ABSTRACT
Service virtualisation is a supporting tool for DevOps to generate interactive service models of dependency systems on which a system-under-test relies. These service models allow applications under development to be continuously tested against production-like conditions. Generating these virtual service models requires expert knowledge of the service protocol, which may not always be available. However, service models may be generated automatically from network traces. Previous work has used the Needleman-Wunsch algorithm to select a response from the service model to play back for a live request. We propose an extension of the Needleman-Wunsch algorithm, which uses entropy analysis to automatically detect the critical matching fields for selecting a response. Empirical tests against four enterprise protocols demonstrate that entropy weighted matching can improve response accuracy.
- T. Banzai, H. Koizumi, R. Kanbayashi, T. Imada, T. Hanawa, and M. Sato. D-cloud: Design of a software testing environment for reliable distributed systems using cloud computing technology. In 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGrid 2010), pages 631--636, Melbourne, Australia, 2010. Google ScholarDigital Library
- A. Bertolino, G. De Angelis, L. Frantzen, and A. Polini. Model-based generation of testbeds for web services. In Testing of Software and Communicating Systems, volume 5047, pages 266--282. 2008. Google ScholarDigital Library
- D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. F. Nielsen, S. Thatte, and D. Winer. Simple Object Access Protocol (SOAP) 1.1, 5 2000. W3C Note 08 May 2000.Google Scholar
- L. Chen. Continuous delivery: Huge benefits, but challenges too. IEEE Software, 32(2):50--54, 2015.Google ScholarDigital Library
- W. Cui, V. Paxson, N. C. Weaver, and R. H. Katz. Protocol-independent adaptive replay of application dialog. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006), pages 1--15, San Diego, California, USA, 2006.Google Scholar
- Docker Inc. Docker. http://docker.com, 2015.Google Scholar
- M. Du, J.-G. Schneider, C. Hine, J. Grundy, and S. Versteeg. Generating service models by trace subsequence substitution. In Proceedings of the 9th International ACM Sigsoft Conference on Quality of Software Architectures (QoSA 2013), pages 123--132, Vancouver, British Columbia, Canada, 2013. Google ScholarDigital Library
- T. Ebringer, L. Sun, and S. Boztas. A fast randomness test that preserves local detail. Virus Bulletin, 2008.Google Scholar
- B. Fitzgerald and K.-J. Stol. Continuous software engineering and beyond: trends and challenges. In 1st International Workshop on Rapid Continuous Software Engineering, pages 1--9. ACM, 2014. Google ScholarDigital Library
- P. Godefroid. Micro execution. In 36th International Conference on Software Engineering (ICSE 2014), pages 539--549, Hyderabad, India, 2014. Google ScholarDigital Library
- J. Grundy, Y. Cai, and A. Liu. Softarch/mte: Generating distributed system test-beds from high-level software architecture descriptions. Automated Software Engineering, 12(1):5--39, Jan. 2005. Google ScholarDigital Library
- C. Hine. Emulating Enterprise Software Environments. Phd thesis, Swinburne University of Technology, Faculty of Information and Communication Technologies, 2012.Google Scholar
- J. Humble. Continuous delivery vs continuous deployment. http://continuousdelivery.com/2010/08/continuous-delivery-vs-continuous-deployment/, 13 August 2010. (Accessed 19 January 2016).Google Scholar
- L. Jost. The relation between evenness and diversity. Diversity, 2(2):207--232, 2010.Google ScholarCross Ref
- P. Li. Selecting and Using Virtualization Solutions: our Experiences with VMware and VirtualBox. Journal of Computing Sciences in Colleges, 25(3):11--17, 2010. Google ScholarDigital Library
- R. Long, M. Harrington, R. Hain, and G. Nicholls. IMS Primer. IBM International Technical Support Organisation, 2000.Google Scholar
- G. J. McLachlan, K.-A. Do, and C. Ambroise. Analyzing Microarray Gene Expression Data. Wiley-Interscience, 2004.Google ScholarCross Ref
- J. Michelsen and J. English. Service Virtualization: Reality is Overrated. Apress, September 2012. Google ScholarDigital Library
- S. B. Needleman and C. D. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 48(3):443--453, 1970.Google ScholarCross Ref
- J. Sermersheim. Lightweight Directory Access Protocol (LDAP): The Protocol, 6 2006. RFC 4511.Google Scholar
- C. E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27:379--423, 623--656, 1948.Google ScholarCross Ref
- E. H. Simpson. Measurement of diversity. Nature, 1949.Google Scholar
- J. Sun and T. Mannisto. Usefulness evaluation of simulation in server system testing. In 36th IEEE Computer Software and Applications Conference (COMPSAC 2012), pages 158--163, Turkey, 2012. Google ScholarDigital Library
- Twitter. The Twitter REST API, 2014.Google Scholar
Recommendations
A semantically enhanced service repository for user-centric service discovery and management
User centricity represents a new trend in the currently flourishing service oriented computing era. By upgrading end-users to prosumers (producer+consumer) and involving them in the process of service creation, both service consumers and service ...
Towards Automated RESTful Web Service Composition
ICWS '09: Proceedings of the 2009 IEEE International Conference on Web ServicesEmerging as the popular choice for leading Internet companies to expose internal data and resources, Restful Web services are attracting increasing attention in the industry.While automating WSDL/SOAP based Web service composition has been extensively ...
Bridging the gap between service description models in service matchmaking
Development of service-based and agent-based computing systemsIn service-oriented architectures SOA the process of service discovery involves the matchmaking between service advertisements and service requests. Most approaches assume that both service advertisements and service requests are expressed using the ...
Comments