Beruflich Dokumente
Kultur Dokumente
Project Advisor
Mahjabeen Tahir
Lecturer
SSUET
Submitted by
Muhammad Yasir Siddiqui 2002-CE-075
Muhammad Tariq 2002-CE-106
Shahzad Akhtar 2002-CE-082
Muhammad Kazim 2002-CE-100
January 2006
PREFACE
According to this report, we are going to spread a new style of streaming which will
handle you in many dimensions of the communication. In term of communication, we
have different bridges but there is more powerful bridge of communication like
computer networks. This report is all about the information streaming over the
computer networks. There is much information in the world which is easily
understood by the target user. This information has the flavor of multimedia
extensions which look very well with respect to target eyes. When these type of
extensions come over the computer network so generate the maximum response with
in communication.
The only prerequisite things for this are to find some knowledge about the multimedia
streaming over the computer networks. There are many hidden truth in the multimedia
world because everybody is moving to attractive and meaningful communication with
respect to smart machine throughput.
ACKNOWLEDGMENT
First of all we would like to thank Vital Force only ALLAH for blessing us with the
mental and physical abilities with the help of which we were successfully able to go
through this project and bring it to the final stages of completion.
We would like to thank our teacher Ms. Mahjabeen Tahir who guided us through out
in every difficulty and provided us with the best solutions of problems through her
professional approach and experience.
INTRODUCTION TO GROUP MEMBERS
MAHJABEEN TAHIR
Assistant Professor
SSUET
CERTIFICATE OF COMPLETION
Chapter 1 Introduction
2.2 Use-cases
2.3 Specials usage considerations
2.3.1 User Interface
2.3.2 Hardware Interface
2.3.3 Software Interface
2.3.4 Communication Interface
2.3.5 Deployment Interface
1 Introduction
In addition of the attractive, meaningful and quality of communication, there is most
descent and powerful extensions for desire and quality communication. Yes we have
the multimedia extensions pool to get highly attractive and meaningful style. When
ever these types of extensions come over the communication medium it means you
can spread your messages in very excellent communication language. Quality of
communication is the part of marketing, advertising and business point of view.
Whenever you are communicating over the computer networks, you should apply
attractive communication language otherwise your delivered information can sink by
the network traffic.
Multimedia is collection of video, sound, images, text, and animation extensions.
These types of extensions give you very attractive and stylish quality of
communication. By raising media war, everybody wants to on-air himself by gigantic
and attractive communication. In this project, multimedia extensions are the acid of
communication over the computer network. We can stream video, audio in term of
live as well stream real time video and voice to the listener. We can also provide live
presentation of the reports and documents. Multimedia extensions enable you to
spread all information over the computer network.
Every communication has the medium. According to this project we adopt computer
network for the communication bridge and deploy it in very secure manner. Now a
day’s computer network provides different security but according this project we
produced basic security in term of authorization and authentication. According to this
project, authorization is term of rights which is related to server side and
authentication is term to access rights by right hands. Database server is in action for
maintaining access control profile. Database server provided security over the
application level but in IP level we used secure socket layer (SSL) and Domain name
system (DNS). Operating system has the major role to apply extra valuable services in
term of network protocol, database and securities.
Communication Medium
Medium of communication is the input and process unit for performing different
functionality in term of project life cycle. Communication medium shows like local
area network with respect to security and quality purpose. Communication medium is
the tool to stream information to the desire target.
Address Naming
This is the processing over the transmission medium addressing. This project will deal
heaving transmission of information that needs some extra-ordinary operation during
streaming. Address/IP naming is operating addressing of on-stream information.
There is not static IP addressing due to heavy streaming. According to handle quality
of streaming, we will refresh destination addresses and put special addresses for
specific clients. This will help us for security purpose with respect to authorization
and authentication.
Multimedia Extensions
Multimedia extensions are the major inputs of the project life cycle. In multimedia we
have several extensions of information for communicating in right and desire way.
Multimedia extensions are the on-stream extensions which have to operate in both end
of Communication Bridge. These are the inputs as well as the outputs in different
scenarios. Multimedia extensions are the block of on-stream information which will
deal by the project processing unit.
Process Units
Project processing unit has some sub units which will take their own functional
department. The real functionality of this project is to stream multimedia extension
over the local area network in term of quality factor. There are many sub system for
processing like authorization, authentication, streaming, controlling and measuring.
Process unit can be the embedded form of different units which interconnect and
communicate to each other with respect to the requirement.
Quality of Streaming
This is the major output of this project with respect to get quality of on-stream
information. In this project quality measurement is operated by the process unit and
applies other tool for getting desire and actual stream of information. Output should
be in acceptable skeleton according to project life cycle.
According to system context view, we have big picture with respect to business,
market, commercial and product domain scope. This system is classified into many
places of departments. This system has better scope, availability, reliability and
integrity with respect to domain and market scope.
According to market point of view, system has attractive extensions that up the
market presentation in stylish manner. You may market your product or anything by
showing its all benefit by using attractive presentation.
According to co-operative point of view, system will give the quality of interaction
between the company employees. They are very accurate and update by using the
presentation of desire goal of team management.
According to this project, there are so many white papers and research behind its
development. This project has solid background with respect to history because there
are so many applications are behaving like it. In this project we have covered a
powerful application system over the network. There are so many terminologies in
this project in term of research and learning point of view like. First we have
Switch
Multimedia
Casting Server
Multimedia receiver Clients
Multimedia casting over LAN
Figure 1.4.1
Multimedia is collection of video, voice, animation, sound, pictures and text etc. these
extension are the basic block of today’s communication.
Computer network is the largest environment in this world. According to this project
we have consider LAN (Local Area Network) environment for Communication
Bridge. The every network environment derived from the LAN because it is the basic
environment of computer network. LAN is single administrator environment with the
range of 1 Km it may exceed upon specific conditions. Multimedia is the heavy and
consumes space extension because it is so visualized and attractive. It stream over
heavy bandwidth that’s why we considered LAN environment that provided desire
area of bandwidth. We considered Ethernet standard for multimedia streaming
because of its high data rate and bandwidth. LAN environment is very reliable and
available for heavy transfer rate over computer network. It is easy to interface,
configure and support. According to theoretical background, we have collected
information of multimedia streaming in many applications like Windows Net Meeting
3.0. Multimedia streaming very accurate in LAN environment because there is no lost
of data/ information due to high data rate and bandwidth.
Multimedia files can be very large. You would spend many minutes or even hours
waiting for them to be downloaded to your computer if they weren't streamed.
Streaming media technology allows you to see or hear the content in just a few
seconds, instead of having to wait for it. Your only wait is a few seconds for a
"buffer" to be built up that helps avoid interruptions caused by Internet traffic
problems.
In the majority of cases streaming media is used to maintain control over the
distribution of the media files (because it is difficult to capture streaming video and
audio).
Ethernet protocols refer to the family of local-area network (LAN) covered by the
IEEE 802.3. In the Ethernet standard, there are two modes of operation: half-duplex
and full-duplex modes. In the half duplex mode, data are transmitted using the
popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a
shared medium. The main disadvantages of the half-duplex are the efficiency and
distance limitation, in which the link distance is limited by the minimum MAC frame
size. This restriction reduces the efficiency drastically for high-rate transmission.
Therefore, the carrier extension technique is used to ensure the minimum frame size
of 512 bytes in Gigabit Ethernet to achieve a reasonable link distance. Like in 802.3
header.
7 1 2 or 6 2 or 6 2 0-1500 0-46 4
Preamble Destination Source Data Pad Checksum
address address
Table 1.4.2
LAN Environment
Figure 1.4.2
1. The physical medium used to carry Ethernet signals between computers.
2. A set of medium access control rules embedded in each Ethernet interface that
allow multiple computers to fairly arbitrate access to the shared Ethernet channel.
3. An Ethernet frame that consists of a standardized set of bits used to carry data
over the system.
Application Data Network Traffic Network Requirements
Type/ Impact
Size
Scientific GB Increase in large files Higher bandwidth
Modeling Large bandwidth desktop, server,
required backbone
Publications 100s of Increase in large files Higher bandwidth
Imaging MB Large bandwidth desktop, server,
required backbone
Internet Audio, Increase in large files Higher bandwidth
Intranet Video Large bandwidth desktop, server,
Extranet 1-100 required backbone, low latency
MB Low latency necessary
Data TB Increase in large files Higher bandwidth
Warehousing Large bandwidth desktop, server,
Net. Backup required backbone, low latency
Fixed time of
transmission
Conferencing 1.5-4 Class of service Higher bandwidth
Whiteboard Mbps required desktop, server,
High volume of data backbone, low latency
Ethernet Standards
Table 1.4.3
Microsoft Windows 2003 Server
Windows Server 2003 operating systems take the best of Windows 2000 Server
technology and make it easier to deploy, manage, and use. The result: a highly
productive infrastructure that helps makes your network a strategic asset for your
organization. Windows Server 2003 operating systems ship with Windows Server
Service Pack 1 (SP1). Windows Server 2003 SP1 provides enhanced security,
increased reliability, and a simplified administration to help enterprise customers
across all industries. Windows Server 2003 includes all the functionality customers
need today from a Windows Server operating system to do more with less, such as
security, reliability, availability, and scalability. Windows Server 2003 is a
Windows Server 2003 contains core technologies that build on the strengths of
Windows 2000 Server to deliver a superior and cost-effective server operating system.
Learn about the many new features and technologies that make Windows Server 2003
an ideal server platform for organizations of any size. Windows 2003 has a lot of
supreme tools for business and communication environment but we found some of
them for this project management.
• Availability
• Scalability.
• Security.
• The common language runtime
• Active Directory
• Management services
• Storage management
• Networking and communications
• Windows Media Services
• Microsoft Active Directory Service
Originally inspired by the emergence of LDAP-based solutions in the mid-1990s,
organizations have had success in deploying directory-enabled business solutions for
key problems such as network operating system (NOS) user support, public key
infrastructure (PKI) deployment, white pages or yellow pages access, extranet or Web
single sign on (SSO) capabilities, and line-of-business applications.
Active Directory Application Mode achieves this goal without the burden of
expensive training, additional licensing, or operational costs that can be incurred by
the installation of an additional directory technology to support directory-enabled
applications. Active Directory Application Mode is a new capability in Active
Directory that addresses certain deployment scenarios that are related to directory-
enabled applications. ADAM runs as a non-operating-system service, and, as such, it
does not require deployment on a domain controller. Running as a non-operating-
system service means that multiple instances of ADAM can run concurrently on a
single server, and each instance can be configured independently.
Active Directory Application Mode represents a breakthrough in directory services
technology that overcomes the previously mentioned obstacles, maintains flexibility,
and helps organizations avoid increased infrastructure costs. Active Directory
Application Mode is easily installed or uninstalled on developer workstations. This
allows rapid restoration to a clean state during the application prototyping and
development process.
You can use Active Directory Application Mode effectively in the following
scenarios:
Application-specific directory scenarios
Application developer scenarios
Extranet access management (EAM) scenarios
Migration scenarios
Developers, end users, and ISVs can easily deploy Active Directory Application
Mode as a lightweight directory service on most Windows Server 2003 platforms and
on Windows XP Professional. You can easily install, reinstall, or remove the ADAM
application directory, making it the ideal directory service to deploy with an
application. Because Active Directory Application Mode is integrated with the
Windows security model, any application that is deployed using ADAM can
authenticate access against Active Directory across the enterprise. An application
owner can easily deploy directory-enabled applications without affecting the directory
schema for the entire organization, while continuing to use the identity information
and credentials that are stored in the organization’s NOS directory. Applications that
use Active Directory Application Mode have the same reliability, scalability, and
performance that they have with deployments of Active Directory in the NOS
environment.
Figure 1.4.3
With Active Directory Application Mode, for the first time you can employ a single
directory technology in multiple roles, while preserving investments that you’ve made
in administrator training; operations; licensing; and, most importantly, security.
Organizations, ISVs, and developers can use Active Directory in multiple roles,
without having to face the increased costs associated with deploying multiple
technologies for both an NOS directory and an application directory.
