Sie sind auf Seite 1von 100

Final Year Project Report

MULTIMEDIA CASTING OVER LAN


B.S. Computer Engineering, Batch 2002

Project Advisor
Mahjabeen Tahir
Lecturer
SSUET

Submitted by
Muhammad Yasir Siddiqui 2002-CE-075
Muhammad Tariq 2002-CE-106
Shahzad Akhtar 2002-CE-082
Muhammad Kazim 2002-CE-100

DEPARTMENT OF COMPUTER ENGINEERING


Sir Syed University of Engineering and Technology
University Road, Karachi – 75300

January 2006
PREFACE

According to this report, we are going to spread a new style of streaming which will
handle you in many dimensions of the communication. In term of communication, we
have different bridges but there is more powerful bridge of communication like
computer networks. This report is all about the information streaming over the
computer networks. There is much information in the world which is easily
understood by the target user. This information has the flavor of multimedia
extensions which look very well with respect to target eyes. When these type of
extensions come over the computer network so generate the maximum response with
in communication.

Multimedia is the extension of meaningful communication with respect to sender and


receiver ends. Video, Audio, Visual presentations are the basic blocks of today’s and
forthcoming communication. Multimedia information precise your information in
very attractive and meaningful style. Multimedia streaming is the powerful bridge of
communication which is doing best by computer networks. Everybody in the world
wants to say attractive body and verbal language but multimedia streaming gives you
attractive communication language.

When we are going to communicate, we should have any medium of communication


but according to this report, we are exploring the computer networks types in term of
medium size of industrial pool. Computer networks join together for the near and
Tele-communication phenomenon. If you have the computer network, you want to
share information with attractive and meaningful styles. LAN is most powerful and
high through put bridge of communication which describe you the information
through multimedia casting.

The only prerequisite things for this are to find some knowledge about the multimedia
streaming over the computer networks. There are many hidden truth in the multimedia
world because everybody is moving to attractive and meaningful communication with
respect to smart machine throughput.
ACKNOWLEDGMENT

First of all we would like to thank Vital Force only ALLAH for blessing us with the
mental and physical abilities with the help of which we were successfully able to go
through this project and bring it to the final stages of completion.

We would like to thank our teacher Ms. Mahjabeen Tahir who guided us through out
in every difficulty and provided us with the best solutions of problems through her
professional approach and experience.
INTRODUCTION TO GROUP MEMBERS

Muhammad Yasir siddiqui 2002-CE-075


Network Programming + Research + Overall integration of project
Immediate Contact: 0333 2109785, Email: be_yasir@hotmail.com

Muhammad Tariq 2002-CE-106


Programming + Research + UML + Report + Database Management
Immediate Contact: 0300 2716858, Email: specialist106@hotmail.com,
specialist106@yahoo.com

Shahzad Aakhter 2002-CE-082


Programming + Network configuration + Report
Immediate Contact: 021 6631529, Email: shah_ce082@hotmail.com

Muhammad Kazim 2002-CE-100


Network Configuring + Research + Report integration
Immediate Contact: 0321 2091481, Email: mkazim4u@yahoo.com
CERTIFICATE OF COMPLETION

This is to certify that the following students

Muhammad Yasir Siddiqui 2002-CE-075


Muhammad Tariq 2002-CE-106
Shahzad Akhtar 2002-CE-082
Muhammad Kazim 2002-CE-100

have successfully completed their final year project named

MULTIMEDIA CASTING OVER LAN

in the partial fulfillment of the Degree of Bachelor of Science in


Computer Engineering.

MAHJABEEN TAHIR
Assistant Professor
SSUET
CERTIFICATE OF COMPLETION

This is to certify that the following students

Muhammad Yasir Siddiqui 2002-CE-075


Muhammad Tariq 2002-CE-106
Shahzad Akhtar 2002-CE-082
Muhammad Kazim 2002-CE-100

have successfully completed their final year project named

MULTIMEDIA CASTING OVER LAN

in the partial fulfillment of the Degree of Bachelor of Science in


Computer Engineering.

Dr. Imran Ali Tasadduq


Chairman
Computer Engineering Department
SSUET
CONTENTS

Chapter 1 Introduction

1.1 Goal & Objective


1.2 System statement of scope
1.3 System context
1.4 Theoretical Background of project
1.5 Technology & Tools used in the project

Chapter 2 Usage scenario / User Interaction

2.1 User profile


2.1.1 Administrator
2.1.2 Managing Director
2.1.3 Employee
2.1.4 Teacher/Instructor
2.1.5 Student
2.1.6 Team Leader
2.1.7 Stock Exchange Manager
2.1.8 Stock Exchange Employee

2.2 Use-cases
2.3 Specials usage considerations
2.3.1 User Interface
2.3.2 Hardware Interface
2.3.3 Software Interface
2.3.4 Communication Interface
2.3.5 Deployment Interface

Chapter 3 Functional & Data Description

3.1 System Architecture


3.1.1 Architecture model
3.2.2 Modules overview

3.2 Data Description


3.2.1 Major Data Objects/Signal Specification
3.2.2 System Level Data Mode
3.3 System Interface Description

3.3.1 External Machine Interface


3.2.2 External System Interface
Chapter 4 Subsystem/Module Description

4.1 Description for Subsystem ‘n’


4.1.1 Subsystem scope
4.1.2 Subsystem flow diagram/ desired UML
diagram
4.1.3 Algorithmic/protocol model
4.1.4 Restrictions/limitations
4.1.5 Performance issues

Chapter 5 Behavioral Model and Description

5.1 Description for system behavior


5.1.1 Events/interrupts
5.1.2 States
5.2 State Transition Diagrams
5.3 Control specification

Chapter 6 System Prototype Modeling and Simulation Results

6.1 Description of system modeling approach


6.2 Simulation results
6.3 Special performance issues
6.4 Prototyping requirements

Chapter 7 System Estimates and Actual Outcome

7.1 Historical data used for estimates


7.2 Estimation techniques applied and results
7.2.1 Estimation Technique
7.2.2 Estimate For Technique
7.3 Actual Results and Deviation from Estimates
7.4 System Resources
7.4.1 System Resources Required
7.4.2 System Resources Used

Chapter 8 Test Plan

8.1 System Test and Procedure


8.2 Testing strategy

8.2.1 Unit Testing


8.2.2 Integration Testing
8.2.3 Validation Testing
8.2.4 High-Order Testing

8.3 Testing Resources and Staffing


8.4 Test Metrics
8.4.1 Architectural Design Metrics
8.5 Testing Tools and Environment
8.6 Test Record Keeping and Test Log

Chapter 9 Future Enhancements and Recommendations

9.1 Wireless Environment


9.2 Ad-Hoc Environment
9.3 VPN Environment

Chapter10 Conclusion / Summary


SYNOPSIS

In addition to being a gigantic, commercial, meaningful and entertainment, the


computer network is the world’s biggest library. There is information available on
every conceivable topic, making some one to understand you in attractive meaningful
style because you may the managing director or country manager. Of course, you
have the powerful communication way to present yourself stylish. Multimedia is the
collection of attractive and meaningful extensions. Of course you can communicate
with these extensions over the network.

Multimedia is collection of video, sound, images, text, and animation extensions. By


using multimedia casting you can interact through smart way to the people. By raising
media war, there are much attractive and meaningful information over the any
medium of communication. Everybody in the world wants to present him/her in
powerful communication style. Multimedia communication is the master piece of
information spreading phenomenon. There are documentary, educationally and
informational casting which build you in your desire industrial pool. Information are
getting reduction in size but getting increment in communication style. Where ever
you are, you always want to like stay in better environment but It can give you better
present style of your information. In every department of daily life, we are seeing
improvement in every communication. Offices, education and commercially we want
to get some information in better style rather than hunky panky style. Yes every
department of life want to get processing by electronically.

In the world of computer networks, we want to share information in attractive and


meaningful style. Now today computer networks are strongly use for communication
either this is for near or far in distance. Computer network provide you global services
of information sharing either it is about academic information, offices information,
current events information and commercial information. There are many standards of
computer network in term of LAN and WAN but we are considering LAN Ethernet
standard for medium and small environment. Now a day there is high efficiency and
maximum throughput over Ethernet standards. Multimedia is the bandwidth of data
when it is traveling over the network. According to heavy communication we are first
considering LAN environment for get Quality of services. LAN is the high bandwidth
medium of the network communication due to its configuration. LAN has the
capability of streaming multimedia with respect to quality of services.

Multimedia Casting over LAN provides you streaming of multimedia extensions. By


raising heavy communication extension, it is very reliable, available and intractable
tool for high bandwidth of data streaming. According to this project, you can
communicate through multimedia extension which define your communication
language very attractive able and meaningful. This project provide you a co-operative
medium of communication by using multimedia extensions like Video, Audio,
Pictures, Animation, Visual Text etc.
Chapter 1 Introduction

1 Introduction
In addition of the attractive, meaningful and quality of communication, there is most
descent and powerful extensions for desire and quality communication. Yes we have
the multimedia extensions pool to get highly attractive and meaningful style. When
ever these types of extensions come over the communication medium it means you
can spread your messages in very excellent communication language. Quality of
communication is the part of marketing, advertising and business point of view.
Whenever you are communicating over the computer networks, you should apply
attractive communication language otherwise your delivered information can sink by
the network traffic.
Multimedia is collection of video, sound, images, text, and animation extensions.
These types of extensions give you very attractive and stylish quality of
communication. By raising media war, everybody wants to on-air himself by gigantic
and attractive communication. In this project, multimedia extensions are the acid of
communication over the computer network. We can stream video, audio in term of
live as well stream real time video and voice to the listener. We can also provide live
presentation of the reports and documents. Multimedia extensions enable you to
spread all information over the computer network.
Every communication has the medium. According to this project we adopt computer
network for the communication bridge and deploy it in very secure manner. Now a
day’s computer network provides different security but according this project we
produced basic security in term of authorization and authentication. According to this
project, authorization is term of rights which is related to server side and
authentication is term to access rights by right hands. Database server is in action for
maintaining access control profile. Database server provided security over the
application level but in IP level we used secure socket layer (SSL) and Domain name
system (DNS). Operating system has the major role to apply extra valuable services in
term of network protocol, database and securities.

Sir Syed University of Engineering & Technology 1


Chapter 1 Introduction

1.1 Goals and objectives


According to this project objective, we have to provide a vital communication over
the local area network. In term of communication information we have to on-stream
attractive and meaningful information which describe quality of communication
language. On-stream information has to give excellent view to the target user. Either
target users belong to company or education or commercial, they should want good
looking information for interaction. Multimedia extensions have the attractive and
meaningful style. Every communication language surround by these extensions.
Multimedia extensions should have minimum resources but have stylish presentation
over the any communication medium. The most crucial objective of this project is that
apply the any communication language with minimum resources. Communication
medium has to more reliable and available with respect to target users. According to
this project, we have to develop a secure and errorless network for heavy
communication extensions. This network has to follow security in term of
authentication and authorization. Network has to without any virus or threat. The
carriers (protocols) of information have to more reliable and errorless over the bulky
communication.
According to project goal, there are some major terms related to on-stream
information and the on-communication medium. On-stream information has to travel
over the medium with out any tolerance and delay. Information will not loose required
bandwidth and frame rate with respect to multimedia extensions. Multimedia
extensions should have the same quality rate to the target user. Quality of service will
be considered over the on-stream information by using some medium statistics and
calculations. Local area network will use as a communication medium, to apply
maximum throughput over the on-stream information. Ethernet is the tool in term of
local area network management. This network standard will handle the security and
performance issues during communication. Ethernet will provide operating system
services in term of performance, integration and supervision.

Sir Syed University of Engineering & Technology 2


Chapter 1 Introduction

1.2 System statement of scope


System scope will explore in different flavor with respect to input, processing and
outputs. This project is quit looking different with respect to its requirement. This
project will allows you to gather multiple of information with respect to scope.

Communication Medium
Medium of communication is the input and process unit for performing different
functionality in term of project life cycle. Communication medium shows like local
area network with respect to security and quality purpose. Communication medium is
the tool to stream information to the desire target.

Address Naming

This is the processing over the transmission medium addressing. This project will deal
heaving transmission of information that needs some extra-ordinary operation during
streaming. Address/IP naming is operating addressing of on-stream information.
There is not static IP addressing due to heavy streaming. According to handle quality
of streaming, we will refresh destination addresses and put special addresses for
specific clients. This will help us for security purpose with respect to authorization
and authentication.

