\BOOKMARK [1][-]{section.1}{Introduction and Motivation}{} \BOOKMARK [1][-]{section.2}{Requirements}{} \BOOKMARK [2][-]{subsection.2.1}{Logical and algorithmic requirements}{section.2} \BOOKMARK [2][-]{subsection.2.2}{Software requirements}{section.2} \BOOKMARK [2][-]{subsection.2.3}{Hardware requirements}{section.2} \BOOKMARK [1][-]{section.3}{Database design}{} \BOOKMARK [1][-]{section.4}{Software design}{} \BOOKMARK [2][-]{subsection.4.1}{Database access}{section.4} \BOOKMARK [2][-]{subsection.4.2}{Controlling the cell phones}{section.4} \BOOKMARK [2][-]{subsection.4.3}{Client and Server class}{section.4} \BOOKMARK [2][-]{subsection.4.4}{Ping class}{section.4} \BOOKMARK [2][-]{subsection.4.5}{Data logging}{section.4} \BOOKMARK [2][-]{subsection.4.6}{SSH Tunnel Class}{section.4} \BOOKMARK [2][-]{subsection.4.7}{USB Cell phone detection class}{section.4} \BOOKMARK [2][-]{subsection.4.8}{Truth table class}{section.4} \BOOKMARK [2][-]{subsection.4.9}{Init Test class}{section.4} \BOOKMARK [2][-]{subsection.4.10}{Controller class}{section.4} \BOOKMARK [1][-]{section.5}{Hardware design}{} \BOOKMARK [2][-]{subsection.5.1}{BeagleBoard}{section.5} \BOOKMARK [2][-]{subsection.5.2}{Cell phones}{section.5} \BOOKMARK [2][-]{subsection.5.3}{Cables for the cell phones}{section.5} \BOOKMARK [2][-]{subsection.5.4}{Server}{section.5} \BOOKMARK [1][-]{section.6}{Communication protocol}{} \BOOKMARK [2][-]{subsection.6.1}{Communication between the handler and controller}{section.6} \BOOKMARK [2][-]{subsection.6.2}{Verification of the protocol}{section.6} \BOOKMARK [1][-]{section.7}{Security and safety of the system}{} \BOOKMARK [2][-]{subsection.7.1}{Encryption of the communication channels}{section.7} \BOOKMARK [2][-]{subsection.7.2}{Security on the web site}{section.7} \BOOKMARK [3][-]{subsubsection.7.2.1}{Configuring the http secure protocol https}{subsection.7.2} \BOOKMARK [3][-]{subsubsection.7.2.2}{Password protecting the web site using .htaccess}{subsection.7.2} \BOOKMARK [1][-]{section.8}{Web page}{} \BOOKMARK [2][-]{subsection.8.1}{Communication between the web page and the test software}{section.8} \BOOKMARK [2][-]{subsection.8.2}{Results on the web page}{section.8} \BOOKMARK [1][-]{section.9}{Employing the test software system}{} \BOOKMARK [2][-]{subsection.9.1}{Required software and libraries}{section.9} \BOOKMARK [3][-]{subsubsection.9.1.1}{Python installation}{subsection.9.1} \BOOKMARK [3][-]{subsubsection.9.1.2}{Apache Web server installation}{subsection.9.1} \BOOKMARK [3][-]{subsubsection.9.1.3}{SSH}{subsection.9.1} \BOOKMARK [3][-]{subsubsection.9.1.4}{MySQL database and MySQLdb library}{subsection.9.1} \BOOKMARK [3][-]{subsubsection.9.1.5}{Serial port library}{subsection.9.1} \BOOKMARK [3][-]{subsubsection.9.1.6}{PJSUA library}{subsection.9.1} \BOOKMARK [3][-]{subsubsection.9.1.7}{pChart library}{subsection.9.1} \BOOKMARK [3][-]{subsubsection.9.1.8}{proctitle library}{subsection.9.1} \BOOKMARK [2][-]{subsection.9.2}{Configuring hardware}{section.9} \BOOKMARK [3][-]{subsubsection.9.2.1}{Configuring the cell phones}{subsection.9.2} \BOOKMARK [2][-]{subsection.9.3}{Location of the files}{section.9} \BOOKMARK [2][-]{subsection.9.4}{Setting up the parameters}{section.9} \BOOKMARK [2][-]{subsection.9.5}{Test descriptions}{section.9} \BOOKMARK [3][-]{subsubsection.9.5.1}{Smart test}{subsection.9.5} \BOOKMARK [3][-]{subsubsection.9.5.2}{SIP test}{subsection.9.5} \BOOKMARK [3][-]{subsubsection.9.5.3}{GSM test}{subsection.9.5} \BOOKMARK [3][-]{subsubsection.9.5.4}{All test}{subsection.9.5} \BOOKMARK [3][-]{subsubsection.9.5.5}{Manual test}{subsection.9.5} \BOOKMARK [2][-]{subsection.9.6}{Result descriptions}{section.9} \BOOKMARK [2][-]{subsection.9.7}{Using the software}{section.9} \BOOKMARK [3][-]{subsubsection.9.7.1}{Web site guide}{subsection.9.7} \BOOKMARK [3][-]{subsubsection.9.7.2}{Terminal guide}{subsection.9.7} \BOOKMARK [1][-]{section.10}{Conclusion}{}