期刊文献+

From Active to Passive——Progress in Testing Internet Routing Protocols 被引量:2

原文传递
导出
摘要 Routing protocols play an important role in the Internet and the test requirements are running up. To test routing protocols more efficiently, several enhancing techniques are applied in the protocol integrated test system described in this paper. The Implementation Under Test is modeled as a black box with windows. The test system is endowed with multiple channels and multiple ports to test distributed protocols. The test suite and other related aspects are also extended. Meanwhile, the passive testing is introduced to test, analyze and manage routing protocols in the production field, which is able to perform the conformance test, the interoperability test and the performance test. The state machine of peer sessions is tested with the state synchronization algorithm, and the routing information manipulation and other operations are checked and analyzed with the methods like the topology analysis and the internal process simulation. With both the active testing and the passive testing, the routing protocol test is going further and more thoroughly and helps a lot in the development of routers.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2002年第3期264-283,共20页 计算机科学技术学报(英文版)
基金 国家自然科学基金
  • 相关文献

参考文献1

共引文献5

同被引文献9

  • 1Malkin G. RFC 2453 RIP Version 2[ S], November 1998.
  • 2Malkin G, Minnear R. RFC 2080 RIPng for IPv6 [ S], January 1997.
  • 3Moy J. RFC 2328 OSPF Version 2[S], April 1998.
  • 4Coltun R, Ferguson D, Moy J. RFC 2740 OSPF for IPv6[ S], December 1999.
  • 5Sarikaya B . Principles of Protocol Engineering and Conformance Testijag[ A]. Ellis Horwood, Series in Computer Communications and Networking[ C], 1993.
  • 6Sidhu D, Leung T. Formal method for protocol testing: A detailed stud[J]. IEEE Trans. On software Engineering, 1989, 15(4).
  • 7ISO/IEC 9646 - 1 : IT - OSI - Conformance testing methodology and framework: Part 1 : General concepts[ S].
  • 8ZHOU Wen Zhe,,ALAN M,GU Qiang.A novel classification scheme for 802. 11 WLAN active attacking traffic patterns[].Wireless Communications and Networking Conference.2006
  • 9Borisov N,Goldberg I,Wagner D.Intercepting mobile communications: The insecurity of 802.11[].The Seventh Annual International Conference on Mobile Computer and Networking.2001

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部