Software Testing
Software Testing
Ajitha Kruthiventy, Amrish Shah, Ashna Datye, Bharathy J, Deepa M G, James M, Jayapradeep
J, Jeffin Jacob M, Kapil Mohan Sharma, Leena Warrier, Mahesh, Michael Frank, Muhammad
Kashif Jamil Narendra N, Naveed M, Phaneendra Y, Prathima N, Ravi Kiran N, Rajeev D, Sarah
Salahuddin, Siva Prasad B, Shalini R, Shilpa D, Subramanian D Ramprasad, Sunitha C N, Sunil
Kumar M K, Usha Padmini K, Winston George and Harinath P V
Copyright (c) SofTReL 2004. Permission is granted to copy, distribute and/or modify this
document under the terms of the GNU Free Documentation License, Version 1.2 or any
later version published by the Free Software Foundation; with no Invariant Sections, no
Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the
section entitled "GNU Free Documentation License".
Revision History
Ver. No.
0.1
Date
06-Apr-04
Description
Initial document creation
Author
Harinath, on behalf
0.2
01-May-04
of STGB Team.
Harinath, on behalf
0.3
03-July-04
Draft Release
of STGB Team.
Harinath, on behalf
of STGB Team
http://www.SofTReL.org
2 of 142
Table of Contents
Forward.........................................................................................................6
About SofTReL...............................................................................................7
Purpose of this Document.............................................................................7
Authors.........................................................................................................8
Intended Audience.........................................................................................9
How to use this Document.............................................................................9
What this Guide Book is not..........................................................................9
How to Contribute.........................................................................................9
Future Enhancements...................................................................................9
Copyrights.....................................................................................................9
3.1
3.2
3.3
3.4
9.1 Review...................................................................................................30
9.2 Walkthrough..........................................................................................33
http://www.SofTReL.org
3 of 142
9.3 Inspection..............................................................................................35
10. Testing Types and Techniques......................................................................36
Alpha Testing.......................................................................................71
User Acceptance Testing......................................................................72
Installation Testing..............................................................................72
Beta Testing .......................................................................................73
4 of 142
http://www.SofTReL.org
5 of 142
http://www.SofTReL.org
6 of 142
About SofTReL
The Software Testing Research Lab (SofTReL) is a non-profit organization dedicated for
Research and Advancements of Software Testing.
The concept of having a common place for Software Testing Research was formulated in
2001. Initially we named it Software Quality and Engineering. Recently in March 2004,
we renamed it to Software Testing Research Lab SofTReL.
Professionals who are currently working with the industry and possess rich experience
in testing form the members of the Lab.
Visit http://www.softrel.org for more information.
http://www.SofTReL.org
7 of 142
Authors
The guide book has been authored by professionals who Test everyday.
Ajitha Kruthiventy - GrayLogic Corporation, New Jersey, USA
Amrish Shah - MAQSoftware, Mumbai
Ashna Datye - RS Tech Inc, Canada
Bharathy Jayaraman - Ivesia Solutions (I) Pvt Limited, Chennai
Deepa M G - Ocwen Technology Xchange, Bangalore
James M - CSS, Chennai
Jayapradeep Jiothis - Satyam Computer Services, Hyderabad
Jeffin Jacob Mathew - ICFAI Business School, Hyderabad
Kapil Mohan Sharma - Pixtel Communitations, New Delhi
Leena Warrier Wipro Technologies, Bangalore
Mahesh, iPointSoft, Hyderabad
Michael Frank - USA
Muhammad Kashif Jamil, Avanza Solutions, Karachi, Pakistan
Narendra Nagaram Satyam Computer Services, Hyderabad
Naveed Mohammad vMoksha, Bangalore
Phaneendra Y - Wipro Technologies, Bangalore
Prathima Nagaprakash Wipro Technologies, Bangalore
Ravi Kiran N - Andale, Bangalore
Rajeev Daithankar - Persistent Systems Pvt. Ltd., Pune
Sarah Salahuddin - Arc Solutions, Pakistan
Siva Prasad Badimi - Danlaw Technologies, Hyderabad
Shalini Ravikumar - USA
Shilpa Dodla - Decatrend Technologies, Chennai
Subramanian Dattaramprasad - MindTeck, Bangalore
Sunitha C N - Infosys Technologies, Mysore
Sunil Kumar M K Yahoo! India, Bangalore
Usha Padmini Kandala - Virtusa Corp, Massachusetts
Winston George VbiZap Soft Solutions (P) Ltd., Chennai
Harinath SofTReL, Bangalore
http://www.SofTReL.org
8 of 142
Intended Audience
This guide book is aimed at all Testing Professionals from a beginner to an advanced
user. This book would provide a baseline understanding of the conceptual theory.
How to Contribute
This is an open source project. If you are interested in contributing to the book or to the
Lab, please do write in to stgb at SoFTReL dot org. We need your expertise in the
research activities.
Future Enhancements
This is the first part of the three-part Software Testing Guide Book (STGB) series. You
can visit http://www.softrel.org/stgb.html for updates on the Project.
Copyrights
SofTReL is not proposing the Testing methodologies, types and various other concepts.
We tried presenting each and every theoretical concept of Software Testing with a live
example for easier understanding of the subject and arriving at a common
understanding of Software Test Engineering.
However, we did put in few of our proposed ways to achieve specific tasks and these are
governed
by
The
GNU
Free
Documentation
License
(GNU-FDL).
Please
visit
http://www.SofTReL.org
9 of 142
Hardware advances outpacing the ability to build software for this hardware.
This crisis though identified in the early years, exists to date and we have examples of
software failures around the world. Software is basically considered a failure if the
project is terminated because of costs or overrun schedules, if the project has
experienced overruns in excess of 50% of the original or if the software results in client
lawsuits. Some examples of failures include failure of Air traffic control systems, failure
of medical software, and failure in telecommunication software. The primary reason for
these failures other than those mentioned above is due to bad software engineering
practices adopted. Some of the worst software practices include:
To avoid these failures and thus improve the record, what is needed is a better
understanding of the process, better estimation techniques for cost time and quality
measures. But the question is, what is a process? Process transform inputs to outputs
http://www.SofTReL.org
10 of 142
i.e. a product. A software process is a set of activities, methods and practices involving
transformation that people use to develop and maintain software.
At present a large number of problems exist due to a chaotic software process and the
occasional success depends on individual efforts. Therefore to be able to deliver
successful software projects, a focus on the process is essential since a focus on the
product alone is likely to miss the scalability issues, and improvements in the existing
system. This focus would help in the predictability of outcomes, project trends, and
project characteristics.
The process that has been defined and adopted needs to be managed well and thus
process management comes into play.
knowledge and management of the software process, its technical aspects and also
ensures that the processes are being followed as expected and improvements are
shown.
From this we conclude that a set of defined processes can possibly save us from
software project failures. But it is nonetheless important to note that the process alone
cannot help us avoid all the problems, because with varying circumstances the need
varies and the process has to be adaptive to these varying needs. Importance needs to
be given to the human aspect of software development since that alone can have a lot of
impact on the results, and effective cost and time estimations may go totally waste if the
human resources are not planned and managed effectively. Secondly, the reasons
mentioned related to the software engineering principles may be resolved when the
needs are correctly identified. Correct identification would then make it easier to
identify the best practices that can be applied because one process that might be
suitable for one organization may not be most suitable for another.
Therefore to make a successful product a combination of Process and Technicalities will
be required under the umbrella of a well-defined process.
Having talked about the Software process overall, it is important to identify and relate
the role software testing plays not only in producing quality software but also
maneuvering the overall process.
The computer society defines testing as follows: Testing -- A verification method that
applies a controlled set of conditions and stimuli for the purpose of finding errors. This
is the most desirable method of verifying the functional and performance requirements.
Test results are documented proof that requirements were met and can be repeated.
The resulting data can be reviewed by all concerned for confirmation of capabilities.
http://www.SofTReL.org
11 of 142
There may be many definitions of software testing and many which appeal to us from
time to time, but its best to start by defining testing and then move on depending on
the requirements or needs.
The user knows what the customer requires (Requirements are clear from the
customer).
http://www.SofTReL.org
12 of 142
But processing
(converting) the user input of the key to the machine understandable language, making
the system understand what to be displayed and in return the word document
displaying what you have typed is performed by the batch systems. These batch
systems contain one or more Application Programming Interface (API) which perform
various tasks.
13 of 142
system and instructs the system which sent the data to perform specific tasks based on
the reply sent by the system which received the data.
http://www.SofTReL.org
14 of 142
using a simulator is much safer and less expensive than learning on a real fighter
plane. System simulation mimics the operation of a real system such as the operation
in a bank, or the running of the assembly line in a factory etc.
Simulation in the early stage of design cycle is important because the cost of mistakes
increases dramatically later in the product life cycle. Also, simulation software can
analyze the operation of a real system without the involvement of an expert, i.e. it can
also be analyzed with a non-expert like a manager.
How to Build Simulation Systems
In order to create a simulation system we need a realistic model of the system behavior.
One way of simulation is to create smaller versions of the real system.
http://www.SofTReL.org
15 of 142
The simulation system may use only software or a combination of software and
hardware to model the real system. The simulation software often involves the
integration of artificial intelligence and other modeling techniques.
What applications fall under this category?
Simulation is widely used in many fields. Some of the applications are:
Models of planes and cars that are tested in wind tunnels to determine the
aerodynamic properties.
Used in computer Games (E.g. SimCity, car games etc). This simulates the
working in a city, the roads, people talking, playing games etc.
Most Embedded Systems are developed by simulation software before they ever
make it to the chip fabrication labs.
http://www.SofTReL.org
16 of 142
This means that the input data affecting the results will be entered into the
simulation during its entire lifetime than just at the beginning. A simulation system
used to predict the growth of the economy may need to incorporate changes in
economic data, is a good example of a dynamic simulation system.
Discrete Simulation Systems
Discrete Simulation Systems use models that have discrete entities with multiple
attributes. Each of these entities can be in any state, at any given time, represented by
the values of its attributes. . The state of the system is a set of all the states of all its
entities.
This state changes one discrete step at a time as events happens in the system.
Therefore, the actual designing of the simulation involves making choices about which
entities to model, what attributes represent the Entity State, what events to model, how
these events impact the entity attributes, and the sequence of the events. Examples of
these systems are simulated battlefield scenarios, highway traffic control systems,
multiteller systems, computer networks etc.
Continuous Simulation Systems
If instead of using a model with discrete entities we use data with continuous values,
we will end up with continuous simulation. For example instead of trying to simulate
battlefield scenarios by using discrete entities such as soldiers and tanks, we can try to
model behavior and movements of troops by using differential equations.
Social Simulation Systems
Social simulation is not a technique by itself but uses the various types of simulation
described above. However, because of the specialized application of those techniques for
social simulation it deserves a special mention of its own.
The field of social simulation involves using simulation to learn about and predict
various social phenomenon such as voting patterns, migration patterns, economic
decisions made by the general population, etc. One interesting application of social
simulation is in a field called artificial life which is used to obtain useful insights into
the formation and evolution of life.
What can be the possible test approach?
A simulation systems primary responsibility is to replicate the behavior of the real
system as accurately as possible. Therefore, a good place to start creating a test plan
would be to understand the behavior of the real system.
http://www.SofTReL.org
17 of 142
Subjective Testing
Subjective testing mainly depends on an expert's opinion. An expert is a person who is
proficient and experienced in the system under test. Conducting the test involves test
runs of the simulation by the expert and then the expert evaluates and validates the
results based on some criteria.
One advantage of this approach over objective testing is that it can test those conditions
which cannot be tested objectively. For example, an expert can determine whether the
joystick handling of the flight feels "right".
One disadvantage is that the evaluation of the system is based on the "expert's" opinion,
which may differ from expert to expert. Also, if the system is very large then it is bound
to have many experts. Each expert may view it differently and can give conflicting
opinions. This makes it difficult to determine the validity of the system. Despite all
these disadvantages, subjective testing is necessary for testing systems with human
interaction.
Objective Testing
Objective testing is mainly used in systems where the data can be recorded while the
simulation is running. This testing technique relies on the application of statistical and
automated methods to the data collected.
Statistical methods are used to provide an insight into the accuracy of the simulation.
These methods include hypothesis testing, data plots, principle component analysis and
cluster analysis.
Automated testing requires a knowledge base of valid outcomes for various runs of
simulation. This knowledge base is created by domain experts of the simulation system
being tested. The data collected in various test runs is compared against this knowledge
base to automatically validate the system under test. An advantage of this kind of
testing is that the system can continually be regression tested as it is being developed.
Statistical Methods
Statistical methods are used to provide an insight into the accuracy of the simulation.
These methods include hypothesis testing, data plots, principle component analysis and
cluster analysis.
Automated Testing
Automated testing requires a knowledge base of valid outcomes for various runs of
simulation. This knowledge base is created by domain experts of the simulation system
being tested. The data collected in various test runs is compared against this knowledge
base to automatically validate the system under test. An advantage of this kind of
testing is that the system can continually be regression tested as it is being developed.
http://www.SofTReL.org
18 of 142
Inventory Systems.
19 of 142
Access to Code
Developers must provide full access (source code, infrastructure, etc) to testers.
The Code, change records and design documents should be provided to the
testing team. The testing team should read and understand the code.
Event logging
The events to log include User events, System milestones, Error handling and
completed transactions. The logs may be stored in files, ring buffers in memory,
and/or serial ports. Things to be logged include description of event, timestamp,
subsystem, resource usage and severity of event. Logging should be adjusted by
subsystem and type. Log file report internal errors, help in isolating defects, and
give useful information about context, tests, customer usage and test coverage.
The more readable the Log Reports are, the easier it becomes to identify the
defect cause and work towards corrective measures.
http://www.SofTReL.org
20 of 142
Design
by
Contract
theory---This
technique
requires
that
Resource Monitoring
Memory usage should be monitored to find memory leaks. States of running
methods, threads or processes should be watched (Profiling interfaces may be
used for this.). In addition, the configuration values should be dumped.
