Automated evaluation of test logs
09785889 · 2017-10-10
Assignee
Inventors
Cpc classification
G06N7/01
PHYSICS
International classification
G06N7/00
PHYSICS
G06F11/36
PHYSICS
Abstract
An automated evaluation of test logs for the testing of telecommunications equipment includes a probabilistic model that links possible events in a test log with possible causes for the event. Probability values for possible causes are calculated from the probabilistic model and a search result, and a reference to a possible cause is provided in an output based upon the calculated probability values.
Claims
1. A method for the automated evaluation of a test log for testing telecommunications equipment, the method comprising: providing a probabilistic model, which links a plurality of possible events in the test log with a plurality of possible causes; searching the test log for the occurrence of at least one of the possible events; calculating probability values for the plurality of possible causes with the probabilistic model and a search result; and providing an indication of at least one possible cause for the at least one of the possible events in the test log based on the calculated probability values, wherein consideration of at least one event and/or consideration of at least one cause are specified or selected from a menu.
2. The method according to claim 1, further comprising assigning a predefined probability value to at least one link in the probabilistic model, which is used for the calculation of the probability values for the plurality of possible causes.
3. The method according to claim 1, wherein each link associates one event with one possible cause, and one probability value is allocated to each link.
4. The method according to claim 1, wherein each event is linked to all possible causes that are represented in the probabilistic model.
5. The method according to claim 1, wherein the probabilistic model comprises a Bayesian network, a neural network, and/or a decision tree.
6. The method according to claim 1, wherein the plurality of events relate to the occurrence or nonoccurrence of at least one message, the occurrence or non-occurrence of a parameter in a message, and/or the occurrence or non-occurrence of a parameter value of a parameter in a message.
7. The method according to claim 1, wherein separate probability values are allocated to the occurrence of, or the non-occurrence of, a message, a parameter or a parameter value.
8. The method according to claim 1, wherein the probabilistic model comprises the possibility of an unknown cause.
9. The method according to claim 1, wherein the probabilistic model comprises a multi-layer network with an event layer, an intermediate layer, or a cause layer, wherein nodes of the intermediate layer represent causes for the event layer and/or events for the cause layer.
10. The method according to claim 9, wherein at least one of the nodes of the intermediate layer represents a chronological sequence of events.
11. A computer system including an expert system for the evaluation of test logs of telecommunications devices, and an evaluation tool within the framework of the expert system, the evaluation tool configured to: provide a probabilistic model, which links a plurality of events in the test log with a plurality of possible causes; search the test log for the occurrence of the events; calculate probability values for the plurality of possible causes with the probabilistic model and a search result; and provide an indication of at least one possible cause for at least one of the events in the test log from the calculated probability values, wherein consideration of at least one event and/or consideration of at least one cause are specified or selected from a menu.
12. The computer system according to claim 11, wherein the evaluation tool is further configured to allow user entries relating to the consideration of at least one event, the consideration of at least one cause, and/or the indication of at least one probability value for a link.
13. The computer system according to claim 11, wherein the evaluation tool is further configured to provide a plurality of probabilistic models for different questions for the evaluation of the test logs.
14. The method according to claim 1, wherein the plurality of possible events includes non-detection of an observation, or a process, in the test log.
15. The method according to claim 1, wherein the search of the test log comprises pattern matching or pattern recognition, or a targeted search in which a search of a pattern is implemented following the detection of another pattern.
16. The computer system according to claim 11, wherein the plurality of possible events includes non-detection of an observation, or a process, in the test log.
17. The computer system according to claim 11, wherein the searching of the test log comprises pattern matching or pattern recognition, or a targeted search in which a search of a pattern is implemented following the detection of another pattern.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Further aspects and advantages of the invention are described below with reference to the attached drawings. The drawings show:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
(9)
(10) A testing of the user device 102 comprises the transmission 106 of messages from the TE 104 to the DUT 102 and also the transmission 108 of messages from the DUT 102 to the TE 104. In this context, the message exchange 106, 108 runs via at least one interface 110, that is, for example, via an air interface. Via the interface 110, the TE 102 can emulate, for example, the behaviour of a case station of a mobile-radio network for this purpose.
(11) The TE 104 logs the test procedure, that is, especially the messages transmitted 106 and respectively received 108 via the interface 110, in a test log (“Log”) 112, which can be present, for example, after the completion of the test in the form of one or more computer-readable files. Dependent upon the type and the purpose of the test, a plurality of messages can be exchanged via the interface 110. For each message, further details are generally logged, for example, embedded messages of lower log layers, existing parameters, optionally with parameter values, etc., so that a correspondingly extensive test log 112 is obtained, as is known to the person skilled in the art.
(12) The evaluation system (RS, “Reporting System”) 160 is separated from the testing system 100 or respectively the testbed TB, as indicated by the line 150. As a functional component, the RS 160 comprises an expert system (ES) 162, which can be implemented on a computer system, which is not shown in greater detail here, for example, a conventional office PC or a computer network with distributed resources, such as a conventional office network. Alternatively, the expert system can be implemented on the TE 104, or on a notebook or similar portable device, for example, in order to allow a test evaluation on-site in the case of a service.
(13) Human test personnel, that is, a human tester or human test team, initiates the test evaluation via a console (input/output system) 164 and receives the results via the console 164, which can comprise, for example, a keyboard and/or other entry means and a display and/or other display means including electronic storage capacities for the storage of result reports.
(14) The expert system 162 has access to a database (databank), which provides, in particular, at least one classifier (Cl. “Classifier”) 166. For the implementation of the test evaluation, the expert system 162 gains access 168 to the test log 112. A test evaluation can be triggered, for example, by the test personnel, by means of a corresponding command issued via the console 164. Following this, a functional component 170 implements a search of the test log 112 for every classifier (PR, “Pattern Recognition”), that is, the component 170 searches the log 112 for the occurrence of given patterns, for example, character sequences, such as message identifiers. These patterns are specified by the classifier 166.
(15) A functional component 172 implements an evaluation processing (EV, “Evaluation”) on the basis of the detection and/or non-detection of the results. This processing is also specified by the classifier 166. On the basis of the processing, a functional component 174 determines test results (TR, “Test Results”), which can be presented to the test personnel in the form of a result report, for example, for storage in the form of a result file and/or for output at the console 164.
(16)
(17)
(18) In step 302, a pre-defined probabilistic model is presented, which links a plurality of events which can occur in the test log 112 with a plurality of possible causes. The probabilistic model in the example described here can comprise the classifier 166. In step 304, the test log 111 is searched by the component 170 for the occurrence of the events specified by the classifier 166.
(19) In step 306, probability values for the causes specified by the classifier 166 are calculated by the component 172 on the basis of the probabilistic model and a result from the investigation implemented in step 304. In step 308, the component 174 provides an indication of at least one possible cause for events which have and/or have not occurred in the test log, and in fact, on the basis of the calculated probability values. In step 310, the method ends, for example, in that a procedure control is returned to a superordinate control program within the framework of the expert system 162 or test-evaluation system 160.
(20) In the form of a flow chart,
(21) The processing 400 also relates, for example, to the automated evaluation of the test log 112, wherein the graph of a specified probabilistic model is set up for this purpose. The operation 400 can be implemented by a computer program and can be initiated, for example, by an entry via the console 164. The processing 400 can run in a batch mode and/or can run in the background, while other processes can be controlled, via the console 164 or other components of the evaluation system 160 not shown. The processing can comprise a presentation of an evaluation result on the console 164 after the initiation of the processing 400.
(22) The operation 400 describes a procedure from the perspective of a main program. The functional components 170, 172, 174 can be implemented in the form of sub-procedures, which are each controlled by a call from the main program. The main program can implement, for example, the expert system 162, or respectively an instance of it. However, other configurations are also conceivable.
(23) In step 402, a process (program, sub-routine, function, etc.) “GetOutOfSync” is called up. On the basis of this process, in step 404, the data of the classifier 166 are made available to the expert system 162, for example, by reading in the classifier 166 “OutOfSync”. From step 406, the further processing is implemented according to the date specified by the classifier 166. Steps 402 to 406 can be regarded as a concrete realisation of step 302.
(24)
(25) For this purpose, a plurality of possible causes 504 or respectively hypotheses H0, H1, H2 and H3 and furthermore a plurality of possible events 506 or observations (statements) A0, A1, A2, A3 with their abbreviations, known as such to the person skilled in the art, of the messages or respectively message sequences, are represented. In the following, English equivalents for the technical terminology used in
(26) The cause H0 represents at least one unknown cause; with the latter, observations can be taken into consideration, for example, given combinations of the occurrence and/or non-occurrence of events which match none of the known causes H1, H2, H3. The unknown cause H0 therefore provides an indication to the human test evaluator that the expert system was not able to identify any probable cause; that this should therefore be implemented by the test evaluator; and/or that, after the detection of the “unknown” cause, the expert system could optionally be supplemented with the latter.
(27) Every event is linked to every cause by precisely one link (relation, edge) 508. Conversely, every link 508 links precisely one event with precisely one cause. The links 508 are illustrated in
(28) The classifier 166 represents the causes 504, events 506 and links 508 in the form of a Bayesian network, in which a value 510 which indicates a probability is assigned to every link 508. The probability values 510 can be interpreted as probabilities that the event 506 designated by the corresponding link 508 is attributable to the cause linked by the link 508. These probability values 510 can be specified within the classifier 166 as constants. The values 510 can be specified during the development of the classifier 166 or the expert system 162, updated by a software/firmware update, and/or entered or amended by a user of the expert system 162 or the test-evaluation system 160. In an administrative mode in which no test evaluations are implemented, the expert system can thus, for example, receive entries via the console, with which the probabilities 510 can be entered or amended by test personnel, and matched, for example, with concrete empirical values.
(29) It is also conceivable that other aspects of the classifier are variable. For example, it may be possible for a user to add a further cause to the causes H0-H3 via the console 164 and/or to remove one or more of the causes H0-H3 from the graph 166. Similarly, it may be possible for a user to add an event to the events A0-A3 and/or to remove one or more of the events A0-A3 from the graph 166. The addition and/or removal of nodes 506, 508 can be implemented, for example, via a menu choice, with which processes or respectively statements comparable with the processes H0-H3, A0-A3 are offered to the user. For example, a menu can offer a selection of messages of a given log stack for a given interface, such as the interface 110 in
(30) With step 408 in
(31) The component 170 now implements a procedure for pattern recognition, that is to say, a measurement, or respectively a search or scan procedure, that is, for example, a check is carried out for each of the character strings 202 to determine whether this occurs in the test log 112. Additionally, further information can be measured, for instance, the position of the occurrence (such as the timestamp, and/or a position in the log file 112), allocated message contents, etc. It should be noted that an event 506 from
(32) After completion of the scanning procedure in step 408, the measurement results or respectively observations 204 (
(33) In the present example, it is assumed that the probabilities 510 indicated in the network or graph 166 in
(34) The measured data 204 which have been read in can contain further information. Accordingly, for example, message contents can be transferred for detected events, or a time sequence of detected events can be transferred. The alphabet with which the events are defined can be correspondingly extensive. Finally, every alphabet can be related back to a binary alphabet, that is, a message with different message contents can be represented in the form of a plurality of atomic events, which are then only defined with a binary alphabet. However, event lists, such as the list 204, can become extensive. The concrete embodiment can be optimised on the basis of the above discussion for every individual case.
(35) In step 412, the processing component 172 calculates probabilities for the causes 504 (hypotheses H0-H3) represented in the classifier 166. Alongside the events which are also available to the component 172 through the measurement results 204, the component 172 also reads in indicators 206 (
(36) The network or respectively the classifier 166 in this example is treated as a Bayesian network or respectively as a Bayesian classifier. Accordingly, a calculation of the probabilities with which the causes 504 of the graph 166 in
(37) As a result of the calculations, a list 210 (
(38) The steps 410 and 412 can correspond approximately with step 306. In steps 414 and 416, which can correspond approximately to step 308, the reporting component 174 receives the result data 210. Additionally, the component 174 can also call 214 (compare
(39)
(40)
(41) The component 174 has initiated the generation of a bookmark 702, which refers to a given position in the test log 112 and indicates a probable cause for an error situation allocated to this position. In detail, a warning is set by the bookmark 702. At the position designated by the ID 704, a synchronisation loss (OOS, “Out of Sync”) of the DUT 102 has been determined. The ID 704 can be a transfer address. In other exemplary embodiments, a line number, a timestamp or other position details can be indicated directly in the test log 112.
(42) The bookmark 702 further contains a short textual indication relating to the cause of the OOS, as calculated with the procedure according to the invention described above. In the case of a presentation of the test report on the console 164, further information could be displayed by clicking on the line 702, for example, providing a level of detail as in the command-line output 600 from
(43) Instead of only outputting the most probable cause, several causes can also be output, for example, if two or more maximum probabilities are disposed side-by-side within a corridor of, for example, 10%.
(44) The classifier 166 in
(45) In general, both events and causes can ultimately be regarded as processes; that is to say, a process can be represented in a probabilistic model equally well as an event and also as a cause. On this basis, a three-layer network can be treated as a combination of two two-layer networks, as described above. The causes, including the calculated probability values of the first two-layer network, go into the second two-layer network as results. The analysis of time dependencies, for example, with regard to a sequence of messages in the test log, can be cited as an example of a complex analysis, which is offered for representation in a multi-layer network.
(46) While the classifier 166 in
(47) An expert system like the system 164 in
(48) The evaluation by means of classifiers according to the invention can be offered to the user in the form of one (or more) evaluation tools. Within the framework of this tool, the user can select or deselect one or more questions. The optional entry of events, causes and probability values for the links can also be implemented within the framework of the evaluation tool. It is also conceivable for a dedicated view or respectively a dedicated window to be open or respectively opened for the tool, or for each selected classifier, for example, on a display screen of the evaluation console 164, in which the evaluation results are then also displayed, either in abbreviated form, as shown by way of example in
(49) The method procedures described here can generally be implemented in the form of hardware circuits, as software in combination with a programmable microprocessor, an application-specific integrated circuit (ASIC) and/or with the use of one or more digital signal processors (DSP). A software coding of the method described here can be stored, for example, in a Random-Access-Memory (RAM) or a Read-Only-Memory (ROM), for example an “Erasable Programmable ROM” (EPROM) or comparable semi-permanent or permanent storage medium.
(50) The invention is not restricted to the exemplary embodiments described and the aspects highlighted here; on the contrary, within the scope indicated by the dependent claims, a plurality of developments are possible which are disposed within the range of activity of the person skilled in the art. In particular, to the person skilled in the art, given combinations of features described separately above are evident as expedient or advantageous.
(51) From the above description of the invention it is manifest that various techniques can be used for implementing the concepts of the present invention without departing from its scope. Moreover, while the invention has been described with specific reference to certain embodiments, a person of ordinary skill in the art would recognize that changes can be made in form and detail without departing from the spirit and the scope of the invention. The described embodiments are to be considered in all respects as illustrative and not restrictive. It should also be understood that the invention is not limited to the particular embodiments described herein, but is capable of many rearrangements, modifications, and substitutions without departing from the scope of the invention.