This document summarizes a project using model-based testing (MBT) to test the charging subsystem (CS) of a mobile operator. Key points:
- An MBT approach was used to generate TTCN-3 test scripts from a state machine model of the CS to test features like subscriber provisioning and data usage charging.
- Over 12,000 test cases covering all transition triples were generated and run in under 6 hours, finding 15 new errors. This provided better coverage than manual testing.
- The mobile operator found MBT reduced testing time and costs compared to manual testing and increased confidence in the CS before deployment. They plan to use MBT for future testing.
This presentation was prepared by Ishara Amarasekera and Prabath Weerasinghe based on the paper, Feedback Queueing Models for Time Shared Systems by Edward G. Coffman and Leonard Kleinrock.
This presentation contains a summary of the content provided in this research paper and was presented as a paper discussion for the course, Advanced Operating Systems in Computer Science.
This is a presentation created to facilitate a research paper discussion on 'Feedback queuing models for time shared systems' for a final year undergraduate course. This includes a summary of the concepts presented with the paper, excluding their statistical proofs.
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and ChallengesAJAY KHARAT
With the advancement of SDN and NFV techniques a series of work was proposed:
OpenSketch, DREAM, FlowRadar, Trumpet
Hybrid solution that balances the tradeoff between FCAP (higher accuracy) and SMON (less memory)
Alternative data structure to Ring Buffer that would consume less memory
Achieve a design of integration that has the minimal forwarding-monitoring function interference, optimal code sharing and efficient CPU/Memory resource usage
This presentation was prepared by Ishara Amarasekera and Prabath Weerasinghe based on the paper, Feedback Queueing Models for Time Shared Systems by Edward G. Coffman and Leonard Kleinrock.
This presentation contains a summary of the content provided in this research paper and was presented as a paper discussion for the course, Advanced Operating Systems in Computer Science.
This is a presentation created to facilitate a research paper discussion on 'Feedback queuing models for time shared systems' for a final year undergraduate course. This includes a summary of the concepts presented with the paper, excluding their statistical proofs.
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and ChallengesAJAY KHARAT
With the advancement of SDN and NFV techniques a series of work was proposed:
OpenSketch, DREAM, FlowRadar, Trumpet
Hybrid solution that balances the tradeoff between FCAP (higher accuracy) and SMON (less memory)
Alternative data structure to Ring Buffer that would consume less memory
Achieve a design of integration that has the minimal forwarding-monitoring function interference, optimal code sharing and efficient CPU/Memory resource usage
Soln deck business operations support services_finalAdobe
Dynamically scale business operations to accommodate growth, change management and complexity with Business Operations Support as a Service (BOSS). The result is reduced cost and fewer resources required.
Flexible Cloud-Based Application Management
For today's companies, scaling operational skills and resources in line with business expansion is a constant challenge. The Cloud can offer greater application flexibility, but traditional application management models focus on stability, fixed capacity and service-level agreements, all of which are not conducive to cloud-based environments. In addition, operational support structures are commonly static and not designed for accelerated response times and dynamic changes.
A cloud-based support environment can help your company change and innovate quickly to meet your business needs.
Capgemini Cloud Assessment is a Cloud agnostic, vendor aware methodology that focuses on low risk, high return business transformation. Additionally, it reduces TCO and provides an early view of ROI.
This closed loop assessment leverages pre-built accelerators such as ROI calculators, risk models and portfolio analyzers utilizing our deep partner ecosystem. We deliver an end state architecture, business case and deployment roadmap in just six to eight weeks.
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSDeepak Shankar
Selecting the right Ethernet standard and configuring all the network devices in the embedded systems accurately is an extremely hard and rigorous job. The configuration depends on the topology, workloads of the connected devices, processing overhead at the switches, and the external interfaces. Network calculus, mathematical models and analytical techniques provide worst case execution time (WCET), but their probability of activity is extremely wide. This leads to overdesign which leads to higher costs, power consumption, weight, and size. Simulating the network is the best way to measure the throughput of the entire system. Digital system simulation provides better latency and throughput accuracy, but the accuracy is still limited because it does not consider the latency associated with the network OS, cybersecurity processing and scheduling. In many cases, these factors can reduce the throughput by 20-40%.
