0% found this document useful (0 votes)
7 views

Unit 2

Unit 2

Uploaded by

Y Rhino
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Unit 2

Unit 2

Uploaded by

Y Rhino
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

BASICS OF PATH TESTING:

• PATH TESTING:

➢ Path Testing is the name given to a family of test techniques based on


judiciously selecting a set of test paths through the program.
➢ If the set of paths are properly chosen then we have achieved some measure
of test thoroughness. For example, pick enough paths to assure that every
source statement has been executed at least once.
➢ Path testing techniques are the oldest of all structural test techniques.
➢ Path testing is most applicable to new software for unit testing. It is a structural
technique.
➢ It requires complete knowledge of the program's structure.
➢ It is most often used by programmers to unit test their own code.
➢ The effectiveness of path testing rapidly deteriorates as the size of the software
aggregate under test increases.

• THE BUG ASSUMPTION:

➢ The bug assumption for the path testing strategies is that something has gone wrong
with the software that makes it take a different path than intended.
➢ As an example "GOTO X" where "GOTO Y" had been intended.
➢ Structured programming languages prevent many of the bugs targeted by path
testing: as a consequence the effectiveness for
➢ path testing for these languages is reduced and for old code in COBOL, ALP,
FORTRAN and Basic, the path testing is indespensable.

• CONTROL FLOW GRAPHS:

➢ The control flow graph is a graphical representation of a program's control structure.


It uses the elements named process blocks, decisions, and junctions.
➢ The flow graph is similar to the earlier flowchart, with which it is not to be confused.
➢ Flow Graph Elements:A flow graph contains four different types of elements. (1)
Process Block (2) Decisions (3) Junctions (4) Case Statements

1. Process Block:

➢ A process block is a sequence of program statements uninterrupted by either


decisions or junctions.
➢ It is a sequence of statements such that if any one of statement of the block is
executed, then all statement thereof are executed.
➢ Formally, a process block is a piece of straight-line code of one statement or hundreds
of statements.
➢ A process has one entry and one exit. It can consists of a single statement or
instruction, a sequence of statements or instructions, a single entry/exit subroutine, a
macro or function call, or a sequence of these.

2. Decisions:

➢ A decision is a program point at which the control flow can diverge.


➢ Machine language conditional branch and conditional skip instructions are examples
of decisions.
➢ Most of the decisions are two-way but some are three way branches in control flow.

3. Case Statements:

➢ A case statement is a multi-way branch or decisions.


➢ Examples of case statement are a jump table in assembly language, and the PASCAL
case statement.
➢ From the point of view of test design, there are no differences between Decisions and
Case Statements

4. Junctions:

➢ A junction is a point in the program where the control flow can merge.
➢ Examples of junctions are: the target of a jump or skip instruction in ALP, a label that
is a target of GOTO.

Figure 2.1: Flowgraph Elements

• CONTROL FLOW GRAPHS Vs FLOWCHARTS:

➢ A program's flow chart resembles a control flow graph.


➢ In flow graphs, we don't show the details of what is in a process block.
➢ In flow charts every part of the process block is drawn.
➢ The flowchart focuses on process steps, where as the flow graph focuses on control
flow of the program.
➢ The act of drawing a control flow graph is a useful tool that can help us clarify the
control flow and data flow issues.
• NOTATIONAL EVOULTION:

➢ The control flow graph is simplified representation of the program's structure.


➢ The notation changes made in creation of control flow graphs:

1. The process boxes weren't really needed. There is an implied process


on every line joining junctions and decisions.
2. We don't need to know the specifics of the decisions, just the fact that
there is a branch.
3. The specific target label names aren't important-just the fact that they
exist. So we can replace them by simple numbers.
4. To understand this, we will go through an example (Figure 2.2) written in
a FORTRAN like programming language called Programming Design
Language (PDL). The program's corresponding flowchart (Figure 2.3) and
flowgraph (Figure 2.4) were also provided below for better understanding.
5. The first step in translating the program to a flowchart is shown in Figure
2.3, where we have the typical one-for-one classical flowchart. Note that
complexity has increased, clarity has decreased, and that we had to add
auxiliary labels (LOOP, XX, and YY), which have no actual program
counterpart. In Figure 2.4 we merged the process steps and replaced them
with the single process box. We now have a control flowgraph. But this
representation is still too busy. We simplify the notation further to achieve
Figure 2.5, where for the first time we can really see what the control flow
looks like.
Figure 2.2: Program Example (PDL)

Figure 2.3: One-to-one flowchart for


example program in Figure 2.2
Figure 2.4: Control Flowgraph for example
in Figure 2.2

Figure 2.5: Simplified Flowgraph Notation


Figure 2.6: Even Simplified Flowgraph Notation

The final transformation is shown in Figure 2.6, where we've dropped


the node numbers to achieve an even simpler representation. The way to work with
control flowgraphs is to use the simplest possible representation - that is, no more
information than you need to correlate back to the source program or PDL.

• LINKED LIST REPRESENTATION:

➢ Although graphical representations of flowgraphs are revealing, the details of the


control flow inside a program they are often inconvenient.
➢ In linked list representation, each node has a name and there is an entry on the list
for each link in the flow graph. only the information pertinent to the control flow is
shown.

Linked List representation of Flow Graph:

Figure 2.7: Linked List Control Flowgraph Notation


• FLOWGRAPH - PROGRAM CORRESPONDENCE:

➢ A flow graph is a pictorial representation of a program and not the program itself, just
as a topographic map.
➢ You can’t always associate the parts of a program in a unique way with flowgraph
parts because many program structures, such as if-then-else constructs, consists of
a combination of decisions, junctions, and processes.
➢ The translation from a flowgraph element to a statement and vice versa is not always
unique. (See Figure 2.8)

Figure 2.8: Alternative Flowgraphs for same logic


(Statement "IF (A=0) AND (B=1) THEN . . .").

➢ An improper translation from flowgraph to code during coding can lead to bugs, and
improper translation during the test design lead to missing test cases and causes
undiscovered bugs.

• FLOWGRAPH AND FLOWCHART GENERATION:


➢ Flowcharts can be

1. Handwritten by the programmer.


2. Automatically produced by a flowcharting program based on a mechanical analysis
of the source code.
3. Semi automatically produced by a flow charting program based in part on structural
analysis of the source code and in part on directions given by the programmer.

➢ There are relatively few control flow graph generators.

• PATH TESTING - PATHS, NODES AND LINKS:

➢ Path:a path through a program is a sequence of instructions or statements that


starts at an entry, junction, or decision and ends at another, or possibly the same
junction, decision, or exit.
➢ A path may go through several junctions, processes, or decisions, one or more times.
➢ Paths consists of segments.
➢ The segment is a link - a single process that lies between two nodes.
➢ A path segment is succession of consecutive links that belongs to some path.
➢ The length of path measured by the number of links in it and not by the number of the
instructions or statements executed along that path.
➢ The name of a path is the name of the nodes along the path.

• FUNDAMENTAL PATH SELECTION CRITERIA:

➢ There are many paths between the entry and exit of a typical routine.
➢ Every decision doubles the number of potential paths.
➢ every loop multiplies the number of potential paths by the number of different iteration
values possible for the loop.

➢ Defining complete testing:

1. Exercise every path from entry to exit


2. Exercise every statement or instruction at least once
3. Exercise every branch and case statement, in each direction at least
once

➢ If prescription 1 is followed then 2 and 3 are automatically followed. But it is impractical


for most routines. It can be done for the routines that have no loops, in which it is
equivalent to 2 and 3 prescriptions.
➢ EXAMPLE:Here is the correct version.

For X negative, the output is X + A, while for X greater than or equal to zero,
the output is X + 2A. Following prescription 2 and executing every statement,
but not every branch, would not reveal the bug in the following incorrect
version:

A negative value produces the correct answer. Every statement can be


executed, but if the test cases do not force each branch to be taken, the bug
can remain hidden. The next example uses a test based on executing each
branch but does not force the execution of all statements:
The hidden loop around label 100 is not revealed by tests based on prescription 3
alone because no test forces the execution of statement 100 and the following
GOTO statement. Furthermore, label 100 is not flagged by the compiler as an
unreferenced label and the subsequent GOTO does not refer to an undefined label.

