Global Journal of Computer Science and Technology: E Network, Web & Security Volume 1 7 Issue 4 Version 1.0 Year 201 7 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350

A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers

By Umeh Innocent Ikechukwu Nnamdi Azikiwe University Abstract- Nowadays, virtually all the basic aspects of human endeavor is computer and network dependent. Therefore bandwidth being one of the most valued resource and component of any network must be properly managed to yield a reliable performance. Over the years, different algorithms, models, techniques and applications have been developed for network and bandwidth management yet bandwidth problems has persistently remained on the increase. This work is an indepth survey on the causes of bandwidth problems, the basic models and techniques for bandwidth management and is followed by an analysis which is aimed at yielding meaningful suggestions on how a better technique or method for securing an efficient and improved bandwidth management solution using the application layer of the OSI network model can be achieved. Keywords: network, OSI models, techniques, bandwidth, bandwidth management, layer(s), internet, administrator. GJCST-E Classification: C.2.1, C.2.3

ASurveyonBandwidthManagementTechniquesViatheOSIModelNetworkandApplication Layers

Strictly as per the compliance and regulations of:

© 2017. Umeh Innocent Ikechukwu. This is a research/review paper, distributed under the terms of the Creative Commons Attribution- Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction inany medium, provided the original work is properly cited. A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers

Umeh Innocent Ikechukwu

Abstract - Nowadays, virtually all the basic aspects of human network. They think of the network as a way to access endeavor is computer and network dependent. Therefore the applications they need, when they need them. A few 201 bandwidth being one of the most valued resource and of the requirements to achieve a good network have component of any network must be properly managed to yield been identified to include the following; Year

a reliable performance. Over the years, different algorithms, models, techniques and applications have been developed for i. A network should stay up all the time, even in the 33 network and bandwidth management yet bandwidth problems event of failed links, equipment failure, and has persistently remained on the increase. This work is an in- overloaded conditions. depth survey on the causes of bandwidth problems, the basic ii. Every network should reliably deliver applications models and techniques for bandwidth management and is and provide reasonable response times from any followed by an analysis which is aimed at yielding meaningful suggestions on how a better technique or method for securing host to any host. an efficient and improved bandwidth management solution iii. A network should be secure. It should protect the using the application layer of the OSI network model can be data that is transmitted over it and data stored on achieved. the devices that connect to it. Keywords: network, OSI models, techniques, bandwidth, iv. A network should be easy to modify to adapt to bandwidth management, layer(s), internet, administrator. network growth and general business changes. v. Because failures occasionally occur, I. Introduction troubleshooting should be easy. Finding and fixing )

owadays, almost every endeavor of human daily a problem should not be too time-consuming. E

lives depend primarily on computers and related The statements above fall in line with Sunjay ( N devices which in turn are based on networks. Sharma (2011) recommendations for a manageable Domestic, official, social, financial, economic, religious network to be achieved. and many other human activities have all become computer and network based. Also, these activities b) Network Management when carried out with the computer have been proved to Network management is the process of be more successful and cheaper when computer manipulating resources of a network such as bandwidth, storage, etc. in other to improve the performance of the networks get involved. Computer networks on its side, requires data bandwidth for its operation and network. functionality. Bandwidth is a very essential but expensive Over the years, various techniques andmodels network resource which must be properly managed to of layered architecture has been employed to either, provide the maximum required throughput expected by administer, manage and or secure computer networks. the network owners and the network users. The lack of John S. et al. (2011),in a study on the causes of failure in or improper management of a network to conserve internet access delivery in Nigerian university libraries, bandwidth results to network crisis or failure. observed that planning and eventual management of the bandwidth of a is always a a) Requirements for a Good Network challenging task yet, networks must be properly Like every other project, a network projects managed to provide efficiency, throughput and good must have a proper design for the network to survive (QoS). Layering which implies the expansion after deployment. According to ANAND Global Journal of Computer Science and Technology Volume XVII Issue IV Version I division of one whole network process into smaller tasks (2005), good networks do not happen by accident rather where each of the small task is then assigned to a good networks are the result of hard work by network particular layer which works dedicatedly to process only designers and technicians, who identify network that task. Layering idea has been greatly employed in requirements and select the best solutions to meet the managing network and its complex and important needs of a business. Network users generally do not resources like bandwidth. think in terms of the complexity of the underlying

Author: Computer Science Department, Nnamdi Azikiwe University, Awka Anambra State, Nigeria. e-mail: [email protected]

© 2017 Global Journals Inc. (US) A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers

d) Network Bandwidth Bandwidth is a very important network resource and plays a very key factor in networking. Bandwidth can be defined in variety of ways depending on the context. In computing, bandwidth can be defined as; the bit-rate of available or consumed information capacity in a network and expressed typically in metric multiples of bits per second (bps). Bandwidth may be characterized as network bandwidth, data bandwidth or digital bandwidth. Behrouz (2013) defined bandwidth as a range within a band of frequencies or wavelengths while Fig.1: The structure of a layered task Devajitet al. (2013)defined bandwidth in computer

201 networking as, a reference to the data rate supported by In layered communication system, one layer of a network connection or interface.

Year a host deals with the task done by the layer or to be

done by its peer layer at the same level on the remote e) Bandwidth Management Challenges

34 host as shown in Fig. 1. Bandwidth is one of the most required and most The two most popular layer models used in expensive components of the internet today. It is a network communication are the OSI (Open System general knowledge that the higher the available Interconnection) and Internet or DOD (Department of bandwidth, the better the performance of their networks Defence) models. but this is not always true rather actually dependent on certain factors viz;

c) OSI Network Model i. The cost of bandwidth is a major cost of network Open System Interconnect (OSI) is an open and most organization obtain as much as they can standard for all communication systems. OSI model is only afford rather than as they need. But most established by International Standard Organization. The times, the users’ demand on bandwidth exceeds model provides a seven layered structure which proffer the capacity of their link causing saturation and great benefits in troubleshooting because each layer of leading to network poor performance. the model serves a specific function. For example, the

) ii. Most network face the challenge of bandwidth

E network layer, Layer 3, is charged with logical routing misuse and abuse causing such networks to surfer

( functions. The transport layer, Layer 4, is above Layer 3 from bandwidth insufficiency or vulnerability of their and provides additional services. In the TCP/IP world, networks. Layer 3 is served by IP, and Layer 4 is served by TCP iii. Some networks are not managed at all. Reference (Transmission Control Protocol) or UDP (User Datagram Sara gywnn (2013) stated categorically that most Protocol) as illustrated in the Fig. 2. research centers and educational institutions in Africa and the developing world are not managed at all thereby causing network failures and sometimes

the extinction of such networks.

iv. Avister (2009) alsoproved that although most people assume that internet congestions is only on the link to the internet, but congestion is mainly in

the incoming direction. Therefore, the significance of bandwidth in a network cannot be overemphasized and suggest that there is the need for efficient bandwidth management systems and models in every network.

f) Significance of Bandwidth Management

In order to meet the objectives of organizations Global Journal of Computer Science and Technology Volume XVII Issue IV Version I and internet users, internet usage must be managed to

achieve the following;

1. To control the expensive cost of bandwidth 2. To proffer good network performance and efficiency for critical and useful applications Fig. 1.2: The OSI model layers (image from Webopedia) 3. To enable the use of non-critical applications when resources are available

©2017 Global Journals Inc. (US) A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers

4. To deter the use of insecure and illegal applications improve network performance by reducing unnecessary within their networks traffic in the network. Access restrictions are implemented by assigning private IP addresses (e.g. II. Bandwidth Management Techniques 192.168.xx.xx) to users, none use of se network address Different traffic requirements exist for different translation (NAT) and through channeling web access users and different applications in a network. While via a proxy server. Access restriction can be some users or applications are termed critical because summarized as taking administrative measure to prevent of their importance or bandwidth requirements, others unauthorized bandwidth usage. are not. Bandwidth management techniques are employed in networks to basically provide proper utilization of bandwidth. Bandwidth management begins with network planning and design at the inception of a network but eventually through various other techniques 201 by using the different layers of the OSI model. Year

Bandwidth management techniques are aimed at;

35 1. Limiting the non-critical traffic in such a way that it does not affect the necessary critical traffic 2. Bandwidth traffic attempts to separate the critical traffic from the non-critical in other to achieve 1 above. 3. It also aims at providing sufficient resources traffic Fig. 2: Restriction of internet usage technique for areas deemed critical by the network owner 4. To carry non-critical traffic on the basis of resource availability. b) Time Shift Internet Usage 5. To limit the usage of unauthorized applications This bandwidth management technique uses within the network. ftp (file transfer protocol) and web mirror servers to 6. To limit the size of bandwidth usage and avoid upload files on to the server at night which can be accessed by day. It applies off-line downloading where waste. )

