media player report (1)
TRANSCRIPT
-
7/31/2019 Media Player Report (1)
1/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 1
A Seminar Report on
Media PlayerSubmitted in the partial fulfillment of degree of Bachelor of Technology in
Computer Science and Engineering under Rajasthan Technical University,
Kota (Raj.)
Submitted to: Submitted By:
Mr. Manoj K Nama Ankur Gupta (08ESKCS015)
(Sr. Lect. CSE Dept.) Mohit Agarwaal (08ESKCS66)SKIT Jaipur Kamalkant Gaider(08ESKCS50)
SWAMI KESHVANAND INSTITUTE OF
TECHNOLOGY, MANAGEMENT &
GRAMOTHAN, JAIPUR
-
7/31/2019 Media Player Report (1)
2/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 2
CERTIFICATE
This is to certify that the seminar entitled MEDIA PLAYER has
been presented byANKUR GUPTA, MOHIT AGARWAL AND
KAMALKANT GAIDER under my guidance during the academic
year 2011-2012.
Guide
Mr. Manoj K Nama
Head of the Department
Prof. C.M Chaudhary
-
7/31/2019 Media Player Report (1)
3/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 3
Acknowledgement
I take this opportunity to express my sincere thanks and deep gratitude to all
those people who extended their wholehearted co-operation and have helped
me in completing this project successfully.
First of all, I would like to thank Mr. Surana Academic Director (SKIT, JAIPUR)
for creating opportunities to undertake me in the esteemed organization.
Special thanks to Mr. Manoj kumar Nama, Project Manager for all the help
and guidance extended to me by him in every stage during my training. His
inspiring suggestions and timely guidance enabled me to perceive the various
aspects of the project in a new light.
I would also thank to my Mr. CM Chaudhary, HOD (COMPUTER SCIENCEDEPT.)
& my internal project guide Mr. M.K.Nama who guided me a lot in completing
this project. I would also like to thank my parents & project mate for guiding
and encouraging me throughout the duration of the project.
Last but not least, I convey my thanks to all members who directly or indirectly
helped me in successfully completing my project work.
ANKUR GUPTA(08ESKCS015)
MOHIT AGARWAAL(08ESKCS066)
KAMALKANT GAIDER(08ESKCS050)
8th
SEM, CSE
-
7/31/2019 Media Player Report (1)
4/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 4
INDEX
1.0 INTRODUCTION1.1 Purpose1.2 Scope1.3 Terminologies used1.4 Technologies to be used1.5 Product Feature2.0 OVERALL DESCRIPTION2.1 Products Perspective
2.2 Software Interface
2.3 Hardware Interface
2.4 Communication Interface
2.5 Product Function
2.6 User characteristics
2.7 Constraints
2.8 Use case model description
2.9 Class diagram
2.10 Sequence diagram
2.11 Functional diagram
2.12 Schemas
-
7/31/2019 Media Player Report (1)
5/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 5
2.13 Assumptions and Dependencies
3.0 Specific Requirements
3.1 Use Case Report
3.2 Supplementary Requirements
4.0 FAQs
4.1 References
1.0 INTRODUCTION:
-
7/31/2019 Media Player Report (1)
6/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 6
The application shall allow the user to lawfully and freely distribute music over the internet.
For each song the user should be charged a fee which is agreed between the client and the
provider. Once the fee is paid the music is distributed to him/her. From here onwards the user
can they distributed the music using their own personal hardware or software. The application
should inform the user which devices are connected to the system at any one time. The
system should allow the distribution of music to external devices as well as to other systems
by providing networking capability. The application will finally incorporate advanced
searching and sorting facilities, making it easier for the user to organize their music
collection.
1.1 PURPOSE:
The purpose of the application is to deliver an easy-to-use music sharing and downloading
application. It should be available for even the most novices of computer users and run on
small computers. The application itself is a complete piece of software with few
dependencies on other aspects of the environment. The application is a new piece of software
which will be given a release number of 0.1. Future release numbers will follow the common
number convention.
1.2 SCOPE:
The application should strengthen the weaknesses mentioned in the ethnographic studies. The
application should be able to run on any system regardless of the operating system or
hardware; within reason. The application will be installed on a home users desktop computer
or laptop using an installation wizard The application is design for all types of usersregardless of their age or experience; however limitations and locks will be applied to users
under the age of 16. The application must function effectively and maintain an efficient level
of service with maximum uptime to download songs.
1.3 TERMINOLOGIES USED:
-
7/31/2019 Media Player Report (1)
7/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 7
SLA: SLA is a formal written agreement made between two parties. The service provider and the
service recipient. It defines the term of engagement the fundamental rules that will govern the
relationship.
HTML: Hypertext Markup Language is a markup language used to design static web pages.
EJB: Enterprise Java Beans.
J2EE: Java 2 Enterprise Edition is a programming platformpart of the Java platformfor
developing and running distributed multitier architecture Java applications, based largely on modular
software components running on an application server.
DB2: DB2 Database is the database management system that delivers a flexible and cost effective
database platform to build robust on demand business applications.
WAS: Web sphere application server is an application server that runs business applications and
supports the J2EE and web services standards.
WSAD : Web sphere studio application developer is a toolkit which is designed for the creation of
more complex projects, providing fully dynamic web application utilizing EJBs. This consist of EJB
tools, CMP, data mapping tools & a universal test client that is designed to aid testing of EJBs.
HTTP: Hypertext Transfer Protocol is a transaction oriented client/server protocol between web
browser & a Web Server.
HTTPS: Secure Hypertext Transfer Protocol is a HTTP over SSL (secure socket layer).
TCP/IP: Transmission Control Protocol/Internet Protocol, the suite of communication protocols used
to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP.
1.4 TECHNOLOGIES TO BE USED:
J2EE: Application Architecture
JSP:java server programming
-
7/31/2019 Media Player Report (1)
8/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 8
1.5 PRODUCT FEATURE:
The application shall allow the user to lawfully and freely distribute music over the internet.
For each song the user should be charged a fee which is agreed between the client and the
provider. Once the fee is paid the music is distributed to him/her. From here onwards the user
can they distributed the music using their own personal hardware or software. The application
should inform the user which devices are connected to the system at any one time. The
system should allow the distribution of music to external devices as well as to other systems
by providing networking capability.
The application will finally incorporate advanced searching and sorting facilities, making it
easier for the user to organize their music collection. The application is intended for users
who use and distribute music electronically. One of the highest priorities is age verification;
people under the age of 16 should not be allowed to purchase the songs online and adults may
also chose to lock specific songs which contain offensive material. The application shallallow both novice users and more competent computer users to use the system effectively.
For more frequent computer users, there will be options for advanced functions to allow them
to generate their own playlists along with storing and loading multiple files. The system shall
restrict remote users being able to download music on a clients system.
2.0 OVERALL DESCRIPTION:
2.1 PRODUCTS PERSPECTIVE:
-
7/31/2019 Media Player Report (1)
9/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 9
Music System MAK is a software application aimed towards people who need software
assistance for music media distribution. This innovative application hopes to compete against
currently available software applications for music media distribution, such as Apple iTunes
and Microsoft Windows Media Player.
2.2 SOFTWARE INTERFACE:
2.2.1 OPERATING SYSTEM :-
The product will work with any version of Mac OS X, Windows XP, Windows Vista and
Windows 7.
2.2.2 LIBRARIES:-
The product will support the audio compression formats and related codecs for MPEG-1,
MPEG-2, MPEG-3, MPEG-4 and Windows Media Audio (WMA).
2.2.3 INTEGRATED COMMERCIAL COMPONENTS:-
The system will interact with web application programming interfaces (API) of third party
services, such as YouTube, Facebook, MySpace and iTunes.
2.3 HARDWARE INTERFACE:
2.3.1 GAMING CONSOLES:-
-
7/31/2019 Media Player Report (1)
10/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 10
The product will enable interaction with gaming consoles, such as PlayStation 3 and Xbox
360 via wireless network connection and USB cable connection in order to support music
distribution between these devices.
2.3.2 MOBILE DEVICES:-
The external hardware interface will support mobile devices, such as smart phones and digital
music players, via a Universal Serial Bus (USB) cable or Bluetooth connection in order to
allow the exchange of music files and synchronization of playlists.
2.3.3 EXTERNAL STORAGES
The product will support transparent connections with external hard drives in order to support
automatic archiving capability.
2.3.4 AUDIO INPUT & OUTPUT
The product will work with audio recording devices such as microphones. External audio
equipment such as Hi-Fi speakers will also be supported.
2.4 COMMUNICATION INTERFACE:
It uses HTTP/HTTPS protocol on client side. Firewall security is required for security the server. TCP/IP protocol is the basic need for the client side.
2.5 PRODUCT FUNCTION:
-
7/31/2019 Media Player Report (1)
11/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 11
2.5.1 FUNCTIONAL REQUIREMENTS (OR PRIMARY FUNCTIONS)
The system shall have an Internet connection. This will enable the downloading of songs
from a digital media store. In addition, users shall be able to use a web browser in locating
songs to download. The system shall allow a media server configuration. This will allow
music in the library to be shared with compatible remote devices. Therefore, both the system
and devices shall use a common networking protocol. In this user could access music located
on their media player through a games console. As a result of this, the system shall restrict
access to the shared network to those who have authorized access. The system shall
communicate with distribution devices via a connection. This could be a wired connection or
optionally a wireless connection.
2.5.2 NONFUNCTIONAL REQUIREMENTS (OR SECONDARY
FUNCTIONS):
2.5.2.1 Performance Requirements
The application must have a minimum processor speed so that there are some restrictions on
what type of computer can use it. However this will be as small as possible to enable a broad
range of clients to use the application. From Jonathons ethnographic study we can see that
speed was a common issue while distributing music. The system must also aim to use
minimum hard disk space yet keep the quality of the media as high as possible.
2.5.2.2 Safety Requirements
All songs downloaded will be checked before downloaded by the system to make sure the
music has no viruses in order to keep the users computer safe from being attacked. The next
requirement is that a compressed version of the songs which are downloaded get saved to a
back-up area so that if something goes wrong with the software like it crashes the song files
are still safe.
2.5.2.3 Security Requirements
-
7/31/2019 Media Player Report (1)
12/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 12
Information of users such as IP addresses will be kept private so that third parties cannot gain
access to this personal information in order to keep within the Data Protection Act. The next
requirement is that the system should prevent the user downloading material which would be
deemed offensive such as blasphemy and obscene material and also the system will check
certain age restrictions on songs to make sure that material isnt seen by minors. The final
limitation is that the method of which people share their music should have limitations so that
Copyright of songs is not broken.
2.5.2.4 Software Quality Attributes
These are a variety of constraints that might affect the user or system. The system should beable to by-pass security systems which are on the computer which deny our system
connection. This is to enable that reliability is always at a high level; some ethnographic
studies showed that users could not connected to the internet due to firewalls. The next
requirement is that the application should enable music files to be converted to different,
valid, formats and that all common music formats should be supported; any which arent are
provided with plug-ins to enable them. This is to ensure interoperability between the files and
system, the decision for this was that in numerous ethnographic studies the downloaded
music couldnt be played using their chosen device.
Another interoperability requirement is that the system should allow any storage device to
connect to the system and enable the distribution of music. The reason for this is that researchshows people used ITunes but they could only distribute the music on to their IPods which
was found to be a problem. A usability requirement is that there should be a help guide within
the new system so that the time that new users can soon understand the system; however the
system will be simple and therefore self-explanatory.
There will be hotkeys throughout the system so that users can speed up their performance
once they have mastered how to use the program. The system should remember the last song
played on the system so that users can manipulate the program easily and efficiently.
The system will have a predictive search where the user starts typing in the name of a song
and the system brings up a variety of options which begin with the same parts as the search.
The reason for this is that if the user sees there search in the drop down box it saves themtyping it out which may cause typing errors.
2.6 USER CHARACTERSTICS:
The application is intended for users who use and distribute music electronically. One of the
highest priorities is age verification; people under the age of 16 should not be allowed to
purchase the songs online and adults may also chose to lock specific songs which contain
-
7/31/2019 Media Player Report (1)
13/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 13
offensive material. The application shall allow both novice users and more competent
computer users to use the system effectively. For more frequent computer users, there will be
options for advanced functions to allow them to generate their own playlists along with
storing and loading multiple files. The system shall restrict remote users being able to
download music on a clients system.
The target clients for our software are ordinary computer users who distribute music media. It
is assumed that the target group does not have to be familiar with the use of any software of
similar functionality, but to have a basic computer and Internet skills that will enable them to
use this software.
2.6.1 NOT-REGISTERED USERS CLASS
Able to use all of the functionality of the Music Player ComponentAble to use limited functionality of Music Search Component searching for music
in other users shared music libraries
Not able to use any of the functionality of the Music Organiser ComponentNot able to use any of the functionality of the Music Sharer Component
2.6.2 REGISTERED USERS CLASS
Able to use all of the functionality of the Music Player Component Able to use all of the functionality of the Music Search Component Able to use all of the functionality of the Music Organiser Component Able to use all of the functionality of the Music Sharer Component
2.7 CONSTRAINTS:
GUI is only in English. Login and password is used for identification
-
7/31/2019 Media Player Report (1)
14/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 14
Trail version of the system will be valid up to 30 days To avail full functionality of system license should purchased All devices must be tamper evident. System should be update regularly. Crash reports of the system must be sent to the developer team. All devices must undergo a full re-installation and product upgrade.
