Beruflich Dokumente
Kultur Dokumente
Tilak College of
Arts, Commerce, Science College
Vashi
PROJECT REPORT ON
LIVE CHAT
By
Mr. DNYANRAJ SUBHASH PATIL
Under the Guidance Of
Prof. Mrs.Triveni Kaul
Submitted to
University of Mumbai
2011-2012
DEPARTMENT OF COMPUTER SCIENCE
(Seat o._____________).
Internal Examiner
Head of Department
External Examiner
ACKNOWLEDGEMENT
Making of project Live Chat Application is been unique experience for
us.
We would like to thanks the entire staff of the Computer
Science department of Tilak College of Science and Commerce, who
kept helping continuously through out our project.
A special thanks to Mr. Rao Ghuge and Mrs. Bhagyashree
Kulkarni
and
Mrs.Triveni
Koul
for
their
valuable
guidance,
SIGNED SHEET
Class : T.Y.B.Sc
Subject : project
PHASE
PHASE
NO.
1
Project Finalization
Investigation of
system
requirements/Synopsis
System Design
Program Design
Program Coding
First phase
Second phase
Third phase
Last phase
Integration testing
Complete Project
10
Documentation
printout Checking
11
Final Submission
COMPLITION
SIGN
DATE
(guide)
INDEX
Sr.No.
Title
Page
No.
Introduction
Gantt Chart
Organizational overview
a. Purpose
b. Scope
c. Organization chart
d. Present system
e. Limitations of present system
Proposed system
Benefits of proposed system
System study
a. System analysis
b. Requirement specification
c. Feasibility study
System analysis
a. Prototyping model
b. Event table
c. ER-Diagram
d. Use case diagram & use case description
e. Activity diagram
f. Sequence diagram
g. Collaboration diagram
h. State chart diagram
i. Context Level diagram
j. Data Flow Diagram.
k. Class Diagram
7
System Design
a. Component Diagram
b. System Flow Chart
System coding
a. List of tables with attributes and
constraints
b. Testing & Validation
c. Test cases
System Implementation
10
Future Enhancement
11
CHAPTER
INTRODUCTION
INTRODUCTION TO PROJECT
1.1 Introduction
Live Chat is an easy-to-use, server based LAN messaging application
for effective communication. It correctly identifies and works under
all operating systems with unlimited user accounts and is the only
secure, messenger .The simple interface makes special training
needless.
Platform independence:
Unlimited clients:
CHAPTER
GANTT CHART
Gantt Chart:-
CHAPTER
ORGANIZATIONAL
OVERVIEW
Organizational overview
Purpose of the Project:This project is to create a chat application with a server and
clients to enable the clients to chat with many other clients in the
same common chat group. This project is to simulate the multicast
chatting. In the case of multicasting when a message is sent to a
group of clients, then only a single message is sent to the router.
Which means that the client will send the message only once and
based on the location of the clients, the router will either pass the
message to another router or if the clients are in the same local
network the router will send a copy of the message to each client in
that network. So this way we are reducing the number of messages
being passed in the whole network.
Scope of the Project:Mail Server with Live Chat is going to be a text communication
software, it will be able to communicate between two computers
using point to point communication. .
The limitation of Live Chat is it does not support audio conversations.
To overcome this limitation we are concurrently working on
developing better technologies.
Data communication over LAN networks is going to be a most
important mode of communication for the corporates in the very
near future. Companies have to rely on external networks which not
only are unreliable but also cost inefficient.
Companies would like to have a communication software wherein
they can communicate instantly within their organization.
The fact that the software uses an internal network setup within the
organization makes it very secure from outside attacks.
Organization chart:-
LAN:-
Server
get Groups
Send Message
Client:-
Present system:When the existing system was studied, it was found having
some problems, existing system was very time consuming and
was not very efficient. The drawback of the existing system has
resulted in to the development of new system, which is very
user friendly and effective. Existing system was also very low in
performance.
