You are on page 1of 3

LIST OF ABBREVATIONS

SLNO

ABBREVATION

WMN

Wireless Mesh Networks

ETT

Expected Transmission Time

WCETT

DESCRIPTION

Weighed Cumulative ETT

ETC

Expected Transmission Count

OLSR

Optimized Link State Routing

DSDV

Destination-Sequenced Distance-Vector

CHGSR

Cluster Head Gateway Switch Routing

AODV

Four Generation

10

DSR

Third Generation

11

RREQ

Route Request

12

RREP

Routing Reply

13

MAC

Frequency-Division Multiple Access

14

QOS

Quality Of Service

15

MC

Mesh Clients

16

MR

Mesh Routers

17

WSN

Wireless Sensor Networks

18

MPR

Multi-path Routing

19

SPR

Single Path Routing

20

AP

Access Point

21

ACK

Acknowledgement

22

Java VM

Java Virtual Machine

23

JDBC

Java Database Connectivity

24

Java API

Java Application Programming Interface

25

ODBC

Open Database Connectivity

26

RDBMS

Relational Database Management System

27

JDK

Java Development Kit

LIST OF FIGURES
FIG NO
1.1

FIG NAME
Infrastructure of Wireless Mesh Network
1

PAGE NO
3

4.2.1

System architecture

31

4.2.2

Data flow diagram

32

5.2.1(a)

How a Java Program Compiles and Interprets

36

5.2.1(b)

Java is a Platform Independent

36

5.2.2

program thats running on the Java platform

37

7.2.1

Route node 1 creation

54

7.2.2

successful creation of node 1

55

7.2.3

route node 2 creation

55

7.2.4

successful creation of node 2

56

7.2.5

route node 3 creation

56

7.2.6

successful creation of node 3

57

7.2.7

route node 4 creation

57

7.2.8

successful creation of node 4

58

7.2.9

route node 5 creation

58

7.2.10

successful creation of node 5

59

7.2.11

list of created nodes

60

7.2.12

selection of source node

60

7.2.13

selection of destination node

61

7.2.14

Best route selection

62

7.2.15

Message reached from source to destination

62

7.2.16

Details of delivered packet

63

ABSTRACT
Wireless ad hoc networks are defenceless to uniqueness based assaults
because they dont have the centralized server to control the communication nodes in
the network, so many attacks like injecting the malicious nodes by adversaries, false
identity creation for nodes and also including spoofing attacks, such that drastically
collision or reduce the overall routine of wireless networks. Conservatively, make
confident the uniqueness of the conversationalist and perceiving an adversarial or
attackers presence is executed through cryptographic validation. Unfortunately,
2

verification of the uniqueness or identity is not constantly enviable as it necessitates


key service management, and also coupled with extra infrastructural visual projection
and more general calculations. There are many Routing protocols are proposed for
efficient information transmission in wireless mesh networks. But in an existing
system attacker can also compromise nodes, however, he does not control certain
elements such as mobility of the nodes or modification/addition of the hardware of the
captured nodes. In order to overcome the problems in the previous system, we
proposed effective adaptive routing protocol in the wireless networks. We proposed
Least Cost Spoiling problems in Wireless Mesh Networks with Efficient multi-way
routing protocols. Compared to conventional protocols it is effective against node
blocking, isolation and network-sub division type attacks. Here we introduces
Adoptable Routing Algorithm route the packets without knowledge of channel
statistics and network model. Here the network structure model created by
transmission success probability. Hence this provides an efficient and effective
technique for information transmission.

Keywords: Wireless Networks, Blocking, Attacks, Multi-path routing, Adaptive


Routing.

You might also like