SlideShare une entreprise Scribd logo
1  sur  29
 Overview
 Chapter Briefs
 Socket
 Socket Programming
 Socket Type
 Implementation issues
 Control Flow
 Design
 Implementation
 Discussion
 Future Development
 In this article it has been looked how to program using sockets by
implementing an echo server along with a client that is used to
send and receive string messages. It will start off by giving a
quick introduction to TCP/IP fundamentals and then explain how
sockets fit into the diagram.
• Most network application can be divided into two pieces: a client
and a server. A client is the side that initiates the communication
process, where as the server responds to incoming client requests.
• There are numerous network protocols, such as Netbios, RPC
(Remote Procedure Call), DCOM, Pipe, IPC (Inter-process
Communication) that can be used for the Comm Link. Here is
only look at TCP/IP.
Although TCP can be implemented to work over any transport protocol,
it's usually synonymous with IP. TCP is a connection-oriented stream
protocol (like a telephone call). This is shown below with a factious
network topology layout, where the data packet takes (n) number of
hops to get from the source to the Destination.
A socket is made up of 3 identifying properties:
Protocol Family, IP Address and Port Number.
For TCP/IP Sockets:
The protocol family is AF_INET (Address Family Internet)
The IP Address identifies a host/service machine on the network.
Port defines the Service on the machine that communicating to/from
The port numbers from 0 to 255 are well-known ports, and the use of these
port numbers in your application is highly discouraged. Many well-known
services which are use have assigned port numbers in this range.
Service Name Port Number
ftp 21
telnet 23
http 80
An interface between an application processes and transport layer.
The application process can send/receive messages to/from another
application process (local or remote) via a socket.
socket ( )
bind( )
+---->listen ( )
| accept( )
| (block until connection from client )
| read( )
| write( )
+----- close( )
close( )
• The steps to get a server up and running are shown below
(read from top to bottom). This is how our sample code is
written, so it's a good idea to get familiar with the process.
The steps the client needs to take in order to communicate with the
server.
• socket( )
• connect( )
• write( )
• read( )
• close( )
1. Create a socket with the server IP address
2. Connect to the server, this step also names the socket
3. Send data to the server
4. Read data returned (echoed) back from the server
5. Close the socket
Winsock control comes with VB6 and is used to create
applications that access the low-level functions of the
Transmission Control Protocol/Internet Protocol (TCP/IP).
Client and server will interact with each other to exchange data.
So, the programming discipline using socket is known as socket
programming.
Winsock Operating Modes:
1. sckTCPProtocol
2. sckUDPProtocol
There are several Internet socket types:
Datagram sockets, also known as connectionless sockets, which use
User Datagram Protocol (UDP)
Stream sockets, also known as connection-oriented sockets, which
use Transmission Control Protocol (TCP) or Stream Control
Transmission Protocol (SCTP).
Raw sockets (or Raw IP sockets), typically available in routers and
other network equipment. Here the transport layer is bypassed, and
the packet headers are not stripped off, but are accessible to the
application.
Sockets are usually implemented by an API library such as Berkeley
sockets, first introduced in 1983. Most implementations are based
on Berkeley sockets, for example Winsock introduced in 1991.
Other socket API implementations exist, such as the STREAMS-
based Transport Layer Interface (TLI).
Development of application programs that utilize this API is called
socket programming or network programming.
User
Name
User
Password
Encode
password then
Save to Data
1 User Entry
D Data Save
Figure : DFD for register new user:
Receiver’s
User
Name If Receiver online then
“Send”
2 Check Online
D Data Log Save
Figure : Control Flow to Send Message
Sender’s
User
Name Option (Yes/No)
2 Chat Requested
If Yes, Then
Message Received
If No, Then
Message
Ignored
Figure 3 : Control Flow to Receive Message
Receiver’s
User Name If Receiver online then
“Send” File Receive
Request
2 Check Online
If Receiver – Yes
Then Send File
Check
If Receiver – No
Then Send process Break
Figure 4 : Control Flow to Send File
File Receive
Request
A File Receive requested
By <Sender>
2 Message Display
If – Yes
Then display
message Where to
save the file
Check
If – No Then
receive process break.
Figure 5 : Control Flow to Receive File
Requested
User Name
“Accept voice chat”
Option (Yes/No)
6 Message Show
If Press – Yes
Check For Supported
Sound Hardware
Check
If Receiver – No
Then voice chat process
Break
If (Supported) = True
Then Chat Start
If (supported) = False
Then Show Error Msg.
Figure 6 : Control Flow Voice Chat
Figure 7 : User administrator add panel
Figure 8 : Server Log pan store every status change it
made change by user and the server administrator.
These logs are stored in flat data mode.
Figure 9: The session info contains the online user information.
User entire time. His/Her encoded password.
Figure 10 : The user login form.
Figure 11: This is the most valuable client side main form.
Figure 12 : Data Receive From.
Figure 13: Voice Chat Client.
Figure 14 : Client Side Option Dialog
The installation phase arrives only after the implementation phase
has been successfully competed. The final system now stands
ready to be delivered to the users. The principal objectives of the
installation phase are to replace the existing system by the newly
created system is smooth, trouble -free manner. In order to
accomplish the objectives, three activities must be performed.
Finally this software is completed successfully in implemented in
real field successfully. But man has a concern about something
new. In this way the development process will be continuing. At
present it covers to text based chat, voice chat and file transfer. All
this shorts as it was in requirement successfully done. But
committed with market it is need farther more development.
Otherwise it would be out of business. In this manner some plan
made for future work and research.
Future development is on plan. which are video chat or
video conference. Existing software will be more interactive
look. Some games will be added to it. Animation will be
applied. Sound effect and Sound theme will be make
resonance to cha user. Funny Aviary keeps support when
no one is online of according to user demand.
Design an Implementation of A Messaging and Resource Sharing Software

