Front-end test method of distributed communication system

A technology of distributed communication and testing methods, applied in the field of front-end testing of distributed communication systems, can solve the problems of wasting testing time, testing errors, and testing process errors, improving efficiency and accuracy, avoiding malicious tampering, and ensuring stability sexual effect

Active Publication Date: 2020-04-17
燕东科技(广东)有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a front-end testing method for a distributed communication system to solve the problem in the prior art that during the process of generating access request data, there may be abnormalities in the access request data, which may cause errors in the entire test process, and it is necessary to start from scratch. A lot of test time was wasted, and, in the process of sending the response data to the client for execution by the server, there may be a problem of illegal tampering of the response data, which will also cause test errors and affect the normal test of the communication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Front-end test method of distributed communication system
  • Front-end test method of distributed communication system
  • Front-end test method of distributed communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] The client responds to the test command and generates access request data;

[0086] The anomaly detection module intercepts the access request data and performs anomaly detection;

[0087] If the access request data is abnormal, the client responds to the test command again and regenerates the access request data.

Embodiment 2

[0089] The client responds to the test command and generates access request data;

[0090] The anomaly detection module intercepts the access request data and performs anomaly detection;

[0091] The access request data is detected to be normal, and the access request data is sent to the server;

[0092] The server selects a test case corresponding to the function to be tested;

[0093] The server obtains the data to be fed back according to the access request data;

[0094] The server generates response data according to the test case and the data to be fed back;

[0095] The server packs the response data, and at the same time, generates nine identical file packages;

[0096] Ten file packages make up the response data file package set P={P 1 ,P 2 ,P 3 ,P 4 ,P 5 ,P 6 ,P 7 ,P 8 ,P 9 ,P 10};

[0097] The tag address corresponding to each file packet in the response data file packet set P is:

[0098] P 1 =(1,5),P 2 =(2,8),P 3 =(3,12),P 4 =(4,20),P 5 =(5,29)...

Embodiment 3

[0116] The client responds to the test command and generates access request data;

[0117] The anomaly detection module intercepts the access request data and performs anomaly detection;

[0118] The access request data is detected to be normal, and the access request data is sent to the server;

[0119] The server selects a test case corresponding to the function to be tested;

[0120] The server obtains the data to be fed back according to the access request data;

[0121] The server generates response data according to the test case and the data to be fed back;

[0122] The server packs the response data, and at the same time, generates nine identical file packages;

[0123] Ten file packages make up the response data file package set P={P 1 ,P 2 ,P 3 ,P 4 ,P 5 ,P 6 ,P 7 ,P 8 ,P 9 ,P 10};

[0124] The tag address corresponding to each file packet in the response data file packet set P is:

[0125] P 1 =(1,5),P 2 =(2,8),P 3 =(3,13),P 4 =(4,20),P 5 =(5,29)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication systems, and particularly discloses a front-end test method of a distributed communication system, which comprises the following steps: S1, a client generates access request data in response to a test instruction; S2, abnormal data detection is carried out on the access request data; S3, a test case corresponding to the to-be-tested function is selected by the access request data; S4, to-be-fed back data are obtained according to the access request data; S5, response data are generated according to the test case and the to-be-fed back data; S6, the response data are packaged, and a plurality of same file packages are generated; S7, a corresponding label address is added to each file package; S8, the client decodes the label address of the file package; S9, the client executes the decoded response data to generate a test result; and S10, a test result is displayed. The method is scientific and reasonable, is safe and convenient to use, and can effectively improve the front-end test efficiency and accuracy of the communication system.

Description

technical field [0001] The invention relates to the technical field of communication systems, in particular to a front-end testing method of a distributed communication system. Background technique [0002] Communication system is a general term for technical systems used to complete the information transmission process. Modern communication systems are mainly realized by the propagation of electromagnetic waves in free space or the transmission mechanism in guided media. The former is called wireless communication system, and the latter is called wired communication system. [0003] After the communication system is built, it needs to be tested. The existing test method is to input test instructions, generate access request data, select test cases and data to be fed back corresponding to the function to be tested, and generate Response data, the front end executes the response data, generates test results, and completes the test. [0004] The existing communication system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
CPCH04L43/50H04L43/10
Inventor 郭小芳
Owner 燕东科技(广东)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products