Submitted:
09 June 2025
Posted:
10 June 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Methodology
3. Network Access Layer
3.1. Replacing Copper with Fiber Cable
3.2. Upgrading Ethernet Hubs and Networks Interface Cards
4. Network Layer Bandwidth Management
4.1. Network Segmentation
4.2. Full Duplex Ethernet
4.3. Bandwidth Allocation, Sharing and Reservation
4.4. Load Shedding and Buffer Allocation
4.5. Flow Control Using Choke Packets and VLANs
5. Transport Layer Bandwidth Management
6. Application Layer Bandwidth Management
7. Results and Discussions

| Technique | TCP/IP Layer | Strengths | Weaknesses |
| Replacing Copper with Fiber Cable | Network Access Layer | Easy to implement | Costly |
| Upgrading Ethernet Hubs and Networks Interface Cards | Network Access Layer | Easy to implement Big pipe approach ensure QOS for all users |
Costly Managerial overhead due to external connections Big pipe approach is not sustainable |
| Network Segmentation | Network Layer | low latency, Support for prioritization. it is less costly as compared to network access layer on cost of installing cables |
There are huge cost implications of buying new hubs and bridge |
| Full duplex Ethernet | Network Layer Bandwidth Management | Increases bandwidth capacity | Requires complete NICs replacement and reconfiguration of the client and server soft wares |
| Dynamic bandwidth allocation | Network Layer Bandwidth Management | Improves bandwidth usage significantly | Not efficient in in enhancing QOS overhead created during negotiation of traffic flow a peak rate, sustained rate and burst length |
| Load Shedding and Buffer Allocation |
Network Layer Bandwidth Management | Reduces the amount of traffic in transit | Difficult to implement priority schemes |
| Flow Control Using Choke Packets and VLANs |
Network Layer Bandwidth Management | Reduces bandwidth consumed by broadcast domains | Only effective if it manages to decrease the quantity of traffic in a link at critical points and time |
| TCP sliding window | Transport Layer Bandwidth Management | Dynamic based on situation Predictable |
Dependent on TCP acknowledgements |
| Using Bandwidth Caps | Application Layer Bandwidth Management | Saves bandwidth |
lacks the granularity to differentiate traffic bandwidth caps are difficult to distinguish from network failure cannot effectively manage congestion during peak hours |
8. Conclusion and Recommendations
References
- Alkharasani, A. M., Othman, M., Abdullah, A., & Lun, K. Y. (2017). An Improved Quality-of-Service Performance Using RED ’ s Active Queue Management Flow Control in Classifying Networks. 5, 24467–24478.
- By, P., Sovandara, T., April, M. U. M., & Penh, P. (2015). Bandwidth Management and QOS. (April).
- Celik, A., Radaydeh, R. M., & Member, S. (2017). Resource Allocation and Interference Management for D2D-Enabled DL / UL Decoupled Het-Nets. 22735–22749.
- Gémieux, M., Li, M., Savaria, Y., David, J., Zhu, G., & Member, S. (2018). A Hybrid Architecture With Low Latency Interfaces Enabling Dynamic Cache Management. 6. [CrossRef]
- He, L., Member, S., Wang, J., & Member, S. (2017). Bandwidth Efficiency Maximization for Single-Cell Massive Spatial Modulation MIMO : An Adaptive Power Allocation Perspective. IEEE Access, 5, 1482–1495. [CrossRef]
- Huang, X., Yuan, T., & Ma, M. (2018). Utility-Optimized Flow-Level Bandwidth Allocation in Hybrid SDNs. IEEE Access, 6, 20279–20290. [CrossRef]
- Ji, Y., & Member, S. (2018). Reconfigurable Optical OFDM Datacenter Datacenter Networks. IEEE Photonics Journal, 10(5), 1–16. [CrossRef]
- Kulkarni, S. (2015). Implementation of iSCSI for Mobile Platforms and its Performance Optimization on Mobile Networks. 3(5).
- Lim, W., Kourtessis, P., Senior, J. M., Na, Y., Allawi, Y., Jeon, S., & Chung, H. A. E. (2017). Dynamic Bandwidth Allocation for OFDMA-PONs Using Hidden Markov Model. 5, 3–6.
- Mahajan, N., & Mahajan, S. (2015). AN EFFICIENT TOKEN BUCKET ALGORITHM INCREASING WIRELESS. 3(3).
- Mamman, M., & Hanapi, Z. M. (2017). An Adaptive Call Admission Control With Bandwidth Reservation for Downlink LTE Networks. IEEE Access, 5, 10986–10994. [CrossRef]
- Marir, N., Wang, H., Li, B., & Jia, M. (2018). Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark. IEEE Access, 6, 59657–59671. [CrossRef]
- Nahrstedt, K., Arefin, A., & Rivas, R. (2011). QoS and resource management in distributed interactive multimedia environments. 99–132. [CrossRef]
- Paul, A. K., Tachibana, A., & Hasegawa, T. (2016). An Enhanced Available Bandwidth Estimation Technique for an End-to-End Network Path. IEEE Transactions on Network and Service Management, 13(4), 768–781. [CrossRef]
- Randrianantenaina, I., & Member, S. (2017). Interference Management in Full-Duplex Cellular Networks With Partial Spectrum Overlap.
- Sboui, L., Member, S., & Ghazzai, H. (2016). On Green Cognitive Radio Cellular Networks : Dynamic Spectrum and Operation Management. IEEE Access, 4, 4046–4057. [CrossRef]
- Song, M. (2018). Minimizing Power Consumption in Video Servers by the Combined Use of Solid-State Disks and Multi-Speed Disks. IEEE Access, 6, 25737–25746. [CrossRef]
- Wang, B., Sun, Y., & Cao, Q. I. (2018). Bandwidth Slicing for Socially-Aware D2D Caching in SDN-Enabled Networks. IEEE Access, 6, 50910–50926. [CrossRef]
- Wang, Z. (2018). DyCache : Dynamic Multi-Grain Cache Management for Irregular Memory Accesses on GPU. IEEE Access, 6, 38881–38891. [CrossRef]
- Wu, B., Wu, B., Yin, H., Liu, A., Liu, C., & Xing, F. (2017). Investigation and System Implementation of Flexible Bandwidth Switching for a Software-Defined Space Information Network. IEEE Photonics Journal, 9(3), 1–14. [CrossRef]
- Xu, W. (2018). A Novel Data Reuse Method to Reduce Demand on Memory Bandwidth and Power Consumption For True Motion Estimation. IEEE Access, 6, 10151–10159. [CrossRef]
Authors’ Profiles |
|
Kithinji Joseph: Doctor of Philosophy (Computer Science), Lecturer, Department of computing and information Technology,University of Embu , Kenya. Areas of scientific interests: QOS in computer networks, database optimization, storage area networks, data science Email: kithinji.joseph@embuni.ac.ke
|
|
How to cite this paper: Kithinji. Joseph, " A study of Bandwidth Management Techniques for the implementation of Quality of Service in Internet Protocol Networks", International Journal of Computer Network and Information Security(IJCNIS), |
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
