A CEO finds that during periods of high network
usage, she is unable to access enterprise applications to respond
effectively to critical business communications. The IT admin wants
to ensure that all traffic to and from the CEO receives preferential
treatment over other employee traffic so that she is guaranteed
not only access to, but high performance of, critical network resources.