Wednesday, August 28, 2013
What are different policies to prevent congestion at different layers?
Posted by
Sunflower
at
8/28/2013 10:09:00 PM
0
comments
Labels: Avoidance, Capacity, Congestion, Congestion control, Control, Efficiency, Layers, Network, Networking, Operation, Parameters, Path, Policies, Prevent, Prevention, Resources, Throughput, traffic, User
![]() | Subscribe by Email |
|
Wednesday, August 7, 2013
Difference between adaptive and non - adaptive algorithms?
- Non – adaptive algorithms
and
- Adaptive algorithms
- Shortest path routing: This algorithm makes
use of the Dijkstra’s algorithm for computing the shortest path where
nodes and communication links are represented by vertices and edges of the
graph respectively.
- Flooding: Here, the arriving data packet is
transmitted on all the outgoing lines save the one on which it arrived. Its
selective flooding variation is commonly used.
- Flow based routing: This algorithm takes in to
consideration the present flow of the network before deciding on which
line the packet must be transmitted.
- Distance vector routing: It requires knowledge
about the whole network and is associated with the count to infinity problem.
- Link state routing: It requires knowledge about
neighborhood.
- Hierarchical routing: It is used for very large
networks.
- Optimized link state routing: It is used for mobile
hosts.
Posted by
Sunflower
at
8/07/2013 11:30:00 PM
0
comments
Labels: Adaptive, Algorithms, Datagram, Destination, Information, Input, Layers, Links, Network, Networking, Nodes, Non-adaptive, Path, Process, Protocols, Route, Routing, Source, System
![]() | Subscribe by Email |
|
Thursday, July 18, 2013
What is a routing algorithm in network layer?
- Administrative
distance: This basis is valid when different routing protocols are being
used. It prefers a lower distance.
- Metric: This basis is valid when only one routing protocol is being used
throughout the networks. It prefers a low cost route.
- Prefix-length: This basis does not depends on whether the same protocol is being used or there are many different protocols involved. It prefers the longer subnet masks.
Posted by
Sunflower
at
7/18/2013 08:46:00 PM
0
comments
Labels: Address, Algorithms, Data, Destination, Forwarding, Information, Input, Memory, Messages, Network, Networking, Nodes, Operation, Packets, Path, Process, Records, Route, Routing, Source
![]() | Subscribe by Email |
|
Saturday, June 23, 2012
What are limitations of smoke testing?
About Smoke Testing
Limitations of Smoke Testing
- Biggest limitation of the
smoke testing is that its field of application and usefulness is quite
narrow.
- Smoke testing can only be
used when the time frame is small during the introduction of a new
functionality or feature in to the software system or application.
- Though being wide, a smoke
test is very shallow.
- Smoke testing does not take into consideration the fine details of the software system or application.
- Smoke tests cannot be
substituted for actual functional tests.
- Smoke testing is a kind of
black box testing and does not consider the internals of the software
system or application.
- In smoke testing the tester
cannot access the source code.
- In smoke testing the tester
has to interact with the system via an interface by giving a variety of
inputs and then examining the obtained outputs.
- Another limitation is that
the path coverage provided by the smoke tests is very limited since all
the given inputs have to be checked.
- Smoke tests cannot keep a
control on targeting the paths and code segments that might be more error
prone than the other segments.
- Smoke test are a bit
difficult to design since they should be designed in such a way that they
touch every part of the application software.
- Usually the smoke testing can
be applied only when some new components are incorporated in to the
existing software system or application.
Posted by
Sunflower
at
6/23/2012 01:00:00 PM
0
comments
Labels: Advantages, Application, Change, Code, Coverage, Design, Functionality, Interface, Internals, Limitations, Narrow, Path, Smoke Testing, Smoke tests, Software System, Software testing, System, Test cases, Testers, Tests
![]() | Subscribe by Email |
|
Friday, June 22, 2012
How is optimization of smoke testing done?
- The path was compiled with
too much of optimization and
- The data directory is not
pointed out properly by the path.
Steps for Optimization of Smoke tests
- Compiler bugs and errors or
- The path has not been set
properly.
Compiler Bugs and Errors
If path is not set properly
When does a system or an application crash?
How to optimize smoke tests?
Posted by
Sunflower
at
6/22/2012 05:00:00 AM
0
comments
Labels: Application, Bugs, Code, Compiler, Crash, Data, Errors, Execute, Methodology, optimization, Optimizing, Path, Re-compile, Smoke Testing, Smoke tests, Software Systems, Steps, Test cases, Testers, Tests
![]() | Subscribe by Email |
|