Passive monitoring

Passive monitoring

Passive monitoring is a technique used to capture traffic from a network by generating a copy of that traffic, often from a span port or mirror port or via a network tap. Once the data (a stream of frames or packets) has been extracted, it can be used in many ways.

*It can be analyzed in a sniffer such as Wireshark
*It can be examined for flows of traffic, providing information on "top talkers" in a network as well as TCP round-trip time.
*It can be reassembled according to an application's state machine into end-user activity (for example, into database queries, e-mail messages, and so on.) This kind of technology is common in Real User Monitoring when applied to the http protocol in web applications.
*In some cases, http reassembly is further analyzed for web analytics

Passive monitoring can be very helpful in troubleshooting performance problems once they have occurred. Passive monitoring differs from synthetic monitoring in that it relies on actual inbound web traffic to take measurements, so problems can only be discovered after they have occurred.

While initially viewed as competitive to synthetic monitoring approaches, most networking professionals now recognize that passive and synthetic monitoring are complementary.


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Monitoring and Measurement in the Next Generation Technologies — (MOMENT) is a project aimed at integrating different platforms for network monitoring and measurement to develop a common and open pan European infrastructure. The system will include both passive and active monitoring and measurement techniques… …   Wikipedia

  • Passive infrared sensor — A Passive InfraRed sensor (PIR sensor) is an electronic device that measures infrared (IR) light radiating from objects in its field of view. PIR sensors are often used in the construction of PIR based motion detectors (see below). Apparent… …   Wikipedia

  • Passive Probe — Overview = Passive probing is the process of acquiring control or data from a telecommunication or data network without disturbing the network being monitored. This ensures that applications using the probed data can do so without any threat to… …   Wikipedia

  • Passive attack — A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext). This can also include known plaintext… …   Wikipedia

  • Passive Integrated Transponder tags — an integrated microchip about 11 mm long that is programmed to include specific fish information and inserted into the body cavity of the fish and decoded at selected monitoring sites. Used for identifying individual fish for monitoring and… …   Dictionary of ichthyology

  • Synthetic monitoring — (also known as active monitoring ) is website monitoring that is done using a web browser emulation. Behavioral scripts (or paths) are created to simulate an action or path that a customer or end user would take on a site. Those paths are then… …   Wikipedia

  • Real user monitoring — (RUM) is a passive web monitoring technology that records all user interaction with a website. Monitoring actual user interaction with a website is important to website operators to determine if users are being served quickly, error free and if… …   Wikipedia

  • Website monitoring — is the process of testing or tracking (monitoring) how end users interact with a website or web application. Website monitoring is often used by businesses to ensure that their customers are able to access their online applications and perform… …   Wikipedia

  • Data monitoring switch — A data monitoring switch is a networking hardware appliance that provides a pool of monitoring tools with access to traffic from a large number of network links. It provides a combination of functionality that may include aggregating monitoring… …   Wikipedia

  • Vessel monitoring system — Vessel monitoring systems (VMS) are used in commercial fishing to allow environmental and fisheries regulatory organizations to monitor, minimally, the position, time at a position, and course and speed of fishing vessels. They are a key part of… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”