➢ A Static Analysis (that is, an analysis based on examining the source code or
structure) cannot determine whether a piece of code is or is not reachable. There
could be subroutine calls with parameters that are subroutine labels, or in the above
example there could be a GOTO that targeted label 100 but could never achieve a
value that would send the program to that label.
➢ Only a Dynamic Analysis (that is, an analysis based on the code's behavior while
running - which is to say, to all intents and purposes, testing) can determine whether
code is reachable or not and therefore distinguish between the ideal structure we think
we have and the actual, buggy structure.

• PATH TESTING CRITERIA:


➢ Any testing strategy based on paths must at least both exercise every instruction and
take branches in all directions.
➢ A set of tests that does this is not complete in an absolute sense, but it is complete in
the sense that anything less must leave something untested.
➢ So we have explored three different testing criteria or strategies out of a potentially
infinite family of strategies.

1.Path Testing (Pinf):


➢ Execute all possible control flow paths through the program: typically, this is restricted
to all possible entry/exit paths through the program.
➢ If we achieve this prescription, we are said to have achieved 100% path coverage.
This is the strongest criterion in the path testing strategy family: it is generally
impossible to achieve.

2. Statement Testing (P1):


➢ Execute all statements in the program at least once under some test. If we do enough
tests to achieve this, we are said to have achieved 100% statement coverage.
➢ An alternate equivalent characterization is to say that we have achieved 100% node
coverage. We denote this by C1.
➢ This is the weakest criterion in the family: testing less than this for new software is
unconscionable (unprincipled or can not be accepted) and should be criminalized.

3.Branch Testing (P2):


➢ Execute enough tests to assure that every branch alternative has been exercised at
least once under some test.
➢ If we do enough tests to achieve this prescription, then we have achieved 100%
branch coverage.
➢ An alternative characterization is to say that we have achieved 100% link coverage.
➢ For structured software, branch testing and therefore branch coverage strictly
includes statement coverage.
➢ We denote branch coverage by C2.

Commonsense and Strategies:


1. Branch and statement coverage are accepted today as the minimum mandatory
testing requirement.
2. The question "why not use a judicious sampling of paths?, what is wrong with
leaving some code, untested?" is ineffectual in the view of common sense and
experience since:
(1.) Not testing a piece of a code leaves a residue of bugs in the program in proportion
to the size of the untested code and the probability of bugs.

(2.)The high probability paths are always thoroughly tested if only to demonstrate that
the system works properly.

3. Which paths to be tested? You must pick enough paths to achieve C1+C2. The
question of what is the fewest number of such paths is interesting to the designer of
test tools that help automate the path testing, but it is not crucial to the pragmatic
(practical) design of tests. It is better to make many simple paths than a few
complicated paths.
4. Path Selection Example:

Figure 2.9: An example flowgraph to explain path selection

5. Practical Suggestions in Path Testing:


➢ Draw the control flow graph on a single sheet of paper.
➢ Make several copies - as many as you will need for coverage (C1+C2) and several
more.
➢ Use a yellow highlighting marker to trace paths. Copy the paths onto a master sheets.
➢ Continue tracing paths until all lines on the master sheet are covered, indicating that
you appear to have achieved C1+C2.
➢ As you trace the paths, create a table that shows the paths, the coverage status of
each process, and each decision.
➢ The above paths lead to the following table considering Figure 2.9:

▪ After you have traced a a covering path set on the master sheet and filled in the table
for every path, check the following:

1. Does every decision have a YES and a NO in its column? (C2)


2. Has every case of all case statements been marked? (C2)
3. Is every three - way branch (less, equal, greater) covered? (C2)
4. Is every link (process) covered at least once? (C1)
5. Revised Path Selection Rules:
6. Pick the simplest, functionally sensible entry/exit path.
7. Pick additional paths as small variation from previous paths. Pick paths that
do not have loops rather than paths that do. Favor short paths that make
sense over paths that don't.
8. Pick additional paths that have no obvious functional meaning only if it's
necessary to provide coverage.
9. Be comfortable with your chosen paths. Play your hunches (guesses) and
give your intuition free reign as long as you achieve C1+C2.
10. Don't follow rules slavishly (blindly) - except for coverage.

