SlideShare una empresa de Scribd logo
1 de 24
SCTP
Presented by:
Sutanu Paul
CSI 13023
MTECH(IT)
TEZPUR UNIVERSITY
CONTENTS
• What is SCTP?
• Why not TCP?
• SCTP Services
-Multiple Streams
-Multihoming
-Full-Duplex Communication
-Connection-Oriented Service
-Reliable Service

•
•
•
•
•

SCTP Features
FOUR Way Hand Shake
Graceful Shutdown
Flow Control Mechanism in SCTP
Congestion Control Mechanism in SCTP
SCTP
Stream Control Transmission Protocol (SCTP) is a new
reliable, message-oriented transport-layer protocol. It
combines the best features of UDP and TCP.
• Why TCP can’t be used as a common Protocol?
TCP provides reliable data transfer and strict order-of-transmission delivery.
_ The problem of this approach is that a loss at any point in the stream
blocks the delivery of the rest of the data.
– some applications(real time data such as audio or video ) need reliable transfer
but not sequence maintenance. They suffer head-of-line (HOL) blocking.

• TCP was never designed to be multi-homed
– A multi-homed host is one that has several network cards, and can make use of
a number of IP addresses at the same time.

• TCP is relatively vulnerable to denial of service attacks.
– This kind of attacks try to make unavailable one service, by exhausting the
resources it uses. One of such well-known attacks is the so-called SYN attack.
SCTP SERVICES
•
•
•
•
•

Multiple Streams
Multihoming
Full-Duplex Communication
Connection-Oriented Service
Reliable Service
Multi-stream
SCTP allows multistream service in each connection
,which is called association in SCTP terminology. If one
of the streams is blocked, the other streams can still
• SCTP is a message-oriented,
deliver their data. The idea is similar to multiple lanes
reliable lane can be used for a different type
on a highway, eachprotocol that combines the
of traffic.

• best features of UDP and TCP.
Multihoming
The following figure depicts a typical multi-homed host
• A multi-homed host is one that has several network cards, and
can make use of a number of IP addresses at the same time.

App-3

App-2
App-1

OS
NI-1

NI-2

160.15.82.20

NI-3

10.1.61.11
161.10.8.221
Multihoming (contd)
• A TCP connection involves one source and one
destination IP address i.e. even if the sender or
receiver is a multihomed ,only one of these IP
addresses per end can be utilized during the
connection.
• An SCTP association on the other hand support
multihoming service. The sender and receiver can
define multiple IP addresses in each end for an
association
• In this fault-tolerant approach ,when one path
fails, another interface can be used for data delivery
without interruption.
SCTP Endpoint : An SCTP endpoint can be represented as a
list of SCTP transport addresses with the same port:
endpoint = [10.1.4.2, 10.1.5.3 : 80]

[161.10.8.221 : 2223]
Application-1

NI-1

NI-2

NI-3

10.1.61.11
160.15.82.20
161.10.8.221
SCTP Endpoint (contd)
• Application-1 has bound one IP address of the host
with the port 2223.
• If a new application is started Application-2, it may
legally bind [160.15.82.20 : 2223] or [10.1.61.11 :
2223] or even [160.15.82.20, 10.1.61.11 : 2223]
• The new application will NOT be able to bind the
existing SCTP Transport address that Application-1
has bound i.e.: [161.10.8.221 : 2223]
• Client and server are connected to two networks with two IP
addresses each .They can make an association ,using four
different pairs of IP address.
• However in current implementations only one pair of IP
addresses can be chosen for normal communication ;the
alternative is used if the main fails.
i.e. At present, SCTP does not allow load sharing between different
path.
Currently, it is only for fault-tolerance.
10
SCTP SERVICES(contd)
• Full-Duplex Communication: data can flow
in both the directions.
• Connection-Oriented Service: two SCTP’s
establish an association between each other.
• Reliable Service: uses acknowledgement
mechanism to check the safe and sound arrival
of data.
SCTP FEATURES
•
•
•
•

Transmission Sequence Number (TSN)
Stream Identifier (SI)
Stream Sequence Number (SSN)
Packets
The unit of data in SCTP is called data
chunk. In SCTP, a data chunk is numbered
using a TSN.

