Chapter 5 FSM
Chapter 5 FSM
n
i=1
E
ki
=Q
States in E
ki
are k-equivalent.
If state v is in E
ki
and v in E
kj
for i=j, then u and v are k-distinguishable.
Aditya P. Mathur 2005
50
How to construct a k-equivalence partition?
Given an FSM M, construct a 1-equivalence partition, start with a
tabular representation of M.
Current
state
Output Next state
a b a b
q1 0 1 q1 q4
q2 0 1 q1 q5
q3 0 1 q5 q1
q4 1 1 q3 q4
q5 1 1 q2 q5
Aditya P. Mathur 2005
51
Construct 1-equivalence partition
Group states identical in their Output entries. This gives us 1-partition
P
1
consisting of E
1
={q1, q2, q3} and E
2
={q4, q5}.
E
Current
state
Output Next state
a b a b
1 q1 0 1 q1 q4
q2 0 1 q1 q5
q3 0 1 q5 q1
2 q4 1 1 q3 q4
q5 1 1 q2 q5
Aditya P. Mathur 2005
52
Construct 2-equivalence partition: Rewrite P
1
table
Rewrite P
1
table. Remove the output columns. Replace a state entry q
i
by q
ij
where j is the group number in which lies state q
i
.
E
Current
state
Next state
a b
1 q1 q11 q42
q2 q11 q52
q3 q52 q11
2 q4 q31 q42
q5 q21 q52
Group number
P
1
Table
Aditya P. Mathur 2005
53
Construct 2-equivalence partition: Construct P
2
table
Group all entries with identical second subscripts under the next state
column. This gives us the P
2
table. Note the change in second
subscripts.
E
Current
state
Next state
a b
1 q1 q11 q43
q2 q11 q53
2 q3 q53 q11
3 q4 q32 q43
q5 q21 q53
P
2
Table
Aditya P. Mathur 2005
54
Construct 3-equivalence partition: Construct P
3
table
Group all entries with identical second subscripts under the next state
column. This gives us the P
3
table. Note the change in second
subscripts.
E
Current
state
Next state
a b
1 q1 q11 q43
q2 q11 q54
2 q3 q54 q11
3 q4 q32 q43
4 q5 q21 q54
P
3
Table
Aditya P. Mathur 2005
55
Construct 4-equivalence partition: Construct P
4
table
Continuing with regrouping and relabeling, we finally arrive at P
4
table.
E
Current
state
Next state
a b
1 q1 q11 q44
2 q2 q11 q55
3 q3 q55 q11
4 q4 q33 q44
5 q5 q22 q55
P
4
Table
Aditya P. Mathur 2005
56
k-equivalence partition: Convergence of the process
The process is guaranteed to converge.
When the process converges, and the machine is minimal, each state
will be in a separate group.
The next step is to obtain the distinguishing strings for each state.
Aditya P. Mathur 2005
57
Finding the distinguishing sequences: Example
Let us find a distinguishing sequence for states q1 and q2.
Find tables P
i
and P
i+1
such that (q1, q2) are in the same group in P
i
and different groups in P
i+1
. We get P
3
and P
4
.
Initialize z=c. Find the input symbol that distinguishes q1 and q2 in
table P3. This symbol is b. We update z to z.b. Hence z now becomes
b.
Aditya P. Mathur 2005
58
Finding the distinguishing sequences: Example (contd.)
The next states for q1 and q2 on b are, respectively, q4 and q5.
We move to the P
2
table and find the input symbol that distinguishes
q4 and q5.
Let us select a as the distinguishing symbol. Update z which now
becomes ba.
The next states for states q4 and q5 on symbol a are, respectively,
q3 and q2. These two states are distinguished in P
1
by a and b. Let
us select a. We update z to baa.
Aditya P. Mathur 2005
59
Finding the distinguishing sequences: Example (contd.)
The next states for q3 and q2 on a are, respectively, q1 and q5.
Moving to the original state transition table we obtain a as the
distinguishing symbol for q1 and q5
We update z to baaa. This is the farthest we can go backwards
through the various tables. baaa is the desired distinguishing
sequence for states q1 and q2. Check that o(q1,baaa)=o(q2,baaa).
Aditya P. Mathur 2005
60
Finding the distinguishing sequences: Example (contd.)
