Implementation of Queue Tree and DoH on Mikrotik Router for Internet Sehat and Stable Internet
Main Article Content
Abstract
This study presents the implementation of Queue Tree and DNS over HTTPS (DoH) on a Mikrotik Router RB951Ui-2HnD as an innovative model for achieving a “Healthy Internet” (Internet Sehat) characterised by efficiency, fairness, and safety within community-based networks. Conducted at the Infotek Hotspot in Gritma Housing, Manado, the research employed an experimental design comparing pre- and post-implementation performance over fourteen days. Key parameters measured included latency, packet loss, throughput, and DNS response time, using tools such as Wireshark, Mikrotik Bandwidth Test, and PingPlotter. The results demonstrated substantial improvements: latency decreased from 125 ms to 83 ms (−33.6%), packet loss dropped from 5.8% to 0.9% (−84.5%), and throughput increased from 36 Mbps to 49.3 Mbps (+37%). Additionally, DoH reduced DNS response time to 22 ms—13% faster than traditional DNS—while ensuring encrypted, secure, and privacy-preserving communications. These outcomes confirm that Queue Tree effectively regulates bandwidth distribution and that DoH enhances user trust through encryption and content filtering. The dual implementation forms a synergistic framework that improves network performance while upholding ethical and secure Internet usage. Furthermore, this approach offers a cost-effective and replicable solution for community hotspots, schools, and small-scale ISPs seeking stability and security without hardware upgrades. By integrating technical innovation with digital ethics, the study contributes to the development of sustainable Internet infrastructures that embody Indonesia’s Internet Sehat vision—delivering reliable, equitable, and responsible connectivity for all.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
[2] M. O. Olomu, G. O. Binuyo, and T. O. Oyebisi, “The adoption and impact of Internet-based technological innovations on the performance of the industrial cluster firms,” J. Econ. Technol., vol. 1, pp. 164–178, 2023, doi: https://doi.org/10.1016/j.ject.2023.11.004.
[3] W. Welda, “DETERMINATION OF MIKROTIK ROUTER BASED ON PRICE AND QUALITY USING SIMPLE ADDITIVE WEIGHTING (SAW) METHOD,” Bull. Netw. Eng. INFORMATICS, vol. 1, p. 25, Apr. 2023, doi: 10.59688/bufnets.v1i1.8.
[4] L. Kristiana and A. Z. Azmi, “Bandwidth Limitation Based on Content Classification Using Queue Trees and Hierarchical Token Buckets,” E3S Web Conf., vol. 484, pp. 1–11, 2024, doi: 10.1051/e3sconf/202448402011.
[5] F. Aktas, I. Shayea, M. Ergen, B. Saoud, A. E. Yahya, and A. Laura, “AI-enabled routing in next generation networks: A survey,” Alexandria Eng. J., vol. 120, pp. 449–474, 2025, doi: https://doi.org/10.1016/j.aej.2025.01.095.
[6] A. Nurmawan, F. Fahrullah, R. Ismayanti, F. Alameka, and H. Haerullah, “Implementasi Jaringan Hotspot Menggunakan Metode Queue Tree Pada Router Mikrotik Toko Sinar Jaya,” J. Rekayasa Teknol. Inf., vol. 8, p. 164, Dec. 2024, doi: 10.30872/jurti.v8i2.16812.
[7] A. Dauerer, “A systematic literature review of performance measurement systems and the integration of ESG factors,” Environ. Sustain. Indic., vol. 27, p. 100746, 2025, doi: https://doi.org/10.1016/j.indic.2025.100746.
[8] F. Casaril and L. Galletta, “Developing security metrics for space systems: A study considering the NIST Cybersecurity Framework 2.0 and the NIS2,” Int. J. Crit. Infrastruct. Prot., vol. 51, p. 100805, 2025, doi: https://doi.org/10.1016/j.ijcip.2025.100805.
[9] P. S. M. B. Bossoufi, “Digital Technologies and Applications,” Lecture Notes in Networks and Systems. [Online]. Available: https://link.springer.com/book/10.1007/978-3-031-68650-4
[10] Y. M. Hazairin, Farhan Toibah Umi Kalsum, “Designing A Web-Based Mikrotik Hotspot Server Monitoring Application.pdf,” Publishing, vol. 4, no. 1, p. 11, 2024, [Online]. Available: https://penerbitadm.pubmedia.id/index.php/KOMITEK/article/view/1745/2056
[11] M. Munawarsyah, D. Ratnasari, M. Hafiun, and A. Aziz, “The Implications of Social Media Use Among Teenagers in The Digital Era: An Islamic Education Perspective.,” PAKAR Pendidik., vol. 23, pp. 342–352, Jul. 2025, doi: 10.24036/pakar.v23i2.697.
