summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.tex~
diff options
context:
space:
mode:
authorRefik Hadzialic2011-10-09 19:21:23 +0200
committerRefik Hadzialic2011-10-09 19:21:23 +0200
commit3ef4634493e83bd968cea8ad58346e248fe6d06b (patch)
treebcb3dc28dcd6cd88ca312e3e61852b5ea648b94c /notFinishedCode/Report/test.tex~
parentWriting report! (diff)
downloadgsm-selftest-3ef4634493e83bd968cea8ad58346e248fe6d06b.tar.gz
gsm-selftest-3ef4634493e83bd968cea8ad58346e248fe6d06b.tar.xz
gsm-selftest-3ef4634493e83bd968cea8ad58346e248fe6d06b.zip
Removed some errors that latex produced because of special characters!
Diffstat (limited to 'notFinishedCode/Report/test.tex~')
-rw-r--r--notFinishedCode/Report/test.tex~23
1 files changed, 12 insertions, 11 deletions
diff --git a/notFinishedCode/Report/test.tex~ b/notFinishedCode/Report/test.tex~
index dc38a71..9db3763 100644
--- a/notFinishedCode/Report/test.tex~
+++ b/notFinishedCode/Report/test.tex~
@@ -114,7 +114,7 @@ Our first version of the developed program code for controlling the cell phones
to send commands instead of using a state controlled approach to confirm that every command was successfuly received and executed by the cell phone.
It meant we had to make an enormous number of assumptions. In comparison to our second approach, to build a state controlled cell phone control class,
our first approach was inferior and slower. The state controlled method connected two cell phones, on the same base station, up to 15 times faster than timed approach.
-\subsection{Some subsection}
+\subsection{subsection}
\newpage
\section{Hardware design}
In our team project we had the option to choose all the required hardware ourself beside the two BeagleBoards, which we were supplied by Konrad and Dennis.
@@ -153,37 +153,38 @@ At the start we did not have a cable supplied for the Siemens S55 phone. We cont
\subsection{Hanlder side}
\begin{figure}[ht!]
\centering
- \includegraphics[width=140mm]{protocolCommunicationHandler.png}
+ \includegraphics[width=130mm]{protocolCommunicationHandler.png}
\caption[]{Flowchart of the protocol, on the handler side}
\end{figure}
\begin{figure}[ht!]
\centering
- \includegraphics[width=140mm]{protocolCommunicationcControllerReceiver.png}
+ \includegraphics[width=130mm]{protocolCommunicationcControllerReceiver.png}
\caption[]{Flowchart of the protocol, on the controller side for the caller}
\end{figure}
\begin{figure}[ht!]
\centering
- \includegraphics[width=140mm]{protocolCommunicationcControllerCaller.png}
+ \includegraphics[width=130mm]{protocolCommunicationcControllerCaller.png}
\caption[]{Flowchart of the protocol, on the controller side for the receiver}
\end{figure}
\subsection{Verification of the protocol}
The verification results are listed here:
\begin{lstlisting}
-(Spin Version 6.1.0 -- 2 May 2011)
- + Partial Order Reduction
+(Spin Version 6.1.0 -- 2 May 2011) + Partial Order Reduction
Full statespace search for:
never claim - (none specified)
assertion violations +
- cycle checks - (disabled by -DSAFETY)
- invalid end states +
-State-vector 44 byte, depth reached 65, ••• errors: 0 •••
+ cycle checks - (disabled by -DSAFETY)
+ invalid end states +
+
+State-vector 44 byte, depth reached 65, errors: 0
40 states, stored
3 states, matched
- 43 transitions (= stored+matched)
+ 43 transitions ( stored+matched)
90 atomic steps
+
hash conflicts: 0 (resolved)
2.195 memory usage (Mbyte)
unreached in proctype Server1
@@ -197,7 +198,7 @@ pan: elapsed time 0 seconds
\clearpage
-
+\newpage
\section{Security and safety of the system}