Advertisement

Network Timing and the 2015 Leap Second

  • Darryl Veitch
  • Kanthaiah Vijayalayan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9631)

Abstract

Using a testbed with reference timestamping, we collected timing data from public Stratum-1 NTP servers during the leap second event of end-June 2015. We found a wide variety of anomalous server-side behaviors, both at the NTP protocol level and in the server clocks themselves, which can last days or even weeks after the event. Out of 176 servers, only 61% had no erroneous behavior related to the leap second event that we could detect.

Keywords

Leap second NTP Stratum-1 server Network measurement LI bits UTC 

Notes

Acknowledgment

Partially supported by Australian Research Council’s Linkage Projects funding scheme #LP120100073, in partnership with Symmetricom (now Microsemi).

References

  1. 1.
  2. 2.
    Burnicki, M.: Technical aspects of leap second propagation and evaluation. In: Requirements for UTC and Civil Timekeeping on Earth Colloquium. Science and Technology Series, vol. 115. Univelt Inc., San Diego (2015)Google Scholar
  3. 3.
    Lichvar, M.: Five different ways to handle leap seconds with NTP. http://developerblog.redhat.com/2015/06/01/five-different-ways-handle-leap-seconds-ntp/
  4. 4.
    Mills, D.L.: Computer Network Time Synchronization: The Network Time Protocol. CRC Press Inc., Boca Raton (2006)CrossRefzbMATHGoogle Scholar
  5. 5.
    Elsins, M.: HANDLING THE LEAP SECOND - LINUX. http://www.pythian.com/blog/handling-the-leap-second-linux/
  6. 6.
    redhat, How to clear the Leap Second Insertion flag after it has been received?. https://access.redhat.com/articles/199563/
  7. 7.
    Burnicki, M.: Technical aspects of leap second propagation and evaluation. In: FOSDEM (2015). http://nwtime.org/leap-second-resources/
  8. 8.
    Malone, D.: Leap Second (2015). http://www.maths.tcd.ie/~dwmalone/time/leap2015/
  9. 9.
    RADclock Project webpage. http://www.synclab.org/radclock/
  10. 10.
    Veitch, D., Ridoux, J., Korada, S.B.: Robust synchronization of absolute and difference clocks over networks. IEEE/ACM Trans. Netw. 17, 417–430 (2009)CrossRefGoogle Scholar
  11. 11.
    Endace, Endace Measurement Systems. DAG series PCI and PCI-X cards. http://www.endace.com/networkMCards.htm
  12. 12.
    Archipelago monitor locations. http://www.caida.org/projects/ark/locations/
  13. 13.
    Vijayalayan, K., Veitch, D.: Rot at the roots? Examining public timing infrastructure. In: Proceedings of IEEE INFOCOM 2016, San Francisco, CA, USA, 10–15 April 2016Google Scholar
  14. 14.
    Minar, N.: A Survey of the NTP Network (1999). http://alumni.media.mit.edu/~nelson/research/ntp-survey99/html/
  15. 15.
    Czyz, J., Kallitsis, M., Gharaibeh, M., Papadopoulos, C., Bailey, M., Karir, M.: Taming the 800 pound gorilla: the rise and decline of NTP DDoS attacks. In: Proceedings of IMC 2014, IMC 2014, pp. 435–448. ACM, New York (2014)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Faculty of Engineering and ITUniversity of Technology SydneyUltimoAustralia
  2. 2.Melbourne School of EngineeringUniversity of MelbourneMelbourneAustralia

Personalised recommendations