skip to main content
10.1145/75246.75274acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

An improved protocol test generation procedure based on UIOS

Published: 01 August 1989 Publication History

Abstract

This paper shows the Unique Input/Output, UIO, approach and the Distinguishing Sequence, DS, approach for the conformance testing of protocol implementations do not always produce identical fault converges, contrary to a previous claim. In the UIO approach, when UIO sequences and signatures are not unique in an implementation, they may not be able to detect erroneous states in the implementation. The UIO approach is revised here with the addition of a verification procedure to ensure that the UIO sequences are all unique in an implementation. Since signatures are generally not unique, this revision requires substituting the use of a signature for a state, S, with a set of input/output sequences, IO(S,K)s, unique to S, each of which distinguishes S from at least one other state, K. Verification is then applied to the IO(S,K)s. Fault coverage in the revised UIO, UIOv, approach is better than that in the original approach. A uniqueness criterion is discussed here to capture a desirable fault coverage for finite-state machine, FSM, test sequences. This criterion ensures the detection of any faulty FSM implementation provided that its set of states does not exceed that in the specified FSM. It is shown that test sequences generated by the UIOv approach and the DS approach always satisfy the uniqueness criterion. In fact, the DS approach is a special case of the UIOv approach; however, the UIOv approach has wider applicability and is generally applicable to k-distinguishable FSMs.

References

[1]
Aho, A.V., Dahbura, A.T., Lcc,D. and Uyar,U.M., "An Optimization Technique for Protocol Conformance Test Generation Based on UIO Sequences and Rural Chinese Postman Tours," Preliminary Proceedings, Eighth International Symposium on Protocol Specification, Testing and Verification, Atlantic City, NJ., 1988.
[2]
Bochmann, G.v., "A General Transition Model for Protocols and Communication Services," IEEE Trans. on Communications, vol COM-28, April 1980, pp. 643 - 650.
[3]
Chan, W.Y.L., Vuong, S. and Ito, M.R., "On Test Generation for Protocols," Ninth International Symposium on Protocol Specification, Testing and Verification, The Netherlands, June 1989.
[4]
Chow, T., "Testing Software Design Modeled by Finite-State Machines," IEEE Transactiona on Software Engineerin$ vol SE-4, no. 3, 1978, pp. 178-187.
[5]
Gonenc, G., "A Method for the Design of Fault Detection Experiments," IEEE Transactions on Computers, vol. C-19, no. 6, June 1970.
[6]
Hennie, F.C., "Fault Detection Experiments for Sequential Circuits," Proc. 5th Ann. Syrup. Switch. Theory and Logical Design, 1964, pp. 95-110.
[7]
Kohavi, Z., Switching and Finite Automata Theory, McGraw-Hill, NY., 1978.
[8]
Naito, S. and Tsunoyama, M., "Fault Detection for Sequential Machines by Transition Tours," Proc. of IEEE Fault Tolerant Computing Conference, 1981.
[9]
Rayner, D., "Standardizing Conformance Testing for OSI," Protocol Specification, Testing and Verification, V, M. Diaz, Ed., North-Holland, Amsterdam, The Netherlands, 1986.
[10]
Sabnani, K.K. and Dahbura, A.T., "A Protocol Test Generation Procedure," Computer Networks, vol. 15, no. 4, 1988, pp. 285-297.
[11]
Sidhu, D. and Leung, T., "Experience with Test Generation for Real Protocols," Proc. A CM Sigcomm '88 Symposium, Communications Architectures & Protocols, Stanford, CA., Aug. 1988, pp. 257-261.

Cited By

View all
  • (2012)An improved method based on UIOv for test sequence generation2012 IEEE 14th International Conference on Communication Technology10.1109/ICCT.2012.6511424(573-577)Online publication date: Nov-2012
  • (2010)A test sequences optimization method for improving fault coverage2010 2nd IEEE International Conference on Information Management and Engineering10.1109/ICIME.2010.5478197(80-84)Online publication date: Apr-2010
  • (2009)A Transfer Fault Diagnosing Method for Protocol Conformance Test Based on FSMs2009 Asia-Pacific Conference on Information Processing10.1109/APCIP.2009.51(173-177)Online publication date: Jul-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

SIGCOMM '89: Symposium proceedings on Communications architectures & protocols
August 1989
313 pages
ISBN:0897913329
DOI:10.1145/75246
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1989

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCOMM89
Sponsor:
SIGCOMM89: Communications Architectures & Protocols
September 25 - 27, 1989
Texas, Austin, USA

Acceptance Rates

Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)113
  • Downloads (Last 6 weeks)17
Reflects downloads up to 23 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2012)An improved method based on UIOv for test sequence generation2012 IEEE 14th International Conference on Communication Technology10.1109/ICCT.2012.6511424(573-577)Online publication date: Nov-2012
  • (2010)A test sequences optimization method for improving fault coverage2010 2nd IEEE International Conference on Information Management and Engineering10.1109/ICIME.2010.5478197(80-84)Online publication date: Apr-2010
  • (2009)A Transfer Fault Diagnosing Method for Protocol Conformance Test Based on FSMs2009 Asia-Pacific Conference on Information Processing10.1109/APCIP.2009.51(173-177)Online publication date: Jul-2009
  • (2007)Midpoints Versus EndpointsProceedings of the 5th international conference on Applied Cryptography and Network Security10.1007/978-3-540-72738-5_4(46-64)Online publication date: 5-Jun-2007
  • (2005)A specification and verification tool for communication protocolsComputing in the 90's10.1007/BFb0038498(234-241)Online publication date: 14-Jun-2005
  • (2004)Timed i/o test sequences for discrete event model verificationProceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems10.1007/978-3-540-30583-5_30(275-284)Online publication date: 4-Oct-2004
  • (2003)Context independent unique state identification sequences for testing communication protocols modelled as extended finite state machinesComputer Communications10.1016/S0140-3664(03)00116-626:14(1622-1633)Online publication date: 1-Sep-2003
  • (2002)A Method to Generate Conformance Test Sequences for FSM with Timer System CallFormal Techniques for Networked and Distributed Systems10.1007/0-306-47003-9_19(301-316)Online publication date: 2002
  • (2001)Testing timed automataTheoretical Computer Science10.1016/S0304-3975(99)00134-6254:1-2(225-257)Online publication date: Mar-2001
  • (1999)Using semicontrollable interfaces in testing army communications protocols: application to MIL-STD 188-220BMILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)10.1109/MILCOM.1999.821357(1020-1025)Online publication date: 1999
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy