Analysis of Load Balancing Effectiveness Using Per Connection Classifier (PCC) on Mikrotik Router

Authors

  • AHMAD Farizi Universitas Madura image/svg+xml Author
  • Mohammad Khoirun Nizam Author

Keywords:

Load Balancing, Per Connection Classifier (PCC), Mikrotik RouterOS, Quality of Service, Multi-ISP Network, Network Performance Optimization.

Abstract

The growing demand for digital services such as e-learning, video conferencing, and access to academic information systems requires a stable and high-capacity internet network. Reliance on a single ISP often leads to bottlenecks, increased delay, jitter, and packet loss during peak hours. One effective solution is implementing load balancing in multi-ISP configurations. This study analyzes the effectiveness of the Per Connection Classifier (PCC) load balancing method on Mikrotik RouterOS by assessing Quality of Service (QoS) parameters, namely throughput, delay, jitter, and packet loss.
The study used an experimental approach with two scenarios: without load balancing as the baseline, and with PCC implementation. The results showed that PCC significantly increased throughput, decreased delay, stabilized jitter, and reduced packet loss compared to the baseline. The PCC hashing mechanism proved consistent in distributing connections to two ISPs with different capacities without causing session breaks. Evaluations based on TIPHON and ITU-T standards indicate that network performance after PCC implementation is in the good to excellent category. This study confirms that PCC is an effective and efficient load balancing method for optimizing medium-scale institutional networks that require high service availability and real-time traffic stability.

Downloads

Download data is not yet available.

References

[1] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[2] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.

[3] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” Digit. Transform. Technol., vol. 3, no. 2, pp. 903–910, 2024, doi: 10.47709/digitech.v3i2.3446.

[4] F. P. E. Putra, N. Ramadhani, F. Fauzan, and M. Mursidi, “Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 372–381, 2024, doi: 10.47709/brilliance.v4i1.4292.

[5] F. P. E. Putra, M. Aziz, G. Arifin, A. Rohman, A. Rizki, and A. M. Syam, “Analisis Qos & Qoe,” J. Syntax Admiration, vol. 5, no. 1, pp. 140–145, 2024, doi: 10.46799/jsa.v5i1.973.

[6] F. P. E. Putra, U. Ubaidi, A. B. Tamam, and R. W. Efendi, “Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 340–347, 2024, doi: 10.47709/brilliance.v4i1.4199.

[7] F. P. E. Putra, R. W. Efendi, A. B. Tamam, and W. A. Pramadi, “Tren dan Praktik Terbaik dalam Pengembangan Web Berbasis API : Kajian Literatur terhadap Framework Laravel dan React,” Infomatek, vol. 27, no. 1, pp. 165–178, 2025, doi: 10.23969/infomatek.v27i1.25122.

[8] F. P. E. Putra, O. F. Kusuma, M. Mursidi, and A. Hamzah, “Comparative Analysis of Laravel and Symfony in PHP-Based Web Application Developmen,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 272–280, 2025, doi: 10.47709/brilliance.v5i1.5892.

[9] F. P. E. Putra, U. Ubaidi, R. O. F. Kusuma, A. M. Syam, and S. A. Efendy, “Effect Of Distance On Wi-Fi Signal Quality In The Home Environment,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 391–398, 2024, doi: 10.47709/brilliance.v4i1.4319.

[10] F. P. E. Putra, A. Zulfikri, A. Rohman, and R. Alim, “Analysis Comparative of Performance Optimization Techniques for PHP Framework Testing: Laravel, CodeIgniter, Symfony,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 242–248, 2025, doi: 10.47709/brilliance.v5i1.5989.

[11] F. P. E. Putra, U. Ubaidi, D. Mayangsari, and N. Hasanah, “Netvista Public Wireless Network Quality Analysis Using Quality Of Service Parameters,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 443–452, 2024, doi: 10.47709/brilliance.v4i1.4388.

[12] I. Hidayatullah, M. H. Khairi, I. Maulana, and F. P. Eka Putra, “Analisis Protokol Keamanan Jaringan dalam Era Internet of Things (IoT),” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 356–366, 2025, doi: 10.29408/jit.v8i2.30257.

[13] M. U. Farooq, X. Wang, A. Hawbani, L. Zhao, A. Al-Dubai, and O. Busaileh, “SDORP: SDN Based Opportunistic Routing for Asynchronous Wireless Sensor Networks,” 2023. doi: 10.1109/TMC.2022.3158695.

