A Tool for Creating Test Scenarios for Industry Applications
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F20%3APR34234" target="_blank" >RIV/00216305:26230/20:PR34234 - isvavai.cz</a>
Result on the web
<a href="https://pajda.fit.vutbr.cz/tacr-unis/tyrant" target="_blank" >https://pajda.fit.vutbr.cz/tacr-unis/tyrant</a>
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
A Tool for Creating Test Scenarios for Industry Applications
Original language description
Tyrant is an open source tool, that learns the logs of captured communication and outputs model that can be used to reproduce the run (or its mutation) in form of the so called scenario. Tyrant focuses on digital twins: the simulation and implementation of corresponding factory production environment (corresponding components, information system, ERP systems, etc.). The main use case of the scenarios is meant for testing the individual components in the environment: the machines, the terminals, ERP (Enterprise Resource Planning) systems and the PIS (Production Information System). The tool is mainly meant to be used together with the Kryton tool, developed in Masaryk University, which can orchestrate a set of simulators according to the given scenario, that is inferred by the Tyrant from the input set of logs. The tool (and its process) works in the following phases: 1. A communication in real production is captured either for future testing or for debugging purposes. This results in the set of logs of messages, where each message has particular timestamp, issued command, host, target, and set of data of various formats. 2. Logs are parsed by the Tyrant into the stream of messages. Each message is classified into a set of clusters of messages, where each cluster is identified by unique key. The data of the corresponding cluster is abstracted into the form of abstract trie. 3. The model of the communication is inferred. By default, the model is linear and reproduces the log 1:1, without any abstractions or reduction. Optionally, the tool can apply an abstraction (namely height abstraction) resulting into minimized model, which is user-friendly for manual inspection. 4. The model is serialized to stream of messages: the output scenario in the YAML format supported by the Kryton tool. The Kryton then can reproduce the scenario by sending messages between real (tested
Czech name
—
Czech description
—
Classification
Type
R - Software
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
<a href="/en/project/TN01000077" target="_blank" >TN01000077: National Centre of Competence in Cybersecurity</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2020
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Internal product ID
tyrant
Technical parameters
Software je volně dostupný včetně zdrojových textů. Pro informace o licenčních podmínkách prosím kontaktujte: Výzkumné centrum informačních technologií, Fakulta informačních technologií VUT v Brně, Božetěchova 2, 612 66 Brno.
Economical parameters
Software je volně dostupný včetně zdrojových textů.
Owner IČO
00216305
Owner name
Vysoké učení technické v Brně