Resource monitoring is of particular concern in applications where the load on
the application in real time is estimated to be considerable.
Control
Control refers to our ability to provide inputs and reach states in the software under
test.
The features to improve controllability are:
Test Points
Allow data to be inspected, inserted or modified at points in the software. It is
especially useful for dataflow applications. In addition, a pipe and filters
architecture provides many opportunities for test points.
http://www.SofTReL.org
21 of 142
Test Interfaces
Interfaces may be provided specifically for testing e.g. Excel and Xconq etc.
Existing interfaces may be able to support significant testing e.g. InstallSheild,
AutoCAD, Tivoli, etc.
Fault injection
Error seeding---instrumenting low level I/O code to simulate errors---makes it
much easier to test error handling. It can be handled at both system and
application level, Tivoli, etc.
A BROADER VIEW
Below are given a broader set of characteristics (usually known as James Bach
heuristics) that lead to testable software.
Operability
The better it works, the more efficiently it can be tested.
The system should have few bugs, no bugs should block the execution of tests
and the product should evolve in functional stages (simultaneous development
and testing).
Observability
What we see is what we test.
http://www.SofTReL.org
22 of 142
Controllability
The better we control the software, the more the testing process can be automated
and optimized.
Check that
Decomposability
By controlling the scope of testing, we can quickly isolate problems and perform
effective and efficient testing.
The software system should be built from independent modules which can be
tested independently.
Simplicity
The less there is to test, the more quickly we can test it.
The points to consider in this regard are functional (e.g. minimum set of
features), structural (e.g. architecture is modularized) and code (e.g. a coding
standard is adopted) simplicity.
Stability
The fewer the changes, the fewer are the disruptions to testing.
The changes to software should be infrequent, controlled and not invalidating
existing tests. The software should be able to recover well from failures.
Understandability
The more information we will have, the smarter we will test.
The testers should be able to understand well the design, changes to the design
and the dependencies between internal, external and shared components.
Technical
documentation
should
be
instantly
accessible,
accurate,
well
Suitability
The more we know about the intended use of the software, the better we can
organize our testing to find important bugs.
http://www.SofTReL.org
23 of 142
lifecycle
of
software
development
into
Requirements
Analysis,
Design,
Design
(1)
Determine
correctness
and
consistency
(2)
Generate
24 of 142
Invest in analysis at the beginning of the project - Having a clear, concise and
formal
statement
of
the
requirements
facilitates
programming,
Start developing the test set at the requirements analysis phase - Data should
be generated that can be used to determine whether the requirements have
been met. To do this, the input domain should be partitioned into classes of
values that the program will treat in a similar manner and for each class a
representative element should be included in the test data. In addition,
following should also be included in the data set: (1) boundary values (2) any
non-extreme input values that would require special handling.
The output domain should be treated similarly.
Invalid input requires the same analysis as valid input.
Design
The design document aids in programming, communication, and error analysis and test
data generation. The requirements statement and the design document should together
http://www.SofTReL.org
25 of 142
give the problem and the organization of the solution i.e. what the program will do and
how it will be done.
The design document should contain:
Analysis of design to check its completeness and consistency - the total process
should be analyzed to determine that no steps or special cases have been
overlooked. Internal interfaces, I/O handling and data structures should
specially be checked for inconsistencies.
Generation of test data based on the design - The tests generated should cover
the structure as well as the internal functions of the design like the data
structures, algorithm, functions, heuristics and general program structure etc.
Standard extreme and special values should be included and expected output
should be recorded in the test data.
Reexamination and refinement of the test data set generated at the requirements
analysis phase.
The first two steps should also be performed by some colleague and not only the
designer/developer.
Programming/Construction
http://www.SofTReL.org
26 of 142
Check the code for consistency with design - the areas to check include modular
structure, module interfaces, data structures, functions, algorithms and I/O
handling.
Perform the Testing process in an organized and systematic manner with test runs
dated, annotated and saved. A plan or schedule can be used as a checklist to
help the programmer organize testing efforts. If errors are found and changes
made to the program, all tests involving the erroneous segment (including those
which resulted in success previously) must be rerun and recorded.
Asks some colleague for assistance - Some independent party, other than the
programmer of the specific part of the code, should analyze the development
product at each phase. The programmer should explain the product to the party
who will then question the logic and search for errors with a checklist to guide
the search. This is needed to locate errors the programmer has overlooked.
Use available tools - the programmer should be familiar with various compilers
and interpreters available on the system for the implementation language being
used because they differ in their error analysis and code generation capabilities.
Apply Stress to the Program - Testing should exercise and stress the program
structure, the data structures, the internal functions and the externally visible
functions or functionality. Both valid and invalid data should be included in the
test set.
Test one at a time - Pieces of code, individual modules and small collections of
modules should be exercised separately before they are integrated into the total
program, one by one. Errors are easier to isolate when the no. of potential
interactions should be kept small. Instrumentation-insertion of some code into
the program solely to measure various program characteristics can be useful
here. A tester should perform array bound checks, check loop control variables,
determine whether key data values are within permissible ranges, trace program
execution, and count the no. of times a group of statements is executed.
http://www.SofTReL.org
27 of 142
Measure testing coverage/When should testing stop? - If errors are still found
every time the program is executed, testing should continue. Because errors
tend to cluster, modules appearing particularly error-prone require special
scrutiny.
The metrics used to measure testing thoroughness include statement testing
(whether each statement in the program has been executed at least once),
branch testing (whether each exit from each branch has been executed at least
once) and path testing (whether all logical paths, which may involve repeated
execution of various segments, have been executed at least once). Statement
testing is the coverage metric most frequently used as it is relatively simple to
implement.
The amount of testing depends on the cost of an error. Critical programs or
functions require more thorough testing than the less significant functions.
http://www.SofTReL.org
28 of 142
Requirement Study
Requirement Checklist
Software Requirement
Specification
Software Requirement
Specification
Functional Specification
Checklist
Functional Specification
Document
Functional Specification
Document
Architecture Design
Architecture Design
Coding
Functional Specification
Document
Unit/Integration/System
Test Case Documents
Functional Specification
Document
Performance Criteria
Software Requirement
Specification
Regression Test Case
Document
http://www.SofTReL.org
29 of 142
9. Verification Strategies
What is Verification?
Verification is the process of evaluating a system or component to determine whether
the products of a given development phase satisfy the conditions imposed at the start of
that phase.1
What is the importance of the Verification Phase?
Verification process helps in detecting defects early, and preventing their leakage
downstream. Thus, the higher cost of later detection and rework is eliminated.
9.1 Review
A process or meeting during which a work product, or set of work products, is
presented to project personnel, managers, users, customers, or other interested parties
for comment or approval.
http://www.SofTReL.org
30 of 142
The main goal of reviews is to find defects. Reviews are a good compliment to testing to
help assure quality. A few purposes of SQA reviews can be as follows:
Assure the quality of deliverables before the project moves to the next stage.
Once a deliverable has been reviewed, revised as required, and approved, it can
be used as a basis for the next stage in the life cycle.
Support decisions made during such reviews include Corrective actions, Changes in the
allocation of resources or changes to the scope of the project
In management reviews the following Software products are reviewed:
Audit Reports
Contingency plans
Installation plans
Risk management plans
Software Q/A
The participants of the review play the roles of Decision-Maker, Review Leader,
Recorder, Management Staff, and Technical Staff.
Technical Reviews
Technical reviews confirm that product Conforms to specifications, adheres to
regulations, standards, guidelines, plans, changes are properly implemented, changes
affect only those system areas identified by the change specification.
http://www.SofTReL.org
31 of 142
Ensure that any changes in the development procedures (design, coding, testing)
are implemented per the organization pre-defined standards.
Installation procedure
Release notes
The participants of the review play the roles of Decision-maker, Review leader, Recorder,
Technical staff.
What is Requirement Review?
A process or meeting during which the requirements for a system, hardware item, or
software item are presented to project personnel, managers, users, customers, or other
interested parties for comment or approval. Types include system requirements review,
software requirements review.
Who is involved in Requirement Review?
Input Criteria
Software requirement specification is the essential document for the review. A checklist
can be used for the review.
Exit Criteria
Exit criteria include the filled & completed checklist with the reviewers comments &
suggestions and the re-verification whether they are incorporated in the documents.
What is Design Review?
A process or meeting during which a system, hardware, or software design is presented
to project personnel, managers, users, customers, or other interested parties for
http://www.SofTReL.org
32 of 142
comment or approval. Types include critical design review, preliminary design review,
and system design review.
Who involve in Design Review?
QA team member leads design review. Members from development team and QA
team participate in the review.
Input Criteria
Design document is the essential document for the review. A checklist can be used for
the review.
Exit Criteria
Exit criteria include the filled & completed checklist with the reviewers comments &
suggestions and the re-verification whether they are incorporated in the documents.
QA team member (In case the QA Team is only involved in Black Box Testing, then
the Development team lead chairs the review team) leads code review. Members
from development team and QA team participate in the review.
Input Criteria
The Coding Standards Document and the Source file are the essential documents for
the review. A checklist can be used for the review.
Exit Criteria
Exit criteria include the filled & completed checklist with the reviewers comments &
suggestions and the re-verification whether they are incorporated in the documents.
9.2 Walkthrough
A static analysis technique in which a designer or programmer leads members of the
development team and other interested parties through a segment of documentation or
http://www.SofTReL.org
33 of 142
code, and the participants ask questions and make comments about possible errors,
violation of development standards, and other problems.
The objectives of Walkthrough can be summarized as follows:
Train and exchange technical information among project teams which participate in
the walkthrough.
Increase the quality of the project, thereby improving morale of the team members.
http://www.SofTReL.org
34 of 142
9.3 Inspection
A static analysis technique that relies on visual examination of development products to
detect errors, violations of development standards, and other problems. Types include
code inspection; design inspection, Architectural inspections, Test ware inspections etc.
The participants in Inspections assume one or more of the following roles:
a) Inspection leader
b) Recorder
c) Reader
d) Author
e) Inspector
All participants in the review are inspectors. The author shall not act as inspection
leader and should not act as reader or recorder. Other roles may be shared among the
team members. Individual participants may act in more than one role.
Individuals holding management positions over any member of the inspection team
shall not participate in the inspection.
Input to the inspection shall include the following:
a) A statement of objectives for the inspection
b) The software product to be inspected
c) Documented inspection procedure
d) Inspection reporting forms
e) Current anomalies or issues list
Input to the inspection may also include the following:
f) Inspection checklists
g) Any regulations, standards, guidelines, plans, and procedures against which the
software product is to be inspected
h) Hardware product specifications
i) Hardware performance data
j) Anomaly categories
The individuals may make additional reference material available responsible for the
software product when requested by the inspection leader.
The purpose of the exit criteria is to bring an unambiguous closure to the inspection
meeting. The exit decision shall determine if the software product meets the inspection
exit criteria and shall prescribe any appropriate rework and verification. Specifically,
the inspection team shall identify the software product disposition as one of the
following:
http://www.SofTReL.org
35 of 142
a) Accept with no or minor rework. The software product is accepted as is or with only
minor rework. (For example, that would require no further verification).
b) Accept with rework verification. The software product is to be accepted after the
inspection leader or
a designated member of the inspection team (other than the author) verifies rework.
c) Re-inspect. Schedule a re-inspection to verify rework. At a minimum, a re-inspection
shall examine the software product areas changed to resolve anomalies identified in the
last inspection, as well as side effects of those changes.
Interface checking
Random testing
Domain testing
http://www.SofTReL.org
36 of 142
Some of these and many others would be discussed in the later sections of this chapter.
White box testing is much more expensive (In terms of resources and time) than black
box testing. It requires the source code to be produced before the tests can be planned
and is much more laborious in the determination of suitable input data and the
determination if the software is or is not correct. It is advised to start test planning with
a black box testing approach as soon as the specification is available. White box tests
are to be planned as soon as the Low Level Design (LLD) is complete. The Low Level
Design will address all the algorithms and coding style. The paths should then be
http://www.SofTReL.org
37 of 142
checked against the black box test plan and any additional required test cases should
be
determined
and
applied.
Branch Coverage or Node Testing Each branch in the code is taken in each
possible direction at least once.
Compound Condition Coverage When there are multiple conditions, you must
test not only each direction but also each possible combinations of conditions,
which is usually done by using a Truth Table
Basis Path Testing Each independent path through the code is taken in a predetermined order. This point will further be discussed in other section.
Data Flow Testing (DFT) In this approach you track the specific variables
through each possible calculation, thus defining the set of intermediate paths
through the code i.e., those based on each piece of code chosen to be tracked.
http://www.SofTReL.org
38 of 142
Path Testing Path testing is where all possible paths through the code are
defined and covered. This testing is extremely laborious and time consuming.
Loop Testing In addition top above measures, there are testing strategies based
on loop testing. These strategies relate to testing single loops, concatenated
loops, and nested loops. Loops are fairly simple to test unless dependencies exist
among the loop or b/w a loop and the code it contains.
What do we do in WBT?
In WBT, we use the control structure of the procedural design to derive test cases.
Using WBT methods a tester can derive the test cases that
Guarantee that all independent paths within a module have been exercised
at least once.
Execute all loops at their boundaries and within their operational bounds
White box testing (WBT) is also called Structural or Glass box testing.
Why WBT?
We do WBT because Black box testing is unlikely to uncover numerous sorts of
defects in the program. These defects can be of the following nature:
http://www.SofTReL.org
39 of 142
http://www.SofTReL.org
40 of 142
Skills Required
Talking theoretically, all we need to do in WBT is to define all logical paths, develop
test cases to exercise them and evaluate results i.e. generate test cases to exercise
the program logic exhaustively.
For this we need to know the program well i.e. We should know the specification
and the code to be tested; related documents should be available too us .We must
be able to tell the expected status of the program versus the actual status found at
any point during the testing process.
