Friday, 23 November 2012

What is protocol testing.

Q- What is Telecom Protocol Testing


Telecom testing or protocol testing is also comes under testing technology. Engineers can test any software in any domain with the knowledge of software testing except telecom domain. we can test applications in banking domain , insurance domain or retail domain with the knowledge of software testing. it all involving money transaction that all the human being can easily understand without any specialized training .protocol , sockets ,pockets are involving in telecom applications and need to have these knowledge to test telecom application. telecom testing training course is the combined study of protocol , networking concepts , ems/nms , perl and testing concepts.

Types Of Protocol Testing:

1. Protocol Conformance Testing
2. Performance Testing
3. Robustness(Security)  Testing
4. Interoperability Testing  

1. Protocol Conformance Testing

Protocol Conformance testing is the process of systematically selecting each requirement in a standards document and then testing to see if the device under test operates according to that requirement.  This is done by creating a series of single function tests for each requirement, resulting in thousands of tests. Usually these tests are automated so they can be run sequentially against the device under test.
An example of a conformance test would be to check if the “ping” command operates correctly. Ping should send an ICMP echo request to an operational host or router and the host or router should return an ICMP echo response. The “ping” command should also be sent to a non-existent or non-operational host or router, and then report back “ping: unknown host [hostname]”. The latter would be a negative conformance test.



Protocol conformance testing requires testing both the syntax and the semantics (functionality) of the device under test. The semantic tests tend to be more difficult to create as a practical matter. For example, testing that a router is maintaining an accurate count of all erroneous incoming packets of a certain type requires a mechanism for generating the erroneous packets, counting them, directing them to the router, assuring they were received by the router, and then reading the actual counter in the router.

Read More
Next Blog........
 

 

No comments:

Post a Comment