4/26/10

Ubuntu Countdown | Ubuntu



Help spread the word about Ubuntu


Thanks to the Ubuntu Web Presence Team for contributing these graphics and animations. If you're interested in helping to spread Ubuntu the team is open to everyone. A special thanks goes to the community members who created the graphics, concept and animation:
For best results: use the exact code listed. It will change as release day approaches so if you copy the file to a different location you won't get the full benefit.

4/18/10

CWNA - Certified Wireless Network Administrator


 CWNA Certified Wireless Network Administrator Official Study Guide: Exam PW0-104 (CWNP Official Study Guides)CWNA Certified Wireless Network Administrator Official Study Guide: Exam PW0-104 (CWNP Official Study Guides) 

CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 (CWNP Official Study Guides)CWTS: Certified Wireless Technology Specialist Official Study Guide: Exam PW0-070 (CWNP Official Study Guides)

I completed a 1 week intense CWNP program at Motorola Holtsville, NY in 2009.
Get a first look at what you will be learning in order to  pass the CWNA exam and begin the journey to becoming a Certified Wireless Network Professional.
  • Objectives CWNP
  • About Your Instructor and Training
  • What’s Covered in the Course

Introduction to WLAN Standards

You will learn about the several different wireless LAN Standards and other related standards.
  • Standard Organizations
  • Wi-Fi Alliance
  • IEEE 802.11 Working Groups
  • 802.11 Amendments
  • 802.11a Amendment
  • 802.11b Amendment
  • 802.11g Amendment
  • 802.11h Amendment
  • 802.11e and 802.11i Amendments
  • 802.11j, 802.11d, and 802.11c Amendments
  • 802.11r and 802.11n Amendments
  • 802.11s and 802.11k Amendments
  • 802.11p and 802.11t Amendments
  • 802.11u, 802.11v, and 802.11w Amendments
  • Related Standards: 802.1X and EAP
  • Related Standards: 802.3 - 2005, Clause 33
  • Related Standards: RADIUS

RF Fundamentals

You will learn to understand the fundamentals of Radio Frequency behavior as it relates to wireless networking.
  • Sine Waves
  • Current Flow
  • Photons
  • Wavelength
  • Frequency
  • Wavelength and Frequency
  • Wavelength Calculation
  • Amplitude (Power Level)
  • Phase
  • RF Loss
  • RF Loss: Reflection
  • RF Loss: Refraction
  • RF Loss: Diffraction
  • RF Loss: Scattering
  • RF Loss: Absorption
  • Interference (Corruption)
  • Basic Types of Modulation
  • DSSS and HR/DSSS MCS
  • OFDM MCS
  • Spectral Mask: DSSS and HR/DSSS
  • Spectral Mask: OFDM
  • 2.4 GHz ISM Band and Channels
  • UNII Bands and Channels
  • DSSS Coding
  • OFDM FEC Coding

RF Math

Learn how to set a basic wireless router and a single client, talking to an access point. Also, learn to put WEP encryption between the wireless client and the access point, to provide basic internet security.
  • Inverse Square Law
  • Free Space Path Loss (FSPL)
  • Units of Measure
  • Rule of 10s and 3s
  • RF Numbers: Infinitely Large to Infinitesimally Small
  • Conversion Chart: dBm/mW
  • Gains and Losses
  • 2X Amplification (Rule of 3s)
  • 2X Attenuation (Rule of 3s)
  • 10X Amplification (Rule of 10s)
  • 10X Attenuation (Rule of 10s)
  • RF Math: Problem
  • Receiver Sensitivity
  • Equivalent Isotropically Radiated Power (EIRP)
  • Will the Link Work?

Antennas

You will embark on a comprehensive journey, learning everything you will need to know about antennas.
  • Isotropic Radiator
  • Visualizing Beam Patterns
  • Polarization of an Antenna
  • Understanding Polarization
  • Passive Gain
  • Low Gain Omni Antennas
  • High Gain Omni Antennas
  • Omni Antenna Examples
  • Semi-Directional Antennas: Patch/Panel
  • Patch Antennas
  • Patch/Panel Antenna Examples
  • Sector Panel Antennas
  • Sectorized Antenna Systems
  • Yagi Antennas
  • Highly-Directional Antennas: Parabolic Dish or Grid
  • Dish/Grid Antennas
  • Antenna Mounting Accessories
  • Antenna Mounting Examples
  • Voltage Standing Wave Ratio
  • Antenna Characteristics
  • Simple Diversity Systems
  • Diversity Transit Systems
  • Line-of-Sight (LoS)
  • Fresnel Zone
  • Calculating 1FZ Size & Minimum Clearance
  • Free Space Path Loss (FSPL)
  • Earth Bulge
  • Calculating Antenna Height for Links > 7 Miles
  • Antenna Downtilt
  • Antenna Safety
  • Antenna Accessories: RF Cables
  • FCC Part 15.204 Amendment
  • Antenna Accessories: Pigtail Cables
  • Common RF Connectors
  • Lightning Arrestors
  • Lightning Protection

RF Regulatory Domains

You will learn how the Radio Frequency spectrum is managed locally, regionally, and throughout the world.
  • International RF Spectrum Management Hierarchy
  • Regional Spectrum Management Groups – CITEL, CEPT, RCC, ATU, & APT
  • Examples of Local RF Regulatory Bodies
  • 2.4 GHz ISM Band
  • 5 GHz Unlicensed Bands
  • FCC 2.4 GHz PtMP Rules
  • Americas/EMEA 5 GHz Band Rules
  • FCC 5 GHz PtMP Rules: UNII-1, 2, & 3
  • FCC 2.4 GHz PtP Rules
  • FCC 5 GHz PtP Rules: UNII-3

Wireless LAN Operation

You will get a comprehensive view at the operation Wireless LAN hardware and software.
  • WLAN Radios
  • Client Utilities
  • Enterprise-Class Client Utilities
  • Access Points
  • Access Points as MAC Bridges
  • Frame Forwarding Between Physical Interfaces
  • Ad Hoc Mode
  • Infrastructure Mode
  • Wireless Network Management Systems (WNMS)
  • WLAN Controllers
  • WLAN Controller: Core
  • WLAN Controller: Distribution
  • WLAN Controller: Access
  • WLAN Profiles
  • Remote Office WLAN Controllers
  • Wireless Workgroup Bridges
  • Workgroup Bridges
  • Wireless Bridges
  • Bridging Repeaters
  • Access Point: Root Mode
  • Access Point: Repeater Mode Wireless Distribution System
  • Point-to-Point (PtP) Connections
  • Point-to-Point Bridging
  • Point-to-Multipoint (PtMP) Connections
  • Point-to-Multipoint Bridging
  • Line-of-Sight (LoS)
  • Wireless Residential Gateways
  • Wireless VPN Routers
  • Enterprise Encryption Gateways (EEGs)
  • Using EEGs
  • WLAN Arrays
  • Location Tracking
  • Evolution of WLAN Architecture
  • Evolution of WLAN Architecture: Multi-Channel Architecture (MCA)
  • Evolution of WLAN Architecture: Single Channel Architecture (SCA)
  • Wireless Mesh Networks

Power over Ethernet (PoE)

You will learn what Power over Ethernet is, how it works, and it’s applications in the wireless network.
  • A Tale of Two Standards
  • PoE Overview
  • Powered Device (PD)
  • Power Sourcing Equipment
  • 802.3af PD Classification Signature
  • 802.3af PSE Power Classes & PD Power Consumption
  • Where is the Power?
  • 802.3af Power Interface
  • PSE Endpoint Alternative A
  • PSE Endpoint Alternative B
  • PSE Midspan
  • 802.3af PD Pinout
  • High Density PoE Requires Planning
  • High Density PoE Requires High-Power Feeds and Much Cooling
  • Use of Management Protocols
  • Where PoE is Used in WLANs
  • Non-WLAN Uses of PoE
  • PoE Diagnostics

