Sunday, August 31, 2014

What is V-model- advantages, disadvantages and when to use it?

What is V-model- advantages, disadvantages and when to use it?

V- model means Verification and Validation model. Just like the waterfall model, the V-Shaped life cycle is a sequential path of execution of processes. Each phase must be completed before the next phase begins.  Testing of the product is planned in parallel with a corresponding phase of development.


The various phases of the V-model are as follows:

Requirements like BRS and SRS begin the life cycle model just like the waterfall model. But, in this model before development is started, a system test plan is created.  The test plan focuses on meeting the functionality specified in the requirements gathering.

The high-level design (HLD) phase focuses on system architecture and design. It provide overview of solution, platform, system, product and service/process. An integration test plan is created in this phase as well in order to test the pieces of the software systems ability to work together.

The low-level design (LLD) phase is where the actual software components are designed. It defines the actual logic for each and every component of the system. Class diagram with all the methods and relation between classes comes under LLD. Component tests are created in this phase as well.

The implementation phase is, again, where all coding takes place. Once coding is complete, the path of execution continues up the right side of the V where the test plans developed earlier are now put to use.

Coding: This is at the bottom of the V-Shape model. Module design is converted into code by developers.

Advantages of V-model:

    Simple and easy to use.
    Testing activities like planning, test designing happens well before coding. This saves a lot of time. Hence higher chance of success over the waterfall model.
    Proactive defect tracking – that is defects are found at early stage.
    Avoids the downward flow of the defects.
    Works well for small projects where requirements are easily understood.

Disadvantages of V-model:

    Very rigid and least flexible.
    Software is developed during the implementation phase, so no early prototypes of the software are produced.
    If any changes happen in midway, then the test documents along with requirement documents has to be updated.

When to use the V-model:

    The V-shaped model should be used for small to medium sized projects where requirements are clearly defined and fixed.
    The V-Shaped model should be chosen when ample technical resources are available with needed technical expertise.

High confidence of customer is required for choosing the V-Shaped model approach. Since, no prototypes are produced, there is a very high risk involved in meeting customer expectations.
*************
 System Requirements Specification (SyRS):

A System Requirements Specification (abbreviated SyRS when need to be distinct from a Software Requirements Specification SRS) is a structured collection of information that embodies the requirements of a system.

A business analyst, sometimes titled system analyst, is responsible for analyzing the business needs of their clients and stakeholders to help identify business problems and propose solutions. Within the systems development life cycle domain, the BA typically performs a liaison function between the business side of an enterprise and the information technology department or external service providers.

Software requirements specification

A software requirements specification (SRS) is a description of a software system to be developed, laying out functional and non-functional requirements. (Non-functional requirements impose constraints on the design or implementation such as performance engineering requirements, quality standards, or design constraints.) The specification may include a set of use cases that describe interactions the users will have with the software.




Saturday, August 30, 2014

SDLC, Software Development Life Cycle

SDLC, Software Development Life Cycle


SDLC Overview

SDLC, Software Development Life Cycle is a process used by software industry to design, develop and test high quality softwares. The SDLC aims to produce a high quality software that meets or exceeds customer expectations, reaches completion within times and cost estimates.
  • SDLC is the acronym of Software Development Life Cycle.
  • It is also called as Software development process.
  • The software development life cycle (SDLC) is a framework defining tasks performed at each step in the software development process.
  • ISO/IEC 12207 is an international standard for software life-cycle processes. It aims to be the standard that defines all the tasks required for developing and maintaining software.
A typical Software Development life cycle consists of the following stages:
  • Stage 1: Planning and Requirement Analysis
  • Stage 2: Defining Requirements
  • Stage 3: Designing the product architecture
  • Stage 4: Building or Developing the Product
  • Stage 5: Testing the Product
  • Stage 6: Deployment in the Market and Maintenance


SDLC Models
There are various software development life cycle models defined and designed which are
followed during software development process. These models are also referred as "Software
Development Process M
odels". Each process model follows a Series of steps unique to its type,
in order to ensure success in process of software development. Following are the most
important and popular SDLC models followed in the industry:

Waterfall Model

Iterative Model

Spiral Model

V-Model

Big Bang Model The other related methodologies are Agile Model, RAD Model

Rapid Application : Development and Prototyping Models



Waterfall Model
The Waterfall Model was first Process Model to be introduced. It is also referred to as
a linear - sequential life cycle model. It is very simple to understand and use.
In a waterfall model, each phase must be completed before the next phase can begin and there
is no overlapping in the phases. Waterfall model is the earliest SDLC approach that was used for software development .
The waterfall Model illustrates the software development process in a linear sequential flow; hence it is also referred to as a linear - sequential life cycle model. This means that any phase in
the development process begins only if the previous phase is complete.
In waterfall model phases do not overlap. .
Waterfall Model design Waterfall approach was first SDLC Model to be used widely in
Software Engineering to ensure success of the project.
In "The Waterfall" approach, the whole process of software development is divided into separate
phases. In Waterfall model, typically, the outcome of one phase acts as the input for the next phase sequentially.

******************************************
Iterative model :





Advantages of Iterative model:

    In iterative model we can only create a high-level design of the application before we actually begin to build the product and define the design solution for the entire product. Later on we can design and built a skeleton version of that, and then evolved the design based on what had been built.
    In iterative model we are building and improving the product step by step. Hence we can track the defects at early stages. This avoids the downward flow of the defects.
    In iterative model we can get the reliable user feedback. When presenting sketches and blueprints of the product to users for their feedback, we are effectively asking them to imagine how the product will work.
    In iterative model less time is spent on documenting and more time is given for designing.

 Disadvantages of Iterative model:

    Each phase of an iteration is rigid with no overlaps
    Costly system architecture or design issues may arise because not all requirements are gathered up front for the entire lifecycle

When to use iterative model:

    Requirements of the complete system are clearly defined and understood.
    When the project is big.
    Major requirements must be defined; however, some details can evolve with time.

*************************

Spiral Model :-





The spiral model is similar to the incremental model, with more emphasis placed on risk analysis. The spiral model has four phases: Planning, Risk Analysis, Engineering and Evaluation. A software project repeatedly passes through these phases in iterations (called Spirals in this model). The baseline spiral, starting in the planning phase, requirements are gathered and risk is assessed. Each subsequent spirals builds on the baseline spiral.

Planning Phase: Requirements are gathered during the planning phase. Requirements like ‘BRS’ that is ‘Bussiness Requirement Specifications’ and ‘SRS’ that is ‘System Requirement specifications’.

Risk Analysis: In the risk analysis phase, a process is undertaken to identify risk and alternate solutions.  A prototype is produced at the end of the risk analysis phase. If any risk is found during the risk analysis then alternate solutions are suggested and implemented.

Engineering Phase: In this phase software is developed, along with testing at the end of the phase. Hence in this phase the development and testing is done.

Evaluation phase: This phase allows the customer to evaluate the output of the project to date before the project continues to the next spiral.

Advantages of Spiral model:

    High amount of risk analysis hence, avoidance of Risk is enhanced.
    Good for large and mission-critical projects.
    Strong approval and documentation control.
    Additional Functionality can be added at a later date.
    Software is produced early in the software life cycle.

Disadvantages of Spiral model:

    Can be a costly model to use.
    Risk analysis requires highly specific expertise.
    Project’s success is highly dependent on the risk analysis phase.
    Doesn’t work well for smaller projects.

 When to use Spiral model:

    When costs and risk evaluation is important
    For medium to high-risk projects
    Long-term project commitment unwise because of potential changes to economic priorities
    Users are unsure of their needs
    Requirements are complex
    New product line
    Significant changes are expected (research and exploration)




Sunday, August 24, 2014

ccna teacher


IP Address Classes
Class A 1 – 127 (Network 127 is reserved for loopback and internal testing)
Leading bit pattern 0
00000000.00000000.00000000.00000000
Class B 128 – 191 Leading bit pattern 10
10000000.00000000.00000000.00000000
Class C 192 – 223 Leading bit pattern 110
11000000.00000000.00000000.00000000
Class D 224 – 239 (Reserved for multicast)
Class E 240 – 255 (Reserved for experimental, used for research)


Private Address Space
Class A 10.0.0.0 to 10.255.255.255
Class B 172.16.0.0 to 172.31.255.255
Class C 192.168.0.0 to 192.168.255.255

Default Subnet Masks
Class A
255.0.0.0
Class B
255.255.0.0
Class C
255.255.255.0


2n where N is the number of bits in the subnet mask. IE, 2^4 = 4 bits of host space = 16 host addresses, minus 2, an address for the "network" and an address for being on a multiaccess network (broadcast address).

Example... 192.168.1.16/28 (32 minus the number of bits = 28). So, you have 2^N hosts, which means you have 192.168.1.16, .17, .18...29,.30,.31,.32 but, you loose the all 0's bits (0000) and the all ones (1111) as these have a significance. The 0000s would be 192.168.1.16 (the network address) and the 1111 would be the broadcast address, which would be 192.168.1.31

**************

Dear There are two sub-layers in Data link Layer that is Mac layer and Logical link layer.MAC defines how packets are placed on the media. LLC is responsible for identifying Network Layer protocols and encapsulating them..LLC header tells the data link layer,what to do with a packet once a frame is received.

data packets are placed on the media by encoding ...

***********
What is a Network Switch: Unmanaged Switches

An unmanaged switch works right out of the box. It's not designed to be configured, so you don't have to worry about installing or setting it up correctly. Unmanaged switches have less network capacity than managed switches. You'll usually find unmanaged switches in home networking equipment.

*****************
What is a Network Switch?

To understand basic networking, you first need to answer the question, "What is a network switch?"

Most business networks today use switches to connect computers, printers and servers within a building or campus. A switch serves as a controller, enabling networked devices to talk to each other efficiently. Through information sharing and resource allocation, switches save businesses money and increase employee productivity.

*********




CCNA Teacher

CCNA Teacher


If we create LOOPBACK address we are not giving no shutdown because we are creating logical interface, in switching if we create int vlan (for ex int van2,van3)this is also logically creating then why we need to give NOSHUTDOWN???????????

All IP interfaces are down by default. This is to allow you to add and move subnets without risk of propagating routes or creating an overlap. Loopbacks are a special case as they don't have an L2 component. It makes little sense for it to be up by default, but meh...

concept of loopback was mainly developed for testing purpose. hence they are up by default n order to save our time .but on vlans scenario is different intrface are logical but placed on physical
 *************

 In STP why priority is giving multiple of 4096??????????

 It is because in the days of plain old vanilla STP we had 2 bytes for the bridge priority 0 - 65535 ( in math we inc the zero, so 65536 variations). But when RSTP came along we needed a vlan id field - that took 12 bits leaving only 4 bits for bridge priority.

4 bits have 16 possible variations, so 16 * 4096 = 65536

Very good question

*******************************
what is the difference between the root port and designated port ?

There can be ONLY one Root Port on a switch. There may be multiple Designated Ports on a switch

 *********************

Hi Community,
I am setting up a lab at the office to start studying by myself, I have SWs 2x3560 2x3550 3x2900, routers will be in GNS3, and to access the SWs I have a 2511 with 16 async interfaces.
I am trying to connect to any of the SWs with no joy.
Here's what I am doing: I already have all my SWs configured with the basic commands, they are all up and running. The 2511 is configured as follows:
line con 0
line 1 16
transport input all
exec-timeout 0 0
no exec
session-timeout 20
int loopback0
ip add 1.1.1.1 255.255.255.255
ip host C13560 2001 1.1.1.1
.
.
.
.
ip host A32900 2007 1.1.1.1
When issuing in exec mode
#1
or
‪#‎telnet‬ 1.1.1.1 2001
I get an unreachable host error message
Note: I am using the proper cable to connect from the async interface to the console port on the SW.
I wonder if any of you guys could help a little bit.

  ---
 Aux would go to a gateway to access the 2511 remotely. This particular 2511 doesn't have the interface to connect the octal cable, it has 16 Async interfaces, which go to every console ports of your devices

*****************************************************
An IP address can be divided in two parts, network bits 'x' and host bits 'y'. To obtain the number of usable IPs in a network do (2^y)-2. You remove 2 from the count since the IPs are in use for other reasons: one of them is the network boundary and the other is the broadcast.

In any network, there is a limited number of IP addresses that can be assigned to hosts on the network. This is the formula. Take for example the network 192.168.1.0/24. You have 32 bits total, or four octets of 8 bits, but 24 are network bits and can't be assigned to hosts. The last 8 bits are the host bits. You can't use the zero address, 192.168.1.0 because it belongs to the network itself. You can't use 192.168.1.255 because it is the broadcast address. Anything else from .1 to .254 can be assigned to a host on the network. So 2 raised to the 8th power minus 2 = 254 host addresses available


********************

Hi Guys,
I want to know what is an Unmanaged Switch? Is it a Hub or not is what I want to know actually.
We know a Hub has one collision and one broadcast domain so let' say if I connect multiple devices to a Hub and if even two of them try to send at the same time there will be a collison causing data corruption etc. Now, if an Unmanaged switch is nothing but a Hub then wouldn't I face the same problem if two or more than two devices try to send or receice at the same time?

Reply : With a hub all workstations are essentially on the same wire and every port sees every packet.
A switch will build mac address tables and forward most traffic intelligently.
So a dumb switch isn't a hub.
I guess you could say the switch, even a toy one, operates more at layer 2 in the OSI model where the hub is purely layer 1.

***************
Hey Rahul,

An un-managed switch is not an hub. I've a cyber-cafe.... earlier my LAN was built using Hubs, however i've replaced them with un-managed switches.

I see a lot of difference in the speed of my LAN. And i don't think the unmanaged switches maintain a MAC table. I believe the difference between those two is: Hub acts like a bus topology, whereas the un-managed switch acts like a star topology. And even hub operate at 10mbps whereas an un-managed switch can operate between 10-100 mbps. The unmanaged switch helped a lot for me to enhance my cafe..

While using hubs the video streaming was very slow it is used to stop for every few mins then again buffer like this... but now there is no latency at all using unmanageble switches.

Please don't forget to rate the helpful posts.

Regards,
Chandu
******************************
Alain Cadet 7 months ago

Hi,
And i don't think the unmanaged switches maintain a MAC table
That would mean they would flood all the time so basically act like hubs and in this case I don't think you would have seen a performance increase in your network
Regards
Alain
Don't forget to rate helpful posts.

**************
As they are unmanaged , no you can't view the MAC table but if they flood everything you will see it by sniffing on another PC linked to the switch, if it doesn't flood unicast you'll only see unknown unicast frames but not known unicast frames.

Regards

Alain
***************
David :
An unmanaged switch is just that, unmanaged.
Its still a switch in that it maintains a MAC addresss table and forwards frames based on this.
A hub and an unmanaged switch are not the same thing.
***********
Joseph : An unmanaged switch is one you cannot configure (i.e. you cannot manage it, ergo its unmanaged).  It is not a hub.  BTW, there are (or were) manageable hubs.



PING SOCKET

PING SOCKET


Ping is a program using a raw ICMP socket the program is presented with a copy of all incoming ICMP messages .
There are three commonly encountered types of sockets: stream, datagram, and raw.
TCP uses the stream type and UDP uses the datagram type.
Raw sockets are used by any application that needs to interact directly with
IP, bypassing TCP and UDP in doing so.

ICMP is a necessary component of any TCP/IP implementation. It does not exist to provide information to the higher-layer protocols (like TCP and UDP) so that they may be more reliable.

ICMP protocol is in fact an Internet layer protocol (Layer 3) and is an integral part of the IP protocol suite.
*****************************
it doesn't necessarily mean that only layer 3 devices like router can work with IP but two PCs directly connected with each other can also communicate based on IP and generate messages. the main responsibility of layer 3 device is to forward your packet to other networks were not reachable within your broadcast domain.
****************************
That's the management IP, used to configure and manage a "managed" switch, without this management IP, you can only configure it through the console port or any other ports. When u ping from the switch, it uses its management IP as src IP, that's why you get the respond even though it's not L3 switch. L2 only means it have functions for packet processing up to L2 e.g. MAC ACL, but you can't do things like IP ACL on L2 switch.

switches r of 2 types manageble(l3) ,unmanageble(l2)..................manageble switch .has al functions of router except routing

Wrong. Even my lowly 1900 switch is both L2 and manageable





SUBNET AND CIDR

SUBNET AND CIDR

7 bit subnet = 10000000=128 /25
6 bit subnet = 11000000=192 /26
5 bit subnet = 11100000=224 /27
4 bit subnet = 11110000=240 /28
3 bit subnet = 11111000=248 /29
2 bit subnet = 11111100=252 /30
1 bit subnet = 11111110=254 /31



Understanding CIDR Subnet Mask Notation

m0n0wall uses a subnet mask format that you may not be familiar with. Rather than the common 255.x.x.x, it uses CIDR (Classless InterDomain Routing) notation.

1.5.1. CIDR Table

You can refer to the following table to find the CIDR equivalent of your subnet mask.

Table 1.1. CIDR Subnet Table
Subnet Mask CIDR Prefix Total IP's Usable IP's Number of Class C networks
255.255.255.255 /32 1 1 1/256th
255.255.255.254 /31 2 0 1/128th
255.255.255.252 /30 4 2 1/64th
255.255.255.248 /29 8 6 1/32nd
255.255.255.240 /28 16 14 1/16th
255.255.255.224 /27 32 30 1/8th
255.255.255.192 /26 64 62 1/4th
255.255.255.128 /25 128 126 1 half
255.255.255.0 /24 256 254 1
255.255.254.0 /23 512 510 2
255.255.252.0 /22 1024 1022 4
255.255.248.0 /21 2048 2046 8
255.255.240.0 /20 4096 4094 16
255.255.224.0 /19 8192 8190 32
255.255.192.0 /18 16,384 16,382 64
255.255.128.0 /17 32,768 32,766 128
255.255.0.0 /16 65,536 65,534 256
255.254.0.0 /15 131,072 131,070 512
255.252.0.0 /14 262,144 262,142 1024
255.248.0.0 /13 524,288 524,286 2048
255.240.0.0 /12 1,048,576 1,048,574 4096
255.224.0.0 /11 2,097,152 2,097,150 8192
255.192.0.0 /10 4,194,304 4,194,302 16,384
255.128.0.0 /9 8,388,608 8,388,606 32,768
255.0.0.0 /8 16,777,216 16,777,214 65,536
254.0.0.0 /7 33,554,432 33,554,430 131,072
252.0.0.0 /6 67,108,864 67,108,862 262,144
248.0.0.0 /5 134,217,728 134,217,726 1,048,576
240.0.0.0 /4 268,435,456 268,435,454 2,097,152
224.0.0.0 /3 536,870,912 536,870,910 4,194,304
192.0.0.0 /2 1,073,741,824 1,073,741,822 8,388,608
128.0.0.0 /1 2,147,483,648 2,147,483,646 16,777,216
0.0.0.0 /0 4,294,967,296 4,294,967,294 33,554,432

So where do these CIDR numbers come from anyway?

The CIDR number comes from the number of 1's in the subnet mask when converted to binary.
The common subnet mask 255.255.255.0 is 11111111.11111111.11111111.00000000 in binary. This adds up to 24 1's, or /24 (pronounced 'slash twenty four').
A subnet mask of 255.255.255.192 is 11111111.11111111.11111111.11000000 in binary, or 26 1's, hence a /26.
And so on...

Good Information here : http://doc.m0n0.ch/quickstartpc/intro-CIDR.html

QUESTIONS

QUESTIONS

rip aur ospf ke advantage aur nuksan bata diejye anyone

RIP 16 HOP TAK KAAM KARTA HAI , JABKI OSPF AREA NEIGHBOURSHIP LOG NETWORK BASED

************************
Non-manageble swith can understand ip address...??????

 A layer 2 device has no purpose for a layer 3 address in its normal operation, it works strictly with MAC addresses. So if it were unmanaged, there would be no use for an IP address. A layer 3 device would need some sort of configuration before it could begin routing so I can't envision any L3 switch that is not manageable.

An unmanaged switch is not a box full of wires.

Yes, but all layer 3 switches are manageble. He is asking for non-manageble switches.

un managed switch is just like a hub with addition to storage for mac addres .

*************
 whats the scope of DATA CENTER today and in the next say 5-10 years ?
ive been told data center industry is limited to limited region of the world, not a worldwide phenomenon (THAT I DONT BELIEVE PERSONALLY) Correct me if im wrong and help ..

Cisco has come out with their ucs systems which can run hundreds of virtual servers off a single server. We also have the cloud phenomenon currently going on. One takes away from needing large data centers, the other promotes having storage centers.. Only time will tell but tech has a way of seeing large things go small and become more efficient... I.e. room size computers and today's desktops... The trend in my eyes is that data centers will become fewer and more specific location based