While developing the new system all requirements of the end
user was taken into consideration. These have been maximum
efforts towards overcoming the drawbacks of the existing
system, while the new system was designed & developed.
CHAPTER
PROPOSED
SYSTEM
PROPOSED SYSTEM
1.
2.
CHAPTER
SYSTEM STUDY
SYSTEM ANALYSIS :-
The above steps constitute the logical framework for the system
analysis.
PRELIMINARY INVESTIGATION:-
Request clarification: -
the request from employee may not be well stated. Sometimes the
request may not be well defined. Therefore before any system
investigation can be considered, the project request must be
examined to determine precisely the actual requirements of the
organization.
Feasibility study:-
Request approval:
all projects that are requested are not desirable or feasible .some
organization receive so many projects requests from employee that
only a few of them can be pursued. However those projects that are
feasible and desirable should put into a schedule. The management
decides request that are most important. After a project request is
approved the cost priority, the completion time and the personal
required are estimated. Once the request is approved, the collection
of data and determination of requirements can be started.
REQUIREMENT SPECIFICATION
The primary goal of the system analyst is to improve the efficiency of
the existing system. For that the study of specification of the
requirements is very essential. For the development of the new
system, a preliminary survey of the existing system will be
conducted. Investigation done whether the up gradation of the
system into an application program could solve the problems and
eradicate the inefficiency of the Existing system.
HARDWARE REQUIREMENTS
Server:-
128 MB RAM
PIII and above processors
2.1 GB Free Space
Router
NIC Card
10BaseT Ethernet Card
Client:-
128 MB RAM
PIII or above
1 GB Free Space
NIC Card
10BaseT Ethernet Card
Software Requirements:
Network Requirements:
LAN connection
Software Specification
Why java?
JAVA technology promises you that you only have to write your
application once for the java platform & then you will able to run it
anywhere (any operating system)
Security:-
Network-Centric Programming:-
Performance
Why MS-Access?
The data stored in each table can be retrieved and updated based on
other tables. MSACCESS is a relational database management
system designed for the graphical environment .With
Tables:
In Tables Data are stored in the format of rows and columns. Every
table in a database focuses on one subject. Each row or record in a
table is a unique instance of the subject of the table.
Queries:
Queries extract data from the table on a user defined criteria. They
enable us to view fields from more than one table.
Feasibility study
is
conducted
in
close
collaboration
with
user
costly
repairs
at
later
stage
when
system
is
implemented.
Avoid crash implementation of the new system.
Avoid the Hardware approach i.e. getting a computer first
and then deciding how to use it.
TECHNICAL FEASIBILITY
ECONOMIC FEASIBILITY
OPERATIONAL FEASIBILITY
ECONOMIC FEASIBILITY:-
This part of feasibility study gives the top management the economic
TECHNICAL FEASIBILITY:-
BEHAVIOURAL FEASIBILITY:-
CHAPTER
SYSTEM
ANALYSIS
The mode is used for developing the Exam Tool as the prototyping
model. Prototyping Model is based on the idea of developing an initial
implementation, exposing this to user comment and defining this
through many until an adequate system has been developed.
Prototype can run back-to-back tests. This reduces the need for
tedious manual checking of test run. The same test is given to both
the prototype and the system under test to look for differences in
the final results and thereby making necessary changes. Thus
prototype serves as a technique of risk reduction.
