summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.toc
diff options
context:
space:
mode:
Diffstat (limited to 'notFinishedCode/Report/test.toc')
-rw-r--r--notFinishedCode/Report/test.toc39
1 files changed, 21 insertions, 18 deletions
diff --git a/notFinishedCode/Report/test.toc b/notFinishedCode/Report/test.toc
index 759c6d7..00deae8 100644
--- a/notFinishedCode/Report/test.toc
+++ b/notFinishedCode/Report/test.toc
@@ -12,21 +12,24 @@
\contentsline {subsection}{\numberline {4.4}Ping class}{14}
\contentsline {subsection}{\numberline {4.5}Data logging}{15}
\contentsline {subsection}{\numberline {4.6}SSH Class}{15}
-\contentsline {section}{\numberline {5}Hardware design}{16}
-\contentsline {subsection}{\numberline {5.1}BeagleBoard}{16}
-\contentsline {subsection}{\numberline {5.2}Cell phones}{17}
-\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{17}
-\contentsline {subsection}{\numberline {5.4}Server}{17}
-\contentsline {section}{\numberline {6}Communication protocol}{18}
-\contentsline {subsection}{\numberline {6.1}Communication between the handler and controller}{18}
-\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{19}
-\contentsline {section}{\numberline {7}Security and safety of the system}{22}
-\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{22}
-\contentsline {subsection}{\numberline {7.2}Security on the web site}{23}
-\contentsline {section}{\numberline {8}Web page}{27}
-\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{27}
-\contentsline {subsection}{\numberline {8.2}Results on the web page}{27}
-\contentsline {section}{\numberline {9}How to use and start the system}{29}
-\contentsline {subsection}{\numberline {9.1}Required libraries}{29}
-\contentsline {subsection}{\numberline {9.2}Configuring hardware}{29}
-\contentsline {section}{\numberline {10}Conclusion}{30}
+\contentsline {subsection}{\numberline {4.7}USB Cell phone detection class}{15}
+\contentsline {subsection}{\numberline {4.8}Truth table class}{16}
+\contentsline {subsection}{\numberline {4.9}Init Test class}{16}
+\contentsline {section}{\numberline {5}Hardware design}{17}
+\contentsline {subsection}{\numberline {5.1}BeagleBoard}{17}
+\contentsline {subsection}{\numberline {5.2}Cell phones}{18}
+\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{18}
+\contentsline {subsection}{\numberline {5.4}Server}{18}
+\contentsline {section}{\numberline {6}Communication protocol}{19}
+\contentsline {subsection}{\numberline {6.1}Communication between the handler and controller}{19}
+\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{20}
+\contentsline {section}{\numberline {7}Security and safety of the system}{23}
+\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{23}
+\contentsline {subsection}{\numberline {7.2}Security on the web site}{24}
+\contentsline {section}{\numberline {8}Web page}{28}
+\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{28}
+\contentsline {subsection}{\numberline {8.2}Results on the web page}{28}
+\contentsline {section}{\numberline {9}How to use and start the system}{30}
+\contentsline {subsection}{\numberline {9.1}Required libraries}{30}
+\contentsline {subsection}{\numberline {9.2}Configuring hardware}{30}
+\contentsline {section}{\numberline {10}Conclusion}{31}