How might the clocks in two computers that are linked by a local network be synchronized without reference to an external time source? What factors limit the accuracy of the procedure you have described? How could the clocks in a large number of computers connected by the Internet be synchronized? Discuss the accuracy of that procedure.

What will be an ideal response?


Several time synchronization protocols are described in Section 10.3. One of these is Cristian’s protocol.
Briefly, the round trip time t to send a message and a reply between computer A and computer B is measured
by repeated tests; then computer A sends its clock setting T to computer B. B sets its clock to T+t/2. The setting
can be refined by repetition. The procedure is subject to inaccuracy because of contention for the use of the
local network from other computers and delays in the processing the messages in the operating systems of A
and B. For a local network, the accuracy is probably within 1 ms.
For a large number of computers, one computer should be nominated to act as the time server and it
should carry out Cristian’s protocol with all of them. The protocol can be initiated by each in turn. Additional
inaccuracies arise in the Internet because messages are delayed as they pass through switches in wider area
networks. For a wide area network the accuracy is probably within 5-10 ms. These answers do not take into
account the need for fault-tolerance. See Chapter 10 for further details.

Computer Science & Information Technology

You might also like to view...

Cost estimates are inherently risky, irrespective of the estimation technique used. Suggest four ways in which the risk in a cost estimate can be reduced.

What will be an ideal response?

Computer Science & Information Technology

If a user knows that he/she frequently downloads files from a certain site and that the site is trustworthy, he/she might add the site's address to a list of ________

A) secure pages B) non-trusted sites C) trusted sites D) private pages

Computer Science & Information Technology

Match the following dates with its historical highlight

I. 1987 II. 1995 III. 1999 IV. 2004 V. 2010 A. iPhone OS becomes iOS B. McAfee is founded C. Mac OS 9 is released D. Ubuntu Linux is released E. Windows 95 is released

Computer Science & Information Technology

The connection of an event to its resulting actions is known by what term?

A. event wiring B. event triggering C. event watching D. event connecting

Computer Science & Information Technology