Add to Book Shelf
Flag as Inappropriate
Email this Book

Network Time Protocol (Version 3) Specification, Implementation and Analysis

By Mills, David L.

Click here to view

Book Id: WPLBN0000693699
Format Type: PDF eBook:
File Size: 0.4 MB
Reproduction Date: 2005

Title: Network Time Protocol (Version 3) Specification, Implementation and Analysis  
Author: Mills, David L.
Volume:
Language: English
Subject: Technology, Fine Arts, Sociology
Collections: Technical eBooks and Manuals Collection, Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

L. Mill, B. D. (n.d.). Network Time Protocol (Version 3) Specification, Implementation and Analysis. Retrieved from http://gutenberg.cc/


Description
Technical Reference Publication

Excerpt
Abstract: This document describes the Network Time Protocol (NTP), specifies its formal structure and summarizes information useful for its implementation. NTP provides the mechanisms to synchronize time and coordinate time distribution in a large, diverse internet operating at rates from mundane to lightwave. It uses a returnable-time design in which a distributed subnet of time servers operating in a self-organizing, hierarchical-master-slave configuration synchronizes local clocks within the subnet and to national time standards via wire or radio. The servers can also redistribute reference time via local routing algorithms and time daemons.

Table of Contents
Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1. Related Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1. Implementation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2. Network Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3. Network Time Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.1. Data Formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.2. State Variables and Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2.1. Common Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2.2. System Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.2.3. Peer Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.2.4. Packet Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.2.5. Clock-Filter Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.2.6. Authentication Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.2.7. Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3. Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.4. Event Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.4.1. Notation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.4.2. Transmit Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.4.3. Receive Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 3.4.4. Packet Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 3.4.5. Clock-Update Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3.4.6. Primary-Clock Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 3.4.7. Initialization Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 3.4.7.1. Initialization Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.4.7.2. Initialization-Instantiation Procedure . . . . . . . . . . . . . . . . . . . . . . 29 3.4.7.3. Receive-Instantiation Procedure . . . . . . . . . . . . . . . . . . . . . . . . 30 3.4.7.4. Primary Clock-Instantiation Procedure . . . . . . . . . . . . . . . . . . . . . 31 3.4.8. Clear Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3.4.9. Poll-Update Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 3.5. Synchronization Distance Procedure . . . . . . . . . . . . . . . . . . . . . . . . 32 3.6. Access Control Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 4. Filtering and Selection Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 4.1. Clock-Filter Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 4.2. Clock-Selection Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 4.2.1. Intersection Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5. Local Clocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 5.1. Fuzzball Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 5.2. Gradual Phase Adjustments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 5.3. Step Phase Adjustments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 5.4. Implementation Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.