Limitations
Unfortunately in WBT, exhaustive testing of a code presents certain logistical
problems. Even for small programs, the number of possible logical paths can be very
large. For instance, a 100 line C Language program that contains two nested loops
executing 1 to 20 times depending upon some initial input after some basic data
declaration. Inside the interior loop four if-then-else constructs are required. Then
there are approximately 1014 logical paths that are to be exercised to test the
program exhaustively. Which means that a magic test processor developing a single
test case, execute it and evaluate results in one millisecond would require 3170
years working continuously for this exhaustive testing which is certainly
impractical. Exhaustive WBT is impossible for large software systems. But that
doesnt mean WBT should be considered as impractical. Limited WBT in which a
limited no. of important logical paths are selected and exercised and important data
structures are probed for validity, is both practical and WBT. It is suggested that
white and black box testing techniques can be coupled to provide an approach that
that validates the software interface selectively ensuring the correction of internal
working of the software.
Tools used for White Box testing:
Few Test automation tool vendors offer white box testing tools which:
1) Provide run-time error and memory leak detection;
2) Record the exact amount of time the application spends in any given block of code for
the purpose of finding inefficient code bottlenecks; and
3) Pinpoint areas of the application that have and have not been executed.
http://www.SofTReL.org
41 of 142
42 of 142
A Graph Matrix is a square matrix whose size is equal to the number of nodes on the
flow graph. Each row and column corresponds to an identified node, and matrix entries
correspond to connections between nodes.
10.1.5 Control Structure Testing
Described below are some of the variations of Control Structure Testing.
Condition Testing
Condition testing is a test case design method that exercises the logical conditions
contained in a program module.
Data Flow Testing
The data flow testing method selects test paths of a program according to the
locations of definitions and uses of variables in the program.
10.1.6 Loop Testing
Loop Testing is a white box testing technique that focuses exclusively on the validity of
loop constructs. Four classes of loops can be defined: Simple loops, Concatenated
loops, nested loops, and unstructured loops.
Simple Loops
The following sets of tests can be applied to simple loops, where n is the maximum
number of allowable passes through the loop.
1. Skip the loop entirely.
2. Only one pass through the loop.
3. Two passes through the loop.
4. m passes through the loop where m<n.
5. n-1, n, n+1 passes through the loop.
Nested Loops
If we extend the test approach from simple loops to nested loops, the number of
possible tests would grow geometrically as the level of nesting increases.
1. Start at the innermost loop. Set all other loops to minimum values.
2. Conduct simple loop tests for the innermost loop while holding the outer
loops at their minimum iteration parameter values. Add other tests for out-ofrange or exclude values.
3. Work outward, conducting tests for the next loop, but keep all other outer loops
at minimum values and other nested loops to typical values.
4. Continue until all loops have been tested.
http://www.SofTReL.org
43 of 142
Concatenated Loops
Concatenated loops can be tested using the approach defined for simple loops, if
each of the loops is independent of the other. However, if two loops are concatenated
and the loop counter for loop 1 is used as the initial value for loop 2, then the loops
are not independent.
Unstructured Loops
Whenever possible, this class of loops should be redesigned to reflect the use of the
structured programming constructs.
44 of 142
BVA focuses on the boundary of the input space to identify test cases
Rational is that errors tend to occur near the extreme values of an input
variable
http://www.SofTReL.org
45 of 142
2. Physical Quantities
o
An example of physical variables being tested, telephone numbers what faults might be revealed by numbers of 000-0000, 000-0001,
555-5555, 999-9998, 999-9999?
46 of 142
http://www.SofTReL.org
47 of 142
3. For each Requirement, decide what technique you should use to derive the test
cases. For example, if you are testing a Login page, you need to write test cases
basing on error guessing and also negative cases for handling failures.
4. Have a Traceability Matrix as follows:
Requirement No (In RD)
Requirement
Test Case No
What this Traceability Matrix provides you is the coverage of Testing. Keep filling
in the Traceability matrix when you complete writing test cases for each
requirement.
http://www.SofTReL.org
48 of 142
Due to such interfaces, independent testing of a Unit becomes impossible. But that is
what we want to do; we want to test a Unit in isolation! So here we use Stub and
Driver.
A Driver is a piece of software that drives (invokes) the Unit being tested. A driver
creates necessary Inputs required for the Unit and then invokes the Unit.
A Unit may reference another Unit in its logic. A Stub takes place of such subordinate
unit during the Unit Testing. A Stub is a piece of software that works similar to a unit
which is referenced by the Unit being tested, but it is much simpler that the actual
unit. A Stub works as a Stand-in for the subordinate unit and provides the minimum
required behavior for that unit.
Programmer needs to create such Drivers and Stubs for carrying out Unit Testing.
Both the Driver and the Stub are kept at a minimum level of complexity, so that they do
not induce any errors while testing the Unit in question.
Example - For Unit Testing of Sales Order Printing program, a Driver program will
have the code which will create Sales Order records using hardcoded data and then call
Sales Order Printing program. Suppose this printing program uses another unit which
calculates Sales discounts by some complex calculations. Then call to this unit will be
replaced by a Stub, which will simply return fix discount data.
Unit Test Cases
It must be clear by now that preparing Unit Test Cases document (referred to as UTC
hereafter) is an important task in Unit Testing activity. Having an UTC, which is
complete with every possible test case, leads to complete Unit Testing and thus gives an
assurance of defect-free Unit at the end of Unit Testing stage. So let us discuss about
how to prepare a UTC.
Think of following aspects while preparing Unit Test Cases
Expected Functionality: Write test cases against each functionality that is expected
to be provided from the Unit being developed.
e.g. If an SQL script contains commands for creating one table and altering another
table then test cases should be written for testing creation of one table and
alteration of another.
It is important that User Requirements should be traceable to Functional
Specifications, Functional Specifications be traceable to Program Specifications and
Program Specifications be traceable to Unit Test Cases. Maintaining such
traceability ensures that the application fulfills User Requirements.
Input values:
http://www.SofTReL.org
49 of 142
Every input value: Write test cases for each of the inputs accepted by the
Unit.
e.g. If a Data Entry Form has 10 fields on it, write test cases for all 10 fields.
Validation of input: Every input has certain validation rule associated with
it. Write test cases to validate this rule. Also, there can be cross-field
validations in which one field is enabled depending upon input of another
field. Test cases for these should not be missed.
e.g. A combo box or list box has a valid set of values associated with it.
A numeric field may accept only positive values.
An email address field must have ampersand (@) and period (.) in it.
A Sales tax code entered by user must belong to the State specified by
the user.
Limitations of data types: Variables that hold the data have their value limits
depending upon their data types. In case of computed fields, it is very
important to write cases to arrive at an upper limit value of the variables.
Output values: Write test cases to generate scenarios, which will produce all types
of output values that are expected from the Unit.
e.g. A Report can display one set of data if user chooses a particular option and
another set of data if user chooses a different option. Write test cases to check each
of these outputs. When the output is a result of some calculations being performed
or some formulae being used, then approximations play a major role and must be
checked.
Screen / Report Layout: Screen Layout or web page layout and Report layout must
be tested against the requirements. It should not happen that the screen or the
report looks beautiful and perfect, but user wanted something entirely different! It
should ensure that pages and screens are consistent.
Path coverage: A Unit may have conditional processing which results in various
paths the control can traverse through. Test case must be written for each of these
paths.
http://www.SofTReL.org
50 of 142
Assumptions: A Unit may assume certain things for it to function. For example, a
Unit may need a database to be open. Then test case must be written to check that
the Unit reports error if such assumptions are not met.
Transactions: In case of database applications, it is important to make sure that
transactions are properly designed and no way inconsistent data gets saved in the
database.
Abnormal terminations: Behavior of the Unit in case of abnormal termination
should be tested.
Error messages: Error messages should be short, precise and self-explanatory. They
should be properly phrased and should be free of grammatical mistakes.
UTC Document
Given below is a simple format for UTC document.
Test Case No.
ID which can be
referred to in
other
documents like
Traceability
Matrix,
Root
Cause Analysis
of Defects etc.
Test
Case
purpose
What to test
Procedure
How to test
Expected
Result
What
should
happen
Actual result
What actually
happened?
This
column
can be omitted
when
Defect
Recording Tool
is used.
Note that as this is a sample, we have not provided columns for Pass/Fail and Remarks.
Example:
Let us say we want to write UTC for a Data Entry Form below:
Item No.
Item No.
Item Name
Item
Item
No.Price
Item No...
Item No.
Given below are some of the Unit Test Cases for the above Form:
Test
Test
Case Procedure
Expected Result
Case
purpose
No.
http://www.SofTReL.org
Actual
result
51 of 142
Item no. to
start by A or
B.
2.
Item Price to
be
between
1000 to 2000 if
Item no. starts
with A.
2,3.
Should
get
accepted and control
should move to next
field.
4. Should not get
accepted. An error
message should be
displayed and control
should remain in Item
no. field.
2,3.Error should get
displayed and control
should remain in Price
field.
4,5,6.Should
get
accepted and control
should move to next
field.
UTC Checklist
UTC checklist may be used while reviewing the UTC prepared by the programmer. As
any other checklist, it contains a list of questions, which can be answered as either a
Yes or a No. The Aspects list given in Section 4.3 above can be referred to while
preparing UTC checklist.
e.g. Given below are some of the checkpoints in UTC checklist
1. Are test cases present for all form field validations?
2. Are boundary conditions considered?
3. Are Error messages properly phrased?
Defect Recording
Defect Recording can be done on the same document of UTC, in the column of
Expected Results. This column can be duplicated for the next iterations of Unit
Testing.
Defect Recording can also be done using some tools like Bugzilla, in which defects are
stored in the database.
Defect Recording needs to be done with care. It should be able to indicate the problem
in clear, unambiguous manner, and reproducing of the defects should be easily possible
from the defect information.
Conclusion
http://www.SofTReL.org
52 of 142
Exhaustive Unit Testing filters out the defects at an early stage in the Development Life
Cycle. It proves to be cost effective and improves Quality of the Software before the
smaller pieces are put together to form an application as a whole. Unit Testing should
be done sincerely and meticulously, the efforts are paid well in the long run.
53 of 142
2. Low level components are combined into clusters that perform a specific
software sub function.
3. A driver is written to coordinate test case input and output.
4. The cluster is tested.
Drivers are removed and clusters are combined moving upward in the program
structure.
Software
IE 4.x, Opera, Netscape
IE 5.x, Netscape
Mozilla
Operating System
Windows 95
Windows XP
Linux
Compatibility tests are also performed for various client/server based applications
where the hardware changes from client to client.
Compatibility Testing is very crucial to organizations developing their own products.
The products have to be checked for compliance with the competitors of the third party
tools, hardware, or software platform. E.g. A Call center product has been built for a
solution with X product but there is a client interested in using it with Y product; then
the issue of compatibility arises. It is of importance that the product is compatible with
varying platforms. Within the same platform, the organization has to be watchful that
with each new release the product has to be tested for compatibility.
A good way to keep up with this would be to have a few resources assigned along with
their routine tasks to keep updated about such compatibility issues and plan for testing
when and if the need arises.
http://www.SofTReL.org
54 of 142
By the above example it is not intended that companies which are not developing
products do not have to cater for this type of testing. There case is equally existent, if an
application uses standard software then would it be able to run successfully with the
newer versions too? Or if a website is running on IE or Netscape, what will happen
when it is opened through Opera or Mozilla. Here again it is best to keep these issues in
mind and plan for compatibility testing in parallel to avoid any catastrophic failures and
delays.
12.3.2 Recovery Testing
Recovery testing is a system test that focuses the software to fall in a variety of ways
and verifies that recovery is properly performed. If it is automatic recovery then reinitialization, check pointing mechanisms, data recovery and restart should be
evaluated for correctness. If recovery requires human intervention, the mean-time-torepair (MTTR) is evaluated to determine whether it is within acceptable limits.
12.3.3 Usability Testing
Usability is the degree to which a user can easily learn and use a product to achieve a
goal. Usability testing is the system testing which attempts to find any human-factor
problems. A simpler description is testing the software from a users point of view.
Essentially it means testing software to prove/ensure that it is user-friendly, as distinct
from testing the functionality of the software. In practical terms it includes ergonomic
considerations, screen design, standardization etc.
The idea behind usability testing is to have actual users perform the tasks for which the
product was designed. If they can't do the tasks or if they have difficulty performing the
tasks, the UI is not adequate and should be redesigned. It should be remembered that
usability testing is just one of the many techniques that serve as a basis for evaluating
the UI in a user-centered approach. Other techniques for evaluating a UI include
inspection methods such as heuristic evaluations, expert reviews, card-sorting,
matching test or Icon intuitiveness evaluation, cognitive walkthroughs. Confusion
regarding usage of the term can be avoided if we use usability evaluation for the
generic term and reserve usability testing for the specific evaluation method based on
user
performance.
Heuristic
Evaluation
and
Usability
Inspection
or
cognitive
55 of 142
someone's opinion of how users might perform that is offered as evidence that the UI is
acceptable or not. This distinction between performance and opinion about performance
is crucial. Opinions are subjective. Whether a sample of users can accomplish what
they want or not is objective. Under many circumstances it is more useful to find out if
users can do what they want to do rather than asking someone.
PERFORMING
THE TEST
1. Get a person who fits the user profile. Make sure that you are not getting
someone who has worked on it.
2. Sit them down in front of a computer, give them the application, and tell them a
small scenario, like: Thank you for volunteering making it easier for users to
find what they are looking for. We would like you to answer several questions.
There is no right or wrong answers. What we want to learn is why you make the
choices you do, what is confusing, why choose one thing and not another, etc.
Just talk us through your search and let us know what you are thinking. We
have a recorder which is going to capture what you say, so you will have to tell
us what you are clicking on as you also tell us what you are thinking. Also think
aloud when you are stuck somewhere
3. Now dont speak anything. Sounds easy, but see if you actually can shut up.
4. Watch them use the application. If they ask you something, tell them you're not
there. Then shut up again.
