IJMECS Vol. 8, No. 7, 8 Jul. 2016
Cover page and Table of Contents: PDF (size: 335KB)
Full Text (PDF, 335KB), PP.53-60
Views: 0 Downloads: 0
Performance Testing, Distributed Applications Testing, Agent-based Testing, Random Testing
Testing is a crucial step in designing and implementing software in the distributed environment. Testing in the distributed applications is not only difficult, but also a costly method. This Research briefly discusses the performance testing in the distributed software environment along with different other testing techniques proposed in the literature that correspond to distributed applications. Additionally, we discuss the key testing challenges faced during the whole process of testing the distributed applications. Much of the focus of this paper is on intelligent agent-based testing. Agent based testing is provide better coordination mechanism between multiple testers and exert more controllability and observablility on fault detection. In this study we have critically analyzed testing methodologies being practiced in the distributed environment. We have studied the merits and limitations of these methodologies proposed in the contemporary literature and have identified the possible improvements in those methodologies to make them more robust.
Muhammad Fraz Malik, M. N. A. Khan, "An Analysis of Performance Testing in Distributed Software Applications", International Journal of Modern Education and Computer Science(IJMECS), Vol.8, No.7, pp.53-60, 2016. DOI:10.5815/ijmecs.2016.07.06
[1]E. Collins, G. Macedo, N. Maia., and A. Dias-Neto,” A Industrial Experience on the Application of Distributed Testing in an Agile Software Development Environment”, In Global Software Engineering (ICGSE) on IEEE Seventh International Conference, pp-190-194,2012.
[2]G.A Di Lucca, and A, R Fasolino,” Testing Web-based applications: The state of the art and future trends”on Information and Software Technology, vol 48, pp-1172-1186, 2006..
[3]T. Clune, M. Rilee, and D. Rouson, “Testing as an essential process for developing and maintaining scientific software”.on In The 2nd Workshop on Sustainable Software for Science: Practices and Experiences, 2014.
[4]M. Chu, C. Murphy, and G. Kaiser, “Distributed in vivo testing of software applications. In Software Testing Verification, and Validation”, on 1st International Conference on, pp. 509-512, 2008
[5]B. Li, M. Grechanik, and D. Poshyvanyk, “Sanitizing and minimizing databases for software application test outsourcing. In Software Testing, Verification and Validation (ICST)” on IEEE Seventh International Conference on, pp. 233-242,2014.
[6]N. Sivakumar, and k. Vivekanandan, “Agent Oriented Software Testing–Role Oriented approach” on International Journal of Advanced Computer Science and Applications, vol 3, 2012
[7]E. Uzuncoava, S.khurshid,, and D. Batory, “Incremental test generation for software product lines” on Software Engineering, IEEE Transactions, vol 36, pp. 309-322,2010. [8] Lv, J., Hu, H., Cai, K. Y., & Chen, T. Y. (2014). Adaptive and Random Partition Software Testing.
[8]J. Lv, H. Hu, K. Y. Cai, and T. Y Chen,” Adaptive and Random Partition Software Testing”,2014.
[9]T. Chen, F., Kuo, H., Liu and E. Wong,” Code coverage of adaptive random testing”, on IEEE Transactions on Reliability, vol 62, pp. 226-237.2013.
[10]F.E, Eassa., L.J Osterweil, M. A, Fadel, S. Sandokji and A Ezz,” DTTAS: A Dynamic Testing Tool for Agent-based Systems”on Pensee Journal, vol 76. 2014
[11]E. Serrano., A. Munoz,. And J. Botia.” An approach to debug interactions in multi-agent system software tests.” On Information Sciences,vol 205, pp. 38-57,2012
[12]D. Hao, Y., Chen., F. Tang, and F. Qi. “Distributed agent-based performance testing framework on Web Services” In Software Engineering and Service Sciences (ICSESS) on International Conference on, pp. 90-94, 2010.
