To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Passive monitoring

From Wikipedia, the free encyclopedia

Passive monitoring is a technique used to capture traffic from a network by copying traffic, often from a span port or mirror port or via a network tap. It can be used in application performance management for performance trending and predictive analysis.[1] Passive monitoring is also used in web performance optimization in the form of real user monitoring.[2] E-commerce and media industries use real user monitoring to correlate site performance to conversions and engagement.[3]

  • It can be analyzed in a sniffer such as Wireshark.
  • It can be examined for flows of traffic, providing information on "top talkers" in a network as well as TCP round-trip time.
  • It can be reassembled according to an application's state machine into end-user activity (for example, into database queries, e-mail messages, and so on.) This kind of technology is common in real user monitoring.[4]
  • In some cases, HTTP reassembly is further analyzed for web analytics.

Passive monitoring can be very helpful in troubleshooting performance problems once they have occurred. Passive monitoring differs from synthetic monitoring in that it relies on actual inbound web traffic to take measurements, so problems can only be discovered after they have occurred. Synthetic monitoring is also referred to as active monitoring, which helps report on system availability and predefined business transactions using synthetic probes and web robots.[5]

While initially viewed as competitive with synthetic monitoring approaches, most networking professionals now recognize that passive and synthetic monitoring are complementary.

YouTube Encyclopedic

  • 1/2
    Views:
    638
    2 554
  • Monitoring Technology Makes a Difference
  • Nagios Core enabling external commands

Transcription

See also

References

  1. ^ "The Anatomy of APM - 4 Foundational Elements to a Successful Strategy". APM Digest. 4 April 2012.
  2. ^ "Identify website availability issues with Real User Monitoring".
  3. ^ "Introducing: Platform Real User Monitoring".
  4. ^ "Synthetic and Real User Monitoring Explained".
  5. ^ "Prioritizing Gartner's APM Model". APM Digest. 15 March 2012.
This page was last edited on 26 January 2023, at 10:19
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.