Linux/unix: Basic Ntp Configuration
Network Time Protocol (NTP) is an Internet protocol used for the transfer of accurate time, providing time information so that a precise time can be obtained and maintained on a network
Most UNIX and Linux operating systems provide built-in time synchronisation functionality with its NTP (Network Time Protocol) daemon. If the NTP service is not available on your version of UNIXLinux, NTP version 4 is open source and can easily be downloaded and configured, compiled and installed from www.ntp.org.
Network Time Protocol is the standard service for time dissemination across TCP/IP networks. It provides accuracies of 1-50 milliseconds, depending on the characteristics of the synchronization source and network paths.
The configuration file fro the NTP daemon is named ntp.conf and contains a list of reference clocks that it can synchronise too. The command ‘server' specifies the reference clock, any characters after the '#' symbol are comments, example:
server time-a.nist.gov # Public NTP server: NIST
driftfile /var/lib/ntp/ntp.drift
The drift file command identifies the location where the drift is recorded (sometimes referred to as a ‘frequency error). This value can be offset by NTP to ensure of increased accuracy. When configured, NTP can be controlled using the commands 'ntpd start' ‘ntpd stop' ‘ ntpq -p' (displays status)
NTP can also authenticate timing resources Note: It is strongly recommends that you configure a time server with a hardware source rather than from the internet where there is no authentication. Authentication codes are specified in the 'ntp.keys' file.
Specialist NTP servers are available that can receive transmissions from either GPS or national time reference broadcasts. They are relatively cheap and the signal is authenticated providing a secure time reference.
Authentication allows passwords to be specified by the NTP server and its clients. NTP passwords or keys are stored in the ntp.keys file in the following format: number M (The M stands for MD5 encryption), password:
1 M mypassword
3 M my2ndpassword
5 M my3rdpassword
Authentication for NTP has been developed to prevent malicious tampering with system synchronisation just as firewalls have been developed to protect networks from attack but as with any system of security it only works if it is utilised.
Related Tags: ntp server, gps ntp server, windows ntp server, ntp clock, ntp time server, gps time server, network time server, gps ntp time server, ntp servers, ntp gps time server, windows server 2008, ntp gps server, linux time server, linux ntp
Richard N Williams is a technical author and specialist in atomic clocks, telecommunications, NTP and network time synchronisation helping to develop dedicated NTP clocks. Please visit us for more information about an NTP server or other network time server solutions.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Understanding Cisco Sfp Optical Transceivers
The word SFP is an IT industry term which stands for Small Form Factor Pluggable. An SFP is a variet - Sharing The Internet Connection
If you are connecting two or more of your computers with each other over the network, then it is eas - Connecting The New Computer To My Server
The server is the computer that will handle the requests for applications, data and also other netwo - Networks
What is a network and its types ?The generic term " network "defines a set of entities (objects, peo - Ssl Certificates Are In Use Today Not All Valid
Qualys, a security research firm tries to paint a detailed portrait of SSL deployments and gaps with - A Mail Forwarding Usa - A Gift To Global Trade Links
Technologies have evolved very much over the past few decades. Globalization has enabled the world t - Benefits Of Wan Optimization Appliances/devices
In today's globally competitive market, corporate organizations both big and small adopt strategic m - Proper Network Cable Management And How It Can Save Your Business Time And Money
In many businesses now there are plenty of computers which will likely be attached to some sort of s - Dedicated Hosting In India For Web Servers
Dedicated web server hosting in India for complete control over your dedicated server is provided by - Outsourcing: The Future Of Network Management India
Computer Networking is a dynamic area and few strategies that were not thinkable yesterday can becom
Most viewed articles in this category:
- Image Sticking In Lcd Tv Sets
Image Retention - Isn't it just an issue with Plasma TVs?What is Image Sticking?Many are aware that - Used Foundry Networks: Used IT Gear Goes Mainstream
San Francisco, CA April 10, 2006Ask any IT manager what they think about used data networking gear a - CCNP Certification / BCMSN Exam Tutorial: Server Load Balancing (SLB)
When you're working on your BCMSN exam on your way to CCNP certification, you'll read at length abou - CCNP Certification / BSCI Exam Tutorial: The BGP Neighbor Process
Like TCP, BGP is connection-oriented. An underlying connection between two BGP speakers is est - CCNA / MCSE / CCNP Certification: Making Failure Work For You
Whether you're on the road to the CCNA, CCNP, MCSE, or you're on any other computer certification tr - Cisco CCNP / BSCI Exam Tutorial: OSPF Route Redistribution Review
OSPF route redistribution is an important topic on the BSCI exam, and it's a topic full of details a - Cisco CCNA / CCNP / BCMSN Exam Review: Trunking And Trunking Protocols
To earn your CCNA or CCNP certification, you've got to understand the basics of trunking. This - Cisco CCNP / BSCI Exam Tutorial: 10 ISIS Details You Must Know!
Earning your CCNP certification and passing the BSCI exam depends on knowing the details of many Cis - Cisco CCNA / CCNP Certification Exam Tutorial: ISDN And Multilink PPP
ISDN is a huge topic on both your Cisco CCNA and BCRAN CCNP exams. While many ISDN topics seem - Used foundry networks hardware remains in high demand
San Francisco, CA May 22, 2006: In recent years, the trend towards used networking hardware has cont