⚡ Quick Answer
QoS (Quality of Service) manages network traffic to give priority to latency-sensitive applications. Key concepts: Classification = identify and mark traffic (DSCP field in IP header). Traffic shaping = buffer excess traffic and release it smoothly (causes delay, not drops). Traffic policing = enforce hard rate limits and drop excess traffic immediately. DSCP EF (46) = voice (highest priority). DSCP AF41 (34) = video. DSCP CS0 (0) = best-effort. CoS = Layer 2 equivalent using 802.1p bits in the VLAN tag.
Why QoS Matters
Networks have finite bandwidth. When a link becomes congested, packets queue up and routers must decide which ones to forward first and which ones to drop. Without QoS, that decision is made randomly — a large file download could cause equal congestion impact as a VoIP call, even though the call is far more sensitive to delay.
QoS solves this by providing a framework to classify, mark, and manage traffic based on its type and business importance. Voice calls get forwarded immediately with guaranteed bandwidth. Video gets a large dedicated queue. Bulk file transfers get whatever bandwidth remains. The result is consistent call quality even on a busy network.
Three properties of traffic quality matter most for real-time applications: latency (one-way delay — voice needs under 150ms to sound natural), jitter (variation in latency — causes choppy audio/video), and packet loss (dropped packets — TCP retransmits them but UDP doesn't, causing gaps in voice/video).
QoS Models
🏗️
IntServ (Integrated Services)
Applications reserve bandwidth end-to-end across the network using the RSVP (Resource Reservation Protocol) signalling protocol. Each router along the path must be aware of and maintain the reservation. Provides guaranteed, hard QoS. Drawback: doesn't scale — every router must maintain state for every flow. Rarely used on large networks today.
RSVPHard guaranteesPer-flow state
📊
DiffServ (Differentiated Services)
Traffic is classified and marked at the network edge using the DSCP field. Core routers apply forwarding behaviors based on DSCP markings without tracking individual flows — highly scalable. The dominant QoS model in modern enterprise and service provider networks. Per-Hop Behavior (PHB) is the forwarding behavior applied at each router based on the DSCP value.
DSCPScalablePer-Hop Behavior
DSCP Markings — Traffic Classes
DSCP (Differentiated Services Code Point) uses 6 bits in the IP header's ToS field, allowing 64 possible values. In practice, a handful of well-known values are used for specific traffic types.
| DSCP Name |
DSCP Value |
Decimal |
Typical Use |
Drop Probability |
| EF — Expedited Forwarding |
101110 |
46 |
VoIP / real-time voice |
None — highest priority queue |
| AF41 — Assured Forwarding 4,1 |
100010 |
34 |
Video conferencing |
Low |
| AF31 — Assured Forwarding 3,1 |
011010 |
26 |
Business-critical apps (ERP, CRM) |
Low |
| AF21 — Assured Forwarding 2,1 |
010010 |
18 |
Transactional data |
Low |
| AF11 — Assured Forwarding 1,1 |
001010 |
10 |
Bulk data, background transfers |
Low |
| CS0 — Best Effort (BE) |
000000 |
0 |
Default — unclassified traffic |
Highest (dropped first) |
| CS6 / CS7 |
110000 / 111000 |
48 / 56 |
Network control traffic (routing protocols, OSPF, BGP) |
None — reserved for network use |
🎯 Exam Tip — DSCP Numbers to Know
EF = 46 = VoIP. This is the most tested value. If the question mentions voice traffic and a DSCP number, it's 46.
AF4x = Video. AF41 (34) is standard for video conferencing.
CS0 = 0 = Best Effort. Default marking for traffic that hasn't been classified. It gets whatever's left over.
CS6/CS7 are reserved for network infrastructure (routing protocol traffic). Never use these for user applications.
CoS — Class of Service (Layer 2)
DSCP operates at Layer 3 (IP header). CoS (Class of Service), defined in IEEE 802.1p, is the Layer 2 equivalent — it uses 3 bits in the 802.1Q VLAN tag to mark traffic with a priority from 0 (lowest) to 7 (highest). This allows QoS to be applied on Ethernet switches before traffic is routed.
📌 CoS Values in Practice
CoS 5 = VoIP (maps to DSCP EF). CoS 4 = Video. CoS 3 = Business-critical data. CoS 0 = Best effort (default).
When traffic moves from Layer 2 to Layer 3, CoS values are typically mapped to corresponding DSCP values. Network devices re-mark traffic at trust boundaries — where traffic enters from an untrusted source, markings are reset or re-applied according to policy.
Traffic Shaping vs Traffic Policing
Both mechanisms enforce a rate limit, but they handle traffic that exceeds the limit differently. Understanding this distinction is frequently tested.
🔄
Traffic Shaping
Buffers excess traffic and releases it at a controlled rate. Bursts are absorbed into a queue and transmitted smoothly — like a token bucket. No packet loss from the shaping mechanism itself (only if the buffer fills completely). Causes additional delay. Best for outbound traffic where you want smooth transmission without drops. TCP handles this well — smooth flow without retransmits.
Buffers excessAdds delayNo drops
🚔
Traffic Policing
Drops or re-marks excess traffic immediately — no buffering. Traffic that exceeds the configured rate is either discarded or remarked to a lower DSCP class (so it gets dropped later during congestion). Causes packet loss for TCP applications (triggers retransmits, reducing effective throughput). Used on ingress interfaces and on service provider networks to enforce contracted rates (CIR — Committed Information Rate).
