Friday, August 9, 2013
What are applications of flooding algorithm?
Posted by
Sunflower
at
8/09/2013 03:07:00 PM
0
comments
Labels: Address, Algorithms, Applications, Data, files, Flood, Flooding Algorithm, Graph, Hosts, Links, Messages, Nodes, Packets, Parameters, Receiver, Route, Routing, Schema, Similarity Algorithm, Transmitter
![]() | Subscribe by Email |
|
Thursday, August 8, 2013
Flooding - a kind of static algorithm
- Systems that require bridging, systems
like use net.
- Peer to peer file
sharing.
- Used as a part of the
routing protocols such as the DVMRP, OSPF etc.
- Used in protocols used for
the adhoc wireless networks.
- Each node in the network
might act as both receiver and the transmitter.
- The incoming message is
forwarded by the receiving node to each of its neighboring nodes except
the one which is the source code.
Advantages and Disadvantages of Flooding Algorithm
- If it is possible for
delivering the packet, it will be delivered but a number of times.
- In flooding algorithm every
path in the network is naturally utilized and so the shortest path is also
used.
- The implementation of the
flooding algorithm is quite simple.
- The cost of the flooding
algorithm can be very high because a lot of bandwidth is wasted. Even if
there is one destination of the message, it will be sent to all the hosts
on the network unnecessarily. If in case there occurs a denial of service
attack or a ping flood, the reliability of the whole network will be
affected badly.
- In the computer network, the
message might get duplicated. This in turn can increase the load on the bandwidth
of the network. This will call for increasing the complexity of the
processing for rejecting the duplicates of the messages.
- The packets that are
duplicate might keep on circulating forever, if the following precautions
are not taken:
Posted by
Sunflower
at
8/08/2013 11:33:00 PM
0
comments
Labels: Advantages, Algorithms, Application, Code, Design, Destination, Disadvantages, Flooding Algorithm, Graph, Links, Message, Messages, Network, Packets, Routers, Routing, Source, Static, System
![]() | Subscribe by Email |
|
Tuesday, May 15, 2012
How does a definition use association play a role in data flow testing?
About Data Flow Testing
- Defined,
created, initialized (d)
- Killed,
undefined, released (k)
- Used (u): in calculations (c)
- In predicates (p)
About Definition Use Associations
- X is
the variable
- D is
the node consisting of a definition of variable x
- U is
either a predicate node or a statement depending up on the case and
consists of a use of x.
- (x, 3,
4)
- (x, 1,
4)
- (y, 2,
(4, t))
- (z, 2,
(3, t)) etc.
- All
uses (AU)
- All DU
paths (ADUP) and many more.
Posted by
Sunflower
at
5/15/2012 03:55:00 PM
0
comments
Labels: Anomaly, Control flow Graph, Data, Data Flow Testing, Definition Use Association, DU, DU segment, Dynamic, Graph, Nodes, Path testing, Routines, Software testing, Statements, Static, Strategy, Tools, Types, Variables
![]() | Subscribe by Email |
|
Wednesday, March 21, 2012
Cause-Effect Graphing is a black box testing - Explain?
So many testing techniques have been categorized under the black box testing and the cause effect graphing is one of them and that is what the whole article is all about.
- A directed graph created for the purpose of mapping of the set of causes to a set of effects is nothing but a cause effect graph.
- The causes mapped in the graph are merely the input to a software system or application and the effects can be thought of as the corresponding outputs.
- The right of the cause effect graph houses all the effects with their corresponding nodes and the left side shelters all the causes and along with their corresponding nodes.
- A graph representing causes and effects in such a way is said to be a typical cause effect graph.
- It may also make use of certain intermediate nodes for the representation of the relation between the input and the output using the logical operators like AND, OR etc.
- The constraints can be effectively added to the effects and causes in the graph and these represented as the labelled edges using a dashed line along with the symbol of the constraint.
Constraint Symbols for the Causes:
1. E – exclusive
2. OaOO – one and only one
3. I – at least one
- The first constraint is used to state that at any instant any two causes (say cause 1 and cause 2) cannot be true simultaneously.
- The second constraint i.e., the inclusive constraint is used to state that at least one of the two or more numbers of causes must be true.
- The third constraint “one and only one” is used to state that the only one among all the constraints can be true.
Constraints for the Effects
1. R – requires
2. M – mask
- These are the only two valid constraints for the effects.
- The first one states that if one of the causes is true, then it implies that the other one also must be true and it also states that only one of the two constraints can be true and other can be false.
- The second constraint i.e., the mask constraint states just the opposite of the first constraint i.e., if one of the effects is true, then the other must be false.
"One point to be noted here is that the mask constraint only relates to the effects rather than relating to the causes like other constraints."
The direction of the graph is represented as shown below:
Causes -> Intermediate nodes -> Effects
Normal Forms of Cause Effect Graph
The cause effect graph is always rearranged in such a way that at any point between any input and output there lays only one node. Two normal forms of the cause effect graph have been identified:
- Conjunctive normal form
- Disjunctive normal form
When is Cause Effect Graphing performed?
One of the main purposes of the cause effect graph is the generation of the reduced decision table. The cause effect graphing is performed after the following tasks have been completed:
1. All the requirements have been reviewed to check out for any ambiguity.
2. All the requirements have been reviewed for their content.
3. It has been ensured that the requirements are complete and correct.
Cause effect graphing is basically used for hardware testing, but now it has been adopted for the use in the software testing.
It takes in to consideration only the desired external behaviour of the system and therefore it has been categorized as a black box testing technique and only selects the test cases that represent a logical relation between the causes and effects for the production of the test cases.
Posted by
Sunflower
at
3/21/2012 11:09:00 AM
0
comments
Labels: Black box testing, Cause Effect Graphing, Causes, Conjunctive, Constraints, Disjunctive, Effects, Forms, Graph, Input, Logical, Nodes, Output, Perform, Purpose, Recovery Techniques, Requirements
![]() | Subscribe by Email |
|
Saturday, August 7, 2010
Methods of black box testing - Graph based testing methods and Equivalence Partitioning
Black Box Testing is testing without knowledge of the internal workings of the item being tested. There are four black box testing methods:
Graph-based Testing Methods
Basic idea: A "cause" is an input condition, and an "effect" is a specific sequence of computations to be performed. A cause-effect graph is basically a directed graph that describes the logical combinations of causes and their relationship to the effects to be produced.
- Black-box methods based on the nature of the relationships (links) among the program objects (nodes), test cases are designed to traverse the entire graph.
- A graph is created between the objects and the relationships.
- From the graph, each object relationship is identified and test cases written accordingly to discover the errors.
Equivalence Partitioning
This method divides the input domain of a program into classes of data from which test cases can be derived. It reduces the number of test cases. The guidelines of Equivalence Partitioning are :
- If an input condition specifies a range, one valid and two invalid equivalence classes are defined.
- If an input condition requires a specific value, then one valid and two invalid equivalence classes are defined.
- If an input condition specifies a member of a set, then one valid and one invalid equivalence class are defined.
- If an input condition is boolean, then one valid and one invalid equivalence class are defined.
Posted by
Sunflower
at
8/07/2010 08:49:00 PM
0
comments
Labels: Black box testing, Classes, Domain, Equivalence Partitioning, Graph, Graph based testing, Input, Methods, Objects, Output, Range, Relationships, Software testing, Test cases
![]() | Subscribe by Email |
|