期刊文献+

BT协议的形式化建模与测试生成

BT Modeling and Conformance Test Generation
下载PDF
导出
摘要 B itTorrent(BT)是基于Peer-to-Peer(P2P)技术的比较流行文件共享软件,BT protoco l是其相关软件实现的一个基本协议.本文对BT协议进行深入的分析,采用有限状态机(FSM,F inite S tate M achine)对BT协议进行形式化建模,描述了正常的共享流程及部分异常处理.然后使用U IO方法生成了BT协议基于FSM模型的一致性测试序列,包括各个状态的U IO序列及各个变迁的测试序列,最后是本文的结论及下一步将要做的研究工作. BitTorrent(BT) is a popular software which is based on Peer-to-Peer (P2P)technology to support file sharing. BT protocol is a basic peer-to-peer protocol to all BT implementations. In this paper, BT protocol is deeply analyzed and its formal model is constructed with finite state machine (FSM) . The model discribes not only the formal sharing flow but also the part exception process. Whereafter the UIO method is chosen to generate the conformance test sequences including the UIO sequence of each state and test sequence of each transition. Finally, the conclusion and the research work in the future are presented.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第4期676-679,共4页 Journal of Chinese Computer Systems
基金 国家自然基金项目(60863015)资助 教育部春晖项目(z2007-1-01032)资助 内蒙古自然科学基金重点项目(200711020803 20080404ZD20)资助 内蒙古自治区高等学校科学研究项目(NJ09012)资助
关键词 BITTORRENT协议 FSM 测试序列 UIO方法 BT protocol FSM test sequence UIO
  • 相关文献

参考文献11

  • 1The true picture of peer-to-peer file sharing [ EB/OL]. http:// www. cachelogic, corn, Jan ,2006.
  • 2ISO/IEC 9646-1 open systems intereonnection-eonformance testing methodology and framework-part 1 [ S ]. General Concepts, 1994.
  • 3Harren M, Hellerstein JM, Huebsch R,et al. Complex queries in DHT-based peer-to-peer networks[Z]. Lecture Notes in Computer Science, 2002, 2429,242-250.
  • 4Steve Bellovin. Security aspects of napster and gnutella[C]. In 2001 Usenix Annual Technical Conference, Boston, Massachusetts, June,2001.
  • 5Eduardo Cunha, Gerson Sunyc, Patrick Valduriez. Action synchronization in P2P system testing[J]. ACM International Conference Proceeding Series, 2008, 261:43-49.
  • 6李娟娟,钱德沛,仝杰,邬金.基于P2P的无线传感器网络应用架构研究[J].微电子学与计算机,2006,23(9):13-15. 被引量:5
  • 7BitTorrent protocol spe, cification v1.0[ EB/OL]. http ://wiki. theory. org/BitTorrent Specification ,2008.
  • 8张涌,钱乐秋,王渊峰.基于扩展有限状态机测试中测试输入数据自动选取的研究[J].计算机学报,2003,26(10):1295-1303. 被引量:23
  • 9Deepinder sidhu. Formal methods for protocol testing: a detailed study [ J ]. IEEE Transactions on Software Engineering, April, 1989,15(4) :413-426.
  • 10马秀飞,高翔,梅杓春.两种基于UIO序列的测试序列生成算法及比较[J].计算机工程与应用,2005,41(22):76-79. 被引量:5

二级参考文献17

  • 1庞其祥,程时端,金跃辉.EFSM的等价转换和通信协议一致性测试[J].通信学报,1997,18(4):37-42. 被引量:3
  • 2奚红宇,徐红,高仲仪.Ada软件测试用例生成工具[J].软件学报,1997,8(4):297-302. 被引量:6
  • 3Ana R Cavalli,Jean Philippe Favreau,Marc Phalippou. Standardization of Formal Methods in Conformance Testing of Communication Protocols [J].Computer Networks and ISDN System,1996;29:3~14.
  • 4Raymond E Miler,Sanjoy Paul. Generating Minimal Length Test Sequences for Conformance Testing of Communication Protocols[C ].In:Proc IEEE INFOCOM'91,1991:970~979.
  • 5H Motteler,A Chung,D Sidhu.Fault Coverage of UIO-based Methods for Protocol Testing[C].In:O Rafiq ed. Proc IFIP Protocol Test Systems,Ⅵ(C-19), 1994: 21~33.
  • 6K Sabnani,A Dahbura. A protocol test generation procedure[J].Computer Network and ISDN System, 1988; 15 (4) :285~297.
  • 7Robert Sedgewick.Algorithms in C++Graph Algorithms[M].北京:清华大学出版社.2003.
  • 8DouglasEComer DavidLStevens.用TCP/IP进行网际互联第一卷[M]:第四版[M].北京:电子工业出版社,2003..
  • 9Jinglun Shi,Weiping Liu.A service-oriented model for wreless sensor networks with Internet[A].The Fifth International Conference[C].New York:IEEE Press 2005:1045 ~1049
  • 10Srdjan Krco,David Cleary,Dary Parker.P2P mobile sensor networks[A].Proceeding of the 38th Hawaii International Conference on System Science[C].IEEE Press 2005:324c~324c

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部