Multimedia Extensions
Multimedia extensions are the major inputs of the project life cycle. In multimedia we
have several extensions of information for communicating in right and desire way.
Multimedia extensions are the on-stream extensions which have to operate in both end
of Communication Bridge. These are the inputs as well as the outputs in different
scenarios. Multimedia extensions are the block of on-stream information which will
deal by the project processing unit.

Process Units
Project processing unit has some sub units which will take their own functional
department. The real functionality of this project is to stream multimedia extension
over the local area network in term of quality factor. There are many sub system for
processing like authorization, authentication, streaming, controlling and measuring.
Process unit can be the embedded form of different units which interconnect and
communicate to each other with respect to the requirement.

Sir Syed University of Engineering & Technology 3


Chapter 1 Introduction

Quality of Streaming
This is the major output of this project with respect to get quality of on-stream
information. In this project quality measurement is operated by the process unit and
applies other tool for getting desire and actual stream of information. Output should
be in acceptable skeleton according to project life cycle.

Client or End User


According to this project, client/end user is the most important part in term of project
life cycle. This project will deal communication between the persons by suitable
medium. Client will behave as a technical and co-operative employee of any
industrial pool rather than a user will behave as a commercial and entertainment.

1.3 System Context

According to system context view, we have big picture with respect to business,
market, commercial and product domain scope. This system is classified into many
places of departments. This system has better scope, availability, reliability and
integrity with respect to domain and market scope.

According to business point of view, we are considering the advertisement behavior


by this system. This system will give the attractive and good looking of advertisement
for getting full response of target user.

According to market point of view, system has attractive extensions that up the
market presentation in stylish manner. You may market your product or anything by
showing its all benefit by using attractive presentation.

According to co-operative point of view, system will give the quality of interaction
between the company employees. They are very accurate and update by using the
presentation of desire goal of team management.

According to education point of view, system creates a handsome and noiseless


environment for teacher and student. Teacher will concentrate to his/her lecture rather
than to control student at the front of white board. Student will completely converge
him/her self over the lecture.

Sir Syed University of Engineering & Technology 4


Chapter 1 Introduction

1.4 Theoretical Background


For a long time now, its been very easy to download and play back high-quality
multimedia files (Video,Audio,Pictures,Animation etc) from the Internet. Current web
browsers and servers support full-file transfer mode of document retrieval. However,
full file transfer means very long, unacceptable transfer times and playback latency.
Ideally, video and audio should be streamed across the Internet from the server to the
client in response to a client request for a Web page containing embedded videos. The
client plays the incoming multimedia stream in real time as the data is received.
Audio streaming is becoming widely accepted and deployed. In particular,
Progressive Networks' RealAudio has a wide following. Although streaming audio
programs are considerably further along than video, they are still nowhere near typical
computer-sound quality. The idea of streaming video over the network has been
gaining a lot of interest. The current Internet is a best effort network and interconnects
sites with widely varying bandwidth capabililties. In the future the Internet will see
the rollout of ATM, RSVP with the ability to control Quality of Services (QoS) and
mobile networks with widely varying QoS. Therefore it will remain a very
heterogeneous network. In this report firstly we present a brief review of the current
video compression standards, evolving standards and techniques and the internet
transport protocols being deployed. In addition, issues such as the need for servers,
plugins and firewall penetration are discussed. There are many commerical streaming
video products becoming available as well as many research projects in this area. We
then review the currently available commercial products which purport to provide
video streaming capabilities over the Internet and out line their current limitations.
Then we describe the major research projects currently underway, which are
attempting to solve some of these limitations. Finally we compare and evaluate the
SuperNOVA project with respect to other research projects and the cur rent
commercial products.

According to this project, there are so many white papers and research behind its
development. This project has solid background with respect to history because there
are so many applications are behaving like it. In this project we have covered a
powerful application system over the network. There are so many terminologies in
this project in term of research and learning point of view like. First we have

Sir Syed University of Engineering & Technology 5


Chapter 1 Introduction

introduced multimedia extensions in this project. Multimedia is collection of


meaningful and attractive data/information.

Local Area Network

Multimedia casting over LAN

Switch

Multimedia
Casting Server
Multimedia receiver Clients
Multimedia casting over LAN
Figure 1.4.1

By using multimedia extension, we have improved communication language by mean


meaningful communication. Multimedia extension provide stylish and good looking
preview for its listener or target user. By raising media war, everybody wants to
communicate in stylish and attractive manner. Either you related to business,
marketing and education environment you have to communicate in meaningful and
attractive manner otherwise your target person ignore you. Now a day there are so
many improvements in communication language by mean of multimedia extensions.

Sir Syed University of Engineering & Technology 6


Chapter 1 Introduction

Multimedia is collection of video, voice, animation, sound, pictures and text etc. these
extension are the basic block of today’s communication.

Computer network is the largest environment in this world. According to this project
we have consider LAN (Local Area Network) environment for Communication
Bridge. The every network environment derived from the LAN because it is the basic
environment of computer network. LAN is single administrator environment with the
range of 1 Km it may exceed upon specific conditions. Multimedia is the heavy and
consumes space extension because it is so visualized and attractive. It stream over
heavy bandwidth that’s why we considered LAN environment that provided desire
area of bandwidth. We considered Ethernet standard for multimedia streaming
because of its high data rate and bandwidth. LAN environment is very reliable and
available for heavy transfer rate over computer network. It is easy to interface,
configure and support. According to theoretical background, we have collected
information of multimedia streaming in many applications like Windows Net Meeting
3.0. Multimedia streaming very accurate in LAN environment because there is no lost
of data/ information due to high data rate and bandwidth.

Streaming multimedia extensions across networks is an effort that is attracting many


participants. It's called "streaming" because the sound and picture data flow in a
digital stream from a server computer to your computer, ready to hear or view in real
time, without having to download all of the content before you can enjoy it. It comes
to you in a stream of digital bits... hence the term "streaming."This is evidenced by
the eight primary commercial and thirteen research organisations involved with this
technology in various ways. A key characteristic of both the commercial products and
research demonstrators is the diversity in technological infrastructure e.g. networks,
protocols, compression standards supported.

Multimedia files can be very large. You would spend many minutes or even hours
waiting for them to be downloaded to your computer if they weren't streamed.
Streaming media technology allows you to see or hear the content in just a few
seconds, instead of having to wait for it. Your only wait is a few seconds for a
"buffer" to be built up that helps avoid interruptions caused by Internet traffic
problems.
In the majority of cases streaming media is used to maintain control over the

Sir Syed University of Engineering & Technology 7


Chapter 1 Introduction

distribution of the media files (because it is difficult to capture streaming video and
audio).

According to this project, we considered many history applications about multimedia


streaming that’s why we found a new look and style of multimedia communication.
There are so many applications available for streaming but there is some problem
when you are streaming at cooperative environment. This project is the powerful tool
in cooperative environment by mean of security. There is central multimedia server
that controls his multimedia client according to his/her privilege. This application is
very cooperative in such type of environment where some secure multimedia
streaming required. Multimedia clients restrict over one central multimedia server.
Every on-streamed data is provided by multimedia server by mean of secure
streaming. By using central multimedia server, we have streamed informative
information to different multimedia client and obviously they would concentrate at
the on-streamed information. You will stream that type of information that you want
to send to your target user. Multimedia clients really dependent on the multimedia
server that make it cooperative with his/her team leader, CEO, Director and Teacher
etc.
Video Streaming
Audio Streaming
Real Time Voice Streaming
Real Time Video Streaming
Live Presentation Streaming
Remote Streaming
Secure Shared Files Streaming
Table 1.4.1

According to this project, we covered many multimedia extensions for streaming.


Video and audio is the major on-stream extensions but there is live presentation of
documents as well remote streaming of files. They all operations conducted by
multimedia server for organizing a better communication environment by mean of
security. There is no application available in front of it by mean of these types of
services. This project provided Qos (Quality of Services) in term of on-stream data
because there are some critical issues about on-stream data quality. This project is
supported following streaming.

Sir Syed University of Engineering & Technology 8


Chapter 1 Introduction

1.5 Technology & Tools/hardware components


According to this project, we have used different technology and tool/hardware with
respect to project management. Technology embedded in to many environment either
it belong to operating system, development tool, application tool, configuring tool and
third party software. Technology and tool emphasis into network and software which
are describe below.

LAN Standard 802.3

Ethernet protocols refer to the family of local-area network (LAN) covered by the
IEEE 802.3. In the Ethernet standard, there are two modes of operation: half-duplex
and full-duplex modes. In the half duplex mode, data are transmitted using the
popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a
shared medium. The main disadvantages of the half-duplex are the efficiency and
distance limitation, in which the link distance is limited by the minimum MAC frame
size. This restriction reduces the efficiency drastically for high-rate transmission.
Therefore, the carrier extension technique is used to ensure the minimum frame size
of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. Like in 802.3
header.

7 1 2 or 6 2 or 6 2 0-1500 0-46 4
Preamble Destination Source Data Pad Checksum
address address

Start of frame delimiter Length of data field

Table 1.4.2

Sir Syed University of Engineering & Technology 9


Chapter 1 Introduction

LAN Environment

Figure 1.4.2
1. The physical medium used to carry Ethernet signals between computers.
2. A set of medium access control rules embedded in each Ethernet interface that
allow multiple computers to fairly arbitrate access to the shared Ethernet channel.
3. An Ethernet frame that consists of a standardized set of bits used to carry data
over the system.
Application Data Network Traffic Network Requirements
Type/ Impact
Size
Scientific GB Increase in large files Higher bandwidth
Modeling Large bandwidth desktop, server,
required backbone
Publications 100s of Increase in large files Higher bandwidth
Imaging MB Large bandwidth desktop, server,
required backbone
Internet Audio, Increase in large files Higher bandwidth
Intranet Video Large bandwidth desktop, server,
Extranet 1-100 required backbone, low latency
MB Low latency necessary
Data TB Increase in large files Higher bandwidth
Warehousing Large bandwidth desktop, server,
Net. Backup required backbone, low latency
Fixed time of
transmission
Conferencing 1.5-4 Class of service Higher bandwidth
Whiteboard Mbps required desktop, server,
High volume of data backbone, low latency

Ethernet Standards
Table 1.4.3
Microsoft Windows 2003 Server
Windows Server 2003 operating systems take the best of Windows 2000 Server
technology and make it easier to deploy, manage, and use. The result: a highly
productive infrastructure that helps makes your network a strategic asset for your
organization. Windows Server 2003 operating systems ship with Windows Server
Service Pack 1 (SP1). Windows Server 2003 SP1 provides enhanced security,
increased reliability, and a simplified administration to help enterprise customers
across all industries. Windows Server 2003 includes all the functionality customers
need today from a Windows Server operating system to do more with less, such as
security, reliability, availability, and scalability. Windows Server 2003 is a

Sir Syed University of Engineering & Technology 10


Chapter 1 Introduction

multipurpose operating system capable of handling a diverse set of server roles,


depending on your needs, in either a centralized or distributed fashion.

File and print server.


Web server and Web application services.
Mail server.
Terminal server.
Remote access and virtual private network (VPN) server.
Directory services, Domain Name System (DNS), Dynamic Host Configuration
Protocol (DHCP) server, and Windows Internet Naming Service (WINS).
Streaming media server.
Windows 2003 Services
Table 1.4.4

Windows Server 2003 contains core technologies that build on the strengths of
Windows 2000 Server to deliver a superior and cost-effective server operating system.
Learn about the many new features and technologies that make Windows Server 2003
an ideal server platform for organizations of any size. Windows 2003 has a lot of
supreme tools for business and communication environment but we found some of
them for this project management.
• Availability
• Scalability.
• Security.
• The common language runtime
• Active Directory
• Management services
• Storage management
• Networking and communications
• Windows Media Services
• Microsoft Active Directory Service
Originally inspired by the emergence of LDAP-based solutions in the mid-1990s,
organizations have had success in deploying directory-enabled business solutions for
key problems such as network operating system (NOS) user support, public key
infrastructure (PKI) deployment, white pages or yellow pages access, extranet or Web
single sign on (SSO) capabilities, and line-of-business applications.

