NTP Network time protocol. 19-Aug-152 Needs for precision time Stock market buy and sell orders Aviation traffic control and position reporting Network.

Slides:



Advertisements
Similar presentations
Copyright © 2014 EMC Corporation. All Rights Reserved. Basic Network Configuration for File Upon completion of this module, you should be able to: Configure.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Network Time Protocol (NTP) August 9 th 2011, OSG Site Admin Workshop Jason Zurawski – Internet2 Research Liaison.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
L-8 Synchronizing Physical Clocks 1 Announcements Proj1 checkpoint – due midnight tonight HW1 checkpoint – due 2/12 2.
Distributed Systems Fall 2010 Time and synchronization.
Teaching material based on Distributed Systems: Concepts and Design, Edition 3, Addison-Wesley Copyright © George Coulouris, Jean Dollimore, Tim.
Distributed Systems CS Synchronization – Part II Lecture 8, Sep 28, 2011 Majd F. Sakr, Vinay Kolar, Mohammad Hammoud.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Physical Clocks need for time in distributed systems physical clocks and their problems synchronizing physical clocks u coordinated universal time (UTC)
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Enhanced NTP IETF – TicToc BOF Greg Dowd – Jeremy Bennington –
A Security Analysis of the Network Time Protocol (NTP) Presentation by Tianen Liu.
176 Introduction to Network Time Protocol (NTP) Version A.01 H3065S Module 15 Slides.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
10/13/2015© 2008 Raymond P. Jefferis IIILect 07 1 Internet Protocol.
Computer Emergency Notification System (CENS)
Time and Coordination March 13, Time and Coordination What is time? :-)  Issue: How do you coordinate distributed computers if there is no global.
Parallel and Distributed Simulation Synchronizing Wallclock Time.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Sir John Tenniel; Alice’s Adventures in Wonderland,Lewis Carroll 11-Nov-151 The Nanokernel David L. Mills University of Delaware
UNIT - III. Time Server It is a daemon that runs on one machine and to which other systems synchronize their system clocks. It is a service that provides.
Institute of Technology Sligo - Dept of Computing Sem 2 Chapter 12 Routing Protocols.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Network Time Protocol Objectives Contents to learn how to setup ntp
Time This powerpoint presentation has been adapted from: 1) sApr20.ppt.
Network Time Protocol Objectives Contents to learn how to setup ntp
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Computer Network Design EEL 6785 Dr. Janusz Zalewski University of Central Florida.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
Multicasting EECS June Multicast One-to-many, many-to-many communications Applications: – Teleconferencing – Database – Distributed computing.
Sem 2 v2 Chapter 12: Routing. Routers can be configured to use one or more IP routing protocols. Two of these IP routing protocols are RIP and IGRP. After.
NTP in UBuntu. The Network Time Protocol (NTP) is a protocol for synchronizing the clocks of computer systems over packet-switched, variable- latency.
Distributed Computing
LINUX ADMINISTRATION 1
Understand Networking Services
CHAPTER 3 Architectures for Distributed Systems
Chapter 2: Basic Switching Concepts and Configuration
NAT , Device Discovery Chapter 9 , chapter 10.
Security of a Local Area Network
Network Time Protocol (NTP) General Overview
NTP Performance Analysis
Net 435: Wireless sensor network (WSN)
Dept. of Computer Science
CAIRN/DARTnet Collaboration
Unit 27: Network Operating Systems
Scalable, Autonomous Network Services Configuration
Internet Timekeeping Around the Globe
The Network Computer as Precision Timekeeper
Coping with Overload on the Network Time Protocol Public Servers
* Essential Network Security Book Slides.
Presentation by Wyatt Zacharias
NTP Clock Discipline Modelling and Analysis
NTP Clock Discipline Principles
Quad Charts David L. Mills University of Delaware
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Survivable Real-Time Network Services
Survivable Real-Time Network Services - the Nanokernel
NTP Research Opportunities
Presentation transcript:

NTP Network time protocol

19-Aug-152 Needs for precision time Stock market buy and sell orders Aviation traffic control and position reporting Network monitoring, measurement and control Radio and TV programming launch and monitoring Multimedia synchronization for real-time teleconferencing Distributed network gaming and training

19-Aug-153 Needs for precision time Distributed database transaction journalling and logging Secure document timestamps (with cryptographic certification) Differentiated services traffic engineering Interactive simulation event synchronization and ordering

19-Aug-154 Introduction NTP is a protocol for synchronising the clocks of computer systems over packet-switched, variable- latency data networks. NTP uses UDP as its transport layer – using port 123. NTP has been running continuously operating, ubiquitously available protocol in the Internet since 1985 Over 150 Internet primary servers are in Australia, Canada, Chile, France, Germany, Israel, Italy, Holland, Japan, Norway, Sweden, Switzerland, UK, and US. Agencies and organizations: US Weather Service, US Treasury Service, IRS, PBS, Merrill Lynch, Citicorp, GTE, Sun, HP, etc.

On the hazards of serving time With potential client populations in the millions, there is a very real vulnerability to grossly overload the public primary server population. The public NTP client software exchanges packets with the server on a continuous basis in order to discipline the computer clock time and frequency. This software has been carefully designed to be a good network citizen and ordinarily does not exceed a rate of one packet every fifteen minutes. Defective NTP client implementations have appeared that exhibit gross violations of the Internet social contract. An example is the U Wisconsin incident reported in the next slide. The sheer weight of numbers threatens to overwhelm at least some of the current NIST and USNO servers. Other incidents reveal really bad network engineering and counterproductive parameter selection, especially poll interval.

The U Wisconsin incident (2003) U Wisconsin operates a number of time servers for campus access. A home router came on the market that had the address of one of these servers hard-coded in firmware and could not be changed, could send packets continuously at one-second intervals under certain conditions when service was interrupted. This would not be a problem if only a small numbers of these routers were sold. However, eventually 750,000 routers were sold and most could not be recalled, updated or even reliably found. The resulting traffic overwhelmed the server, university network and service provider. There has been no wholly satisfactory solution to this problem other than to insure continuous service and to educate the manufacturer about socially responsible product design.

19-Aug-157 The Network Protocol (NTP) Network Time Protocol (NTP) synchronises clocks of hosts and routers in the Internet. NTP provides accurate time synchronisation nominal accuracies of low tens of milliseconds on WANs, submilliseconds on LANs, and submicroseconds using a precision time source such as a cesium oscillator or GPS receiver. NTP software has been ported widely and built into the operating systems for Linux/Unix. Every Windows/XP has an NTP client. NTP has been on the NASA Shuttle. The NTP architecture, protocol and algorithms have been evolved over the last two decades to the latest NTP Version 4 software distributions.

Goals of NTP Provide the best accuracy under prevailing network and server conditions. Resist many and varied kinds of failures, including fail-stop, malicious attacks and implementation bugs. Maximise utilisation of Internet diversity and redundancy. Automatically organise subnet topology for best accuracy and reliability. Self contained cryptographic authentication based on both symmetric key and public key infrastructures and independent of external services.

Outside of NTP scope Local time – this is provided by the operating system. Access control - this is provided by firewalls and address filtering. Privacy - all protocol values, including time values, are public unless explicitly configured for encryption. Non-repudiation - this can be provided by a layered protocol if necessary. Conversion of NTP timestamps to and from other time representations and formats.

19-Aug-1510 NTP hierarchy Primary (stratum 1) servers synchronise to national time standards via radio, satellite and modem. Secondary (stratum 2,...) servers and clients synchronise to primary servers via hierarchical subnet. A publicly available set of secondary servers is maintained by pool.ntp.org DNS is used to assign randomly to NTP clients Clients and servers operate in master/slave, symmetric and multicast modes with or without cryptographic authentication. Reliability assured by redundant servers and multiple network paths. Engineered algorithms reduce jitter, mitigate multiple sources and avoid improperly operating servers.

19-Aug-1511 NTP Version 4 NTP Version 4 architecture, protocol and algorithms have been evolved to achieve this degree of accuracy. Improved clock models which accurately predict the time and frequency adjustment for each synchronization source and network path. Engineered algorithms reduce the impact of network jitter and oscillator wander while speeding up initial convergence. Redesigned clock discipline algorithm operates in frequency-lock, phase-lock and hybrid modes. The improvements, confirmed by simulation, improve accuracy by about a factor of ten, while allowing operation at much longer poll intervals without significant reduction in accuracy.

NTP Service Description System-V Managed Service Core packages: ntp Daemons: ntpd Config.: Server: /etc/ntpd.conf Other configuration files: /var/lib/ntp/*

Ntp utility programs ntpdate: Set the system date and time via ntp ntptime: Display the time variables maintained by the Linux kernel ntptrace: Trace the chain of ntp servers back to the primary source

Configuring NTP restrict default nomodify noquery restrict mask nomodify restrict # the time servers server pool.ntp.org # general configuration server # local clock fudge stratum 10 driftfile /var/lib/ntp/drift broadcastdelay 0.008

Configuring NTP restrict default nomodify noquery restrict [IP list] [options] Default defines the policy for all addresses not mentioned on any other restrict line Without options allows all access nomodify, noquery: No modifying or querying of the NTP service on the server

Configuring NTP restrict mask nomodify restrict The first line specifies that any IP in that network cannot modify but can query etc. The second line specifies that local access is unrestricted

Configuring NTP # the time servers server pool.ntp.org # general configuration server Peer Server #local clock Server [server name] [options] List of NTP servers to be used as reference Two mentions of pool.ntp.org means that the pool servers will be tried twice (i.e. two different IPs will be polled) In this example, first checks the pool.ntp.org clocks and then uses the local server ( ) Also peer can be used to specify peer time server with which time is also synchronised

Configuring NTP fudge stratum 10 driftfile /var/lib/ntp/drift broadcastdelay Fudge defines the priority of this server– Stratum 10 is lower priority and therefore will only be used as a last resort driftfile contains the system clock error Stores the oscillation frequency of the local clock and it is calculated automatically by ntpd NTP uses this to adjust the system time. Broadcastdelay is an estimate of the server to client packet latency On a Lan, typically and seconds

NTP configuration: setting the poll interval server pool.ntp.org minpoll 10 maxpoll 17 These options specify the minimum and maximum poll intervals for NTP messages, in seconds as a power of two. The maximum poll interval defaults to 10 (1,024 s), but can be increased by the maxpoll option to an upper limit of 17 (36.4 h). The minimum poll interval defaults to 6 (64 s), but can be decreased by the minpoll option to a lower limit of 4 (16s).

Configuring NTP with broadcast Broadcast autokeys The time server is configured to use listen for broadcast timestamps from a ntp server on Autokeys means that the timestamp will be encrypted If no IP was specified, it would take any timestamp that is broadcast (not a good idea)

Configuring NTP with security Crypto pw serverpassword keysdir /etc/ntp NTP v4 can support public key encryption. Any connection defined by in a broadcast, server or peer line can specify autokeys to enable encryption (e.g. server autokeys) The specified file stores the keys used by clients. Generate keys using ntp-keygen command Ntp-keygen –T –I –p serverpassword

19-Aug-1522 Further information NTP home page Current NTP software and documentation FAQ and links to other sources and interesting places NTP Public Services Project: Lists of available servers David L. Mills home page Papers, reports and memoranda in PostScript and PDF formats Briefings in HTML, PostScript, PowerPoint and PDF formats Collaboration resources hardware, software and documentation Songs, photo galleries and after-dinner speech scripts