summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.toc
blob: d1730e83cdeac9e61a82690839f12526d8e0d899 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
\select@language {english}
\contentsline {section}{\numberline {1}Introduction and Motivation}{3}
\contentsline {section}{\numberline {2}Requirements}{4}
\contentsline {section}{\numberline {3}Database design}{5}
\contentsline {section}{\numberline {4}Software design}{6}
\contentsline {subsection}{\numberline {4.1}Database access}{6}
\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{6}
\contentsline {subsection}{\numberline {4.3}subsection}{7}
\contentsline {section}{\numberline {5}Hardware design}{8}
\contentsline {subsection}{\numberline {5.1}BeagleBoard}{8}
\contentsline {subsection}{\numberline {5.2}Cell phones}{9}
\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{9}
\contentsline {section}{\numberline {6}Communication protocol}{10}
\contentsline {subsection}{\numberline {6.1}Hanlder side}{10}
\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{11}
\contentsline {section}{\numberline {7}Security and safety of the system}{12}
\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{12}
\contentsline {subsection}{\numberline {7.2}Security on the web site}{13}
\contentsline {section}{\numberline {8}Web page}{17}
\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{17}
\contentsline {subsection}{\numberline {8.2}Results on the web page}{17}
\contentsline {section}{\numberline {9}Conclusion}{19}