Sir Syed University of Engineering & Technology 11


Chapter 1 Introduction

Active Directory Application Mode achieves this goal without the burden of
expensive training, additional licensing, or operational costs that can be incurred by
the installation of an additional directory technology to support directory-enabled
applications. Active Directory Application Mode is a new capability in Active
Directory that addresses certain deployment scenarios that are related to directory-
enabled applications. ADAM runs as a non-operating-system service, and, as such, it
does not require deployment on a domain controller. Running as a non-operating-
system service means that multiple instances of ADAM can run concurrently on a
single server, and each instance can be configured independently.
Active Directory Application Mode represents a breakthrough in directory services
technology that overcomes the previously mentioned obstacles, maintains flexibility,
and helps organizations avoid increased infrastructure costs. Active Directory
Application Mode is easily installed or uninstalled on developer workstations. This
allows rapid restoration to a clean state during the application prototyping and
development process.
You can use Active Directory Application Mode effectively in the following
scenarios:
 Application-specific directory scenarios
 Application developer scenarios
 Extranet access management (EAM) scenarios
 Migration scenarios
Developers, end users, and ISVs can easily deploy Active Directory Application
Mode as a lightweight directory service on most Windows Server 2003 platforms and
on Windows XP Professional. You can easily install, reinstall, or remove the ADAM
application directory, making it the ideal directory service to deploy with an
application. Because Active Directory Application Mode is integrated with the
Windows security model, any application that is deployed using ADAM can
authenticate access against Active Directory across the enterprise. An application
owner can easily deploy directory-enabled applications without affecting the directory
schema for the entire organization, while continuing to use the identity information
and credentials that are stored in the organization’s NOS directory. Applications that
use Active Directory Application Mode have the same reliability, scalability, and

Sir Syed University of Engineering & Technology 12


Chapter 1 Introduction

performance that they have with deployments of Active Directory in the NOS
environment.

Figure 1.4.3

With Active Directory Application Mode, for the first time you can employ a single
directory technology in multiple roles, while preserving investments that you’ve made
in administrator training; operations; licensing; and, most importantly, security.
Organizations, ISVs, and developers can use Active Directory in multiple roles,
without having to face the increased costs associated with deploying multiple
technologies for both an NOS directory and an application directory.

Microsoft DHCP Server

The Microsoft Windows 2000 Server network operating system includes an enhanced
implementation of Dynamic Host Configuration Protocol (DHCP). This includes
integration of DHCP with domain name system (DNS), enhanced monitoring and
statistical reporting for DHCP servers, new vendor-specific options and user-class
support, multicast address allocation, and rogue DHCP server detection. Also

Sir Syed University of Engineering & Technology 13


Chapter 1 Introduction

included is a discussion of Windows Clustering, a part of Windows 2000 Advanced


Server. DHCP for Windows 2000 is open and based on industry standards, supporting
Requests for Comments (RFCs) 2131 and 2132.

Figure 1.4.4

The Microsoft® Windows® 2000 Server network operating system builds on the
longstanding Microsoft support for Dynamic Host Configuration Protocol (DHCP),
an open, industry standard that reduces the complexity of administering networks
based on TCP/IP. Each host computer connected to a TCP/IP network must be
assigned a unique IP address. DHCP frees network administrators from having to
configure all of the computers by hand.
TCP/IP is the global network protocol of choice, especially for corporate intranets
adopting Internet technology. However, configuring and administering TCP/IP
network clients have traditionally been time-consuming and costly. This is why
Microsoft, as a member of the Internet Engineering Task Force (IETF), was an early
advocate for having dynamic IP addressing technology and worked closely with other
IETF members to create the DHCP solution.
DHCP is open and standards-based, as defined by IETF Requests for Comments
(RFCs) 2131 and 2132. DHCP can automatically configure a host while it is booting
on a TCP/IP network, as well as change settings while the host is attached. This lets
all available IP addresses be stored in a central database along with associated
configuration information, such as the subnet mask, gateways, and address of DNS
servers.

Sir Syed University of Engineering & Technology 14


Chapter 1 Introduction

DHCP makes life easier for network administrators, and the larger the network, the
greater the benefit. Without dynamic address assignment, clients have to be
configured one by one. IP addresses must be managed to avoid duplicate use.
Changes must be applied to clients by hand. Configuration information is not
centralized; and it is difficult to get a view of all client configurations.

Microsoft SQL Server 2000


Microsoft SQL Server 2000 is a full-featured relational database management system
(RDBMS) that offers a variety of administrative tools to ease the burdens of database
development, maintenance and administration. In this article, we'll cover six of the
more frequently used tools: Enterprise Manager, Query Analyzer, SQL Profiler,
Service Manager, Data Transformation Services and Books Online.

SQL Server 2005 provides many new and enhanced business intelligence (BI)
features designed to give you a competitive advantage. These advantages include
integrating multiple data sources with Integration Services; enriching data and
building complex business analytics with Analysis Services; and writing, managing,
and delivering rich reports with Reporting Services. Review the following product
and technical resources and other information designed to help you improve BI in
your organization. Easily integrate data from a wide range of operational and
enterprise data sources, and gain competitive advantage through a holistic view of
your business.
Gain an integrated view of all your business data as the foundation for your traditional
reporting, OLAP analysis, scorecards, and data mining.
Deliver the information employees need to make better business decisions—in
virtually any business environment. Explore data, discover patterns, and apply these
patterns to business operations with an easy-to-use, extensible, accessible, and
flexible platform.

Microsoft .Net Frame Work

The .NET Framework is a new computing platform that simplifies application


development in the highly distributed environment of the Internet. The .NET
Framework is designed to fulfill the following objectives:

Sir Syed University of Engineering & Technology 15


Chapter 1 Introduction

• To provide a consistent object-oriented programming environment whether object


code is stored and executed locally, executed locally but Internet-distributed, or
executed remotely.
• To provide a code-execution environment that minimizes software deployment
and versioning conflicts.
• To provide a code-execution environment that guarantees safe execution of code,
including code created by an unknown or semi-trusted third party.
• To provide a code-execution environment that eliminates the performance
problems of scripted or interpreted environments.
• To make the developer experience consistent across widely varying types of
applications, such as Windows-based applications and Web-based applications.
• To build all communication on industry standards to ensure that code based on the
.NET Framework can integrate with any other code.

The .NET Framework has two main components: the common language runtime
and the .NET Framework class library. The common language runtime is the
foundation of the .NET Framework. You can think of the runtime as an agent that
manages code at execution time, providing core services such as memory
management, thread management, and remoting, while also enforcing strict type
safety and other forms of code accuracy that ensure security and robustness. In fact,
the concept of code management is a fundamental principle of the runtime. Code that
targets the runtime is known as managed code, while code that does not target the
runtime is known as unmanaged code. The class library, the other main component of
the .NET Framework, is a comprehensive, object-oriented collection of reusable types
that you can use to develop applications ranging from traditional command-line or
graphical user interface (GUI) applications to applications based on the latest
innovations provided by ASP.NET, such as Web Forms and XML Web services.

The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of managed
code, thereby creating a software environment that can exploit both managed and
unmanaged features. The .NET Framework not only provides several runtime hosts,
but also supports the development of third-party runtime hosts.

Sir Syed University of Engineering & Technology 16


Chapter 1 Introduction

Internet Explorer is an example of an unmanaged application that hosts the runtime


(in the form of a MIME type extension). Using Internet Explorer to host the runtime
enables you to embed managed components or Windows Forms controls in HTML
documents. Hosting the runtime in this way makes managed mobile code (similar to
Microsoft® ActiveX® controls) possible, but with significant improvements that only
managed code can offer, such as semi-trusted execution and secure isolated file
storage.

Figure 1.4.5

The .NET Framework class library is a collection of reusable types that tightly
integrate with the common language runtime. The class library is object oriented,
providing types from which your own managed code can derive functionality. This
not only makes the .NET Framework types easy to use, but also reduces the time
associated with learning new features of the .NET Framework. In addition, third-party
components can integrate seamlessly with classes in the .NET Framework.

• Console applications.

Sir Syed University of Engineering & Technology 17


Chapter 1 Introduction

• Windows GUI applications (Windows Forms).


• ASP.NET applications.
• XML Web services.
• Windows services.

Microsoft Visual C#
Visual C# .NET 2003 is the comprehensive toolset for creating XML Web services
and Microsoft .NET—connected applications for Microsoft Windows® and the Web.
This robust development package, which uses the component-oriented C#
development language, offers beginning and intermediate developers with C++ or
Java experience a modern language and environment for creating next-generation
software. Visual C# 2003 delivers superior functionality for streamlining business
processes, including:

• Rapid design, development, and deployment support for creating and consuming
Web services.
• Form designers and visual controls for creating rich Windows-based applications.
• Authoring tools and services for building powerful Microsoft .NET server-based
solutions.
• Migration tools for converting Java-based projects to the Microsoft .NET
development environment.

With Visual C# .NET 2003, developers can build solutions for the broadest range of
clients, including Windows, the Web, and mobile or embedded devices. Using this
elegant programming language and tool, developers can leverage their existing C++
and Java-language skills and knowledge to be successful in the .NET environment.
Visual C# .NET 2003 includes a powerful remote and multi-language debugger,
enabling developers to test applications and build reliable multi-tier solutions that
span process boundaries and are written in multiple programming languages. Note:
Remote debugging is available only in Visual Studio .NET Professional Edition and
higher. Employ "unsafe" code to call native Windows APIs, use pre-built COM
components, and leverage existing ActiveX® controls to seamlessly integrate existing
applications and components.

Sir Syed University of Engineering & Technology 18


Chapter 1 Introduction

Microsoft ADO.Net
With ADO.NET, developers gain access to more powerful components, such as the
Dataset class and a strongly typed programming model that provides IntelliSense and
statement completion for data access code. Unlike classic ADO, ADO.NET is
optimized to provide the very best performance and scalability for both connected and
disconnected data-centric applications.

The Data Set class is a great way to query and update data while minimizing the time
necessary to hold onto a costly connection to the database. Classic ADO was great for
sending and receiving data; however, there were limited ways to work with the data
once the developer closed the connection. This lead many developers down a path that
limited the performance, responsiveness, and scalability of their system. The Data Set
acts like an in-memory copy of the database, including multiple tables, relationships,
and the ability to track the original and new values. In this way, a portion of the
database can be brought down to the client via the Data Set class, updated with new
data, and then sent back to the server to be merged back into the database. Using
Visual Basic .NET and ADO.NET, developers can quickly be productive and create a
data management application with minimal coding involved. The Data Adapter
Configuration Wizard can generate all of the code necessary to select, insert, update,
and delete data from any table in the database. Further, unlike classic ADO, it
provides the developer with the ability to customize each SQL command and can
even create the stored procedures.

ADO .NET

Sir Syed University of Engineering & Technology 19


Chapter 1 Introduction

Figure 1.4.6

ADO.NET includes new data providers that were specifically created to talk directly
to databases such as SQL Server 7.0 or greater. This can provide a performance boost
since the Visual Basic .NET code doesn’t need to traverse through multiple API
layers before it gets to the actual database. This makes database calls faster and far
more efficient. There is also a data provider for OLEDB-supported databases and
even some new data providers that offer direct access to other databases such as
Oracle. ADO.NET builds upon previous versions of data access models. And since it
is tightly integrated into the .NET Framework and the Visual Studio .NET IDE, it
provides the power and productivity required by developers.

Microsoft Direct X
Every component of DirectX 8.0 has received major new features that greatly
enhance the capabilities of DirectX. Three components have had major rewrites:
graphics, audio, and networking. DirectInput® includes new configuration
functionality, action mapping, and better international support. And for the first time,
DirectShow® is a part of DirectX, both in the runtime and in the SDK.Briefly.
DirectX Graphics component. The API has been extensively updated to make it even
easier to use and to support the latest graphics hardware. The most compelling new
feature is support for programmable shaders (a shader is a piece of code written in a
shading language that is designed to be used in either the programmable vertex
pipeline or the programmable pixel pipeline).

Lead Technology Tool


The LEADTOOLS Video Conferencing SDK can be used to create Client Server
applications such as:
Security Server / Web Cast – Single sever sending to multiple clients.
Video Conferencing – Each computer participating in the conference is both a client
and a server.
Live Presentations over the Web – Capture screen activity on a server and send to
one or more clients.

To implement a Security Server or Web Cast type application, you would have the
Server application running on one computer and the Client application running on one

Sir Syed University of Engineering & Technology 20


Chapter 1 Introduction

or more remote computers. The Client computers would all be able to receive and see
the video data being captured and sent from the Server. The Client computers would
see the data from the time that they connect. For example, if Client#1 connects at
10:00 and Client#2 connects at 10:05, then Client#2 would have missed the first 5
minutes of the video.

