This action might not be possible to undo. Are you sure you want to continue?
MULTIMEDIA CASTING OVER LAN
B.S. Computer Engineering, Batch 2002
Mahjabeen Tahir Lecturer SSUET
Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100
DEPARTMENT OF COMPUTER ENGINEERING Sir Syed University of Engineering and Technology University Road, Karachi – 75300 January 2006
According to this report, we are going to spread a new style of streaming which will handle you in many dimensions of the communication. In term of communication, we have different bridges but there is more powerful bridge of communication like computer networks. This report is all about the information streaming over the computer networks. There is much information in the world which is easily understood by the target user. This information has the flavor of multimedia extensions which look very well with respect to target eyes. When these type of extensions come over the computer network so generate the maximum response with in communication. Multimedia is the extension of meaningful communication with respect to sender and receiver ends. Video, Audio, Visual presentations are the basic blocks of today’s and forthcoming communication. Multimedia information precise your information in very attractive and meaningful style. Multimedia streaming is the powerful bridge of communication which is doing best by computer networks. Everybody in the world wants to say attractive body and verbal language but multimedia streaming gives you attractive communication language. When we are going to communicate, we should have any medium of communication but according to this report, we are exploring the computer networks types in term of medium size of industrial pool. Computer networks join together for the near and Tele-communication phenomenon. If you have the computer network, you want to share information with attractive and meaningful styles. LAN is most powerful and high through put bridge of communication which describe you the information through multimedia casting. The only prerequisite things for this are to find some knowledge about the multimedia streaming over the computer networks. There are many hidden truth in the multimedia world because everybody is moving to attractive and meaningful communication with respect to smart machine throughput.
First of all we would like to thank Vital Force only ALLAH for blessing us with the mental and physical abilities with the help of which we were successfully able to go through this project and bring it to the final stages of completion.
We would like to thank our teacher Ms. Mahjabeen Tahir who guided us through out in every difficulty and provided us with the best solutions of problems through her professional approach and experience.
com Muhammad Tariq 2002-CE-106 Programming + Research + UML + Report + Database Management Immediate Contact: 0300 2716858.com 2002-CE-100 . Email: email@example.com Shahzad Aakhter 2002-CE-082 Programming + Network configuration + Report Immediate Contact: 021 6631529.INTRODUCTION TO GROUP MEMBERS Muhammad Yasir siddiqui 2002-CE-075 Network Programming + Research + Overall integration of project Immediate Contact: 0333 2109785.com.com Muhammad Kazim Network Configuring + Research + Report integration Immediate Contact: 0321 2091481. Email: shah_ce082@hotmail. Email: specialist106@hotmail. specialist106@yahoo. Email: be_yasir@hotmail.
CERTIFICATE OF COMPLETION This is to certify that the following students Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100 have successfully completed their final year project named MULTIMEDIA CASTING OVER LAN in the partial fulfillment of the Degree of Bachelor of Science in Computer Engineering. MAHJABEEN TAHIR Assistant Professor SSUET .
Dr.CERTIFICATE OF COMPLETION This is to certify that the following students Muhammad Yasir Siddiqui Muhammad Tariq Shahzad Akhtar Muhammad Kazim 2002-CE-075 2002-CE-106 2002-CE-082 2002-CE-100 have successfully completed their final year project named MULTIMEDIA CASTING OVER LAN in the partial fulfillment of the Degree of Bachelor of Science in Computer Engineering. Imran Ali Tasadduq Chairman Computer Engineering Department SSUET .
1.1.3 Specials usage considerations 2.1.2 Hardware Interface 2.3.3 188.8.131.52.7 184.108.40.206 2.CONTENTS Chapter 1 Introduction 1.3.1 System Architecture 3.2 System statement of scope 1.5 Deployment Interface Chapter 3 Functional & Data Description 3.2.4 Theoretical Background of project 1.8 Administrator Managing Director Employee Teacher/Instructor Student Team Leader Stock Exchange Manager Stock Exchange Employee 2.1.1 Architecture model 3.2 System Level Data Mode 3.3 Software Interface 2.2.4 Communication Interface 2.2 Data Description 3.4 2.3 System context 1.2 External System Interface .1.1 User Interface 2.1.2 Modules overview 3.3 System Interface Description 220.127.116.11 2.5 Technology & Tools used in the project Chapter 2 Usage scenario / User Interaction 2.1.5 2.1 2.2 Use-cases 2.1 Goal & Objective 1.1 Major Data Objects/Signal Specification 3.1 External Machine Interface 3.1 User profile 2.1.
3 8.1 8.1 Historical data used for estimates 18.104.22.168 States 5.2.3 Algorithmic/protocol model 4.1 Subsystem scope 4.4 Test Metrics .1.4 Prototyping requirements Chapter 7 System Estimates and Actual Outcome 22.214.171.124 Testing Resources and Staffing 8.2 Subsystem flow diagram/ desired UML diagram 4.2.2 8.1 Description for system behavior 5.2 State Transition Diagrams 5.4 Restrictions/limitations 4.4 System Resources 7.Chapter 4 Subsystem/Module Description 4.1 System Resources Required 7.2 Testing strategy 8.3 Special performance issues 126.96.36.199 System Resources Used Chapter 8 Test Plan 8.4 Unit Testing Integration Testing Validation Testing High-Order Testing 8.3 Actual Results and Deviation from Estimates 7.1 Events/interrupts 5.1 System Test and Procedure 8.2 Estimate For Technique 7.3 Control specification Chapter 6 System Prototype Modeling and Simulation Results 188.8.131.52.1 Description of system modeling approach 6.2 Estimation techniques applied and results 7.1 Description for Subsystem ‘n’ 184.108.40.206.5 Performance issues Chapter 5 Behavioral Model and Description 5.1 Estimation Technique 7.2 Simulation results 6.
8.1 Wireless Environment 9.4.6 Test Record Keeping and Test Log Chapter 9 Future Enhancements and Recommendations 9.2 Ad-Hoc Environment 9.1 Architectural Design Metrics 8.5 Testing Tools and Environment 8.3 VPN Environment Chapter10 Conclusion / Summary .
By raising media war. education and commercially we want to get some information in better style rather than hunky panky style.SYNOPSIS In addition to being a gigantic. Now a day there is high efficiency and maximum throughput over Ethernet standards. sound. we are seeing improvement in every communication. In the world of computer networks. LAN is the high bandwidth . text. Computer network provide you global services of information sharing either it is about academic information. Yes every department of life want to get processing by electronically. educationally and informational casting which build you in your desire industrial pool. There are many standards of computer network in term of LAN and WAN but we are considering LAN Ethernet standard for medium and small environment. Where ever you are. Everybody in the world wants to present him/her in powerful communication style. By using multimedia casting you can interact through smart way to the people. Multimedia is the collection of attractive and meaningful extensions. there are much attractive and meaningful information over the any medium of communication. you always want to like stay in better environment but It can give you better present style of your information. Multimedia communication is the master piece of information spreading phenomenon. making some one to understand you in attractive meaningful style because you may the managing director or country manager. In every department of daily life. Information are getting reduction in size but getting increment in communication style. Multimedia is the bandwidth of data when it is traveling over the network. you have the powerful communication way to present yourself stylish. we want to share information in attractive and meaningful style. offices information. and animation extensions. current events information and commercial information. the computer network is the world’s biggest library. commercial. images. Multimedia is collection of video. Of course. Now today computer networks are strongly use for communication either this is for near or far in distance. According to heavy communication we are first considering LAN environment for get Quality of services. Offices. There are documentary. meaningful and entertainment. Of course you can communicate with these extensions over the network. There is information available on every conceivable topic.
medium of the network communication due to its configuration. Animation. Audio. Multimedia Casting over LAN provides you streaming of multimedia extensions. you can communicate through multimedia extension which define your communication language very attractive able and meaningful. According to this project. Visual Text etc. . Pictures. it is very reliable. By raising heavy communication extension. This project provide you a co-operative medium of communication by using multimedia extensions like Video. available and intractable tool for high bandwidth of data streaming. LAN has the capability of streaming multimedia with respect to quality of services.
In addition of the attractive, meaningful and quality of communication, there is most descent and powerful extensions for desire and quality communication. Yes we have the multimedia extensions pool to get highly attractive and meaningful style. When ever these types of extensions come over the communication medium it means you can spread your messages in very excellent communication language. Quality of communication is the part of marketing, advertising and business point of view. Whenever you are communicating over the computer networks, you should apply attractive communication language otherwise your delivered information can sink by the network traffic. Multimedia is collection of video, sound, images, text, and animation extensions. These types of extensions give you very attractive and stylish quality of communication. By raising media war, everybody wants to on-air himself by gigantic and attractive communication. In this project, multimedia extensions are the acid of communication over the computer network. We can stream video, audio in term of live as well stream real time video and voice to the listener. We can also provide live presentation of the reports and documents. Multimedia extensions enable you to spread all information over the computer network. Every communication has the medium. According to this project we adopt computer network for the communication bridge and deploy it in very secure manner. Now a day’s computer network provides different security but according this project we produced basic security in term of authorization and authentication. According to this project, authorization is term of rights which is related to server side and authentication is term to access rights by right hands. Database server is in action for maintaining access control profile. Database server provided security over the application level but in IP level we used secure socket layer (SSL) and Domain name system (DNS). Operating system has the major role to apply extra valuable services in term of network protocol, database and securities.
Sir Syed University of Engineering & Technology
1.1 Goals and objectives
According to this project objective, we have to provide a vital communication over the local area network. In term of communication information we have to on-stream attractive and meaningful information which describe quality of communication language. On-stream information has to give excellent view to the target user. Either target users belong to company or education or commercial, they should want good looking information for interaction. Multimedia extensions have the attractive and meaningful style. Every communication language surround by these extensions. Multimedia extensions should have minimum resources but have stylish presentation over the any communication medium. The most crucial objective of this project is that apply the any communication language with minimum resources. Communication medium has to more reliable and available with respect to target users. According to this project, we have to develop a secure and errorless network for heavy communication extensions. This network has to follow security in term of authentication and authorization. Network has to without any virus or threat. The carriers (protocols) of information have to more reliable and errorless over the bulky communication. According to project goal, there are some major terms related to on-stream information and the on-communication medium. On-stream information has to travel over the medium with out any tolerance and delay. Information will not loose required bandwidth and frame rate with respect to multimedia extensions. Multimedia extensions should have the same quality rate to the target user. Quality of service will be considered over the on-stream information by using some medium statistics and calculations. Local area network will use as a communication medium, to apply maximum throughput over the on-stream information. Ethernet is the tool in term of local area network management. This network standard will handle the security and performance issues during communication. Ethernet will provide operating system services in term of performance, integration and supervision.
Sir Syed University of Engineering & Technology
1.2 System statement of scope
System scope will explore in different flavor with respect to input, processing and outputs. This project is quit looking different with respect to its requirement. This project will allows you to gather multiple of information with respect to scope.
Medium of communication is the input and process unit for performing different functionality in term of project life cycle. Communication medium shows like local area network with respect to security and quality purpose. Communication medium is the tool to stream information to the desire target.
This is the processing over the transmission medium addressing. This project will deal heaving transmission of information that needs some extra-ordinary operation during streaming. Address/IP naming is operating addressing of on-stream information. There is not static IP addressing due to heavy streaming. According to handle quality of streaming, we will refresh destination addresses and put special addresses for specific clients. This will help us for security purpose with respect to authorization and authentication.
