22:
171:
to take measurements, so problems can only be discovered after they have occurred. Synthetic monitoring is also referred to as active monitoring, which helps report on system availability and predefined business transactions using synthetic probes and web robots.
144:
It can be reassembled according to an application's state machine into end-user activity (for example, into database queries, e-mail messages, and so on.) This kind of technology is common in
175:
While initially viewed as competitive with synthetic monitoring approaches, most networking professionals now recognize that passive and synthetic monitoring are complementary.
126:
optimization in the form of real user monitoring. E-commerce and media industries use real user monitoring to correlate site performance to conversions and engagement.
32:
119:
184:
90:
214:
62:
47:
141:
It can be examined for flows of traffic, providing information on "top talkers" in a network as well as TCP round-trip time.
69:
114:
is a technique used to capture traffic from a network by copying traffic, often from a span port or mirror port or via a
256:
290:
76:
58:
164:
145:
242:
228:
83:
270:
189:
160:
131:
123:
284:
152:
122:
for performance trending and predictive analysis. Passive monitoring is also used in
194:
168:
115:
21:
163:
performance problems once they have occurred. Passive monitoring differs from
39:
135:
215:"The Anatomy of APM - 4 Foundational Elements to a Successful Strategy"
229:"Identify website availability issues with Real User Monitoring"
15:
151:
In some cases, HTTP reassembly is further analyzed for
43:
257:"Synthetic and Real User Monitoring Explained"
8:
243:"Introducing: Platform Real User Monitoring"
48:introducing citations to additional sources
159:Passive monitoring can be very helpful in
38:Relevant discussion may be found on the
206:
7:
167:in that it relies on actual inbound
271:"Prioritizing Gartner's APM Model"
120:application performance management
14:
185:Computer and network surveillance
31:relies largely or entirely on a
20:
1:
273:. APM Digest. 15 March 2012.
217:. APM Digest. 4 April 2012.
307:
130:It can be analyzed in a
165:synthetic monitoring
146:real user monitoring
118:. It can be used in
59:"Passive monitoring"
44:improve this article
291:Network management
112:Passive monitoring
109:
108:
94:
298:
275:
274:
267:
261:
260:
253:
247:
246:
239:
233:
232:
225:
219:
218:
211:
104:
101:
95:
93:
52:
24:
16:
306:
305:
301:
300:
299:
297:
296:
295:
281:
280:
279:
278:
269:
268:
264:
255:
254:
250:
241:
240:
236:
227:
226:
222:
213:
212:
208:
203:
190:Packet analyzer
181:
161:troubleshooting
124:web performance
105:
99:
96:
53:
51:
37:
25:
12:
11:
5:
304:
302:
294:
293:
283:
282:
277:
276:
262:
248:
234:
220:
205:
204:
202:
199:
198:
197:
192:
187:
180:
177:
157:
156:
149:
142:
139:
107:
106:
42:. Please help
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
303:
292:
289:
288:
286:
272:
266:
263:
258:
252:
249:
244:
238:
235:
230:
224:
221:
216:
210:
207:
200:
196:
193:
191:
188:
186:
183:
182:
178:
176:
173:
170:
166:
162:
154:
153:web analytics
150:
147:
143:
140:
137:
133:
129:
128:
127:
125:
121:
117:
113:
103:
100:November 2015
92:
89:
85:
82:
78:
75:
71:
68:
64:
61: –
60:
56:
55:Find sources:
49:
45:
41:
35:
34:
33:single source
29:This article
27:
23:
18:
17:
265:
251:
237:
223:
209:
174:
158:
111:
110:
97:
87:
80:
73:
66:
54:
30:
195:Wiretapping
169:web traffic
116:network tap
201:References
70:newspapers
136:Wireshark
40:talk page
285:Category
179:See also
134:such as
132:sniffer
84:scholar
86:
79:
72:
65:
57:
91:JSTOR
77:books
63:news
46:by
287::
259:.
245:.
231:.
155:.
148:.
138:.
102:)
98:(
88:·
81:·
74:·
67:·
50:.
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.