Towards Interoperability Test Generation of Time Dependent Protocols: a Case Study Zhiliang Wang, Jianping Wu, Xia Yin Department of Computer Science Tsinghua.

Slides:



Advertisements
Similar presentations
Tintu David Joy. Agenda Motivation Better Verification Through Symmetry-basic idea Structural Symmetry and Multiprocessor Systems Mur ϕ verification system.
Advertisements

Translation-Based Compositional Reasoning for Software Systems Fei Xie and James C. Browne Robert P. Kurshan Cadence Design Systems.
Neighbor Discovery for IPv6 Mangesh Kaushikkar. Overview Introduction Terminology Protocol Overview Message Formats Conceptual Model of a Host.
Mobile IP: enable mobility for IP-based networks CS457 presentation Xiangchuan Chen Nov 6, 2001.
PROTOCOL VERIFICATION & PROTOCOL VALIDATION. Protocol Verification Communication Protocols should be checked for correctness, robustness and performance,
Using TTCN-3 in Interoperability Testing for Real-time Communication Systems Zhiliang Wang, Jianping Wu, Xia Yin, Xingang Shi and Beihang Tian Department.
Timed Automata.
An Automata-based Approach to Testing Properties in Event Traces H. Hallal, S. Boroday, A. Ulrich, A. Petrenko Sophia Antipolis, France, May 2003.
1 Formal Models for Stability Analysis : Verifying Average Dwell Time * Sayan Mitra MIT,CSAIL Research Qualifying Exam 20 th December.
Formal Software Testing and Model Checking Generating Test Cases For a Timed I/O Automaton Model Leonid Mokrushin.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
1 A survey of Internet Topology Discovery. 2 Outline Motivations Internet topology IP Interface Level Router Level AS Level PoP Level.
1 A Tree Based Router Search Engine Architecture With Single Port Memories Author: Baboescu, F.Baboescu, F. Tullsen, D.M. Rosu, G. Singh, S. Tullsen, D.M.Rosu,
1 Ivan Lanese Computer Science Department University of Bologna Roberto Bruni Computer Science Department University of Pisa A mobile calculus with parametric.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Scheduling with Optimized Communication for Time-Triggered Embedded Systems Slide 1 Scheduling with Optimized Communication for Time-Triggered Embedded.
Design of Fault Tolerant Data Flow in Ptolemy II Mark McKelvin EE290 N, Fall 2004 Final Project.
Software Engineering, COMP201 Slide 1 Protocol Engineering Protocol Specification using CFSM model Lecture 30.
25/06/2015Marius Mikucionis, AAU SSE1/22 Principles and Methods of Testing Finite State Machines – A Survey David Lee, Senior Member, IEEE and Mihalis.
1 Ivan Lanese Computer Science Department University of Bologna Italy Concurrent and located synchronizations in π-calculus.
Guide to TCP/IP Fourth Edition
Protocol Analysis/Testing Based on Sidhu et al in IEEE TSE 89 and TN 93 Figures from the papers.
Cisco Public © 2013 Cisco and/or its affiliates. All rights reserved. 1.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
1 A Petri Net Siphon Based Solution to Protocol-level Service Composition Mismatches Pengcheng Xiong 1, Mengchu Zhou 2 and Calton Pu 1 1 College of Computing,
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Modeling Process CSCE 668Set 14: Simulations 2 May be several algorithms (processes) runs on each processor to simulate the desired communication system.
Model Based Conformance Testing for Extensible Internet Protocols Anastasia Tugaenko Scientific Adviser: Nikolay Pakulin, PhD.
Transformation of Timed Automata into Mixed Integer Linear Programs Sebastian Panek.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
A SAVI Solution for DHCP Draf-ietf-savi-dhcp-06 J. Bi, J. Wu, G. Yao, F. Baker IETF79, Beijing Nov. 9, 2010.
Ivan Lanese Computer Science Department University of Bologna/INRIA Italy Amending Choreographies Joint work with Fabrizio Montesi and Gianluigi Zavattaro.
Timed Test Cases Generation Based on MSC-2000 Test Purposes Abdeslam En-Nouaary and Gang Liu Department of Electrical and Computer Engineering Concordia.
1 M. Tudruj, J. Borkowski, D. Kopanski Inter-Application Control Through Global States Monitoring On a Grid Polish-Japanese Institute of Information Technology,
Natallia Kokash (Accepted for PACO’2011) ACG, 31/05/ Input-output conformance testing for channel-based connectors 1.
Engineering Workshops Purposes of Neighbor Solicitation.
1 Black-box conformance testing for real-time systems Stavros Tripakis VERIMAG Joint work with Moez Krichen.
1 Outline:  Optimization of Timed Systems  TA-Modeling of Scheduling Tasks  Transformation of TA into Mixed-Integer Programs  Tree Search for TA using.
Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN Zhiliang Wang, Xia Yin, Haibin Wang, Jianping Wu Department of Computer Science.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public BSCI Module 8 Lesson 3 1 BSCI Module 8 Lesson 3 Implementing Dynamic IPv6 Addresses.
Speaker: Yi-Lei Chang Advisor: Dr. Kai-Wei Ke 2012/05/15 IPv6-based wireless sensor network 1.
Verification & Validation By: Amir Masoud Gharehbaghi
COSC 5341 High-Performance Computer Networks Presentation for By Linghai Zhang ID:
ICMPv6 Error Message Types Informational Message Types.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Branch and Bound Algorithms Present by Tina Yang Qianmei Feng.
Chapter 8 Asynchronous System Model by Mikhail Nesterenko “Distributed Algorithms” by Nancy A. Lynch.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Quality Assurance in the Presence of Variability Kim Lauenroth, Andreas Metzger, Klaus Pohl Institute for Computer Science and Business Information Systems.
Winter 2007SEG2101 Chapter 121 Chapter 12 Verification and Validation.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Distributed Error- Confinement Shay Kutten (Technion) with Boaz Patt-Shamir (Tel Aviv U.) Yossi Azar (Tel Aviv U.)
LACSI 2002, slide 1 Performance Prediction for Simple CPU and Network Sharing Shreenivasa Venkataramaiah Jaspal Subhlok University of Houston LACSI Symposium.
Nonlinear balanced model residualization via neural networks Juergen Hahn.
CS5270 Lecture 41 Timed Automata I CS 5270 Lecture 4.
Dynamic Routing Protocols part2
Computational Thinking, Problem-solving and Programming: General Principals IB Computer Science.
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
IP Forwarding Relates to Lab 3.
IP Forwarding Relates to Lab 3.
Internet Control Message Protocol Version 4 (ICMPv4)
IP Forwarding Relates to Lab 3.
Internet of Things A Process Calculus Approach
IP Forwarding Relates to Lab 3.
Hierarchical Search on DisCSPs
IP Forwarding Relates to Lab 3.
Hierarchical Search on DisCSPs
Chapter 2 from ``Introduction to Parallel Computing'',
Presentation transcript:

Towards Interoperability Test Generation of Time Dependent Protocols: a Case Study Zhiliang Wang, Jianping Wu, Xia Yin Department of Computer Science Tsinghua University (Globecom2004)

2 Outline Background Motivation Our proposed method Conclusion and Future work

3 Background: Protocol Testing Conformance testing – Basic method of protocol testing – Test whether an implementation conforms to its protocol specification – Test a single protocol entity Interoperability testing – Complement of conformance testing – Test whether two or more protocol implementations can communicate with each other correctly and inter-operate as a whole system to perform functions specified in protocol specifications – Test two or more protocol entities

4 Background: Protocol Testing Protocol Specification Test Generation Abstract Test Suite Test Implementation Implementation Processes Protocol Impl. SUT Test Execution Test Verdict

5 Background: Time-Dependent Protocols Real-life network protocols – Behaviors of input and output – Their time of occurrence – Time dependent! Conformance testing of time-dependent protocols – Protocol modeling: Timed Automaton and its variants (e.g. TIOA) – Many researches have been done Interoperability testing of time-dependent protocols – No work considered time constraints – Existing methods are difficult to be applied in the real-life interoperability testing This paper studied interoperability test generation for time dependent protocols

6 Background: Neighbor Discovery Protocol One of the basic protocols in IPv6 protocol set Should be supported in all IPv6 implementations Corresponding functions in IPv4 – ARP (Address Resolution Protocol) – ICMP router discovery – ICMP redirect function Using 5 ICMP packet types: – RS: Router Solicitation – RA: Router Advertisement – NS: Neighbor Solicitation – NA: Neighbor Advertisement – Redirect

7 Outline Background Motivation Our proposed method Conclusion and Future work

8 Motivation System (Protocol) Modeling –Single protocol entity: TIOA (Timed Input Output Automata) –Two or more protocol entities: CTIOA (Communicating TIOA) An TIOA set Channels between TIOAs Test Generation Method Generate grid automaton for each TIOA Calculate a composite product of grid automata Apply existing non-timed interoperability test generation methods Problem: state space explosion !! An improved method calculate the composite automaton of TIOAs using reachability analysis method Generate interoperability test sequences Analyze the executability of derived test sequences

9 Outline Background Motivation Our proposed method –Formal model and protocol specification –Test architecture –Test generation –Executability analysis Conclusion and Future work