Multimedia extensions are the major inputs of the project life cycle. In multimedia we have several extensions of information for communicating in right and desire way. Multimedia extensions are the on-stream extensions which have to operate in both end of Communication Bridge. These are the inputs as well as the outputs in different scenarios. Multimedia extensions are the block of on-stream information which will deal by the project processing unit.
Project processing unit has some sub units which will take their own functional department. The real functionality of this project is to stream multimedia extension over the local area network in term of quality factor. There are many sub system for processing like authorization, authentication, streaming, controlling and measuring. Process unit can be the embedded form of different units which interconnect and communicate to each other with respect to the requirement.
Sir Syed University of Engineering & Technology
1. Client or End User According to this project. This system will give the attractive and good looking of advertisement for getting full response of target user. In this project quality measurement is operated by the process unit and applies other tool for getting desire and actual stream of information. reliability and integrity with respect to domain and market scope. market. They are very accurate and update by using the presentation of desire goal of team management. According to co-operative point of view. This project will deal communication between the persons by suitable medium. According to education point of view. According to business point of view. According to market point of view. commercial and product domain scope. system has attractive extensions that up the market presentation in stylish manner. Sir Syed University of Engineering & Technology 4 . system creates a handsome and noiseless environment for teacher and student. You may market your product or anything by showing its all benefit by using attractive presentation.Chapter 1 Introduction Quality of Streaming This is the major output of this project with respect to get quality of on-stream information. This system has better scope. system will give the quality of interaction between the company employees. Teacher will concentrate to his/her lecture rather than to control student at the front of white board. Output should be in acceptable skeleton according to project life cycle.3 System Context According to system context view. we have big picture with respect to business. Student will completely converge him/her self over the lecture. we are considering the advertisement behavior by this system. availability. Client will behave as a technical and co-operative employee of any industrial pool rather than a user will behave as a commercial and entertainment. client/end user is the most important part in term of project life cycle. This system is classified into many places of departments.
There are so many terminologies in this project in term of research and learning point of view like. The idea of streaming video over the network has been gaining a lot of interest. Audio streaming is becoming widely accepted and deployed. In particular. evolving standards and techniques and the internet transport protocols being deployed. Ideally. unacceptable transfer times and playback latency. The current Internet is a best effort network and interconnects sites with widely varying bandwidth capabililties. they are still nowhere near typical computer-sound quality. We then review the currently available commercial products which purport to provide video streaming capabilities over the Internet and out line their current limitations. its been very easy to download and play back high-quality multimedia files (Video. there are so many white papers and research behind its development. In addition. The client plays the incoming multimedia stream in real time as the data is received. This project has solid background with respect to history because there are so many applications are behaving like it. However. In this report firstly we present a brief review of the current video compression standards. Progressive Networks' RealAudio has a wide following. plugins and firewall penetration are discussed. video and audio should be streamed across the Internet from the server to the client in response to a client request for a Web page containing embedded videos. issues such as the need for servers.Animation etc) from the Internet. Therefore it will remain a very heterogeneous network. In the future the Internet will see the rollout of ATM. RSVP with the ability to control Quality of Services (QoS) and mobile networks with widely varying QoS. which are attempting to solve some of these limitations. Although streaming audio programs are considerably further along than video.Audio. Then we describe the major research projects currently underway.Chapter 1 Introduction 1. According to this project.Pictures. full file transfer means very long. There are many commerical streaming video products becoming available as well as many research projects in this area. Finally we compare and evaluate the SuperNOVA project with respect to other research projects and the cur rent commercial products. First we have Sir Syed University of Engineering & Technology 5 .4 Theoretical Background For a long time now. In this project we have covered a powerful application system over the network. Current web browsers and servers support full-file transfer mode of document retrieval.
Either you related to business. marketing and education environment you have to communicate in meaningful and attractive manner otherwise your target person ignore you. Local Area Network Multimedia casting over LAN Switch Multimedia receiver Clients Multimedia casting over LAN Figure 1. By raising media war. Now a day there are so many improvements in communication language by mean of multimedia extensions.Chapter 1 Introduction introduced multimedia extensions in this project. Sir Syed University of Engineering & Technology 6 . Multimedia extension provide stylish and good looking preview for its listener or target user. everybody wants to communicate in stylish and attractive manner. we have improved communication language by mean meaningful communication.1 Multimedia Casting Server By using multimedia extension. Multimedia is collection of meaningful and attractive data/information.4.
we have collected information of multimedia streaming in many applications like Windows Net Meeting 3. It is easy to interface. ready to hear or view in real time. voice. According to this project we have consider LAN (Local Area Network) environment for Communication Bridge. hence the term "streaming. Streaming multimedia extensions across networks is an effort that is attracting many participants. without having to download all of the content before you can enjoy it. protocols. Multimedia is the heavy and consumes space extension because it is so visualized and attractive. LAN is single administrator environment with the range of 1 Km it may exceed upon specific conditions. The every network environment derived from the LAN because it is the basic environment of computer network. instead of having to wait for it. these extension are the basic block of today’s communication. animation."This is evidenced by the eight primary commercial and thirteen research organisations involved with this technology in various ways. According to theoretical background. It comes to you in a stream of digital bits. pictures and text etc. Multimedia streaming very accurate in LAN environment because there is no lost of data/ information due to high data rate and bandwidth. In the majority of cases streaming media is used to maintain control over the Sir Syed University of Engineering & Technology 7 . compression standards supported. configure and support. It stream over heavy bandwidth that’s why we considered LAN environment that provided desire area of bandwidth. We considered Ethernet standard for multimedia streaming because of its high data rate and bandwidth.. LAN environment is very reliable and available for heavy transfer rate over computer network. sound. Streaming media technology allows you to see or hear the content in just a few seconds. It's called "streaming" because the sound and picture data flow in a digital stream from a server computer to your computer. Multimedia files can be very large. networks.g. You would spend many minutes or even hours waiting for them to be downloaded to your computer if they weren't streamed..0. Your only wait is a few seconds for a "buffer" to be built up that helps avoid interruptions caused by Internet traffic problems. A key characteristic of both the commercial products and research demonstrators is the diversity in technological infrastructure e.Chapter 1 Introduction Multimedia is collection of video. Computer network is the largest environment in this world.
By using central multimedia server. Multimedia clients really dependent on the multimedia server that make it cooperative with his/her team leader. You will stream that type of information that you want to send to your target user. we covered many multimedia extensions for streaming. They all operations conducted by multimedia server for organizing a better communication environment by mean of security. There is central multimedia server that controls his multimedia client according to his/her privilege. Video Streaming Audio Streaming Real Time Voice Streaming Real Time Video Streaming Live Presentation Streaming Remote Streaming Secure Shared Files Streaming Table 1. This project provided Qos (Quality of Services) in term of on-stream data because there are some critical issues about on-stream data quality. This project is supported following streaming. Director and Teacher etc. we have streamed informative information to different multimedia client and obviously they would concentrate at the on-streamed information. This application is very cooperative in such type of environment where some secure multimedia streaming required.Chapter 1 Introduction distribution of the media files (because it is difficult to capture streaming video and audio). Every on-streamed data is provided by multimedia server by mean of secure streaming. There is no application available in front of it by mean of these types of services. CEO. Multimedia clients restrict over one central multimedia server. According to this project. Sir Syed University of Engineering & Technology 8 .4. Video and audio is the major on-stream extensions but there is live presentation of documents as well remote streaming of files. There are so many applications available for streaming but there is some problem when you are streaming at cooperative environment. This project is the powerful tool in cooperative environment by mean of security.1 According to this project. we considered many history applications about multimedia streaming that’s why we found a new look and style of multimedia communication.
4. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. Technology and tool emphasis into network and software which are describe below. This restriction reduces the efficiency drastically for high-rate transmission. data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a shared medium. The main disadvantages of the half-duplex are the efficiency and distance limitation. 7 1 2 or 6 2 or 6 Preamble Destination Source address Start of frame delimiter address Length of data field Table 1. we have used different technology and tool/hardware with respect to project management. Therefore.5 Technology & Tools/hardware components According to this project.Chapter 1 Introduction 1. LAN Standard 802.3. in which the link distance is limited by the minimum MAC frame size. Like in 802. development tool. there are two modes of operation: half-duplex and full-duplex modes.3 Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802. configuring tool and third party software. In the Ethernet standard. application tool.2 2 0-1500 Data 0-46 4 Pad Checksum Sir Syed University of Engineering & Technology 9 . Technology embedded in to many environment either it belong to operating system.3 header. In the half duplex mode.
3 Microsoft Windows 2003 Server Windows Server 2003 operating systems take the best of Windows 2000 Server technology and make it easier to deploy. The physical medium used to carry Ethernet signals between computers. server. Backup required Fixed time of transmission Conferencing 1.Chapter 1 Introduction LAN Environment Figure 1. Windows Server 2003 operating systems ship with Windows Server Service Pack 1 (SP1).5-4 Class of service Whiteboard Mbps required High volume of data Ethernet Standards Table 1. Windows Server 2003 is a Sir Syed University of Engineering & Technology 10 . low latency Higher bandwidth desktop. server. An Ethernet frame that consists of a standardized set of bits used to carry data over the system. backbone. backbone Higher bandwidth desktop. A set of medium access control rules embedded in each Ethernet interface that allow multiple computers to fairly arbitrate access to the shared Ethernet channel. Windows Server 2003 SP1 provides enhanced security.2 1. low latency Higher bandwidth desktop. 2. increased reliability. and scalability. Increase in large files Intranet Video Large bandwidth Extranet 1-100 required MB Low latency necessary Data TB Increase in large files Warehousing Large bandwidth Net. manage. such as security. Application Scientific Modeling Data Type/ Size GB Network Traffic Impact Network Requirements Higher bandwidth desktop. reliability. The result: a highly productive infrastructure that helps makes your network a strategic asset for your organization. low latency Increase in large files Large bandwidth required Publications 100s of Increase in large files Imaging MB Large bandwidth required Internet Audio. backbone. server. availability. and use. backbone Higher bandwidth desktop. and a simplified administration to help enterprise customers across all industries. backbone. 3. Windows Server 2003 includes all the functionality customers need today from a Windows Server operating system to do more with less.4. server. server.4.
Streaming media server. public key infrastructure (PKI) deployment. Learn about the many new features and technologies that make Windows Server 2003 an ideal server platform for organizations of any size. depending on your needs. white pages or yellow pages access. Security.Chapter 1 Introduction multipurpose operating system capable of handling a diverse set of server roles. • • • • • • • • • • Availability Scalability. Mail server. The common language runtime Active Directory Management services Storage management Networking and communications Windows Media Services Microsoft Active Directory Service Originally inspired by the emergence of LDAP-based solutions in the mid-1990s. Remote access and virtual private network (VPN) server. Terminal server.4 Windows Server 2003 contains core technologies that build on the strengths of Windows 2000 Server to deliver a superior and cost-effective server operating system. extranet or Web single sign on (SSO) capabilities. Windows 2003 Services Table 1. Dynamic Host Configuration Protocol (DHCP) server. and line-of-business applications.4. Domain Name System (DNS). Directory services. in either a centralized or distributed fashion. and Windows Internet Naming Service (WINS). Windows 2003 has a lot of supreme tools for business and communication environment but we found some of them for this project management. Web server and Web application services. organizations have had success in deploying directory-enabled business solutions for key problems such as network operating system (NOS) user support. File and print server. Sir Syed University of Engineering & Technology 11 .
