SlideShare une entreprise Scribd logo
1  sur  24
SCTP
Presented by:
Sutanu Paul
CSI 13023
MTECH(IT)
TEZPUR UNIVERSITY
CONTENTS
• What is SCTP?
• Why not TCP?
• SCTP Services
-Multiple Streams
-Multihoming
-Full-Duplex Communication
-Connection-Oriented Service
-Reliable Service

•
•
•
•
•

SCTP Features
FOUR Way Hand Shake
Graceful Shutdown
Flow Control Mechanism in SCTP
Congestion Control Mechanism in SCTP
SCTP
Stream Control Transmission Protocol (SCTP) is a new
reliable, message-oriented transport-layer protocol. It
combines the best features of UDP and TCP.
• Why TCP can’t be used as a common Protocol?
TCP provides reliable data transfer and strict order-of-transmission delivery.
_ The problem of this approach is that a loss at any point in the stream
blocks the delivery of the rest of the data.
– some applications(real time data such as audio or video ) need reliable transfer
but not sequence maintenance. They suffer head-of-line (HOL) blocking.

• TCP was never designed to be multi-homed
– A multi-homed host is one that has several network cards, and can make use of
a number of IP addresses at the same time.

• TCP is relatively vulnerable to denial of service attacks.
– This kind of attacks try to make unavailable one service, by exhausting the
resources it uses. One of such well-known attacks is the so-called SYN attack.
SCTP SERVICES
•
•
•
•
•

Multiple Streams
Multihoming
Full-Duplex Communication
Connection-Oriented Service
Reliable Service
Multi-stream
SCTP allows multistream service in each connection
,which is called association in SCTP terminology. If one
of the streams is blocked, the other streams can still
• SCTP is a message-oriented,
deliver their data. The idea is similar to multiple lanes
reliable lane can be used for a different type
on a highway, eachprotocol that combines the
of traffic.

• best features of UDP and TCP.
Multihoming
The following figure depicts a typical multi-homed host
• A multi-homed host is one that has several network cards, and
can make use of a number of IP addresses at the same time.

App-3

App-2
App-1

OS
NI-1

NI-2

160.15.82.20

NI-3

10.1.61.11
161.10.8.221
Multihoming (contd)
• A TCP connection involves one source and one
destination IP address i.e. even if the sender or
receiver is a multihomed ,only one of these IP
addresses per end can be utilized during the
connection.
• An SCTP association on the other hand support
multihoming service. The sender and receiver can
define multiple IP addresses in each end for an
association
• In this fault-tolerant approach ,when one path
fails, another interface can be used for data delivery
without interruption.
SCTP Endpoint : An SCTP endpoint can be represented as a
list of SCTP transport addresses with the same port:
endpoint = [10.1.4.2, 10.1.5.3 : 80]

[161.10.8.221 : 2223]
Application-1

NI-1

NI-2

NI-3

10.1.61.11
160.15.82.20
161.10.8.221
SCTP Endpoint (contd)
• Application-1 has bound one IP address of the host
with the port 2223.
• If a new application is started Application-2, it may
legally bind [160.15.82.20 : 2223] or [10.1.61.11 :
2223] or even [160.15.82.20, 10.1.61.11 : 2223]
• The new application will NOT be able to bind the
existing SCTP Transport address that Application-1
has bound i.e.: [161.10.8.221 : 2223]
• Client and server are connected to two networks with two IP
addresses each .They can make an association ,using four
different pairs of IP address.
• However in current implementations only one pair of IP
addresses can be chosen for normal communication ;the
alternative is used if the main fails.
i.e. At present, SCTP does not allow load sharing between different
path.
Currently, it is only for fault-tolerance.
10
SCTP SERVICES(contd)
• Full-Duplex Communication: data can flow
in both the directions.
• Connection-Oriented Service: two SCTP’s
establish an association between each other.
• Reliable Service: uses acknowledgement
mechanism to check the safe and sound arrival
of data.
SCTP FEATURES
•
•
•
•

Transmission Sequence Number (TSN)
Stream Identifier (SI)
Stream Sequence Number (SSN)
Packets
The unit of data in SCTP is called data
chunk. In SCTP, a data chunk is numbered
using a TSN.

• To distinguish between different streams,
SCTP uses an SI.
To distinguish between different data
chunks belonging to the same stream,
SCTP uses SSNs.
• Data chunks are identified by three
identifiers: TSN, SI, and SSN.
• TSN is a cumulative number identifying
the association
A scenario:
Suppose that process A needs to send 11 messages to
process B in three streams, the first four in first stream,
the second three in second stream, and last four in third
stream
PACKET FORMAT
• An SCTP packet has a mandatory general
header and a set of blocks called chunks.
There are two types of chunks: control
chunks and data chunks.
Chunks
FOUR- WAY HANDSHAKE
• The client sends the first packet which contain an INIT
chunk.
• The server sends the second packet which contains an
INIT ACK chunk.
• The client sends the third packet which includes a
COOKIE ECHO chunk, this is a simple chunk that echoes
without any change to the cookie sent by the server.
• The server sends the fourth packet, which includes the
COOKIE ACK CHUNK that acknowledges the receipt of
the COOKIE ECHO chunk.
• It prevents Denial Of Service Attack .
An SCTP association: 4 way handshake
3 way handshake inTCP
A
t=0

1RTT

B
Problem in 3 way handshake :SYN
Flooding Attack in TCP
attackers
128.3.4.5
192.10.2.8

130.2.4.15

victim

SYN
228.3.14.5

SYN

190.13.4.1
221.3.5.10

SYN

Flooded!!
TCB
TCB

TCB
TCB
TCB

Unavailable, reserved resources

• There is no ACK in response to the SYN-ACK, hence connection
remains half-open
• Other genuine clients cannot open connections to the victim
• The victim is unable to provide service
Graceful Shutdown
App signals
shutdown

A

B

Shutdown
pending

Shutdown
sent

Shutdown
received

Shutdown-Ack
sent
Closed
Closed
• Framing : preserve message boundaries
• Flow Control
– SCTP uses an end-to-end window based flow and congestion
control mechanism similar to the one that is used in TCP
• Flow Control for Multi-homed Endpoints
– By default, all transmission is done to a previously selected
address from the set of destination addresses, which is called
the Primary Address.
– Retransmissions should be done on different paths, so that if
one path is overloaded, retransmissions do not affect this
path.
• Congestion Control
– The congestion control mechanisms for SCTP have been
derived from TCP Congestion Control), and been adapted
for multi-homing.
• Slow Start and Congestion Avoidance is used with
different parameters for different paths.
References
• Data Communication and Networking by
Behrouz A. Forouzan (4th edition)
• Wikipedia
THANK YOU

Contenu connexe

Tendances

Alternative Transport Protocols
Alternative Transport ProtocolsAlternative Transport Protocols
Alternative Transport ProtocolsPeter R. Egli
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
MultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathMultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathDiogo Mónica
 
Transport Layer Part 1
Transport Layer Part 1Transport Layer Part 1
Transport Layer Part 1Tutun Juhana
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security SolutionNishant Pawar
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...Communication Systems & Networks
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDPsangusajjan
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)maamir farooq
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)maamir farooq
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp networkHamzahMohammed4
 

Tendances (20)

Sctp
SctpSctp
Sctp
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
Alternative Transport Protocols
Alternative Transport ProtocolsAlternative Transport Protocols
Alternative Transport Protocols
 
Multipath TCP
Multipath TCPMultipath TCP
Multipath TCP
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
MultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathMultiPath TCP - The path to multipath
MultiPath TCP - The path to multipath
 
Sigtran Workshop
Sigtran WorkshopSigtran Workshop
Sigtran Workshop
 
Transport Layer Part 1
Transport Layer Part 1Transport Layer Part 1
Transport Layer Part 1
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security Solution
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
 
ss7 and M3UA
ss7 and M3UAss7 and M3UA
ss7 and M3UA
 
RTP.ppt
RTP.pptRTP.ppt
RTP.ppt
 

Similaire à SCTP: An Introduction to the Stream Control Transmission Protocol

Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptxpoonamsngr
 
TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxNischayBahl1
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxAlphaKoiSylvester
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP PresentationHarish Chand
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxsarosh32
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5Ramesh Babu
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxutkarshlodhi4
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9Waqas Ahmed Nawaz
 

Similaire à SCTP: An Introduction to the Stream Control Transmission Protocol (20)

Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
 
TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptx
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptx
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Tcp ip presentation
Tcp ip presentationTcp ip presentation
Tcp ip presentation
 
Tcp3 wayhandshakeprocess
Tcp3 wayhandshakeprocessTcp3 wayhandshakeprocess
Tcp3 wayhandshakeprocess
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Tcp
TcpTcp
Tcp
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