[13]S. Azzounzi., M., Benattou, and M.E.H Charaf,” A temporal agent based approach for testing open distributed systems.” on Computer Standards & Interfaces, vol 40, pp. 23-33.2015.
[14]R. Loffler, B. Guldali, & S. Geisen, (2010). Towards Model-based Acceptance Testing for Scrum. Software technik-Trends, GI.
[15]S. Iqbal, M. Khalid, M. N. A. Khan, “A Distinctive Suite of Performance Metrics for Software Design”, International Journal of Software Engineering & Its Applications, vol. 7, no. 5, (2013).
[16]S. Iqbal and M. N. A. Khan, “Yet another Set of Requirement Metrics for Software Projects”, International Journal of Software Engineering & Its Applications, vol. 6, no. 1, (2012).
[17]M. Faizan, S. Ulhaq, M. N. A. Khan, “Defect Prevention and Process Improvement Methodology for Outsourced Software Projects”, Middle-East Journal of Scientific Research, vol. 19, no. 5, (2014), pp. 674-682.
[18]M. Faizan, M. N.A. Khan, S. Ulhaq, “Contemporary Trends in Defect Prevention”, A Survey Report. International Journal of Modern Education & Computer Science, vol. 4, no. 3, (2012).
[19]K. Khan, A. Khan, M. Aamir and M. N. A. Khan, “Quality Assurance Assessment in Global Software Development” World Applied Sciences Journal, vol. 24, no. 11, (2013).
[20]M. Amir, K. Khan, A. Khan, M. N. A. Khan, “An Appraisal of Agile Software Development Process”, International Journal of Advanced Science & Technology, vol. 58, (2013).
[21]M. Khan and M. N. A. Khan, “Exploring Query Optimization Techniques in Relational Databases”, International Journal of Database Theory & Application, vol. 6, no. 3, (2013).
[22]M. N. A. Khan, M. Khalid and S. UlHaq, “Review of Requirements Management Issues in Software Development”, International Journal of Modern Education & Computer Science, vol. 5, no. (1), (2013).
[23]M. Umar and M. N. A. Khan, “A Framework to Separate NonFunctional Requirements for System Maintainability”, Kuwait Journal of Science & Engineering, vol. 39, no. 1 B, (2012), pp. 211- 231.
[24]M. Umar and M. N. A. Khan, Analyzing Non-Functional Requirements (NFRs) for software development. In IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), (2011), pp. 675-678).
[25]M. N. A. Khan, C. R. Chatwin and R. C. Young, “A framework for post-event timeline reconstruction using neural networks”, digital investigation, vol. 4, no. 3, (2007), pp. 146-157.
[26]M. N. A. Khan, C. R. Chatwin and R. C. Young, “Extracting Evidence from File system Activity using Bayesian Networks”, International journal of Forensic computer science, vol. 1, (2007), pp. 50-63.
[27]M. N. A. Khan, “Performance analysis of Bayesian networks and neural networks in classification of file system activities”, Computers & Security, vol. 31, no. 4, (2012), pp. 391-401.
[28]M. Rafique and M. N. A. Khan, “Exploring Static and Live Digital Forensics: Methods, Practices and Tools”, International Journal of Scientific & Engineering Research, vol. 4, no. 10, (2013), pp. 1048-1056.
[29]M. S. Bashir and M. N. A. Khan, “Triage in Live Digital Forensic Analysis”, International journal of Forensic Computer Science, vol. 1, (2013), pp. 35-44.
[30]A. Sarwar and M. N. A. Khan, “A Review of Trust Aspects in Cloud Computing Security”, International Journal of Cloud Computing and Services Science (IJCLOSER), vol. 2, no. 2, (2013), pp. 116-122.
[31]A. H. Gondal and M. N. A. Khan, “A review of fully automated techniques for brain tumor detection from MR images”, International Journal of Modern Education and Computer Science (IJMECS), vol. 5, no. 2, (2013), pp. 55.
