Ind
on
esi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Com
p
ut
er
Scie
nce
Vo
l.
24
,
No.
1
,
Octo
be
r
20
21
,
pp.
329
~
337
IS
S
N:
2502
-
4752, DO
I:
10.11
591/ijeecs
.v
2
4
.i
1
.
pp
329
-
337
329
Journ
al
h
om
e
page
:
http:
//
ij
eecs.i
aesc
or
e.c
om
Analysis
of
IP
v6
jumb
ogram pa
ck
ages tra
nsmi
ssion
using
jumb
o
frame in
mik
ro
tik
-
based
tu
nn
eling
Yahya
Hida
ya
tu
ll
ah
1
,
A
ri
e
f Marw
anto
2
,
I
mam Muc
h I
b
nu
S
ubr
oto
3
1,2
Dep
ar
t
m
ent
of
Elec
tr
ic
a
l Engi
n
ee
ring
,
Univ
ersitas Isla
m
Su
lt
an
Agung (UNIS
S
ULA)
,
Sem
ara
n
g,
Indone
si
a
3
Depa
rtment
of
I
nform
at
ion
T
ec
h
nolog
y
and
Com
pute
r
Sc
ie
nc
e, U
nive
rsita
s
Islam
Sulta
n
Agung (
UN
ISSULA)
Sem
ara
ng,
Indo
nesia
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Sep
19
, 202
0
Re
vised Ju
n
25
, 2021
Accepte
d
J
u
l
15
, 2
021
The
va
li
da
ti
on
and
accurac
y
of
int
ern
et
protoc
ol
v
ersio
n
6
(
IPv6
)
per
form
anc
e
usi
ng
jumbo
fra
me
s
is
stil
l
not
per
fect,
due
to
p
ee
r
-
to
-
p
eer
conne
c
ti
ons
te
sti
ng
withi
n
the
sa
m
e
oper
at
ing
s
ystem
and
bet
wee
n
oper
at
in
g
s
y
stems
.
The
ref
ore
,
inacc
ur
at
e
d
at
a
te
st
resul
ts.
To
m
it
iga
te
d
,
tes
ti
ng
with
a
wider
pl
at
form
is
rec
om
m
ende
d,
a
m
edi
um
-
sca
le
net
work
co
nnec
ti
on
is
proposed
such
a
s
m
et
ropoli
ta
n
a
rea
ne
tworks.
In
thi
s
works
,
a
c
onnec
ti
on
bet
wee
n
computer
device
s
conn
ec
t
ed
b
y
three
p
rox
y
rout
ers
are
m
ade
,
with
diffe
ren
t
IPv6
s
egments
on
e
ach
port.
The
n
each
computer
de
vic
e
sends
tra
ffi
c
dat
a
to
e
ac
h
othe
r
using
a
tra
ffi
c
-
gen
era
t
or
appl
icati
on
.
The
first
te
st
through
thre
e
r
oute
rs
without
tunne
l
connect
io
n
is
ca
rrie
d
out
as
the
first
sce
nar
io
to
c
om
par
e
per
for
m
anc
e
with
t
unnel
-
base
d
tes
ti
ng.
Thr
ee
par
amete
rs h
ave
bee
n
used
in this
te
st
,
such
as
m
axi
m
um
tra
nsfer unit
(
MTU
)
1500
b
y
t
es,
MT
U
400
by
te
s
an
d
MTU
9000
b
y
t
es.
The
r
esult
s
of
the
te
sts
conduc
t
ed
show
tha
t
the
use
of
j
um
bo
fra
m
es
usi
ng
a
prox
y
is
le
ss
eff
ec
ti
v
e
,
eve
n
though
it
p
roduc
es
a
la
rge
r
throughput
when
using
the
MTU
400
0,
but
the
re
is
fra
gm
en
ta
ti
on
in
the
packet
p
assing
thro
ugh
the
prox
y
b
ec
ause
th
e
pac
ke
t
passing
t
hrough
the prox
y
is split
in
to
15
00
b
y
te siz
es
.
Ke
yw
or
d
s
:
Gen
e
rato
r
tra
ffi
c
IPv6
Ju
m
bo
fram
e
Op
e
rati
on syst
e
m
s
Tu
nn
el
li
ng
This
is an
open
acc
ess arti
cl
e
un
der
the
CC
B
Y
-
SA
license
.
Corres
pond
in
g
Aut
h
or:
Ar
ie
f
Mar
wan
t
o
Dep
ar
t
m
ent
of
Ele
ct
rical
En
gi
neer
i
ng
Un
i
ver
sit
as
Isl
a
m
Su
lt
an Agu
ng (U
NI
S
SUL
A)
Ra
ya
K
al
igawe
St.
Km
04
,
Se
m
aran
g 5
0112,
Indo
nesia
Em
a
il
:
arief@u
niss
ula.ac.i
d
1.
INTROD
U
CT
ION
Ju
m
bo
fr
am
e
data
transm
iss
ion
util
iz
at
ion
in
internet
pr
oto
c
ol
ver
si
on
6
(
IPv6
)
rese
arch
is
le
ss
at
te
ntion
[1]
-
[3]
.
More
over,
m
os
t
re
searc
hers
are focu
se
s o
n
r
ound
tri
p
ti
m
e
(RTT
)
a
num
ber
of 1500 b
y
te
s
of
m
axi
m
u
m
tran
sm
issi
on
unit
(MTU
)
duri
ng
send
i
ng
proc
ess
in
W
in
dows
an
d
Lin
ux
platfor
m
[4]
-
[11]
.
Pr
e
vious
resea
rch
[
12]
-
[
19]
was
co
nducte
d
on
ly
com
par
in
g
rou
nd
tri
p
ti
m
e
(RTT)
and
data
transm
issio
n
tim
e
us
in
g
file
tran
sfer
pr
oto
c
ol
(F
TP).
A
norm
al
m
axi
m
u
m
t
ran
s
fer
un
it
(
MTU)
of
15
00
byte
s
is
us
ed
an
d
a
m
od
ifie
d
MTU
of
up
to
9000
byte
s
is
al
so
use
d
by
so
m
e
research
e
rs.
Ju
m
bo
fr
am
e
is
a
f
ram
e
siz
e
sent
fro
m
et
hernet
with
a
payl
oa
d
siz
e
exceedi
ng
15
00
byte
s,
w
hile
g
iga
byte
Ethe
rn
et
is
a
jum
bo
f
ram
e
trans
m
issi
o
n
et
hernet t
hat ca
n
tra
ns
m
it
1
g
igabyte
of d
at
a
in one
seco
nd
[
20
]
-
[
27
]
.
In
[28]
The
pur
pose
of
this
researc
h
is
to
fin
d
out
how
t
he
pe
rfor
m
anc
e
is
ob
ta
ine
d
wh
e
n
us
i
ng
j
um
bo
f
ram
es.
The
m
et
ho
d
is
perform
ed
by
retrievin
g
file
s
from
the
ftp
serv
e
r.
T
he
re
su
lt
s
obta
ined
by
th
e
netw
ork
thr
ou
ghput
us
in
g
a
la
rg
er
jum
bo
fr
am
e
so
that
the
data
retrieval
tim
e
is
t
wice
as
fast.
I
n
oth
e
r
hand,
[
29
]
has
pro
po
se
d
e
xam
inati
on
o
f
jum
bo
f
ram
es
in
sim
il
ar
op
erati
ng
syst
em
s.
The
pur
pose
of
thi
s
stu
dy
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
2
4
, N
o.
1
,
Oct
o
ber
20
21
:
329
-
337
330
was
to
see
the
p
er
form
ance
w
hen
us
i
ng
jum
bo
f
ram
es.
The
m
e
tho
d
us
e
d
i
s
sen
ding d
at
a b
et
wee
n
2
com
pu
te
rs
with
the
sam
e
op
e
rati
ng
syst
e
m
.
B
y
us
in
g
j
um
bo
fr
am
es,
da
ta
traff
ic
is
e
xpect
ed
t
o
be
m
or
e
sta
ble
[
30]
-
[3
6
]
.
Peer
-
to
-
peer
pe
rfor
m
ace
te
sti
ng
has
bee
n
pro
po
se
d
by
[
37
]
with
Win
dows
an
d
Lin
ux
platf
orm
witho
ut
passing
so
m
e
so
rt
of co
nnect
ions f
r
om
co
up
l
e r
ou
te
r
h
a
r
dwares.
A
few
jum
bo
f
ram
e
te
sts
are
cond
ucted
by
[
38
]
-
[
47
]
us
in
g
th
e
tu
nn
el
m
eth
od
only
pee
r
-
to
-
peer
a
nd
no
t
te
sti
ng
on
a
true
scal
e.
