Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: NETWORK DISCOVERY
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
NETWORK DISCOVERY
[attachment=29353]
Abstract
An application to scan the current network and identify the network elements that support SNMP and provide the list of the nodes in a tree manner. It builds the SNMP nodes in the given sub-network.
In the telecommunications network environment, network management is to manage the individual network elements behavior.
Testing
Software testing is more than just error detection.
Testing software is operating the software under controlled conditions, to
verify that it behaves “as specified”;
to detect errors, and
to validate that what has been specified is what the user actually wanted.
Verification is the checking or testing of items, including software, for conformance and consistency by evaluating the results against pre-specified requirements.
Error Detection Testing should intentionally attempt to make things go wrong to determine if things happen when they shouldn’t or things don’t happen when they should.
Validation looks at the system correctness – i.e. is the process of checking that what has been specified is what the user actually wanted. 
UNIT TESTING
Testing of individual software components or modules. Typically done by the programmer and not by testers, as it requires detailed knowledge of the internal program design and code. may require developing test driver modules or test harnesses.
It affords several benefits:
Facilitates change
Simplifies integration
Find problems early
Documentation
Design
BLACKBOX TESTING
Black-box testing is a method of software testing that tests the functionality of an application as opposed to its internal structures or workings
Specific knowledge of the application's code/internal structure and programming knowledge in general is not required.
Functional testing is a type of black box testing that bases its test cases on the specifications of the software component under test.
Functions are tested by feeding them input and examining the output, and internal program structure
Functional testing typically involves five steps:
The identification of functions that the software is expected to perform
The creation of input data based on the function's specifications
The execution of the test case
The comparison of actual and expected outputs
Test cases
“A test case has components that describes an input, action or event and an expected response, to determine if a feature of an application is working correctly.” 
The basic objective of writing test cases is to validate the testing coverage of the application. 
DESCEPTION STEP NAME EXCPECTED OUTPUT RESULT
validating Statistic window
go to View ,click on statistics
RT-network discovery ,statistics window should be opened
pass
Software Process Model
A software process model is a simplified description of a software process which is presented from a particular perspective.
Software process model is an abstraction of the actual process which is being described.
Process models may include activities which are part of the software process, software products and the roles of people involved in software engineering.
Spiral model
The aim of customer communication is to establish effective communication between developer and customer.
The planning objectives are to define resources, project alternatives, time lines and other project related information.
The purpose of the risk analysis phase is to assess both technical and management risks.
The engineering task is to build one or more representations of the application.
The construction and release task – to construct, test, install and provide user support (e.g., documentation and training).
The customer evaluation task - to obtain customer feedback based on the evaluation of the software representation created during the engineering stage and implemented during the install stage.
Advantages
High amount of risk analysis
Good for large and mission-critical projects.
Software is produced early in the software life cycle.
Disadvantages
Can be a costly model to use.
Risk analysis requires highly specific expertise.
Project's success is highly dependent on the risk analysis phase.
Doesn't work well for smaller projects.
Reports
Scan the current network.
Identify the network elements.
Store the new elements details into the database.
Stored elements are displayed in GUI.
It performs the scan by making SNMP ping requests to all the network elements, whichever the network element responds to these ping requests, that network element will be added to the management application. All the discovered network elements will be shown in a tree manner in GUI, allowing the operator to traverse easily.