"Assessing Combinatorial Design for Analyzing System Performance of a Computer Network "

Bestoun S. Ahmed , Amin S. Mohammad , and Hemin T. Essa
Software Engineering Research Group, Software Engineering Department, Engineering College,Salahaddin University

Generally, combinatorial design concerns with the arrangement of finite set of elements into
patterns (subsets, words, arrays) according to specified rules. The usefulness of this design method is
that the number of input combination can be reduced dramatically but all of them are covered by
the combinatorial set. This paper presents the application of this design method in communication
networks. Communication engineers can use this novel method to generate test cases for producing
cost-effective set of experiments to recognize the factors that have the least and most impact on the
system's performance. A well-known scenario is used for the purpose of the experiment and five
factors with different values are chosen to qualify their effect on the network performance. The
experimental set is generated using combinatorial design method and then it is been used to analyze
the effect of each factor. The experiments showed the effectiveness of the method to be used for
analyzing the effect of factors on communication network.

Keywords: Communication networks; combinatorial design; software testing; performance evaluation;
network design; design of experiments

[1] X. Che and S. Maag, "Passive performance testing of network protocols," Computer
Communications, vol. 51, pp. 36-47, 2014.
[2] K.-H. Lee, S. Cho, and J.-H. Kim, "Performance evaluation of network coding in IEEE
802.11 wireless ad hoc networks," Ad Hoc Networks, vol. 16, pp. 131-141, 2014.
[3] D. Papakostas and D. Katsaros, "A simulation-based performance evaluation of a
randomized MIS-based clustering algorithm for ad hoc networks," Simulation Modelling
Practice and Theory, vol. 48, pp. 1-23, 2014.
[4] V. Shakhov, "Experiment design for parameter estimation in sensing models," in Wireless
Access Flexibility. vol. 8072, G. Bianchi, A. Lyakhov, and E. Khorov, Eds., ed: Springer
Berlin Heidelberg, 2013, pp. 151-158.
[5] A. Barrett and D. Dvorak, "A combinatorial test suite generator for gray-box testing," in
3rd IEEE International Conference on Space Mission Challenges for Information
Technology, Pasadena, California, USA, 2009, pp. 387-393.
[6] X. Qu, M. B. Cohen, and K. M. Woolf, "Combinatorial interaction regression testing: a
study of test case generation and prioritization," in IEEE International Conference on
Software Maintenance, ICSM 2007, Paris, France, 2007, pp. 255-264.
[7] B. S. Ahmed, K. Z. Zamli, and C. P. Lim, "Application of Particle Swarm Optimization to
Uniform and Variable Strength Covering Array Construction," Applied Soft Computing,
vol. 12, pp. 1330–1347, 2012.
[8] D. R. Sulaiman and B. S. Ahmed, "Using the combinatorial optimization approach for
DVS in high performance processors," in Technological Advances in Electrical,
Electronics and Computer Engineering (TAEECE), 2013 International Conference on,
2013, pp. 105-109.
[9] M. A. Sahib, B. S. Ahmed, and M. Y. Potrus, "Application of combinatorial interaction
design for DC servomotor PID controller tuning," Journal of Control Science and
Engineering, vol. 2014, p. 7, 2014.
[10] C. Yilmaz, S. Fouche, M. B. Cohen, A. Porter, G. Demiroz, and U. Koc, "Moving Forward
with Combinatorial Interaction Testing," Computer, vol. 47, pp. 37-45, 2014.
[11] F. T. Chan, T. Y. Chen, I. K. Mak, and Y. T. Yu, "Proportional sampling strategy:
guidelines for software testing practitioners," Information and Software Technology, vol.
38, pp. 775-782, 1996.
[12] D. C. Montgomery, Design and analysis of experiments: John Wiley & Sons, 2006.
[13] D. Hoskins, R. C. Turban, and C. J. Colbourn, "Experimental designs in software
engineering: d-optimal designs and covering arrays," in ACM Workshop on
Interdisciplinary Software Engineering Research, Newport Beach, CA, USA, 2004, pp. 55
- 66.
[14] R. N. Kacker, D. Richard Kuhn, Y. Lei, and J. F. Lawrence, "Combinatorial testing for
software: An adaptation of design of experiments," Measurement, vol. 46, pp. 3745-3752,
[15] D. S. Hoskins, C. J. Colbourn, and D. C. Montgomery, "Software performance testing
using covering arrays: efficient screening designs with categorical factors," in 5th
International Workshop on Software and Performance, Palma, Illes Balears, Spain, 2005,
pp. 131-136.
[16] C. Yilmaz, M. B. Cohen, and A. Porter, "Covering arrays for efficient fault
characterization in complex configuration spaces," ACM SIGSOFT Software Engineering
Notes, vol. 29, pp. 45-54, 2004.
[17] A. Hartman and L. Raskin, "Problems and algorithms for covering arrays," Discrete
Mathematics, vol. 284, pp. 149-156, 2004.
[18] S. Y. Borodai and I. S. Grunskii, "Recursive generation of locally complete tests,"
Cybernetics and Systems Analysis, vol. 28, pp. 504-508, 1992.
[19] D. E. Shasha, A. Y. Kouranov, L. V. Lejay, M. F. Chou, and G. M. Coruzzi, "Using
combinatorial design to study regulation by multiple input signals: A tool for parsimony in
the post-genomics era," Plant Physiology, vol. 127, pp. 1590-1594, 2001.
[20] J. N. Cawse, Experimental design for combinatorial and high throughput materials
development: Wiley-Interscience, 2003.
[21] B. S. Ahmed and K. Z. Zamli, "A variable strength interaction test suites generation
strategy using Particle Swarm Optimization," Journal of Systems and Software, vol. 84,
pp. 2171-2185, 2011.
[22] M. B. Cohen, M. B. Dwyer, and J. Shi, "Interaction testing of highly-configurable systems
in the presence of constraints," in International Symposium on Software Testing and
Analysis, London, United Kingdom, 2007, pp. 129-139.
[23] I. Pepelnjak, EIGRP Network Design Solutions: The Definitive Resource for EIGRP
Design, Deployment, and Operation: Cisco Systems; 1st edition, 2000.
[24] P. P. Pham and S. Perreau, "Performance analysis of reactive shortest path and multipath
routing mechanism with load balance," in INFOCOM 2003. Twenty-Second Annual Joint
Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 251-
259 vol.1.
[25] N. F. Mir, Computer and Communication Networks: Pearson Education, 2006.
[26] B. Forouzan, Data Communications and Networking: McGraw-Hill
Science/Engineering/Math; 5 edition, 2012.
[27] J. R. Iyengar, P. D. Amer, and R. Stewart, "Receive buffer blocking in concurrent
multipath transfer," in IEEE Global Telecommunications Conference, 2005. GLOBECOM
'05. , 2005, p. 6 pp.