✘sys_fuzz * ntp_random()
Gary E. Miller
gem at rellim.com
Tue Jan 24 20:29:16 UTC 2017
Yo All!
Last week we had a discussion on sys_fuzz and the value of adding
random noise to some measurements. The code defi2nes sys_fuzz asL
"* The sys_fuzz variable measures the minimum time to read the system
* clock, regardless of its precision."
Rondomness of half the sys_fuzz is then added to some values, like this:
fuzz = ntp_random() * 2. / FRAC * sys_fuzz
Makes no sense to me. Adding randomness helps when you have hysteresis,
stiction, friction, lash and some other things, but none of those apply
to NTP.
So I took two identical RasPi's and forced sys_fuzz to zero on one of
them. Four days later I can see no difference in the results from
those two.
Can anyone find a case were adding the randomness can be proved to help?
We already have all the guesses we need, anyone have any data?
Otherwise sys_fuzz * ntp_random() is more poinltess noise in the code we
can rip out.
RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
gem at rellim.com Tel:+1 541 382 8588
Veritas liberabit vos. -- Quid est veritas?
"If you can’t measure it, you can’t improve it." - Lord Kelvin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20170124/c2b84e0c/attachment.bin>
More information about the devel
mailing list