Comprehensive Approach for Cross Compatibility Testing of Website

Total Page:16

File Type:pdf, Size:1020Kb

Comprehensive Approach for Cross Compatibility Testing of Website National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing (RTMC) 2011 Proceedings published in International Journal of Computer Applications® (IJCA) Comprehensive Approach for Cross Compatibility Testing of Website Sanjay Dahiya1, Ved Parkash1, T.R. Mudgal2 1Lecturer, Deptt. of CSE, CDLM Govt. Engineering College, Panniwala - Mota (Sirsa) (Haryana) 2Lecturer, Deptt. of Physics, CDLM Govt. Engineering College, Panniwala - Mota (Sirsa) (Haryana) ABSTRACT testing and automated testing tools are extremely helpful in the testing Developing a website is one of the most challenging processes in of website with all dimensions. computer science and the instant worldwide audiences of any Web Browser Enabled Application make its quality and reliability crucial 2. GENERAL DIMENSIONS OF WEBSITE factors in its success. But the technical complexities of a website and QUALITY & RELIABILITY: variances in the browsers, operating systems, and devices make testing There are many dimensions of quality; each measure will pertain to a and quality control much more difficult and in some ways, more subtle, particular website in varying degrees. Here are some common measures than "conventional" client/server or non-web application. So which [2]: configuration should we test for our website, become a major ongoing Timeliness: websites change often and rapidly. How much challenging effort. Automated testing of websites is an opportunity and has a website changed since the last upgrade? How do we a challenge. The aim of this paper is to discuss the parameters that a highlight the parts that have changed? website should meet before its launching worldwide and suggest some cross browsers automated testing tools which help in website testing on Structural Quality: How well do all of the parts of the website various browsers, operating systems, and devices and meet technical hold together? Are all links inside and outside the website needs for assuring website quality. working? Do all of the images work? Are there parts of the website that are not connected?[3] Keywords: Web-testing, Web-browser, Web quality and reliability, Client/Server, Content: Does the content of critical pages match what is Compatibility Testing. supposed to be there? Do key phrases exist continually in highly-changeable pages? Do critical pages maintain quality 1. INTRODUCTION: content from version to version? What about dynamically Web testing is the name given to software testing that focuses on web generated HTML /DHTML pages? applications. Comprehensive testing of a web-based system before going live can help address issues before the system is revealed to the Accuracy and Consistency: Are today's copies of the pages public. Generally the websites are essentially client/server applications downloaded the same as yesterday's? Close enough? Is the with web servers and „browser‟ clients. Consideration should be given data presented to the user accurate enough? How do we to the interaction between html pages, TCP/IP communications, Internet know? connections, firewalls, application that run in web pages (such as applet, Response Time and Latency: Does the Website server JavaScript, plug-in application), and applications that run on the server respond to a browser request within certain performance side (such as cgi script, database interfaces, logging applications, parameters? In an e-commerce context, how is the end-to-end dynamic page generators, asp etc.)[5]. Web testing is done for 3 tier response time after a SUBMIT? Are there parts of a site that applications (developed for Internet/Intranet/Extranet). Here we will be are so slow the user discontinues working? [3] having browser, web server and Data Base server. The applications accessible in browser would be developed in HTML, DHTML, XML, Performance: Is the Browser --> Web --> ebSite --> Web --> JavaScript etc. Applications for the web server would be developed in Browser connection quick enough? How does the Java, ASP, JSP, VBScript, JavaScript, Perl, Cold Fusion, PHP performance vary by time of day, by load and usage? Is etc.[5][7]. All the manipulations are done on the web server with the performance adequate for e-commerce applications? Taking help of these programs developed. The Data Base-server would be 10 minutes -- or maybe even only 1 minute -- to respond to an having oracle, SQL server, Sybase, my-sql etc. All data is stored in the e-commerce purchase may be unacceptable! database available on the Data Base server. Also the issues such as the security of the web application, the basic 3. PARAMETERS OR WEB TESTING functionality of the site, its accessibility to users as well as readiness for expected traffic and number of users and the ability to survive a massive CHECKLIST THAT A WEBSITE MEET spike in user-traffic, Here we will discuss some parameters that a website should meet in its life span in concerned of its quality and reliability, both of which are related to load testing. One of the most challenging so that websites fulfill its objectives. processes is testing the site in wide array of different browser, operating systems, and devices. Gone are the days where all we needed to test in 3.1 Functionality Testing test for all the links in web was IE and Netscape, for displaying resolution of 600*800 via window pages, database connection, forms used in the web pages for submitting 98. Now we are taking dozens of browsers, handful operating systems, or getting information from user, Cookie testing [2]: and a mix of monitor resolutions [8]. With a wide variety of servers, Check all the links: browsers, operating systems and different devices, website Test the outgoing links from all the pages from specific domain under test. Test all internal links. Testing can become a major ongoing effort. So which dimensions Test links jumping on the same pages. should we test for our website is very challenging task. It is not possible Test links used to send the email to admin or other users from for us to test all the quality dimensions of the website manually. web pages. Therefore, automated testing plays a very important role in website Test to check if there are any orphan pages. 