Analisis Efektivitas Load Balancing Menggunakan Per Connection Classifier (PCC) pada Router Mikrotik

Penulis

  • Ahmad Farizi Universitas Madura image/svg+xml Penulis
  • Mohammad Khoirun Nizam Penulis

Kata Kunci:

Load Balancing, Per Connection Classifier (PCC), Mikrotik RouterOS, Kualitas Layanan, Jaringan Multi-ISP, Optimasi Kinerja Jaringan.

Abstrak

Pertumbuhan kebutuhan layanan digital seperti e-learning, video conference, dan akses sistem informasi akademik menuntut 
ketersediaan jaringan internet yang stabil dan berkapasitas tinggi. Ketergantungan pada satu ISP sering menyebabkan bottleneck, 
peningkatan delay, jitter, serta packet loss pada jam sibuk. Salah satu solusi efektif adalah penerapan load balancing pada 
konfigurasi multi-ISP. Penelitian ini menganalisis efektivitas metode load balancing Per Connection Classifier (PCC) pada 
Mikrotik RouterOS dengan menilai parameter Quality of Service (QoS), yaitu throughput, delay, jitter, dan packet loss. 
Penelitian menggunakan pendekatan eksperimental dengan dua skenario: tanpa load balancing sebagai baseline, dan 
implementasi PCC. Hasil menunjukkan bahwa PCC mampu meningkatkan throughput secara signifikan, menurunkan delay, 
menstabilkan jitter, serta mengurangi packet loss dibandingkan baseline. Mekanisme hashing PCC terbukti konsisten dalam 
mendistribusikan koneksi ke dua ISP dengan kapasitas berbeda tanpa menyebabkan session break. Evaluasi berdasarkan standar 
TIPHON dan ITU-T menunjukkan bahwa performa jaringan setelah implementasi PCC berada pada kategori good hingga 
excellent. Penelitian ini menegaskan bahwa PCC merupakan metode load balancing yang efektif dan efisien untuk optimasi 
jaringan institusi skala menengah yang membutuhkan ketersediaan layanan tinggi dan stabilitas trafik real-time. 

Unduhan

Data unduhan tidak tersedia.

Referensi

[1] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[2] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.

[3] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” Digit. Transform. Technol., vol. 3, no. 2, pp. 903–910, 2024, doi: 10.47709/digitech.v3i2.3446.

[4] F. P. E. Putra, N. Ramadhani, F. Fauzan, and M. Mursidi, “Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 372–381, 2024, doi: 10.47709/brilliance.v4i1.4292.

[5] F. P. E. Putra, M. Aziz, G. Arifin, A. Rohman, A. Rizki, and A. M. Syam, “Analisis Qos & Qoe,” J. Syntax Admiration, vol. 5, no. 1, pp. 140–145, 2024, doi: 10.46799/jsa.v5i1.973.

[6] F. P. E. Putra, U. Ubaidi, A. B. Tamam, and R. W. Efendi, “Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 340–347, 2024, doi: 10.47709/brilliance.v4i1.4199.

[7] F. P. E. Putra, R. W. Efendi, A. B. Tamam, and W. A. Pramadi, “Tren dan Praktik Terbaik dalam Pengembangan Web Berbasis API : Kajian Literatur terhadap Framework Laravel dan React,” Infomatek, vol. 27, no. 1, pp. 165–178, 2025, doi: 10.23969/infomatek.v27i1.25122.

[8] F. P. E. Putra, O. F. Kusuma, M. Mursidi, and A. Hamzah, “Comparative Analysis of Laravel and Symfony in PHP-Based Web Application Developmen,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 272–280, 2025, doi: 10.47709/brilliance.v5i1.5892.

[9] F. P. E. Putra, U. Ubaidi, R. O. F. Kusuma, A. M. Syam, and S. A. Efendy, “Effect Of Distance On Wi-Fi Signal Quality In The Home Environment,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 391–398, 2024, doi: 10.47709/brilliance.v4i1.4319.

[10] F. P. E. Putra, A. Zulfikri, A. Rohman, and R. Alim, “Analysis Comparative of Performance Optimization Techniques for PHP Framework Testing: Laravel, CodeIgniter, Symfony,” Brill. Res. Artif. Intell., vol. 5, no. 1, pp. 242–248, 2025, doi: 10.47709/brilliance.v5i1.5989.

[11] F. P. E. Putra, U. Ubaidi, D. Mayangsari, and N. Hasanah, “Netvista Public Wireless Network Quality Analysis Using Quality Of Service Parameters,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 443–452, 2024, doi: 10.47709/brilliance.v4i1.4388.

