(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 11,
network using the Simple Network Management ProtocolSNMP.
III. Short Message Service (SMS) and AT commandsA-
SMS: have taken the mobile world by a storm. Accordingresearches , there are two types of mobile users: texters andtalkers. The texters send more than double the messages thattalkers do .So, SMS is a technology that enables the sending andreceiving of messages between mobile phones. It was firstappeared in Europe in 1992.The data that can be held by SMS message is very limited.One SMS message can contain at most 140 bytes of data, soone SMS can contain up to 160 characters if 7-bit characterencoding is used (like English, Deutsch) or 70 characters if 16-bit character encoding is used (like Arabic, Chinese) .There are many different kinds of SMS applications on themarket today and many others are being developed likeperson-to-person text messaging, provision of information,alerts and notifications.
AT Commands:AT commands are instructions used to control a modem,GSM/GPRS modem or mobile phones. AT is the abbreviationof ATtention. Every command line starts with "AT" or "at".The AT commands can be executed either by programmingor using the Hyper Terminal program.The starting "AT" is the prefix that informs the mobilephone about the start of a command line. It is not part of theAT command name.Here are some of the tasks that can be done using ATcommands with a GSM/GPRS modem or mobile phone:
Get basic information about the mobile phone orGSM/GPRS modem.
Get basic information about the subscriber.
Send, read, write or delete SMS messagesThere are basically two modes to work with SMS: ProtocolData Unit mode (PDU) and Text Mode. A mobile phoneinternally uses PDU format.Developers normally uses text mode because it is easier touse. (AT+CMGF) is the command to set the mode, e.g.AT+CMGF=0 sets the PDU mode while AT+CMGF=1 willset the format to text mode. The General syntax of ExtendedAT commands are:
All command lines must start with "AT" and end withcarriage return character.
A command line can contain more than one AT commands.Only the first AT command should be prefixed with "AT". ATcommands in the same command-line string should beseparated with semicolons, e.g. AT+CMGL;+CMGI<CR>.
A string is enclosed between double quotes, e.g.AT+CMGL="ALL"<CR>.
Information responses and result codes (including both finalresult codes and unsolicited result codes) always start and endwith a carriage return character and a linefeed character, e.g.after sending the command line "AT+CGMI
" to themobile device, the mobile device should return a responsesimilar to this
IV. PROPOSED METHODOLOGY
system assumes that there are the followinghardware requirements:
Computer device supported by any data base softwarelike SQL, to save the questions with answers and also tosave students' names and mobile phone numbers.
Mobile phone supporting Global System for Mobilecommunication (GSM) connected to the computer.
Printer device.Figure (1) shows the architecture of the system.Figure (1) architecture of the systemThe teacher will formulate the questions and print them. Thestudents will receive the questions printed on papers, send theanswers as SMS to the mobile phone connected to computer.Now the computer will read the received messages using theAT commands and grade the answers, save and send them tothe students. The job is divided into two algorithms, the firstone is used by the teacher to formulate and print the questions,while the second algorithm is used to receive the students'answers.
A- First Algorithm:
The teacher can use either saved files containing questions,or write the questions directly with their answers.The program will generate a random sequence for thequestions to each student to ensure that there will be nocheating between students. After that the new sequence will besaved in the DB to be used during marks grading.Now the program will print the student's name with his/herphone number on the top of the paper and print the questions inthe new randomized sequence in the other parts of the paper.Figure (2) shows the flowchart of this algorithm.
B- Second Algorithm: