Performance Analysis of TCP vs. UDP Protocols in Local Network Simulations
Keywords:
Keywords: TCP, UDP, network simulation, throughput, latency.Abstract
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are two major protocols at the transport layer that have fundamental differences in their working mechanisms and design objectives. TCP offers high reliability through flow control, congestion control, and packet retransmission mechanisms, while UDP provides fast and lightweight datagram delivery services without reliability guarantees. These differences make the performance of both protocols highly dependent on the characteristics of the network on which they operate. This study aims to comprehensively analyze the performance comparison of TCP and UDP on a local area network (LAN) using a simulation based on Network Simulator 3 (NS-3). The simulation was conducted on a simple topology consisting of two hosts and one router with a capacity of 100 Mbps, involving variations in packet size and traffic load levels. The simulation results show that under low to moderate load conditions, TCP and UDP are able to provide relatively good performance, although UDP remains superior in terms of latency and throughput due to its minimal control mechanisms. However, when the network load increases to near maximum capacity, TCP throughput experiences a significant decline due to the activation of congestion control mechanisms, while UDP maintains high throughput but with the consequence of increased packet loss. Further analysis shows that TCP is more suitable for applications that require data integrity, while UDP is more optimal for real-time applications that demand fast responses. Thus, this study emphasizes the importance of selecting the appropriate transport protocol based on application requirements and network conditions, especially in LAN environments that have different characteristics from other wide area networks.
Downloads
References
REFERENSI
[1] A. H. Mahmoud et al., “Nanoscale β-TCP-Laden GelMA/PCL Composite Membrane for Guided Bone Regeneration,” ACS Appl. Mater. Interfaces, vol. 15, no. 27, pp. 32121–32135, 2023, doi: 10.1021/acsami.3c03059.
[2] X. Cao and X. Zhang, “SaTCP: Link-Layer Informed TCP Adaptation for Highly Dynamic LEO Satellite Networks,” Proc. - IEEE INFOCOM, vol. 2023-May, 2023, doi: 10.1109/INFOCOM53939.2023.10228914.
[3] P. Bruhn, M. Kühlewind, and M. Muehleisen, “Performance and improvements of TCP CUBIC in low-delay cellular networks,” Comput. Networks, vol. 224, 2023, doi: 10.1016/j.comnet.2023.109609.
[4] T. O. Agboola, F. C. T. Mezue, S. B. Adebayo, J. Adegede, and O. C. Oyeniran, “Technical Challenges and Solutions to TCP in Data Center,” 2024, researchgate.net. doi: 10.55529/ijitc.44.36.46.
[5] P. Jiao, T. Liu, C. Zhao, J. Fei, S. Guan, and Y. Ma, “ZmTCP14, a TCP transcription factor, modulates drought stress response in Zea mays L,” Environ. Exp. Bot., vol. 208, 2023, doi: 10.1016/j.envexpbot.2023.105232.
[6] Y. Pan and C. Rossow, “TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake,” Proc. - IEEE Symp. Secur. Priv., pp. 4497–4515, 2024, doi: 10.1109/SP54263.2024.00265.
[7] M. Arghavani, H. Zhang, D. Eyers, and ..., “SUSS: Improving TCP Performance by Speeding Up Slow-Start,” Proc. ACM …, 2024, doi: 10.1145/3651890.3672234.
[8] A. H. M. Mohammed, K. A. Shariff, and ..., “A comprehensive review of the effects of porosity and macro-and micropore formations in porous β-TCP scaffolds on cell responses,” J. Aust. …, 2023, doi: 10.1007/S41779-023-00880-0.
[9] X. Ni, J. Feng, M. Liang, F. Zhou, Y. Xia, and ..., “Enhancing Bone Repair with β-TCP-Based Composite Scaffolds: A Review of Design Strategies and Biological Mechanisms,” Orthop. Res. …, 2025, doi: 10.2147/ORR.S525959.
[10] S. Li, S. Shi, Y. Xiao, C. Zhang, Y. T. Hou, and W. Lou, “Bijack: Breaking bitcoin network with tcp vulnerabilities,” Eur. Symp. …, 2023, doi: 10.1007/978-3-031-51479-1_16.
[11] Q. Sun et al., “Construction of a UDP-Arabinose Regeneration System for Efficient Arabinosylation of Pentacyclic Triterpenoids,” ACS Synth. Biol., vol. 12, no. 8, pp. 2463–2474, 2023, doi: 10.1021/acssynbio.3c00351.
[12] X. Zhou et al., “Efficient Biosynthesis of Salidroside via Artificial in Vivo enhanced UDP-Glucose System Using Cheap Sucrose as Substrate,” ACS Omega, vol. 9, no. 20, pp. 22386–22397, 2024, doi: 10.1021/acsomega.4c02060.
[13] Q. Yang et al., “Genome-wide analysis of UDP-glycosyltransferases family and identification of UGT genes involved in abiotic stress and flavonol biosynthesis in Nicotiana tabacum,” 2023, Springer. doi: 10.1186/s12870-023-04208-9.
[14] M. Z. Asif et al., “Role of UDP-Glycosyltransferase (ugt) Genes in Detoxification and Glycosylation of 1-Hydroxyphenazine (1-HP) in Caenorhabditis elegans,” Chem. Res. Toxicol., vol. 37, no. 4, pp. 590–599, 2024, doi: 10.1021/acs.chemrestox.3c00410.
[15] U. Duthaler et al., “The Activity of Members of the UDP-Glucuronosyltransferase Subfamilies UGT1A and UGT2B is Impaired in Patients with Liver Cirrhosis,” 2023, Springer. doi: 10.1007/s40262-023-01261-3.
[16] J. F. Fay et al., “UDP-glucose and MRS2905 agonist-bound states of the purinergic P2Y14 receptor,” Commun. Biol., 2025, doi: 10.1038/s42003-025-09174-6.
[17] K. Bardhi, S. Coates, M. Zhao, M. C. Anyachebelu, and P. Lazarus, “Identification of human hepatic UDP-glucuronosyltransferases involved in the glucuronidation of temazepam,” Drug Metab. Dispos., vol. 53, no. 7, 2025, doi: 10.1016/j.dmd.2025.100104.
[18] C. Cui et al., “One-pot biosynthesis of gastrodin using UDP-glycosyltransferase itUGT2 with an in situ UDP-glucose recycling system,” Enzyme Microb. Technol., vol. 166, 2023, doi: 10.1016/j.enzmictec.2023.110226.
[19] Y. Yang et al., “UDP-Glycosyltransferases in Edible Fungi: Function, Structure, and Catalytic Mechanism,” 2023, mdpi.com. doi: 10.3390/fermentation9020164.
[20] T. D. Hoffmann, E. Kurze, J. Liao, T. Hoffmann, C. Song, and W. Schwab, “Genome-wide identification of UDP-glycosyltransferases in the tea plant (Camellia sinensis) and their biochemical and physiological functions,” 2023, frontiersin.org. doi: 10.3389/fpls.2023.1191625.
[21] Y. P. W. Prasetyo, “Simulasi Jaringan Saraf Tiruan dengan Neural Network Fitting Tool (NFTool),” G-Tech J. Teknol. Terap., vol. 7, no. 4, pp. 1722–1731, 2023, doi: 10.33379/gtech.v7i4.3381.
[22] H. Harjanto and G. Purnama, “Perancangan Dan Simulasi Jaringan Komputer Dengan Metode Pengembangan Network Development Life Cycle (Ndlc) Pada Kantor Cabang Pt. V2 Indonesia,” JATI (Jurnal Mhs. Tek. Inform., vol. 8, no. 4, pp. 8032–8039, 2024, doi: 10.36040/jati.v8i4.10622.
[23] A. Santoso and S. Dianing Asri, “Perancangan Jaringan Internet Dengan Simulasi Menggunakan Gns3,” JATI (Jurnal Mhs. Tek. Inform., vol. 8, no. 4, pp. 8040–8048, 2024, doi: 10.36040/jati.v8i4.10625.
[24] M. Intan Sabila, M. Tahir, S. Dwi Mardania, and R. Ilham Arifin, “Implementasi Snort Sebagai Ids Dalam Mendeteksi Serangan Port Scanning Nmap Pada Simulasi Jaringan Virtual,” JATI (Jurnal Mhs. Tek. Inform., vol. 9, no. 4, pp. 6944–6948, 2025, doi: 10.36040/jati.v9i4.14340.
[25] S. Ramadhani and J. Hariansyah, “Simulasi Jaringan Kabel Dan Nirkabel Menggunakan Mikrotik Pada Pembelajaran Teknik Komputer Dan Jaringan (Tkj),” J. Intra Tech, vol. 7, no. 2, pp. 22–29, 2023, doi: 10.37030/jit.v7i2.146.
[26] F. Mikael Sinaga, S. Jurnalis Pipin, and H. Kurniawan, “Pelatihan Instalasi Jaringan Komputer Menggunakan Simulasi Cisco pada SMK Methodist Tanjung Morawa,” 2023, researchgate.net. doi: 10.47065/jrespro.v4i1.3633.
[27] Y. M. Putra and T. Wellem, “Simulasi Jaringan Ieee 802.11Ax Wifi 6 Menggunakan Simulator Ns-3 Untuk Pengukuran Throughput Pada Band Frekuensi 6 Ghz,” J. Indones. Manaj. Inform. dan Komun., vol. 4, no. 3, pp. 913–923, 2023, doi: 10.35870/jimik.v4i3.298.
[28] Y. D. Mukin and N. P, “Simulasi Jaringan Smart Home dengan Sistem Berbasis IoT,” J. Komunikasi, Sains dan Teknol., vol. 2, no. 1, pp. 159–168, 2023, doi: 10.61098/jkst.v2i1.34.
[29] Naufal Taufiqul Hakim, Hijroh Tamamil Gina, Apriliano Chandra Diva, Gilang Gemilang, and Didik Aribowo, “Simulasi Jaringan Metro Ethernet Dengan Aplikasi Cis-Co Packet Tracer Versi 6.2.0,” J. Sains dan Teknol., vol. 2, no. 1, pp. 22–31, 2023, doi: 10.58169/saintek.v2i1.130.
[30] Muhammad Abdullah Bin Matni, Raihan Ahmad Musyaffa, Umar Hamzah, Aini Nur Hayani, and Didik Aribowo, “Simulasi Penggunaan Cisco Packet Treaser Untuk Protokol TCP dan UDP Dalam Topologi Jaringan Ring,” J. Tek. Mesin, Ind. Elektro dan Inform., vol. 3, no. 2, pp. 240–246, 2024, doi: 10.55606/jtmei.v3i2.3832.
[31] T. Deng et al., “High-Throughput Strategies in the Discovery of Thermoelectric Materials,” Adv. Mater., vol. 36, no. 13, 2024, doi: 10.1002/adma.202311278.
[32] X. Xu et al., “The New Era of High-Throughput Nanoelectrochemistry,” 2023, ACS Publications. doi: 10.1021/acs.analchem.2c05105.
[33] M. Zhang, S. Xu, Y. Han, D. Li, S. Yang, and Y. Huang, “High-throughput horticultural phenomics: The history, recent advances and new prospects,” Comput. Electron. Agric., vol. 213, 2023, doi: 10.1016/j.compag.2023.108265.
[34] M. E. Dueñas, R. E. Peltier‐Heap, M. Leveridge, R. S. Annan, F. H. Büttner, and M. Trost, “Advances in high‐throughput mass spectrometry in drug discovery,” EMBO Mol. Med., vol. 15, no. 1, 2023, doi: 10.15252/emmm.202114850.
[35] J. Derks and N. Slavov, “Strategies for Increasing the Depth and Throughput of Protein Analysis by plexDIA,” J. Proteome Res., vol. 22, no. 3, pp. 697–705, 2023, doi: 10.1021/acs.jproteome.2c00721.
