What is loadrunner, Computer Engineering

LoadRunner works by making virtual users who take the place of real users operating client software, such as sending requests using the HTTP protocol to IIS or Apache web servers. Requests from a lot of virtual user clients are created by Load Generators in order to create a load on several servers under test

These load generator agents are started and stopped by Mercury's Controller program. The Controller controls load test runs based on Scenarios invoking compiled Scripts and associated Run-time Settings.

Scripts are crafted using Mercury's "Virtual user script Generator" (named "V U Gen"), It makes C-language script code to be executed by virtual users by capturing network traffic between Internet application clients and servers.

With Java clients, VuGen captures calls by hooking within the client JVM. During runs, the status of every machine is monitored by the Controller.

At the end of every run, the Controller combines its monitoring logs with logs obtained from load generators, and makes them available to the "Analysis" program, which can then create run result reports and graphs for Microsoft Word, Crystal Reports, or an HTML webpage browser.               



Posted Date: 4/3/2013 2:53:12 AM | Location : United States

Related Discussions:- What is loadrunner, Assignment Help, Ask Question on What is loadrunner, Get Answer, Expert's Help, What is loadrunner Discussions

Write discussion on What is loadrunner
Your posts are moderated
Related Questions
Q. Illustrate Characteristic tables of flip-flops? Excitation Tables Characteristic tables of flip-flops present the subsequent state when inputs and present state are kno

What is interpreter? An  interpreter is a program that appears to execute a source program as if it were machine language.

What are various types of Shift Registers ? Ans: Kinds of Shift Registers: (i) SISO that is Serial-In Serial-Out Shift Register (ii) SIPO that is Serial-In P

whitch goods did the new england colonies exportto england and what did they get in return

Your task is to propose a business that has a Web presence on the Internet. Your business may be an online only business or a so-called "clicks and mortar" business. You

Performance Equation of computer system: Following equation is frequently used for expressing a computer's performance ability: The CISC approach tries to minimize the

what is cursor

What are the essential components of a 3-tier client server In a three-tier or multi-tier environment, the client executes the presentation logic (the client). The business log

Question 1: (a) Describe the two fundamental characteristics of antennas explaining in detail how it affects the security of wireless networks. (b) What is a wireless cli

super ascii string checker