5. Start noting all the things you will have to change.
6. Afterwards ask them what they thought and note them down.
7. Once the whole thing is done thank the volunteer.
USABILITY TESTING
for
http://www.SofTReL.org
56 of 142
DRUM from Serco Usability Services is a tool, which has been developed by
close cooperation between Human Factors professionals and software engineers
to provide a broad range of support for video-assisted observational studies.
USABILITY LABS
Lodestone Research has usability-testing laboratory with state of the art audio
and visual recording and testing equipment. All equipment has been designed to
be portable so that it can be taken on the road. The lab consists of a test room
and an observation/control room that can seat as many as ten observers. A-V
equipment includes two (soon to be 3) fully controllable SVHS cameras,
capture/feed capabilities for test participant's PC via scan converter and direct
split signal (to VGA "slave" monitors in observation room), up to eight video
monitors and four VCA monitors for observer viewing, mixing/editing
http://www.SofTReL.org
57 of 142
Online Computer Library Center, Inc provides insight into the usability test
laboratory. It gives an overview of the infrastructure as well as the process being
used in the laboratory.
END
GOALS OF
USABILITY TESTING
To summarize the goals, it can be said that it makes the software more user friendly.
The end result will be:
Special tests may be designed that generate ten interrupts per second, when
one or two is the average rate.
Test Cases that may cause excessive hunting for disk-resident data.
58 of 142
general, we want to measure the Response Time, Throughput, and Utilization of the
Web site while simulating attempts by virtual users to simultaneously access the site.
One of the main objectives of performance testing is to maintain a Web site with low
response time, high throughput, and low utilization.
Response Time
Response Time is the delay experienced when a request is made to the server and the
server's response to the client is received. It is usually measured in units of time, such
as seconds or milliseconds. Generally speaking, Response Time increases as the inverse
of unutilized capacity. It increases slowly at low levels of user load, but increases
rapidly as capacity is utilized. Figure 1 demonstrates such typical characteristics of
Response Time versus user load.
http://www.SofTReL.org
59 of 142
Figure 2 shows the different response time in the entire process of a typical Web
request.
Total Response Time = (N1 + N2 + N3 + N4) + (A1 + A2 + A3)
Where Nx represents the network Response Time and Ax represents the application
Response Time.
In general, the Response Time is mainly constrained by N1 and N4. This Response Time
represents the method your clients are using to access the Internet. In the most
common scenario, e-commerce clients access the Internet using relatively slow dial-up
connections. Once Internet access is achieved, a client's request will spend an
indeterminate amount of time in the Internet cloud shown in Figure 2 as requests and
responses are funneled from router to router across the Internet.
To reduce these networks Response Time (N1 and N4), one common solution is to move
the servers and/or Web contents closer to the clients. This can be achieved by hosting
your farm of servers or replicating your Web contents with major Internet hosting
providers who have redundant high-speed connections to major public and private
Internet exchange points, thus reducing the number of network routing hops between
the clients and the servers.
Network Response Times N2 and N3 usually depend on the performance of the
switching equipment in the server farm. When traffic to the back-end database grows,
consider upgrading the switches and network adapters to boost performance.
Reducing application Response Times (A1, A2, and A3) is an art form unto itself
because the complexity of server applications can make analyzing performance data
and performance tuning quite challenging. Typically, multiple software components
interact on the server to service a given request. Response time can be introduced by
any of the components. That said, there are ways you can approach the problem:
First, your application design should minimize round trips wherever possible.
Multiple round trips (client to server or application to database) multiply
transmission and resource acquisition Response time. Use a single round trip
wherever possible.
http://www.SofTReL.org
60 of 142
You can optimize many server components to improve performance for your
configuration. Database tuning is one of the most important areas on which to
focus. Optimize stored procedures and indexes.
Finally, to increase capacity, you may want to upgrade the server hardware (scaling
up), if system resources such as CPU or memory are stretched out and have become
the bottleneck. Using multiple servers as a cluster (scaling out) may help to lessen
the load on an individual server, thus improving system performance and reducing
application latencies.
Throughput
Throughput refers to the number of client requests processed within a certain unit of
time. Typically, the unit of measurement is requests per second or pages per second.
From a marketing perspective, throughput may also be measured in terms of visitors
per day or page views per day, although smaller time units are more useful for
performance testing because applications typically see peak loads of several times the
average load in a day.
As one of the most useful metrics, the throughput of a Web site is often measured and
analyzed at different stages of the design, develop, and deploy cycle. For example, in the
process of capacity planning, throughput is one of the key parameters for determining
the hardware and system requirements of a Web site. Throughput also plays an
important role in identifying performance bottlenecks and improving application and
system performance. Whether a Web farm uses a single server or multiple servers,
throughput statistics show similar characteristics in reactions to various user load
levels. Figure 3 demonstrates such typical characteristics of throughput versus user
load.
http://www.SofTReL.org
61 of 142
http://www.SofTReL.org
62 of 142
Utilization
Utilization refers to the usage level of different system resources, such as the server's
CPU(s), memory, network bandwidth, and so forth. It is usually measured as a
percentage of the maximum available level of the specific resource. Utilization versus
user load for a Web server typically produces a curve, as shown in Figure 4.
http://www.SofTReL.org
63 of 142
Capacity planning
Bug fixing
Capacity Planning
How do you know if your server configuration is sufficient to support two million
visitors per day with average response time of less than five seconds? If your company
is projecting a business growth of 200 percent over the next two months, how do you
know if you need to upgrade your server or add more servers to the Web farm? Can
your server and application support a six-fold traffic increase during the Christmas
shopping season?
Capacity planning is about being prepared. You need to set the hardware and software
requirements of your application so that you'll have sufficient capacity to meet
anticipated and unanticipated user load.
One approach in capacity planning is to load-test your application in a testing (staging)
server farm. By simulating different load levels on the farm using a Web application
performance testing tool such as WAS, you can collect and analyze the test results to
better understand the performance characteristics of the application. Performance
charts such as those shown in Figures 1, 3, and 4 can then be generated to show the
expected Response Time, throughput, and utilization at these load levels.
http://www.SofTReL.org
64 of 142
In addition, you may also want to test the scalability of your application with different
hardware configurations. For example, load testing your application on servers with
one, two, and four CPUs respectively would help to determine how well the application
scales with symmetric multiprocessor (SMP) servers. Likewise, you should load test
your application with different numbers of clustered servers to confirm that your
application scales well in a cluster environment.
Although performance testing is as important as functional testing, its often overlooked
.Since the requirements to ensure the performance of the system is not as
straightforward as the functionalities of the system, achieving it correctly is more
difficult.
The effort of performance testing is addressed in two ways:
Load testing
Stress testing
Load testing
Load testing is a much used industry term for the effort of performance testing. Here
load means the number of users or the traffic for the system. Load testing is defined as
the testing to determine whether the system is capable of handling anticipated number
of users or not.
In Load Testing, the virtual users are simulated to exhibit the real user behavior as
much as possible. Even the user think time such as how users will take time to think
before inputting data will also be emulated. It is carried out to justify whether the
system is performing well for the specified limit of load.
For example, Let us say an online-shopping application is anticipating 1000 concurrent
user hits at peak period. In addition, the peak period is expected to stay for 12 hrs.
Then the system is load tested with 1000 virtual users for 12 hrs. These kinds of tests
are carried out in levels: first 1 user, 50 users, and 100 users, 250 users, 500 users
and so on till the anticipated limit are reached. The testing effort is closed exactly for
1000 concurrent users.
The objective of load testing is to check whether the system can perform well for
specified load. The system may be capable of accommodating more than 1000
concurrent users. But, validating that is not under the scope of load testing. No attempt
is made to determine how many more concurrent users the system is capable of
servicing. Table 1 illustrates the example specified.
http://www.SofTReL.org
65 of 142
Stress testing
Stress testing is another industry term of performance testing. Though load testing &
Stress testing are used synonymously for performancerelated efforts, their goal is
different.
Unlike load testing where testing is conducted for specified number of users, stress
testing is conducted for the number of concurrent users beyond the specified limit. The
objective is to identify the maximum number of users the system can handle before
breaking down or degrading drastically. Since the aim is to put more stress on system,
think time of the user is ignored and the system is exposed to excess load. The goals of
load and stress testing are listed in Table 2. Refer to table 3 for the inference drawn
through the Performance Testing Efforts.
Let us take the same example of online shopping application to illustrate the objective
of stress testing. It determines the maximum number of concurrent users an online
system can service which can be beyond 1000 users (specified limit). However, there is
a possibility that the maximum load that can be handled by the system may found to
be same as the anticipated limit. The Table<##>illustrates the example specified.
Stress testing also determines the behavior of the system as user base increases. It
checks whether the system is going to degrade gracefully or crash at a shot when the
load goes beyond the specified limit.
Table 1: Load and stress testing of illustrative example
Types of
Duration
Testing
Load Testing
12 Hours
Stress Testing
12 Hours
http://www.SofTReL.org
66 of 142
Goals
Testing for anticipated user base
Validates
whether
system
is
Stress testing
specified limit
Testing beyond the anticipated
user base
Checks
whether
the
system
Inference
Whether system Available?
Stress Testing
Conducting performance testing manually is almost impossible. Load and stress tests
are carried out with the help of automated tools. Some of the popular tools to automate
performance testing are listed in table 4.
Table 4: Load and stress testing tools
Tools
LoadRunner
Astra load test
Silk performer
WebLoad
QALoad
e-Load
eValid
WebSpray
TestManager
http://www.SofTReL.org
Vendor
Mercury Interactive Inc
Mercury Interactive Inc
Segue
Radview Software
CompuWare
Empirix Software
Software research Inc
CAI network
Rational
67 of 142
Microsoft technologies
OpenDemand
Red Gate Software
Open source
Mercury interactive Inc
Novasoft Inc
Webmaster solutions
Quatium technologies
PrimeMail Inc
Bug Fixing
Some errors may not occur until the application is under high user load. For Example,
memory leaks can exacerbate server or application problems sustaining high load.
Performance testing helps to detect and fix such problems before launching the
application. It is therefore recommended that developers take an active role in
performance testing their applications, especially at different major milestones of the
development cycle.
12.3.7 Content Management Testing
Content Management has gained a predominant importance after the Web applications
took a major part of our lives. What is Content Management? As the name denotes, it is
managing the content. How do they work? Let us take a common example. You are in
China and you wanted to open the Yahoo! Chinese version. When you choose Chinese
version on the main page of Yahoo! You get to see the entire content in Chinese. Yahoo!
Would strategically plan and have various servers for various languages. When you
choose a particular version of the page, the request is redirected to the server which
manages the Chinese content page. The Content Management systems help is placing
content for various purposes and also help in displaying when the request comes in.
Content Management Testing involves:
1. Testing the distribution of the content.
2. Request, Response Times.
3. Content display on various browsers and operating systems.
4. Load distribution on the servers.
In fact all the performance related testing should be performed for each version of the
web application which uses the content management servers.
12.3.8 Regression Testing
Regression testing as the name suggests is used to test / check the effect of changes
made in the code.
http://www.SofTReL.org
68 of 142
Most of the time the testing team is asked to check last minute changes in the code just
before making a release to the client, in this situation the testing team needs to check
only the affected areas.
So in short for the regression testing the testing team should get the input from the
development team about the nature / amount of change in the fix so that testing team
can first check the fix and then the side effects of the fix.
In my present organization we too faced the same problem. So we made a regression
bucket (this is a simple excel sheet containing the test cases that we need think assure
us of bare minimum functionality) this bucket is run every time before the release.
In fact the regression testing is the testing in which maximum automation can be done.
The reason being the same set of test cases will be run on different builds multiple
times.
But again the extent of automation depends on whether the test cases will remain
applicable over the time, In case the automated test cases do not remain applicable for
some amount of time then test engineers will end up in wasting time to automate and
dont get enough out of automation.
http://www.SofTReL.org
69 of 142
Comparing the current test results with the previously executed test
results
To verify that the data dictionary of data elements that have been
changed is correct
Regression testing as the name suggests is used to test / check the effect of changes
made in the code.
Most of the time the testing team is asked to check the last minute changes in the code
just before making a release to the client, in this situation the testing team needs to
check only the affected areas.
So in short for the regression testing the testing team should get the input from the
development team about the nature / amount of change in the fix so that testing team
can first check the fix and then the affected areas.
In my present organization we too faced the same problem. So we made a regression
bucket (this is a simple excel sheet containing the test cases that we need think assure
us of bare minimum functionality) this bucket is run every time before the release.
In fact the regression testing is the testing in which maximum automation can be done.
The reason being the same set of test cases will be run on different builds multiple
times.
70 of 142
A through understanding of the product is done now. During this phase, the test plan
and test cases for the beta phase (the next stage) is created. The errors reported are
documented internally for the testers and developers reference. No issues are usually
reported and recorded in any of the defect management/bug trackers
http://www.SofTReL.org
71 of 142
to provide input while there is still time to make significant changes as the
design evolves.
http://www.SofTReL.org
72 of 142
Identify errors
Report errors/findings
Provide Test Instruction Sheet that describes items such as testing objectives,
steps to follow, data to enter, functions to invoke.
Role of a tester
Report defects
73 of 142
Results."
- Dr. Cem Kaner.
"Exploratory testing is an interactive process of concurrent
product exploration, test design and test execution. To the
extent that the next test we do is influenced by the result
of the last test we did, we are doing exploratory testing.
- James Bach.
Exploratory testing is defined as simultaneous test design, test execution and bug
reporting. In this approach the tester explores the system (finding out what it is and
then testing it) without having any prior test cases or test scripts. Because of this
reason it also called as ad hoc testing, guerrilla testing or intuitive testing. But there is
some difference between them. In operational terms, exploratory testing is an
interactive process of concurrent product exploration, test design, and test execution.
The outcome of an exploratory testing session is a set of notes about the product,
failures found, and a concise record of how the product was tested. When practiced by
trained testers, it yields consistently valuable and auditable results. Every tester
performs this type of testing at one point or the other. This testing totally depends on
the skill and creativity of the tester. Different testers can explore the system in different
ways depending on their skills. Thus the tester has a very vital role to play in
exploratory testing.
This approach of testing has also been advised by SWEBOK for testing since it might
uncover the bugs, which the normal testing might not discover. A systematic approach
of exploratory testing can also be used where there is a plan to attack the system under
test. This systematic approach of exploring the system is termed Formalized exploratory
testing.
Exploratory testing is a powerful approach in the field of testing. Yet this
approach has not got the recognition and is often misunderstood and not gained the
respect it needs. In many situations it can be more productive than the scripted testing.
But the real fact is that all testers do practice this methodology sometime or the other,
most often unknowingly!
Exploratory testing believes in concurrent phases of product exploration, test
design and test execution. It is categorized under Black-box testing. It is basically a
free-style testing approach where you do not begin with the usual procedures of
elaborate test plans and test steps. The test plan and strategy is very well in the testers
mind. The tester asks the right question to the product / application and judges the
http://www.SofTReL.org
74 of 142
outcome. During this phase he is actually learning the product as he tests it. It is
interactive and creative. A conscious plan by the tester gives good results.
Human beings are unique and think differently, with a new set of ideas
emerging. A tester has the basic skills to listen, read, think and report. Exploratory
testing is just trying to exploit this and structure it down. The richness of this process
is only limited to the breadth and depth of our imagination and the insight into the
product under test.
How does it differ from the normal test procedures?
The definition of exploratory testing conveys the difference. In the normal testing
style, the test process is planned well in advance before the actual testing begins. Here
the test design is separated from the test execution phase. Many a times the test design
and test execution is entrusted on different persons.
Exploratory testing should not be confused with the dictionary meaning of adhoc. Ad hoc testing normally refers to a process of improvised, impromptu bug
searching. By definition, anyone can do ad hoc testing. The term exploratory testing-by Dr. Cem Kaner, in Testing Computer Software--refers to a sophisticated, systematic,
thoughtful approach to ad hoc testing.
What is formalized Exploratory Testing?
A structured and reasoned approach to exploratory testing is termed as Formalized
Exploratory Testing. This approach consists of specific tasks, objectives, and
deliverables that make it a systematic process.
Using the systematic approach (i.e. the formalize approach) an outline of what to
attack first, its scope, the time required to be spent etc is achieved. The
approach might be using simple notes to more descriptive charters to some
vague scripts. By using the systematic approach the testing can be more
organized focusing at the goal to be reached. Thus solving the problem where
the pure Exploratory Testing might drift away from the goal.
When we apply Exploratory Planning to Testing, we create Exploratory planning.
The formalized approach used for the Exploratory Testing can vary depending on
the various criteria like the resource, time, the knowledge of the application
available etc. Depending on these criteria, the approach used to attack the
http://www.SofTReL.org
75 of 142
system will also vary. It may involve creating the outlines on the notepad to
more sophisticated way by using charters etc. Some of the formal approaches
used for Exploratory Testing can be summarized as follows.
Identify the application domain.
The exploratory testing can be performed by identifying the application
domain. If the tester has good knowledge of domain, then it would be
easier to test the system without having any test cases. If the tester were
well aware of the domain, it would help analyzing the system faster and
better. His knowledge would help in identifying the various workflows
that usually exist in that domain. He would also be able to decide what
are the different scenarios and which are most critical for that system.
Hence he can focus his testing depending on the scenarios required. If a
QA lead is trying to assign the tester to a task, it is advisable that the
tester identifies the person who has the domain knowledge of that
system for ET.
For example, consider software has been built to generate the invoices
for its customers depending on the number of the units of power that
has been consumed. In such a case exploratory testing can be done by
identifying the domain of the application. A tester who has experience of
the billing systems for the energy domain would fit better than one who
does not have any knowledge. The tester who has knowledge in the
application domain knows the terminology used as well the scenarios
that would be critical to the system. He would know the ways in which
various computations are done. In such a case, tester with good
knowledge would be familiar to the terms like to line item, billing rate,
billing cycle and the ways in which the computation of invoice would be
done. He would explore the system to the best and takes lesser time. If
the tester does not have domain knowledge required, then it would take
time to understand the various workflows as well the terminology used.
He might not be able to focus on critical areas rather focus on the other
areas.
Identify the purpose.
Another approach to Exploratory Testing is by identifying the purpose of
the system i.e. What is that system used for. By identifying the purpose
http://www.SofTReL.org
76 of 142
try to analyze to what extent it is used. The effort can be more focused by
identifying the purpose.
For example, consider software developed to be used in Medical
operations. In such case care should be taken that the software build is
100% defect free. Hence the effort that needs to be focused is more and
care should be taken that the various workflows involved are covered.
On the other hand, if the software build is to provide some entertainment
then the criticality is lesser. Thus effort that needs to be focused varies.
Identifying the purpose of the system or the application to be tested
helps to a great extent.
Identify the primary and secondary functions.
Primary Function: Any function so important that, in the estimation of a
normal user, its inoperability or impairment would render the product
unfit for its purpose. A function is primary if you can associate it with
the purpose of the product and it is essential to that purpose. Primary
functions define the product. For example, the function of adding text to
a document in Microsoft Word is certainly so important that the product
would be useless without it. Groups of functions, taken together, may
constitute a primary function, too. For example, while perhaps no single
function on the drawing toolbar of Word would be considered primary,
the entire toolbar might be primary. If so, then most of the functions on
that toolbar should be operable in order for the product to pass
Certification.
Secondary
Function
or
contributing
function:
Any
function
that
http://www.SofTReL.org
77 of 142
Thus by identifying the primary function and secondary functions for the
system, testing can be done where more focus and effort can be given to
Primary functions compared to the secondary functions.
Example: Consider a web based application developed for online
shopping. For such an application we can identify the primary functions
and secondary functions and go ahead with Exploratory Testing. The
main functionality of that application is that the items selected by the
user need to be properly added to the shopping cart and price to be paid
is properly calculated. If there is online payment, then security is also an
aspect. These can be considered as the primary functions.
Whereas the bulletin board provided or the mail functionality provided
are considered as the secondary functions. Thus testing to be performed
is more focused at the primary functions rather than on the secondary
functions. If the primary functions do not work as required then the
main intention of having the application is lost.
Identify the workflows.
Identifying the workflows for testing any system without any scripted test
cases can be considered as one of the best approaches used. The
workflows are nothing but a visual representation of the scenarios as the
system would behave for any given input. The workflows can be simple
flow charts or Data Flow Diagrams (DFD) or the something like state
diagrams, use cases, models etc. The workflows will also help to identify
the scope for that scenario. The workflows would help the tester to keep
track of the scenarios for testing. It is suggested that the tester navigates
through the application before he starts exploring. It helps the tester in
identifying the various possible workflows and issues any found which he
is comfortable can be discussed with the concerned team.
Example: Consider a web application used for online shopping. The
application has various links on the web page. If tester is trying to test if
the items that he is adding to cart are properly being added, then he
should know the flow for the same. He should first identify the workflow
for such a scenario. He needs to login and then select a category and
identify the items and then add the item he would require. Thus without
http://www.SofTReL.org
78 of 142
knowing the workflow for such a scenario would not help the tester and
in the process loses his time.
In case he is not aware of the system, try to navigate through the
application once and get comfortable. Once the application is dully
understood, it is easier to test and explore more bugs.
Identify the break points.
Break points are the situations where the system starts behaving
abnormally. It does not give the output it is supposed to give. So by
identifying such situations also testing can be done. Use boundary
values or invariance for finding the break points of the application. In
most of the cases it is observed that system would work for normal
inputs or outputs. Try to give input that might be the ideal situation or
the worse situation.
Example: consider an application build to generate the reports for the
accounts department of a company depending on the criteria given. In
such cases try to select a worse case of report generation for all the
employees for their service. The system might not behave normally in the
situation.
Try to input a large input file to the application that provides the user to
upload and save the data given.
Try to input 500 characters in the text box of the web application.
Thus by trying to identify the extreme conditions or the breakpoints
would help the tester to uncover the hidden bugs. Such cases might not
be covered in the normal scripted testing. Hence this helps in finding the
bugs which might not covered in the normal testing.
Check UI against Windows interface etc standards.
The Exploratory Testing can be performed by identifying the User
interface standards. There are set standards laid down for the user
interfaces that need to be developed. These user standards are nothing
but the look and feel aspects of the interfaces the user interacts with.
The user should be comfortable with any of the screens that (s)he
working. These aspects help the end user to accept the system faster.
http://www.SofTReL.org
79 of 142
Are the buttons of the required size and are they placed in the
comfortable location.
80 of 142
cases it would help the tester explore the areas where the components
are coupled. The output of one component should be correctly sent to
other component. Hence such scenarios or workflows need to be
identified and explored more. More focus on some of the shown areas
that are more error prone.
Example: consider the online shopping application. The user adds the
items to his cart and proceeds to the payments details page. Here the
items added, their quantity etc should be properly sent to the next
module. If there is any error in any of the data transfer process, the pay
details will not be correct and the user will be billed wrong. There by
leading to a major error. In such a scenario, more focus is required in the
interfaces.
There may be external interfaces, like the application is integrated with
another application for the data. In such cases, focus should be more on
the interface between the two applications. How data is being passed, is
correct data being passed, if there is large data, is transfer of entire data
done or is system behaving abnormally when there is large data are few
points which should be addressed.
Record failures
In exploratory testing, we do the testing without having any documented
test cases. If a bug has been found, it is very difficult for us to test it after
fix. This is because there are no documented steps to navigate to that
particular scenario. Hence we need to keep track of the flow required to
reach where a bug has been found. So while testing, it is important that
at least the bugs that have been discovered are documented. Hence by
recording failures we are able to keep track of work that has been done.
This would also help even if the tester who was actually doing ET is not
available. Since the document can be referred and list all the bugs that
have been reported as well the flows for the same can be identified.
Example: for example consider the online shopping site. A bug has been
found while trying to add the items of given category into the cart. If the
tester can just document the flow as well as the error that has occurred,
http://www.SofTReL.org
81 of 142
it would help the tester himself or any other tester. It can be referred
while testing the application after a fix.
Document issues and question.
The tester trying to test an application using Exploratory Testing
methodology should feel comfortable to test. Hence it is advisable that
the tester navigates through the application once and notes any
ambiguities or queries he might feel. He can even get the clarification on
the workflows he is not comfortable. Hence by documenting all the issues
and questions that have been found while scanning or navigating the
application can help the tester have testing done without any loss in
time.
Decompose the main task into smaller tasks .The smaller ones to still smaller
activities.
It is always easier to work with the smaller tasks when compared to large
tasks. This is very useful in performing Exploratory Testing because lack
of test cases might lead us to different routes. By having a smaller task,
the scope as well as the boundary are confined which will help the tester
to focus on his testing and plan accordingly.
If a big task is taken up for testing, as we explore the system, we might
get deviated from our main goal or task. It might be hard to define
boundaries if the application is a new one. With smaller tasks, the goal is
known and hence the focus and the effort required can be properly
planned.
Example: An application that provides email facility. The new users can
register and use the application for the email. In such a scenario, the
main task itself can be divided into smaller tasks. One task to check if
the UI standards are met and it is user friendly. The other task is to test
if the new users are able to register with the application and use email
facility.
Thus the two tasks are smaller which will the corresponding groups to
focus their testing process.
Charter- states the goal and the tactics to be used.
http://www.SofTReL.org
82 of 142
Charter Summary:
o
Tools to use
Documents to examine
A charter can be simple one to more descriptive giving the strategies and
outlines for the testing process.
Example: Test the application for report generation.
Or.
Test the application if the report is being generated for the date before
01/01/2000.Use the use cases models for identifying the workflows.
http://www.SofTReL.org
83 of 142
session designed depends on the tester and the charter. After the session
is completed, each session is debriefed. The primary objective in the
debriefing is to understand and accept the session report. Another
objective is to provide feedback and coaching to the tester. The
debriefings would help the manager to plan the sessions in future and
also to estimate the time required for testing the similar functionality.
The debriefing session is based on agenda called PROOF.
Past: What happened during the session?
Results: What was achieved during the session?
Outlook: What still needs to be done?
Obstacles: What got in the way of good testing?
Feeling: How does the tester feel about all this?
The time spent on charter and on opportunity is also noted.
Opportunity testing is any testing that doesnt fit the charter of the
session. The tester is not restricted to his charter, and hence allowed to
deviate from the goal specified if there is any scope of finding an error.
A session can be broadly classified into three tasks (namely the TBS
metrics).
Session test up: Time required in setting up the application under test.
Test design and execution: Time required scanning the product and test.
Bug investigation and reporting: Time required finding the bugs and
reporting to the concerned.
The entire session report consists of these sections:
Session charter (includes a mission statement, and areas to be
tested)
Tester name(s)
Date and time started
http://www.SofTReL.org
84 of 142
http://www.SofTReL.org
85 of 142
it was found that these were the most critical bugs, which were camouflaged in
the software and which if present could have made the software Not fit for Use.
There are some pre requisites for DDET:
o
Advantages of DDET:
o
No wastage of time.
86 of 142
Mission
The goal of testing needs to be understood first before the work begins. This
could be the overall mission of the test project or could be a particular functionality /
scenario. The mission is achieved by asking the right questions about the product,
designing tests to answer these questions and executing tests to get the answers. Often
the tests do not completely answer, in such cases we need to explore. The test
procedure is recorded (which could later form part of the scripted testing) and the result
status too.
Tester
The tester needs to have a general plan in mind, though may not be very
constrained. The tester needs to have the ability to design good test strategy, execute
good tests, find important problems and report them. He simply has to think out of the
box.
Time
Time available for testing is a critical factor. Time falls short due to the following
reasons:
o
Many a time in project life cycles, the time and resources required in creating
the test strategy, test plan and design, execution and reporting is overlooked.
