Network Working Group                                         A. Shpiner
Internet Draft                 Technion - Israel Institute of Technology
Intended status: Experimental                                     R. Tse
Expires: August 2014                                           C. Schelp
                                                              PMC-Sierra
                                                              T. Mizrahi
                                                                 Marvell
                                                       February 11, 2014

                      Multi-Path Time Synchronization
              draft-shpiner-multi-path-synchronization-03.txt


Abstract

   Clock synchronization protocols are very widely used in IP-based
   networks. The Network Time Protocol (NTP) has been commonly deployed
   for many years, and the last few years have seen an increasingly
   rapid deployment of the Precision Time Protocol (PTP). As time-
   sensitive applications evolve, clock accuracy requirements are
   becoming increasingly stringent, requiring the time synchronization
   protocols to provide high accuracy. Slave Diversity is a recently
   introduced approach, where the master and slave clocks (also known as
   server and client) are connected through multiple network paths, and
   the slave combines the information received through all paths to
   obtain a higher clock accuracy compared to the conventional one-path
   approach.  This document describes a multi-path approach to PTP and
   NTP over IP networks, allowing the protocols to run concurrently over
   multiple communication paths between the master and slave clocks. The
   multi-path approach can significantly contribute to clock accuracy,
   security and fault protection. The Multi-Path Precision Time Protocol
   (MPPTP) and Multi-Path Network Time Protocol (MPNTP) define an
   additional layer that extends the existing PTP and NTP without the
   need to modify these protocols. MPPTP and MPNTP also allow backward
   compatibility with nodes that do not support the multi-path
   extension.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.





Shpiner, et al.        Expires August 11, 2014                [Page 1]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 11, 2014.

Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1. Introduction ................................................. 3
   2. Conventions Used in this Document ............................ 5
      2.1. Abbreviations ........................................... 5
      2.2. Terminology ............................................. 5
   3. Multiple Paths in IP Networks ................................ 5
      3.1. Load Balancing .......................................... 5
      3.2. Using Multiple Paths Concurrently ....................... 5
      3.3. Two-Way Paths ........................................... 6
   4. Solution Overview ............................................ 6
      4.1. Path Configuration and Identification ................... 6
      4.2. Combining ............................................... 7
   5. Multi-Path Time Synchronization Protocols over IP Networks ... 7
      5.1. Single-Ended Multi-Path Synchronization ................. 8
         5.1.1. Single-Ended MPPTP Synchronization Message Exchange  8
         5.1.2. Single-Ended MPNTP Synchronization Message Exchange  9
      5.2. Dual-Ended Multi-Path Synchronization .................. 10
         5.2.1. Dual-Ended MPPTP Synchronization Message Exchange . 10


Shpiner, et al.        Expires August 11, 2014                [Page 2]


Internet-Draft     Multi-Path Time Synchronization       February 2014


         5.2.2. Dual-Ended MPNTP Synchronization Message Exchange . 11
      5.3. Using Traceroute for Path Discovery .................... 12
      5.4. Using Unicast Discovery for MPPTP ...................... 12
   6. Combining Algorithm ......................................... 13
      6.1. Averaging .............................................. 13
      6.2. Switching / Dynamic Algorithm .......................... 13
      6.3. NTP-like Filtering-Clustering-Combining Algorithm ...... 13
   7. Security Considerations ..................................... 14
   8. IANA Considerations ......................................... 14
   9. Acknowledgments ............................................. 14
   10. References ................................................. 14
      10.1. Normative References .................................. 14
      10.2. Informative References ................................ 15


1. Introduction

   The two most common time synchronization protocols in IP networks are
   the Network Time Protocol [NTP], and the Precision Time Protocol
   (PTP), defined in the IEEE 1588 standard [IEEE1588].
   The accuracy of the time synchronization protocols directly depends
   on the stability and the symmetry of propagation delays on both
   directions between the master and slave clocks. Depending on the
   nature of the underlying network, time synchronization protocol
   packets can be subject to variable network latency or path asymmetry
   (e.g. [ASSYMETRY], [ASSYMETRY2]). As time sensitive applications
   evolve, accuracy requirements are becoming increasingly stringent.

   Using a single network path in a clock synchronization protocol
   closely ties the slave clock accuracy to the behavior of the specific
   path, which may suffer from temporal congestion, faults or malicious
   attacks. Relying on multiple clock servers as in NTP solves these
   problems, but requires active maintenance of multiple accurate
   sources in the network, which is not always possible. The usage of
   Transparent Clocks (TC) in PTP solves the congestion problem by
   eliminating the queueing time from the delay calculations, but
   requires the intermediate routers and switches to support the TC
   functionality, which is not always the case.










Shpiner, et al.        Expires August 11, 2014                [Page 3]


Internet-Draft     Multi-Path Time Synchronization       February 2014


                                  ____
                           ______/    \_____
                       ___/                 \____
                  ____/                          \
      ____       /           path 1              /           ___
     /    \     /    ________________________    \          /   \
    /Master\____\___/                        \____\________/Slave\
    \Clock /    /   \________ _______________/     \       \Clock/
     \____/     \                                  /        \__ /
                 \____       path 2             __/
                      \_______           ______/
                              \_________/


                      Figure 1 Multi-Path Connection

   Since master and slave clocks are often connected through more than
   one path in the network, as shown in Figure 1, [SLAVEDIV] suggested
   that a time synchronization protocol can be run over multiple paths,
   providing several advantages. First, it can significantly increase
   the clock accuracy as shown in [SLAVEDIV]. Second, this approach
   provides additional security, allowing mitigating man-in-the-middle
   attacks against the time synchronization protocol [DELAY-ATT]. Third,
   using multiple paths concurrently provides an inherent failure
   protection mechanism.

   This document introduces Multi-Path PTP (MPPTP) and Multi-Path NTP
   (MPNTP), respectively. These extensions are defined at the network
   layer and do not require any changes in the PTP or in the NTP
   protocols.

   MPPTP and MPNTP are defined over IP networks. As IP networks
   typically combine ECMP routing, this property is leveraged for the
   multiple paths used in MPPTP and MPNTP. The key property of the
   multi-path extension is that clocks in the network can use more than
   one IP address. Each {master IP, slave IP} address pair defines a
   path. Depending on the network topology and configuration, the IP
   combination pairs can form multiple diverse paths used by the multi-
   path synchronization protocols.

   This document introduces two variants for each of the two multi-path
   protocols; a variant that requires both master and slave nodes to
   support the multi-path protocol, referred to as the dual-ended
   variant, and a backward compatible variant that allows a multi-path



Shpiner, et al.        Expires August 11, 2014                [Page 4]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   clock to connect to a conventional single-path clock, referred to as
   the single-ended variant.

2. Conventions Used in this Document

2.1. Abbreviations

   ECMP   Equal Cost Multiple Path

   LAN    Local Area Network

   MPNTP   Multi-Path Network Time Protocol

   MPPTP   Multi-Path Precision Time Protocol

   NTP    Network Time Protocol

   PTP    Precision Time Protocol

2.2. Terminology

   In the NTP terminology, a time synchronization protocol is run
   between a client and a server, while PTP uses the terms master and
   slave. Throughout this document, the sections that refer to both PTP
   and NTP generically use the terms master and slave.

3. Multiple Paths in IP Networks

3.1. Load Balancing

   Traffic sent across IP networks is often load balanced across
   multiple paths. The load balancing decisions are typically based on
   packet header fields: source and destination addresses, Layer 4
   ports, the Flow Label field in IPv6, etc.
   Three common load balancing criteria are per-destination, per-flow
   and per-packet.  The per-destination load balancers take a load
   balancing decision based on the destination IP address. Per-flow load
   balancers use various fields in the packet header, e.g., IP addresses
   and Layer 4 ports, for the load balancing decision. Per-packet load
   balancers use flow-blind techniques such as round-robin without
   basing the choice on the packet content.

3.2. Using Multiple Paths Concurrently

   To utilize the diverse paths that traverse per-destination load-
   balancers or per-flow load-balancers, the packet transmitter can vary


Shpiner, et al.        Expires August 11, 2014                [Page 5]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   the IP addresses in the packet header. The analysis in [PARIS2] shows
   that a significant majority of the flows on the internet traverse
   per-destination or per-flow load-balancing. It presents statistics
   that 72% of the flows traverse per-destination load balancing and 39%
   of the flows traverse per-flow load-balancing, while only a
   negligible part of the flows traverse per-packet load balancing.
   These statistics show that the vast majority of the traffic on the
   internet is load balanced based on packet header fields.

   The approaches in this draft are based on varying the source and
   destination IP addresses in the packet header. Possible extensions
   have been considered that also vary the UDP ports. However some of
   the existing implementations of PTP and NTP use fixed UDP port values
   in both the source and destination UDP port fields, and thus do not
   allow this approach.

3.3. Two-Way Paths

   A key property of IP networks is that packets forwarded from A to B
   do not necessarily traverse the same path as packets from B to A.
   Thus, we define a two-way path for a master-slave connection as a
   pair of one-way paths: the first from master to slave and the second
   from slave to master.

   If possible, a traffic engineering approach can be used to verify
   that time synchronization traffic is always forwarded through
   bidirectional two-way paths, i.e., that each two-way path uses the
   same route on the forward and reverse directions, thus allowing
   propagation time symmetry. However, in the general case two-way paths
   do not necessarily use the same path for the forward and reverse
   directions.

4. Solution Overview

   The multi-path time synchronization protocols we present are
   comprised of two building blocks; one is the path configuration and
   identification, and the other is the algorithm used by the slave to
   combine the information received from the various paths.

4.1. Path Configuration and Identification

   The master and slave clocks must be able to determine the path of
   transmitted protocol packets, and to identify the path of incoming
   protocol packets. A path is determined by a {master IP, slave IP}
   address pair. The synchronization protocol message exchange is run
   independently through each path.



Shpiner, et al.        Expires August 11, 2014                [Page 6]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   Each IP address pair defines a two-way path, and thus allows the
   clocks to bind a transmitted packet to a specific path, or to
   identify the path of an incoming packet.

   If possible, the routing tables across the network should be
   configured with multiple traffic engineered paths between the pair of
   clocks. By carefully configuring the routers in such networks it is
   possible to create diverse paths for each of the IP address pairs
   between two clocks in the network. However, in public and provider
   networks the load balancing behavior is hidden from the end users. In
   this case the actual number of paths may be less than the number of
   IP address pairs, since some of the address pairs may share common
   paths.

4.2. Combining

   Various methods can be used for combining the time information
   received from the different paths. This document surveys several
   combining methods in Section 5.4. The output of the combining
   algorithm is the accurate time offset.

5. Multi-Path Time Synchronization Protocols over IP Networks

   This section presents two variants of MPPTP and MPNTP; single-ended
   multi-path time synchronization and dual-ended multi-path time
   synchronization. In the first variant, the multi-path protocol is run
   only by the slave and the master is not aware of its usage. In the
   second variant, all clocks must support the multi-path protocol.

   The dual-ended protocol provides higher path diversity by using
   multiple IP addresses at both ends, the master and slave, while the
   single-ended protocol only uses multiple addresses at the slave. On
   the other hand, the dual-ended protocol can only be deployed when
   both the master and the slave support this protocol.  Dual-ended and
   single-ended protocols can co-exist in the same network.  Each slave
   selects the connection(s) it wants to make with the available
   masters.  A dual-ended slave could switch to single-ended mode if it
   does not see any dual-ended masters available.  A single-ended slave
   could connect to a single IP address of a dual-ended master.

   Multi-path time synchronization, in both variants, requires clocks to
   use multiple IP addresses. If possible, the set of IP addresses for
   each clock should be chosen in a way that enables the establishment
   of paths that are the most different. It is applicable if the load
   balancing rules in the network are known. Using multiple IP addresses
   introduces a tradeoff. A large number of IP addresses allows a large
   number of diverse paths, providing the advantages of slave diversity


Shpiner, et al.        Expires August 11, 2014                [Page 7]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   discussed in Section 1. On the other hand, a large number of IP
   addresses is more costly, requires the network topology to be more
   redundant, and exacts extra management overhead.

   The descriptions in this section refer to the end-to-end scheme of
   PTP, but are similarly applicable to the peer-to-peer scheme. The
   MPNTP protocol described in this document refers to the NTP client-
   server mode, although the concepts described here can be extended to
   include the symmetric variant as well.

   Multi-path synchronization protocols by nature require protocol
   messages to be sent as unicast. Specifically in PTP, the following
   messages must be sent as unicast in MPPTP: Sync, Delay_Req,
   Delay_Resp, PDelay_Req, PDelay_Resp, Follow_Up, and
   PDelay_Resp_Follow_Up. Note that [IEEE1588] allows these messages to
   be sent either as multicast or as unicast.

5.1. Single-Ended Multi-Path Synchronization

   In the single-ended approach, only the slave is aware of the fact
   that multiple paths are used, while the master is agnostic to the
   usage of multiple paths. This approach allows a hybrid network, where
   some of the clocks are multi-path clocks, and others are conventional
   one-path clocks. A single-ended multi-path clock presents itself to
   the network as N independent clocks, using N IP addresses, as well as
   N clock identity values (in PTP). Thus, the usage of multiple slave
   identities by a slave clock is transparent from the master's point of
   view, such that it treats each of the identities as a separate slave
   clock.

5.1.1. Single-Ended MPPTP Synchronization Message Exchange

   The single-ended MPPTP message exchange procedure is as follows.

   o Each single-ended MPPTP clock has a fixed set of N IP addresses
      and N corresponding clockIdentities. Each clock arbitrarily
      defines one of its IP addresses and clockIdentity values as the
      clock primary identity.

   o A single-ended MPPTP port sends Announce messages only from its
      primary identity, according to the BMC algorithm.

   o The BMC algorithm at each clock determines the master, based on
      the received Announce messages.





Shpiner, et al.        Expires August 11, 2014                [Page 8]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   o A single-ended MPPTP port that is in the 'slave' state uses
      unicast negotiation to request the master to transmit unicast
      messages to each of the N slave clock identities. The slave port
      periodically sends N Signaling messages to the master, using each
      of its N identities. The Signaling message includes the
      REQUEST_UNICAST_TRANSMISSION_TLV.

   o The master periodically sends unicast Sync messages from its
      primary identity, identified by the sourcePortIdentity and IP
      address, to each of the slave identities.

   o The slave, upon receiving a Sync message, identifies its path
      according to the destination IP address. The slave sends a
      Delay_Req unicast message to the primary identity of the master.
      The Delay_Req is sent using the slave identity corresponding to
      the path the Sync was received through. Note that the rate of
      Delay_Req messages may be lower than the Sync message rate, and
      thus a Sync message is not necessarily followed by a Delay_Req.

   o The master, in response to a Delay_Req message from the slave,
      responds with a Delay_Resp message using the IP address and
      sourcePortIdentity from the Delay_Req message.

   o Upon receiving the Delay_Resp message, the slave identifies the
      path using the destination IP address and the
      requestingPortIdentity. The slave can then compute the
      corresponding path delay and the offset from the master.

   o The slave combines the information from all negotiated paths.

5.1.2. Single-Ended MPNTP Synchronization Message Exchange

   The single-ended MPNTP message exchange procedure is as follows.

   o A single-ended MPNTP client has N separate identities, i.e., N IP
      addresses. The assumption is that the server information,
      including its IP address is known to the NTP clients.

   o A single-ended MPNTP client initiates the NTP protocol with an NTP
      server N times, using each of its N identities.

   o The NTP protocol is maintained between the server and each of the
      N client identities.

   o The client sends NTP messages to the master using each of its N
      identities.



Shpiner, et al.        Expires August 11, 2014                [Page 9]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   o The server responds to the client's NTP messages using the IP
      address from the received NTP packet.

   o The client, upon receiving an NTP packet, uses the IP destination
      address to identify the path it came through, and uses the time
      information accordingly.

   o The client combines the information from all paths.

5.2. Dual-Ended Multi-Path Synchronization

   In dual-ended multi-path synchronization each clock has N IP
   addresses. Time synchronization messages are exchanged between some
   of the combinations of {master IP, slave IP} addresses, allowing
   multiple paths between the master and slave.  Note that the actual
   number of paths between the master and slave may be less than the
   number of chosen {master, slave} IP address pairs.

   Once the multiple two-way connections are established, a separate
   synchronization protocol exchange instance is run through each of
   them.

5.2.1. Dual-Ended MPPTP Synchronization Message Exchange

   The dual-ended MPPTP message exchange procedure is as follows.

   o Every clock has N IP addresses, but uses a single clockIdentity.

   o The BMC algorithm at each clock determines the master.  The master
      is identified by its clockIdentity, allowing other clocks to know
      the multiple IP addresses it uses.

   o When a clock sends an Announce message, it sends it from each of
      its IP addresses with its clockIdentity.

   o A dual-ended MPPTP port that is in the 'slave' state uses unicast
      negotiation to request the master to transmit unicast messages to
      some or all of its N_s IP addresses. This negotiation is done
      individually between a slave IP address and the corresponding
      master IP address that the slave desires a connection with.  The
      slave port periodically sends Signaling messages to the master,
      using some or all of its N_s IP addresses as source, to the
      corresponding master's N_m IP addresses. The Signaling message
      includes the REQUEST_UNICAST_TRANSMISSION_TLV.





Shpiner, et al.        Expires August 11, 2014               [Page 10]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   o The master periodically sends unicast Sync messages from each of
      its IP addresses to the corresponding slave IP addresses for which
      a unicast connection was negotiated.

   o The slave, upon receiving a Sync message, identifies its path
      according to the {source, destination} IP addresses. The slave
      sends a Delay_Req unicast message, swapping the source and
      destination IP addresses from the Sync message. Note that the rate
      of Delay_Req messages may be lower than the Sync message rate, and
      thus a Sync message is not necessarily followed by a Delay_Req.

   o The master, in response to a Delay_Req message from the slave,
      responds with a Delay_Resp message using the sourcePortIdentity
      from the Delay_Req message, and swapping the IP addresses from the
      Delay_Req.

   o Upon receiving the Delay_Resp message, the slave identifies the
      path using the {source, destination} IP address pair. The slave
      can then compute the corresponding path delay and the offset from
      the master.

   o The slave combines the information from all negotiated paths.

5.2.2. Dual-Ended MPNTP Synchronization Message Exchange

   The MPNTP message exchange procedure is as follows.

   o Each NTP clock has a set of N IP addresses. The assumption is that
      the server information, including its multiple IP addresses is
      known to the NTP clients.

   o The MPNTP client chooses N_svr of the N server IP addresses and
      N_c of the N client IP addresses and initiates the N_svr*N_c
      instances of the protocol, one for each {server IP, client IP}
      pair, allowing the client to combine the information from the
      N_s*N_c paths.
      (N_svr and N_c indicate the number of IP addresses of the server
      and client, respectively, which a client chooses to connect with)

   o The client sends NTP messages to the master using each of the
      source-destination address combinations.

   o The server responds to the client's NTP messages using the IP
      address combination from the received NTP packet.





Shpiner, et al.        Expires August 11, 2014               [Page 11]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   o Using the {source, destination} IP address pair in the received
      packets, the client identifies the path, and performs its
      computations for each of the paths accordingly.

   o The client combines the information from all paths.

5.3. Using Traceroute for Path Discovery

   The protocols presented above use multiple IP addresses in a single
   clock to create multiple paths. However, although each two-way path
   is defined by a different {master, slave} address pair, some of the
   IP address pairs may traverse exactly the same network path, making
   them redundant. Traceroute-based path discovery can be used for
   filtering only the IP addresses that obtain diverse paths. 'Paris
   Traceroute' [PARIS] and 'TraceFlow' [TRACEFLOW] are examples of tools
   that discover the paths between two points in the network.

   The Traceroute-based filtering can be implemented by both master and
   slave nodes, or it can be restricted to run only on slave nodes to
   reduce the overhead on the master.  For networks that guarantee the
   path of the timing packets in the forward and reverse direction are
   the same, path discovery should only be performed at the slave.

5.4. Using Unicast Discovery for MPPTP

   As presented above, MPPTP uses Announce messages and the BMC
   algorithm to discover the master. The unicast discovery option of PTP
   can be used as an alternative.

   When using unicast discovery the MPPTP slave ports maintain a list of
   the IP addresses of the master. The slave port uses unicast
   negotiation to request unicast service from the master, as follows:

   o In single-ended MPPTP, the slave uses unicast negotiation from
      each of its identities to the master's (only) identity.

   o In dual-ended MPPTP, the slave uses unicast negotiation from its
      IP addresses, each to a corresponding master IP address to request
      unicast synchronization messages.

   Afterwards, the message exchange continues as described in sections
   5.1.1. and 5.2.1.

   The unicast discovery option can be used in networks that do not
   support multicast or in networks in which the master clocks are known
   in advance. In particular, unicast discovery avoids multicasting
   Announce messages.


Shpiner, et al.        Expires August 11, 2014               [Page 12]


Internet-Draft     Multi-Path Time Synchronization       February 2014


6. Combining Algorithm

   Previous sections discussed the methods of creating the multiple
   paths and obtaining the time information required by the slave
   algorithm. This section discusses the algorithm used to combine this
   information into a single accurate time estimate. Note that the
   choice of the combining algorithm is local to the slave, and does not
   affect the interoperability of the protocol.
   Several combining methods are examined next.

6.1. Averaging

   In the first method the slave performs an autonomous time computation
   for each of the master-slave paths, and obtains the combined time by
   simply averaging the separate instances. This method can be further
   enhanced by adding weights to each of the paths. For example, a
   reasonable weighting choice is to use an inverse of the round-trip
   delay between the peers. Another option is to use the inverse of the
   path delay variance, which is approximately the maximum likelihood
   estimator under certain assumptions [WEIGHT-MEAN].

6.2. Switching / Dynamic Algorithm

   The switching and dynamic algorithms are presented in [SLAVEDIV]. The
   switching algorithm periodically chooses a primary path, and performs
   all time computations based on the protocol packets received through
   the primary path. The primary path is defined as the path with the
   minimal distance between the sampled delay and the average delay. The
   dynamic algorithm dynamically chooses between the result of the
   switching algorithm and the averaging.
6.3. NTP-like Filtering-Clustering-Combining Algorithm

   NTP ([NTP], [NTP2]) provides an efficient algorithm of combining
   offset samples from multiple peers. The same approach can be used in
   MPPTP and MPNTP.

   In the MPNTP, the selection and combining algorithms treat the offset
   samples from multiple paths as NTP treats samples from distinct
   peers. The rest of the selection and combining algorithms, as well as
   clock control logic is the same as in conventional NTP. In MPPTP, a
   similar approach to NTP can be adopted.

   The combining algorithm [NTP3] contains three steps: filtering,
   selection and clustering.




Shpiner, et al.        Expires August 11, 2014               [Page 13]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   In the filtering step, the best of the last n (usually n=8) samples
   of each peer is chosen. The choice criterion is the combination of a
   round trip delay estimate of the sample and the distance from the
   average offset of all n samples of a peer.

   In the selection step the peers are divided into two groups: true-
   chimers and false tickers.

   The clustering step chooses a subset of the true-chimers,  whose peer
   jitter (the variance of peer offset samples) is smaller than the
   total select jitter of all selected peer offsets (the variance of the
   best offset of the selected peers).

   The offset samples that passed through the three steps are combined
   by a weighted average into a single offset estimate. Detailed
   explanations are provided in [NTP2],[NTP3].

7. Security Considerations

   The security aspects of time synchronization protocols are discussed
   in detail in [TICTOCSEC]. The methods describe in this document
   propose to run a time synchronization protocol through redundant
   paths, and thus allow to detect and mitigate man-in-the-middle
   attacks, as described in [DELAY-ATT].

8. IANA Considerations

   There are no IANA actions required by this document.

   RFC Editor: please delete this section before publication.

9. Acknowledgments

   The authors gratefully acknowledge the useful comments provided by
   Peter Meyer and Doug Arnold, as well as other comments received from
   the TICTOC working group participants.

   This document was prepared using 2-Word-v2.0.template.dot.

10. References

10.1. Normative References

   [IEEE1588]    IEEE Instrumentation and Measurement Society, "IEEE
                 Standard for a Precision Clock Synchronization
                 Protocol for Networked Measurement and Control
                 Systems", IEEE Std 1588, 2008.


Shpiner, et al.        Expires August 11, 2014               [Page 14]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   [NTP]         D. Mills, J. Martin, J. Burbank, W. Kasch, "Network
                 Time Protocol Version 4: Protocol and Algorithms
                 Specification", IETF, RFC 5905, 2010.

10.2. Informative References

   [ASSYMETRY]   Yihua He and Michalis Faloutsos and Srikanth
                 Krishnamurthy and Bradley Huffaker, "On routing
                 asymmetry in the internet", IEEE Globecom, 2005.

   [ASSYMETRY2]  Abhinav Pathak, Himabindu Pucha, Ying Zhang, Y.
                 Charlie Hu, and Z. Morley Mao, "A measurement study of
                 internet delay asymmetry", PAM'08, 2008.

   [DELAY-ATT]   T. Mizrahi, "A Game Theoretic Analysis of Delay
                 Attacks against Time Synchronization Protocols",
                 ISPCS, 2012.

   [NTP2]        Mills, D.L., "Internet time synchronization: the
                 Network Time Protocol", IEEE Trans. Communications
                 COM-39, 10 (October 1991), 1482-1493.

   [NTP3]        Mills, D.L., "Improved algorithms for synchronizing
                 computer network clocks", IEEE/ACM Trans. Networks 3,
                 3(June 1995), 245-254.

   [PARIS]       Brice Augustin, Timur Friedman and Renata Teixeira,
                 "Measuring Load-balanced Paths in the Internet", IMC,
                 2007.

   [PARIS2]      B. Augustin, T. Friedman, and R. Teixeira, "Measuring
                 Multipath Routing in the Internet", IEEE/ACM
                 Transactions on Networking, 19(3), p. 830 - 840, June
                 2011.

   [SLAVEDIV]    T. Mizrahi, "Slave Diversity: Using Multiple Paths to
                 Improve the Accuracy of Clock Synchronization
                 Protocols", ISPCS, 2012.

   [TICTOCSEC]   T. Mizrahi, K. O'Donoghue, "Security Requirements of
                 Time Protocols in Packet Switched Networks", IETF,
                 draft-ietf-tictoc-security-requirements, work in
                 progress, 2013.

   [TRACEFLOW]   J. Narasimhan, B. V. Venkataswami, R. Groves and P.
                 Hoose, "Traceflow", IETF, draft-janapath-intarea-
                 traceflow, work in progress, 2012.


Shpiner, et al.        Expires August 11, 2014               [Page 15]


Internet-Draft     Multi-Path Time Synchronization       February 2014


   [WEIGHT-MEAN] http://en.wikipedia.org/wiki/Weighted_mean#Dealing_wi
                 th_variance



Authors' Addresses

   Alex Shpiner
   Department of Electrical Engineering
   Technion - Israel Institute of Technology
   Haifa, 32000 Israel

   Email: shalex@tx.technion.ac.il



   Richard Tse
   PMC-Sierra
   8555 Baxter Place
   Burnaby, BC
   Canada
   V5A 4V7

   Email: Richard.Tse@pmcs.com



   Craig Schelp
   PMC-Sierra
   8555 Baxter Place
   Burnaby, BC
   Canada
   V5A 4V7

   Email: craig.schelp@pmcs.com



   Tal Mizrahi
   Marvell
   6 Hamada St.
   Yokneam, 20692 Israel

   Email: talmi@marvell.com





Shpiner, et al.        Expires August 11, 2014               [Page 16]