COM 1204 Object-Oriented Design - Spring 2001 - Programming Projects

Professor Futrelle -- College of Computer Science, Northeastern U., Boston, MA

(Version of 4/1/2001)


Introduction

This describes certain aspects of your project development as well as linking to an example I've prepared for you. Further information can be found on the important Assignments page.

The Demo1 project example

As of 3/31/01 I have assembled a simple demonstration project that includes source code, screen shots and javadoc web pages for a small bit of a simple phone system.

The "Evap" project example

As of 4/3/01 I have assembled a another demonstration project that includes source code, screen shots and javadoc web pages for a small bit of a simple phone system. This project shows how the states of objects are maintained over time, with each system responding to a call to its step() function by checking its state, and possibly initiating a call to another object. The important point is this: To keep the linkage between objects limited and to allow them autonomy, when an object is contacted by another it responds simply be changing its internal state. It only invokes functions in other objects when it is stepped.

The working group arrangements, or "phone companies"

The class will be divided into four groups or "phone companies", each responsible for creating a simulation for the complete system. The lists, with email addresses, will be published and made available to everyone the moment the groups are created. [As of 4/3/01, the groups list has been emailed to all. If you didn't get it, email us.]

How your project work will proceed -- Setting up directories

Your group will have to organize itself, especially by setting up some directories on unix to hold sources and javadoc pages shared by all in the group. Each member of the group will need to have directories for their own work and their own web pages. Below is an example of how you might proceed in setting up the correct directory permissions to make all this work. We'll call the sample students here S1 and S2, with S2 designated to keep the common directories for the group (one of the four groups). The overall strategy is this: You set up certain directories are set up so that only users who know the precise names of files and/or directories contained in them can access them. So the names of the "hidden" inner files and directories can be given to other members of the group and/or the Professor and Teaching Assistant for grading purposes. The file names used below are examples only. Some must be given distinct names in order to make it impossible for others to locate them.


Go to COM1204 home page

Return to Prof. Futrelle's home page