B Pages:5 Words:1367
This is just a sample.
To get a unique essay
Hire Writer
Type of paper: Essay
University/College: University of Arkansas System
Subject: ,
Download: .pdf, .docx, .epub, .txt

A limited time offer!

Get custom essay sample written according to your requirements

Urgent 3h delivery guaranteed

Order Now

Text Messages and Video Conferencing

Project Objective The objective of this project is to implement sending and receiving text messages and video conferencing on LANA using Visual Basic. It provides functionality that enables classes to use a default application framework. Once the frame work is able to do sending and receiving messages and video conferencing on LANA, the project can be extended in future for developing audio chat as well.

We will write a custom essay sample on Text Messages and Video Conferencing specifically for you
for only $13.90/page
Order Now

Two users are able to chat by entering each others’ IP addresses. Users can easily add and delete contacts from their contact list.

Users can accept and reject invitations or requests of video hat. Since the only form of authentication is enabling the recipient to accept chat request, this application is not very secure to use on the Internet. But, this application is intended to be used inside a LANA where users are known and trusted. Questionnaires 1 . Who can benefit this system? 2. What are the requirements In terms of: Hardware components Software Components 3. What features does the system offer In terms of: Sending and receiving message Video Conferencing 4.

How many participants do you envisage needing to use the system? Will be the equipment be used? In a single location dedicate location at school range location throughout the school 5. Where 6. Are there any maintenance and support services or contracts available to you In relation to the equipment? 7. How much was the cost of the project and when will be Its duration? 8. How easy Is the equipment to use and operate? How straightforward Is the user Interface? Statement of Problem This present study tries to analyze, design, develop, test and Implement secured LANA chat system.

Specially, the study sought answer the following questions: 1. Who can benefit this system? 2. How efficient the LANA chat System Is? 3. What specific programming language needed for the proposed LANA chat System? 4. What are the technical features of the proposed system In terms of: a. Security b. Celestially d. System Process Significance of the Study The proposed system basically connects to certain people by obtaining an IP Configuration; it also provides video conferencing by obtaining the said IP address.

Further, it also provides on sending and receiving messages through LANA and at the same time you can only chose and create contact list wherein a certain person you want can only interact to you by getting its IP address. This system is a project proposal intended for the students and officers/employees of some establishments for them not to need a wireless connection Just to communicate to other people or their friends. This would also allow them to connect and socialize to people like sending and receiving text message and video conferencing through LANA even though they don’t have connections like wireless or modem.

With this system, it would be easy for them to exchange thoughts and ideas by Just communicating to their friends. Review of Related Literature The simplest computer chatting is a method of sending, receiving, and storing typed assuages with a network of users. This network could be WAN (Wide Area Network) or LANA(Local Area Network). Our chatting system will deal only with Élan’s (static IP address) and it is made up of two applications one runs on the server side (any computer on the network you choose it to be the server) while the other is delivered and executed on the client PC.

Every time the client wants to chat he runs the client application, enter his user name, host name where the server application is running, and hits the connect button and start chatting. The system is many-to-many arrangement; every-one is able to “talk” to anyone else. Messages may be broadcasted to all receivers(recipients are automatically notified of incoming messages) or sent to special individuals (private chatting through server) where during this operation all messages are encrypted at the sender side and decrypted at the recipient to disallow any hackers to the server from reading these private messages.

For this system to be physically realized you should be familiar with programming and networking. Visual Basic is our programming language, TCP/IP is our network protocol, and finally “windows sockets” is our programming interface to have access to network functionality. Video conferencing enables direct face-to-face communication across networks. The term ‘video conferencing’ covers a range of communication activities and technologies.

At one end of the scale are web- conferencing tools such as Yahoo Instant Messenger, which can be used with low- cost webs on stand-alone PC’s to provide basic video conferencing facilities. At the high end of the scale are dedicated video conferencing studios with specialist cameras, lighting and audio equipment. What each video conferencing system has in common is that two or more parties in different locations have the ability to monomaniac using a combination of video, audio and data.

A video conference can be person to person (referred to as ‘point-to-point’) or can involve more than two (the United Kingdom Education and Research Networking Association) to develop a national schools’ network. This will be a secure network, available from anywhere, allowing easy access to a wide range of high quality online applications, including video conferencing. Methodology Waterfall Approach In the software development process cycle, programming models are used to plan the various stages of developing an application. One such model is the waterfall del.

It is called such because the model develops systematically from one phase to another in a downward fashion, like a waterfall. Requirement Gathering and Analysis Deployment of System System Design Implementation Testing Maintenance Figure 1 . Waterfall Model Figure 1 shows the model that the researchers followed from the start until the implementation of the system. It had begun in the gathering of requirements and analysis. The researchers conducted an interview with the client in order to assemble the necessary information in constructing the system Just as how the client expects it to be.

Sharing of if ideas and opinions between the researchers and the client took place during the meeting of the requirements for the said system, in order to distinguish, whether such requirements could be valid and possible to be included in the system to be developed . Seer friendly interface, big capacity of storage, reliable and secure. After the requirements have been gathered and analyzed, the researchers then started to build the design of the system. The user -interface was drafted and designed according to client’s request.

The researchers chose IV programming Language for construction of the system. The design served as a guide on where to begin and to end. Without this, the construction of the system would be difficult. Upon finishing the chosen design of the system, the coding was started. As the coding of the system progressed, immediate testing was done to distinguish if it works in the preferred way and to remove all the bugs. When the construction of the system was at the last completed, it was tested to phase. After the successful testing of the system, it was then transported to client .

The waterfall approach was used as guide to complete the system or project. Proponents System Analyst is responsible for the support of at least complex systems and applications, analyzes and understands the current state processes to ensure that the context and implications of change are understood by the clients and project teams, develops an understanding of how present and future business needs will impact to the solution and works with the clients to prioritize and rationalize the requirements of the system.

The documenter or project writer develops and maintains, under the supervision of the project leader, the different documents pertaining to the management of the project including the project plan/schedule of he project closure document. In this project, the first systems analyst and the project manager is John Michael Mango. In systems development, he is responsible for the designing of the new system/application.

Also required to perform as a programmer, where he actually writes the code to implement the design of the proposed application. The second systems analyst is Siebel Managua who is responsible for defining the alternate solutions to the system and also for the problems occurring at the various stages of the development process. Finally, the documenter is Johnnie Malay who designs, creates and maintains technical documentation.