Wikipedia

Passive monitoring

Passive monitoring is a technique used to capture traffic from a network by copying traffic, often from a span port or mirror port or via a network tap. It can be used in application performance management for performance trending and predictive analysis.[1] Passive monitoring is also used in web performance optimization in the form of real user monitoring.[2] E-commerce and media industries use real user monitoring to correlate site performance to conversions and engagement.[3]

  • It can be analyzed in a sniffer such as Wireshark.
  • It can be examined for flows of traffic, providing information on "top talkers" in a network as well as TCP round-trip time.
  • It can be reassembled according to an application's state machine into end-user activity (for example, into database queries, e-mail messages, and so on.) This kind of technology is common in real user monitoring.[4]
  • In some cases, HTTP reassembly is further analyzed for web analytics.

Passive monitoring can be very helpful in troubleshooting performance problems once they have occurred. Passive monitoring differs from synthetic monitoring in that it relies on actual inbound web traffic to take measurements, so problems can only be discovered after they have occurred. Synthetic monitoring is also referred to as active monitoring, which helps report on system availability and predefined business transactions using synthetic probes and web robots.[5]

While initially viewed as competitive to synthetic monitoring approaches, most networking professionals now recognize that passive and synthetic monitoring are complementary.

See also

  • Computer and network surveillance
  • Packet analyzer
  • Wiretapping

References

  1. ^ "The Anatomy of APM - 4 Foundational Elements to a Successful Strategy". APM Digest. 4 April 2012.
  2. ^ http://blog.catchpoint.com/2018/09/27/identify-website-availability-issues-with-real-user-monitoring/
  3. ^ http://blog.catchpoint.com/2018/05/10/introducing-platform-real-user-monitoring/
  4. ^ http://blog.catchpoint.com/2018/09/26/real-user-monitoring-vs-synthetic-monitoring/
  5. ^ "Prioritizing Gartner's APM Model". APM Digest. 15 March 2012.
This article is copied from an article on Wikipedia® - the free encyclopedia created and edited by its online user community. The text was not checked or edited by anyone on our staff. Although the vast majority of Wikipedia® encyclopedia articles provide accurate and timely information, please do not assume the accuracy of any particular article. This article is distributed under the terms of GNU Free Documentation License.

Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.