summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.toc
diff options
context:
space:
mode:
authorRefik Hadzialic2011-10-21 12:22:08 +0200
committerRefik Hadzialic2011-10-21 12:22:08 +0200
commitdabe9300fb780c7feb21e56c3cd3ba0fd4bd5f5a (patch)
treef0763e69166effcfacacdd3bdf7146510a802dec /notFinishedCode/Report/test.toc
parentMerge branch 'master' of lab.ks.uni-freiburg.de:lsfks/projekte/gsm-selftest (diff)
downloadgsm-selftest-dabe9300fb780c7feb21e56c3cd3ba0fd4bd5f5a.tar.gz
gsm-selftest-dabe9300fb780c7feb21e56c3cd3ba0fd4bd5f5a.tar.xz
gsm-selftest-dabe9300fb780c7feb21e56c3cd3ba0fd4bd5f5a.zip
Report writing!
Diffstat (limited to 'notFinishedCode/Report/test.toc')
-rw-r--r--notFinishedCode/Report/test.toc55
1 files changed, 29 insertions, 26 deletions
diff --git a/notFinishedCode/Report/test.toc b/notFinishedCode/Report/test.toc
index 2afe324..6764041 100644
--- a/notFinishedCode/Report/test.toc
+++ b/notFinishedCode/Report/test.toc
@@ -1,29 +1,32 @@
\select@language {english}
\contentsline {section}{\numberline {1}Introduction and Motivation}{3}
\contentsline {section}{\numberline {2}Requirements}{4}
-\contentsline {section}{\numberline {3}Database design}{6}
-\contentsline {section}{\numberline {4}Software design}{7}
-\contentsline {subsection}{\numberline {4.1}Database access}{7}
-\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{7}
-\contentsline {subsection}{\numberline {4.3}Client and Server class}{8}
-\contentsline {subsection}{\numberline {4.4}Ping class}{10}
-\contentsline {subsection}{\numberline {4.5}Data logging}{10}
-\contentsline {subsection}{\numberline {4.6}SSH Class}{10}
-\contentsline {section}{\numberline {5}Hardware design}{11}
-\contentsline {subsection}{\numberline {5.1}BeagleBoard}{11}
-\contentsline {subsection}{\numberline {5.2}Cell phones}{12}
-\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{12}
-\contentsline {subsection}{\numberline {5.4}Server}{12}
-\contentsline {section}{\numberline {6}Communication protocol}{13}
-\contentsline {subsection}{\numberline {6.1}Handler side}{13}
-\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{14}
-\contentsline {section}{\numberline {7}Security and safety of the system}{15}
-\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{15}
-\contentsline {subsection}{\numberline {7.2}Security on the web site}{16}
-\contentsline {section}{\numberline {8}Web page}{20}
-\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{20}
-\contentsline {subsection}{\numberline {8.2}Results on the web page}{20}
-\contentsline {section}{\numberline {9}How to use and start the system}{22}
-\contentsline {subsection}{\numberline {9.1}Required libraries}{22}
-\contentsline {subsection}{\numberline {9.2}Configuring hardware}{22}
-\contentsline {section}{\numberline {10}Conclusion}{23}
+\contentsline {subsection}{\numberline {2.1}Logical and algorithmic requirements}{4}
+\contentsline {subsection}{\numberline {2.2}Software requirements}{5}
+\contentsline {subsection}{\numberline {2.3}Hardware requirements}{6}
+\contentsline {section}{\numberline {3}Database design}{7}
+\contentsline {section}{\numberline {4}Software design}{8}
+\contentsline {subsection}{\numberline {4.1}Database access}{8}
+\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{8}
+\contentsline {subsection}{\numberline {4.3}Client and Server class}{9}
+\contentsline {subsection}{\numberline {4.4}Ping class}{11}
+\contentsline {subsection}{\numberline {4.5}Data logging}{11}
+\contentsline {subsection}{\numberline {4.6}SSH Class}{11}
+\contentsline {section}{\numberline {5}Hardware design}{12}
+\contentsline {subsection}{\numberline {5.1}BeagleBoard}{12}
+\contentsline {subsection}{\numberline {5.2}Cell phones}{13}
+\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{13}
+\contentsline {subsection}{\numberline {5.4}Server}{13}
+\contentsline {section}{\numberline {6}Communication protocol}{14}
+\contentsline {subsection}{\numberline {6.1}Handler side}{14}
+\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{15}
+\contentsline {section}{\numberline {7}Security and safety of the system}{16}
+\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{16}
+\contentsline {subsection}{\numberline {7.2}Security on the web site}{17}
+\contentsline {section}{\numberline {8}Web page}{21}
+\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{21}
+\contentsline {subsection}{\numberline {8.2}Results on the web page}{21}
+\contentsline {section}{\numberline {9}How to use and start the system}{23}
+\contentsline {subsection}{\numberline {9.1}Required libraries}{23}
+\contentsline {subsection}{\numberline {9.2}Configuring hardware}{23}
+\contentsline {section}{\numberline {10}Conclusion}{24}