Sie sind auf Seite 1von 14

1

CHAPTER 1
INTRODUCTION

Background of the study


(DISCUSSION OF MAIN TOPIC, PROBLEM STATEMENTS AND
SPECIFIC TOPIC)
Depletion VoIP is a revolutionary technology that has the potential to
completely rework the world's phone systems. VoIP is often referred to as IP
telephony (IPT) because it uses Internet protocols to make possible enhanced
voice communications.
Objectives of the study
General Objectives:
The general objective of the study is to develop a Voice over Internet Protocol
(VOIP) program generator. It specifically aims:
1.
2.
3.
4.
5.

To design a system that (FEATURES)


To create a prototype as designed
To test and improved the developed prototype.
To evaluate the prototype (REFER TO ISO STANDARD)
Document the result

Scope and Limitation of the study

This study is limited to a voice over internet protocol program generator


that generates and customizes phone services, phones and devices, voice mail
managing, notifications, and call management. A phone service manages calls,
faxes and has a Caller ID tools for both making and receiving calls. In an event a
call maybe diverted to a personal number if permitted.
Significance of the study
VOIP program generator is a system that generates steps and
instructions. The proposed project is a generic program that can be used by any
Office
VOIP Program Generator in the offices generates set of instructions to be
used by the office staff in managing and organizing voice calls.
School
The use of VOIP program generator in school generates VOIP program
that may reduce the costs of telephony communication.
The Future Researchers
This will give information and knowledge that serves as a guideline to
improve their project development.

CHAPTER II
CONCEPTUAL FRAMEWORK

This chapter presents the review of related literature and studies


underlying the framework of the study. It includes the conceptual model of the
study and the operational definition of terms.

REVIEW OF RELATED LITERATURE AND STUDIES

Voip

VOIP is a digital telephone service that uses the public Internet and
private backbones for call transport. VOIP applications are used mostly by the
call centre company or an individual for a cost cutting and managing of calls.
Program generator is a software program that enables an individual to easily
create a program of their own with less effort and programming knowledge.

Communication

Subtopics of this major topic identify what communication is all about. It


also discusses what and how communications are sent and received. There are
different types of communications discussed in this section.

CONCEPTUAL MODEL OF THE STUDY


On the basis of the foregoing concepts, theories and findings of related literature,
studies presents and insights taken from them, a conceptual model is developed
as shown below:
KNOWLEDGE
REQUIREMENTS
1. (write here
the topical
outline)
HARDWARE
REQUIREMENTS
1. Write here the
hardware
requirements
SOFTWARE
REQUIREMENTS
1. (write here
the software
requirements)

DATA GATHERING
1. Conduct
interviews
2. Research
DESIGN
1. (write here the
major
processes of
your proposed
project)
DEVELOPMENT
1. Create a
prototype as
designed
TESTING AND
IMPROVEMENTS
1. Document the
result
2. Evaluate the
prototype In
terms of its
Include here the

VOIP PROGRAM
GENERATOR

EVALUATION

Figure 1: Conceptual Model of the proposed project VOIP Program


Generator.
Knowledge Requirements. This includes the knowledge of the
researchers to develop the proposed project. And also, it includes basic ideas a
user needs to know in able to understand easily the proposed project..
Software Requirements. These are the computer programs that are
going to be used in the system. The proposd project will be created in the Linux
operating system. Trixbox will be used as the Trixbox is an iso image of a preconfigured Asterisk server which makes installation and deployment easier.
Trixbox contains a full version of Asterisk and other pre-configured applications
considered add-ons.
Hardware Requirements. It includes the technical requirements of the
proposed project. A network interface card and network interface devices will be
needed to for the connection of different calls. And the computer unit, with at
least 512Mb RAM, Pentium 4 processor and 10Gb space for the hard disk,
where the users interface with data, through a database, is actually seen.

Operational Definition of Terms


VOIP (Voice over Internet Protocol) is a voice communication over the network
the bridging the gap of communication
IP (Internet Protocol) is a numerical label assigned to the device participating in
a computer network that uses the Internet Protocol for communication

CHAPTER III
METHODOLOGY

This chapter presents the sequence of project development. It also


includes the discussion of methods and actions in developing the project. It also
includes some related information, development procedures and the definition of
a number of viewpoints on how the application was evaluated by the users and
Information Technology specialists.
PROJECT DESIGN
Figure 2 shows the Context-level Data Flow Diagram of the proposed
project. The process is initiated by the user by entering the configured details.
The system then processes the generated program to the user.

Configuration Details

USER

Generated Program

VOIP Program Generator

Figure 2.0 Context Diagram of the proposed project.

USER

10

Figure 3.0 Shows the low level Diagram of VOIP Program Generator
The figure above shows the process of Voice over Internet Protocol
Program Generator. New user needs to create an account before selecting a
program. Upon selecting a program whether school or office selected programs
may be configured depending on the requirements of the user. Every Program
configured will be checked and update for verifications and clarification. All
programs that are configured and updated may be viewed by the user.

11

PROJECT DEVELOPMENT

In developing the project, the researchers undergone different activities


shown in figure 5 which identifies the analysis, resources in designing the project.
The activities involved are illustrated below: (refer to the model that you used ex:
waterfall model)

BEGIN

Data and Information Gathering

Study and Analysis of the Information gathered

System Design
Yes
System Development

Accepted?

No

System Unit Testing

Documentation

END

12

Figure 5. Project Development Flowchart


Data and Information Gathering
Data and information gathering related to the development of the study were
conducted. Several tools were used to perform this task. This includes playing
existing games, researching new and existing game concepts, observing gaming
trends, evaluating successful games and researching in different school libraries.
Study and Analysis of the Information Gathered
The pieces of information gathered were analyzed. Useful information was
comprehensively utilized. Data flow diagrams and conceptual diagrams were
used as tools.
System Design
In the system design, all pertinent input data and required outputs were
determined and planned. The design was made according to JMonkeyEngines
Application API game loop, this creates multithreaded game loops. Making the
game fast and the source code is much more maintainable.
System Development
This is the process of writing algorithms and coding with a specific
programming language. Java programming language was used. This is the
phase of the development where Object Oriented Programming knowledge and
skill are required.

13

System Evaluation
User participation is very important. The system was evaluated by wouldbe users.
Documentation
Documentation is the last phase in project development. The preparation
of the users manual to guide the end-users in manipulating the game was the
main activity of this phase.

OPERATION PROCEDURE

OPERATING PROCEDURE
The following figure presents the system flow with the integration of
Security Profile System process.

Username & Password


Recognition

Magnetic Card
Recognition

Decrypted
Information

Security
Restriction

Encrypted
Information

Security Profile
System
Users Concern

Records of Profile

14

Figure 6. Security Profile System Process


Figure 6 shows the procedures to be done to make the system
operational. It indicates the processes that clearly describe the system. The user
will proceed to the authentication processes which are the username and
password recognition, and then to magnetic card recognition to verify the user if
he/she is authorized. The authorized user must respond to correct security
measures to access the profiles. The authorized user will browse the selection
link and proceed to his/her concern. The system will now respond the request of
the user.

Das könnte Ihnen auch gefallen