Using the procedure analogous to the one used for q1 and q2, we can
find the distinguishing sequence for each pair of states. This leads us
to the following characterization set for our FSM.
W={a, aa, aaa, baaa}
Aditya P. Mathur 2005
61
Chows method: where are we?
Step 4: Construct set Z from W and m.
Step 5: Desired test set=P.Z
Step 1: Estimate the maximum number of states (m) in the correct
implementation of the given FSM M.
Step 2: Construct the characterization set W for M.
Done
Step 3: (a) Construct the testing tree for M and (b) generate the
transition cover set P from the testing tree.
Next (a)
Aditya P. Mathur 2005
62
Step 3: (a) Construct the testing tree for M
A testing tree of an FSM is a tree rooted at the initial state. It contains at least
one path from the initial state to the remaining states in the FSM. Here is how
we construct the testing tree.
State q0, the initial state, is the root of the testing tree. Suppose that the testing
tree has been constructed until level k . The (k+1)th level is built as follows.
Select a node n at level k. If n appears at any level from 1 through k , then n is a
leaf node and is not expanded any further. If n is not a leaf node then we
expand it by adding a branch from node n to a new node m if o(n, x)=m for
x X . This branch is labeled as x. This step is repeated for all nodes at level k.
Aditya P. Mathur 2005
63
Example: Construct the testing tree for M
Start here, initial
state is the root.
q1 becomes leaf,
q4 can be
expanded.
No further
expansion
possible
.
.
.
M
Aditya P. Mathur 2005
64
Chows method: where are we?
Step 4: Construct set Z from W and m.
Step 5: Desired test set=P.Z
Step 1: Estimate the maximum number of states (m) in the correct
implementation of the given FSM M.
Step 2: Construct the characterization set W for M.
Done
Step 3: (a) Construct the testing tree for M and (b) generate the
transition cover set P from the testing tree.
Next, (b)
Aditya P. Mathur 2005
65
Step 3: (b) Find the transition cover set from the testing tree
A transition cover set P is a set of all strings representing sub-paths, starting
at the root, in the testing tree. Concatenation of the labels along the edges of a
sub-path is a string that belongs to P. The empty string (c) also belongs to P.
P={c, a, b, bb, ba, bab, baa, baab, baaa, baaab,
baaaa}
Aditya P. Mathur 2005
66
Chows method: where are we?
Step 5: Desired test set=P.Z
Step 1: Estimate the maximum number of states (m) in the correct
implementation of the given FSM M.
Step 2: Construct the characterization set W for M.
Done
Step 3: (a) Construct the testing tree for M and (b) generate the
transition cover set P from the testing tree.
Done
Step 4: Construct set Z from W and m.
Next
Aditya P. Mathur 2005
67
Step 4: Construct set Z from W and m
For m=n, we get
Z = X
0
.W=W
Given that X is the input alphabet and W the characterization set, we
have:
Z = X
0
.W X
1
.W .. X
m-1-n
.W X
m-n
.W
For X={a, b}, W={a, aa, aaa, baaa}, m=6
Z = W X
1
.W ={a, aa, aaa, baaa} {a, b}.{a, aa, aaa, baaa}
={a, aa, aaa, baaa, aa, aaa, aaaa, baaaa, ba, baa, baaa,
bbaaa}
Aditya P. Mathur 2005
68
Chows method: where are we?
Step 1: Estimate the maximum number of states (m) in the correct
implementation of the given FSM M.
Step 2: Construct the characterization set W for M.
Done
Step 3: (a) Construct the testing tree for M and (b) generate the
transition cover set P from the testing tree.
Done
Step 4: Construct set Z from W and m.
Done
Step 5: Desired test set=P.Z Next
Aditya P. Mathur 2005
69
Step 5: Desired test set=P.Z
The test inputs based on the given FSM M can now be derived as:
T=P.Z
Do the following to test the implementation:
1. Find the expected response to each element of T.
2. Generate test cases for the application. Note that even though
the application is modeled by M, there might be variables to be
set before it can be exercised with elements of T.
3. Execute the application and check if the response matches. Reset
the application to the initial state after each test.
Aditya P. Mathur 2005
70
Example 1: Testing an erroneous application
Correct design
M1 M2
M
t1=baaaaaa
M1(t1)=1101001
M(t1)=1101001
t2=baaba
M2(t2)=11001
M(t2)=11011
Error revealing
test cases
Aditya P. Mathur 2005
71
Example 2: Extra state. N=5, m=6.
