summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.toc
blob: 493b8ad383e8de1f1f9c457ce6597be5dc6c2d0b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
\select@language {english}
\contentsline {section}{\numberline {1}Introduction and Motivation}{4}
\contentsline {section}{\numberline {2}Requirements}{5}
\contentsline {subsection}{\numberline {2.1}Logical and algorithmic requirements}{5}
\contentsline {subsection}{\numberline {2.2}Software requirements}{6}
\contentsline {subsection}{\numberline {2.3}Hardware requirements}{8}
\contentsline {section}{\numberline {3}Database design}{9}
\contentsline {section}{\numberline {4}Software design}{11}
\contentsline {subsection}{\numberline {4.1}Database access}{13}
\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{13}
\contentsline {subsection}{\numberline {4.3}Client and Server class}{14}
\contentsline {subsection}{\numberline {4.4}Ping class}{15}
\contentsline {subsection}{\numberline {4.5}Data logging}{16}
\contentsline {subsection}{\numberline {4.6}SSH Tunnel Class}{16}
\contentsline {subsection}{\numberline {4.7}USB Cell phone detection class}{17}
\contentsline {subsection}{\numberline {4.8}Truth table class}{17}
\contentsline {subsection}{\numberline {4.9}Init Test class}{17}
\contentsline {subsection}{\numberline {4.10}Controller class}{17}
\contentsline {section}{\numberline {5}Hardware design}{18}
\contentsline {subsection}{\numberline {5.1}BeagleBoard}{18}
\contentsline {subsection}{\numberline {5.2}Cell phones}{19}
\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{19}
\contentsline {subsection}{\numberline {5.4}Server}{19}
\contentsline {section}{\numberline {6}Communication protocol}{20}
\contentsline {subsection}{\numberline {6.1}Communication between the handler and controller}{20}
\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{21}
\contentsline {section}{\numberline {7}Security and safety of the system}{24}
\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{24}
\contentsline {subsection}{\numberline {7.2}Security on the web site}{25}
\contentsline {section}{\numberline {8}Web page}{29}
\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{29}
\contentsline {subsection}{\numberline {8.2}Results on the web page}{29}
\contentsline {section}{\numberline {9}Employing the test software system}{31}
\contentsline {subsection}{\numberline {9.1}Required software and libraries}{31}
\contentsline {subsubsection}{\numberline {9.1.1}Python installation}{31}
\contentsline {subsubsection}{\numberline {9.1.2}Apache Web server installation}{31}
\contentsline {subsubsection}{\numberline {9.1.3}SSH}{31}
\contentsline {subsubsection}{\numberline {9.1.4}MySQL database and MySQLdb library}{32}
\contentsline {subsubsection}{\numberline {9.1.5}Serial port library}{32}
\contentsline {subsubsection}{\numberline {9.1.6}PJSUA library}{32}
\contentsline {subsubsection}{\numberline {9.1.7}pChart library}{33}
\contentsline {subsubsection}{\numberline {9.1.8}proctitle library}{33}
\contentsline {subsection}{\numberline {9.2}Configuring hardware}{33}
\contentsline {subsection}{\numberline {9.3}Using the software}{34}
\contentsline {section}{\numberline {10}Conclusion}{35}