• To distinguish between different streams,
SCTP uses an SI.
To distinguish between different data
chunks belonging to the same stream,
SCTP uses SSNs.
• Data chunks are identified by three
identifiers: TSN, SI, and SSN.
• TSN is a cumulative number identifying
the association
A scenario:
Suppose that process A needs to send 11 messages to
process B in three streams, the first four in first stream,
the second three in second stream, and last four in third
stream
PACKET FORMAT
• An SCTP packet has a mandatory general
header and a set of blocks called chunks.
There are two types of chunks: control
chunks and data chunks.
Chunks
FOUR- WAY HANDSHAKE
• The client sends the first packet which contain an INIT
chunk.
• The server sends the second packet which contains an
INIT ACK chunk.
• The client sends the third packet which includes a
COOKIE ECHO chunk, this is a simple chunk that echoes
without any change to the cookie sent by the server.
• The server sends the fourth packet, which includes the
COOKIE ACK CHUNK that acknowledges the receipt of
the COOKIE ECHO chunk.
• It prevents Denial Of Service Attack .
An SCTP association: 4 way handshake
3 way handshake inTCP
A
t=0

1RTT

B
Problem in 3 way handshake :SYN
Flooding Attack in TCP
attackers
128.3.4.5
192.10.2.8

130.2.4.15

victim

SYN
228.3.14.5

SYN

190.13.4.1
221.3.5.10

SYN

Flooded!!
TCB
TCB

TCB
TCB
TCB

Unavailable, reserved resources

• There is no ACK in response to the SYN-ACK, hence connection
remains half-open
• Other genuine clients cannot open connections to the victim
• The victim is unable to provide service
Graceful Shutdown
App signals
shutdown

A

B

Shutdown
pending

Shutdown
sent

Shutdown
received

Shutdown-Ack
sent
Closed
Closed
• Framing : preserve message boundaries
• Flow Control
– SCTP uses an end-to-end window based flow and congestion
control mechanism similar to the one that is used in TCP
• Flow Control for Multi-homed Endpoints
– By default, all transmission is done to a previously selected
address from the set of destination addresses, which is called
the Primary Address.
– Retransmissions should be done on different paths, so that if
one path is overloaded, retransmissions do not affect this
path.
• Congestion Control
– The congestion control mechanisms for SCTP have been
derived from TCP Congestion Control), and been adapted
for multi-homing.
• Slow Start and Congestion Avoidance is used with
different parameters for different paths.
References
• Data Communication and Networking by
Behrouz A. Forouzan (4th edition)
• Wikipedia
THANK YOU

Más contenido relacionado

La actualidad más candente

Alternative Transport Protocols
Alternative Transport ProtocolsAlternative Transport Protocols
Alternative Transport ProtocolsPeter R. Egli
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
MultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathMultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathDiogo Mónica
 
Transport Layer Part 1
Transport Layer Part 1Transport Layer Part 1
Transport Layer Part 1Tutun Juhana
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security SolutionNishant Pawar
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...Communication Systems & Networks
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDPsangusajjan
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)maamir farooq
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)maamir farooq
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp networkHamzahMohammed4
 

La actualidad más candente (20)

Sctp
SctpSctp
Sctp
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
Alternative Transport Protocols
Alternative Transport ProtocolsAlternative Transport Protocols
Alternative Transport Protocols
 
Multipath TCP
Multipath TCPMultipath TCP
Multipath TCP
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
MultiPath TCP - The path to multipath
MultiPath TCP - The path to multipathMultiPath TCP - The path to multipath
MultiPath TCP - The path to multipath
 
