Sie sind auf Seite 1von 26

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

A Seminar Report on

Media Player
Submitted in the partial fulfillment of degree of Bachelor of Technology in Computer Science and Engineering under Rajasthan Technical University, Kota (Raj.)

Submitted to: Mr. Manoj K Nama (Sr. Lect. CSE Dept.) SKIT Jaipur

Submitted By: Ankur Gupta (08ESKCS015) Mohit Agarwaal (08ESKCS66) Kamalkant Gaider(08ESKCS50)

SWAMI KESHVANAND INSTITUTE OF TECHNOLOGY, MANAGEMENT & GRAMOTHAN, JAIPUR


MAK/SKIT Page 1

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

CERTIFICATE

This is to certify that the seminar entitled MEDIA PLAYER has been presented by ANKUR GUPTA, MOHIT AGARWAL AND KAMALKANT GAIDER under my guidance during the academic year 2011-2012.

Guide Mr. Manoj K Nama Head of the Department Prof. C.M Chaudhary

MAK/SKIT

Page 2

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

Acknowledgement
I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me in completing this project successfully.

First of all, I would like to thank Mr. Surana Academic Director (SKIT, JAIPUR) for creating opportunities to undertake me in the esteemed organization. Special thanks to Mr. Manoj kumar Nama, Project Manager for all the help and guidance extended to me by him in every stage during my training. His inspiring suggestions and timely guidance enabled me to perceive the various aspects of the project in a new light. I would also thank to my Mr. CM Chaudhary, HOD (COMPUTER SCIENCEDEPT.) & my internal project guide Mr. M.K.Nama who guided me a lot in completing this project. I would also like to thank my parents & project mate for guiding and encouraging me throughout the duration of the project. Last but not least, I convey my thanks to all members who directly or indirectly helped me in successfully completing my project work.

ANKUR GUPTA(08ESKCS015) MOHIT AGARWAAL(08ESKCS066) KAMALKANT GAIDER(08ESKCS050) 8th SEM, CSE

MAK/SKIT

Page 3

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

INDEX
1.0 1.1 1.2 1.3 1.4 1.5 2.0 2.1 INTRODUCTION Purpose Scope Terminologies used Technologies to be used Product Feature OVERALL DESCRIPTION Products Perspective

2.2 Software Interface 2.3 Hardware Interface 2.4 Communication Interface 2.5 Product Function 2.6 User characteristics 2.7 Constraints 2.8 Use case model description 2.9 Class diagram 2.10 Sequence diagram 2.11 Functional diagram 2.12 Schemas
MAK/SKIT Page 4

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

2.13 Assumptions and Dependencies 3.0 Specific Requirements 3.1 Use Case Report 3.2 Supplementary Requirements 4.0 FAQs 4.1 References

1.0 INTRODUCTION:
MAK/SKIT Page 5

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

The application shall allow the user to lawfully and freely distribute music over the internet. For each song the user should be charged a fee which is agreed between the client and the provider. Once the fee is paid the music is distributed to him/her. From here onwards the user can they distributed the music using their own personal hardware or software. The application should inform the user which devices are connected to the system at any one time. The system should allow the distribution of music to external devices as well as to other systems by providing networking capability. The application will finally incorporate advanced searching and sorting facilities, making it easier for the user to organize their music collection.

1.1 PURPOSE:

The purpose of the application is to deliver an easy-to-use music sharing and downloading application. It should be available for even the most novices of computer users and run on small computers. The application itself is a complete piece of software with few dependencies on other aspects of the environment. The application is a new piece of software which will be given a release number of 0.1. Future release numbers will follow the common number convention.

1.2 SCOPE:

The application should strengthen the weaknesses mentioned in the ethnographic studies. The application should be able to run on any system regardless of the operating system or hardware; within reason. The application will be installed on a home users desktop computer or laptop using an installation wizard The application is design for all types of users regardless of their age or experience; however limitations and locks will be applied to users under the age of 16. The application must function effectively and maintain an efficient level of service with maximum uptime to download songs.

1.3 TERMINOLOGIES USED:

MAK/SKIT

Page 6

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

SLA: SLA is a formal written agreement made between two parties. The service provider and the service recipient. It defines the term of engagement the fundamental rules that will govern the relationship. HTML: Hypertext Markup Language is a markup language used to design static web pages. EJB: Enterprise Java Beans. J2EE: Java 2 Enterprise Edition is a programming platformpart of the Java platformfor

developing and running distributed multitier architecture Java applications, based largely on modular software components running on an application server. DB2: DB2 Database is the database management system that delivers a flexible and cost effective database platform to build robust on demand business applications. WAS: Web sphere application server is an application server that runs business applications and supports the J2EE and web services standards. WSAD : Web sphere studio application developer is a toolkit which is designed for the creation of more complex projects, providing fully dynamic web application utilizing EJBs. This consist of EJB tools, CMP, data mapping tools & a universal test client that is designed to aid testing of EJBs. HTTP: Hypertext Transfer Protocol is a transaction oriented client/server protocol between web browser & a Web Server. HTTPS: Secure Hypertext Transfer Protocol is a HTTP over SSL (secure socket layer). TCP/IP: Transmission Control Protocol/Internet Protocol, the suite of communication protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP.

1.4 TECHNOLOGIES TO BE USED:


J2EE: Application Architecture JSP: java server programming MAK/SKIT Page 7

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

1.5 PRODUCT FEATURE:

The application shall allow the user to lawfully and freely distribute music over the internet. For each song the user should be charged a fee which is agreed between the client and the provider. Once the fee is paid the music is distributed to him/her. From here onwards the user can they distributed the music using their own personal hardware or software. The application should inform the user which devices are connected to the system at any one time. The system should allow the distribution of music to external devices as well as to other systems by providing networking capability. The application will finally incorporate advanced searching and sorting facilities, making it easier for the user to organize their music collection. The application is intended for users who use and distribute music electronically. One of the highest priorities is age verification; people under the age of 16 should not be allowed to purchase the songs online and adults may also chose to lock specific songs which contain offensive material. The application shall allow both novice users and more competent computer users to use the system effectively. For more frequent computer users, there will be options for advanced functions to allow them to generate their own playlists along with storing and loading multiple files. The system shall restrict remote users being able to download music on a clients system.

2.0 OVERALL DESCRIPTION:

2.1 PRODUCTS PERSPECTIVE:


MAK/SKIT Page 8

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

Music System MAK is a software application aimed towards people who need software assistance for music media distribution. This innovative application hopes to compete against currently available software applications for music media distribution, such as Apple iTunes and Microsoft Windows Media Player.

2.2 SOFTWARE INTERFACE:


2.2.1 OPERATING SYSTEM :The product will work with any version of Mac OS X, Windows XP, Windows Vista and Windows 7.

2.2.2 LIBRARIES:The product will support the audio compression formats and related codecs for MPEG-1, MPEG-2, MPEG-3, MPEG-4 and Windows Media Audio (WMA).

2.2.3 INTEGRATED COMMERCIAL COMPONENTS:The system will interact with web application programming interfaces (API) of third party services, such as YouTube, Facebook, MySpace and iTunes.

2.3 HARDWARE INTERFACE:


2.3.1 GAMING CONSOLES:-

MAK/SKIT

Page 9

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

The product will enable interaction with gaming consoles, such as PlayStation 3 and Xbox 360 via wireless network connection and USB cable connection in order to support music distribution between these devices.

2.3.2 MOBILE DEVICES:The external hardware interface will support mobile devices, such as smart phones and digital music players, via a Universal Serial Bus (USB) cable or Bluetooth connection in order to allow the exchange of music files and synchronization of playlists.

2.3.3 EXTERNAL STORAGES


The product will support transparent connections with external hard drives in order to support automatic archiving capability.

2.3.4 AUDIO INPUT & OUTPUT


The product will work with audio recording devices such as microphones. External audio equipment such as Hi-Fi speakers will also be supported.

2.4 COMMUNICATION INTERFACE:


It uses HTTP/HTTPS protocol on client side. Firewall security is required for security the server. TCP/IP protocol is the basic need for the client side.

2.5 PRODUCT FUNCTION:

MAK/SKIT

Page 10

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

2.5.1 FUNCTIONAL REQUIREMENTS (OR PRIMARY FUNCTIONS)


The system shall have an Internet connection. This will enable the downloading of songs from a digital media store. In addition, users shall be able to use a web browser in locating songs to download. The system shall allow a media server configuration. This will allow music in the library to be shared with compatible remote devices. Therefore, both the system and devices shall use a common networking protocol. In this user could access music located on their media player through a games console. As a result of this, the system shall restrict access to the shared network to those who have authorized access. The system shall communicate with distribution devices via a connection. This could be a wired connection or optionally a wireless connection.