Exploratory testing becomes useful since the test plan, design and execution
happen together.
http://www.SofTReL.org
87 of 142
Change request come in much later stage of the cycle when much of the testing
is done with
Test Strategy
The tester crafts the test by systematically exploring the product. He defines his
approach, analyze the product, and evaluate the risk
Documentation
The written notes / scripts of the tester are reviewed by the test lead / manager.
These later form into new test cases or updated test materials.
Where does Exploratory Testing Fit?
Exploratory testing fits almost in any kind of testing projects, projects with
rigorous test plans and procedures or in projects where testing is not dictated
completely in advance. The situations where exploratory testing could fit in are:
The basic rule is this: exploratory testing is called for any time the next test you should
perform is not obvious, or when you want to go beyond the obvious.
http://www.SofTReL.org
88 of 142
Have the ability to design good tests, execute them and find important
problems
Be a critical thinker: They are able to review and explain their logic, looking
out for errors in their own thinking.
Have diverse ideas so as to make new test cases and improve existing ones.
A good exploratory tester always asks himself, whats the best test I can perform now?
They remain alert for new opportunities.
Advantages
Exploratory testing is advantageous when
Drawbacks
Difficult to quantize
http://www.SofTReL.org
89 of 142
http://www.SofTReL.org
90 of 142
You can derive scenarios based on the Use Cases. Use Cases provide good coverage of
the requirements and functionality.
1) Agile testers treat the developers as their customer and follow the agile
manifesto. The Context driven testing principles (explained in later part) act as a
set of principles for the agile tester.
2)
91 of 142
In the first definition of Agile testing we described it as one following the Context driven
principles.
The context driven principles which are guidelines for the agile tester are:
1. The value of any practice depends on its context.
2. There are good practices in context, but there are no best practices.
3. People, working together, are the most important part of any projects context.
4. Projects unfold over time in ways that are often not predictable.
5. The product is a solution. If the problem isnt solved, the product doesnt work.
6. Good software testing is a challenging intellectual process.
7. Only through judgment and skill, exercised cooperatively throughout the entire
project, are we able to do the right things at the right times to effectively test our
products.
http://www.context-driven-testing.com/
In the second definition we described Agile testing as a testing methodology adopted
when an entire project follows Agile (development) Methodology. We shall have a look at
the Agile development methodologies being practiced currently:
Agile Development Methodologies
Crystal
Scrum
Xbreed
In a fast paced environment such as in Agile development the question then arises
as to what is the Role of testing?
Testing is as relevant in an Agile scenario if not more than a traditional software
development scenario.
http://www.SofTReL.org
92 of 142
Testing is the Headlight of the agile project showing where the project is standing
now and the direction it is headed.
Testing provides the required and relevant information to the teams to take
informed and precise decisions.
The testers in agile frameworks get involved in much more than finding software
bugs, anything that can bug the potential user is a issue for them but testers
dont make the final call, its the entire team that discusses over it and takes a
decision over a potential issues.
A firm belief of Agile practitioners is that any testing approach does not assure
quality its the team that does (or doesnt) do it, so there is a heavy emphasis on the
skill and attitude of the people involved.
Agile Testing is not a game of gotcha, its about finding ways to set goals rather
than focus on mistakes.
Among
these
Agile
methodologies
mentioned
we
shall
look
at
XP
(Extreme
Programming) in detail, as this is the most commonly used and popular one.
The basic components of the XP practices are:
Pair Programming
Refactoring
User Stories
Acceptance Testing
Test-First Programming
Developers write unit tests before coding. It has been noted that this kind of
approach motivates the coding, speeds coding and also and improves design
results in better designs (with less coupling and more cohesion)
http://www.SofTReL.org
93 of 142
Many open source tools like xUnit have been developed to support this
methodology.
Refactoring
Traditional development tries to understand how all the code will work
together in advance. This is the design. With agile methods, this difficult
process of imagining what code might look like before it is written is
avoided. Instead, the code is restructured as needed to maintain a
coherent design. Frequent refactoring allows less up-front planning of
design.
Agile
methods
replace
high-level
design
with
frequent
redesign
Make the simplest design that will work and add complexity only when
needed and refactor as necessary.
Acceptance Testing
http://www.SofTReL.org
94 of 142
With all these features and process included we can define a practice for Agile testing
encompassing the following features.
Coaching Tests
Exploratory Learning
Looking deep into each of these practices we can describe each of them as:
Conversational Test Creation
Don't do it alone.
Coaching Tests
Tests should provide Goals and guidance, Instant feedback and Progress
measurement
Developers are responsible for providing the fixtures that automate coaching
tests
In most cases XP teams are adding test interfaces to their products, rather
than using external test tools
Test Interaction Model
http://www.SofTReL.org
95 of 142
Exploratory Learning
Plan to explore, learn and understand the product with each iteration.
We believe that Agile Testing is a major step forward. You may disagree. But regardless
Agile Programming is the wave of the future. These practices will develop and some of
the extreme edges may be worn off, but its only growing in influence and attraction.
Some testers may not like it, but those who dont figure out how to live with it are
simply going to be left behind.
Some testers are still upset that they dont have the authority to block the release. Do
they think that they now have the authority to block the adoption of these new
development methods? Theyll need to get on this ship and if they want to try to keep it
from the shoals. Stay on the dock if you wish. Bon Voyage!
96 of 142
Testing APIs requires a thorough knowledge of its inner workings - Some APIs may
interact with the OS kernel, other APIs, with other software to offer their
functionality. Thus an understanding of the inner workings of the interface
would help in analyzing the call sequences and detecting the failures caused.
Adequate programming skills - API tests are generally in the form of sequences of
calls, namely, programs. Each tester must possess expertise in the programming
language(s) that are targeted by the API. This would help the tester to review and
scrutinize the interface under test when the source code is available.
Lack of Domain knowledge Since the testers may not be well trained in using
the API, a lot of time might be spent in exploring the interfaces and their usage.
This problem can be solved to an extent by involving the testers from the initial
stage of development. This would help the testers to have some understanding
on the interface and avoid exploring while testing.
http://www.SofTReL.org
97 of 142
and usage scenarios. Hence having proper documentation would help test
designer design the tests faster.
Access to source code The availability of the source code would help tester to
understand and analyze the implementation mechanism used; and can identify
the loops or vulnerabilities that may cause errors. Thus if the source code is not
available then the tester does not have a chance to find anomalies that may
exist in the code.
Testing of API calls can be done in isolation or in Sequence to vary the order in which
the functionality is exercised and to make the API produce useful results from these
tests. Designing tests is essentially designing sequences of API calls that have a
potential of satisfying the test objectives. This in turn boils down to designing each call
with specific parameters and to building a mechanism for handling and evaluating
return values.
Thus designing of the test cases can depend on some of the general questions like
What combination will cause a failure, a bad return value, or an anomaly in the
operating environment?
http://www.SofTReL.org
98 of 142
3. Determining the content under which an API call is made. This might include
setting external environment conditions (files, peripheral devices, and so forth) and
also internal stored data that affect the API.
4. Sequencing API calls to vary the order in which the functionality is exercised and to
make the API produce useful results from successive calls.
By analyzing the problems listed above, a strategy needs to be formulated for testing the
API. The API to be tested would require some environment for it to work. Hence it is
required that all the conditions and prerequisites understood by the tester. The next
step would be to identify and study its points of entry. The GUIs would have items like
menus, buttons, check boxes, and combo lists that would trigger the event or action to
be taken. Similarly, for APIs, the input parameters, the events that trigger the API
would act as the point of entry. Subsequently, a chief task is to analyze the points of
entry as well as significant output items. The input parameters should be tested with
the valid and invalid values using strategies like the boundary value analysis and
equivalence partitioning. The fourth step is to understand the purpose of the routines,
the contexts in which they are to be used. Once all this parameter selections and
combinations are designed, different call sequences need to be explored.
The steps can be summarized as following
1. Identify the initial conditions required for testing.
2. Identify the parameters Choosing the values of individual parameters.
3. Identify the combination of parameters pick out the possible and applicable
parameter combinations with multiple parameters.
4. Identify the order to make the calls deciding the order in which to make the calls
to force the API to exhibit its functionality.
5. Observe the output.
1.Identify the initial condition:
The testing of an API would depend largely on the environment in which it is to be
tested. Hence initial condition plays a very vital role in understanding and verifying the
behavior of the API under test. The initial conditions for testing APIs can be classified as
Mandatory pre-setters.
Behavioral pre-setters.
http://www.SofTReL.org
99 of 142
Mandatory Pre-setters
The execution of an API would require some minimal state, environment. These type of
initial conditions are classified under the mandatory initialization (Mandatory presetters) for the API. For example, a non-static member function API requires an object
to be created before it could be called. This is an essential activity required for invoking
the API.
Behavioral pre-setters
To test the specific behavior of the API, some additional environmental state is required.
These types of initial conditions are called the behavioral pre-setters category of Initial
condition. These are optional conditions required by the API and need to be set before
invoking the API under test thus influencing its behavior. Since these influence the
behavior of the API under test, they are considered as additional inputs other than the
parameters
Thus to test any API, the environment required should also be clearly understood and
set up. Without these criteria, API under test might not function as required and leave
the testers job undone.
2.Input/Parameter Selection: The list of valid input parameters need to be identified
to verify that the interface actually performs the tasks that it was designed for. While
there is no method that ensures this behavior will be tested completely, using inputs
that return quantifiable and verifiable results is the next best thing. The different
possible input values (valid and invalid) need to be identified and selected for testing.
The techniques like the boundary values analysis and equivalence-partitioning need to
be used while trying to consider the input parameter values. The boundary values or
the limits that would lead to errors or exceptions need to be identified. It would also be
helpful if the data structures and other components that use these data structures
apart from the API are analyzed. The data structure can be loaded by using the other
components and the API can be tested while the other component is accessing these
data structures. Verify that all other dependent components functionality are not
affected while the API accesses and manipulates the data structures
http://www.SofTReL.org
100 of 142
The availability of the source code to the testers would help in analyzing the various
inputs values that could be possible for testing the API. It would also help in
understanding the various paths which could be tested. Therefore, not only are testers
required to understand the calls, but also all the constants and data types used by the
interface.
3. Identify the combination of parameters: Parameter combinations are extremely
important for exercising stored data and computation. In API calls, two independently
valid values might cause a fault when used together which might not have occurred
with the other combinational values. Therefore, a routine called with two parameters
requires selection of values for one based on the value chosen for the other. Often the
response of a routine to certain data combinations is incorrectly programmed due to the
underlying complex logic.
The API needs to be tested taking into consideration the combination of different
parameter. The number of possible combinations of parameters for each call is typically
large. For a given set of parameters, if only the boundary values have been selected, the
number of combinations, while relatively diminished, may still be prohibitively large.
For example, consider an API which takes three parameters as input. The various
combinations of different values for the input values and their combinations needs to be
identified.
Parameter combination is further complicated by the function overloading capabilities
of many modern programming languages. It is important to isolate the differences
between such functions and take into account that their use is context driven. The APIs
can also be tested to check that there are no memory leaks after they are called. This
can be verified by continuously calling the API and observing the memory utilization.
4.Call Sequencing: When combinations of possible arguments to each individual call
are unmanageable, the number of possible call sequences is infinite. Parameter
selection and combination issues further complicate the problem call-sequencing
problem. Faults caused by improper call sequences tend to give rise to some of the most
dangerous problems in software. Most security vulnerabilities are caused by the
execution of some such seemingly improbable sequences.
5.Observe the output: The outcome of an execution of an API depends upon the
behavior of that API, the test condition and the environment. The outcome of an API can
http://www.SofTReL.org
101 of 142
be at different ways i.e., some could generally return certain data or status but for some
of the API's, it might not return or shall be just waiting for a period of time, triggering
another event, modifying certain resource and so on.
The tester should be aware of the output that needs to be expected for the API under
test. The outputs returned for various input values like valid/invalid, boundary values
etc needs to be observed and analyzed to validate if they are as per the functionality. All
the error codes returned and exceptions returned for all the input combinations should
be evaluated.
API Testing Tools: There are many testing tools available. Depending on the level of
testing required, different tools could be used. Some of the API testing tools available
are mentioned here.
JVerify: This is from Man Machine Systems.
JVerify is a Java class/API testing tool that supports a unique invasive testing model.
The invasive model allows access to the internals (private elements) of any Java object
from within a test script. The ability to invade class internals facilitates more effective
testing at class level, since controllability and observability are enhanced. This can be
very valuable when a class has not been designed for testability.
JavaSpec: JavaSpec is a SunTest's API testing tool. It can be used to test Java
applications and libraries through their API. JavaSpec guides the users through the
entire test creation process and lets them focus on the most critical aspects of testing.
Once the user has entered the test data and assertions, JavaSpec automatically
generates self-checking tests, HTML test documentation, and detailed test reports.
Here is an example of how to automate the API testing.
Assumptions: 1. Test engineer is supposed to test some API.
2. The APIs are available in form of library (.lib).
3. Test engineer has the API document.
There are mainly two things to test in API testing: 1. Black box testing of the APIs
2. Interaction / integration testing of the APIs.
By black box testing of the API mean that we have to test the API for outputs. In simple
words when we give a known input (parameters to the API) then we also know the ideal
output. So we have to check for the actual out put against the idle output.
http://www.SofTReL.org
102 of 142
For this we can write a simple c program that will do the following: a) Take the parameters from a text file (this file will contain many of such
input parameters).
b) Call the API with these parameters.
c) Match the actual and idle output and also check the parameters for good
values that are passed with reference (pointers).
d) Log the result.
Secondly we have test the integration of the APIs.
For example there are two APIs say
Handle h = handle createcontext (void);
When the handle to the device is to be closed then the corresponding function
Bool bishandledeleted = bool deletecontext (handle &h);
Here we have to call the two APIs and check if they are handled by the created
createcontext () and are deleted by the deletecontext ().
This will ensure that these two APIs are working fine.
For this we can write a simple c program that will do the following: a) Call the two APIs in the same order.
b) Pass the output parameter of the first as the input of the second
c) Check for the output parameter of the second API
d) Log the result.
