Dynamics
System test report form $Revision: 1.6 $ State approved
Date 05-Dec-1998 Author Kimmo Mustonen
Review date 08-Dec-1998 Reviewed by Jouni Malinen
Approval date 09-Dec-1998 Approved by Jouni Malinen
$Id: test_form_system.html,v 1.6 1998/12/09 14:59:45 jkmaline Exp $


The following system test report form consists of test cases that are created based on the requirements specification and the functional definition.


Test result codes:
S = Successful
I = Improvements required
F = Failed
N = Not implemented (yet)

Date {date}
Tester {tester}
ID
Test case
Result
Comments
S01
Can mobile user attach to the home network?
S02
Can mobile user connect to the foreign network?
S03
Does the Keep Alive protocol keep the tunnel open?
S04
Is the Mobile Node able to move to a new Access Point?
S05
Can the corresponding nodes connect to the Mobile Node at home?
S06
Can the corresponding nodes connect to the Mobile Node in a foreign network?
S07
Can the connection be maintained even though the Mobile Node is moving?
S08
Is tunneling hierarchical?
S09
Update only those elements that need to be updated?
S10
Length of the tunnel restricted by the system architecture?
S11
Dynamic tunnel configuration information updates?
S12
Is further development and inter operability supported?
S13
Is the IP-protocol version 4?
S14
Is the mobility transparent to an external observer?
S15
Is the product good enough for further development?
S16
Are the important documents and the code reviewed?
S17
Is CVS version control used?
S18
Is the functionality transparent to the mobile user?
S19
Do the lowest foreign agents use broadcasting to advertise availability.
S20
Does the mobile node select the lowest foreign agent?
S21
Do the home elements handle several concurrent users?
S22
Is the product maturity level a working prototype?
S23
Does the software have an installation mechanism?
S24
Is the platform Linux?
S25
Is the Tunneling possible with minimum firewall openings?
S26
Are mobility management information updates secure?
S27
Does the system support logging?
S28
Is resource allocation optimized?
S29
Is the mobility management security design modular?
S30
Is each piece of the software configurable?
S31
Are there monitoring tools for the software?
S32
Is there a programming API for the software?
S33
Is the software performing well enough (i.e. not a clear bottleneck)?
S34
Is communication with the customer continuous?
S35
Is the portability taken into account?
S36
Is the code written according to Linux kernel programming guidelines?
S37
Are there multiple modes for tunneling?
General comments {Comments}