D7.2 N4C Laboratory Testing on Integrated Subsystems
|
|
|
- Sherilyn Nichols
- 10 years ago
- Views:
Transcription
1 Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Contract no: D7.2 N4C Laboratory Testing on Integrated Subsystems Pedro Nunes Institute António Cunha, André Pardal, Francisco Barbosa Postal address: Rua Pedro Nunes, , Coimbra, Portugal Tel: Fax:
2 N4C 30/04/2009 Page 2 of 38 ABSTRACT (Max 400 word) Starting in May 2008, N4C is a 36 month research project in the Seventh Framework Programme ( In cooperation between users in northern Sweden and Kočevje region in Slovenian mountain and partners, the project will design and experiment with an architecture, infrastructure and applications in field trials and build two test beds. This document makes reference to some of the actual integration methodologies, explaining the advantages and disadvantages of each one, along with the first drafts for the tests that will be performed in the summer of Due date of deliverable: 30/04/2009 Actual submission date: 30/04/2009 Document history Status Date Author Initial Draft based on DOW António Cunha, André Pardal, Francisco Barbosa First draft circulated to consortium 16/04/2009 Feedback 23/04/2009 Karl Grøttum 18/06/2009 Maria Udén Submission to EC Dissemination level PU = Public PP = Restricted to other programme participants (including the Commission Services). RE = Restricted to a group specified by the consortium (including the Commission Services). CO = Confidential, only for members of the consortium (including the Commission Services). Level PU
3 N4C 30/04/2009 Page 3 of 38 CONTENT 1. INTRODUCTION OVERVIEW ABBREVIATIONS SYSTEM S INTEGRATION SYSTEM S GENERAL DIAGRAM SYSTEM S FUNCTIONALITIES MODULES DESCRIPTION APPLICATION S SWIM LANE TRANSPORT SWIM LANE NETWORK SWIM LANE LINK AND PHYSICAL SWIM LANES PHYSICAL DEVICES TEST METHODOLOGY (THEORETICAL FRAMEWORK) UNIT TESTS INTEGRATION TEST GLOBAL INTEGRATION TESTING INCREMENTAL INTEGRATION TESTING INTER-PROCESS COMMUNICATION (IPC) FUNCTIONAL TESTS NON-FUNCTIONAL TESTS REQUIREMENTS-BASED TESTING SUBSYSTEMS INTEGRATION FOR SUMMER TESTS SYSTEM INTEGRATION SUBSYSTEM 1 TRANSMISSION SUBSYSTEM 2 DISCOVERY & LINK SUBSYSTEM 3 BUNDLE & STORAGE SUBSYSTEM 4 DATA MANAGEMENT SUBSYSTEM 5 SYSTEM MANAGEMENT CONFIGURATION SUBSYSTEM 6 ROUTING SUBSYSTEM TEST PLANNING LINK AND PHYSICAL SWIM LANES WI-FI WIMAX BLUETOOTH TRANSPORT SWIM LANE PROPHET DTN BUNDLE PROTOCOL APPLICATION SWIM LANE NOT SO INSTANT MESSENGER WEB CACHING HIKER S APPLICATIONS HERDER APPLICATION AND ANIMAL MIGRATION MONITORING MANAGEMENT AND CONFIGURATION CONTROLLER CONCLUSIONS REFERENCES... 38
4 N4C 30/04/2009 Page 4 of INTRODUCTION 1.1 OVERVIEW This document was created under the scope of the preparation of the system s integration (Work package 7). For this document, it was planned the development and supervision of incremental lab testing of the integrated hardware and software and also the development of a regression harness for testing updated infrastructure subcomponents. However, due to the project s complexity, it is not yet possible to design a complete set of integration tests in order to ensure the total correctness of the system s integration. To achieve this task with the maximum efficiency, we have decided to make a theoretic approach first, which is a fundamental requirement for the next step in the development process, the integration tests design. So, in the following sections, it is analyzed the division of the system into modules, grouped according to each one s function, which are then described. Later, different integration test methodologies are analyzed against the objectives and constraints of this project, explaining the reasons why some of them fit into this project and others do not. Finally, it is proposed a division into subsystems as part of the methodology used for the integration tests that will occur next summer, along with conditions that should be established before initiating tests. The document aims to not only expose the theory for integration tests, selecting the solutions that seem to be more appropriate, but also to help N4C s partners to develop their white-box tests, giving them, at the same time, a general view of the other modules and the entire system itself. 1.2 ABBREVIATIONS CCR DTN IPC LI Communications Challenged Region Delay Tolerant Networking Inter-Process Communication Legacy Internet 2. SYSTEM S INTEGRATION System s integration is the result of joining all the modules of the system, ensuring that they properly work together as a system. Thinking of a system as a group of, many times disparate, subsystems, each of which with its own interface, the integration of the subsystems has to do with how the interfaces will connect to each other, trying to achieve a way of all interfaces can communicate between them, so all subsystems can act as one.
5 N4C 30/04/2009 Page 5 of 38 Integrated systems can, in its turn, be part of a bigger system if another integration process is made, leading to every time more complex systems, but at the same time, to a valueadding capability. 2.1 SYSTEM S GENERAL DIAGRAM Using gathered information from N4C s partners, we have defined the modules of the system. From the interaction of the modules it was build the system s general diagram presented in Figure 1[4]. This diagram is divided in six swim lanes, five of which correspond to the communication s stack and the sixth to other hardware with different functions, not restricted to network capabilities. In this diagram there are two kinds of paths between the modules: the control message path and the network message path. Each type of message can travel by only one of the paths: 1. Control message: This type of message is related to, among others, system configurations messages, notification messages and link state messages. Only control messages can travel in the red paths, as depicted below; 2. Network message: Data messages from/for user s applications, which may also include control data, travels in the blue paths. Figure 1: System's general diagram
6 N4C 30/04/2009 Page 6 of SYSTEM S FUNCTIONALITIES The following UML use case diagram presents the functionalities that N4C intends to offer its users, divided by the subsystems discussed next in section N4C N4C Web Caching Application Request data to be cached regularly Setup cache in advance Access to a non-cached site User with a laptop/pda N4C / Not So Instant Messenger Send Request a search Provide important information Receive Send data to cache in advance Send a "Not So Instant Message" Receive a "Not So Instant Message" N4C Hiker s Applications N4C Data Transfer from Meteorological Stations Collect temperature data Collect relative humidity data Service Provider Download POIs Collect wind speed data Hiker's PDA Send message with own location Download maps of a location Update geoblog and photoblog << include >> << include >> << include >> << include >> Get current position Collect wind direction data Collect pressure data Collect solar radiation data Meteorological Station Collect precipitation data N4C Reindeer Tracking System Send collected data to LI in ASCII format Herd's Hardware Transmit reindeer's position Monitor Reindeer's Location Herder Figure 2: Functionalities use case diagram.
7 N4C 30/04/2009 Page 7 of MODULES DESCRIPTION APPLICATION S SWIM LANE USER APPLICATIONS The user applications will be the interface of the system with the user. This module is the source/destiny of the data that will be generated. There are four user applications, namely web caching, data transfer from meteorological station, hiker s applications and /not so instant messenger WEB CACHING This application has the following functionalities: a) User pulled regular: a user can request some data to be delivered regularly; b) User pulled event driven: a user can set up a cache in advance; c) Provider pushed regular: Provide important information for educational purposes and tourists, etc.; d) Provider pushed event driven: Sends data to cache in advance; e) Ad hoc site request: a user tries to access a site that is not normally cached; f) Ad hoc search request: a user makes a search request through a search box. This application should have the following input: site/search requests from clients using ad hoc TCP/IP mode in the CCRs and data from providers using TCP/IP in the LI. The answer to the input should be the delivery of the requested data to the client. In Figure 3, the CCR area should be viewed as a black box, being the DTN users and service providers the ones who provide the input, and the DTN users are the output s destination. Legacy Internet CCR Input: Data Delivery DTN Input: Data Request Output: Data Delivery Service Provider DTN User Figure 3: Input and output of Web Caching application
8 N4C 30/04/2009 Page 8 of METEOROLOGICAL STATION This application transmits meteorological data from the DTN to LI. The meteorological sensors measure: a) the temperature; b) the relative humidity; c) wind s speed and direction; d) the pressure; e) the solar radiation; and f) the precipitation. Before of data s transmission, the data file should be prepared so the following initializations can be done: init file for meteorological station, defining the constants for the sensors; init file for meteorological station, defining the processing of the measured data; init file for meteorological station, defining the data to be transmitted; init file for the DTN protocol defining the destination of data. The data files should be delivered in ASCII format (see D3.1 Functional Specification (Initial), document: N4C-WP3-2-fs-initial-04.doc). CCR Input: Temperature Relative Humidity Wind s Direction and Speed Pressure Solar Radiation Precipitation DTN Meteorological Station Legacy Internet Output: Data Collected (ASCII format) Figure 4: Input and output of the meteorological station / NOT SO INSTANT MESSENGER This application has two distinct functionalities. The first one is to send and receive s, and the latter is not so instant messages (similar to Microsoft Windows messenger). Both of these functionalities can use text or attachments. The not so instant messenger will be implemented within the DTN network only to guarantee the correct work of this functionality. The inputs of these applications are the s/messages sent out by the DTN users and the output is the delivery of s/messages to the destination.
9 N4C 30/04/2009 Page 9 of 38 CCR LI send/delivery DTN Input: / Message Send Output: / Message Delivery DTN User Figure 5: Input and output of the /not So Instant Messenger Application HIKER S APPLICATIONS This module consists in several features, as described below: Points of Interest (POI) The functionalities of the application are to download potential interest points like heart starter, medical or physical services. The module should be able to extract GPS maps with the location of interest points, from the web cache/internet. For example, the location of nearest medical services (medical, physical or heart starter) can be one type of Point of Interest (POI). The input of the application is the current location, given by the GPS receiver s coordinates and the output is the POI database updated. Send a Message with own location This application should be able to send a message with GPS receiver s own location in a DTN region and forward it to the LI. The input of this application is the GPS receiver s coordinates and the output is the containing those coordinates. Maps for Own Location Download maps related to one s location. The application should be able to pull up a map of the area around the current GPS receiver s coordinates. The input of this application is the GPS receiver s coordinates and the output is the updated cached maps. Geoblog and Photo Blog Must be able of automatic updates of geoblog and photo blog when there is a connection opportunity. The input of this functionality is the GPS receiver s coordinates and the output is the with the GPS receiver s coordinates. These features are schematized according to its input and output in the diagram depicted in Figure 6.
10 N4C 30/04/2009 Page 10 of 38 CCR DTN GPS Receiver Current Coordinates Hiker s PDA Input: Location s coordinates Output: POIs updated Maps updated Message / with own location Legacy Internet Figure 6: Input and output of Hiker's Application HERDER S SOFTWARE This module represents a specific subsystem focused in the animals monitoring, connected to a specialized wireless hardware MANAGEMENT AND CONFIGURATION CONTROLLER The management and configuration controller module is connected with all other modules and will ensure the configuration, monitoring and analysis of all the system s modules LOCAL MANAGEMENT The local management module implements the interface between user applications and the remainder system and manages data from/to user applications TRANSPORT SWIM LANE ROUTING This module manages and calculates the transition s probability of the bundles between two nodes. For now, there are two kinds of routing protocols that can be implemented: the PRoPHET and the static protocol PRoPHET The PRoPHET uses three main parameters: alpha, beta and gamma. The alpha parameter is used for updating the deliverable probability of the encountered node, beta is used for updating the transitive deliverable probabilities and gamma is used for aging the deliverable probabilities.
11 N4C 30/04/2009 Page 11 of ADDRESS AND ASSOCIATION MEMBERSHIP Allows the association of a new member in the CCRs and manage nodes addresses DTN BUNDLE PROTOCOL This module will bundle/debundle data DTN BUNDLE MANAGEMENT This module is responsible for creating, managing and breaking links between two neighbor nodes COMMUNICATION OPPORTUNITY MANAGEMENT This module manages the connection between nodes. When a new neighbor becomes accessible, this module performs the following steps: a) Decides what routing protocol should be used; b) Wakes up the routing protocol; c) Exchanges the meta information (link characteristics: how long it expects the link to be up and how fast data can be exchanged) with the new neighbor; d) Decides what bundles to exchange; e) Order the bundle protocol to start exchanging bundles STORAGE MANAGEMENT & STORAGE This module stores and manages the bundles. It evaluates what bundles need to be send first and how much storage capability is available NETWORK SWIM LANE CONVERGENCE LAYERS This module converts the bundles in conventional legacy internet packets and converts the packets from conventional legacy internet into bundles COMMUNICATIONS DISCOVERY This module searches for other nodes using UDP packets sent by wireless hardware in broadcast mode and waits for an answer.
