1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
|
Network Working Group D.L. Mills
Request for Comments: 958 M/A-COM Linkabit
September 1985
Network Time Protocol (NTP)
Status of this Memo
This RFC suggests a proposed protocol for the ARPA-Internet
community, and requests discussion and suggestions for improvements.
Distribution of this memo is unlimited.
Table of Contents
1. Introduction
2. Service Model
3. Protocol Overview
4. State Variables and Formats
5. Protocol Operation
5.1. Protocol Modes
5.2. Message Processing
5.3. Network Considerations
5.4. Leap Seconds
6. References
Appendix A. UDP Header Format
Appendix B. NTP Data Format
1. Introduction
This document describes the Network Time Protocol (NTP), a protocol
for synchronizing a set of network clocks using a set of distributed
clients and servers. NTP is built on the User Datagram Protocol
(UDP) [13], which provides a connectionless transport mechanism. It
is evolved from the Time Protocol [7] and the ICMP Timestamp message
[6] and is a suitable replacement for both.
NTP provides the protocol mechanisms to synchronize time in principle
to precisions in the order of nanoseconds while preserving a
non-ambiguous date, at least for this century. The protocol includes
provisions to specify the precision and estimated error of the local
clock and the characteristics of the reference clock to which it may
be synchronized. However, the protocol itself specifies only the
data representation and message formats and does not specify the
synchronizing algorithms or filtering mechanisms.
Other mechanisms have been specified in the Internet protocol suite
to record and transmit the time at which an event takes place,
including the Daytime protocol [8] and IP Timestamp option [9]. The
NTP is not meant to displace either of these mechanisms. Additional
information on network time synchronization can be found in the
Mills [Page 1]
^L
RFC 958 September
Network Time Protocol
References at the end of this document. An earlier synchronization
protocol is discussed in [3] and synchronization algorithms in [2],
[5], [10] and [12]. Experimental results on measured roundtrip delays
and clock offsets in the Internet are discussed in [4] and [11]. A
comprehensive mathematical treatment of clock synchronization can be
found in [1].
2. Service Model
The intent of the service for which this protocol is designed is to
connect a few primary reference clocks, synchronized by wire or radio
to national standards, to centrally accessable resources such as
gateways. These gateways would use NTP between them to cross-check
the primary clocks and mitigate errors due to equipment or
propagation failures. Some number of local-net hosts, serving as
secondary reference clocks, would run NTP with one or more of these
gateways. In order to reduce the protocol overhead, these hosts
would redistribute time to the remaining local-net hosts. In the
interest of reliability selected hosts might be equipped with less
accurate but less expensive radio clocks and used for backup in case
of failure of the primary and/or secondary clocks or communication
paths between them.
In the normal configuration a subnetwork of primary and secondary
clocks will assume a hierarchical organization with the more accurate
clocks near the top and the less accurate below. NTP provides
information that can be used to organize this hierarchy on the basis
of precision or estimated error and even to serve as a rudimentary
routing algorithm to organize the subnetwork itself. However, the
NTP protocol does not include a specification of the algorithms for
doing this, which is left as a topic for further study.
3. Protocol Overview
There is no provision for peer discovery, acquisition, or
authentication in NTP. Data integrity is provided by the IP and UDP
checksums. No reachability, circuit-management, duplicate-detection
or retransmission facilities are provided or necessary. The service
can operate in a symmetric mode, in which servers and clients are
indistinguishable yet maintain a small amount of state information,
or in an unsymmetric mode in which servers need maintain no client
state other than that contained in the client request. Moreover,
only a single NTP message format is necessary, which simplifies
implementation and can be used in a variety of solicited or
unsolicited polling mechanisms.
In what may be the most common (unsymmetric) mode a client sends an
Mills [Page 2]
^L
RFC 958 September
Network Time Protocol
NTP message to one or more servers and processes the replies as
received. The server interchanges addresses and ports, fills in or
overwrites certain fields in the message, recalculates the checksum
and returns it immediately. Information included in the NTP message
allows each client/server peer to determine the timekeeping
characteristics of its other peers, including the expected accuracies
of their clocks. Using this information each peer is able to select
the best time from possibly several other clocks, update the local
clock and estimate its accuracy.
It should be recognized that clock synchronization requires by its
nature long periods and multiple comparisons in order to maintain
accurate timekeeping. While only a few comparisons are usually
adequate to maintain local time to within a second, primarily to
protect against broken hardware or synchronization failure, periods
of hours or days and tens or hundreds of comparisons are required to
maintain local time to within a few tens of milliseconds.
Fortunately, the frequency of comparisons can be quite small and
almost always non-intrusive to normal network operations.
4. State Variables and Formats
NTP timestamps are represented as a 64-bit fixed-point number, in
seconds relative to 0000 UT on 1 January 1900. The integer part is
in the first 32 bits and the fraction part in the last 32 bits, as
shown in the following diagram.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Integer Part |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Fraction Part |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
This format allows convenient multiple-precision arithmetic and
conversion to Time Protocol representation (seconds), but does
complicate the conversion to ICMP Timestamp message representation
(milliseconds). The low-order fraction bit increments at about
0.2-nanosecond intervals, so a free-running one-millisecond clock
will be in error only a small fraction of one part per million, or
less than a second per year.
In some cases a particular timestamp may not be available, such as
when the protocol first starts up. In these cases the 64-bit field
is set to zero, indicating the value is invalid or undefined.
Mills [Page 3]
^L
RFC 958 September
Network Time Protocol
Following is a description of the various data items used in the
protocol. Details of packet formats are presented in the Appendices.
Leap Indicator
This is a two-bit code warning of an impending leap-second to be
inserted in the internationally coordinated Standard Time
broadcasts. A leap-second is occasionally added or subtracted
from Standard Time, which is based on atomic clocks, to maintain
agreement with Earth rotation. When necessary, the corrections
are notified in advance and executed at the end of the last day of
the month in which notified, usually June or December. When a
correction is executed the first minute of the following day will
have either 59 or 61 seconds.
Status
This is a six-bit code indicating the status of the local clock.
Values are assigned to indicate whether it is operating correctly
or in one of several error states.
Reference Clock Type
This is an eight-bit code identifying the type of reference clock
used to set the local clock. Values are assigned for primary
clocks (locally synchronized to Standard Time), secondary clocks
(remotely synchronized via various network protocols) and even
eyeball-and-wristwatch.
Precision
This is a 16-bit signed integer indicating the precision of the
local clock, in seconds to the nearest power of two. For
instance, a 60-Hz line-frequency clock would be assigned the value
-6, while a 1000-Hz crystal clock would be assigned the value -10.
Estimated Error
This is a 32-bit fixed-point number indicating the estimated error
of the local clock at the time last set. The value is in seconds,
with fraction point between bits 15 and 16, and is computed by the
sender based on the reported error of the reference clock, the
precision and drift rate of the local clock and the time the local
clock was last set. For statistical purposes this quantity can be
assumed equal to the estimated or computed standard deviation, as
described in [12].
Mills [Page 4]
^L
RFC 958 September
Network Time Protocol
Estimated Drift Rate
This is a 32-bit signed fixed-point number indicating the
estimated drift rate of the local clock. The value is
dimensionless, with fraction point to the left of the high-order
bit. While for most purposes this value can be estimated based on
the hardware characteristics, it is possible to compute it quite
accurately, as described in [12].
Reference Clock Identifier
This is a 32-bit code identifying the particular reference clock.
The interpretation of its value depends on value of Reference
Clock Type. In the case of a primary clock locally synchronized
to Standard Time (type 1), the value is an ASCII string
identifying the clock. In the case of a secondary clock remotely
synchronized to an Internet host via NTP (type 2), the value is
the 32-bit Internet address of that host. In other cases the
value is undefined.
Reference Timestamp
This is a 64-bit timestamp established by the server or client
host as the timestamp (presumably obtained from a reference clock)
most recently used to update the local clock. If the local clock
has never been synchronized, the value is zero.
Originate Timestamp
This is a 64-bit timestamp established by the client host and
specifying the local time at which the request departed for the
service host. It will always have a nonzero value.
Receive Timestamp
This is a 64-bit timestamp established by the server host and
specifying the local time at which the request arrived from the
client host. If no request has ever arrived from the client the
value is zero.
Transmit Timestamp
This is a 64-bit timestamp established by the server host and
specifying the local time at which the reply departed for the
client host. If no request has ever arrived from the client the
value is zero.
Mills [Page 5]
^L
RFC 958 September
Network Time Protocol
5. Protocol Operation
The intent of this document is to specify a standard for data
representation and message format which can be used for a variety of
synchronizing algorithms and filtering mechanisms. Accordingly, the
information in this section should be considered a guide, rather than
a concise specification. Nevertheless, it is expected that a
standard Internet distributed timekeeping protocol with concisely
specified synchronizing and filtering algorithms can be evolved from
the information in this section.
5.1. Protocol Modes
The distinction between client and server is significant only in
the way they interact in the request/response interchange. The
same NTP message format is used by each peer and contains the same
data relative to the other peer. In the unsymmetric mode the
client periodically sends an NTP message to the server, which then
responds within some interval. Usually, the server simply
interchanges addresses and ports, fills in the required
information and sends the message right back. Servers operating in
the unsymmetric mode then need retain no state information between
client requests.
In the symmetric mode the client/server distinction disappears.
Each peer maintains a table with as many entries as active peers,
each entry including a code uniquely identifying the peer (e.g.
Internet address), together with status information and a copy of
the Originate Timestamp and Receive Timestamp values last received
from that peer. The peer periodically sends an NTP message to each
of these peers including the latest copy of these timestamps. The
interval between sending NTP messages is managed solely by the
sending peer and is unaffected by the arrival of NTP messages from
other peers.
The mode assumed by a peer can be determined by inspection of the
UDP Source Port and Destination Port fields (see Appendix A). If
both of these fields contain the NTP service-port number 123, the
peer is operating in symmetric mode. If they are different and
the Destination Port field contains 123, this is a client request
and the receiver is expected to reply in the manner described
above. If they are different and the Source Port field contains
123, this is a server reply to a previously sent client request.
Mills [Page 6]
^L
RFC 958 September
Network Time Protocol
5.2. Message Processing
The significant events of interest in NTP occur usually near the
times the NTP messages depart and arrive the client/server. In
order to maintain the highest accuracy it is important that the
timestamps associated with these events be computed as close as
possible to the hardware or software driver associated with the
communications link and, in particular, that departure timestamps
be recomputed for each retransmission, if used at the link level.
An NTP message is constructed as follows (see Appendix B). The
source peer constructs the UDP header and the LI, Status,
Reference Clock Type and Precision fields in the NTP data portion.
Next, it determines the current synchronizing source and
constructs the Type and Reference Clock Identifier fields. From
its timekeeping algorithm (see [12] for examples) it determines
the Reference Timestamp, Estimated Error and Estimated Drift Rate
fields. Then it copies into the Receive Timestamp and Transmit
Timestamp fields the data saved from the latest message received
from the destination peer and, finally, computes the Originate
Timestamp field.
The destination peer calculates the roundtrip delay and clock
offset relative to the source peer as follows. Let t1, t2 and t3
represent the contents of the Originate Timestamp, Receive
Timestamp and Transmit Timestamp fields and t4 the local time the
NTP message is received. Then the roundtrip delay d and clock
offset c is:
d = (t4 - t1) - (t3 - t2) and c = (t2 - t1 + t3 - t4)/2 .
The implicit assumption in the above is that the one-way delay is
statistically half the roundtrip delay and that the intrinsic
drift rates of both the client and server clocks are small and
close to the same value.
5.3. Network Considerations
The client/server peers have an opportunity to learn a good deal
about each other in the NTP message exchange. For instance, each
can learn about the characteristics of the other clocks and select
among them the most accurate to use as reference clock, compute
the estimated error and drift rate and use this information to
manage the dynamics of the subnetwork of clocks. An outline of a
suggested mechanism is as follows:
Included in the table of timestamps for each peer are state
Mills [Page 7]
^L
RFC 958 September
Network Time Protocol
variables to indicate the precision, as well as the current
estimated delay, offset, error and drift rate of its local clock.
These variables are updated for each NTP message received from the
peer, after which the estimated error is periodically recomputed
on the basis of elapsed time and estimated drift rate.
Assuming symmetric mode, a polling interval is established for
each peer, depending upon its normal synchronization source,
precision and intrinsic accuracy, which might be determined in
advance or even as the result of observation. The delay and
clock-offset samples obtained can be filtered using
maximum-likelihood techniques and algorithms described in [12].
From time to time a local-clock correction is computed from the
offset data accumulated as above, perhaps using algorithms
described in [10] and [12]. The correction causes the local clock
to run slightly fast or slow to the corrected time or to jump
instantaneously to the correct time, depending on the magnitude of
the correction. See [5] and [11] for a discussion of local-clock
implementation models and synchronizing algorithms. Note that the
expectation here is that all network clocks are maintained by
these algorithms, so that manual intervention is not normally
required.
As a byproduct of the above operations an estimate of local-clock
error and drift rate can be computed. Note that the magnitude of
the error estimate must always be greater than that of the
selected reference clock by at least the inherent precision of the
local clock. It does not take a leap of imagination to see that
the estimated error, delay or precision, or some combination of
them, can be used as a metric for a simple min-hop-type routing
algorithm to organize the subnetwork so as to provide the most
accurate time to all peers and to provide automatic fallback to
alternate sources in case of failures.
A variety of network configurations can be included in the above
scenario. In the case of networks supporting a broadcast
function, for example, NTP messages can be broadcast from one or
more server hosts and picked up by client hosts sharing the same
cable. Since typical networks of this type have a very low
propagation delay, the roundtrip-delay calculation can be omitted
and the clients need not broadcast in return. Thus, the
requirement to save per-peer timestamps is removed, so that the
Receive Timestamp and Transmit Timestamp fields can be set to zero
and the local-clock offset becomes simply the difference between
the Originate Timestamp and the local time upon arrival. In the
case of long-delay satellite networks with broadcast capabilities,
Mills [Page 8]
^L
RFC 958 September
Network Time Protocol
an accurate measure of roundtrip delay is usually available from
the channel-scheduling algorithm, so the per-peer timestamps again
can be avoided.
5.4. Leap Seconds
A standard mechanism to effect leap-second correction is not a
part of this specification. It is expected that the Leap
Indicator bits would be set by hand in the primary reference
clocks, then trickle down to all other clocks in the network,
which would execute the correction at the specified time and reset
the bits.
Mills [Page 9]
^L
RFC 958 September
Network Time Protocol
6. References
1. Lindsay, W.C., and A.V. Kantak. Network Synchronization of
Random Signals. IEEE Trans. Comm. COM-28, 8 (August 1980),
1260-1266.
2. Mills, D.L. Time Synchronization in DCNET Hosts. DARPA Internet
Project Report IEN-173, COMSAT Laboratories, February 1981.
3. Mills, D.L. DCNET Internet Clock Service. DARPA Network Working
Group Report RFC-778, COMSAT Laboratories, April 1981.
4. Mills, D.L. Internet Delay Experiments. DARPA Network Working
Group Report RFC-889, M/A-COM Linkabit, December 1983.
5. Mills, D.L. DCN Local-Network Protocols. DARPA Network Working
Group Report RFC-891, M/A-COM Linkabit, December 1983.
6. Postel, J. Internet Control Message Protocol. DARPA Network
Working Group Report RFC-792, USC Information Sciences Institute,
September 1981.
7. Postel, J. Time Protocol. DARPA Network Working Group Report
RFC-868, USC Information Sciences Institute, May 1983.
8. Postel, J. Daytime Protocol. DARPA Network Working Group Report
RFC-867, USC Information Sciences Institute, May 1983.
9. Su, Z. A Specification of the Internet Protocol (IP) Timestamp
Option. DARPA Network Working Group Report RFC-781. SRI
International, May 1981.
10. Marzullo, K., and S. Owicki. Maintaining the Time in a
Distributed System. ACM Operating Systems Review 19, 3 (July
1985), 44-54.
11. Mills, D.L. Experiments in Network Clock Synchronization. DARPA
Network Working Group Report RFC-957, M/A-COM Linkabit, August
1985.
12. Mills, D.L. Algorithms for Synchronizing Network Clocks. DARPA
Network Working Group Report RFC-956, M/A-COM Linkabit, September
1985.
13. Postel, J. User Datagram Protocol. DARPA Network Working Group
Report RFC-768, USC Information Sciences Institute, August 1980.
Mills [Page 10]
^L
RFC 958 September
Network Time Protocol
Appendix A. UDP Header Format
An NTP packet consists of the UDP header followed by the NTP data
portion. The format of the UDP header and the interpretation of its
fields are described in [13] and are not part of the NTP
specification. They are shown below for completeness.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Port | Destination Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Length | Checksum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Source Port
UDP source port number. In the case of unsymmetric mode and a
client request this field is assigned by the client host, while
for a server reply it is copied from the Destination Port field of
the client request. In the case of symmetric mode, both the
Source Port and Destination Port fields are assigned the NTP
service-port number 123.
Destination Port
UDP destination port number. In the case of unsymmetric mode and a
client request this field is assigned the NTP service-port number
123, while for a server reply it is copied form the Source Port
field of the client request. In the case of symmetric mode, both
the Source Port and Destination Port fields are assigned the NTP
service-port number 123.
Length
Length of the request or reply, including UDP header, in octets.
Checksum
Standard UDP checksum.
Mills [Page 11]
^L
RFC 958 September
Network Time Protocol
Appendix B. NTP Data Format
The format of the NTP data portion, which immediately follows the UDP
header, is shown below along with a description of its fields.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|LI | Status | Type | Precision |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Estimated Error |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Estimated Drift Rate |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Reference Clock Identifier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Reference Timestamp (64 bits) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Originate Timestamp (64 bits) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Receive Timestamp (64 bits) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Transmit Timestamp (64 bits) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Leap Indicator (LI)
Code warning of impending leap-second to be inserted at the end of
the last day of the current month. Bits are coded as follows:
00 no warning
01 +1 second (following minute has 61 seconds)
10 -1 second (following minute has 59 seconds)
11 reserved for future use
Status
Code indicating status of local clock. Values are defined as
follows:
Mills [Page 12]
^L
RFC 958 September
Network Time Protocol
0 clock operating correctly
1 carrier loss
2 synch loss
3 format error
4 interface (Type 1) or link (Type 2) failure
(additional codes reserved for future use)
Reference Clock Type
(Type)
Code identifying the type of reference clock. Values are defined
as follows:
0 unspecified
1 primary reference (e.g. radio clock)
2 secondary reference using an Internet host via NTP
3 secondary reference using some other host or protocol
4 eyeball-and-wristwatch
(additional codes reserved for future use)
Precision
Signed integer in the range +32 to -32 indicating the precision of
the local clock, in seconds to the nearest power of two.
Estimated Error
Fixed-point number indicating the estimated error of the local
clock at the time last set, in seconds with fraction point between
bits 15 and 16.
Estimated Drift Rate
Signed fixed-point number indicating the estimated drift rate of
the local clock, in dimensionless units with fraction point to the
left of the high-order bit.
Reference Clock
Identifier
Code identifying the particular reference clock. In the case of
type 1 (primary reference), this is a left-justified, zero-filled
ASCII string identifying the clock, for example:
WWVB WWVB radio clock (60 KHz)
Mills [Page 13]
^L
RFC 958 September
Network Time Protocol
GOES GOES satellite clock (468 HMz)
WWV WWV radio clock (2.5/5/10/15/20 MHz)
(and others as necessary)
In the case of type 2 (secondary reference) this is the 32-bit
Internet address of the reference host. In other cases this field
is reserved for future use and should be set to zero.
Reference Timestamp
Local time at which the local clock was last set or corrected.
Originate Timestamp
Local time at which the request departed the client host for the
service host.
Receive Timestamp
Local time at which the request arrived at the service host.
Transmit Timestamp
Local time at which the reply departed the service host for the
client host.
Mills [Page 14]
^L
|