Test
ing
in
t
he
us
e
of
ho
m
e
and
office
co
m
pu
te
rs,
or
co
m
pu
te
rs
with
gen
e
ral
sp
eci
ficat
ions
that
are
widely
us
e
d
in
t
he
c
om
m
un
it
y
has
not
bee
n
widely
us
e
d.
T
his
is
because
no
on
e
has
m
entione
d
that
j
um
bo
fr
am
es
can
r
un
on
tu
nnel
m
edia.
Me
anwhil
e,
f
or
co
m
m
un
ic
at
ion
be
tween
tw
o
or
m
or
e
offices
that
re
qu
i
re
a
la
r
ge
da
ta
connecti
on
[48]
-
[52]
,
tu
nnel
m
edia
can
be
us
ed
by
m
axim
iz
ing
the
r
unning
tro
ughput.
by
i
ncr
easi
ng
the
MTU
value
on
the
tu
nn
el
c
on
necti
on,
the
nu
m
ber
of
pac
kets
sent
is
reduc
ed
s
o
that
the
netw
ork
str
uctur
e
th
at
will
be
ca
rri
ed
out
in
the
te
st
is
to
buil
d
a
n
e
w
netw
ork,
co
ns
ist
in
g
of
4
com
pu
te
rs
co
nnect
ed
by
3
router
un
it
s
with
diff
e
re
nt
netw
ork
a
ddresses
,
then
the
r
ou
te
r
will
be
arr
a
ng
ed
s
o
that
the
co
nnec
ti
on
betwee
n
c
om
pu
te
r
r
unni
ng
us
i
ng
tu
nn
e
l
m
edia.
Ther
e
are
th
ree
pa
ra
m
et
ers
us
ed
in
te
sti
ng
this
jum
bo
f
ra
m
e,
nam
ely
MTU
1500
byte
s,
MT
U
400
by
te
s
and
MTU
9000
byte
s,
a
nd
MTU
pa
ra
m
et
ers
above
9000
by
te
s
cannot
be
pe
rfor
m
ed,
beca
us
e
the
de
vice
is
no
t
ca
pab
le
,
then
forw
a
r
d
the
co
nnect
ion
m
ad
e
is usin
g
t
he
tra
ns
m
issi
on
cont
ro
l
protoc
ol
(
T
CP
)
protoc
ol.
2.
RESEA
R
C
H
PROP
OSE
D
METHO
D
In
this
w
ork,
ne
twork
m
od
el
ing
will
be
carr
ie
d
ou
t
by
buil
ding
a
seven
-
node
c
onnecti
on
us
ing
th
ree
routers
an
d
f
our
com
pu
te
rs
,
at
the
e
nd
of
t
he
netw
ork
t
he
re
will
be
a
c
om
pu
te
r
with
W
i
ndows
an
d
Linux
op
e
rati
ng
syst
em
s.
At
the
tim
e
of
te
sti
ng,
da
ta
traff
ic
will
be
captu
re
d
usi
ng
the
W
i
res
ha
rk
a
pp
li
cat
ion,
with
this
app
li
cat
io
n
it
will
be
seen
how
m
any
tro
ughputs
are
runn
i
ng,
how
m
any
pack
et
s
are
sent,
ho
w
m
any
pack
et
s
are
l
ost
an
d al
so t
he ji
tt
er th
at
occ
urs
dur
i
ng transm
i
ssion.
The
te
sti
ng
te
chn
i
qu
e
is
tha
t
there
are
tw
o
com
pu
te
r
de
vices
co
nn
ect
e
d
to
a
com
pu
te
r
netw
ork
,
connecte
d
by
three
r
oute
rs
w
il
l
send
data
usi
ng
a
traf
fic
-
ge
ner
at
or
ap
plica
ti
on
cal
le
d
iperf
,
a
nd
run
f
or
10
seco
nd
s
on
eac
h
te
st,
t
he
prot
oco
l
us
e
d
i
n
t
he
thr
ough
pu
t
te
st
is
TCP
c
ompu
te
rs
t
hat
are
us
e
d
us
in
g
Wi
ndows
and
Li
nux
op
e
rati
ng
syst
em
s.
The
te
sti
ng
is
done
by
sen
din
g
data
f
ro
m
a
com
pu
te
r
wit
h
the
sam
e
operati
ng
syst
e
m
,
then
acro
s
s
operati
ng
syst
em
s.
The
netw
ork
str
uc
ture
us
ed
us
e
s
2
m
et
ho
ds
,
t
he
fir
st
is
the
netw
or
k
that i
s con
nected
directl
y usi
ng a ca
ble on e
ach
dev
ic
e,
as
show
n
i
n
Fi
gur
e 1
.
Figure
1. Direc
t connect
io
n w
it
ho
ut t
unnel m
edia
The
n
the
seco
nd
net
wor
k
m
et
hod,
t
he
c
onnecti
on
is
m
ade
us
in
g
t
unneli
ng
on
t
he
r
oute
r
de
vice,
s
o
that
routers
1
a
nd
2
a
re
directl
y
con
necte
d
usi
ng
t
he
tu
nn
el
m
et
ho
d.
As
show
n
in
Fig
ur
e
2.
Tec
hnic
al
te
sti
ng
is
done
li
ke
wh
e
n
te
sti
ng
a
co
nn
ect
io
n
without
us
in
g
a
tu
nn
el
,
na
m
el
y
by
sendi
ng
t
raffic
bet
ween
2
com
pu
te
rs,
for
the
ty
pe
of
t
un
nel
us
e
d
is
IP
IPv6
tu
nn
el
,
by
encap
s
ulati
ng
the
IP
pac
ket
in
the
IP
pac
ke
t
then
sen
ding it
into
the n
et
wor
k
to
ano
t
her r
ou
te
r by u
sin
g
I
Pv6
[
53
]
-
[
57
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
2502
-
4752
An
alysis of
I
P
v
6
ju
m
bogra
m
packa
ges
tra
nsmissi
on
us
in
g
j
umb
o…
(
Yahy
a Hid
aya
t
ullah
)
331
Figure
2. Co
nnect
ion
us
in
g
a
tunnel
3.
RES
ULTS
A
ND AN
ALY
S
IS
Connect
io
n
te
sti
ng
betwee
n
the
sam
e
op
era
ti
ng
syst
e
m
s
a
nd
betwee
n
op
erati
ng
syst
em
s
is
carried
ou
t
to
m
easur
e
network
p
er
form
ance
us
ing
jum
bo
fr
am
es.
Ther
e
are
tw
o
te
sts,
nam
ely
testing
with
ou
t
usi
ng
a
tunnel an
d
te
sti
ng usi
ng a t
unne
l.
3.1
.
The
perf
orm
an
ce w
ith
out tunnel
Test
s
with
the
sam
e
W
in
dow
s
operati
ng
sys
tem
hav
e
been
carried
out
us
i
ng
the
I
perf
a
ppli
cat
ion
for
10
sec
onds
,
th
en
W
i
res
hark
captu
res
t
he
da
ta
sent
a
nd
rec
ei
ved
a
fter
I
pe
rf
r
un
s
f
or
10
seco
nd
s
,
as
s
how
n
i
n
Figure
3,
the
da
ta
that
has
be
en
rec
orde
d
by
W
ires
hark.
I
n
Figure
3
,
t
he
resu
lt
s
of
te
sti
ng
us
i
ng
a
co
m
pu
te
r
with
the
W
i
nd
ows
operati
ng
syst
e
m
are
sh
own
.
W
it
h
a
n
MTU
of
40
00
byte
s,
the
res
ul
ti
ng
thr
ough
put
is
the
MTU
with
the
la
rg
est
th
rou
ghpu
t
of
91
4
Mb
ps
.
Test
s
s
how
that
the
gr
eat
e
r
the
MT
U
us
e
d,
t
he
fe
wer
pa
ckets
sent f
or the nu
m
ber
o
f
pack
et
s sen
t for 1
0
se
conds
. W
he
n
usi
ng
MTU
1500 b
yt
es, the
total
n
um
ber
o
f
pa
ckets
sent
is
633,7
85
pack
et
s
,
a
nd
if
MT
U
4000
byte
s
is
us
e
d,
it
can
se
nd
28
8,580
pac
kets
and
MTU
9000
byte
s
has
se
nt
121,7
45 p
ac
kets.
Figure
3. Test
ing
W
i
ndows
w
it
ho
ut t
unnels
In
W
i
ndows
te
sti
ng
,
wh
e
n
usi
ng
MT
U
4000
byte
s,
the
m
os
t
pac
ket
loss
occurre
d,
the
r
e’r
e
on
ly
19
pack
et
lo
ss.