Sigtran Workshop
Sigtran WorkshopSigtran Workshop
Sigtran Workshop
 
Transport Layer Part 1
Transport Layer Part 1Transport Layer Part 1
Transport Layer Part 1
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security Solution
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
 
ss7 and M3UA
ss7 and M3UAss7 and M3UA
ss7 and M3UA
 
RTP.ppt
RTP.pptRTP.ppt
RTP.ppt
 

Similar a SCTP: An Introduction to the Stream Control Transmission Protocol

Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptxpoonamsngr
 
TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxNischayBahl1
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxAlphaKoiSylvester
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP PresentationHarish Chand
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxDESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxsarosh32
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5Ramesh Babu
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxutkarshlodhi4
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9Waqas Ahmed Nawaz
 

Similar a SCTP: An Introduction to the Stream Control Transmission Protocol (20)

Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
 
Unit-4 (1).pptx
Unit-4 (1).pptxUnit-4 (1).pptx
Unit-4 (1).pptx
 
TCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptxTCP_NISCHAYBAHL.pptx
TCP_NISCHAYBAHL.pptx
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
tcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptxtcp-ippresentation-150614172243-lva1-app6892.pptx
tcp-ippresentation-150614172243-lva1-app6892.pptx
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Tcp ip presentation
Tcp ip presentationTcp ip presentation
Tcp ip presentation
 
Tcp3 wayhandshakeprocess
Tcp3 wayhandshakeprocessTcp3 wayhandshakeprocess
Tcp3 wayhandshakeprocess
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Tcp
TcpTcp
Tcp
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
Transport layer.pptx
Transport layer.pptxTransport layer.pptx
Transport layer.pptx
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