When you run the Server application, its IP address will appear next to “connection”,
the machine(s) to receive the video must know that IP address in order to be able to
connect to the server. When you run the Client application, it will ask you for an IP
address to which you wish to connect.

It is also possible to have one Client application receive data from more than one
Server application. For example, a viewing station could monitor multiple security
camera locations. For this, all you need is the IP addresses of all the servers to which
you wish to connect and monitor. You can run the Client application on one machine
and connect to as many servers as you wish from the same client.
To implement a Video Conferencing application, you can run both the Client and
Server applications on each computer that will participate in the conference. In other
words, each computer plays the role of both client and server.

You can run both the Server and Client applications on your machine, and have a 2nd
party do the same. When you run the Server your IP address will appear next to
“connection”, the party with which you are conferencing must have that address in
order to be able to connect to you. And, you need to have their IP address in order to
connect to them. When you run the Client application, it will ask you for an IP
address to which you wish to connect.

To conference with more than one person, each machine in the conference should run
the server, using the same client you can connect to as many IP addresses as you
want, meaning to as many servers as you want (one client can connect to many
servers). You can create and broadcast live presentations over the web using using the
LEAD Screen Capture filter as the video device on the Server side and the LEAD
Screen Capture encoder to compress the video data. Once the Clients connect to your
server, they will be able to see what is happening on your desktop and they will hear

Sir Syed University of Engineering & Technology 21


Chapter 1 Introduction

what you are saying. Screen activity and sound are recorded and encoded using the
LEAD Screen Capture encoder and then transmitted to the Client applications.

VaxExtended Tool
VaxExtended SDK is the best peer-to-peer VoIP solution. Two or more persons can
connect to each other on the direct IP-to-IP connection to have real-time voice
conference over the LAN, WAN or Internet. It supports client side voice mixing, in
which, during the conference each end receives multiple voice streams and mix them
into single voice stream and play it over the sound device. Due to client side voice
mixing, Extended SDK is a perfect solution to have small private conferences, where
8 to 10 persons can connect and have Real-Time voice conference over the LAN,
WAN or Internet. It is NAT and other firewalls friendly. If the client is behind the
NAT/router then there is no configuration required to connect to listening end. Enable
the port forwarding at the router end in order to receive incoming connection requests.
PERSON A PERSON B PERSON C
Initialize Initialize Initialize
Connect
OnStatusEvent: 51
OnConnectionEvent
(51 = CONNECTING)
AcceptIncomingCall
OnStatusEvent: 51
(51 = CONNECTING)
OnStatusEvent: 53 OnStatusEvent: 53
(53 = CONNECTED) (53 = CONNECTED)
Successfully connected and having Voice Conversation
AddInConf
OnStatusEvent: 59
OnAddConferenceEvent
(59 = ADDING)
AcceptAddInConf
OnStatusEvent: 59
(59 = ADDING)
OnStatusEvent: 60 OnStatusEvent: 60
(60 = ADDED) (60= ADDED)
OnStatusEvent: 60 OnStatusEvent: 60
(60 = ADDED) (60 = ADDED)
Successfully added and all of them having Voice Conference
Table 1.4.5

Sir Syed University of Engineering & Technology 22


Chapter 2 Introduction

2 Usage scenario / User Interaction


This project is really a market oriented, business oriented and education oriented tool
for communication. There is some special scenario about the user and his
requirement. Usage scenario based on the project’s target user as well the manage
user. User interaction is totally independent in term of project scenario and interaction
based on the target and mange user.

2.1 User profiles

The different types of users with their hierarchies and their description are given as
follows:
Administrator
He/she is the most powerful user according to system maintenance and support.
Administrator is the controlling user in term of system flow. He/she is also the
cooperative with the other users of the system. He/she provides help to other users on
how to use the system and troubleshoots the system. He/she makes sure the system is
working properly and the system is secured with respect to system availability and
reliability.
Managing Director
Managing director is the upper level management user. He/she announce any
announcement for his/her employee. According to this system, he/she will able to
update his/her employee directly through multimedia communication and present
some thing live to his/her employee by mean of multimedia communication. He/she is
also able to spread his/her command directly to his/her employee desktop.
Employee
In every industrial pool we have a lot of employee. They work together but how they
can interact directly to their team leader or the director. If they all went to director or
team leader so there is huge bulk of employee at the door of director/team leader
room. Every employee updated with respect to any command, announcement and
circular by using this system approach.

Teacher/Instructor
According to the teacher point of view, he/she will get the powerful tool for teaching
and spreading information to the students. Especially in laboratory education he/she

Sir Syed University of Engineering & Technology 23


Chapter 2 Introduction

will enable to give lecture at the desktop of the students. Teacher will concentrate
over his/her topic rather than to control student. This system gives the noiseless
education environment with respect to teacher point of view.
Student
Students will easy to get their lecture with out any confusion because there is no white
board in term of lecture and presentation. Students will have deep look on their
lecture at their computer screen. Student will get their notes/lectures directly through
the teacher system.
Team Leader
Team leader will operate his/her team member directly under the one building. There
is no need for team member to go through table to table of each team mate member.
Team leader will directly get the task execution by his/her team member and deliver
to the director.
Stock Exchange Manager
Stock exchange has the lot of employee and stock partner. Stock exchange manager
will update his/her stock partner and employee by mean of live reports and
documentation.
Stock Exchange Employee
Stock exchange employee will very update and accurate by mean of live transmission.
They will able to get statistics and calculation very quick because all information at
their desktop.

Sir Syed University of Engineering & Technology 24


Chapter 2 Introduction

2.2 Use-cases

Video Streaming

Audio Streaming

Real Time Video

Real Time Voice


server User

Remote Streaming

Share File

Live Presentation

Overall Use Case


Figure 2.2.1

Sir Syed University of Engineering & Technology 25


Chapter 2 Introduction

System Support Streaming Streaming


Video Audio

Real Time
Video

Loggin Real Time


Administrator
Voice

Remote
Streaming

Live
Testing Share File Presentation

Administrator Use case


Figure 2.2.2

Streaming
Video
Streaming
Audio

Loggin Real Time


Managing Director
Voice

Remote
Streaming
Live
Presentation

Managing Director Use Case


Figure 2.2.3

Sir Syed University of Engineering & Technology 26


Chapter 2 Introduction

Streaming Streaming
Video Audio

Real Time
Video

Loggin Real Time


Employee
Voice

Remote
Streaming

Share File Live


Presentation

Employee Use Case


Figure 2.2.4

Streaming Streaming
Video Audio

Real Time
Video

Loggin Real Time


Teacher
Voice

Remote
Streaming

Share File Live


Presentation

Teacher Use Case


Figure 2.2.5

Sir Syed University of Engineering & Technology 27


Chapter 2 Introduction

Streaming Streaming
Video Audio

Real Time
Video

Loggin Real Time


Student
Voice

Remote
Streaming

Share File Live


Presentation

Student Use Case


Figure 2.2.6

Remote
Streaming

Loggin Live
Team Leader
Presentation

Share File

Team Leader Use Case


Figure 2.2.7

Sir Syed University of Engineering & Technology 28


Chapter 2 Introduction

Streaming
Video

Real Time
Video

Loggin
Stock Exchange
Manager

Remote
Streaming
Live
Presentation

Stock Exchange Manager Use Case


Figure 2.2.8

Real Time
Video

Remote
Streaming
Login
Stock Exchange
Employee

Live
Presentation

Share File

Stock Exchange Employee Use case


Figure 2.2.9

Sir Syed University of Engineering & Technology 29


Chapter 2 Introduction

2.3 Special usage considerations

There is some special consideration for system quality. Special usage of consideration
lies in different scenario of the system usage. In this section special requirements that
will be used during the process development & usage of the overall application that
includes the following
User Interface
This is the basic building block of this system because system will never become a
market oriented product when ever it is not very friendly to target user. User interface
included all the benefits according to target user. According to graphically user
interface (GUI), we have considered all prospects with the user friendly terminology.
GUI is easy to use and very good looking for the target eyes.
Hardware Interface
In hardware interface, we have considered all hardware tools like system and other
third part hardware like input, process and output interface. Key board, mouse and
trackball are the parts of input and monitor and printer are the parts of output. Process
part divided in two many sub part like C.P.U and LAN card and network switch etc.
Software Interface
The basic building block of the software interface is the operating system. We have
used Microsoft based operating system. Server system should have any server product
of Microsoft operating system. There are some operating system services have used in
this system like security and socket. We have used central and server based database
system for security and streaming. There are some third party tools for maximum
system throughput. Software interface should have the compatibility with the
operating system and the third party software. Client system should have the same
specification but it is not necessary to use server product at the client side.
Communication Interface
Communication is the tool of this project. In communication interface we have
consider reliable and pre-request LAN card for communication. We have also
considered the medium which is wired. Communication interface has the flavor of
both software and hardware interface. Some specifications are described by hardware
and some by software. We have used Ethernet standard for LAN.

Sir Syed University of Engineering & Technology 30


Chapter 2 Introduction

Deployment Interface
This is the major interface because project is becoming product by using deployment
interface. Deployment has done by the same operating system environment at the both
end of medium. During deployment we have to consider the operating system
compatibility with the other third party software. System configuration has the major
role in deployment interface.

Sir Syed University of Engineering & Technology 31


Chapter 3 Functional and Data Description

3 Functional and Data Description


According to this project, we have a lot of functionality and data description of
different level of execution. This system is working upon different functionality and
data description. The major theme divides into two systems which are server and
client. Every system has its own functionality and data modeling with respect to
execution. The overall system connected with similar theme of modeling which based
on different sub-functions and data description. The major characteristic is about the
data object processing in term of multimedia extension. Functionality is all about data
processing over the network.
The relationship of data object with respect to functionality is quiet observable with
respect to execution. The multimedia data pointed by sub-data object which are the
cause of multimedia communication over the network. Functionality is based on the
data object either they used as sub-system or sub-executable. Following table shows
some brief idea about functional and data description.

System Description

Functionality Data Description

Main functionality Data entity


Sub functionality Data Object
Internal functionality Data Behavior
External functionality Data relations
Control functionality Data operations
Figure 3.1

Sir Syed University of Engineering & Technology 32


Chapter 3 Functional and Data Description

3.1 System Architecture


This is the overall architecture for both application like Multimedia Server and
Multimedia Client.

Administrator

Managing Teacher
Director Instructor

Multimedia Casting Over LAN

Video Audio
Streaming Streaming

Real Time Voice Real Time Video


Streaming Streaming

Presentation Remote
Streaming Streaming

Stock Exchange Student


Manger

Employee

Overall System Architecture


Figure 3.1.1

Sir Syed University of Engineering & Technology 33


Chapter 3 Functional and Data Description

3.1.1 Architecture model


The project block diagram is shown here as a brief context level model of the system
architecture.

Multimedia Synchronize
Login
Server Cock

Maintain
Database
erver

Multimedia Streaming
Login
Client Multimedia

Block Diagram of the System Block


Figure: 3.1.2

3.1.2 Modules overview

Authentication Module
This is the major module for the security in term of authorization and authentication.
This module provided a secure login at the both end of application. It checks user
privileges from the directory services of operating system. This is the first basic
module of this system.

Server Configuration Module


This is the module that gets the network address of the server and applies it over all
application for multimedia streaming. It gets simple a complete IP address and the
system name resolve by network class.

Sir Syed University of Engineering & Technology 34


Chapter 3 Functional and Data Description

Database Module
This module communicates with the database server for signaling. It provides a major
back end operation with respect to multimedia streaming. It is the initial connection to
produce synchronization between multimedia server and client.

Multimedia extensions Module


This is the complete module of multimedia streaming. It has sub-module with respect
to connection and action. All multimedia extension is streamed by this module with
respect to current operation with in the span of time. There are the lists of sub
modules which lie in this section.
• Listen Video
• Listen Audio
• Listen Live
• Listen Camera
• Listen Remote
• Listen Shared Files

Multimedia streamed Module


This is the complete module of multimedia streaming. It has sub-module with respect
to connection and action. All multimedia extension is streamed by this module with
respect to current operation with in the span of time. There are the lists of sub
modules which lie in this section.
• Listen Video
• Listen Audio
• Listen Live
• Listen Camera
• Listen Remote
• Listen Shared Files

3.2 Data Description


According to this project, we have considered a central database system for
communication. Data objects are behaving as signals for multimedia clients. The
overall system connected with similar theme of modeling which based on different
sub-functions and data description. The major characteristic is about the data object

Sir Syed University of Engineering & Technology 35


Chapter 3 Functional and Data Description

processing in term of multimedia extension. Functionality is all about data processing


over the network. Data objects and their instance values accessed by the multimedia
clients by mean of security. Security is also provided by the database server.