An application owner can easily deploy directory-enabled applications without affecting the directory schema for the entire organization. or operational costs that can be incurred by the installation of an additional directory technology to support directory-enabled applications. any application that is deployed using ADAM can authenticate access against Active Directory across the enterprise. You can use Active Directory Application Mode effectively in the following scenarios: Application-specific directory scenarios Application developer scenarios Extranet access management (EAM) scenarios Migration scenarios Developers. Because Active Directory Application Mode is integrated with the Windows security model. Active Directory Application Mode is a new capability in Active Directory that addresses certain deployment scenarios that are related to directoryenabled applications. reinstall. additional licensing. maintains flexibility. ADAM runs as a non-operating-system service. and helps organizations avoid increased infrastructure costs. scalability. This allows rapid restoration to a clean state during the application prototyping and development process.Chapter 1 Introduction Active Directory Application Mode achieves this goal without the burden of expensive training. and each instance can be configured independently. You can easily install. making it the ideal directory service to deploy with an application. Applications that use Active Directory Application Mode have the same reliability. while continuing to use the identity information and credentials that are stored in the organization’s NOS directory. and Sir Syed University of Engineering & Technology 12 . or remove the ADAM application directory. as such. and. Active Directory Application Mode represents a breakthrough in directory services technology that overcomes the previously mentioned obstacles. it does not require deployment on a domain controller. end users. and ISVs can easily deploy Active Directory Application Mode as a lightweight directory service on most Windows Server 2003 platforms and on Windows XP Professional. Active Directory Application Mode is easily installed or uninstalled on developer workstations. Running as a non-operatingsystem service means that multiple instances of ADAM can run concurrently on a single server.
4. while preserving investments that you’ve made in administrator training. and. ISVs. licensing. and rogue DHCP server detection.3 With Active Directory Application Mode. This includes integration of DHCP with domain name system (DNS). without having to face the increased costs associated with deploying multiple technologies for both an NOS directory and an application directory. security. new vendor-specific options and user-class support. and developers can use Active Directory in multiple roles. Also Sir Syed University of Engineering & Technology 13 . most importantly. operations. Figure 1. for the first time you can employ a single directory technology in multiple roles. Microsoft DHCP Server The Microsoft Windows 2000 Server network operating system includes an enhanced implementation of Dynamic Host Configuration Protocol (DHCP).Chapter 1 Introduction performance that they have with deployments of Active Directory in the NOS environment. enhanced monitoring and statistical reporting for DHCP servers. Organizations. multicast address allocation.
and address of DNS servers. was an early advocate for having dynamic IP addressing technology and worked closely with other IETF members to create the DHCP solution. industry standard that reduces the complexity of administering networks based on TCP/IP. This lets all available IP addresses be stored in a central database along with associated configuration information. Sir Syed University of Engineering & Technology 14 . supporting Requests for Comments (RFCs) 2131 and 2132. However. DHCP frees network administrators from having to configure all of the computers by hand. a part of Windows 2000 Advanced Server. as a member of the Internet Engineering Task Force (IETF). TCP/IP is the global network protocol of choice. as well as change settings while the host is attached. DHCP is open and standards-based. Each host computer connected to a TCP/IP network must be assigned a unique IP address. an open.4.Chapter 1 Introduction included is a discussion of Windows Clustering. configuring and administering TCP/IP network clients have traditionally been time-consuming and costly. DHCP can automatically configure a host while it is booting on a TCP/IP network. as defined by IETF Requests for Comments (RFCs) 2131 and 2132. DHCP for Windows 2000 is open and based on industry standards. especially for corporate intranets adopting Internet technology. gateways. such as the subnet mask. Figure 1.4 The Microsoft® Windows® 2000 Server network operating system builds on the longstanding Microsoft support for Dynamic Host Configuration Protocol (DHCP). This is why Microsoft.
maintenance and administration. and it is difficult to get a view of all client configurations. Microsoft . enriching data and building complex business analytics with Analysis Services. SQL Profiler. and apply these patterns to business operations with an easy-to-use. Without dynamic address assignment. the greater the benefit. and gain competitive advantage through a holistic view of your business.Net Frame Work The . SQL Server 2005 provides many new and enhanced business intelligence (BI) features designed to give you a competitive advantage. IP addresses must be managed to avoid duplicate use. Explore data. Data Transformation Services and Books Online. Gain an integrated view of all your business data as the foundation for your traditional reporting. Review the following product and technical resources and other information designed to help you improve BI in your organization. The . extensible. Microsoft SQL Server 2000 Microsoft SQL Server 2000 is a full-featured relational database management system (RDBMS) that offers a variety of administrative tools to ease the burdens of database development.Chapter 1 Introduction DHCP makes life easier for network administrators. and the larger the network. Deliver the information employees need to make better business decisions—in virtually any business environment. we'll cover six of the more frequently used tools: Enterprise Manager. Changes must be applied to clients by hand. and delivering rich reports with Reporting Services. and writing. In this article.NET Framework is designed to fulfill the following objectives: Sir Syed University of Engineering & Technology 15 . scorecards. Query Analyzer. managing. and flexible platform. Configuration information is not centralized. and data mining. clients have to be configured one by one. These advantages include integrating multiple data sources with Integration Services. accessible. OLAP analysis. Easily integrate data from a wide range of operational and enterprise data sources. Service Manager.NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet. discover patterns.
NET Framework class library. providing core services such as memory management. object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP.NET.NET Framework. In fact. including code created by an unknown or semi-trusted third party. The common language runtime is the foundation of the . thereby creating a software environment that can exploit both managed and unmanaged features. such as Web Forms and XML Web services.NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code. thread management. To make the developer experience consistent across widely varying types of applications. The .NET Framework has two main components: the common language runtime and the . executed locally but Internet-distributed. such as Windows-based applications and Web-based applications.Chapter 1 Introduction • To provide a consistent object-oriented programming environment whether object code is stored and executed locally. • • • • • To provide a code-execution environment that minimizes software deployment and versioning conflicts. and remoting. Sir Syed University of Engineering & Technology 16 . is a comprehensive. the concept of code management is a fundamental principle of the runtime.NET Framework.NET Framework not only provides several runtime hosts. The class library. To build all communication on industry standards to ensure that code based on the . while code that does not target the runtime is known as unmanaged code. The . To provide a code-execution environment that guarantees safe execution of code. Code that targets the runtime is known as managed code. but also supports the development of third-party runtime hosts. To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. You can think of the runtime as an agent that manages code at execution time. or executed remotely.NET Framework can integrate with any other code. The . the other main component of the . while also enforcing strict type safety and other forms of code accuracy that ensure security and robustness.
Internet Explorer is an example of an unmanaged application that hosts the runtime (in the form of a MIME type extension). Using Internet Explorer to host the runtime enables you to embed managed components or Windows Forms controls in HTML documents. Hosting the runtime in this way makes managed mobile code (similar to Microsoft® ActiveX® controls) possible, but with significant improvements that only managed code can offer, such as semi-trusted execution and secure isolated file storage.
Figure 1.4.5 The .NET Framework class library is a collection of reusable types that tightly integrate with the common language runtime. The class library is object oriented, providing types from which your own managed code can derive functionality. This not only makes the .NET Framework types easy to use, but also reduces the time associated with learning new features of the .NET Framework. In addition, third-party components can integrate seamlessly with classes in the .NET Framework. • Console applications.
Sir Syed University of Engineering & Technology
• • • •
Windows GUI applications (Windows Forms). ASP.NET applications. XML Web services. Windows services.
Microsoft Visual C#
Visual C# .NET 2003 is the comprehensive toolset for creating XML Web services and Microsoft .NET—connected applications for Microsoft Windows® and the Web. This robust development package, which uses the component-oriented C# development language, offers beginning and intermediate developers with C++ or Java experience a modern language and environment for creating next-generation software. Visual C# 2003 delivers superior functionality for streamlining business processes, including: • • • • Rapid design, development, and deployment support for creating and consuming Web services. Form designers and visual controls for creating rich Windows-based applications. Authoring tools and services for building powerful Microsoft .NET server-based solutions. Migration tools for converting Java-based projects to the Microsoft .NET development environment. With Visual C# .NET 2003, developers can build solutions for the broadest range of clients, including Windows, the Web, and mobile or embedded devices. Using this elegant programming language and tool, developers can leverage their existing C++ and Java-language skills and knowledge to be successful in the .NET environment. Visual C# .NET 2003 includes a powerful remote and multi-language debugger, enabling developers to test applications and build reliable multi-tier solutions that span process boundaries and are written in multiple programming languages. Note: Remote debugging is available only in Visual Studio .NET Professional Edition and higher. Employ "unsafe" code to call native Windows APIs, use pre-built COM components, and leverage existing ActiveX® controls to seamlessly integrate existing applications and components.
Sir Syed University of Engineering & Technology
With ADO.NET, developers gain access to more powerful components, such as the Dataset class and a strongly typed programming model that provides IntelliSense and statement completion for data access code. Unlike classic ADO, ADO.NET is optimized to provide the very best performance and scalability for both connected and disconnected data-centric applications. The Data Set class is a great way to query and update data while minimizing the time necessary to hold onto a costly connection to the database. Classic ADO was great for sending and receiving data; however, there were limited ways to work with the data once the developer closed the connection. This lead many developers down a path that limited the performance, responsiveness, and scalability of their system. The Data Set acts like an in-memory copy of the database, including multiple tables, relationships, and the ability to track the original and new values. In this way, a portion of the database can be brought down to the client via the Data Set class, updated with new data, and then sent back to the server to be merged back into the database. Using Visual Basic .NET and ADO.NET, developers can quickly be productive and create a data management application with minimal coding involved. The Data Adapter Configuration Wizard can generate all of the code necessary to select, insert, update, and delete data from any table in the database. Further, unlike classic ADO, it provides the developer with the ability to customize each SQL command and can even create the stored procedures.
Sir Syed University of Engineering & Technology
To implement a Security Server or Web Cast type application. audio. and networking.6 ADO.NET Framework and the Visual Studio .NET IDE. Microsoft Direct X Every component of DirectX 8. Three components have had major rewrites: graphics. and better international support. both in the runtime and in the SDK.4. And since it is tightly integrated into the . DirectShow® is a part of DirectX. action mapping.0 has received major new features that greatly enhance the capabilities of DirectX. ADO.NET includes new data providers that were specifically created to talk directly to databases such as SQL Server 7.Briefly. The most compelling new feature is support for programmable shaders (a shader is a piece of code written in a shading language that is designed to be used in either the programmable vertex pipeline or the programmable pixel pipeline). Video Conferencing – Each computer participating in the conference is both a client and a server. it provides the power and productivity required by developers. The API has been extensively updated to make it even easier to use and to support the latest graphics hardware. And for the first time. Lead Technology Tool The LEADTOOLS Video Conferencing SDK can be used to create Client Server applications such as: Security Server / Web Cast – Single sever sending to multiple clients.Chapter 1 Introduction Figure 1. you would have the Server application running on one computer and the Client application running on one Sir Syed University of Engineering & Technology 20 .0 or greater.NET builds upon previous versions of data access models. DirectX Graphics component. DirectInput® includes new configuration functionality. This can provide a performance boost since the Visual Basic .NET code doesn’t need to traverse through multiple API layers before it gets to the actual database. Live Presentations over the Web – Capture screen activity on a server and send to one or more clients. This makes database calls faster and far more efficient. There is also a data provider for OLEDB-supported databases and even some new data providers that offer direct access to other databases such as Oracle.