12 N4C 30/04/2009 Page 12 of LINK AND PHYSICAL SWIM LANES NETWORK HARDWARE This module represents the physical devices which will send and receive data PHYSICAL DEVICES INTEL BOARD It is a specialized hardware set (batteries, data store and so on) developed to work within DTNs and with arctic temperature s conditions NOKIA N810 It is an internet tablet. It features the Maemo Linux distribution, based on Maemo 4.0, including MicroB, a Mozilla-based mobile browser, and a GPS navigation application HERDER S HARDWARE This hardware is a wireless animal tracking system. Animal Tracking intends to develop novel sensors and power sources to allow reindeer and other herds/cattle to be located within the DTN region. The air-interface technologies will accordingly proceed to find optimal physical layer strategies. 3. TEST METHODOLOGY (THEORETICAL FRAMEWORK) It is possible to define two basic opacity classes of tests: black box testing and white box testing. The black box testing consists in ignoring the internal mechanism of a system and focuses solely on the outputs generated in response to selected inputs. It is often used in validation tests. The white box tests are focuses on the internal structure of the module and is often used for verification. The classes of testing are denoted by colors to depict the opacity of the testers of the modules. In the black box tests, the internal structure of the module isn t relevant for the test. The module is considered to be a black box to the tester who can t see inside the box. The tester knows only that information can be input into to the black box, and the black box will send something back out. Based on the requirements knowledge, the tester knows what to expect the black box to send out and tests to make sure the black box sends out what it is supposed to send out. In the white box tests, tests focus on the internal structure of the code
13 N4C 30/04/2009 Page 13 of 38 and are most of the time written by the code s developers, who perform white box tests by executing methods with certain parameters. Our objective is to understand all the modules from a high level view only, due of the big complexity of the entire system. For that purpose, we will consider the modules like blackboxes. Afterwards, we expect that white-box tests (unit tests) are performed by the developers (each module owner testing its modules). 3.1 UNIT TESTS Unit test is a method of software testing that verifies that the individual modules are working properly. Using white box testing techniques, testers can realize that a module does what it is intended to do at a very low structural level. Ideally, each test case is independent from the others. Additional components (like stubs) can be used to assist testing a module in isolation. For example, the tester will write some test code that will call a method with certain parameters and will ensure that the return value of this method is as expected. The goal of unit testing is to isolate each part of the system and show that the individual parts are correct. The unit test provides the guarantee that the system s module works correctly, allowing also to find problems in an early stage of the development cycle. 3.2 INTEGRATION TEST Even though modules can be properly working individually, that does not mean that they can work integrated in a larger system or subsystem. For example, in a subsystem composed by multiple modules, data might get lost across an interface, messages might not get passed properly or interfaces might not be implemented as specified. In order to solve issues that might be encountered when integrating modules, an integration test must be performed. The integration test is the phase of tests in which individual modules are combined and tested as subsystems. Then, testers apply the tests defined in an integration test plan to those subsystems. The integration test can be divided into four methods: the global integration test, the incremental integration test and the Inter-Process Communication (IPC) GLOBAL INTEGRATION TESTING The global integration testing, or the big bang approach, consists in the integration of all modules at the same time. In this method, all modules are coupled together to form a complete system and then used for integration testing. The big bang method is very effective for saving time in the integration testing process, but the location of bugs can be very difficult after the bang, principally in complex systems.
14 N4C 30/04/2009 Page 14 of INCREMENTAL INTEGRATION TESTING The incremental integration testing consists in incrementing the set of integrated modules progressively. This method results in some additional overhead relatively to the big bang method, but significantly reduces bugs localization and time spent looking for bugs, particularly in complex projects. The two main techniques to perform incremental integration testing are the top-down and the bottom-up TOP-DOWN The top down method is the procedure where the top integrated modules are tested and the branches of the modules are testing step by step till all modules are integrated. In this method the high level modules are tested first, possibly with the middle level control structures present only as stub (stubs are units which are only present to allow the higher level control routines to be tested). For example, a system with the following general modules diagrams: High Level Module A B C D E F G The respective scheme of integration test using top-down technique is the following: A A, B, C, D A, B, C, D, E, F, G The most important advantages of this technique are: allows early verification of high level behavior; modules can be added one at a time with each step if desired; it is easy to find the missing branch links; few or no drivers needed (unit to simulate the highest level modules).
15 N4C 30/04/2009 Page 15 of 38 The most important disadvantages are: delays verification of low-level behavior; stubs are required for missing elements; test cases are difficult to formulate and interpret BOTTOM-UP In the bottom-up method the low level modules are integrated and tested first. After the integration testing of lower level integrated modules, they are combined in subsystems and these are tested. This process continues until the high level modules are tested. For the previous example, the scheme of integration test using bottom up technique is the following: E E, F, B F C A, B, C, D, E, F, G G G, D The main advantages of this method are: allows early verification of the low level behavior; no stubs are required; test cases more easily to formulate and interpret; it is easy to find bugs; logic modules tested thoroughly; testing can be done in parallel with implementation. The principal disadvantages are: delays verification of the high level behavior; drivers are required for missing elements; possibility of a large number of modules integrated in the case that a module may have several modules dependencies.
