LAN Using Visual Basic: Text Messages and Video Conferencing Essay Example
LAN Using Visual Basic: Text Messages and Video Conferencing Essay Example

LAN Using Visual Basic: Text Messages and Video Conferencing Essay Example

Available Only on StudyHippo
  • Pages: 5 (1197 words)
  • Published: May 22, 2017
  • Type: Report
View Entire Sample
Text preview

The objective of this project is to implement sending and receiving text messages and video conferencing on LAN using Visual Basic. It provides functionality that enables classes to use a default application framework.

Once the frame work is able to do sending and receiving messages and video conferencing on LAN, the project can be extended in future for developing audio chat as well. Two users are able to chat by entering each others’ IP addresses. Users can easily add and delete contacts from their contact list. Users can accept and reject invitations or requests of video chat.

Since the only form of authentication is enabling the recipient to accept chat request, this application is not very secure to use on the Internet. But, this application is intended to be used inside a LAN where users are known and trusted. Questionnaires

  1. Who can benefit this system? ...


  2. What are the requirements in terms of: Hardware components Software Components
  3. What features does the system offer in terms of: Sending and receiving message Video Conferencing
  4. How many participants do you envisage needing to use the system?
  5. Where will be the equipment be used?
  6. This system is a project proposal intended for the students and officers/employees of some establishments for them not to need a wireless connection just to communicate to other people or their friends. This would also allow them to connect and socialize to people like sending and receiving a text messages and video conferencing through LAN even though they don’t have connections like wireless or modem. With this system, it would be easy for them to exchange thoughts and ideas by just communicating to their friends. Review of Related LiteratureThe

View entire sample
Join StudyHippo to see entire essay

simplest computer chatting is a method of sending, receiving, and storing typed messages with a network of users.

This network could be WAN (Wide Area Network) or LAN(Local Area Network). Our chatting system will deal only with LAN’s (static IP address) and it is made up of two applications one runs on the server-side (any computer on the network you choose it to be the server) while the other is delivered and executed on the client PC. Every time the client wants to chat he runs the client application, enter his user name, hostname where the server application is running and hits the connect button, and start chatting. The system is a many-to-many arrangement; every–one is able to “talk” to anyone else. Messages may be broadcasted to all receivers(recipients are automatically notified of incoming messages) or sent to special individuals (private chatting through server) where during this operation all messages are encrypted at the sender side and decrypted at the recipient to disallow any hackers to the server from reading these private messages.

For this system to be physically realized you should be familiar with programming and networking. Visual Basic is our programming language, TCP/IP is our network protocol, and finally “windows sockets” is our programming interface to have access to network functionality. Video conferencing enables direct face-to-face communication across networks. The term 'video conferencing' covers a range of communication activities and technologies. At one end of the scale are web-conferencing tools such as Yahoo Instant Messenger, which can be used with low-cost webcams on stand-alone PCs to provide basic video conferencing facilities. At the high end of the scale are dedicated video conferencing studios with specialist

cameras, lighting, and audio equipment.

What each video conferencing system has in common is that two or more parties in different locations have the ability to communicate using a combination of video, audio, and data. A video conference can be person to person (referred to as 'point-to-point') or can involve more than two people, when the term is 'multipoint'. Becta is working with the DfES and UKERNA (the United Kingdom Education and Research Networking Association) to develop a national schools’ network. This will be a secure network, available from anywhere, allowing easy access to a wide range of high-quality online applications, including video conferencing.

Methodology Waterfall Approach In the software development process cycle, programming models are used to plan the various stages of developing an application. One such model is the waterfall model. It is called such because the model develops systematically from one phase to another in a downward fashion, like a waterfall. Requirement Gathering and Analysis Deployment of System System Design Implementation Testing Maintenance Figure 1. Waterfall Model Figure 1 shows the model that the researchers followed from the start until the implementation of the system.

It had begun in the gathering of requirements and analysis. The researchers conducted an interview with the client in order to assemble the necessary information in constructing the system just as how the client expects it to be. Sharing of if ideas and opinions between the researchers and the client took place during the meeting of the requirements for the said system, in order to distinguish, whether such requirements could be valid and possible to be included in the system to be developed. User-friendly interface, big capacity of storage, reliable

and secure.

After the requirements have been gathered and analyzed, the researchers then started to build the design of the system. The user –interface was drafted and designed according to the client’s request. The researchers chose VB programming Language for construction of the system. The design served as a guide on where to begin and to end. Without this, the construction of the system would be difficult.

Upon finishing the chosen design of the system, the coding was started. As the coding of the system progressed, immediate testing was done to distinguish if it works in the preferred way and to remove all the bugs. When the construction of the system was at the last completed, it was tested to determine if it really matches to specifications and requirements done on the first phase. After the successful testing of the system, it was then transported to client . The waterfall approach was used as guide to complete the system or project.

Proponents System Analyst is responsible for the support of at least complex systems and applications, analyzes and understands the current state processes to ensure that the context and implications of change are understood by the clients and project teams, develops an understanding of how present and future business needs will impact to the solution and works with the clients to prioritize and rationalize the requirements of the system. The documenter or project writer develops and maintains, under the supervision of the project leader, the different documents pertaining to the management of the project including the project plan/schedule of the project closure document. In this project, the first systems analyst and the project manager is John Michael Mangao.

In systems development, he is responsible for the designing of the new system/application. Also required to perform as a programmer, where he actually writes the code to implement the design of the proposed application.

The second systems analyst is Jezebel Manager who is responsible for defining the alternate solutions to the system and also for the problems occurring at the various stages of the development process. Finally, the documenter is Johnoel Malayo who designs, creates and maintains technical documentation.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds