首页   按字顺浏览 期刊浏览 卷期浏览 Executable EFSM‐based data flow and control flow protocol test sequence generati...
Executable EFSM‐based data flow and control flow protocol test sequence generation using reachability analysis

 

作者: Chung‐Ming Huang,   Ming‐Yuhe Jang,   Yuan‐Chuen Lin,  

 

期刊: Journal of the Chinese Institute of Engineers  (Taylor Available online 1999)
卷期: Volume 22, issue 5  

页码: 593-615

 

ISSN:0253-3839

 

年代: 1999

 

DOI:10.1080/02533839.1999.9670497

 

出版商: Taylor & Francis Group

 

关键词: protocol test;extended finite state machines (EFSMs);data flow test;control flow test.

 

数据来源: Taylor

 

摘要:

This paper presents an executable Extended‐Finite‐State‐Machine (EFSM)‐based protocol test sequence generation method with specified variable bound. The proposed method overlaps data flow and control flow tests. In the data flow part, the transition paths that containdefinitionuses andoutputuses of variables in the protocol specifications need to be detected and tested. An executable data flow test path, which is called an EDO‐path, contains two parts: (1) a switching transition sequence that directs to a transition T containing adefinitionuse of a variable V, and (2) a transition sequence originated from T, such that its head transition has adefinitionuse of V and its tail transition contains either (i) an output use of V, or (ii) an output use of another variable which is affected by this definition use of V. In the control flow part, each transition must be tested as to whether it conforms to the original specification or not. An executable control flow test path, which is called an EC‐path, for a transition T contains (1) a switching sequence that directs to the head state of T, (2) the transition T itself, and (3) the Unique Input/Output sequence of T's tail state, which verifies whether the tail state of T is correct or not. To shorten the length of the total test sequences, the proposed method overlaps the control flow test sequences with the data flow test sequences. That is, a test sequence may combine both control flow and data flow tests. The overlap is achieved as follows: when of searching EDO‐paths, EC‐paths are also searched in the same executable transition exploration sequences. If not all of the EC‐paths are overlapped with EDO‐paths, the remaining EC‐paths are searched individually. Additionally, to provide flexible protocol conformance testing, protocol testers can specify some variable bound for their specific test purposes. That is, protocol testers can run tests they are interested in by specifying the associated variable bound in the protocol specification.

 

点击下载:  PDF (2070KB)



返 回