[36] D. Xu, Q. Zhang, X. Huo, Y. Wang, and M. Yang, “Advances in data‐assisted high‐throughput computations for material design,” Mater. Genome Eng. Adv., vol. 1, no. 1, 2023, doi: 10.1002/mgea.11.
[37] M. Zeng et al., “High-throughput printing of combinatorial materials from aerosols,” 2023, nature.com. doi: 10.1038/s41586-023-05898-9.
[38] J. Derks et al., “Increasing the throughput of sensitive proteomics by plexDIA,” Nat. Biotechnol., vol. 41, no. 1, pp. 50–59, 2023, doi: 10.1038/s41587-022-01389-w.
[39] Y. Huang et al., “High-throughput microbial culturomics using automation and machine learning,” 2023, nature.com. doi: 10.1038/s41587-023-01674-2.
[40] G. Monteiro da Silva, J. Y. Cui, D. C. Dalgarno, G. P. Lisi, and B. M. Rubenstein, “High-throughput prediction of protein conformational distributions with subsampled AlphaFold2,” 2024, nature.com. doi: 10.1038/s41467-024-46715-9.
[41] Fauzan Prasetyo Eka Putra, Debri Eko Arissandi, Achmad Rofiqi, and Moh Firman Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5938.
[42] Fauzan Prasetyo Eka Putra, Dian Tri Agustina, Triana Selvia Khusnul Khotimah, and Tarisha Ramadhanty, “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivitas Internet of Things (IoT),” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5836.
[43] Fauzan Prasetyo Eka Putra, Dea Aulia Siswoyo, M. Idris Ainul Yaqin, and Rica Oktavia, “Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G: Perspektif Nasional dan Internasional,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.6141.
[44] Fauzan Prasetyo Eka Putra, Noviyani Dwi Saputri, Fathur Rosi, and Rohilia Loati, “Optimalisasi Infrastruktur Cloud Networking melalui Integrasi SDN, NFV, dan Multi-Cloud,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.6099.
[45] F. P. E. Putra, R. M. Ilhamsyah, S. A. Efendy, and A. Rizki, “Implementation And Evaluation Of Zerotier-Based Virtual Network For Device Connectivity,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 281–290, 2025, doi: 10.47709/brilliance.v5i1.5966.
[46] F. P. E. Putra, A. Zulfikri, A. Rohman, and R. Alim, “Analysis Comparative of Performance Optimization Techniques for PHP Framework Testing: Laravel, CodeIgniter, Symfony,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 242–248, 2025, doi: 10.47709/brilliance.v5i1.5989.
[47] F. P. E. Putra, S. Syirofi, D. Wahid, and A. M. Syam, “Security Analysis And Data Recovery On Large-Scale Computer Networks,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 384–390, 2025, doi: 10.47709/brilliance.v5i1.6276.
[48] F. P. E. Putra, M. Surur, M. Mahendra, and G. Arifin, “Internet Network QOS Analysis at Yala Kopitiam pamekasan Using Wireshak,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 190–200, 2025, doi: 10.47709/brilliance.v5i1.5940.
[49] F. P. E. Putra, M. A. Mahmud, and I. S. Maqom, “Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus,” 2024, researchgate.net. doi: 10.47709/digitech.v3i2.3457.
[50] F. P. E. Putra, A. Zulfikri, G. Arifin, and ..., “Analysis of phishing attack trends, impacts and prevention methods: literature study,” … Res. Artif. …, 2024, doi: DOI: https://doi.org/10.47709/brilliance.v4i1.4357.
[51] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.
[52] F. P. E. Putra, R. W. Efendi, A. B. Tamam, and W. A. Pramadi, “Tren dan Praktik Terbaik dalam Pengembangan Web Berbasis API : Kajian Literatur terhadap Framework Laravel dan React,” Infomatek, vol. 27, no. 1, pp. 165–178, 2025, doi: 10.23969/infomatek.v27i1.25122.
[53] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.
Published
Issue
Section
License
Copyright (c) 2025 Ryan Putra Pratama Agustin, Hoirul Umam (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








