Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Terminal NL Wave 3
Detailed Test Plan
Author
Surajit Bagchi
Project Manager- Vodafone
Henk.de-Keijzer@vodafone.com
Status
Initial Draft
Status Date
22-Dec-2014
Date Printed:
Save Date:
CONFIDENTIAL
Page 1
DOCUMENT CONTROL
Modification History
Version
0.1
Author(s)
Date Released
Surajit Bagchi
22 Dec 2014
Notes
Initial draft
Review History
Version Reviewed
Reviewer
Date Reviewed
0.1
Henk.de-Keijzer@vodafone.com
Notes
Approval History
Version Approved
Approver
Date Approved
Notes
Date received
Asim K Chatterjee
Page 2
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
CONTENT
Document Control.........................................................................................................2
Modification History........................................................................................................................... 2
Review History................................................................................................................................... 2
Approval History................................................................................................................................. 2
Additional Distribution List.................................................................................................................. 2
Content.........................................................................................................................3
1 Introduction.............................................................................................................5
1.1
1.2
1.3
1.4
Background.............................................................................................................6
2.1
3
4
Test Objectives.......................................................................................................7
Test Scope:.............................................................................................................8
4.1
5
6
Overview................................................................................................................................. 5
Identification............................................................................................................................ 5
References.............................................................................................................................. 5
Notations and Abbreviations:................................................................................................... 5
Out of scope............................................................................................................................ 8
Assumptions...........................................................................................................9
Test Strategy.........................................................................................................10
6.1
High Level overview of system test approach.......................................................................10
6.2
Test Goals:............................................................................................................................. 11
6.3
Types of Testing..................................................................................................................... 11
6.4
Test Approach System Testing............................................................................................ 11
6.5
Risk Assessment................................................................................................................... 12
6.6
Entry / Exit Criteria................................................................................................................ 12
6.6.1
System Testing............................................................................................................... 12
Test Plan...............................................................................................................13
7.1
7.2
7.3
10 Test Deliverables:.................................................................................................19
10.1
10.2
10.3
10.4
10.5
Page 3
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
1 INTRODUCTION
1.1 Overview
For Local Integration layer (LIL/ ODS), existing Article Master Stock interface IF0161 from 3TM to LIL will
be enhanced due to Business process changes/ decision to use EAN # as additional article numbers,
Thuiskopijheffing (Copy Right levy) and technical issues experienced in the current interface flows (e.g.
not being able to correctly identify deactivated articles). And some pass through interfaces between 3TM
and AXY-RS/ Dynafix via LIL.
1.2 Identification
The purpose of the document is to create a complete and consistent detail test plan that provides high
level testing guidance and insight in the following levels of tests:
System Testing/SIT Verify the correctness of the new functionalities implemented and check
whether the system as a whole with all modules is working as expected with available test data.
Vodafone BICC UAT Support: Support will be provided during UAT as per the scope mentioned
in UAT test strategy provided by BICC.
This document will focus majorly on system testing details- e.g. approach, strategy etc.
1.3 References
This document is based on and refers to the following documents:
Sr. No.
1
2
Title
VF_NL HLD Terminal NL Wave 3 ver.1.0.doc
VF_NL_BI
Detailed
Design
Terminal_NL_Wave_3_V1.10.doc
Version
-
1.0
Date
21-Nov-2014
1.10
114-Dec-2014
Description
High Level Design
Low Level Design
Material Master
Local Integration Layer
Page 4
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
2 BACKGROUND
2.1 High Level Data Model:
Below is the charcoal diagram for the project:
Page 5
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
3 TEST OBJECTIVES
Testing is the systematic search for defects in all project deliverables. It is the process of examining an
output of a process under consideration, comparing the results against a set of pre-determined
expectations, and dealing with the variances.
The main test objectives are:
Identify and publish the scope and substance of the testing effort
Identify and publish risks to the successful completion of the project
Verify functional correctness from a design point of view
Verify functional correctness from system behaviour
Test product robustness and stability
Report on the status of the product regarding the tests and measures
Page 6
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
4 TEST SCOPE:
The scope of this document concerns with testing of source data processing coming from different
source systems. This comprises:
Deliverable Name
QA Summary Report
Remark
This document will contain test scope, test approach and all detail on
different test activity
Will contain functionality covered, steps to follow, expected output, input
test data
Will contain execution status of each test case.
Will contain daily execution status report along with defect details. At the
end of each level of testing IBM will provide the overall project health
along with Go, No-Go suggestion for the next level.
Page 7
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
5 ASSUMPTIONS
The assumptions for performing the test activities are mentioned below:
No.
Assumption
IBM will receive test data from stock interface IF0161 (from
3TM) to LIL prior to system test starts
3
4
Comment
Page 8
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
6 TEST STRATEGY
This section describes the approach and methodologies to plan, organize and manage the testing.
The test strategy is business driven and aims at:
-finding major defects as early as possible
-making the critical path of the testing phase as short as possible
Test Designing
Test Case Identification:
Requirements traceability matrix will be created to trace the test coverage between test
goals and test cases.
Test execution.
Initiation of the test execution will be based on the fulfillment of entry criteria mentioned in this
document.
All identified System test cases will be executed as part of system test.
Success or failure of any test function/feature will be determined based on difference between
expected result and actual observation. Defects will be logged for failed test cases.
Test Reporting:
It is the process of reporting the progress of testing activities in each test level such as new identified
test cases, deviations from the baseline (test design).Furthermore the progress of execution, results
of the tests including issues found, root cause identification, known issues. A daily progress report
will be sent during system test execution.
Connectivity establishment:
Page 9
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
Data Loading:
Mapping:
Validate attribute level mapping between source and target data as per the mapping sheet mentioned in detailed
design document
Vodafone NL
Vodafone NL
Terminal Wave - Test Terminal
Goals_v0Wave
1.xls - Detail test plan_v 0.3.xls
Test Area
Approach Details
Verify whether source data is coming from 3TM
to LIL in the landing directory as mentioned in
detailed design document
Connectivity Test
Interface Test
Data Loading
Mapping Validation
Dependency
Connectivity should be
set between 3TM
interface to LIL
Source data should be
available prior to system
test.
Source data should be
available prior to system
test
Comment
Page 10
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
Rank
(H/M/L)
Unit test result and all open issues are documented and available
All test hardware platforms are identified, installed, configured and verified- ready for testing. E.g
identify LIL test server, Teradata server.
All applicable standard software tools including testing tools must have been successfully installed.
All required accesses are granted for each team member.- E.g. Teradata access for testing team.
Test cases and test plans are reviewed and signed off by VF test manager
Exit Criteria
All System Test Cases are executed and execution status is recorded
At least 95% of test cases executed are passed- out of which all critical and high priority test cases
are passed. Go ahead with failed test cases will be decided based on mutual agreement with IBM
Test Manager and VF Test Manager.
All open defects are reviewed and agreed by Vodafone for go-ahead in next test level
IBM has delivered a final and signed-off ST End Report (or QA report) to Vodafone- ensuring no
blocking defect is open and maximum of 5 severe defect can be in open status.
Page 11
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
7 TEST PLAN
7.1 Test Planning Workshops
After the initial version of this document is distributed and made available to all stakeholders, review will
be done on this document. Once review feedback is received by all stakeholders, document will be
modified and send again for review. This process will be completed based on the defined milestone date
once all stakeholders are agreed to test planning mentioned in this document.
Responsibilities
Testers
VF Test Manager
Page 12
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
VF BICC Team
Create UAT test plan with required support from each vendor.
Discuss and agree with IBM regarding support required for UAT environment
setup, test data identification/creation, test execution etc.
Share UAT test scenarios of IBM scope.
Milestone
Detailed Test Plan Creation
System Test Case Creation
System Test/SIT execution
UAT Support
IBM Stability Test
Roll Out & Go live phase
Babysit/Stabilisation Period
Planned Start
Date
8-Dec-2014
10-Dec-2014
29-Dec-2014
12-Jan-2015
03-Feb-2015
09-Mar-2015
14-Mar-2015
Planned End
Date
22-Dec-2014
24-Dec-2014
9-Jan-2015
30-Jan-2015
06-Mar-2015
13-Mar-2015
10-Apr-2015
Comment
Page 13
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
System Test/SIT will be performed in stand alone system test environment connected to
FileExpress server to receive source data from different source systems.
VF BICC UAT support will be provided in UAT environment created and maintained by IBM (will
be done based on UAT plan provided by VF BICC).
Tool
Microsoft Excel
Microsoft Excel
Putty, Winscp
sql scripts
Version
Excel-2003
Excel-2003
Putty v 0.60
NA
The build management process must be followed at all times. Promotion of code from the
development environment to the test environment will not be automatic. A process, which includes
the use of configuration management, will be created to manage code promotions. Email notification
will be sent to the test leads before code can be promoted to the test environment.
During System Test, the configuration management team will be restricted from promoting any
changes or defect correction to the test environment without approval from the test manager.
Builds will be delivered with unique names or numbers. Release notes defining the defect fixes
included in the build will be delivered to the test team prior to the installation of each build in to the
test environment.
Environment changes will not be accepted. If there is a need for any of these changes it will need to
be handled via the Project Change control process. Environment changes include changes to the
version of the OS, User access control or network control devices which may impact the interface
testing.
No separate configuration management tool will be used for version controlling of test assets.
Page 14
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
Defect Workflow:
Page 15
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
No
Defect
Accepted?
Yes
Close Defect
Assign Priority
No
Need to fix?
Yes
Defect is deferred
Assign Developer to fix
Verification
failed?
No
Close Defect
Page 16
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
Severe
Minor
Informational
Severity Definition
Catastrophic defect with complete loss of a service. Work cannot reasonably continue,
the operation is mission critical to the business and there is no work around. In general,
a blocking defect would prevent the product from being released or would involve high
cost. E.g. Defect that cause system to crash.
Defect results in severely loss of a service. A work around may exist but its use is
unsatisfactory on the long term.
Defect causes failure of non-critical aspects of the system. There is a reasonably
satisfactory work around.
Defect of minor significance. A work around exists or, if not, the impairment is slight.
E.g. A button is slightly off centre on a data screen.
9.2 Reporting
9.2.1 Test Progress Reporting
The relevant process reports for this test project are:
Test Result Report - This report will describe the status of each system test case with its steps as pass
or failed along with associated defects. This report will be sent to VF within a week of system test
completion. This is applicable only for system testing.
QA Summary Report: This report will contain the summary of test case execution status, % of test
cases executed vs pass/fail, defect summary report, risks and mitigation plan, overall project status. This
will be sent to VF with regular interval of each test phases.
System Test End Report Includes summary of test execution report, summary of test result report,
summary of open defects and is signed off by the IBM project manager stating that IBM is confident (or
not) to proceed to the SIT. The report is delivered to the VF Test Manager before the start of the SIT. This
is the same document QA Summary Report.
.
Page 17
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM
10 TEST DELIVERABLES:
10.1
System test cases will be documented and tracked through excel. Test cases will be maintained as a
separate document.
10.2
Traceability Matrix:
Traceability matrix is to map the test cases with test goals and vice versa. Traceability matrix will be
maintained in QA Summary Report along with test coverage.
10.3
Test result report will be created for system testing only. This report contains a detailed execution status
of each test case along with associated defects. Test result report will be maintained as a separate
document.
10.4
QA Summary Report:
QA Summary Report will contain day to day execution status in each test level. This report includes:
10.5
This is similar to QA Summary Report which will be captured at the end of system test. This report will contain all
the details as mentioned in QA Summary Report along with IBM advice to go/no-go for the next level of testing.
Page 18
Information Security Level 2 - Sensitive
Proprietary and Confidential Information of Vodafone and IBM