In this paper, we will present our research on modeling the entire Ethernet network, including the workloads, network flow control, scheduling, switch hardware, and software. To substantially increase the coverage and compare topologies, we have developed a set of benchmarks that provides coverage for different combination of deterministic, rate-constrained, and best effort traffic. During the presentation, we will cover the benchmarks, the list of attributes required to accurately model the traffic, nodes, switches, and the scheduler settings. We will also look at the statistics and reports required to make the configuration decision. In addition, we will discuss how the model must be constructed to study the impact of future requirements, failures, network intrusions, and security detection schemes.
Key Takeaways:
1. Learn how to efficiently use network simulation to design Ethernet systems
2. Develop a reusable benchmark and associated statistics to test different configurations
3. The role and impact of the CDT slots, guard band, send slope, idle slope, shuffle scheduling, flow control and virtual channels
[EWiLi2016] Enabling power-awareness for the Xen HypervisorMatteo Ferroni
Virtualization allows simultaneous execution of multi-tenant workloads on the same platform, either a server or an embedded system. Unfortunately, it is non-trivial to attribute hardware events to multiple virtual tenants, as some system’s metrics relate to the whole system (e.g., RAPL energy counters). Virtualized environments have then a rather incomplete picture of how tenants use the hardware, limiting their optimization capabilities. Thus, we propose XeMPower, a lightweight monitoring solution for Xen that precisely accounts hardware events to guest workloads. It also enables attribution of CPU power consumption to individual tenants. We show that XeMPower introduces negligible overhead in power consumption, aiming to be a reference design for power-aware virtualized environments.
Full paper: http://ceur-ws.org/Vol-1697/EWiLi16_10.pdf
Martin Gijsen - Effective Test Automation a la Carte TEST Huddle
EuroSTAR Software Testing Conference 2009 presentation on Effective Test Automation a la Carte by Martin Gijsen. See more at conferences.eurostarsoftwaretesting.com/past-presentations/
스마트 엔지니어링: 제조사를 위한 품질 예측 시뮬레이션 및 인공지능 모델 적용 사례 소개 – 권신중 AWS 솔루션즈 아키텍트, 천준홍 두산...Amazon Web Services Korea
제조 고객사의 품질 개선 활동이나 시뮬레이션을 자원의 제약 없이 보다 신속하고 효율적으로 개선할 수 있는 AWS의 서비스와 참조 아키텍처를 소개 드립니다. 탄력적이고 확장 가능한 클라우드 인프라를 활용하여 품질 예측 시뮬레이션을 수행한 두산중공업의 사례와 한국타이어앤테크놀로지가 타이어 성능을 결정하는 ‘컴파운드’라는 고무 물질 관련 축적 데이터를 AWS와 함께 쉽고 빠르게 분석, 활용하여 성능과 안정성이 강화된 타이어를 개발해나가는 사례를 직접 전해 드립니다.
B Kindilien-Does Manufacturing Have a Future?jgIpotiwon
Presentation to students and educators at Eastern Connecticut State University in 2008 on the challenges, and opportunities, facing people in manufacturing.
Soln deck business operations support services_finalAdobe
Dynamically scale business operations to accommodate growth, change management and complexity with Business Operations Support as a Service (BOSS). The result is reduced cost and fewer resources required.
Flexible Cloud-Based Application Management
For today's companies, scaling operational skills and resources in line with business expansion is a constant challenge. The Cloud can offer greater application flexibility, but traditional application management models focus on stability, fixed capacity and service-level agreements, all of which are not conducive to cloud-based environments. In addition, operational support structures are commonly static and not designed for accelerated response times and dynamic changes.
A cloud-based support environment can help your company change and innovate quickly to meet your business needs.
Capgemini Cloud Assessment is a Cloud agnostic, vendor aware methodology that focuses on low risk, high return business transformation. Additionally, it reduces TCO and provides an early view of ROI.
This closed loop assessment leverages pre-built accelerators such as ROI calculators, risk models and portfolio analyzers utilizing our deep partner ecosystem. We deliver an end state architecture, business case and deployment roadmap in just six to eight weeks.