large files downloads are queued for off-peak hours. E

In order to achieve these outlined objectives of ( User are requested on appeal to shift their internet bandwidth management, the various techniques usage time and this technique often yields low success. employed by different network owners, administrators and users to manage bandwidth apart from the c) Managing multiple connections measures considered during the planning and design of This is another technique used for managing a network can be categorized into four main follows; bandwidth. Obviously, managing a single network is a lot easier than managing multiple sites but many sites a) Restriction of Internet Usage Technique use multiple connections as a result of cost and This technique implies placing a restriction on reliability problems. It is ideal to share network load those users, group of persons or applications from proportionally among multiple connections but it is accessing the available bandwidth by means of easier to control outing traffic as against in coming software embedded in a routers and seems to be more traffic because of the difficulty of managing the dynamic effective in providing security. Most internet users in assignment of IP addresses from different connections organizations only require to access their corporate to different group of users. Border Gateway Protocol intranet and email. Such users should be restricted from (BGP) is a standardized exterior gateway protocol accessing the internet rather may be provided with web designed to exchange routing and reachability of machine for their occasional internet need since not information among autonomous systems. BGP is providing internet access to those who do not need it for difficult to configure for managing multiple connections corporate functions improves the network security. Also, and requires the co-operation of the ISPs involved as access restriction include the prevention of unauthorized well as the services of an expert to configure it. Global Journal of Computer Science and Technology Volume XVII Issue IV Version I users and non-critical applications from accessing the Furthermore, multiple connections bandwidth bandwidth. This is a sure way of improving network management technique is done using NAT and use of bandwidth and security. Sometimes, users are equipped proxies with multiple IPs apportioned to the IP. with applications that are not necessary for their corporate function and they end up wasting bandwidth d) Network Layer Bandwidth Management and causing network traffic hugs. For example running The network layer of the OSI network model is streaming media, social media and torrent download in responsible for address assignment and the unique a corporate environment. Such should be restricted to addressing of hosts in a network using the IP network

© 2017 Global Journals Inc. (US) A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers

protocol to route messages using the best path static or dynamic bandwidth allocations to manage available. Bandwidth management at the network layer bandwidth. operates as a real time management technique by i. Bandwidth allotment model (BAM) processing data packets as they arrive. Managing Bandwidth allotment model was the first bandwidth at the network layer involve network traffic bandwidth modelling management model developed also called data traffic which refers to the amount of and was used in a triggered dynamic bandwidth data moving across a network at a given point of time as management mechanism [15]. stated by Jianguo (2013). Network data is mostly

encapsulated in network packets which provide the load ii. Bandwidth Constraint Models in the network. Network traffic is the main component for One of the goals of DiffServ or MPLS traffic network traffic measurement, network traffic control and engineering is to guarantee bandwidth reservations for simulation. The proper organization of network traffic different service classes. For these goals two functions

201 helps in ensuring the quality of service (QoS) in a given are defined

network. The QoS techniques of Integrated Services (i) Class - type (CT) is a group of traffic flows, based

Year (Intserve) and differentiated services (Diffserve) can be on QoS settings, sharing the same bandwidth

used to manage bandwidth since it has to do with data reservation; Bandwidth constraint (BC) is a part of the

36 traffic. QoS is used to provide service to applications at output bandwidth that a CT can use.

the required quality by checkmating data loss, delay and iii. Static Bandwidth Allocation jitter to manage and make efficient use of bandwidth to This management technique allocates meet organization’s needs. QoS and bandwidth maximum bandwidth level to each class and uses management have similar objectives except that QoS is traffic-shape or rate-limit command to control the data real-time and only applicable at the network layer while traffic. If a class uses less than the allocated bandwidth, bandwidth management can be done using different it is not restricted but if the class attempts to use more techniques at different layers of the OSI model to than the allocated bandwidth, it is limited. If total achieve the required objectives. QoS uses packet allocations is less than or equal to the available BW then classification, queuing disciplines, packet discard all allocations can be satisfied. Otherwise, Total policies, policing and shaping as to perform bandwidth allocation ids greater that the available bandwidth. management functions. Conclusively, one can include

) QoS in a bandwidth management system by configuring iv. Dynamic Bandwidth Allocation E

QoS in a router to control outgoing traffic as far as the In dynamic bandwidth allocation policy-map ( internet link is not congested. Incoming traffic is though and bandwidth or priority commands are used to difficult to control using this technique. Bandwidth provide limited bandwidth only when link is congested. management at the network layer is traffic control based The classes are not subjected to limitation only when the using a router as illustrated in Fig.2.1. link is not congested. v. Bandwidth Reservation Bandwidth reservation is another allocation method which is based on priority of a class. The remaining bandwidth can then be allocated to none priority classes. It is best used when a fixed bandwidth is required for priority or critical traffic.

