You are on page 1of 19

VIETTEL GROUP

VIETTEL NETWORKS CORPORATION


------------o0o-----------

IT TRAINING DOCUMENT
(For Deputy Provincial Director)
First published
------------o0o-----------

Hanoi, April 2020


TABLE OF CONTENTS:
VIETTEL NETWORK INFORMATION TECHNOLOGY SYSTEM .................. 3
I. IT Components ................................................................................................... 3
1. IT Infrastructure ............................................................................................. 3
2. Operation Support System ............................................................................. 3
3. Business Support System ............................................................................... 8
II. Common Concept .............................................................................................. 9
4. Basic concept for IT solution ......................................................................... 9
5. Basic concept for Security ........................................................................... 11
6. Basic concept for Database System and RDBMS ....................................... 16
7. Basic concept for RDBMS logic .................................................................. 18
III. Some key Quality Indicators for IT ................................................................. 18

IT OVERVIEW DOCUMENT

2
VIETTEL NETWORK INFORMATION TECHNOLOGY SYSTEM

I. IT Components
No Terms Cencept/Feature
1. IT Infrastructure
Electronic A type of machine that processes information according to the
1 computers, programs stored in it, is made up of basic elements including:
computers memory, CPU processor, hard drive ...
Personal PC A small computer (in terms of size, processing function,
2
(PC) price) and compatible for each individual.
A computer that is connected to a computer network or the
3 Server
Internet, has a large size and high processing capacity.
Server is the use of virtualization technology to split into
Virtual Private many smaller servers. Virtual servers have the same features
4
Server as a private server, but run resource sharing from the original
physical server.
As a server built on cloud computing technology, combining
from many different physical servers and using the same SAN
5 Cloud Server storage system (Storage Area Networking) with high access
speed helps the server operate. Fast, stable, limit downtime
low level.
AAA Servers perform authentication, authorization, trace and log
6 authentication control functions when users access computer network
server resources.
As a device that stores and processes large amounts of data, it
Storage
7 is made up of combining multiple hard drives - HDDs
Devices
together.
A device that distributes data evenly between two or more
computers (networked) or other resources for optimal use,
8 Load Balancer
maximizing throughput, minimizing response time and
avoiding status Overload.
2. Operation Support System
Concept:
NocPro focuses on monitoring and warning, loading
performance for the entire telecommunications network of
1 NocPro Viettel. Create ticket and workorder to assign jobs and handle
centralized troubleshooting to the ONE.PM system, KPIs
from time to time for optimal service planning and network
planning.
IT OVERVIEW DOCUMENT

3
IT Overview Document

No Terms Cencept/Feature
Target users:
The entire technical force is involved in warning,
performance monitoring, and operating incident handling and
information rescue. Decentralize users according to levels of
Corporation, region, province and district.
Concept:
A gateway for authentication, decentralized centralization of
user interaction with network nodes, management, and
logging of network impact on network nodes that support the
2 Gatepro command line. Link to the ONE.PM system to manage impact
on legal change requests (CR).
Target users:
The entire technical force is tasked with impacting the
network
Concept:
NIMS (Network Infrastructure Management System) is a
software that manages all network infrastructure information
such as peripheral networks (tanks, columns, copper cables,
optical cables, cable cabinets, cable boxes, cuffs, ODF),
stations. , telecommunication and auxiliary equipment in
3 NIMS stations, microwave stations, VSAT stations ... and physical
connections from equipment to equipment / customers based
on digital maps. As a source of database (station list,
equipment ..) input for other software.
Target users:
Technical force at all levels of the Corporation (VTT &
VTNet), region, province and district.
Concept:
GNOC's service quality management helps close the process
from the moment a complaint is turned into an incident until
the process is completed and returns results to users to
Service increase the availability of the system, ensuring ensure the
4 Operation processing is fastest, most accurate, increases customer
Center satisfaction.
Target users:
Customer care staff, Service Problem staff, troubleshooting
staff.