16 N4C 30/04/2009 Page 16 of INTER-PROCESS COMMUNICATION (IPC) IPC consists in a set of techniques for the exchange of data among multiple threads in one or more processes which may be running on one or more computers connected by a network, depending of the system. IPC techniques are divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC). The method of IPC used may vary based on the bandwidth and latency of communication between the threads, and the type of data being exchanged. An interesting IPC which we can use to integrate the system is D-Bus, a medium for local communication between processes running on the same host. D-Bus is meant to be fast and lightweight and is designed for use as a unified middleware layer underneath the main free desktop environments. Unlike more heavyweight conventional messaging middleware, D-Bus is non-transactional. It is stateful and connection-based, however, making it "smarter" than low-level message-passing protocols such as UDP. On the other hand, it does carry messages as discrete items not continuous streams of data as in the case with TCP. Both one-to-one messaging and publish/subscribe communication are supported. D-Bus has a structured view of the data it carries, and deals with data in binary form: integral numbers of various widths, floating-point numbers, strings, compound types, and so on. Because data is not just "raw bytes" to D-Bus, messages can be validated and ill-formed messages rejected. In technical terms, D-Bus behaves as an RPC mechanism and provides its own marshaling. In Figure 7 [1] it is presented the D-Bus structure.
17 N4C 30/04/2009 Page 17 of 38 Figure 7: D-Bus structure. 3.3 FUNCTIONAL TESTS The functional test has the aim of testing the complete integrated system to evaluate the system's compliance with its functional requirements. This kind of test is implemented within the scope of black-box testing, and as such, should require no knowledge of the internal structure of the modules. The black-box approach is a testing method in which test data is derived from the specified functional requirements without regard to the final system s structure. It is also termed data-driven, input/output driven or requirements-based testing. Black-box testing also mainly refers to functional testing. It is a testing method emphasized on executing the functions and examination of their input and output data. The tester treats the module under test as a black-box. Only the inputs, outputs and functional requirements are visible, and the functionality is determined by observing the outputs to corresponding inputs. In testing, various inputs are exercised and the outputs are compared against functional requirements to validate its correctness. All test cases are derived from the requirement list. 3.4 NON-FUNCTIONAL TESTS Non-functional testing verifies that the system functions properly, even when it receives invalid or unexpected inputs. Non-functional tests try to establish whether the device under
18 N4C 30/04/2009 Page 18 of 38 test can tolerate invalid or unexpected inputs, thereby establishing the robustness of input validation routines as well as error-handling routines. The most important non-functional tests are: Stress testing: conducted to evaluate the system at or beyond the limits of its requirements; Performance testing: conducted to evaluate the compliance of the system with specified performance requirements (capability, speed, precision, ); Usability testing: conducted to evaluate the extent to which a user can learn to operate, prepare inputs for, and interpret outputs of the system; Load tests: maximize the load imposed on the system (volume of data, number of users, ); Security tests: evaluates system s characteristics that relate to the availability, integrity and confidentiality of system s data and services; Recovery tests: subject a system to losses of resources in order to determine if it can recover properly from those losses; Reliability tests: is the probability that a system will operate without failure under given conditions for a given interval (mean time between failures = mean time to failure + mean time to repair). 4. REQUIREMENTS-BASED TESTING We have decided to follow the requirements-based testing methodology that is addressed to validate that the requirements are correct, complete, unambiguous, and logically consistent and designing a necessary and sufficient (from a black box perspective) set of test cases from those requirements. As this is an investigation-based project, aiming at the deployment of applications to final users, it is necessary to have test and integration methods, so that, in the end of the project, the system can be composed of tangible assets. The requirements-based testing process can to be divided into the following steps: Pass/Fail Criteria Definition The test effort has specific, quantitative and qualitative goals. Testing is successfully completed only when the goals have been reached. (e.g., testing is considered to be successfully completed if 100% of the messages are delivered correctly to its destination). Design Test Cases Logical test cases are defined by five characteristics: the initial state of the system prior to executing the test, the data in the data base, the inputs, the expected outputs, and the final system state. Build Test Cases To build the test cases we need: initialization, assumptions and restrictions identification. Creating the necessary data and building the components to support testing (e.g., build the necessaries stubs and drivers).
19 N4C 30/04/2009 Page 19 of 38 Execute Tests Execute the test-case steps against the system being tested and document the results. Verify Test Results Verify that the test results are similar to the expected ones. Verify Test Coverage Track the amount of functional coverage and system coverage achieved by the successful execution of the set of tests. Manage and Track Defects Any defects detected during the testing process will be tracked to resolution. Statistics are maintained concerning the overall defect trends and status. Manage the Test Library The test manager maintains the relationships between the test cases and the programs being tested. The test manager keeps track of which tests have or have not been executed, and whether the executed tests have been passed or failed. 5. SUBSYSTEMS INTEGRATION FOR SUMMER TESTS After performing an evaluation of the four integration test possibilities described under section 3.2, we excluded the big bang approach and the top-down. The big bang approach was rejected because the modules are being developed progressively and the big bang approach requires that all modules are integrated at the same time, which would imply that the system s integration would have to wait until all the modules were fully developed. The top-down technique was rejected because it requires firstly the integration of the high level modules and, in this project, these modules will probably be the last to be terminated, because they need the cooperation of the end users in some specifications, like users requirements. Consequentially, it is not logical to use this method. The bottom-up method is a hypothesis, due to the fact that the low level modules will be the terminated first, which is consistent to the fact that the bottom-up method integrates first the low level protocol. Another advantage of this method is the great capability of localizing bugs in the integrated system. Finally, IPC, namely the D-BUS integration platform, is also a hypothesis, as it adds flexibility and independency to the integration process: flexibility because it allows a faster accommodation of existing and new closed modules and independency of the integrated modules relatively of the other modules of the system. In this project those two features will be very important because the modules will be closed-in progressively. After careful consideration, we believe that the D-Bus integration platform is the most interesting option, because D-Bus is fast, lightweight and is designed for use as a unified middleware layer underneath the main free desktop environments. The bottom-up method was also excluded because D-Bus gives more flexibility in the integration process and increases the expansion capability, by adding new modules to the system.
20 N4C 30/04/2009 Page 20 of SYSTEM INTEGRATION The D-bus integration platform is an inter-process communication system which it can be used to integrate the modules of the system. Adding the D-bus system bus to the general diagram presented in Figure 1 resulted in the diagram depicted in Figure 8 [4]. Extrapolating from the diagram below, we ve manage to define six subsystems as guidelines for the next summer tests, presented in the next sections. Figure 8: System general diagram using D-bus system bus. 5.2 SUBSYSTEM 1 TRANSMISSION The first subsystem, named Transmission, is emphasized in Figure 9 [4] and aggregates three modules: DTN Bundle Protocol, Convergence Layers and Network Hardware. The aim of this subsystem is to test the capability of transmitting data bundles using the available technologies.