11 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing (RTMC) 2011 Proceedings published in International Journal of Computer Applications® (IJCA) Lastly in link checking, check for broken links in all above- browser compatibility testing of our web application. Test web mentioned links. application on different browsers like Internet explorer, Firefox, Test forms in all pages: Forms are the integral part of any Netscape navigator, AOL, Safari, Opera browsers with different web site. Forms are used to get information from users and to keep versions [3]. interaction with them. So what should be checked on these forms? [3] OS compatibility: Some functionality in our web First check all the validations on each field. application may not be compatible with all operating systems. All new Check for the default values of fields. technologies used in web development like graphics designs, interface Wrong inputs to the fields in the forms. call like different API‟s may not be available in all Operating Systems. Options to create forms if any, form delete, view or modify Test our web application on different operating systems like Windows, the forms. UNIX, MAC, Linux and Solaris with different OS flavors. Cookies testing: Cookies are small files stored on user Mobile browsing: This is a new technology era. So in machine. These are basically used to maintain the session mainly login future Mobile browsing will rock. Test web pages on mobile browsers. sessions. Test the application by enabling or disabling the cookies in our Compatibility issues may be there on mobile. browser options. Test if the cookies are encrypted before writing to user Printing options: If we are giving page-printing options machine. If we are testing the session cookies (i.e. cookies expire after then make sure fonts, page alignment and page graphics getting printed the session‟s ends) check for login sessions and user stats after session properly. Pages should be fit to paper size or as per the size mentioned end. Check effect on application security by deleting the cookies. in printing option. Validate our HTML/CSS: If we are optimizing our site for Search engines then HTML/CSS validation is very important. 3.5 Performance testing: Web application should Mainly validate the site for HTML syntax errors. Check if site is sustain to heavy load. Web performance testing should include Web crawlable to different search engines. Load Testing and Web Stress Testing. Test application performance on Database testing: Data consistency is very important in different internet connection speed. web application. Check for data integrity and errors while we edit, Web load testing: Test if many users are accessing or delete, modify the forms or do any DB related functionality. Check if all requesting the same page. Can system sustain in peak load times? Site the database queries are executing correctly, data is retrieved correctly should handle many simultaneous user requests, large input data from and also updated correctly. More on database testing could be load on users, Simultaneous connection to DB, heavy load on specific pages etc. Database; we will address this in web load or performance testing ] Stress testing: Generally stress means stretching the system below [2 . beyond its specification limits. Web stress testing is performed to break the site by giving stress and checked how system reacts to stress and 3.2 Usability Testing: how system recovers from crashes. Stress is generally given on input fields, login and sign up areas Test for navigation: Navigation means how the user surfs . the web pages, different controls like buttons, boxes or how user using the links on the pages to surf different pages. Usability testing includes: 3.6 Security Testing: Following are some test cases for Web site should be easy to use.
Recommended publications
  • Cache Files Detect and Eliminate Privacy Threats
    Award-Winning Privacy Software for OS X Every time you surf the web or use your computer, bits of Recover Disk Space data containing sensitive information are left behind that Over time, the files generated by web browsers can start could compromise your privacy. PrivacyScan provides to take up a large amount of space on your hard drive, protection by scanning for these threats and offers negatively impacting your computer’s performance. multiple removal options to securely erase them from PrivacyScan can locate and removes these space hogs, your system. freeing up valuable disk space and giving your system a speed boost in the process. PrivacyScan can seek and destroy internet files used for tracking your online whereabouts, including browsing history, cache files, cookies, search history, and more. Secure File Shredding Additionally, PrivacyScan can eliminate Flash Cookies, PrivacyScan utilizes advanced secure delete algorithms which are normally hidden away on your system. that meet and exceed US Department of Defense recommendations to ensure complete removal of Privacy Threat: Cookies sensitive data. Cookies can be used to track your usage of websites, determining which pages you visited and the length Intuitive Interface of time you spent on each page. Advertisers can use PrivacyScan’s award-winning design makes it easy to cookies to track you across multiple sites, building up track down privacy threats that exist on your system and a “profile” of who you are based on your web browsing quickly eliminate them. An integrated setup assistant and habits. tip system provide help every step of the way to make file cleaning a breeze.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • THE POWER of CLOUD COMPUTING COMES to SMARTPHONES Neeraj B
    THE POWER OF CLOUD COMPUTING COMES TO SMARTPHONES Neeraj B. Bharwani B.E. Student (Information Science and Engineering) SJB Institute of Technology, Bangalore 60 Table of Contents Introduction ............................................................................................................................................3 Need for Clone Cloud ............................................................................................................................4 Augmented Execution ............................................................................................................................5 Primary functionality outsourcing ........................................................................................................5 Background augmentation..................................................................................................................5 Mainline augmentation .......................................................................................................................5 Hardware augmentation .....................................................................................................................6 Augmentation through multiplicity .......................................................................................................6 Architecture ...........................................................................................................................................7 Snow Flock: Rapid Virtual Machine Cloning for Cloud Computing ........................................................
