Final Year Project Report

MULTIMEDIA CASTING OVER LAN
B.S. Computer Engineering, Batch 2002

Project Advisor
Mahjabeen Tahir Lecturer SSUET

Submitted by
Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100

DEPARTMENT OF COMPUTER ENGINEERING Sir Syed University of Engineering and Technology University Road, Karachi – 75300 January 2006

PREFACE
According to this report, we are going to spread a new style of streaming which will handle you in many dimensions of the communication. In term of communication, we have different bridges but there is more powerful bridge of communication like computer networks. This report is all about the information streaming over the computer networks. There is much information in the world which is easily understood by the target user. This information has the flavor of multimedia extensions which look very well with respect to target eyes. When these type of extensions come over the computer network so generate the maximum response with in communication. Multimedia is the extension of meaningful communication with respect to sender and receiver ends. Video, Audio, Visual presentations are the basic blocks of today’s and forthcoming communication. Multimedia information precise your information in very attractive and meaningful style. Multimedia streaming is the powerful bridge of communication which is doing best by computer networks. Everybody in the world wants to say attractive body and verbal language but multimedia streaming gives you attractive communication language. When we are going to communicate, we should have any medium of communication but according to this report, we are exploring the computer networks types in term of medium size of industrial pool. Computer networks join together for the near and Tele-communication phenomenon. If you have the computer network, you want to share information with attractive and meaningful styles. LAN is most powerful and high through put bridge of communication which describe you the information through multimedia casting. The only prerequisite things for this are to find some knowledge about the multimedia streaming over the computer networks. There are many hidden truth in the multimedia world because everybody is moving to attractive and meaningful communication with respect to smart machine throughput.

ACKNOWLEDGMENT
First of all we would like to thank Vital Force only ALLAH for blessing us with the mental and physical abilities with the help of which we were successfully able to go through this project and bring it to the final stages of completion.

We would like to thank our teacher Ms. Mahjabeen Tahir who guided us through out in every difficulty and provided us with the best solutions of problems through her professional approach and experience.

Email: specialist106@hotmail.com Shahzad Aakhter 2002-CE-082 Programming + Network configuration + Report Immediate Contact: 021 6631529. Email: shah_ce082@hotmail. Email: mkazim4u@yahoo. Email: be_yasir@hotmail.com 2002-CE-100 . specialist106@yahoo.INTRODUCTION TO GROUP MEMBERS Muhammad Yasir siddiqui 2002-CE-075 Network Programming + Research + Overall integration of project Immediate Contact: 0333 2109785.com Muhammad Kazim Network Configuring + Research + Report integration Immediate Contact: 0321 2091481.com.com Muhammad Tariq 2002-CE-106 Programming + Research + UML + Report + Database Management Immediate Contact: 0300 2716858.

MAHJABEEN TAHIR Assistant Professor SSUET .CERTIFICATE OF COMPLETION This is to certify that the following students Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100 have successfully completed their final year project named MULTIMEDIA CASTING OVER LAN in the partial fulfillment of the Degree of Bachelor of Science in Computer Engineering.

Imran Ali Tasadduq Chairman Computer Engineering Department SSUET . Dr.CERTIFICATE OF COMPLETION This is to certify that the following students Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100 have successfully completed their final year project named MULTIMEDIA CASTING OVER LAN in the partial fulfillment of the Degree of Bachelor of Science in Computer Engineering.

5 2.4 2.1 Goal & Objective 1.6 2.1.5 Deployment Interface Chapter 3 Functional & Data Description 3.2 External System Interface .3.1 System Architecture 3.3 System Interface Description 3.1 User Interface 2.2 System Level Data Mode 3.1 Architecture model 3.1 External Machine Interface 3.3.8 Administrator Managing Director Employee Teacher/Instructor Student Team Leader Stock Exchange Manager Stock Exchange Employee 2.4 Communication Interface 2.3 System context 1.3.1.1 User profile 2.2 2.1.2 Modules overview 3.2 System statement of scope 1.2.7 2.2.1.3 Specials usage considerations 2.CONTENTS Chapter 1 Introduction 1.1 Major Data Objects/Signal Specification 3.4 Theoretical Background of project 1.1.3.3.2 Use-cases 2.3.1.2.2 Data Description 3.1 2.5 Technology & Tools used in the project Chapter 2 Usage scenario / User Interaction 2.1.2.3 Software Interface 2.2 Hardware Interface 2.3 2.1.1.

1 Description for system behavior 5.1.1.1 Description of system modeling approach 6.1 Estimation Technique 7.3 Control specification Chapter 6 System Prototype Modeling and Simulation Results 6.1 System Resources Required 7.1 Historical data used for estimates 7.1.3 Actual Results and Deviation from Estimates 7.1 8.2 Estimation techniques applied and results 7.4.2 Testing strategy 8.1 System Test and Procedure 8.1 Events/interrupts 5.3 Algorithmic/protocol model 4.1 Subsystem scope 4.2.1 Description for Subsystem ‘n’ 4.3 8.4 Unit Testing Integration Testing Validation Testing High-Order Testing 8.4 System Resources 7.4.2.3 Special performance issues 6.2.2 Estimate For Technique 7.2 8.1.1.2 System Resources Used Chapter 8 Test Plan 8.1.2 Simulation results 6.4 Restrictions/limitations 4.Chapter 4 Subsystem/Module Description 4.1.2 States 5.4 Prototyping requirements Chapter 7 System Estimates and Actual Outcome 7.2 State Transition Diagrams 5.2.3 Testing Resources and Staffing 8.4 Test Metrics .2.5 Performance issues Chapter 5 Behavioral Model and Description 5.2.2 Subsystem flow diagram/ desired UML diagram 4.

3 VPN Environment Chapter10 Conclusion / Summary .4.1 Wireless Environment 9.2 Ad-Hoc Environment 9.1 Architectural Design Metrics 8.8.5 Testing Tools and Environment 8.6 Test Record Keeping and Test Log Chapter 9 Future Enhancements and Recommendations 9.

LAN is the high bandwidth . text. offices information. Now today computer networks are strongly use for communication either this is for near or far in distance. sound. According to heavy communication we are first considering LAN environment for get Quality of services. the computer network is the world’s biggest library. In the world of computer networks. Information are getting reduction in size but getting increment in communication style. and animation extensions. Offices. we want to share information in attractive and meaningful style. Multimedia communication is the master piece of information spreading phenomenon. there are much attractive and meaningful information over the any medium of communication. Now a day there is high efficiency and maximum throughput over Ethernet standards. educationally and informational casting which build you in your desire industrial pool. commercial. making some one to understand you in attractive meaningful style because you may the managing director or country manager.SYNOPSIS In addition to being a gigantic. Multimedia is the collection of attractive and meaningful extensions. There are documentary. meaningful and entertainment. By using multimedia casting you can interact through smart way to the people. By raising media war. you always want to like stay in better environment but It can give you better present style of your information. In every department of daily life. Of course you can communicate with these extensions over the network. Of course. Yes every department of life want to get processing by electronically. education and commercially we want to get some information in better style rather than hunky panky style. Multimedia is the bandwidth of data when it is traveling over the network. we are seeing improvement in every communication. you have the powerful communication way to present yourself stylish. current events information and commercial information. Multimedia is collection of video. There are many standards of computer network in term of LAN and WAN but we are considering LAN Ethernet standard for medium and small environment. images. There is information available on every conceivable topic. Computer network provide you global services of information sharing either it is about academic information. Everybody in the world wants to present him/her in powerful communication style. Where ever you are.

Multimedia Casting over LAN provides you streaming of multimedia extensions. it is very reliable. By raising heavy communication extension. Audio. Pictures. you can communicate through multimedia extension which define your communication language very attractive able and meaningful. Visual Text etc. . Animation. According to this project.medium of the network communication due to its configuration. This project provide you a co-operative medium of communication by using multimedia extensions like Video. available and intractable tool for high bandwidth of data streaming. LAN has the capability of streaming multimedia with respect to quality of services.

Chapter 1

Introduction

1 Introduction
In addition of the attractive, meaningful and quality of communication, there is most descent and powerful extensions for desire and quality communication. Yes we have the multimedia extensions pool to get highly attractive and meaningful style. When ever these types of extensions come over the communication medium it means you can spread your messages in very excellent communication language. Quality of communication is the part of marketing, advertising and business point of view. Whenever you are communicating over the computer networks, you should apply attractive communication language otherwise your delivered information can sink by the network traffic. Multimedia is collection of video, sound, images, text, and animation extensions. These types of extensions give you very attractive and stylish quality of communication. By raising media war, everybody wants to on-air himself by gigantic and attractive communication. In this project, multimedia extensions are the acid of communication over the computer network. We can stream video, audio in term of live as well stream real time video and voice to the listener. We can also provide live presentation of the reports and documents. Multimedia extensions enable you to spread all information over the computer network. Every communication has the medium. According to this project we adopt computer network for the communication bridge and deploy it in very secure manner. Now a day’s computer network provides different security but according this project we produced basic security in term of authorization and authentication. According to this project, authorization is term of rights which is related to server side and authentication is term to access rights by right hands. Database server is in action for maintaining access control profile. Database server provided security over the application level but in IP level we used secure socket layer (SSL) and Domain name system (DNS). Operating system has the major role to apply extra valuable services in term of network protocol, database and securities.

Sir Syed University of Engineering & Technology

1

Chapter 1

Introduction

1.1 Goals and objectives
According to this project objective, we have to provide a vital communication over the local area network. In term of communication information we have to on-stream attractive and meaningful information which describe quality of communication language. On-stream information has to give excellent view to the target user. Either target users belong to company or education or commercial, they should want good looking information for interaction. Multimedia extensions have the attractive and meaningful style. Every communication language surround by these extensions. Multimedia extensions should have minimum resources but have stylish presentation over the any communication medium. The most crucial objective of this project is that apply the any communication language with minimum resources. Communication medium has to more reliable and available with respect to target users. According to this project, we have to develop a secure and errorless network for heavy communication extensions. This network has to follow security in term of authentication and authorization. Network has to without any virus or threat. The carriers (protocols) of information have to more reliable and errorless over the bulky communication. According to project goal, there are some major terms related to on-stream information and the on-communication medium. On-stream information has to travel over the medium with out any tolerance and delay. Information will not loose required bandwidth and frame rate with respect to multimedia extensions. Multimedia extensions should have the same quality rate to the target user. Quality of service will be considered over the on-stream information by using some medium statistics and calculations. Local area network will use as a communication medium, to apply maximum throughput over the on-stream information. Ethernet is the tool in term of local area network management. This network standard will handle the security and performance issues during communication. Ethernet will provide operating system services in term of performance, integration and supervision.

Sir Syed University of Engineering & Technology

2

Chapter 1

Introduction

1.2 System statement of scope
System scope will explore in different flavor with respect to input, processing and outputs. This project is quit looking different with respect to its requirement. This project will allows you to gather multiple of information with respect to scope.

Communication Medium
Medium of communication is the input and process unit for performing different functionality in term of project life cycle. Communication medium shows like local area network with respect to security and quality purpose. Communication medium is the tool to stream information to the desire target.

Address Naming
This is the processing over the transmission medium addressing. This project will deal heaving transmission of information that needs some extra-ordinary operation during streaming. Address/IP naming is operating addressing of on-stream information. There is not static IP addressing due to heavy streaming. According to handle quality of streaming, we will refresh destination addresses and put special addresses for specific clients. This will help us for security purpose with respect to authorization and authentication.

Multimedia Extensions
Multimedia extensions are the major inputs of the project life cycle. In multimedia we have several extensions of information for communicating in right and desire way. Multimedia extensions are the on-stream extensions which have to operate in both end of Communication Bridge. These are the inputs as well as the outputs in different scenarios. Multimedia extensions are the block of on-stream information which will deal by the project processing unit.