.
2.8 USE CASE MODEL DESCRIPTION:
A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram. Its
purpose is to present a graphical overview of the functionality provided by system in terms of factors,
their goals (represented as use cases), and dependencies between those use cases
User
Actions
2.9 CLASS DIAGRAM:
The class diagram is the main building block in object oriented modeling. It is used both for general
conceptual modeling of the systematic of the application, and for detailed modeling translating the
models into programming code. The classes in a class diagram represent both the main objects and or
interactions in the application and the objects to be programmed.
login
playlist
Play
AUDIO VIDEO
Customization
Update
-
7/31/2019 Media Player Report (1)
15/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 15
-
7/31/2019 Media Player Report (1)
16/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 16
SEQUENCE DIAGRAM:
A sequence diagram shows, as parallel vertical lines (lifelines), different processes or objects that live
simultaneously, and, as horizontal arrows, the messages exchanged between them, in the order in
which they occur.
-
7/31/2019 Media Player Report (1)
17/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 17
2.11 Functional Diagram:
-
7/31/2019 Media Player Report (1)
18/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 18
Candidate
Candidate Id Contact Details
Experience
Party Details
Vote
Casted
Upload
Correct
Details
General Public
Admin
Field Officer
Gets Data
And
validates it
Validates
The Data
Gets Data
From Form
Area Name
Name
Voter Id
Contact
Domicile
Address
Area Id
Id
Name
Phone No.Age
Reg. form
Name
Email Id.
Email id
Name
Phone No.
Age
Id
Verification
Verification
Row
State
City Area
General Details
General Details
Address
Election Commission
-
7/31/2019 Media Player Report (1)
19/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 19
2.11 ASSUMPTIONS AND DEPENDENCIES:
The voting is done through the country on a single day. All the candidates have their respective data on portals of their parties which can be
kinked with the main electronic voting sites.
Role of every user predefined and no other extensions can be done without the permissionof election commissioner and administrator both.
User ID and password are provided with Voter-Id which can further be modified.
Important: During the making of this project it has been assumed that the city is not been divided
into different wards. In fact the whole city can be treated as a ward and all the candidates of
particular city compete under one ward only. The voters also cast their votes under one ward only.
3.0 SPECIFIC REQUIREMENTS:
3.1 USE-CASE REPORTS:
A) ADMINISTRATOR
Responsible for providing all the information of candidates who have applied for the polling and voter
registration.
I) PROFILE OF CANDIDATES
-
7/31/2019 Media Player Report (1)
20/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 20
All the candidates have to submit their information to the administrator so that it can be displayed on
the site.
II) PROVIDING THE LIST OF CANDIDATES
He will provide the list of all the candidates at the local as well as national level.
DESCRIPTION
Administrator inserts the candidates profile data in the database only after verification. After then
only the profile is displayed on the portal.
PRECONDITIONS
Data is verified by the Administrator. Administrator is logged in already.
NORMAL FLOW OF EVENTS:
Administrator clicks on to the link of view profiles on his home page. Data is already provided by the candidate and the administrator verifies it. Query is submitted and data is saved on database.
B) FIELD OFFICERS
All the responsibility of maintaining the connection and availability of the system is taken by this
person. He is also responsible for voter registration done on the day of polling.
I) MANAGING CONNECTIVITY AND AVAILABILITY OF THE SYSTEMAll the connectivity and system availability is maintained while polling process continues.
II) ON-SPOT VOTER REGISTRATIONVoters who were not able to register themselves beforehand, the field officers do their registration
thereby itself on the day of polling.
DESCRIPTION
All newly registered voters are given a unique id by the Administrator which is useful for them while
voting because they are registered in database with this id.
-
7/31/2019 Media Player Report (1)
21/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 21
PRECONDITIONS
All the formalities are done such as Voter Id-card. Voters are verified.
NORMAL FLOW OF EVENT
Data verified by election commission. Data sent to Administrator. Voters information is verified by the administrator and stored in database and given a unique
id for login.
C) CANDIDATES
The candidates who are competing for elections in their respective constituencies are provided with a
registration form. After filling the form and getting it verified by the Administrator, the candidates are
eligible for voting.
I) PROVIDE PROFILE INFORMATIONThe candidate provides the information regarding his/her qualification, profession, party which he
wants to join, etc by filling the registration form.
NAME OF CASE USED:- PROVIDE PROFILE INFORMATION
DESCRIPTION
All the candidates wishing to contest elections have to provide their detailed information on the form
upload on the site. This information is then verified by the Administrator, only after which the
candidate can fight elections. The candidate is also given a unique id by the Administrator which can
be used by them for updating profile information.
