Knowledge (XXG)

Passive monitoring

Source 📝

22: 171:
to take measurements, so problems can only be discovered after they have occurred. Synthetic monitoring is also referred to as active monitoring, which helps report on system availability and predefined business transactions using synthetic probes and web robots.
144:
It can be reassembled according to an application's state machine into end-user activity (for example, into database queries, e-mail messages, and so on.) This kind of technology is common in
175:
While initially viewed as competitive with synthetic monitoring approaches, most networking professionals now recognize that passive and synthetic monitoring are complementary.
126:
optimization in the form of real user monitoring. E-commerce and media industries use real user monitoring to correlate site performance to conversions and engagement.
32: 119: 184: 90: 214: 62: 47: 141:
It can be examined for flows of traffic, providing information on "top talkers" in a network as well as TCP round-trip time.
69: 114:
is a technique used to capture traffic from a network by copying traffic, often from a span port or mirror port or via a
256: 290: 76: 58: 164: 145: 242: 228: 83: 270: 189: 160: 131: 123: 284: 152: 122:
for performance trending and predictive analysis. Passive monitoring is also used in
194: 168: 115: 21: 163:
performance problems once they have occurred. Passive monitoring differs from
39: 135: 215:"The Anatomy of APM - 4 Foundational Elements to a Successful Strategy" 229:"Identify website availability issues with Real User Monitoring" 15: 151:
In some cases, HTTP reassembly is further analyzed for
43: 257:"Synthetic and Real User Monitoring Explained" 8: 243:"Introducing: Platform Real User Monitoring" 48:introducing citations to additional sources 159:Passive monitoring can be very helpful in 38:Relevant discussion may be found on the 206: 7: 167:in that it relies on actual inbound 271:"Prioritizing Gartner's APM Model" 120:application performance management 14: 185:Computer and network surveillance 31:relies largely or entirely on a 20: 1: 273:. APM Digest. 15 March 2012. 217:. APM Digest. 4 April 2012. 307: 130:It can be analyzed in a 165:synthetic monitoring 146:real user monitoring 118:. It can be used in 59:"Passive monitoring" 44:improve this article 291:Network management 112:Passive monitoring 109: 108: 94: 298: 275: 274: 267: 261: 260: 253: 247: 246: 239: 233: 232: 225: 219: 218: 211: 104: 101: 95: 93: 52: 24: 16: 306: 305: 301: 300: 299: 297: 296: 295: 281: 280: 279: 278: 269: 268: 264: 255: 254: 250: 241: 240: 236: 227: 226: 222: 213: 212: 208: 203: 190:Packet analyzer 181: 161:troubleshooting 124:web performance 105: 99: 96: 53: 51: 37: 25: 12: 11: 5: 304: 302: 294: 293: 283: 282: 277: 276: 262: 248: 234: 220: 205: 204: 202: 199: 198: 197: 192: 187: 180: 177: 157: 156: 149: 142: 139: 107: 106: 42:. Please help 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 303: 292: 289: 288: 286: 272: 266: 263: 258: 252: 249: 244: 238: 235: 230: 224: 221: 216: 210: 207: 200: 196: 193: 191: 188: 186: 183: 182: 178: 176: 173: 170: 166: 162: 154: 153:web analytics 150: 147: 143: 140: 137: 133: 129: 128: 127: 125: 121: 117: 113: 103: 100:November 2015 92: 89: 85: 82: 78: 75: 71: 68: 64: 61: –  60: 56: 55:Find sources: 49: 45: 41: 35: 34: 33:single source 29:This article 27: 23: 18: 17: 265: 251: 237: 223: 209: 174: 158: 111: 110: 97: 87: 80: 73: 66: 54: 30: 195:Wiretapping 169:web traffic 116:network tap 201:References 70:newspapers 136:Wireshark 40:talk page 285:Category 179:See also 134:such as 132:sniffer 84:scholar 86:  79:  72:  65:  57:  91:JSTOR 77:books 63:news 46:by 287:: 259:. 245:. 231:. 155:. 148:. 138:. 102:) 98:( 88:· 81:· 74:· 67:· 50:. 36:.

Index


single source
talk page
improve this article
introducing citations to additional sources
"Passive monitoring"
news
newspapers
books
scholar
JSTOR
network tap
application performance management
web performance
sniffer
Wireshark
real user monitoring
web analytics
troubleshooting
synthetic monitoring
web traffic
Computer and network surveillance
Packet analyzer
Wiretapping
"The Anatomy of APM - 4 Foundational Elements to a Successful Strategy"
"Identify website availability issues with Real User Monitoring"
"Introducing: Platform Real User Monitoring"
"Synthetic and Real User Monitoring Explained"
"Prioritizing Gartner's APM Model"
Category

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.