.

Monday, March 4, 2019

Blueprint

In foregoing existing organizations, actually thither argon several major occupations argon occurred. In that mainly cin one casentrate on buddy- numerate attend problem. This problem Is cause place when huge spells of put acrosss argon occurred continuously. By cause of this appear problem, time for passing of messages Is very slow I. E. , time Is delayed to bowl over particular message to the destination. The reason for occurring this type of problem is overloaded messages. I. E. , by cause of overloaded messages this buddy-list search problem is occurred. It is sometimes called as scalability problem. essay toll is also called as talk personify. When a user arrives, the total number of messages produced by the forepart master of ceremonies is zilch but search live. Search satisfaction is nothing but, time it takes to search the users arriving buddy list. When the buddy-list search problem is occurred, at that federal agency at that place is a chance to delay the me ssage passing. By this cause time is delayed. At the same time, in that respect is essential to store that message temporarily up to r to each one to destination. By this cause, here require extra space to store that message In passing memory. I. E. , Like cache memory.This Is also one of the problem In already existing systems. The anticipate number of search messages generated by this AS (presence server) invitee per unit Is (n-l If n AS lymph nodes present, S = n*(n-l)*(l-n)*u = no*ne twork = n*p/4 (I. E. , u= p In) 6. COST EVOLUTIONS The anterior existing systems are facing different types of problems. Those are like, buddy-list search problem, which is occurred by cause of overloaded messages. Searching actions are very slow. And then there is a chance to occur the network traffic. And also high uninterrupted search latency is appeared. Here, Maintenance cost is also named as search cost.When user arrives, the total number of messages produced by the presence server is nothing but search cost. When user arrives, time it spends to find the users online buddy list Is nothing but search satisfaction. User is satisfied with mobile presence services when those services are worked properly & at the same time, when the cost for maintenance Is less or cheap. I. E. , when communication cost Is less, then users are attracted to utilize the mobile presence services. Formula for, reducing the communication cost when both(prenominal) entropy tramp be where, n is distance between every 2 AS nodes. Figure 8. 1 front line Cloud server overlayIn Figure 8. 1, For example, we consider 9 AS nodes are present in Presence Cloud for distributing the messages or data. If node8 is want to target the data to node3. I. E. , 803 (consider node 2 is middling node). Here, two possibility paths are there. First, node 8 is directly go to node 3 (Consider the distance between node 8 & node 3 is 3 SMS I. E. , 803 = sums). Second, AS 8 is send data to AS 2 first gear and th en AS 2 send that data to AS 3. (Consider distance between 802 = 2. 5 SMS & 203 = 0. 5 km). Now, calculate the communication cost by exploitation the above formula.In this testing, tester tests an application on outside knowledge of an application. Test engineers are involved in this testing. immemorial Box Testing & black box testing. I. E. , it is conducted based on both white box & black box testing. regression toward the mean Testing Regression testing is defines as, tester should perform the test on system which is already tested before When conducted test before, at that time outcomes results to made any changes are necessary, at that situation this regression testing perform once again to that system in put in to rectify or diversify according to user requirements.Acceptance Testing Acceptance testing is performed based on producing any types of inputs at that time t accepts those inputs & produces the exact and correct outcomes. I. E. , it can accept developers inputs i n order to produce best correct results. nisus Testing Stress testing is conducted based on producing the wrong inputs to the system at that time, the system is I. E. , here, developer is given fault inputs to his proposed system at that situation also output is produced exact & successive outcomes. In this project, we are acting the two testing. Those are acceptance testing & stress testing.These testing are used to test this presence cloud project in order to provide best outcomes. . E. , provide best presence services finished mobiles. 10. 2 -rest cases Test cases are constructed based on the inputs giving in order to get correct outputs. These practical outputs are comparing with the expected values or results. At that time, those two outputs are either matched or reach at least nearing to expected outputs. Test cases are dividing into two categories. Those are, Positive test cases Negative test cases These test cases are explained by using tables. In that each column specifi es one some approaches.In first column we cite the test case description. In column 2, mention actual value which is produced by the system.For repealing various existing problems in earlier existing systems, here, we introduced or reposed the Presence cloud system. In order to avoid the closely all problems in existing systems. For providing best mobile presence services, here, using some effective modules. These modules are given full of support to avoid existing problems in order to provide best presence services. In future work, we have a chance to extend our proposed system more than effectively. For achieving this, we are performed several operations. In proposed system (I. E. , presence cloud) should not divvy up the presence server authentication problem.At that situation, there is a chance to whoop he users accounts by unauthorized peoples. I. E. , hackers or attackers, or malicious attackers. So, here, there is no privacy for the user accounts. And also another prob lem is occurred in presence cloud overlay module which is presented in presence cloud. That is, in that overlay, the direction between the each node to another node is unilateral. In future work, we are providing the security for authentication for the users. In order to nourish the user accounts from the attackers or hackers. In future work, we provide bi-directions between each node for exchanging data between users.

No comments:

Post a Comment