Event table:-
Event
Trigger
Source Activity
Response
Destinati
on
User
Ask for
form
User
User
selected
User
Login
User
record
User
registra
tion
Create
User
new user registere
record
d
User
User
Nick
name
Add
the Nick
nick name name
in the chat saved
list
User
Look
up IP
for
IP address
address
checked
User
User
selects
other
users
for chat
Look
up User
for other selected
users
User
Enquiry
User
for other
users
SERVER
Message passes
on to the server
broadcasts it on every
clients screen
CLIENT 1
CLIENT N
Registration
Client can add update delete the data from database
Invali Login
Valid Login
Redirect to Chat Client Page
Activity diagram:-
Invali Login
Valid Login
Redirect to chat Client Page
Login
chat
Sequence Diagram:-
aSendMessag
eWindow
client
Message()
Client
* write()
Server
* recieve()
mssgType :=
getMssgType()
[validMssg]
new
aBroadcastMssg
new
LogEntry
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Collaboration Diagram :-
:SendMesseWindow
1 :client Message()
:Client
1.1 * write()
:Server
1.1.2:
new
:BroadcastMssg
1.1.1 * receive()
Dataflow diagram:-
Class Diagram:-
ChatServer
1
1
ChatServerThread 1
ChatLogThread
1
1
ChatLogBuffer
1
ChatSocket
1
1
1 ServerConnetionPool
SocketNumber
Hostname
close()
getConnection(), broadcast()
1
1..*
ServerConnection
0..*
ChatHistoryItem
broadcast()
1
1
ServerSendThread
broadcast()
1
1
ServerReceiveThread
MainWindow 1
ChatClient
exit()
1
DisplayTextArea
1
ClientConnectionThread
ChatSocket
1
displayMsg()
1
ClientReceiveThread
1
SendTextArea
1
ClientSendThread
broadcast()
1 SocketNumber
Hostname
close()
CHAPTER
SYSTEM DESIGN
Component diagram :-
Main Application
Server GUI
ChatServerInterface
DB Magement
Client GUI
ChatClientInterface
Database
Live Chat
Client
Chatting
Server
Maintain
active user
CHAPTER
SYSTEM
CODING
Table name : -
login
Description
Field
Data type
Size
Constraint
Description
username
Text
50
password
Text
50
Keeps the
password of
User
Table name : -
registration
Description
:-
Field
Data type
Size
Constraint
firstname
Text
30
lastname
Text
30
gender
Text
10
Users Gender
Text
30
contact
Text
10
Users Contact
number
username
Text
30
password
Text
30
Primary Key
Description
Users Username
Users Password
In the code testing the logic of the developed system is tested. For
this every module of the program is executed to find an error. To
perform specification test, the examination of the specifications
stating what the program should do and how it should perform
under various conditions.
System testing does not test the software as a whole, but rather
the integration of each module in the system. The primary concern is
the compatibility of individual modules. One has to find areas where
modules have been designed with different specifications of data
lengths, type and data element name.
Validation refers to the process of using the new software for the
developed system in a live environment i.e., new software inside the
organization, in order to find out the errors.
The validation phase reveals the failures and the bugs in the
developed system. We will come to know about the practical
difficulties the system faces when operated in the true environment.
By testing the code of the implemented software, the logic of the
program can be examined. A specification test is conducted to check
whether the specifications stating the program are performing
under various conditions.
Apart from these tests, there are some special tests conducted
which are given below:
This determines whether the new system will handle the volume of
activities when the system is at the peak of its processing demand.
The test has revealed that the new software for the agency is
capable of handling the demands at the peak time.
Storage Testing:
This test determines the amount of the time used by the system to
process transaction data.
Unit Level
Module Level
Integration & System
Regression
UNIT TESTING
MODULE LEVEL :
REGRESSION TESTING:-
Testing Methods:
White box testing is when the tester has access to the internal data
structures and algorithms including the code that implement these.
Test case:
For Login Page
CHAPTER
SYSTEM
IMPLEMENTATION
System implementation:-
Once the planning has been completed, the major efforts are to
ensure that the program in the system is working properly.
At the same time concentrate on training user staff. When the staff
has been trained a full system can carry out.
10
CHAPTER
FUTURE
ENHACEMENT
FUTURE ENHANCEMENTS:-
11
CHAPTER
BIBOLIGRAPHY
BIBLIOGRAPHY:Books referred
Java: The Complete Reference
- by Herbert Schildt
Introduction to Java Programming
- by Y. Daniel Liang
Internet References:www.books.google.co.in
www.howstuffworks.com
www.wikipedia.org
www.javaworld.com
www.sun.com