The Microsoft Windows 2000 Server network operating system includes an enhanced
implementation of Dynamic Host Configuration Protocol (DHCP). This includes
integration of DHCP with domain name system (DNS), enhanced monitoring and
statistical reporting for DHCP servers, new vendor-specific options and user-class
support, multicast address allocation, and rogue DHCP server detection. Also
Figure 1.4.4
The Microsoft® Windows® 2000 Server network operating system builds on the
longstanding Microsoft support for Dynamic Host Configuration Protocol (DHCP),
an open, industry standard that reduces the complexity of administering networks
based on TCP/IP. Each host computer connected to a TCP/IP network must be
assigned a unique IP address. DHCP frees network administrators from having to
configure all of the computers by hand.
TCP/IP is the global network protocol of choice, especially for corporate intranets
adopting Internet technology. However, configuring and administering TCP/IP
network clients have traditionally been time-consuming and costly. This is why
Microsoft, as a member of the Internet Engineering Task Force (IETF), was an early
advocate for having dynamic IP addressing technology and worked closely with other
IETF members to create the DHCP solution.
DHCP is open and standards-based, as defined by IETF Requests for Comments
(RFCs) 2131 and 2132. DHCP can automatically configure a host while it is booting
on a TCP/IP network, as well as change settings while the host is attached. This lets
all available IP addresses be stored in a central database along with associated
configuration information, such as the subnet mask, gateways, and address of DNS
servers.
DHCP makes life easier for network administrators, and the larger the network, the
greater the benefit. Without dynamic address assignment, clients have to be
configured one by one. IP addresses must be managed to avoid duplicate use.
Changes must be applied to clients by hand. Configuration information is not
centralized; and it is difficult to get a view of all client configurations.
SQL Server 2005 provides many new and enhanced business intelligence (BI)
features designed to give you a competitive advantage. These advantages include
integrating multiple data sources with Integration Services; enriching data and
building complex business analytics with Analysis Services; and writing, managing,
and delivering rich reports with Reporting Services. Review the following product
and technical resources and other information designed to help you improve BI in
your organization. Easily integrate data from a wide range of operational and
enterprise data sources, and gain competitive advantage through a holistic view of
your business.
Gain an integrated view of all your business data as the foundation for your traditional
reporting, OLAP analysis, scorecards, and data mining.
Deliver the information employees need to make better business decisions—in
virtually any business environment. Explore data, discover patterns, and apply these
patterns to business operations with an easy-to-use, extensible, accessible, and
flexible platform.
The .NET Framework has two main components: the common language runtime
and the .NET Framework class library. The common language runtime is the
foundation of the .NET Framework. You can think of the runtime as an agent that
manages code at execution time, providing core services such as memory
management, thread management, and remoting, while also enforcing strict type
safety and other forms of code accuracy that ensure security and robustness. In fact,
the concept of code management is a fundamental principle of the runtime. Code that
targets the runtime is known as managed code, while code that does not target the
runtime is known as unmanaged code. The class library, the other main component of
the .NET Framework, is a comprehensive, object-oriented collection of reusable types
that you can use to develop applications ranging from traditional command-line or
graphical user interface (GUI) applications to applications based on the latest
innovations provided by ASP.NET, such as Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load the
common language runtime into their processes and initiate the execution of managed
code, thereby creating a software environment that can exploit both managed and
unmanaged features. The .NET Framework not only provides several runtime hosts,
but also supports the development of third-party runtime hosts.
Figure 1.4.5
The .NET Framework class library is a collection of reusable types that tightly
integrate with the common language runtime. The class library is object oriented,
providing types from which your own managed code can derive functionality. This
not only makes the .NET Framework types easy to use, but also reduces the time
associated with learning new features of the .NET Framework. In addition, third-party
components can integrate seamlessly with classes in the .NET Framework.
• Console applications.
Microsoft Visual C#
Visual C# .NET 2003 is the comprehensive toolset for creating XML Web services
and Microsoft .NET—connected applications for Microsoft Windows® and the Web.
This robust development package, which uses the component-oriented C#
development language, offers beginning and intermediate developers with C++ or
Java experience a modern language and environment for creating next-generation
software. Visual C# 2003 delivers superior functionality for streamlining business
processes, including:
• Rapid design, development, and deployment support for creating and consuming
Web services.
• Form designers and visual controls for creating rich Windows-based applications.
• Authoring tools and services for building powerful Microsoft .NET server-based
solutions.
• Migration tools for converting Java-based projects to the Microsoft .NET
development environment.
With Visual C# .NET 2003, developers can build solutions for the broadest range of
clients, including Windows, the Web, and mobile or embedded devices. Using this
elegant programming language and tool, developers can leverage their existing C++
and Java-language skills and knowledge to be successful in the .NET environment.
Visual C# .NET 2003 includes a powerful remote and multi-language debugger,
enabling developers to test applications and build reliable multi-tier solutions that
span process boundaries and are written in multiple programming languages. Note:
Remote debugging is available only in Visual Studio .NET Professional Edition and
higher. Employ "unsafe" code to call native Windows APIs, use pre-built COM
components, and leverage existing ActiveX® controls to seamlessly integrate existing
applications and components.
Microsoft ADO.Net
With ADO.NET, developers gain access to more powerful components, such as the
Dataset class and a strongly typed programming model that provides IntelliSense and
statement completion for data access code. Unlike classic ADO, ADO.NET is
optimized to provide the very best performance and scalability for both connected and
disconnected data-centric applications.
The Data Set class is a great way to query and update data while minimizing the time
necessary to hold onto a costly connection to the database. Classic ADO was great for
sending and receiving data; however, there were limited ways to work with the data
once the developer closed the connection. This lead many developers down a path that
limited the performance, responsiveness, and scalability of their system. The Data Set
acts like an in-memory copy of the database, including multiple tables, relationships,
and the ability to track the original and new values. In this way, a portion of the
database can be brought down to the client via the Data Set class, updated with new
data, and then sent back to the server to be merged back into the database. Using
Visual Basic .NET and ADO.NET, developers can quickly be productive and create a
data management application with minimal coding involved. The Data Adapter
Configuration Wizard can generate all of the code necessary to select, insert, update,
and delete data from any table in the database. Further, unlike classic ADO, it
provides the developer with the ability to customize each SQL command and can
even create the stored procedures.
ADO .NET
Figure 1.4.6
ADO.NET includes new data providers that were specifically created to talk directly
to databases such as SQL Server 7.0 or greater. This can provide a performance boost
since the Visual Basic .NET code doesn’t need to traverse through multiple API
layers before it gets to the actual database. This makes database calls faster and far
more efficient. There is also a data provider for OLEDB-supported databases and
even some new data providers that offer direct access to other databases such as
Oracle. ADO.NET builds upon previous versions of data access models. And since it
is tightly integrated into the .NET Framework and the Visual Studio .NET IDE, it
provides the power and productivity required by developers.