[12] U. Pribadi, M. Iqbal, and F. Restiane, “Factors Affecting Trust in E-Government,” J. Gov. Civ. Soc., vol. 5, p. 263, Oct. 2021, doi: 10.31000/jgcs.v5i2.4848.
[13] S. Senyao and S. Ha, “How social media influences resident participation in rural tourism development: a case study of Tunda in Tibet,” J. Tour. Cult. Chang., vol. 20, pp. 1–20, Nov. 2020, doi: 10.1080/14766825.2020.1849244.
[14] M. Rath and J. Chatterjee, “Strength Optimized Weight Balancing for Traffic Management in Vehicular Ad-hoc Networks,” Int. J. Bus. Data Commun. Netw., vol. 20, pp. 1–19, Feb. 2025, doi: 10.4018/IJBDCN.368561.
[15] M. I. Nasution, F. Rahim, and H. Alfarizzi, “Analysis and Implementation of Simple Queue and Queue,” J. Appl. Enginerring Technol. Sci., vol. 4, no. 1, pp. 488–498, 2022.
[16] K. Hynek, D. Vekshin, J. Luxemburk, T. Cejka, and A. Wasicek, “Summary of DNS over HTTPS Abuse,” IEEE Access, vol. 10, p. 1, Jan. 2022, doi: 10.1109/ACCESS.2022.3175497.
[17] R. Ridobillah, D. Indrayana, and F. Az-Zahra, “ANALISIS PERBANDINGAN UNTUK OPTIMALISASI JARINGAN MENGGUNAKAN METODE QUEUE TREE DAN PCQ DI ICT UMMI,” JATI (Jurnal Mhs. Tek. Inform., vol. 8, pp. 10147–10154, Sep. 2024, doi: 10.36040/jati.v8i5.11021.
[18] N. Fachada and N. David, Artificial Intelligence in Modeling and Simulation, vol. 17, no. 6. 2024. doi: 10.3390/a17060265.
[19] S. Safinatunnaza, A. Noviriandini, L. Indriyani, and S. Fauziah, “LAN Bandwidth Management Using the Queue Tree Method,” Golden Ratio Data Summ., vol. 5, pp. 7–13, Feb. 2025, doi: 10.52970/grdis.v5i1.887.
[20] T. Panayiotou, K. Manousakis, S. Chatzis, and G. Ellinas, “A Data-Driven Bandwidth Allocation Framework with QoS Considerations for EONs,” J. Light. Technol., vol. PP, p. 1, Jan. 2019, doi: 10.1109/JLT.2019.2894179.
[21] K. Nzobokela, S. Tembo, and B. Habeenzu, “Enhancing Network Performance and Quality of Service (QoS) in a Wired Local Area Network (LAN),” vol. 13, pp. 1–14, Feb. 2024, doi: 10.5923/j.ijnc.20241301.01.
[22] V. Bhateja, J. Tang, S. C. Satapathy, P. Peer, and R. Das, Evolution in Computational Intelligence, Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021), no. April. 2022. doi: 10.1007/978-981-16-6616-2.
[23] A. Haris, B. Riyanto, F. Surachman, and A. Ramadhan, “Analisis Pengamanan Jaringan Menggunakan Router Mikrotik dari Serangan DoS dan Pengaruhnya Terhadap Performansi,” Komputika J. Sist. Komput., vol. 11, pp. 67–76, Jan. 2022, doi: 10.34010/komputika.v11i1.5227.
[24] J. M. de L. G. C. Fuentes and SanchoAna AyerbeMaría Luisa Escalante, “Investigación en Ciberseguridad Actas de las VII Jornadas Nacionales (JNIC 2022),” in JNIC, 2022, p. 376. [Online]. Available: https://2022.jnic.es/Actas_JNIC_2022_v11.pdf
[25] C. Smansub, B. Purahong, P. Sithiyopasakul, and C. Benjangkaprasert, “A study of network bandwidth management by using queue tree with per connection queue,” J. Phys. Conf. Ser., vol. 1195, p. 12019, Apr. 2019, doi: 10.1088/1742-6596/1195/1/012019.
[26] A. M. Al-Ansi, A. Garad, M. Jaboob, and A. Al-Ansi, “Elevating e-government: Unleashing the power of AI and IoT for enhanced public services,” Heliyon, vol. 10, no. 23, p. e40591, 2024, doi: https://doi.org/10.1016/j.heliyon.2024.e40591.