• LOOPS:
Cases for a single loop:A Single loop can be covered with two cases: Looping and Not
looping. But, experience shows that many loop-related bugs are not discovered by C1+C2.
Bugs hide themselves in corners and congregate at boundaries - in the cases of loops, at
or around the minimum or maximum number of times the loop can be iterated. The
minimum number of iterations is often zero, but it need not be.

CASE 1: Single loop, Zero minimum, N maximum, No excluded values

▪ Try bypassing the loop (zero iterations). If you can't, you either have a bug, or zero
is not the minimum and you have the wrong case.
▪ Could the loop-control variable be negative? Could it appear to specify a negative
number of iterations? What happens to such a value?
▪ One pass through the loop.
▪ Two passes through the loop.
▪ A typical number of iterations, unless covered by a previous test.
▪ One less than the maximum number of iterations.
▪ The maximum number of iterations.
▪ Attempt one more than the maximum number of iterations. What prevents the loop-
control variable from having this value? What will happen with this value if it is
forced?
CASE 2: Single loop, Non-zero minimum, No excluded values

▪ Try one less than the expected minimum. What happens if the loop control variable's
value is less than the minimum? What prevents the value from being less than the
minimum?
▪ The minimum number of iterations.
▪ One more than the minimum number of iterations.
▪ Once, unless covered by a previous test.
▪ Twice, unless covered by a previous test.
▪ A typical value.
▪ One less than the maximum value.
▪ The maximum number of iterations.
▪ Attempt one more than the maximum number of iterations.

CASE 3: Single loops with excluded values

▪ Treat single loops with excluded values as two sets of tests consisting of loops
without excluded values, such as case 1 and 2 above.
▪ Example, the total range of the loop control variable was 1 to 20, but that values
7,8,9,10 were excluded. The two sets of tests are 1-6 and 11-20.
▪ The test cases to attempt would be 0,1,2,4,6,7 for the first range and
10,11,15,19,20,21 for the second range.

Kinds of Loops:There are only three kinds of loops with respect to path testing:

1. Nested Loops:
1. The number of tests to be performed on nested loops will be the exponent of the
tests performed on single loops.
2. As we cannot always afford to test all combinations of nested loops' iterations
values. Here's a tactic used to discard some of these values:
1. Start at the inner most loop. Set all the outer loops to their minimum values.
2. Test the minimum, minimum+1, typical, maximum-1 , and maximum for the
innermost loop, while holding the outer loops at their minimum iteration parameter
values. Expand the tests as required for out of range and excluded values.
3. If you've done the outmost loop, GOTO step 5, else move out one loop and set it up
as in step 2 with all other loops set to typical values.
4. Continue outward in this manner until all loops have been covered.
5. Do all the cases for all loops in the nest simultaneously.

2. Concatenated Loops:

1. Concatenated loops fall between single and nested loops with respect to test cases.
Two loops are concatenated if it's possible to reach one after exiting the other while
still on a path from entrance to exit.
2. If the loops cannot be on the same path, then they are not concatenated and can
be treated as individual loops.

3. Horrible Loops:

1. A horrible loop is a combination of nested loops, the use of code that jumps into
and out of loops, intersecting loops, hidden loops, and cross connected loops.
2. Makes iteration value selection for test cases an awesome and ugly task, which is
another reason such structures should be avoided.
Figure 2.10: Example of Loop types
Loop Testing Time :

▪ Any kind of loop can lead to long testing time, especially if all the extreme value
cases are to attempted (Max-1, Max, Max+1).
▪ This situation is obviously worse for nested and dependent concatenated loops.
▪ Consider nested loops in which testing the combination of extreme values lead to
long test times. Several options to deal with:
1. Prove that the combined extreme cases are hypothetically possible, they are not
possible in the real world
2. Put in limits or checks that prevent the combined extreme cases. Then you have
to test the software that implements such safety measures.

PREDICATES, PATH PREDICATES AND ACHIEVABLE


PATHS:

PREDICATE: The logical function evaluated at a decision is called


Predicate. The direction taken at a decision depends on the value of decision
variable. Some examples are: A>0, x+y>=90.......

PATH PREDICATE: A predicate associated with a path is called a


Path Predicate. For example, "x is greater than zero", "x+y>=90", "w is either
negative or equal to 10 is true" is a sequence of predicates whose truth
values will cause the routine to take a specific path.
MULTIWAY BRANCHES:

▪ The path taken through a multiway branch such as a computed GOTO's, case
statement, or jump tables cannot be directly expressed in TRUE/FALSE terms.
▪ Although, it is possible to describe such alternatives by using multi valued logic, an
expedient (practical approach) is to express multiway branches as an equivalent
set of if..then..else statements.
▪ For example a three way case statement can be written as: If case=1 DO A1 ELSE
(IF Case=2 DO A2 ELSE DO A3 ENDIF)ENDIF.

INPUTS:

▪ In testing, the word input is not restricted to direct inputs, but includes all data
objects referenced by the routine whose values are fixed prior to entering it.
▪ Example:--
▪ inputs in a calling sequence,
▪ objects in a data structure,
▪ values left in registers, or
▪ any combination of object types.
▪ The input for a particular test is mapped as a one-dimensional array called as an
Input Vector.

PREDICATE INTERPRETATION:

▪ The simplest predicate depends only on input variables.


▪ For example if x1,x2 are inputs, the predicate might be x1+x2>=7, given the values
of x1 and x2 the direction taken through the decision is based on the predicate is
determined at input time and does not depend on processing.
▪ Another example, assume a predicate x1+y>=0 that along a path prior to reaching
this predicate we had the assignment

x1+y>=0 ----------→ y=x2+7 ----------→ x1+x2+7>=0.


▪ statement y=x2+7. although our predicate depends on processing, we can
substitute the symbolic expression for y to obtain an equivalent predicate
x1+x2+7>=0.
▪ The act of symbolic substitution of operations along the path in order to express the
predicate solely in terms of the input vector is called predicate
interpretation.(Collection of input operations to make the predicate in terms of input
vector or path is called predicate Interpretation)
▪ Sometimes the interpretation may depend on the path; for example,
6. INPUT X
7. ON X GOTO A, B, C, ...
8. A: Z := 7 @ GOTO HEM
9. B: Z := -7 @ GOTO HEM Here HEM , ELL, EMM are
10. C: Z := 0 @ GOTO HEM lables.
11. .........
12. HEM: DO SOMETHING
13. .........
14. HEN: IF Y + Z > 0 GOTO ELL ELSE GOTO EMM
The predicate interpretation at HEN depends on the path we took through the first
multiway branch. It yields for the three cases respectively, if Y+7>0, Y-7>0, Y>0.

The path predicates are the specific form of the predicates of the decisions along the
selected path after interpretation.

INDEPENDENCE OF VARIABLES AND PREDICATES:

• The path predicates take on truth values based on the values of input variables, either
directly or indirectly.
• If a variable's value does not change as a result of processing, that variable is
independent of the processing.
• If the variable's value can change as a result of the processing, the variable is process
dependent.
• A predicate whose truth value can change as a result of the processing is said to
be process dependent and one whose truth value does not change as a result of the
processing is process independent.
• Process dependence of a predicate does not always follow from dependence of the
input variables on which that predicate is based.

CORRELATION OF VARIABLES AND PREDICATES:


• Two variables are correlated if every combination of their values cannot be
independently specified.
• Variables whose values can be specified independently without restriction are called
uncorrelated.
• A pair of predicates whose outcomes depend on one or more variables in common are
said to be correlated predicates.

For example, the predicate X==Y is followed by another predicate X+Y == 8. If we


select X and Y values to satisfy the first predicate, we might have forced the 2nd
predicate's truth value to change.

• Every path through a routine is achievable only if all the predicates in that routine are
uncorrelated.

PATH PREDICATE EXPRESSIONS:


A path predicate expression is a set of Boolean expressions, all of which must be satisfied
to achieve the selected path. (Collection of Boolean expressions to satisfy the selected
path)

Example:

X1+3X2+17>=0
X3=17
X4-X1>=14X2

Any set of input values that satisfy all of the conditions of the path predicate expression will
force the routine to the path.