[14] S. Tumula et al., “An enhanced bio‐inspired energy‐efficient localization routing for mobile wireless sensor network,” 2024. doi: 10.1002/dac.5803.

[15] W. K. Ghamry and S. Shukry, “Multi-objective intelligent clustering routing schema for internet of things enabled wireless sensor networks using deep reinforcement learning,” 2024. doi: 10.1007/s10586-023-04218-0.

[16] Z. Setiawan, A. Hiswara, and H. N. Muthmainah, “Mengoptimalkan Jaringan Sensor Nirkabel dalam Aplikasi Monitor Lingkungan dengan Teknologi IoT di Indonesia,” 2023. doi: 10.58812/jmws.v2i10.704.

[17] W. Osamy, B. Alwasel, A. Salim, A. M. Khedr, and A. Aziz, “LBAS: Load-Balancing Aware Clustering Scheme for IoT-Based Heterogeneous Wireless Sensor Networks,” 2024. doi: 10.1109/JSEN.2024.3381852.

[18] A. R. Gaidhani and A. D. Potgantwar, “A Review of Machine Learning-Based Routing Protocols for Wireless Sensor Network Lifetime,” 2023. doi: 10.3390/engproc2023059231.

[19] V. Kusla and G. S. Brar, “A Technique for Cluster Head Selection in Wireless Sensor Networks Using African Vultures Optimization Algorithm,” 2023. doi: 10.4108/eetsis.v10i3.2680.

[20] A. Srivastava and P. K. Mishra, “Load-Balanced Cluster Head Selection Enhancing Network Lifetime in WSN Using Hybrid Approach for IoT Applications,” 2023. doi: 10.1155/2023/4343404.

[21] M. M. Pandith, N. K. Ramaswamy, M. Srikantaswamy, and R. K. Ramaswamy, “An efficient reconfigurable geographic routing congestion control algorithm for wireless sensor networks,” 2023. doi: 10.11591/ijece.v13i6.pp6388-6398.

[22] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.

[23] F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, 2024, doi: 10.60083/jsisfotek.v5i4.329.

[24] M. Khofikur R.A, F. P. Eka Putra, M. W. Ridho G, and V. Huda, “Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 334–344, 2025, doi: 10.29408/jit.v8i2.30230.

[25] G. Gülbaş and G. Çetin, “Lifetime Optimization of the LEACH Protocol in WSNs with Simulated Annealing Algorithm,” 2023. doi: 10.1007/s11277-023-10746-0.

[26] K. M. Bataihah, H. B. Salameh, H. Al-Obiedollah, M. Al-Nairat, and Y. Jararweh, “Improving Connectivity in Urban IoT-Based Wireless Sensor Networks: A Nonorthogonal Cognitive-Based Power Allocation,” 2024. doi: 10.1109/JSEN.2023.3301622.

[27] X. Wang, S. Chen, Y. Zhu, S. Zhang, X. Li, and L. Zhu, “Application of Wavelet Scattering Network and Ensemble Learning on Deception Jamming Recognition for Ultra-Wideband Detectors,” 2024. doi: 10.1109/TMTT.2023.3313872.

[28] Z. Dou, Z. Yao, Z. Zhang, and M. Lu, “A Lidar-Assisted Self-Localization Technology for Indoor Wireless Sensor Networks,” 2023. doi: 10.1109/JIOT.2023.3275942.

[29] M. A. Talukder, M. Khalid, and N. Sultana, “A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction,” 2025. doi: 10.1038/s41598-025-87028-1.

[30] K. K. P. Churchill et al., “A Reconfigurable CMOS Stack Rectifier with 22.8-dB Dynamic Range Achieving 47.91% Peak PCE for IoT/WSN Application,” 2023. doi: 10.1109/TVLSI.2023.3299075.

[31] G. Santhosh and K. V. Prasad, “Energy Saving Scheme for Compressed Data Sensing Towards Improving Network Lifetime for Cluster based WSN,” 2023. doi: 10.58346/JISIS.2023.I1.007.

[32] R. Goyal, N. Mittal, L. Gupta, and A. Surana, “Routing Protocols in Wireless Body Area Networks: Architecture, Challenges, and Classification,” 2023. doi: 10.1155/2023/9229297.

[33] X. Xue, R. Shanmugam, S. K. Palanisamy, O. I. Khalaf, D. Selvaraj, and G. M. Abdulsahib, “A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks,” 2023. doi: 10.3390/sym15020438.