Microsoft Direct X
Every component of DirectX 8.0 has received major new features that greatly
enhance the capabilities of DirectX. Three components have had major rewrites:
graphics, audio, and networking. DirectInput® includes new configuration
functionality, action mapping, and better international support. And for the first time,
DirectShow® is a part of DirectX, both in the runtime and in the SDK.Briefly.
DirectX Graphics component. The API has been extensively updated to make it even
easier to use and to support the latest graphics hardware. The most compelling new
feature is support for programmable shaders (a shader is a piece of code written in a
shading language that is designed to be used in either the programmable vertex
pipeline or the programmable pixel pipeline).
To implement a Security Server or Web Cast type application, you would have the
Server application running on one computer and the Client application running on one
or more remote computers. The Client computers would all be able to receive and see
the video data being captured and sent from the Server. The Client computers would
see the data from the time that they connect. For example, if Client#1 connects at
10:00 and Client#2 connects at 10:05, then Client#2 would have missed the first 5
minutes of the video.
When you run the Server application, its IP address will appear next to “connection”,
the machine(s) to receive the video must know that IP address in order to be able to
connect to the server. When you run the Client application, it will ask you for an IP
address to which you wish to connect.
It is also possible to have one Client application receive data from more than one
Server application. For example, a viewing station could monitor multiple security
camera locations. For this, all you need is the IP addresses of all the servers to which
you wish to connect and monitor. You can run the Client application on one machine
and connect to as many servers as you wish from the same client.
To implement a Video Conferencing application, you can run both the Client and
Server applications on each computer that will participate in the conference. In other
words, each computer plays the role of both client and server.
You can run both the Server and Client applications on your machine, and have a 2nd
party do the same. When you run the Server your IP address will appear next to
“connection”, the party with which you are conferencing must have that address in
order to be able to connect to you. And, you need to have their IP address in order to
connect to them. When you run the Client application, it will ask you for an IP
address to which you wish to connect.
To conference with more than one person, each machine in the conference should run
the server, using the same client you can connect to as many IP addresses as you
want, meaning to as many servers as you want (one client can connect to many
servers). You can create and broadcast live presentations over the web using using the
LEAD Screen Capture filter as the video device on the Server side and the LEAD
Screen Capture encoder to compress the video data. Once the Clients connect to your
server, they will be able to see what is happening on your desktop and they will hear
what you are saying. Screen activity and sound are recorded and encoded using the
LEAD Screen Capture encoder and then transmitted to the Client applications.
VaxExtended Tool
VaxExtended SDK is the best peer-to-peer VoIP solution. Two or more persons can
connect to each other on the direct IP-to-IP connection to have real-time voice
conference over the LAN, WAN or Internet. It supports client side voice mixing, in
which, during the conference each end receives multiple voice streams and mix them
into single voice stream and play it over the sound device. Due to client side voice
mixing, Extended SDK is a perfect solution to have small private conferences, where
8 to 10 persons can connect and have Real-Time voice conference over the LAN,
WAN or Internet. It is NAT and other firewalls friendly. If the client is behind the
NAT/router then there is no configuration required to connect to listening end. Enable
the port forwarding at the router end in order to receive incoming connection requests.
PERSON A PERSON B PERSON C
Initialize Initialize Initialize
Connect
OnStatusEvent: 51
OnConnectionEvent
(51 = CONNECTING)
AcceptIncomingCall
OnStatusEvent: 51
(51 = CONNECTING)
OnStatusEvent: 53 OnStatusEvent: 53
(53 = CONNECTED) (53 = CONNECTED)
Successfully connected and having Voice Conversation
AddInConf
OnStatusEvent: 59
OnAddConferenceEvent
(59 = ADDING)
AcceptAddInConf
OnStatusEvent: 59
(59 = ADDING)
OnStatusEvent: 60 OnStatusEvent: 60
(60 = ADDED) (60= ADDED)
OnStatusEvent: 60 OnStatusEvent: 60
(60 = ADDED) (60 = ADDED)
Successfully added and all of them having Voice Conference
Table 1.4.5
The different types of users with their hierarchies and their description are given as
follows:
Administrator
He/she is the most powerful user according to system maintenance and support.
Administrator is the controlling user in term of system flow. He/she is also the
cooperative with the other users of the system. He/she provides help to other users on
how to use the system and troubleshoots the system. He/she makes sure the system is
working properly and the system is secured with respect to system availability and
reliability.
Managing Director
Managing director is the upper level management user. He/she announce any
announcement for his/her employee. According to this system, he/she will able to
update his/her employee directly through multimedia communication and present
some thing live to his/her employee by mean of multimedia communication. He/she is
also able to spread his/her command directly to his/her employee desktop.
Employee
In every industrial pool we have a lot of employee. They work together but how they
can interact directly to their team leader or the director. If they all went to director or
team leader so there is huge bulk of employee at the door of director/team leader
room. Every employee updated with respect to any command, announcement and
circular by using this system approach.
Teacher/Instructor
According to the teacher point of view, he/she will get the powerful tool for teaching
and spreading information to the students. Especially in laboratory education he/she
will enable to give lecture at the desktop of the students. Teacher will concentrate
over his/her topic rather than to control student. This system gives the noiseless
education environment with respect to teacher point of view.
Student
Students will easy to get their lecture with out any confusion because there is no white
board in term of lecture and presentation. Students will have deep look on their
lecture at their computer screen. Student will get their notes/lectures directly through
the teacher system.
Team Leader
Team leader will operate his/her team member directly under the one building. There
is no need for team member to go through table to table of each team mate member.
Team leader will directly get the task execution by his/her team member and deliver
to the director.
Stock Exchange Manager
Stock exchange has the lot of employee and stock partner. Stock exchange manager
will update his/her stock partner and employee by mean of live reports and
documentation.
Stock Exchange Employee
Stock exchange employee will very update and accurate by mean of live transmission.
They will able to get statistics and calculation very quick because all information at
their desktop.
2.2 Use-cases
Video Streaming
Audio Streaming
Remote Streaming
Share File
Live Presentation
Real Time
Video
Remote
Streaming
Live
Testing Share File Presentation
Streaming
Video
Streaming
Audio
Remote
Streaming
Live
Presentation
Streaming Streaming
Video Audio
Real Time
Video
Remote
Streaming
Streaming Streaming
Video Audio
Real Time
Video
Remote
Streaming
Streaming Streaming
Video Audio
Real Time
Video
Remote
Streaming
Remote
Streaming
Loggin Live
Team Leader
Presentation
Share File
Streaming
Video
Real Time
Video
Loggin
Stock Exchange
Manager
Remote
Streaming
Live
Presentation
Real Time
Video
Remote
Streaming
Login
Stock Exchange
Employee
Live
Presentation
Share File
There is some special consideration for system quality. Special usage of consideration
lies in different scenario of the system usage. In this section special requirements that
will be used during the process development & usage of the overall application that
includes the following
User Interface
This is the basic building block of this system because system will never become a
market oriented product when ever it is not very friendly to target user. User interface
included all the benefits according to target user. According to graphically user
interface (GUI), we have considered all prospects with the user friendly terminology.
GUI is easy to use and very good looking for the target eyes.
Hardware Interface
In hardware interface, we have considered all hardware tools like system and other
third part hardware like input, process and output interface. Key board, mouse and
trackball are the parts of input and monitor and printer are the parts of output. Process
part divided in two many sub part like C.P.U and LAN card and network switch etc.
Software Interface
The basic building block of the software interface is the operating system. We have
used Microsoft based operating system. Server system should have any server product
of Microsoft operating system. There are some operating system services have used in
this system like security and socket. We have used central and server based database
system for security and streaming. There are some third party tools for maximum
system throughput. Software interface should have the compatibility with the
operating system and the third party software. Client system should have the same
specification but it is not necessary to use server product at the client side.
Communication Interface
Communication is the tool of this project. In communication interface we have
consider reliable and pre-request LAN card for communication. We have also
considered the medium which is wired. Communication interface has the flavor of
both software and hardware interface. Some specifications are described by hardware
and some by software. We have used Ethernet standard for LAN.
Deployment Interface
This is the major interface because project is becoming product by using deployment
interface. Deployment has done by the same operating system environment at the both
end of medium. During deployment we have to consider the operating system
compatibility with the other third party software. System configuration has the major
role in deployment interface.
System Description
Administrator
Managing Teacher
Director Instructor
Video Audio
Streaming Streaming
Presentation Remote
Streaming Streaming
Employee
Multimedia Synchronize
Login
Server Cock
Maintain
Database
erver
Multimedia Streaming
Login
Client Multimedia
Authentication Module
This is the major module for the security in term of authorization and authentication.
This module provided a secure login at the both end of application. It checks user
privileges from the directory services of operating system. This is the first basic
module of this system.
Database Module
This module communicates with the database server for signaling. It provides a major
back end operation with respect to multimedia streaming. It is the initial connection to
produce synchronization between multimedia server and client.
Data description is the all over flow of signals by mean of multimedia extensions.
This project is the great tool in cooperative, business and education environment. It
stream valuable data/ information in the manner of security. It is provided a full
management of multimedia streaming over the network. It generate clock for signal
accessing by mean of data objects.
Video_Connect
Attributes Type
Video_ Index decimal
Video_Stream varchar
Video_Name varchar
Video_PlayList varchar
Video_Duration varchar
Video_Position float
Is_Video_skip float
Table 3.2.1.1
Voice_Connect
Attributes Type
Voice_Index decimal
Server_Name varchar
Server_Ip varchar
Table 3.2.1.2
Present_Connect
Attributes Type
Present_Index decimal
Present_Name varchar
Present_Path varchar
Table 3.2.1.3
Remote_Connect
Attributes Type
Remote_Index decimal
Remote_Name varchar
Remote_Path varchar
Table 3.2.1.4
Shared_File
Attributes Type
Index_File decimal
File_Name varchar
File_Path varchar
Table 3.2.1.5
Status_Table
Attributes Type
Status_Index decimal
Status_Of_streaming varchar
Table 3.2.1.6
Client_Info
Attributes Type
Client_ Index decimal
Client_Name varchar
Client_Pass varchar
Table 3.2.1.7
MultiMedia_Info
Attributes Type
MM_ Index decimal
MM_User varchar
MM_Ct varchar
MM_File varchar
MM_Path varchar
MM_Stime varchar
MM_ETime varchar
Table 3.2.1.8
Server_Config
Attributes Type
Host_ Index decimal
Host_Name varchar
Host_IP varchar
Table 3.2.1.9
Audio_Connect
Attributes Type
Audio _ Index decimal
Audio_Stream varchar
Audio _Name varchar
Audio _PlayList varchar
Audio _Position float
Audio _Duration varchar
Is_Audio_skip float
Table 3.2.1.10
Video_Actions
Attributes Type
Changed_ Index decimal
Changed_Video varchar
Changed_Position float
Is_Stoped int
Is_Played int
Is_Paused int
Table 3.2.1.11
Audio_Actions
Attributes Type
Changed_ Index decimal
Changed_Audio varchar
Changed_Position float
Is_Stoped int
Is_Played int
Is_Paused int
Table 3.2.1.12
Voice_Action
Attributes Type
Voice_Action_ Index decimal
Voice_Signal varchar
Table 3.2.1.13
Multimedia
Server
Multimedia
Server
Database
Server
Figure 3.3.2
This project has the flavor of both networking and software. There are some interfaces
by mean of networking such as a desired LAN card for connecting system over LAN
environment. Other thing is about the network switch which is used for the same
network family. Every system that wants to communicate with multimedia server then
it should be providing desire user name and user password for multimedia streaming.
Member Server
Member server is the client machine which is driving by any server product operating
system. We have windows 2003 server machine as a multimedia client so windows
2003 server made it a member server. Member server may use as a backup of
multimedia server or its said to be a backup server.
Work Station
Work station is simply a client machine which is connected to the server. Work
station has not any server product like Windows 98/XP. Multimedia client may be a
workstation it is on customer.
Web Camera
Web camera is the other external machine used for real time video streaming because
it is the part of multimedia extensions. Web camera has interfaced by development
tool like C#.
