Exploring the Effectiveness of End-to-End Testing Frameworks in Modern Web Development
DOI:
https://doi.org/10.63282/3050-922X.IJERET-V3I3P104Keywords:
End-to-End Testing, Web Development, Software Testing, Testing Frameworks, Automated Testing, Continuous Integration, Continuous Deployment, CI/CD Pipelines, Test Automation, Functional Testing, Regression Testing, User Experience Testing, Software Quality Assurance, Cypress, Selenium, Playwright, Test Reliability, Flaky Tests, Cross-Browser Testing, Cross-Platform Compatibility, Performance Testing, Debugging, DevOpsAbstract
Dependability and quality of software constitute first issues in contemporary web development. Traditional testing approaches cannot find integration problems among multiple components as web systems get ever more complicated. Since end-to- end (E2E) testing tools help developers replicate real-world user interactions and validate the complete running performance of an application, they are becoming more and more crucial. The need of E2E testing in improving software dependability is investigated in this work. It underlines the main benefits of early defect discovery, enhanced user experience assurance, and thorough E2E testing system coverage of improvements. Furthermore included are issues that could undermine the effectiveness of automated testing systems: test flakiness, high maintenance overhead, and extended running times. Examining important E2E testing systems including Cypress, Selenium, and Playwright, this paper offers a thorough assessment based on their strengths, weaknesses, and fit for various project objectives. Modern DevOps systems first concentrate on analyzing important components including simplicity of use, performance, debugging tools, and interface. Furthermore, best practices for executing E2E testing include CI/CD pipeline integration, test case design optimization, and artificial intelligence-powered automation applied to raise test dependability. A real case study using an E2E testing infrastructure shows how a large financial company improved test stability and deployment efficiency. This study investigates emerging E2E testing trends including low-code/no-code testing solutions, cloud-based testing, and artificial intelligence-driven automation and so influences the course of software quality assurance. The results emphasize the need of applying scalable, efficient, sustainable E2E testing techniques to guarantee strong and remarkable online applications in a development environment running ever quicker
References
[1] Tsai, W. T., Bai, X., Paul, R., Shao, W., & Agarwal, V. (2001, October). End-to-end integration testing design. In 25th Annual International Computer Software and Applications Conference. COMPSAC 2001 (pp. 166-171). IEEE.
[2] Krishnamurthy, B., & Wills, C. E. (2000). Analyzing factors that influence end-to-end web performance. Computer Networks, 33(1-6), 17-32.
[3] Pan, Y., Sun, F., Teng, Z., White, J., Schmidt, D. C., Staples, J., & Krause, L. (2019). Detecting web attacks with end-to-end deep learning. Journal of Internet Services and Applications, 10(1), 1-22.
[4] Mikowski, M., & Powell, J. (2013). Single page web applications: JavaScript end-to-end. Simon and Schuster.
[5] Yasodhara Varma, and Manivannan Kothandaraman. “Leveraging Graph ML for Real-Time Recommendation Systems in Financial Services”. Essex Journal of AI Ethics and Responsible Innovation, vol. 1, Oct. 2021, pp. 105-28
[6] Sangeeta Anand, and Sumeet Sharma. “Leveraging ETL Pipelines to Streamline Medicaid Eligibility Data Processing”. American Journal of Autonomous Systems and Robotics Engineering, vol. 1, Apr. 2021, pp. 358-79
[7] Sangaraju, Varun Varma, and Senthilkumar Rajagopal. "Danio rerio: A Promising Tool for Neurodegenerative Dysfunctions." Animal Behavior in the Tropics: Vertebrates: 47.
[8] Chow, M., Meisner, D., Flinn, J., Peek, D., & Wenisch, T. F. (2014). The mystery machine: End-to-end performance analysis of large-scale internet services. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14) (pp. 217-231).
[9] Soni, M. (2015, November). End to end automation on cloud with build pipeline: the case for DevOps in insurance industry, continuous integration, continuous testing, and continuous delivery. In 2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (pp. 85-89). IEEE.
[10] Bradford, M., Earp, J. B., & Grabski, S. (2014). Centralized end-to-end identity and access management and ERP systems: A multi-case analysis using the Technology Organization Environment framework. International Journal of Accounting Information Systems, 15(2), 149-165.
[11] Sangeeta Anand, and Sumeet Sharma. “Temporal Data Analysis of Encounter Patterns to Predict High-Risk Patients in Medicaid”. American Journal of Autonomous Systems and Robotics Engineering, vol. 1, Mar. 2021, pp. 332-57
[12] Viglino, T., Motlicek, P., & Cernak, M. (2019, September). End-to-End Accented Speech Recognition. In Interspeech (pp. 2140-2144).
[13] Gupta, U., Hsia, S., Saraph, V., Wang, X., Reagen, B., Wei, G. Y., ... & Wu, C. J. (2020, May). Deeprecsys: A system for optimizing end-to-end at-scale neural recommendation inference. In 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA) (pp. 982-995). IEEE.
[14] Sangeeta Anand, and Sumeet Sharma. “Automating ETL Pipelines for Real-Time Eligibility Verification in Health Insurance”. Essex Journal of AI Ethics and Responsible Innovation, vol. 1, Mar. 2021, pp. 129-50
[15] Chen, T., Moreau, T., Jiang, Z., Shen, H., Yan, E. Q., Wang, L., ... & Krishnamurthy, A. (2018). TVM: end-to-end optimization stack for deep learning. arXiv preprint arXiv:1802.04799, 11(2018), 20.
[16] Sommers, J., Barford, P., Duffield, N., & Ron, A. (2005, August). Improving accuracy in end-to-end packet loss measurement. In Proceedings of the 2005 conference on applications, technologies, architectures, and protocols for computer communications (pp. 157-168).
[17] Varma, Yasodhara. “Governance-Driven ML Infrastructure: Ensuring Compliance in AI Model Training”. International Journal of Emerging Research in Engineering and Technology, vol. 1, no. 1, Mar. 2020, pp. 20-30
[18] Sreedhar, C., and Varun Verma Sangaraju. "A Survey On Security Issues In Routing In MANETS." International Journal of Computer Organization Trends 3.9 (2013): 399-406.
[19] Chaniotis, I. K., Kyriakou, K. I. D., & Tselikas, N. D. (2015). Is Node. js a viable option for building modern web applications? A performance evaluation study. Computing, 97, 1023-1044.
[20] Kupunarapu, Sujith Kumar. "AI-Enabled Remote Monitoring and Telemedicine: Redefining Patient Engagement and Care Delivery." International Journal of Science And Engineering 2.4 (2016): 41-48.
[21] Sangeeta Anand, and Sumeet Sharma. “Role of Edge Computing in Enhancing Real-Time Eligibility Checks for Government Health Programs”. Newark Journal of Human-Centric AI and Robotics Interaction, vol. 1, July 2021, pp. 13-33
[22] Kaldor, J., Mace, J., Bejda, M., Gao, E., Kuropatwa, W., O'Neill, J., ... & Song, Y. J. (2017, October). Canopy: An end-to-end performance tracing and analysis system. In Proceedings of the 26th symposium on operating systems principles (pp. 34-50).
[23] Varma, Yasodhara. “Secure Data Backup Strategies for Machine Learning: Compliance and Risk Mitigation Regulatory Requirements (GDPR, HIPAA, etc.)”. International Journal of Emerging Trends in Computer Science and Information Technology, vol. 1, no. 1, Mar. 2020, pp. 29-38
[24] Sangaraju, Varun Varma. "Ranking Of XML Documents by Using Adaptive Keyword Search." (2014): 1619-1621.
[25] Kupunarapu, Sujith Kumar. "AI-Enhanced Rail Network Optimization: Dynamic Route Planning and Traffic Flow Management." International Journal of Science And Engineering 7.3 (2021): 87-95.
[26] Sangeeta Anand, and Sumeet Sharma. “Leveraging AI-Driven Data Engineering to Detect Anomalies in CHIP Claims”. Los Angeles Journal of Intelligent Systems and Pattern Recognition, vol. 1, Apr. 2021, pp. 35-55
[27] Asadi, N., & Lin, J. (2013, July). Effectiveness/efficiency tradeoffs for candidate generation in multi-stage retrieval architectures. In Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval (pp. 997-1000).
[28] Oest, A., Zhang, P., Wardman, B., Nunes, E., Burgis, J., Zand, A., ... & Ahn, G. J. (2020). Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In 29th {USENIX} Security Symposium ({USENIX} Security 20).