overview

INon Functional Testing: Non-Functional Testing evaluates non-functional aspects of a system such as performance, scalability, usability, reliability.It assesses system properties that will not be critical to functionality but contribute to the end-user experience.

Non Functional Testing

Performance Testing

Performance testing is done to check the behavior and performance of DUT. It checks responsiveness, stability, scalability, reliability, throughput, and resource usage of DUT. This test is done using different tools for ex: Ixchariot, Veriwave,Iperf,Jperf We can analyze different KPIs, such as the number of virtual users, hits per second, response time, latency, and bytes per second (throughput) after running the test.

Endurance Testing

Endurance testing is done by running tests that run overnight or for several(7-15) days. Different types of traffic will be pushed between DUT and connected clients. The objective of this test is to find crashes,memory leaks,process restarts,cpu utilization which might not be observed in short duration tests.Also we can check the cpu utilization of DUT after the test run.

Security Testing

Security testing checks whether software is vulnerable to cyber attacks, and tests the impact of malicious or unexpected inputs on its operations. Security testing provides evidence that systems and information are safe and reliable, and that they do not accept unauthorized inputs.

It aims to uncover vulnerabilities, threats, and risks that could potentially cause harm to the software or its users. It's done with the purpose of evaluating the extent of protection required by a system and determining if the current level of security is enough, or if additional safeguards are needed

Main goals of security testing

Identify assets Things that need to be protected, such as software applications and computing infrastructure.

Identify threats and vulnerabilities : activities that can cause damage to an asset, or weaknesses in one or more assets that can be exploited by attackers.

Identify risk : security testing aims to evaluate the risk that specific threats or vulnerabilities will cause a negative impact to the business. Risk is evaluated by identifying the severity of a threat or vulnerability, and the likelihood and impact of exploitation.

Perform remediation : security testing is not just a passive evaluation of assets. It provides actionable guidance for remediating vulnerabilities discovered, and can verify that vulnerabilities were successfully fixed.

Key principles of security testing

Security testing aims to ensure that an organization’s systems, applications, and data upholds the following security principles:

Confidentiality – limiting access to sensitive access managed by a system.

Integrity – ensuring that data is consistent, accurate, and trustworthy throughout its lifecycle and cannot be modified by unauthorized entities.

Authentication – ensuring sensitive systems or data are protected by a mechanism that verifies the identity of the individual accessing them.

Authorization – ensuring sensitive systems or data properly control access for authenticated users according to their roles or permissions.

Availability – ensuring that critical systems or data are available for their users when they are needed.

What tools do we use for Wireless Security?

WIDS/WIPS: Wireless Intrusion detection & prevention System. In WIDS, a system of sensors is used to monitor the network for the intrusion of unauthorized devices, such as rogue access points. In a WIPS, the system not only detects unauthorized devices, but also takes steps to mitigate the threat by containing the device and detaching it from the wireless network

Postman : Using the Postman tool, we can analyze RESTful APIs made by others. Postman is an API(application programming interface) development tool that helps to build, test, and modify APIs. It has the ability to make various types of HTTP requests (POST, GET, PUT, PATCH, Delete)

Burp Tool: A Burp Suite is used to perform security tests for mobile applications via Burp Proxy. This enables us to intercept, view, and modify all the HTTP/S requests and responses processed by the app, and carry out penetration testing using Burp in the normal way

Nessus tool : Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network. It does this by running over 1200 checks on a given computer, testing to see if any of these attacks could be used to break into the computer or otherwise harm it.

Ostinato: Ostinato:

Usability testing

is focused on how usable a system is. The main focus is the experience of using the application. The application should be user-friendly. Usability testing is observing how users interact with—and how they respond to—your product. These days, usability testing can include

Types of usability testing for products include:

  • Visual design testing: gather insights about creatives, designs, videos, or other visual elements
  • System usability evaluations: measure a product or service’s ease of use
  • Card sorting: understand how contributors group content and label categories
  • Needs and frustrations discovery: identify opportunities to improve customer experiences or activities
  • Web/mobile/prototype evaluations: observe people using a pre-production product or experience

Scalability Testing

The objective of scalability testing is:

  • To determine how the application scales with increasing workload.
  • Scalability testing gauges how well an application or system performs at different user loads
  • Scalability testing will be performed at a hardware, software, or database level.
  • Parameters used for this testing differ from one application to the other, for a web page, it could be the number of users, CPU usage, and network usage, while for a web server it would be the number of requests processed.

Interoperability Testing

Types of usability testing for products include:

  • to test DUT from different manufacturer
  • to test the sub-module with the entire DUT
  • to test WLAN devices and LTE supported IoT devices or device having two wireless protocols

Endurance Testing

Endurance testing is done by running tests that run overnight or for several(7-15) days. Different types of traffic will be pushed between DUT and connected clients. The objective of this test is to find crashes,memory leaks,process restarts,cpu utilization which might not be observed in short duration tests.Also we can check the cpu utilization of DUT after the test run.

Range Vs Rate Testing

The objective of RvR testing is

  • Traffic that an AP can carry depending on the distance at which the WiFi client connects. In this way can evaluate the quality of the RF part of the APs.
  • This test will be performed in 2-ways at Lab in RF controlled environment and Field in range of coverage distance.

Reliability Testing

The objective of RvR testing is

  • To find the structure of repeating failures.
  • To find the number of failures occurring is the specific periodof time.
  • To discover the main cause of failure.
  • To conduct performance testing of various modules of software product after fixing defects.

Wi-Fi Labs

Chennai | Manesar | Pollachi

interested inVirtual tour of
vvdn's manufacturing
facilities?