Data description is the all over flow of signals by mean of multimedia extensions.
This project is the great tool in cooperative, business and education environment. It
stream valuable data/ information in the manner of security. It is provided a full
management of multimedia streaming over the network. It generate clock for signal
accessing by mean of data objects.

3.2.1 Major data objects/signal specification

Video_Connect

Attributes Type
Video_ Index decimal
Video_Stream varchar
Video_Name varchar
Video_PlayList varchar
Video_Duration varchar
Video_Position float
Is_Video_skip float
Table 3.2.1.1

Voice_Connect

Attributes Type
Voice_Index decimal
Server_Name varchar
Server_Ip varchar
Table 3.2.1.2

Present_Connect

Attributes Type
Present_Index decimal
Present_Name varchar
Present_Path varchar
Table 3.2.1.3

Sir Syed University of Engineering & Technology 36


Chapter 3 Functional and Data Description

Remote_Connect

Attributes Type
Remote_Index decimal
Remote_Name varchar
Remote_Path varchar
Table 3.2.1.4

Shared_File

Attributes Type
Index_File decimal
File_Name varchar
File_Path varchar
Table 3.2.1.5

Status_Table

Attributes Type
Status_Index decimal
Status_Of_streaming varchar
Table 3.2.1.6

Client_Info

Attributes Type
Client_ Index decimal
Client_Name varchar
Client_Pass varchar
Table 3.2.1.7

MultiMedia_Info

Attributes Type
MM_ Index decimal
MM_User varchar
MM_Ct varchar
MM_File varchar
MM_Path varchar
MM_Stime varchar
MM_ETime varchar
Table 3.2.1.8

Sir Syed University of Engineering & Technology 37


Chapter 3 Functional and Data Description

Server_Config

Attributes Type
Host_ Index decimal
Host_Name varchar
Host_IP varchar

Table 3.2.1.9

Audio_Connect

Attributes Type
Audio _ Index decimal
Audio_Stream varchar
Audio _Name varchar
Audio _PlayList varchar
Audio _Position float
Audio _Duration varchar
Is_Audio_skip float

Table 3.2.1.10

Video_Actions

Attributes Type
Changed_ Index decimal
Changed_Video varchar
Changed_Position float
Is_Stoped int
Is_Played int
Is_Paused int
Table 3.2.1.11

Audio_Actions

Attributes Type
Changed_ Index decimal
Changed_Audio varchar
Changed_Position float
Is_Stoped int
Is_Played int
Is_Paused int

Table 3.2.1.12

Sir Syed University of Engineering & Technology 38


Chapter 3 Functional and Data Description

Voice_Action

Attributes Type
Voice_Action_ Index decimal
Voice_Signal varchar

Table 3.2.1.13

3.2.2 System level data model


Under this section, the major components and hardware are shown in the form
of DFD.

Multimedia
Server

Multimedia
Server

Database
Server

Client Client Client


1 2 3

Figure 3.3.2

3.3 System Interface Description

This project has the flavor of both networking and software. There are some interfaces
by mean of networking such as a desired LAN card for connecting system over LAN
environment. Other thing is about the network switch which is used for the same
network family. Every system that wants to communicate with multimedia server then
it should be providing desire user name and user password for multimedia streaming.

Sir Syed University of Engineering & Technology 39


Chapter 3 Functional and Data Description

According to software interfaces, we considered a lot of active X control for


development. There are some operating system services by mean of control interfaces
and some third party tool be considered. We considered a lot of control and classes
provided by development environment.

3.3.1 External machine interfaces

Member Server

Member server is the client machine which is driving by any server product operating
system. We have windows 2003 server machine as a multimedia client so windows
2003 server made it a member server. Member server may use as a backup of
multimedia server or its said to be a backup server.

Work Station
Work station is simply a client machine which is connected to the server. Work
station has not any server product like Windows 98/XP. Multimedia client may be a
workstation it is on customer.

Web Camera
Web camera is the other external machine used for real time video streaming because
it is the part of multimedia extensions. Web camera has interfaced by development
tool like C#.

Ethernet Switch
Ethernet card has used for multimedia bridge because we have a lot of system
requirement over LAN. Ethernet make a single administrator network environment
which belong to our requirement.

3.3.2 External system interfaces


 Combo Box

 Button

 Checked List Box

 Menu

 Data Grid

Sir Syed University of Engineering & Technology 40


Chapter 3 Functional and Data Description

 Label

 Text Box

 Group Box

 Panel

 Main Menu

 Tool bar

 Vax-Extended object

 Lead Control object

 Media player 9.0

 Web browser control

 Rich text box buffer

 Status bar

 System performance control

 Image list.

Sir Syed University of Engineering & Technology 41


Chapter 4 Subsystem Module Description

4 Sub-system module Description


According to this project we have both network and software flavor and their sub-
system and module.
According to hardware/network sub system, we have considered following
component.

Member Server
Member server is the client machine which is driving by any server product operating
system. We have windows 2003 server machine as a multimedia client so windows
2003 server made it a member server. Member server may use as a backup of
multimedia server or its said to be a backup server.

Work Station
Work station is simply a client machine which is connected to the server. Work
station has not any server product like Windows 98/XP. Multimedia client may be a
workstation it is on customer.

Web Camera
Web camera is the other external machine used for real time video streaming because
it is the part of multimedia extensions. Web camera has interfaced by development
tool like C#.

Ethernet card based on 802.3


It is used for connection based on LAN standard Ethernet. We used 100 Mbps
configuration Ethernet card for multimedia communication. We used wired Ethernet
card due to its high bandwidth and data rate.

Ethernet Switch
Ethernet card has used for multimedia bridge because we have a lot of system
requirement over LAN. Ethernet make a single administrator network environment
which belong to our requirement.

Sir Syed University of Engineering & Technology 42


Chapter 4 Subsystem Module Description

According to software we have used several modules for development. Software


modules belong to development modules and third party tools that are interfaced
during development.

Authentication Module
This is the major module for the security in term of authorization and authentication.
This module provided a secure login at the both end of application. It checks user
privileges from the directory services of operating system. This is the first basic
module of this system.

Server Configuration Module


This is the module that gets the network address of the server and applies it over all
application for multimedia streaming. It gets simple a complete IP address and the
system name resolve by network class.

Database Module
This module communicates with the database server for signaling. It provides a major
back end operation with respect to multimedia streaming. It is the initial connection to
produce synchronization between multimedia server and client.

Multimedia streamed Module


This is the complete module of multimedia streaming. It has sub-module with respect
to connection and action. All multimedia extension is streamed by this module with
respect to current operation with in the span of time. There are the lists of sub
modules which lie in this section.
 Listen Video
 Listen Audio
 Listen Live
 Listen Camera
 Listen Remote
 Listen Shared Files

Sir Syed University of Engineering & Technology 43


Chapter 4 Subsystem Module Description

Multimedia action Module


According to this module, the overall action that is performed by multimedia server is
noticed here because client has to synchronize with the specific operation that applied
over multimedia extensions. Multimedia action modules carry signal to database
server and client automatically get actions with in span of time.
 Video Action
 Audio Action
 Live Action
 Web Camera Action
 Voice Action

Vax-Extended Module
Vax-Extended module belongs to third part tool for voice streaming. It creates real
time voice session between multimedia server and clients. It is responsible for voice
streaming on the specific port that provided by in term of hard cord. It communicates
over IP addresses of the systems but it is not hard corded.

Lead Module
Lead control module also belongs to third party tool for real time video conferencing.
It is responsible for voice streaming on the specific port that provided by in term of
hard cord. It communicates over IP addresses of the systems but it is not hard corded.
It captures the real time video in the file and then stream over the network.

4.1 Description for Subsystem


We considered subsystem scope in the manner of reliability and availability of the
system. According to multimedia server, we considered some special subsystem or
module for communication. Some hardware scope is defined by the development
domain. According to hardware, we considered communication system over network
like server and clients. Server should have any server product of Microsoft based
operating system. After all client should have any operating system of Microsoft
family rather than Windows 95/98 etc. we consider network switch that support
minimum eight client machine for communication and support high bandwidth of

Sir Syed University of Engineering & Technology 44


Chapter 4 Subsystem Module Description

data. Ethernet card considered high bandwidth and data transfer rate. According to
real time streaming we considered a quality capture web cam for real time streaming.
It should be capture 30 to 40 frames per second for desire quality.
There are many subsystems like the authentication system interact with directory
services of the operating system. This is the tool for security purpose with respect to
authentication. The other module is about the data base server which is very important
for communication because database server behave like a bridge for signals of
multimedia extensions. Database server uses its services in term of queries in the
desire span of time. The several types of queries execute in the span of time for
multimedia communication. Database server directly communicates with multimedia
server and client on the specific request. There are some third party tool interfaces
with respect to project services. Third party tool applied in the extra scope of
utilization with respect to project scope. Third party tools provided some restricted
operation but we have interfaced them in extra ordinary style.
The major subsystem is about the network based component called Ethernet card
based on IEEE standard 802.3. This is the high bandwidth supported LAN card for
heavy communications.

4.1.1 Subsystem scope


Ethernet protocols refer to the family of local-area network (LAN) covered by the
IEEE 802.3. In the Ethernet standard, there are two modes of operation: half-duplex
and full-duplex modes. In the half duplex mode, data are transmitted using the
popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a
shared medium. Four data rates are currently defined for operation over optical fiber
and twisted-pair cables:

 10 Mbps - 10Base-T Ethernet (IEEE 802.3)


 100 Mbps - Fast Ethernet (IEEE 802.3u)
 1000 Mbps - Gigabit Ethernet (IEEE 802.3z)
 10-Gigabit - 10 Gbps Ethernet (IEEE 802.3ae).

Each Ethernet-equipped computer operates independently of all other stations on the


network: there is no central controller. All stations attached to an Ethernet are

Sir Syed University of Engineering & Technology 45


Chapter 4 Subsystem Module Description

connected to a shared signaling system, also called the medium. To send data a station
first listens to the channel, and when the channel is idle the station transmits its data in
the form of an Ethernet frame, or packet.
After each frame transmission, all stations on the network must contend equally for
the next frame transmission opportunity. Access to the shared channel is determined
by the medium access control (MAC) mechanism embedded in the Ethernet interface
located in each station. The medium access control mechanism is based on a system
called Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

Sir Syed University of Engineering & Technology 46


Chapter 4 Subsystem Module Description

4.1.2 Subsystem flow diagram/ desired UML diagram

Start
YES

Multime
dia
Install streamin
Multimedia g
application
NO

Wait for
Login to streaming
directory service
of OS

End
Server
initialization

Login to
directory service
of OS

Client joins the


server

Server
found NO

YES

Connected to
server

Figure 4.1.2.1

4.1.3 Algorithmic/protocol model

Sir Syed University of Engineering & Technology 47


Chapter 4 Subsystem Module Description

As with all IEEE 802 protocols, the ISO data link layer is divided into two IEEE 802
sub layers, the Media Access Control (MAC) sub layer and the MAC-client sub layer.
The IEEE 802.3 physical layer corresponds to the ISO physical layer.
The MAC sub-layer has two primary responsibilities:

 Data encapsulation, including frame assembly before transmission, and


frame parsing/error detection during and after reception
 Media access control, including initiation of frame transmission and
recovery from transmission failure

Even though the media segments may be physically connected in a star pattern, with
multiple segments attached to a repeater, the logical topology is still that of a single
Ethernet channel that carries signals to all stations. 802 protocols support our desire
protocol like TCP/IP for errorless and lossless communication. It provides a secure
communication in term of security issues.