Ethernet Switch
Ethernet card has used for multimedia bridge because we have a lot of system
requirement over LAN. Ethernet make a single administrator network environment
which belong to our requirement.
Button
Menu
Data Grid
Label
Text Box
Group Box
Panel
Main Menu
Tool bar
Vax-Extended object
Status bar
Image list.
Member Server
Member server is the client machine which is driving by any server product operating
system. We have windows 2003 server machine as a multimedia client so windows
2003 server made it a member server. Member server may use as a backup of
multimedia server or its said to be a backup server.
Work Station
Work station is simply a client machine which is connected to the server. Work
station has not any server product like Windows 98/XP. Multimedia client may be a
workstation it is on customer.
Web Camera
Web camera is the other external machine used for real time video streaming because
it is the part of multimedia extensions. Web camera has interfaced by development
tool like C#.
Ethernet Switch
Ethernet card has used for multimedia bridge because we have a lot of system
requirement over LAN. Ethernet make a single administrator network environment
which belong to our requirement.
Authentication Module
This is the major module for the security in term of authorization and authentication.
This module provided a secure login at the both end of application. It checks user
privileges from the directory services of operating system. This is the first basic
module of this system.
Database Module
This module communicates with the database server for signaling. It provides a major
back end operation with respect to multimedia streaming. It is the initial connection to
produce synchronization between multimedia server and client.
Vax-Extended Module
Vax-Extended module belongs to third part tool for voice streaming. It creates real
time voice session between multimedia server and clients. It is responsible for voice
streaming on the specific port that provided by in term of hard cord. It communicates
over IP addresses of the systems but it is not hard corded.
Lead Module
Lead control module also belongs to third party tool for real time video conferencing.
It is responsible for voice streaming on the specific port that provided by in term of
hard cord. It communicates over IP addresses of the systems but it is not hard corded.
It captures the real time video in the file and then stream over the network.
data. Ethernet card considered high bandwidth and data transfer rate. According to
real time streaming we considered a quality capture web cam for real time streaming.
It should be capture 30 to 40 frames per second for desire quality.
There are many subsystems like the authentication system interact with directory
services of the operating system. This is the tool for security purpose with respect to
authentication. The other module is about the data base server which is very important
for communication because database server behave like a bridge for signals of
multimedia extensions. Database server uses its services in term of queries in the
desire span of time. The several types of queries execute in the span of time for
multimedia communication. Database server directly communicates with multimedia
server and client on the specific request. There are some third party tool interfaces
with respect to project services. Third party tool applied in the extra scope of
utilization with respect to project scope. Third party tools provided some restricted
operation but we have interfaced them in extra ordinary style.
The major subsystem is about the network based component called Ethernet card
based on IEEE standard 802.3. This is the high bandwidth supported LAN card for
heavy communications.
connected to a shared signaling system, also called the medium. To send data a station
first listens to the channel, and when the channel is idle the station transmits its data in
the form of an Ethernet frame, or packet.
After each frame transmission, all stations on the network must contend equally for
the next frame transmission opportunity. Access to the shared channel is determined
by the medium access control (MAC) mechanism embedded in the Ethernet interface
located in each station. The medium access control mechanism is based on a system
called Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
Start
YES
Multime
dia
Install streamin
Multimedia g
application
NO
Wait for
Login to streaming
directory service
of OS
End
Server
initialization
Login to
directory service
of OS
Server
found NO
YES
Connected to
server
Figure 4.1.2.1
As with all IEEE 802 protocols, the ISO data link layer is divided into two IEEE 802
sub layers, the Media Access Control (MAC) sub layer and the MAC-client sub layer.
The IEEE 802.3 physical layer corresponds to the ISO physical layer.
The MAC sub-layer has two primary responsibilities:
Even though the media segments may be physically connected in a star pattern, with
multiple segments attached to a repeater, the logical topology is still that of a single
Ethernet channel that carries signals to all stations. 802 protocols support our desire
protocol like TCP/IP for errorless and lossless communication. It provides a secure
communication in term of security issues.
4.1.4 Restrictions/limitations
The main disadvantages of the half-duplex are the efficiency and distance limitation,
in which the link distance is limited by the minimum MAC frame size. This
restriction reduces the efficiency drastically for high-rate transmission. Therefore, the
carrier extension technique is used to ensure the minimum frame size of 512 bytes in
Gigabit Ethernet to achieve a reasonable link distance. When it comes to how signals
flow over the set of media segments that make up an Ethernet system, it helps to
understand the topology of the system. The signal topology of the Ethernet is also
known as the logical topology, to distinguish it from the actual physical layout of the
media cables. The logical topology of an Ethernet provides a single channel (or bus)
that carries Ethernet signals to all stations. The restriction over multimedia streaming
is about to over flow because if we consider multiple multimedia extensions so it may
effect on your system performance.
(If you're just listening or watching, you can even close your browser.) In any
case, speedy computers are better.
Noisy phone lines. If you have a phone line that isn't free of noise (humming,
crackling), that's not good for streaming (or Web browsing). Disconnect any
phones that cause a buzz or hum. Have your phone company check your line
to get rid of humming or other line noise. Of course, a cable modem or DSL
connection is best for streaming media.
The main disadvantages of the half-duplex are the efficiency and distance
limitation, in which the link distance is limited by the minimum MAC frame
size. This restriction reduces the efficiency drastically for high-rate
transmission. Therefore, the carrier extension technique is used to ensure the
minimum frame size of 512 bytes in Gigabit Ethernet to achieve a reasonable
link distance.
According to multimedia client, we have some same behavior states with respect to
multimedia server. Multimedia client converge its attention to its server because in
every second multimedia server can get different state with respect to multimedia
streaming. The basic behavior is about to get multimedia streaming from the
multimedia server but it can change with in second. Multimedia client has a powerful
control by mean of its communication with respect to multimedia streaming.
Multimedia client has also used some operating system service and third party tool for
desire execution. Multimedia client has several behavior states with respect to server
acknowledgement due to central database system.
span of time with respect to requirement. After connected database server, multimedia
is on the state of communication. The administrator or the team leader can stream
multimedia extension over the network. There are complete library of multimedia
extension ready for streaming.
According to multimedia client, first event is about the authentication of clients.
Multimedia client has to login with the directory service of operating system.
