summaryrefslogtreecommitdiffstats
path: root/notFinishedCode
diff options
context:
space:
mode:
authorRefik Hadzialic2011-10-12 19:52:54 +0200
committerRefik Hadzialic2011-10-12 19:52:54 +0200
commitad726f3ea99754c7a85009ce127e0e15a0a57bc2 (patch)
tree2febedf68120472f4e68397d9ebcce748db5d8aa /notFinishedCode
parentReport writing (diff)
downloadgsm-selftest-ad726f3ea99754c7a85009ce127e0e15a0a57bc2.tar.gz
gsm-selftest-ad726f3ea99754c7a85009ce127e0e15a0a57bc2.tar.xz
gsm-selftest-ad726f3ea99754c7a85009ce127e0e15a0a57bc2.zip
Report working!
Diffstat (limited to 'notFinishedCode')
-rw-r--r--notFinishedCode/Report/test.aux47
-rw-r--r--notFinishedCode/Report/test.log54
-rw-r--r--notFinishedCode/Report/test.pdfbin704223 -> 706528 bytes
-rw-r--r--notFinishedCode/Report/test.tex8
-rw-r--r--notFinishedCode/Report/test.tex~11
-rw-r--r--notFinishedCode/Report/test.toc32
6 files changed, 81 insertions, 71 deletions
diff --git a/notFinishedCode/Report/test.aux b/notFinishedCode/Report/test.aux
index f21fd70..8fd67f1 100644
--- a/notFinishedCode/Report/test.aux
+++ b/notFinishedCode/Report/test.aux
@@ -14,39 +14,42 @@
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces }}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{6}}
\citation{socket}
+\citation{wiki}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces }}{7}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Client and Server model}{7}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Client and Server class}{7}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces }}{8}}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces }}{8}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Ping class}{9}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}Data logging}{9}}
\citation{beagleDataSheet}
-\@writefile{toc}{\contentsline {section}{\numberline {5}Hardware design}{9}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}BeagleBoard}{9}}
-\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces }}{9}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Cell phones}{10}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{10}}
+\@writefile{toc}{\contentsline {section}{\numberline {5}Hardware design}{10}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}BeagleBoard}{10}}
+\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces }}{10}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Cell phones}{11}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{11}}
\citation{spin}
\citation{spin}
\citation{wiki}
-\@writefile{toc}{\contentsline {section}{\numberline {6}Communication protocol}{11}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Hanlder side}{11}}
-\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces }}{11}}
-\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces }}{11}}
-\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces }}{11}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{12}}
+\@writefile{toc}{\contentsline {section}{\numberline {6}Communication protocol}{12}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Hanlder side}{12}}
+\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces }}{12}}
+\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces }}{12}}
+\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces }}{12}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{13}}
\citation{sshTunnel}
-\@writefile{toc}{\contentsline {section}{\numberline {7}Security and safety of the system}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{13}}
-\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces }}{13}}
+\@writefile{toc}{\contentsline {section}{\numberline {7}Security and safety of the system}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{14}}
+\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces }}{14}}
\citation{https}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}Security on the web site}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}Security on the web site}{15}}
\citation{https}
\citation{https}
-\@writefile{toc}{\contentsline {section}{\numberline {8}Web page}{18}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{18}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {8.2}Results on the web page}{18}}
+\@writefile{toc}{\contentsline {section}{\numberline {8}Web page}{19}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{19}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {8.2}Results on the web page}{19}}
\citation{pChart}
-\@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces }}{19}}
-\@writefile{toc}{\contentsline {section}{\numberline {9}Conclusion}{20}}
+\@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces }}{20}}
+\@writefile{toc}{\contentsline {section}{\numberline {9}Conclusion}{21}}
\bibcite{mysqlManual}{1}
\bibcite{wiki}{2}
\bibcite{socket}{3}
@@ -55,4 +58,4 @@
\bibcite{https}{6}
\bibcite{pChart}{7}
\bibcite{beagleDataSheet}{8}
-\newlabel{LastPage}{{}{21}}
+\newlabel{LastPage}{{}{22}}
diff --git a/notFinishedCode/Report/test.log b/notFinishedCode/Report/test.log
index 636b0b7..bb9f19c 100644
--- a/notFinishedCode/Report/test.log
+++ b/notFinishedCode/Report/test.log
@@ -1,4 +1,4 @@
-This is pdfTeX, Version 3.1415926-1.40.10 (TeX Live 2009/Debian) (format=pdflatex 2011.9.27) 12 OCT 2011 19:42
+This is pdfTeX, Version 3.1415926-1.40.10 (TeX Live 2009/Debian) (format=pdflatex 2011.9.27) 12 OCT 2011 19:51
entering extended mode
%&-line parsing enabled.
**test.tex
@@ -281,19 +281,19 @@ LaTeX Font Info: External font `cmex10' loaded for size
(Font) <10.95> on input line 6.
Class scrartcl Info: You've told me to use the font selection of the element
(scrartcl) `sectioning' that is an alias of element `disposition'
-(scrartcl) on input line 9.
+(scrartcl) on input line 11.
Class scrartcl Info: You've told me to use the font selection of the element
(scrartcl) `sectioning' that is an alias of element `disposition'
-(scrartcl) on input line 13.
+(scrartcl) on input line 15.
Class scrartcl Info: You've told me to use the font selection of the element
(scrartcl) `sectioning' that is an alias of element `disposition'
-(scrartcl) on input line 16.
+(scrartcl) on input line 18.
Class scrartcl Info: You've told me to use the font selection of the element
(scrartcl) `sectioning' that is an alias of element `disposition'
-(scrartcl) on input line 19.
+(scrartcl) on input line 21.
Class scrartcl Info: You've told me to use the font selection of the element
(scrartcl) `sectioning' that is an alias of element `disposition'
-(scrartcl) on input line 22.
+(scrartcl) on input line 24.
)
\tf@toc=\write4
\openout4 = `test.toc'.
@@ -322,55 +322,55 @@ File: serverClass.png Graphic file (type png)
File: ClientClass.png Graphic file (type png)
<use ClientClass.png>
[7 <./serialPort.png (PNG copy)>] [8 <./serverClass.png (PNG copy)> <./ClientCl
-ass.png (PNG copy)>] <bb.jpg, id=43, 521.95pt x 516.93124pt>
+ass.png (PNG copy)>] [9] <bb.jpg, id=46, 521.95pt x 516.93124pt>
File: bb.jpg Graphic file (type jpg)
<use bb.jpg>
-[9
+[10
- <./bb.jpg>] [10]
-<protocolCommunicationHandler.png, id=51, 2486.93823pt x 792.13588pt>
+ <./bb.jpg>] [11]
+<protocolCommunicationHandler.png, id=54, 2486.93823pt x 792.13588pt>
File: protocolCommunicationHandler.png Graphic file (type png)
<use protocolCommunicationHandler.png>
-<protocolCommunicationcControllerReceiver.png, id=52, 1808.16705pt x 766.62883p
+<protocolCommunicationcControllerReceiver.png, id=55, 1808.16705pt x 766.62883p
t>
File: protocolCommunicationcControllerReceiver.png Graphic file (type png)
<use protocolCommunicationcControllerReceiver.png>
-<protocolCommunicationcControllerCaller.png, id=53, 1808.16705pt x 766.62883pt>
+<protocolCommunicationcControllerCaller.png, id=56, 1808.16705pt x 766.62883pt>
File: protocolCommunicationcControllerCaller.png Graphic file (type png)
-<use protocolCommunicationcControllerCaller.png> [11
+<use protocolCommunicationcControllerCaller.png> [12
<./protocolCommunicationHandler.png (PNG copy)> <./protocolCommunicationcContr
ollerReceiver.png (PNG copy)> <./protocolCommunicationcControllerCaller.png (PN
-G copy)>] [12]
-<sshTunnel.png, id=61, 696.6025pt x 152.57pt>
+G copy)>] [13]
+<sshTunnel.png, id=65, 696.6025pt x 152.57pt>
File: sshTunnel.png Graphic file (type png)
- <use sshTunnel.png> [13
+ <use sshTunnel.png> [14
- <./sshTunnel.png (PNG copy)>] [14] [15]
-LaTeX Font Info: Try loading font information for OMS+cmr on input line 399.
+ <./sshTunnel.png (PNG copy)>] [15] [16]
+LaTeX Font Info: Try loading font information for OMS+cmr on input line 401.
(/usr/share/texmf-texlive/tex/latex/base/omscmr.fd
File: omscmr.fd 1999/05/25 v2.5h Standard LaTeX font definitions
)
LaTeX Font Info: Font shape `OMS/cmr/m/n' in size <9> not available
-(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 399.
- [16] [17] [18]
+(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 401.
+ [17] [18] [19]
LaTeX Font Info: Font shape `OMS/cmr/m/n' in size <12> not available
-(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 471.
+(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 473.
-<resultsImage.png, id=81, 702.625pt x 431.6125pt>
+<resultsImage.png, id=85, 702.625pt x 431.6125pt>
File: resultsImage.png Graphic file (type png)
<use resultsImage.png>
-[19 <./resultsImage.png (PNG copy)>] [20]
-LaTeX Font Info: Try loading font information for T1+cmtt on input line 495.
+[20 <./resultsImage.png (PNG copy)>] [21]
+LaTeX Font Info: Try loading font information for T1+cmtt on input line 497.
(/usr/share/texmf-texlive/tex/latex/base/t1cmtt.fd
File: t1cmtt.fd 1999/05/25 v2.5h Standard LaTeX font definitions
)
-AED: lastpage setting LastPage [21] (./test.aux) )
+AED: lastpage setting LastPage [22] (./test.aux) )
Here is how much of TeX's memory you used:
4908 strings out of 495061
67951 string characters out of 1182621
@@ -393,9 +393,9 @@ ur/jknappen/ec/ecsx1440.600pk> </home/refik/.texmf-var/fonts/pk/ljfour/jknappen
sr/share/texmf-texlive/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/te
xmf-texlive/fonts/type1/public/amsfonts/cm/cmsy10.pfb></usr/share/texmf-texlive
/fonts/type1/public/amsfonts/cm/cmsy9.pfb>
-Output written on test.pdf (21 pages, 704223 bytes).
+Output written on test.pdf (22 pages, 706528 bytes).
PDF statistics:
- 637 PDF objects out of 1000 (max. 8388607)
+ 644 PDF objects out of 1000 (max. 8388607)
0 named destinations out of 1000 (max. 500000)
56 words of extra memory for PDF output out of 10000 (max. 10000000)
diff --git a/notFinishedCode/Report/test.pdf b/notFinishedCode/Report/test.pdf
index e4e739e..cadd52e 100644
--- a/notFinishedCode/Report/test.pdf
+++ b/notFinishedCode/Report/test.pdf
Binary files differ
diff --git a/notFinishedCode/Report/test.tex b/notFinishedCode/Report/test.tex
index 3b67df0..dd25b8a 100644
--- a/notFinishedCode/Report/test.tex
+++ b/notFinishedCode/Report/test.tex
@@ -130,7 +130,7 @@ our first approach was inferior and slower. The state controlled method connecte
One can easyly apply the class just by correctly defining the parameters: port address, baud rate and timeout. The former two are self-explanatory and the timeout parameter is used to define when the alarm function should raise a timeout exception.
A timeout exception gets raised when the cell phone does not respond (i.e. when the cell phone enters a deadlock or delayed state.) We had used the serial port library inside of Python although we use USB cables to connect to our cell phones. One should
be aware that our USB cables create a virtual serial port. More details on class design and an example can be found on our project wiki \cite{wiki}.
-\subsection{Client and Server model}
+\subsection{Client and Server class}
Our socket communication code is based on the example given in the Python socket manual \cite{socket}.
We extended it into two classes, a client and a server class. We had used the TCP protocol to base our two classes on\footnote{TCP is reliable compared to UDP (i.e. transmitted packets get also delivered),
packets are ordered when received and data are received in a stream (i.e. multiple packets can be read at once.)}.
@@ -153,8 +153,10 @@ The client class can be seen in the following figure. To initialize the client o
\includegraphics[scale=0.5]{ClientClass.png}
\caption[]{Client class, used by the client application}
\end{figure}
-
-
+Once an instance of it is created and loaded with the IP address and the port, one needs to call the \emph{connect()} method.
+The method will produce an integer based on its connection state. Output information and the programming code can be found on our project wiki page \cite{wiki}.
+\subsection{Ping class}
+\subsection{Data logging}
\clearpage
\section{Hardware design}
In our team project we had the option to choose all the required hardware ourself beside the two BeagleBoards, which we were supplied by Konrad and Dennis.
diff --git a/notFinishedCode/Report/test.tex~ b/notFinishedCode/Report/test.tex~
index 5ea3264..dd25b8a 100644
--- a/notFinishedCode/Report/test.tex~
+++ b/notFinishedCode/Report/test.tex~
@@ -130,7 +130,7 @@ our first approach was inferior and slower. The state controlled method connecte
One can easyly apply the class just by correctly defining the parameters: port address, baud rate and timeout. The former two are self-explanatory and the timeout parameter is used to define when the alarm function should raise a timeout exception.
