You are on page 1of 3

LIST OF ABBREVATIONS

SL NO

ABBREVATIONS

DESCRIPTION

MANET

Mobile Ad-Hoc Network

OOPS

Object Oriented Programming Concepts

TCP/IP

Transmission Control Protocol/Internet


Protocol

JDBC

Java Database Connectivity

ODBC

Open Database Connectivity

AACK

Adaptive Acknowledgement

EC

MANET

IDS

10

TACK

11

DFD

Data Flow Diagrams

12

MRA

Misbehavior Report Authentication

14

RO

Routing Overhead

16

JVM

Java Virtual Machine.

17

API

Application Program Interface.

18

JSP

Java Server Pages.

19

HTML

20

ASP

21

HTTP

Hyper Text Transfer Protocol.

22

ODBC

Open Data Base Connectivity.

End Consumers
Mobile Ad Hoc Network
Intrusion Detection System
Two Acknowledgement

Hyper Text Markup Language.


Active Server Pages.

LIST OF FIGURES
SL NO

FIG NO

FIG NAME

PAGE NO

1(a)

Mobile Ad-Hoc Network

1(b)

MANET Infrastructure

1(c)

WANET Diagram

3(a)

Experimental Diagram

14

4(a)

ACK Sechme

17

4(b)

Secure-ACK

17

4(c)

Digital signature

18

4(d)

Management of Secure IDS for


Mobile Adhoc Network
Architecture

20

4(e)

Data Flow Diagram For MSIMANET

23

10

5(a)

Simple JAVA programming


architecture

27

11

5(b)

An overview of the software


development process

28

12

5(c)

For the same application multiple


platforms will be running through
the JVM

28

13

5(d)

Java Virtual Machine

29

14

5(e)

Structural Design of JSP

31

15

5(f)

JSP Architecture

32

ii

16

5(g)

Two-Tier Architecture of JDBC

37

17

5(h)

Three-Tier Architecture of JDBC

38

18

6.2(a)

Creating Regions

44

19

6.2(b)

Creation of Server Region page

45

20

6.2(c)

Generation of digital signature


page

46

21

6.2(d)

Path selection page

47

22

6.2(e)

Receiving the data from region


page

48

23

6.2(f)

Server received response page

49

24

6.2(g)

Digital signature responds page

50

25

6.2(h)

Sending data at passive attack at


region2

51

26

6.2(i)

Creating the duplicate regions 2&


3

52

27

6.2(j)

Malicious node creation at region1 53


from server

28

6.2(k)

Creating the individual path

54

29

6.2(l)

Victim node generated by server

55

30

6.2(m)

MRA received page

56

31

6.2(n)

Resending the data to server

57

32

6.2(o)

Error log received from server


response

58

iii

You might also like