Trabajo De Fin De Carrera

Total Page:16

File Type:pdf, Size:1020Kb

Trabajo De Fin De Carrera TRABAJO DE FIN DE CARRERA TÍTULO DEL TFC: VirtualEPSC, el mundo virtual 2.0 del Campus del Baix Llobregat TITULACIÓN: Ingeniería Técnica de Telecomunicación, especialidad en Telemática AUTORES: Luis Miguel Amorós Martínez Noemí Arbós Linio DIRECTOR: Toni Oller Arcas FECHA: 14 de julio de 2010 Título: VirtualEPSC, el mundo virtual 2.0 del Campus del Baix Llobregat Autores: Luis Miguel Amorós Martínez Noemí Arbós Linio Director: Toni Oller Arcas Fecha: 14 de julio de 2010 Resumen En las últimas décadas, se han producido cambios tecnológicos de gran envergadura que han provocado una ruptura brusca con las tecnologías existentes hasta el momento. Una de las más importantes es Internet, que se ha convertido en el entorno de comunicación más importante de la historia, con más de mil millones de usuarios en todo el mundo. Internet ha sufrido una serie de cambios en los últimos años y uno de los últimos conceptos que han surgido es el de web 2.0. Esta filosofía se basa en dar un rol más activo a los usuarios, por ejemplo, utilizando la colaboración de los usuarios en Internet, también llamado inteligencia colectiva; y en el diseño centrado en el usuario. Este trabajo describe los pasos seguidos para desarrollar una web 2.0 que aloja un mundo virtual que emula el Campus del Baix Llobregat. Se describe cómo son el diseño y la arquitectura del proyecto, y cómo se ha hecho la implementación de las diferentes partes. El resultado se denomina VirtualEPSC, una web 2.0 que aloja una aplicación multimedia en 2D que emula el Campus del Baix Llobregat, donde los usuarios podrán interactuar entre ellos. Esta plataforma permite promocionar el campus de una manera divertida y que las personas que quieran conocerlo puedan visitarlo de una manera virtual. Además, en la aplicación se ofrecen servicios relacionados con el campus y se proporciona la posibilidad de que usuarios registrados puedan crear sus propias zonas dentro del mundo virtual, incentivando aún más la participación de los usuarios. Title: VirtualEPSC, the virtual world 2.0 of Campus del Baix Llobregat Authors: Luis Miguel Amorós Martínez Noemí Arbós Linio Director: Toni Oller Arcas Date: July, 14th 2010 Overview In last decades there have been big technological changes which have caused a sharp break with existing technologies so far. One of the most important is Internet which has become the most important communications environment in history, with over one thousand millions of users worldwide. Internet has undergone several changes in recent years. One of the new concepts that have arisen is Web 2.0. This philosophy is based on giving a more active role to the users, for example, using the collaboration of Internet users, also called collective intelligence; and the user-centered design. This project describes the steps followed to develop a web 2.0 that provide a virtual world which emulates the Campus of the Baix Llobregat. It is described how the design and architecture is, and how the implementation to the different parts has done. The result is called VirtualEPSC, a web 2.0 hosting a multimedia application in 2D that emulates the Campus of the Baix Llobregat and where users will be able to interact to each other. This platform allows promoting the campus in a funny way and people who want to know how the campus looks like can visit it in a virtual way. In addition, the application offers some services related to the campus and provides the possibility for registered users to create their own areas inside the virtual world, encouraging the participations of users. ÍNDICE INTRODUCCIÓN .............................................................................................. 1 CAPÍTULO 1. MOTIVACIÓN Y OBJETIVOS.................................................... 3 1.1. CONCEPTOS BÁSICOS ..............................................................................................3 1.2. OBJETIVOS DE DESARROLLO .................................................................................4 1.3. WEB 2.0 .......................................................................................................................5 1.4. DIARIO DE UN ESTUDIANTE .....................................................................................6 CAPÍTULO 2. ESPECIFICACIONES ................................................................ 9 2.1. SITIO WEB ...................................................................................................................9 2.1.1. Tipos de Usuarios ...............................................................................................9 2.1.2. Funcionalidades ...............................................................................................10 2.2. APLICACIÓN DEL MUNDO VIRTUAL ......................................................................12 2.2.2. Avatares.............................................................................................................20 2.2.3. Red de amigos ..................................................................................................20 2.2.4. Miniperfil de usuario .........................................................................................21 2.2.5. Puntos Sociales ................................................................................................22 2.2.6. Servicio de mensajería instantánea ................................................................23 CAPÍTULO 3. DISEÑO Y ARQUITECTURA .................................................. 