4.1.4 Restrictions/limitations
The main disadvantages of the half-duplex are the efficiency and distance limitation,
in which the link distance is limited by the minimum MAC frame size. This
restriction reduces the efficiency drastically for high-rate transmission. Therefore, the
carrier extension technique is used to ensure the minimum frame size of 512 bytes in
Gigabit Ethernet to achieve a reasonable link distance. When it comes to how signals
flow over the set of media segments that make up an Ethernet system, it helps to
understand the topology of the system. The signal topology of the Ethernet is also
known as the logical topology, to distinguish it from the actual physical layout of the
media cables. The logical topology of an Ethernet provides a single channel (or bus)
that carries Ethernet signals to all stations. The restriction over multimedia streaming
is about to over flow because if we consider multiple multimedia extensions so it may
effect on your system performance.

4.1.5 Performance issues


 A slow computer. Even with a fast computer, if you have too many
applications open, it could slow down your media streaming. If you notice
things are sluggish, close all unnecessary applications and windows running
on your computer. Just keep your Web browser and your media player open.

Sir Syed University of Engineering & Technology 48


Chapter 4 Subsystem Module Description

(If you're just listening or watching, you can even close your browser.) In any
case, speedy computers are better.
 Noisy phone lines. If you have a phone line that isn't free of noise (humming,
crackling), that's not good for streaming (or Web browsing). Disconnect any
phones that cause a buzz or hum. Have your phone company check your line
to get rid of humming or other line noise. Of course, a cable modem or DSL
connection is best for streaming media.
 The main disadvantages of the half-duplex are the efficiency and distance
limitation, in which the link distance is limited by the minimum MAC frame
size. This restriction reduces the efficiency drastically for high-rate
transmission. Therefore, the carrier extension technique is used to ensure the
minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable
link distance.

Sir Syed University of Engineering & Technology 49


Chapter 5 Behavioral Model and Description

5 Behavioral Model and Description


According to multimedia server, we have different behavior with respect to its states
of execution. There are so many behavior characteristics which are the cause of system
action and performance. Multimedia server has some major behavior with respect to
multimedia streaming but it is not least according to system performance. Multimedia
streaming is the basic behavior of multimedia server but there are some other behavior
included for controlling, optimizing and integration. Multimedia server has a powerful
control behavior with respect to system states because there are heavy data transfer
rate over the network by mean of multimedia streaming. Multimedia server behavior is
controlled by some operating system services and third party software. There are
several states of event from ideal state to busy state.

According to multimedia client, we have some same behavior states with respect to
multimedia server. Multimedia client converge its attention to its server because in
every second multimedia server can get different state with respect to multimedia
streaming. The basic behavior is about to get multimedia streaming from the
multimedia server but it can change with in second. Multimedia client has a powerful
control by mean of its communication with respect to multimedia streaming.
Multimedia client has also used some operating system service and third party tool for
desire execution. Multimedia client has several behavior states with respect to server
acknowledgement due to central database system.

5.1 Description for system behavior


According to the system behavior, there are a lot of flavors with respect to states and
events. According to multimedia server, we have considered a strong security
mechanism with respect to login state. The login event deals the security in term of
authentication and authorization. Multimedia server should be in the hand of authentic
person of any industrial pool. We used an event for authentication with the directory
service of operating system. After authorization multimedia server is got its listening
address by the network. Listening address got globalize for its multimedia clients. The
major event is about to generate a clock for synchronization. Clock event
Call itself in specific span of time like recursion. The next major event is about to
synchronize with database server. Multimedia server called database services in the

Sir Syed University of Engineering & Technology 50


Chapter 5 Behavioral Model and Description

span of time with respect to requirement. After connected database server, multimedia
is on the state of communication. The administrator or the team leader can stream
multimedia extension over the network. There are complete library of multimedia
extension ready for streaming.
According to multimedia client, first event is about the authentication of clients.
Multimedia client has to login with the directory service of operating system.
Internally operating system grants his/her connection by mean of login application of
this project. After connection, multimedia clients have to wait on-stream multimedia
streaming that is controlled by multimedia server. Multimedia client has an
synchronized clock to database server for signaling about on-stream multimedia
extensions. Multimedia clients are dependent on the multimedia server otherwise they
will not able to get any information.

5.1.1 Events

Multimedia Server
 Login to directory service and DNS.
 Generate a clock for synchronization.
 Connect to database server.
 Listen clients for assigning address.
 Assign communication port.
 Stream multimedia extensions.
 Maintained record for multimedia clients.
 Using operating system services.
 Interface third party software with operating system.
 Calculate network statistic.
 Close all operation and services related to project.

Multimedia Client
 Login to directory service of Multimedia server.
 Generate clock for synchronization.
 Contact to central database system like multimedia server.
 Get multimedia streaming.

Sir Syed University of Engineering & Technology 51


Chapter 5 Behavioral Model and Description

 Using operating system services.


 Interface third party software with operating system.
 Calculate network statistic.
 Close all operation and services related to project.

5.1.2 States
Multimedia Server

 Initialize login form.


 Authentication
 Enable controls.
 Initialized Main Form
 Enable menus and controls.
 Call third party services.
 Monitoring database.
 Maintaining database.
 Authorization by Windows Directory services.
 Calculate network statistics.
 Display database form.
 Finish.

Multimedia Client
 Initialize login form.
 Authentication
 Enable controls.
 Initialized Main Form
 Enable menus and controls.
 Call third party services.
 Access central database.
 Calculate network statistics.
 Finish.

Sir Syed University of Engineering & Technology 52


Chapter 5 Behavioral Model and Description

5.2 State Transition Diagrams

Multimedia Server

State 1 State 5

Administrator initiates Run the application


the setup

State 2 State 6
Install .Net framework
Streaming MultiMedia
Extensions from Server

State 3 State 7
Install Multimedia Receive the on-stream
Server application by User

State 4
Application icon
generated on the desktop

Figure 5.2.1

Sir Syed University of Engineering & Technology 53


Chapter 5 Behavioral Model and Description

Multimedia Client

State 1 State 5

User initiates the setup Run the application

State 2 State 6
Install .NET
framework Streaming MultiMedia
Extensions from Server

State 3 State 7
Install Multimedia Receive on-stream
Client application Multimedia Client

State 4

Application icon
generated on the desktop

Figure 5.2.2

Sir Syed University of Engineering & Technology 54


Chapter 5 Behavioral Model and Description

5.3 Control specification

There are some specific states of control with respect to project services. The overall
control of flow is given in figure 5.3

Multimedia Server Multimedia Client

Active Directory Services

Generate clock Generate clock

Connect to DBS Connect to DBS

Stream Multimedia Get On-stream Data

Control DBS Multimedia actions

Calculate Network Calculate Network


Statistics Statistics

Figure 5.3.1

Sir Syed University of Engineering & Technology 55


Chapter 6 System Prototype Modeling and Simulation
Results

6 System Prototype Modeling and Simulation Results


System prototype modeling is the approach of project simulation with respect to
expected result that you want after compilation. According to this project, we
considered universal prototype model for simulation. Simulation result gave us
overall idea about system performance and execution. Simulation result is about the
real time process of any system that works with in its desired domain. System
prototype gave us theoretical as well as practical description about system execution
in term of desired performance. We considered universal model but added some
useful phase for system modeling.

6.1 Description of system modeling approach

System Development Life Cycle Model


We considered most famous model like System Development Life Cycle which is
also known as Classic Life Cycle Model (or) Linear Sequential Model (or)
Waterfall Method. There was some enhancement in this model according over
project deployment. This has the following activities.
Information about Modeling and engineering.
Software Requirements Analysis.
Systems Analysis and Design.
Code Generation.
Testing and Support.
Deployment.

Table 6.1

Information about Modeling and engineering


As software is always of a large system (or business), work begins by establishing
requirements for all system elements and then allocating some subset of these
requirements to software. This system view is essential when software must interface
with other elements such as hardware, people and other resources. System is the basic
and very critical requirement for the existence of software in any entity. So if the
system is not in place, the system should be engineered and put in place. In some
cases to extract the maximum output, system should be re-engineered and spiced up.
Once the ideal system is engineered or tuned up, the development team studies the
software requirement for the system.

Sir Syed University of Engineering & Technology 56


Chapter 6 System Prototype Modeling and Simulation
Results

Software Requirements Analysis


This is also known as feasibility study. In this phase, the development team visits the
customer and studies their system. They investigate the need for possible software
automation in the given system. By the end of the feasibility study, the team furnishes
a document that holds the different specific recommendations for the candidate
system. It also includes the personnel assignments, costs, project schedule, and target
dates. The requirements gathering process is intensified and focused specially on
software. To understand the nature of the program(s) to be built, the system engineer
("analyst") must understand the information domain for the software, as well as
required function, behavior, performance and interfacing. The essential purpose of
this phase is to find the need and to define the problem that needs to be solved.

Systems Analysis and Design


In this phase, the software's overall structure and its nuances are defined. In terms of
the client/server technology, the number of tiers needed for the package architecture,
the database design, the data structure design etc are all defined in this phase.
Analysis and Design are very crucial in the whole development cycle. Any glitch in
the design phase could be very expensive to solve in the later stage of the software
development. Much care is taken during this phase. The logical system of the product
is developed in this phase.

Code Generation
The design must be translated into a machine-readable form. The code generation step
performs this task. If design is performed in a detailed manner, code generation can be
accomplished with out much complication. Programming tools like Compilers,
Interpreters, and Debuggers are used to generate the code. Different high level
programming languages like C, C++, VB.Net, C# are used for coding. With respect to
the type of application, the right programming language is chosen.

Testing and Support


Once the code is generated, the program testing begins. Different testing
methodologies are available to unravel the bugs that were committed during the
previous phases. Different testing tools and methodologies are already available.

Sir Syed University of Engineering & Technology 57


Chapter 6 System Prototype Modeling and Simulation
Results

Some companies build there own testing tools that are tailor made for there own
development operations.
Software will definitely undergo change once it is delivered to the customer. There
are many reasons for the change. Change could happen because of some unexpected
input values into the system. In addition, the changes in the system could directly
affect the software operations. The software should be developed to accommodate
changes that could happen during the post implementation period.

Deployment
This is the major factor for achieving the desire result. Development tool provide the
massive support to develop perfect result. In this project, development tool will play
the massive role to achieve high quality result.

6.2 Simulation results

Simulation Tools Simulation Results


Microsoft Windows Task Manager Give Over all System performance in
term of Usage
MultiMedia Server Network Statistics Give bandwidth in term of data transfer
rate in term of received and sent
MultiMedia Server Performance Counter Packet lost, packet received and packet
sent.

Table 6.2.1

Sir Syed University of Engineering & Technology 58


Chapter 6 System Prototype Modeling and Simulation
Results

System performance Measurement


Figure 6.2.2

Sir Syed University of Engineering & Technology 59


Chapter 6 System Prototype Modeling and Simulation
Results

Network Monitoring
Figure 6.2.3

6.3 Special performance issues

 Issues with SDLC.


 Lengthy development time is required.
 Tends to result in high cost development.
 Users’ requirements can change before the process is completed.
 Users never know their actual requirements until something tangible exists.
 Issues With Prototyping:
 Can meet a small group’s requirement which may not be adequate for the overall
system.
 We can use prototyping as a part of traditional SDLC approach.
 Here prototyping is considered to be an additional, specialized method for
gathering users' information requirements.

Sir Syed University of Engineering & Technology 60


Chapter 6 System Prototype Modeling and Simulation
Results

6.4 Prototyping requirements

 User Information.
 Listen user.
 Complete analysis.
 Design and implementation.
 Know target product.
 Support tool.

Sir Syed University of Engineering & Technology 61


Chapter 7 System Estimates and Actual Outcome

7 System Estimates and Actual Outcome


Software estimation is the form of problem solving and in most cases, the problem to
be solved. Some time the software estimation becomes a huge below by mean of
system decomposition and system resizing. System estimation and the actual outcome
shows your scope efforts, engineering efforts and the deploy efforts.

7.1 Historical data used for estimates

According to this project we have a lot of consideration over the historical data. This
project has both software and network flavor. This is the communication environment
over the network. We assumed following data for the deployment and release.

Network Analysis with operating system

Security in term of Authentication and


Authorization
Top class graphical user Interface with
respect to user friendly
Multimedia Streaming applications like
Net meeting, Media player 9, VoIP
application and Real time Video.
Database Management system such as
Oracle, Sql server 2000.
Implementation of third party software
Like Voice/Video Sdk and Direct X
Over all Historical Data
Table 7.1

The historical data gave us the complete idea of project compilation. According to
Multimedia server, first we have considered network design analysis with respect to
operating system. The overall securities apply by the software application like we
considered Active Directory and DNS services. The other most historical data is about
the perfect and good looking GUI. We have considered a lot of pre-made application
like Media player, Net meeting and third party product. We considered some
streaming software like Media Player and Net Meeting by mean of implementation.
The real time streaming products gave us strong support of the project compilation.
There were a lot of considerations about the database management system. We have
also considered some third party tool for system development life cycle.