Process Units
Project processing unit has some sub units which will take their own functional department. The real functionality of this project is to stream multimedia extension over the local area network in term of quality factor. There are many sub system for processing like authorization, authentication, streaming, controlling and measuring. Process unit can be the embedded form of different units which interconnect and communicate to each other with respect to the requirement.

Sir Syed University of Engineering & Technology

3

1. client/end user is the most important part in term of project life cycle. market.Chapter 1 Introduction Quality of Streaming This is the major output of this project with respect to get quality of on-stream information. This system will give the attractive and good looking of advertisement for getting full response of target user. Output should be in acceptable skeleton according to project life cycle. Sir Syed University of Engineering & Technology 4 . This system is classified into many places of departments. According to business point of view.3 System Context According to system context view. Teacher will concentrate to his/her lecture rather than to control student at the front of white board. This project will deal communication between the persons by suitable medium. According to co-operative point of view. Client will behave as a technical and co-operative employee of any industrial pool rather than a user will behave as a commercial and entertainment. In this project quality measurement is operated by the process unit and applies other tool for getting desire and actual stream of information. we are considering the advertisement behavior by this system. reliability and integrity with respect to domain and market scope. commercial and product domain scope. system creates a handsome and noiseless environment for teacher and student. availability. system will give the quality of interaction between the company employees. According to market point of view. we have big picture with respect to business. Student will completely converge him/her self over the lecture. According to education point of view. This system has better scope. Client or End User According to this project. They are very accurate and update by using the presentation of desire goal of team management. You may market your product or anything by showing its all benefit by using attractive presentation. system has attractive extensions that up the market presentation in stylish manner.

This project has solid background with respect to history because there are so many applications are behaving like it. its been very easy to download and play back high-quality multimedia files (Video. Audio streaming is becoming widely accepted and deployed. Although streaming audio programs are considerably further along than video.4 Theoretical Background For a long time now. There are so many terminologies in this project in term of research and learning point of view like.Animation etc) from the Internet. plugins and firewall penetration are discussed. Finally we compare and evaluate the SuperNOVA project with respect to other research projects and the cur rent commercial products. they are still nowhere near typical computer-sound quality.Audio.Chapter 1 Introduction 1. According to this project. video and audio should be streamed across the Internet from the server to the client in response to a client request for a Web page containing embedded videos. unacceptable transfer times and playback latency. In this report firstly we present a brief review of the current video compression standards. there are so many white papers and research behind its development. RSVP with the ability to control Quality of Services (QoS) and mobile networks with widely varying QoS. In this project we have covered a powerful application system over the network. There are many commerical streaming video products becoming available as well as many research projects in this area. evolving standards and techniques and the internet transport protocols being deployed. In particular. In addition. issues such as the need for servers. However.Pictures. full file transfer means very long. In the future the Internet will see the rollout of ATM. Then we describe the major research projects currently underway. The current Internet is a best effort network and interconnects sites with widely varying bandwidth capabililties. The idea of streaming video over the network has been gaining a lot of interest. First we have Sir Syed University of Engineering & Technology 5 . Ideally. Therefore it will remain a very heterogeneous network. Current web browsers and servers support full-file transfer mode of document retrieval. The client plays the incoming multimedia stream in real time as the data is received. which are attempting to solve some of these limitations. We then review the currently available commercial products which purport to provide video streaming capabilities over the Internet and out line their current limitations. Progressive Networks' RealAudio has a wide following.

we have improved communication language by mean meaningful communication. Local Area Network Multimedia casting over LAN Switch Multimedia receiver Clients Multimedia casting over LAN Figure 1.4.1 Multimedia Casting Server By using multimedia extension. everybody wants to communicate in stylish and attractive manner. Multimedia is collection of meaningful and attractive data/information. marketing and education environment you have to communicate in meaningful and attractive manner otherwise your target person ignore you. Now a day there are so many improvements in communication language by mean of multimedia extensions. By raising media war. Either you related to business. Sir Syed University of Engineering & Technology 6 .Chapter 1 Introduction introduced multimedia extensions in this project. Multimedia extension provide stylish and good looking preview for its listener or target user.

According to theoretical background. According to this project we have consider LAN (Local Area Network) environment for Communication Bridge. Multimedia streaming very accurate in LAN environment because there is no lost of data/ information due to high data rate and bandwidth. In the majority of cases streaming media is used to maintain control over the Sir Syed University of Engineering & Technology 7 . these extension are the basic block of today’s communication. It's called "streaming" because the sound and picture data flow in a digital stream from a server computer to your computer.Chapter 1 Introduction Multimedia is collection of video. pictures and text etc. networks. It is easy to interface. sound. Multimedia files can be very large. We considered Ethernet standard for multimedia streaming because of its high data rate and bandwidth. It stream over heavy bandwidth that’s why we considered LAN environment that provided desire area of bandwidth. instead of having to wait for it. Your only wait is a few seconds for a "buffer" to be built up that helps avoid interruptions caused by Internet traffic problems. without having to download all of the content before you can enjoy it. Streaming media technology allows you to see or hear the content in just a few seconds. hence the term "streaming."This is evidenced by the eight primary commercial and thirteen research organisations involved with this technology in various ways..0. The every network environment derived from the LAN because it is the basic environment of computer network. You would spend many minutes or even hours waiting for them to be downloaded to your computer if they weren't streamed. configure and support. A key characteristic of both the commercial products and research demonstrators is the diversity in technological infrastructure e. we have collected information of multimedia streaming in many applications like Windows Net Meeting 3. protocols. Computer network is the largest environment in this world. LAN environment is very reliable and available for heavy transfer rate over computer network.. LAN is single administrator environment with the range of 1 Km it may exceed upon specific conditions. It comes to you in a stream of digital bits. voice. ready to hear or view in real time. Streaming multimedia extensions across networks is an effort that is attracting many participants. animation. compression standards supported. Multimedia is the heavy and consumes space extension because it is so visualized and attractive.g.

Video and audio is the major on-stream extensions but there is live presentation of documents as well remote streaming of files. They all operations conducted by multimedia server for organizing a better communication environment by mean of security. There is no application available in front of it by mean of these types of services.1 According to this project. we covered many multimedia extensions for streaming. By using central multimedia server. You will stream that type of information that you want to send to your target user. CEO. Sir Syed University of Engineering & Technology 8 .Chapter 1 Introduction distribution of the media files (because it is difficult to capture streaming video and audio). This project is the powerful tool in cooperative environment by mean of security. This project is supported following streaming. Every on-streamed data is provided by multimedia server by mean of secure streaming.4. There is central multimedia server that controls his multimedia client according to his/her privilege. Multimedia clients restrict over one central multimedia server. we considered many history applications about multimedia streaming that’s why we found a new look and style of multimedia communication. This application is very cooperative in such type of environment where some secure multimedia streaming required. There are so many applications available for streaming but there is some problem when you are streaming at cooperative environment. According to this project. Video Streaming Audio Streaming Real Time Voice Streaming Real Time Video Streaming Live Presentation Streaming Remote Streaming Secure Shared Files Streaming Table 1. This project provided Qos (Quality of Services) in term of on-stream data because there are some critical issues about on-stream data quality. Multimedia clients really dependent on the multimedia server that make it cooperative with his/her team leader. Director and Teacher etc. we have streamed informative information to different multimedia client and obviously they would concentrate at the on-streamed information.

The main disadvantages of the half-duplex are the efficiency and distance limitation. Technology and tool emphasis into network and software which are describe below. data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a shared medium. This restriction reduces the efficiency drastically for high-rate transmission. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. In the half duplex mode. LAN Standard 802. 7 1 2 or 6 2 or 6 Preamble Destination Source address Start of frame delimiter address Length of data field Table 1. Therefore. configuring tool and third party software. application tool. in which the link distance is limited by the minimum MAC frame size. Like in 802. In the Ethernet standard.Chapter 1 Introduction 1. we have used different technology and tool/hardware with respect to project management.5 Technology & Tools/hardware components According to this project.3 header. Technology embedded in to many environment either it belong to operating system.4.3 Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802. development tool. there are two modes of operation: half-duplex and full-duplex modes.3.2 2 0-1500 Data 0-46 4 Pad Checksum Sir Syed University of Engineering & Technology 9 .

Windows Server 2003 SP1 provides enhanced security.Chapter 1 Introduction LAN Environment Figure 1.5-4 Class of service Whiteboard Mbps required High volume of data Ethernet Standards Table 1. such as security. and a simplified administration to help enterprise customers across all industries. backbone Higher bandwidth desktop. backbone. Windows Server 2003 includes all the functionality customers need today from a Windows Server operating system to do more with less. server.2 1. Backup required Fixed time of transmission Conferencing 1. Windows Server 2003 operating systems ship with Windows Server Service Pack 1 (SP1). server. server. manage. backbone. low latency Increase in large files Large bandwidth required Publications 100s of Increase in large files Imaging MB Large bandwidth required Internet Audio. A set of medium access control rules embedded in each Ethernet interface that allow multiple computers to fairly arbitrate access to the shared Ethernet channel.3 Microsoft Windows 2003 Server Windows Server 2003 operating systems take the best of Windows 2000 Server technology and make it easier to deploy. server. reliability.4. 3. increased reliability. Increase in large files Intranet Video Large bandwidth Extranet 1-100 required MB Low latency necessary Data TB Increase in large files Warehousing Large bandwidth Net. low latency Higher bandwidth desktop. and scalability. The result: a highly productive infrastructure that helps makes your network a strategic asset for your organization. backbone. An Ethernet frame that consists of a standardized set of bits used to carry data over the system. server. and use. availability. 2. backbone Higher bandwidth desktop. The physical medium used to carry Ethernet signals between computers.4. Windows Server 2003 is a Sir Syed University of Engineering & Technology 10 . Application Scientific Modeling Data Type/ Size GB Network Traffic Impact Network Requirements Higher bandwidth desktop. low latency Higher bandwidth desktop.