Sometimes a predicate can have an OR in it.

Example:

A: X5 > 0 E: X6 < 0
B: X1 + 3X2 + 17 >= 0 B: X1 + 3X2 + 17 >= 0
C: X3 = 17 C: X3 = 17
D: X4 - X1 >= 14X2 D: X4 - X1 >= 14X2

Boolean algebra notation to denote the boolean expression:

ABCD+EBCD=(A+E)BCD

Compound Predicate: Predicates of the form A OR B, A AND B and more complicated


boolean expressions are called as compound predicates.

Some times even a simple predicate becomes compound after interpretation. Example:
the predicate if (x=17) whose opposite branch is if x.NE.17 which is equivalent to x>17 .
Or. X<17.

PREDICATE COVERAGE:
• Predicate coverage is being the achieving of all possible combinations of truth values
corresponding to the selected path have been explored under some test.

As achieving the desired direction at a given decision could still hide bugs in the associated
predicates.

TESTING BLINDNESS:
Testing Blindness is a pathological (harmful) situation in which the desired path is achieved
for the wrong reason.

There are three types of Testing Blindness:

1.Assignment Blindness
2.Equality Blindness
3.Self Blindness

1.Assignment Blindness:
• Assignment blindness occurs when the buggy predicate appears to work correctly
because the specific value chosen for an assignment statement works with both the
correct and incorrect predicate.
• For Example:

• Correct • Buggy
• X=7 • X=7
........ ........
if Y > 0 then ... if X+Y > 0 then ...
• If the test case sets Y=1 the desired path is taken in either case, but there is still a
bug.

2.Equality Blindness:
• Equality blindness occurs when the path selected by a prior predicate results in a
value that works both for the correct and buggy predicate.
• For Example:

Correct Buggy
if Y = 2 then if Y = 2 then
........ ........
if X+Y > 3 then ... if X > 1 then ...

• The first predicate if y=2 forces the rest of the path, so that for any positive value of
x. the path taken at the second predicate will be the same for the correct and buggy
version.

3.Self Blindness:
• Self blindness occurs when the buggy predicate is a multiple of the correct predicate
and as a result is indistinguishable along that path.
• For Example:

Correct Buggy
X = A X = A
........ ........
if X-1 > 0 then ... if X+A-2 > 0 then ...

• The assignment (x=a) makes the predicates multiples of each other, so the direction
taken is the same for the correct and buggy version.
PATH SENSITIZING:
o REVIEW: ACHIEVABLE AND UNACHIEVABLE PATHS:
1. We want to select and test enough paths to achieve a satisfactory notion of test
completeness such as C1+C2.
2. Extract the programs control flowgraph and select a set of tentative covering paths.
3. For any path in that set, interpret the predicates along the path as needed to express
them in terms of the input vector. In general individual predicates are compound or
may become compound as a result of interpretation.
4. Trace the path through, multiplying the individual compound predicates to achieve
a boolean expression such as

(A+BC) (D+E) (FGH) (IJ) (K) (l) (L).

5. Multiply out the expression to achieve a sum of products form:

ADFGHIJKL+AEFGHIJKL+BCDFGHIJKL+BCEFGHIJKL

6. Each product term denotes a set of inequalities that if solved will yield an input vector
that will drive the routine along the designated path.
7. Solve any one of the inequality sets for the chosen path and you have found a set
of input values for the path.
8. If you can find a solution, then the path is achievable.
9. If you cant find a solution to any of the sets of inequalities, the path is un achievable.
10. The act of finding a set of solutions to the path predicate expression is called PATH
SENSITIZATION.

o HEURISTIC PROCEDURES FOR SENSITIZING PATHS:


1. This is a workable approach, instead of selecting the paths without considering how to
sensitize, attempt to choose a covering path set that is easy to sensitize and pick hard
to sensitize paths only as you must to achieve coverage.
2. Identify all variables that affect the decision.
3. Classify the predicates as dependent or independent.
4. Start the path selection with un correlated, independent predicates.
5. If coverage has not been achieved using independent uncorrelated predicates, extend
the path set using correlated predicates.
6. If coverage has not been achieved extend the cases to those that involve dependent
predicates.
7. Last, use correlated, dependent predicates.