Drops excessHard limitCIR enforcement
Queuing Mechanisms
When congestion occurs, packets queue before being transmitted. The queuing mechanism determines which packets are served next — this is where priority enforcement actually happens.
FIFO
First In, First Out
Packets are transmitted in the order they arrived — no priority. Simple but provides no QoS. All traffic is treated equally. Default on unconfigured interfaces. A large burst from one flow can delay all other traffic (head-of-line blocking).
PQ
Priority Queuing
Traffic is assigned to one of 4 queues (high, medium, normal, low). High-priority queue is always served first — lower queues only get bandwidth when the high queue is empty. Risk of starvation: low-priority traffic may never be served if high-priority traffic never stops. Used for strict QoS enforcement.
WFQ
Weighted Fair Queuing
Automatically identifies flows and assigns bandwidth proportional to IP precedence. Ensures all flows get some bandwidth — prevents starvation while still giving priority to marked traffic. Good for mixed environments without manual queue configuration. Default queuing on many Cisco interfaces below 2 Mbps.
CBWFQ
Class-Based Weighted Fair Queuing
Extends WFQ — traffic classes are defined by the administrator (matching ACLs, DSCP values, protocols) and each class is guaranteed a minimum bandwidth percentage. Most commonly used queuing method in enterprise QoS policies. Often combined with LLQ for voice.
LLQ
Low Latency Queuing
Adds a strict priority queue to CBWFQ for voice and real-time traffic. Voice traffic always gets forwarded immediately from the priority queue; all other classes share remaining bandwidth via CBWFQ. The recommended queuing mechanism for VoIP networks.
RED / WRED
Weighted Random Early Detection
Proactively drops packets randomly before queues fill completely, signalling TCP senders to slow down before congestion gets critical. WRED respects DSCP markings — packets with lower priority are dropped at lower queue fill thresholds than high-priority packets. Prevents global synchronisation of TCP flows.
Bandwidth Guarantees — CIR and CBR
📌 Key Rate Terms
CIR (Committed Information Rate) — the guaranteed minimum bandwidth contracted with a service provider. Traffic up to the CIR is always forwarded. Traffic above the CIR (burst) may be forwarded if bandwidth is available, or dropped/re-marked.
CBR (Constant Bit Rate) — a fixed, continuous rate with no variation. Used for voice circuits and legacy TDM connections. Every packet of a CBR flow is transmitted at exactly the same rate.
PIR (Peak Information Rate) — the maximum rate allowed during burst periods above the CIR. Traffic between CIR and PIR is marked "excess" and may be dropped during congestion.
QoS Trust Boundaries
A trust boundary is the point in the network where you stop trusting incoming QoS markings and enforce your own policy. Endpoints (PCs, phones) can mark their own traffic with any DSCP value — including spoofing high-priority markings to get preferential treatment. The trust boundary is where you re-classify and re-mark traffic according to network policy.
🎯 Exam Tip — Trust Boundary Placement
IP phones: Trust DSCP markings from IP phones (they correctly mark voice at EF=46) but re-mark PC traffic behind the phone to CS0 regardless of what the PC claims.
Access layer switches: The most common trust boundary. Markings from untrusted endpoints are reset here; the switch re-marks based on interface or ACL-based policies.
Never trust markings from the internet — ISPs strip or ignore DSCP markings at their boundaries. QoS works within your network, not across arbitrary internet paths.
Exam Scenarios
Scenario 1: Users report poor voice call quality when the network is heavily loaded with large file transfers. What QoS technique should be implemented? Answer: Configure LLQ (Low Latency Queuing) with a strict priority queue for voice traffic (DSCP EF = 46). Limit file transfer traffic to a separate CBWFQ class with capped bandwidth. Voice will always be forwarded immediately from the priority queue.
Scenario 2: A company's internet connection is contracted for 100 Mbps. An ISP wants to enforce this limit. Which technique drops packets that exceed 100 Mbps immediately rather than buffering them? Answer: Traffic policing. Traffic above the CIR is dropped (or re-marked) immediately. Traffic shaping would buffer excess traffic, which is not what strict CIR enforcement requires.
Scenario 3: An administrator needs to ensure that VoIP traffic always receives the highest DSCP marking. A user is attempting to mark their web browser traffic as DSCP 46 to gain priority. How is this prevented? Answer: Define a QoS trust boundary at the access layer switch. Reset all DSCP markings from untrusted user devices to CS0. Apply a policy that re-marks only known VoIP sources (by IP address or port 5060/RTP) to DSCP EF.
Scenario 4: What DSCP value should be assigned to VoIP traffic, and what is the equivalent CoS value? Answer: VoIP traffic should be marked DSCP EF = 46 at Layer 3. The equivalent Layer 2 CoS value is CoS 5 in the 802.1p field of the VLAN tag (802.1Q).
Scenario 5: A network team wants to implement QoS without tracking individual flows or reserving per-connection bandwidth across every router. Which QoS model should they use? Answer: DiffServ (Differentiated Services). Traffic is classified and marked at the edge, and core routers apply Per-Hop Behaviors based on DSCP values — no per-flow state is maintained, making it scalable. IntServ/RSVP would require per-flow reservations at every hop and doesn't scale.
Ace your Network+ exam
Free cheat sheets covering QoS, routing, WAN, and more.
View Cheat Sheet →
Related Topics