10 Formal Model Communicating Timed Input Output Automata (CTIOA) –a set of TIOAs M: M i = S Mi : set of states; L Mi : set of input and output actions: (“!a”, “?b”); s Mi 0 : initial state; C Mi : set of clocks; T Mi : set of transitions: –a set of channels C: C ij represents the communicating channel from TIOA M i to M j. Semantic of channels: the output of TIOA M i can be transferred to the input of M j via channel C ij An assumption: time taken for an IO action via a channel is approximately equal to 0 (Normal network load) MjMj MiMi C ij a !a ?a Predicate of clock values Clock set to be reset IO action

11 Protocol Specification Router discovery function in ND Protocol –Two types of nodes: Router and Host –Protocol specification uS_RA: Unsolicited Router Advertisements S_RA: Solicited Router Advertisements RS: Router Solicitations Clock set: Router node: {t11, t12} Host node: {t21, t22} Channel set: {C RH, C HR } 12 Transition Examples: ?RS[t11>=3]/{t12} 13 ?RS[0<t11<3]

12 Test Architecture PO: Point of Observation Control line: e.g. Telnet

13 Test Cases Generation (overview) Calculate the composite automaton of TIOAs using reachability analysis method Generate interoperability test sequences Analyze the executability of derived test sequences

14 Reachability Analysis Global Reachability Graph Synchronizing Transitions and ________________________________________________________ and

15 Reachability Analysis An example of Global Reachability Graph (Tree) –DFS-based method Model

16 Test Cases Generation(overview) Calculate the composite automaton of TIOAs using reachability analysis method Generate interoperability test sequences Analyze the executability of derived test sequences

17 Test Generation An example (b) (a)

18 Test Cases Generation(overview) Calculate the composite automaton of TIOAs using reachability analysis method Generate interoperability test sequences Analyze the executability of derived test sequences

19 Executability Analysis Executability: satisfies all time constrains IOTS = ST 1 ·ST 2 ·...·ST n [Theorem 1] t ij k must be represented by a linear combination of tt s (s = 0,1,…,k-1) and d ij (initial local clock values). Global Clocks Local Clocks C 1 ({d ij |i, j}, tt 0 ) ∧ C 2 ({d ij |i, j}, tt 0, tt 1 ) ∧... ∧ C n ({d ij |i, j}, tt 0, tt 1,..., tt n-1 ) C 1 ({t ij 1 |i, j}) ∧ C 2 ({t ij 2 |i, j}) ∧... ∧ C n ({t ij n |i, j}) Local Clocks C({d ij |i, j}, {tt k |k}) Global Clocks

20 Executability Analysis (cont) Problem 1: Executability Determination Given (1) IOTS = ST 1 ·ST 2 ·...·ST n ;(2) each initial local clock values d ij. Determine if IOTS is executable. C 1 ({d ij |i, j}, tt 0 ) ∧ C 2 ({d ij |i, j}, tt 0, tt 1 ) ∧... ∧ C n ({d ij |i, j}, tt 0, tt 1,..., tt n-1 ) C 1 (tt 0 ) ∧ C 2 (tt 0, tt 1 ) ∧... ∧ C n (tt 0, tt 1,..., tt n-1 )

21 Executability Analysis (cont) Algorithm:

22 Executability Analysis (cont) Example: (b) (a)

23 Executability Analysis (cont) Problem 2: Generating Executable Test Sequence –Basic idea: select a set of appropriate initial clock values –assume that (1) a set of linear constraints C({d ij |i, j}, {tt k |k}); (2) the value bounds of all initial clocks (d ij ∈ [0, D ij ]) are known, determine bounds of d ij (i=1,2; j=1,2,…,n i ) to make time constraints satisfied. Method: Solve a linear programming problem –evaluate the value of Max(d ij |i, j) and Min(d ij |i,j) No solution: must-inexecutable Has a solution: may-executable the value bound of d ij : [Min(d ij |i,j), Max(d ij |i, j)] Problem: –More than one local clocks –Difficult to determine initial values of each local clock

24 Executability Analysis (cont) Problem 3: Adaptive Executable Test Sequence –A heuristic method: set part of initial clock values in advance according to the test scenario –determine whether the test sequence is must-inexecutable or may- executable If must-inexecutable then prune it from reachability tree; Else evaluate value bounds of unset initial clocks. –divide the valid clock region into several sub-regions, so that only a unique test sequence tree exists in one sub-region

25 Example: set d 21 =0 Adaptive test sequence

26 Conclusion and Future work Present a formal method to generate timed interoperability test sequence for time dependent protocols Executability analysis can be reduced to a Linear Programming problem. Alleviate state space explosion problem Future work: –Analyze fault coverage of this method –Extend this method to the more common situations of interoperability testing –Apply it to the real-life protocol testing activities

Thank you! If you have any questions, please send to: