheral control function. Now we considered the multimedia client software requisites. (IOS) Estimated lines of code Estimated LOC 750 103 402 150 112 105 324 260 230 170 170 175 2951 Multimedia Server software Table 7. (GUI) Network analysis and implementation. Multimedia client is controlled by the multi media server that’s why we covered a lot of LOC in multimedia server software estimation. (NAI) Static Video/Audio Streaming.2 This is all about the one sided estimation in term of multimedia server. Sir Syed University of Engineering & Technology 64 . (LS) Real Time Voice/Video. Remote streaming and Sharing.Chapter 7 System Estimates and Actual Outcome Requirement and Function Graphical User interface.

Remote streaming and Sharing. (PCF) Security Implementation. (GUI) Network analysis and implementation. (SI) Integration of services.Chapter 7 System Estimates and Actual Outcome Requirement and Function Graphical User interface. (IOS) Estimated lines of code Estimated LOC 450 102 230 150 112 105 227 160 230 120 70 75 1990 Multimedia Server software Table 7. (FOL) Peripheral control function. (SAA). (TPSI) Flow of Control. we considered following data or in formation which is about our team performance. (NAI) Static Video/Audio Streaming. (RTVV) Database Management system. (RSS) Live Presentation. (DMS) Third party Software interfacing. Average productivity = 925 Loc/pm where pm --> person-month Sir Syed University of Engineering & Technology 65 .2 By using Loc-based estimation. (LS) Real Time Voice/Video.

1 System Resources (Required and Used) System resources divided in to three major parts follow as: Software Hardware.Chapter 7 System Estimates and Actual Outcome Total lines of code (LOC) =4941 Loc Total person required = 4 approximately Cost per line of code = Rs.4.3 Actual Results and Deviation from Estimates Component/Recourse Project cost in term of development Network switch Ethernet Cards (3 pieces) Posters and Brochure Final Report Extras Total Cost Final Cost 60000 1200 600 6000 2000 1000 70800 Estimated Cost 54351 1500 700 6000 2000 1000 65551 7. Human ware 7.Net 2003. Desktop/Lap Tops. 11 Total Cost estimate= Rs.4. (For Multimedia Clients) Microsoft . System Resources Required Sir Syed University of Engineering & Technology 66 . (For Multimedia Server) Microsoft Windows 2000/XP/2003.2 System Resources Required Microsoft Windows 2000/2003. Ethernet card Network switch. 54351 7. Microsoft Paint.

Sir Syed University of Engineering & Technology 67 .XP/2003. Active Directory Services Microsoft C#. Microsoft Windows 2000. Net Environment. Ms Networking protocols installed and enabled.Chapter 7 System Estimates and Actual Outcome Pentium class P3/P4 computer 3 units.

This Software test split into two main perspectives. but most importantly it measures the quality of the software you are developing. they also be tested by integration. you must systematically explore the program to ensure coverage is thorough. and performance in test plans increases the likelihood that testing does take place and is effective and efficient. External program logic exercise using “black box” test. the complete system control structure of the procedural design to derive cases. This view presupposes there are defects in your software waiting to be discovered and this view is rarely disproved or even disputed. random testing. This Sir Syed University of Engineering & Technology 68 . Every statement has its own condition with respect to the project life cycle. in part because it has a great deal to do with setting expectations.Chapter 8 Test Plan 8 Test Plan Software testing is the critical element of software quality assurance and represents the ultimate review of specification. but not unnecessarily repetitive. This project has the integrated structures which are independent to each Other. According to white box testing. Considering budget. A formal test plan establishes a testing process that does not depend upon accidental. Testing accomplishes a variety of things. Several factors contribute to the importance of making testing a high priority of any software development effort. The earlier in the development cycle that testing becomes part of the effort the better. schedule. The test plan outlines the entire testing process and includes the individual test cases. To develop a solid test plan. This is the main step with respect to team work because all the development is the return of team work. Planning is crucial to a successful testing effort. Integrated testing of the application avoids the huge and bulk phase of testing. Every team can test its own integrated application with respect to project development. Planning also ensures tests are not forgotten or repeated unless necessary for regression testing. There are some iterations on the project development. Internal program logic exercise using “white box” test case design techniques. design and code generation. In this step we control the testing at the level of project control statements by mean of Boolean condition. Some conditions are valid with specific condition so there is complex testing with respect to validation.