Internally operating system grants his/her connection by mean of login application of
this project. After connection, multimedia clients have to wait on-stream multimedia
streaming that is controlled by multimedia server. Multimedia client has an
synchronized clock to database server for signaling about on-stream multimedia
extensions. Multimedia clients are dependent on the multimedia server otherwise they
will not able to get any information.
5.1.1 Events
Multimedia Server
Login to directory service and DNS.
Generate a clock for synchronization.
Connect to database server.
Listen clients for assigning address.
Assign communication port.
Stream multimedia extensions.
Maintained record for multimedia clients.
Using operating system services.
Interface third party software with operating system.
Calculate network statistic.
Close all operation and services related to project.
Multimedia Client
Login to directory service of Multimedia server.
Generate clock for synchronization.
Contact to central database system like multimedia server.
Get multimedia streaming.
5.1.2 States
Multimedia Server
Multimedia Client
Initialize login form.
Authentication
Enable controls.
Initialized Main Form
Enable menus and controls.
Call third party services.
Access central database.
Calculate network statistics.
Finish.
Multimedia Server
State 1 State 5
State 2 State 6
Install .Net framework
Streaming MultiMedia
Extensions from Server
State 3 State 7
Install Multimedia Receive the on-stream
Server application by User
State 4
Application icon
generated on the desktop
Figure 5.2.1
Multimedia Client
State 1 State 5
State 2 State 6
Install .NET
framework Streaming MultiMedia
Extensions from Server
State 3 State 7
Install Multimedia Receive on-stream
Client application Multimedia Client
State 4
Application icon
generated on the desktop
Figure 5.2.2
There are some specific states of control with respect to project services. The overall
control of flow is given in figure 5.3
Figure 5.3.1
Table 6.1
Code Generation
The design must be translated into a machine-readable form. The code generation step
performs this task. If design is performed in a detailed manner, code generation can be
accomplished with out much complication. Programming tools like Compilers,
Interpreters, and Debuggers are used to generate the code. Different high level
programming languages like C, C++, VB.Net, C# are used for coding. With respect to
the type of application, the right programming language is chosen.
Some companies build there own testing tools that are tailor made for there own
development operations.
Software will definitely undergo change once it is delivered to the customer. There
are many reasons for the change. Change could happen because of some unexpected
input values into the system. In addition, the changes in the system could directly
affect the software operations. The software should be developed to accommodate
changes that could happen during the post implementation period.
Deployment
This is the major factor for achieving the desire result. Development tool provide the
massive support to develop perfect result. In this project, development tool will play
the massive role to achieve high quality result.
Table 6.2.1
Network Monitoring
Figure 6.2.3
User Information.
Listen user.
Complete analysis.
Design and implementation.
Know target product.
Support tool.
According to this project we have a lot of consideration over the historical data. This
project has both software and network flavor. This is the communication environment
over the network. We assumed following data for the deployment and release.
The historical data gave us the complete idea of project compilation. According to
Multimedia server, first we have considered network design analysis with respect to
operating system. The overall securities apply by the software application like we
considered Active Directory and DNS services. The other most historical data is about
the perfect and good looking GUI. We have considered a lot of pre-made application
like Media player, Net meeting and third party product. We considered some
streaming software like Media Player and Net Meeting by mean of implementation.
The real time streaming products gave us strong support of the project compilation.
There were a lot of considerations about the database management system. We have
also considered some third party tool for system development life cycle.
This is all about the one sided estimation in term of multimedia server. Now we
considered the multimedia client software requisites. Multimedia client is controlled
by the multi media server that’s why we covered a lot of LOC in multimedia server
software estimation.
8 Test Plan
Software testing is the critical element of software quality assurance and represents
the ultimate review of specification, design and code generation. The test plan
outlines the entire testing process and includes the individual test cases. To develop a
solid test plan, you must systematically explore the program to ensure coverage is
thorough, but not unnecessarily repetitive. A formal test plan establishes a testing
process that does not depend upon accidental, random testing.
Testing accomplishes a variety of things, but most importantly it measures the quality
of the software you are developing. This view presupposes there are defects in your
software waiting to be discovered and this view is rarely disproved or even disputed.
Several factors contribute to the importance of making testing a high priority of any
software development effort.
The earlier in the development cycle that testing becomes part of the effort the better.
Planning is crucial to a successful testing effort, in part because it has a great deal to
do with setting expectations. Considering budget, schedule, and performance in test
plans increases the likelihood that testing does take place and is effective and
efficient. Planning also ensures tests are not forgotten or repeated unless necessary for
regression testing.
This Software test split into two main perspectives.
Internal program logic exercise using “white box” test case design techniques.
External program logic exercise using “black box” test.
According to white box testing, the complete system control structure of the
procedural design to derive cases. This project has the integrated structures which are
independent to each Other. This is the main step with respect to team work because all
the development is the return of team work. Every team can test its own integrated
application with respect to project development. Integrated testing of the application
avoids the huge and bulk phase of testing. In this step we control the testing at the
level of project control statements by mean of Boolean condition. Every statement has
its own condition with respect to the project life cycle. There are some iterations on
the project development, they also be tested by integration. Some conditions are valid
with specific condition so there is complex testing with respect to validation. This
phase of testing can generate the valid report of every statement with respect to the
project control. White box embedded by the following steps.
1: Guarantee that all independent path with in the module.
2: Exercise all logical decision on the basis of True and False.
3: Execute all the loops at their boundaries and operations bounds.
4: Exercise internal data structures to ensure their validity.
According to the black box testing, we considered behavioral testing and focus on the
functional requirement of the project. Black box attempts error in different manners.
First we considered the integrated functionality based on sub-system or the unit of
system. By using integrated testing in black box we enabled to test overall system
with respect to exact test plan. Every team member traced error and threat of his part
of implementation. Black box testing tends to applied during stages of testing. It is all
about the control structures so attention was focus on the information domain. Black
box embedded by the following steps.
1: Incorrect or missing function.
2: Interface errors.
3: Errors in the data structures or external database access.
4: Behavior or performance errors.
5: Initialization and termination errors.
Recovery testing
According to this project, we considered recovery testing in term of static and
dynamic. Statically we considered pre plan recovery strategies because there were so
many problems during implementation. During implementation we have recovered
many future recovery stuffs in term of pre-plan recovery. After static recovery we
considered run-time recovery by mean of dynamic.
