summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.toc
diff options
context:
space:
mode:
authorRefik Hadzialic2011-10-20 16:41:22 +0200
committerRefik Hadzialic2011-10-20 16:41:22 +0200
commit5c080b0ec7274e26027f80f8a8ca01d0b219bd79 (patch)
treead6f9b521677127b839f9255642a6068c409d4f4 /notFinishedCode/Report/test.toc
parentReport writing (diff)
downloadgsm-selftest-5c080b0ec7274e26027f80f8a8ca01d0b219bd79.tar.gz
gsm-selftest-5c080b0ec7274e26027f80f8a8ca01d0b219bd79.tar.xz
gsm-selftest-5c080b0ec7274e26027f80f8a8ca01d0b219bd79.zip
Requirements writing!
Diffstat (limited to 'notFinishedCode/Report/test.toc')
-rw-r--r--notFinishedCode/Report/test.toc52
1 files changed, 26 insertions, 26 deletions
diff --git a/notFinishedCode/Report/test.toc b/notFinishedCode/Report/test.toc
index 4288295..979ce92 100644
--- a/notFinishedCode/Report/test.toc
+++ b/notFinishedCode/Report/test.toc
@@ -1,29 +1,29 @@
\select@language {english}
\contentsline {section}{\numberline {1}Introduction and Motivation}{3}
\contentsline {section}{\numberline {2}Requirements}{4}
-\contentsline {section}{\numberline {3}Database design}{5}
-\contentsline {section}{\numberline {4}Software design}{6}
-\contentsline {subsection}{\numberline {4.1}Database access}{6}
-\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{6}
-\contentsline {subsection}{\numberline {4.3}Client and Server class}{7}
-\contentsline {subsection}{\numberline {4.4}Ping class}{9}
-\contentsline {subsection}{\numberline {4.5}Data logging}{9}
-\contentsline {subsection}{\numberline {4.6}SSH Class}{9}
-\contentsline {section}{\numberline {5}Hardware design}{10}
-\contentsline {subsection}{\numberline {5.1}BeagleBoard}{10}
-\contentsline {subsection}{\numberline {5.2}Cell phones}{11}
-\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{11}
-\contentsline {subsection}{\numberline {5.4}Server}{11}
-\contentsline {section}{\numberline {6}Communication protocol}{12}
-\contentsline {subsection}{\numberline {6.1}Hanlder side}{12}
-\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{13}
-\contentsline {section}{\numberline {7}Security and safety of the system}{14}
-\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{14}
-\contentsline {subsection}{\numberline {7.2}Security on the web site}{15}
-\contentsline {section}{\numberline {8}Web page}{19}
-\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{19}
-\contentsline {subsection}{\numberline {8.2}Results on the web page}{19}
-\contentsline {section}{\numberline {9}How to use and start the system}{21}
-\contentsline {subsection}{\numberline {9.1}Required libraries}{21}
-\contentsline {subsection}{\numberline {9.2}Configuring hardware}{21}
-\contentsline {section}{\numberline {10}Conclusion}{22}
+\contentsline {section}{\numberline {3}Database design}{6}
+\contentsline {section}{\numberline {4}Software design}{7}
+\contentsline {subsection}{\numberline {4.1}Database access}{7}
+\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{7}
+\contentsline {subsection}{\numberline {4.3}Client and Server class}{8}
+\contentsline {subsection}{\numberline {4.4}Ping class}{10}
+\contentsline {subsection}{\numberline {4.5}Data logging}{10}
+\contentsline {subsection}{\numberline {4.6}SSH Class}{10}
+\contentsline {section}{\numberline {5}Hardware design}{11}
+\contentsline {subsection}{\numberline {5.1}BeagleBoard}{11}
+\contentsline {subsection}{\numberline {5.2}Cell phones}{12}
+\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{12}
+\contentsline {subsection}{\numberline {5.4}Server}{12}
+\contentsline {section}{\numberline {6}Communication protocol}{13}
+\contentsline {subsection}{\numberline {6.1}Hanlder side}{13}
+\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{14}
+\contentsline {section}{\numberline {7}Security and safety of the system}{15}
+\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{15}
+\contentsline {subsection}{\numberline {7.2}Security on the web site}{16}
+\contentsline {section}{\numberline {8}Web page}{20}
+\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{20}
+\contentsline {subsection}{\numberline {8.2}Results on the web page}{20}
+\contentsline {section}{\numberline {9}How to use and start the system}{22}
+\contentsline {subsection}{\numberline {9.1}Required libraries}{22}
+\contentsline {subsection}{\numberline {9.2}Configuring hardware}{22}
+\contentsline {section}{\numberline {10}Conclusion}{23}