Comparative Analysis of Hierarchical Token Bucket and Per Connection Queue Methods in Video Conferences

Authors

  • Kariyamin Department of Information Technology, Institut Teknologi dan Bisnis Muhammadiyah Wakatobi, Indonesia
  • La Ode Alyandi Department of Information Technology, Institut Teknologi dan Bisnis Muhammadiyah Wakatobi, Indonesia
  • Deyti Lusty A'an Department of Information Technology, Institut Teknologi dan Bisnis Muhammadiyah Wakatobi, Indonesia
  • Wa Ode Reni Suarti Department of Information Technology, Institut Teknologi dan Bisnis Muhammadiyah Wakatobi, Indonesia
  • Putri Yapono Department of Information Technology, Institut Teknologi dan Bisnis Muhammadiyah Wakatobi, Indonesia
  • Diana May Glaiza G. Tangaro TK Elevator WLL, Fereej Bin Mahmoud, Shoumoukh Tower, Qatar
  • Florence Jean B. Talirongan College of Computer Studies, Misamis University, Philippines

DOI:

https://doi.org/10.64539/sjer.v1i2.2025.13

Keywords:

Hierarchy Token Bucket, Per-Connection Queue, Quality of Service, Video conference

Abstract

Video conferencing is a set of interactive telecommunication technologies that allow two or more parties in different locations to interact using audio and video simultaneously. In video conferencing tools, bandwidth management is needed to maintain the quality of data transmitted through bandwidth. The Hierarchical Token Bucket (HTB) method is a method that uses a hierarchical structure and priorities for the client so that the distribution of bandwidth can be adjusted. In contrast, the Per Connection Queue (PCQ) method is a method that applies bandwidth sharing so that the allocation of bandwidth can be done more evenly to all clients. The parameters used to determine the quality of service in both methods are throughput, packet loss, delay, and jitter. The test results showed that in the Zoom application, the HTB method had an average TIPHON Standard Index of 3.5, while the PCQ method was 3.75. However, in the TrueConf application, the HTB method has a TIPHON standard index of 3.75, while the PCQ method has a TIPHON standard index of 3.5. In the TrueConf application, the HTB method is superior, while in the Zoom application, the PCQ method is superior.

References

[1] W. Badawy, “On Scalable Video Codec for 4K and High Definition Video Streaming - The Hierarchical Adaptive Structure Mesh Approach ‘HASM-4k,’” in IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin, 2020, pp. 2–6. doi: 10.1109/ICCE-Berlin50680.2020.9352175.

[2] S. Xu and G. Liu, “Multi-access Edge Computing Based User Experience Driven Multicast Video Conference Algorithm,” Proceedings - 2020 IEEE 13th International Conference on Edge Computing, EDGE 2020, pp. 99–105, 2020, doi: 10.1109/EDGE50951.2020.00022.

[3] T. Banchuen, K. Kawila, and K. Rojviboonchai, “An SDN framework for video conference in inter-domain network,” International Conference on Advanced Communication Technology, ICACT, vol. 2018-Febru, pp. 600–605, 2018, doi: 10.23919/ICACT.2018.8323848.

[4] I. Riadi, Herman, and N. H. Siregar, “Mobile Forensic Analysis of Signal Messenger Application on Android using Digital Forensic Research Workshop (DFRWS) Framework,” Ingénierie des systèmes d information, vol. 27, no. 6, pp. 903–913, 2022, doi: 10.18280/isi.270606.

[5] L. Wang, Q. Li, L. Liu, Y. Jiang, M. Xu, and J. Wu, “S5: An Application Sensitive QoS Assurance System via SDN,” 2018 IEEE 37th International Performance Computing and Communications Conference, IPCCC 2018, pp. 1–8, 2018, doi: 10.1109/PCCC.2018.8710838.

[6] S. Sanjeev, “Genetic Algorithm and Multiple QoS Aspects,” 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 922–927, 2018.

[7] J. Xu et al., “Towards fuzzy QoS driven service selection with user requirements,” Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017, pp. 230–234, 2017, doi: 10.1109/PIC.2017.8359548.

[8] D. Iswadi, R. Adriman, and R. Munadi, “Adaptive Switching PCQ-HTB Algorithms for Bandwidth Management in RouterOS,” Proceedings: CYBERNETICSCOM 2019 - 2019 IEEE International Conference on Cybernetics and Computational Intelligence: Towards a Smart and Human-Centered Cyber World, pp. 61–65, 2019, doi: 10.1109/CYBERNETICSCOM.2019.8875679.

[9] M. Wairisal and N. Surantha, “Design and Evaluation of Efficient Bandwidth Management for a Corporate Network,” Proceedings of 2018 International Conference on Information Management and Technology, ICIMTech 2018, no. September, pp. 98–102, 2018, doi: 10.1109/ICIMTech.2018.8528162.

[10] R. Umar, I. Riadi, and R. S. Kusuma, “Mitigating sodinokibi ransomware attack on cloud network using software-defined networking (SDN),” International Journal of Safety and Security Engineering, vol. 11, no. 3, pp. 239–246, 2021, doi: 10.18280/ijsse.110304.

[11] M. I. Ichwan, L. Sugiyanta, and P. W. Yunanto, “Analisis Manajemen Bandwidth Hierarchical Token Bucket (HTB) dengan Mikrotik pada Jaringan SMK Negeri 22,” PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer, vol. 3, no. 2, pp. 122–126, 2019, doi: 10.21009/pinter.3.2.6.

[12] P. Ferdiansyah, R. Indrayani, and S. Subektiningsih, “Analisis Manajemen Bandwidth Menggunakan Hierarchical Token Bucket Pada Router dengan Standar Deviasi,” Jurnal Nasional Teknologi dan Sistem Informasi, vol. 6, no. 1, pp. 38–45, 2020, doi: 10.25077/teknosi.v6i1.2020.38-45.

[13] A. C. Nurcahyo, L. Firgia, and Y. Mustaqim, “Implementasi dan Analisis Metode Hierarchical Token Bucket pada Manajemen Bandwidth Jaringan (Studi Kasus : Jaringan Rektorat Institut Shanti Bhuana),” Journal of Information Technology, vol. 1, no. 2, pp. 41–49, 2021, doi: 10.46229/jifotech.v1i2.200.

[14] I. M. Martínez, I. Meneghel, M. Carmona-Halty, and C. M. Youssef-Morgan, “Adaptation and validation to Spanish of the Psychological Capital Questionnaire–12 (PCQ–12) in academic contexts,” Current Psychology, vol. 40, no. 7, pp. 3409–3416, 2021, doi: 10.1007/s12144-019-00276-z.

[15] E. R. Amalia, Nurheki, R. Saputra, C. Ramadhana, and E. H. Yossy, “Computer network design and implementation using load balancing technique with per connection classifier (PCC) method based on MikroTik router,” Procedia Comput Sci, vol. 216, pp. 103–111, 2023, doi: 10.1016/j.procs.2022.12.116.

[16] R. A. A. Amin and R. E. Indrajit, “Analysis of effectiveness of using simple queue with per connection queue (PCQ) in the bandwidth management (a case study at the academy of information management and computer Mataram (Amikom) Mataram),” J Theor Appl Inf Technol, vol. 83, no. 3, pp. 319–326, 2016.

[17] R. Hasan and R. Hasan, Threat model and security analysis of video conferencing systems as a communication paradigm during the COVID-19 pandemic. Elsevier Inc., 2022. doi: 10.1016/B978-0-323-90054-6.00009-X.

[18] A. B. Newcomb, M. Duval, S. L. Bachman, D. Mohess, J. Dort, and M. R. Kapadia, “Building Rapport and Earning the Surgical Patient’s Trust in the Era of Social Distancing: Teaching Patient-Centered Communication During Video Conference Encounters to Medical Students,” J Surg Educ, vol. 78, no. 1, pp. 336–341, 2021, doi: 10.1016/j.jsurg.2020.06.018.

[19] K. Sakthidasan @ Sankaran, X. Z. Gao, K. R. Devabalaji, and Y. Mohana Roopa, “Energy based random repeat trust computation approach and Reliable Fuzzy and Heuristic Ant Colony mechanism for improving QoS in WSN,” Energy Reports, vol. 7, pp. 7967–7976, 2021, doi: 10.1016/j.egyr.2021.08.121.

[20] W. Tian and Y. Hu, “Label importance ranking with entropy variation complex networks for structured video captioning,” Traitement du Signal, vol. 38, no. 4, pp. 937–946, 2021, doi: 10.18280/ts.380403.

[21] O. Said, “A bandwidth control scheme for reducing the negative impact of bottlenecks in IoT environments: Simulation and performance evaluation,” Internet of Things (Netherlands), vol. 21, no. December 2022, p. 100682, 2023, doi: 10.1016/j.iot.2023.100682.

[22] H. T. Madan and P. I. Basarkod, “Throughput and Outage Probability Analysis for Cognitive Radio-Non-Orthogonal Multiple Access in Uplink and Downlink Scenarios,” Mathematical Modelling of Engineering Problems, vol. 7, no. 4, pp. 659–666, 2020, doi: 10.18280/MMEP.070419.

[23] G. Rahate and N. Chopade, “Realistic Vertical Handoff Predictive Trigger Thresholding in Heterogeneous Networks,” Ingenierie des Systemes d’Information, vol. 27, no. 4, pp. 557–563, 2022, doi: 10.18280/isi.270405.

[24] S. Automatisés, “Journal Europé en des Systèmes Automatisés,” vol. 53, no. 3, pp. 429–435, 2020.

[25] L. Verma, I. Verma, and M. Kumar, “An Adaptive Congestion Control Algorithm,” Modelling, Measurement and Control A, vol. 92, no. 1, pp. 30–36, 2019, doi: 10.18280/mmc_a.920105.