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Minnesota River Weekly Update April 15, 2009
    Minnesota River Weekly Update April 15, 2009 Not Your Typical Online Auction NICOLLET — Some may think farming and the Internet are two opposite ends of the technological spectrum, but Joe and Liza Domeier are proving they work well together. And profitably at that. They run Pehling Bay Farm near Nicollet. Joe’s mother grew up on the 30-acre property established by her grandfather. Liza was raised on a hog farm near St. Clair. The couple sells pasture-fed livestock and poultry, as well as fiber from their sheep flock. They are building a healthy business utilizing the Internet and direct marketing to draw buyers who are willing to pay premium prices for local grown products. The small acreage would pay like a part-time job if they attempted traditional row crop farming. So a different approach was chosen: raising pasture fed animals to sell to very select markets. Their sheep, hogs, chickens and beef are all pasture-fed, which may mean slower growth. However, Joe said it makes for healthier and more flavorful meats. They don’t sell meat or fiber retail or wholesale, only directly to customers. Direct marketing allows more money to be generated from the land. Their web site, www.pehlingbayfarm.com, advertises their meat and is a place where they can take product orders. In fact, most of their sales come via online sources. ―Direct marketing without the Internet is like not having a phone,‖ Joe said, ―And you reach a much larger audience.‖ Joe says he is able to get about twice the market price for lambs as he would at a sale barn.
    [Show full text]
  • Internet Explorer
    U.T.E. Università della Terza Età Bollate, Garbagnate Milanese e Novate Milanese INTERNET Ing. Giovanni Pozzi Internet Definizione: Generalmente definita «la rete delle reti» o semplicemente «rete»; è una rete di computer mondiale ad accesso pubblico attualmente rappresentante anche uno dei principali mezzi di comunicazione di massa. Internet - Programma Cenni storici. Navigazione. Posta Elettronica. Sicurezza Telefonare via Internet. Altri servizi. Cenni Storici 1957: 4 ottobre Cosmodromo di Baikonur Lancio del satellite SPUTNIK 1958: Il dipartimento della difesa Statunitense crea ARPA (Advanced Research Projects Agency) Che, nel 1969, crea ARPANET. Cenni Storici 1971: La rete ARPANET connette tra loro 23 computer 1973: La Gran Bretagna e la Norvegia si uniscono alla rete con un computer ciascuna. 1981: Nasce in Francia la rete Minitel. In breve tempo diventa la più grande rete di computer al di fuori degli USA 1982: Definizione del protocollo TCP/IP e della parola "Internet“ 1984: La rete conta ormai mille computer collegati 1986: In aprile, da Pisa, sede del Centro Nazionale Universitario di Calcolo Elettronico (Cnuce) viene realizzata la prima connessione Internet dall'Italia con gli Stati Uniti. 1987: Sono connessi 10 000 computer. Il 23 dicembre viene registrato “cnr.it”, il primo dominio con la denominazione geografica dell'Italia; è il sito del Consiglio Nazionale delle Ricerche. 1989: Sono connessi 100mila computer. Cenni Storici 1990: Scomparsa di ARPANET; apparizione del linguaggio HTML 1991: Il CERN (Centro Europeo
    [Show full text]
  • Web Browsers
    WEB BROWSERS Page 1 INTRODUCTION • A Web browser acts as an interface between the user and Web server • Software application that resides on a computer and is used to locate and display Web pages. • Web user access information from web servers, through a client program called browser. • A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web Page 2 FEATURES • All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window • A refresh and stop buttons for refreshing and stopping the loading of current documents • Home button that gets you to your home page • Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent Page 3 COMPONENTS OF WEB BROWSER 1. User Interface • this includes the address bar, back/forward button , bookmarking menu etc 1. Rendering Engine • Rendering, that is display of the requested contents on the browser screen. • By default the rendering engine can display HTML and XML documents and images Page 4 HISTROY • The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. • Microsoft responded with its browser Internet Explorer in 1995 initiating the industry's first browser war • Opera first appeared in 1996; although it have only 2% browser usage share as of April 2010, it has a substantial share of the fast-growing mobile phone Web browser market, being preinstalled on over 40 million phones.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Bitraser for File User Guide for Version 4