Contenu connexe

Tendances

Multiuser chat application using java
Multiuser chat application using javaMultiuser chat application using java
Multiuser chat application using javaasifnoman240
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network systemSalauddin Rubel
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat applicationSamsil Arefin
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocolsPriyanka Shinde
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architectureOrbay Yeşil
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Chat server nitish nagar
Chat server nitish nagarChat server nitish nagar
Chat server nitish nagarNitish Nagar
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eadpeer
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approachSarah R. Dowlath
 
Get into Networking by Clearing Comptia Network+ Test
Get into Networking by Clearing Comptia Network+ TestGet into Networking by Clearing Comptia Network+ Test
Get into Networking by Clearing Comptia Network+ Testcertblaster
 
Rpc Case Studies (Distributed computing)
Rpc Case Studies (Distributed computing)Rpc Case Studies (Distributed computing)
Rpc Case Studies (Distributed computing)Sri Prasanna
 
File transfer protocol- Gowdham
File transfer protocol- GowdhamFile transfer protocol- Gowdham
File transfer protocol- GowdhamGowdham P
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.igede tirtanata
 

Tendances (20)

Multiuser chat application using java
Multiuser chat application using javaMultiuser chat application using java
Multiuser chat application using java
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Technical Architectures
Technical ArchitecturesTechnical Architectures
Technical Architectures
 
Ip
IpIp
Ip
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Ftp.75 to 76
Ftp.75 to 76Ftp.75 to 76
Ftp.75 to 76
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Chat server nitish nagar
Chat server nitish nagarChat server nitish nagar
Chat server nitish nagar
 
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9eChapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
 
Aplication and Transport layer- a practical approach
Aplication and Transport layer-  a practical approachAplication and Transport layer-  a practical approach
Aplication and Transport layer- a practical approach
 
Get into Networking by Clearing Comptia Network+ Test
Get into Networking by Clearing Comptia Network+ TestGet into Networking by Clearing Comptia Network+ Test
Get into Networking by Clearing Comptia Network+ Test
 
Rpc Case Studies (Distributed computing)
Rpc Case Studies (Distributed computing)Rpc Case Studies (Distributed computing)
Rpc Case Studies (Distributed computing)
 
Tcpip tutorial
Tcpip tutorialTcpip tutorial
Tcpip tutorial
 
Application layer
Application layerApplication layer
Application layer
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
File transfer protocol- Gowdham
File transfer protocol- GowdhamFile transfer protocol- Gowdham
File transfer protocol- Gowdham
 
Cisco discovery d homesb module 6 - v.4 in english.
Cisco discovery   d homesb module 6 - v.4 in english.Cisco discovery   d homesb module 6 - v.4 in english.
Cisco discovery d homesb module 6 - v.4 in english.
 

Similaire à Design an Implementation of A Messaging and Resource Sharing Software

Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
Java Networking
Java NetworkingJava Networking
Java NetworkingSunil OS
 
Socket Programming by Rajkumar Buyya
Socket Programming by Rajkumar BuyyaSocket Programming by Rajkumar Buyya
Socket Programming by Rajkumar BuyyaiDhawalVaja
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptmohanravi1986
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in JavaTushar B Kute
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptxaravind Guru
 
Mail Server Project Report
Mail Server Project ReportMail Server Project Report
Mail Server Project ReportKavita Sharma
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in JavaTushar B Kute
 
Network and distributed systems
Network and distributed systemsNetwork and distributed systems
Network and distributed systemsSri Prasanna
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals Vikas Gupta
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in JavaTushar B Kute
 

Similaire à Design an Implementation of A Messaging and Resource Sharing Software (20)

Socket programming
Socket programmingSocket programming
Socket programming
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
Java Networking
Java NetworkingJava Networking
Java Networking
 
Socket Programming by Rajkumar Buyya
Socket Programming by Rajkumar BuyyaSocket Programming by Rajkumar Buyya
Socket Programming by Rajkumar Buyya
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Osi model
Osi modelOsi model
Osi model
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
Mail Server Project Report
Mail Server Project ReportMail Server Project Report
Mail Server Project Report
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Network and distributed systems
Network and distributed systemsNetwork and distributed systems
Network and distributed systems
 
Bt0076
Bt0076Bt0076
Bt0076
 
Networking Fundamentals
Networking Fundamentals Networking Fundamentals
Networking Fundamentals
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Sockets
SocketsSockets
Sockets
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in Java
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
Application Layer
Application Layer Application Layer
Application Layer
 

Dernier

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Design an Implementation of A Messaging and Resource Sharing Software

