Bestoun S. Ahmed , Amin S. Mohammad , and Hemin T. Essa

Software Engineering Research Group, Software Engineering Department, Engineering College,Salahaddin University

Abstract

Generally, combinatorial design concerns with the arrangement of finite set of elements into

patterns (subsets, words, arrays) according to specified rules. The usefulness of this design method is

that the number of input combination can be reduced dramatically but all of them are covered by

the combinatorial set. This paper presents the application of this design method in communication

networks. Communication engineers can use this novel method to generate test cases for producing

cost-effective set of experiments to recognize the factors that have the least and most impact on the

system's performance. A well-known scenario is used for the purpose of the experiment and five

factors with different values are chosen to qualify their effect on the network performance. The

experimental set is generated using combinatorial design method and then it is been used to analyze

the effect of each factor. The experiments showed the effectiveness of the method to be used for

analyzing the effect of factors on communication network.

Keywords: Communication networks; combinatorial design; software testing; performance evaluation;

network design; design of experiments

References

[1] X. Che and S. Maag, "Passive performance testing of network protocols," Computer

Communications, vol. 51, pp. 36-47, 2014.

[2] K.-H. Lee, S. Cho, and J.-H. Kim, "Performance evaluation of network coding in IEEE

802.11 wireless ad hoc networks," Ad Hoc Networks, vol. 16, pp. 131-141, 2014.

[3] D. Papakostas and D. Katsaros, "A simulation-based performance evaluation of a

randomized MIS-based clustering algorithm for ad hoc networks," Simulation Modelling

Practice and Theory, vol. 48, pp. 1-23, 2014.

[4] V. Shakhov, "Experiment design for parameter estimation in sensing models," in Wireless

Access Flexibility. vol. 8072, G. Bianchi, A. Lyakhov, and E. Khorov, Eds., ed: Springer

Berlin Heidelberg, 2013, pp. 151-158.

[5] A. Barrett and D. Dvorak, "A combinatorial test suite generator for gray-box testing," in

3rd IEEE International Conference on Space Mission Challenges for Information

Technology, Pasadena, California, USA, 2009, pp. 387-393.

[6] X. Qu, M. B. Cohen, and K. M. Woolf, "Combinatorial interaction regression testing: a

study of test case generation and prioritization," in IEEE International Conference on

Software Maintenance, ICSM 2007, Paris, France, 2007, pp. 255-264.

[7] B. S. Ahmed, K. Z. Zamli, and C. P. Lim, "Application of Particle Swarm Optimization to

Uniform and Variable Strength Covering Array Construction," Applied Soft Computing,

vol. 12, pp. 1330–1347, 2012.

[8] D. R. Sulaiman and B. S. Ahmed, "Using the combinatorial optimization approach for

DVS in high performance processors," in Technological Advances in Electrical,

Electronics and Computer Engineering (TAEECE), 2013 International Conference on,

2013, pp. 105-109.

[9] M. A. Sahib, B. S. Ahmed, and M. Y. Potrus, "Application of combinatorial interaction

design for DC servomotor PID controller tuning," Journal of Control Science and

Engineering, vol. 2014, p. 7, 2014.

[10] C. Yilmaz, S. Fouche, M. B. Cohen, A. Porter, G. Demiroz, and U. Koc, "Moving Forward

with Combinatorial Interaction Testing," Computer, vol. 47, pp. 37-45, 2014.

[11] F. T. Chan, T. Y. Chen, I. K. Mak, and Y. T. Yu, "Proportional sampling strategy:

guidelines for software testing practitioners," Information and Software Technology, vol.

38, pp. 775-782, 1996.

[12] D. C. Montgomery, Design and analysis of experiments: John Wiley & Sons, 2006.

[13] D. Hoskins, R. C. Turban, and C. J. Colbourn, "Experimental designs in software

engineering: d-optimal designs and covering arrays," in ACM Workshop on

Interdisciplinary Software Engineering Research, Newport Beach, CA, USA, 2004, pp. 55

- 66.

[14] R. N. Kacker, D. Richard Kuhn, Y. Lei, and J. F. Lawrence, "Combinatorial testing for

software: An adaptation of design of experiments," Measurement, vol. 46, pp. 3745-3752,

2013.

[15] D. S. Hoskins, C. J. Colbourn, and D. C. Montgomery, "Software performance testing

using covering arrays: efficient screening designs with categorical factors," in 5th

International Workshop on Software and Performance, Palma, Illes Balears, Spain, 2005,

pp. 131-136.

[16] C. Yilmaz, M. B. Cohen, and A. Porter, "Covering arrays for efficient fault

characterization in complex configuration spaces," ACM SIGSOFT Software Engineering

Notes, vol. 29, pp. 45-54, 2004.

[17] A. Hartman and L. Raskin, "Problems and algorithms for covering arrays," Discrete

Mathematics, vol. 284, pp. 149-156, 2004.

[18] S. Y. Borodai and I. S. Grunskii, "Recursive generation of locally complete tests,"

Cybernetics and Systems Analysis, vol. 28, pp. 504-508, 1992.

[19] D. E. Shasha, A. Y. Kouranov, L. V. Lejay, M. F. Chou, and G. M. Coruzzi, "Using

combinatorial design to study regulation by multiple input signals: A tool for parsimony in

the post-genomics era," Plant Physiology, vol. 127, pp. 1590-1594, 2001.

[20] J. N. Cawse, Experimental design for combinatorial and high throughput materials

development: Wiley-Interscience, 2003.

[21] B. S. Ahmed and K. Z. Zamli, "A variable strength interaction test suites generation

strategy using Particle Swarm Optimization," Journal of Systems and Software, vol. 84,

pp. 2171-2185, 2011.

[22] M. B. Cohen, M. B. Dwyer, and J. Shi, "Interaction testing of highly-configurable systems

in the presence of constraints," in International Symposium on Software Testing and

Analysis, London, United Kingdom, 2007, pp. 129-139.

[23] I. Pepelnjak, EIGRP Network Design Solutions: The Definitive Resource for EIGRP

Design, Deployment, and Operation: Cisco Systems; 1st edition, 2000.

[24] P. P. Pham and S. Perreau, "Performance analysis of reactive shortest path and multipath

routing mechanism with load balance," in INFOCOM 2003. Twenty-Second Annual Joint

Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 251-

259 vol.1.

[25] N. F. Mir, Computer and Communication Networks: Pearson Education, 2006.

[26] B. Forouzan, Data Communications and Networking: McGraw-Hill

Science/Engineering/Math; 5 edition, 2012.

[27] J. R. Iyengar, P. D. Amer, and R. Stewart, "Receive buffer blocking in concurrent

multipath transfer," in IEEE Global Telecommunications Conference, 2005. GLOBECOM

'05. , 2005, p. 6 pp.