PATH INSTRUMENTATION:
Path instrumentation is what we have to do to confirm that the outcome was
achieved by the intended path.

Co-incidental Correctness: The coincidental correctness stands for achieving


the desired outcome for wrong reason.

o Figure 2.11: Coincidental Correctness


o The above figure is an example of a routine that, for the (unfortunately) chosen
input value (X = 16), yields the same outcome (Y = 2) no matter which case
we select. Therefore, the tests chosen this way will not tell us whether we have
achieved coverage. For example, the five cases could be totally jumbled and
still the outcome would be the same. Path Instrumentation is what we have
to do to confirm that the outcome was achieved by the intended path.

The types of instrumentation methods include:

1.Interpretive Trace Program:

1. An interpretive trace program is one that executes every statement in order and
records the intermediate values of all calculations, the statement labels traversed
etc.
2. If we run the tested routine under a trace, then we have all the information we need
to confirm the outcome and, furthermore, to confirm that it was achieved by the
intended path.
3. The trouble with traces is that they give us far more information than we need. In
fact, the typical trace program provides so much information that confirming the path
from its massive output dump is more work than simulating the computer by hand
to confirm the path.

2.Traversal Marker or Link Marker:


• A simple and effective form of instrumentation is called a traversal marker or link
marker.
• Name every link by a lower case letter.
• Instrument the links so that the link's name is recorded when the link is executed.
• The succession of letters produced in going from the routine's entry to its exit should,
if there are no bugs, exactly correspond to the path name.

▪ Figure 2.12: Single Link Marker Instrumentation


1. Why Single Link Markers aren't enough: Unfortunately, a single link marker may
not do the trick because links can be chewed by open bugs.

▪ Figure 2.13: Why Single Link Markers aren't enough.


▪ We intended to traverse the ikm path, but because of a rampaging GOTO in the
middle of the m link, we go to process B. If coincidental correctness is against us,
the outcomes will be the same and we won't know about the bug.

2Two Link Marker Method:


1. The solution to the problem of single link marker method is to implement two
markers per link: one at the beginning of each link and on at the end.
2. The two link markers now specify the path name and confirm both the beginning
and end of the link.

▪ Figure 2.14: Double Link Marker Instrumentation.

3.Link Counter

A less disruptive (and less informative) instrumentation method is based on


counters. Instead of a unique link name to be pushed into a string when the link is
traversed, we simply increment a link counter. We now confirm that the path length
is as expected. The same problem that led us to double link markers also leads us
to double link counters.
Transaction
• A transaction is a unit of work seen from a system user's point of view.
• A transaction consists of a sequence of operations, some of which are performed
by a system, persons or devices that are outside of the system.
• Transaction begins with Birth-that is they are created as a result of some external
act.
• At the conclusion of the transaction's processing, the transaction is no longer in the
system.

• Example of a transaction: A transaction for an online information retrieval


system might consist of the following steps or tasks:
▪ Accept input (tentative birth)
▪ Validate input (birth)
▪ Transmit acknowledgement to requester
▪ Do input processing
▪ Search file
▪ Request directions from user
▪ Accept input
▪ Validate input
▪ Process request
▪ Update file
▪ Transmit output
▪ Record transaction in log and clean up (death)

• TRANSACTION FLOW GRAPHS:


• Transaction flows are introduced as a representation of a system's processing.
• The methods that were applied to control flow graphs are then used for functional
testing.
• Transaction flows and transaction flow testing are to the independent system tester
what control flows are path testing are to the programmer.
• The transaction flow graph is to create a behavioural model of the program that
leads to functional testing.
• The transaction flowgraph is a model of the structure of the system's behaviour
(functionality).
• An example of a Transaction Flow is as follows:
Figure2.2: An Example of a Transaction Flow

USAGE:
• Transaction flows are indispensable for specifying requirements of
complicated systems, especially online systems.
• A big system such as an air traffic control or airline reservation system, has not
hundreds, but thousands of different transaction flows.
• The flows are represented by relatively simple flowgraphs, many of which
have a single straight-through path.
• Loops are infrequent compared to control flowgraphs.
• The most common loop is used to request a retry after user input errors. An
ATM system, for example, allows the user to try, say three times, and will take
the card away the fourth time.
• COMPLICATIONS:
• In simple cases, the transactions have a unique identity from the time they'r
created to the time they're completed.
• In many systems the transactions can give birth to others, and transactions can
also merge.
• Births: There are three different possible interpretations of the decision symbol, or
nodes with two or more out links. It can be a Decision, Biosis or a Mitosis.
1. Decision: Here the transaction will take one alternative or the other
alternative but not both. (See Figure 2.3 (a))
2. Biosis: Here the incoming transaction gives birth to a new transaction, and
both transaction continue on their separate paths, and the parent retains it
identity. (See Figure 2.3 (b))
3. Mitosis: Here the parent transaction is destroyed and two new transactions

are created.(See Figure 2.3 (c))

Transaction flow junction points are potentially as troublesome as transaction


flow splits. There are three types of junctions: (1) Ordinary Junction (2)
Absorption (3) Conjugation

Ordinary Junction: An ordinary junction which is similar to the


Mergers:junction in a control flow graph. A transaction can arrive either on
one link or the other. (See Figure 3.3 (a))
Absorption: In absorption case, the predator transaction absorbs prey
transaction. The prey gone but the predator retains its identity. (See Figure
2.3(b))

Conjugation: In conjugation case, the two parent transactions merge to form


a new daughter. In keeping with the biological flavor this case is called as
conjugation.(See Figure 2.3 (c))

Figure 2.3: Transaction Flow Junctions and Mergers

We have no problem with ordinary decisions and junctions. Births, absorptions, and
conjugations are as problematic for the software designer as they are for the software
modeler and the test designer; as a consequence, such points have more than their share
of bugs.
The common problems are: lost daughters, wrongful deaths, and illegitimate births.

TRANSACTION FLOW TESTING TECHNIQUES:

• GET THE TRANSACTIONS FLOWS:


• Complicated systems that process a lot of different, complicated transactions
should have explicit representations of the transactions flows, or the
equivalent.
• Transaction flows are like control flow graphs, and consequently we should
expect to have them in increasing levels of detail.
• The system's design documentation should contain an overview section that
details the main transaction flows.
• Detailed transaction flows are a mandatory pre requisite to the rational design
of a system's functional test.

• INSPECTIONS, REVIEWS AND WALKTHROUGHS:

• Transaction flows are natural agenda for system reviews or inspections.


• In conducting the walkthroughs, you should:
• Discuss enough transaction types to account for 98%-99% of the transaction the system is
expected to process.
• Discuss paths through flows in functional rather than technical terms.
• Ask the designers to relate every flow to the specification and to show how that transaction,
directly or indirectly, follows from the requirements.
o Make transaction flow testing the corner stone of system functional testing just as
path testing is the corner stone of unit testing.
o Select additional flow paths for loops, extreme values, and domain boundaries.
o Design more test cases to validate all births and deaths.
o Publish and distribute the selected test paths through the transaction flows as early
as possible so that they will exert the maximum beneficial effect on the project.

• PATH SELECTION:
o Select a set of covering paths (c1+c2) using the analogous criteria you used for
structural path testing.
o Select a covering set of paths based on functionally sensible transactions as you
would for control flow graphs.
o Try to find the most tortuous, longest, strangest path from the entry to the exit of
the transaction flow.

• PATH SENSITIZATION:
o Most of the normal paths are very easy to sensitize-80% - 95% transaction flow
coverage (c1+c2) is usually easy to achieve.
o The remaining small percentage is often very difficult.
o Sensitization is the act of defining the transaction. If there are sensitization
problems on the easy paths, then bet on either a bug in transaction flows or a
design bug.

• PATH INSTRUMENTATION:
o Instrumentation plays a bigger role in transaction flow testing than in unit path
testing.
o The information of the path taken for a given transaction must be kept with that
transaction and can be recorded by a central transaction dispatcher or by the
individual processing modules.
o In some systems, such traces are provided by the operating systems or a running

log

You might also like