performed by the Test Team.1 System Test and Procedure The process of testing an integrated hardware and software system to verify that the system meets its specified requirements is said to be system testing. 1: Incorrect or missing function. we considered behavioral testing and focus on the functional requirement of the project. 3: Execute all the loops at their boundaries and operations bounds. White box embedded by the following steps. 2: Interface errors. First we considered the integrated functionality based on sub-system or the unit of system.Chapter 8 Test Plan phase of testing can generate the valid report of every statement with respect to the project control. 8. System testing is black box testing. we considered configuration and implementation by mean of errorless product environment. The purpose of system testing is to validate an application's accuracy and completeness in performing the functions as designed. Black box embedded by the following steps. 2: Exercise all logical decision on the basis of True and False. System test organized by the team leader which may changed during testing. 4: Exercise internal data structures to ensure their validity. 5: Initialization and termination errors. 4: Behavior or performance errors. By using integrated testing in black box we enabled to test overall system with respect to exact test plan. System has several test units with respect to its behavior. It is all about the control structures so attention was focus on the information domain. 1: Guarantee that all independent path with in the module. Sir Syed University of Engineering & Technology 69 . We considered all integrated phase in term of Black box and White box. Every team member traced error and threat of his part of implementation. Black box testing tends to applied during stages of testing. Black box attempts error in different manners. According to the black box testing. 3: Errors in the data structures or external database access. According to the system strategy. and at the start of the system testing the complete system is configured in a controlled environment.

which are in turn aggregated into even larger parts of the program. and determine whether it behaves exactly as you expect. many units are combined into components. two units that have already been tested are combined into a component and the interface between them is tested. We considered every unit separately then combine it with other units. The idea is to test combinations of pieces and eventually expand the process to test your modules with those of other groups. reliability and performance. they should be tested in pairs rather than all at once.2 Integration testing Integration testing is a logical extension of unit testing. A component. Sir Syed University of Engineering & Technology 70 . Every unit has its own functionality but it is not avoid that there is some error in it.Chapter 8 Test Plan 8. This method reduces the number of possibilities to a far simpler level of analysis. In its simplest form. Eventually all the modules making up a process are tested together. if the program is composed of more than one process. It is the crucial phase when you are going to test your project in term of availability. Unit testing has proven its value in that a large percentage of defects are identified during its use. Each unit is tested separately before integrating them into modules to test the interfaces between modules. refers to an integrated aggregate of more than one unit. By using a test plan that requires you to test each unit and ensure the viability of each before combining units.1 Unit testing The primary goal of unit testing is to take the smallest piece of testable software in the application. We split this phase into many subphase because it is easy to test in integrated flavor. Integration testing identifies problems that occur when units are combined. Unit testing avoid the bulk of work and it is easy to integrated overall test into many different testing unit.2 Testing strategy Testing is the important part in software project evaluation because it gives desired support for deployment. Unit testing described overall threat and error with respect to software and hardware. Every phase has its own functional power for finding errors. in this sense. In a realistic scenario.2. 8.2. Beyond that. isolate it from the remainder of the code. 8. you know that any errors discovered when combining units are likely related to the interface between units.

Recovery testing According to this project. we considered recovery testing in term of static and dynamic. There are many issues in term of security because authorization and authentication have most important role in project execution. High-order testing (a. We checked the overall system i.a. During implementation we have recovered many future recovery stuffs in term of pre-plan recovery. System Testing) High order testing is some times also called a Bird’s eye view. Security testing Security testing is about validating your application's security services and identifying potential security flaws.e.3 Validation testing The validation testing strategy and procedure is specified.Chapter 8 Test Plan 8. issues lists. Verification ensures the product is designed to deliver all functionality to the customer.k. plans. We Sir Syed University of Engineering & Technology 71 . In dynamic testing.2. walk through and inspection meetings. Statically we considered pre plan recovery strategies because there were so many problems during implementation. code. If any module fail during execution we implemented a desire recovery processes at the run time. validation typically involves actual testing and takes place after verifications are completed. it typically involves reviews and meetings to evaluate documents. After static recovery we considered run-time recovery by mean of dynamic. we considered recovery the run time of project. There are important data over the network and target user access it by some access policy that applies on him/her. is the intended behavior of the product. Validation ensures that functionality. This section includes a discussion of the order of validation by system. Every module works within its boundary and interact with the other modules and passes data in a secure manner to each other. this can be done with checklists. as defined in requirements. We handled many exceptions at the run time because it is important to organize project functionality at the run time. This section contains important testing recommendations for verifying that you have created a securable application. each and every module is working properly and the task defined for each module is fulfilled according to project requirements. requirements and specifications.