802.11 Service Sets

You will learn about the three types of service sets within the 802.11 Service Set. Plus, you will learn about 802.11 association, authentication, and network infrastructure.
  • 802.11 Service Sets
  • Independent Basic Service Set (IBSS)
  • IBSS Process
  • Basic Service Set (BBS)
  • BSS Selection
  • Extended Service Set
  • The Network Infrastructure
  • Integration Service
  • Distribution System
  • Wireless Distribution System (WDS)
  • 802.11 State Machine
  • Joining a Service Set - State 1 (Discovery)
  • Joining a Service Set - State 1 (Open System Auth)
  • Joining a Service Set - State 1 (Shared Key Auth)
  • Joining a Service Set - State 2 (All Frames)
  • Disassociation
  • Deauthentication
  • Roaming (BSS Transition)
  • Load Balancing

Basic WLAN Analysis

You will learn how to perform protocol analysis on your wireless network. Plus, you will take a detailed look at the 802.11 Frame Types, Protection Mechanisms, Power Saving Operations, and Transmission Rates.
  • WLAN Protocol Analyzers
  • Handheld Protocol Analyzers
  • 802.11 Frame Format
  • Data Frames
  • Null Frames
  • Control Frames
  • Hidden Node - Obstructions
  • Hidden Node - Signal Strength
  • Hidden Node - Signaling Methods
  • Using RTS/CTS
  • RTS/CTS Exchange
  • Protection Mechanisms
  • Power Management Modes
  • TIM and DTIM
  • ATIM & ATIM Window
  • Legacy Power Save and U-APSD
  • Management Frames
  • Beacons
  • Probe Requests/Responses
  • Open Authentication
  • Shared Key Authentication
  • Association Request/Response
  • Disassociation
  • Deauthentication
  • Acknowledgement (Ack) Frames
  • Basic and Supported Rates
  • Transmission Rates

802.11 Medium Access

You will learn about Carrier Sense Multiple Access Collision Detection and Carrier Sense Multiple Access Collision Avoidance and other methods and functions that you can use to avoid collisions and provide true Quality of Service.
  • CSMA/CD
  • CSMA/CA
  • Distributed Coordination Function (DCF)
  • Virtual Carrier Sense
  • Physical Carrier Sense
  • Inter-Frame Spacing
  • Random Backoff Algorithm
  • Point Coordination Function (PCF)
  • 802.11e MAC Architecture
  • HCF Controlled Channel Access (HCCA)
  • Enhanced Distributed Channel Access (EDCA)
  • WMM Access Categories (AC)
  • WMM Transmission Queues
  • WMM Power Save (WMM-PS)

