Software Testing Methodologies - Unit-3
Software Testing Methodologies - Unit-3
DOMAIN TESTING
INTRODUCTION:
o Domain: In mathematics, domain is a set of possible values of an independent
variable or the variables of a function.
o Programs as input data classifiers: domain testing attempts to determine whether
the classification is or is not correct.
o Domain testing can be based on specifications or equivalent implementation
information.
o If domain testing is based on specifications, it is a functional test technique.
o If domain testing is based implementation details, it is a structural test technique.
o For example, you're doing domain testing when you check extreme values of an
input variable.
All inputs to a program can be considered as if they are numbers. For example, a
character string can be treated as a number by concatenating bits and looking at them as if
they were a binary integer. This is the view in domain testing, which is why this strategy
has a mathematical flavor.
o Before doing whatever it does, a routine must classify the input and set it moving
on the right path.
o An invalid input (e.g., value too big) is just a special processing case called
'reject'.
o The input then passes to a hypothetical subroutine rather than on calculations.
o In domain testing, we focus on the classification aspect of the routine rather than
on the calculations.
o Structural knowledge is not needed for this model - only a consistent, complete
specification of input values for each case.
o We can infer that for each case there must be at least one path to process that case.
A DOMAIN IS A SET:
o An input domain is a set.
o If the source language supports set definitions (E.g. PASCAL set types and C
enumerated types) less testing is needed because the compiler does much of it for
us.
o Domain testing does not work well with arbitrary discrete sets of data objects.
o Domain for a loop-free program corresponds to a set of numbers defined over the
input vector.
A DOMAIN CLOSURE:
o A domain boundary is closed with respect to a domain if the points on the
boundary belong to the domain.
o If the boundary points belong to some other domain, the boundary is said to be
open.
o Figure 4.2 shows three situations for a one-dimensional domain - i.e., a domain
defined over one input variable; call it x
The importance of domain closure is that incorrect closure bugs are frequent domain bugs. For
example, x >= 0 when x > 0 was intended
Figure 4.2: Open and Closed Domains.
DOMAIN DIMENSIONALITY:
o Every input variable adds one dimension to the domain.
o One variable defines domains on a number line.
o Two variables define planar domains.
o Three variables define solid domains.
o Every new predicate slices through previously defined domains and cuts them in
half.
o Every boundary slices through the input vector space with a dimensionality which
is less than the dimensionality of the space.
o Thus, planes are cut by lines and points, volumes by planes, lines and points and
n-spaces by hyperplanes.
BUG ASSUMPTION:
o The bug assumption for the domain testing is that processing is okay but the
domain definition is wrong.
o An incorrectly implemented domain means that boundaries are wrong, which may
in turn mean that control flow predicates are wrong.
o Many different bugs can result in domain errors. Some of them are:
Domain Errors:
Double Zero Representation: In computers or Languages that have a
distinct positive and negative zero, boundary errors for negative zero are
common.
Floating point zero check: A floating point number can equal zero only if
the previous definition of that number set it to zero or if it is subtracted
from itself or multiplied by zero. So the floating point zero check to be
done against an epsilon value.
o Functional Homogeneity of Bugs: Whatever the bug is, it will not change the
functional form of the boundary predicate. For example, if the predicate is ax >=
b, the bug will be in the value of a or b but it will not change the predicate to ax
>= b, say.
o Linear Vector Space: Most papers on domain testing, assume linear boundaries -
not a bad assumption because in practice most boundary predicates are linear.
o Loop Free Software: Loops are problematic for domain testing. The trouble with
loops is that each iteration can result in a different predicate expression (after
interpretation), which means a possible domain boundary change.
NICE DOMAINS:
o Where do these domains come from?
Domains are and will be defined by an imperfect iterative process aimed at
achieving (user, buyer, voter) satisfaction.
o Implemented domains can't be incomplete or inconsistent. Every input will be
processed (rejection is a process), possibly forever. Inconsistent domains will be
made consistent.
o Conversely, specified domains can be incomplete and/or inconsistent. Incomplete
in this context means that there are input vectors for which no path is specified,
and inconsistent means that there are at least two contradictory specifications over
the same segment of the input space.
o Some important properties of nice domains are: Linear, Complete, Systematic,
And Orthogonal, Consistently closed, Convex and simply connected.
o To the extent that domains have these properties domain testing is easy as testing
gets.
o The bug frequency is lesser for nice domain than for ugly domains.