In dynamic testing, we considered recovery the run time of project. We handled many
exceptions at the run time because it is important to organize project functionality at
the run time. If any module fail during execution we implemented a desire recovery
processes at the run time.
Security testing
Security testing is about validating your application's security services and identifying
potential security flaws. This section contains important testing recommendations for
verifying that you have created a securable application.
There are many issues in term of security because authorization and authentication
have most important role in project execution. There are important data over the
network and target user access it by some access policy that applies on him/her. We
considered couple of testing strategy over the project by mean of security. For
example a wrong person login through the network an access important multimedia
data by mean of security threats. Like
Interruption
Interception
Fabrication
Modification
Stress testing
Stress testing, which is a specialized form of performance testing, is similar to
destructive testing in other fields of engineering. The goal of stress testing is to crash
the application by increasing the processing load past performance degradation until
the application begins to fail due to saturation of resources or the occurrence of errors.
Stress testing helps to reveal subtle bugs that would otherwise go undetected until the
application was deployed. Since such bugs are typically the result of design flaws,
stress testing should begin early in the development phase on each area of the
application. Fix these subtle bugs at their source instead of fixing symptomatic bugs
that may occur elsewhere in the application if these bugs were ignored.
We considered many multimedia extensions streaming over the network which have
20 to 30 client machines. Multimedia extensions want the high bandwidth medium
during streaming so we have applied many extensions at the run time and change it
frequently.
Performance testing
Performance testing presumes that the application is functioning, stable, and robust.
As such, it is important to eliminate as many variables as possible from the tests. For
example, bugs in the code can create the appearance of a performance problem or
even mask a performance problem. To accurately compare the results from different
performance test passes, the application must be working correctly. It is especially
important to retest application functionality if the tuning process has modified the
implementation of a component. The application must pass its functional tests before
you can test its performance. In addition to application changes, unexpected changes
can occur in hardware, network traffic, software configuration, system services, and
so on. It is important to control changes to the application.
Wireless Environment:
If you are going to move over the wireless environment then you have to consider
some terminologies. Totally it is all about the hardware and the deployment
environment because you will just change your hardware in term of wireless
environment and configure it by mean of Addressing. Wireless environment has some
recommendations like AOC (area of coverage) and security issues. You must define
your domain of communication in term of coverage area. You may deploy your
encryption and decryption tool for threat less communication.
Ad-Hoc Environment:
Now a day, there are so many researches over the Ad-hoc environment. According to
the future enhancement of this project, we will able to deploy it over the access
pointless environment (Ad-hoc). We will convert to Ad-hoc environment by the wi-fi
enable communication device. This device has some specification and configuration
in different direction but it is very smart in special environment. There is simple
application interfacing by mean of self database server for autonomous navigation of
system. Every application will be totally independent to each other. Some special tool
will be use to improve Ad-hoc communication.
VPN Environment:
Virtual private network is the most handsome future plan for this system. Every one
want to become co-operate in term of information sharing. VPN provide large area
coverage so it will become a wide area network application. VPN boost multimedia
communication over the large area.
10 Conclusion
There is one multimedia server that control his multimedia clients with respect to
security because your multimedia extension is very secure and you don’t want to
shared it softcopy with other people but you want stream it for business, market and
education point of view. This system is the powerful tool in cooperative environment
because every industrial pool is converging over team work. Team leader, Director,
Teacher can communicate with respect to quick and noiseless environment.
H. APPENDICES
i. Project Schedule
Project Timeline chart
JAN FEB MAR APR MAY JUN JUL AGU SEP OCT NOV DEC
REFERENCE
[1] Jackson M. H., Baldeschwieler J. E. and Rowe L. A., "Berkeley CMT Media
Toolkit API" , U. C. Berkeley, (submitted for publication).
[2] Mayer-Patel K., Simpson D., Wu D., and Rowe L. A. "Synchronized Continuous
Media Playback Through the World Wide Web" ,U.C. Berkeley, Computer Science
Division, Soda Hall, Berkeley, CA 94720
[3] Rowe L. A., "Continuous Media Applications", Multipoint Workshop held in
conjunction with ACM Multimedia 1994, San Francisco, CA, November 1994.
[4] Microsoft Learning & Research. (2003). Retrieved from the World Wide
Web on 02/10/2005.www.microsoft.com/windows2000/
Technologies/ terminal/default.asp
[5] Microsoft Learning & Research. (2003). Retrieved from the World
Wide Web on 02/16/2005. www.microsoft.com/windowsserver
2003/techinfo/overview/termserv.mspx
[6] Remote Service Research. (2000). Retrieved from www on 02/17/2005.
www.rdesktop.org
[7] C# Corner Research. (2001). Retrieved from www on 02/03/2005. www.c-
sharpcorner.com/Network/NetworkProgramPart2RVS.asp
[8] Code Beach Research. (1999). Retrieved from www on 02/11/2005.
www.codebeach.com/index.asp?tabID=2& categoryID=15&subcategoryID=7
[9] Complete Reference C# .Net
[10] SQL Server 2000 Microsoft Press.
I. GLOSSARY
Multimedia
It is the collection of meaningful and attractive information.
Multimedia extension
Visualized information files. Like (Video, Audio, Animation, Picture, Voice, Text)
etc.
Multimedia client
It is the workstation or member server that gets on-stream data.
Multimedia server
It is the server that stream multimedia extensions.
Streaming
It's called "streaming" because the video,sound and picture data flow in a digital
stream from a server computer to your computer, ready to hear or view in real time,
without having to download all of the content before you can enjoy it. It comes to you
in a stream of digital bits... hence the term "streaming."
Remote streaming
It is the transfer of files over the LAN environment.
Real time video
The real time video is directly streamed after span of time by mean capturing.
Real time voice
The real time voice is directly streamed by mean capturing.
Ethernet 802.3
Ethernet protocols refer to the family of local-area network (LAN) covered by the
IEEE 802.3. In the Ethernet standard, there are two modes of operation: half-duplex
and full-duplex modes. In the half duplex mode, data are transmitted using the
popular Carrier-Sense Multiple Access/Collision Detection (CSMA/CD) protocol on a
medium.
Half duplex mode:
It works one operation either send or receive.
Full-duplex mode
Simultaneously (stream and get-stream) multimedia extension