SCTP: An Introduction to the Stream Control Transmission Protocol

  • 1. SCTP Presented by: Sutanu Paul CSI 13023 MTECH(IT) TEZPUR UNIVERSITY
  • 2. CONTENTS • What is SCTP? • Why not TCP? • SCTP Services -Multiple Streams -Multihoming -Full-Duplex Communication -Connection-Oriented Service -Reliable Service • • • • • SCTP Features FOUR Way Hand Shake Graceful Shutdown Flow Control Mechanism in SCTP Congestion Control Mechanism in SCTP
  • 3. SCTP Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport-layer protocol. It combines the best features of UDP and TCP. • Why TCP can’t be used as a common Protocol? TCP provides reliable data transfer and strict order-of-transmission delivery. _ The problem of this approach is that a loss at any point in the stream blocks the delivery of the rest of the data. – some applications(real time data such as audio or video ) need reliable transfer but not sequence maintenance. They suffer head-of-line (HOL) blocking. • TCP was never designed to be multi-homed – A multi-homed host is one that has several network cards, and can make use of a number of IP addresses at the same time. • TCP is relatively vulnerable to denial of service attacks. – This kind of attacks try to make unavailable one service, by exhausting the resources it uses. One of such well-known attacks is the so-called SYN attack.
  • 4. SCTP SERVICES • • • • • Multiple Streams Multihoming Full-Duplex Communication Connection-Oriented Service Reliable Service
  • 5. Multi-stream SCTP allows multistream service in each connection ,which is called association in SCTP terminology. If one of the streams is blocked, the other streams can still • SCTP is a message-oriented, deliver their data. The idea is similar to multiple lanes reliable lane can be used for a different type on a highway, eachprotocol that combines the of traffic. • best features of UDP and TCP.
  • 6. Multihoming The following figure depicts a typical multi-homed host • A multi-homed host is one that has several network cards, and can make use of a number of IP addresses at the same time. App-3 App-2 App-1 OS NI-1 NI-2 160.15.82.20 NI-3 10.1.61.11 161.10.8.221
  • 7. Multihoming (contd) • A TCP connection involves one source and one destination IP address i.e. even if the sender or receiver is a multihomed ,only one of these IP addresses per end can be utilized during the connection. • An SCTP association on the other hand support multihoming service. The sender and receiver can define multiple IP addresses in each end for an association • In this fault-tolerant approach ,when one path fails, another interface can be used for data delivery without interruption.
  • 8. SCTP Endpoint : An SCTP endpoint can be represented as a list of SCTP transport addresses with the same port: endpoint = [10.1.4.2, 10.1.5.3 : 80] [161.10.8.221 : 2223] Application-1 NI-1 NI-2 NI-3 10.1.61.11 160.15.82.20 161.10.8.221
  • 9. SCTP Endpoint (contd) • Application-1 has bound one IP address of the host with the port 2223. • If a new application is started Application-2, it may legally bind [160.15.82.20 : 2223] or [10.1.61.11 : 2223] or even [160.15.82.20, 10.1.61.11 : 2223] • The new application will NOT be able to bind the existing SCTP Transport address that Application-1 has bound i.e.: [161.10.8.221 : 2223]
  • 10. • Client and server are connected to two networks with two IP addresses each .They can make an association ,using four different pairs of IP address. • However in current implementations only one pair of IP addresses can be chosen for normal communication ;the alternative is used if the main fails. i.e. At present, SCTP does not allow load sharing between different path. Currently, it is only for fault-tolerance. 10
  • 11. SCTP SERVICES(contd) • Full-Duplex Communication: data can flow in both the directions. • Connection-Oriented Service: two SCTP’s establish an association between each other. • Reliable Service: uses acknowledgement mechanism to check the safe and sound arrival of data.
  • 12. SCTP FEATURES • • • • Transmission Sequence Number (TSN) Stream Identifier (SI) Stream Sequence Number (SSN) Packets
  • 13. The unit of data in SCTP is called data chunk. In SCTP, a data chunk is numbered using a TSN. • To distinguish between different streams, SCTP uses an SI. To distinguish between different data chunks belonging to the same stream, SCTP uses SSNs. • Data chunks are identified by three identifiers: TSN, SI, and SSN. • TSN is a cumulative number identifying the association
  • 14. A scenario: Suppose that process A needs to send 11 messages to process B in three streams, the first four in first stream, the second three in second stream, and last four in third stream
  • 15. PACKET FORMAT • An SCTP packet has a mandatory general header and a set of blocks called chunks. There are two types of chunks: control chunks and data chunks.
  • 17. FOUR- WAY HANDSHAKE • The client sends the first packet which contain an INIT chunk. • The server sends the second packet which contains an INIT ACK chunk. • The client sends the third packet which includes a COOKIE ECHO chunk, this is a simple chunk that echoes without any change to the cookie sent by the server. • The server sends the fourth packet, which includes the COOKIE ACK CHUNK that acknowledges the receipt of the COOKIE ECHO chunk. • It prevents Denial Of Service Attack .
  • 18. An SCTP association: 4 way handshake
  • 19. 3 way handshake inTCP A t=0 1RTT B
  • 20. Problem in 3 way handshake :SYN Flooding Attack in TCP attackers 128.3.4.5 192.10.2.8 130.2.4.15 victim SYN 228.3.14.5 SYN 190.13.4.1 221.3.5.10 SYN Flooded!! TCB TCB TCB TCB TCB Unavailable, reserved resources • There is no ACK in response to the SYN-ACK, hence connection remains half-open • Other genuine clients cannot open connections to the victim • The victim is unable to provide service
  • 22. • Framing : preserve message boundaries • Flow Control – SCTP uses an end-to-end window based flow and congestion control mechanism similar to the one that is used in TCP • Flow Control for Multi-homed Endpoints – By default, all transmission is done to a previously selected address from the set of destination addresses, which is called the Primary Address. – Retransmissions should be done on different paths, so that if one path is overloaded, retransmissions do not affect this path. • Congestion Control – The congestion control mechanisms for SCTP have been derived from TCP Congestion Control), and been adapted for multi-homing. • Slow Start and Congestion Avoidance is used with different parameters for different paths.
  • 23. References • Data Communication and Networking by Behrouz A. Forouzan (4th edition) • Wikipedia