Software Testing For Wireless Mobile Computing _________________________________________________________________________ By Michael Paltayan.

Slides:



Advertisements
Similar presentations
Chapter 3: Introduction to Data Communications and Networking
Advertisements

Live migration of Virtual Machines Nour Stefan, SCPD.
How to Buy…. What do I want to buy? What do I want?… A desktop or a mobile computer (notebook or tablet) What is the purpose? Where am I going to use.
The recent technological advances in mobile communication, computing and geo-positioning technologies have made real-time transit vehicle information systems.
Chapter 1:Introduction to the world of computers
A Mobile Agent Architecture for Heterogeneous Devices Presented by: Chuong Hoang CS Software Architect and Design The University of Texas at Dallas.
M. Muztaba Fuad Masters in Computer Science Department of Computer Science Adelaide University Supervised By Dr. Michael J. Oudshoorn Associate Professor.
Introduction to the World of Computers
PC Anywhere By: Neil Meharu Jewel Libid Pete Ramirez Lynn Hy.
Chapter 1: Introduction
Interactive Visual System By Arthur Evans, John Sikorski, and Patricia Thomas.
1 Introduction to Networking Lesson 01 NETS2150/2850.
Parking Space Finder Lucia Wiguno Thursday, April
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
Sami S.Al-Wakeel 1 CHAPTER 1 INTRODUCTION. Sami S.Al-Wakeel 2 NETWORK Definition: A Group of interconnected nodes that exchange information and share.
D-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Hardware and Multimedia Chapter 4. 4 Personal Computers (PCs) PCs are computers that can be: Used by individuals at home, work, or school Desktop models.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
Ahmed Nabizadeh. A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication.
Basic Data Communication
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited by : Noor Al-Hareqi.
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Introduction to Computers
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
Unleashing Mobile Broadband WiPipe Central MANAGED SERVICES Secure, Manage, & Maintain the Edge of the 3G/4G Network.
Kris Horn Santhoshi Smitha Thota Uday Chandra Karrotthi.
2-3 note. 2 Peripheral Devices “Peripheral devices” are hardware plugged into ports or connected to a computer wirelessly. These devices can be for input,
Living in a Digital World Discovering Computers Fundamentals, 2010 Edition.
+ Defining “Quality” Software Catherine Dwyer Spring 2012.
Extended Learning Module D
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Network Monitoring Through Mobile (MOBTOP) Developed By : Akanksha Jain. (102199) Shikha Arora (101319) Team Name: Beans Course: CS532 Guided By:Prof.
1999 Final Year Projects Prof. Michael R. Lyu. Lyu9901: TravelNet Design a Web-based travel manager to reserve airplane tickets and hotel. A distributed.
BASIC CONCEPTS OF COMPUTING.  What is a computer? What is a computer?  An expanded model of a computer An expanded model of a computer  The role of.
4G-MOBILE COMMUNICATION D.MANOJ KUMAR III. B.Tech, E.C.E N.B.K.R.Institue of Science and technology P.PALLAVI II. B.Tech, E.C.E Kakatiya Institue of Technology.
1 Chapter 7 Operating System & Utility Programs.  consists of the programs that control or maintain the operations of the computer and its devices. It.
Network Monitoring Through Mobile (MOBTOP) Developed By : Akanksha Jain. (102199) Deepika Reddy (102210) Team Name: Beans Guided By: Prof. Robert Zhu SUBMITTED.
Will Worden Jackie Huynh Chris Shrives. What does it do? Use your cell phone as a remote control for a media control center Two sides – Computer Side.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Remote Monitoring Pratheeba Murugesan Tejo Harisha Brundavana.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Copyright©2008 N.AlJaffan®KSU1 Chapter 7 Operating System and Utility Programs.
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Multimedia and Computers Introduction to Computers.
Copyright©2008 N.AlJaffan®KSU1 Chapter 7 Operating System and Utility Programs.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
Networks & Communications Diambil dari : Module Application Training Institut Teknologi Bandung
Alex Leifheit NETWORKS. NETWORK A number of interconnected computers, machines, or operations. Key Components Network components, Network Architecture,
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Lecture 1: Network Operating Systems (NOS) An Introduction.
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
Sy Le CS 147.  Process of transferring information between computers virtually anywhere in the world.
1 Καστοριά Μάρτιος 13, 2009 Efficient Service Task Assignment in Grid Computing Environments Dr Angelos Michalas Technological Educational Institute of.
Network Monitoring Through Mobile (MOBTOP) Developed By : Akanksha Jain. (102199) Shikha Arora (101319) Team Name: Beans Course: CS532 Guided By:Prof.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Third International Workshop on Networked Appliance 2001 SONA: Applying Mobile Agent to Networked Appliance Control S.Aoki, S.Makino, T.Okoshi J.Nakazawa.
System Architecture & Hardware Configurations Dr. D. Bilal IS 582 Spring 2008.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Wifi Based Menu Ordering By Samiksha Patil Shalini Yethendran Anitta Eaphen.
Introduction Chapter 1. Introduction  A computer network is two or more computers connected together so they can communicate with one another.  Two.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Wireless Modes.
Chapter 1 – Part 1 Introduction.
Net 431: ADVANCED COMPUTER NETWORKS
Mobile Agents M. L. Liu.
WELCOME TO SEMINAR.
Presentation transcript:

Software Testing For Wireless Mobile Computing _________________________________________________________________________ By Michael Paltayan

Introduction 4GL wireless networks make it difficult to test applications for mobile technology. (PDAs, Notebooks, Phones, tablet PCs, etc) 4GL wireless networks make it difficult to test applications for mobile technology. (PDAs, Notebooks, Phones, tablet PCs, etc) This article presents new approach, called Flying Emulator for testing mobile applications in different subnets within a LAN or WAN This article presents new approach, called Flying Emulator for testing mobile applications in different subnets within a LAN or WAN Key idea is to automate testing of applications designed for WLAN with subnets or LANs Key idea is to automate testing of applications designed for WLAN with subnets or LANs Why I chose this Article? Why I chose this Article?

The Flying Emulator The key idea in this approach is to implement emulators as mobile agents that can travel from computer to computer under their own control. The key idea in this approach is to implement emulators as mobile agents that can travel from computer to computer under their own control. When an agent moves to another location, the agent transfers its state, as well as its code, to the destination. When an agent moves to another location, the agent transfers its state, as well as its code, to the destination. Carried software can continue its processing after arriving at the new host in the same way as it had been physically moved with target terminal. Carried software can continue its processing after arriving at the new host in the same way as it had been physically moved with target terminal.

The Flying Emulator This approach consists of three components: A mobile-agent-based emulator that provides the target software with internal execution environment, also carries the software to specific access point host on remote networks on behalf of the terminal. A mobile-agent-based emulator that provides the target software with internal execution environment, also carries the software to specific access point host on remote networks on behalf of the terminal. Access point hosts (APHs) that are allocated to each network and enable the software carried by the emulator to connect with various services. Access point hosts (APHs) that are allocated to each network and enable the software carried by the emulator to connect with various services. Remote Control Server (RCS) – which enables remotely displaying emulator’s GUI on the screen. Remote Control Server (RCS) – which enables remotely displaying emulator’s GUI on the screen.

Mobile Termianl Emulation Each mobile agent based emulator can carry and test software designed to run on its target terminal. Each mobile agent based emulator can carry and test software designed to run on its target terminal. The current implementation of the approach is built on JAVA and provides mobile-agent-based emulators. The current implementation of the approach is built on JAVA and provides mobile-agent-based emulators.

Emulation When emulator migrates between APHs, its target software is transformed into a bitstream along with states and codes then transformed to destination APH. When emulator migrates between APHs, its target software is transformed into a bitstream along with states and codes then transformed to destination APH. The Destination APH retrieves the software and emulator from the bitstream. The Destination APH retrieves the software and emulator from the bitstream. Developer can control the movement of the emulator interactively through the RCS. Developer can control the movement of the emulator interactively through the RCS.

Emulation When emulator migrates between APHs, its target software is transformed into a bitstream along with states and codes then transformed to destination APH. When emulator migrates between APHs, its target software is transformed into a bitstream along with states and codes then transformed to destination APH. The Destination APH retrieves the software and emulator from the bitstream. The Destination APH retrieves the software and emulator from the bitstream. Developer can control the movement of the emulator interactively through the RCS. Developer can control the movement of the emulator interactively through the RCS.

Software Testing And RCS Developers use RCS to manage APHs, monitoring their status and controlling execution of the code.

Conclusion This approach enables application-level software to be executed and tested through its current network as if the software were being moved and executed on that target device. This approach enables application-level software to be executed and tested through its current network as if the software were being moved and executed on that target device. Approach still has issues and needs further testing and implementation. Approach still has issues and needs further testing and implementation.

No Questions Right ?