Multimedia extensions want the high bandwidth medium during streaming so we have applied many extensions at the run time and change it frequently. Since such bugs are typically the result of design flaws. is similar to destructive testing in other fields of engineering. We considered many multimedia extensions streaming over the network which have 20 to 30 client machines. It is especially important to retest application functionality if the tuning process has modified the implementation of a component. software configuration. system services. network traffic. For example. stable. Sir Syed University of Engineering & Technology 72 . bugs in the code can create the appearance of a performance problem or even mask a performance problem. and so on.Chapter 8 Test Plan considered couple of testing strategy over the project by mean of security. it is important to eliminate as many variables as possible from the tests. The application must pass its functional tests before you can test its performance. and robust. stress testing should begin early in the development phase on each area of the application. In addition to application changes. As such. To accurately compare the results from different performance test passes. Performance testing Performance testing presumes that the application is functioning. Stress testing helps to reveal subtle bugs that would otherwise go undetected until the application was deployed. It is important to control changes to the application. Fix these subtle bugs at their source instead of fixing symptomatic bugs that may occur elsewhere in the application if these bugs were ignored. Like Interruption Interception Fabrication Modification Stress testing Stress testing. which is a specialized form of performance testing. The goal of stress testing is to crash the application by increasing the processing load past performance degradation until the application begins to fail due to saturation of resources or the occurrence of errors. unexpected changes can occur in hardware. the application must be working correctly. For example a wrong person login through the network an access important multimedia data by mean of security threats.

2: Metrics that focus on test coverage for a given component. states and transition that have to use in testing phase.Chapter 8 Test Plan 8. The majority of metrics proposed focus on the process of testing. 1: Examining the number of transition contained in the state transition Representation of transition respect to evaluation of test. data element. hardware and network. According to hardware. 2: Examining the number of data object that move across the interface. object. We considered this metric in following steps. We have also applied little bit support by this project but it wasn’t so we considered more over the operating system services. design and code metrics to guide them in the design and execution of test cases. Project platform helped us in different scenarios because it was giving time to time configuration setting in term of network specification. Software resources are also applied by the operating system services. In general we relied on analysis. There are many resources used for testing because this project belongs to different paradigm in term of software. relationship.4 Test metrics Test metrics fall into two broad categories: 1: metrics that attempt to predict the likely number of tests required at Various testing levels. We used some of test metric which is given below: Bang metrics Bang metrics provided us the number of test cases required by examining the primitive measures discussed like number of functional primitives.3 Testing resources and staffing Testing resources belong to different flavor which are organized into different manner of staffing. we considered operating system services for testing. we tested specialized hardware by mean of project requirement. The number of tests associated with the human/computer/sub-system interface can be estimated. In term of network. Hardware testing was not very crucial because we considered pre-plan hardware equipment that avoids hardware tolerance. Operating system has its own software application that gave us the performance and testing support by mean of software resources. Sir Syed University of Engineering & Technology 73 . 8. not the technical characteristics of the test themselves.

Tools Local area Network Windows 2003 Task Manager Windows 2003 LAN/MAN Microsoft TCP/IP services Microsoft Direct X 9/10 Microsoft . We have developed a log file that maintained the history of our testing with respect to errors and bugs. Operating system has the excellent tool for this management because it gave us error as well as warning with respect to execution. Sir Syed University of Engineering & Technology 74 .Net 2003 Microsoft CLR/CTR. It is all about the component level design metrics that lies at the core of basic path of project implementation. 8. Testing tools adopt by the specification of project environment. We considered some services by operating system to get following testing: Testing Environment Addressing and Configuring Streaming Bandwidth Performance Over Network Data transfer rate over LAN Quality of Multimedia extension Flow of project control.6 Test record keeping and test log This is the most important phase because you always learn from your mistakes. Architectural Metrics gave us the result of overall integration plan in term of system resources. 8. Architectural design metrics Architectural design metrics provided information on the ease or difficulty associated with integration testing.Chapter 8 Test Plan 3: The number of data elements that are input or output. We generated log files either it was related to network field or the software field. There was another great tool for testing which was our development environment indicated many of errors as well as warnings with respect to project deployment. Unhandled Exceptions.5 Testing tools and environment We considered many tools for testing but the environment is only one in term of coverage area and operating system. We have found a lot of errors in term of project model that were the useful stuff for our project future scope.

there are so many researches over the Ad-hoc environment. Later on it will easily convert into following technologies: Wireless Environment: If you are going to move over the wireless environment then you have to consider some terminologies. This device has some specification and configuration in different direction but it is very smart in special environment. Totally it is all about the hardware and the deployment environment because you will just change your hardware in term of wireless environment and configure it by mean of Addressing. Every one want to become co-operate in term of information sharing. According to the future enhancement of this project. You must define your domain of communication in term of coverage area. VPN boost multimedia communication over the large area. Every application will be totally independent to each other. This is today’s market oriented product in term of wired medium or small cooperative business environment. You may deploy your encryption and decryption tool for threat less communication. This system has some recommendation at this time of deployment but in future it can deal us in some specialized manner. There is simple application interfacing by mean of self database server for autonomous navigation of system.Chapter 9 Recommendations Future Enhancements and 9 Future Enhancements and recommendations Future Enhancements and recommendation is fully observable during entire project scheduling. VPN Environment: Virtual private network is the most handsome future plan for this system. Sir Syed University of Engineering & Technology 75 . Wireless environment has some recommendations like AOC (area of coverage) and security issues. Ad-Hoc Environment: Now a day. We will convert to Ad-hoc environment by the wi-fi enable communication device. Some special tool will be use to improve Ad-hoc communication. we will able to deploy it over the access pointless environment (Ad-hoc). VPN provide large area coverage so it will become a wide area network application.

Team leader. This is evidenced by the eight primary commercial and thirteen research organizations involved with this technology in various ways. A key characteristic of both the commercial products and research demonstrators is the diversity in technological infrastructure. This system is the powerful tool in cooperative environment because every industrial pool is converging over team work. Director. This project provided a secure communication of information which is deals by one server powered by Database server. According to the new generation technology. We introduced central access point for multimedia streaming by mean of security. Sir Syed University of Engineering & Technology 76 . we have discovered a lot of background theory about the multimedia streaming. There is one multimedia server that control his multimedia clients with respect to security because your multimedia extension is very secure and you don’t want to shared it softcopy with other people but you want stream it for business. Some technical skill is about the development area of new generation languages would be considered in this project development life cycle. market and education point of view. Teacher can communicate with respect to quick and noiseless environment.Chapter 10 Conclusion 10 Conclusion Streaming multimedia extensions across networks is an effort that is attracting many participants. According to this project. We found some critical issues about the network programming because it is difficult to implement it in different devices. we fulfilled extra ordinary work in term of multimedia streaming.

Project Schedule JAN FEB MAR APR MAY JUN JUL AGU SEP OCT NOV DEC Analysis Phase Design Phase Implementation Phase Testing and deploy Phase Overall project timeline Sir Syed University of Engineering & Technology 77 . APPENDICES Project Timeline chart i.Appendices H.

Appendices Work load distribution Working Months January Muhammad Yasir Collect information about streaming Analyze over all project flow Define project domain Design overall project control Design GUI (MultiMedia Server) Testing previous applications AD and SSL programming Implement SQL server 2000 interface clock Integrate sub classes with interface Apply final GUI Multimedia Server Muhammad Tariq Study LAN environment LAN 802.3 standard (Ethernet) Use case Configure Active Directory Services Design GUI (MultiMedia Client) Develop class diagrams Video streaming Class Design table attributes Shahzad Akhtar Study Premade Application Muhammad Kazim Analyze project scope February March April Use cases Implement DHCP server Develop LAN environment Define Client requirements Apply rules for DNS May June July August Design overall network setting Develop class Configure diagram network Audio streaming class Design relation ship b/w tables Introduce 3rd part software Design flow of tables Design a timing procedure MultiMedia Client Testing Integrating 3rd party software Report modeling September October November December Design remote Design streaming shared file class Apply final Implement GUI live MultiMedia presentation Client streaming Use network Real time Real time programming Voice Video for application Streaming Streaming Final testing Report Testing Overall project modeling project MultiMedia Client Work Load Distribution Table Sir Syed University of Engineering & Technology 78 .

Appendices ii. Snap shots of deployed system Multimedia Server Snap # 1 Sir Syed University of Engineering & Technology 79 .