21 N4C 30/04/2009 Page 21 of 38 Figure 9: Definition of the subsystem 1 Transmission in the general diagram. 5.3 SUBSYSTEM 2 DISCOVERY & LINK Subsystem 2, named Discovery & Link, is comprised of five distinct modules: Communication Opportunity Management, DTN Bundle Management, Communication Discovery, Convergence Layers and Network Hardware. The aim of this subsystem is to test the capability of discovering new nodes, evaluate the conditions to establish a connection between two nodes and, if there are acceptable conditions, establish the link. This subsystem s constituent modules are emphasized in Figure 10 [4].
22 N4C 30/04/2009 Page 22 of 38 Figure 10: Definition of the subsystem 2 Discovery & Link in the general diagram. 5.4 SUBSYSTEM 3 BUNDLE & STORAGE Subsystem 3, named Bundle & Storage is composed by three modules: Routing, DTN Bundle Protocol and Storage Management & Storage. The aim of this subsystem is to test the functionalities of data bundle/debundle, data storage and storage management. In Figure 11 [4] it is outlined this subsystem s position in the general diagram.
23 N4C 30/04/2009 Page 23 of 38 Figure 11: Definition of the subsystem 3 Bundle & Storage in the general diagram. 5.5 SUBSYSTEM 4 DATA MANAGEMENT Subsystem 4, named Data Management is composed by four modules: User Applications, Local Management, Herder s Software and Herder s Hardware. This subsystem is focused in the data generation and management of that data. Figure 12 [4] depicts this subsystem s place in the general diagram.
24 N4C 30/04/2009 Page 24 of 38 Figure 12: Definition of the subsystem 4 Data Management in the general diagram. 5.6 SUBSYSTEM 5 SYSTEM MANAGEMENT CONFIGURATION Subsystem 5, named System Configuration, as can be seen in Figure 13 [4], joins four modules: User Applications, Management and Configuration Controller, Herder s Software and Herder s Hardware. This subsystem is focused in the management and configuration s test of the modules (e.g. User Applications).
25 N4C 30/04/2009 Page 25 of 38 Figure 13: Definition of the subsystem 5 System Configuration in the general diagram. 5.7 SUBSYSTEM 6 ROUTING As depicted in Figure 14 [4], subsystem 6, named Routing, is comprised of six modules: User Applications, Address and Association Membership, Herder s Software, Herder s Hardware, Local Management and Routing. The aim of this subsystem is to test the capabilities of routing, address and new member association.
26 N4C 30/04/2009 Page 26 of 38 Figure 14: Definition of the subsystem 6 Routing in the general diagram. 6. SUBSYSTEM TEST PLANNING This chapter intends to provide the planning of the tests to all modules, as an initial approach to the next phase of designing the tests themselves. This test plan derives from the chosen test methodology requirements-based testing, exposed in section 4 -, from a blackbox perspective. In order to test the integration of the system s modules, this chapter describes, beyond the goal of each module, the initial conditions, as well as some constraints, so tests can be properly made and results can be as reliable and truth as possible. 6.1 LINK AND PHYSICAL SWIM LANES WI-FI GOAL Test the reliability and performance of data s transmission through Wi-Fi technology between two or more nodes.
27 N4C 30/04/2009 Page 27 of WIMAX GOAL Test the reliability and performance of transmission data through WiMax technology between two or more nodes BLUETOOTH GOAL Test the reliability and performance of transmission data through Bluetooth technology between two or more nodes. 6.2 TRANSPORT SWIM LANE PROPHET GOAL Test the capabilities and performance of this routing protocol between two or more nodes. Right now there are two implementation of the PRoPHET protocol. One is the stand alone PRoPHET implementation from the SNC project and the second one is done within the DTN2 reference implementation. Which implementation will actually be used for further development and testing is still an open question INITIALIZATION Tests should start with default values of the PRoPHET parameters (alpha 0.75, beta 0.25, gamma Later on, the parameters can be tuned up to achieve optimal routing performance on node mobility s case. All the routing information (such as delivery probability tables on nodes) should be cleared out before every test. All the old log files should be removed as well before every test ASSUMPTIONS AND RESTRICTIONS In case of limited time tests, with low node s mobility, it will be prepared and applied an optimized probabilities table to eliminate the needed routing set up time INPUT Main input for PRoPHET testing will be generated network traffic, number of nodes, node mobility and encountering time. In case of a heavy traffic load, node s storage capacity can be used as well.
28 N4C 30/04/2009 Page 28 of OUTPUT Gathered traces of the encounters, encountered time, bundle routes, power on/off time and updates of probability tables TEST CASE PASS/FAIL CRITERIA After every test, an in-depth analysis should be performed in order to extract the actual routes of the bundles. Main success criteria is whether the protocol can choose, in every node, an optimal route in every "decision steps" or not, according to the gathered information routing provided by each node DTN BUNDLE PROTOCOL GOAL Test the DTN bundle protocol s capabilities and performance between two or more nodes and also the performance when interacting with other protocols. 6.3 APPLICATION SWIM LANE GOAL Test the capability of sending and receiving messages with text and attachments. The tests should be done between DTN servers only and a DTN server with a LI server NOT SO INSTANT MESSENGER GOAL Test the capabilities of sending and receiving messages with text or attachments. The tests should be done within the DTN network only INITIALIZATION All the old sent and received messages will be removed from all the nodes (including log files) INPUT Main input will be the messages sent out by the DTN users OUTPUT Traces of sent and delivered messages during the test time.
29 N4C 30/04/2009 Page 29 of TEST CASE PASS/FAIL CRITERIA To pass this test case, all the messages should be delivered, except those dropped by the network itself, due to an expired bundle time WEB CACHING USER PULLED REGULAR GOAL Test if a user can request some data or web pages. These data should be delivered regularly INITIALIZATION Clients need to be connected to a DTN. The testing equipment should be up and running with all the necessary applications and scripts. A provider/client on LI needs to be connected to a DTN gateway ASSUMPTIONS AND RESTRICTIONS Requests are made from hotspots or end user clients with DTN and cache applications. It is not certain that the client itself has this software. In that case, the client needs to configure the web browser to use the proxy settings, so it will use the hotspot instead. For now, the user pulled regular is the application that is in testing and should work. The other test cases for web caching will be developed for future tests INPUT Site/search requests from clients using ad hoc TCP/IP mode and data from providers using TCP/IP OUTPUT Delivered web data to client TEST CASE PASS/FAIL CRITERIA Pass: In a controlled test environment, the requests should be processed and tried to be delivered. Fail: Data is not processed USER PULLED EVENT DRIVER GOAL Test if a user can set up a cache in advance to provide data.
