Network Time Protocol (NTP) General Overview: David L. Mills University of Delaware Mailto:mills@udel - Edu
Network Time Protocol (NTP) General Overview: David L. Mills University of Delaware Mailto:mills@udel - Edu
General Overview
David L. Mills
University of Delaware
http://www.eecis.udel.edu/~mills
mailto:[email protected]
alautun, Maya glyph
Introduction
NIST estimates 10-20 million NTP servers and clients deployed in the
Internet and its tributaries all over the world. Every Windows/XP has an
NTP client.
NTP software has been ported to almost every workstation and server
platform available today - from PCs to Crays - Unix, Windows, VMS
and embedded systems, even home routers and battery backup
systems.
The NTP architecture, protocol and algorithms have been evolved over
the last two decades to the latest NTP Version 4 software distributions.
Well over a million Internet servers and clients are all over the world
National and regional service providers BBN, MCI, Sprint, Alternet, etc.
Agencies and organizations: US Weather Service, US Treasury Service,
IRS, PBS, Merrill Lynch, Citicorp, GTE, Sun, DEC, HP, etc.
Private networks are reported to have over 10,000 NTP servers and clients
behind firewalls; one (GTE) reports in the order of 30,000 NTP workstations
and PCs.
NTP has been on the NASA Shuttle and in Antarctica and planned for the
Mars Internet.
Clock Discipline
Algorithm
Filter 1
Peer 2
Filter 2
Peer 3
Filter 3
Selection
and
Clustering
Algorithms
Combining
Algorithm
Loop Filter
P/F-Lock Loop
Timestamps
NTP Messages
VFO
Clock filters select best from a window of eight time offset samples.
S3
S3
S2
S4
S2
S3
Workstation
(a)
S1
S2
S3
Clients
(b)
S1
S2
S2
S1
*
S1
S2
Clients
(c)
S1
*
S1
S2
* to buddy (S2)
Goals
Provide the best accuracy under prevailing network and server conditions.
Resist many and varied kinds of failures, including two-face, fail-stop,
malicious attacks and implementation bugs.
Maximize utilization of Internet diversity and redundancy.
Automatically organize subnet topology for best accuracy and reliability.
Self contained cryptographic authentication based on both symmetric key
and public key infrastructures and independent of external services.
Non-goals
Local time this is provided by the operating system.
Access control - this is provided by firewalls and address filtering.
Privacy - all protocol values, including time values, are public.
Non-repudiation - this can be provided by a layered protocol if necessary.
Conversion of NTP timestamps to and from other time representations and
formats.
Current Network Time Protocol Version 3 has been in use since 1992,
with nominal accuracy in the low milliseconds.
Fire-and-forget software
Single software distribution can be compiled and installed automatically on
most host architectures and operating systems.
Run-time configuration can be automatically determined and maintained in
response to changing network topology and server availability.
10
This machine supports NFS, NTP, RIP, IGMP and a mess of printers,
radio clocks and an 8-port serial multiplexor
In total, the NTP service requires 1.54% of the available CPU time and
generates 10.5, 608-bit packets per second, or 0.41% of a T1 line
11
12
13
14
1,502 local clock backup sources (used only if all other sources fail)
15
GPS
receivers (2)
Cesium
clocks (2)
LORAN-C
receivers (2)
ASCII
ASCII, IRIG
grundoon PPS
NTP monitor
IRIG
PPS
pogo
DCnet
GPS, etc
receivers (3)
rackety
public
DCnet 128.4
10/100 Mb/s
barnstable
DARTnet
DARTnet
1.5 Mb/s T1
UDELnet
routers
ISDN
bridge
Cesium
clock
Backroom
Test Facility
UDELnet, Internet
1000/622 Mb/s
NTP primary time servers synchronize to ASCII, PPS and IRIG-B, all with
kernel modifications for precision timekeeping
NTP secondary servers (not shown) include SunOS 4/5, Ultrix 4, OSF/1, HPUX, Cisco, Bancomm and Fuzzball (semi-retired)
16
17
This shows the residual error measured between the Austron 2201 GPS
receiver and the HP 5061A cesium clock
18
19
20
21
Further information
22