Conformance testing of priority inheritance protocols
نویسندگان
چکیده
The priority inversion problem has been detected two decades ago. The decisive ideas to cope with this problem have been published one decade ago. In the meantime the vendors of operating systems and run–time systems have occupied this topic in providing certain protocols in order to avoid priority inversion. However, at a closer look there are considerable differences in the usage and the results of the various protocol interfaces. This is really pitiful in the scope of real–time systems, because the application programmer wants to rely on certain predictability criterions, depending only on the kind of protocol used. Hence, we propose test-suites to check the degree of conformance between the protocol proposed in literature and the one implemented in a certain environment.
منابع مشابه
Specification Based Conformance Testing for Email Protocols
The paper presents a method for conformance testing of Internet electronic mail protocols. The method is based on formal specification of the standards following the approach of the contract specification, and designing tests as traversal of a state machine. The paper presents the implementation of the method for the most widely used e-mail protocols SMTP, POP3 and IMAP4 and is illustrated by t...
متن کاملTesting Internet Applications - Terminology and Applicability
This paper examines the applicability of OSI conformance test methodology to Internet protocols. It summarizes the differences between them and introduces the Internet Reference Model along with a new abstract test method, which was designed for the practical purposes of conformance testing of TCP/IP protocols. Some interesting test cases and points, that were chosen from RIP, demonstrate the f...
متن کاملTest suite development for conformance testing of email protocols
The method for testing electronic mail protocols in the Internet to conform to the standards based on formal specifications is presented. The method is based on automated testing technology UniTESK in which functional requirements are formalized as preand postconditions and test sequence is generated on-the-fly from finite state machine (test state machine) traversal. The method is illustrated ...
متن کاملA Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs
According to the progress of high-speed networks, many communication protocols are specified as concurrent systems. Such systems can be modeled as concurrent deterministic FSMs (DFSMs). In those protocols, a common input may be taken by some of concurrent DFSMs competitively. In such a case, the global behaviour becomes non-deterministic in general. Conformance testing is typically a black-box ...
متن کاملTTCN-3 Based Conformance Testing of a Node Monitoring Protocol for MANETs
As a node monitoring protocol, which is a part of network management, operates in distributed manner, conformance testing of such protocols is more tedious than testing a peer-to-peer protocol. Various works carried out to give the methodology to do conformance testing of distributed protocol. In this paper, we have presented a formal approach for conformance testing of a Node Monitoring Protoc...
متن کامل