From 5c3c664882a3cd5112e45768075f8d92318ffeea Mon Sep 17 00:00:00 2001 From: Refik Hadzialic Date: Sun, 9 Oct 2011 18:52:04 +0200 Subject: Writing report :( --- notFinishedCode/Report/test.tex.backup | 15 +++++++++++++-- 1 file changed, 13 insertions(+), 2 deletions(-) (limited to 'notFinishedCode/Report/test.tex.backup') diff --git a/notFinishedCode/Report/test.tex.backup b/notFinishedCode/Report/test.tex.backup index 9cc4e7c..2bf7a72 100644 --- a/notFinishedCode/Report/test.tex.backup +++ b/notFinishedCode/Report/test.tex.backup @@ -102,12 +102,19 @@ Prof. Dr. Gerhard Schneider\\ \vspace{1\baselineskip} Supervisors: \\ Konrad Mei Before we had started working on our project, we had to analyze the overall network to come up with test cases that contain the highest information content. The next step in our procedure was to implement our ideas into a working piece of software. Gradually we implemented a bit-by-bit of the final software. Every single step was accompanied by testing and validation procedures. At the end we connected all the ``black-boxes'' into one big piece of software. We have fulfilled our requests and goals and made a fully working and operable test software. Despite developing a working software, all the way along we thought about the simplicity of the usage of the software. In the following chapters we will describe in more detail our approach and how each subsystem works. \newpage -\section{Requests} % chapter 2 +\section{Requirements} % chapter 2 \newpage \section{Database design} +How we designed our database and why, explain in this section! \newpage \section{Software design} % section 2.1 -\subsection{Usage} % subsection 2.1.1 +\subsection{Database access} % subsection 2.1.1 +\subsection{Controlling the cell phones} +Our first version of the developed program code for controlling the cell phones used predefined timed values +to send commands instead of using a state controlled approach to confirm that every command was successfuly received and executed by the cell phone. +It meant we had to make an enormous number of assumptions. In comparison to our second approach, to build a state controlled cell phone control class, +our first approach was inferior and slower. The state controlled method connected two cell phones, on the same base station, up to 15 times faster than timed approach. +\subsection{} \newpage \section{Hardware design} In our team project we had the option to choose all the required hardware ourself beside the two BeagleBoards, which we were luckily supplied by Konrad and Dennis. @@ -122,6 +129,10 @@ Since one of the project goals was to reduce the costs as much as it was possibl Protocols used by old versions of Nokia phones as the 3310 use the F-Bus protocol. It was not easy to work with. After performing various experiments we found out that it was not possible to send commands for controlling the calls. In the meantime we found two Siemens phones, one M45 and S55. +The first one, Siemens M45, had a cable supplied with it and it was not difficult to control it with AT commands. +At the start we did not have a cable supplied with the Siemens S55 phone. We controlled it over the Bluetooth port. +\subsection{Cables} + \newpage \section{Communication protocol} -- cgit v1.2.3-55-g7522