Enhancement in PDR and Reducing the Delay in Wireless LAN Enhancement in PDR and Reducing the Delay in Wireless LAN Enhancement in PDR and Reducing the Delay in Wireless LAN

Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any obstacle tha comes in his line of direction. So because of this hackers can easily hack that material that is been transferred from different nodes. . In wireless LAN, Denial of Service or Jamming is caused by disrupting or denying the communication between sender an receiver. So for this reason the SNR is decreased at the receiver end. To understand how the signals are getting weak and how the jammer attacks the wireless LAN so that network performance drops down significantly. It is important to develop some powerf network analysis, design and managing the performance optimization of the network. In this paper some of the most common attacks and threats are explained and the prevention that can be taken by using various tools is implemented. All the node attacks are been shown by using a simulator NS2.


I. INTRODUCTION
Wireless networks are so vulnerable to the outer attack as compared to wired ones because you can track the wired one that who is using it but in wireless networks there are huge numbers of people who are tracking the particular broadcasting device. So they can't be @ IJTSRD | Available Online @ www.ijtsrd.com | Volume -2 | Issue -1 | Nov-Dec 2017 Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any obstacle that comes in his line of direction. So because of this hackers can easily hack that material that is been transferred from different nodes. . In wireless LAN, Denial of Service or Jamming is caused by disrupting or denying the communication between sender and receiver. So for this reason the SNR is decreased at the receiver end. To understand how the signals are getting weak and how the jammer attacks the wireless LAN so that network performance drops down significantly. It is important to develop some powerful tools for network analysis, design and managing the performance optimization of the network. In this paper some of the most common attacks and threats are explained and the prevention that can be taken by using various tools is implemented. All the nodes and the attacks are been shown by using a simulator NS2.
Wireless networks are so vulnerable to the outer attack as compared to wired ones because you can track the wired one that who is using it but in wireless networks numbers of people who are tracking the particular broadcasting device. So they can't be physically secured as wired network. mostly used by mobile devices and by laptops. WLAN's offer permission to move in the particular cell of a network device which is not present in the wired network. In order to understand the various attacks against the wireless infrastructure it is important to develop an appropriate defense strategy. the risks involved in the network and making informed decisions about security measures, the wireless network operator has a better chance to protect itself, its assets, and users. In this paper some of the most common attacks and threats are briefly explained. Furthermore, some possible countermeasures are d

II.
WIRELESS LOCAL AREA TECHNOLOGY A WLAN, or wireless LAN, is a devices to connect and communicate a traditional wired LAN, in which devices communicate over Ethernet WLAN communicate via Wi-Fi While a WLAN may look different than a traditional LAN, it functions the same way. New devices are typically added and configured using communicate with other devices on the network the same way they would on a wired network. The primary difference is how the data is transmitted. In a LAN, data is transmitted over physical cables in a series of Ethernet packets containing. In a WLAN, data is transmitted over the air using one of Wi protocols. WLAN's offer permission to move in the particular cell ce which is not present in the wired In order to understand the various attacks against the wireless infrastructure it is important to develop an appropriate defense strategy. By knowing the risks involved in the network and making informed decisions about security measures, the wireless network operator has a better chance to protect itself, its assets, and users. In this paper some of the most common attacks and threats are briefly explained. Furthermore, some possible countermeasures are discussed also.

WIRELESS LOCAL AREA NETWORK
, is a network that allows devices to connect and communicate wirelessly. Unlike LAN, in which devices cables, devices on a Fi. While a WLAN may look different than a traditional LAN, it functions the same way. New devices are typically added and configured using DHCP. They can communicate with other devices on the network the same way they would on a wired network. The primary difference is how the data is transmitted. In a LAN, data is transmitted over physical cables in a series of containing. In a WLAN, data is transmitted over the air using one of Wi-Fi 802.11 As wireless devices have grown in popularity, so have routers sold are now wireless International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com routers. A wireless router serves as a providing wireless connections to any Wi devices within range of the router's wireless signal. This includes laptops, tablets, smart phones wireless devices, such as smart appliances and home controllers. Wireless routers often connect to a cable modem or other Internet-connected device to provide Internet access to connected devices.
LANs and WLANs can be merged together using a bridge that connects the two networks. Many wireless routers also include Ethernet ports, providing connections for a limited number of wireless devices. In most cases, wireless routers act as a bridge, merging the Ethernet and Wi-Fi-connected devices into the same network. This allows wired and wireless devices to communicate with each other through a single router.
Wireless bounded breadth arrangement Technology is created from about 2 aspects one is interface agenda (NIC) and addition is admission purpose (AP). NIC could be an adapted with aural the laptop through the NIC laptop affiliated to an altered laptop and we will forward and accept the information. AP is wireless action NIC affiliated to the AP and so ability forwards to an atomic one another.