The example is over simplified but this works because we are using this kind of test tool
for extensive regression testing of our API library.
103 of 142
People
Dynamic Testing
There is a need for people who can handle the pressure of tight schedules. They need to
be productive contributors even through the early phases of the development life cycle.
According to James Bach, a core skill is the ability to think critically.
It should also be noted that dynamic testing lies at the heart of the software testing
process, and the planning, design, development, and execution of dynamic tests should
be performed well for any testing process to be efficient.
THE RAPID TESTING
PRACTICE
It would help us if we scrutinize each phase of a development process to see how the
efficiency, speed and quality of testing can be improved, bearing in mind the following
factors:
Actions that the test team can take to prevent defects from escaping. For
example, practices like extreme programming and exploratory testing.
Actions that the test team can take to manage risk to the development schedule.
The information that can be obtained from each phase so that the test team can
speed up the activities.
If a test process is designed around the answers to these questions, both the speed of
testing and the quality of the final product should be enhanced.
Some of the aspects that can be used while rapid testing are given below:
1. Test for link integrity
2. Test for disabled accessibility
3. Test the default settings
4. Check the navigations
http://www.SofTReL.org
104 of 142
at the sources of
data
6. Run Multiple instances
7. Check for interdependencies and stress them
8. Test for consistency of design
9. Test for compatibility
10. Test for usability
11. Check for the possible variabilitys and attack them
12. Go for possible stress and load tests
13. And our favorite banging the keyboard
http://www.SofTReL.org
105 of 142
http://www.SofTReL.org
106 of 142
18.1.10
Ideally each software developed must satisfy the set of requirements completely. So,
right from design, each requirement must be addressed in every single document in the
software process. The documents include the HLD, LLD, source codes, unit test cases,
integration test cases and the system test cases. Refer the following sample table which
describes Requirements Traceability Matrix process. In this matrix, the rows will have
the requirements. For every document {HLD, LLD etc}, there will be a separate column.
So, in every cell, we need to state, what section in HLD addresses a particular
requirement. Ideally, if every requirement is addressed in every single document, all the
individual cells must have valid section ids or names filled in. Then we know that every
requirement is addressed. In case of any missing of requirement, we need to go back to
the document and correct it, so that it addressed the requirement.
For testing at each level, we may have to address the requirements. One integration and
the system test case may address multiple requirements.
DTP Scenario
http://www.SofTReL.org
DTC Id
Code
LLD Section
107 of 142
Requirement
Requirement
Requirement
Requirement
Requirement
18.1.11
No
+ve/-ve
+ve/-ve
+ve/-ve
+ve/-ve
1,2,3,4
1,2,3,4
1,2,3,4
1,2,3,4
+ve/-ve
TESTER
1,2,3,4
TESTER
1
2
3
4
DEVELOPER
TEST LEAD
Test Summary
The senior management may like to have test summary on a weekly or monthly basis. If
the project is very critical, they may need it on a daily basis also. This section must
address what kind of test summary reports will be produced for the senior management
along with the frequency.
The test strategy must give a clear vision of what the testing team will do for the whole
project for the entire duration. This document will/may be presented to the client also,
if needed. The person, who prepares this document, must be functionally strong in the
product domain, with a very good experience, as this is the document that is going to
drive the entire team for the testing activities. Test strategy must be clearly explained to
the testing team members tight at the beginning of the project.
http://www.SofTReL.org
108 of 142
tells the completion criteria of that phase, after the validation is done. For example, the
exit criterion for unit testing is all unit test cases must pass.
ETVX is a modeling technique for developing worldly and atomic level models. It sands
for Entry, Task, Verification and Exit. It is a task-based model where the details of each
task are explicitly defined in a specification table against each phase i.e. Entry, Exit,
Task, Feedback In, Feedback Out, and measures.
There are two types of cells, unit cells and implementation cells. The implementation
cells are basically unit cells containing the further tasks.
For example if there is a task of size estimation, then there will be a unit cell of size
estimation. Then since this task has further tasks namely, define measures, estimate
size. The unit cell containing these further tasks will be referred to as the
implementation cell and a separate table will be constructed for it.
A purpose is also stated and the viewer of the model may also be defined e.g. top
management or customer.
18.2.1 Unit Test Plan {UTP}
The unit test plan is the overall plan to carry out the unit test activities. The lead tester
prepares it and it will be distributed to the individual testers, which contains the
following sections.
18.2.1.1
What is to be tested?
The unit test plan must clearly specify the scope of unit testing. In this, normally the
basic input/output of the units along with their basic functionality will be tested. In
this case mostly the input units will be tested for the format, alignment, accuracy and
the totals. The UTP will clearly give the rules of what data types are present in the
system, their format and their boundary conditions. This list may not be exhaustive;
but it is better to have a complete list of these details.
18.2.1.2Sequence of Testing
The sequences of test activities that are to be carried out in this phase are to be listed in
this section. This includes, whether to execute positive test cases first or negative test
cases first, to execute test cases based on the priority, to execute test cases based on
test groups etc. Positive test cases prove that the system performs what is supposed to
do; negative test cases prove that the system does not perform what is not supposed to
do. Testing the screens, files, database etc., are to be given in proper sequence.
http://www.SofTReL.org
109 of 142
ETVX criteria
What is to be tested?
This section clearly specifies the kinds of interfaces fall under the scope of testing
internal, external interfaces, with request and response is to be explained. This need
not go deep in terms of technical details but the general approach how the interfaces
are triggered is explained.
18.2.2.1Sequence of Integration
When there are multiple modules present in an application, the sequence in which they
are to be integrated will be specified in this section. In this, the dependencies between
the modules play a vital role. If a unit B has to be executed, it may need the data that is
fed by unit A and unit X. In this case, the units A and X have to be integrated and then
using that data, the unit B has to be tested. This has to be stated to the whole set of
units in the program. Given this correctly, the testing activities will lead to the product,
slowly building the product, unit by unit and then integrating them.
18.2.2.2
There may be N number of units in the application, but the units that are going to
communicate with each other, alone are tested in this phase. If the units are designed
in such a way that they are mutually independent, then the interfaces do not come into
picture. This is almost impossible in any system, as the units have to communicate to
other units, in order to get different types of functionalities executed. In this section, we
http://www.SofTReL.org
110 of 142
need to list the units and for what purpose it talks to the others need to be mentioned.
This will not go into technical aspects, but at a higher level, this has to be explained in
plain English.
Apart from the above sections, the following sections are addressed, very specific to
integration testing.
ETVX criteria
111 of 142
ETVX criteria
Build/Refresh criteria
112 of 142
113 of 142
16. RESOURCES
17. RISKS & CONTINGENCIES
18. APPROVALS
The schedule details of the various test pass such as Unit tests, Integration tests,
System Tests should be clearly mentioned along with the estimated efforts.
http://www.SofTReL.org
114 of 142
analysis of requirements, use cases, and technical specifications, and they should be
developed in parallel with the software development effort.
A test case describes a set of actions to be performed and the results that are expected.
A test case should target specific functionality or aim to exercise a valid path through a
use case. This should include invalid user actions and illegal inputs that are not
necessarily listed in the use case. A test case is described depends on several factors,
e.g. the number of test cases, the frequency with which they change, the level of
automation employed, the skill of the testers, the selected testing methodology, staff
turnover, and risk.
The test cases will have a generic format as below.
Test case ID - The test case id must be unique across the application
Test case description - The test case description must be very brief.
Test prerequisite - The test pre-requisite clearly describes what should be present in
the system, before the test can be executes.
Test Inputs - The test input is nothing but the test data that is prepared to be fed to
the system.
Test steps - The test steps are the step-by-step instructions on how to carry out the
test.
Expected Results - The expected results are the ones that say what the system must
give as output or how the system must react based on the test steps.
Actual Results The actual results are the ones that say outputs of the action for the
given inputs or how the system reacts for the given inputs.
Pass/Fail - If the Expected and Actual results are same then test is Pass otherwise Fail.
The test cases are classified into positive and negative test cases. Positive test cases are
designed to prove that the system accepts the valid inputs and then process them
correctly. Suitable techniques to design the positive test cases are Specification derived
tests, Equivalence partitioning and State-transition testing. The negative test cases are
designed to prove that the system rejects invalid inputs and does not process them.
Suitable techniques to design the negative test cases are Error guessing, Boundary
value analysis, internal boundary value testing and State-transition testing. The test
cases details must be very clearly specified, so that a new person can go through the
test cases step and step and is able to execute it. The test cases will be explained with
specific examples in the following section.
http://www.SofTReL.org
115 of 142
For example consider online shopping application. At the user interface level the client
request the web server to display the product details by giving email id and Username.
The web server processes the request and will give the response. For this application we
will design the unit, Integration and system test cases.
116 of 142
Test Prerequisite: The user should have access to Customer Login screen form screen
Negative Test Case
Project Name-Online shopping
Version-1.1
Module-Catalog
T
Description
Test Inputs
Expected Results
est
#
1
Email=keerthi@redif
values
fmail
be
in
field
Username=Xavier
accepted.
should
valid Email
Inputs should not
values
mail.com
be
Username=John
should
field
accepted.
Email=shilpa@yahoo
values in Username
.com
field
Username=Mark24
It
display
message
3
il
Enter
Email=john26#rediff
results
It
Pass/Fa
display
message
2
Actual
Enter
valid Email
Inputs should not
be
accepted.
should
It
display
message
Enter
correct Username
Positive Test Case
Test
#
1
Description
Test Inputs
Expected
Actual
results
Results
Inputs
inputting values in
Username=dave
should
Email field
Check
accepted.
Inputs
inputting values in
should
Email field
Username=john
accepted.
Inputs
Username=mark
should
Check
Check
for
for
for
inputting values in
Username field
http://www.SofTReL.org
be
be
be
accepted.
117 of 142
Pass/Fail
Description
Test Inputs
#
1
Enter
Screen
and UserName.
values
in
Expected
Actual
Results
Inputs
should
results
be accepted.
For Eg:
Email
[email protected]
Backend
Username=shilpa
Select email, username
The
Verification
from Cus;
entered
and
Username
Check
for
Product
Information
should
be
displayed
at
sqlprompt.
It
should
link
display
complete details
of the product
http://www.SofTReL.org
118 of 142
Pass/Fail
Inputs
screen
Id
be accepted.
and
Product
name
should
fields.
For Eg:
Product Id-245
Product
name-Norton
Backend
Antivirus
Select pid , pname from
The
verification
Product;
Product id and
Product
entered
name
should
be
displayed at the
sql prompt.
NOTE: The tester has to execute above unit and Integration test cases after
coding. And He/She has to fill the actual results and Pass/fail columns. If the test
cases fail then defect report should be prepared.
System Test Cases: The system test cases meant to test the system as per the requirements; end-to end.
This is basically to make sure that the application works as per SRS. In system test
cases, (generally in system testing itself), the testers are supposed to act as an end
user. So, system test cases normally do concentrate on the functionality of the system,
inputs are fed through the system and each and every check is performed using the
system itself. Normally, the verifications done by checking the database tables directly
or running programs manually are not encouraged in the system test.
The system test must focus on functional groups, rather than identifying the program
units. When it comes to system testing, it is assume that the interfaces between the
modules are working fine (integration passed).
Ideally the test cases are nothing but a union of the functionalities tested in the unit
testing and the integration testing. Instead of testing the system inputs outputs through
database or external programs, everything is tested through the system itself. For
example, in a online shopping application, the catalog and administration screens
(program units) would have been independently unit tested and the test results would
be verified through the database. In system testing, the tester will mimic as an end user
and hence checks the application through its output.
http://www.SofTReL.org
119 of 142
There are occasions, where some/many of the integration and unit test cases are
repeated in system testing also; especially when the units are tested with test stubs
before and not actually tested with other real modules, during system testing those
cases will be performed again with real modules/data in
Incorrect output
But as for a test engineer all are same as the above definition is only for the purpose of
documentation or indicative.
However, the above is a broad categorization; below we have for you a host of varied
types of defects that can be identified in different software applications:
http://www.SofTReL.org
120 of 142
19.
Hardware Errors
20.
21.
Documentation Errors
22.
Testing Errors
Submit Defect
Update Defect
http://www.SofTReL.org
Assign
Fix/Change
Review, Verify
and Qualify
Validate
Duplicate,
Reject or More
Info
Close
121 of 142
Cancel
Schedule,
Work Effort,
Product Size,
Quality Performance
Measuring enables.
Metrics enables estimation of future work.
That is, considering the case of testing - Deciding the product is fit for shipment or
delivery depends on the rate the defects are found and fixed. Defect collected and fixed
is one kind of metric. (www.processimpact.com)
As defined in the MISRA Report,
It is beneficial to classify metrics according to their usage. IEEE 928.1 [4] identifies two
classes:
i)
ii)
Defects are analyzed to identify which are the major causes of defect and which is the
phase that introduces most defects. This can be achieved by performing Pareto analysis
of defect causes and defect introduction phases. The main requirements for any of these
analysis is Software Defect Metrics.
Few of the Defect Metrics are:
Defect Density: (No. Of Defects Reported by SQA + No. Defects Reported By Peer
Review)/Actual Size.
The Size can be in KLOC, SLOC, or Function Points. The method used in the
Organization to measure the size of the Software Product.
The SQA is considered to be the part of the Software testing team.
http://www.SofTReL.org
122 of 142
Test effectiveness:
and Uat = total no. of defects reported during User acceptance testing
User Acceptance Testing is generally carried out using the Acceptance Test Criteria
according to the Acceptance Test Plan.
Defect Removal Efficiency:
(Total No Of Defects Removed /Total No. Of Defects Injected)*100 at various stages of
SDLC
Description
This metric will indicate the effectiveness of the defect identification and removal in
stages for a given project
Formula
Overall: DRE = [(Total defects corrected at all phases before delivery) / (Total
defects detected at all phases before and after delivery)] * 100
Metric Representation
Percentage
Calculated at
Stage completion or Project Completion
Calculated from
Bug Reports and Peer Review Reports
Defect Distribution:
Analysis, Design Reviews, Code Reviews, Unit Tests, Integration Tests, System Tests,
User Acceptance Tests, Review by Project Leads and Project Managers.