F
ur
t
her
m
or
e,
th
e
j
it
te
r
te
st
that
occu
r
s
duri
ng
te
sti
ng
s
how
s
that
the
la
rger
the
pac
ket
s
ent,
th
e
gr
eat
er
the
j
it
te
r
val
ue
s
.
Like
wise,
the
tim
e
sp
a
n
ha
s
al
so
s
how
n
re
su
lt
s
t
hat
are
not
di
fferent
from
j
it
ter
,
the
la
r
ger the
pac
ke
t si
ze sent, t
he
longe
r
it
takes
.
In
Fig
ur
e
4,
th
e
te
st
on
t
he
L
inux
op
e
rati
ng
syst
e
m
sh
ows
that
the
fell
ow
Lin
ux
op
e
ra
ti
ng
syst
em
platfo
rm
s
are
no
t
a
ble
to
se
nd
pack
et
s
with
an
MT
U
of
m
or
e
tha
n
9000
byte
s.
S
o
t
hat
the
us
e
of
MT
U
40
00
byte
s h
as
s
how
n resu
lt
s
with t
he greatest
th
r
oughput,
w
hich
is e
qual
to 9
55 M
bp
s
. T
he n
um
ber
of
packet
s that
can
be
sent
is
al
so
getti
ng
le
ss,
f
or
MT
U
9000
byte
s
the
pa
cket
sent
is
th
e
value
of
t
he
pack
et
that
wa
s
sent
from
et
her
net
bu
t
fail
ed
to
s
end
so
t
he
value
is
ve
ry
sm
a
ll
.
In
te
sti
ng
L
inux
an
d
Li
nux
,
MT
U
4000
byte
s
shows
that
t
he
te
st
do
e
s
no
t
pro
duce
a
pac
ke
t
loss
great
er
t
han
MT
U
1500
byte
s,
le
ss
pa
cket
los
s
that
occurs
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
2
4
, N
o.
1
,
Oct
o
ber
20
21
:
329
-
337
332
on
ly
4
pac
kets.
howe
ver,
the
j
it
te
r
at
the
4000
byte
s
MTU
sti
ll
occu
rs
and
s
how
s
a
hi
gh
e
r
num
ber
than
t
he
1500
byte
s MT
U,
with a
v
al
ue
of
0.037
4
m
s.
The
us
e
of
t
he
4000
byte
s
MTU
ti
m
e
sp
an
has
s
how
n
that
in
a
dd
it
io
n
to
pro
du
ci
ng
a
la
r
ger
thr
oughput,
t
he
transm
issi
on
ti
m
e
can
al
so
be
faster
,
s
o
t
hat it
is
un
a
ble
to
s
end
pac
kets w
i
th
an
MT
U
of
m
or
e
than
9000
byte
s.
S
o
that
the
use
of
MTU
40
00
has
sho
wn
r
esults
with
t
he
gr
eat
est
th
rou
ghput,
w
hich
is
equ
al
to
955
Mb
ps
.
In
te
sti
ng
Lin
ux
to
Li
nux
,
th
e
us
e
of
4000
byte
s
MTU
did
not
re
su
lt
in
a
pac
ket
loss
gr
eat
e
r
than
MT
U
15
00
byte
s,
the
pack
et
los
s
wa
s
le
ss,
only
4
pack
et
s
.
I
n
the
us
e
of
MTU
4000
byte
s,
j
it
te
r
sti
l
l
occurs
a
nd
sti
ll
sh
ows
a
hi
gher
num
ber
than
MTU
1500
byte
s,
w
hich
i
s
equ
al
to
the
value
of
0.037
4
m
s.
Me
anwhil
e,
th
e
tim
e
sp
an
sh
ows
that
us
i
ng
a
n
MT
U
of
4000
byte
s,
in
ad
diti
on
to
producin
g
a
la
rg
er
thr
oughput,
dat
a transm
issi
on
has
al
s
o
s
how
n t
hat the t
ran
s
m
issi
on
tim
e is al
so
faster.
Figure
5
s
how
s
the
res
ults
of
cr
os
s
-
operati
ng
syst
em
s
te
stin
g
with
the
te
s
t
m
et
ho
d
with
ou
t
us
i
ng
a
tunnel
betwee
n
the
Lin
ux
a
nd
W
in
dow
s
op
erati
ng
syst
em
s.
The
res
ults
of
these
te
sts
s
how
that
the
la
rg
est
thr
oughput
ge
ner
at
e
d
is
MT
U
4000
byte
s,
the
num
ber
of
pac
ket
s
se
nt
for
MT
U
use
is
9000
byte
s,
nam
ely
126,1
67
pac
ka
ges
pe
r
te
st
whic
h
is
the
le
ast
pack
et
deliver
y.
The
great
er
the
MTU
use
d,
the
le
ss
pack
e
t
loss
that occ
ur
s
, by
us
in
g
a
n
MT
U of
9000
byte
s, packet l
os
s
doe
s not o
cc
ur.
H
oweve
r, t
he jit
te
r
that
occurs is
that
the
great
er
t
he
MTU
the
great
er
the
j
it
te
r
tha
t
occurs.
A
nd
the
ti
m
e
sp
an
a
lso
s
hows
res
ul
ts
li
ke
j
it
te
r,
wh
e
re
the great
er t
he M
TU,
t
he grea
te
r
the s
pa
n
tha
t occurs
.
Figure
4. Test
ing
Lin
ux
-
Li
nux
without t
un
ne
ls
Figure
5.
Lin
ux
-
Win
dows
te
s
t
ing
without t
unnels
3.2.
Tu
nneli
n
g testin
g
The
sec
ond
st
age
of
te
sti
ng
is
carried
out
us
in
g
a
netw
ork
m
od
el
that
has
a
tunnel
li
nk
in
the
connecti
on
bet
ween
the
route
rs
us
e
d.
T
hr
ee
te
sts
wer
e
car
ried
out,
the
fi
rst
and
sec
ond
te
sts
us
ed
the
sa
m
e
op
e
rati
ng syst
e
m
, th
en
the thi
r
d
te
st
was
c
ro
s
s
-
te
sti
ng b
et
we
en
W
i
ndows
a
nd
Lin
ux
op
e
ra
ti
ng
syst
em
s.
Figure
6 has s
how
n
t
he
p
e
rfor
m
ance
te
sti
ng
of
Win
dows
-
W
i
ndow
s
via t
unnel.
T
he results
of th
e analy
sis are
.
In
Fig
ur
e
6,
t
he
tu
nn
el
networ
k
is
us
e
d
i
n
the
first
te
st
on
t
he
sam
e
W
i
ndows
oper
at
ing
syst
em
.
The
te
st
res
ults
show
that
f
or
the
great
est
thr
oughput
is
to
use
the
MT
U
40
00
byte
s.
Me
a
nwhile
,
the
sm
al
le
st
total
nu
m
ber
of
pac
kets
wh
e
n
sent
in
one
te
st
us
ing
MT
U
is
9000
byte
s,
w
hich
is
10
6,494
pac
ka
ge
s.
The
re
wer
e
only
3
pa
cket
loss
that
oc
curred
durin
g
th
e
te
st,
wh
en
us
in
g
MTU
40
00
byte
s.
The
n
fo
r
j
it
te
r
sh
ow
s
that
the
la
rg
er
the
pack
et
sent,
th
e
gr
eat
er
the
r
esulti
ng
j
it
te
r.
Wh
e
n
us
i
ng
th
e
4000
byte
s
MTU,
the
tim
e
sp
an
shows t
he fast
e
st t
i
m
e a
m
on
g othe
r
MT
Us,
it
is at 1
0.2
026
s
econds
.
Figure
6. Tu
nn
e
li
ng
W
i
ndows
to
W
i
ndows
te
sti
ng
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
2502
-
4752
An
alysis of
I
P
v
6
ju
m
bogra
m
packa
ges
tra
nsmissi
on
us
in
g
j
umb
o…
(
Yahy
a Hid
aya
t
ullah
)
333
In
t
he
ne
xt
te
st
is
te
sti
ng
on
t
he
sam
e
Linu
x
op
e
rati
ng
syst
e
m
,
as
show
n
i
n
Fig
ure
7
.
T
he
te
st
resu
lt
s
show
that
the
la
rg
est
t
hro
ughput
is
the
one
us
in
g
t
he
MT
U
4000
byte
s,
w
hile
the
9000
by
te
s
MTU
s
ho
ws
t
hat
the
syst
e
m
can
no
t
se
nd
data,
because
the
op
erati
ng
syst
em
is
un
able
se
nds
a
pack
et
la
rger
than
the
M
TU
of
900
byte
s.
F
ig
ur
e
7
s
hows
th
at
the
nu
m
ber
of
pac
kets
sent
us
ing
the
MT
U
of
4000
byte
s
is
a
total
of
299,8
77
pack
et
s
.
The
di
ff
ere
nce
of
1
pack
et
loss
is
show
n
in
the
us
e
of
MTU
1500
byte
s
an
d
MTU
9000
by
te
s.
The
j
it
te
r
that
occurs
is
sti
ll
gr
eat
er
for
the
us
e
of
a
la
r
ger
MTU
as
well
.
Me
anwhil
e,
the
tim
e
sp
an
a
t
MTU
4000
byte
s h
as
sho
wn a
value
sm
aller th
an M
TU 150
0 byt
es.
Figure
7.
Lin
ux
tu
nnel
ing
to
Linux
te
sti
ng
The
la
st
te
st
was
car
ried
out
betwee
n
cr
os
s
-
platf
or
m
op
erati
ng
syst
e
m
s,
W
indo
ws
and
Li
nux
as
show
n
i
n
Fig
ure
8
.
The
te
st
r
esults
s
how
th
at
the
th
r
ough
pu
t
can
r
un
optim
a
ll
y
us
ing
the
MT
U
4000
byte
s,
and
the
total
num
ber
of
pac
ke
ts
gen
erate
d
in
on
e
te
st
us
in
g
the
4000
byt
es
MTU
is
264,9
43
pack
a
ges
.
Wh
il
e
pack
et
loss
usi
ng
MT
U
4000
byte
s
in
this
t
est
do
es
not
oc
cur,
for
the
j
i
tt
er
is
st
il
l
the
sam
e
as
the
previo
us
te
st
resu
lt
s,
wi
th
the
us
e
of
a
la
rg
e
r
MT
U
it
will
pro
duce
a
great
er
j
it
te
r,
an
d
the
r
es
ulti
ng
ti
m
e
sp
an
show
s
that i
n
the
use
of 90
00 b
yt
es
MTU ,
this test
h
as
sho
wn the
low
e
st val
ue.
Figure
8. Tu
nn
el
ing
Li
nux
t
o
W
i
ndows
te
sti
ng
3.3.
Tr
affic o
n mikr
ot
ik
Re
trie
val
of
t
r
aff
ic
data
t
hat
passes
t
hro
ugh
the
m
ikro
ti
k
is
not
in
acc
ord
ance
with
the
MTU
that
is
set
,
on
a
m
ikro
ti
k
pack
et
siz
e
that
is
m
or
e
than
1500
byte
s
will
be
fr
agm
ented
into
sm
al
l
pack
et
s
with
a
siz
e
of
1500
byte
s
il
lustrate
d
in
F
igure
9.
In
Fig
ur
e
9
sho
ws
th
e
res
ults
of
th
e
te
sts
that
ha
ve
been
car
rie
d
ou
t
,
com
pu
te
r
1
se
nds
a p
acket
to co
m
pu
te
r
2
going
t
hro
ugh
se
ve
ral
m
ikro
ti
k
r
ou
te
rs,
the jum
bo
size
of
t
he
pack
et
that
com
es
ou
t
of
c
om
pu
te
r
1
is
received
by
router
1,
t
hen
f
ro
m
ro
ute
r
1
th
e
pack
et
is
fr
a
gm
ented
into
a
s
m
a
l
l
siz
e,
then
sent
to
to
router
3
a
nd
procee
d
t
o
router
2,
a
fter
the
pac
ket
is
r
ecei
ved
by
r
ou
te
r
2,
the
siz
e
of
t
he
pack
et
w
hich
w
as previ
ou
sly
bro
ke
n
dow
n
i
nto
sm
all
pieces
is returne
d
ba
ck
t
o
it
s o
ri
gina
l
siz
e
an
d
c
on
ti
nu
es
sen
ding
the
pa
cket
to
com
pu
t
er
2,
t
he
rese
nd
pac
ket
an
d
l
os
t
se
gm
en
wi
ll
sh
ow
in
Fig
ur
e
10.
I
n
Fig
ur
e
10
shows
the
se
ndin
g
of
jum
bo
pack
et
s
bet
w
een
m
ikro
ti
k,
pack
et
f
rag
m
entat
ion
occ
urs,
the
fr
agm
entat
ion
process
cause
s
pack
et
l
os
s
bet
ween m
ikro
ti
ks so
that
perfor
m
ance and th
r
oughput
decr
ea
se.
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
2
4
, N
o.
1
,
Oct
o
ber
20
21
:
329
-
337
334
Figure
9. Pac
ka
ge
fr
a
gm
entation
on the
m
ikro
ti
k
Figure
10. Sen
ding
pack
et
bet
ween m
ikro
ti
k
4.
CONCL
USSI
ON
Test
s
carrie
d
ou
t
betwee
n
c
om
pu
te
r
de
vic
es
us
in
g
a
net
wor
k
syst
em
without
usi
ng
a
tunnel
an
d
us
in
g
a
tu
nn
el
has
bee
n
done.
The
te
st
res
ults
sho
w
t
hat
the
us
e
of
4000
by
te
s
MTU
ca
n
pro
du
ce
the
gr
eat
est
thr
oughput
in
sen
ding
data
on
t
he
sam
e
o
per
at
in
g
syst
em
and
acr
os
s
op
e
rati
ng
syst
e
m
s.
The
num
ber
of
pack
a
ges
se
nt
ind
ic
at
es
that
t
he
gr
eat
e
r
the
MTU
us
e
d,
the
few
er
the
nu
m
ber
of
pack
a
ges
sent.
S
o
th
is
40
00
byte
s
MTU
is
ideal
for
r
unni
ng
on
the
IPv
6
platfo
rm
.
The
a
m
ou
nt
of
pa
cket
loss
t
hat
occurs
durin
g
t
he
te
st
do
e
s
not
al
way
s
ind
ic
at
e
that
the
use
of
a
la
r
ge
MTU
is
bo
und
to o
ccu
r
with
a
la
rg
e p
acket l
os
s,
or
v
ic
e
ve
rsa.
The
occ
urre
nc
e
of
pack
et
los
s
dep
e
nds
on
t
he
rea
din
ess
of
al
l
con
nected
dev
ic
es
,
if
ther
e
are
de
vices
that
are
no
t
rea
dy to re
cei
ve
the
pac
ke
t, then pac
ket
loss
will
o
ccu
r durin
g
tra
ns
m
i
ssion.
The
data s
how
s that the g
reat
er th
e MTU
use
d,
the
gr
eat
e
r
the j
it
te
r
value a
nd
Jit
te
r occu
rs
beca
us
e i
t
is
influ
e
nce
d
by
the
am
ou
nt
of
MT
U
us
e
d.
The
us
e
of
a
la
rg
e
r
MT
U
s
hows
that
it
can
r
edu
ce
the
ti
m
e
s
pa
n
value, s
o
that
pe
rfor
m
ance is
bette
r.
T
he
a
na
log
y i
n usi
ng jum
bo
fram
es i
n
e
ver
y
day li
fe is like se
nd
i
ng good
s
by
ente
rin
g
i
nto
a
la
rger
siz
e
box,
wh
e
n
t
he
box
siz
e
is
sm
al
l,
the
s
hippin
g
process
will
ta
ke
lo
nger,
w
her
eas
by
us
in
g
a
la
rger
box,
the
nu
m
ber
of
goods
sent
can
be
re
du
ce
d,
s
o
that
the
sh
ip
ping
pr
ocess
ca
n
run
faster,
bu
t
inc
reasin
g
the
siz
e
of
the
box
does
no
t
a
lway
s
m
ake
the
delivery
of
goods
fa
ste
r,
e
nl
arg
in
g
the
s
hip
pi
ng
m
edium
m
us
t
be
a
dju
ste
d
to
the
m
axi
m
u
m
capaci
ty
of
the
trans
port
m
ed
ium
,
becau
se
se
nd
i
ng
pac
ka
ge
s
with
siz
es that exce
ed
the
capacit
y o
r
are
to
o
la
r
ge
can
al
s
o red
uc
e p
e
rfor
m
ance when deli
ve
r
y of g
oods.
T
h
e
u
s
e
o
f
j
u
m
b
o
f
r
a
m
e
s
u
s
i
ng
a
m
i
k
r
o
t
i
k
i
s
l
e
s
s
e
f
f
e
c
t
i
v
e
,
e
v
e
n
t
h
o
u
g
h
i
t
p
r
o
d
u
c
e
s
a
l
a
r
g
e
r
t
h
r
o
u
g
h
p
u
t
w
h
e
n
u
s
i
n
g
t
h
e
M
T
U
4
0
0
0
,
b
u
t
t
h
e
r
e
i
s
f
r
a
g
m
e
nt
a
t
i
o
n
i
n
t
h
e
p
a
c
k
e
t
s
p
a
s
s
i
n
g
t
h
r
o
u
g
h
t
h
e
m
i
k
r
o
t
i
k
b
e
c
a
us
e
t
h
e
p
a
c
k
e
t
p
a
s
s
i
n
g
t
h
r
o
u
g
h
t
h
e
m
i
k
r
o
t
i
k
i
s
s
p
l
i
t
i
n
t
o
1
5
0
0
b
y
t
e
s
i
z
e
s
.
I
n
t
h
e
f
u
t
u
r
e
,
f
r
o
m
t
h
e
r
e
s
u
l
t
s
o
f
t
h
e
r
e
s
e
a
r
c
h
c
o
n
d
u
c
t
e
d
,
i
t
c
a
n
s
t
i
l
l
b
e
d
e
v
e
l
o
p
e
d
t
o
f
i
n
d
be
t
t
e
r
t
e
s
t
v
a
l
u
e
s
a
n
d
a
c
c
u
r
a
c
y
,
b
y
u
s
i
n
g
a
t
u
n
n
e
l
m
e
t
h
o
d
o
t
h
e
r
t
h
a
n
IP
I
P
v
6
,
t
h
e
n
i
n
n
e
t
w
o
r
k
d
e
s
i
g
n
i
t
c
a
n
c
om
bi
n
e
f
r
o
m
di
f
f
e
r
e
n
t
t
e
s
t
l
o
c
a
t
i
o
n
s
o
n
a
w
i
d
e
r
s
c
a
l
e
.
REFERE
NCE
S
[1]
A.
Sali
h,
“
An
ada
pti
ve
appr
o
ach
to
det
ec
t
ing
beha
viour
al
cove
r
t
cha
nnel
s
in
IPv6
,”
Notti
ngh
am
Tre
nt
Univer
si
t
y
,
2017.
[2]
M.
Leinonen
,
“
L
a
y
er
2
e
the
rne
t c
om
m
unic
at
ion
tu
nnel
ing
poss
ibi
litie
s in
au
tomati
o
n
s
y
st
ems
,
”
201
7.
[3]
G.
Nac
i
and
D.
Haji
,
“
D
y
namic
Beha
vior
Ana
l
y
s
is
of
AN
FIS
Bas
ed
MP
PT
Control
le
r
for
Standal
one
Photovolt
aic
S
y
stems
,
”
In
t. J.
Re
n
ew. E
nergy
Re
s.
,
vol
.
10
,
no
.
1,
pp.
101
-
108,
2020.
[4]
X.
Chen,
H.
Kim
,
J.
M.
A
m
an,
W
.
Chang,
M.
Le
e
,
and
J.
Rexfor
d,
“
Mea
suring
tc
p
round
-
tri
p
ti
m
e
in
the
dat
a
pla
ne
,
”
in
Proc
e
edi
ngs
of
the
W
orkshop
on
Secur
e
Program
mable
Ne
twork
Inf
ras
truct
ure
,
202
0,
pp.
35
-
41,
do
i:
10.
1145/340566
9.
3405823.
[5]
T.
Kato
,
X.
Yan,
R.
Yam
amoto,
and
S.
Ohza
hata,
“
A
Study
on
Round
-
tri
p
Ti
m
e
Esti
m
at
ion
fro
m
Unidire
ct
ion
a
l
Packe
t
Trace
s
U
sing
Diffe
ren
t
T
CP
Congesti
on
Control
Algorit
h
m
s,”
Int.
J.
Adv
.
Net
works
Serv
.
,
vol.
12
,
no
1
-
2
,
2019
.
[6]
M.
Zha
ng
et
al
.
,
“
W
il
l
TCP
work
in
mmW
ave
5G
ce
ll
ul
ar
net
work
s
?
,
”
IEEE
Comm
un.
Mag.
,
vol
.
57,
no.
1,
pp.
65
-
71,
2019
,
doi
:
10
.
1109/MCOM
.
2018.
1701370.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
2502
-
4752
An
alysis of
I
P
v
6
ju
m
bogra
m
packa
ges
tra
nsmissi
on
us
in
g
j
umb
o…
(
Yahy
a Hid
aya
t
ullah
)
335
[7]
D.
H.
Hagos,
P.
E.
Engelstad,
A.
Yaz
id,
and
C
.
Griwodz,
“
A
De
ep
Learni
ng
Approac
h
to
D
y
n
a
m
ic
Pass
ive
RT
T
Predic
ti
on
Mod
el
for
TCP,”
in
2019
IEE
E
38
th
Inte
rnational
Pe
rform
ance
Computing
and
Comm
unic
ati
ons
Confe
renc
e
(
IPCCC)
,
2019,
pp.
1
-
10,
doi
:
10
.
110
9/IPCCC47392.2019.
8958727.
[8]
I.
Maslouhi
,
E
.
M.
Ar
Re
y
ouch
i,
K.
Ghoum
id,
an
d
B.
Kaou
ta
r,
“
A
naly
sis
of
end
-
to
-
end
p
ac
ke
t
de
lay
for
Inte
rn
et
o
f
Thi
ngs i
n
wire
l
e
ss
comm
unic
at
io
ns,”
Int
.
J. A
d
v.
Comput.
Sc
i. A
p
pl.
,
vol
.
9
,
no
.
9
,
pp.
338
-
343
,
20
18.
[9]
J.
Cric
higno,
Z
.
Csibi,
E.
Bou
-
Harb,
and
N.
Ghani,
“
Im
pac
t
of
se
gm
ent
size
and
par
al
l
el
stre
ams
on
TC
P
BBR,”
in
2018
41st
Inte
rnational
Confe
r
enc
e
on
Tel
ec
o
mm
unic
ati
ons
and
Signal
Proc
essing
(
TSP
)
,
2
018,
pp.
1
-
5,
d
oi
:
10.
1109/T
SP
.
20
18.
8441250.
[10]
H.
Ahm
ed,
M.
J.
Ars
had,
S.
Muham
m
ad,
S.
Ah
m
ad,
and
A.
H.
Za
hid
,
“
Queue
l
engt
h‐ba
sed
lo
a
d
bal
ancing
in
d
at
a
ce
nt
e
r
ne
tworks,
”
Int
.
J. Commun.
Syst
.
,
vol
.
33
,
no.
14
,
p
.
e4472
,
2020,
doi: 10.
10
02/da
c
.
4472.
[11]
B.
Preve
z
e,
“
A
novel
m
et
hod
f
or
per
form
anc
e
improvem
ent
of
slow
start
cong
esti
on
con
trol
m
et
hod
in
pac
k
e
t
sw
it
che
d
n
et
wor
ks,”
Uludağ
Uni
v.
J. F
a
c. E
ng.
,
v
ol.
24
,
n
o
.
3
,
pp
.
451
-
468,
2019
,
doi:
10
.
17482/u
um
fd.
644387.
[12]
S.
Nara
y
an
an
d
P.
R.
Lut
ui,
“
TCP/IP
Jumbo
Fram
es
Network
Perform
a
nce
Evaluation
on
A
Te
st
-
bed
Infra
struct
ur
e,”
I
nt.
J. W
irel.
M
icr
ow.
Technol.
,
v
ol.
2
,
no
.
6
,
pp
.
2
9
-
36,
2012
,
doi
: 10.5815/
ij
wm
t.
2
012.
06.
05
.
[13]
J.
Hurw
it
z
and
W
.
Feng,
“
Init
ia
l
end
-
to
-
end
pe
rf
orm
anc
e
evalua
t
ion
of
10
-
Gigabit
Et
her
n
et,”
in
1
1th
Symposium
on
High
Pe
rform
an
ce
In
te
rconn
ec
ts
,
2003
.
Proc
ee
d
i
ngs.
,
2003
,
pp
.
1
16
-
121,
doi
:
1
0
.
1109/CONECT.2003.1231487.
[14]
P.
Joubert,
R.
B
.
King,
R.
Neve
s,
M.
Russ
inovi
ch,
and
J.
M.
T
rac
e
y
,
“
High
-
Pe
rform
anc
e
Mem
or
y
-
Bas
ed
W
eb
Serve
rs:
Kerne
l and
Us
er
-
Space
Perform
anc
e,”
i
n
USENIX
Annual
Techni
cal
Co
nfe
renc
e,
Gene
r
al
Tr
ack
,
2001,
pp.
175
-
187.
[15]
S.
Pr
apt
odi
y
ono,
A.
S.
Pram
udy
o
,
and
R.
Sofhan
,
“
The
Im
pac
ts
of
Tra
nsm
it
ti
ng
I
Pv6
Packe
ts
Us
ing
Jum
bo
Fram
e
on
The
Network
Perform
anc
e
,
”
i
n
PR
OCE
EDINGS
The
4th
In
te
r
nati
onal
Con
fe
r
enc
e
on
Basi
c
S
ci
en
ce
s
2018:
The
Dev
el
opmen
t
of
Sci
en
ce
s and
Te
chnol
ogy
in
Imp
rov
ing
Natural
a
nd
Cult
ural
Re
s
ource
s
,
2019
.
[16]
P.
Gra
y
and
A
.
Bet
z
,
“
Perform
anc
e
ev
al
u
at
ion
o
f
coppe
r
-
b
ase
d
giga
bit
et
h
ern
et
int
erf
ac
es,
”
in
2
7th
Annual
I
EEE
Confe
renc
e
on
Local
Comput
er
Net
works,
2002
.
Proce
ed
ings.
LC
N
2002.
,
2002,
p
p.
679
-
690
.
[17]
R.
Sofhan,
R.
F
ahr
izal,
and
A.
Os
m
an,
“Per
form
anc
e
evalua
t
io
n
of
IPv6
jumb
ogra
m
pac
ket
s
t
ran
sm
ission
usin
g
jumbo
fra
m
es,
”
in
2017
4th
Inte
rnational
C
onfe
renc
e
on
El
ectric
al
Enginee
ring,
Comp
ute
r
Sci
en
ce
a
nd
Informatic
s (
EECSI)
,
2017,
pp
.
1
-
5,
doi
:
10
.
110
9/E
ECSI.2017
.
8
2
39188.
[18]
Y.
W
u,
S.
Kum
ar,
and
S.
-
J.
Park,
“
Mea
surem
ent
and
per
form
an
ce
issues
of
tr
ansport
proto
col
s
ove
r
10áGbps
high
-
spee
d
opt
ic
a
l
n
etw
orks,”
Comput.
Net
works
,
vol
.
5
4,
no
.
3
,
pp
.
475
-
488,
2010
,
doi
: 10.1016/
j
.
comne
t.
2009.
09
.
017.
[19]
Y.
W
u,
S.
Kum
ar,
and
S.
-
J.
Park
,
“
On
tra
nsport
protoc
ol
pe
rform
anc
e
m
ea
surem
en
t
over
10gbps
hi
gh
spee
d
opti
c
al
net
works
,
”
in
2
009
Proce
edi
ng
s
of
18th
Inte
rnational
Confe
r
e
nce
on
Compute
r
Comm
unic
ati
ons
and
Net
works
,
2009,
pp
.
1
-
6
,
d
oi:
10
.
1109/ICC
CN.2009.
52352
38.
[20]
L.
Valcare
ngh
i,
K.
Kondepu,
an
d
P.
Castol
di,
“
Ti
m
e
-
ver
sus
size
-
base
d
CP
RI
in
Et
her
net
enc
ap
sulat
ion
for
next
gene
ra
ti
on
rec
on
figura
bl
e
fronth
aul
,
”
IEE
E
/OSA
J.
Opt.
Comm
u
n.
Net
w.
,
vol.
9,
no.
9,
pp.
D64
-
D73,
2017,
doi:
10.
1364/JOCN
.
9.
000D64.
[21]
M.
J.
Christe
nse
n
and
T.
R
ic
h
t
e
r,
“
Achie
ving
r
e
li
able
UD
P
tra
n
sm
ission
at
10
Gb/s
using
BS
D
socke
t
for
da
ta
ac
quisit
ion
s
y
s
tem
s,”
J. I
nstrum
.
,
vol. 15, no. 9, p. T
09005,
2020.
[22]
A.
Custura
,
G.
Fairhurst,
and
I.
L
ea
rm
onth,
“
Exp
l
oring
usabl
e
Pat
h
MTU
in
the
In
te
rne
t
,
”
in
2018
Net
work
Tr
a
ff
i
c
Me
asur
eme
nt
an
d
Analysis Confer
enc
e
(
TMA)
,
20
18,
pp
.
1
-
8
,
doi
: 10.23919/
TMA.
2018.
8506538.
[23]
T.
La
ckor
z
y
nski
,
G.
Gar
te
n
,
J.
S.
Hus
te
r,
S.
Kops
el
l,
and
H.
Hart
ig,
“
Ena
bling
and
Optimiz
ing
MA
Csec
fo
r
Industria
l
Envi
ro
nm
ent
s,”
IE
EE Tr
ans.
Ind.
In
formatic
s
,
vo
l. 17,
no.
11
,
2020
,
doi
:
10.
1109
/T
II
.
20
20.
3040966.
[24]
D.
W
ang
and
B.
Hua,
“
ZCop
y
-
Vhos
t:
Repl
acin
g
Data
Cop
y
W
i
th
Page
Remapping
in
Virtua
l
P
ac
ke
t
I/O,
”
IE
E
E
Ac
c
ess
,
vol
.
7
,
p
p.
51047
-
51057
,
2019,
doi: 10.
11
09/ACCESS
.
2019.
2911905.
[25]
N.
M.
Garc
ia,
“
The
Inte
rn
e
t
Protocol
--
Past
,
som
e
cur
ren
t
li
m
itati
ons
and
a
glim
pse
of
a
pos
sible
future,”
arX
iv
Prepr.
arXi
v210
4.
01406
,
2021.
[26]
T.
Järv
i, “La
y
er
2
Soluti
ons i
n
A
cc
ess Provide
r
N
et
works
,
”
2020.
[27]
Y.
Song,
Y.
W
a
ng,
P.
Bul
l,
and
J.
D.
Re
iss,
“
Perform
anc
e
ev
al
ua
ti
on
of
a
new
f
lexible
ti
m
e
divi
si
on
m
ult
ipl
ex
in
g
protoc
ol
on
m
ixe
d
tra
ffi
c
t
y
p
es,
”
in
2017
I
EE
E
31st
Int
ernati
onal
Confe
r
enc
e
on
Ad
van
ce
d
Informatio
n
Net
working
and
Appl
ic
a
ti
ons (
AI
NA)
,
2017,
pp
.
2
3
-
30,
doi
:
10
.
11
09/AINA
.
2017.
8
0.
[28]
D.
Sal
y
ers,
Y.
Jiang,
A.
Strie
g
el,
and
C.
Poell
ab
aue
r,
“
Jum
boGe
n:
d
y
namic
jum
bo
fra
m
e
gene
ra
ti
on
for
net
work
per
form
anc
e
sca
la
bilit
y
,
”
ACM
S
IGCO
MM
Comput.
Comm
un.
Rev.
,
vol
.
37
,
no
.
5
,
2007
,
pp.
53
–
64
.
[29]
Supri
y
an
to,
R.
Sofhan,
R.
Fahriz
al,
and
A.
Os
m
an,
“Per
form
anc
e
eva
lu
at
i
on
of
IPv6
Ju
m
bogra
m
Packets
tra
nsm
ission
usi
ng
Jum
bo
Fra
m
es,
”
Int.
Conf
.
El
e
ct
r.
Eng
.
Comput.
Sci
.
In
formatic
s
,
vol.
2017
-
Dec
em,
no
.
Septe
m
ber
,
pp
.
1
9
-
21,
2017
,
doi
: 10.1109/
E
ECSI.
2017.
8239188.
[30]
G.
Herna
ndez
-
O
reg
on
et
al
.
,
“
Perform
anc
e
an
a
l
ysis
of
V2V
and
V2I
Li
Fi
comm
u
nic
ation
s
y
st
ems
in
tra
ffic
li
ghts,
”
Wirel
.
Comm
un.
Mob.
Comput.
,
vol.
2019
,
2019
,
doi:
10
.
1155/20
19/4279683.
[31]
Y.
Li
u,
A.
Dow
li
ng,
and
L.
Huie
,
“
Benc
hm
ark
ing
Network
Perf
orm
anc
e
in
Nam
ed
Data
Networki
ng
(ND
N),”
in
2020
29th
Wirel
ess
and
Optic
al
Co
mm
unic
ati
ons
Confe
renc
e
(
WOCC)
,
2020
,
pp.
1
-
6
,
doi:
10.
1109/WO
CC48579.2020.
911
4910.
[32]
T.
Lucas,
M.
Fe
rre
ira,
R.
Pla
chta,
G.
Ferre
ira,
a
nd
K.
Costa,
“
Non
-
Fragm
ent
ed
Network
Flow
Design
Anal
y
sis
:
Com
par
ison I
Pv4 with
IPv6
Us
in
g
Path
MTU
Discove
r
y
,
”
Compu
te
rs
,
vol
.
9
,
no
.
2
,
p
.
54
,
2020
.
[33]
J.
Gara
y
,
J.
Un
zi
lla,
E.
Jac
ob
,
and
J.
Matias,
“
A
Lay
er
2
T
raf
fic
Stee
r
ing
Mec
hani
sm
for
Network
Slici
ng
sce
nar
ios,
”
in
20
18
4th
IEEE
Co
nfe
renc
e
on
Networ
k
Soft
wariz
ati
on
and
Worksh
ops
(
Net
Soft
)
,
2018,
pp
.
384
-
39
2,
doi:
10
.
1109/NE
TSOF
T.
2018.
84
60100.
[34]
M.
W
y
ss
,
G.
G
iul
ia
r
i,
M
.
L
egn
er,
and
A.
Pe
rri
g,
“
Secur
e
and
Scal
able
QoS
f
or
Crit
i
ca
l
Appl
ic
ations,”
2021
IEE
E/ACM
2
9th
Inte
rnatio
nal
Symposium
on
Qualit
y
of
S
erv
i
ce
(
IWQO
S
)
,
2021,
doi:
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
2
4
, N
o.
1
,
Oct
o
ber
20
21
:
329
-
337
336
10.
1109/IWQ
OS52092.
2021.
952
1315.
[35]
T.
Hir
ai
and
T
.
Murase,
“
Node
cl
usteri
ng
comm
unic
ation
m
et
ho
d
with
m
ember
dat
a
esti
m
at
ion
t
o
improve
qos
of
v2x
comm
unic
ations
for
drivi
ng
assistanc
e
wi
th
c
rash
warni
ng,
”
I
EE
E
Ac
c
ess
,
vol
.
7,
pp
.
37691
-
3
7707,
2019,
do
i
:
10
.
1109/ACCESS
.
2019.
2906392.
[36]
I.
A.
I.
Di
y
eb
,
A.
Saif
,
and
N.
A.
Al
-
Sha
iba
n
y
,
“
Et
hi
ca
l
ne
t
work
surveil
l
an
ce
using
pa
cke
t
sniffing
tool
s:
A
compara
ti
v
e
stud
y
,
”
Int
.
J.
Comput.
Netw.
Inf.
Se
cur.
,
vol.
11,
n
o.
7,
pp.
12
-
22,
2018,
do
i:
10.
5815/i
j
cni
s.2
018.
07.
02
.
[37]
S.
Praptodiy
ono
,
R.
Sofhan,
A
.
S.
Pram
ud
y
o,
T.
Firm
ans
y
ah
,
and
A.
Os
m
an,
“
Perform
anc
e
compari
son
of
tra
nsm
it
ti
ng
jumbo
fra
m
e
on
W
indows
and
Li
nux
sy
st
em,”
TEL
KOMNIKA
(Tele
communic
at
ion
Comput.
El
ec
tr
on.
Control.
,
vol
.
17
,
no
.
1
,
pp
.
68
-
7
5,
2019
,
doi
:
10
.
12928/t
el
kom
ni
ka.
v17i1
.
11627.
[38]
A.
Uta
et
a
l.
,
“
Is
big
da
ta
p
erf
or
m
anc
e
rep
rodu
cible
in
m
oder
n
cloud
net
works
?
,
”
in
17th
{USENI
X}
Symposium
o
n
Net
worked
System
s Design
and
I
mpleme
ntat
ion
(
{NSDI} 20)
,
2020,
pp
.
513
–
527
.
[39]
H.
Raj
and
K.
Schwan,
“
Hig
h
per
form
anc
e
and
sca
la
b
le
I/
O
virt
ual
izati
on
via
self
-
virt
u
alize
d
device
s,
”
i
n
Proce
ed
ings
of
the
16th
int
ernational
sympos
ium
on
High
perfor
mance
distribut
e
d
computi
ng
,
20
07,
pp.
179
-
188
,
doi:
10
.
1145/12
72366.
1272390.
[40]
M.
G.
Iat
r
ou,
A.
G.
Vo
y
iatzi
s,
a
nd
D.
N.
Serpa
nos,
“
Network
St
ac
k
Optimizatio
n
for
Im
prove
d
IPs
ec
Perform
anc
e
on
Li
nux
,
”
in
S
E
CR
Y
PT
,
2009,
p
p.
83
-
91
.
[41]
A.
Za
kar
i
,
M.
Mus
a,
G.
Beka
r
oo,
S.
A.
Bal
a
,
I.
A.
T.
Hashe
m
,
and
S.
Haka
k,
“
IPv4
and
IP
v6
protoc
ols:
A
Com
par
at
ive
pe
rform
anc
e
study
,
”
in
2019
IE
EE
10th
Control
and
Syste
m
Gr
aduate
Re
sea
rch
Coll
oquium
(
ICSGRC
)
,
2019,
pp
.
1
-
4
,
doi
:
10
.
1109/ICSGRC
.
2019.
8837050.
[42]
T.
Koutn
y
and
J
.
S
y
kor
a,
“
Le
ss
ons
le
arn
ed
on
en
hanc
ing
p
erf
orm
anc
e
of
ne
tworking
applications
b
y
IP
tunne
l
ing
t
hrough
Act
ive
Networks,”
In
t.
J.
Adv.
In
te
rnet
Technol
.
,
vo
l. 3,
no.
3
-
4
,
2010
.
[43]
I.
Kotul
ia
k
,
P.
R
y
bár
,
and
P.
T
rúc
hl
y
,
“
Perform
anc
e
compari
s
on
of
IPs
ec
and
TL
S
b
ase
d
VP
N
te
chno
logi
es,
”
i
n
2011
9th
Inte
rnational
Confe
ren
c
e
on
Eme
rging e
Learning
Technol
ogie
s and
Applicat
ions (
ICETA)
,
2011,
pp.
217
-
221,
doi
:
10
.
110
9/ICE
TA.
2011
.
6
112567.
[44]
B.
Hoekstra
,
D.
Mus
uli
n,
and
J
.
J.
Kei
jser,
“
C
om
par
ing
TCP
per
form
anc
e
of
tunne
le
d
and
no
n
-
tunne
le
d
tra
ff
i
c
using Ope
nVP
N,”
Uni
v. V
an
Am
sterdam,
Syst
.
N
et
w.
Eng
.
Amste
rdam
,
pp
.
2010
-
2011,
2011
.
[45]
Z.
A.
Za
rd
ari,
M.
Ali,
R.
A.
Shah
,
and
L.
H.
Z
ard
ari
,
“
A H
y
brid
T
ec
hniqu
e
for
Tunne
li
ng
Mec
h
anis
m
of
IPv6
using
Te
red
o
and
6RD
to
Enha
n
ce
the
Network
Perform
anc
e,
”
Int. J
.
A
dv.
Comput
.
Sci.
Appl
.
,
vol
.
9,
no
.
11,
pp
.
100
-
10
5,
2018,
doi
:
10
.
14
569/IJACS
A.2018.
091115.
[46]
W
.
Feng,
P.
Ba
la
ji,
C.
B
aro
n,
L.
N.
Bhu
y
a
n,
and
D.
K.
Pand
a,
“
Perform
anc
e
cha
ra
ct
e
rizati
on
of
a
10
-
Gigab
i
t
Et
her
n
et
TOE
,
”
in
13th
S
ymposium
on
High
Pe
rform
ance
I
nte
rconne
ct
s
(
HO
TI’05
)
,
2005,
pp.
58
-
63
,
do
i:
10.
1109/CONE
CT.
200
5.
30
.
[47]
J.
S
y
kor
a
and
T
.
Koutn
y
,
“
Enhanci
ng
Perform
an
ce
of
Networki
n
g
Applic
a
ti
ons
b
y
IP
Tunne
l
ing
through
Act
ive
Networks,”
in
2
010
Nint
h
Inte
rn
ati
onal
Con
fe
ren
ce
on
Net
works
,
2010,
pp
.
361
-
3
64,
doi
:
10
.
1109
/ICN.
2010.
64
.
[48]
Y.
A.
Make
r
i
,
“
Design
an
d
Im
ple
m
ent
at
i
on
of
op
ti
m
ized
feature
s
in
a
lo
ca
l
area
net
work
fo
r
improvede
nte
rpr
isene
twork,”
GS
J
,
vo
l. 7, no. 7, 2
019
[49]
D.
Yun,
C.
Q.
W
u,
N.
S.
V
Rao,
and
R.
Kett
imuthu,
“
Advising
big
dat
a
tra
nsfer
over
dedi
ca
t
ed
conne
c
ti
ons
base
d
on
profiling
opt
i
m
iz
at
ion
,
” IE
E
E
/A
CM
Tr
ans.
Ne
tw.
,
vol
.
27
,
no
.
6,
pp
.
2280
–
229
3,
2019
.
[50]
S.
Kuce
r
a,
K
.
Fahm
i,
and
H
.
Cla
uss
en,
“
Late
nc
y
as
a
serv
ice:
En
abling
re
liable
data
de
li
ve
r
y
ov
er
m
ultipl
e
unre
li
ab
le wire
l
e
ss
li
nks,”
in
201
9
IEEE
90th
V
eh
ic
ular Te
chnol
o
gy
Conf
ere
nce (
VTC2019
-
Fal
l)
,
201
9,
pp
.
1
–
5.
[51]
A.
H.
A.
Abubaka
r,
A.
Muham
m
ad,
and
K.
Moham
m
ed,
“
CS
T4500:
Com
pute
r
Network
And
Inte
rne
tworking
.
”
Dec
ember
2020
.
[52]
M.
I.
Nashirud
din
and
N.
Soli
hah,
“
Perform
a
nce
Eva
lu
at
ion
of
XG
S
-
PO
N
Optic
al
Networ
k
Te
rm
ination
f
or
Ent
erp
ris
e
Custom
er,
”
in
2020
3
rd
Inte
rnational
Seminar
on
Re
search
of
Information
Technol
og
y
and
Inte
l
li
gen
t
Syste
ms
(
ISRI
TI)
,
2020
,
pp
.
251
–
256
.
[53]
I.
Har
y
ono,
D
.
W
.
Sudihart
o,
a
nd
A.
G.
Putra
da,
“
QoS
Im
pro
vement
Anal
y
si
s
of
VoIP
Serv
ic
e
W
hic
h
Us
es
Overl
a
y
Ne
twork.
Case
Stud
y
:
Cal
li
ng
AW
S
V
oIP
Gate
wa
y
Fr
om
Bandung,
In
donesia
,
”
in
20
18
Inte
rnationa
l
Seminar
on
App
l
ic
ati
on
for Te
ch
nology
o
f
Inform
ati
on
and
Comm
unic
ati
on
,
2018
,
pp.
381
–
387
.
[54]
S.
T.
Aung
and
T.
The
in
,
“
Compa
rat
iv
e
Anal
y
s
i
s
of
Site
-
to
-
Site
Lay
er
2
Virtua
l
Privat
e
Network
s,”
in
2020
IEE
E
Confe
renc
e
on
C
omputer
Applica
ti
ons (
ICCA)
,
2020,
pp
.
1
–
5.
[55]
Y.
K.
Sharm
a
and
C.
Kaur,
“
The
Vita
l
Role
of
Vi
r
tua
l
Private
Net
work
(VP
N)
in
Making
Secur
e
Connec
ti
on
Ove
r
Inte
rne
t
W
orld
.”
I
nte
rnational
Jo
urnal
of Re
c
ent
Technol
ogy
and
Engi
nee
ring
(
IJR
TE)
,
vol. 8, no. 6, Marc
h
2020.
[56]
S.
Mac
ke
y
,
I.
Mihov,
A.
Nos
enko,
F
.
Veg
a,
and
Y.
Cheng,
“
A
Perform
anc
e
Com
par
ison
of
W
ire
Guard
and
OpenVP
N,”
in
P
roce
edi
ngs of
th
e
Tenth ACM
Co
nfe
renc
e
on
Dat
a
and
Applicatio
n
Sec
urit
y
and
P
rivac
y
,
2020
,
pp
.
162
–
164
.
[57]
R
.
Angelo
,
“
Sec
ure
Protoco
ls a
n
d
Virtua
l
Priva
te Net
works
:
An
E
val
uation.
,
”
Iss
ues
Inf. Sy
st
.
,
vol
.
20,
no.
3,
2019
.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
2502
-
4752
An
alysis of
I
P
v
6
ju
m
bogra
m
packa
ges
tra
nsmissi
on
us
in
g
j
umb
o…
(
Yahy
a Hid
aya
t
ullah
)
337
BIOGR
AP
HI
ES OF
A
UTH
ORS
Yah
y
a
Hi
da
y
at
ullah
was
born
in
Sem
ara
ng
,
0
2
S
septe
m
ber
1990,
obt
ai
ned
an
As
socia
t
e
Degre
e
(A.m
d)
in
Te
l
ec
om
m
unic
at
ion
Engi
ne
ering
from
Sem
ar
ang
Stat
e
Pol
y
t
ec
hni
c,
and
gra
duated
in
20
15.
Obtai
n
ed
a
Bac
hel
o
r
of
En
gine
eri
ng
(ST),
Depa
rtment
of
I
nform
at
ic
s
,
Sulta
n
Agung
Is
la
m
ic
Unive
rsit
y
(UN
ISS
ULA)
Sem
ara
ng,
gra
d
uat
ed
in
2016
.
He’s
fini
shed
stud
y
in
Mast
er
of
El
e
ct
er
i
ca
l
Engi
n
ee
rin
g
from
Unive
rsita
s
Islam
Sulta
n
Agung
(UN
ISSULA)
S
emara
ng
in
2020.
Curre
ntly
a
Dire
ct
or
of
CV.
Maud
y
Com
m
unic
at
ion
Network
in
S
emara
ng.
Arie
f
mar
w
ant
o
,
ST,
M.
Eng
,
Ph.
D
is
le
cturer
in
Master
of
El
ectrical
Engi
neering
Depa
rtment,
Fac
ulty
of
Industri
al
Te
chno
log
y
,
Un
ive
rsita
s
Isl
am
Sulta
n
Agung
(U
NIS
SU
LA),
Sem
ara
ng,
Indo
nesia
.
He
gr
ad
uat
ed
from
the
fac
ulty
of
En
gine
eri
ng
m
aj
or
in
el
e
ct
ri
ca
l
engi
ne
eri
ng
at
Univer
sita
s
Mu
hamm
adiy
ah
Y
og
y
ak
arta.
His
m
aste
r
and
Ph.
D
degr
ee
has
obta
ine
d
from
Univer
sit
y
T
eknologi
Malay
sia
m
a
jor
in
Elec
tr
ic
a
l
and
El
e
ct
roni
c
E
ngine
eri
ng
.
Now
he
was
a
se
nior
lectur
er
in
Master
of
Elec
trica
l
Engi
ne
eri
ng
Depa
rtment
UN
I
SS
ULA.
He
was
publi
shed
m
o
re
tha
n
100
ac
ad
emic
pap
er
s
in
rep
ut
able
c
onfe
ren
c
es
dan
journa
l
.
His
int
ere
st
rese
arc
h
in
ren
ewa
bl
e
en
erg
y
,
b
iomedic
a
l
engi
ne
eri
ng
,
Io
T,
te
l
emati
cs
an
d
embedde
d
te
chnol
og
y
.
Imam
Much
Ib
nu
S
ub
rot
o
is
a
m
ember
of
Facul
t
y
of
Indust
ria
l
Technol
og
y
,
Univer
sit
as
Islam
Sulta
n
Ag
ung.
He
r
ec
e
ived
the
d
egr
e
e
in
El
ectri
ca
l
Engi
n
ee
ring
m
aj
o
ring
of
Com
pute
r
Engi
neering
fro
m
Gadja
h
Mada
Univer
sit
y
,
Indo
nesia
in
1998
.
H
e
fini
shed
h
is
stu
d
y
in
Master
of
Com
pute
r
Sci
enc
e
from
Unive
rsiti
T
eknol
ogi
Malay
s
ia
in
200
7
and
f
ini
shed
hi
s
Ph.
D
from
Univer
siti
T
ekn
ologi
Malay
si
a
m
aj
oring
of
Com
pute
r
Scie
nc
e
in
2015.
Now
he
was
a
senior
le
ct
ur
er
in
Mast
er
of
El
e
ct
ri
cal
Engi
neering
De
par
tment
UN
ISSULA.
He
hel
d
o
f
Inform
at
ion
Te
chnol
og
y
Pro
gra
m
in
Master
of
El
ec
tr
ical
En
gine
eri
ng
Dept
.
He
was
publi
shed
m
ore
tha
n
100
ac
ade
m
ic
p
ape
rs
in
rep
utable
conf
er
ences
dan
journa
ls.
His
int
ere
st
res
ea
rch
in
Dat
a
Mining,
Busines
s
Inte
ll
ig
enc
e
,
B
ig
Data
,
Softwar
e
Engi
ne
eri
ng
,
Sm
art
S
y
stems
an
d
Artifi
cial
Inte
lligence.
Evaluation Warning : The document was created with Spire.PDF for Python.