[32]A. Zia and M. N. A. Khan, “Identifying key challenges in performance issues in cloud computing”, International Journal of Modern Education and Computer Science (IJMECS), vol. 4, no. 10, (2012), pp. 59.
[33]K. U. Rehman and M. N. A. Khan, “The Foremost Guidelines for Achieving Higher Ranking in Search Results through Search Engine Optimization”, International Journal of Advanced Science and Technology, vol. 52, (2013), pp. 101-110.
[34]M. Khan and M. N. A. Khan, “Exploring query optimization techniques in relational databases”, International Journal of Database Theory & Application, vol. 6, no. 3, (2013).
[35]R. Shehzad, M. N. KHAN and M. Naeem, “Integrating knowledge management with business intelligence processes for enhanced organizational learning”, International Journal of Software Engineering and Its Applications, vol. 7, no. 2, (2013), pp. 83-91.
[36]S. U. Haq, M. Raza, A. Zia and M. N. A. Khan, “Issues in global software development: A critical review”, Journal of Software Engineering and Applications, 4(10), 590, 2015.
[37]A. S. Shah, M. N. A. Khan and A. Shah. An appraisal of off-line signature verification techniques. International Journal of Modern Education and Computer Science, 7(4), 67-75, 2015.
[38]A. Zia and M. N. A. Khan, “A Scheme to Reduce Response Time in Cloud Computing Environment”, International Journal of Modern Education and Computer Science (IJMECS), vol. 5, no. 6, (2013), pp. 56.
[39]M. Tariq and M. N. A. Khan, “The Context of Global Software Development: Challenges, Best Practices and Benefits”, Information Management & Business Review, vol. 3, no. 4, (2011).
[40]A. Shahzad, M. Hussain and M. N. A. Khan, “Protecting from Zero-Day Malware Attacks”, Middle-East Journal of Scientific Research, vol. 17, no. 4, (2013), pp. 455-464.
[41]A. A. Khan and M. Khan, “Internet content regulation framework”, International Journal of U-& EService, Science & Technology, vol. 4, no. 3, (2011).
[42]K. Ullah and M. N. A. Khan, “Security and Privacy Issues in Cloud Computing Environment: A Survey Paper”, International Journal of Grid and Distributed Computing, vol. 7, no. 2, (2014), pp. 89-98.
[43]A. A. Abbasi, M. N. A. Khan and S. A. Khan, “A Critical Survey of Iris Based Recognition Systems”, Middle-East Journal of Scientific Research, vol. 15, no. 5, (2013), pp. 663- 668.
[44]M. N. A. Khan, S. A. Qureshi and N. Riaz, “Gender classification with decision trees”, Int. J. Signal Process. Image Process. Patt. Recog, vol. 6, (2013), pp. 165-176.
[45]S. S. Ali and M. N. A. Khan, “ICT Infrastructure Framework for Microfinance Institutions and Banks in Pakistan: An Optimized Approach”, International Journal of Online Marketing (IJOM), vol. 3, no. 2, (2013), pp. 75-86.
[46]A. Mahmood, M. Ibrahim and M. N. A. Khan, “Service Composition in the Context of Service Oriented Architecture”, Middle East Journal of Scientific Research, vol. 15, no. 11, (2013).
[47]M. A. Masood and M. N. A. Khan, “Clustering Techniques in Bioinformatics”, I. J. Modern Education and Computer Science, vol. 1, (2015), pp. 38-46.
[48]Ur Rehman, T., Khan, M. N. A., & Riaz, N. (2013). Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies. International Journal of Information Technology and Computer Science (IJITCS), 5(3), 40.
[49]Ahmed, R., & Khan, M. N. A. (2013). An Analytical Review of Stereovision Techniques to Reconstruct 3D Coordinates. International Journal of Information Technology and Computer Science (IJITCS), 5(7), 80.