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSDeepak Shankar
Selecting the right Ethernet standard and configuring all the network devices in the embedded systems accurately is an extremely hard and rigorous job. The configuration depends on the topology, workloads of the connected devices, processing overhead at the switches, and the external interfaces. Network calculus, mathematical models and analytical techniques provide worst case execution time (WCET), but their probability of activity is extremely wide. This leads to overdesign which leads to higher costs, power consumption, weight, and size. Simulating the network is the best way to measure the throughput of the entire system. Digital system simulation provides better latency and throughput accuracy, but the accuracy is still limited because it does not consider the latency associated with the network OS, cybersecurity processing and scheduling. In many cases, these factors can reduce the throughput by 20-40%.
In this paper, we will present our research on modeling the entire Ethernet network, including the workloads, network flow control, scheduling, switch hardware, and software. To substantially increase the coverage and compare topologies, we have developed a set of benchmarks that provides coverage for different combination of deterministic, rate-constrained, and best effort traffic. During the presentation, we will cover the benchmarks, the list of attributes required to accurately model the traffic, nodes, switches, and the scheduler settings. We will also look at the statistics and reports required to make the configuration decision. In addition, we will discuss how the model must be constructed to study the impact of future requirements, failures, network intrusions, and security detection schemes.
Key Takeaways:
1. Learn how to efficiently use network simulation to design Ethernet systems
2. Develop a reusable benchmark and associated statistics to test different configurations
3. The role and impact of the CDT slots, guard band, send slope, idle slope, shuffle scheduling, flow control and virtual channels
[EWiLi2016] Enabling power-awareness for the Xen HypervisorMatteo Ferroni
Virtualization allows simultaneous execution of multi-tenant workloads on the same platform, either a server or an embedded system. Unfortunately, it is non-trivial to attribute hardware events to multiple virtual tenants, as some system’s metrics relate to the whole system (e.g., RAPL energy counters). Virtualized environments have then a rather incomplete picture of how tenants use the hardware, limiting their optimization capabilities. Thus, we propose XeMPower, a lightweight monitoring solution for Xen that precisely accounts hardware events to guest workloads. It also enables attribution of CPU power consumption to individual tenants. We show that XeMPower introduces negligible overhead in power consumption, aiming to be a reference design for power-aware virtualized environments.
Full paper: http://ceur-ws.org/Vol-1697/EWiLi16_10.pdf
Martin Gijsen - Effective Test Automation a la Carte TEST Huddle
EuroSTAR Software Testing Conference 2009 presentation on Effective Test Automation a la Carte by Martin Gijsen. See more at conferences.eurostarsoftwaretesting.com/past-presentations/
스마트 엔지니어링: 제조사를 위한 품질 예측 시뮬레이션 및 인공지능 모델 적용 사례 소개 – 권신중 AWS 솔루션즈 아키텍트, 천준홍 두산...Amazon Web Services Korea
제조 고객사의 품질 개선 활동이나 시뮬레이션을 자원의 제약 없이 보다 신속하고 효율적으로 개선할 수 있는 AWS의 서비스와 참조 아키텍처를 소개 드립니다. 탄력적이고 확장 가능한 클라우드 인프라를 활용하여 품질 예측 시뮬레이션을 수행한 두산중공업의 사례와 한국타이어앤테크놀로지가 타이어 성능을 결정하는 ‘컴파운드’라는 고무 물질 관련 축적 데이터를 AWS와 함께 쉽고 빠르게 분석, 활용하여 성능과 안정성이 강화된 타이어를 개발해나가는 사례를 직접 전해 드립니다.
B Kindilien-Does Manufacturing Have a Future?jgIpotiwon
Presentation to students and educators at Eastern Connecticut State University in 2008 on the challenges, and opportunities, facing people in manufacturing.
Analytical, prototyping, model-based systems engineering and custom discrete-event model development of automotive networks are inaccurate, expensive, and takes too long to do detailed routing analysis, Quality-of-Service (QoS) trade-off, and bandwidth exploration. To capture the nuances of QoS, scheduling, buffer management, and network topologies, these solutions require a considerable amount of time, costs, and customization. To achieve the reliability of wiring harness, the latency and bandwidth measurements of automotive networks must be accurate, tested for failure conditions, and simulated for security breaches, traffic spikes, and translations.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Model based ttcn-3 testing of a mobile operator charging
1. Model-based TTCN-3 testing of a
mobile operator charging subsystem
T3UC, Beijing
July 2010
Dr. Andres Kull, Elvior
Dr. Kullo Raiend, Elvior
2. System Under Test
► Customer: Estonian mobile operator EMT (www.emt.ee)
► SUT: post-paid data charging subsystem in EMT
► CS: provided by Ericsson (www.ericsson.com)
► CS is customized using EMT business rules
Billing Subsystem
Charging Provisioning
accumulators
GSM/WCDMA
SUT: Charging Subsystem
Network Data session
3. CS core functionality
► Subscribers are provisioned by billing subsystem
► Provisioning the charging rules to the subscribers
► According to the data sessions the subscriber
account is credited by CS
Billing Subsystem
Billing Sybsystem
Charging Provisioning
Charging reports Provisioning
accumulators
GSM/WCDMA
GSM/WCDMA Data usage
SUT: Charging Subsystem
Charging Subsystem
Network
Network Data session
4. CS testing bottlenecks
► Ericsson upgrades CS software from time to time
► Customer introduces new subscription packages or
changes existing ones from time to time
► Manual testing is time-consuming and error-prone
► Time for testing the updates is usually very short
5. Customer’s hopes from MBT
► Shorten the regression testing time
► Increase the test coverage
► Avoiding risks caused by the human factor in
executing huge amount of boring tests manually
► Reducing the amount of manual tests significantly
6. MBT workflow used
CS model in Poseidon
for UML CASE tool
Generator
TTCN3- test scripts
Develops
Defines
coverage
CS Requirements Analyses
► System requirements are modelled TTCN-3 test tool
► Tests are generated from models
► Resulting tests have predefined coverage SUT: CS
7. CS features under test
► Subscribers provisioning
► Changing subscription profiles
► Changing month and day
► Bonus data amount usage
► Free data amount usage
► Priced data usage within HPLMN limit
► Priced data usage in the case of unlimited HPLMN
► Data usage if HPLMN limit is exceeded
8. Main test scenario TTCN-3 test tool
Network Billing subsystem
SUT: Charging Subsystem (CS)
TTCN-3 test tool
Billing subsystem Network
Charging Subsystem (CS)
Provision a subcsriber Generate data session
Ask charging accumulators for the subscriber
Charging accumulators
Test if the subscriber account is credited as described by charging rules
9. CS model
► State machine models the behaviour of CS
► Only few model states (forBonus, forFree, noCharge,
Priced, LimitExceeded)
► 16 context variables
► Properties
of subscriber profiles
► CS accumulators for different purposes
► 106 transitions
► Express CS and environment transactions
► Used for modelling the charging rules
10. Tests generation and execution
Coverage Generation Test lengh Amount of Execution
time (transitions) TTCN-3 (LOC) time
All transitions 2 min 213 9 213 5 min
All transition 57 min 1 672 22 765 24 min
pairs
All transition 18 h 49 min 12 807 89 191 5h
triples
11. Detected errors
► Note: CS was quite well manually tested before the
MBT started
► In total 15 new errors were detected
► Detected charging errors could spoil the reputation of
the operator
12. Project process, time spent
► Beginning (94 h, 31%)
► Introduction to problem domain
► Setting up test environment
► Executing 1st generated test case
► Incremental development to cover the scope
(142 h, 47%)
► Model updates Results Results Model
Results Model Model
► Test generation analysis analysis uddate
analysis uddate uddate
► Test execution
► Analysing results Test Test Test Test Test Test
executionexecutiongeneration
execution generationgeneration
► Refactoring and test generation for different
subscription profiles (32 h, 11%)
► Creating of documentation (32 h, 11%)
13. Test automation specialists feedback
► Higher test coverage than manually scripted
► The tests building productivity increases significantly
► Long generated test cases detected otherwise hard
to find errors
► Significant tests maintenance costs decrease is
foreseen
► Requirements traceability and results analysis is the
key issue that should be improved in MBT
14. Conclusions
► Manual to MBT reduces test quality decrease
caused by human factor
► All transition test coverage tests allow quickly (5min)
verify in regression test the past functionality
► MBT revealed significant amount of errors that were
not disclosed in manual tests
► At the end of project the testing staff was convinced
that CS is ready for taking into real use
► MBT is the technology that EMT will start to use
15. Thank you!
More information:
www.elvior.com
Cut your sofware testing expenses
Functional black-box tests automation