    BitRaser for File User Guide for Version 4 Legal Notices | About Stellar | Contact Us 1. General Information 1.1. About BitRaser for File BitRaser for File is a complete solution to maintain your computer privacy by erasing worthless yet sensitive information from your computer. Erased data is beyond recovery. BitRaser for File can be used to erase files/folders, Unused space, and System traces. BitRaser for File erases files & folders completely from hard drive. You can select multiple files/folders at a time for erasure. Once files / folders from the Drive are erased using BitRaser for File no one will ever be able to recover that data. The software allows you to generate and save the certificate for the successful erasure process. In addition, it can erase unused space completely such that all traces of previously stored data will be completely removed. When you delete data from hard drive, the data content is not deleted entirely, instead the space occupied by the data is marked as unused space and the new data is written on that unused space. BitRaser for File also erases all the system traces. Operating systems store records of all activities such as browsing Internet and opening documents constantly. In addition, deleted or formatted data leaves traces on hard drive. Data recovery software use these traces to recover data, making the hard drive inefficient. Extremely secure algorithms which confirm to the US Government DoD standards are used to ensure permanent data deletion. BitRaser for File can use any of the algorithms for erasure process. The software is menu driven, simple to use with an intuitive interface, and requires no prior technical skill.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • Getting Started with Ubuntu and Kubuntu
    Getting Started With Ubuntu and Kubuntu IN THIS PART Chapter 1 The Ubuntu Linux Project Chapter 2 Installing Ubuntu and Kubuntu Chapter 3 Installing Ubuntu and Kubuntu on Special-Purpose Systems COPYRIGHTED MATERIAL 94208c01.indd 1 3/16/09 11:43:23 PM 94208c01.indd 2 3/16/09 11:43:24 PM The Ubuntu Linux Project ersonal computers and their operating systems have come a long way since the late 1970s, when the first home computer hit the market. At IN THIS cHAPTER that time, you could only toggle in a program by flipping switches on the P Introducing Ubuntu Linux front of the machine, and the machine could then run that program and only that program until you manually loaded another, at which time the first program Choosing Ubuntu was kicked off the system. Today’s personal computers provide powerful graph- ics and a rich user interface that make it easy to select and run a wide variety of Reviewing hardware and software concurrently. software requirements The first home computer users were a community of interested people who just Using Ubuntu CDs wanted to do something with these early machines. They formed computer clubs and published newsletters to share their interests and knowledge ​— ​and often the Getting help with Ubuntu Linux software that they wrote for and used on their machines. Sensing opportunities and a growing market, thousands of computer companies sprang up to write and Getting more information sell specific applications for the computer systems of the day. This software ranged about Ubuntu from applications such as word processors, spreadsheets, and games to operating systems that made it easier to manage, load, and execute different programs.
    [Show full text]
  • Le Web Social Table Des Matières
    Le Web Social Table des matières 1 Web social 1 1.1 Historique ............................................... 1 1.2 L'évolution du web social ....................................... 1 1.2.1 Blogs et wiki ......................................... 1 1.2.2 L'art social .......................................... 2 1.2.3 Le crowdsourcing ...................................... 2 1.2.4 Le développement d'applications mobiles .......................... 2 1.2.5 Des projets de logiciels communautaires ........................... 2 1.3 Du web social à la vie réelle ..................................... 2 1.4 Bibliographie ............................................. 3 1.5 Notes et références .......................................... 3 1.6 Voir aussi ............................................... 3 2 Réseautage social 4 2.1 Histoire ................................................ 4 2.2 Applications .............................................. 4 2.3 Modèle économique ......................................... 5 2.3.1 Commerce des données ................................... 5 2.3.2 Vente d'espaces publicitaires ................................. 5 2.3.3 Cession des actifs ....................................... 5 2.4 Domaines d'application ........................................ 5 2.4.1 Réseaux internes versus réseaux externes ........................... 6 2.4.2 Services en ligne de réseautage professionnels ........................ 6 2.4.3 Réseaux sociaux d'amis de la vie réelle ............................ 6 2.4.4 Services en ligne d'ancien
    [Show full text]