Learn about the many new features and technologies that make Windows Server 2003 an ideal server platform for organizations of any size. Remote access and virtual private network (VPN) server. Domain Name System (DNS). Sir Syed University of Engineering & Technology 11 . Dynamic Host Configuration Protocol (DHCP) server. Directory services. organizations have had success in deploying directory-enabled business solutions for key problems such as network operating system (NOS) user support.4. Mail server. in either a centralized or distributed fashion. The common language runtime Active Directory Management services Storage management Networking and communications Windows Media Services Microsoft Active Directory Service Originally inspired by the emergence of LDAP-based solutions in the mid-1990s. Windows 2003 has a lot of supreme tools for business and communication environment but we found some of them for this project management. • • • • • • • • • • Availability Scalability. depending on your needs. and Windows Internet Naming Service (WINS). Windows 2003 Services Table 1. public key infrastructure (PKI) deployment. File and print server. Streaming media server.Chapter 1 Introduction multipurpose operating system capable of handling a diverse set of server roles. extranet or Web single sign on (SSO) capabilities.4 Windows Server 2003 contains core technologies that build on the strengths of Windows 2000 Server to deliver a superior and cost-effective server operating system. Security. white pages or yellow pages access. Terminal server. and line-of-business applications. Web server and Web application services.

or operational costs that can be incurred by the installation of an additional directory technology to support directory-enabled applications. any application that is deployed using ADAM can authenticate access against Active Directory across the enterprise. This allows rapid restoration to a clean state during the application prototyping and development process. and Sir Syed University of Engineering & Technology 12 . additional licensing. An application owner can easily deploy directory-enabled applications without affecting the directory schema for the entire organization. and helps organizations avoid increased infrastructure costs. Applications that use Active Directory Application Mode have the same reliability. while continuing to use the identity information and credentials that are stored in the organization’s NOS directory. Active Directory Application Mode is a new capability in Active Directory that addresses certain deployment scenarios that are related to directoryenabled applications. reinstall. as such. scalability. and each instance can be configured independently. making it the ideal directory service to deploy with an application. end users. Running as a non-operatingsystem service means that multiple instances of ADAM can run concurrently on a single server. You can use Active Directory Application Mode effectively in the following scenarios:  Application-specific directory scenarios  Application developer scenarios  Extranet access management (EAM) scenarios  Migration scenarios Developers. maintains flexibility. ADAM runs as a non-operating-system service. Active Directory Application Mode is easily installed or uninstalled on developer workstations. and.Chapter 1 Introduction Active Directory Application Mode achieves this goal without the burden of expensive training. or remove the ADAM application directory. You can easily install. Active Directory Application Mode represents a breakthrough in directory services technology that overcomes the previously mentioned obstacles. it does not require deployment on a domain controller. and ISVs can easily deploy Active Directory Application Mode as a lightweight directory service on most Windows Server 2003 platforms and on Windows XP Professional. Because Active Directory Application Mode is integrated with the Windows security model.

without having to face the increased costs associated with deploying multiple technologies for both an NOS directory and an application directory. and. Microsoft DHCP Server The Microsoft Windows 2000 Server network operating system includes an enhanced implementation of Dynamic Host Configuration Protocol (DHCP). licensing. Also Sir Syed University of Engineering & Technology 13 . operations. most importantly. new vendor-specific options and user-class support.3 With Active Directory Application Mode. Figure 1. enhanced monitoring and statistical reporting for DHCP servers.Chapter 1 Introduction performance that they have with deployments of Active Directory in the NOS environment. and rogue DHCP server detection. and developers can use Active Directory in multiple roles.4. multicast address allocation. This includes integration of DHCP with domain name system (DNS). ISVs. Organizations. security. while preserving investments that you’ve made in administrator training. for the first time you can employ a single directory technology in multiple roles.

DHCP can automatically configure a host while it is booting on a TCP/IP network. DHCP for Windows 2000 is open and based on industry standards. DHCP frees network administrators from having to configure all of the computers by hand. was an early advocate for having dynamic IP addressing technology and worked closely with other IETF members to create the DHCP solution. as defined by IETF Requests for Comments (RFCs) 2131 and 2132. such as the subnet mask. configuring and administering TCP/IP network clients have traditionally been time-consuming and costly. DHCP is open and standards-based. gateways.Chapter 1 Introduction included is a discussion of Windows Clustering. especially for corporate intranets adopting Internet technology. as well as change settings while the host is attached. as a member of the Internet Engineering Task Force (IETF).4 The Microsoft® Windows® 2000 Server network operating system builds on the longstanding Microsoft support for Dynamic Host Configuration Protocol (DHCP). However. This is why Microsoft. Figure 1. Each host computer connected to a TCP/IP network must be assigned a unique IP address. supporting Requests for Comments (RFCs) 2131 and 2132. industry standard that reduces the complexity of administering networks based on TCP/IP. This lets all available IP addresses be stored in a central database along with associated configuration information. an open. Sir Syed University of Engineering & Technology 14 .4. a part of Windows 2000 Advanced Server. and address of DNS servers. TCP/IP is the global network protocol of choice.

enriching data and building complex business analytics with Analysis Services. SQL Server 2005 provides many new and enhanced business intelligence (BI) features designed to give you a competitive advantage. clients have to be configured one by one.NET Framework is designed to fulfill the following objectives: Sir Syed University of Engineering & Technology 15 . The . Easily integrate data from a wide range of operational and enterprise data sources. and apply these patterns to business operations with an easy-to-use. Microsoft . Query Analyzer. Data Transformation Services and Books Online. Review the following product and technical resources and other information designed to help you improve BI in your organization.Chapter 1 Introduction DHCP makes life easier for network administrators. Microsoft SQL Server 2000 Microsoft SQL Server 2000 is a full-featured relational database management system (RDBMS) that offers a variety of administrative tools to ease the burdens of database development. Gain an integrated view of all your business data as the foundation for your traditional reporting.NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet.Net Frame Work The . In this article. extensible. Changes must be applied to clients by hand. discover patterns. and it is difficult to get a view of all client configurations. SQL Profiler. and data mining. IP addresses must be managed to avoid duplicate use. and the larger the network. OLAP analysis. scorecards. Without dynamic address assignment. Configuration information is not centralized. maintenance and administration. and delivering rich reports with Reporting Services. Explore data. accessible. Deliver the information employees need to make better business decisions—in virtually any business environment. managing. These advantages include integrating multiple data sources with Integration Services. and writing. and flexible platform. Service Manager. we'll cover six of the more frequently used tools: Enterprise Manager. and gain competitive advantage through a holistic view of your business. the greater the benefit.

or executed remotely. such as Windows-based applications and Web-based applications.NET Framework has two main components: the common language runtime and the . and remoting. thereby creating a software environment that can exploit both managed and unmanaged features. the other main component of the . The common language runtime is the foundation of the . providing core services such as memory management. To provide a code-execution environment that guarantees safe execution of code. but also supports the development of third-party runtime hosts.NET.NET Framework can integrate with any other code.NET Framework not only provides several runtime hosts. executed locally but Internet-distributed. The class library. • • • • • To provide a code-execution environment that minimizes software deployment and versioning conflicts. The . To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. such as Web Forms and XML Web services.NET Framework class library. To make the developer experience consistent across widely varying types of applications. Code that targets the runtime is known as managed code.NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code. The . To build all communication on industry standards to ensure that code based on the . In fact.NET Framework. Sir Syed University of Engineering & Technology 16 . while also enforcing strict type safety and other forms of code accuracy that ensure security and robustness. is a comprehensive.NET Framework. including code created by an unknown or semi-trusted third party. the concept of code management is a fundamental principle of the runtime.Chapter 1 Introduction • To provide a consistent object-oriented programming environment whether object code is stored and executed locally. while code that does not target the runtime is known as unmanaged code. object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP. You can think of the runtime as an agent that manages code at execution time. thread management. The .

Chapter 1

Introduction

Internet Explorer is an example of an unmanaged application that hosts the runtime (in the form of a MIME type extension). Using Internet Explorer to host the runtime enables you to embed managed components or Windows Forms controls in HTML documents. Hosting the runtime in this way makes managed mobile code (similar to Microsoft® ActiveX® controls) possible, but with significant improvements that only managed code can offer, such as semi-trusted execution and secure isolated file storage.

Figure 1.4.5 The .NET Framework class library is a collection of reusable types that tightly integrate with the common language runtime. The class library is object oriented, providing types from which your own managed code can derive functionality. This not only makes the .NET Framework types easy to use, but also reduces the time associated with learning new features of the .NET Framework. In addition, third-party components can integrate seamlessly with classes in the .NET Framework. • Console applications.

Sir Syed University of Engineering & Technology

17

Chapter 1

Introduction

• • • •

Windows GUI applications (Windows Forms). ASP.NET applications. XML Web services. Windows services.

Microsoft Visual C#
Visual C# .NET 2003 is the comprehensive toolset for creating XML Web services and Microsoft .NET—connected applications for Microsoft Windows® and the Web. This robust development package, which uses the component-oriented C# development language, offers beginning and intermediate developers with C++ or Java experience a modern language and environment for creating next-generation software. Visual C# 2003 delivers superior functionality for streamlining business processes, including: • • • • Rapid design, development, and deployment support for creating and consuming Web services. Form designers and visual controls for creating rich Windows-based applications. Authoring tools and services for building powerful Microsoft .NET server-based solutions. Migration tools for converting Java-based projects to the Microsoft .NET development environment. With Visual C# .NET 2003, developers can build solutions for the broadest range of clients, including Windows, the Web, and mobile or embedded devices. Using this elegant programming language and tool, developers can leverage their existing C++ and Java-language skills and knowledge to be successful in the .NET environment. Visual C# .NET 2003 includes a powerful remote and multi-language debugger, enabling developers to test applications and build reliable multi-tier solutions that span process boundaries and are written in multiple programming languages. Note: Remote debugging is available only in Visual Studio .NET Professional Edition and higher. Employ "unsafe" code to call native Windows APIs, use pre-built COM components, and leverage existing ActiveX® controls to seamlessly integrate existing applications and components.

Sir Syed University of Engineering & Technology

18

Chapter 1

Introduction

Microsoft ADO.Net
With ADO.NET, developers gain access to more powerful components, such as the Dataset class and a strongly typed programming model that provides IntelliSense and statement completion for data access code. Unlike classic ADO, ADO.NET is optimized to provide the very best performance and scalability for both connected and disconnected data-centric applications. The Data Set class is a great way to query and update data while minimizing the time necessary to hold onto a costly connection to the database. Classic ADO was great for sending and receiving data; however, there were limited ways to work with the data once the developer closed the connection. This lead many developers down a path that limited the performance, responsiveness, and scalability of their system. The Data Set acts like an in-memory copy of the database, including multiple tables, relationships, and the ability to track the original and new values. In this way, a portion of the database can be brought down to the client via the Data Set class, updated with new data, and then sent back to the server to be merged back into the database. Using Visual Basic .NET and ADO.NET, developers can quickly be productive and create a data management application with minimal coding involved. The Data Adapter Configuration Wizard can generate all of the code necessary to select, insert, update, and delete data from any table in the database. Further, unlike classic ADO, it provides the developer with the ability to customize each SQL command and can even create the stored procedures.

ADO .NET

Sir Syed University of Engineering & Technology

19

Briefly. To implement a Security Server or Web Cast type application.NET code doesn’t need to traverse through multiple API layers before it gets to the actual database. DirectInput® includes new configuration functionality. The most compelling new feature is support for programmable shaders (a shader is a piece of code written in a shading language that is designed to be used in either the programmable vertex pipeline or the programmable pixel pipeline). The API has been extensively updated to make it even easier to use and to support the latest graphics hardware. and better international support. DirectShow® is a part of DirectX. DirectX Graphics component. Live Presentations over the Web – Capture screen activity on a server and send to one or more clients. it provides the power and productivity required by developers.NET builds upon previous versions of data access models. both in the runtime and in the SDK. This makes database calls faster and far more efficient.6 ADO.0 or greater. Lead Technology Tool The LEADTOOLS Video Conferencing SDK can be used to create Client Server applications such as: Security Server / Web Cast – Single sever sending to multiple clients. you would have the Server application running on one computer and the Client application running on one Sir Syed University of Engineering & Technology 20 .0 has received major new features that greatly enhance the capabilities of DirectX.Chapter 1 Introduction Figure 1. And for the first time.NET IDE. There is also a data provider for OLEDB-supported databases and even some new data providers that offer direct access to other databases such as Oracle. ADO.4. This can provide a performance boost since the Visual Basic . and networking.NET includes new data providers that were specifically created to talk directly to databases such as SQL Server 7.NET Framework and the Visual Studio . audio. Microsoft Direct X Every component of DirectX 8. Three components have had major rewrites: graphics. Video Conferencing – Each computer participating in the conference is both a client and a server. And since it is tightly integrated into the . action mapping.

all you need is the IP addresses of all the servers to which you wish to connect and monitor. the machine(s) to receive the video must know that IP address in order to be able to connect to the server. the party with which you are conferencing must have that address in order to be able to connect to you. they will be able to see what is happening on your desktop and they will hear Sir Syed University of Engineering & Technology 21 . its IP address will appear next to “connection”. For this. When you run the Client application. you need to have their IP address in order to connect to them. then Client#2 would have missed the first 5 minutes of the video. meaning to as many servers as you want (one client can connect to many servers). You can run both the Server and Client applications on your machine. You can create and broadcast live presentations over the web using using the LEAD Screen Capture filter as the video device on the Server side and the LEAD Screen Capture encoder to compress the video data. To conference with more than one person. it will ask you for an IP address to which you wish to connect. a viewing station could monitor multiple security camera locations. For example. you can run both the Client and Server applications on each computer that will participate in the conference. The Client computers would all be able to receive and see the video data being captured and sent from the Server. each computer plays the role of both client and server. When you run the Server application. When you run the Server your IP address will appear next to “connection”. The Client computers would see the data from the time that they connect. In other words. if Client#1 connects at 10:00 and Client#2 connects at 10:05. and have a 2nd party do the same. each machine in the conference should run the server. Once the Clients connect to your server. using the same client you can connect to as many IP addresses as you want. For example. And. You can run the Client application on one machine and connect to as many servers as you wish from the same client. It is also possible to have one Client application receive data from more than one Server application. it will ask you for an IP address to which you wish to connect.Chapter 1 Introduction or more remote computers. When you run the Client application. To implement a Video Conferencing application.

