Network Time Protocol (2024)

Network Time Protocol (NTP) is a protocol designed to time-synchronize a network of machines. NTP runs on User Datagram Protocol (UDP), which in turn runs on IP. NTP Version 3 is documented in RFC 1305.

An NTP network usually gets its time from an authoritative time source such as a radio clock or an atomic clock attached to a time server. NTP then distributes this time across the network. NTP is extremely efficient; no more than one packet per minute is necessary to synchronize two machines to the accuracy of within a millisecond of one another.

NTP uses the concept of a stratum to describe how many NTP hops away a machine is from an authoritative time source. A stratum 1 time server typically has an authoritative time source (such as a radio or atomic clock, or a Global Positioning System (GPS) time source) directly attached, a stratum 2 time server receives its time via NTP from a stratum 1 time server, and so on.

NTP has two ways to avoid synchronizing to a machine whose time may not be accurate. NTP will never synchronize to a machine that is not in turn synchronized. NTP will compare the time reported by several machines, and will not synchronize to a machine whose time is significantly different from others, even if its stratum is lower. This strategy effectively builds a self-organizing tree of NTP servers.

The Cisco implementation of NTP does not support stratum 1 service; that is, you cannot connect to a radio or atomic clock (for some specific platforms, however, you can connect to a GPS time-source device). Cisco recommends that the time service for your network be derived from the public NTP servers available in the IP Internet.

If the network is isolated from the Internet, the Cisco implementation of NTP allows a machine to be configured so that it acts as though it is synchronized via NTP, when in fact it has determined the time using other means. Other machines can then synchronize to that machine via NTP.

A number of manufacturers include NTP software for their host systems and a publicly available version for systems running UNIX. This software also allows UNIX-derivative servers to acquire the time directly from an atomic clock, which would subsequently propagate time information along to Cisco routers.

The communications between machines running NTP (known as associations) are usually statically configured; each machine is given the IP address of all machines with which it should form associations. Accurate timekeeping is made possible through exchange of NTP messages between each pair of machines with an association.

However, in a LAN environment, NTP can be configured to use IP broadcast messages instead. This alternative reduces configuration complexity because each machine can be configured to send or receive broadcast messages. However, the accuracy of timekeeping is marginally reduced because the information flow is one-way only.

The time kept on a machine is a critical resource, so Cisco strongly recommends that you use the security features of NTP to avoid the accidental or malicious setting of incorrect time. Two mechanisms are available: an access list-based restriction scheme and an encrypted authentication mechanism.

When multiple sources of time (Virtual Integrated Network System (VINES), hardware clock, manual configuration) are available, NTP is always considered to be more authoritative. NTP time overrides the time set by any other method.

NTP services are disabled on all interfaces by default.

For more information about NTP, see the following sections:

Poll-Based NTP Associations

Networking devices running NTP can be configured to operate in variety of association modes when synchronizing time with reference time sources. A networking device can obtain time information on a network in two ways—by polling host servers and by listening to NTP broadcasts. This section focuses on the poll-based association modes. Broadcast-based NTP associations are discussed in the Broadcast-Based NTP Associations section.

The following are the two most commonly used poll-based association modes:

  • Client mode

  • Symmetric active mode

The client and the symmetric active modes should be used when NTP is required to provide a high level of time accuracy and reliability.

When a networking device is operating in the client mode, it polls its assigned time-serving hosts for the current time. The networking device will then pick a host from among all the polled time servers to synchronize with. Because the relationship that is established in this case is a client-host relationship, the host will not capture or use any time information sent by the local client device. This mode is most suited for file-server and workstation clients that are not required to provide any form of time synchronization to other local clients. Use the ntp server command to individually specify the time server that you want your networking device to consider synchronizing with and to set your networking device to operate in the client mode.

When a networking device is operating in the symmetric active mode, it polls its assigned time-serving hosts for the current time and it responds to polls by its hosts. Because this is a peer-to-peer relationship, the host will also retain time-related information of the local networking device that it is communicating with. This mode should be used when a number of mutually redundant servers are interconnected via diverse network paths. Most stratum 1 and stratum 2 servers on the Internet adopt this form of network setup. Use the ntp peer command to individually specify the time serving hosts that you want your networking device to consider synchronizing with and to set your networking device to operate in the symmetric active mode.

The specific mode that you should set for each of your networking devices depends primarily on the role that you want them to assume as a timekeeping device (server or client) and the device’s proximity to a stratum 1 timekeeping server.

A networking device engages in polling when it is operating as a client or a host in the client mode or when it is acting as a peer in the symmetric active mode. Although polling does not usually place a burden on memory and CPU resources such as bandwidth, an exceedingly large number of ongoing and simultaneous polls on a system can seriously impact the performance of a system or slow the performance of a given network. To avoid having an excessive number of ongoing polls on a network, you should limit the number of direct, peer-to-peer or client-to-server associations. Instead, you should consider using NTP broadcasts to propagate time information within a localized network.

Broadcast-Based NTP Associations

Broadcast-based NTP associations should be used when time accuracy and reliability requirements are modest and if your network is localized and has more than 20 clients. Broadcast-based NTP associations are also recommended for use on networks that have limited bandwidth, system memory, or CPU resources.

A networking device operating in the broadcast client mode does not engage in any polling. Instead, it listens for NTP broadcast packets that are transmitted by broadcast time servers. Consequently, time accuracy can be marginally reduced because time information flows only one way.

Use the ntp broadcast client command to set your networking device to listen for NTP broadcast packets propagated through a network. For broadcast client mode to work, the broadcast server and its clients must be located on the same subnet. You must enable the time server that transmits NTP broadcast packets on the interface of the given device by using the ntp broadcast command.

NTP Access Group

The access list-based restriction scheme allows you to grant or deny certain access privileges to an entire network, a subnet within a network, or a host within a subnet. To define an NTP access group, use the ntp access-group command in global configuration mode.

The access group options are scanned in the following order, from least restrictive to the most restrictive:

  1. ipv4—Configures IPv4 access lists.

  2. ipv6—Configures IPv6 access lists.

  3. peer—Allows time requests and NTP control queries, and allows the system to synchronize itself to a system whose address passes the access list criteria.

  4. serve—Allows time requests and NTP control queries, but does not allow the system to synchronize itself to a system whose address passes the access list criteria.

  5. serve-only—Allows only time requests from a system whose address passes the access list criteria.

  6. query-only—Allows only NTP control queries from a system whose address passes the access list criteria.

If the source IP address matches the access lists for more than one access type, the first type is granted access. If no access groups are specified, all access types are granted access to all systems. If any access groups are specified, only the specified access types will be granted access.

For details on NTP control queries, see RFC 1305 (NTP Version 3).

The encrypted NTP authentication scheme should be used when a reliable form of access control is required. Unlike the access list-based restriction scheme that is based on IP addresses, the encrypted authentication scheme uses authentication keys and an authentication process to determine if NTP synchronization packets sent by designated peers or servers on a local network are deemed as trusted before the time information that they carry along with them is accepted.

The authentication process begins from the moment an NTP packet is created. Cryptographic checksum keys are generated using the message digest algorithm 5 (MD5) and are embedded into the NTP synchronization packet that is sent to a receiving client. Once a packet is received by a client, its cryptographic checksum key is decrypted and checked against a list of trusted keys. If the packet contains a matching authentication key, the time-stamp information that is contained within the packet is accepted by the receiving client. NTP synchronization packets that do not contain a matching authenticator key are ignored.

Network Time Protocol (1)
Note

In large networks, where many trusted keys must be configured, the Range of Trusted Key Configuration feature enables configuring multiple keys simultaneously.

It is important to note that the encryption and decryption processes used in NTP authentication can be very CPU-intensive and can seriously degrade the accuracy of the time that is propagated within a network. If your network setup permits a more comprehensive model of access control, you should consider the use of the access list-based form of control.

After NTP authentication is properly configured, your networking device will synchronize with and provide synchronization only to trusted time sources.

Network Time Protocol (2024)

FAQs

Network Time Protocol? ›

The Network Time Protocol (NTP) is a networking protocol for clock synchronization

synchronization
Synchronization is the coordination of events to operate a system in unison. For example, the conductor of an orchestra keeps the orchestra synchronized or in time. Systems that operate with all parts in synchrony are said to be synchronous or in sync—and those that are not are asynchronous.
https://en.wikipedia.org › wiki › Synchronization
between computer systems over packet-switched, variable-latency data networks. In operation since before 1985, NTP is one of the oldest Internet protocols in current use. NTP was designed by David L. Mills of the University of Delaware.

Is NTP a TCP or UDP protocol? ›

In use since 1985, the NTP is the most popular Internet time protocol. It is based on UDP, therefore having low networking overheads and low service response latency because it does not need to establish a TCP connection. An NTP client periodically requests updates from at least one server.

Is 8.8.8.8 an NTP server? ›

8.8 (same for NTP server) #6.

Is NTP still used? ›

One of the oldest internet communication protocols still in use today, NTP enables time synchronization across network devices. Despite being a critical part of many computer processes, it's very easy to overlook. The goal of NTP is to synchronize computers with respect to Coordinated Universal Time (UTC).

What is an example of NTP? ›

Some examples of how NTP is used are the following: Distributed procedures depend on coordinated times to ensure proper sequences are followed. Security mechanisms depend on consistent timekeeping across the network. File system updates carried out across several computers depend on synchronized clock times.

Is NTP port 123 TCP or UDP? ›

Implementations send and receive timestamps using the User Datagram Protocol (UDP) on port number 123.

Can NTP work on TCP? ›

Network Time Protocol (NTP) is a protocol that helps the computers clock times to be synchronized in a network. This protocol is an application protocol that is responsible for the synchronization of hosts on a TCP/IP network.

What is a good NTP server to use? ›

In most cases it's best to use pool.ntp.org to find an NTP server (or 0.pool.ntp.org, 1.pool.ntp.org, etc if you need multiple server names).

Is Google NTP free? ›

Google Public NTP is a free, global time service that you can use to synchronize to Google's atomic clocks.

What is the default NTP server? ›

The Network Time Protocol (NTP) helps obtain the precise time from a server and regulate the local time in each network element. If NTP server is not configured in the Instant network, a n IAP reboot may lead to variation in time data. The NTP server is set to pool.ntp.org by default.

What is replacing NTP? ›

chrony is an implementation of the Network Time Protocol (NTP). It is an alternative to ntpd, a reference implementation of NTP.

What is better than NTP? ›

The PTP protocol in a nutshell

In theory, it has a precision of nanoseconds. But in practice, it has rather of precision of microseconds, which still makes it a far more accurate protocol than the NTP. PTP is a recent protocol since it was first documented in 2002 (IEEE 1588-2002 standard of the IETF).

Can I use my router as an NTP server? ›

Enabling a router to become a NTP master will not guarantee accurate time, but it will ensure that all network components' time remain synchronized. This distinction is important because routers acting as NTP masters can synchronize their entire network to an incorrect time.

What is NTP for dummies? ›

NTP is an internet protocol that's used to synchronise the clocks on computer networks to within a few milliseconds of universal coordinated time (UTC).

How many NTP servers should I use? ›

To work properly ntpd needs to talk to at least 3 servers ("A man with a watch knows what time it is. A man with two watches is never sure"). For servers in the pool we recommend configuring no less than 4 and no more than 7 servers.

What happens if the NTP server is down? ›

If it cannot sync with an external time server, the local clock will keep ticking, but will lose accuracy over time. The local hardware clock will drift by 1-10 seconds per day. That drift can be much higher in the case of a VM.

Is time TCP or UDP? ›

The TIME service is an Internet protocol defined in RFC 868. Its purpose is to provide a site-independent, machine readable date and time. TIME can operate over either TCP or UDP.

What is the transport protocol for NTP? ›

The Network Time Protocol (NTP) synchronizes the time of day among a set of distributed time servers and clients in order to correlate events when receiving system logs and other time-specific events from multiple network devices. NTP uses the User Datagram Protocol (UDP) as its transport protocol.

What layer protocol is NTP? ›

The Network Time Protocol (NTP) is an application layer protocol in the TCP/IP.

Is NetBIOS TCP or UDP? ›

NetBIOS datagrams are sent over UDP. A datagram is sent with a "Direct Unique" or "Direct Group" packet if it's being sent to a particular NetBIOS name, or a "Broadcast" packet if it's being sent to all NetBIOS names on the network.

Top Articles
3 Reasons the IRS is Coming After Your Business - 1st Step Accounting, LLC
The 7 Best Platforms To Develop Algorithmic Trading Strategies
Phcs Medishare Provider Portal
Dew Acuity
What to Serve with Lasagna (80+ side dishes and wine pairings)
The Idol - watch tv show streaming online
Kent And Pelczar Obituaries
What Was D-Day Weegy
Our History | Lilly Grove Missionary Baptist Church - Houston, TX
Tamilblasters 2023
W303 Tarkov
Keurig Refillable Pods Walmart
Fredericksburg Free Lance Star Obituaries
Walthampatch
Seattle Rpz
Minecraft Jar Google Drive
Aldi Süd Prospekt ᐅ Aktuelle Angebote online blättern
Lazarillo De Tormes Summary and Study Guide | SuperSummary
Where to Find Scavs in Customs in Escape from Tarkov
Mission Impossible 7 Showtimes Near Marcus Parkwood Cinema
Nine Perfect Strangers (Miniserie, 2021)
Pjs Obits
The Blind Showtimes Near Amc Merchants Crossing 16
Maxpreps Field Hockey
Is Holly Warlick Married To Susan Patton
Cowboy Pozisyon
How do you get noble pursuit?
My Reading Manga Gay
Colin Donnell Lpsg
Www Craigslist Com Shreveport Louisiana
Beaver Saddle Ark
Audi Q3 | 2023 - 2024 | De Waal Autogroep
Sinfuldeeds Vietnamese Rmt
Spinning Gold Showtimes Near Emagine Birch Run
Domino's Delivery Pizza
Imperialism Flocabulary Quiz Answers
Tugboat Information
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
Best Restaurants Minocqua
Seminary.churchofjesuschrist.org
Stranahan Theater Dress Code
Todd Gutner Salary
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Juiced Banned Ad
War Room Pandemic Rumble
Suntory Yamazaki 18 Jahre | Whisky.de » Zum Online-Shop
Zom 100 Mbti
Benjamin Franklin - Printer, Junto, Experiments on Electricity
Fredatmcd.read.inkling.com
Best brow shaping and sculpting specialists near me in Toronto | Fresha
Mike De Beer Twitter
WHAT WE CAN DO | Arizona Tile
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 5826

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.