M1 M2
t1=baaba M(t1)=11011 M1(t1)=11001
t2=baaa M(t2)=1101 M2(t2)=1100
Aditya P. Mathur 2005
72
Error detection process: in-class discussion
Given m=n, each test case t is of the form r.s where r is in P
and s in W. r moves the application from initial state q0 to state
qj. Then, s=as takes it from qi to state qj or qj.
Aditya P. Mathur 2005 73
Automata theoretic versus control theoretic
methods for test generation
Aditya P. Mathur 2005
74
Automata-theoretic vs. Control theoretic techniques
The W and the Wp methods are considered automata-theoretic
methods for test generation.
In contrast, many books on software testing mention control
theoretic techniques for test generation. Let us understand the
difference between the two types of techniques and their fault
detection abilities.
Aditya P. Mathur 2005
75
Control theoretic techniques
State cover: A test set T is considered adequate with respect to
the state cover criterion for an FSM M if the execution of M
against each element of T causes each state in M to be
visited at least once.
Transition cover: A test set T is considered adequate with respect
to the branch/transition cover criterion for an FSM M if the
execution of M against each element of T causes each
transition in M to be taken at least once
Aditya P. Mathur 2005
76
Control theoretic techniques (contd.)
Switch cover: A test set T is considered adequate with respect to
the 1-switch cover criterion for an FSM M if the execution of
M against each element of T causes each pair of transitions
(tr1, tr2) in M to be taken at least once, where for some input
substring ab tr1: qi=o(qj, a) and tr_2: qk= o(qi, b) and qi,
qj, qk are states in M.
Aditya P. Mathur 2005
77
Control theoretic techniques (contd.)
Boundary interior cover: A test set T is considered adequate with
respect to the boundary-interior cover criterion for an FSM M if
the execution of M against each element of T causes each loop (a
self-transition) across states to be traversed zero times and at least
once. Exiting the loop upon arrival covers the ``boundary"
condition and entering it and traversing the loop at least once
covers the ``interior" condition.
Aditya P. Mathur 2005
78
Control theoretic technique: Example 1
Consider the following machines, a correct one (M1) and one with a
transfer error (M1).
t=abba covers all states but does
not not reveal the error. Both
machines generate the same
output which is 0111.
Will the tests generated by the
W method reveal this error?
Check it out!
Aditya P. Mathur 2005
79
Control theoretic technique: Example 2
Consider the following machines, a correct one (M2) and one with a
transfer error (M2).
There are 12 branch pairs, such
as (tr1, tr2), (tr1, tr3), tr6, tr5).
Consider the test set: {bb, baab,
aabb, aaba, abbaab}. Does it
cover all branches? Does it
reveal the error?
Are the states in M2 1-
distinguishable?
Aditya P. Mathur 2005
80
Control theoretic technique: Example 3
Consider the following machines, a correct one (M3) and one with a
transfer error (M3).
Consider T={t1: aab, t2: abaab}.
T1 causes each state to be
entered but loop not traversed.
T2 causes each loop to be
traversed once.
Is the error revealed by T?
Aditya P. Mathur 2005 81
The Partial W (Wp) method
Aditya P. Mathur 2005
82
The partial W (Wp) method
Tests are generated from minimal, complete, and connected FSM.
Size of tests generated is generally smaller than that generated using the
W-method.
Test generation process is divided into two phases: Phase 1: Generate a
test set using the state cover set (S) and the characterization set (W).
Phase 2: Generate additional tests using a subset of the transition cover
set and state identification sets.
What is a state cover set? A state identification set?
Aditya P. Mathur 2005
83
State cover set
Given FSM M with input alphabet X, a state cover set S is a finite non-
empty set of strings over X* such that for each state qi in Q, there is a
string in S that takes M from its initial state to qi.
S={c, b, ba, baa, baaa}
S is always a subset of the
transition cover set P. Also, S
is not necessarily unique.
Aditya P. Mathur 2005
84
State identification set
Given an FSM M with Q as the set of states, an identification set
for state qieQ is denoted by W
i
and has the following
properties:
(a) W
i
_ W , 1s isn [Identification set is a subset of W.]
(b) O(qi, s)= O(qj, s) , for 1sjs n , j= i , se W
i
[For each state
other than qi, there is a string in Wi that distinguishes qi from
qj.]
(c) No subset of W
i
satisfies property (b). [W
i
is minimal.]
Aditya P. Mathur 2005
85
State identification set: Example
Si Sj X o(Si,x) o(Sj,x)
1 2 baaa 1 0
3 aa 0 1
4 a 0 1
5 a 0 1
2 3 aa 0 1
4 a 0 1
5 a 0 1
3 4 a 0 1
5 a 0 1
4 5 aaa 1 0
Last element of the output string
W
1
=W
2
={baaa, aa, a}
W
3
={a aa} W
4
=W
5
={a, aaa}
Aditya P. Mathur 2005
86
Wp method: Example: Step 1: Compute S, P, W,
Wi,W
W
1
=W
2
={baaa, aa, a}
W
3
={a aa} W
4
=W
5
={a, aaa}
S={c, b, ba, baa, baaa}
P={c, a, b, bb, ba, bab, baa, baab, baaa, baaab, baaaa}
W={a, aa, aaa, baaa}
W={W1, W2, W3, W4, W5}
Aditya P. Mathur 2005
87
Wp method: Example: Step 2: Compute T1 [m=n]
T1=S. W={c, b, ba, baa, baaa}.{a, aa, aaa, baaa}
Elements of T1 ensure that the each state of the FSM is covered
and distinguished from the remaining states.
Aditya P. Mathur 2005
88
Wp method: Example: Step 3: Compute R and o
[m=n]
R=P-S={c, a, b, bb, ba, bab, baa, baab, baaa, baaab, baaaa}-{c, b,
ba, baa, baaa}
={a, bb, bab, baab, baaab, baaaa}
Let each element of R be denoted as r
i1
, r
i2
,r
ik
.
o(r
ik
, m)=q
ij
, where meX (the alphabet)
Aditya P. Mathur 2005
89
Wp method: Example: Step 4: Compute T2 [m=n]
T2=RW=
k
(j=1)
(r
ij
}. W
ij
, where W
ij
is the identification set for state
q
ij
.
o(q1, a)=q1 o(q1, bb)=q4 o(q1, bab)=q5
o(q1, baab)=q5 o(q1, baaab)=q5 o(q1, baaaa)=q1
T2=({a}. W
1
) ({bb}.W
4
) ({bab}.W
5
) ({baab}.W
5
)
{baaab}.W
5
) ({baaaa}. W
1
)
={abaaa, aaa, aa} {bba, bbaaa} {baba, babaaa}
{baaba, baabaaa} {baaaba, baaabaaa} {baaaabaaa,
baaaaaa, baaaaa}
Aditya P. Mathur 2005
90
Wp method: Example: Savings
Test set size using the W method= 44
Test set size using the Wp method= 34 (20 from T1+14 from T2)
Aditya P. Mathur 2005
91
Testing using the Wp method
Testing proceeds in two phases.
While tests from phase 1 ensure state coverage, they do not ensure
all transition coverage. Also, even when tests from phase cover all
transitions, they do not apply the state identification sets and hence
not all transfer errors are guaranteed to be revealed by these tests.
Tests from T1 are applied in phase 1. Tests from T2 are applied in phase 2.
Aditya P. Mathur 2005
92
Wp method:
T1=S. X[m-n], where X[m-n] is the set union of X
i
, 1sis (m-n)
T2= T2=R. X[m-n] W
Both sets T1 and T2 are computed a bit differently, as follows:
Aditya P. Mathur 2005
93
Summary
Behavior of a large variety of applications can be modeled using
finite state machines (FSM). GUIs can also be modeled using FSMs
The W and the Wp methods are automata theoretic methods to
generate tests from a given FSM model.
Tests so generated are guaranteed to detect all operation errors,
transfer errors, and missing/extra state errors in the implementation
given that the FSM representing the implementation is complete,
connected, and minimal. What happens if it is not?
Aditya P. Mathur 2005
94
Summary (contd.)
Automata theoretic techniques generate tests superior in their fault
detection ability than their control-theoretic counterparts.
Control-theoretic techniques, that are often described in books on
software testing, include branch cover, state cover, boundary-interior,
and n-switch cover.
The size of tests sets generated by the W method is larger than
generated by the Wp method while their fault detection effectiveness
are the same.