5 Sir Syed University of Engineering & Technology 22 . WAN or Internet. Two or more persons can connect to each other on the direct IP-to-IP connection to have real-time voice conference over the LAN. WAN or Internet. Enable the port forwarding at the router end in order to receive incoming connection requests. VaxExtended Tool VaxExtended SDK is the best peer-to-peer VoIP solution. PERSON A Initialize Connect OnStatusEvent: 51 (51 = CONNECTING) OnConnectionEvent AcceptIncomingCall OnStatusEvent: 51 (51 = CONNECTING) OnStatusEvent: 53 (53 = CONNECTED) OnStatusEvent: 53 (53 = CONNECTED) AddInConf OnStatusEvent: 59 (59 = ADDING) OnAddConferenceEvent AcceptAddInConf OnStatusEvent: 59 (59 = ADDING) OnStatusEvent: 60 (60 = ADDED) OnStatusEvent: 60 (60 = ADDED) OnStatusEvent: 60 (60= ADDED) OnStatusEvent: 60 (60 = ADDED) PERSON B Initialize PERSON C Initialize Successfully connected and having Voice Conversation Successfully added and all of them having Voice Conference Table 1. Extended SDK is a perfect solution to have small private conferences.4. during the conference each end receives multiple voice streams and mix them into single voice stream and play it over the sound device. in which.Chapter 1 Introduction what you are saying. It is NAT and other firewalls friendly. It supports client side voice mixing. If the client is behind the NAT/router then there is no configuration required to connect to listening end. where 8 to 10 persons can connect and have Real-Time voice conference over the LAN. Screen activity and sound are recorded and encoded using the LEAD Screen Capture encoder and then transmitted to the Client applications. Due to client side voice mixing.

He/she is also able to spread his/her command directly to his/her employee desktop. He/she is also the cooperative with the other users of the system. User interaction is totally independent in term of project scenario and interaction based on the target and mange user. There is some special scenario about the user and his requirement. business oriented and education oriented tool for communication. Especially in laboratory education he/she Sir Syed University of Engineering & Technology 23 . He/she provides help to other users on how to use the system and troubleshoots the system. Managing Director Managing director is the upper level management user. 2.Chapter 2 Introduction 2 Usage scenario / User Interaction This project is really a market oriented. Employee In every industrial pool we have a lot of employee. Administrator is the controlling user in term of system flow. Usage scenario based on the project’s target user as well the manage user. Teacher/Instructor According to the teacher point of view. Every employee updated with respect to any command. announcement and circular by using this system approach. He/she announce any announcement for his/her employee. he/she will able to update his/her employee directly through multimedia communication and present some thing live to his/her employee by mean of multimedia communication. He/she makes sure the system is working properly and the system is secured with respect to system availability and reliability. They work together but how they can interact directly to their team leader or the director. If they all went to director or team leader so there is huge bulk of employee at the door of director/team leader room. According to this system.1 User profiles The different types of users with their hierarchies and their description are given as follows: Administrator He/she is the most powerful user according to system maintenance and support. he/she will get the powerful tool for teaching and spreading information to the students.

Student will get their notes/lectures directly through the teacher system. Stock Exchange Manager Stock exchange has the lot of employee and stock partner. This system gives the noiseless education environment with respect to teacher point of view.Chapter 2 Introduction will enable to give lecture at the desktop of the students. Stock exchange manager will update his/her stock partner and employee by mean of live reports and documentation. Teacher will concentrate over his/her topic rather than to control student. Students will have deep look on their lecture at their computer screen. Team Leader Team leader will operate his/her team member directly under the one building. They will able to get statistics and calculation very quick because all information at their desktop. Sir Syed University of Engineering & Technology 24 . There is no need for team member to go through table to table of each team mate member. Student Students will easy to get their lecture with out any confusion because there is no white board in term of lecture and presentation. Stock Exchange Employee Stock exchange employee will very update and accurate by mean of live transmission. Team leader will directly get the task execution by his/her team member and deliver to the director.

1 Sir Syed University of Engineering & Technology 25 .2 Use-cases Video Streaming Audio Streaming Real Time Video server Real Time Voice User Remote Streaming Share File Live Presentation Overall Use Case Figure 2.2.Chapter 2 Introduction 2.

2 Streaming Video Streaming Audio Managing Director Loggin Real Time Voice Remote Streaming Live Presentation Managing Director Use Case Figure 2.3 Sir Syed University of Engineering & Technology 26 .2.2.Chapter 2 Introduction System Support Streaming Video Streaming Audio Real Time Video Administrator Loggin Real Time Voice Remote Streaming Testing Share File Live Presentation Administrator Use case Figure 2.

5 Sir Syed University of Engineering & Technology 27 .Chapter 2 Introduction Streaming Video Streaming Audio Real Time Video Employee Loggin Real Time Voice Remote Streaming Share File Live Presentation Employee Use Case Figure 2.4 Streaming Video Streaming Audio Real Time Video Teacher Loggin Real Time Voice Remote Streaming Share File Live Presentation Teacher Use Case Figure 2.2.2.

Chapter 2 Introduction Streaming Video Streaming Audio Real Time Video Student Loggin Real Time Voice Remote Streaming Share File Live Presentation Student Use Case Figure 2.6 Remote Streaming Team Leader Loggin Live Presentation Share File Team Leader Use Case Figure 2.2.7 Sir Syed University of Engineering & Technology 28 .2.

2.9 Sir Syed University of Engineering & Technology 29 .2.Chapter 2 Introduction Streaming Video Real Time Video Stock Exchange Manager Loggin Remote Streaming Live Presentation Stock Exchange Manager Use Case Figure 2.8 Real Time Video Remote Streaming Stock Exchange Employee Login Live Presentation Share File Stock Exchange Employee Use case Figure 2.

User interface included all the benefits according to target user. Server system should have any server product of Microsoft operating system. We have used Microsoft based operating system. Process part divided in two many sub part like C.Chapter 2 Introduction 2. Client system should have the same specification but it is not necessary to use server product at the client side. Software Interface The basic building block of the software interface is the operating system. mouse and trackball are the parts of input and monitor and printer are the parts of output. Hardware Interface In hardware interface. Some specifications are described by hardware and some by software. In this section special requirements that will be used during the process development & usage of the overall application that includes the following User Interface This is the basic building block of this system because system will never become a market oriented product when ever it is not very friendly to target user. Key board. GUI is easy to use and very good looking for the target eyes. Sir Syed University of Engineering & Technology 30 . There are some operating system services have used in this system like security and socket. Communication Interface Communication is the tool of this project. Software interface should have the compatibility with the operating system and the third party software. We have also considered the medium which is wired. Communication interface has the flavor of both software and hardware interface.U and LAN card and network switch etc. There are some third party tools for maximum system throughput. we have considered all hardware tools like system and other third part hardware like input. Special usage of consideration lies in different scenario of the system usage. In communication interface we have consider reliable and pre-request LAN card for communication. process and output interface.3 Special usage considerations There is some special consideration for system quality.P. We have used central and server based database system for security and streaming. we have considered all prospects with the user friendly terminology. According to graphically user interface (GUI). We have used Ethernet standard for LAN.

Sir Syed University of Engineering & Technology 31 . System configuration has the major role in deployment interface.Chapter 2 Introduction Deployment Interface This is the major interface because project is becoming product by using deployment interface. Deployment has done by the same operating system environment at the both end of medium. During deployment we have to consider the operating system compatibility with the other third party software.

Functionality is all about data processing over the network. The major theme divides into two systems which are server and client. The overall system connected with similar theme of modeling which based on different sub-functions and data description. Every system has its own functionality and data modeling with respect to execution. we have a lot of functionality and data description of different level of execution. This system is working upon different functionality and data description. The major characteristic is about the data object processing in term of multimedia extension. The multimedia data pointed by sub-data object which are the cause of multimedia communication over the network. Following table shows some brief idea about functional and data description. The relationship of data object with respect to functionality is quiet observable with respect to execution.Chapter 3 Functional and Data Description 3 Functional and Data Description According to this project. Functionality is based on the data object either they used as sub-system or sub-executable. System Description Functionality Main functionality Sub functionality Internal functionality External functionality Control functionality Figure 3.1 Data Description Data entity Data Object Data Behavior Data relations Data operations Sir Syed University of Engineering & Technology 32 .

Administrator Managing Director Teacher Instructor Multimedia Casting Over LAN Video Streaming Audio Streaming Real Time Voice Streaming Real Time Video Streaming Presentation Streaming Remote Streaming Stock Exchange Manger Employee Overall System Architecture Figure 3.Chapter 3 Functional and Data Description 3.1 Student Sir Syed University of Engineering & Technology 33 .1 System Architecture This is the overall architecture for both application like Multimedia Server and Multimedia Client.1.

Server Configuration Module This is the module that gets the network address of the server and applies it over all application for multimedia streaming.1. Sir Syed University of Engineering & Technology 34 . It checks user privileges from the directory services of operating system. This module provided a secure login at the both end of application.2 Modules overview Authentication Module This is the major module for the security in term of authorization and authentication. Multimedia Server Login Synchronize Cock Maintain Database erver Multimedia Client Login Streaming Multimedia Block Diagram of the System Block Figure: 3.Chapter 3 Functional and Data Description 3.1. This is the first basic module of this system.1 Architecture model The project block diagram is shown here as a brief context level model of the system architecture. It gets simple a complete IP address and the system name resolve by network class.1.2 3.

we have considered a central database system for communication. All multimedia extension is streamed by this module with respect to current operation with in the span of time. It is the initial connection to produce synchronization between multimedia server and client.Chapter 3 Functional and Data Description Database Module This module communicates with the database server for signaling. Data objects are behaving as signals for multimedia clients. There are the lists of sub modules which lie in this section. There are the lists of sub modules which lie in this section. Multimedia extensions Module This is the complete module of multimedia streaming. The overall system connected with similar theme of modeling which based on different sub-functions and data description. It provides a major back end operation with respect to multimedia streaming. It has sub-module with respect to connection and action. The major characteristic is about the data object Sir Syed University of Engineering & Technology 35 . All multimedia extension is streamed by this module with respect to current operation with in the span of time. • • • • • • Listen Video Listen Audio Listen Live Listen Camera Listen Remote Listen Shared Files 3. • • • • • • Listen Video Listen Audio Listen Live Listen Camera Listen Remote Listen Shared Files Multimedia streamed Module This is the complete module of multimedia streaming.2 Data Description According to this project. It has sub-module with respect to connection and action.

