IP module: Difference between revisions

Jump to navigation Jump to search
Line 335: Line 335:


  It’s essential to understand that the values provided by the TCP application times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered '''heuristics'''—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.
  It’s essential to understand that the values provided by the TCP application times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered '''heuristics'''—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.
See [[TCP application time]] for more details about these values.


The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.
The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.
546

edits

Navigation menu