25 3.1. ARQUITECTURA GENERAL ....................................................................................25 3.2. SERVIDOR WEB .......................................................................................................27 3.2.1. Implementación ................................................................................................28 3.3. SISTEMA DE ALMACENAMIENTO DE DATOS .......................................................35 3.3.1. Implementación ................................................................................................36 3.4. OPENID ......................................................................................................................40 3.4.1. Implementación ................................................................................................41 3.5. MENSAJERÍA INSTANTÁNEA .................................................................................44 3.5.1. Implementación ................................................................................................45 3.6. APLICACIÓN DEL MUNDO VIRTUAL ......................................................................53 3.6.1. Implementación ................................................................................................54 3.7. APIS ...........................................................................................................................62 3.7.1. Añadir una nueva zona al mundo virtual ........................................................62 3.7.2. Juegos, subir la puntuación ............................................................................64 CAPÍTULO 4. OTRAS TECNOLOGIAS UTILIZADAS ................................... 67 4.1. MAVEN.......................................................................................................................67 4.2. JETTY WEB SERVER ...............................................................................................69 4.3. SUBVERSION ............................................................................................................71 CAPÍTULO 5. PLAN DEL PROYECTO .......................................................... 73 5.1. TIEMPO DE DEDICACIÓN ........................................................................................73 5.2. TAREAS .....................................................................................................................73 CAPÍTULO 6. CONCLUSIONES .................................................................... 77 BIBLIOGRAFÍA .............................................................................................. 81 ACRÓNIMOS, SIGLAS Y DEFINICIONES ..................................................... 85 ANEXOS ......................................................................................................... 89 A. FICHERO DE CONFIGURACIÓN DEL MAPA GENERAL ............................................89 B. APACHE WICKET .........................................................................................................91 C. APACHE CASSANDRA.................................................................................................94 C.1. Modelo de datos ...............................................................................................96 C.2. Arquitectura del clúster en Cassandra ...........................................................99 D. OPENID ........................................................................................................................ 102 D.1. Terminología ................................................................................................... 102 D.2. Tipos de identificadores................................................................................. 102 D.3. Como funciona OpenID .................................................................................. 103 D.4. Seguridad ........................................................................................................ 105 E. XMPP ..........................................................................................................................
Recommended publications
  • Pragmatic Version Control Using Subversion
    What readers are saying about Pragmatic Version Control using Subversion I expected a lot, but you surprised me with even more. Hav- ing used CVS for years I hesitated to try Subversion until now, although I knew it would solve many of the shortcom- ings of CVS. After reading your book, my excuses to stay with CVS disappeared. Oh, and coming from the Pragmatic Bookshelf this book is fun to read too. Thanks Mike. Steffen Gemkow Managing Director, ObjectFab GmbH I’m a long-time user of CVS and I’ve been skeptical of Sub- version, wondering if it would ever be “ready for prime time.” Until now. Thanks to Mike Mason for writing a clear, con- cise, gentle introduction to this new tool. After reading this book, I’m actually excited about the possibilities for version control that Subversion brings to the table. David Rupp Senior Software Engineer, Great-West Life & Annuity This was exactly the Subversion book I was waiting for. As a long-time Perforce and CVS user and administrator, and in my role as an agile tools coach, I wanted a compact book that told me just what I needed to know. This is it. Within a couple of hours I was up and running against remote Subversion servers, and setting up my own local servers too. Mike uses a lot of command-line examples to guide the reader, and as a Windows user I was worried at first. My fears were unfounded though—Mike’s examples were so clear that I think I’ll stick to using the command line from now on! I thoroughly recommend this book to anyone getting started using or administering Subversion.
    [Show full text]
  • Software Best Practices
    Software Best Practices Marco Mambelli – [email protected] Engineering Week 17 February 2020 Software • Set of instructions and its associated documentations that tells a computer what to do or how to perform a task • Any manuscript/artifact/product written by you with the scope to be used by machine and humans 2 2/17/20 Marco Mambelli | Software best practices 3 2/17/20 Marco Mambelli | Software best practices Outline • General applicability, more in detail – Version control and Git – Documentation • More specific to coding – Requirements – Design • Technology selection • OS Requirements • Software inputs • Software logs, metrics and accounting – Code development – Validation and testing – Releases – Deployment – Bug tracking – Change management – Critical services operation 4 2/17/20 Marco Mambelli | Software best practices “Piled Higher and Deeper” by Jorge Cham, http://www.phdcomics.com 5 2/17/20 Marco Mambelli | Software best practices Version Control System • Preserves different version of a document • Helps merging different contributions • Answers important questions on the documents – What changed? – Who changed it? – Why? 6 2/17/20 Marco Mambelli | Software best practices Centralized vs distributed VCS 7 2/17/20 Marco Mambelli | Software best practices Common RCS • SVN (Apache Subversion) – Newer system based on CVS – Includes atomic operations – Cheaper branch operations, slower comparative speed – Does not use peer-to-peer model – Still contains bugs relating to renaming files and directories – Insufficient repository management
    [Show full text]
  • IPS Signature Release Note V9.17.79
    SOPHOS IPS Signature Update Release Notes Version : 9.17.79 Release Date : 19th January 2020 IPS Signature Update Release Information Upgrade Applicable on IPS Signature Release Version 9.17.78 CR250i, CR300i, CR500i-4P, CR500i-6P, CR500i-8P, CR500ia, CR500ia-RP, CR500ia1F, CR500ia10F, CR750ia, CR750ia1F, CR750ia10F, CR1000i-11P, CR1000i-12P, CR1000ia, CR1000ia10F, CR1500i-11P, CR1500i-12P, CR1500ia, CR1500ia10F Sophos Appliance Models CR25iNG, CR25iNG-6P, CR35iNG, CR50iNG, CR100iNG, CR200iNG/XP, CR300iNG/XP, CR500iNG- XP, CR750iNG-XP, CR2500iNG, CR25wiNG, CR25wiNG-6P, CR35wiNG, CRiV1C, CRiV2C, CRiV4C, CRiV8C, CRiV12C, XG85 to XG450, SG105 to SG650 Upgrade Information Upgrade type: Automatic Compatibility Annotations: None Introduction The Release Note document for IPS Signature Database Version 9.17.79 includes support for the new signatures. The following sections describe the release in detail. New IPS Signatures The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms. Report false positives at [email protected], along with the application details. January 2020 Page 2 of 245 IPS Signature Update This IPS Release includes Two Thousand, Seven Hundred and Sixty Two(2762) signatures to address One Thousand, Nine Hundred and Thirty Eight(1938) vulnerabilities. New signatures are added for the following vulnerabilities: Name CVE–ID
    [Show full text]
  • Inequalities in Open Source Software Development: Analysis of Contributor’S Commits in Apache Software Foundation Projects
    RESEARCH ARTICLE Inequalities in Open Source Software Development: Analysis of Contributor’s Commits in Apache Software Foundation Projects Tadeusz Chełkowski1☯, Peter Gloor2☯*, Dariusz Jemielniak3☯ 1 Kozminski University, Warsaw, Poland, 2 Massachusetts Institute of Technology, Center for Cognitive Intelligence, Cambridge, Massachusetts, United States of America, 3 Kozminski University, New Research on Digital Societies (NeRDS) group, Warsaw, Poland ☯ These authors contributed equally to this work. * [email protected] a11111 Abstract While researchers are becoming increasingly interested in studying OSS phenomenon, there is still a small number of studies analyzing larger samples of projects investigating the structure of activities among OSS developers. The significant amount of information that OPEN ACCESS has been gathered in the publicly available open-source software repositories and mailing- list archives offers an opportunity to analyze projects structures and participant involve- Citation: Chełkowski T, Gloor P, Jemielniak D (2016) Inequalities in Open Source Software Development: ment. In this article, using on commits data from 263 Apache projects repositories (nearly Analysis of Contributor’s Commits in Apache all), we show that although OSS development is often described as collaborative, but it in Software Foundation Projects. PLoS ONE 11(4): fact predominantly relies on radically solitary input and individual, non-collaborative contri- e0152976. doi:10.1371/journal.pone.0152976 butions. We also show, in the first published study of this magnitude, that the engagement Editor: Christophe Antoniewski, CNRS UMR7622 & of contributors is based on a power-law distribution. University Paris 6 Pierre-et-Marie-Curie, FRANCE Received: December 15, 2015 Accepted: March 22, 2016 Published: April 20, 2016 Copyright: © 2016 Chełkowski et al.
    [Show full text]
  • Collaboration Tools in Software Engineering Stepan Bolotnikov Me
    Collaboration Tools in Software Engineering Stepan Bolotnikov Me ● Stepan Bolotnikov ● Software Engineer at Guardtime ● MSc in Software Engineering from UT, 2018 ● [email protected] You Mostly BSc students in Computer Science ● Software developers / QA engineers ● CS researchers ● Project managers / team leads In any case connected to software projects, sharing knowledge and resources Course ● History and working principles of version control systems (VCS) ● Git distributed VCS ● Issue tracking ● Theoretical knowledge + practical hands-on exercises ● 8 sessions ● Every 2nd Friday ● Lecture + practice ● Non-differentiated (pass/fail) Schedule ● 22. Feb - Introduction, history of VCS ● 08. Mar - Introduction to Git, setting up the first repository, basic Git usage ● 22. Mar - Common Git commands ● 05. Apr - Branching in Git, common branching models ● 19. Apr - Troubleshooting common Git issues ● 03. May - Github; Issue tracking ● 17. May - Advanced Git usage; git hooks and CI ● 31. May - Guest lecture, preparation for exam ● 07. June - Exam 1 ● 14. June - Exam 2 Sessions ● 4h ● Lecture part ● Practical part Final exam ● 7th or 17th June ● Individual practical tasks ● “Poor”, “Satisfactory” or “Good” ● “Satisfactory” and “Good” - passing In order to pass the course ● Active participation in at least 6 out of 8 sessions ○ Complete the practical tasks ● “Satisfactory” or “Good” on the final exam Communication Course website http://courses.cs.ut.ee/2019/cse Course Slack Click Lecture 1: Introduction to course, History of Version
    [Show full text]
  • CPS Release Notes
    Release Notes for Cisco Policy Suite for Release 7.0 First Published: September 26, 2014 Last Updated: July 10, 2015 Release: 7.0 Contents This document describes the new features, feature versions and limitations for the Cisco Policy Suite software. Use this document in combination with documents listed in the “Related Documentation” section on page 33. This document includes the following sections: • Introduction, page 1 • New and Changed Information, page 2 • Installation Notes, page 9 • Limitations and Restrictions, page 15 • Caveats, page 23 • Related Documentation, page 33 Introduction The Cisco Policy Suite is a comprehensive policy, charging, and subscriber data management solution that allows service providers to control and monetize their networks and to profit from personalized services. The Cisco Policy Suite has the following components: • Policy Server (PS) • Charging Server (CS) • Application Gateway (AGW) Cisco Systems, Inc. www.cisco.com New and Changed Information • Unified Subscriber Manager (USuM) • Subscriber Analytics The Cisco Policy Suite provides an intelligent control plane solution, including southbound interfaces to various policy control enforcement functions (PCEFs) in the network, and northbound interfaces to OSS/BSS and subscriber applications, IMSs, and web applications. The Cisco Policy Suite modules are enabled individually or deployed as an integrated end-to-end policy, charging, and service creation solution. Competitive Benefits The new Cisco Policy Suite solution provides these benefits over competitive solutions. • Cisco Policy Suite architecture allows simultaneous sessions and transactions per second (TPS) capacity to be independently scaled. This allows Cisco Policy Suite to be efficiently sized for both high simultaneous sessions with low TPS or low sessions with high TPS, resulting in lower total cost of ownership when compared to traditional PCRF models.