It generate clock for signal accessing by mean of data objects. business and education environment. Functionality is all about data processing over the network. Security is also provided by the database server.2 Present_Connect Attributes Present_Index Present_Name Present_Path Table 3.2.1. This project is the great tool in cooperative.2.1. Data description is the all over flow of signals by mean of multimedia extensions.Chapter 3 Functional and Data Description processing in term of multimedia extension.3 Type decimal varchar varchar Type decimal varchar varchar Type decimal varchar varchar varchar varchar float float Sir Syed University of Engineering & Technology 36 .1 Voice_Connect Attributes Voice_Index Server_Name Server_Ip Table 3.2. It is provided a full management of multimedia streaming over the network. It stream valuable data/ information in the manner of security. Data objects and their instance values accessed by the multimedia clients by mean of security. 3.1 Major data objects/signal specification Video_Connect Attributes Video_ Index Video_Stream Video_Name Video_PlayList Video_Duration Video_Position Is_Video_skip Table 3.1.2.

2.1.2.1.7 MultiMedia_Info Type decimal varchar varchar Type decimal varchar Type decimal varchar varchar Type decimal varchar varchar Attributes MM_ Index MM_User MM_Ct MM_File MM_Path MM_Stime MM_ETime Table 3.8 Type decimal varchar varchar varchar varchar varchar varchar Sir Syed University of Engineering & Technology 37 .4 Shared_File Attributes Index_File File_Name File_Path Table 3.6 Client_Info Attributes Client_ Index Client_Name Client_Pass Table 3.1.1.2.Chapter 3 Functional and Data Description Remote_Connect Attributes Remote_Index Remote_Name Remote_Path Table 3.5 Status_Table Attributes Status_Index Status_Of_streaming Table 3.2.1.2.

1.2.Chapter 3 Functional and Data Description Server_Config Attributes Host_ Index Host_Name Host_IP Table 3.10 Video_Actions Attributes Type Changed_ Index decimal Changed_Video varchar Changed_Position float Is_Stoped int Is_Played int Is_Paused int Table 3.11 Audio_Actions Attributes Changed_ Index Changed_Audio Changed_Position Is_Stoped Is_Played Is_Paused Table 3.2.1.2.1.9 Audio_Connect Attributes Audio _ Index Audio_Stream Audio _Name Audio _PlayList Audio _Position Audio _Duration Is_Audio_skip Table 3.2.1.12 Type decimal varchar float int int int Type decimal varchar varchar varchar float varchar float Type decimal varchar varchar Sir Syed University of Engineering & Technology 38 .

2 System level data model Under this section.2.1. Other thing is about the network switch which is used for the same network family.13 Type decimal varchar 3. Every system that wants to communicate with multimedia server then it should be providing desire user name and user password for multimedia streaming.2 3.2. the major components and hardware are shown in the form of DFD. Multimedia Server Multimedia Server Database Server Client 1 Client 2 Client 3 Figure 3. There are some interfaces by mean of networking such as a desired LAN card for connecting system over LAN environment.3 System Interface Description This project has the flavor of both networking and software.Chapter 3 Functional and Data Description Voice_Action Attributes Voice_Action_ Index Voice_Signal Table 3. Sir Syed University of Engineering & Technology 39 .3.

1 External machine interfaces Member Server Member server is the client machine which is driving by any server product operating system. Web camera has interfaced by development tool like C#. Work station has not any server product like Windows 98/XP. 3. we considered a lot of active X control for development. There are some operating system services by mean of control interfaces and some third party tool be considered. We have windows 2003 server machine as a multimedia client so windows 2003 server made it a member server. Work Station Work station is simply a client machine which is connected to the server. Web Camera Web camera is the other external machine used for real time video streaming because it is the part of multimedia extensions. Ethernet make a single administrator network environment which belong to our requirement. 3.3. Member server may use as a backup of multimedia server or its said to be a backup server. We considered a lot of control and classes provided by development environment. Multimedia client may be a workstation it is on customer. Ethernet Switch Ethernet card has used for multimedia bridge because we have a lot of system requirement over LAN.3.2 External system interfaces  Combo Box  Button  Checked List Box  Menu  Data Grid Sir Syed University of Engineering & Technology 40 .Chapter 3 Functional and Data Description According to software interfaces.

0  Web browser control  Rich text box buffer  Status bar  System performance control  Image list.Chapter 3 Functional and Data Description  Label  Text Box  Group Box  Panel  Main Menu  Tool bar  Vax-Extended object  Lead Control object  Media player 9. Sir Syed University of Engineering & Technology 41 .

Sir Syed University of Engineering & Technology 42 . Ethernet card based on 802. Member Server Member server is the client machine which is driving by any server product operating system. Work station has not any server product like Windows 98/XP. we have considered following component. Multimedia client may be a workstation it is on customer.Chapter 4 Subsystem Module Description 4 Sub-system module Description According to this project we have both network and software flavor and their subsystem and module. Web camera has interfaced by development tool like C#. Member server may use as a backup of multimedia server or its said to be a backup server.3 It is used for connection based on LAN standard Ethernet. We have windows 2003 server machine as a multimedia client so windows 2003 server made it a member server. According to hardware/network sub system. Web Camera Web camera is the other external machine used for real time video streaming because it is the part of multimedia extensions. We used 100 Mbps configuration Ethernet card for multimedia communication. We used wired Ethernet card due to its high bandwidth and data rate. Work Station Work station is simply a client machine which is connected to the server. Ethernet Switch Ethernet card has used for multimedia bridge because we have a lot of system requirement over LAN. Ethernet make a single administrator network environment which belong to our requirement.

Server Configuration Module This is the module that gets the network address of the server and applies it over all application for multimedia streaming.  Listen Video  Listen Audio  Listen Live  Listen Camera  Listen Remote  Listen Shared Files Sir Syed University of Engineering & Technology 43 . There are the lists of sub modules which lie in this section. It gets simple a complete IP address and the system name resolve by network class. Multimedia streamed Module This is the complete module of multimedia streaming. It provides a major back end operation with respect to multimedia streaming. All multimedia extension is streamed by this module with respect to current operation with in the span of time. Software modules belong to development modules and third party tools that are interfaced during development. Authentication Module This is the major module for the security in term of authorization and authentication. This is the first basic module of this system. It has sub-module with respect to connection and action. Database Module This module communicates with the database server for signaling.Chapter 4 Subsystem Module Description According to software we have used several modules for development. It checks user privileges from the directory services of operating system. It is the initial connection to produce synchronization between multimedia server and client. This module provided a secure login at the both end of application.

Chapter 4 Subsystem Module Description Multimedia action Module According to this module. Some hardware scope is defined by the development domain. It is responsible for voice streaming on the specific port that provided by in term of hard cord. It communicates over IP addresses of the systems but it is not hard corded. After all client should have any operating system of Microsoft family rather than Windows 95/98 etc. we considered some special subsystem or module for communication.1 Description for Subsystem We considered subsystem scope in the manner of reliability and availability of the system. According to hardware. 4. It captures the real time video in the file and then stream over the network. Lead Module Lead control module also belongs to third party tool for real time video conferencing.  Video Action  Audio Action  Live Action  Web Camera Action  Voice Action Vax-Extended Module Vax-Extended module belongs to third part tool for voice streaming. the overall action that is performed by multimedia server is noticed here because client has to synchronize with the specific operation that applied over multimedia extensions. we considered communication system over network like server and clients. It creates real time voice session between multimedia server and clients. we consider network switch that support minimum eight client machine for communication and support high bandwidth of Sir Syed University of Engineering & Technology 44 . According to multimedia server. Server should have any server product of Microsoft based operating system. It communicates over IP addresses of the systems but it is not hard corded. It is responsible for voice streaming on the specific port that provided by in term of hard cord. Multimedia action modules carry signal to database server and client automatically get actions with in span of time.

4. This is the tool for security purpose with respect to authentication. In the Ethernet standard.1. In the half duplex mode.3u)  1000 Mbps . Four data rates are currently defined for operation over optical fiber and twisted-pair cables:  10 Mbps .10 Gbps Ethernet (IEEE 802. It should be capture 30 to 40 frames per second for desire quality.Gigabit Ethernet (IEEE 802. According to real time streaming we considered a quality capture web cam for real time streaming. data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a shared medium. Database server uses its services in term of queries in the desire span of time.3)  100 Mbps .3. The major subsystem is about the network based component called Ethernet card based on IEEE standard 802. Ethernet card considered high bandwidth and data transfer rate.10Base-T Ethernet (IEEE 802. There are many subsystems like the authentication system interact with directory services of the operating system. there are two modes of operation: half-duplex and full-duplex modes. All stations attached to an Ethernet are Sir Syed University of Engineering & Technology 45 .Fast Ethernet (IEEE 802. Third party tool applied in the extra scope of utilization with respect to project scope. Third party tools provided some restricted operation but we have interfaced them in extra ordinary style.3z)  10-Gigabit . The several types of queries execute in the span of time for multimedia communication. Database server directly communicates with multimedia server and client on the specific request. Each Ethernet-equipped computer operates independently of all other stations on the network: there is no central controller. The other module is about the data base server which is very important for communication because database server behave like a bridge for signals of multimedia extensions. This is the high bandwidth supported LAN card for heavy communications.3.1 Subsystem scope Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802. There are some third party tool interfaces with respect to project services.Chapter 4 Subsystem Module Description data.3ae).

To send data a station first listens to the channel. Access to the shared channel is determined by the medium access control (MAC) mechanism embedded in the Ethernet interface located in each station. all stations on the network must contend equally for the next frame transmission opportunity. and when the channel is idle the station transmits its data in the form of an Ethernet frame. The medium access control mechanism is based on a system called Carrier Sense Multiple Access with Collision Detection (CSMA/CD). or packet. Sir Syed University of Engineering & Technology 46 . also called the medium. After each frame transmission.Chapter 4 Subsystem Module Description connected to a shared signaling system.

Chapter 4 Subsystem Module Description 4.1.1.1.3 Algorithmic/protocol model Sir Syed University of Engineering & Technology 47 .2 Subsystem flow diagram/ desired UML diagram Start YES Install Multimedia application Multime dia streamin g NO Login to directory service of OS Wait for streaming End Server initialization Login to directory service of OS Client joins the server Server found YES NO Connected to server Figure 4.1 4.2.

the Media Access Control (MAC) sub layer and the MAC-client sub layer. with multiple segments attached to a repeater.4 Restrictions/limitations The main disadvantages of the half-duplex are the efficiency and distance limitation. The logical topology of an Ethernet provides a single channel (or bus) that carries Ethernet signals to all stations. if you have too many applications open. to distinguish it from the actual physical layout of the media cables.1. it helps to understand the topology of the system. 4.Chapter 4 Subsystem Module Description As with all IEEE 802 protocols. It provides a secure communication in term of security issues. including frame assembly before transmission. If you notice things are sluggish.3 physical layer corresponds to the ISO physical layer. The signal topology of the Ethernet is also known as the logical topology. including initiation of frame transmission and recovery from transmission failure Even though the media segments may be physically connected in a star pattern. it could slow down your media streaming. the ISO data link layer is divided into two IEEE 802 sub layers. close all unnecessary applications and windows running on your computer. and frame parsing/error detection during and after reception  Media access control. This restriction reduces the efficiency drastically for high-rate transmission. the logical topology is still that of a single Ethernet channel that carries signals to all stations. Sir Syed University of Engineering & Technology 48 . 4. 802 protocols support our desire protocol like TCP/IP for errorless and lossless communication. Even with a fast computer.1.5 Performance issues  A slow computer. The IEEE 802. Just keep your Web browser and your media player open. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. in which the link distance is limited by the minimum MAC frame size. The restriction over multimedia streaming is about to over flow because if we consider multiple multimedia extensions so it may effect on your system performance. The MAC sub-layer has two primary responsibilities:  Data encapsulation. When it comes to how signals flow over the set of media segments that make up an Ethernet system. Therefore.

 The main disadvantages of the half-duplex are the efficiency and distance limitation. Of course. speedy computers are better. Disconnect any phones that cause a buzz or hum. crackling). If you have a phone line that isn't free of noise (humming. Sir Syed University of Engineering & Technology 49 . you can even close your browser. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. that's not good for streaming (or Web browsing). Have your phone company check your line to get rid of humming or other line noise.  Noisy phone lines.Chapter 4 Subsystem Module Description (If you're just listening or watching. a cable modem or DSL connection is best for streaming media.) In any case. in which the link distance is limited by the minimum MAC frame size. This restriction reduces the efficiency drastically for high-rate transmission. Therefore.

we have different behavior with respect to its states of execution. The login event deals the security in term of authentication and authorization. we have considered a strong security mechanism with respect to login state. Multimedia streaming is the basic behavior of multimedia server but there are some other behavior included for controlling. After authorization multimedia server is got its listening address by the network. Clock event Call itself in specific span of time like recursion. There are several states of event from ideal state to busy state. Multimedia client has also used some operating system service and third party tool for desire execution. Multimedia client has several behavior states with respect to server acknowledgement due to central database system. Multimedia server has some major behavior with respect to multimedia streaming but it is not least according to system performance. According to multimedia server. Multimedia server has a powerful control behavior with respect to system states because there are heavy data transfer rate over the network by mean of multimedia streaming. According to multimedia client. We used an event for authentication with the directory service of operating system. we have some same behavior states with respect to multimedia server. Multimedia server called database services in the Sir Syed University of Engineering & Technology 50 .1 Description for system behavior According to the system behavior. 5. Listening address got globalize for its multimedia clients. The next major event is about to synchronize with database server. Multimedia server behavior is controlled by some operating system services and third party software. There are so many behavior characteristics which are the cause of system action and performance. Multimedia client converge its attention to its server because in every second multimedia server can get different state with respect to multimedia streaming. The basic behavior is about to get multimedia streaming from the multimedia server but it can change with in second. there are a lot of flavors with respect to states and events. The major event is about to generate a clock for synchronization. Multimedia server should be in the hand of authentic person of any industrial pool.Chapter 5 Behavioral Model and Description 5 Behavioral Model and Description According to multimedia server. optimizing and integration. Multimedia client has a powerful control by mean of its communication with respect to multimedia streaming.

The administrator or the team leader can stream multimedia extension over the network. Sir Syed University of Engineering & Technology 51 .1. multimedia clients have to wait on-stream multimedia streaming that is controlled by multimedia server. multimedia is on the state of communication. first event is about the authentication of clients. 5. Multimedia Client  Login to directory service of Multimedia server.  Maintained record for multimedia clients.  Close all operation and services related to project.  Assign communication port.  Connect to database server. After connected database server.  Stream multimedia extensions.  Generate a clock for synchronization.  Calculate network statistic. According to multimedia client.1 Events Multimedia Server  Login to directory service and DNS. Multimedia clients are dependent on the multimedia server otherwise they will not able to get any information. There are complete library of multimedia extension ready for streaming.  Get multimedia streaming. Internally operating system grants his/her connection by mean of login application of this project.  Using operating system services. Multimedia client has to login with the directory service of operating system. Multimedia client has an synchronized clock to database server for signaling about on-stream multimedia extensions.Chapter 5 Behavioral Model and Description span of time with respect to requirement.  Generate clock for synchronization.  Interface third party software with operating system.  Listen clients for assigning address.  Contact to central database system like multimedia server. After connection.

1.  Calculate network statistics.  Display database form. Multimedia Client  Initialize login form. 5.  Monitoring database.  Calculate network statistic.  Calculate network statistics.Chapter 5 Behavioral Model and Description  Using operating system services.  Call third party services.  Initialized Main Form  Enable menus and controls.  Finish.  Close all operation and services related to project.  Access central database. Sir Syed University of Engineering & Technology 52 .  Maintaining database.  Authentication  Enable controls.  Interface third party software with operating system.  Finish.  Authentication  Enable controls.  Initialized Main Form  Enable menus and controls.  Call third party services.2 States Multimedia Server  Initialize login form.  Authorization by Windows Directory services.

Net framework State 6 Streaming MultiMedia Extensions from Server State 3 Install Multimedia Server application State 7 Receive the on-stream by User State 4 Application icon generated on the desktop Figure 5.2.2 State Transition Diagrams Multimedia Server State 1 State 5 Administrator initiates the setup Run the application State 2 Install .1 Sir Syed University of Engineering & Technology 53 .Chapter 5 Behavioral Model and Description 5.

2 Sir Syed University of Engineering & Technology 54 .2.Chapter 5 Behavioral Model and Description Multimedia Client State 1 State 5 User initiates the setup Run the application State 2 Install .NET framework State 6 Streaming MultiMedia Extensions from Server State 3 Install Multimedia Client application State 7 Receive on-stream Multimedia Client State 4 Application icon generated on the desktop Figure 5.

3 Control specification There are some specific states of control with respect to project services. The overall control of flow is given in figure 5.Chapter 5 Behavioral Model and Description 5.3 Multimedia Server Multimedia Client Active Directory Services Generate clock Generate clock Connect to DBS Connect to DBS Stream Multimedia Get On-stream Data Control DBS Multimedia actions Calculate Network Statistics Figure 5.3.1 Calculate Network Statistics Sir Syed University of Engineering & Technology 55 .

System prototype gave us theoretical as well as practical description about system execution in term of desired performance. There was some enhancement in this model according over project deployment. We considered universal model but added some useful phase for system modeling. Simulation result is about the real time process of any system that works with in its desired domain.Chapter 6 Results System Prototype Modeling and Simulation 6 System Prototype Modeling and Simulation Results System prototype modeling is the approach of project simulation with respect to expected result that you want after compilation. system should be re-engineered and spiced up. Once the ideal system is engineered or tuned up. Software Requirements Analysis. Code Generation. Testing and Support. Table 6. Systems Analysis and Design. people and other resources. Information about Modeling and engineering. So if the system is not in place. This system view is essential when software must interface with other elements such as hardware. System is the basic and very critical requirement for the existence of software in any entity. the system should be engineered and put in place. This has the following activities. we considered universal prototype model for simulation. According to this project. work begins by establishing requirements for all system elements and then allocating some subset of these requirements to software. Sir Syed University of Engineering & Technology 56 . In some cases to extract the maximum output. 6. Simulation result gave us overall idea about system performance and execution.1 Description of system modeling approach System Development Life Cycle Model We considered most famous model like System Development Life Cycle which is also known as Classic Life Cycle Model (or) Linear Sequential Model (or) Waterfall Method. Deployment.1 Information about Modeling and engineering As software is always of a large system (or business). the development team studies the software requirement for the system.

Testing and Support Once the code is generated. Analysis and Design are very crucial in the whole development cycle. They investigate the need for possible software automation in the given system. The requirements gathering process is intensified and focused specially on software. the software's overall structure and its nuances are defined. Systems Analysis and Design In this phase. the program testing begins. Sir Syed University of Engineering & Technology 57 . The code generation step performs this task. Much care is taken during this phase. code generation can be accomplished with out much complication. Interpreters.Chapter 6 Results System Prototype Modeling and Simulation Software Requirements Analysis This is also known as feasibility study. the database design. The essential purpose of this phase is to find the need and to define the problem that needs to be solved. and target dates. If design is performed in a detailed manner. project schedule. Different testing tools and methodologies are already available. the team furnishes a document that holds the different specific recommendations for the candidate system. It also includes the personnel assignments. Code Generation The design must be translated into a machine-readable form. C++. Any glitch in the design phase could be very expensive to solve in the later stage of the software development. the right programming language is chosen. the number of tiers needed for the package architecture. performance and interfacing. Different testing methodologies are available to unravel the bugs that were committed during the previous phases. C# are used for coding. the data structure design etc are all defined in this phase. the system engineer ("analyst") must understand the information domain for the software.Net. Programming tools like Compilers. costs. Different high level programming languages like C. the development team visits the customer and studies their system. In this phase. To understand the nature of the program(s) to be built. and Debuggers are used to generate the code. With respect to the type of application. behavior. as well as required function. In terms of the client/server technology. The logical system of the product is developed in this phase. VB. By the end of the feasibility study.

2. There are many reasons for the change. the changes in the system could directly affect the software operations. Software will definitely undergo change once it is delivered to the customer. In this project. packet received and packet sent. Development tool provide the massive support to develop perfect result. Change could happen because of some unexpected input values into the system. development tool will play the massive role to achieve high quality result. Deployment This is the major factor for achieving the desire result. In addition. 6. Table 6.Chapter 6 Results System Prototype Modeling and Simulation Some companies build there own testing tools that are tailor made for there own development operations.2 Simulation results Simulation Tools Microsoft Windows Task Manager MultiMedia Server Network Statistics MultiMedia Server Performance Counter Simulation Results Give Over all System performance in term of Usage Give bandwidth in term of data transfer rate in term of received and sent Packet lost. The software should be developed to accommodate changes that could happen during the post implementation period.1 Sir Syed University of Engineering & Technology 58 .

2.2 Sir Syed University of Engineering & Technology 59 .Chapter 6 Results System Prototype Modeling and Simulation System performance Measurement Figure 6.

 Here prototyping is considered to be an additional.3 Special performance issues  Issues with SDLC.Chapter 6 Results System Prototype Modeling and Simulation Network Monitoring Figure 6.  Users never know their actual requirements until something tangible exists.  Issues With Prototyping:  Can meet a small group’s requirement which may not be adequate for the overall system. specialized method for gathering users' information requirements.  Lengthy development time is required.  Tends to result in high cost development.  Users’ requirements can change before the process is completed.  We can use prototyping as a part of traditional SDLC approach.2. Sir Syed University of Engineering & Technology 60 .3 6.

 Design and implementation. Sir Syed University of Engineering & Technology 61 .  Listen user.  Support tool.  Complete analysis.4 Prototyping requirements  User Information.  Know target product.Chapter 6 Results System Prototype Modeling and Simulation 6.

According to Multimedia server. Some time the software estimation becomes a huge below by mean of system decomposition and system resizing. Implementation of third party software Like Voice/Video Sdk and Direct X Over all Historical Data Table 7. We considered some streaming software like Media Player and Net Meeting by mean of implementation. Sql server 2000. We assumed following data for the deployment and release. Network Analysis with operating system Security in term of Authentication and Authorization Top class graphical user Interface with respect to user friendly Multimedia Streaming applications like Net meeting.1 The historical data gave us the complete idea of project compilation. The other most historical data is about the perfect and good looking GUI. Sir Syed University of Engineering & Technology 62 . There were a lot of considerations about the database management system. Media player 9. first we have considered network design analysis with respect to operating system. The real time streaming products gave us strong support of the project compilation. Net meeting and third party product. the problem to be solved. We have considered a lot of pre-made application like Media player. We have also considered some third party tool for system development life cycle. This project has both software and network flavor. Database Management system such as Oracle. The overall securities apply by the software application like we considered Active Directory and DNS services. This is the communication environment over the network. engineering efforts and the deploy efforts. 7.Chapter 7 System Estimates and Actual Outcome 7 System Estimates and Actual Outcome Software estimation is the form of problem solving and in most cases. System estimation and the actual outcome shows your scope efforts. VoIP application and Real time Video.1 Historical data used for estimates According to this project we have a lot of consideration over the historical data.