[12] I. Hidayatullah, M. H. Khairi, I. Maulana, and F. P. Eka Putra, “Analisis Protokol Keamanan Jaringan dalam Era Internet of Things (IoT),” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 356–366, 2025, doi: 10.29408/jit.v8i2.30257.

[13] M. U. Farooq, X. Wang, A. Hawbani, L. Zhao, A. Al-Dubai, and O. Busaileh, “SDORP: SDN Based Opportunistic Routing for Asynchronous Wireless Sensor Networks,” 2023. doi: 10.1109/TMC.2022.3158695.

[14] S. Tumula et al., “An enhanced bio‐inspired energy‐efficient localization routing for mobile wireless sensor network,” 2024. doi: 10.1002/dac.5803.

[15] W. K. Ghamry and S. Shukry, “Multi-objective intelligent clustering routing schema for internet of things enabled wireless sensor networks using deep reinforcement learning,” 2024. doi: 10.1007/s10586-023-04218-0.

[16] Z. Setiawan, A. Hiswara, and H. N. Muthmainah, “Mengoptimalkan Jaringan Sensor Nirkabel dalam Aplikasi Monitor Lingkungan dengan Teknologi IoT di Indonesia,” 2023. doi: 10.58812/jmws.v2i10.704.

[17] W. Osamy, B. Alwasel, A. Salim, A. M. Khedr, and A. Aziz, “LBAS: Load-Balancing Aware Clustering Scheme for IoT-Based Heterogeneous Wireless Sensor Networks,” 2024. doi: 10.1109/JSEN.2024.3381852.

[18] A. R. Gaidhani and A. D. Potgantwar, “A Review of Machine Learning-Based Routing Protocols for Wireless Sensor Network Lifetime,” 2023. doi: 10.3390/engproc2023059231.

[19] V. Kusla and G. S. Brar, “A Technique for Cluster Head Selection in Wireless Sensor Networks Using African Vultures Optimization Algorithm,” 2023. doi: 10.4108/eetsis.v10i3.2680.

[20] A. Srivastava and P. K. Mishra, “Load-Balanced Cluster Head Selection Enhancing Network Lifetime in WSN Using Hybrid Approach for IoT Applications,” 2023. doi: 10.1155/2023/4343404.

[21] M. M. Pandith, N. K. Ramaswamy, M. Srikantaswamy, and R. K. Ramaswamy, “An efficient reconfigurable geographic routing congestion control algorithm for wireless sensor networks,” 2023. doi: 10.11591/ijece.v13i6.pp6388-6398.

[22] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.

[23] F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, 2024, doi: 10.60083/jsisfotek.v5i4.329.

[24] M. Khofikur R.A, F. P. Eka Putra, M. W. Ridho G, and V. Huda, “Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 334–344, 2025, doi: 10.29408/jit.v8i2.30230.

[25] G. Gülbaş and G. Çetin, “Lifetime Optimization of the LEACH Protocol in WSNs with Simulated Annealing Algorithm,” 2023. doi: 10.1007/s11277-023-10746-0.

[26] K. M. Bataihah, H. B. Salameh, H. Al-Obiedollah, M. Al-Nairat, and Y. Jararweh, “Improving Connectivity in Urban IoT-Based Wireless Sensor Networks: A Nonorthogonal Cognitive-Based Power Allocation,” 2024. doi: 10.1109/JSEN.2023.3301622.

[27] X. Wang, S. Chen, Y. Zhu, S. Zhang, X. Li, and L. Zhu, “Application of Wavelet Scattering Network and Ensemble Learning on Deception Jamming Recognition for Ultra-Wideband Detectors,” 2024. doi: 10.1109/TMTT.2023.3313872.

[28] Z. Dou, Z. Yao, Z. Zhang, and M. Lu, “A Lidar-Assisted Self-Localization Technology for Indoor Wireless Sensor Networks,” 2023. doi: 10.1109/JIOT.2023.3275942.

[29] M. A. Talukder, M. Khalid, and N. Sultana, “A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction,” 2025. doi: 10.1038/s41598-025-87028-1.

[30] K. K. P. Churchill et al., “A Reconfigurable CMOS Stack Rectifier with 22.8-dB Dynamic Range Achieving 47.91% Peak PCE for IoT/WSN Application,” 2023. doi: 10.1109/TVLSI.2023.3299075.

[31] G. Santhosh and K. V. Prasad, “Energy Saving Scheme for Compressed Data Sensing Towards Improving Network Lifetime for Cluster based WSN,” 2023. doi: 10.58346/JISIS.2023.I1.007.

[32] R. Goyal, N. Mittal, L. Gupta, and A. Surana, “Routing Protocols in Wireless Body Area Networks: Architecture, Challenges, and Classification,” 2023. doi: 10.1155/2023/9229297.

[33] X. Xue, R. Shanmugam, S. K. Palanisamy, O. I. Khalaf, D. Selvaraj, and G. M. Abdulsahib, “A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks,” 2023. doi: 10.3390/sym15020438.

[34] Y. F. Da Silva, R. C. S. Freire, and J. V. Da Fonseca Neto, “Conception and Design of WSN Sensor Nodes Based on Machine Learning, Embedded Systems and IoT Approaches for Pollutant Detection in Aquatic Environments,” 2023. doi: 10.1109/ACCESS.2023.3325760.

[35] K. Soltani, L. Farzinvash, and M. A. Balafar, “Trust-aware and energy-efficient data gathering in wireless sensor networks using PSO,” 2023. doi: 10.1007/s00500-023-07856-z.

[36] K. Chaitanya and G. Dhanabalan, “Precise Node Authentication using Dynamic Session Key Set and Node Pattern Analysis for Malicious Node Detection in Wireless Sensor Networks,” 2024. doi: 10.22399/ijcesen.613.

[37] L. Balraj and A. Prasanth, “An energy‐aware software fault detection system based on hierarchical rule approach for enhancing quality of service in internet of things‐enabled wireless sensor network,” 2024. doi: 10.1002/ett.4971.

[38] H. R. H. Al Dallal, “Clustering protocols for energy efficiency analysis in WSNS and the IOT,” 2024. doi: 10.25045/jpis.v15.i1.03.

[39] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.

[40] T. Zhukabayeva, A. Pervez, Y. Mardenov, M. Othman, N. Karabayev, and Z. Ahmad, “A Traffic Analysis and Node Categorization- Aware Machine Learning-Integrated Framework for Cybersecurity Intrusion Detection and Prevention of WSNs in Smart Grids,” 2024. doi: 10.1109/ACCESS.2024.3422077.

[41] J. Xiao, C. Li, Z. Li, and J. Zhou, “BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques,” 2024. doi: 10.1038/s41598-024-60338-6.

[42] H. Chen, X. Nan, and S. Xia, “Data Fusion Based on Temperature Monitoring of Aquaculture Ponds With Wireless Sensor Networks,” 2023. doi: 10.1109/JSEN.2022.3222510.

[43] M. Dener, C. Okur, S. Al, and A. Orman, “WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks,” 2024. doi: 10.1109/JIOT.2023.3292209.

[44] T. S, J. S. S. Samhitha, K. A. Sagar, J. S. Yaswanth, and K. Haritha, “Early Forest Fire Prediction System Using Wireless Sensor Network,” 2024. doi: 10.1109/DICCT61038.2024.10532798.

[45] O. A. Ghasemi, M. C. Amirani, and M. Azghani, “Resource and Power Allocation for Sum-Throughput Maximization in RIS-Assisted TDMA Wireless Sensor Networks,” 2024. doi: 10.1109/JIOT.2024.3390199.

[46] C. A. Putra, N. N. Aprilia, A. E. N. Sari, R. M. Wijdan, and A. R. Putri, “Pendampingan Pembuatan Nomor Induk Berusaha (NIB) untuk Pengembangan UMKM di Kelurahan Tlumpu Melalui Online Single Submission (OSS),” I-Com Indones. Community J., 2022, doi: 10.33379/icom.v2i2.1397.

[47] S. Bhatia, Z. Jaffery, and S. Mehfuz, “A Comparative Study of Wireless Communication Protocols for use in Smart Farming Framework Development,” 2023. doi: 10.1109/ICCT56969.2023.10075696.

[48] N. Dharini, J. Katiravan, S. D. M. Priya, and S. V. A. Sneghaa, “Intrusion Detection in Novel WSN-Leach Dos Attack Dataset using Machine Learning based Boosting Algorithms,” 2023. doi: 10.1016/j.procs.2023.12.064.

[49] S. W. Nourildean, M. D. Hassib, and Y. A. Mohammed, “AD-Hoc Routing Protocols in WSN-WiFi based IoT in Smart Home,” 2023. doi: 10.1109/DeSE58274.2023.10099981.

[50] S. S. Khatami, M. Shoeibi, R. Salehi, and M. Kaveh, “Energy-Efficient and Secure Double RIS-Aided Wireless Sensor Networks: A QoS-Aware Fuzzy Deep Reinforcement Learning Approach,” 2025. doi: 10.3390/jsan14010018.

Unduhan

Diterbitkan

2025-12-25

Cara Mengutip

Analisis Efektivitas Load Balancing Menggunakan Per Connection Classifier (PCC) pada Router Mikrotik. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(01). https://ejournal.omahtabing.com/knj/article/view/92

Artikel paling banyak dibaca berdasarkan penulis yang sama