You are IT support specialist tasked with setting up a NIDS system to monitor your company’s network traffic for suspicious behaviour . Which constraint must you consider when you set up the NIDS?