This. Current trends in which software development is going to prototyping. Now we consider following data for estimation: Sir Syed University of Engineering & Technology 63 .2. is probably not going to generate much in the way of new research. This project is about server client operations that’s why we considered it into many phased of development. When a new project estimated. or business processes affected. CASE tools. changes. make the use of LOC much less stable. Loc data are used in two ways during software project estimation: As an estimation variable to size each element of the software. as fewer and fewer organizations have significant numbers of new applications "written" entirely by programmers. 7. The project planner begins with a bounded statement of software scope and forms this statement attempts to decompose software into loc function.2.2 Estimation techniques applied and results There are many estimation techniques for project estimation but we considered very common and effective cost estimation by mean of exact cost management. In loc-based estimation. and 4GLs.2 Estimate for technique Loc is the estimation technique in tern of project management. we considered the whole scenario of our project by mean of lines of code. We considered integrated parts of this project by mean of lines of code. it should first be allocated to a domain. and then the appropriate domain average for productivity should be used in generating the estimate. there must be many projects of different types and sizes in a stable environment. As baseline metrics collected from past project and used in conjunction with estimate variables to develop cost and effort projections. In order to get a model which suits the environment. This is generally no longer the case.Chapter 7 System Estimates and Actual Outcome 7. The planner may choose another component for sizing such as classes or objects. 7. the oldest of the models. We considered the scope of estimation technique because project resources and uses may tolerate by mean of requirement.1 Estimation Technique Loc is the acronym of lines of code.

2 This is all about the one sided estimation in term of multimedia server. Now we considered the multimedia client software requisites. (GUI) Network analysis and implementation. (SI) Integration of services. (RTVV) Database Management system. (IOS) Estimated lines of code Estimated LOC 750 103 402 150 112 105 324 260 230 170 170 175 2951 Multimedia Server software Table 7. (PCF) Security Implementation.Chapter 7 System Estimates and Actual Outcome Requirement and Function Graphical User interface. (SAA). (TPSI) Flow of Control. (RSS) Live Presentation. (FOL) Peripheral control function. (LS) Real Time Voice/Video. (NAI) Static Video/Audio Streaming. Remote streaming and Sharing. Multimedia client is controlled by the multi media server that’s why we covered a lot of LOC in multimedia server software estimation. (DMS) Third party Software interfacing. Sir Syed University of Engineering & Technology 64 .

(NAI) Static Video/Audio Streaming. (DMS) Third party Software interfacing. (SI) Integration of services. (SAA). (FOL) Peripheral control function. we considered following data or in formation which is about our team performance. (RTVV) Database Management system. (IOS) Estimated lines of code Estimated LOC 450 102 230 150 112 105 227 160 230 120 70 75 1990 Multimedia Server software Table 7. (TPSI) Flow of Control.2 By using Loc-based estimation. (GUI) Network analysis and implementation. (RSS) Live Presentation. Average productivity = 925 Loc/pm where pm --> person-month Sir Syed University of Engineering & Technology 65 . (LS) Real Time Voice/Video. (PCF) Security Implementation.Chapter 7 System Estimates and Actual Outcome Requirement and Function Graphical User interface. Remote streaming and Sharing.

2 System Resources Required Microsoft Windows 2000/2003.4. Ethernet card Network switch. Human ware 7.1 System Resources (Required and Used) System resources divided in to three major parts follow as: Software Hardware.Chapter 7 System Estimates and Actual Outcome Total lines of code (LOC) =4941 Loc Total person required = 4 approximately Cost per line of code = Rs. (For Multimedia Clients) Microsoft . 11 Total Cost estimate= Rs. Microsoft Paint. 54351 7.4. System Resources Required Sir Syed University of Engineering & Technology 66 . (For Multimedia Server) Microsoft Windows 2000/XP/2003.Net 2003. Desktop/Lap Tops.3 Actual Results and Deviation from Estimates Component/Recourse Project cost in term of development Network switch Ethernet Cards (3 pieces) Posters and Brochure Final Report Extras Total Cost Final Cost 60000 1200 600 6000 2000 1000 70800 Estimated Cost 54351 1500 700 6000 2000 1000 65551 7.

XP/2003. Microsoft Windows 2000. Sir Syed University of Engineering & Technology 67 . Active Directory Services Microsoft C#.Chapter 7 System Estimates and Actual Outcome Pentium class P3/P4 computer 3 units. Net Environment. Ms Networking protocols installed and enabled.

in part because it has a great deal to do with setting expectations. the complete system control structure of the procedural design to derive cases. but not unnecessarily repetitive. design and code generation. This view presupposes there are defects in your software waiting to be discovered and this view is rarely disproved or even disputed. Integrated testing of the application avoids the huge and bulk phase of testing. Internal program logic exercise using “white box” test case design techniques. This project has the integrated structures which are independent to each Other. Planning is crucial to a successful testing effort. This Sir Syed University of Engineering & Technology 68 . but most importantly it measures the quality of the software you are developing. According to white box testing. Every team can test its own integrated application with respect to project development. The earlier in the development cycle that testing becomes part of the effort the better. Several factors contribute to the importance of making testing a high priority of any software development effort. Every statement has its own condition with respect to the project life cycle. and performance in test plans increases the likelihood that testing does take place and is effective and efficient. This Software test split into two main perspectives. Planning also ensures tests are not forgotten or repeated unless necessary for regression testing. External program logic exercise using “black box” test. The test plan outlines the entire testing process and includes the individual test cases. Considering budget. There are some iterations on the project development. schedule. A formal test plan establishes a testing process that does not depend upon accidental. random testing. In this step we control the testing at the level of project control statements by mean of Boolean condition. they also be tested by integration.Chapter 8 Test Plan 8 Test Plan Software testing is the critical element of software quality assurance and represents the ultimate review of specification. To develop a solid test plan. This is the main step with respect to team work because all the development is the return of team work. you must systematically explore the program to ensure coverage is thorough. Testing accomplishes a variety of things. Some conditions are valid with specific condition so there is complex testing with respect to validation.

1 System Test and Procedure The process of testing an integrated hardware and software system to verify that the system meets its specified requirements is said to be system testing. 5: Initialization and termination errors. Every team member traced error and threat of his part of implementation. According to the black box testing. It is all about the control structures so attention was focus on the information domain. 3: Execute all the loops at their boundaries and operations bounds. performed by the Test Team. Black box attempts error in different manners. White box embedded by the following steps. 3: Errors in the data structures or external database access. By using integrated testing in black box we enabled to test overall system with respect to exact test plan. 8. 4: Exercise internal data structures to ensure their validity. We considered all integrated phase in term of Black box and White box. Black box testing tends to applied during stages of testing. and at the start of the system testing the complete system is configured in a controlled environment. we considered configuration and implementation by mean of errorless product environment. 1: Incorrect or missing function. First we considered the integrated functionality based on sub-system or the unit of system. we considered behavioral testing and focus on the functional requirement of the project. System has several test units with respect to its behavior. 4: Behavior or performance errors.Chapter 8 Test Plan phase of testing can generate the valid report of every statement with respect to the project control. According to the system strategy. System testing is black box testing. 2: Interface errors. Sir Syed University of Engineering & Technology 69 . Black box embedded by the following steps. 2: Exercise all logical decision on the basis of True and False. 1: Guarantee that all independent path with in the module. System test organized by the team leader which may changed during testing. The purpose of system testing is to validate an application's accuracy and completeness in performing the functions as designed.

2.1 Unit testing The primary goal of unit testing is to take the smallest piece of testable software in the application. It is the crucial phase when you are going to test your project in term of availability. In its simplest form. The idea is to test combinations of pieces and eventually expand the process to test your modules with those of other groups.2 Testing strategy Testing is the important part in software project evaluation because it gives desired support for deployment. they should be tested in pairs rather than all at once. Beyond that. which are in turn aggregated into even larger parts of the program. This method reduces the number of possibilities to a far simpler level of analysis. reliability and performance. two units that have already been tested are combined into a component and the interface between them is tested. Every unit has its own functionality but it is not avoid that there is some error in it. if the program is composed of more than one process.Chapter 8 Test Plan 8. Eventually all the modules making up a process are tested together. A component. 8. By using a test plan that requires you to test each unit and ensure the viability of each before combining units. you know that any errors discovered when combining units are likely related to the interface between units.2. in this sense. 8. Unit testing described overall threat and error with respect to software and hardware. Unit testing avoid the bulk of work and it is easy to integrated overall test into many different testing unit. Every phase has its own functional power for finding errors. many units are combined into components. In a realistic scenario.2 Integration testing Integration testing is a logical extension of unit testing. isolate it from the remainder of the code. Integration testing identifies problems that occur when units are combined. and determine whether it behaves exactly as you expect. We considered every unit separately then combine it with other units. Sir Syed University of Engineering & Technology 70 . Unit testing has proven its value in that a large percentage of defects are identified during its use. refers to an integrated aggregate of more than one unit. Each unit is tested separately before integrating them into modules to test the interfaces between modules. We split this phase into many subphase because it is easy to test in integrated flavor.

we considered recovery testing in term of static and dynamic. We checked the overall system i. as defined in requirements. validation typically involves actual testing and takes place after verifications are completed.3 Validation testing The validation testing strategy and procedure is specified. is the intended behavior of the product. code. High-order testing (a.a. Recovery testing According to this project.Chapter 8 Test Plan 8. This section includes a discussion of the order of validation by system.k. There are important data over the network and target user access it by some access policy that applies on him/her. After static recovery we considered run-time recovery by mean of dynamic. Verification ensures the product is designed to deliver all functionality to the customer. During implementation we have recovered many future recovery stuffs in term of pre-plan recovery. walk through and inspection meetings. we considered recovery the run time of project. issues lists. this can be done with checklists. If any module fail during execution we implemented a desire recovery processes at the run time. We Sir Syed University of Engineering & Technology 71 . Every module works within its boundary and interact with the other modules and passes data in a secure manner to each other. We handled many exceptions at the run time because it is important to organize project functionality at the run time. Validation ensures that functionality. Security testing Security testing is about validating your application's security services and identifying potential security flaws. In dynamic testing. Statically we considered pre plan recovery strategies because there were so many problems during implementation. requirements and specifications. There are many issues in term of security because authorization and authentication have most important role in project execution. it typically involves reviews and meetings to evaluate documents.e. plans. System Testing) High order testing is some times also called a Bird’s eye view. This section contains important testing recommendations for verifying that you have created a securable application.2. each and every module is working properly and the task defined for each module is fulfilled according to project requirements.

which is a specialized form of performance testing. To accurately compare the results from different performance test passes. Fix these subtle bugs at their source instead of fixing symptomatic bugs that may occur elsewhere in the application if these bugs were ignored. software configuration. Multimedia extensions want the high bandwidth medium during streaming so we have applied many extensions at the run time and change it frequently. is similar to destructive testing in other fields of engineering. and so on. Since such bugs are typically the result of design flaws. stress testing should begin early in the development phase on each area of the application. The application must pass its functional tests before you can test its performance. For example a wrong person login through the network an access important multimedia data by mean of security threats.Chapter 8 Test Plan considered couple of testing strategy over the project by mean of security. It is important to control changes to the application. unexpected changes can occur in hardware. Sir Syed University of Engineering & Technology 72 . Stress testing helps to reveal subtle bugs that would otherwise go undetected until the application was deployed. stable. it is important to eliminate as many variables as possible from the tests. Like Interruption Interception Fabrication Modification Stress testing Stress testing. bugs in the code can create the appearance of a performance problem or even mask a performance problem. system services. In addition to application changes. We considered many multimedia extensions streaming over the network which have 20 to 30 client machines. network traffic. the application must be working correctly. It is especially important to retest application functionality if the tuning process has modified the implementation of a component. As such. and robust. For example. The goal of stress testing is to crash the application by increasing the processing load past performance degradation until the application begins to fail due to saturation of resources or the occurrence of errors. Performance testing Performance testing presumes that the application is functioning.