A timeout exception gets raised when the cell phone does not respond (i.e. when the cell phone enters a deadlock or delayed state.) We had used the serial port library inside of Python although we use USB cables to connect to our cell phones. One should
be aware that our USB cables create a virtual serial port. More details on class design and an example can be found on our project wiki \cite{wiki}.
-\subsection{Client and Server model}
+\subsection{Client and Server class}
Our socket communication code is based on the example given in the Python socket manual \cite{socket}.
We extended it into two classes, a client and a server class. We had used the TCP protocol to base our two classes on\footnote{TCP is reliable compared to UDP (i.e. transmitted packets get also delivered),
packets are ordered when received and data are received in a stream (i.e. multiple packets can be read at once.)}.
@@ -146,14 +146,17 @@ Before solving the problem without using the socket parameter, we had another so
\includegraphics[scale=0.8]{serverClass.png}
\caption[]{Server class, used by the server application}
\end{figure}
-In the process of testing the client class we did not have any major problems. The only major flow we had to debug was when one of the sides disconnects that we get out of the waiting loop if the timeout variable was set to \emph{0} (i.e. infinite waiting loop.) The client class can be seen in the following figure.
+In the process of testing the client class we did not have any major problems. The only major flow we had to debug was when one of the sides disconnects that we get out of the waiting loop if the timeout variable was set to \emph{0} (i.e. infinite waiting loop.)
+The client class can be seen in the following figure. To initialize the client object one needs to define the IP address and the port of the server application listening on it.
\begin{figure}[hb!]
\centering
\includegraphics[scale=0.5]{ClientClass.png}
\caption[]{Client class, used by the client application}
\end{figure}
-
-
+Once an instance of it is created and loaded with the IP address and the port, one needs to call the \emph{connect()} method.
+The method will produce an integer based on its connection state. Output information and the programming code can be found on our project wiki page \cite{wiki}.
+\subsection{Ping class}
+\subsection{Data logging}
\clearpage
\section{Hardware design}
In our team project we had the option to choose all the required hardware ourself beside the two BeagleBoards, which we were supplied by Konrad and Dennis.
diff --git a/notFinishedCode/Report/test.toc b/notFinishedCode/Report/test.toc
index 17b11fa..ada41a6 100644
--- a/notFinishedCode/Report/test.toc
+++ b/notFinishedCode/Report/test.toc
@@ -5,18 +5,20 @@
\contentsline {section}{\numberline {4}Software design}{6}
\contentsline {subsection}{\numberline {4.1}Database access}{6}
\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{6}
-\contentsline {subsection}{\numberline {4.3}Client and Server model}{7}
-\contentsline {section}{\numberline {5}Hardware design}{9}
-\contentsline {subsection}{\numberline {5.1}BeagleBoard}{9}
-\contentsline {subsection}{\numberline {5.2}Cell phones}{10}
-\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{10}
-\contentsline {section}{\numberline {6}Communication protocol}{11}
-\contentsline {subsection}{\numberline {6.1}Hanlder side}{11}
-\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{12}
-\contentsline {section}{\numberline {7}Security and safety of the system}{13}
-\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{13}
-\contentsline {subsection}{\numberline {7.2}Security on the web site}{14}
-\contentsline {section}{\numberline {8}Web page}{18}
-\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{18}
-\contentsline {subsection}{\numberline {8.2}Results on the web page}{18}
-\contentsline {section}{\numberline {9}Conclusion}{20}
+\contentsline {subsection}{\numberline {4.3}Client and Server class}{7}
+\contentsline {subsection}{\numberline {4.4}Ping class}{9}
+\contentsline {subsection}{\numberline {4.5}Data logging}{9}
+\contentsline {section}{\numberline {5}Hardware design}{10}
+\contentsline {subsection}{\numberline {5.1}BeagleBoard}{10}
+\contentsline {subsection}{\numberline {5.2}Cell phones}{11}
+\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{11}
+\contentsline {section}{\numberline {6}Communication protocol}{12}
+\contentsline {subsection}{\numberline {6.1}Hanlder side}{12}
+\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{13}
+\contentsline {section}{\numberline {7}Security and safety of the system}{14}
+\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{14}
+\contentsline {subsection}{\numberline {7.2}Security on the web site}{15}
+\contentsline {section}{\numberline {8}Web page}{19}
+\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{19}
+\contentsline {subsection}{\numberline {8.2}Results on the web page}{19}
+\contentsline {section}{\numberline {9}Conclusion}{21}