To implement a Video Conferencing application. it will ask you for an IP address to which you wish to connect. each computer plays the role of both client and server. they will be able to see what is happening on your desktop and they will hear Sir Syed University of Engineering & Technology 21 . And. Once the Clients connect to your server. The Client computers would all be able to receive and see the video data being captured and sent from the Server. the party with which you are conferencing must have that address in order to be able to connect to you. if Client#1 connects at 10:00 and Client#2 connects at 10:05. For example.Chapter 1 Introduction or more remote computers. each machine in the conference should run the server. To conference with more than one person. and have a 2nd party do the same. The Client computers would see the data from the time that they connect. a viewing station could monitor multiple security camera locations. its IP address will appear next to “connection”. meaning to as many servers as you want (one client can connect to many servers). When you run the Server your IP address will appear next to “connection”. When you run the Client application. it will ask you for an IP address to which you wish to connect. When you run the Client application. all you need is the IP addresses of all the servers to which you wish to connect and monitor. you can run both the Client and Server applications on each computer that will participate in the conference. You can run both the Server and Client applications on your machine. then Client#2 would have missed the first 5 minutes of the video. the machine(s) to receive the video must know that IP address in order to be able to connect to the server. You can create and broadcast live presentations over the web using using the LEAD Screen Capture filter as the video device on the Server side and the LEAD Screen Capture encoder to compress the video data. For this. You can run the Client application on one machine and connect to as many servers as you wish from the same client. When you run the Server application. It is also possible to have one Client application receive data from more than one Server application. using the same client you can connect to as many IP addresses as you want. For example. In other words. you need to have their IP address in order to connect to them.
It is NAT and other firewalls friendly. in which. Due to client side voice mixing. during the conference each end receives multiple voice streams and mix them into single voice stream and play it over the sound device. VaxExtended Tool VaxExtended SDK is the best peer-to-peer VoIP solution.Chapter 1 Introduction what you are saying. Extended SDK is a perfect solution to have small private conferences.4. PERSON A Initialize Connect OnStatusEvent: 51 (51 = CONNECTING) OnConnectionEvent AcceptIncomingCall OnStatusEvent: 51 (51 = CONNECTING) OnStatusEvent: 53 (53 = CONNECTED) OnStatusEvent: 53 (53 = CONNECTED) AddInConf OnStatusEvent: 59 (59 = ADDING) OnAddConferenceEvent AcceptAddInConf OnStatusEvent: 59 (59 = ADDING) OnStatusEvent: 60 (60 = ADDED) OnStatusEvent: 60 (60 = ADDED) OnStatusEvent: 60 (60= ADDED) OnStatusEvent: 60 (60 = ADDED) PERSON B Initialize PERSON C Initialize Successfully connected and having Voice Conversation Successfully added and all of them having Voice Conference Table 1. WAN or Internet. It supports client side voice mixing. If the client is behind the NAT/router then there is no configuration required to connect to listening end. Enable the port forwarding at the router end in order to receive incoming connection requests. Two or more persons can connect to each other on the direct IP-to-IP connection to have real-time voice conference over the LAN.5 Sir Syed University of Engineering & Technology 22 . Screen activity and sound are recorded and encoded using the LEAD Screen Capture encoder and then transmitted to the Client applications. WAN or Internet. where 8 to 10 persons can connect and have Real-Time voice conference over the LAN.
There is some special scenario about the user and his requirement. 2. He/she announce any announcement for his/her employee.Chapter 2 Introduction 2 Usage scenario / User Interaction This project is really a market oriented. User interaction is totally independent in term of project scenario and interaction based on the target and mange user. business oriented and education oriented tool for communication. Administrator is the controlling user in term of system flow. According to this system. If they all went to director or team leader so there is huge bulk of employee at the door of director/team leader room. Employee In every industrial pool we have a lot of employee. he/she will able to update his/her employee directly through multimedia communication and present some thing live to his/her employee by mean of multimedia communication. He/she makes sure the system is working properly and the system is secured with respect to system availability and reliability. He/she is also able to spread his/her command directly to his/her employee desktop. He/she is also the cooperative with the other users of the system. Especially in laboratory education he/she Sir Syed University of Engineering & Technology 23 . He/she provides help to other users on how to use the system and troubleshoots the system. Every employee updated with respect to any command. he/she will get the powerful tool for teaching and spreading information to the students. Managing Director Managing director is the upper level management user.1 User profiles The different types of users with their hierarchies and their description are given as follows: Administrator He/she is the most powerful user according to system maintenance and support. Teacher/Instructor According to the teacher point of view. Usage scenario based on the project’s target user as well the manage user. announcement and circular by using this system approach. They work together but how they can interact directly to their team leader or the director.
Stock Exchange Employee Stock exchange employee will very update and accurate by mean of live transmission. There is no need for team member to go through table to table of each team mate member. Stock Exchange Manager Stock exchange has the lot of employee and stock partner. Student will get their notes/lectures directly through the teacher system. Teacher will concentrate over his/her topic rather than to control student. Students will have deep look on their lecture at their computer screen. Student Students will easy to get their lecture with out any confusion because there is no white board in term of lecture and presentation. Team leader will directly get the task execution by his/her team member and deliver to the director. This system gives the noiseless education environment with respect to teacher point of view.Chapter 2 Introduction will enable to give lecture at the desktop of the students. They will able to get statistics and calculation very quick because all information at their desktop. Stock exchange manager will update his/her stock partner and employee by mean of live reports and documentation. Sir Syed University of Engineering & Technology 24 . Team Leader Team leader will operate his/her team member directly under the one building.
2 Use-cases Video Streaming Audio Streaming Real Time Video server Real Time Voice User Remote Streaming Share File Live Presentation Overall Use Case Figure 2.Chapter 2 Introduction 2.2.1 Sir Syed University of Engineering & Technology 25 .
Chapter 2 Introduction System Support Streaming Video Streaming Audio Real Time Video Administrator Loggin Real Time Voice Remote Streaming Testing Share File Live Presentation Administrator Use case Figure 220.127.116.11 Sir Syed University of Engineering & Technology 26 .2 Streaming Video Streaming Audio Managing Director Loggin Real Time Voice Remote Streaming Live Presentation Managing Director Use Case Figure 2.
4 Streaming Video Streaming Audio Real Time Video Teacher Loggin Real Time Voice Remote Streaming Share File Live Presentation Teacher Use Case Figure 2.5 Sir Syed University of Engineering & Technology 27 .2.Chapter 2 Introduction Streaming Video Streaming Audio Real Time Video Employee Loggin Real Time Voice Remote Streaming Share File Live Presentation Employee Use Case Figure 2.2.
7 Sir Syed University of Engineering & Technology 28 .Chapter 2 Introduction Streaming Video Streaming Audio Real Time Video Student Loggin Real Time Voice Remote Streaming Share File Live Presentation Student Use Case Figure 2.2.6 Remote Streaming Team Leader Loggin Live Presentation Share File Team Leader Use Case Figure 2.2.
Chapter 2 Introduction Streaming Video Real Time Video Stock Exchange Manager Loggin Remote Streaming Live Presentation Stock Exchange Manager Use Case Figure 2.9 Sir Syed University of Engineering & Technology 29 .8 Real Time Video Remote Streaming Stock Exchange Employee Login Live Presentation Share File Stock Exchange Employee Use case Figure 2.2.2.
Key board. In this section special requirements that will be used during the process development & usage of the overall application that includes the following User Interface This is the basic building block of this system because system will never become a market oriented product when ever it is not very friendly to target user. In communication interface we have consider reliable and pre-request LAN card for communication. process and output interface. We have used Microsoft based operating system. we have considered all prospects with the user friendly terminology. We have used central and server based database system for security and streaming. Communication interface has the flavor of both software and hardware interface. Special usage of consideration lies in different scenario of the system usage.3 Special usage considerations There is some special consideration for system quality. According to graphically user interface (GUI). We have used Ethernet standard for LAN. Communication Interface Communication is the tool of this project. Server system should have any server product of Microsoft operating system. Some specifications are described by hardware and some by software.P. Hardware Interface In hardware interface. Client system should have the same specification but it is not necessary to use server product at the client side. GUI is easy to use and very good looking for the target eyes. We have also considered the medium which is wired.Chapter 2 Introduction 2. Software Interface The basic building block of the software interface is the operating system. mouse and trackball are the parts of input and monitor and printer are the parts of output. Software interface should have the compatibility with the operating system and the third party software.U and LAN card and network switch etc. Sir Syed University of Engineering & Technology 30 . There are some operating system services have used in this system like security and socket. we have considered all hardware tools like system and other third part hardware like input. Process part divided in two many sub part like C. There are some third party tools for maximum system throughput. User interface included all the benefits according to target user.
Deployment has done by the same operating system environment at the both end of medium. Sir Syed University of Engineering & Technology 31 .Chapter 2 Introduction Deployment Interface This is the major interface because project is becoming product by using deployment interface. System configuration has the major role in deployment interface. During deployment we have to consider the operating system compatibility with the other third party software.
Functionality is all about data processing over the network.1 Data Description Data entity Data Object Data Behavior Data relations Data operations Sir Syed University of Engineering & Technology 32 . Every system has its own functionality and data modeling with respect to execution. we have a lot of functionality and data description of different level of execution.Chapter 3 Functional and Data Description 3 Functional and Data Description According to this project. This system is working upon different functionality and data description. Functionality is based on the data object either they used as sub-system or sub-executable. System Description Functionality Main functionality Sub functionality Internal functionality External functionality Control functionality Figure 3. The overall system connected with similar theme of modeling which based on different sub-functions and data description. Following table shows some brief idea about functional and data description. The major theme divides into two systems which are server and client. The multimedia data pointed by sub-data object which are the cause of multimedia communication over the network. The major characteristic is about the data object processing in term of multimedia extension. The relationship of data object with respect to functionality is quiet observable with respect to execution.
1 Student Sir Syed University of Engineering & Technology 33 .1.Chapter 3 Functional and Data Description 3.1 System Architecture This is the overall architecture for both application like Multimedia Server and Multimedia Client. Administrator Managing Director Teacher Instructor Multimedia Casting Over LAN Video Streaming Audio Streaming Real Time Voice Streaming Real Time Video Streaming Presentation Streaming Remote Streaming Stock Exchange Manger Employee Overall System Architecture Figure 3.
Chapter 3 Functional and Data Description 3.2 3. This module provided a secure login at the both end of application.2 Modules overview Authentication Module This is the major module for the security in term of authorization and authentication.1. Sir Syed University of Engineering & Technology 34 .1 Architecture model The project block diagram is shown here as a brief context level model of the system architecture. It checks user privileges from the directory services of operating system.1. This is the first basic module of this system. Multimedia Server Login Synchronize Cock Maintain Database erver Multimedia Client Login Streaming Multimedia Block Diagram of the System Block Figure: 3. Server Configuration Module This is the module that gets the network address of the server and applies it over all application for multimedia streaming. It gets simple a complete IP address and the system name resolve by network class.1.
It has sub-module with respect to connection and action. There are the lists of sub modules which lie in this section. • • • • • • Listen Video Listen Audio Listen Live Listen Camera Listen Remote Listen Shared Files 3. There are the lists of sub modules which lie in this section. The overall system connected with similar theme of modeling which based on different sub-functions and data description. It has sub-module with respect to connection and action. we have considered a central database system for communication. The major characteristic is about the data object Sir Syed University of Engineering & Technology 35 . All multimedia extension is streamed by this module with respect to current operation with in the span of time. It is the initial connection to produce synchronization between multimedia server and client. It provides a major back end operation with respect to multimedia streaming. Data objects are behaving as signals for multimedia clients. All multimedia extension is streamed by this module with respect to current operation with in the span of time. • • • • • • Listen Video Listen Audio Listen Live Listen Camera Listen Remote Listen Shared Files Multimedia streamed Module This is the complete module of multimedia streaming.2 Data Description According to this project. Multimedia extensions Module This is the complete module of multimedia streaming.Chapter 3 Functional and Data Description Database Module This module communicates with the database server for signaling.
1. It is provided a full management of multimedia streaming over the network. This project is the great tool in cooperative.Chapter 3 Functional and Data Description processing in term of multimedia extension.2.1 Major data objects/signal specification Video_Connect Attributes Video_ Index Video_Stream Video_Name Video_PlayList Video_Duration Video_Position Is_Video_skip Table 3. 3.1. Data objects and their instance values accessed by the multimedia clients by mean of security. It generate clock for signal accessing by mean of data objects. Data description is the all over flow of signals by mean of multimedia extensions.3 Type decimal varchar varchar Type decimal varchar varchar Type decimal varchar varchar varchar varchar float float Sir Syed University of Engineering & Technology 36 . It stream valuable data/ information in the manner of security.1 Voice_Connect Attributes Voice_Index Server_Name Server_Ip Table 3.1. Functionality is all about data processing over the network. Security is also provided by the database server.2.2 Present_Connect Attributes Present_Index Present_Name Present_Path Table 3.2. business and education environment.2.
6 Client_Info Attributes Client_ Index Client_Name Client_Pass Table 3.7 MultiMedia_Info Type decimal varchar varchar Type decimal varchar Type decimal varchar varchar Type decimal varchar varchar Attributes MM_ Index MM_User MM_Ct MM_File MM_Path MM_Stime MM_ETime Table 18.104.22.168 Status_Table Attributes Status_Index Status_Of_streaming Table 22.214.171.124.8 Type decimal varchar varchar varchar varchar varchar varchar Sir Syed University of Engineering & Technology 37 .126.96.36.199 Shared_File Attributes Index_File File_Name File_Path Table 3.2.Chapter 3 Functional and Data Description Remote_Connect Attributes Remote_Index Remote_Name Remote_Path Table 3.2.
12 Type decimal varchar float int int int Type decimal varchar varchar varchar float varchar float Type decimal varchar varchar Sir Syed University of Engineering & Technology 38 .2.9 Audio_Connect Attributes Audio _ Index Audio_Stream Audio _Name Audio _PlayList Audio _Position Audio _Duration Is_Audio_skip Table 3.11 Audio_Actions Attributes Changed_ Index Changed_Audio Changed_Position Is_Stoped Is_Played Is_Paused Table 188.8.131.52.2.10 Video_Actions Attributes Type Changed_ Index decimal Changed_Video varchar Changed_Position float Is_Stoped int Is_Played int Is_Paused int Table 184.108.40.206.Chapter 3 Functional and Data Description Server_Config Attributes Host_ Index Host_Name Host_IP Table 3.
Every system that wants to communicate with multimedia server then it should be providing desire user name and user password for multimedia streaming.2 3. There are some interfaces by mean of networking such as a desired LAN card for connecting system over LAN environment.3.2.3 System Interface Description This project has the flavor of both networking and software. the major components and hardware are shown in the form of DFD.2 System level data model Under this section.13 Type decimal varchar 3. Sir Syed University of Engineering & Technology 39 .Chapter 3 Functional and Data Description Voice_Action Attributes Voice_Action_ Index Voice_Signal Table 3.1.2. Multimedia Server Multimedia Server Database Server Client 1 Client 2 Client 3 Figure 3. Other thing is about the network switch which is used for the same network family.
3. Member server may use as a backup of multimedia server or its said to be a backup server. 3.3. We have windows 2003 server machine as a multimedia client so windows 2003 server made it a member server. Web Camera Web camera is the other external machine used for real time video streaming because it is the part of multimedia extensions. There are some operating system services by mean of control interfaces and some third party tool be considered.Chapter 3 Functional and Data Description According to software interfaces. Multimedia client may be a workstation it is on customer. Web camera has interfaced by development tool like C#. Ethernet Switch Ethernet card has used for multimedia bridge because we have a lot of system requirement over LAN. Work station has not any server product like Windows 98/XP. we considered a lot of active X control for development. Work Station Work station is simply a client machine which is connected to the server.1 External machine interfaces Member Server Member server is the client machine which is driving by any server product operating system.2 External system interfaces Combo Box Button Checked List Box Menu Data Grid Sir Syed University of Engineering & Technology 40 .3. Ethernet make a single administrator network environment which belong to our requirement. We considered a lot of control and classes provided by development environment.
0 Web browser control Rich text box buffer Status bar System performance control Image list. Sir Syed University of Engineering & Technology 41 .Chapter 3 Functional and Data Description Label Text Box Group Box Panel Main Menu Tool bar Vax-Extended object Lead Control object Media player 9.
Ethernet Switch Ethernet card has used for multimedia bridge because we have a lot of system requirement over LAN. Multimedia client may be a workstation it is on customer. Web Camera Web camera is the other external machine used for real time video streaming because it is the part of multimedia extensions. Ethernet card based on 802. Work station has not any server product like Windows 98/XP. Work Station Work station is simply a client machine which is connected to the server. we have considered following component. Member Server Member server is the client machine which is driving by any server product operating system.Chapter 4 Subsystem Module Description 4 Sub-system module Description According to this project we have both network and software flavor and their subsystem and module. Sir Syed University of Engineering & Technology 42 . We used 100 Mbps configuration Ethernet card for multimedia communication.3 It is used for connection based on LAN standard Ethernet. Web camera has interfaced by development tool like C#. Member server may use as a backup of multimedia server or its said to be a backup server. According to hardware/network sub system. We used wired Ethernet card due to its high bandwidth and data rate. We have windows 2003 server machine as a multimedia client so windows 2003 server made it a member server. Ethernet make a single administrator network environment which belong to our requirement.
This module provided a secure login at the both end of application. It gets simple a complete IP address and the system name resolve by network class. It has sub-module with respect to connection and action.Chapter 4 Subsystem Module Description According to software we have used several modules for development. It checks user privileges from the directory services of operating system. Listen Video Listen Audio Listen Live Listen Camera Listen Remote Listen Shared Files Sir Syed University of Engineering & Technology 43 . Server Configuration Module This is the module that gets the network address of the server and applies it over all application for multimedia streaming. All multimedia extension is streamed by this module with respect to current operation with in the span of time. This is the first basic module of this system. Database Module This module communicates with the database server for signaling. There are the lists of sub modules which lie in this section. Authentication Module This is the major module for the security in term of authorization and authentication. It is the initial connection to produce synchronization between multimedia server and client. It provides a major back end operation with respect to multimedia streaming. Multimedia streamed Module This is the complete module of multimedia streaming. Software modules belong to development modules and third party tools that are interfaced during development.
4. Multimedia action modules carry signal to database server and client automatically get actions with in span of time. It communicates over IP addresses of the systems but it is not hard corded. Server should have any server product of Microsoft based operating system. It is responsible for voice streaming on the specific port that provided by in term of hard cord. According to multimedia server. According to hardware. Lead Module Lead control module also belongs to third party tool for real time video conferencing.1 Description for Subsystem We considered subsystem scope in the manner of reliability and availability of the system. It creates real time voice session between multimedia server and clients.Chapter 4 Subsystem Module Description Multimedia action Module According to this module. It communicates over IP addresses of the systems but it is not hard corded. After all client should have any operating system of Microsoft family rather than Windows 95/98 etc. It is responsible for voice streaming on the specific port that provided by in term of hard cord. the overall action that is performed by multimedia server is noticed here because client has to synchronize with the specific operation that applied over multimedia extensions. we considered communication system over network like server and clients. Video Action Audio Action Live Action Web Camera Action Voice Action Vax-Extended Module Vax-Extended module belongs to third part tool for voice streaming. we consider network switch that support minimum eight client machine for communication and support high bandwidth of Sir Syed University of Engineering & Technology 44 . Some hardware scope is defined by the development domain. we considered some special subsystem or module for communication. It captures the real time video in the file and then stream over the network.
there are two modes of operation: half-duplex and full-duplex modes. In the Ethernet standard.1. This is the tool for security purpose with respect to authentication. The major subsystem is about the network based component called Ethernet card based on IEEE standard 802.10Base-T Ethernet (IEEE 802. The several types of queries execute in the span of time for multimedia communication. Ethernet card considered high bandwidth and data transfer rate. According to real time streaming we considered a quality capture web cam for real time streaming. This is the high bandwidth supported LAN card for heavy communications.Chapter 4 Subsystem Module Description data.3) 100 Mbps .3z) 10-Gigabit .3. Each Ethernet-equipped computer operates independently of all other stations on the network: there is no central controller.3u) 1000 Mbps . In the half duplex mode.Gigabit Ethernet (IEEE 802. It should be capture 30 to 40 frames per second for desire quality. Third party tools provided some restricted operation but we have interfaced them in extra ordinary style. Third party tool applied in the extra scope of utilization with respect to project scope. 4.1 Subsystem scope Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802. There are many subsystems like the authentication system interact with directory services of the operating system. All stations attached to an Ethernet are Sir Syed University of Engineering & Technology 45 . The other module is about the data base server which is very important for communication because database server behave like a bridge for signals of multimedia extensions. Four data rates are currently defined for operation over optical fiber and twisted-pair cables: 10 Mbps . data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a shared medium. There are some third party tool interfaces with respect to project services.Fast Ethernet (IEEE 802. Database server uses its services in term of queries in the desire span of time.3.3ae).10 Gbps Ethernet (IEEE 802. Database server directly communicates with multimedia server and client on the specific request.
and when the channel is idle the station transmits its data in the form of an Ethernet frame.Chapter 4 Subsystem Module Description connected to a shared signaling system. all stations on the network must contend equally for the next frame transmission opportunity. The medium access control mechanism is based on a system called Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Access to the shared channel is determined by the medium access control (MAC) mechanism embedded in the Ethernet interface located in each station. or packet. Sir Syed University of Engineering & Technology 46 . After each frame transmission. also called the medium. To send data a station first listens to the channel.
1.1.3 Algorithmic/protocol model Sir Syed University of Engineering & Technology 47 .2 Subsystem flow diagram/ desired UML diagram Start YES Install Multimedia application Multime dia streamin g NO Login to directory service of OS Wait for streaming End Server initialization Login to directory service of OS Client joins the server Server found YES NO Connected to server Figure 4.Chapter 4 Subsystem Module Description 4.1.1 4.2.
The logical topology of an Ethernet provides a single channel (or bus) that carries Ethernet signals to all stations. including initiation of frame transmission and recovery from transmission failure Even though the media segments may be physically connected in a star pattern. It provides a secure communication in term of security issues. 4. if you have too many applications open. close all unnecessary applications and windows running on your computer.3 physical layer corresponds to the ISO physical layer. including frame assembly before transmission. the Media Access Control (MAC) sub layer and the MAC-client sub layer. Even with a fast computer. and frame parsing/error detection during and after reception Media access control.1. Just keep your Web browser and your media player open. the ISO data link layer is divided into two IEEE 802 sub layers. The restriction over multimedia streaming is about to over flow because if we consider multiple multimedia extensions so it may effect on your system performance. with multiple segments attached to a repeater. the logical topology is still that of a single Ethernet channel that carries signals to all stations.1. The MAC sub-layer has two primary responsibilities: Data encapsulation. to distinguish it from the actual physical layout of the media cables. 4.4 Restrictions/limitations The main disadvantages of the half-duplex are the efficiency and distance limitation.Chapter 4 Subsystem Module Description As with all IEEE 802 protocols. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. it could slow down your media streaming. 802 protocols support our desire protocol like TCP/IP for errorless and lossless communication. it helps to understand the topology of the system. in which the link distance is limited by the minimum MAC frame size.5 Performance issues A slow computer. The signal topology of the Ethernet is also known as the logical topology. Sir Syed University of Engineering & Technology 48 . Therefore. When it comes to how signals flow over the set of media segments that make up an Ethernet system. If you notice things are sluggish. This restriction reduces the efficiency drastically for high-rate transmission. The IEEE 802.
Of course.) In any case. a cable modem or DSL connection is best for streaming media.Chapter 4 Subsystem Module Description (If you're just listening or watching. the carrier extension technique is used to ensure the minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. in which the link distance is limited by the minimum MAC frame size. you can even close your browser. crackling). Disconnect any phones that cause a buzz or hum. This restriction reduces the efficiency drastically for high-rate transmission. Therefore. speedy computers are better. Sir Syed University of Engineering & Technology 49 . If you have a phone line that isn't free of noise (humming. Noisy phone lines. Have your phone company check your line to get rid of humming or other line noise. The main disadvantages of the half-duplex are the efficiency and distance limitation. that's not good for streaming (or Web browsing).
5. Multimedia server called database services in the Sir Syed University of Engineering & Technology 50 . we have different behavior with respect to its states of execution.1 Description for system behavior According to the system behavior. we have some same behavior states with respect to multimedia server. We used an event for authentication with the directory service of operating system. According to multimedia server. The login event deals the security in term of authentication and authorization. Multimedia streaming is the basic behavior of multimedia server but there are some other behavior included for controlling. Multimedia client converge its attention to its server because in every second multimedia server can get different state with respect to multimedia streaming. Multimedia client has a powerful control by mean of its communication with respect to multimedia streaming. Multimedia server behavior is controlled by some operating system services and third party software. Multimedia server should be in the hand of authentic person of any industrial pool. Multimedia server has some major behavior with respect to multimedia streaming but it is not least according to system performance. Multimedia client has several behavior states with respect to server acknowledgement due to central database system. Multimedia server has a powerful control behavior with respect to system states because there are heavy data transfer rate over the network by mean of multimedia streaming.Chapter 5 Behavioral Model and Description 5 Behavioral Model and Description According to multimedia server. Multimedia client has also used some operating system service and third party tool for desire execution. There are so many behavior characteristics which are the cause of system action and performance. The basic behavior is about to get multimedia streaming from the multimedia server but it can change with in second. there are a lot of flavors with respect to states and events. Listening address got globalize for its multimedia clients. According to multimedia client. we have considered a strong security mechanism with respect to login state. Clock event Call itself in specific span of time like recursion. The next major event is about to synchronize with database server. After authorization multimedia server is got its listening address by the network. There are several states of event from ideal state to busy state. The major event is about to generate a clock for synchronization. optimizing and integration.
multimedia is on the state of communication. After connected database server.Chapter 5 Behavioral Model and Description span of time with respect to requirement. Using operating system services. Stream multimedia extensions. multimedia clients have to wait on-stream multimedia streaming that is controlled by multimedia server. Multimedia clients are dependent on the multimedia server otherwise they will not able to get any information. Close all operation and services related to project. Connect to database server. first event is about the authentication of clients. Internally operating system grants his/her connection by mean of login application of this project. The administrator or the team leader can stream multimedia extension over the network. Get multimedia streaming. Maintained record for multimedia clients. Contact to central database system like multimedia server. Sir Syed University of Engineering & Technology 51 . 5. There are complete library of multimedia extension ready for streaming. Assign communication port. After connection. Listen clients for assigning address.1 Events Multimedia Server Login to directory service and DNS. Interface third party software with operating system. According to multimedia client. Generate clock for synchronization. Calculate network statistic.1. Generate a clock for synchronization. Multimedia Client Login to directory service of Multimedia server. Multimedia client has an synchronized clock to database server for signaling about on-stream multimedia extensions. Multimedia client has to login with the directory service of operating system.
Multimedia Client Initialize login form. Calculate network statistic.1. Call third party services. Maintaining database. Initialized Main Form Enable menus and controls. Finish. Authentication Enable controls.2 States Multimedia Server Initialize login form. Close all operation and services related to project. Calculate network statistics. Finish. Display database form. 5.Chapter 5 Behavioral Model and Description Using operating system services. Access central database. Authorization by Windows Directory services. Interface third party software with operating system. Authentication Enable controls. Monitoring database. Calculate network statistics. Initialized Main Form Enable menus and controls. Call third party services. Sir Syed University of Engineering & Technology 52 .
2.Chapter 5 Behavioral Model and Description 5.1 Sir Syed University of Engineering & Technology 53 .Net framework State 6 Streaming MultiMedia Extensions from Server State 3 Install Multimedia Server application State 7 Receive the on-stream by User State 4 Application icon generated on the desktop Figure 5.2 State Transition Diagrams Multimedia Server State 1 State 5 Administrator initiates the setup Run the application State 2 Install .
Chapter 5 Behavioral Model and Description Multimedia Client State 1 State 5 User initiates the setup Run the application State 2 Install .2.NET framework State 6 Streaming MultiMedia Extensions from Server State 3 Install Multimedia Client application State 7 Receive on-stream Multimedia Client State 4 Application icon generated on the desktop Figure 5.2 Sir Syed University of Engineering & Technology 54 .
Chapter 5 Behavioral Model and Description 5.3 Control specification There are some specific states of control with respect to project services. The overall control of flow is given in figure 5.3 Multimedia Server Multimedia Client Active Directory Services Generate clock Generate clock Connect to DBS Connect to DBS Stream Multimedia Get On-stream Data Control DBS Multimedia actions Calculate Network Statistics Figure 5.1 Calculate Network Statistics Sir Syed University of Engineering & Technology 55 .3.
We considered universal model but added some useful phase for system modeling. Systems Analysis and Design. the system should be engineered and put in place. This has the following activities. Simulation result is about the real time process of any system that works with in its desired domain. Deployment.1 Information about Modeling and engineering As software is always of a large system (or business). Software Requirements Analysis. the development team studies the software requirement for the system. System prototype gave us theoretical as well as practical description about system execution in term of desired performance. System is the basic and very critical requirement for the existence of software in any entity. 6. people and other resources. Table 6. Testing and Support. Simulation result gave us overall idea about system performance and execution.1 Description of system modeling approach System Development Life Cycle Model We considered most famous model like System Development Life Cycle which is also known as Classic Life Cycle Model (or) Linear Sequential Model (or) Waterfall Method. There was some enhancement in this model according over project deployment. Once the ideal system is engineered or tuned up. So if the system is not in place. system should be re-engineered and spiced up. This system view is essential when software must interface with other elements such as hardware. In some cases to extract the maximum output. According to this project. Sir Syed University of Engineering & Technology 56 . Code Generation. we considered universal prototype model for simulation.Chapter 6 Results System Prototype Modeling and Simulation 6 System Prototype Modeling and Simulation Results System prototype modeling is the approach of project simulation with respect to expected result that you want after compilation. Information about Modeling and engineering. work begins by establishing requirements for all system elements and then allocating some subset of these requirements to software.
the right programming language is chosen. code generation can be accomplished with out much complication. the development team visits the customer and studies their system. costs. Code Generation The design must be translated into a machine-readable form. The logical system of the product is developed in this phase. C++. Programming tools like Compilers. Analysis and Design are very crucial in the whole development cycle. Systems Analysis and Design In this phase. They investigate the need for possible software automation in the given system. Sir Syed University of Engineering & Technology 57 . To understand the nature of the program(s) to be built. It also includes the personnel assignments. The essential purpose of this phase is to find the need and to define the problem that needs to be solved. The requirements gathering process is intensified and focused specially on software. as well as required function. the team furnishes a document that holds the different specific recommendations for the candidate system. The code generation step performs this task. Different testing tools and methodologies are already available. the number of tiers needed for the package architecture. the program testing begins. project schedule. By the end of the feasibility study. Different testing methodologies are available to unravel the bugs that were committed during the previous phases.Chapter 6 Results System Prototype Modeling and Simulation Software Requirements Analysis This is also known as feasibility study. In this phase. Testing and Support Once the code is generated. VB. Much care is taken during this phase. and Debuggers are used to generate the code. With respect to the type of application. Interpreters. In terms of the client/server technology. the data structure design etc are all defined in this phase. If design is performed in a detailed manner. C# are used for coding. Any glitch in the design phase could be very expensive to solve in the later stage of the software development. and target dates. the software's overall structure and its nuances are defined. the system engineer ("analyst") must understand the information domain for the software. the database design. Different high level programming languages like C.Net. behavior. performance and interfacing.
development tool will play the massive role to achieve high quality result. the changes in the system could directly affect the software operations. 6.2.Chapter 6 Results System Prototype Modeling and Simulation Some companies build there own testing tools that are tailor made for there own development operations.2 Simulation results Simulation Tools Microsoft Windows Task Manager MultiMedia Server Network Statistics MultiMedia Server Performance Counter Simulation Results Give Over all System performance in term of Usage Give bandwidth in term of data transfer rate in term of received and sent Packet lost. packet received and packet sent. In addition. Development tool provide the massive support to develop perfect result. Change could happen because of some unexpected input values into the system. Table 6. The software should be developed to accommodate changes that could happen during the post implementation period. In this project.1 Sir Syed University of Engineering & Technology 58 . Deployment This is the major factor for achieving the desire result. There are many reasons for the change. Software will definitely undergo change once it is delivered to the customer.
Chapter 6 Results System Prototype Modeling and Simulation System performance Measurement Figure 6.2.2 Sir Syed University of Engineering & Technology 59 .
Chapter 6 Results System Prototype Modeling and Simulation Network Monitoring Figure 6. Tends to result in high cost development. specialized method for gathering users' information requirements.3 6. Users’ requirements can change before the process is completed.2. Sir Syed University of Engineering & Technology 60 . We can use prototyping as a part of traditional SDLC approach. Users never know their actual requirements until something tangible exists.3 Special performance issues Issues with SDLC. Here prototyping is considered to be an additional. Lengthy development time is required. Issues With Prototyping: Can meet a small group’s requirement which may not be adequate for the overall system.
Support tool. Know target product. Listen user.Chapter 6 Results System Prototype Modeling and Simulation 6. Sir Syed University of Engineering & Technology 61 . Design and implementation. Complete analysis.4 Prototyping requirements User Information.
The real time streaming products gave us strong support of the project compilation. According to Multimedia server. Implementation of third party software Like Voice/Video Sdk and Direct X Over all Historical Data Table 7. Sir Syed University of Engineering & Technology 62 . first we have considered network design analysis with respect to operating system.Chapter 7 System Estimates and Actual Outcome 7 System Estimates and Actual Outcome Software estimation is the form of problem solving and in most cases. Net meeting and third party product. This project has both software and network flavor. Media player 9. System estimation and the actual outcome shows your scope efforts. This is the communication environment over the network. There were a lot of considerations about the database management system. VoIP application and Real time Video. 7. We considered some streaming software like Media Player and Net Meeting by mean of implementation. We assumed following data for the deployment and release. Network Analysis with operating system Security in term of Authentication and Authorization Top class graphical user Interface with respect to user friendly Multimedia Streaming applications like Net meeting. engineering efforts and the deploy efforts. Database Management system such as Oracle. We have considered a lot of pre-made application like Media player. Sql server 2000. Some time the software estimation becomes a huge below by mean of system decomposition and system resizing. The other most historical data is about the perfect and good looking GUI.1 The historical data gave us the complete idea of project compilation. The overall securities apply by the software application like we considered Active Directory and DNS services.1 Historical data used for estimates According to this project we have a lot of consideration over the historical data. We have also considered some third party tool for system development life cycle. the problem to be solved.
This project is about server client operations that’s why we considered it into many phased of development. we considered the whole scenario of our project by mean of lines of code. it should first be allocated to a domain. We considered integrated parts of this project by mean of lines of code.2. CASE tools. and then the appropriate domain average for productivity should be used in generating the estimate.2 Estimate for technique Loc is the estimation technique in tern of project management. there must be many projects of different types and sizes in a stable environment. changes.2. 7. This is generally no longer the case. is probably not going to generate much in the way of new research. This. When a new project estimated.Chapter 7 System Estimates and Actual Outcome 7. and 4GLs. Loc data are used in two ways during software project estimation: As an estimation variable to size each element of the software. Current trends in which software development is going to prototyping. We considered the scope of estimation technique because project resources and uses may tolerate by mean of requirement. Now we consider following data for estimation: Sir Syed University of Engineering & Technology 63 . 7. As baseline metrics collected from past project and used in conjunction with estimate variables to develop cost and effort projections. The project planner begins with a bounded statement of software scope and forms this statement attempts to decompose software into loc function. In order to get a model which suits the environment. or business processes affected.2 Estimation techniques applied and results There are many estimation techniques for project estimation but we considered very common and effective cost estimation by mean of exact cost management.1 Estimation Technique Loc is the acronym of lines of code. make the use of LOC much less stable. In loc-based estimation. as fewer and fewer organizations have significant numbers of new applications "written" entirely by programmers. the oldest of the models. The planner may choose another component for sizing such as classes or objects.
Multimedia client is controlled by the multi media server that’s why we covered a lot of LOC in multimedia server software estimation. (LS) Real Time Voice/Video. (SAA). (SI) Integration of services. Remote streaming and Sharing.Chapter 7 System Estimates and Actual Outcome Requirement and Function Graphical User interface. Sir Syed University of Engineering & Technology 64 . (GUI) Network analysis and implementation. (PCF) Security Implementation. (NAI) Static Video/Audio Streaming. (TPSI) Flow of Control.2 This is all about the one sided estimation in term of multimedia server. (DMS) Third party Software interfacing. (RSS) Live Presentation. (FOL) Peripheral control function. (RTVV) Database Management system. Now we considered the multimedia client software requisites. (IOS) Estimated lines of code Estimated LOC 750 103 402 150 112 105 324 260 230 170 170 175 2951 Multimedia Server software Table 7.
(RSS) Live Presentation. (FOL) Peripheral control function. (DMS) Third party Software interfacing. we considered following data or in formation which is about our team performance.2 By using Loc-based estimation. (IOS) Estimated lines of code Estimated LOC 450 102 230 150 112 105 227 160 230 120 70 75 1990 Multimedia Server software Table 7. (RTVV) Database Management system. (SI) Integration of services. (SAA). Remote streaming and Sharing. (NAI) Static Video/Audio Streaming.Chapter 7 System Estimates and Actual Outcome Requirement and Function Graphical User interface. (PCF) Security Implementation. Average productivity = 925 Loc/pm where pm --> person-month Sir Syed University of Engineering & Technology 65 . (LS) Real Time Voice/Video. (TPSI) Flow of Control. (GUI) Network analysis and implementation.
(For Multimedia Clients) Microsoft . (For Multimedia Server) Microsoft Windows 2000/XP/2003.Chapter 7 System Estimates and Actual Outcome Total lines of code (LOC) =4941 Loc Total person required = 4 approximately Cost per line of code = Rs. Ethernet card Network switch.3 Actual Results and Deviation from Estimates Component/Recourse Project cost in term of development Network switch Ethernet Cards (3 pieces) Posters and Brochure Final Report Extras Total Cost Final Cost 60000 1200 600 6000 2000 1000 70800 Estimated Cost 54351 1500 700 6000 2000 1000 65551 7. System Resources Required Sir Syed University of Engineering & Technology 66 .4. 11 Total Cost estimate= Rs.2 System Resources Required Microsoft Windows 2000/2003. 54351 7.4.1 System Resources (Required and Used) System resources divided in to three major parts follow as: Software Hardware. Human ware 7. Microsoft Paint. Desktop/Lap Tops.Net 2003.
Ms Networking protocols installed and enabled.XP/2003. Sir Syed University of Engineering & Technology 67 .Chapter 7 System Estimates and Actual Outcome Pentium class P3/P4 computer 3 units. Active Directory Services Microsoft C#. Microsoft Windows 2000. Net Environment.
but not unnecessarily repetitive. Every team can test its own integrated application with respect to project development. This Sir Syed University of Engineering & Technology 68 . Some conditions are valid with specific condition so there is complex testing with respect to validation. design and code generation. they also be tested by integration. Planning also ensures tests are not forgotten or repeated unless necessary for regression testing. Considering budget. This view presupposes there are defects in your software waiting to be discovered and this view is rarely disproved or even disputed. the complete system control structure of the procedural design to derive cases. To develop a solid test plan. In this step we control the testing at the level of project control statements by mean of Boolean condition. schedule. Internal program logic exercise using “white box” test case design techniques. you must systematically explore the program to ensure coverage is thorough. Integrated testing of the application avoids the huge and bulk phase of testing. This is the main step with respect to team work because all the development is the return of team work. This project has the integrated structures which are independent to each Other. but most importantly it measures the quality of the software you are developing. and performance in test plans increases the likelihood that testing does take place and is effective and efficient. Several factors contribute to the importance of making testing a high priority of any software development effort. This Software test split into two main perspectives. There are some iterations on the project development. Planning is crucial to a successful testing effort. The earlier in the development cycle that testing becomes part of the effort the better. External program logic exercise using “black box” test. Testing accomplishes a variety of things. A formal test plan establishes a testing process that does not depend upon accidental. random testing. According to white box testing. The test plan outlines the entire testing process and includes the individual test cases. Every statement has its own condition with respect to the project life cycle. in part because it has a great deal to do with setting expectations.Chapter 8 Test Plan 8 Test Plan Software testing is the critical element of software quality assurance and represents the ultimate review of specification.
4: Behavior or performance errors. According to the black box testing. 2: Interface errors.1 System Test and Procedure The process of testing an integrated hardware and software system to verify that the system meets its specified requirements is said to be system testing. we considered behavioral testing and focus on the functional requirement of the project. 1: Incorrect or missing function. System test organized by the team leader which may changed during testing. Black box embedded by the following steps. We considered all integrated phase in term of Black box and White box. It is all about the control structures so attention was focus on the information domain. Black box testing tends to applied during stages of testing. System has several test units with respect to its behavior. By using integrated testing in black box we enabled to test overall system with respect to exact test plan. 8. Every team member traced error and threat of his part of implementation. performed by the Test Team. White box embedded by the following steps. First we considered the integrated functionality based on sub-system or the unit of system. System testing is black box testing. Sir Syed University of Engineering & Technology 69 . According to the system strategy. 4: Exercise internal data structures to ensure their validity. and at the start of the system testing the complete system is configured in a controlled environment. 3: Execute all the loops at their boundaries and operations bounds.Chapter 8 Test Plan phase of testing can generate the valid report of every statement with respect to the project control. 3: Errors in the data structures or external database access. Black box attempts error in different manners. 5: Initialization and termination errors. we considered configuration and implementation by mean of errorless product environment. 2: Exercise all logical decision on the basis of True and False. The purpose of system testing is to validate an application's accuracy and completeness in performing the functions as designed. 1: Guarantee that all independent path with in the module.
they should be tested in pairs rather than all at once.2 Testing strategy Testing is the important part in software project evaluation because it gives desired support for deployment. in this sense. We considered every unit separately then combine it with other units. It is the crucial phase when you are going to test your project in term of availability. The idea is to test combinations of pieces and eventually expand the process to test your modules with those of other groups.2. Every unit has its own functionality but it is not avoid that there is some error in it. In its simplest form. By using a test plan that requires you to test each unit and ensure the viability of each before combining units. 8. This method reduces the number of possibilities to a far simpler level of analysis. Unit testing has proven its value in that a large percentage of defects are identified during its use. Integration testing identifies problems that occur when units are combined. A component. We split this phase into many subphase because it is easy to test in integrated flavor. Beyond that. and determine whether it behaves exactly as you expect. Every phase has its own functional power for finding errors.2 Integration testing Integration testing is a logical extension of unit testing. Eventually all the modules making up a process are tested together. reliability and performance.Chapter 8 Test Plan 8. refers to an integrated aggregate of more than one unit. In a realistic scenario. Unit testing avoid the bulk of work and it is easy to integrated overall test into many different testing unit.2. Sir Syed University of Engineering & Technology 70 . 8. Each unit is tested separately before integrating them into modules to test the interfaces between modules.1 Unit testing The primary goal of unit testing is to take the smallest piece of testable software in the application. if the program is composed of more than one process. Unit testing described overall threat and error with respect to software and hardware. many units are combined into components. two units that have already been tested are combined into a component and the interface between them is tested. which are in turn aggregated into even larger parts of the program. isolate it from the remainder of the code. you know that any errors discovered when combining units are likely related to the interface between units.
We Sir Syed University of Engineering & Technology 71 . requirements and specifications. validation typically involves actual testing and takes place after verifications are completed. We handled many exceptions at the run time because it is important to organize project functionality at the run time. High-order testing (a. plans. During implementation we have recovered many future recovery stuffs in term of pre-plan recovery. After static recovery we considered run-time recovery by mean of dynamic. we considered recovery the run time of project. Security testing Security testing is about validating your application's security services and identifying potential security flaws.e. this can be done with checklists. Statically we considered pre plan recovery strategies because there were so many problems during implementation. Every module works within its boundary and interact with the other modules and passes data in a secure manner to each other.a. This section contains important testing recommendations for verifying that you have created a securable application. walk through and inspection meetings. Validation ensures that functionality. each and every module is working properly and the task defined for each module is fulfilled according to project requirements. Recovery testing According to this project. There are many issues in term of security because authorization and authentication have most important role in project execution.Chapter 8 Test Plan 8. issues lists. There are important data over the network and target user access it by some access policy that applies on him/her. If any module fail during execution we implemented a desire recovery processes at the run time. System Testing) High order testing is some times also called a Bird’s eye view. In dynamic testing. code. it typically involves reviews and meetings to evaluate documents.2.k. as defined in requirements. Verification ensures the product is designed to deliver all functionality to the customer. we considered recovery testing in term of static and dynamic. This section includes a discussion of the order of validation by system. is the intended behavior of the product. We checked the overall system i.3 Validation testing The validation testing strategy and procedure is specified.
For example a wrong person login through the network an access important multimedia data by mean of security threats. In addition to application changes. Fix these subtle bugs at their source instead of fixing symptomatic bugs that may occur elsewhere in the application if these bugs were ignored. To accurately compare the results from different performance test passes. Stress testing helps to reveal subtle bugs that would otherwise go undetected until the application was deployed. The goal of stress testing is to crash the application by increasing the processing load past performance degradation until the application begins to fail due to saturation of resources or the occurrence of errors. The application must pass its functional tests before you can test its performance. stable. the application must be working correctly. For example. We considered many multimedia extensions streaming over the network which have 20 to 30 client machines. Multimedia extensions want the high bandwidth medium during streaming so we have applied many extensions at the run time and change it frequently. stress testing should begin early in the development phase on each area of the application. Like Interruption Interception Fabrication Modification Stress testing Stress testing. It is especially important to retest application functionality if the tuning process has modified the implementation of a component. system services. software configuration. it is important to eliminate as many variables as possible from the tests. Performance testing Performance testing presumes that the application is functioning. Sir Syed University of Engineering & Technology 72 . bugs in the code can create the appearance of a performance problem or even mask a performance problem. It is important to control changes to the application. is similar to destructive testing in other fields of engineering. unexpected changes can occur in hardware.Chapter 8 Test Plan considered couple of testing strategy over the project by mean of security. network traffic. and so on. Since such bugs are typically the result of design flaws. As such. which is a specialized form of performance testing. and robust.
