HomeDocs-Technical WhitePaper20-EFT.WP.Metrology.TimeBase v1.0

Appendix B — Contract Library & Strategy Cards (C50 Full Set)


One-line objective: Provide executable C50-* contracts and strategy card templates for time-base metrology & synchronization, so that offset / skew / jitter, the Allan family, dual-form arrival time, and distributed synchronization are measurable, alertable, and rollbackable in production.


I. Purpose & Scope


II. Evaluation Semantics & Rule Grammar

  1. Rule primitives
    • metric ⊲⊳ threshold within Δt using agg, where agg ∈ {mean, p95, p99, max} and ⊲⊳ ∈ {≤, ≥, ∈}.
    • Composition: AND / OR / k-of-n, with graded severities sev ∈ {warn, major, critical}.
  2. Statistical windows
    Δt = [t0, t1] rolling or tumbling windows; sequential scenarios may attach an alpha_spending budget.
  3. Uncertainty disclosure
    If a rule depends on an estimator x_hat, publish U = k * u_c with coverage confidence or posterior quantiles.
  4. Units & dimensions
    Every rule must declare unit(metric) and dim(metric) and pass check_dim(metric - threshold).

III. Base Contract Cluster C50-1x (Time Bases & Timestamps)

  1. C50-11 Monotonic Base
    • Rule: non_decreasing(tau_mono); any violation → data rejected.
    • Action: tag segment m=1, quarantine the batch.
  2. C50-12 ts Publication Slope
    Rule: d ts / d tau_mono ∈ [1 - tol_skew_pub, 1 + tol_skew_pub] within Δt using max; default tol_skew_pub = 5 ppm.
  3. C50-13 Timestamp Chain Budget
    • Rule: latency_chain.p99 ≤ budget_chain.p99 and per-segment phy/mac/stack/app stay under plan.
    • Cross-ref: Ch. 4 and I50-41/42.
  4. C50-14 Units & Dimensions
    Rule: check_dim(all) = pass before publication.

IV. Sync & Servo Contracts C50-2x (NTP/PTP/SyncE)

  1. C50-21 PTP Lock Stability
    • Rule: offset.p95 ≤ tol_offset_p95 AND J.p99 ≤ tol_J_p99 within Δt; defaults tol_offset_p95 = 200 ns, tol_J_p99 = 1 μs (profile dependent).
    • Depends on I50-51/55/56.
  2. C50-22 BMCA Uniqueness
    • Rule: count(role == GM) = 1 within Δt; if >1 → critical.
    • Action: run failover_policy and append audit_log.
  3. C50-23 NTP Frequency Compliance
    Rule: |skew|.mean ≤ tol_skew_ntp within Δt and slew_rate ≤ max_slew; defaults tol_skew_ntp = 100 ppm, max_slew = 50 ns/s.
  4. C50-24 Holdover Budget
    Rule: holdover_time ≤ holdover_budget ∧ offset.p95 ≤ tol_offset_holdover; breach → degrade, rate-limit, or switch to secondary ref.
  5. C50-25 Leap Smear Consistency
    Rule: within the leap window |Δts_step| = 0 ∧ smear_profile == policy; breach → major and configuration rollback.

V. Allan Family & Noise Contracts C50-3x


VI. Arrival-Time & Path Contracts C50-4x


VII. Buffering, Resampling & Conversion Contracts C50-5x


VIII. Distributed & Failover Contracts C50-6x


IX. Audit, SLO & Compliance Templates C50-7x


X. Strategy Card Template (Instantiable)

  1. Template fields: name, scope, triggers, metrics, thresholds, window Δt, actions, fallbacks, rollback, owner, TraceID.
  2. Execution flow
    • Detect: evaluate relevant C50-* rules.
    • Decide: route by severity warn/major/critical.
    • Act: throttle, reparent_to_GM, enter_holdover, enable_smear, quarantine, degrade_service.
    • Audit: append audit_log and signature.
    • Rollback: auto-revert when conditions meet or require human approval.
  3. Example A — PTP Lock Loss Recovery
    • Trigger: C50-21 breaches major+ for 3 consecutive windows.
    • Action: enter holdover, run failover_policy, degrade sync; start I50-55 servo_kalman for robust filtering.
  4. Example B — Dual-Form Arrival Breach
    • Trigger: C50-41 violation.
    • Action: pause T_arr publication, roll back to the previous mapping, trigger path recalibration, replay windows post-recovery and supplement audit.
  5. Example C — Reference-Tree Rebuild
    • Trigger: C50-61 or C50-62 violation.
    • Action: minimal-disturbance re-rooting; limit switch frequency ≤ 1 / T_min_switch; enable traffic_shift on edge zones.

XI. Contract Packs & Tiers

  1. Tiers
    • Gold: enable C50-21/22/24/31/32/41/61/63/71/72 with tight thresholds.
    • Silver: core rules enabled, thresholds relaxed ×1.5.
    • Bronze: essentials + audit-only, thresholds relaxed ×2.
  2. Composition
    Within a tier, apply k-of-n tolerance (default k = n - 1); cross-tier downgrades are forbidden for releases.

XII. Integration & Persistence Keys

  1. Manifest mapping
    • manifest.time.contracts = { id, rule, window, result, severity, action, ts, signature }.
    • Panel fields map to TS.sli.* and align with report.slo.
  2. Cross-references
    Ch. 5 (servos), Ch. 7 (Allan metrics), Ch. 9 (arrival paths), Ch. 14 (SLO dashboards).

Summary

is a mandatory check.dual-form T_arr with delta_form checks and signed persistence prior to release; unit/dim/U, with published on ts and computed on tau_mono contract family and strategy-card templates spanning from single-host time bases to distributed graph synchronization. Every contract is C50-*This appendix defines the

Copyright & License (CC BY 4.0)

Copyright: Unless otherwise noted, the copyright of “Energy Filament Theory” (text, charts, illustrations, symbols, and formulas) belongs to the author “Guanglin Tu”.
License: This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0). You may copy, redistribute, excerpt, adapt, and share for commercial or non‑commercial purposes with proper attribution.
Suggested attribution: Author: “Guanglin Tu”; Work: “Energy Filament Theory”; Source: energyfilament.org; License: CC BY 4.0.

First published: 2025-11-11|Current version:v5.1
License link:https://creativecommons.org/licenses/by/4.0/