A Formal Approach to Network/Distributed Systems Complex Testing

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-22 Number-2
Year of Publication : 2015
Authors : Andrey A. Shchurov, Radek Mařík, Vladimir A. Khlevnoy


Andrey A. Shchurov, Radek Mařík, Vladimir A. Khlevnoy "Analysis of Various Opinion Mining Algorithms". International Journal of Computer Trends and Technology (IJCTT) V22(2):76-80, April 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Deployment of network/distributed systems sets high requirements for procedures, tools and approaches for the complex testing of these systems. This work provides a survey of testing activities with regard to these systems based on standards and actual practices for both software-based and distribution (network) aspects. On the basis of this survey, we determine formal testing procedures/processes which cover these aspects, but which are not contrary to both aspects. The next step, based on the analysis of the implementation phase of System Development Life Cycle, determines a formal model for these processes.

[1] S. Delgado, "Designing Modular Software Architectures for Next- Generation Heterogeneous Networked Test Systems," in Autotestcon, 2006 IEEE, 2006.
[2] N. G. Leveson, Safeware: system safety and computers, ACM, 1995.
[3] Cisco Systems and Rockwell Automation, "Converged Plantwide Ethernet (CPwE) Design and Implementation Guide," 2011.
[4] ISO/IEC Std 9646:1994 Information technology - Open Systems Interconnection - Conformance testing methodology and framework, 1994.
[5] ITU-T Rec Z.500: Framework on Formal Methods in Conformance Testing, 1997.
[6] J. Tretmans, "An Overview of OSI Conformance Testing," 2001.
[7] T. Walter, I. Schieferdecker and J. Grabowski, "Test Architectures for Distributed Systems: State of the Art and Beyond," in Proceedings of the IFIP TC6 11th International Workshop on Testing Communicating Systems, 1998.
[8] J. Grabowski and T. Walter, "Towards an Integrated Test Methodology for Advanced Communication Systems," in Proceedings of the '16th International Conference and Exposition on Testing Computer Software (TCS'99), 1999.
[9] R. W. Buchanan, The art of testing network systems, John Wiley & Sons, 1996.
[10] A. Sholomon and T. Kunath, Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance, 1st ed., Cisco Press, 2011.
[11] A. Ranjbar, Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide, 1st ed., Cisco Press, 2010.
[12] IEEE Std 1012-1998 IEEE Standard for Software Verification and Validation, 1998.
[13] ISO/IEC/IEEE Std 12207:2008 Systems and software engineering - Software life cycle processes, 2008.
[14] ISO/IEC/IEEE Std 15288:2008 Systems and software engineering - System life cycle processes, 2008.
[15] ISO/IEC/IEEE Std 29119:2013 Software and systems engineering - Software testing, 2013.
[16] P. Ammann and J. Offutt, Introduction to Software Testing, Cambridge University Press, 2008.
[17] G. J. Myers, C. Sandler and T. Badgett, The Art of Software Testing, 3rd ed., Wiley Publishing, 2011.
[18] Torry Harris Business Solutions, "SOA Test Methodology - White Paper," 2007.
[19] Carnegie Mellon Software Engineering Institute (SEI), "CMU/SEI-2010- TR-011 - Testing in Service-Oriented Environments," 2010.
[20] M. Modarres, M. Kaminskiy and V. Krivtsov, Reliability Engineering And Risk Analysis: A Practical Guide, 2nd ed., CRC Press, 2010.
[21] RFC 2544 - Benchmarking Methodology, 1999.
[22] RFC 2889 - LAN Switch Benchmarking Methodology, 2000.
[23] RFC 3511 - Methodology for Firewall Performance, 2003.
[24] RFC 5180 - IPv6 Benchmarking Methodology, 2008.
[25] ITU-T Rec. Y.1540: Internet protocol data communication service – IP packet transfer and availability performance parameters, 2011.
[26] ITU-T Rec Y.1541: Network performance objectives for IP-based services, 2011.
[27] R. Jain, The art of computer systems performance analyzis: techniques for experimental design, measurement, simulation, and modeling, John Wiley & Sons, 1991.
[28] ITU-T Rec X.1051: Information technology - Security techniques - Information security management guidelines for telecommunications organizations, 2008.
[29] ISO/IEC Std 27001:2013 Information technology - Security Techniques - Information Security Management Systems Requirements Specification, 2013.
[30] ISO/IEC Std 27002:2013 Information technology - Security techniques - Code of practice for information security management, 2013.
[31] ISO/IEC Std 27005:2011 Information technology - Security techniques - Information security risk management, 2011.
[32] S. Yong and D. Aitel, The Hacker's Handbook. The Strategy behind Breaking into and Defending Networks, Auerbach publications, 2004.
[33] L. Allen, Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide, Packt Publishing, 2012. [34] G. Weidman, Penetration testing. A Hands-on Introduction to Hacking, No Starch Press, 2014.
[35] "Das V-Modell," [Online]. Available: http://v-modell.iabg.de/.
[36] ISO/IEC Std 7498:1994 Information technology - Open Systems Interconnection - Basic Reference Model, 1994.
[37] A. A. Shchurov, "A Formal Model of Distributed Systems For Test Generation Missions," International Journal of Computer Trends and Technology (IJCTT), vol. 15, no. 3, pp. 128-133, 2014.
[38] W. W. Royce, "Managing the development of large software systems: concepts and techniques," in Proc. IEEE WESTCON, 1970.

distributed systems, network testing, software testing.