Slide title In CAPITALS 50 pt Slide subtitle 32 pt Risk-based regression testing in a telecommunication system node Master’s thesis presentation 14.8.2007.

Slides:



Advertisements
Similar presentations
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Feasibility Study of A-interface over Internet Protocol Masters Thesis Presentation Eero Laitinen,
Advertisements

Testing Workflow Purpose
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Active Queue Management for LTE uplink in eNodeB Yifeng Tan Supervisor: Professor Riku Jäntti Instructor:
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ericsson Nikola Tesla’s view of collaboration between academic communities and enterprises Gordana Kovačević,
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ericsson satsning på Public Safety - National Security HIØ Personalseminar – 9. mai 06 - Ed.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Elements for successful partnership between Enterprise and University Ericsson in Croatia case EUPIDE.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Proactive fault management in mobile core network Niko Isotalo Instructor: Ira Antikainen Supervisor:
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Frame Header Based Speech Quality Analysis Method in a Circuit-Switched Media Gateway Master’s Thesis.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt BSNL 3G Network Parameters affecting Data Speed
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile Phone Security Stewart Kowalski, Ericsson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt KPI Reporting and Analysis Templates Naren Mohan
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Open Source Business Models for Mobile Media Gateway Node Manager.
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Improved project management practices as a key to the successful IS implementation Željka Požgaj*, Hrvoje.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt E2E IMS Interoperability Test Environment Ali Soujeh Senior Specialist, Interoperability Ericsson.
Improving Effectiveness of Regression Testing of Telecommunications Systems Software Sami Torniainen Supervisor: Professor Raimo Kantola.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Site DB creation and updates 05/08/2006 by Performance Team.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Bitstream and Hybrid Model VQEG Meeting, Kyoto, March 2008 Jörgen Gustafsson and Martin Pettersson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Service requirements from 3GPP TS SDO Emergency Services Coordination Workshop (ESW06) Columbia.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Developing a Testing Process for Remote Usage of Multimedia Messaging Centre Master´s Thesis Presentation.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt ESPA in WCDMA.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-02 Suresh Krishnan Ana Kukec Khaja Ahmed.
CS4723 Software Validation and Quality Assurance Lecture 15 Advanced Topics Test Plans and Management.
Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt HANDOVER Overview.
Regression Testing. 2  So far  Unit testing  System testing  Test coverage  All of these are about the first round of testing  Testing is performed.
Collaborative Open Source Software Utilization in Competitive Advantage Creation Author: Erkko Anttila Supervisor: Heikki Hämmäinen, Professor Instructor:
Testing Workflow In the Unified Process and Agile/Scrum processes.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
06/09/2005Master's Thesis Seminar - Jesse Kruus 1 Analyzing and Developing Base Load for WCDMA Base Station Automated Testing System Thesis written at.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt PDU PCN TTCN 3 in SGSN testing Peter Eldh.
Chapter 13: Regression Testing Omar Meqdadi SE 3860 Lecture 13 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
University of Palestine software engineering department Testing of Software Systems Testing throughout the software life cycle instructor: Tasneem.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Simple DNA draft-krishnan-dna-simple-03 Suresh Krishnan Greg Daley.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Model based development for the RUNES component middleware platform Gabor Batori
T Project Review WellIT PP Iteration
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Cost Control in Service Composition Environments NGMAST 2008 Jörg Niemöller, Raphaël Quinet, Roman Levenshteyn.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Static Call Admission Control and Dimensioning of Media Gateways in IP based Mobile Core Networks Mika.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Configuration Aware Distributed System Design in Erlang Gabor Batori, Zoltan Theisz, Domonkos Asztalos.
Rev A Mikko Suominen Enhancing System Capacity and Robustness by Optimizing Software Architecture in a Real-time Multiprocessor Environment.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Performance of Signalling Compression in the Third Generation Mobile Network Jouni Mäenpää S
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Dynamic and Persistent Scheduling for Voice over IP Traffic in the Long-Term Evolution Uplink Master’s.
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
1 © NOKIA Functionality and Testing of Policy Control in IP Multimedia Subsystem Skander Chaichee HUT/Nokia Networks Supervisor: Professor Raimo.
Ericsson Tower Tube. Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24.
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
HUAWEI TECHNOLOGIES CO., LTD. Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt POST LAUNCH TUNING.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt ANALYSING EFFECTS OF MALFUNCTIONS ON THE PERFORMANCE OF UMTS RADIO ACCESS NETWORKS Author: Antti Keintola.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ericsson IMS CANTO 2005, St. Kitts Antonio Gómez Business Unit Systems.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Robust Reconfigurable Erlang Component System ErlCOM Gabor Batori, Zoltan Theisz, Domonkos Asztalos.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Verification of a GPRS Charging System in a Simulated Test Environment Author: Kirsi Koskenheimo Supervisor:
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ambient Networks Media Delivery in the 3GPP Framework Author: Outi Koski Supervisor: Heikki Hämmäinen.
Which is more safer?. Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Some Background about 3GPP SA4’s RTSP extensions Thorsten Lohmar.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Protection concerns using Switched Ethernet as internal bus for a Telecommunication Network Element.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Guidelines for Firewall Administrators Mobile IPv6 Suresh Krishnan, Niklas Steinleitner, Ying Qiu, Gabor.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Authentication/Authorization for possible deployments Relevant scenarios for CAFE.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Capacity Management in WCDMA.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Improvement of Software Delivery Process in the Telecommunications Industry Xian Sun
Testing throughout Lifecycle Ljudmilla Karu. Verification and validation (V&V) Verification is defined as the process of evaluating a system or component.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Multi-component KPI:s ETSI/STQ_Mobile(08)18TD10.
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Authors: Maria de Fatima Mattiello-Francisco Ana Maria Ambrosio
Presentation transcript:

Slide title In CAPITALS 50 pt Slide subtitle 32 pt Risk-based regression testing in a telecommunication system node Master’s thesis presentation Author: Mika Lehto Supervisor: Professor Heikki Hämmäinen Instructor: M.Sc. Pekka Hämäläinen

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Agenda  Background and objectives  Risk-based testing  Regression testing  Case Study –Ericsson’s Media Gateway for Mobile Networks (M-MGw) –M-MGw Node Functional Verification –Risk model –Risk analysis and prioritization –Scenarios for the case study –Results  Conclusions  Future research

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Background  The costs of regression testing comprise % of the whole testing costs on average in software development → regression testing is often the target of cost reduction activities in order to achieve shorter time-to-market and lower cost structure of the product  The efficiency of regression testing is usually attempted to improve by using regression testing methods such as regression test selection, test suite reduction, and test case prioritization  One approach that has been studied is called risk-based regression testing but only a little information about the feasibility of risk-based regression testing is currently available

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Objectives  The primary objective of this thesis was to study whether it would have been beneficial to use risk-based regression testing in an old M-MGw Node Functional Verfication project  This thesis also analyzed the differences in test case selections between previously used and risk-based test case selections methods  The aim of this thesis was also to demonstrate how risk-based testing approach can be utilized in regression testing

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Risk-based testing  The fundamental difference between traditional testing and risk-based testing is that risk-based testing brings formal risk assessment methods (risk identification, risk analysis, and risk prioritization) in testing process  The aim of risk-based testing is to focus the test effort on the most critical areas of the system  Risk-based testing approach can be used for instance to: –Select the most important test objects and test cases –Evaluate the current level of system quality and risk –Provide input for the decision to continue or stop testing

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Regression testing  “Selective retesting of a system or component to verify that modifications have not caused unintended effects and that the system or component still complies with its specified requirements” (IEEE Software glossary)  Regression testing is typically used during iterative software development and to support application maintenance  The biggest challenge in regression testing is the test case selection  In risk-based regression testing, formal risk analysis methods are used to select the most risky test cases for execution

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Ericsson’s Media Gateway for Mobile Networks (M-MGw)  M-MGw operates in the connectivity layer of the core network and its fundamental purpose is to connect the core network to other networks such as UTRAN and PSTN  M-MGw also supports media conversion, bearer control and payload processing  M-MGw is remotely controlled by the MSC or SGSN Servers which operate in the network control layer.

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential M-MGw Node Functional Verification  Testing in the NFV is based on requirements (e.g. Specifications and call flows)  NFV is a testing phase in which the M-MGw software is first time tested in a real node environment  Test environment is established of one M-MGw node and all the external interfaces to this node are simulated

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Risk model  The case study was based on a qualitative risk model and a risk was measured as a risk exposure: Risk Exposure = Probability x Consequence  Risk items were categorized into three classes according to the probability and consequence of a risk: tolerable, undesirable, and intolerable

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Risk analysis and prioritization  Risk analysis was performed both for the test objects and test cases using systems experts –2 systems experts participated into the risk analysis of test objects and 8 systems experts analyzed the risks related to test cases  Test objects and test cases were prioritized according to risk exposure –In a case of test case prioritization, also other prioritization criteria (consequence, old test case priority) were needed because several test cases had the same risk exposure

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Scenarios  The analysis was based on 5 scenarios in which the amount of executed test cases was changed  In scenario 1, as many test cases were selected for execution per test object as in the original case but the test cases were selected based on risk  In other scenarios, the test effort was focused on the most risky test objects by defining how many percent of the test cases per test object were executed –Scenario 2: Intolerable 25%, Undesirable 15%, Tolerable 10% –Scenario 3: Intolerable 20%, Undesirable 10%, Tolerable 5% –Scenario 4: Intolerable 15%, Undesirable 10%, Tolerable 0% –Scenario 5: Intolerable 10%, Undesirable 5%, Tolerable 0%

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Results – used man hours  Significant savings in used man hours would have been achieved in scenarios 3-5  In the original case, the used man hours were distributed equally to all test objects  In risk-based approach (i.e. scenarios 2-5), approximately 55 % of man hours were consumed to 20 % of test objects

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Results – risk level  Risk level defines how many percent of the total risk is still uncovered  Risk level would have been 10 percentage units lower in the original case if the test cases had been selected based on risk  In the scenarios 3-4, risk level is at the same level than in the original case even though much less man hours were consumed

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Results – detected faults  Only 40 % of the faults were found in scenario 1 in which the test cases were selected based on risk but the test effort was not concentrated on the most risky test objects  By concentrating also the test effort to the most risky test objects, % of the faults were found  Deeper analysis to these poor fault-detection rates revealed that the risk analysis of test cases of TO_04 had failed and caused faults to slip through testing

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Results – test case selections  Differencies in test case selections between previously used and risk-based approach was analyzed by determining test case coverage which defines how many percent of test cases executed in the original case was also executed in designed scenarios  In addition, the average risk exposure per test case was determined to each scenario

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Conclusions  Risk-based regression testing would not have brought cost savings in used man hours because the costs of the faults that slipped through testing would have eliminated all the gained cost savings  Testing effort was not concentrated on the most risky test object in the original case  It can not be said that testers would have utilized risk- based testing approach when selecting regression test cases in the original case

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential Future Research  A possible pilot project for risk-based testing in order to get more empirical experience how risk-based testing works in practice  The concept and usage of risk level should be investigated more because risk level could be possible used as an indicator to tell when it is time to stop testing  To develop a framework for assessing the costs of the faults quantitatively

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt Ericsson Confidential