PRECONDITIONS
All the formalities are done such as age verification, medical checkup, etc. Candidates are verified.
-
7/31/2019 Media Player Report (1)
22/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 22
NORMAL FLOW OF EVENT
Profile details provided by the candidate. Data sent to Administrator. Candidates information is verified by the administrator and only after successful verification
, they are given a unique Id for login.
D) VOTERS
The candidates who are competing for elections in their respective constituencies are provided with a
registration form. After filling the form and getting it verified by the Administrator, the candidates are
eligible for voting.
I) PROVIDE PROFILE INFORMATIONThe candidate provides the information regarding his/her qualification, profession, party which he
wants to join, etc by filling the registration form.
II) CAST THEIR VOTESThe voters practice their right to vote by logging into their account. After login the candidate list is
displayed and the voter can chose which candidate to vote.
III) GETTING INFORMATION ABOUT PARTY MANIFESTOS AND CANDIDATEPROFILES:
Party manifestos are already stored in database and the voter is displayed this on his homepage. He
can also view the profiles of all the candidates who are contesting for elections.
DESCRIPTION
All the voters wishing to cast their vote have to provide their detailed information on the formuploaded on the site. This information is then verified by the Administrator, only after which the voter
can vote. The voter is also given a unique id by the Administrator which can be used by them for
login and viewing party manifestos and candidate profiles.
PRECONDITIONS
All the formalities are done such as age verification, medical checkup, etc. Voters are verified.
NORMAL FLOW OF EVENT
-
7/31/2019 Media Player Report (1)
23/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 23
Information details provided by the voters. Data sent to Administrator. Voters information is verified by the administrator and only after successful verification,
they are given a unique Id for login.
3.2 SUPPLEMENTARY REQUIREMENTS
POWER BACKUP
Whenever the polling is taking place the system should not face any breakdown in the supply of
power otherwise data could be lost or connection could be broken.
PROPER MAINTENANCE
While in operation if any error occurs when there must be a technical person to solve it, he can be any
one of polling agents.
NETWORK AVAILABILITY AND BANDWIDTH ISSUE
High speed network connection is required so that the data can travel swiftly.
SERVER SHOULD BE HIGHLY RESPONSIVE
When polling happens in any country on a single day then it would give a lot of stress on to the
server, the server should be configured in a manner so that it can bear that stress.
FAQS: YOU REALLY NEED TO KNOW THIS
1.WHY SHOULD YOU VOTE?
India is the largest democracy in the world. The right to vote and more importantly the exercise of
franchise by the eligible citizens is at the heart of every democracy. We, the people, through this
exercise of our right to vote have the ultimate power to shape the destiny of country by electing our
-
7/31/2019 Media Player Report (1)
24/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 24
representatives who run the Government and take decisions for the growth, development and benefit
of all the citizens.
2 .WHO CAN VOTE?
All citizens of India who are 18 years of age as on 1st January of the year for which the electoral roll is
prepared are entitled to be registered as a voter in the constituency where he or she ordinarily resides.
Only persons who are of unsound mind and have been declared so by a competent court or
disqualified due to Corrupt Practices or offences relating to elections are not entitled to be registered
in the electoral rolls.
3 .WHAT IS THE DISCLOSURE BY CANDIDATES?
3.1 Recently the Election Commission of India has made it mandatory consequent upon a Judgment
of Humble supreme court that all candidates must file an affidavit along with their nomination form
with details such as:-
i. his/her criminal antecedents,ii. his/her assets and liabilities and those of his/her spouse and dependents, andiii. his/her educational background.This has been done with a view that every citizen has a right to know about the candidates contesting
an election and make an informed choice.
3.2 The Election Commission has directed all Returning Officers to display the copies of nomination
papers and accompanying affidavits received during any day on his notice board immediately on
receipt and make copies of these for distribution to the press and any members of public who want
this information, free of cost. Any citizen of the country can obtain copies of the nomination form and
the affidavit filed by any candidate from the Returning Officer and it shall not be refused. As a voter
you have every right to seek this information and get it.
3.3 Above measures help the electors make an informed choice about the candidate they are going to
vote for.
-
7/31/2019 Media Player Report (1)
25/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK
MAK/SKIT Page 25
4.0 REFERENCES
1. www.videolan.org
2. www.wikipedia.com
3. www.google.com
-
7/31/2019 Media Player Report (1)
26/26
MEDIA PLAYER SKIT
Project_ report 25-02-2012
MAK