4
IT Overview Document

No Terms Cencept/Feature
Concept:
NCMS (Network Configuration Management System) is a
configuration management software, soft parameter of all
types of telecommunications equipment according to different
vendors and provides a number of tools to check parameters,
5 NCMS
configuration, checklist .. . compared to standard
configuration.
Target users:
Technical force at all levels, VTNet Corporation, region,
province and district.
Concept:
NPMS (Network Performance Management System) is a
software that automatically takes data from servers (OSS,
Network IPMS, ftp server ...), calculates and synthesizes and reports
Performance KPI indicators for all arrays: Transmission, Communication
6
Management Routes, IP, Core Mobile, VAS / IN. Allows storage,
System comparison and evaluation
Target users:
Technical force at all levels of VTNet Corporation, region,
province and district.
Concept:
- It is the software that provides the interface for technical
staff to fully understand information about infrastructure
management (stations, equipment, cable routes, concave
areas, KPIs), information about incidents from NTMS,
technical information. on station properties.
Workforce - Provide the function of regular and irregular assignments,
Management monitoring and evaluation of work for technical staff and
7
System technical team leaders.
- Calculating points, salary calculation for technical staff,
district staff.
- Calculate Viettel points according to the optimal design
criteria, infrastructure development, operation and
information rescue.
Target users:
Technical force in the province and district.
Concept:
Support centralized management of GNOC network
Global
operation, operating levels at the Corporation, region,
Network
province and district. Includes Field Operation, Change
8 Operation
Management, Maintenance Request, Trouble Management
Center GNOC
and Problem Management processes.
(ONE.PM)
Target users:
Technical force at all levels, VTNet Corporation, region,
5
IT Overview Document

No Terms Cencept/Feature
province and district.

Concept:
- It is an application on mobile devices (smartphone, ipad),
providing district technical staff with tools and functions to
perform technical operations, search KPI / database in the
field.
- The main function blocks include: Active monitoring
9 Vsmart (mobile alerts, IP, Transmission, Television), job management
(troubleshooting, fixed service development, task handling
according to GNOC process, routine monitoring of technical
inspection management), KPI lookup, impact handling of
errors, look up resources, utility functions.
Target users:
Technical force at the district level.
Concept:
It is the optimal management system for design operations,
management of concave area management, management of
Optimizing periodic testing plans and addition of stations to ensure
10
Network Tool optimal network quality.
Target users:
Optimal design staff at corporations, regions, provinces and
districts.
Concept:
Database management software for all electromechanical
equipment on the network for monitoring and maintaining
IMES electromechanical items at the station.
11
Target users:
Force for management, exploitation and planning of
electromechanical systems at Corporations, regions, provinces
and districts.
Concept:
Software to monitor the quality (domestic, international
bandwidth, latency, jitter, packet loss, etc.) of wired service.
12 CEM
Target users:
Technical force at all levels, VTNet Corporation, region,
province and district.

6
IT Overview Document

No Terms Cencept/Feature
Concept:
Software to directly affect to network elements from access
to core layer for all domain (IT/Mobile/IP,..).
Automation The software is designed to replace human actions to avoid
13
System risks and improve efficiencies
Target users:
Technical force at all levels, VTNet Corporation, region,
province and district.
Concept:
It is key - platform is designed and developed to digitize all
processes and acitivites of Organization using low-code
14 i-BPMS technology and self service purpose.
Target users:
Technical force at all levels, VTNet Corporation, region,
province and district.
Concept:
It is key – platform is designed to support end-user to search
information or take action without logining into any systems.
15 Chatbot The platform using NLU to chat with end-user
Target users:
Technical force at all levels, VTNet Corporation, region,
province and district.
Concept:
It is platform is designed to training models for dectecting
image in types of: classification, object detection and
annomally detection.
Computer The platform can be intergrated with other system (like:
16
Vision Vsmart) to replace human effort for checking and inspecting
quality and detecting annomally.
Target users:
Technical force at all levels, VTNet Corporation, region,
province and district.
Concept:
Geo Productivity Software is designed for field sales and
service teams. More than simple geo location or route
optimization software, GPS combines geo location services
with Salesforce data so sales professionals can prioritize sales
17 GEO visits and optimize travel between meetings. With GPS, field
sales and services professionals can spend more time selling
face-to-face and less time traveling.
Target users:
Technical force at all levels, VTNet Corporation, region,
province and district.

7
IT Overview Document

No Terms Cencept/Feature
Concept:
Data monitoring allows an organization to proactively
maintain a high, consistent standard of data quality. By
checking data routinely as it is stored within applications,
organizations can avoid the resource-intensive pre-processing
18 Data Mon
of data before it is moved. With data monitoring, data is
quality checked at creation time rather than before a move.
Target users:
Technical force at all levels, VTNet Corporation, region,
province and district.
3. Business Support System
BCCS
(Billing and The system of charging and customer care of Viettel BCCS
1
Customer Care includes 03 modules: BCCS_CM, BCCS_IM, BCCS_CC.
Service)
Customer management module (BCCS Customer
Management) has the following main functions:
- Managing prepaid customers.
2 BCCS_CM - Connecting mobile subscribers, homephone prepaid,
postpaid, fixed services such as PSTN, ADSL ...
- Performing after-sales operations such as changing sims,
changing packages, terminating contracts.
- Division of sales resource management system (BCCS
Inventory Management) has the following main functions:
- Inventory management
3 BCCS_IM
Sales Manager
- Invoice Management
- Active / DeActive scratch card
- The customer care subsystem has the following main
BCCS_CC functions:
4 (BCCS - Search function.
customer care) - Customer information answering function.
- Function of managing and handling complaints
Bankplus is a service system based on mobile devices that
Bankplus/VT allows customers to perform financial transactions: Transfer
5
Pay money, recharge phones, look up transactions, balances, pay
electricity / water bills, Prepaid deposit, postpaid debt tiles.
- General system of postpaid subscription fee (Billing) has the
following main functions:
6 Billing - Summarizing and calculating service fee of the subscriber
to help customers look up hot charges, look up data flow.
- Blocking red alerts, sending warning messages to

8
IT Overview Document

No Terms Cencept/Feature
customers when the limit is about to reach, when the free
data flow D-com runs out.
II. Common Concept
No Terms Concept/Feature
4. Basic concept for IT solution
Connect all resources related to storage in the network
Storage area
1 together. To provide high data connection speed (Gigabit /
networking
sec) between storage devices, and high scalability.
A solution that distributes workload evenly between two
or more computers (networked) or other resources so that
2 Load balancing
resources can be used optimally, maximizing throughput,
reducing response time and Avoid overload.
A solution to copy storage area on main storage device to
backup storage device. If the main storage system fails, the
3 Replication
system will immediately access the copied data on the
backup device to minimize system downtime.
A technology designed to create an intermediary layer
between the computer hardware system and the software
running on it. The idea of server virtualization technology
4 Virtualization is that from a single physical machine can form many
independent virtual machines. Each virtual machine has its
own separate system source settings, operating system, and
applications.

Cloud computing is a catalytic model for ubiquitous,


convenient and on-demand network access to a shared
repository of configurable computing resources (such as
5 Cloud computing
networks, servers, storage, applications, and services), they
can be quickly allocated and launched with minimal effort
to manage or interact with service providers.

A solution in which cloud infrastructure is operated


exclusively for a single organization. It can be hosted or
6 Private Cloud managed by a third party and can be deployed in the
organization's home (on-site) or outsourced to a hosting
company.
A solution in which cloud infrastructure and resources are
7 Public cloud
made available to the public through a public network. A
9
IT Overview Document

No Terms Concept/Feature
public cloud is organized to sell owned cloud services and
serve as a diverse warehouse of customers.
As with private clouds, a community cloud can be
managed by organizations or a third party. However, a
8 Hybric cloud community cloud that serves a set of organizations with
the same security, privacy and compliance concerns rather
than serving a single organization as a private cloud does.
Virtualization (Virtual Destkop Infrastructure - VDI) is a
solution that uses computing resources from servers
combined with virtualization technology to create a system
9 VDI
of workstations, now virtual machines. Users will have
access to the system and are allocated virtual machines for
remote use.
IaaS (Infrastructure as a Service) is Cloud services for
infrastructure such as: Server, Storage, Network, Security.
This infrastructure is available at the service provider
10 IaaS (Service Provider) and users just need to choose the right
configuration (not having to buy equipment, deploy the
system and spend administrative staff). Access to
resources is done via Public IP or VPN.
PaaS is an IaaS-based service model (Server, Storage,
Network, Security, ...) with the addition of OS and
PaaS Middleware components to create a computing
11 (Platform as a environment to help you easily develop and deploy
Services) applications. . With PaaS, software developers or IT
departments of businesses can quickly set up a
programming environment, test applications.
SaaS (Software-as-a-Service) are software services
deployed on Service Provider system, users can access and
use anytime, anywhere by Web-browser. SaaS services
charge on a subscription model, so you only pay a monthly
12 SaaS
fee for the number of accounts used. With the popularity
of mobile devices (Smartphone, Tablet), SaaS model is
becoming more and more popular by the convenience and
efficiency.
Backup is the creation of copies of the original data, stored
in a safe place and taken out to use (restore) when the
13 Backup/Recovery system goes down, the process of recovering the system to
work normally is called recovery

10
IT Overview Document

No Terms Concept/Feature

Recovery or recovery after a disaster is a solution that


prepares facilities, people, and processes so that whenever
DR (Disaster
14 major incidents occur, not only important data is not lost
Recovery)
but also Normal dynamic continues to be maintained as if
no incident occurred.

Anti-duplication is the process of finding and removing


duplicated data stored in different storage spaces (such as
hard disk, memory ...), which can reduce up to 90% of the
15 Deduplication
storage capacity. For example, through anti-duplicate
technology, you can ensure that you only save one copy of
the attachment sent to hundreds of employees.

Compression is a method of encoding digital data, using


an algorithm that eliminates the elements that are deemed
useless on multimedia content in order to reduce capacity
and reduce the bandwidth required to transmit. There are
16 Compression
two basic compression methods: Lossy compression -
some data will be lost when the files are decompressed;
lossless compression - no loss of data when the file is
recovered.

5. Basic concept for Security

- Basic properties of IT Security for an information


system include:
- Confidentiality: Information stored on the system is only
accessible by authorized objects (people, computer
The security
programs ...).
1 attributes of the
- Integrity: Information is only allowed to be modified by
system
licensed subjects and ensures the accuracy of storage or
transmission on the network.
- Availability: Information must be always available for
authorized users to access at any time.

Usually computer network attacks consist of 5 steps:


Step 1:
Steps to attack
Reconnaissance (Reconnaissance)
2 computer
Attacker mainly uses techniques to find relevant
networks
information of the object and prepare to attack. The
information sought in this step is usually about the

11
IT Overview Document

No Terms Concept/Feature
organization of ownership, geographical location, working
partners, living habits of employees ...
Step 2:
Scanning
At this stage, the attacker identifies more detailed
information of the target such as: Server, network
equipment (hostname, IP address, operating system,
running service, TCP / UDP port is open, correct) identify
loopholes, system vulnerabilities of the object). This
information will help the attacker to select the appropriate
technique and attack plan.
Step 3:
Gainning Access (Attempts to gain access)
In this step, the attacker will use the information collected
in Step 2 to identify system vulnerabilities and exploit
these vulnerabilities to gain access to the system.
Step 4:
Maintain Access
Once the system has been hijacked, the acttacker will open
the backdoor to make it easier to access again without
having to exploit the vulnerability again.
Step 5:
Covering Tracks (Delete tracks)
Attacker will remove the attack traces to prevent the
detection of administrators, remove evidence or prevent
legitimate actions to protect the system, which focuses
primarily on log file access, warnings from IDS
(Instruction Detection System) system.
Denial of Service DoS (Denial of Service) is often used to
make attacks on public systems / services on the Internet
Denial of service with the aim of preventing legitimate access from users /
3
attack customers, said Another way is to make the service
provider server unable to meet user / customer usage
requirements.
Social Engineering is a computer network attack method
aimed at deceiving users. Hackers use day-to-day
communication skills to trick users into giving them
Social
4 information or causing them to do certain things that
Engineering
reduce the security level of the system. This technique of
attack depends very much on the dexterity and ability to
lead others of hackers.
Encryption, hash - Encryption (Encryption) is a form of converting and
5 function and hiding information from understandable form to
encode incomprehensible form without means of decoding.
12
IT Overview Document

No Terms Concept/Feature
- Hash function: A form of summarizing information to
detect a difference from the original. A hash function will
accept input data of any length and will produce a string of
characters of a fixed length and unique (MD5, SHA1,
SHA512 ...)
- Encode: A form of re-displaying information from one
signal form to another to suit the storage and transmission.
Encode does not change the information but only the form
of representation.

Malicious software is a type of computer software or


simply a piece of code designed to perform the destruction
6 Malware of the attributes of system security such as: Virus, Worm,
Trojan, Spyware, Adware, Keylogger, Backdoor, Rootkits,
webshells ...

- Physical security requirements for the system include:


- Ensuring the requirements for control, access history,
intrusion detection.
- Monitoring by security camera continuously 24/7.
- Ensure the temperature and humidity of the environment
7 Physical Safety
must be consistent and stable.
- Ensure the power supply must be stable, ready and have
backup.
- Ensuring timely response to natural disasters such as fire,
explosion, etc.

Sniffer is a passive form of attack, where an attacker uses


packet capture programs to listen and analyze packets to
obtain desired information such as username / password.
8 Sniffer
This mode is very effective with non-encrypted
communication protocols such as Telnet, rlogin, http,
snmp, nntp, pop, ftp, imap, ..
- In a regular network, there are many network areas with
different security priorities, at least there are usually 3
regions:
Secure network - Trust zone: Use for user computers.
9
area - Untrust Zone: Use for connections outside the unit and
outside the Internet.
- DMZ area: Use for internal network administration
servers such as AD, File Server, DHCP server.

13
IT Overview Document

No Terms Concept/Feature
Stateful Packet Inspection is a smart packet filtering
technology. Firewalls that use this technology can identify
and monitor the state of a connection by storing
Stateful Packet information about that connection from the time it was
10
Inspection created to the end of a status table. The firewall will then
use this status table to check whether the packets match
the status of the connection, thereby making decisions that
allow the packet to go through or discard.
- IDS (Intrusion Detection System) / IPS (Intrusion
Prevention System) are systems and software that monitor
and detect network attacks as well as acts of illegal
exploitation of network resources. report or prevent this
behavior.
11 IDS/IPS
- IDS / IPS collects data from many different sources and
conducts synthesis and analysis to detect violations based
on standard samples available in the system database.
These analytical samples are usually updated periodically
by each manufacturer.
- VPN is an independent virtual network that uses the
Internet to connect remote sites and users while ensuring
that a private network and access control, VPN connection
VPN models include:
12 (Virtual Private - Remote Access VPN: Allows users from the Internet to
Network) connect and access resources in the local network.
- Site to site VPN: Allows connecting multiple geographic
areas of an organization that are geographically distributed
to each other via the Internet.
- Wireless LAN (WLAN) is a LAN in which
communication devices are connected to each other
through radio waves based on IEEE 802.11 standard. To
secure the WLAN, communication between devices needs
to be encrypted and authenticated. There are the following
main standards:
- Open: WLAN is not authenticated, all devices can
connect to the network and access to resources freely.
13 WLAN Security - WEP: Old WLAN protection standard, using DES
encryption, Preshare Key authentication are simple and
can be easily hacked.
- WPA: Old WLAN protection standard, using TKIP
encryption, Preshare Key authentication or EAP
centralized authentication
- WPA2: New WLAN protection standard, using AES
strong encryption protocol, Preshare Key authentication or
centralized authentication through many methods such as
14
IT Overview Document

No Terms Concept/Feature
RADIUS, TACACS +
AAA server (Authentication, Authorization, Accounting)
is a server that performs the function of authentication,
authorization, trace and log control when users access
14 AAA Server computer network resources. An example of AAA server
is the RADIUS server. The RADIUS server is commonly
used by ISPs to manage customer Internet access, WLAN,
email access or other services.
Logs are messages generated by computer systems,
equipment, and software when an event occurs, giving
details of the content and possibly cause of such event.
Logs often take the form:
- Information: The messages describe the normal operating
events of the system, often used for monitoring.
- Debug: The messages describe the detailed operation of
15 Log the system, often used to check for errors.
- Warning: Describes events that may cause (not stop
working) effects on the system.
- Error: Describe the event about the error that occurred
with the system.
Alert: Describes the events that have just happened to the
system and require human intervention.

- Hardening is a system configuration and optimization


task to increase the security level when hackers attack the
system. The normal hardening of the system follows the
principle of minimum rights, including:
- Minimize the list of logged in users.
- Minimize system services / functions.
16 Hardening - Minimize inbound and outbound connections
- Minimize the rights of users to run applications / services
- Set policies related to all types of accounts
- Decentralize directories and files on the principle of what
they need.
- Install security solutions such as Antivirus, HIDS.
- Configure logging.
- Email security should take into account the following
factors:
- Confidentiality: The content of the email needs to be
encrypted so that only stakeholders can read the content of
17 Email security
the email.
- Integrity (Integrity): Ensure email content must be kept
intact, not modified, fake content.
Email security is done in many ways such as:
15
IT Overview Document

No Terms Concept/Feature
- Electronic signing of email content (digitally signing
with a digital signature).
- Encrypt email content.
- Encryption of transmission line to block spam filtering.

The solution to prevent the risk of loss / disclosure of


important data from being stolen from inside as well as
outside the organization. DLP includes the following basic
features:
- Manage, monitor or encrypt / prevent sending data
DLP
- Log data that users have manipulated, copied and sent.
18 (Data Loss/Leak
- Isolation of data defined as important to a safe area.
Prevention)
- Encrypt data, ensuring that when it is lost, the data
cannot be used.
- Highlight data, ensure detection when users convert to
other types of formats.

Active Directory is a directory service on Microsoft's


Windows Server operating system platform to manage
accounts logged on computers, manage computers, shared
19 Active Directory folders, etc. Active Directory is organized by forest
hierarchy model (is a collection of many trusted domains),
trees (organized from the root, regions and regions /
regions).
Proxy server is a service provider system that acts as an
intermediary between two objects of a connection (client
and server). There is no direct connection between the
client and the server, instead the client will connect to the
20 Proxy
proxy server and send a request to connect to a resource
on the server. The proxy server will handle this request for
both the way back and forth, the data sent from the server
will be forwarded to it by the client.
6. Basic concept for Database System and RDBMS
- Is an organized information set, so that its access,
management and rendering are done easily.
In information technology, based on the approach to
1 Database
organizing data, the database is divided into groups:
- The most common is relational database.
- Easily access in view of the object-oriented database is
16
IT Overview Document

No Terms Concept/Feature
object-oriented database (object-oriented database).
- Most used in the network environment (computer
network) is distributed database.
- A set of data objects organized in table format so that
they can later be accessed and / or exported in different
ways without reorganizing the data tables. .
- Another important feature of relational database is its
Relational
2 scalability. After the database is created, a new data set
database
can be added without having to change the application
program that is operating on it.
- Database users can get different views from a database,
depending on the data export requirements they need.

17
IT Overview Document

No Terms Concept/Feature
- A system of programs, or a software, manages relational
databases. It allows us to create, update, and administer
databases according to the relational model of E. F. Codd.
Most current RDBMS support the use of SQL to access
the database.
Relational
Some characteristics of RDBMS:
database
3 - Allows creating a database with tables (tables), columns
management
(columns), relationships (relationship) and indexes
system – RDBMS
(Index).
- Ensure referential integrity between rows of tables
- Update the Index automatically.
- Allow performing SQL queries to receive data from
different tables in the database.
7. Basic concept for RDBMS logic
A data structure, used to organize data storage for a certain
information topic. It consists of a set of related data
entries, organized in the form of a data matrix, with a
1 Table specified number of columns and rows.
Table is considered as one of the simplest and most
common forms of data storage in relational databases.

Also known as a field (field): Designed to contain data


sets, describing the same specific attribute, of each entity
(record) in the table.
2 Colum
This also means that the data value set contained in a
column must have the same data type.
As can be seen, column is a vertical entity in the table.
A line, also known as a record, is a set of fields in a table.
The data here uniquely identifies a specific entity in a
3 Row
table. As can be seen, row is a horizontal entity in the
table.
A table usually has one or more columns combined, with
the data contained there uniquely identifying each record
in the table. This column, or these columns, is called the
4 Primary Key
primary key of the table and it is responsible for enforcing
the data integrity of the table.
In a table there may be no or only one primary key.
III. Some key Quality Indicators for IT
TT Terms Concept/Features

18
IT Overview Document

TT Terms Concept/Features

The number of customer feedback (NCF) is the number of


customer feedback related to Viettel's error, excluding support
requests, advice, reflection due to customer error:
Quantity
- For telecommunication / mass customer service systems
1 Customer
(systems with a large number of customers):
Complaints
NCF = Total reflection * 1000 / Number of customers.
- For internal / enterprise service system:
NCF = Total reflection * 100 / Number of customers.

The customer influence level (AHKH) is the total level of


The level of customer influence caused by incidents arising on the system
2 customer during the evaluation cycle.
influence AHKH = ∑ (Downtime * Number of customers that actually
affect)
System availability (% of business registration) is the ratio of
time in which the system is ready to provide services to
Availability
3 customers:
of the system
% Business Registration = (Time according to evaluation cycle
- ∑ (Downtime) i) * 100% / Time of evaluation cycle
The percentage of functions meeting the processing speed
The rate of requirements (% PFM) is the ratio between the number of
functional functions meeting the processing speed requirements and the
satisfactory number of functions measuring the processing speed of the
4
on the system.
processing % PFM = number of functions meeting processing speed
speed requirements / number of processing speed measurement
functions
Successful transaction rate (% STR) is the rate of transactions
Successful
determined to be successful on the total number of transactions:
5 transaction
% STR = the number of functions that meet the required trading
rate
rate / number of trading rate measurement functions
Rate of Rate of on-time incidents (% RTI) is the ratio between the
incidents number of incidents solved on time and the total number of
6
rectified on incidents arising in the assessment cycle:
time % RTI = number of issues fixed on time / total incidents

19

You might also like