30 N4C 30/04/2009 Page 30 of INITIALIZATION Clients need to be connected to a DTN. The testing equipment should be up and running with all the necessary applications and scripts. A provider/client on LI needs to be connected to a DTN gateway ASSUMPTIONS AND RESTRICTIONS Requests are made from hotspots or end user client with DTN and cache applications. It is not certain that client itself has this software. In that case, the client needs to configure the web browser to use the proxy settings so it will use the hotspot instead. For now, the user pulled regular is the one that is in testing and should work. The other use cases will be worked on for future tests INPUT Site/search requests from clients using ad hoc TCP/IP mode and data from providers using TCP/IP OUTPUT Delivered web data to client TEST CASE PASS/FAIL CRITERIA Pass: In a controlled test environment, the requests should be processed and tried to be delivered. Fail: Data is not processed PROVIDER PUSHED REGULAR GOAL Test if the provider can regularly deliver important information into the DTN network (e.g. information for tourists or governmental information) INITIALIZATION Clients need to be connected to a DTN. The testing equipment should be up and running with all the necessary applications and scripts. A provider/client on LI needs to be connected to a DTN gateway ASSUMPTIONS AND RESTRICTIONS Requests are made from hotspots or end user client with DTN and cache applications. It is not certain that client itself has this software. In that case, client needs to configure the web browser to use the proxy setting so it will use the hotspot instead. For now, the user pulled regular is the one that is in testing and should work. The other use cases will be worked on for future tests.
31 N4C 30/04/2009 Page 31 of INPUT Site/search requests from clients using ad hoc TCP/IP mode and data from providers using TCP/IP OUTPUT Delivered web data to client TEST CASE PASS/FAIL CRITERIA Pass: In a controlled test environment, the requests should be processed and tried to be delivered. Fail: Data is not processed PROVIDER PUSHED EVENT DRIVEN GOAL Test if the provider can send data to cache in advance (e.g. educational contents) INITIALIZATION Clients need to be connected to a DTN. The testing equipment should be up and running with all the necessary applications and scripts. A provider/client on LI needs to be connected to a DTN gateway ASSUMPTIONS AND RESTRICTIONS Requests are made from hotspots or end user clients with DTN and cache applications. It is not certain that the client itself has this software. In that case, the client needs to configure the web browser to use the proxy settings, so it will use the hotspot instead. For now, the user pulled regular is the one that is in testing and should work. The other use cases will be worked on for future tests INPUT Site/search requests from clients using ad hoc TCP/IP mode and data from providers using TCP/IP OUTPUT Delivered web data to client TEST CASE PASS/FAIL CRITERIA Pass: In a controlled test environment, the requests should be processed and tried to be delivered. Fail: Data is not processed.
32 N4C 30/04/2009 Page 32 of AD HOC SITE REQUEST GOAL Test if a user can request a site that is not normally cached INITIALIZATION Client need to be connected to a DTN. The testing equipment should be up and running with all the necessary applications and scripts. A provider/client on LI needs to be connected to a DTN gateway ASSUMPTIONS AND RESTRICTIONS The request is made from hotspots or end user client with DTN and cache applications. It is not certain that client itself has this software. In that case, the client needs to configure the web browser to use the proxy settings, so it will use the hotspot instead. For now, the user pulled regular is the one that is in testing and should work. The other use cases will be worked on for future tests INPUT Site/search requests from clients using ad hoc TCP/IP mode and data from providers using TCP/IP OUTPUT Delivered web data to client TEST CASE PASS/FAIL CRITERIA Pass: In a controlled test environment, the requests should be processed and tried to be delivered. Fail: Data is not processed AD HOC SEARCH REQUEST GOAL Test if a user can make a search request through a search box INITIALIZATION Client need to be connected to a DTN. The testing equipment should be up and running with all the necessary applications and scripts. A provider/client on LI needs to be connected to a DTN gateway ASSUMPTIONS AND RESTRICTIONS Requests are made from hotspots or end user clients with DTN and cache applications. It is not certain that client itself has this software. In that case, the client needs to configure the web browser to use the proxy settings, so it will use the hotspot instead. For now, the user pulled regular is the one that is in testing and should work. The other use cases will be worked on for future tests.
33 N4C 30/04/2009 Page 33 of INPUT Site/search requests from clients using ad hoc TCP/IP mode and data from providers using TCP/IP OUTPUT Delivered web data to client TEST CASE PASS/FAIL CRITERIA Pass: In a controlled test environment, the requests should be processed and tried to be delivered. Fail: Data is not processed METEOROLOGICAL STATION GOAL Test data s transfer from meteorological station (temperature, relative humidity, wind speed and direction, pressure, solar radiation and precipitation) through the DTN to LI. This must be tested in two different ways: In a periodical time schedule and whenever the transmission is requested (as faster as possible) INITIALIZATION Several initialization files will be prepared for the data transfer: init file for meteorological station, defining the constants for the sensors; init file for meteorological station defining the processing of the measured data, init file for meteorological station defining the data transmitting and init file for the DTN protocol defining the destination of data ASSUMPTIONS AND RESTRICTIONS All hardware should be able to work within a temperature range from -20 to +80 degrees Celsius INPUT Data from meteorological sensors: Air temperature Relative humidity Wind speed and direction Pressure Global solar radiation Precipitation OUTPUT Data files in ASCII format (see D3.1 Functional Specification (Initial), document:
34 N4C 30/04/2009 Page 34 of 38 N4C-WP3-2-fs-initial-04.doc) TEST CASE PASS/FAIL CRITERIA Pass: 75% of data successfully transferred to the destination. Fail: A percentage of successfully transferred data below 75% HIKER S APPLICATIONS POINTS OF INTEREST (POI) GOAL Test the download of interest points. This test case tests the application in terms of extraction of GPS maps with location of interest points, from the web cache/internet. The location of nearest medical services (medical, physical or heart starter) can be one type of Point Of Interest (POI). (It is possible a pro-actively implementation of this requirement.) INITIALIZATION The client needs to be connected to a DTN-node with web cache of POIs for the area. The testing equipment should be up and running with all the necessary applications and scripts. GPS must be turned on for a minute or so to get a fixed position ASSUMPTIONS AND RESTRICTIONS When tests begin, the GPS receiver has already found its initial position INPUT GPS Position OUTPUT POI database updated TEST CASE PASS/FAIL CRITERIA Pass: POI database updated. Fail: POI database not updated SEND MESSAGE WITH OWN LOCATION GOAL Test the process of sending a message with one s own location to LI INITIALIZATION The client needs to be connected to a DTN-node. The testing equipment should be up and running with all the necessary applications and scripts. GPS must be turned on for a minute or so to get a fixed position.