e) Limiting Non-priority Traffic This is done allocating Small bandwidth nonpriority traffic classes while the remaining available bandwidth is left for the priority traffic. The method is suitable when traffic is variable and the priority traffic does not require unnecessarily limitation. Fig.2.1: Traffic control router based bandwidth i. Priority Queuing management Global Journal of Computer Science and Technology Volume XVII Issue IV Version I This method gives priority to the priority class Network layer bandwidth management divide and sends traffic to others only if the link is free. They traffic into classes viz. IP address based, using remain in que until there is no traffic requirement from subnetwork, based on application versus port the priority class. assignment or the combination of both classes and ii. Proxy and Caching thereafter applying QoS techniques for each class on These are two other network layer bandwidth input of Internet connection and on the output (e.g. management methods. Maximum Connections and Ethernet port) of the network border router and applying Bandwidth are two parameters that can be used to

©2017 Global Journals Inc. (US) A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers control browsing speed of clients in a network using a individuals cannot work without the internet which is the proxy server [9]. Reference [9] further stated that in largest network as stated by Kassimet al. (2012). computer networks, a proxy server may be a computer Networks provide better communications, transfers of system or an application which serves as an data and information, businesses through cloud intermediary between servers sought after by clients. computing and many more. These needs have resulted Proxy servers are hosts systems which relays web in the development of more applications to meet up with access requests from clients. They are used when the need of these services. The application tools need to clients do not have direct access to the web to improve be monitored for business purposes and must prioritize security, logging, accounting and performance in the network bandwidth as it should be used since networks. internet bandwidth usage ranks top among other network application needs. Application layer bandwidth management

(BWM) allows for the creation of policies which regulate 201 bandwidth consumption by specific file types within a protocol, while allowing other file types to use unlimited Year

bandwidth. This enables a network administrator to 37 distinguish between desirable and undesirable traffic Internet within the same protocol. Application layer bandwidth Client/ Browser Proxy Server management is supported for all Application matches, as well as custom App Rules policies using HTTP client, HTTP Server, Custom, and FTP file transfer types. Fig.2.2: Proxy Server used for bandwidth and other management a) Firewalls Firewalls are usually configured to manage Caching and storing copies of recently bandwidth at global or WAN levels. Bandwidth accessed web pages for faster data access is another management modelling using the network applications method of managing bandwidth. It enable pages to be layer which was based on a comparative study on five delivered from the cache when requested for again. The recent research on this subject, it was and discovered pages are stored in browser caches and or proxy that each of them used a different mathematical caches and manage bandwidth by; equation to model the bandwidth management method E

• providing shorter response time to data in a network [12]. Reference [12] survey showed that () • reduced bandwidth requirement from users or client apart from the use of firewall and “Big pipe” approaches • reduced load on servers thus increasing their to manage network and bandwidth, different recent efficiency researches adopted different model, algorithms or • providing network access control and logging techniques in solving either network or bandwidth • Some examples of proxycache include; Apache management problems at the application layer of the proxy, MS proxy server and Squid. OSI model which have also been agreed as the best layer for bandwidth management even though bandwidth management problems still exists. III. Application Layer Bandwidth b) Application Bandwidth Management Management Application bandwidth management (ABM) is Network application layer techniques for the collection of a set of Quality of Service (QoS) tools bandwidth management is another bandwidth used to manipulate and prioritize data traffic by management techniques which has been proved by application type thereby preventing bandwidth-intensive recent research to be one of the most critical areas that applications, such as peer-to-peer applications like can be used to improve bandwidth management and BitTorrent from crowding or taken over legitimate provide efficient network performance yet it has been business traffic in a network. observed to be the least area that has been researched Dan Dinicolo (2013) mentioned that, advanced in solving bandwidth or network management problems.

bandwidth management solutions are employed to Global Journal of Computer Science and Technology Volume XVII Issue IV Version I According to Avister (2009),Youngzsoft (2015) and maximize an organization’s available bandwidth through Ronget al. (2010),different application have been carrying out inspections and classifying the generated developed and distributed for managing network at the traffic by common business applications based on application layer while more are still undergoing granular policies, and ensuring that the most critical development for use as network based bandwidth network traffic receives the highest priority across WAN management applications. New network technologies links. are emerging and network usage is also growing very Solutions provide automatic application rapidly such that today, almost all organizations and protocol classification and comprehensive policies and

© 2017 Global Journals Inc. (US) A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers

traffic controls such as rate shaping, rate limiting, bandwidth management due to one or two deficiencies selective dropping and priority marking. as follows. c) Application Protocol Classification a) Lack of Security in Some Models Application protocol Classification involves One of the major challenges facing modern Deep Packet Inspection (DPI) techniques which will networks management is security. Security begin with enable bandwidth management devices to identify the users in a network to other threats from outside the application protocols not withstanding whether those network especially through the internet. An unsecured or applications use deceptive port-hopping, port- an insecure network is prone to bandwidth wastage, tunnelling, and encryption techniques to avoid detection misuse and other network problems which can affect or not. bandwidth most especially when the network user causing the problem remains unidentifiable. d) Innovative User-Based QoS Policies

201 This technique allocate bandwidth and network b) Non-Consideration of Human Factors on application access transparently to network users solely Management Year on the bases user IDs or using traditional QoS policies All the existing bandwidth management with respect to Layer 3-7 traffic classifications.

38 methods reviewed did not consider the human e) Bandwidth Utilization Reports intervention / user involvement in both using and Bandwidth utilization reports are used to quickly managing bandwidth as necessary parameters to be identify top protocols, and find users that are consuming considered in order to secure an efficient bandwidth too much bandwidth with a view of managing and management in a network. It can be seen that biometric effectively utilizing the available bandwidth on a network. parameters can have serious effect on bandwidth but are not considered by the various techniques for f) Internet Access Bandwidth Management Techniques bandwidth management reviewed. Internet Access Management is one of the

resource management techniques and is often based c) Specialization of Management on using the network applications layer to conserve The network layer techniques considered data bandwidth in a network. The implementation of user’s traffic as the major parameter for bandwidth bandwidth control at this level raise critical concern most management while the application layer management especially in a broad organization’s network. techniques considered filter and bandwidth allotment

E based on classes or policies as the possible methods

Devajitet al., Ronget al. and Cao et al.’sresearch on () bandwidth management proffered efficient solutions for for bandwidth management. These alone cannot yield

bandwidth management using different internet complete bandwidth management. monitoring scheme. Their results followed that capturing data by monitoring and filtering access to the d) Lack of Biometric Impact internet is one of the scheduling schemes for In almost every network management practice, conservation and management of bandwidth on the the facial identity, department, position, job title are not applications layer. Internet access management deemed necessary for user account creation. Most systems enable network owners to monitor, create often, only a User name, user ID and password are the reports and manage traffic travelling for inbound or only identification and authorizations considered when outbound traffic in the network. Internet access creating user accounts in most network. The implication management provides better network bandwidth is that the network admins most often do not have management resulting in increased employees access or opportunity of seeing or physically identifying productivity and reduced legal liability associated with who is using or doing what in their networks. Therefore undesirable Internet content as specified by Devajitet such practices like impersonation, stealing a user ID or al..Many tools can be implemented to run internet masquerading a user can easily grant network access to filtering management in data collections which is an unauthorized user who may misuse bandwidth and based on routing layer protocol or application layer malicious activities which can eventually cause harm to protocol Avister(2013). the network. Also, an authorized user in a large network may tend to waste or misuse bandwidth when he or she

Global Journal of Computer Science and Technology Volume XVII Issue IV Version I IV. Analysis of the Existing cannot be physically identified. Bandwidth Management Applications e) Recommendations for Good Bandwidth All the existing different BWM models and Management Model techniques used for network bandwidth management Based on the analysis of this survey, the which were x-rayed in section IIIproved to be efficient following recommendations are suggested to be but each of the model, techniques of algorithm lacked in included in any bandwidth management application to certain aspects therefore failed to provide total proffer bandwidth or network management efficiency.

