Spelling suggestions: "subject:"computer network protocols."" "subject:"coomputer network protocols.""
1 |
Protocol test sequence generation and analysis using AI techniquesKo, Kai-Chung January 1990 (has links)
This thesis addresses two major issues in protocol conformance testing: test sequence generation and test result analysis. For test sequence generation, a new approach based on the constraint satisfaction problem (CSP) techniques, which is widely used in the AI community, is presented. This method constructs a unique test sequence for a given FSM by using an initial test sequence, such as a transition tour or an UIO test sequence, and incrementally generating a set of test subsequences which together represent the constraints imposed on the overall structure of the FSM. The new method not only generates test sequence with fault coverage which is at least as good as the one provided by the existing methods, but also allows the implementation under test (IUT) to have a larger number of states than that in the specification. In addition, the new method also lends itself naturally to both test result analysis and fault coverage measurement.
For test result analysis, the CSP method uses the observed sequence as the initial sequence, constructs all fault models which satisfy the initial sequence and introduces additional subsequences to pinpoint the IUT fault model. In addition, a second method for test result analysis is proposed, which is originated from a model of diagnostic reasoning from first principle, another well-known AI techniques which produces all minimal diagnoses by considering the overall consistency of the system together with the observation. Unlike the first method, the second method does not require the computation of all fault models explicitly, and hence is considered to be more suitable for large systems.
To our knowledge, the proposed methods in this thesis represent the first attempt in applying AI techniques to the problem of protocol test sequence generation and analysis. / Science, Faculty of / Computer Science, Department of / Graduate
|
2 |
Open systems interconnection passive monitor OSI-PMLo, Jeffrey Kin Hung January 1990 (has links)
The Open Systems Interconnection Passive Monitor (OSI-PM), which is based on the principles of the OSI-Reference Model (OSI-RM), provides a framework for the development
of multi-layer passive monitoring and testing. It adopts the same seven-layer architecture of the OSI-RM and provides the capability of selectively displaying, capturing,
and analyzing the protocol events on single or multiple connections for any subset or all of the seven layers. Different from conventional monitors, the OSI-PM is able to detect protocol violation as they occur in addition to the monitoring functions. The current OSI-PM is able to monitor and test up to the transport layer of the OSI-RM. This thesis discusses the design, prototype implementation and testing of the OSI-PM. / Science, Faculty of / Computer Science, Department of / Graduate
|
3 |
Application of the ferry clip approach to multi-party and interoperability testingDany, Hendra January 1990 (has links)
As communications protocols are becoming more complex and sophisticated, developing
a test system that has the ability to provide a controlled environment for comprehensive
protocol testing is essential to achieve a "real open system". This thesis advocates the need for a multi-party test method as currently identified by ISO, and discusses two important aspects of protocol testing: Conformance and Interoperability. They are complementary to each other and are necessary to ensure the conformity and interoperability
of a protocol implementation. The proposed ferry clip based test architecture is presented. Both the concepts and design principles employed to achieve a flexible and generalized test system and the specific components which comprise the Ferry Clip based Test System are described. The test system is general and flexible not only with respect to the test configurations and test methods but also with respect to the protocol to be tested, the system under test, and the underlying communication system. Applications of the ferry clip approach to multi-party conformance and interoperability testing are discussed, followed by an example of MHS conformance testing which demonstrates the applicability of the ferry clip approach to multi-party testing. / Science, Faculty of / Computer Science, Department of / Graduate
|
4 |
An algorithm for detecting and resolving store-and-forward deadlocks in packet-switched networks.January 1986 (has links)
by Chan Cheung-wing. / Bibliography: leaves 62-63 / Thesis (M.Ph.)--Chinese University of Hong Kong, 1986
|
5 |
Description of a file access protocol for computer networksPelletier, Larry Edward January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
6 |
Test design for computer network protocolsSarikaya, Behcet. January 1984 (has links)
No description available.
|
7 |
(Re)Designing the Internet: a critical constructivist analysis of the next generation Internet Protocol /Felczak, Michael. January 2005 (has links)
Thesis (M.A.) - Simon Fraser University, 2005. / Theses (School of Communication) / Simon Fraser University. Also issued in digital format and available on the World Wide Web.
|
8 |
Protocol design in an uncooperative Internet /Savage, Stefan R., January 2002 (has links)
Thesis (Ph. D.)--University of Washington, 2002. / Vita. Includes bibliographical references (p. 90-102).
|
9 |
Test design for computer network protocolsSarikaya, Behcet. January 1984 (has links)
Communication protocol testing can be done with a test architecture consisting of remote Tester and local Responder processes. By ignoring interaction primitive parameters and additional state variables, it is possible to adapt test sequence generation techniques for finite state machines (FSM) to generate sequences for protocols specified as incomplete finite state machines. / For real protocols, tests can be designed based on the formal specification of the protocol which uses an extended FSM model in specifying the transition types. The transition types are transformed into a simpler form called normal form transitions which can be modelled by a control and a data flow graph. Furthermore, the data flow graph is partitioned to obtain disjoint blocks representing the different functions of the protocol. Tests are designed by considering parameter variations of the input primitives of each data flow function and determining the expected outputs. This methodology gives complete test coverage of all data flow functions and tests for unspecified cases can be designed using the control and data flow graphs. The methodology is applied to two real protocols: Transport protocols Classes 0 and 2.
|
10 |
Symmetry breaking on networks of processesStyer, Eugene Fred January 1989 (has links)
No description available.
|
Page generated in 0.0763 seconds