IMPROVING THE UIOV-METHOD FOR PROTOCOL CONFORMANCE TESTING

被引:2
|
作者
CHEN, WH
TANG, CY
VUONG, ST
机构
[1] TSING HUA UNIV,DEPT COMP SCI,HSINCHU 300,TAIWAN
[2] UNIV BRITISH COLUMBIA,DEPT COMP SCI,VANCOUVER,BC V6T 1W5,CANADA
关键词
COMMUNICATION PROTOCOLS; PROTOCOL CONFORMANCE TESTING; UIOV-METHOD; EXCLUSIVE TREE;
D O I
10.1016/0140-3664(95)99804-L
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The UIOv-method for testing the conformance of a protocol implementation to its specification is improved to generate a shorter test sequence. The traditional UIOv-method utilizes minimum-length Unique Input/Output (UIO) sequences to verify the implementation's states, and thus suffers from a long verification part for checking that these UIO sequences are uniquely implemented. The improved method removes this constraint so that each state can select its UIO sequence from a large set of UIO sequences, and thus some choices may shorten the verification. The exclusive tree data structure is also proposed to represent the mutually exclusive relation between UIO sequences (two UIO sequences are called mutually exclusive if no verification is needed within them); each exclusive tree corresponds to a set of UIO sequences. An algorithm is proposed to generate the exclusive tree whose corresponding UIO sequences can be used with the UIOv-method to shorten the verification while not lengthening the total test sequence. Experimentation of two protocol examples and the Q.931 network-side protocol indicate a length reduction for the verification of 100%, 43% and 64%, respectively, and for the total test sequence of 13.8%, 8.6% and 12.7%, respectively.
引用
收藏
页码:609 / 619
页数:11
相关论文
共 50 条
  • [1] Improving active Mealy machine learning for protocol conformance testing
    Fides Aarts
    Harco Kuppens
    Jan Tretmans
    Frits Vaandrager
    Sicco Verwer
    [J]. Machine Learning, 2014, 96 : 189 - 224
  • [2] Improving active Mealy machine learning for protocol conformance testing
    Aarts, Fides
    Kuppens, Harco
    Tretmans, Jan
    Vaandrager, Frits
    Verwer, Sicco
    [J]. MACHINE LEARNING, 2014, 96 (1-2) : 189 - 224
  • [3] A test sequence generation method for protocol conformance testing
    Zhang X.
    Yang M.
    Luo W.
    Geng G.
    [J]. Gaojishu Tongxin/Chinese High Technology Letters, 2011, 21 (10): : 1034 - 1041
  • [4] An extended-UIO-based method for protocol conformance testing
    Buonanno, G
    Fummi, F
    Sciuto, D
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (03) : 225 - 242
  • [5] A DFSM-Based Protocol Conformance Testing and Diagnosing Method
    Zhang, Xinchang
    Yang, Meihong
    Geng, Guanggang
    Luo, Wanming
    [J]. INFORMATICA, 2011, 22 (03) : 447 - 469
  • [6] A Combining Method for Wireless Protocol Conformance Testing: A Empirical Case
    Wei-Wei, Lin
    Hong-Wei, Zeng
    Kim, Jung Yoon
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [7] Research on Protocol Conformance Testing Method Based on Petri net
    Shu De Qin
    Fan Hao
    Zhang Liang
    [J]. PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 931 - 937
  • [8] IMPROVING CONFORMANCE TESTING FOR LOTOS
    CAVALLI, A
    KIM, SU
    MAIGRON, P
    [J]. FORMAL DESCRIPTION TECHNIQUES, VI, 1994, 22 : 367 - 381
  • [9] An Improved FSM-based Method for BGP Protocol Conformance Testing
    Xie, Lei
    Wei, Jiaolong
    Zhu, Guangxi
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2, 2008, : 631 - 635