Skip to main content

Time to Think about Time

This is a guest post by Isabella. The Millennium Bug seems like a long, distant memory, but in the late 1990s, the Y2K bug was sending fear and panic among network administrators, governments and businesses alike. Cash machines were expected to start dishing out dollars like fruit machines, high interest current accounts would empty, planes would fall from the sky and the world was going to plunge back into the dark ages, as every computer system failed. Okay, things didn’t seem to work out to be that bad. Few if any major computer meltdowns occurred, and the world moved on.

The threat of the Millennium Bug was quite simply caused by a lack of foresight by computer manufacturers and programmers. Many computer programs only bothered to store the year in two decimal places, which meant that come the year 2000, a lot of timestamps would go from 99 to 00, essentially making the computer believe it was the year 1900. The debate was never settled whether the Y2K bug was just a damp squib, propagated by a media panic, or that the threat was real and only due to the actions taken in the run up to the millennium were catastrophes averted. Whatever the truth, one thing the Millennium bug did highlight, was the critical importance of time for maintaining a stable computer network. But all too often, few people give time a second’s thought, and yet it’s perhaps the most fundamental aspect of keeping a network healthy and secure. So perhaps it’s time to look at network time and understand what is going on.


Timestamps

Time is fundamental for computer networks. Time is the only reference point a computer has to complete tasks, save data or know if something has happened, is due to happen, or shouldn’t happen at all. Start messing about with network time and all sorts of problems can occur - data gets lost, systems fail, applications refuse to start and computers crash. Computers rely on time in the form of a timestamp. This is normally the number of seconds from a particular point in time. In Unix systems, the time stamp represents the number of seconds from midnight, 1 January 1970, so the timestamp of 1322657071 represents 12:44 on 30 November 2011.

Because of the fundamental importance of time, all networks need to be synchronized. Network Time Protocol (NTP) or the Windows Time service (W32Time) are the common methods used by most networks to achieve this. These programs take the time from a master computer and spread it around the network, while continuously checking the clocks on all machines to avoid drift. But they are only effective as the time they are using as a source. Computers are lousy at keeping time. While most PCs have an onboard clock built into the motherboard, these can lose several seconds a day. Set your desktop clock on Monday and in a month’s time, you could be several minutes away from the original time source. For this reason, networks need an accurate, reliable and unfaltering source of time to function. And the only machines that can provide such an unwavering time source are atomic clocks.

Atomic Clocks

Computer networks generally use Universal Coordinated Time (UTC) this is a timescale used throughout the world and is generated by a series of global atomic clocks. Because UTC is the same everywhere, it allows computers to communicate across timezones without the problems caused by time differences. Of course, when it comes to setting your desktop clock, the timezone information is added to keep you in local time. Most computer networks hook up to a service such as time.windows.com, time.nist.gov or another online timeserver. These provide the master time that all other machines on a network feed off.

For highly secure networks, external sources of UTC time are used. Often this is done by GPS, using the signals generated by the atomic clocks onboard GPS satellites to synchronize a network. And this isn’t a bad idea. When a connection to a time service gets broken, or worse, an online timeserver gets hacked, those machines hooked up to it become incredibly vulnerable. You only have to think about the perceived chaos of the Y2K bug to realize the potential for a system meltdown if the time being fed to a network has been tampered with. And in the ever-increasing sophistication of modern day hackers, DDoS attacks to timeservers are not uncommon and can expose networks to all sorts of trouble. So perhaps it’s time to start taking time more seriously and securing your time source.


Technology Blog

Comments

Popular posts from this blog

Touch Screen Games for Windows 7

The touch screen system is a great system that can make life a lot easier. It can also bridge the gap between laptop or PC and the tablet. The

Best Free Project Management Software

Businesses in today's day and age seem to be faced with various problems, such as escalating expenses, overdue deadlines, and improper delegations of tasks, to name a few. Because of this, it would be of the utmost essence for companies to choose the perfect project management software for their business. Fortunately, there are many options in today's market that can satisfy practically any demand a business might have, regardless of how big or small it might be. Here are some of the best offerings in project management software today: 1. Asana Asana focuses mostly on improving a team's workflow. One advantage that this service has over the rest is that smaller teams can use it completely free of charge. Also, aside from all of the basic features that project management tools tend to have, Asana developers have made it possible for users to get task notifications directly in their email inboxes. Plus, Asana can be used on most tablets and mobile phones. In fact, it eve...

A Roundup of Must Have Google Resources

This is a guest post by Crystal J. Briscoe . Google have several resources available that helps those people who own their website. These resources help you in the success of the business. The Google resources could be accessed easily if you have a Google account. Once signing with the Goggle account the user would be able to use the various resources available online. 1. Resources available for free: As Google wants the people to use its resources hence these are offered free of cost. The user could enjoy their services based on the requirements. As most people uses Yahoo for email service, hence Google offered the users to sign in with a single user id and gain access to its various recourses. 2. Various Google Resources: In order to make use of the Google resources one must have the Gmail account that would help in utilizing there resources. You Gmail account would help in using different resources available easily. Just logging with your Gmail account and you will be a...

How To Maximize Real Time Communications

Voice over Internet Protocol (VoIP) and the primary rate interface (PRI) services that come with the infrastructure have given offices many different options when it comes to real time digital communications. Some of the features of these services can be integrated into an office so that problems are more quickly solved and communications become more efficient and cost-effective. These ways to maximize real time communications in the office can rely on intrinsic features of the technology or they can involve carefully chosen suites of applications that work together. Session initiation protocol (SIP) forking is a feature of many business VoIP services . SIP forking allows a single digital channel to be forwarded to multiple destinations. This can be used to send a call from a single phone to multiple other devices. If an employee is not at a particular station to answer a phone, then the signal can be forked to a cell phone or another location until the employee receives the call. Th...

How mobile monitoring apps are changing the spy world?

Parents always expect the best out of their children, and so does the employers from their employees. For instance, parents buy their kids a smartphone, and expect them to do well in their academics. Similarly, an employer issues smartphones to their employees to ensure that they excel at work, and contribute towards maximizing profits in the business. However, when expectations are not met, or if you sense that there is something inappropriate concerned to their activities or behavior, then the need to monitor their cell phones arises. In addition, if you suspect that your spouse is giving your share of time and attention to another person, you are certainly left with no option but to monitor their activities. Role of Mobile Monitoring Apps The best method to monitor on someone is through mobile monitoring applications. These apps make your task of monitoring simpler like never before. The application fulfills the spying requirements of distinct individuals accurately. It not o...

Best iPad games: see what others are playing

If you’re looking to have some mega-fun on your iPad, then you need to look for the kinds of games that have gained massive popularity. Their

5 Blogging Mistakes That Can Be Fixed Easily

This is a guest post by Crystal J. Briscoe about five common Blogging Mistakes That Can Be Fixed Easily . One of the most annoying things about reading a really good blog content is the inability to navigate the blog or change the view with ease. While most bloggers usually make certain errors while building their blogs, the following are some of the mistakes that can make your blog useless and what you can do to fix them. 1) Using Mysterious Fonts For Your Blog Contents Whereas making use of distinct fonts to design your blog logo or to create titles for your sidebars can provide your site with a unique look, they should not be used for creating blog content. Fonts that every blogger should use when developing contents for their sites are Times New Roman, Georgia and Serif. This is because these fonts are easy to read by virtually anyone. 2) Building A Compacted Content Zone First-time web developers usually make the error of stuffing their content in a small region on their...

Best way to manage all data of the computer

Data management in computers There is no denying the fact that data management has its own working importance for a common person and also to an analyst. It depends a lot on your managing skills and the level of interest in different data types. Most of the people and computer owners like to divide the data into several folders files or drives so that they can easily access the required one on very less time. Management of data in computers basically refers to arrange the data of same type in different locations in the system. It can be easily grasped into the memory and moreover, you will be tension free. Disc utilization also gets efficient and more organized. Some top benefits of mastering the art of computer data management The biggest merit of managing data is the easy and quick accessibility of the required file or folder in need. You will not waste your precious time and efforts on searching for the correct file. When you manage your data in computer, it defin...

The Emerging Revolution in Game Theory

Prison’s Dilemma has been around for quite some time. Everyone had thought that they had figured out the strategy.

Archive