Protocol Extraction for Blackbox-based Online Game Testing Yeonjun Choi 1,2, Seongil Jin 2, ' ETRI, 2 Chungnam National University Daej eon, Korea

Slides:



Advertisements
Similar presentations
Performance Testing - Kanwalpreet Singh.
Advertisements

Online Educational Game of Snakes and Ladders -Shalini Pradhan -Manali Joshi -Uttara Paingankar -Seema Joshi.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Mi-Joung choi, Hong-Taek Ju, Hyun-Jun Cha, Sook-Hyang Kim and J
Requirements Specification
Presenter : Shih-Tung Huang Tsung-Cheng Lin Kuan-Fu Kuo 2015/6/15 EICE team Model-Level Debugging of Embedded Real-Time Systems Wolfgang Haberl, Markus.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Introduction to the Application.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
1 Summer Report Reporter : Yi-Cheng Lin Data: 2008/09/02.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
SM3121 Software Technology Mark Green School of Creative Media.
Understanding of Load Testing Tools Especially HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
1 Proceeding the Second Exercises on Computer and Systems Engineering Professor OKAMURA Laboratory. Othman Othman M.M.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
«Tag-based Social Interest Discovery» Proceedings of the 17th International World Wide Web Conference (WWW2008) Xin Li, Lei Guo, Yihong Zhao Yahoo! Inc.,
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
DATA COMMUNICATION DONE BY: ALVIN SAMPATH CARLVIN SAMPATH.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
2013Dr. Ali Rodan 1 Handout 1 Fundamentals of the Internet.
1 CMPT 275 High Level Design Phase Architecture. Janice Regan, Objectives of Design  The design phase takes the results of the requirements analysis.
Team ThinkTank. Specifications Ad Hoc networking game. Similar to the Atari Combat! Players control their tank and shoot enemy tanks. Each player gets.
Service Architecture of Grid Faults Diagnosis Expert System Based on Web Service Wang Mingzan, Zhang ziye Northeastern University, Shenyang, China.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games (P2P-NVE 2007 workshop) Jehn-Ruey Jiang and Hung-Shiang Chen Adaptive Computing.
A Platform Independent Tool for Evaluating Performance of Computing Equipment for a Computer Laboratory Takashi Yamanoue Computing and Communications.
MULTIMEDIA DEFINITION OF MULTIMEDIA
ECRS
Loosely Coupled Parallelism: Clusters. Context We have studied older archictures for loosely coupled parallelism, such as mesh’s, hypercubes etc, which.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
The Internet 8th Edition Tutorial 4 Searching the Web.
Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games (P2P-NVE 2007 workshop) Jehn-Ruey Jiang and Hung-Shiang Chen Presenter: Shun-Yun.
Othman Othman M.M., Koji Okamura Kyushu University 1.
02/09/2010 Industrial Project Course (234313) Virtualization-aware database engine Final Presentation Industrial Project Course (234313) Virtualization-aware.
1 MMORPG Servers. 2 MMORPGs Features Avatar Avatar Levels Levels RPG Elements RPG Elements Mission Mission Chatting Chatting Society & Community Society.
TownMUD An Interface for a Text-Based Multiple User Dimension.
1 CMPT 275 High Level Design Phase Modularization.
Design of On-Demand Analysis for Cloud Service Configuration using Related-Annotation Hyogun Yoon', Hanku Lee' 2 `, ' Center for Social Media Cloud Computing,
Development of a Software Renderer for utilizing 3D Contents on a 2D-based Mobile System Sungkwan Kang 1, Joonseub Cha 2, Jimin Lee 1 and Jongan Park 1,
A Method for Providing Personalized Home Media Service Using Cloud Computing Technology Cui Yunl, Myoungjin Kim l and Hanku Lee l 'z * ' Department of.
OCR Software Architecture for Embedded Device Seho Kim', Jaehwa Park Computer Science, Chung-Ang University, Seoul, Korea
HTML5 based Notification System for Updating E-Training Contents Yu-Doo Kim 1 and Il-Young Moon 1 1 Department of Computer Science Engineering, KoreaTech,
D-skyline and T-skyline Methods for Similarity Search Query in Streaming Environment Ling Wang 1, Tie Hua Zhou 1, Kyung Ah Kim 2, Eun Jong Cha 2, and Keun.
Big traffic data processing framework for intelligent monitoring and recording systems 學生 : 賴弘偉 教授 : 許毅然 作者 : Yingjie Xia a, JinlongChen a,b,n, XindaiLu.
The Study on the Car Mechanics e-Training AR(Augmented Reality) System for Real-time Augmented Contents Ji-Yean Yoon,1, Dong-Jin Kim 1, Yu-Doo Kim 1 and.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
JavaScript Introduction and Background. 2 Web languages Three formal languages HTML JavaScript CSS Three different tasks Document description Client-side.
#16 Application Measurement Presentation by Bobin John.
A Classification for Access Control List To Speed Up Packet-Filtering Firewall CHEN FAN, LONG TAN, RAWAD FELIMBAN and ABDELSHAKOUR ABUZNEID Department.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Project GuideBenazir N( ) Mr. Nandhi Kesavan RBhuvaneshwari R( ) Batch no: 32 Department of Computer Science Engineering.
Sung-Dong Kim, Dept. of Computer Engineering, Hansung University Java - Introduction.
Best Institutes offering Software Development courses.
Segments Introduction: slides 2–6, 8 10 minutes
WWW and HTTP King Fahd University of Petroleum & Minerals
Course Outcomes of Object Oriented Modeling Design (17630,C604)
PLANNING AND DESIGNING A RESEARCH STUDY
Software Design and Architecture
Understanding and Utilizing the ISP Analysis Process
HTML5 based Notification System for Updating
YangSun Lee*, YunSik Son**
Objective of This Course
A Case for Mutual Notification
Internet Protocols IP: Internet Protocol
Presentation transcript:

Protocol Extraction for Blackbox-based Online Game Testing Yeonjun Choi 1,2, Seongil Jin 2, ' ETRI, 2 Chungnam National University Daej eon, Korea Abstract. Test automation for online games can reduce testing time and cost because it doesn't need real massive users. Blackbox-based online game testing technology makes it easier to accomplish the goal. It should analyze the game protocols in the packets between game client and server. Change of protocols and scenarios on development and testing phase make it difficult to achieve the automation. In this paper, we introduce the extraction of game protocol to improve automation level of online game testing. Keywords: online game, blackbox-based test, QA, MMORPG 1 Introduction Online Personal Computer game market size is large and grows faster than ever. Especially MMOG(Massively Multiplayer Online Game) is attracted to games users with its rich variety of story and universe, social networking, beautiful graphic effects and realistic action of game characters. MMOG game servers are usually distributed because of its massive number of concurrent user connections. Several issues in management of game servers arise like stability, tolerance, maximum performance and so on. In most of case, it can be evaluated by iterative testing with massive number of users game playing and it takes time and cost. Test automation can be a solution to reduce the cost[1]. We suggest the protocols of game packets for automated online game testing the rest of this paper. 1.1 Online game Testing LoadRunner[2] provides packet replay-based load testing functionality. Prior to test it, you should provide exact packet information. VENUS[3] is used to test online games extensible dummy virtual clients mimicking real gamer's action style, but you should also provide exact game packets and packet sequences. Many changes during development and testing phase also make it difficult to automate game testing. MMORPG games are complicated application and Session 4B 429