802.11n Amendment

802.11n completely revamps how we look at wireless networking. 802.11n is the wave of the future and if you plan on becoming a Wireless Network Administrator then you will have to be an expert on 802.11n. This video will help you take that next step to becoming an 802.11n expert and prepare your for the future of wireless networking!
  • Why 802.11n?
  • PHY Comparison
  • Reliable Connectivity
  • Challenging RF Environments
  • Bandwidth Intensive Environments
  • Voice and Video Readiness
  • Mixed Client Environments
  • 802.11n Enhancements
  • SISo vs. MIMO
  • MIMO
  • SISO and Multipath
  • MIMO Radio Card
  • MIMO "Uses" Multipath
  • MIMO: Tx Beam Forming
  • MIMO: Maximal Ratio Combining
  • MIMO: Spatial Multiplexing
  • PHY Enhancements: Effect of Throughput Example
  • MIMO: Space-Time Block Coding (STBC)
  • SM + STBC Data Flow
  • 20 MHz Channel Mask
  • 40 MHz Channel Mask
  • 20 MHz vs. 40 MHz Channels
  • 2.4 GHz Channel Selection
  • Channel Bonding (2.4 & 5 GHz)
  • Channel Bonding in 5 GHz
  • OFDM Subcarries
  • Non-HT Duplicate Mode
  • Guard Interval Reduction
  • Antenna Selection (ASEL)
  • 802.11n MCS (Data) Rates
  • 802.11n Enhancements
  • 802.11 Protocol Stack
  • 802.11 Encapsulation
  • Frame Aggregation
  • Frame Aggregation: A-MSDU
  • Frame Aggregation: A-MPDU
  • Frame Aggregation Efficiency
  • Block Acknowledgements
  • Reducing MAC Overhead
  • Power Save: SMPS & PSMP
  • SMPS: Static
  • SMPS: Dynamic
  • Unscheduled PSMP (U-PSMP)
  • Scheduled PSMP (S-PSMP)
  • 802.11n Coexistence
  • PPDU Frame Formats
  • 802.11n HT Protection Modes
  • 20/40 MHz BSS Mode
  • PCO BSS Mode
  • Dual CTS Protection
  • L-SIG TXOP Protection
  • 40 MHz Intolerant
  • Wi-Fi Certification for Draft 2.0
  • 802.11n Considerations
  • Backhaul Speeds
  • Power over Ethernet (PoE)
  • Cable Plant Certification
  • 802.11n Deployment Strategy
  • 802.11n Migration Strategy
  • Client Population
  • Site Survey Methodology
  • Data Forwarding Scalability
  • 802.11n Tools: Analyzer
  • 802.11n Tools: Calculator
  • 802.11n Tools: Simulator
  • 802.11n Tools: Efficiency
  • Analyzer: AP Detail
  • Channel Occupancy Effects

Site Surveying

A site survey can be the most important component of a wireless network’s design. You will learn how to determine how much equipment is going to be needed and where that equipment should be located in order to allow the wireless network to function as required.
  • What is an RF Site Survey?
  • The Survey Process
  • Understanding the Customer’s Requirements
  • Access and Documents
  • Spectrum Analyzers
  • Portable, Traditional Spectrum Analyzers
  • Spectrum Analysis
  • Identifying Legacy and Non Wi-Fi 802.11 Transmissions
  • Two Types of RF Site Surveys
  • Manual RF Site Surveys
  • Manual RF Site Survey Applications
  • Manual Site Survey Kit
  • Predictive RF Site Surveys
  • Predictive RF Modeling Tools
  • General Survey Principles
  • Channel Reuse
  • MCA vs. SCA
  • Coverage vs. Capacity
  • VoWLAN Surveying
  • Surveying for SCA Systems
  • Portability vs. Mobility
  • Recommended Rx Thresholds
  • Site Survey Report: The Deliverable
  • RF Site Survey Forms

Basic WLAN Security

You will learn how to lockdown your Wireless Network so that your private data being sent over your wireless network remains private.
  • The Importance of WLAN Security
  • WLAN Secuirty is...
  • Wi-Fi Worries at Home
  • Is Your WLAN Secure?
  • Network Security Components
  • General Security Policy
  • Functional Security Policy
  • Security Policy Compliance
  • WLAN Discovery
  • SSID Hiding
  • Legacy WLAN Security
  • Wi-Fi Protected Access
  • WPA Terminology
  • WPA-2 Personal
  • Wi-Fi Protected Setup
  • Generic 802.1x Process
  • Role Based Access Control
  • WIDS/WIPS
  • Protocol Analyzers
  • Baseline Practices: SOHO
  • Baseline Practices: SMB
  • Baseline Practices: Enterprise

CWNA - Certified Wireless Network Administrator


Configuring Basic WLAN Security

  • Objectives
  • Set up a SOHO Access Point
  • Hiding the SSID
  • Enable MAC Filtering
  • Enable WEP
  • Crack WEP
  • Enable WPA2

Setting Up a Wireless LAN Controller

  • Objectives
  • Connecting with the Console
  • Connecting with a Browser
  • Configuring Networking
  • Configure the WLAN
  • Setting Up Security
  • Configuring Access Point
  • Adaptive AP Setup
  • Implementing Band Steering
  • Client Side of Band Steering

Networking Fundamentals Outline

Networking Fundamentals

Network Topologies

You will learn about the various ways to setup your physical network, do an in depth overview of Wide Area Network technologies, and learn how to logically change your physical network using Virtual Private Networks and Virtual Local Area Networks.
  • What Does Topology Mean?
  • Bus
  • Star
  • Ring
  • Mesh
  • Hybrid
  • WAN Technologies - Circuit and Pocket Switching
  • POTS, PSTN, T1/E1, and T3/E3
  • ISDN
  • SONET/OC-x
  • Frame Relay and ATM
  • MPLS - Multiprotocol Label Switching
  • DSL
  • Cable Modem, Satellite and Wireless
  • What is a VPN?
  • What is a VLAN?
Networking Fundamentals

OSI Model

This information will help you truly understand what is going on in a network and what's going on at each layer. Plus, discover exactly how networks are utilized at the most basic level by sending data from one point and receiving it at another point.
  • Definition of a Protocol
  • Standards of Communication
  • What is the OSI Model?
  • Defining OSI Model Layers
  • How Data Travels Through OSI Model
  • Networking Hardware in OSI Model
Networking Fundamentals

TCP/IP

We will examine the intricacies of the Transmission Control Protocol (TCP) and the Internet Protocol (IP), also known as TCP/IP. Plus, you will discover the architecture of the TCP/IP Protocol Suite and how this relates to networking.
  • TCP/IP Protocol Suite
  • What is TCP/IP (DARPA) Model?
  • Transport Layer Protocols
  • Internet Layer Protocols
  • Types of TCP/IP Communication
  • Working with IP Addresses
  • Planning an IP Addressing Scheme
  • Rules for IP Addressing
  • What is Classful IP Addressing?
  • Private vs. Public IP Addressing
  • What is NAT?
  • How Computers Get IP Addresses
  • Working with Binary Numbers
  • Converting Binary to Decimal and Vice Versa
  • Binary IP Addresses
  • Binary Subnet Masks
  • Internetworking - What is a Router?
  • What is a Default Gateway?
  • What is Subnetting?
  • Classful vs. Classless Interdomain Routing (CIDR)
  • Subnetting with CIDR & VLSM
  • CIDR Notation
  • Fundamentals of IPv6
  • IPv6 Addressing
  • Types of IPv6 Addresses
Networking Fundamentals

Network Devices

This will show you several of the various network devices that you will encounter in today's networks and will also teach you how to use these devices.
  • Modem and NIC
  • Repeater and Hub
  • Bridge and Switch
  • Router
  • Different Types of Switches
  • Advanced Switch Funcionality
  • Firewall and Proxy Server
  • Wireless Access Point
  • Basic DHCP Server and DNS Server
  • CSU/DSU
  • Media Converters
  • Load Balancer and Bandwidth Shaper
Networking Fundamentals

Network Security

In this you will learn about several different tools you can use and practices you can follow that will allow you to properly secure your network. Plus, I will teach you how to recognize common security threats and what can be done to protect your network against these threats.
  • Firewalls
  • Other Security Devices
  • Network Access Security
  • Filtering
  • Tunneling and Encryption
  • Remote Access Protocols
  • User Authentication
  • Device Security
  • Common Security Threats

Overview of Browsers

Open To Choice

These are the browsers included on the Browser Choice screen.

We encourage you to read about them and talk to friends and colleagues so you can learn more about your options.

What does the browser choice screen look like?

Not all browsers are included on the Browser Choice screen. You might want to consider these other options.

Overview of Browsers « Open To Choice

Overview of Browsers « Open To Choice

Posted using ShareThis

4/15/10

Apple iPad

Sales hit 450,000

The iPad went on sale nationwide at 9 a.m. last Saturday with a base price of $499. According to Jobs, iPad users downloaded 250,000 iBook titles on the first day, but that total is now above 600,000. Additionally, customers have downloaded more than 3.5 million iPad apps from the Apple store, which now features 185,000 of them according to Jobs.
The tablet device was met with much fanfare, but first day sales of 300,000 fell short of some analysts' expectations. Many expected Apple to sell as many as 700,000 units in its first weekend.

Hilary DeCesare, CEO of Everloop, talks about a "Facebook for kids"

4/10/10

Austin Firm Tired of Lack of Free Wi-Fi, Installs It

Discount Electronics plans 50 free Wi-Fi hotspots in Austin, with five live now, because it hasn't happened yet on its own. The firm's head, Rick Culleton, said in a statement, "If the city would let us, we'd put free WiFi in the airport and pick up the tab in full."
Wi-Fi Hotspots: Setting Up Public Wireless Internet AccessThe hotspots, under the FreeAustinWiFi.com banner, will be in locally owned operations, such as restaurants and bars, and be branded with the company's information.
It's not like there's no free Wi-Fi in Austin, of course, and folks with long memories will recall the community wireless effort Austin Wireless City Project, which checks in with about 50 locations active in its hotspot list.

4/8/10

How to Accept a Job Offer Through Email

So, you just received a job offer from an employer, but the offer was sent to you through email. Now you're trying to figure out how to respond to the job offer. Well, accepting a job offer through email is becoming more common among companies today. In fact, in today's society, email is a preferred method of contact for some employers because it is a simple and effective communication tool. However, there are a few things that you should do before you accept a job offer through email.





  1. Step1
    Read the email from the employer. If you receive a job offer through email you should open the email as soon as you receive it and read it very carefully. The job offer should contain important information about the position, such as your title, salary, start date, work schedule and benefits. Be sure to read the entire email at least twice, so you can have a clear understanding of the job offer.


  2. Step2
    Write down questions about the job offer. After you read the job offer take a few minutes to jot down any questions you may want to ask the employer. For example, maybe you have questions about the health insurance or retirement benefits. Or perhaps you want to ask the employer if you can change your start date because you need to give your current employer a sufficient amount of time to replace you. Please keep in mind that If you do have questions about the job offer, you should go ahead and email or call the employer right away, so you can discuss your concerns with him. It is best to have your questions or concerns resolved before you actually accept the job offer.


  3. Step3
    Decide if you want to accept the job offer. Be sure to weigh out the pros and cons for the job before you make a decision. Do not spend too much time thinking about the job offer because you don't want the employer to offer the position to someone else. In most cases, you should be able to respond to a job offer through email within 2 or 3 days after you receive the offer.


  4. Step4
    Prepare an email to send to the employer. Once you have decided to accept the job offer, you should take time to write a professional and polite email to that employer informing him of your decision. Be sure to thank the employer for choosing you for the position and let her know that you look forward to working for that company. In addition, be sure to keep the email brief.


  5. Step5
    Send the employer your email. Make sure that you read over your email a couple of times before you send it to the employer. And be sure to send the email to the person who offered you the position (unless you were instructed to contact another person). Also, don't forget to address that specific person in your email (e.g. Dear Mr. John Doe).