[26] M. Y. Wu, Y. H. Lin, T. H. Tseng, C. M. Hsu, K. S. Hsu, and H. C. Young, “A QoS monitoring system for LTE small cells,” IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–4, 2018, doi: 10.1109/NOMS.2018.8406308.

[27] A. K. Gaysin, A. S. Morozov, D. D. Mullahmetov, and A. F. Nadeev, “Development of a Method for Monitoring the GSM Radio Network Fragment’s QoS Parameters,” 2018 Wave Electronics and its Application in Information and Telecommunication Systems, WECONF 2018, pp. 1–5, 2019, doi: 10.1109/WECONF.2018.8604407.

[28] A. Ayyasamy, R. S. Krishnan, and Y. H. Robinson, “Quality of Service using Classified-based approach in Wireless Crop Monitoring Network model,” in Proceedings of the 3rd International Conference on Communication and Electronics Systems, ICCES 2018, IEEE, 2018, pp. 1206–1210. doi: 10.1109/CESYS.2018.8723902.

[29] A. Binsahaq, T. R. Sheltami, and K. Salah, “A Survey on Autonomic Provisioning and Management of QoS in SDN Networks,” IEEE Access, vol. 7, pp. 73384–73435, 2019, doi: 10.1109/ACCESS.2019.2919957.

[30] G. Setti, “Bibliometric indicators: Why do we need more than one?,” IEEE Access, vol. 1, pp. 232–246, 2013, doi: 10.1109/ACCESS.2013.2261115.

[31] G. Mykola, S. Natalia, L. Oleksandr, D. Václav, Č. Jirí, and L. Miroslav, “Double QoS Implementation in the Network Bandwidth Adjustment Task,” International Journal of Intelligent Engineering and Systems, vol. 11, no. 1, pp. 20–29, 2018, doi: 10.22266/ijies2018.0228.03.

[32] Y. Takeda, Y. Musashi, K. Sugitani, and T. Moriyama, “DNS ANY request cannon activity in DNS query packet traffic,” Proceedings - 2013 6th International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2013, vol. 7, no. 1, pp. 181–184, 2013, doi: 10.1109/ICINIS.2013.53.

[33] N. T. E. Hermawan, E. Winarko, A. Ashari, and Y. R. Akhmad, “High Secure Initial Authentication Protocol based on EPNR Cryptosystem for Supporting Radiation Monitoring System,” International Journal of Intelligent Engineering and Systems, vol. 14, no. 5, pp. 1–14, 2021, doi: 10.22266/ijies2021.1031.01.

[34] A. S. J. Charles and K. Palanisamy, “QoS Measurement of RPL using Cooja Simulator and Wireshark Network International Journal of Computer Sciences and Engineering Open Access QoS Measurement of RPL using Cooja Simulator and Wireshark Network Analyser,” International Journal of Computer Sciences and Engineering, vol. 6, no. May, pp. 283–291, 2018.

[35] M. N. Hafizh, I. Riadi, and A. Fadlil, “Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic,” Jurnal Telekomunikasi dan Komputer, vol. 10, no. 2, p. 111, 2020, doi: 10.22441/incomtech.v10i2.8757.

[36] R. Prabha, M. V. Ramesh, and V. P. Rangan, “Building Optimal Topologies for Real-Time Wireless Sensor Networks,” 2018 International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2018, pp. 1–6, 2018, doi: 10.1109/WiSPNET.2018.8538721.

[37] R. S. Tessinari et al., “On the Impact of the Physical Topology on the Optical Network Performance,” 2018 British and Irish Conference on Optics and Photonics, BICOP 2018 - Proceedings, vol. 1, no. December, pp. 1–4, 2019, doi: 10.1109/BICOP.2018.8658361.

[38] B. Aravind and D. Murugan, “Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols,” no. 8, 2019.

[39] G. M. Othman Zebari, K. Faraj, and S. R. M. Zeebaree, “Hand Writing Code-PHP Or Wire shark Ready Application Over Tier Architecture with Windows Servers Operating Systems or Linux Server Operating Systems,” no. 6, pp. 142–149, 2016.

[40] S. M. B. Khan and M. M. H. Shojib, “Design and Implementation of Tree Topology in Software Defined Networking (SDN) using Mininet and OpenDaylight,” International Journal of Computer Sciences and Engineering, vol. 9, no. 11, pp. 51–67, 2021, doi: 10.26438/ijcse/v9i11.5167.

Downloads

Published

2025-06-05

How to Cite

Kariyamin, Alyandi, L. O., A’an, D. L., Suarti, W. O. R., Yapono, P., Tangaro, D. M. G. G., & Talirongan, F. J. B. (2025). Comparative Analysis of Hierarchical Token Bucket and Per Connection Queue Methods in Video Conferences. Scientific Journal of Engineering Research, 1(2), 71–82. https://doi.org/10.64539/sjer.v1i2.2025.13

Issue

Section

Articles

Similar Articles

You may also start an advanced similarity search for this article.