    [Show full text]
  • Design Options of Store-Oriented Software Ecosystems: an Investigation of Business Decisions ∗
    Design Options of Store-Oriented Software Ecosystems: An Investigation of Business Decisions ∗ Bahar Jazayeri1, Olaf Zimmermann2, Gregor Engels1, Jochen K¨uster3, Dennis Kundisch1, Daniel Szopinski1 1 Paderborn University, Germany fbahar.jazayeri,gregor.engels,dennis.kundisch,[email protected] 2 University of Applied Sciences of Eastern Switzerland, Switzerland [email protected] 3 Bielefeld University of Applied Sciences, Germany [email protected] Abstract. Nowadays companies like Apple create ecosystems of third- party providers and users around their software platforms. Often online stores like Apple App Store are created to directly market third-party solutions. We call such ecosystems store-oriented software ecosystems. While the architecture of these ecosystems is mainly derived from busi- ness decisions of their owners, ecosystems with greatly different archi- tectural designs have been created. This diversity makes it challenging for future ecosystem providers to understand which architectural design is suitable to fulfill certain business decisions. In turn, opening a plat- form becomes risky while endangering intellectual property or scarifying quality of services. In this paper, we identify three main design options of store-oriented software ecosystems by classifying existing ecosystems based on similarities in their business decisions. We elaborate on the design options, discuss their main contributions, and provide exemplary ecosystems. Our work provides aspiring ecosystem providers with the reusable knowledge of existing ecosystems and helps them to take more informed architectural decisions and reduce risks in future. Keywords: Software ecosystems, Reusable designs, Variabilities 1 Introduction Software ecosystems have become an emerging architectural approach for many companies to grow. The term software ecosystem is inspired from ecological ecosystems that are the result of an interplay between organisms as well as interactions with a physical environment [1].
    [Show full text]
  • Syncro SVN Client 8.1
    Syncro SVN Client 8.1 Notice Copyright All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and SyncRO Soft SRL, was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Syncro SVN Client | Contents | 5 Contents Chapter 1: Introduction..........................................................................................11 Chapter 2: Installation............................................................................................13 Installation
    [Show full text]
  • Welcome-To-Reqtify-2016-FD01.Pdf
    Welcome to Reqtify 2016 FD01 Reqtify 2016 FD01 is a new major release of Reqtify product line containing new features, new interfaces and minor enhancements, interface updates, and fixes. Reqtify is an interactive requirement traceability and impact analysis tool which can trace requirements from system, program and project levels to the entire levels of your software or hardware component development lifecycle. Reqtify can interface with requirement-related information in a wide variety of data formats, document types and file formats. These can include corporate requirement repositories such as IBM-Rational DOORS™ and RequisitePro™, Borland CaliberRM™, 3SL Cradle™, office type documents such as Microsoft Word, Excel, Adobe FrameMaker and PDF, UML Design tools such as ARTiSAN Studio, Enterprise Architect, CAD tools such as Simulink, Code files such as C, Ada, C++, Java or VHDL as well as information in standard text format, HTML, XML, or ReqIF. This document is for information and instruction purposes and is reserving the right to make changes in specifications and other information contained in this publication without prior notice, and the reader should, in all cases, consult Dassault Systèmes to determine whether any changes have been made. The terms and conditions governing the sale and licensing of products are set forth in a separate written agreements. No representation or other affirmation of fact contained in this publication shall be deemed to be a warranty or give rise to any liability of Dassault Systèmes and its affiliates whatsoever. DASSAULT SYSTÈMES AND ITS AFFILIATES MAKE NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Version Control) Installation and Configuration Guide Version 8.0 and Higher
    Source Management (Version Control) Installation and Configuration Guide Version 8.0 and Higher July 05, 2018 Active Technologies, EDA, EDA/SQL, FIDEL, FOCUS, Information Builders, the Information Builders logo, iWay, iWay Software, Parlay, PC/FOCUS, RStat, Table Talk, Web390, WebFOCUS, WebFOCUS Active Technologies, and WebFOCUS Magnify are registered trademarks, and DataMigrator and Hyperstage are trademarks of Information Builders, Inc. Adobe, the Adobe logo, Acrobat, Adobe Reader, Flash, Adobe Flash Builder, Flex, and PostScript are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Due to the nature of this material, this document refers to numerous hardware and software products by their trademarks. In most, if not all cases, these designations are claimed as trademarks or registered trademarks by their respective companies. It is not this publisher's intent to use any of these names generically. The reader is therefore cautioned to investigate all claimed trademark rights before using any of these names other than to refer to the product described. Copyright © 2018, by Information Builders, Inc. and iWay Software. All rights reserved. Patent Pending. This manual, or parts thereof, may not be reproduced in any form without the written permission of Information Builders, Inc. Contents Preface ......................................................................... 5 Documentation Conventions ............................................................5 Related Publications
    [Show full text]
  • Flare Source Control Guide: Apache Subversion
    USER GUIDE MADCAP FLARE 2021 Source Control: Subversion Copyright 2021 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the written permission of MadCap Software. MadCap Software 9191 Towne Center Drive, Suite 150 San Diego, California 92122 858-320-0387 www.madcapsoftware.com THIS PDF WAS CREATED USING MADCAP FLARE. CONTENTS CHAPTER 1 Introduction 5 CHAPTER 2 General Information for Subversion 6 Common Source Control Terms 7 Source Control Icons 8 CHAPTER 3 Process for Subversion 10 Binding a Project to Subversion 11 Importing From Source Control 15 Updating Source Control Files 16 Committing Source Control Files 19 Adding Files to Source Control 23 Merging Source Control Files 26 CHAPTER 4 Other Activities for Subversion 35 Deleting Source Control Files 36 Disabling the Get Latest Prompt for Source Control 37 Disconnecting From Source Control 38 CONTENTS iii Enabling Source Control Status Checks 40 Locking a File 41 Modifying Network Settings 43 Publishing to Source Control 46 Reverting Modified Source Control Files 47 Rolling Back to an Earlier Version of a File 48 Setting Color Options for Project File Differences 54 Unbinding a Project From Subversion 56 Unlocking a File 57 Viewing Differences in Source Control Files 58 Viewing the History of Source Control Files 63 Viewing Modified Files 65 APPENDIX PDFs 71 Tutorials 71 Cheat Sheets 71 User Guides 72 CONTENTS iv CHAPTER 1 Introduction You can use the Flare interface to perform various source control tasks for a project that is bound to Subversion.
    [Show full text]
  • Collabnet Subversion Edge User Guide 2 | Subversion Edge | TOC
    CollabNet Subversion Edge User Guide 2 | Subversion Edge | TOC Contents Welcome to CollabNet Subversion Edge.............................................................................7 Set up Subversion Edge .......................................................................................................8 Install Subversion Edge ...........................................................................................................................8 Install Subversion Edge on Windows...........................................................................................8 Install Subversion Edge on Linux................................................................................................9 Install Subversion Edge on Solaris.............................................................................................10 Configure the server...............................................................................................................................12 Configure general server settings...............................................................................................12 Configure advanced server settings............................................................................................13 Configure authentication settings...............................................................................................13 Configure a proxy server............................................................................................................14 Configure the mail server...........................................................................................................14
    [Show full text]