{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T16:19:06Z","timestamp":1771863546274,"version":"3.50.1"},"reference-count":18,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T00:00:00Z","timestamp":1589241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia","doi-asserted-by":"publisher","award":["FRGS\/1\/2018\/TK04\/UKM\/02\/07"],"award-info":[{"award-number":["FRGS\/1\/2018\/TK04\/UKM\/02\/07"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia","doi-asserted-by":"publisher","award":["GGPM-2019-030"],"award-info":[{"award-number":["GGPM-2019-030"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>This study presents the proposed testbed implementation for the Advanced Technology Training Center (ADTEC) Batu Pahat, one of Malaysia\u2019s industrial training institutes. The objectives of this study are to discover the issues regarding network congestion, propose a suitable method to overcome such issues, and generate output data for the comparison of the results before and after the proposed implementation. The internet is directly connected to internet service providers (ISPs), which neither impose any rule nor filter the traffic components; all connections comply on the basis of the base effort services provided by the ISP. The congestion problem has been raised several times and the information technology (IT) department has been receiving complaints about poor and sometimes intermittent internet connection. Such issues provide some ideas for a possible solution because the end client is a human resource core business. In addition, budget constraints contribute to this problem. After a comprehensive review of related literature and discussion with experts, the implementation of quality of service through add-on rules, such as traffic policing on network traffic, was proposed. The proposed testbed also classified the traffic. Results show that the proposed testbed is stable. After the implementation of the generated solution, the IT department no longer receives any complaints, and thus fulfills the goal of having zero internet connection issues.<\/jats:p>","DOI":"10.3390\/computers9020039","type":"journal-article","created":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T10:53:55Z","timestamp":1589280835000},"page":"39","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Quality of Service (QoS) Management for Local Area Network (LAN) Using Traffic Policy Technique to Secure Congestion"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8124-6226","authenticated-orcid":false,"given":"Wan Muhd Hazwan","family":"Azamuddin","sequence":"first","affiliation":[{"name":"Network and Communication Technology (NCT) Lab, Centre for Cyber Security, Fakulti Teknologi &amp; Sains Maklumat (FTSM), Universiti Kebangsaan Malaysia (UKM), Bangi 43600 UKM, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1348-5804","authenticated-orcid":false,"given":"Rosilah","family":"Hassan","sequence":"additional","affiliation":[{"name":"Network and Communication Technology (NCT) Lab, Centre for Cyber Security, Fakulti Teknologi &amp; Sains Maklumat (FTSM), Universiti Kebangsaan Malaysia (UKM), Bangi 43600 UKM, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7337-6736","authenticated-orcid":false,"given":"Azana Hafizah Mohd","family":"Aman","sequence":"additional","affiliation":[{"name":"Network and Communication Technology (NCT) Lab, Centre for Cyber Security, Fakulti Teknologi &amp; Sains Maklumat (FTSM), Universiti Kebangsaan Malaysia (UKM), Bangi 43600 UKM, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5511-0205","authenticated-orcid":false,"given":"Mohammad Kamrul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Network and Communication Technology (NCT) Lab, Centre for Cyber Security, Fakulti Teknologi &amp; Sains Maklumat (FTSM), Universiti Kebangsaan Malaysia (UKM), Bangi 43600 UKM, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6746-6011","authenticated-orcid":false,"given":"Ahmed Salih","family":"Al-Khaleefa","sequence":"additional","affiliation":[{"name":"Network and Communication Technology (NCT) Lab, Centre for Cyber Security, Fakulti Teknologi &amp; Sains Maklumat (FTSM), Universiti Kebangsaan Malaysia (UKM), Bangi 43600 UKM, Selangor, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2020,5,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Dey, P.K., Canbaz, M.A., Yuksel, M., and Gunes, M.H. (2018, January 20\u201324). On correlating ISP topologies to their businesses. Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, MO, USA.","DOI":"10.1109\/ICC.2018.8422620"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Marcon, M., Dischinger, M., Gummadi, K.P., and Vahdat, A. (2011, January 4\u20138). The local and global effects of traffic shaping in the internet. Proceedings of the Third International Conference on Communication Systems and Networks (COMSNETS 2011), Bangalore, India.","DOI":"10.1109\/COMSNETS.2011.5716420"},{"key":"ref_3","first-page":"137","article-title":"Optimized authentication for wireless body area network","volume":"10","author":"Ahmad","year":"2018","journal-title":"J. Telecommun. Electron. Comput. Eng."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Jubair, M.A., Mostafa, S.A., Muniyandi, R.C., Mahdin, H., Mustapha, A., Hassan, M.H., Mahmoud, M., Al-Jawhar, Y., Salih, A., and Mahmood, A. (2019). Bat optimized link state routing protocol for energy-aware mobile ad-hoc networks. Symmetry, 11.","DOI":"10.3390\/sym11111409"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Bolla, R., Carrega, A., Repetto, M., and Robino, G. (2018). Improving efficiency of edge computing infrastructures through orchestration models \u2020. Computers, 7.","DOI":"10.3390\/computers7020036"},{"key":"ref_6","first-page":"152","article-title":"Bandwidth guarantee using Class Based Weighted Fair Queue (CBWFQ) scheduling algorithm","volume":"5","author":"Zakariyya","year":"2015","journal-title":"Int. J. Digit. Inf. Wirel. Commun."},{"key":"ref_7","first-page":"205","article-title":"A new adaptive throughput policy algorithm on campus ip-based network internet traffic","volume":"71","author":"Kassim","year":"2015","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"012011","DOI":"10.1088\/1742-6596\/588\/1\/012011","article-title":"Impact of the codec and various QoS methods on the final quality of the transferred voice in an IP network","volume":"588","author":"Slavata","year":"2015","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_9","first-page":"867","article-title":"Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol","volume":"38","author":"Aman","year":"2019","journal-title":"Res. J. Eng. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"702","DOI":"10.3844\/jcssp.2019.702.727","article-title":"Impacts evaluation of DoS attacks over ipv6 neighbor discovery protocol","volume":"15","author":"Ahmed","year":"2019","journal-title":"J. Comput. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Amato, F., Moscato, V., Picariello, A., and Sperli, G. (2017, January 19\u201321). Recommendation in social media networks. Proceedings of the IEEE Third International Conference on Multimedia Big Data (BigMM), Laguna Hills, CA, USA.","DOI":"10.1109\/BigMM.2017.55"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.future.2018.04.006","article-title":"Multimedia story creation on social networks","volume":"86","author":"Amato","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ali, Z., Aman, A.H.B.M., and Hassan, R. (2019). Cloud Query Processing Analysis: Encryption and Decryption. 3C Tecnologia. Glosas de innovaci\u00f3n aplicadas a la pyme. Special Issue, 65\u201375.","DOI":"10.17993\/3ctecno.2019.specialissue3.65-75"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Mojib, G., Aman, A.H.M., Khalaf, M., and Hassan, R. (2019). Simulation Analysis for QoS in Internet of Things Wireless Network. 3C Tecnologia. Glosas de innovaci\u00f3n aplicadas a la pyme. Special Issue, 77\u201383.","DOI":"10.17993\/3ctecno.2019.specialissue3.77-83"},{"key":"ref_15","first-page":"810","article-title":"Implementation of differential services based on priority, token bucket, round robin algorithms","volume":"4","author":"Kaur","year":"2015","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"AL-Khaleefa, A.S., Ahmad, M.R., Isa, A.A.M., AL-Saffar, A., Esa, M.R.M., and Malik, R.F. (2019). MFA-OSELM Algorithm for WiFi-Based Indoor Positioning System. Information, 10.","DOI":"10.3390\/info10040146"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"AL-Saiagh, W., Tiun, S., AL-Saffar, A., Awang, S., and Al-khaleefa, A.S. (2018). Word sense disambiguation using hybrid swarm intelligence approach. PLoS ONE, 13.","DOI":"10.1371\/journal.pone.0208695"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"AL-Khaleefa, A.S., Ahmad, M.R., Isa, A.A.M., Esa, M.R.M., Aljeroudi, Y., Jubair, M.A., and Malik, R.F. (2019). Knowledge Preserving OSELM Model for Wi-Fi-Based Indoor Localization. Sensors, 19.","DOI":"10.3390\/s19102397"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/9\/2\/39\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:28:02Z","timestamp":1760174882000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/9\/2\/39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,12]]},"references-count":18,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,6]]}},"alternative-id":["computers9020039"],"URL":"https:\/\/doi.org\/10.3390\/computers9020039","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,12]]}}}