©2017 Global Journals Inc. (US) A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers a) Inclusion of biometrics parameters for identity of References Références Referencias users’ account in every bandwidth management application. 1. ANAND,(2005). Wireless Hotspots: Current b) The development of a hybrid model or system that challenges and future directions, mobile networks will encompass the features of the various and applications,10, pp 265–274 application layer models applied for bandwidth 2. Sunjay Sharma. (2011). A course in computer management. networks (Principles,Technologies and Protocols). OSI reference model and network architecture.First c) The inclusion of an automatic and immediate Edition, pp 1 – 44, feedback system to any bandwidth management 3. John S., Okonigene R.E., Matthews V.O., Akinade system with the capability of using the mac address B., Chukwu I.S,(2011). Managing and Improving of every user who attempts to gain entrance to a Upon Bandwidth Challenges in Computer Network, network but fails after two attempts. The user will

Journal of Emerging Trends in Engineering and 201 only be able to login after a biometric or physical Applied Sciences (JETEAS)2 (3) pp 482 -486 identification is made by the admin. 4. BehrouzA.Forouzan, (2013). Data communications Year

In conclusion, of an audit trail system that is and networking 5E, Introduction Global Edition, capable of always monitoring the activities of high end 39 Chapter 1,13 – 26. bandwidth users. 5. Devajit M.., Majidul A., Utpal J., Bora, (2013). A

V. Conclusion study of bandwidth management in computer networks. International Journal of Innovative Despite improvements in equipment Technology and Exploring Engineering, (IJITEE) performance and media capabilities, network design is ISSN:2278-3075Vol-2 issue 2, 69 -73 becoming more and more difficult as networks are 6. Sara Gywnn, (January 2013). IAP Workshop: expanding on daily basis due to the digital age. The “Promoting access and capacitybuilding for trend is toward increasingly complex environments scientific information resources. Darker, Senegal, pp involving multiple media, multiple protocols, and 30-32 interconnection to networks outside any single 7. Avistar Communications Corp.(2009).Product organization's dominion of control. Carefully choosing approach document bandwidth management, pp 2- the most appropriate model in designing networks can 10 reduce the hardships associated with growth as a 8. Jianguo Ding, (2013). Advances in network E networking environment evolves. Choosing the management, CRC Press, Tylor&Francis Group, () appropriate network model must not be overlooked Boca Raton London New York, International because, it is a prerequisite for a network design and Standard BookNumber 13:978-1-4200-6455-1 the eventual management of a network and its (EBook-PDF), pp 90 - 113 resources. Different bandwidth management technique 9. Youngzsoft,(July 2015).Retrieved from, http:// and models were surveyed with respect to the layers of youngzsoft.net/ ccproxy/manage ebandwidth.htm,. the OSI network model. The survey showed that the 10. Rong, I., Aragao M., C.C. Uchoa, E & Werneck, application layer bandwidth management techniques R.F.,(2010). NewBenchmark Instances for the was recommended by most researchers as the most Steiner problems in Graphs. In M.G.C. Resende J.P. effective for bandwidth management not withstanding Sousa & A. Viana (Eds) Metaheuristics: Computer some minor problems which this survey observed to decision Making Applied Optimization Series, have resulted basically from the non-inclusion of human Norwell, MA, USA: Kluwer Academic Publishers, parameters in the various application layer models 2010, Vol. 68, 601 -614 surveyed. In conclusion, to curb network and bandwidth 11. Kassim M., Ismail M., Jumari K., and Yusof J., management problems, with human being traffic (2012). International scholarly and scientific generators and bandwidth users, human factors and research & innovation, 6(2) World Academy of influence on bandwidth must be considered by any Science, Engineering and Technology, Vol:6 2012- model before a very efficient bandwidth management 02-22, 332 -339 solution can be achieved. The survey recommend the 12. Dan DiNicolo,(2013)www.2000Trainers.com. Global Journal of Computer Science and Technology Volume XVII Issue IV Version I development of a model or algorithm which will use the Retrieved on August 23rd 2016. application layer to manage bandwidth while https://en.wikipedia.org/wiki/Layered_ServiceProvid considering bandwidth allocation, sharing methods and er, page was last modified on, at 01:31 using organizational policies based on human biometric 13. Cao H., Yeng G., (2010) Bandwidth Management in and influence to manage networks. Computer Networks2010, Retrieved from

http//netmag.edu/~poi/clepis233/ebook/index.htm

14. Rafael F. Reale1, Romildo M. da S. Bezerra2 and

Joberto S. B. Martins, (November 2013). A

© 2017 Global Journals Inc. (US) A Survey on Bandwidth Management Techniques Via the OSI Model Network and Application Layers

Bandwidth Allocation Model Provisioning Framework With Autonomic Characteristics. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6,DOI : 10.5121/ijcnc,, 5606, pp 103 -119

201 Year

40 E

() Global Journal of Computer Science and Technology Volume XVII Issue IV Version I

©2017 Global Journals Inc. (US)

Global Journals Inc. (US) Guidelines Handbook 2017

www.GlobalJournals.org