Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Analysis of Local Area Network Performance using Quality of Service

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2022
Holan Rahmatullah Suhut Nadenggan, Imam Riadi

Holan Rahmatullah Suhut Nadenggan and Imam Riadi. Analysis of Local Area Network Performance using Quality of Service. International Journal of Computer Applications 183(46):43-51, January 2022. BibTeX

	author = {Holan Rahmatullah Suhut Nadenggan and Imam Riadi},
	title = {Analysis of Local Area Network Performance using Quality of Service},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2022},
	volume = {183},
	number = {46},
	month = {Jan},
	year = {2022},
	issn = {0975-8887},
	pages = {43-51},
	numpages = {9},
	url = {},
	doi = {10.5120/ijca2022921866},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The development of information technology is currently very rapid, especially in computer networks which have become fundamental in all aspects. Analysis of the performance of computer networks, especially network LAN (Local Area Networks) is an effort to assess the quality of the internet network provided. Organizations or agencies that use LAN (Local Area Network) should use a good standard of service quality. Quality of Service (QoS) is one way to determine the performance quality of a network. Quality of Service uses 4 parameters to determine the quality of a network, namely throughput, packet loss, delay, and jitter with good service quality standardization, namely the TIPHON standardization (Telecommunication Internet Protocol Harmonization Over Networks). This research was conducted by assessing the Quality of Service (QoS) in the laboratory computer network before and after a Distributed Denial of Service (DDoS) attack. The process of attacking computer networks using tools LOIC (Low Orbit Ion Cannon)and simultaneously measuring network quality using 4lparameters Quality of Service (QoS). This study aims to determine the quality of a LAN(Local Area Network) network will deteriorate if there is a Distributed Denial of Service (DDoS) attack. The results of theresearch were conducted in accordance with the scenarios and objectives desired. The measurementLAN (Local Area Network)performance, before the attack resulted in a value throughput of 80%, packet loss of 0%, delay of 194.5 ms, and jitter of 0 ms. After the attack resulted in a value throughput of 45%, packet loss of 77.5%, delay of 208.25 ms, and Jitter of 0.75 ms. With a QoS parameter index of 3.75 before an attack, and a QoS parameter index of 2.50 after an attack. The Conclusion is that network attacks can affect the quality of network services and even cause disruption to the network system when the traffic is very high, it is necessary to build Local Area Network security against attacks.


  1. M. R. Hidayat dan I. Riadi, “Investigation of Botnet Attacks using Network Forensic Development Life Cycle Method,” Int. J. Comput. Appl., vol. 183, no. 25, hal. 30–36, 2021, doi: 10.5120/ijca2021921632.
  2. M. Iqbal Ichwan, L. Sugiyanta, dan P. Wibowo Yunanto, “Analysis of Hierarchical Token Bucket (HTB) Bandwidth Management with Mikrotik on the SMK Negeri 22 Network,” PINTER J. Pendidik. Tek. Inform. dan Komput., vol. 3, no. 2, hal. 122–126, 2019, doi: 10.21009/pinter.3.2.6.
  3. T. N. Hidayat dan I. Riadi, “Optimation Wireless Security IEEE 802.1X using the Extensible Authentication Protocol-Protected Extensible Authentication Protocol (EAP-PEAP),” Int. J. Comput. Appl., vol. 174, no. 11, hal. 25–30, 2021, doi: 10.5120/ijca2021920988.
  4. I. Riadi, W. P. Wicaksono, P. Studi, S. Informasi, dan U. A. Dahlan, “Implementation of Quality of Service Using the Hierarchical Token Bucket Method for Theory,” JUSI Vol. 1, No. 2 Sept. 2011, vol. 1, no. 2, hal. 93–104, 2011.
  5. S. Ahdan, O. Firmanto, dan S. Ramadona, “Design and Analysis of QoS (Quality of Service) Using the HTB (Hierarchical Token Bucket) Method in RT/RW Net Housing Prasanti 2,” J. Teknoinfo, vol. 12, no. 2, hal. 49, 2018, doi: 10.33365/jti.v12i2.89.
  6. M. Ulfah dan A. S. Irtawaty, “Measurement and Analysis of Internet Network Quality of Service (QoS) in the Balikpapan State Polytechnic Integrated Building,” hal. 351–357, 2020.
  7. R. Indraguna, “Web Server Security Analysis from DDoS Attack using Information Systems Security Assessment Framework Method,” vol. 183, no. 30, hal. 38–46, 2020.
  8. H. Shah, P. Shah, dan S. Naik, “DDOS Protection by Dividing and Limiting,” Int. J. Comput. Appl., vol. 155, no. 11, hal. 12–14, 2016, doi: 10.5120/ijca2016912251.
  9. Aprianto Budiman, M. Ficky Duskarnaen, dan Hamidillah Ajie, “Analysis of Quality of Service (Qos) on the Internet Network of Smk Negeri 7 Jakarta,” PINTER J. Pendidik. Tek. Inform. dan Komput., vol. 4, no. 2, hal. 32–36, 2020, doi: 10.21009/pinter.4.2.6.
  10. N. J. Meok, A. Atok, dan G. E. M. S, “A Study on Quality ff Service Mikrotik Routerboard Wifi Network in Multimedia Study Program SMK Negeri 2 Kupang,” vol. 2, no. 1, 2019.
  11. M. Purwahid dan J. Triloka, “Analysis of Internet Network Quality of Service (QOS) to Support the Strategic Plan of Computer Network Infrastructure at SMK NI Sukadana,” vol. 02, no. 03, hal. 100–109, 2019.
  12. I. Nurrobi, K. Kusnadi, dan R. Adam, “Application Of Quality of Service) Methods to Analyze The Performance Quality of Wireless Networks,” J. Digit, vol. 10, no. 1, hal. 47, 2020, doi: 10.51920/jd.v10i1.155.
  13. B. N. Azura dan Nurharifah, “Performance Analysis of Wireless Lan Network using Quality Of Service (QoS) Method,” J. Teknol. Terap. Sains, vol. 4, hal. 2, 2019.
  14. Y. Yanti, N. Pramita, dan Maulizar, “Analysis of Interference Measurements at Access Points (Ap) to Determine Quality of Service (Qos),” J. Nas. Komputasi dan Teknol. Inf., vol. 1, no. 1, hal. 17–21, 2018.
  15. M. J. N. Yudianto, Computer Networks and Its Definitions, vol. Vol.1. 2014.
  16. A. H. Suyanto, Introduction to Computer Networks, no. 45. 2004.
  17. I. K. S. Satwika, “Analysis of the Quality of Service of a Virtual Private Network (Vpn) at Stmik STIKOM Indonesia,” J. Ilm. Inform., vol. 7, no. 01, hal. 60, 2019, doi: 10.33884/jif.v7i01.1016.
  18. ETSI, “Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); General aspects of Quality of Service (QoS),” 1999.
  19. O. R. Prayogo dan I. Riadi, “Router Forensic Analysis against Distributed Denial of Service (DDoS) Attacks,” Int. J. Comput. Appl., vol. 175, no. 39, hal. 19–25, 2020, doi: 10.5120/ijca2020920944.
  20. S. Geges dan W. Wibisono, “Development of Prevention of Distributed Denial of Service (Ddos) Attacks on Network Resources With Integration of Network Behavior Analysis and Client Puzzles,” JUTI J. Ilm. Teknol. Inf., vol. 13, no. 1, hal. 53, 2015, doi: 10.12962/j24068535.v13i1.a388.
  21. M. A. Ridho dan M. Arman, “Analysis of DDoS Attacks Using Artificial Neural Network Methods,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 3, hal. 373–379, 2020, doi: 10.32736/sisfokom.v9i3.945.
  22. N. Athavale, S. Deshpande, V. Chaudhary, J. Chavan, dan S. S. Barde, “Framework for Threat Analysis and Attack Modelling of Network Security Protocols,” Int. J. Synth. Emot., vol. 8, no. 2, hal. 62–75, 2017, doi: 10.4018/ijse.2017070105.
  23. R. Arunadevi, “Experimentation Of Denial Of Service Attack In Wireless Local Area Infrastructure Network Using Loic Tool,” vol. 8, no. 8, hal. 51–55, 2018, doi: 10.9790/9622-0808035155.
  24. Karmadenur dan R. Yusuf, “Analysis of Snort Rules to Prevent Synflood Attacks on Network Security,” Int. J. Comput. Appl., vol. 178, no. 40, hal. 14–19, 2019, doi: 10.5120/ijca2019919283.
  25. M. A. Anas, Y. Soepriyanto, dan Susilaningsih, “Development of Network Topology Multimedia Tutorials for Class X Vocational School of Computer and Network Engineering," Muchammad Azwar Anas, Yerry Soepriyanto, Susilaningsih,” Multimed. Tutor., vol. 1, no. 4, hal. 307–314, 2018.
  26. H. A. Alamri, V. Thayananthan, dan J. Yazdani, “Machine Learning for Securing SDN based 5G Network,” Int. J. Comput. Appl., vol. 174, no. 14, hal. 9–16, 2021, doi: 10.5120/ijca2021921027.
  27. F. Chowdhury, “NAT Traversal Techniques: A Survey,” Int. J. Comput. Appl., vol. 175, no. 32, hal. 9–19, 2020, doi: 10.5120/ijca2020920885.
  28. K. A. Sadiq, J. K. Ayeni, dan F. S. Oyedepo, “An Optimized Kwara State Polytechnic Campus Networks using VLAN,” Int. J. Comput. Appl., vol. 175, no. 17, hal. 1–3, 2020, doi: 10.5120/ijca2020920671.
  29. A. Alhasan dan S. Wei, “Predicting DDoS Anomaly Patterns in SDN Controller using Hidden Markov Model,” Int. J. Comput. Appl., vol. 175, no. 39, hal. 33–41, 2020, doi: 10.5120/ijca2020920961.


Quality of Service,Throughput, Delay, Jitter,Packet Loss, DDoS, LOIC