Sir Syed University of Engineering & Technology 62


Chapter 7 System Estimates and Actual Outcome

7.2 Estimation techniques applied and results


There are many estimation techniques for project estimation but we considered very
common and effective cost estimation by mean of exact cost management. We
considered the scope of estimation technique because project resources and uses may
tolerate by mean of requirement.

7.2.1 Estimation Technique


Loc is the acronym of lines of code. Loc data are used in two ways during software
project estimation:
As an estimation variable to size each element of the software.
As baseline metrics collected from past project and used in conjunction with estimate
variables to develop cost and effort projections.
The project planner begins with a bounded statement of software scope and forms this
statement attempts to decompose software into loc function. The planner may choose
another component for sizing such as classes or objects, changes, or business
processes affected. When a new project estimated, it should first be allocated to a
domain, and then the appropriate domain average for productivity should be used in
generating the estimate.
This, the oldest of the models, is probably not going to generate much in the way of
new research. Current trends in which software development is going to prototyping,
CASE tools, and 4GLs, make the use of LOC much less stable. In order to get a
model which suits the environment, there must be many projects of different types
and sizes in a stable environment. This is generally no longer the case, as fewer and
fewer organizations have significant numbers of new applications "written" entirely
by programmers.

7.2.2 Estimate for technique


Loc is the estimation technique in tern of project management. In loc-based
estimation, we considered the whole scenario of our project by mean of lines of code.
We considered integrated parts of this project by mean of lines of code. This project is
about server client operations that’s why we considered it into many phased of
development. Now we consider following data for estimation:

Sir Syed University of Engineering & Technology 63


Chapter 7 System Estimates and Actual Outcome

Requirement and Function Estimated LOC


Graphical User interface. (GUI) 750
Network analysis and implementation. (NAI) 103

Static Video/Audio Streaming. (SAA). 402

Remote streaming and Sharing. (RSS) 150

Live Presentation. (LS) 112

Real Time Voice/Video. (RTVV) 105

Database Management system. (DMS) 324

Third party Software interfacing. (TPSI) 260

Flow of Control. (FOL) 230

Peripheral control function. (PCF) 170

Security Implementation. (SI) 170

Integration of services. (IOS) 175

Estimated lines of code 2951

Multimedia Server software


Table 7.2

This is all about the one sided estimation in term of multimedia server. Now we
considered the multimedia client software requisites. Multimedia client is controlled
by the multi media server that’s why we covered a lot of LOC in multimedia server
software estimation.

Sir Syed University of Engineering & Technology 64


Chapter 7 System Estimates and Actual Outcome

Requirement and Function Estimated LOC


Graphical User interface. (GUI) 450
Network analysis and implementation. (NAI) 102

Static Video/Audio Streaming. (SAA). 230

Remote streaming and Sharing. (RSS) 150

Live Presentation. (LS) 112

Real Time Voice/Video. (RTVV) 105

Database Management system. (DMS) 227

Third party Software interfacing. (TPSI) 160

Flow of Control. (FOL) 230

Peripheral control function. (PCF) 120

Security Implementation. (SI) 70

Integration of services. (IOS) 75

Estimated lines of code 1990

Multimedia Server software


Table 7.2

By using Loc-based estimation, we considered following data or in formation which


is about our team performance.
Average productivity = 925 Loc/pm where pm --> person-month

Sir Syed University of Engineering & Technology 65


Chapter 7 System Estimates and Actual Outcome

Total lines of code (LOC) =4941 Loc


Total person required = 4 approximately
Cost per line of code = Rs. 11
Total Cost estimate= Rs. 54351

7.3 Actual Results and Deviation from Estimates

Component/Recourse Final Cost Estimated Cost


Project cost in term of development 60000 54351
Network switch 1200 1500
Ethernet Cards (3 pieces) 600 700
Posters and Brochure 6000 6000
Final Report 2000 2000
Extras 1000 1000
Total Cost 70800 65551

7.4.1 System Resources (Required and Used)


System resources divided in to three major parts follow as:
Software
Hardware.
Human ware

7.4.2 System Resources Required


Microsoft Windows 2000/2003. (For Multimedia Server)
Microsoft Windows 2000/XP/2003. (For Multimedia Clients)
Microsoft .Net 2003.
Microsoft Paint.
Desktop/Lap Tops.
Ethernet card
Network switch.
System Resources Required

Sir Syed University of Engineering & Technology 66


Chapter 7 System Estimates and Actual Outcome

Pentium class P3/P4 computer 3 units.


Microsoft Windows 2000.XP/2003.
Ms Networking protocols installed and enabled.
Active Directory Services
Microsoft C#. Net Environment.

Sir Syed University of Engineering & Technology 67


Chapter 8 Test Plan

8 Test Plan
Software testing is the critical element of software quality assurance and represents
the ultimate review of specification, design and code generation. The test plan
outlines the entire testing process and includes the individual test cases. To develop a
solid test plan, you must systematically explore the program to ensure coverage is
thorough, but not unnecessarily repetitive. A formal test plan establishes a testing
process that does not depend upon accidental, random testing.
Testing accomplishes a variety of things, but most importantly it measures the quality
of the software you are developing. This view presupposes there are defects in your
software waiting to be discovered and this view is rarely disproved or even disputed.
Several factors contribute to the importance of making testing a high priority of any
software development effort.
The earlier in the development cycle that testing becomes part of the effort the better.
Planning is crucial to a successful testing effort, in part because it has a great deal to
do with setting expectations. Considering budget, schedule, and performance in test
plans increases the likelihood that testing does take place and is effective and
efficient. Planning also ensures tests are not forgotten or repeated unless necessary for
regression testing.
This Software test split into two main perspectives.
Internal program logic exercise using “white box” test case design techniques.
External program logic exercise using “black box” test.

According to white box testing, the complete system control structure of the
procedural design to derive cases. This project has the integrated structures which are
independent to each Other. This is the main step with respect to team work because all
the development is the return of team work. Every team can test its own integrated
application with respect to project development. Integrated testing of the application
avoids the huge and bulk phase of testing. In this step we control the testing at the
level of project control statements by mean of Boolean condition. Every statement has
its own condition with respect to the project life cycle. There are some iterations on
the project development, they also be tested by integration. Some conditions are valid
with specific condition so there is complex testing with respect to validation. This

Sir Syed University of Engineering & Technology 68


Chapter 8 Test Plan

phase of testing can generate the valid report of every statement with respect to the
project control. White box embedded by the following steps.
1: Guarantee that all independent path with in the module.
2: Exercise all logical decision on the basis of True and False.
3: Execute all the loops at their boundaries and operations bounds.
4: Exercise internal data structures to ensure their validity.

According to the black box testing, we considered behavioral testing and focus on the
functional requirement of the project. Black box attempts error in different manners.
First we considered the integrated functionality based on sub-system or the unit of
system. By using integrated testing in black box we enabled to test overall system
with respect to exact test plan. Every team member traced error and threat of his part
of implementation. Black box testing tends to applied during stages of testing. It is all
about the control structures so attention was focus on the information domain. Black
box embedded by the following steps.
1: Incorrect or missing function.
2: Interface errors.
3: Errors in the data structures or external database access.
4: Behavior or performance errors.
5: Initialization and termination errors.

8.1 System Test and Procedure


The process of testing an integrated hardware and software system to verify that the
system meets its specified requirements is said to be system testing. System test
organized by the team leader which may changed during testing. System has several
test units with respect to its behavior. According to the system strategy, we considered
configuration and implementation by mean of errorless product environment. System
testing is black box testing, performed by the Test Team, and at the start of the system
testing the complete system is configured in a controlled environment. The purpose of
system testing is to validate an application's accuracy and completeness in performing
the functions as designed. We considered all integrated phase in term of Black box
and White box.

Sir Syed University of Engineering & Technology 69


Chapter 8 Test Plan

8.2 Testing strategy


Testing is the important part in software project evaluation because it gives desired
support for deployment. It is the crucial phase when you are going to test your project
in term of availability, reliability and performance. We split this phase into many sub-
phase because it is easy to test in integrated flavor. Every phase has its own functional
power for finding errors.

8.2.1 Unit testing


The primary goal of unit testing is to take the smallest piece of testable software in the
application, isolate it from the remainder of the code, and determine whether it
behaves exactly as you expect. Each unit is tested separately before integrating them
into modules to test the interfaces between modules. Unit testing has proven its value
in that a large percentage of defects are identified during its use. Unit testing avoid the
bulk of work and it is easy to integrated overall test into many different testing unit.
Unit testing described overall threat and error with respect to software and hardware.
Every unit has its own functionality but it is not avoid that there is some error in it.
We considered every unit separately then combine it with other units.

8.2.2 Integration testing


Integration testing is a logical extension of unit testing. In its simplest form, two units
that have already been tested are combined into a component and the interface
between them is tested. A component, in this sense, refers to an integrated aggregate
of more than one unit. In a realistic scenario, many units are combined into
components, which are in turn aggregated into even larger parts of the program. The
idea is to test combinations of pieces and eventually expand the process to test your
modules with those of other groups. Eventually all the modules making up a process
are tested together. Beyond that, if the program is composed of more than one
process, they should be tested in pairs rather than all at once.
Integration testing identifies problems that occur when units are combined. By using a
test plan that requires you to test each unit and ensure the viability of each before
combining units, you know that any errors discovered when combining units are
likely related to the interface between units. This method reduces the number of
possibilities to a far simpler level of analysis.

Sir Syed University of Engineering & Technology 70


Chapter 8 Test Plan

8.2.3 Validation testing


The validation testing strategy and procedure is specified. This section includes a
discussion of the order of validation by system.
Verification ensures the product is designed to deliver all functionality to the
customer; it typically involves reviews and meetings to evaluate documents, plans,
code, requirements and specifications; this can be done with checklists, issues lists,
walk through and inspection meetings. Validation ensures that functionality, as
defined in requirements, is the intended behavior of the product; validation typically
involves actual testing and takes place after verifications are completed.
High-order testing (a.k.a. System Testing)
High order testing is some times also called a Bird’s eye view. We checked the
overall system i.e. each and every module is working properly and the task defined for
each module is fulfilled according to project requirements. Every module works
within its boundary and interact with the other modules and passes data in a secure
manner to each other.

Recovery testing
According to this project, we considered recovery testing in term of static and
dynamic. Statically we considered pre plan recovery strategies because there were so
many problems during implementation. During implementation we have recovered
many future recovery stuffs in term of pre-plan recovery. After static recovery we
considered run-time recovery by mean of dynamic.
In dynamic testing, we considered recovery the run time of project. We handled many
exceptions at the run time because it is important to organize project functionality at
the run time. If any module fail during execution we implemented a desire recovery
processes at the run time.

Security testing
Security testing is about validating your application's security services and identifying
potential security flaws. This section contains important testing recommendations for
verifying that you have created a securable application.
There are many issues in term of security because authorization and authentication
have most important role in project execution. There are important data over the
network and target user access it by some access policy that applies on him/her. We

Sir Syed University of Engineering & Technology 71


Chapter 8 Test Plan

considered couple of testing strategy over the project by mean of security. For
example a wrong person login through the network an access important multimedia
data by mean of security threats. Like
Interruption
Interception
Fabrication
Modification

Stress testing
Stress testing, which is a specialized form of performance testing, is similar to
destructive testing in other fields of engineering. The goal of stress testing is to crash
the application by increasing the processing load past performance degradation until
the application begins to fail due to saturation of resources or the occurrence of errors.
Stress testing helps to reveal subtle bugs that would otherwise go undetected until the
application was deployed. Since such bugs are typically the result of design flaws,
stress testing should begin early in the development phase on each area of the
application. Fix these subtle bugs at their source instead of fixing symptomatic bugs
that may occur elsewhere in the application if these bugs were ignored.
We considered many multimedia extensions streaming over the network which have
20 to 30 client machines. Multimedia extensions want the high bandwidth medium
during streaming so we have applied many extensions at the run time and change it
frequently.

