A Tool for Creating Test Scenarios for Industry Applications
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F20%3APR34234" target="_blank" >RIV/00216305:26230/20:PR34234 - isvavai.cz</a>
Výsledek na webu
<a href="https://pajda.fit.vutbr.cz/tacr-unis/tyrant" target="_blank" >https://pajda.fit.vutbr.cz/tacr-unis/tyrant</a>
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
A Tool for Creating Test Scenarios for Industry Applications
Popis výsledku v původním jazyce
Tyrant is an open source tool, that learns the logs of captured communication and outputs model that can be used to reproduce the run (or its mutation) in form of the so called scenario. Tyrant focuses on digital twins: the simulation and implementation of corresponding factory production environment (corresponding components, information system, ERP systems, etc.). The main use case of the scenarios is meant for testing the individual components in the environment: the machines, the terminals, ERP (Enterprise Resource Planning) systems and the PIS (Production Information System). The tool is mainly meant to be used together with the Kryton tool, developed in Masaryk University, which can orchestrate a set of simulators according to the given scenario, that is inferred by the Tyrant from the input set of logs. The tool (and its process) works in the following phases: 1. A communication in real production is captured either for future testing or for debugging purposes. This results in the set of logs of messages, where each message has particular timestamp, issued command, host, target, and set of data of various formats. 2. Logs are parsed by the Tyrant into the stream of messages. Each message is classified into a set of clusters of messages, where each cluster is identified by unique key. The data of the corresponding cluster is abstracted into the form of abstract trie. 3. The model of the communication is inferred. By default, the model is linear and reproduces the log 1:1, without any abstractions or reduction. Optionally, the tool can apply an abstraction (namely height abstraction) resulting into minimized model, which is user-friendly for manual inspection. 4. The model is serialized to stream of messages: the output scenario in the YAML format supported by the Kryton tool. The Kryton then can reproduce the scenario by sending messages between real (tested
Název v anglickém jazyce
A Tool for Creating Test Scenarios for Industry Applications
Popis výsledku anglicky
Tyrant is an open source tool, that learns the logs of captured communication and outputs model that can be used to reproduce the run (or its mutation) in form of the so called scenario. Tyrant focuses on digital twins: the simulation and implementation of corresponding factory production environment (corresponding components, information system, ERP systems, etc.). The main use case of the scenarios is meant for testing the individual components in the environment: the machines, the terminals, ERP (Enterprise Resource Planning) systems and the PIS (Production Information System). The tool is mainly meant to be used together with the Kryton tool, developed in Masaryk University, which can orchestrate a set of simulators according to the given scenario, that is inferred by the Tyrant from the input set of logs. The tool (and its process) works in the following phases: 1. A communication in real production is captured either for future testing or for debugging purposes. This results in the set of logs of messages, where each message has particular timestamp, issued command, host, target, and set of data of various formats. 2. Logs are parsed by the Tyrant into the stream of messages. Each message is classified into a set of clusters of messages, where each cluster is identified by unique key. The data of the corresponding cluster is abstracted into the form of abstract trie. 3. The model of the communication is inferred. By default, the model is linear and reproduces the log 1:1, without any abstractions or reduction. Optionally, the tool can apply an abstraction (namely height abstraction) resulting into minimized model, which is user-friendly for manual inspection. 4. The model is serialized to stream of messages: the output scenario in the YAML format supported by the Kryton tool. The Kryton then can reproduce the scenario by sending messages between real (tested
Klasifikace
Druh
R - Software
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
<a href="/cs/project/TN01000077" target="_blank" >TN01000077: Národní centrum kompetence pro Kyberbezpečnost</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2020
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Interní identifikační kód produktu
tyrant
Technické parametry
Software je volně dostupný včetně zdrojových textů. Pro informace o licenčních podmínkách prosím kontaktujte: Výzkumné centrum informačních technologií, Fakulta informačních technologií VUT v Brně, Božetěchova 2, 612 66 Brno.
Ekonomické parametry
Software je volně dostupný včetně zdrojových textů.
IČO vlastníka výsledku
00216305
Název vlastníka
Vysoké učení technické v Brně