[34] Y. F. Da Silva, R. C. S. Freire, and J. V. Da Fonseca Neto, “Conception and Design of WSN Sensor Nodes Based on Machine Learning, Embedded Systems and IoT Approaches for Pollutant Detection in Aquatic Environments,” 2023. doi: 10.1109/ACCESS.2023.3325760.

[35] K. Soltani, L. Farzinvash, and M. A. Balafar, “Trust-aware and energy-efficient data gathering in wireless sensor networks using PSO,” 2023. doi: 10.1007/s00500-023-07856-z.

[36] K. Chaitanya and G. Dhanabalan, “Precise Node Authentication using Dynamic Session Key Set and Node Pattern Analysis for Malicious Node Detection in Wireless Sensor Networks,” 2024. doi: 10.22399/ijcesen.613.

[37] L. Balraj and A. Prasanth, “An energy‐aware software fault detection system based on hierarchical rule approach for enhancing quality of service in internet of things‐enabled wireless sensor network,” 2024. doi: 10.1002/ett.4971.

[38] H. R. H. Al Dallal, “Clustering protocols for energy efficiency analysis in WSNS and the IOT,” 2024. doi: 10.25045/jpis.v15.i1.03.

[39] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.

[40] T. Zhukabayeva, A. Pervez, Y. Mardenov, M. Othman, N. Karabayev, and Z. Ahmad, “A Traffic Analysis and Node Categorization- Aware Machine Learning-Integrated Framework for Cybersecurity Intrusion Detection and Prevention of WSNs in Smart Grids,” 2024. doi: 10.1109/ACCESS.2024.3422077.

[41] J. Xiao, C. Li, Z. Li, and J. Zhou, “BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques,” 2024. doi: 10.1038/s41598-024-60338-6.

[42] H. Chen, X. Nan, and S. Xia, “Data Fusion Based on Temperature Monitoring of Aquaculture Ponds With Wireless Sensor Networks,” 2023. doi: 10.1109/JSEN.2022.3222510.

[43] M. Dener, C. Okur, S. Al, and A. Orman, “WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks,” 2024. doi: 10.1109/JIOT.2023.3292209.

[44] T. S, J. S. S. Samhitha, K. A. Sagar, J. S. Yaswanth, and K. Haritha, “Early Forest Fire Prediction System Using Wireless Sensor Network,” 2024. doi: 10.1109/DICCT61038.2024.10532798.

[45] O. A. Ghasemi, M. C. Amirani, and M. Azghani, “Resource and Power Allocation for Sum-Throughput Maximization in RIS-Assisted TDMA Wireless Sensor Networks,” 2024. doi: 10.1109/JIOT.2024.3390199.

[46] C. A. Putra, N. N. Aprilia, A. E. N. Sari, R. M. Wijdan, and A. R. Putri, “Pendampingan Pembuatan Nomor Induk Berusaha (NIB) untuk Pengembangan UMKM di Kelurahan Tlumpu Melalui Online Single Submission (OSS),” I-Com Indones. Community J., 2022, doi: 10.33379/icom.v2i2.1397.

[47] S. Bhatia, Z. Jaffery, and S. Mehfuz, “A Comparative Study of Wireless Communication Protocols for use in Smart Farming Framework Development,” 2023. doi: 10.1109/ICCT56969.2023.10075696.

[48] N. Dharini, J. Katiravan, S. D. M. Priya, and S. V. A. Sneghaa, “Intrusion Detection in Novel WSN-Leach Dos Attack Dataset using Machine Learning based Boosting Algorithms,” 2023. doi: 10.1016/j.procs.2023.12.064.

[49] S. W. Nourildean, M. D. Hassib, and Y. A. Mohammed, “AD-Hoc Routing Protocols in WSN-WiFi based IoT in Smart Home,” 2023. doi: 10.1109/DeSE58274.2023.10099981.

[50] S. S. Khatami, M. Shoeibi, R. Salehi, and M. Kaveh, “Energy-Efficient and Secure Double RIS-Aided Wireless Sensor Networks: A QoS-Aware Fuzzy Deep Reinforcement Learning Approach,” 2025. doi: 10.3390/jsan14010018.

Published

25-12-2025

How to Cite

Analysis of Load Balancing Effectiveness Using Per Connection Classifier (PCC) on Mikrotik Router. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(01). https://ejournal.omahtabing.com/knj/article/view/92

Most read articles by the same author(s)