TY - JOUR
T1 - Executable EFSM-based data flow and control flow protocol test sequence generation using reachability analysis
AU - Huang, Chung Ming
AU - Jang, Ming Yuhe
AU - Lin, Yuan Chuen
PY - 1999
Y1 - 1999
N2 - This paper presents an executable Extended-Finite-State-Machine (EFSM)-based protocol test sequence generation method with specified variable bound. The proposed method overlaps data flow and control flow tests. In the data flow part, the transition paths that contain definition uses and output uses of variables in the protocol specifications need to be detected and tested. An executable data flow test path, which is called an EDO-path, contains two parts: (1) a switching transition sequence that directs to a transition T containing a definition use of a variable V, and (2) a transition sequence originated from T, such that its head transition has a definition use of V and its tail transition contains either (i) an output use of V, or (ii) an output use of another variable which is affected by this definition use of V. In the control flow part, each transition must be tested as to whether it conforms to the original specification or not. An executable control flow test path, which is called an EC-path, for a transition T contains (1) a switching sequence that directs to the head state of T, (2) the transition T itself, and (3) the Unique Input/Output sequence of T's tail state, which verifies whether the tail state of T is correct or not. To shorten the length of the total test sequences, the proposed method overlaps the control flow test sequences with the data flow test sequences. That is, a test sequence may combine both control flow and data flow tests. The overlap is achieved as follows: when of searching EDO-paths, EC-paths are also searched in the same executable transition exploration sequences. If not all of the EC-paths are overlapped with EDO-paths, the remaining EC-paths are searched individually. Additionally, to provide flexible protocol conformance testing, protocol testers can specify some variable bound for their specific test purposes. That is, protocol testers can run tests they are interested in by specifying the associated variable bound in the protocol specification.
AB - This paper presents an executable Extended-Finite-State-Machine (EFSM)-based protocol test sequence generation method with specified variable bound. The proposed method overlaps data flow and control flow tests. In the data flow part, the transition paths that contain definition uses and output uses of variables in the protocol specifications need to be detected and tested. An executable data flow test path, which is called an EDO-path, contains two parts: (1) a switching transition sequence that directs to a transition T containing a definition use of a variable V, and (2) a transition sequence originated from T, such that its head transition has a definition use of V and its tail transition contains either (i) an output use of V, or (ii) an output use of another variable which is affected by this definition use of V. In the control flow part, each transition must be tested as to whether it conforms to the original specification or not. An executable control flow test path, which is called an EC-path, for a transition T contains (1) a switching sequence that directs to the head state of T, (2) the transition T itself, and (3) the Unique Input/Output sequence of T's tail state, which verifies whether the tail state of T is correct or not. To shorten the length of the total test sequences, the proposed method overlaps the control flow test sequences with the data flow test sequences. That is, a test sequence may combine both control flow and data flow tests. The overlap is achieved as follows: when of searching EDO-paths, EC-paths are also searched in the same executable transition exploration sequences. If not all of the EC-paths are overlapped with EDO-paths, the remaining EC-paths are searched individually. Additionally, to provide flexible protocol conformance testing, protocol testers can specify some variable bound for their specific test purposes. That is, protocol testers can run tests they are interested in by specifying the associated variable bound in the protocol specification.
UR - http://www.scopus.com/inward/record.url?scp=0033338149&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0033338149&partnerID=8YFLogxK
U2 - 10.1080/02533839.1999.9670497
DO - 10.1080/02533839.1999.9670497
M3 - Article
AN - SCOPUS:0033338149
SN - 0253-3839
VL - 22
SP - 593
EP - 615
JO - Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an
JF - Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an
IS - 5
ER -