#Internet Time Servers,
#GPS Time Server Appliances
Internet Time Servers
• Time from outside the network results in variability from the internet
• Unknown time sources and unknown traceability
• User unable to audit the time source
GPS TIME SERVER APPLIANCES
• Time from inside the network is at least 1,000 times more accurate
• Direct connection to very accurate and traceable GPS time
• Full logging of synchronization
NetBeez - What is active network monitoring?NetBeez, Inc.
A short presentation on active network monitoring: what it is, how it is implemented and what its benefits are. If you want to learn more, check out https://netbeez.net
Apply big data and data lake for processing security data collectionsGregory Shlyuger
Computer security, information security and event management (SIEM) and non-event based raw data (NERD) is a feed activity for modern cyber domain network architecture. Each type of cyber domain such as Software Defined Networks, Virtualization, Service Orchestration or Cloud/Elastic computers, essential carryover characteristics. Each cyber domain might have slightly different properties. Enrichment NERD and SIEM models with Raw Activity Event Data allowed transformation the raw sensor flowing through the system into enriched data elements that are both descriptive and predictive in nature. This paper detail some scenarios for evidence collection, parsing, enrichment, the implementation k-Nearest Neighbor (kNN) classifier as a proof of concept (POC) for Apache Metron cyber security framework. For anomaly detection on Hadoop, utilizing Data Lake, data science and machine learning algorithm indicate this is a viable approach towards collecting, analyzing sensor data and analytical grid processing in a complex and ambiguous environment.
Completing a transition to a microservices-based architecture makes every software engineer feel good. You can be proud of requests spanning multiple individual services, each with isolated single responsibility. Exactly as you dreamed it would be.
In the course of this transition however, you will have also created several new problems. Among these is a whole new level of complexity related to understanding the behavior of the application when troubleshooting a problem. If you have ever wrestled with pinpointing the exact root cause during a post-mortem, this talk is for you.
We will show you how capturing the runtime transparency of the distributed and dynamic architecture is possible. Better yet, we will cover both simple and advanced examples about how taking this route gives you an objective and evidence-based ability to zoom in to the problem.
After attending the talk you will understand how distributed tracing will help your team during incident response and post-mortems.
Register today to learn more:
What are distributed traces
Different ways to add distributed tracing to your production services
How the distributed traces expose the runtime architecture of your microservices in production.
Examples of how a distributed trace highlights a problem
Advanced examples of how distributed traces map root causes to real user impact
For enterprise software applications and related processes, highly accurate and synchronized time is a necessity. An inaccurate
computer clock can cause significant problems. A discrepancy of a minute or two could cause a significant and unacceptable margin of error, since many applications require that the time be kept accurate to the nearest second or less.
Are all real-time distributed applications supposed to be designed the same way? Is the design for a UAV-based
application the same as that of a command-and-control application? This paper characterizes the lifecycle of data in real-time applications—from creation to consumption. The paper
covers questions that architects should ask about data management—creation, transmission, validation,
enrichment, and consumption; questions that will determine the foundation of their project.
NetBeez - What is active network monitoring?NetBeez, Inc.
A short presentation on active network monitoring: what it is, how it is implemented and what its benefits are. If you want to learn more, check out https://netbeez.net
Apply big data and data lake for processing security data collectionsGregory Shlyuger
Computer security, information security and event management (SIEM) and non-event based raw data (NERD) is a feed activity for modern cyber domain network architecture. Each type of cyber domain such as Software Defined Networks, Virtualization, Service Orchestration or Cloud/Elastic computers, essential carryover characteristics. Each cyber domain might have slightly different properties. Enrichment NERD and SIEM models with Raw Activity Event Data allowed transformation the raw sensor flowing through the system into enriched data elements that are both descriptive and predictive in nature. This paper detail some scenarios for evidence collection, parsing, enrichment, the implementation k-Nearest Neighbor (kNN) classifier as a proof of concept (POC) for Apache Metron cyber security framework. For anomaly detection on Hadoop, utilizing Data Lake, data science and machine learning algorithm indicate this is a viable approach towards collecting, analyzing sensor data and analytical grid processing in a complex and ambiguous environment.
Completing a transition to a microservices-based architecture makes every software engineer feel good. You can be proud of requests spanning multiple individual services, each with isolated single responsibility. Exactly as you dreamed it would be.
In the course of this transition however, you will have also created several new problems. Among these is a whole new level of complexity related to understanding the behavior of the application when troubleshooting a problem. If you have ever wrestled with pinpointing the exact root cause during a post-mortem, this talk is for you.
We will show you how capturing the runtime transparency of the distributed and dynamic architecture is possible. Better yet, we will cover both simple and advanced examples about how taking this route gives you an objective and evidence-based ability to zoom in to the problem.
After attending the talk you will understand how distributed tracing will help your team during incident response and post-mortems.
Register today to learn more:
What are distributed traces
Different ways to add distributed tracing to your production services
How the distributed traces expose the runtime architecture of your microservices in production.
Examples of how a distributed trace highlights a problem
Advanced examples of how distributed traces map root causes to real user impact
For enterprise software applications and related processes, highly accurate and synchronized time is a necessity. An inaccurate
computer clock can cause significant problems. A discrepancy of a minute or two could cause a significant and unacceptable margin of error, since many applications require that the time be kept accurate to the nearest second or less.
Are all real-time distributed applications supposed to be designed the same way? Is the design for a UAV-based
application the same as that of a command-and-control application? This paper characterizes the lifecycle of data in real-time applications—from creation to consumption. The paper
covers questions that architects should ask about data management—creation, transmission, validation,
enrichment, and consumption; questions that will determine the foundation of their project.
Synchronization For High Frequency Trading Networks: A How To Guidejeremyonyan
For many financial institutions, high frequency trading volume is growing at an accelerating pace and demanding new requirements on their IT infrastructure. Drivers in their business such as pricing of equities moving from decimal to penny resolution and the growing need for markets to provide improved liquidity are resulting in huge opportunities for financial gain. Taking advantage of these opportunities is, in part, dependent on the care taken in the network’s time synchronization and the management of latency. Wall Street firms who were involved in the early phases of High Frequency Trading have been early adopters of high performance timing solutions utilizing a variety of signals including GPS, IRIG, 1PPS, NTP and now the Precision Time Protocol (PTP) which allows for precision time transfer on Ethernet networks. The implementation of specific timing solutions depends on the trading infrastructure and the network topology. Through a combination of hardware, software, and careful network management, it is reasonable to expect microsecond level time-transfer from traceable time sources to Linux applications.
We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.
The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.
Performance Evaluation of Low-cost GPS Time Server based on NTPTELKOMNIKA JOURNAL
Time synchronization is required to maintain a precise clock. In this paper, a low-cost GPS NTP
server has been realized using inexpensive arduino, GPS receiver, and ethernet shield. The performance
of low cost GPS NTP server has been compared with the performance of commercial GPS NTP server
(TM1000A). The results showed that both time server has synchronization success rate of 100% with
average clock offset -8,69 ms for low cost GPS NTP server and -10,1538 ms for TM1000A. However,
TM1000A have better clock offset deviation area compared with low cost GPS NTP server. TM1000A has
a smaller clock offset deviation area, which is between -8 ms to -12 ms while low cost GPS NTP server
has larger clock offset deviation area, which is between -20 ms to +10 ms. With production costs of less
than 29 USD, we offer cheap GPS NTP servers as an alternative GPS NTP server for time synchronization
on computer networks.
At the Workshop for Synchronization and Timing Systems in San Jose, Oscilloquartz’s Nir Laufer explained how to combine PTP and NTP to help meet the sub-millisecond accuracy needed for many new applications.
At ITSF 2016 in Prague, Nir Laufer of Oscilloquartz explained how to combine PTP and NTP to help meet the sub-millisecond accuracy needed for many new applications.
Delay Efficient Method for Delivering IPTV ServicesIJERA Editor
Internet Protocol Television (IPTV) is a system through which Internet television services are delivered using
the architecture and networking methods of the Internet Protocol Suite over a packet-switched network
infrastructure, e.g., the Internet and broadband Internet access networks, instead of being delivered through
traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats. IPTV provides
mainly three services: live TV, catch up TV, and video on demand (VoD).This paper focuses on delivering the
live TV services by exploiting the virtualised cloud architecture of the IPTV and statistical multiplexing. The
VoD tasks are prescheduled so that there will be less Instant Channel Change (ICC) delay. We select a proper
scheduling algorithm for rescheduling the VoD tasks. We then implement the scheduling algorithm for preshifting
the VoD tasks.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Synchronization For High Frequency Trading Networks: A How To Guidejeremyonyan
For many financial institutions, high frequency trading volume is growing at an accelerating pace and demanding new requirements on their IT infrastructure. Drivers in their business such as pricing of equities moving from decimal to penny resolution and the growing need for markets to provide improved liquidity are resulting in huge opportunities for financial gain. Taking advantage of these opportunities is, in part, dependent on the care taken in the network’s time synchronization and the management of latency. Wall Street firms who were involved in the early phases of High Frequency Trading have been early adopters of high performance timing solutions utilizing a variety of signals including GPS, IRIG, 1PPS, NTP and now the Precision Time Protocol (PTP) which allows for precision time transfer on Ethernet networks. The implementation of specific timing solutions depends on the trading infrastructure and the network topology. Through a combination of hardware, software, and careful network management, it is reasonable to expect microsecond level time-transfer from traceable time sources to Linux applications.
We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. We would like to thank …. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum.
Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.
The term “fog computing” or “edge computing” means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. It is a term for placing some processes and resources at the edge of the cloud, instead of establishing channels for cloud storage and utilization.
Performance Evaluation of Low-cost GPS Time Server based on NTPTELKOMNIKA JOURNAL
Time synchronization is required to maintain a precise clock. In this paper, a low-cost GPS NTP
server has been realized using inexpensive arduino, GPS receiver, and ethernet shield. The performance
of low cost GPS NTP server has been compared with the performance of commercial GPS NTP server
(TM1000A). The results showed that both time server has synchronization success rate of 100% with
average clock offset -8,69 ms for low cost GPS NTP server and -10,1538 ms for TM1000A. However,
TM1000A have better clock offset deviation area compared with low cost GPS NTP server. TM1000A has
a smaller clock offset deviation area, which is between -8 ms to -12 ms while low cost GPS NTP server
has larger clock offset deviation area, which is between -20 ms to +10 ms. With production costs of less
than 29 USD, we offer cheap GPS NTP servers as an alternative GPS NTP server for time synchronization
on computer networks.
At the Workshop for Synchronization and Timing Systems in San Jose, Oscilloquartz’s Nir Laufer explained how to combine PTP and NTP to help meet the sub-millisecond accuracy needed for many new applications.
At ITSF 2016 in Prague, Nir Laufer of Oscilloquartz explained how to combine PTP and NTP to help meet the sub-millisecond accuracy needed for many new applications.
Delay Efficient Method for Delivering IPTV ServicesIJERA Editor
Internet Protocol Television (IPTV) is a system through which Internet television services are delivered using
the architecture and networking methods of the Internet Protocol Suite over a packet-switched network
infrastructure, e.g., the Internet and broadband Internet access networks, instead of being delivered through
traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats. IPTV provides
mainly three services: live TV, catch up TV, and video on demand (VoD).This paper focuses on delivering the
live TV services by exploiting the virtualised cloud architecture of the IPTV and statistical multiplexing. The
VoD tasks are prescheduled so that there will be less Instant Channel Change (ICC) delay. We select a proper
scheduling algorithm for rescheduling the VoD tasks. We then implement the scheduling algorithm for preshifting
the VoD tasks.
Similar to Time synchronization solution: NTP (20)
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Time synchronization solution: NTP
1. Internet Time Servers
• Time from outside the network results in variability from the internet
• Unknown time sources and unknown traceability
• User unable to audit the time source
GPS Time Server Appliances
• Time from inside the network is at least 1,000 times more accurate
• Direct connection to very accurate and traceable GPS time
• Full logging of synchronization
Internet Time Servers,
GPS Time Server Appliances
2.
3. The Traceability of Time Synchronization:
Inside vs Outside the Network
• Time from outside the
network results in variability
from the internet
• Unknown time sources and
unknown traceability
• User unable to audit
the time source
Internet
Time Servers
• Time from inside the
network is at least 1,000
times more accurate
• Direct connection to very
accurate and traceable GPS time
• Full logging of synchronization
GPS Time
Server Appliances
NTP-over-the-Internet Increases Synchronization
Variation
NTP is a mature network protocol for synchronizing a local
system to a time server. NTP time servers are widely available
on the internet. But you’ll need to carefully consider if inter-
net time servers are appropriate for your application. Even for
internet time servers operated by national authorities, such as
NIST or the US Naval Observatory that are based on extremely
accurate atomic clocks, there are many factors that impact trace-
ability. According to ntp.org, “If business, organization or human
life depends on having correct time or can be harmed by it being
wrong, you shouldn’t ‘just get it off the internet’.” [http://www.
pool.ntp.org/en/use.html, accessed Jan 15, 2016]
One problem with time synchronization is the variability of network
conditions. Network load, variable paths, and firewall settings can
impact time quality to the local system. To illustrate this effect we
can use the time quality monitoring feature of Spectracom’s
VelaSync™ time server. It has a built-in GPS receiver as its refer-
ence that is accurate to tens of nanoseconds. NTP can be used to
In today’s modern networking infrastructures, great care is taken
to ensure networks are reliable, highly available, and most of all,
secure. Cybersecurity has emerged as a critical area in all facets of
the internet. It’s an area that companies spend millions on each
year. Yet still, there are often overlooked areas which degrade
security. One example of this is time.
As simple as it sounds, time plays a critical role in synchronizing
core business and network systems. It supports authentication
protocols as well as accurate log files critical for an audit trail
necessary for any cyber forensics program. As such, synchroni-
zation is often a requirement for network security standards such
as the Payment Card Industry’s Data Security Standards. PCI DSS
section 10.4 requires a traceable time source for synchronization
of ecommerce systems.
This document briefly discusses the differences between a time
source from within the network compared to outside the
network with considerations for traceability for a network
deployment of network time protocol (NTP).
4. The Traceability of Time Synchronization: Inside vs Outside the Network
compare it to another GPS time server on a local area network.
The offset is around 15-20 microseconds (figure 1).
The VelaSync time server was then connected to some of the most
popular internet time servers. The variation result, shown in figure
2, is as high as tens of milliseconds — 1,000 times worse than NTP
across a local area network. If we assume all the time servers are
accurate then difference is solely due to greater path delay and
other dynamic conditions.
This variation is enough to question the traceability of time from
the internet.
The Internet Obscures Time Traceability
Perhaps more important, for a security-critical network, you need
to know the validity of the source used by the time server that dis-
tributes time to your network. Time from GPS signals is recognized
as the most accurate, available and traceable time source. GPS-
based time servers are easy and simple appliances to add to the
local network. Even when different GPS time servers are deployed
in different locations they will provide the same time regardless
of geographies. What’s more, GPS as a local time source can be
monitored so its logs can be part of the audit trail.
Internet time servers may utilize GPS (or similarly accurate time
sources) but you never know. To illustrate this point, we can use
another feature of the VelaSync time server software, known as
Time Map. The time map provides information available on the
source of the time servers. See figure 3.
Of the seven internet time servers monitored over a 24 hour period, 20
different time sources were identified. Less than half of the sources
could be identified as being directly from GPS. In one case, GPS time
was distributed through 3 different time servers. The best practice of
using NTP server pools is one reason why there are more sources than
time servers. Server pools rotate among various internet time servers,
each with their source of time, to reduce the chance of one bad or
unavailable time server catastrophically affecting the synchronization.
However, that is a problem for those requiring traceability. The source
of time is not known or predetermined.
Conclusion
Indeterminate source identification, indeterminate accuracy variation,
and the inability to log the resulting time synchronization calls to
question the use of time from the internet. What’s more, internet
time servers are subject to being spoofed (bad NTP data sent from
a faked IP address) and direct attacks including NTP poisoning,
replay, and denial of service. So don’t leave it to chance. When
there is a business-critical need to trace time to an accurate source,
the clear solution is GPS time server appliances deployed on the
local network.
HB TECHNOLOGIES with their partners offers several choices of high
performance time servers to meet a variety of requirements and
applications. Contact us to discuss which solution would be best for
solving your requirements.
Figure 1: The comparison between two GPS time servers on the same LAN using
NTP results in 15-20 microseconds offset.
Figure 2: The comparison of internet time servers as measured by NTP on a local
GPS time server. The scale is 1,000 times greater than figure 1.
Figure 3: A time map shows a graphical
diagram of NTP servers and their time
source. In one case, the time source was
distributed through 3 different servers
which can offset accuracy and obscures
traceability.
5. Accurate Time Essential for Video Surveillance Applications...
1 | Timing & Synchronization
As video surveillance hardware becomes IP-based, systems are able to take advantage of the network to improve efficiency and
performance. Time synchronization, in which all the clocks in cameras, recording equipment, and computers have the same time, is
simple to implement on the network. It utilizes a standard protocol and a network appliance known as a time server. What’s more,
the time server can be legally traceable to a time authority. The result is low-cost investment protection for the video system
deployment.
Introduction
Security professionals thrive in a “What if?” world. What if a security system deployment is not synchronized? An employee in a
major corporation clearly compromises corporate security, but the legal department declines to prosecute. Why? Because the
physical security system shows him entering the area several minutes after a particular event was logged on the computer network.
Time synchronization could have preempted this problem.
Assuming clocks in electronic devices are set correctly, they are inherently inaccurate because they drift. The risk of re-setting clocks
at infrequent intervals, in separate systems, with different times compounded by normal clock drift is unnecessary and is a legal
liability. A municipality came under public scrutiny and threat of lawsuit for inadequate response to a medical emergency. The time
stamp on video shows a man collapsing at one time, but the 9-1-1 call was made much later. It was determined subsequently that
the video recorder was manually set incorrectly.
A few years ago, 9-1-1 call centers were facing these types of lawsuits for allegedly not responding to emergencies in reasonable
amounts of time. Time-stamped records, especially those logged on voice recorders, are often subpoenaed in court cases. It is
imperative that these time records be legally traceable to a national standards authority. Synchronizing clocks to traceable time has
proven to be a successful defense of time stamped evidence.
Best practices for the use of video surveillance have been published by The Scientific Working Group for Imaging Technology
(SWGIT) as Recommendations and Guidelines for the Use of CCTV in Security Systems for Commercial Institutions. For security system
data to hold up in a court of law, one must demonstrate the ability to accurately re-create the events surrounding a particular
action. Accurate time stamping is essential for event reconstruction. The SWGIT recommendations specify the use of Network Time
Protocol (NTP) for IP-based systems and GPS-based timing equipment as an industry-standard time synchronization method.
Legal issues aside, synchronizing clocks greatly improves the efficiency of
operations for both the end user and the system integrator. Applications work
as expected, interoperability is ensured, and the costs of troubleshooting and
manually re-setting clocks are eliminated. Unsynchronized clocks lead to finger
pointing. Synchronized clocks offer peace-of-mind for every IP video
deployment.
Synchronization to Legally Traceable Time
Time, as measured by the second, is one of the seven legally-defined units of
measure. Since the Treaty of the Meter of 1875, time has been coordinated
worldwide. Today, official time, known as Coordinated Universal Time (UTC), is
measured by vibrations of the cesium atom, an extremely accurate time
constant. (UTC replaced Greenwich Mean Time [GMT] in 1972.) UTC is kept by
national metrology institutes like the National Institute of Standards and
Technology (NIST) in Boulder, Colorado. In order to synchronize clocks to
accurate time, traceability to NIST is required.
Implementing a NIST-traceable time synchronization system is made easy thanks to the Global Positioning System (GPS). GPS
provides a secure and cost-effective way to provide a traceable time synchronization source to a facility. The GPS system includes 24
6. 2 | Timing & Synchronization
satellites carrying onboard atomic clocks. The U.S. Naval Observatory monitors the satellites’ clocks and locks them to UTC for
accuracy and traceability to national and international standards. We are all familiar with the use of GPS to provide driving
directions. These systems use accurate time and the principle of triangulation to calculate the three-dimensional position anywhere
on earth. The same GPS signal can also be used to synchronize a local “master clock” that is used to distribute time to every clock in
the system.
Distribution of Network Time
Synchronization of security device clocks is a simple process for IP-based systems. Network Time Protocol (NTP) is an “open source”
time synchronization distribution standard sponsored by the Internet Engineering Task Force. Client software for NTP is widely
available for virtually any operating system and is typically preinstalled in IP-cameras, DVRs, computers, etc. Configuring an NTP
client is straightforward once the network has a master clock also known as a time server.
Time servers are available for general use on the Internet.
The major benefit is they are free. Their primary liability is
their use requires and an open port in the firewall and free
sources of time cannot be guaranteed, nor traceable.
What’s more problematic, however, is they require
continuous internet connectivity so they can’t be used in
closed security systems. In any implementation, using a time
source “outside the network” is a liability and should be
considered only after thorough risk analysis.
A GPS time server provides an integrated solution that
enables accurate time stamps for video surveillance systems
as well as access control systems, time and attendance,
alarms, and other elements of the network infrastructure
(routers, firewalls, etc.). Legally traceable timestamps
provide necessary evidence and validation of events for
legal proceedings. For reliability and security, the time server synchronizes to the precision time code from GPS satellites. They
operate safely behind the firewall to synchronize all elements of network hardware and software (including system logs) down to
the millisecond over LANs or WANs, anywhere on the planet.
Improved Cyber Security
The convergence of security systems to the network does not distinguish between protecting physical assets and protecting data
assets. An integrated security program requires regular review and analysis of network activity. System logs and the log files created
by firewalls and intrusion detection systems are vital to the reduction of cyber security threats. If a network is not synchronized and
all the computer clocks keep a different time, it becomes almost impossible to detect and analyze malicious activity on the network.
Time synchronization allows analysts to determine accurately the effect of an intrusion so it can be dealt with efficiently.
Expanded Functionality. Network Security. Peace of Mind.
A GPS-based time server, such as the Spectracom NetClock® system, is a low cost and high reliability network element that offers
worry-free network time synchronization. It tracks up to twelve satellites simultaneously for precise synchronizing to atomic clocks
traceable to national and international standards. Installation and operation is simple; set-up and reporting are web-enabled. A
NetClock time server can be accessed, under appropriate security policies, anywhere within a network. Features include browser-
based remote diagnostics, configuration and control, and flash memory for remote software upgrades. Remote control and
monitoring can also be done through SNMP and Telnet.
Installing a GPS time server on your network establishes the essential hub for integrated security systems. In addition to the
Ethernet capability for IP networking, a NetClock time server features specialized time outputs for stand-alone devices like voice
recorders, display clocks, fire alarms, and much more.
7. 3 | Timing & Synchronization
Conclusion
In the world of security professionals, establishing time synchronization is becoming more crucial if efficiencies and economies of
scale of network convergence are to be realized, and as cyber threats to security continue to emerge. A GPS time server answers the
growing need for accuracy, reliability, and traceability in mission critical systems across IP networks.
References
1) Spectracom web site: http://www.spectracomcorp.com
2) The Scientific Working Group for Imaging Technology (SWGIT): http://www.theiai.org/guidelines/swgit/index.php
3) NTP Public Services Project: http://ntp.isc.org/bin/view/Main/WebHome
4) NIST Time and Frequency Division: http://tf.nist.gov/
8. Time Synchronization Solution
RS-485orNTP
Network #3
Server
Time & Attendance
Network #2
Hub/Switch
Domain
Controller
1PPS
NetClock
®
/NTP Time Server
RS-485
Ethernet Time Server
Gateway/Router
Hub/Switch
Workstations
DatabaseServer
Building Access Control
CCTVEvent Logging
Video Surveillance
DVR
Ethernet
Wireless Mesh Time Network
S P E C T R A C O M
S P E C T R A C O M
S P E C T R A C O M S P E C T R A C O M
12
1
2
3
4
5
6
7
8
9
10
11
S P E C T R A C O M
TimeView™
Displays
S P E C T R A C O M
IP Displays
Main Network
Wireless Transmitter
RS-485
Test
Equipment
GPS Satellites
GPS+GLONASS Antenna
GLONASS Satellites
9. Synchronized Communication Center
Workstations
Server
Voice/Dictation Recorder
IRIG
GPS Satellites
NetClock
®
/NTP Time Server
RS-485
Hub/Switch
Ethernet
S P E C T R A C O M
TimeView™
Displays
S P E C T R A C O M
IPSync™
Displays
Wireless Mesh Time Network
(For Multiple Display Clock Systems)
S P E C T R A C O M
S P E C T R A C O M
S P E C T R A C O M S P E C T R A C O M
Test
Equipment
10 MHZ
1 PPS
Fire Alarm
Event Relay
Workstations
Domain
Controller
Workstations
Domain
Controller
Radio
Network
VoIP 911 Telephony
Network
CAD
Network
Optional 3X Ethernet
(10/100/1000)
10/100 Ethernet
Legacy CAD/
Telephony
RS-232
Time & Attendance
Workstations
DatabaseServer
Building Access Control
CCTVEvent Logging
Video Surveillance
DVR
12
1
2
3
4
5
6
7
8
9
10
11
Agency Network - Main
Ethernet
Wireless Transmitter
GPS+GLONASS Antenna
GLONASS Satellites
11. HB TECHNOLOGIES: GPS: geolocalization, tracking system, Master Clock, Time synchronized,
QU'EST-CE QU'UN MASTER CLOCK? (HORLOGE MAITRE)
Les Horloges Maîtres prennent normalement un ou plusieurs signaux précis de référence de synchronisation en
entrée, puis convertir et distribuer ces références de temps à d'autres appareils pour que leurs horloges soient
presque aussi précises que l'horloge maître.
Les systèmes d'horloge Maîtres sont utilisés dans une grande variété d'applications et d'industries, notamment
l'aérospatiale et de la défense, la diffusion, la radio et les télécommunications, les systèmes de réseau, les
services financiers, les opérations d'urgence et de centres d'appels, et les soins de santé - essentiellement partout
la fiabilité des données et des signaux sont primordiaux.
Les horloges Maîtres du réseau distribuent leurs références de temps sur des réseaux locaux ou étendus. Il existe
également des solutions d'horloge de base et de haute précision qui utilisent des connexions en cuivre ou en fibre
optique pour la distribution de signaux numériques tels que IRIG, Havequick analogique précise, et timecodes
STANAG.
Les Horloges Maîtres peuvent également différer dans la source de leur référence temporelle. Il est un cas rare
pour une horloge maître soit en free-running et non synchronisé, ou au moins par rapport à une référence
externe en continu ou régulièrement. Ainsi, une caractéristique essentielle de tous les systèmes d'horloge maître
est qu'ils sont acceptés en précisant les références de synchronisation des signaux comme entrées. Le
SecureSync à système modulaire de synchronisation temps et fréquence peut accepter plus de 14 différents types
de signaux pour discipliner son horloge locale qui peut générer un nombre similaire de types de signaux pour
synchroniser d’autres appareils. En cas de perte de la référence externe (ou plus d'un pour la redondance),
l'horloge locale maintient la précision temporelle jusqu'à ce que la référence (s) soit restauré. Plusieurs options
d’horloge locale d'oscillateur sont offerts en fonction de la précision requise au cours de la période de "hold
over".
Utilisations courantes des Master clock
Les horloges maître offrent une signalisation précise et heure Légalement traçable à toutes les fonctions de
garde-temps dans un réseau.
Les horloges sont utilisées pour enregistrer les événements de secours pour améliorer les temps de réponse et de
régler les différends juridiques.
Les Systèmes de diffusion numériques comptent sur des horloges maître pour assurer la fiabilité des
transmissions sans fil en alignant la fréquence et le temps. La précision des plates-formes militaires C4ISR (radar,
satcom, simulation, guerre électronique) exige sur le calendrier précis. Les systèmes de télémesure et de test en
vol ne peuvent corréler capteur et d'autres données, si le temps est précisément synchronisé sur l'ensemble du
système. Les entreprises commerciales bénéficient opérations synchronisées de réseau pour les enregistrements
de précision, le dépannage, la sécurité, et pour permettre aux applications sensibles au temps aux niveaux
extrêmement élevés de précision.