Quality of service (QoS) is a technology that allows a network design to strategically optimize network performance for select traffic types. This means, using QoS on a network device can identify which traffic types need to be sent first, how much bandwidth to allocate to various traffic types, which traffic types should be dropped first in the event of congestion, and how to make the most

efficient use of the relatively limited bandwidth of an IP WAN.

Indicate whether the statement is true or false


TRUE
Explanation: Quality of service (QoS) is a suite of technologies that enable you to strategically optimize network performance for select traffic types. For example, in today's converged networks (that is, networks simultaneously transporting voice, video, and data), some applications (for example, voice) might be more intolerant of delay (that is, latency) than other applications (for example, an FTP file transfer is less latency sensitive than a Voice over IP [VoIP] call). Fortunately, through the use of QoS technologies, you can identify which traffic types need to be sent first, how much bandwidth to allocate to various traffic types, which traffic types should be dropped first in the event of congestion, and how to make the most efficient use of the relatively limited bandwidth of an IP WAN.

Computer Science & Information Technology

You might also like to view...

Examples of access specifiers are the key words

a. near and far b. opened and closed c. private and public d. table and row e. None of these

Computer Science & Information Technology

When Track Changes is active, ________ indicate where text has been added, deleted, or formatted

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ____ image represents an image as a grid of dots and specifies the color of each dot.

A. vector B. bitmap C. layout D. static

Computer Science & Information Technology

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

a. Comcast was creating access lists that blocked known BitTorrent trackers. b. Comcast was interjecting TCP segments with the RST (reset) field set. c. Comcast used DNS poisoning to prevent clients from talking to other BitTorrent users. d. Comcast used IP spoofing to impersonate other BitTorrent clients, then dropped traffic.

Computer Science & Information Technology