In term of network. states and transition that have to use in testing phase. We used some of test metric which is given below: Bang metrics Bang metrics provided us the number of test cases required by examining the primitive measures discussed like number of functional primitives. Operating system has its own software application that gave us the performance and testing support by mean of software resources. hardware and network. 2: Metrics that focus on test coverage for a given component. object. design and code metrics to guide them in the design and execution of test cases. 8. not the technical characteristics of the test themselves. 2: Examining the number of data object that move across the interface. There are many resources used for testing because this project belongs to different paradigm in term of software. Project platform helped us in different scenarios because it was giving time to time configuration setting in term of network specification. Hardware testing was not very crucial because we considered pre-plan hardware equipment that avoids hardware tolerance. Software resources are also applied by the operating system services. We considered this metric in following steps.4 Test metrics Test metrics fall into two broad categories: 1: metrics that attempt to predict the likely number of tests required at Various testing levels. data element. According to hardware. The number of tests associated with the human/computer/sub-system interface can be estimated. we considered operating system services for testing.Chapter 8 Test Plan 8. The majority of metrics proposed focus on the process of testing. relationship. Sir Syed University of Engineering & Technology 73 . 1: Examining the number of transition contained in the state transition Representation of transition respect to evaluation of test.3 Testing resources and staffing Testing resources belong to different flavor which are organized into different manner of staffing. In general we relied on analysis. we tested specialized hardware by mean of project requirement. We have also applied little bit support by this project but it wasn’t so we considered more over the operating system services.

We generated log files either it was related to network field or the software field. There was another great tool for testing which was our development environment indicated many of errors as well as warnings with respect to project deployment.Net 2003 Microsoft CLR/CTR. Unhandled Exceptions. Testing tools adopt by the specification of project environment. We have developed a log file that maintained the history of our testing with respect to errors and bugs.6 Test record keeping and test log This is the most important phase because you always learn from your mistakes. Architectural Metrics gave us the result of overall integration plan in term of system resources. It is all about the component level design metrics that lies at the core of basic path of project implementation. 8. 8. Operating system has the excellent tool for this management because it gave us error as well as warning with respect to execution.Chapter 8 Test Plan 3: The number of data elements that are input or output. We considered some services by operating system to get following testing: Testing Environment Addressing and Configuring Streaming Bandwidth Performance Over Network Data transfer rate over LAN Quality of Multimedia extension Flow of project control. Tools Local area Network Windows 2003 Task Manager Windows 2003 LAN/MAN Microsoft TCP/IP services Microsoft Direct X 9/10 Microsoft . We have found a lot of errors in term of project model that were the useful stuff for our project future scope. Architectural design metrics Architectural design metrics provided information on the ease or difficulty associated with integration testing.5 Testing tools and environment We considered many tools for testing but the environment is only one in term of coverage area and operating system. Sir Syed University of Engineering & Technology 74 .

This system has some recommendation at this time of deployment but in future it can deal us in some specialized manner. VPN provide large area coverage so it will become a wide area network application. Wireless environment has some recommendations like AOC (area of coverage) and security issues. Sir Syed University of Engineering & Technology 75 . Every one want to become co-operate in term of information sharing. You must define your domain of communication in term of coverage area. You may deploy your encryption and decryption tool for threat less communication. Totally it is all about the hardware and the deployment environment because you will just change your hardware in term of wireless environment and configure it by mean of Addressing. This is today’s market oriented product in term of wired medium or small cooperative business environment. Some special tool will be use to improve Ad-hoc communication. Every application will be totally independent to each other. There is simple application interfacing by mean of self database server for autonomous navigation of system. Later on it will easily convert into following technologies: Wireless Environment: If you are going to move over the wireless environment then you have to consider some terminologies. VPN boost multimedia communication over the large area. According to the future enhancement of this project. We will convert to Ad-hoc environment by the wi-fi enable communication device. This device has some specification and configuration in different direction but it is very smart in special environment. VPN Environment: Virtual private network is the most handsome future plan for this system. we will able to deploy it over the access pointless environment (Ad-hoc).Chapter 9 Recommendations Future Enhancements and 9 Future Enhancements and recommendations Future Enhancements and recommendation is fully observable during entire project scheduling. Ad-Hoc Environment: Now a day. there are so many researches over the Ad-hoc environment.

Some technical skill is about the development area of new generation languages would be considered in this project development life cycle. we have discovered a lot of background theory about the multimedia streaming. market and education point of view. Director. A key characteristic of both the commercial products and research demonstrators is the diversity in technological infrastructure. According to this project. We introduced central access point for multimedia streaming by mean of security. Teacher can communicate with respect to quick and noiseless environment. we fulfilled extra ordinary work in term of multimedia streaming.Chapter 10 Conclusion 10 Conclusion Streaming multimedia extensions across networks is an effort that is attracting many participants. This system is the powerful tool in cooperative environment because every industrial pool is converging over team work. According to the new generation technology. Sir Syed University of Engineering & Technology 76 . Team leader. We found some critical issues about the network programming because it is difficult to implement it in different devices. There is one multimedia server that control his multimedia clients with respect to security because your multimedia extension is very secure and you don’t want to shared it softcopy with other people but you want stream it for business. This is evidenced by the eight primary commercial and thirteen research organizations involved with this technology in various ways. This project provided a secure communication of information which is deals by one server powered by Database server.

Project Schedule JAN FEB MAR APR MAY JUN JUL AGU SEP OCT NOV DEC Analysis Phase Design Phase Implementation Phase Testing and deploy Phase Overall project timeline Sir Syed University of Engineering & Technology 77 .Appendices H. APPENDICES Project Timeline chart i.

Appendices Work load distribution Working Months January Muhammad Yasir Collect information about streaming Analyze over all project flow Define project domain Design overall project control Design GUI (MultiMedia Server) Testing previous applications AD and SSL programming Implement SQL server 2000 interface clock Integrate sub classes with interface Apply final GUI Multimedia Server Muhammad Tariq Study LAN environment LAN 802.3 standard (Ethernet) Use case Configure Active Directory Services Design GUI (MultiMedia Client) Develop class diagrams Video streaming Class Design table attributes Shahzad Akhtar Study Premade Application Muhammad Kazim Analyze project scope February March April Use cases Implement DHCP server Develop LAN environment Define Client requirements Apply rules for DNS May June July August Design overall network setting Develop class Configure diagram network Audio streaming class Design relation ship b/w tables Introduce 3rd part software Design flow of tables Design a timing procedure MultiMedia Client Testing Integrating 3rd party software Report modeling September October November December Design remote Design streaming shared file class Apply final Implement GUI live MultiMedia presentation Client streaming Use network Real time Real time programming Voice Video for application Streaming Streaming Final testing Report Testing Overall project modeling project MultiMedia Client Work Load Distribution Table Sir Syed University of Engineering & Technology 78 .

Appendices ii. Snap shots of deployed system Multimedia Server Snap # 1 Sir Syed University of Engineering & Technology 79 .

Appendices Multimedia Server Snap # 2 Sir Syed University of Engineering & Technology 80 .

Appendices Multimedia Server Snap # 3 Sir Syed University of Engineering & Technology 81 .

Appendices Multimedia Server Snap # 4 Sir Syed University of Engineering & Technology 82 .

Appendices Multimedia Server Snap # 5 Sir Syed University of Engineering & Technology 83 .

Appendices MultiMedia Client Snap # 1 Sir Syed University of Engineering & Technology 84 .

Appendices MultiMedia Client Snap # 2 Sir Syed University of Engineering & Technology 85 .

Appendices MultiMedia Client Snap # 3 Sir Syed University of Engineering & Technology 86 .

(2003)..codebeach.. Retrieved from www on 02/11/2005. www.microsoft...Reference REFERENCE [1] Jackson M. www. CA 94720 [3] Rowe L. U.asp [8] Code Beach Research.Net [10] SQL Server 2000 Microsoft Press. [2] Mayer-Patel K. Soda Hall. Computer Science Division. (submitted for publication). and Rowe L. [4] Microsoft Learning & Research.csharpcorner. (1999). www. CA..asp?tabID=2& categoryID=15&subcategoryID=7 [9] Complete Reference C# . Retrieved from the World Wide Web on 02/10/2005. Retrieved from www on 02/03/2005. November 1994. and Rowe L. "Berkeley CMT Media Toolkit API" . Simpson D. A. Retrieved from the World Wide Web on 02/16/2005.mspx [6] Remote Service Research.com/windowsserver 2003/techinfo/overview/termserv.rdesktop.org [7] C# Corner Research.microsoft. Berkeley.asp [5] Microsoft Learning & Research. Baldeschwieler J. A.U. H. "Synchronized Continuous Media Playback Through the World Wide Web" . San Francisco.com/windows2000/ Technologies/ terminal/default. E. Wu D. (2003). (2000).C.com/index..com/Network/NetworkProgramPart2RVS. (2001). Sir Syed University of Engineering & Technology 87 . C. Berkeley. Multipoint Workshop held in conjunction with ACM Multimedia 1994. A.www. www. "Continuous Media Applications". Berkeley. Retrieved from www on 02/17/2005.

Real time voice The real time voice is directly streamed by mean capturing. GLOSSARY Multimedia It is the collection of meaningful and attractive information. In the half duplex mode. Ethernet 802. Streaming It's called "streaming" because the video. Animation.3 Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802..sound and picture data flow in a digital stream from a server computer to your computer. Voice. In the Ethernet standard. It comes to you in a stream of digital bits. Multimedia extension Visualized information files. Half duplex mode: It works one operation either send or receive. ready to hear or view in real time.Glossary I. without having to download all of the content before you can enjoy it. Text) etc. Full-duplex mode Simultaneously (stream and get-stream) multimedia extension Sir Syed University of Engineering & Technology 88 . hence the term "streaming. there are two modes of operation: half-duplex and full-duplex modes. Like (Video. Real time video The real time video is directly streamed after span of time by mean capturing. data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a medium.3.. Multimedia server It is the server that stream multimedia extensions. Picture. Multimedia client It is the workstation or member server that gets on-stream data." Remote streaming It is the transfer of files over the LAN environment. Audio.

and integration with a wide variety of programming languages. VaxExtended Tool Third party tool.NET.Glossary Network Traffic Impact Increase in large files large bandwidth required fixed time of transmission Microsoft DHCP Server Dynamic host configuration protocol Microsoft ADO. developers gain access to more powerful components.Net frame work The .NET Framework class library. Microsoft Direct X Microsoft tool.NET.NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. . C# applications to easily query for and manipulate directory service objects System Development Life Cycle it is the basic model used in project development. simplified development and deployment. and Windows Forms. Sir Syed University of Engineering & Technology 89 .NET. Active Directory Services Interfaces Active Directory Service Interfaces (ADSI) enables systems administrators and developers of scripts or C/C++. Loc Lines of code. which includes ADO. AOC (area of coverage) It is the overall domain of the network. It is the Active X control.NET Framework provides a managed execution environment.NET Framework are the common language runtime and the . such as the Dataset class and a strongly typed programming model that provides IntelliSense and statement completion for data access code.Net With ADO. It is the real time voice streaming class. The key components of the . support for multimedia files performance. The . ASP.

Sign up to vote on this title
UsefulNot useful