Automatic and Methodical approach for Test Packet Generation
BEJJANKI PRADEEPKUMAR, D.RAVI KIRAN, , ,
Affiliations M.Tech (CSE), Priyadrshini Institute of Technology & ManagementProfessor (Dept.of CSE), Priyadrshini Institute of Technology & Management
Recently networks are growing wide and more complex. However administrators use tools like ping and
trace route to debug problems. Hence we proposed an automatic and Methodical approach for testing and debugging
networks called Automatic Test Packet Generation (ATPG). This approach gets router configurations and generates a
device-independent model. ATPG generate a few set of test packets to find every link in the network. Test packets are
forwarded frequently and it detect failures to localize the fault. ATPG can detect both functional and performance
(throughput, latency) problems. We found, less number of test packets is enough to test all rules in networks.
BEJJANKI PRADEEPKUMAR,D.RAVI KIRAN."Automatic and Methodical approach for Test Packet Generation". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 12,pp.1142-1146 , December- 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1258.pdf,
Keywords : Fault Localization, Test Packet Selection, Network Debugging, Automatic Test packet Generation (ATPG).
 Hongyi Zeng, Peyman Kazemian, George Varghese, ACM, and Nick McKeown, ACM,â€œAutomatic Test Packet Generationâ€.
 M. Jain, C. Dovrolis,â€œEnd-to-end available bandwidth: Measurement methodology, dynamics, and relation with TCP throughputâ€, IEEE/ACM Trans. Netw., Vol. 11, No. 4, pp. 537â€“549, Aug. 2003.
 Kompella, R. R., Greenberg, A., Rexford, J., Snoeren, A. C., Yates, J. Cross-layer Visibility as a Service", In Proc. of fourth workshop on Hot Topics in Networks (HotNet-IV) (2005)
 D. Maltz, G. Xie, J. Zhan, H. Zhang, G. Hjalmtysson, A. Greenberg,"Routing design in operational networks: A look from the inside", In Proc. ACM SIGCOMM, 2004.
 Mark Stemm, Randy Katz, Srinivasan Seshan,â€œA network measurement architecture for adaptive applicationsâ€, In Proceedings of the nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 285 - 294, 2000.
 Verma, D.,"Simplifying Network Administration using Policy based Management".
 P. Yalagandula, P. Sharma, S. Banerjee, S. Basu, S.-J. Lee, â€œS3: A scalable sensing service for monitoring large networked systems".
 Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest,"Introduction To Algorithms", Eastern Economy Edition.New Delhi: Prentice-Hall of India Private Limited 1998.
 E Balagurusamy,"Programming in ANSI C", Second edition. New Delhi: Tata McGraw-Hill, 1997.
 Deitel & Deitel, C++ How To Program, Second Edition, New Jersey, NJ Prentice Hall, 1997
 Tom Christiansen, Nathn Torkington,"Perl Cookbook: Solutions and Examples For Perl Programmers", 1st Edition, Sebastopol, CA: Oâ€™Reilly & Associates, Inc., 1999.
 Nathan Patwardhan, Ellen Siever and Stephen Spainhour, PERL In A Nutshell, 2nd Edition, Sebastopol, CA: Oâ€™Reilly & Associates, Inc., 2002.
 Tom Milligan, â€œUsing Perl With Rational ClearCase Automation Libraryâ€, 2004Retrieved Nov10, 2010 from
Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors.
News & Events
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞ LAST DATE OF SUBMISSION : 31st March 2023
☞ SUBMISSION TO FIRST DECISION : In 7 Days
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION
All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.