summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.toc
blob: f38d1b1060c0e9af2c2a022ba2c2cbb30a85898a (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
\select@language {english}
\contentsline {section}{\numberline {1}Introduction and Motivation}{4}
\contentsline {section}{\numberline {2}Requirements}{5}
\contentsline {subsection}{\numberline {2.1}Logical and algorithmic requirements}{5}
\contentsline {subsection}{\numberline {2.2}Software requirements}{6}
\contentsline {subsection}{\numberline {2.3}Hardware requirements}{8}
\contentsline {section}{\numberline {3}Database design}{9}
\contentsline {section}{\numberline {4}Software design}{11}
\contentsline {subsection}{\numberline {4.1}Database access}{13}
\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{13}
\contentsline {subsection}{\numberline {4.3}Client and Server class}{14}
\contentsline {subsection}{\numberline {4.4}Ping class}{15}
\contentsline {subsection}{\numberline {4.5}Data logging}{16}
\contentsline {subsection}{\numberline {4.6}SSH Class}{16}
\contentsline {subsection}{\numberline {4.7}USB Cell phone detection class}{16}
\contentsline {subsection}{\numberline {4.8}Truth table class}{17}
\contentsline {subsection}{\numberline {4.9}Init Test class}{17}
\contentsline {subsection}{\numberline {4.10}Controller class}{17}
\contentsline {section}{\numberline {5}Hardware design}{18}
\contentsline {subsection}{\numberline {5.1}BeagleBoard}{18}
\contentsline {subsection}{\numberline {5.2}Cell phones}{19}
\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{19}
\contentsline {subsection}{\numberline {5.4}Server}{19}
\contentsline {section}{\numberline {6}Communication protocol}{20}
\contentsline {subsection}{\numberline {6.1}Communication between the handler and controller}{20}
\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{21}
\contentsline {section}{\numberline {7}Security and safety of the system}{24}
\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{24}
\contentsline {subsection}{\numberline {7.2}Security on the web site}{25}
\contentsline {section}{\numberline {8}Web page}{29}
\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{29}
\contentsline {subsection}{\numberline {8.2}Results on the web page}{29}
\contentsline {section}{\numberline {9}Employing the test system software}{31}
\contentsline {subsection}{\numberline {9.1}Required libraries}{31}
\contentsline {subsubsection}{\numberline {9.1.1}MySQL library}{31}
\contentsline {subsubsection}{\numberline {9.1.2}Serial port library}{31}
\contentsline {subsubsection}{\numberline {9.1.3}PJSUA library}{31}
\contentsline {subsubsection}{\numberline {9.1.4}pChart library}{31}
\contentsline {subsection}{\numberline {9.2}Configuring hardware}{31}
\contentsline {section}{\numberline {10}Conclusion}{32}