A Formal Approach to Network/Distributed Systems Complex Testing

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-22 Number-2
Year of Publication : 2015
Authors : Andrey A. Shchurov, Radek Mařík, Vladimir A. Khlevnoy
  10.14445/22312803/IJCTT-V22P115

MLA

Andrey A. Shchurov, Radek Mařík, Vladimir A. Khlevnoy "Analysis of Various Opinion Mining Algorithms". International Journal of Computer Trends and Technology (IJCTT) V22(2):76-80, April 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Deployment of network/distributed systems sets high requirements for procedures, tools and approaches for the complex testing of these systems. This work provides a survey of testing activities with regard to these systems based on standards and actual practices for both software-based and distribution (network) aspects. On the basis of this survey, we determine formal testing procedures/processes which cover these aspects, but which are not contrary to both aspects. The next step, based on the analysis of the implementation phase of System Development Life Cycle, determines a formal model for these processes.

References
[1] S. Delgado, "Designing Modular Software Architectures for Next- Generation Heterogeneous Networked Test Systems," in Autotestcon, 2006 IEEE, 2006.
[2] N. G. Leveson, Safeware: system safety and computers, ACM, 1995.
[3] Cisco Systems and Rockwell Automation, "Converged Plantwide Ethernet (CPwE) Design and Implementation Guide," 2011.
[4] ISO/IEC Std 9646:1994 Information technology - Open Systems Interconnection - Conformance testing methodology and framework, 1994.
[5] ITU-T Rec Z.500: Framework on Formal Methods in Conformance Testing, 1997.
[6] J. Tretmans, "An Overview of OSI Conformance Testing," 2001.
[7] T. Walter, I. Schieferdecker and J. Grabowski, "Test Architectures for Distributed Systems: State of the Art and Beyond," in Proceedings of the IFIP TC6 11th International Workshop on Testing Communicating Systems, 1998.
[8] J. Grabowski and T. Walter, "Towards an Integrated Test Methodology for Advanced Communication Systems," in Proceedings of the '16th International Conference and Exposition on Testing Computer Software (TCS'99), 1999.
[9] R. W. Buchanan, The art of testing network systems, John Wiley & Sons, 1996.
[10] A. Sholomon and T. Kunath, Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance, 1st ed., Cisco Press, 2011.
[11] A. Ranjbar, Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide, 1st ed., Cisco Press, 2010.
[12] IEEE Std 1012-1998 IEEE Standard for Software Verification and Validation, 1998.
[13] ISO/IEC/IEEE Std 12207:2008 Systems and software engineering - Software life cycle processes, 2008.
[14] ISO/IEC/IEEE Std 15288:2008 Systems and software engineering - System life cycle processes, 2008.
[15] ISO/IEC/IEEE Std 29119:2013 Software and systems engineering - Software testing, 2013.
[16] P. Ammann and J. Offutt, Introduction to Software Testing, Cambridge University Press, 2008.
[17] G. J. Myers, C. Sandler and T. Badgett, The Art of Software Testing, 3rd ed., Wiley Publishing, 2011.
[18] Torry Harris Business Solutions, "SOA Test Methodology - White Paper," 2007.
[19] Carnegie Mellon Software Engineering Institute (SEI), "CMU/SEI-2010- TR-011 - Testing in Service-Oriented Environments," 2010.
[20] M. Modarres, M. Kaminskiy and V. Krivtsov, Reliability Engineering And Risk Analysis: A Practical Guide, 2nd ed., CRC Press, 2010.
[21] RFC 2544 - Benchmarking Methodology, 1999.
[22] RFC 2889 - LAN Switch Benchmarking Methodology, 2000.
[23] RFC 3511 - Methodology for Firewall Performance, 2003.
[24] RFC 5180 - IPv6 Benchmarking Methodology, 2008.
[25] ITU-T Rec. Y.1540: Internet protocol data communication service – IP packet transfer and availability performance parameters, 2011.
[26] ITU-T Rec Y.1541: Network performance objectives for IP-based services, 2011.
[27] R. Jain, The art of computer systems performance analyzis: techniques for experimental design, measurement, simulation, and modeling, John Wiley & Sons, 1991.
[28] ITU-T Rec X.1051: Information technology - Security techniques - Information security management guidelines for telecommunications organizations, 2008.
[29] ISO/IEC Std 27001:2013 Information technology - Security Techniques - Information Security Management Systems Requirements Specification, 2013.
[30] ISO/IEC Std 27002:2013 Information technology - Security techniques - Code of practice for information security management, 2013.
[31] ISO/IEC Std 27005:2011 Information technology - Security techniques - Information security risk management, 2011.
[32] S. Yong and D. Aitel, The Hacker's Handbook. The Strategy behind Breaking into and Defending Networks, Auerbach publications, 2004.
[33] L. Allen, Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide, Packt Publishing, 2012. [34] G. Weidman, Penetration testing. A Hands-on Introduction to Hacking, No Starch Press, 2014.
[35] "Das V-Modell," [Online]. Available: http://v-modell.iabg.de/.
[36] ISO/IEC Std 7498:1994 Information technology - Open Systems Interconnection - Basic Reference Model, 1994.
[37] A. A. Shchurov, "A Formal Model of Distributed Systems For Test Generation Missions," International Journal of Computer Trends and Technology (IJCTT), vol. 15, no. 3, pp. 128-133, 2014.
[38] W. W. Royce, "Managing the development of large software systems: concepts and techniques," in Proc. IEEE WESTCON, 1970.

Keywords
distributed systems, network testing, software testing.