environment factors like massive users and internet connection quality affect the reliability and tolerance of online game. 1.2 Blackbox-based Testing In this paper, we define two types of load testing as whitebox-based load testing and blackbox-based load testing. Whitebox-based load testing means load testing technique with game contents embedding test code or recompilation in case of game protocol changes. We can achieve automated testing with blackbox-based technique[4].  Virtual clients with variable scenarios in groups. It enables us to write variable scenarios and apply them to the clients in groups.  If any virtual client meet exceptional situation like meeting enemies that the scenario does not notify, the client automatically enter battle state because the client system already has battle action sequence.  Virtual clients execute scenarios based on the analyzed protocols and real-time packet analysis. 2 Game Protocol Extraction Game character play is a series of game protocols. Blackbox-based game test needs those protocols. Sometimes it's not easy for game QA testers to get game protocol details in a few reason like frequent protocol change. In this case, you need to extract game protocols from game play data. The protocols of game, which are data packet transferred through network, are usually analyzed by human in following steps: a.Separate header from the game packet b.Extract information from game packet header, it indicates usually game data length and/or other data information c.Extract protocol id from the data section for identifying the game packet. d.Disassemble remaining data to extract the meaning of it. Packet sequence analysis is processed after protocol data is analyzed. Simply with the protocol id, you can extract the sequence of game packet data and produce the basic game scenarios from the sequences. Figure 1 show the automated steps of game packet-protocol analysis. 430 Computers, Networks, Systems, and Industrial Appications

Packet File Packet Analyzer Protocol Header(id) Field Field ( Protocol Header(id) Field I... Field I Protocol Clustering Protocol Sequence Field Text Data Candidate Fig. 1. Game packet analysis is processed through protocol extraction using clustering, sequence extraction, field analysis 2.1 Preprocessing Before game protocol analysis, game packets should be preprocessed. After that game packets are clustered to extract protocols. All input game packets should be preprocessed because packets are transformed to over-MTU(Maximum Transmission Unit) size packets and one-packed multiple packet for network transmission efficiency. There are two kinds of transformed packets  Packet is separated two or more network packets if the data size is bigger than systemically predefined MTU(Maximum Transfer Unit) size. If data packet is too small, two or more data packets are packed in one packet for transmission efficiency. In this step, we also considered game-specific data encryption of game data packet. 2.2 Clustering Packet data is automatically classified using clustering. After preprocessing step, data header is automatically extracted from data packet using data clustering. We applied two kinds of methods to extract data header and protocol id. 1) Length-based Clustering This simple idea is based on the similarity of the data packet length. If data size of two packets is same, they are probabilistically same protocol in practice. But in many cases, same protocol data does not have same data length. The experimental accuracy was under 60%. 2) Hierarchical Clustering It starts from simple idea. a) The length of the data part is not flexible in many cases. Session 4B 431

b) Protocol id appears almost same position We applied hierarchical clustering to extract header parts and protocol id parts. The experimental accuracy was over 95% using our test game contents, ELMA. Figure 2 shows clustered protocol sets. Protocol Vak Drection 1 Packet Data Protocol DeterASCII Data C->S0x21 0x x Ox00 0x200 Ox610x x600x610 5->C0x22 Ox Ox00 Ox00 0x400x08 0,620x62 0x62 0x620,620 S->C0x23 Ox x00 CIAO 0x480, One 0,63 Ova 0)&30 C->50x13 0x00 01 S->COxlb 0x00 01 C->50x17 0x00 00 C->S0x36 0x >C0x37 Ox00 0) C->50x20 0x00 S->C0x2c C->5 S- ar. 0x24 Ox00 0 Ox7S 11x00 n, No Protocol Name 9 protocol name protocol name protocol name protocol name protocol name protocol name protocol name protocol name protocol name protocol name 021 protocol name nrntnen1 name Fig. 2. Shows protocol clusters and each cluster means same protocol. 3 Conclusion In this paper, we introduced Blackbox-based testing for massive online game testing. And we also introduced how automated data extraction is accomplished during game development and testing. We developed Game packes and protocol analysis tools to capture and models the protocol for blackbox-based game testing. The result References 1.Charles P. Schultz, Robert Bryant and Tim Langdell, Game Testing All in one, Thomson Course Technology PTR, LoadRunner. [Online]. Available: 3.Bum Hyun Lim, Jin Ryong Kim and Kwang Hyun Shim, "A Load Testing Architecture for Network Virtual Environment," in Proceedings of 8th International Conference on Advanced Communication Technology, Feb, 2006, pp Blackbox and Scenario-Based Testing of Online Games Using Game Description Language, ETRI Journal, vol.33, no.3, June 2011, pp Computers, Networks, Systems, and Industrial Appications