[LEAPSECS] current / future state of UT1 access?
Martin Burnicki
martin.burnicki at meinberg.de
Mon Mar 19 10:43:38 EDT 2018
Steven Sommars wrote:
> I regularly monitor the NIST public NTP servers including the UT1 server.
> ut1-time.colorado.edu <http://ut1-time.colorado.edu> reachability was
> good for the past 10 weeks, though the server was briefly in alarm on
> January 22 and March 10. I can supply details off-list.
>
> NTP traffic is subject to Internet delay and loss that depends on the
> endpoint IP addresses and often on the client UDP port. If the client
> NTP daemon (ntpd, etc.) can't contact a server, try to manually poll
> using ntpdate.
I've also added ut1-time.colorado.edu as "noselect" peer to a local, GPS
controlled ntpd. Even with a 1024 s poll interval my ntpd doesn't
receive a reply for each request, so the "reach" column in the output of
"ntpq -p" is not "377", which is the same for other NIST servers:
~ # ntpq -p
remote refid st t when poll reach delay offset jitter
======================================================================
*SHM(0) .shm0. 0 l 5 8 377 0.000 0.000 0.000
ptbtime1.ptb.de .PTB. 1 u 79 128 377 28.787 1.397 7.650
ptbtime2.ptb.de .PTB. 1 u 129 128 277 30.608 1.212 5.261
ptbtime3.ptb.de .PTB. 1 u 75 128 377 29.536 2.891 2.165
resolver2.skyfi 216.xxx 2 u 5 64 377 172.385 4.483 2.485
hadb2.smatwebde 192.xxx 3 u 46 64 377 137.772 1.627 2.066
time-a-b.nist.g .NIST. 1 u 95 1024 5 162.529 -8.114 1.445
time-b-b.nist.g .NIST. 1 u 1302 1024 42 159.903 -10.609 2.652
utcnist2.colora .NIST. 1 u 37m 1024 334 161.740 -9.495 3.151
ut1-time.colora .Nut1. 1 u 675 1024 143 162.015 130.909 1.048
This is not a basic network problem at my side. The servers "resolver2"
and "hadb2" which are public pool servers located in the US have both
reach "377", so these ones reply reliably.
You can simply test this if you run "ntpdate -d -p1 <hostname>"
repeatedly. When I try this for a NIST server here from Germany I only
receive a reply occasionally, and in most cases I don't. On the other
hand, if I run the same ntpdate command against a pool server located in
the US, this works most of the time, and only very occasionally there is
no reply.
So there seem to be quite strict restrict rules at NIST. The NIST
servers seem to simply not send a reply if they see queries from the
same IP address in short intervals, whatever "short" means. I'm assuming
this is to reduce the high load they probably have to handle.
Please note you need to take care if you have several nodes behind a NAT
router that poll the same server. From the server's point of view it
looks like all the requests from the nodes behind the router seem to
come from the same (public) IP address, so a particular node on the NAT
subnet may receive even less replies.
Martin
--
Martin Burnicki
Senior Software Engineer
MEINBERG Funkuhren GmbH & Co. KG
Email: martin.burnicki at meinberg.de
Phone: +49 5281 9309-414
Linkedin: https://www.linkedin.com/in/martinburnicki/
Lange Wand 9, 31812 Bad Pyrmont, Germany
Amtsgericht Hannover 17HRA 100322
Geschäftsführer/Managing Directors: Günter Meinberg, Werner Meinberg,
Andre Hartmann, Heiko Gerstung
Websites: https://www.meinberg.de https://www.meinbergglobal.com
Training: https://www.meinberg.academy
More information about the LEAPSECS
mailing list