summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.toc
diff options
context:
space:
mode:
authorRefik Hadzialic2011-10-21 13:49:58 +0200
committerRefik Hadzialic2011-10-21 13:49:58 +0200
commit611f7afafbe200b7ed75b40c7a6eb004dd7f28ee (patch)
tree771fe679b8c6f23fe4fdc9a4ad143ed2bdd18511 /notFinishedCode/Report/test.toc
parentReport writing! (diff)
downloadgsm-selftest-611f7afafbe200b7ed75b40c7a6eb004dd7f28ee.tar.gz
gsm-selftest-611f7afafbe200b7ed75b40c7a6eb004dd7f28ee.tar.xz
gsm-selftest-611f7afafbe200b7ed75b40c7a6eb004dd7f28ee.zip
Report writing!
Diffstat (limited to 'notFinishedCode/Report/test.toc')
-rw-r--r--notFinishedCode/Report/test.toc54
1 files changed, 27 insertions, 27 deletions
diff --git a/notFinishedCode/Report/test.toc b/notFinishedCode/Report/test.toc
index af429f9..38b1ed2 100644
--- a/notFinishedCode/Report/test.toc
+++ b/notFinishedCode/Report/test.toc
@@ -3,30 +3,30 @@
\contentsline {section}{\numberline {2}Requirements}{4}
\contentsline {subsection}{\numberline {2.1}Logical and algorithmic requirements}{4}
\contentsline {subsection}{\numberline {2.2}Software requirements}{5}
-\contentsline {subsection}{\numberline {2.3}Hardware requirements}{6}
-\contentsline {section}{\numberline {3}Database design}{7}
-\contentsline {section}{\numberline {4}Software design}{8}
-\contentsline {subsection}{\numberline {4.1}Database access}{8}
-\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{8}
-\contentsline {subsection}{\numberline {4.3}Client and Server class}{9}
-\contentsline {subsection}{\numberline {4.4}Ping class}{10}
-\contentsline {subsection}{\numberline {4.5}Data logging}{11}
-\contentsline {subsection}{\numberline {4.6}SSH Class}{11}
-\contentsline {section}{\numberline {5}Hardware design}{12}
-\contentsline {subsection}{\numberline {5.1}BeagleBoard}{12}
-\contentsline {subsection}{\numberline {5.2}Cell phones}{13}
-\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{13}
-\contentsline {subsection}{\numberline {5.4}Server}{13}
-\contentsline {section}{\numberline {6}Communication protocol}{14}
-\contentsline {subsection}{\numberline {6.1}Handler side}{14}
-\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{15}
-\contentsline {section}{\numberline {7}Security and safety of the system}{16}
-\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{16}
-\contentsline {subsection}{\numberline {7.2}Security on the web site}{17}
-\contentsline {section}{\numberline {8}Web page}{21}
-\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{21}
-\contentsline {subsection}{\numberline {8.2}Results on the web page}{21}
-\contentsline {section}{\numberline {9}How to use and start the system}{23}
-\contentsline {subsection}{\numberline {9.1}Required libraries}{23}
-\contentsline {subsection}{\numberline {9.2}Configuring hardware}{23}
-\contentsline {section}{\numberline {10}Conclusion}{24}
+\contentsline {subsection}{\numberline {2.3}Hardware requirements}{7}
+\contentsline {section}{\numberline {3}Database design}{8}
+\contentsline {section}{\numberline {4}Software design}{9}
+\contentsline {subsection}{\numberline {4.1}Database access}{10}
+\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{10}
+\contentsline {subsection}{\numberline {4.3}Client and Server class}{11}
+\contentsline {subsection}{\numberline {4.4}Ping class}{12}
+\contentsline {subsection}{\numberline {4.5}Data logging}{13}
+\contentsline {subsection}{\numberline {4.6}SSH Class}{13}
+\contentsline {section}{\numberline {5}Hardware design}{14}
+\contentsline {subsection}{\numberline {5.1}BeagleBoard}{14}
+\contentsline {subsection}{\numberline {5.2}Cell phones}{15}
+\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{15}
+\contentsline {subsection}{\numberline {5.4}Server}{15}
+\contentsline {section}{\numberline {6}Communication protocol}{16}
+\contentsline {subsection}{\numberline {6.1}Handler side}{16}
+\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{17}
+\contentsline {section}{\numberline {7}Security and safety of the system}{18}
+\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{18}
+\contentsline {subsection}{\numberline {7.2}Security on the web site}{19}
+\contentsline {section}{\numberline {8}Web page}{23}
+\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{23}
+\contentsline {subsection}{\numberline {8.2}Results on the web page}{23}
+\contentsline {section}{\numberline {9}How to use and start the system}{25}
+\contentsline {subsection}{\numberline {9.1}Required libraries}{25}
+\contentsline {subsection}{\numberline {9.2}Configuring hardware}{25}
+\contentsline {section}{\numberline {10}Conclusion}{26}