Performance testing
Performance testing presumes that the application is functioning, stable, and robust.
As such, it is important to eliminate as many variables as possible from the tests. For
example, bugs in the code can create the appearance of a performance problem or
even mask a performance problem. To accurately compare the results from different
performance test passes, the application must be working correctly. It is especially
important to retest application functionality if the tuning process has modified the
implementation of a component. The application must pass its functional tests before
you can test its performance. In addition to application changes, unexpected changes
can occur in hardware, network traffic, software configuration, system services, and
so on. It is important to control changes to the application.

Sir Syed University of Engineering & Technology 72


Chapter 8 Test Plan

8.3 Testing resources and staffing


Testing resources belong to different flavor which are organized into different manner
of staffing. There are many resources used for testing because this project belongs to
different paradigm in term of software, hardware and network. According to
hardware, we tested specialized hardware by mean of project requirement. Hardware
testing was not very crucial because we considered pre-plan hardware equipment that
avoids hardware tolerance.
In term of network, we considered operating system services for testing. Project
platform helped us in different scenarios because it was giving time to time
configuration setting in term of network specification. We have also applied little bit
support by this project but it wasn’t so we considered more over the operating system
services.
Software resources are also applied by the operating system services. Operating
system has its own software application that gave us the performance and testing
support by mean of software resources.

8.4 Test metrics


Test metrics fall into two broad categories:
1: metrics that attempt to predict the likely number of tests required at
Various testing levels.
2: Metrics that focus on test coverage for a given component.
The majority of metrics proposed focus on the process of testing, not the technical
characteristics of the test themselves. In general we relied on analysis, design and
code metrics to guide them in the design and execution of test cases. We used some of
test metric which is given below:
Bang metrics
Bang metrics provided us the number of test cases required by examining the
primitive measures discussed like number of functional primitives, data element,
object, relationship, states and transition that have to use in testing phase. The number
of tests associated with the human/computer/sub-system interface can be estimated.
We considered this metric in following steps.
1: Examining the number of transition contained in the state transition
Representation of transition respect to evaluation of test.
2: Examining the number of data object that move across the interface.

Sir Syed University of Engineering & Technology 73


Chapter 8 Test Plan

3: The number of data elements that are input or output.

Architectural design metrics


Architectural design metrics provided information on the ease or difficulty associated
with integration testing. It is all about the component level design metrics that lies at
the core of basic path of project implementation. Architectural
Metrics gave us the result of overall integration plan in term of system resources.

8.5 Testing tools and environment


We considered many tools for testing but the environment is only one in term of
coverage area and operating system. Testing tools adopt by the specification of
project environment. We considered some services by operating system to get
following testing:

Testing Environment Tools


Addressing and Configuring Local area Network
Streaming Bandwidth Windows 2003 Task Manager
Performance Over Network Windows 2003 LAN/MAN
Data transfer rate over LAN Microsoft TCP/IP services
Quality of Multimedia extension Microsoft Direct X 9/10
Flow of project control. Microsoft .Net 2003
Unhandled Exceptions. Microsoft CLR/CTR.

8.6 Test record keeping and test log


This is the most important phase because you always learn from your mistakes. We
have developed a log file that maintained the history of our testing with respect to
errors and bugs. We have found a lot of errors in term of project model that were the
useful stuff for our project future scope. We generated log files either it was related to
network field or the software field. Operating system has the excellent tool for this
management because it gave us error as well as warning with respect to execution.
There was another great tool for testing which was our development environment
indicated many of errors as well as warnings with respect to project deployment.

Sir Syed University of Engineering & Technology 74


Chapter 9 Future Enhancements and
Recommendations

9 Future Enhancements and recommendations


Future Enhancements and recommendation is fully observable during entire project
scheduling. This system has some recommendation at this time of deployment but in
future it can deal us in some specialized manner. This is today’s market oriented
product in term of wired medium or small cooperative business environment. Later on
it will easily convert into following technologies:

Wireless Environment:
If you are going to move over the wireless environment then you have to consider
some terminologies. Totally it is all about the hardware and the deployment
environment because you will just change your hardware in term of wireless
environment and configure it by mean of Addressing. Wireless environment has some
recommendations like AOC (area of coverage) and security issues. You must define
your domain of communication in term of coverage area. You may deploy your
encryption and decryption tool for threat less communication.

Ad-Hoc Environment:
Now a day, there are so many researches over the Ad-hoc environment. According to
the future enhancement of this project, we will able to deploy it over the access
pointless environment (Ad-hoc). We will convert to Ad-hoc environment by the wi-fi
enable communication device. This device has some specification and configuration
in different direction but it is very smart in special environment. There is simple
application interfacing by mean of self database server for autonomous navigation of
system. Every application will be totally independent to each other. Some special tool
will be use to improve Ad-hoc communication.

VPN Environment:
Virtual private network is the most handsome future plan for this system. Every one
want to become co-operate in term of information sharing. VPN provide large area
coverage so it will become a wide area network application. VPN boost multimedia
communication over the large area.

Sir Syed University of Engineering & Technology 75


Chapter 10 Conclusion

10 Conclusion

Streaming multimedia extensions across networks is an effort that is attracting many


participants. This is evidenced by the eight primary commercial and thirteen research
organizations involved with this technology in various ways. A key characteristic of
both the commercial products and research demonstrators is the diversity in
technological infrastructure. According to this project, we fulfilled extra ordinary
work in term of multimedia streaming. We introduced central access point for
multimedia streaming by mean of security. This project provided a secure
communication of information which is deals by one server powered by Database
server.

There is one multimedia server that control his multimedia clients with respect to
security because your multimedia extension is very secure and you don’t want to
shared it softcopy with other people but you want stream it for business, market and
education point of view. This system is the powerful tool in cooperative environment
because every industrial pool is converging over team work. Team leader, Director,
Teacher can communicate with respect to quick and noiseless environment.

According to the new generation technology, we have discovered a lot of background


theory about the multimedia streaming. We found some critical issues about the
network programming because it is difficult to implement it in different devices.
Some technical skill is about the development area of new generation languages
would be considered in this project development life cycle.

Sir Syed University of Engineering & Technology 76


Appendices

H. APPENDICES
i. Project Schedule
Project Timeline chart

JAN FEB MAR APR MAY JUN JUL AGU SEP OCT NOV DEC

Analysis Design Implementation Testing and


Phase Phase Phase deploy
Phase

Overall project timeline

Sir Syed University of Engineering & Technology 77


Appendices

Work load distribution

Working Muhammad Muhammad Shahzad Muhammad


Months Yasir Tariq Akhtar Kazim
January Collect Study LAN Study Pre- Analyze
information environment made project scope
about Application
streaming
February Analyze over LAN 802.3
all project flow standard
(Ethernet)
March Define project Use case Use cases Define Client
domain requirements

April Design overall Configure Implement Apply rules for


project control Active DHCP server DNS
Directory
Services
May Design GUI Design GUI Develop LAN Design overall
(MultiMedia (MultiMedia environment network
Server) Client) setting
June Testing Develop class Develop class Configure
previous diagrams diagram network
applications
July AD and SSL Video Audio Introduce 3rd
programming streaming streaming part software
Class class
August Implement Design table Design Design flow of
SQL server attributes relation ship tables
2000 interface b/w tables
clock
September Integrate sub Design remote Design Design a
classes with streaming shared file timing
interface class procedure
October Apply final GUI Apply final Implement MultiMedia
Multimedia GUI live Client Testing
Server MultiMedia presentation
Client streaming
November Use network Real time Real time Integrating 3rd
programming Voice Video party software
for application Streaming Streaming
December Final testing Report Testing Report
Overall project modeling project modeling
MultiMedia
Client
Work Load Distribution Table

Sir Syed University of Engineering & Technology 78


Appendices

ii. Snap shots of deployed system

Multimedia Server Snap # 1

Sir Syed University of Engineering & Technology 79


Appendices

Multimedia Server Snap # 2

Sir Syed University of Engineering & Technology 80


Appendices

Multimedia Server Snap # 3

Sir Syed University of Engineering & Technology 81


Appendices

Multimedia Server Snap # 4

Sir Syed University of Engineering & Technology 82


Appendices

Multimedia Server Snap # 5

Sir Syed University of Engineering & Technology 83


Appendices

MultiMedia Client Snap # 1

Sir Syed University of Engineering & Technology 84


Appendices

MultiMedia Client Snap # 2

Sir Syed University of Engineering & Technology 85


Appendices

MultiMedia Client Snap # 3

Sir Syed University of Engineering & Technology 86


Reference

REFERENCE

[1] Jackson M. H., Baldeschwieler J. E. and Rowe L. A., "Berkeley CMT Media
Toolkit API" , U. C. Berkeley, (submitted for publication).
[2] Mayer-Patel K., Simpson D., Wu D., and Rowe L. A. "Synchronized Continuous
Media Playback Through the World Wide Web" ,U.C. Berkeley, Computer Science
Division, Soda Hall, Berkeley, CA 94720
[3] Rowe L. A., "Continuous Media Applications", Multipoint Workshop held in
conjunction with ACM Multimedia 1994, San Francisco, CA, November 1994.
[4] Microsoft Learning & Research. (2003). Retrieved from the World Wide
Web on 02/10/2005.www.microsoft.com/windows2000/
Technologies/ terminal/default.asp
[5] Microsoft Learning & Research. (2003). Retrieved from the World
Wide Web on 02/16/2005. www.microsoft.com/windowsserver
2003/techinfo/overview/termserv.mspx
[6] Remote Service Research. (2000). Retrieved from www on 02/17/2005.
www.rdesktop.org
[7] C# Corner Research. (2001). Retrieved from www on 02/03/2005. www.c-
sharpcorner.com/Network/NetworkProgramPart2RVS.asp
[8] Code Beach Research. (1999). Retrieved from www on 02/11/2005.
www.codebeach.com/index.asp?tabID=2& categoryID=15&subcategoryID=7
[9] Complete Reference C# .Net
[10] SQL Server 2000 Microsoft Press.

Sir Syed University of Engineering & Technology 87


Glossary

I. GLOSSARY

Multimedia
It is the collection of meaningful and attractive information.
Multimedia extension
Visualized information files. Like (Video, Audio, Animation, Picture, Voice, Text)
etc.
Multimedia client
It is the workstation or member server that gets on-stream data.
Multimedia server
It is the server that stream multimedia extensions.
Streaming
It's called "streaming" because the video,sound and picture data flow in a digital
stream from a server computer to your computer, ready to hear or view in real time,
without having to download all of the content before you can enjoy it. It comes to you
in a stream of digital bits... hence the term "streaming."
Remote streaming
It is the transfer of files over the LAN environment.
Real time video
The real time video is directly streamed after span of time by mean capturing.
Real time voice
The real time voice is directly streamed by mean capturing.
Ethernet 802.3
Ethernet protocols refer to the family of local-area network (LAN) covered by the
IEEE 802.3. In the Ethernet standard, there are two modes of operation: half-duplex
and full-duplex modes. In the half duplex mode, data are transmitted using the
popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a
medium.
Half duplex mode:
It works one operation either send or receive.
Full-duplex mode
Simultaneously (stream and get-stream) multimedia extension

Sir Syed University of Engineering & Technology 88


Glossary

Network Traffic Impact


Increase in large files large bandwidth required fixed time of transmission

Microsoft DHCP Server


Dynamic host configuration protocol
Microsoft ADO.Net
With ADO.NET, developers gain access to more powerful components, such as
the Dataset class and a strongly typed programming model that provides
IntelliSense and statement completion for data access code. It is the Active X
control.
Microsoft Direct X
Microsoft tool, support for multimedia files performance.
VaxExtended Tool
Third party tool, It is the real time voice streaming class.
.Net frame work
The .NET Framework is an integral Windows component that supports building and
running the next generation of applications and XML Web services. The key
components of the .NET Framework are the common language runtime and the .NET
Framework class library, which includes ADO.NET, ASP.NET, and Windows Forms.
The .NET Framework provides a managed execution environment, simplified
development and deployment, and integration with a wide variety of programming
languages.
Active Directory Services Interfaces
Active Directory Service Interfaces (ADSI) enables systems administrators and
developers of scripts or C/C++, C# applications to easily query for and manipulate
directory service objects
System Development Life Cycle
it is the basic model used in project development.
Loc
Lines of code.
AOC (area of coverage)
It is the overall domain of the network.

Sir Syed University of Engineering & Technology 89

Das könnte Ihnen auch gefallen