SCTP: An Introduction to the Stream Control Transmission Protocol

  • 1. SCTP Presented by: Sutanu Paul CSI 13023 MTECH(IT) TEZPUR UNIVERSITY
  • 2. CONTENTS • What is SCTP? • Why not TCP? • SCTP Services -Multiple Streams -Multihoming -Full-Duplex Communication -Connection-Oriented Service -Reliable Service • • • • • SCTP Features FOUR Way Hand Shake Graceful Shutdown Flow Control Mechanism in SCTP Congestion Control Mechanism in SCTP
  • 3. SCTP Stream Control Transmission Protocol (SCTP) is a new reliable, message-oriented transport-layer protocol. It combines the best features of UDP and TCP. • Why TCP can’t be used as a common Protocol? TCP provides reliable data transfer and strict order-of-transmission delivery. _ The problem of this approach is that a loss at any point in the stream blocks the delivery of the rest of the data. – some applications(real time data such as audio or video ) need reliable transfer but not sequence maintenance. They suffer head-of-line (HOL) blocking. • TCP was never designed to be multi-homed – A multi-homed host is one that has several network cards, and can make use of a number of IP addresses at the same time. • TCP is relatively vulnerable to denial of service attacks. – This kind of attacks try to make unavailable one service, by exhausting the resources it uses. One of such well-known attacks is the so-called SYN attack.
  • 4. SCTP SERVICES • • • • • Multiple Streams Multihoming Full-Duplex Communication Connection-Oriented Service Reliable Service
  • 5. Multi-stream SCTP allows multistream service in each connection ,which is called association in SCTP terminology. If one of the streams is blocked, the other streams can still • SCTP is a message-oriented, deliver their data. The idea is similar to multiple lanes reliable lane can be used for a different type on a highway, eachprotocol that combines the of traffic. • best features of UDP and TCP.
  • 6. Multihoming The following figure depicts a typical multi-homed host • A multi-homed host is one that has several network cards, and can make use of a number of IP addresses at the same time. App-3 App-2 App-1 OS NI-1 NI-2 160.15.82.20 NI-3 10.1.61.11 161.10.8.221
  • 7. Multihoming (contd) • A TCP connection involves one source and one destination IP address i.e. even if the sender or receiver is a multihomed ,only one of these IP addresses per end can be utilized during the connection. • An SCTP association on the other hand support multihoming service. The sender and receiver can define multiple IP addresses in each end for an association • In this fault-tolerant approach ,when one path fails, another interface can be used for data delivery without interruption.
  • 8. SCTP Endpoint : An SCTP endpoint can be represented as a list of SCTP transport addresses with the same port: endpoint = [10.1.4.2, 10.1.5.3 : 80] [161.10.8.221 : 2223] Application-1 NI-1 NI-2 NI-3 10.1.61.11 160.15.82.20 161.10.8.221
  • 9. SCTP Endpoint (contd) • Application-1 has bound one IP address of the host with the port 2223. • If a new application is started Application-2, it may legally bind [160.15.82.20 : 2223] or [10.1.61.11 : 2223] or even [160.15.82.20, 10.1.61.11 : 2223] • The new application will NOT be able to bind the existing SCTP Transport address that Application-1 has bound i.e.: [161.10.8.221 : 2223]
  • 10. • Client and server are connected to two networks with two IP addresses each .They can make an association ,using four different pairs of IP address. • However in current implementations only one pair of IP addresses can be chosen for normal communication ;the alternative is used if the main fails. i.e. At present, SCTP does not allow load sharing between different path. Currently, it is only for fault-tolerance. 10
  • 11. SCTP SERVICES(contd) • Full-Duplex Communication: data can flow in both the directions. • Connection-Oriented Service: two SCTP’s establish an association between each other. • Reliable Service: uses acknowledgement mechanism to check the safe and sound arrival of data.
  • 12. SCTP FEATURES • • • • Transmission Sequence Number (TSN) Stream Identifier (SI) Stream Sequence Number (SSN) Packets
  • 13. The unit of data in SCTP is called data chunk. In SCTP, a data chunk is numbered using a TSN. • To distinguish between different streams, SCTP uses an SI. To distinguish between different data chunks belonging to the same stream, SCTP uses SSNs. • Data chunks are identified by three identifiers: TSN, SI, and SSN. • TSN is a cumulative number identifying the association
  • 14. A scenario: Suppose that process A needs to send 11 messages to process B in three streams, the first four in first stream, the second three in second stream, and last four in third stream
  • 15. PACKET FORMAT • An SCTP packet has a mandatory general header and a set of blocks called chunks. There are two types of chunks: control chunks and data chunks.
  • 17. FOUR- WAY HANDSHAKE • The client sends the first packet which contain an INIT chunk. • The server sends the second packet which contains an INIT ACK chunk. • The client sends the third packet which includes a COOKIE ECHO chunk, this is a simple chunk that echoes without any change to the cookie sent by the server. • The server sends the fourth packet, which includes the COOKIE ACK CHUNK that acknowledges the receipt of the COOKIE ECHO chunk. • It prevents Denial Of Service Attack .
  • 18. An SCTP association: 4 way handshake
  • 19. 3 way handshake inTCP A t=0 1RTT B
  • 20. Problem in 3 way handshake :SYN Flooding Attack in TCP attackers 128.3.4.5 192.10.2.8 130.2.4.15 victim SYN 228.3.14.5 SYN 190.13.4.1 221.3.5.10 SYN Flooded!! TCB TCB TCB TCB TCB Unavailable, reserved resources • There is no ACK in response to the SYN-ACK, hence connection remains half-open • Other genuine clients cannot open connections to the victim • The victim is unable to provide service
  • 22. • Framing : preserve message boundaries • Flow Control – SCTP uses an end-to-end window based flow and congestion control mechanism similar to the one that is used in TCP • Flow Control for Multi-homed Endpoints – By default, all transmission is done to a previously selected address from the set of destination addresses, which is called the Primary Address. – Retransmissions should be done on different paths, so that if one path is overloaded, retransmissions do not affect this path. • Congestion Control – The congestion control mechanisms for SCTP have been derived from TCP Congestion Control), and been adapted for multi-homing. • Slow Start and Congestion Avoidance is used with different parameters for different paths.
  • 23. References • Data Communication and Networking by Behrouz A. Forouzan (4th edition) • Wikipedia