Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Test scenario under consideration  
        6.1     Roles, entities and action or /event flow          
        6.2     Test parameterization and neutral starting state          
        6.3     Re-initialization after unsuccessful transactions            
        6.4     Disappearing money 
        6.5     Automation of tests  
 7     Transaction model and digital financial service key performance indicators  
 8     Creating the use case model from actual use case examples
 9     Data sources            
10     Special procedures in the field        
       10.1     Operational protocol if party A and B do not communicate directly     
11     Testing modes       
       11.1     Basics             
       11.2     Synchronized and asynchronous testing mode             
       11.3     Dual-function set-up and operation  
12      Recording events of DFS test cases              
       12.1     Basic functionality    
       12.2     Practical application 
13     Measurements in the background 
14     General considerations about errors in measurements        
15      Data validation and processing      
       15.1     Overview     
       15.2     Plausibility and validity checks             
       15.3     Data processing         
       15.4     Time profile 
16     Background testing of mobile networks      
Appendix I – Working example for creation of a use case model from actual implementations    
Appendix II – Best-practice example of data structures and procedures used in DFS testing campaigns    
       II.1     Basic considerations for data collection and processing              
       II.2     Additional considerations for cross-border and inter-network testing  
       II.3     Data structure overview           
       II.4     Naming and formatting conventions   
       II.5     Naming and formatting conventions for data objects   
       II.6     Local log sheets           
       II.7     Team assignment list  
       II.8     Device assignment list
Appendix III – Best-practice examples for background testing of mobile networks    
Bibliography