Appendices Multimedia Server Snap # 2 Sir Syed University of Engineering & Technology 80 .

Appendices Multimedia Server Snap # 3 Sir Syed University of Engineering & Technology 81 .

Appendices Multimedia Server Snap # 4 Sir Syed University of Engineering & Technology 82 .

Appendices Multimedia Server Snap # 5 Sir Syed University of Engineering & Technology 83 .

Appendices MultiMedia Client Snap # 1 Sir Syed University of Engineering & Technology 84 .

Appendices MultiMedia Client Snap # 2 Sir Syed University of Engineering & Technology 85 .

Appendices MultiMedia Client Snap # 3 Sir Syed University of Engineering & Technology 86 .

Soda Hall. Berkeley. CA. Retrieved from the World Wide Web on 02/10/2005.microsoft. U..com/windows2000/ Technologies/ terminal/default. www.www. "Synchronized Continuous Media Playback Through the World Wide Web" ... C. (2001). Retrieved from www on 02/17/2005.Reference REFERENCE [1] Jackson M. Simpson D.asp [8] Code Beach Research. Multipoint Workshop held in conjunction with ACM Multimedia 1994. Wu D. (2003).com/Network/NetworkProgramPart2RVS. CA 94720 [3] Rowe L.microsoft.csharpcorner.rdesktop.Net [10] SQL Server 2000 Microsoft Press. "Continuous Media Applications". www.. and Rowe L. (1999).com/windowsserver 2003/techinfo/overview/termserv. (submitted for publication). Berkeley.com/index. (2003). (2000).U. Sir Syed University of Engineering & Technology 87 . Retrieved from www on 02/03/2005. and Rowe L. A. Retrieved from the World Wide Web on 02/16/2005.org [7] C# Corner Research.asp?tabID=2& categoryID=15&subcategoryID=7 [9] Complete Reference C# . [4] Microsoft Learning & Research.C.codebeach. Baldeschwieler J.mspx [6] Remote Service Research. "Berkeley CMT Media Toolkit API" . Retrieved from www on 02/11/2005. San Francisco. Berkeley. A. [2] Mayer-Patel K. E.. November 1994.. H. Computer Science Division. www. A. www.asp [5] Microsoft Learning & Research.

Like (Video. Ethernet 802.. Half duplex mode: It works one operation either send or receive. Streaming It's called "streaming" because the video." Remote streaming It is the transfer of files over the LAN environment. GLOSSARY Multimedia It is the collection of meaningful and attractive information. Picture.. ready to hear or view in real time. It comes to you in a stream of digital bits. Multimedia client It is the workstation or member server that gets on-stream data. Real time video The real time video is directly streamed after span of time by mean capturing. In the Ethernet standard. Animation. data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a medium. Audio. In the half duplex mode.3 Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802.Glossary I.sound and picture data flow in a digital stream from a server computer to your computer. Multimedia extension Visualized information files.3. without having to download all of the content before you can enjoy it. Real time voice The real time voice is directly streamed by mean capturing. Multimedia server It is the server that stream multimedia extensions. Voice. there are two modes of operation: half-duplex and full-duplex modes. hence the term "streaming. Text) etc. Full-duplex mode Simultaneously (stream and get-stream) multimedia extension Sir Syed University of Engineering & Technology 88 .

NET.Glossary Network Traffic Impact Increase in large files large bandwidth required fixed time of transmission Microsoft DHCP Server Dynamic host configuration protocol Microsoft ADO. Loc Lines of code. The . ASP. C# applications to easily query for and manipulate directory service objects System Development Life Cycle it is the basic model used in project development.NET. VaxExtended Tool Third party tool. It is the real time voice streaming class. and Windows Forms. Microsoft Direct X Microsoft tool.NET Framework provides a managed execution environment. which includes ADO. Active Directory Services Interfaces Active Directory Service Interfaces (ADSI) enables systems administrators and developers of scripts or C/C++.NET. such as the Dataset class and a strongly typed programming model that provides IntelliSense and statement completion for data access code. It is the Active X control.NET Framework are the common language runtime and the . developers gain access to more powerful components. simplified development and deployment. support for multimedia files performance. and integration with a wide variety of programming languages.Net With ADO.Net frame work The . Sir Syed University of Engineering & Technology 89 .NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. . AOC (area of coverage) It is the overall domain of the network. The key components of the .NET Framework class library.

Sign up to vote on this title
UsefulNot useful