Software Process Metrics are measures which provide information about the
performance of the development process itself.
Purpose:
http://www.SofTReL.org
123 of 142
2.
3.
Derived Metrics
1.
2.
Project Management
Metrics Collected
1. Planned No. of days
Derived Metrics
1. Schedule Variance
1. Effort Variance
2. Actual Effort
1. Estimated Cost
1. Cost Variance
2. Actual Cost
1. Estimated Size
1. Size Variance
2. Actual Size
Testing & Review
Metrics Collected
1.
2.
3.
4.
Derived Metrics
1. Overall Review Effectiveness (ORE)
2. Overall Test Effectiveness
Peer Reviews
Metrics Collected
http://www.SofTReL.org
124 of 142
1.
2.
3.
4.
5.
6.
7.
8.
9.
125 of 142
Metric Representation
Percentage
Calculated at
Stage completion
Calculated from
Software Project Plan for planned number of days for completing each stage and for
actual number of days taken to complete each stage
Defect Removal Efficiency (DRE)
Description
This metric will indicate the effectiveness of the defect identification and removal in
stages for a given project
Formula
Overall: DRE = [(Total defects corrected at all phases before delivery) / (Total
defects detected at all phases before and after delivery)] * 100
Metric Representation
Percentage
Calculated at
Stage completion or Project Completion
Calculated from
Bug Reports and Peer Review Reports
Overall Review Effectiveness
Description
This metric will indicate the effectiveness of the Review process in identifying the
defects for a given project
Formula
http://www.SofTReL.org
126 of 142
Metric Representation
Percentage
Calculated at
Monthly
Calculated from
Test Reports
Metric Representation
Percentage
Calculated at
Monthly
Calculated from
Test Reports
Metric Representation
Percentage
Calculated at
http://www.SofTReL.org
127 of 142
Calculated from
Estimation sheets for estimated values in person hours, for each activity
within a given stage and Actual Worked Hours values in person hours.
Metric Representation
Percentage
Calculated at
Stage completion
Calculated from
Estimation sheets for estimated values in dollars or rupees, for each activity
within a given stage
Size Variance
Description
This metric gives the variation of actual size Vs. the estimated size. This is
calculated for each project stage wise
Formula
Metric Representation
Percentage
Calculated at
Stage completion
Project Completion
Calculated from
Actual size
128 of 142
This metric will indicate the effort spent on preparation for Review. Use this to
calculate for languages used in the Project
Formula
For every language (such as C, C++, Java, XSL, etc) used, calculate
Calculated at
Monthly
Build completion
Calculated from
Metric Representation
Calculated at
Monthly
Completion of Review
Calculated from
Metric Representation
Ratio
Calculated at
http://www.SofTReL.org
129 of 142
Monthly
Completion of Review
Calculated from
Review Effectiveness
Description
This metric will indicate the effectiveness of the Review process
Formula
Review Effectiveness = [(Number of defects found by Reviews) / ((Total number of
defects found by reviews) + Testing)] * 100
Metric Representation
Percentage
Calculated at
Calculated from
Calculated at
Completion of Reviews
Calculated from
http://www.SofTReL.org
130 of 142
This metric will indicate the effort expended in each stage for reviews to the defects
found
Formula
Metric Representation
Calculated at
Completion of Reviews
Calculated from
Metric Representation
Percentage
Calculated at
Calculated from
Change Request
http://www.SofTReL.org
131 of 142
Metric Representation
Number
Calculated at
Stage completion
Calculated from
Change Request
Metric Representation
Number
Calculated at
Stage completion
Calculated from
SRS
Detail Design
Metric Representation
Number
Calculated at
Stage completion
Calculated from
SRS
http://www.SofTReL.org
132 of 142
Detail Design
Number of Requirements
Metric Representation
Number
Calculated at
Stage completion
Calculated from
SRS
Detail Design
Number of Requirements
Metric Representation
Number
Calculated at
Stage completion
Calculated from
SRS
133 of 142
Number of Defects
Metric Representation
Number
Calculated at
Stage completion
Calculated from
Bug Report
Number of Defects
Stage of origin
Stage of detection
Stage of removal
Metric Representation
Number
Calculated at
Stage completion
Calculated from
Bug Report
Defect Density
Description
This metric provides the analysis on the number of defects to the size of the work
product
Formula
Defect Density = [Total no. of Defects / Size (FP / KLOC)] * 100
Metric Representation
Percentage
Calculated at
Stage completion
Calculated from
http://www.SofTReL.org
134 of 142
Defects List
Bug Report
Duration
Complexity
Technology Constraints
Business Domain
One interesting and useful approach to arrive at the suitable metrics is using the
Goal-Question-Metric Technique.
As evident from the name, the GQM model consists of three layers; a Goal, a Set of
Questions, and lastly a Set of Corresponding Metrics. It is thus a hierarchical
structure starting with a goal (specifying purpose of measurement, object to be
measured, issue to be measured, and viewpoint from which the measure is taken).
The goal is refined into several questions that usually break down the issue into its
major components. Each question is then refined into metrics, some of them
objective, some of them subjective. The same metric can be used in order to answer
different questions under the same goal. Several GQM models can also have
questions and metrics in common, making sure that, when the measure is actually
taken, the different viewpoints are taken into account correctly (i.e., the metric
might have different values when taken from different viewpoints).
In
order
to
give
an
example
of
application
of
the
model:
Question
viewpoint
What is the current Change Request
Metric
Processing Speed?
Average Cycle Time
Standard Deviation
http://www.SofTReL.org
135 of 142
Question
Metric
improving?
Current average cycle time
Baseline average cycle time
100
Subjective rating of manager's satisfaction
http://www.SofTReL.org
136 of 142
References
http://www.SofTReL.org
137 of 142
138 of 142
translation to a variety of formats suitable for input to text formatters. A copy made in
an otherwise Transparent file format whose markup, or absence of markup, has been
arranged to thwart or discourage subsequent modification by readers is not
Transparent. An image format is not Transparent if used for any substantial amount of
text. A copy that is not "Transparent" is called "Opaque".
Examples of suitable formats for Transparent copies include plain ASCII without
markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly
available DTD, and standard-conforming simple HTML, PostScript or PDF designed for
human modification. Examples of transparent image formats include PNG, XCF and
JPG. Opaque formats include proprietary formats that can be read and edited only by
proprietary word processors, SGML or XML for which the DTD and/or processing tools
are not generally available, and the machine-generated HTML, PostScript or PDF
produced by some word processors for output purposes only.
The "Title Page" means, for a printed book, the title page itself, plus such following
pages as are needed to hold, legibly, the material this License requires to appear in the
title page. For works in formats which do not have any title page as such, "Title Page"
means the text near the most prominent appearance of the work's title, preceding the
beginning of the body of the text.
A section "Entitled XYZ" means a named subunit of the Document whose title either is
precisely XYZ or contains XYZ in parentheses following text that translates XYZ in
another language. (Here XYZ stands for a specific section name mentioned below, such
as "Acknowledgements", "Dedications", "Endorsements", or "History".) To "Preserve the
Title" of such a section when you modify the Document means that it remains a section
"Entitled XYZ" according to this definition.
The Document may include Warranty Disclaimers next to the notice which states that
this License applies to the Document. These Warranty Disclaimers are considered to be
included by reference in this License, but only as regards disclaiming warranties: any
other implication that these Warranty Disclaimers may have is void and has no effect
on the meaning of this License.
2. VERBATIM COPYING
You may copy and distribute the Document in any medium, either commercially or
noncommercially, provided that this License, the copyright notices, and the license
notice saying this License applies to the Document are reproduced in all copies, and
that you add no other conditions whatsoever to those of this License. You may not use
technical measures to obstruct or control the reading or further copying of the copies
you make or distribute. However, you may accept compensation in exchange for copies.
If you distribute a large enough number of copies you must also follow the conditions in
section 3.
You may also lend copies, under the same conditions stated above, and you may
publicly display copies.
3. COPYING IN QUANTITY
If you publish printed copies (or copies in media that commonly have printed covers) of
the Document, numbering more than 100, and the Document's license notice requires
Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all
these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the
back cover. Both covers must also clearly and legibly identify you as the publisher of
these copies. The front cover must present the full title with all words of the title equally
prominent and visible. You may add other material on the covers in addition. Copying
with changes limited to the covers, as long as they preserve the title of the Document
and satisfy these conditions, can be treated as verbatim copying in other respects.
If the required texts for either cover are too voluminous to fit legibly, you should put the
first ones listed (as many as fit reasonably) on the actual cover, and continue the rest
onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100,
you must either include a machine-readable Transparent copy along with each Opaque
copy, or state in or with each Opaque copy a computer-network location from which the
http://www.SofTReL.org
139 of 142
http://www.SofTReL.org
140 of 142
L. Preserve all the Invariant Sections of the Document, unaltered in their text
and in their titles. Section numbers or the equivalent are not considered part of
the section titles.
M. Delete any section Entitled "Endorsements". Such a section may not be
included in the Modified Version.
N. Do not retitle any existing section to be Entitled "Endorsements" or to conflict
in title with any Invariant Section.
O. Preserve any Warranty Disclaimers.
If the Modified Version includes new front-matter sections or appendices that qualify as
Secondary Sections and contain no material copied from the Document, you may at
your option designate some or all of these sections as invariant. To do this, add their
titles to the list of Invariant Sections in the Modified Version's license notice. These
titles must be distinct from any other section titles.
You may add a section Entitled "Endorsements", provided it contains nothing but
endorsements of your Modified Version by various parties--for example, statements of
peer review or that the text has been approved by an organization as the authoritative
definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up
to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified
Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be
added by (or through arrangements made by) any one entity. If the Document already
includes a cover text for the same cover, previously added by you or by arrangement
made by the same entity you are acting on behalf of, you may not add another; but you
may replace the old one, on explicit permission from the previous publisher that added
the old one.
The author(s) and publisher(s) of the Document do not by this License give permission
to use their names for publicity for or to assert or imply endorsement of any Modified
Version.
5. COMBINING DOCUMENTS
You may combine the Document with other documents released under this License,
under the terms defined in section 4 above for modified versions, provided that you
include in the combination all of the Invariant Sections of all of the original documents,
unmodified, and list them all as Invariant Sections of your combined work in its license
notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical
Invariant Sections may be replaced with a single copy. If there are multiple Invariant
Sections with the same name but different contents, make the title of each such section
unique by adding at the end of it, in parentheses, the name of the original author or
publisher of that section if known, or else a unique number. Make the same adjustment
to the section titles in the list of Invariant Sections in the license notice of the combined
work.
In the combination, you must combine any sections Entitled "History" in the various
original documents, forming one section Entitled "History"; likewise combine any
sections Entitled "Acknowledgements", and any sections Entitled "Dedications". You
must delete all sections Entitled "Endorsements."
6. COLLECTIONS OF DOCUMENTS
You may make a collection consisting of the Document and other documents released
under this License, and replace the individual copies of this License in the various
documents with a single copy that is included in the collection, provided that you follow
the rules of this License for verbatim copying of each of the documents in all other
respects.
You may extract a single document from such a collection, and distribute it individually
under this License, provided you insert a copy of this License into the extracted
http://www.SofTReL.org
141 of 142
document, and follow this License in all other respects regarding verbatim copying of
that document.
7. AGGREGATION WITH INDEPENDENT WORKS
A compilation of the Document or its derivatives with other separate and independent
documents or works, in or on a volume of a storage or distribution medium, is called an
"aggregate" if the copyright resulting from the compilation is not used to limit the legal
rights of the compilation's users beyond what the individual works permit. When the
Document is included in an aggregate, this License does not apply to the other works in
the aggregate which are not themselves derivative works of the Document.
If the Cover Text requirement of section 3 is applicable to these copies of the Document,
then if the Document is less than one half of the entire aggregate, the Document's Cover
Texts may be placed on covers that bracket the Document within the aggregate, or the
electronic equivalent of covers if the Document is in electronic form. Otherwise they
must appear on printed covers that bracket the whole aggregate.
8. TRANSLATION
Translation is considered a kind of modification, so you may distribute translations of
the Document under the terms of section 4. Replacing Invariant Sections with
translations requires special permission from their copyright holders, but you may
include translations of some or all Invariant Sections in addition to the original versions
of these Invariant Sections. You may include a translation of this License, and all the
license notices in the Document, and any Warranty Disclaimers, provided that you also
include the original English version of this License and the original versions of those
notices and disclaimers. In case of a disagreement between the translation and the
original version of this License or a notice or disclaimer, the original version will prevail.
If a section in the Document is Entitled "Acknowledgements", "Dedications", or
"History", the requirement (section 4) to Preserve its Title (section 1) will typically
require changing the actual title.
9. TERMINATION
You may not copy, modify, sublicense, or distribute the Document except as expressly
provided for under this License. Any other attempt to copy, modify, sublicense or
distribute the Document is void, and will automatically terminate your rights under this
License. However, parties who have received copies, or rights, from you under this
License will not have their licenses terminated so long as such parties remain in full
compliance.
10. FUTURE REVISIONS OF THIS LICENSE
The Free Software Foundation may publish new, revised versions of the GNU Free
Documentation License from time to time. Such new versions will be similar in spirit to
the present version, but may differ in detail to address new problems or concerns. See
http://www.gnu.org/copyleft/.
Each version of the License is given a distinguishing version number. If the Document
specifies that a particular numbered version of this License "or any later version"
applies to it, you have the option of following the terms and conditions either of that
specified version or of any later version that has been published (not as a draft) by the
Free Software Foundation. If the Document does not specify a version number of this
License, you may choose any version ever published (not as a draft) by the Free
Software Foundation.
http://www.SofTReL.org
142 of 142