Your assignment is to prepare and submit a paper on network time protocol. Therefore, computers known as primary time servers are always outfitted with the receivers then use protocols such as NTP to carry out the synchronization of clock times of computers that are connected to a network. The level of separation from the source of UTC is known as strata. Such a protocol can have stratum-0, stratum-1, stratum-2, and so on. Stratum-0 refers to the radio clock that receives the true time from a satellite navigation system or dedicated transmitter. Stratum-1 is the computer that has a direct connection to the radio clock, while stratum-2 is a computer that receives its time from stratum-1. This paper aims at discussing, with close attention to its workings. it’s past and present vulnerabilities, the impact of known exploits for the vulnerability, and provides an opinion of the longevity of the aforementioned exploits.Network time synchronization technology was first used in the year 1979 during the first public demonstration of internet services that were supposed to run over a transatlantic satellite network. In the year 1981, this technology was referred to as Internet Engineering Note. As a result, a public protocol had to be developed. The other tools that were available at that time included time and daytime protocols that were used for recording events. In the year 1988, the implementation of NTPv0 took place in both UNIX and Fuzzball (Mills, 2003). RFC 1119 was published in the year 1989 leading to the definition of NTPv2 with pseudocode that described its operation. RFC 1305 defined NTPv3 in 1992. In the subsequent years, there was the addition of new features and improvement of the algorithms leading to the publication of RFC 5905 in 2010. RFC 5905 had the specifications for NTPv4.There have been a number of security concerns regarding the use of NTP. There is much vulnerability observed in NTP implementations even before the introduction of version 4.2.8.&nbsp.