. . . "In conclusion, we have shown examples of methods and systems for probing client-server applications in a network environment." . .