2.5.2

NONFUNCTIONAL

REQUIREMENTS

(OR

SECONDARY

FUNCTIONS): 2.5.2.1 Performance Requirements


The application must have a minimum processor speed so that there are some restrictions on what type of computer can use it. However this will be as small as possible to enable a broad range of clients to use the application. From Jonathons ethnographic study we can see that speed was a common issue while distributing music. The system must also aim to use minimum hard disk space yet keep the quality of the media as high as possible.

2.5.2.2 Safety Requirements


All songs downloaded will be checked before downloaded by the system to make sure the music has no viruses in order to keep the users computer safe from being attacked. The next requirement is that a compressed version of the songs which are downloaded get saved to a back-up area so that if something goes wrong with the software like it crashes the song files are still safe.

2.5.2.3 Security Requirements

MAK/SKIT

Page 11

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

Information of users such as IP addresses will be kept private so that third parties cannot gain access to this personal information in order to keep within the Data Protection Act. The next requirement is that the system should prevent the user downloading material which would be deemed offensive such as blasphemy and obscene material and also the system will check certain age restrictions on songs to make sure that material isnt seen by minors. The final limitation is that the method of which people share their music should have limitations so that Copyright of songs is not broken.

2.5.2.4 Software Quality Attributes


These are a variety of constraints that might affect the user or system. The system should be able to by-pass security systems which are on the computer which deny our system connection. This is to enable that reliability is always at a high level; some ethnographic studies showed that users could not connected to the internet due to firewalls. The next requirement is that the application should enable music files to be converted to different, valid, formats and that all common music formats should be supported; any which arent are provided with plug-ins to enable them. This is to ensure interoperability between the files and system, the decision for this was that in numerous ethnographic studies the downloaded music couldnt be played using their chosen device. Another interoperability requirement is that the system should allow any storage device to connect to the system and enable the distribution of music. The reason for this is that research shows people used ITunes but they could only distribute the music on to their IPods which was found to be a problem. A usability requirement is that there should be a help guide within the new system so that the time that new users can soon understand the system; however the system will be simple and therefore self-explanatory. There will be hotkeys throughout the system so that users can speed up their performance once they have mastered how to use the program. The system should remember the last song played on the system so that users can manipulate the program easily and efficiently. The system will have a predictive search where the user starts typing in the name of a song and the system brings up a variety of options which begin with the same parts as the search. The reason for this is that if the user sees there search in the drop down box it saves them typing it out which may cause typing errors.

2.6 USER CHARACTERSTICS:


The application is intended for users who use and distribute music electronically. One of the highest priorities is age verification; people under the age of 16 should not be allowed to purchase the songs online and adults may also chose to lock specific songs which contain
MAK/SKIT Page 12

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

offensive material. The application shall allow both novice users and more competent computer users to use the system effectively. For more frequent computer users, there will be options for advanced functions to allow them to generate their own playlists along with storing and loading multiple files. The system shall restrict remote users being able to download music on a clients system. The target clients for our software are ordinary computer users who distribute music media. It is assumed that the target group does not have to be familiar with the use of any software of similar functionality, but to have a basic computer and Internet skills that will enable them to use this software.

2.6.1 NOT-REGISTERED USERS CLASS


Able to use all of the functionality of the Music Player Component Able to use limited functionality of Music Search Component searching for music in other users shared music libraries Not able to use any of the functionality of the Music Organiser Component Not able to use any of the functionality of the Music Sharer Component

2.6.2 REGISTERED USERS CLASS


Able to use all of the functionality of the Music Player Component Able to use all of the functionality of the Music Search Component Able to use all of the functionality of the Music Organiser Component Able to use all of the functionality of the Music Sharer Component

2.7 CONSTRAINTS:

GUI is only in English. Login and password is used for identification Page 13

MAK/SKIT

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

Trail version of the system will be valid up to 30 days To avail full functionality of system license should purchased All devices must be tamper evident. System should be update regularly. Crash reports of the system must be sent to the developer team. All devices must undergo a full re-installation and product upgrade. .

2.8 USE CASE MODEL DESCRIPTION:


A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram. Its purpose is to present a graphical overview of the functionality provided by system in terms of factors, their goals (represented as use cases), and dependencies between those use cases

Update

login

playlist

Play AUDIO/VIDEO

Customization

User Actions 2.9 CLASS DIAGRAM:


The class diagram is the main building block in object oriented modeling. It is used both for general conceptual modeling of the systematic of the application, and for detailed modeling translating the models into programming code. The classes in a class diagram represent both the main objects and or interactions in the application and the objects to be programmed. MAK/SKIT Page 14

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

MAK/SKIT

Page 15

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

SEQUENCE DIAGRAM:
A sequence diagram shows, as parallel vertical lines (lifelines), different processes or objects that live simultaneously, and, as horizontal arrows, the messages exchanged between them, in the order in which they occur.

MAK/SKIT

Page 16

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

2.11 Functional Diagram:

MAK/SKIT

Page 17

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

Age Name Email Id. Phone No. Experience Candidate Id Contact Details

General Details
Row

Party Details

Area Id

Area Name

Address
City State Domicile Voter Id Vote Casted

Candidate
Upload Correct Details

Area

Id Verification Gets Data From Form Reg. form Name Verification

General Public

Field Officer

General Details
Contact Details Address

Validates The Data Gets Data And

Age Phone No. Name Email id

validates it

Election Commission

Admin

Id

Name

MAK/SKIT

Page 18

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

2.11 ASSUMPTIONS AND DEPENDENCIES:


The voting is done through the country on a single day. All the candidates have their respective data on portals of their parties which can be kinked with the main electronic voting sites. Role of every user predefined and no other extensions can be done without the permission of election commissioner and administrator both. User ID and password are provided with Voter-Id which can further be modified.

Important: During the making of this project it has been assumed that the city is not been divided into different wards. In fact the whole city can be treated as a ward and all the candidates of particular city compete under one ward only. The voters also cast their votes under one ward only.

3.0 SPECIFIC REQUIREMENTS:

3.1 USE-CASE REPORTS:


A) ADMINISTRATOR Responsible for providing all the information of candidates who have applied for the polling and voter registration. I) PROFILE OF CANDIDATES

MAK/SKIT

Page 19

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

All the candidates have to submit their information to the administrator so that it can be displayed on the site. II) PROVIDING THE LIST OF CANDIDATES He will provide the list of all the candidates at the local as well as national level. DESCRIPTION Administrator inserts the candidates profile data in the database only after verification. After then only the profile is displayed on the portal. PRECONDITIONS Data is verified by the Administrator. Administrator is logged in already.

NORMAL FLOW OF EVENTS: Administrator clicks on to the link of view profiles on his home page. Data is already provided by the candidate and the administrator verifies it. Query is submitted and data is saved on database.

B) FIELD OFFICERS All the responsibility of maintaining the connection and availability of the system is taken by this person. He is also responsible for voter registration done on the day of polling. I) MANAGING CONNECTIVITY AND AVAILABILITY OF THE SYSTEM All the connectivity and system availability is maintained while polling process continues. II) ON-SPOT VOTER REGISTRATION Voters who were not able to register themselves beforehand, the field officers do their registration thereby itself on the day of polling.

DESCRIPTION All newly registered voters are given a unique id by the Administrator which is useful for them while voting because they are registered in database with this id.

MAK/SKIT

Page 20

MEDIA PLAYER Project_ report MAK PRECONDITIONS

SKIT 25-02-2012

All the formalities are done such as Voter Id-card. Voters are verified.

NORMAL FLOW OF EVENT Data verified by election commission. Data sent to Administrator. Voters information is verified by the administrator and stored in database and given a unique id for login.

C) CANDIDATES The candidates who are competing for elections in their respective constituencies are provided with a registration form. After filling the form and getting it verified by the Administrator, the candidates are eligible for voting. I) PROVIDE PROFILE INFORMATION The candidate provides the information regarding his/her qualification, profession, party which he wants to join, etc by filling the registration form. NAME OF CASE USED:- PROVIDE PROFILE INFORMATION

DESCRIPTION All the candidates wishing to contest elections have to provide their detailed information on the form upload on the site. This information is then verified by the Administrator, only after which the candidate can fight elections. The candidate is also given a unique id by the Administrator which can be used by them for updating profile information. PRECONDITIONS All the formalities are done such as age verification, medical checkup, etc. Candidates are verified.

MAK/SKIT

Page 21

MEDIA PLAYER Project_ report MAK NORMAL FLOW OF EVENT Profile details provided by the candidate. Data sent to Administrator.

SKIT 25-02-2012

Candidates information is verified by the administrator and only after successful verification , they are given a unique Id for login.

D) VOTERS The candidates who are competing for elections in their respective constituencies are provided with a registration form. After filling the form and getting it verified by the Administrator, the candidates are eligible for voting. I) PROVIDE PROFILE INFORMATION The candidate provides the information regarding his/her qualification, profession, party which he wants to join, etc by filling the registration form. II) CAST THEIR VOTES The voters practice their right to vote by logging into their account. After login the candidate list is displayed and the voter can chose which candidate to vote. III) GETTING INFORMATION ABOUT PARTY MANIFESTOS AND CANDIDATE PROFILES: Party manifestos are already stored in database and the voter is displayed this on his homepage. He can also view the profiles of all the candidates who are contesting for elections. DESCRIPTION All the voters wishing to cast their vote have to provide their detailed information on the form uploaded on the site. This information is then verified by the Administrator, only after which the voter can vote. The voter is also given a unique id by the Administrator which can be used by them for login and viewing party manifestos and candidate profiles. PRECONDITIONS All the formalities are done such as age verification, medical checkup, etc. Voters are verified.

NORMAL FLOW OF EVENT MAK/SKIT Page 22

MEDIA PLAYER Project_ report MAK Information details provided by the voters. Data sent to Administrator.

SKIT 25-02-2012

Voters information is verified by the administrator and only after successful verification, they are given a unique Id for login.

3.2 SUPPLEMENTARY REQUIREMENTS


POWER BACKUP Whenever the polling is taking place the system should not face any breakdown in the supply of power otherwise data could be lost or connection could be broken. PROPER MAINTENANCE While in operation if any error occurs when there must be a technical person to solve it, he can be any one of polling agents. NETWORK AVAILABILITY AND BANDWIDTH ISSUE High speed network connection is required so that the data can travel swiftly. SERVER SHOULD BE HIGHLY RESPONSIVE When polling happens in any country on a single day then it would give a lot of stress on to the server, the server should be configured in a manner so that it can bear that stress.

FAQS: YOU REALLY NEED TO KNOW THIS

1.WHY SHOULD YOU VOTE? India is the largest democracy in the world. The right to vote and more importantly the exercise of franchise by the eligible citizens is at the heart of every democracy. We, the people, through this exercise of our right to vote have the ultimate power to shape the destiny of country by electing our

MAK/SKIT

Page 23

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

representatives who run the Government and take decisions for the growth, development and benefit of all the citizens.

2 .WHO CAN VOTE? All citizens of India who are 18 years of age as on 1st January of the year for which the electoral roll is prepared are entitled to be registered as a voter in the constituency where he or she ordinarily resides. Only persons who are of unsound mind and have been declared so by a competent court or disqualified due to Corrupt Practices or offences relating to elections are not entitled to be registered in the electoral rolls. 3 .WHAT IS THE DISCLOSURE BY CANDIDATES? 3.1 Recently the Election Commission of India has made it mandatory consequent upon a Judgment of Humble supreme court that all candidates must file an affidavit along with their nomination form with details such as:i. his/her criminal antecedents, ii. his/her assets and liabilities and those of his/her spouse and dependents, and iii. his/her educational background. This has been done with a view that every citizen has a right to know about the candidates contesting an election and make an informed choice. 3.2 The Election Commission has directed all Returning Officers to display the copies of nomination papers and accompanying affidavits received during any day on his notice board immediately on receipt and make copies of these for distribution to the press and any members of public who want this information, free of cost. Any citizen of the country can obtain copies of the nomination form and the affidavit filed by any candidate from the Returning Officer and it shall not be refused. As a voter you have every right to seek this information and get it. 3.3 Above measures help the electors make an informed choice about the candidate they are going to vote for.

MAK/SKIT

Page 24

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

4.0 REFERENCES

1. www.videolan.org 2. www.wikipedia.com 3. www.google.com

MAK/SKIT

Page 25

MEDIA PLAYER Project_ report MAK

SKIT 25-02-2012

MAK/SKIT

Page 26

Das könnte Ihnen auch gefallen