802.11 Quick Review

802.11 Quick Review

Posted using ShareThis

4/7/10

Six Questions to Determine if You're Ready to Analyze 10GbE Traffic


While the cost for 10GbE is coming down and adoption is rapidly rising, there remain challenges in analyzing 10GbE traffic, most notably because the industry has yet to achieve real-time analysis at 10GbE line rates. However, 10GbE analysis is available and does not have to be limiting in terms of results. Below are six questions that will help determine if your organization is fully optimized for analyzing 10GbE traffic.
1. Are you being specific enough?
It's important to know exactly what you want to capture and what information is going to be most beneficial for your analysis. Your requirements will likely vary between each network segment and odds are you are going to have to capture data at several locations. An excellent way to analyze 10GbE traffic, especially when utilization is high, is to use post-capture analysis and only save the data to a disk in real-time. Trying to capture and analyze simultaneously, in real-time, on highly utilized network segments puts much more strain on the system than if you just save data to a disk for post-capture analysis.
2. Do you REALLY know your network?
Knowing how you expect the network to be performing is all the more critical when trying to analyze highly utilized 10GbE segments. If you're already embroiled in a complex network analysis firefight it's too late to realize that your ability to assess "normal" conditions on the network may be lacking. To get a sense of "normal" conditions before trouble arises, you should perform and archive baseline measurements across specific network traffic like HTTP and key business applications over typical cycles - like an hour, a day, and a week, for the network as a whole. Other metrics to consider include understanding packets size distribution as well as protocol and node usage over time, uncovering cycles in these metrics, which provide a "fingerprint" of your utilization. That way you will always have a clear view of the network for comparison when trouble arises. Only after convincing yourself that the basic data is in place and being collected and analyzed should you embark on detailed analysis and drill-down of packet-level data.
3. Are you sticking to the essentials?
The temptation is to try to capture and analyze everything, especially when the source of the problem is not immediately known. But quite often certain conditions can be immediately ruled out, and using these clues to limit the collection and analysis to only what is necessary dramatically improves network analysis performance. You always have the option to customize analysis by turning off modules that are not important to the current exercise. Modules such as wireless network performance can be turned off, especially in 10GbE analysis, because odds are they are not relevant to the problem being investigated. The key is to customize your usage and take advantage of it.
4. Do you know your limits?
Even after analysis has been streamlined to only essential areas of the network, data capture for network analysis on 10GbE networks generates a great deal of data quickly, and managing the data becomes a significant challenge. Regardless of the system used, the data is typically stored for subsequent retrieval and post-capture analysis. The two most common formats are standard packet files and databases. In either case, two metrics to manage closely are file size and frequency of disk writes. Though intuition may lead you to think that the larger the file size the better, this is often not the case as very large files require very large memory footprints to open. If the files are too large they will be unworkable on the computer being used for analysis. Smaller files, however, typically lead to more frequent disk writes, and this can rob the system of precious resources for performing the actual packet capture. Optimum performance is achieved with a balance of these two demands, and this is different depending on the hardware resources available. One rule of thumb to keep in mind is that if files are being created every 30 seconds or less, it's going to increase strain on achieving the maximum packet capture rate significantly. Starting with reasonable sized buffers and files makes all the difference. We recommend that you start with 256MB buffer for packet capture and 128MB for files to be created. After a few captures you'll quickly determine if either of these parameters can be better optimized for your system. Also, try to use the lowest number of simultaneous captures as possible. In several systems, you're allowed to create as many captures as you want, but you need to remember that for each capture you open more memory is reserved for buffering and less is available for data processing.
5. Are you filtering and slicing?
Filtering is a way of limiting the overall number of packets captured and stored based upon user-specified criteria. Slicing captures and stores all of the packets, but it truncates the packets after a certain length, typically allowing you to store the header information but slice off the payloads. In both cases the same result is achieved, the overall amount of data to store is significantly reduced, freeing up more processing power for capture and analysis and more disk space for storing the data that's truly important to the current analysis task.
6. Are you being reasonable?
Most network analysis systems allow multiple users to connect to the hardware performing critical network data capture and analysis tasks. Put a limit on users. Nominate an owner for each system that will monitor filters and captures. Make sure it's understood who has the authority to go kill a capture. Too many users with too many options is a recipe for disaster. You can always scale with additional systems if needed.