  • 1.
  • 2.  Overview  Chapter Briefs  Socket  Socket Programming  Socket Type  Implementation issues  Control Flow  Design  Implementation  Discussion  Future Development
  • 3.  In this article it has been looked how to program using sockets by implementing an echo server along with a client that is used to send and receive string messages. It will start off by giving a quick introduction to TCP/IP fundamentals and then explain how sockets fit into the diagram.
  • 4. • Most network application can be divided into two pieces: a client and a server. A client is the side that initiates the communication process, where as the server responds to incoming client requests. • There are numerous network protocols, such as Netbios, RPC (Remote Procedure Call), DCOM, Pipe, IPC (Inter-process Communication) that can be used for the Comm Link. Here is only look at TCP/IP.
  • 5. Although TCP can be implemented to work over any transport protocol, it's usually synonymous with IP. TCP is a connection-oriented stream protocol (like a telephone call). This is shown below with a factious network topology layout, where the data packet takes (n) number of hops to get from the source to the Destination.
  • 6. A socket is made up of 3 identifying properties: Protocol Family, IP Address and Port Number. For TCP/IP Sockets: The protocol family is AF_INET (Address Family Internet) The IP Address identifies a host/service machine on the network. Port defines the Service on the machine that communicating to/from The port numbers from 0 to 255 are well-known ports, and the use of these port numbers in your application is highly discouraged. Many well-known services which are use have assigned port numbers in this range. Service Name Port Number ftp 21 telnet 23 http 80
  • 7. An interface between an application processes and transport layer. The application process can send/receive messages to/from another application process (local or remote) via a socket.
  • 8. socket ( ) bind( ) +---->listen ( ) | accept( ) | (block until connection from client ) | read( ) | write( ) +----- close( ) close( ) • The steps to get a server up and running are shown below (read from top to bottom). This is how our sample code is written, so it's a good idea to get familiar with the process.
  • 9. The steps the client needs to take in order to communicate with the server. • socket( ) • connect( ) • write( ) • read( ) • close( ) 1. Create a socket with the server IP address 2. Connect to the server, this step also names the socket 3. Send data to the server 4. Read data returned (echoed) back from the server 5. Close the socket
  • 10. Winsock control comes with VB6 and is used to create applications that access the low-level functions of the Transmission Control Protocol/Internet Protocol (TCP/IP). Client and server will interact with each other to exchange data. So, the programming discipline using socket is known as socket programming. Winsock Operating Modes: 1. sckTCPProtocol 2. sckUDPProtocol
  • 11. There are several Internet socket types: Datagram sockets, also known as connectionless sockets, which use User Datagram Protocol (UDP) Stream sockets, also known as connection-oriented sockets, which use Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP). Raw sockets (or Raw IP sockets), typically available in routers and other network equipment. Here the transport layer is bypassed, and the packet headers are not stripped off, but are accessible to the application.
  • 12. Sockets are usually implemented by an API library such as Berkeley sockets, first introduced in 1983. Most implementations are based on Berkeley sockets, for example Winsock introduced in 1991. Other socket API implementations exist, such as the STREAMS- based Transport Layer Interface (TLI). Development of application programs that utilize this API is called socket programming or network programming.
  • 13. User Name User Password Encode password then Save to Data 1 User Entry D Data Save Figure : DFD for register new user:
  • 14. Receiver’s User Name If Receiver online then “Send” 2 Check Online D Data Log Save Figure : Control Flow to Send Message
  • 15. Sender’s User Name Option (Yes/No) 2 Chat Requested If Yes, Then Message Received If No, Then Message Ignored Figure 3 : Control Flow to Receive Message
  • 16. Receiver’s User Name If Receiver online then “Send” File Receive Request 2 Check Online If Receiver – Yes Then Send File Check If Receiver – No Then Send process Break Figure 4 : Control Flow to Send File
  • 17. File Receive Request A File Receive requested By <Sender> 2 Message Display If – Yes Then display message Where to save the file Check If – No Then receive process break. Figure 5 : Control Flow to Receive File
  • 18. Requested User Name “Accept voice chat” Option (Yes/No) 6 Message Show If Press – Yes Check For Supported Sound Hardware Check If Receiver – No Then voice chat process Break If (Supported) = True Then Chat Start If (supported) = False Then Show Error Msg. Figure 6 : Control Flow Voice Chat
  • 19. Figure 7 : User administrator add panel
  • 20. Figure 8 : Server Log pan store every status change it made change by user and the server administrator. These logs are stored in flat data mode.
  • 21. Figure 9: The session info contains the online user information. User entire time. His/Her encoded password.
  • 22. Figure 10 : The user login form.
  • 23. Figure 11: This is the most valuable client side main form.
  • 24. Figure 12 : Data Receive From. Figure 13: Voice Chat Client.
  • 25. Figure 14 : Client Side Option Dialog
  • 26. The installation phase arrives only after the implementation phase has been successfully competed. The final system now stands ready to be delivered to the users. The principal objectives of the installation phase are to replace the existing system by the newly created system is smooth, trouble -free manner. In order to accomplish the objectives, three activities must be performed.
  • 27. Finally this software is completed successfully in implemented in real field successfully. But man has a concern about something new. In this way the development process will be continuing. At present it covers to text based chat, voice chat and file transfer. All this shorts as it was in requirement successfully done. But committed with market it is need farther more development. Otherwise it would be out of business. In this manner some plan made for future work and research.
  • 28. Future development is on plan. which are video chat or video conference. Existing software will be more interactive look. Some games will be added to it. Animation will be applied. Sound effect and Sound theme will be make resonance to cha user. Funny Aviary keeps support when no one is online of according to user demand.