Conclusion and Future work 

Conclusion 

Security plays an important role in estimating the performance of any type of networks like wired and wireless networks. Wireless networks are more popular across the networking world these days and they are used against much outstanding application to ensure a safe and wireless communication mechanism. Improving the security across the wireless networks is the key research area and there are many security models proposed in this context and most of them are successful. The main aim of this project is to improve the security across the wireless LAN networks and for this a mobile ad hoc network is considered.

OPNET modeler is used as the required simulation tool and the nodes are wireless LAN workstations and a simple wireless LAN server is also used across the simulation mechanism. To proceed with the simulation two scenarios are created and among these scenarios the first scenario is an ordinary configuration and the second scenario deals with the improved security for the wireless LAN. The simulation process adopted in this context is explained in this document and few results are used to estimate the performance of the secure wireless LAN and based on the results achieved following analysis is done in this research. 

Less amount of traffic is received across the safe wireless LAN settings when compared to the normal scenario. From this indication it can be analyzed that the overall traffic is reduced by changing the settings of wireless LAN and if the total traffic reduced across the network, then the nodes across the network will generate ample packets to the server without any loss and when the first scenario is considered there is more traffic and a maximum value of 750 bytes per second is observed.

This value is much greater than the modified scenario where the maximum amount of traffic received is only 150 bytes per second and this indicates that if secure wireless LAN parameters are used, the congestion can be reduced a lot across the network and if there is more traffic received across the network in terms of packets, it indicates that there are chances for flooding and this situation can be eliminated with the implementation of secure wireless LAN parameters. When the second scenario is observed it is clear that a constant rate of traffic is received throughout the simulation process and this value is very less and also the chances for packet flooding is very less. Traffic sent is less with the secure wireless LAN setting when compared to the normal settings scenario.

If the traffic sent in bytes per second is low it can be understood that the chances of network congestion are low and this fact is proved with the secured wireless LAN settings and the actual traffic sent with the normal wireless LAN is more when compared to the secured scenario and a very less number of packets are sent across the network by the nodes towards the wireless LAN server and also across this situation the server will be free enough to handle all the client requests and thus the overall congestion on the network can be reduced a lot due to the secure wireless LAN parameters and If the traffic sent by the video application on the network is low it can be concluded that congestion on the network is reduced and also the packet flooding can be minimized when compared to the unsafe wireless LAN parameters.

Jitter is more with the secure wireless LAN configuration and it indicates that the packet are sent at a constant rate without much delay where the normal scenario has very less jitter and thus the packets are sent with more variation in delay terms and even in this perspective the performance of secured wireless LAN scenario is better when compared to the normal scenario. MOS value is constant and also less with the secured wireless LAN configuration when compared to the normal configuration. From this analysis it can be concluded that the quality of the voice application is improved and maintained at a constant rate across the secured wireless LAN when compared to the unsafe wireless LAN.

The average packet end to end delay is more with the secured wireless LAN configuration when compared to the normal configuration. From this it can be understood that the delay is more with the secure wireless LAN configuration and it sends the packets at a slow and constant rate such that there is no packet loss across the network, where the delay is very less with the unsafe wireless LAN and this indicates that packet flooding is achieved across the network and there is ample scope to lose the packets against the wireless LAN server. Almost same amount of traffic is sent across the network for both the scenarios and on a while the overall traffic sent is less with the secure wireless LAN parameters.

From this it can be understood that the voice application are more open to the attacks and thus the traffic sent is equal even a secure wireless LAN is implemented and a better optimization is done with enhancing the security of the wireless LAN performance metrics and if the delay is more means the wireless LAN server is free enough to handle the packets sent from the corresponding clients and also they can be processed accordingly to their own destinations without any loss in packets.

The delay with the normal configuration is very less and this situation will make the wireless LAN server busy and it will lose the important data packets sent from different applications. Secured wireless LAN parameters are giving ample freedom to the medium in accepting all the networking requests from the corresponding nodes and also the medium can add more nodes and servers with the security provided by the wireless LAN metrics and if the load on the network is more due to the unsafe wireless LAN the rest of the nodes stop working and thus the secure wireless LAN metrics are helpful in reducing the load to a maximum extend and even in this context secure wireless LAN performance is more when compared with the ordinary LAN configurations. 

Future work 

Future work to be done in this project to improve the scope of the research is given below 

  • More scenarios can be added to the simulation and wireless LAN parameters can be added against these scenarios to improve the research in future
  • Security protocols can be added to the network in future to estimate the performance of the wireless LAN at the protocols level.