COMPLETE BOUNDARIES:
o Nice domain boundaries are complete in that they span the number space from
plus to minus infinity in all dimensions.
o Figure 4.4 shows some incomplete boundaries. Boundaries A and E have gaps.
o Such boundaries can come about because the path that hypothetically corresponds
to them is unachievable, because inputs are constrained in such a way that such
values can't exist, because of compound predicates that define a single boundary,
or because redundant predicates convert such boundary values into a null set.
o The advantage of complete boundaries is that one set of tests is needed to confirm
the boundary no matter how many domains it bounds.
o If the boundary is chopped up and has holes in it, then every segment of that
boundary must be tested for every domain it bounds.
SYSTEMATIC BOUNDARIES:
o Systematic boundary means that boundary inequalities related by a simple
function such as a constant.
In Figure 4.3 for example, the domain boundaries for u and v differ only by a
constant.
o where fi is an arbitrary linear function, X is the input vector, ki and c are constants,
and g(i,c) is a decent function over i and c that yields a constant, such as k + ic.
o The first example is a set of parallel lines, and the second example is a set of
systematically (e.g., equally) spaced parallel lines (such as the spokes of a wheel,
if equally spaced in angles, systematic).
o If the boundaries are systematic and if you have one tied down and generate tests
for it, the tests for the rest of the boundaries in that set can be automatically
generated.
ORTHOGONAL BOUNDARIES:
o Two boundary sets U and V (See Figure 4.3) are said to be orthogonal if every
inequality in V is perpendicular to every inequality in U.
o If two boundary sets are orthogonal, then they can be tested independently
o In Figure 4.3 we have six boundaries in U and four in V. We can confirm the
boundary properties in a number of tests proportional to 6 + 4 = 10 (O(n)). If we
tilt the boundaries to get Figure 4.5,
o we must now test the intersections. We've gone from a linear number of cases to a
quadratic: from O(n) to O(n2).
CLOSURE CONSISTENCY:
o Figure 4.6 shows another desirable domain property: boundary closures are
consistent and systematic.
o The shaded areas on the boundary denote that the boundary belongs to the domain
in which the shading lies - e.g., the boundary lines belong to the domains on the
right.
o Consistent closure means that there is a simple pattern to the closures - for
example, using the same relational operator for all boundaries of a set of parallel
boundaries.
CONVEX:
o A geometric figure (in any number of dimensions) is convex if you can take two
arbitrary points on any two different boundaries, join them by a line and all points
on that line lie within the figure.
o Nice domains are convex; dirty domains aren't.
o You can smell a suspected concavity when you see phrases such as: ". . . except if
. . .," "However . . .," ". . . but not. . . ." In programming, it's often the buts in the
specification that kill you.
SIMPLY CONNECTED:
o Nice domains are simply connected; that is, they are in one piece rather than
pieces all over the place interspersed with other domains.
o Simple connectivity is a weaker requirement than convexity; if a domain is
convex it is simply connected, but not vice versa.
o Consider domain boundaries defined by a compound predicate of the (Boolean)
form ABC. Say that the input space is divided into two domains, one defined by
ABC and, therefore, the other defined by its negation.
o For example, suppose we define valid numbers as those lying between 10 and 17
inclusive. The invalid numbers are the disconnected domain consisting of
numbers less than 10 and greater than 17.
o Simple connectivity, especially for default cases, may be impossible.
UGLY DOMAINS:
o Some domains are born ugly and some are uglified by bad specifications.
o Every simplification of ugly domains by programmers can be either good or bad.
o Programmers in search of nice solutions will "simplify" essential complexity out
of existence. Testers in search of brilliant insights will be blind to essential
complexity and therefore miss important cases.
o If the ugliness results from bad specifications and the programmer's simplification
is harmless, then the programmer has made ugly good.
o But if the domain's complexity is essential (e.g., the income tax code), such
"simplifications" constitute bugs.
o Nonlinear boundaries are so rare in ordinary programming that there's no
information on how programmers might "correct" such boundaries if they're
essential.
DOMAIN TESTING:
The closure can be wrong (i.e., assigned to the wrong domain) or the boundary (a point in this
case) can be shifted one way or the other, we can be missing a boundary, or we can have an extra
boundary.
1. Figure 4.13 shows possible domain bugs for a one-dimensional open domain
boundary.
2. In Figure 4.13a we assumed that the boundary was to be open for A. The bug
we're looking for is a closure error, which converts > to >= or < to <= (Figure
4.13b). One test (marked x) on the boundary point detects this bug because
processing for that point will go to domain A rather than B.
3. In Figure 4.13c we've suffered a boundary shift to the left. The test point we used
for closure detects this bug because the bug forces the point from the B domain,
where it should be, to A processing. Note that we can't distinguish between a shift
and a closure error, but we do know that we have a bug.
Figure 4.13: One Dimensional Domain Bugs, Open Boundaries.
4. Figure 4.13d shows a shift the other way. The on point doesn't tell us anything
because the boundary shift doesn't change the fact that the test point will be
processed in B. To detect this shift we need a point close to the boundary but
within A. The boundary is open, therefore by definition, the off point is in A
(Open Off Inside).
5. The same open off point also suffices to detect a missing boundary because what
should have been processed in A is now processed in B.
6. To detect an extra boundary we have to look at two domain boundaries. In this
context an extra boundary means that A has been split in two. The two off points
that we selected before (one for each boundary) does the job. If point C had been
a closed boundary, the on test point at C would do it.
7. For closed domains look at Figure 4.14. As for the open boundary, a test point on
the boundary detects the closure bug. The rest of the cases are similar to the open
boundary, except now the strategy requires off points just outside the domain.
Figure 4.14: One Dimensional Domain Bugs, Closed Boundaries.
1. Figure 4.15 shows possible domain boundary bugs for a two-dimensional domain.
2. A and B are adjacent domains and the boundary is closed with respect to A, which
means that it is open with respect to B.
1. Shifted Boundary: In Figure 4.15b the bug is a shift up, which converts
part of domain B into A processing, denoted by A'. This result is caused
by an incorrect constant in a predicate, such as x + y >= 17 when x + y >=
7 was intended. The off point (closed off outside) catches this bug. Figure
4.15c shows a shift down that is caught by the two on points.
2. Tilted Boundary: A tilted boundary occurs when coefficients in the
boundary inequality are wrong. For example, 3x + 7y > 17 when 7x + 3y >
17 was intended. Figure 4.15d has a tilted boundary, which creates
erroneous domain segments A' and B'. In this example the bug is caught
by the left on point.
3. Extra Boundary: An extra boundary is created by an extra predicate. An
extra boundary will slice through many different domains and will
therefore cause many test failures for the same bug. The extra boundary in
Figure 4.15e is caught by two on points, and depending on which way the
extra boundary goes, possibly by the off point also.
4. Missing Boundary: A missing boundary is created by leaving a boundary
predicate out. A missing boundary will merge different domains and will
cause many test failures although there is only one bug. A missing
boundary, shown in Figure 4.15f, is caught by the two on points because
the processing for A and B is the same - either A or B processing.
INTRODUCTION:
o Recall that we defined integration testing as testing the correctness of the interface
between two otherwise correct components.
o Components A and B have been demonstrated to satisfy their component tests,
and as part of the act of integrating them we want to investigate possible
inconsistencies across their interface.
o Interface between any two components is considered as a subroutine call.
o We're looking for bugs in that "call" when we do interface testing.
o Let's assume that the call sequence is correct and that there are no type
incompatibilities.
o For a single variable, the domain span is the set of numbers between (and
including) the smallest value and the largest value. For every input variable we
want (at least): compatible domain spans and compatible closures (Compatible
but need not be Equal).
CLOSURE COMPATIBILITY:
o Assume that the caller's range and the called domain spans the same numbers - for
example, 0 to 17.
o Figure 4.16 shows the four ways in which the caller's range closure and the
called's domain closure can agree.
o The thick line means closed and the thin line means open. Figure 4.16 shows the
four cases consisting of domains that are closed both on top (17) and bottom (0),
open top and closed bottom, closed top and open bottom, and open top and
bottom.
SPAN COMPATIBILITY:
o Figure 4.18 shows three possibly harmless span incompatibilities.