Abstract
Using a testbed with reference timestamping, we collected timing data from public Stratum-1 NTP servers during the leap second event of end-June 2015. We found a wide variety of anomalous server-side behaviors, both at the NTP protocol level and in the server clocks themselves, which can last days or even weeks after the event. Out of 176 servers, only 61% had no erroneous behavior related to the leap second event that we could detect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Burnicki, M.: Technical aspects of leap second propagation and evaluation. In: Requirements for UTC and Civil Timekeeping on Earth Colloquium. Science and Technology Series, vol. 115. Univelt Inc., San Diego (2015)
Lichvar, M.: Five different ways to handle leap seconds with NTP. http://developerblog.redhat.com/2015/06/01/five-different-ways-handle-leap-seconds-ntp/
Mills, D.L.: Computer Network Time Synchronization: The Network Time Protocol. CRC Press Inc., Boca Raton (2006)
Elsins, M.: HANDLING THE LEAP SECOND - LINUX. http://www.pythian.com/blog/handling-the-leap-second-linux/
redhat, How to clear the Leap Second Insertion flag after it has been received?. https://access.redhat.com/articles/199563/
Burnicki, M.: Technical aspects of leap second propagation and evaluation. In: FOSDEM (2015). http://nwtime.org/leap-second-resources/
Malone, D.: Leap Second (2015). http://www.maths.tcd.ie/~dwmalone/time/leap2015/
RADclock Project webpage. http://www.synclab.org/radclock/
Veitch, D., Ridoux, J., Korada, S.B.: Robust synchronization of absolute and difference clocks over networks. IEEE/ACM Trans. Netw. 17, 417–430 (2009)
Endace, Endace Measurement Systems. DAG series PCI and PCI-X cards. http://www.endace.com/networkMCards.htm
Archipelago monitor locations. http://www.caida.org/projects/ark/locations/
Vijayalayan, K., Veitch, D.: Rot at the roots? Examining public timing infrastructure. In: Proceedings of IEEE INFOCOM 2016, San Francisco, CA, USA, 10–15 April 2016
Minar, N.: A Survey of the NTP Network (1999). http://alumni.media.mit.edu/~nelson/research/ntp-survey99/html/
Czyz, J., Kallitsis, M., Gharaibeh, M., Papadopoulos, C., Bailey, M., Karir, M.: Taming the 800 pound gorilla: the rise and decline of NTP DDoS attacks. In: Proceedings of IMC 2014, IMC 2014, pp. 435–448. ACM, New York (2014)
Acknowledgment
Partially supported by Australian Research Council’s Linkage Projects funding scheme #LP120100073, in partnership with Symmetricom (now Microsemi).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Veitch, D., Vijayalayan, K. (2016). Network Timing and the 2015 Leap Second. In: Karagiannis, T., Dimitropoulos, X. (eds) Passive and Active Measurement. PAM 2016. Lecture Notes in Computer Science(), vol 9631. Springer, Cham. https://doi.org/10.1007/978-3-319-30505-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-30505-9_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30504-2
Online ISBN: 978-3-319-30505-9
eBook Packages: Computer ScienceComputer Science (R0)