3 Testing resources and staffing Testing resources belong to different flavor which are organized into different manner of staffing. The number of tests associated with the human/computer/sub-system interface can be estimated. states and transition that have to use in testing phase. hardware and network. 2: Metrics that focus on test coverage for a given component. Sir Syed University of Engineering & Technology 73 . 8. In term of network. Software resources are also applied by the operating system services. we considered operating system services for testing. Hardware testing was not very crucial because we considered pre-plan hardware equipment that avoids hardware tolerance. We used some of test metric which is given below: Bang metrics Bang metrics provided us the number of test cases required by examining the primitive measures discussed like number of functional primitives. We have also applied little bit support by this project but it wasn’t so we considered more over the operating system services. relationship. design and code metrics to guide them in the design and execution of test cases. Operating system has its own software application that gave us the performance and testing support by mean of software resources.4 Test metrics Test metrics fall into two broad categories: 1: metrics that attempt to predict the likely number of tests required at Various testing levels. Project platform helped us in different scenarios because it was giving time to time configuration setting in term of network specification. 1: Examining the number of transition contained in the state transition Representation of transition respect to evaluation of test. data element. In general we relied on analysis. not the technical characteristics of the test themselves. There are many resources used for testing because this project belongs to different paradigm in term of software. 2: Examining the number of data object that move across the interface. we tested specialized hardware by mean of project requirement.Chapter 8 Test Plan 8. object. We considered this metric in following steps. The majority of metrics proposed focus on the process of testing. According to hardware.
It is all about the component level design metrics that lies at the core of basic path of project implementation. Architectural Metrics gave us the result of overall integration plan in term of system resources. We have developed a log file that maintained the history of our testing with respect to errors and bugs. There was another great tool for testing which was our development environment indicated many of errors as well as warnings with respect to project deployment. 8. We generated log files either it was related to network field or the software field. We considered some services by operating system to get following testing: Testing Environment Addressing and Configuring Streaming Bandwidth Performance Over Network Data transfer rate over LAN Quality of Multimedia extension Flow of project control.6 Test record keeping and test log This is the most important phase because you always learn from your mistakes. Operating system has the excellent tool for this management because it gave us error as well as warning with respect to execution. Sir Syed University of Engineering & Technology 74 . Testing tools adopt by the specification of project environment. Unhandled Exceptions.Net 2003 Microsoft CLR/CTR.5 Testing tools and environment We considered many tools for testing but the environment is only one in term of coverage area and operating system. We have found a lot of errors in term of project model that were the useful stuff for our project future scope. 8. Architectural design metrics Architectural design metrics provided information on the ease or difficulty associated with integration testing. Tools Local area Network Windows 2003 Task Manager Windows 2003 LAN/MAN Microsoft TCP/IP services Microsoft Direct X 9/10 Microsoft .Chapter 8 Test Plan 3: The number of data elements that are input or output.
Later on it will easily convert into following technologies: Wireless Environment: If you are going to move over the wireless environment then you have to consider some terminologies. This device has some specification and configuration in different direction but it is very smart in special environment. VPN provide large area coverage so it will become a wide area network application. This is today’s market oriented product in term of wired medium or small cooperative business environment. VPN boost multimedia communication over the large area. There is simple application interfacing by mean of self database server for autonomous navigation of system. We will convert to Ad-hoc environment by the wi-fi enable communication device. You must define your domain of communication in term of coverage area. This system has some recommendation at this time of deployment but in future it can deal us in some specialized manner. VPN Environment: Virtual private network is the most handsome future plan for this system. According to the future enhancement of this project. Every one want to become co-operate in term of information sharing. Every application will be totally independent to each other. Ad-Hoc Environment: Now a day. You may deploy your encryption and decryption tool for threat less communication. Some special tool will be use to improve Ad-hoc communication. there are so many researches over the Ad-hoc environment. Totally it is all about the hardware and the deployment environment because you will just change your hardware in term of wireless environment and configure it by mean of Addressing. we will able to deploy it over the access pointless environment (Ad-hoc).Chapter 9 Recommendations Future Enhancements and 9 Future Enhancements and recommendations Future Enhancements and recommendation is fully observable during entire project scheduling. Sir Syed University of Engineering & Technology 75 . Wireless environment has some recommendations like AOC (area of coverage) and security issues.
we fulfilled extra ordinary work in term of multimedia streaming. Some technical skill is about the development area of new generation languages would be considered in this project development life cycle. market and education point of view.Chapter 10 Conclusion 10 Conclusion Streaming multimedia extensions across networks is an effort that is attracting many participants. Sir Syed University of Engineering & Technology 76 . we have discovered a lot of background theory about the multimedia streaming. Teacher can communicate with respect to quick and noiseless environment. According to this project. We found some critical issues about the network programming because it is difficult to implement it in different devices. This system is the powerful tool in cooperative environment because every industrial pool is converging over team work. A key characteristic of both the commercial products and research demonstrators is the diversity in technological infrastructure. We introduced central access point for multimedia streaming by mean of security. This is evidenced by the eight primary commercial and thirteen research organizations involved with this technology in various ways. Team leader. This project provided a secure communication of information which is deals by one server powered by Database server. There is one multimedia server that control his multimedia clients with respect to security because your multimedia extension is very secure and you don’t want to shared it softcopy with other people but you want stream it for business. Director. According to the new generation technology.
APPENDICES Project Timeline chart i. Project Schedule JAN FEB MAR APR MAY JUN JUL AGU SEP OCT NOV DEC Analysis Phase Design Phase Implementation Phase Testing and deploy Phase Overall project timeline Sir Syed University of Engineering & Technology 77 .Appendices H.
3 standard (Ethernet) Use case Configure Active Directory Services Design GUI (MultiMedia Client) Develop class diagrams Video streaming Class Design table attributes Shahzad Akhtar Study Premade Application Muhammad Kazim Analyze project scope February March April Use cases Implement DHCP server Develop LAN environment Define Client requirements Apply rules for DNS May June July August Design overall network setting Develop class Configure diagram network Audio streaming class Design relation ship b/w tables Introduce 3rd part software Design flow of tables Design a timing procedure MultiMedia Client Testing Integrating 3rd party software Report modeling September October November December Design remote Design streaming shared file class Apply final Implement GUI live MultiMedia presentation Client streaming Use network Real time Real time programming Voice Video for application Streaming Streaming Final testing Report Testing Overall project modeling project MultiMedia Client Work Load Distribution Table Sir Syed University of Engineering & Technology 78 .Appendices Work load distribution Working Months January Muhammad Yasir Collect information about streaming Analyze over all project flow Define project domain Design overall project control Design GUI (MultiMedia Server) Testing previous applications AD and SSL programming Implement SQL server 2000 interface clock Integrate sub classes with interface Apply final GUI Multimedia Server Muhammad Tariq Study LAN environment LAN 802.
Snap shots of deployed system Multimedia Server Snap # 1 Sir Syed University of Engineering & Technology 79 .Appendices ii.
Appendices Multimedia Server Snap # 2 Sir Syed University of Engineering & Technology 80 .
Appendices Multimedia Server Snap # 3 Sir Syed University of Engineering & Technology 81 .
Appendices Multimedia Server Snap # 4 Sir Syed University of Engineering & Technology 82 .
Appendices Multimedia Server Snap # 5 Sir Syed University of Engineering & Technology 83 .
Appendices MultiMedia Client Snap # 1 Sir Syed University of Engineering & Technology 84 .
Appendices MultiMedia Client Snap # 2 Sir Syed University of Engineering & Technology 85 .
Appendices MultiMedia Client Snap # 3 Sir Syed University of Engineering & Technology 86 .
and Rowe L.. A.asp  Microsoft Learning & Research. Wu D.microsoft. H.com/index. Retrieved from www on 02/17/2005. Soda Hall.csharpcorner. "Berkeley CMT Media Toolkit API" . Retrieved from www on 02/03/2005. Baldeschwieler J. and Rowe L..Net  SQL Server 2000 Microsoft Press. (submitted for publication).. Berkeley. Multipoint Workshop held in conjunction with ACM Multimedia 1994. (2003). www.rdesktop.asp?tabID=2& categoryID=15&subcategoryID=7  Complete Reference C# . E.microsoft. Retrieved from the World Wide Web on 02/10/2005.mspx  Remote Service Research.Reference REFERENCE  Jackson M. Berkeley. www.com/Network/NetworkProgramPart2RVS. A. November 1994..asp  Code Beach Research. San Francisco. (2003).codebeach. "Synchronized Continuous Media Playback Through the World Wide Web" . "Continuous Media Applications".org  C# Corner Research. (1999). Retrieved from www on 02/11/2005.C. Sir Syed University of Engineering & Technology 87 .  Mayer-Patel K..U. Berkeley. CA. (2001). www. CA 94720  Rowe L. C.www. (2000). A. Retrieved from the World Wide Web on 02/16/2005.com/windows2000/ Technologies/ terminal/default.  Microsoft Learning & Research. www.com/windowsserver 2003/techinfo/overview/termserv. Computer Science Division. U. Simpson D..
Voice. Ethernet 802. Picture. Real time voice The real time voice is directly streamed by mean capturing. In the half duplex mode. ready to hear or view in real time. Half duplex mode: It works one operation either send or receive. Audio.. Full-duplex mode Simultaneously (stream and get-stream) multimedia extension Sir Syed University of Engineering & Technology 88 . Multimedia extension Visualized information files.sound and picture data flow in a digital stream from a server computer to your computer. GLOSSARY Multimedia It is the collection of meaningful and attractive information. hence the term "streaming. Like (Video. Text) etc. Real time video The real time video is directly streamed after span of time by mean capturing. Streaming It's called "streaming" because the video.3 Ethernet protocols refer to the family of local-area network (LAN) covered by the IEEE 802. Multimedia client It is the workstation or member server that gets on-stream data." Remote streaming It is the transfer of files over the LAN environment. It comes to you in a stream of digital bits.3.Glossary I. Multimedia server It is the server that stream multimedia extensions. without having to download all of the content before you can enjoy it. Animation. data are transmitted using the popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a medium. In the Ethernet standard. there are two modes of operation: half-duplex and full-duplex modes..
. Microsoft Direct X Microsoft tool.NET Framework provides a managed execution environment. support for multimedia files performance. developers gain access to more powerful components. and integration with a wide variety of programming languages. Loc Lines of code.Glossary Network Traffic Impact Increase in large files large bandwidth required fixed time of transmission Microsoft DHCP Server Dynamic host configuration protocol Microsoft ADO. and Windows Forms.NET Framework are the common language runtime and the . simplified development and deployment. C# applications to easily query for and manipulate directory service objects System Development Life Cycle it is the basic model used in project development. It is the Active X control. The key components of the . The . Active Directory Services Interfaces Active Directory Service Interfaces (ADSI) enables systems administrators and developers of scripts or C/C++.NET. Sir Syed University of Engineering & Technology 89 .NET Framework class library.NET. which includes ADO.Net frame work The .NET.Net With ADO. AOC (area of coverage) It is the overall domain of the network. such as the Dataset class and a strongly typed programming model that provides IntelliSense and statement completion for data access code. VaxExtended Tool Third party tool. ASP. It is the real time voice streaming class.NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.