III. EXPERIMENTAL DESIGN
The secure, flexible and robust routing based mechanism has been designed under the proposed model routing scheme for the wireless adwhich is based upon the combination of dynamic route selection based upon genetic programming mechanism and connection integrity assurance algorithm. The new combination is capable of adding the higher level of security for the prevention of the connectivity holes and the fake route injections in the given network. The smart path selection across the multipath n International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume -2 | Issue -1 | Nov-Dec 2017 routers. A wireless router serves as a base station, providing wireless connections to any Wi-Fi-enabled thin range of the router's wireless signal. smart phones, and other wireless devices, such as smart appliances and smart controllers. Wireless routers often connect to a connected device to provide Internet access to connected devices.
LANs and WLANs can be merged together using a that connects the two networks. Many wireless ports, providing connections for a limited number of wireless devices. In most cases, wireless routers act as a bridge, merging connected devices into the same network. This allows wired and wireless devices to other through a single router.
Wireless bounded breadth arrangement Technology is created from about 2 aspects one is arrangement interface agenda (NIC) and addition is admission adapted with aural the laptop affiliated to an altered forward and accept the information. AP is wireless action NIC affiliated to the AP and so forwards to an atomic one another.
The secure, flexible and robust routing based mechanism has been designed under the proposed -hoc networks, which is based upon the combination of dynamic route selection based upon genetic programming mechanism connection integrity assurance algorithm. The new combination is capable of adding the higher level of security for the prevention of the connectivity holes and the fake route injections in the given network. The smart path selection across the multipath network becomes very important in the voice based ad networks, which requires the dedicated connections the exchange of the voice data over WLAN. The creation of the adaptive ad solution takes the perfectly layered amalgamation o the genetic programming based routing solution along with the connection integrity assurance model in order to realize the robust ad-hoc routing algorithm.  becomes very important in the voice based ad-hoc networks, which requires the dedicated connections for the exchange of the voice data over WLAN. The ad-hoc network routing solution takes the perfectly layered amalgamation of the genetic programming based routing solution along with the connection integrity assurance model in order hoc routing algorithm.

Fig 2: Nodes and Edges
The results have been obtained from the proposed model simulation for the realization of the robust and The proposed model is checked under the Blackhole attack, DDOS and The major parameters of cket delivery ratio), Network Load, and transmission (end-to-end) delay have been analyzed under this section.  Packet Delivery Rate: Packet delivery ratio factor evaluates the percentage of the successfully delivered packets among the given network or link in the given time (1 second in our case). The PDR shows the rising trend in the following graphs, which elaborates the rising network ability with each passing second, whereas the stability or straight line after 10 shows the performance of the fully converged network, which is communicating on the nearly constant speed to deliver the packets among the given networks.   Packet delivery ratio factor evaluates the percentage of the successfully delivered packets among the given network or link in the given time (1 second in our case). The PDR shows the rising trend in the following graphs, which elaborates the rk ability with each passing second, whereas the stability or straight line after 10 th second shows the performance of the fully converged network, which is communicating on the nearly constant speed to deliver the packets among the given networks.
Energy Consumption: The energy consumption has been observed in the Joules for each node connection, also denoted a path in the network. In this simulation, the initial energy is assigned to each of the node during the beginning of the simulation, which i tracked and reduced with the transmission, receive and routing (for intermediate nodes only) phase. The remaining energy in the end is recorded in the following graph, where the steep falling curve has been observed in contrast to the figure 1.1, which s energy consumption with rising number of packets, whereas after nearly 7 th second, the curve remains nearly constant to show the network convergence. The energy consumption has been observed in the Joules for each node-to-node connection, also denoted a path in the network. In this simulation, the initial energy is assigned to each of the node during the beginning of the simulation, which is tracked and reduced with the transmission, receive and routing (for intermediate nodes only) phase. The remaining energy in the end is recorded in the following graph, where the steep falling curve has been observed in contrast to the figure 1.1, which