35 N4C 30/04/2009 Page 35 of ASSUMPTIONS AND RESTRICTIONS When tests begin, the GPS receiver has already found its initial position INPUT GPS Position OUTPUT with GPS Position TEST CASE PASS/FAIL CRITERIA Pass: received at destination. Fail: No received at destination MAPS FOR OWN LOCATION GOAL Test the process of downloading maps of the area around one s own location INITIALIZATION The client needs to be connected to a DTN-node with web cache of maps for the area. The testing equipment should be up and running with all the necessary applications and scripts. GPS must be turned on for a minute or so to get a fixed position ASSUMPTIONS AND RESTRICTIONS When tests begin, the GPS receiver has already found its initial position INPUT GPS Position OUTPUT Map cache updated TEST CASE PASS/FAIL CRITERIA Pass: Map cache updated. Fail: Map cache not updated GEOBLOG AND PHOTOBLOG GOAL Test the automatic actualization of geoblog and photo blog when there is a connection opportunity.
36 N4C 30/04/2009 Page 36 of INITIALIZATION Client need to be connected to a DTN-node. The testing equipment should be up and running with all the necessary applications and scripts. GPS must be turned on for a minute or so to get a fixed position ASSUMPTIONS AND RESTRICTIONS When tests begin, the GPS receiver has already found its initial position INPUT GPS Position OUTPUT Blog with GPS Position or photo with GPS Position TEST CASE PASS/FAIL CRITERIA Pass: Blog with GPS Position, or photo with GPS Position received at destination. Fail: No blog with GPS Position, or no photo with GPS Position received at destination HERDER APPLICATION AND ANIMAL MIGRATION MONITORING GOAL Test the system of the herder application and animal migration monitoring, checking the quality and reliability of the connection between the equipment on animal and the receiver s station. This must be tested in two different ways: In a periodical time schedule, issued by the animal s equipment, and whenever the transmission is requested.
37 N4C 30/04/2009 Page 37 of MANAGEMENT AND CONFIGURATION CONTROLLER GOAL Test management applications for configuration, monitoring and analysis of the DTN user applications and infrastructure. It will be tested the operability and reliability of applications to: determine when DTN capability is available in a node; determine the modes of communication currently available (DTN bundle protocol, LTP transport, direct connection to LI, etc); open, manage and close communication channels using DTN protocols, providing appropriated control for both end user applications and proxy servers; send and receive messages over the DTN infrastructure; receive notifications when the modes of communication alter due to movement or reconfiguration of the node; control and use security mechanisms to allow authentication and encryption for messages; control and monitor the addressing of the node; control and monitor DTN routing mechanisms; control and monitor message (packet, bundle, etc) storage and forwarding. 7. CONCLUSIONS From the methodologies exposed in section 3.2, we came to the conclusion that the best suitable integration methodology is IPC, more concretely, the D-Bus integration platform, due to the reasons already explained in section 5, and also because this method is supported in the current most usual operating systems, like Windows, Linux and Apple S.O. X. Having this methodology in mind, next summer s integration tests can be performed according to the specifications made under sections , using the initial conditions and restrictions mentioned in chapter 6. These tests have, however, to be completely defined and designed in a near future, in order to be available and completely specified before the summer tests.
38 N4C 30/04/2009 Page 38 of REFERENCES [1] D-Bus Tutorial. (2009). Retrieved April 15, 2009, from [2] Inc., B. R. (2003). Requirements Based Testing. Retrieved April 15, 2009, from Requirements%20Based%20Testing%20Process%20Overview.pdf [3] Integration Test Plan. (s.d.). Retrieved April 15, 2009, from an.html [4] (2009). M7.1 N4C Subsystem Integration Model and Tests. [5] (2009). M7.2 N4C Preparation of Specification of the Integration Platform and Guidelines for Implementation. [6] Tsai, W.-T. (2003). Integration Testing. Retrieved April 15, 2009, from [7] Williams, L. (2006). Testing Overview and Black-Box Testing Techniques. Retrieved April 15, 2009, from
Software testing. Objectives
Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating
Chapter 11, Testing, Part 2: Integration and System Testing
Object-Oriented Software Engineering Using UML, Patterns, and Java Chapter 11, Testing, Part 2: Integration and System Testing Overview Integration testing Big bang Bottom up Top down Sandwich System testing
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Chapter 11: Integrationand System Testing
Object-Oriented Software Engineering Using UML, Patterns, and Java Chapter 11: Integrationand System Testing Integration Testing Strategy The entire system is viewed as a collection of subsystems (sets
Software Engineering I: Software Technology WS 2008/09. Integration Testing and System Testing
Software Engineering I: Software Technology WS 2008/09 Integration Testing and System Testing Bernd Bruegge Applied Software Engineering Technische Universitaet Muenchen 1 Overview Integration testing
Chapter 11: Integration- and System Testing
Chapter 11: Integration- and System Testing Chapter 14: Testing (2/2) Object-Oriented Software Construction Armin B. Cremers, Sascha Alda & Tobias Rho (based on Bruegge & Dutoit) Software Lifecycle Activities...and
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Module 10. Coding and Testing. Version 2 CSE IIT, Kharagpur
Module 10 Coding and Testing Lesson 26 Debugging, Integration and System Testing Specific Instructional Objectives At the end of this lesson the student would be able to: Explain why debugging is needed.
RCL: Design and Open Specification
ICT FP7-609828 RCL: Design and Open Specification D3.1.1 March 2014 _D3.1.1_RCLDesignAndOpenSpecification_v1.0 Document Information Scheduled delivery Actual delivery Version Responsible Partner 31.03.2014
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Resource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
Information Systems Development Process (Software Development Life Cycle)
Information Systems Development Process (Software Development Life Cycle) Phase 1 Feasibility Study Concerned with analyzing the benefits and solutions for the identified problem area Includes development
In this Lecture you will Learn: Implementation. Software Implementation Tools. Software Implementation Tools
In this Lecture you will Learn: Implementation Chapter 19 About tools used in software implementation How to draw component diagrams How to draw deployment diagrams The tasks involved in testing a system
Testing Intelligent Device Communications in a Distributed System
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) [email protected] United States Smart Grid systems
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE
SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE Duration 5 Days Course Outline Module 1: Designing IIS Web Farms The students will learn the process of designing IIS Web Farms with
Designing a Windows Server 2008 Applications Infrastructure
Designing a Windows Server 2008 Applications Infrastructure Course 6437A : Three days; Instructor-Led Introduction This three day course will prepare IT professionals for the role of Enterprise Administrator.
Chapter 8 Software Testing
Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is
RCL: Software Prototype
Business Continuity as a Service ICT FP7-609828 RCL: Software Prototype D3.2.1 June 2014 Document Information Scheduled delivery 30.06.2014 Actual delivery 30.06.2014 Version 1.0 Responsible Partner IBM
Levels of Software Testing. Functional Testing
Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines
Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines Michael J Jipping Department of Computer Science Hope College Holland, MI 49423 [email protected] Gary Lewandowski Department of Mathematics
SECTION 4 TESTING & QUALITY CONTROL
Page 1 SECTION 4 TESTING & QUALITY CONTROL TESTING METHODOLOGY & THE TESTING LIFECYCLE The stages of the Testing Life Cycle are: Requirements Analysis, Planning, Test Case Development, Test Environment
Transparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
Niagara IT Manager s Guide
3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
VoIP Conformance Labs
VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.
SiteAudit Knowledge Base Network Traffic March 2012 In This Article: SiteAudit s Traffic Impact How SiteAudit Discovery Works Why Traffic is Minimal How to Measure Traffic Minimal network traffic is the
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Classic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Course 6437A: Designing a Windows Server 2008 Applications Infrastructure
Course 6437A: Designing a Windows Server 2008 Applications Infrastructure Length: 3 Days Audience(s): IT Professionals Level: 400 Technology: Windows Server 2008 Type: Course Delivery Method: Instructor-led
Chapter 6 Essentials of Design and the Design Activities
Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 Essentials of Design and the Design Activities Chapter Overview There are two major themes in this chapter. The first major
Introducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
The proliferation of the raw processing
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
CHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
Smart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
Streamlining Patch Testing and Deployment
Streamlining Patch Testing and Deployment Using VMware GSX Server with LANDesk Management Suite to improve patch deployment speed and reliability Executive Summary As corporate IT departments work to keep
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Skynax. Mobility Management System. System Manual
Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
Presentation: 1.1 Introduction to Software Testing
Software Testing M1: Introduction to Software Testing 1.1 What is Software Testing? 1.2 Need for Software Testing 1.3 Testing Fundamentals M2: Introduction to Testing Techniques 2.1 Static Testing 2.2
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
POLAR IT SERVICES. Business Intelligence Project Methodology
POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
APPROACHES TO SOFTWARE TESTING PROGRAM VERIFICATION AND VALIDATION
1 APPROACHES TO SOFTWARE TESTING PROGRAM VERIFICATION AND VALIDATION Validation: Are we building the right product? Does program meet expectations of user? Verification: Are we building the product right?
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
HP ATA Networks certification
Certification guide HP ATA Networks certification Introduction In today s business environment, the lack of skills to execute IT technologies and cloud solutions is a roadblock for many companies trying
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
Chapter 17 Software Testing Strategies Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For
8. Master Test Plan (MTP)
8. Master Test Plan (MTP) The purpose of the Master Test Plan (MTP) is to provide an overall test planning and test management document for multiple levels of test (either within one project or across
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS Chapter
Managing Mobile Devices Over Cellular Data Networks
Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Copyright www.agileload.com 1
Copyright www.agileload.com 1 INTRODUCTION Performance testing is a complex activity where dozens of factors contribute to its success and effective usage of all those factors is necessary to get the accurate
Basic Testing Concepts and Terminology
T-76.5613 Software Testing and Quality Assurance Lecture 2, 13.9.2006 Basic Testing Concepts and Terminology Juha Itkonen SoberIT Contents Realities and principles of Testing terminology and basic concepts
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
AUTOMATED TESTING and SPI. Brian Lynch
AUTOMATED TESTING and SPI Brian Lynch 1 Introduction The following document explains the purpose and benefits for having an Automation Test Team, the strategy/approach taken by an Automation Test Team
Wireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems
WHITEPAPER Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems Abstract RTI Connext DDS (Data Distribution Service) is a powerful tool that lets you efficiently
A Web-Based Sensor Data Management System for Distributed Environmental Observation
A Web-Based Sensor Data Management System for Distributed Environmental Observation Takahiro Torii, Yusuke Yokota, and Eiji Okubo Index Terms Sensor Web, sensor network, distributed data management, query
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
Remote Network Accelerator
Remote Network Accelerator Evaluation Guide LapLink Software 10210 NE Points Drive Kirkland, WA 98033 Tel: (425) 952-6000 www.laplink.com LapLink Remote Network Accelerator Evaluation Guide Page 1 of 19
Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.
Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul [email protected] Overview Brief introduction to Body Sensor Networks BSN Hardware
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
SECTION 2 PROGRAMMING & DEVELOPMENT
Page 1 SECTION 2 PROGRAMMING & DEVELOPMENT DEVELOPMENT METHODOLOGY THE WATERFALL APPROACH The Waterfall model of software development is a top-down, sequential approach to the design, development, testing
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
