SlideShare a Scribd company logo
Stream	
  Control	
  Transmission	
  Protocol	
  (SCTP)	
  	
  
LAILI	
  AIDI	
  
Presented	
  as	
  part	
  of	
  candidacy	
  at	
  Employer_X	
  
2	
  
Stream Control Transmission Protocol (SCTP)
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  Jakarta,	
  June	
  12,	
  2013	
  
Transport	
  layer	
  is	
  responsible	
  for	
  process-­‐to-­‐process	
  delivery.—the	
  delivery	
  of	
  
a	
  packet,	
  part	
  of	
  a	
  message,	
  from	
  one	
  process	
  to	
  another.	
  Two	
  processes	
  
communicate	
  in	
  a	
  client/server	
  relaKonship.	
  
Data	
  Delivery:	
  
Transport Layer
3	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
Port Numbers
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
4	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
IP Address and Port Numbers
Socket	
  Address
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
5	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
New Transport Protocols
 	
  Many	
  applicaKons	
  need	
  reliable	
  message	
  delivery	
  –	
  use	
  TCP	
  stream	
  	
  
 	
  TCP	
  provides	
  both	
  strict-­‐ordering	
  and	
  reliability	
  –	
  many	
  may	
  not	
  need	
  both	
  
 	
  Need	
  new	
  protocol	
  to	
  reduce	
  user-­‐perceived	
  latency	
  and	
  improve	
  throughput	
  
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
6	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
What is SCTP
 	
  SCTP	
  is	
  a	
  message-­‐oriented,	
  reliable	
  protocol	
  (RFC	
  2960)	
  	
  
 	
  On	
  top of a connectionless packet network
 	
  Perform	
  beXer	
  in	
  the	
  presence	
  of	
  losses:	
  no	
  strictly	
  ordered	
  delivery	
  
 	
  Designed	
  for	
  new	
  Internet	
  applicaKons:	
  ISDN	
  over	
  IP	
  (IUA),	
  SS7	
  signaling	
  
(M2UA,	
  M3UA),	
  Media	
  gateway	
  control	
  (H.248),	
  IP	
  Telephony	
  (H323,	
  SIP),	
  etc	
  
 	
  MulK-­‐homing	
  support
 	
  MulK-­‐stream	
  support
 	
  Unordered	
  data	
  delivery	
  opKon
 	
  Reliable	
  data	
  transfer	
  with	
  SACK	
  
 	
  	
  Flow	
  Control	
  
 	
  	
  CongesKon	
  control	
  
 	
  	
  Message	
  fragmentaKon	
  
 	
  Reliable	
  data	
  transfer	
  with	
  SACK	
  
 	
  	
  Flow	
  Control	
  
 	
  	
  CongesKon	
  control	
  
 	
  	
  Message	
  fragmentaKon	
  
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
7	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
Multi-Homing
 	
  Two	
  fundamental	
  concepts	
  in	
  SCTP:	
  
	
   -­‐	
  	
  Endpoints	
  (communicaKng	
  parKes)	
  	
  
	
   -­‐	
  AssociaKons	
  (communicaKon	
  relaKonships)	
  	
  
 	
  SCTP	
  associaKon	
  allows	
  mulKple	
  IP	
  addresses	
  for	
  each	
  end	
  point.	
  
 	
  This	
  can	
  be	
  represented	
  as	
  a	
  pair	
  of	
  SCTP	
  endpoints:	
  
-­‐	
  assoc	
  =	
  {	
  [10.1.61.11	
  :	
  2223],	
  	
  [161.10.8.221,	
  120.1.1.5	
  :	
  80]}	
  
160.15.82.20
161.10.8.221
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
8	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
Multi-Streams
 	
  SCTP	
  associaKon	
  can	
  involve	
  mulKple	
  streams.	
  
 	
  Reduces	
  unnecessary	
  head-­‐of-­‐line	
  blocking	
  
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
9	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
SCTP Packet
 TCP has segments; SCTP has packets.
 Data chunks are identified by 3items:
- TSN: cumulative number defines the association
- SI: defines the stream
- SSN: defines the chunk in a stream
 	
  Control	
  informaKon	
  &	
  data	
  informaKon	
  are	
  carried	
  in	
  separate	
  chunks.	
  
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
10	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
SCTP Packet
 	
  Control	
  informaKon	
  and	
  data	
  informaKon	
  are	
  carried	
  in	
  separate	
  chunks	
  
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
11	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
Handshake
 	
  SCTP	
  uses	
  a	
  four-­‐way	
  handshake	
  to	
  set	
  up	
  an	
  associaKon	
  
	
   -­‐	
  Cookie	
  to	
  defense	
  against	
  TCP	
  SYN-­‐	
  aXack	
  
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
12	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
Simple Data Transfer
 Only DATA chunks consume TSNs;
 DATA chunks are the only chunks that are acknowledged.
 	
  Acknowledgment	
  defines	
  the	
  cumulaKve	
  TSN,	
  	
  
 The	
  TSN	
  of	
  the	
  last	
  data	
  chunk	
  received	
  in	
  order.	
  
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
13	
  
Stream Control Transmission Protocol (SCTP)
Jakarta,	
  June	
  12,	
  2013	
  
Simple Data Transfer
Associa<on	
  Termina<on	
  	
  
 Acknowledgment	
  defines	
  the	
  cumulaKve	
  TSN,	
  	
  
 	
  The	
  TSN	
  of	
  the	
  last	
  data	
  chunk	
  received	
  in	
  order.	
  
Laili	
  Aidi	
  –	
  Candidacy	
  at	
  Employer_X	
  
Thank	
  You	
  
References:	
  	
  
 	
  N.	
  Gupta,	
  S.	
  Kumar,	
  R.	
  Rajamani,	
  “SCTP	
  v/s	
  TCP	
  –	
  A	
  Comparison	
  of	
  Transport	
  Protocols	
  for	
  Web	
  Traffic”	
  
 	
  Cisco,	
  “A	
  detailed	
  overview	
  of	
  the	
  protocol	
  and	
  a	
  examinaKon	
  of	
  the	
  socket	
  API”	
  
 	
  Forouzan,	
  “Process-­‐to-­‐Process	
  Delivery:	
  UDP,	
  TCP,	
  and	
  SCTP”,	
  Chapter	
  16	
  and	
  23	
  
 	
  Karl-­‐Johan	
  Grinnemo,	
  “Advanced	
  Internetworking,	
  Transport	
  Layer"	
  

More Related Content

What's hot

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
NetProtocol Xpert
 
Routing
RoutingRouting
Routing
Saima Azam
 
Data link layer
Data link layerData link layer
Data link layer
Hassanein Alwan
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
Iffat Anjum
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
Sumita Das
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
Acad
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)tigerbt
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
Hamdamboy (함담보이)
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
KABILESH RAMAR
 

What's hot (20)

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Routing
RoutingRouting
Routing
 
Data link layer
Data link layerData link layer
Data link layer
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Link state protocols.ppt
Link state protocols.pptLink state protocols.ppt
Link state protocols.ppt
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Mk ppt chapter 5
Mk ppt chapter 5Mk ppt chapter 5
Mk ppt chapter 5
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Transport layer
Transport layer Transport layer
Transport layer
 
Arp (address resolution protocol)
Arp (address resolution protocol)Arp (address resolution protocol)
Arp (address resolution protocol)
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 

Viewers also liked

Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
Peter R. Egli
 
SCTP Overview
SCTP OverviewSCTP Overview
SCTP Overview
John Loughney
 
Using SS7 & SIGTRAN to Solve Today's Network Challenges
Using SS7 & SIGTRAN to Solve Today's Network ChallengesUsing SS7 & SIGTRAN to Solve Today's Network Challenges
Using SS7 & SIGTRAN to Solve Today's Network Challenges
Continuous Computing
 
Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDP
VIJAY SHARMA
 
SIGTRAN - An Introduction
SIGTRAN - An IntroductionSIGTRAN - An Introduction
SIGTRAN - An Introduction
Tareque Hossain
 

Viewers also liked (7)

Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
SCTP Overview
SCTP OverviewSCTP Overview
SCTP Overview
 
Using SS7 & SIGTRAN to Solve Today's Network Challenges
Using SS7 & SIGTRAN to Solve Today's Network ChallengesUsing SS7 & SIGTRAN to Solve Today's Network Challenges
Using SS7 & SIGTRAN to Solve Today's Network Challenges
 
Sctp tutorial
Sctp tutorialSctp tutorial
Sctp tutorial
 
Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDP
 
SIGTRAN - An Introduction
SIGTRAN - An IntroductionSIGTRAN - An Introduction
SIGTRAN - An Introduction
 
sigtran
sigtransigtran
sigtran
 

Similar to Stream Control Transmission Protocol (SCTP) - Introduction

Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummyhanums1
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1hanums1
 
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
IJECEIAES
 
Iccci2010 fipv6
Iccci2010 fipv6Iccci2010 fipv6
Iccci2010 fipv6hanums1
 
Transport SDN & OpenDaylight Use Cases in Korea
Transport SDN & OpenDaylight Use Cases in KoreaTransport SDN & OpenDaylight Use Cases in Korea
Transport SDN & OpenDaylight Use Cases in Korea
Justin Park
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
IRJET Journal
 
CCNA CHAPTER 9 BY jetarvind kumar madhukar
CCNA CHAPTER 9 BY jetarvind kumar madhukarCCNA CHAPTER 9 BY jetarvind kumar madhukar
CCNA CHAPTER 9 BY jetarvind kumar madhukar
ALLCAD Services Pvt Limited
 
Review Paper on 802.11ax Scheduling and Resource Allocation
Review Paper on 802.11ax Scheduling and Resource AllocationReview Paper on 802.11ax Scheduling and Resource Allocation
Review Paper on 802.11ax Scheduling and Resource Allocation
ijtsrd
 
SKY X TECHNOLOGY
SKY X TECHNOLOGYSKY X TECHNOLOGY
SKY X TECHNOLOGY
Udirmaan Deka
 
sky x ppt ankur
sky x ppt ankursky x ppt ankur
sky x ppt ankurAnkur Yogi
 
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
ASAITHAMBIRAJAA
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
neirew J
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
hiij
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
ijccsa
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
ijccsa
 
Wccp introduction final2
Wccp introduction final2Wccp introduction final2
Wccp introduction final2
bui thequan
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
IJCNCJournal
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
Katie Gulley
 

Similar to Stream Control Transmission Protocol (SCTP) - Introduction (20)

Iccsit2010 p 1-dummy
Iccsit2010 p 1-dummyIccsit2010 p 1-dummy
Iccsit2010 p 1-dummy
 
Iccsit2010 p 1
Iccsit2010 p 1Iccsit2010 p 1
Iccsit2010 p 1
 
Assignment2
Assignment2Assignment2
Assignment2
 
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...
 
Iccci2010 fipv6
Iccci2010 fipv6Iccci2010 fipv6
Iccci2010 fipv6
 
Transport SDN & OpenDaylight Use Cases in Korea
Transport SDN & OpenDaylight Use Cases in KoreaTransport SDN & OpenDaylight Use Cases in Korea
Transport SDN & OpenDaylight Use Cases in Korea
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
 
CCNA CHAPTER 9 BY jetarvind kumar madhukar
CCNA CHAPTER 9 BY jetarvind kumar madhukarCCNA CHAPTER 9 BY jetarvind kumar madhukar
CCNA CHAPTER 9 BY jetarvind kumar madhukar
 
Review Paper on 802.11ax Scheduling and Resource Allocation
Review Paper on 802.11ax Scheduling and Resource AllocationReview Paper on 802.11ax Scheduling and Resource Allocation
Review Paper on 802.11ax Scheduling and Resource Allocation
 
SKY X TECHNOLOGY
SKY X TECHNOLOGYSKY X TECHNOLOGY
SKY X TECHNOLOGY
 
sky x ppt ankur
sky x ppt ankursky x ppt ankur
sky x ppt ankur
 
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Wccp introduction final2
Wccp introduction final2Wccp introduction final2
Wccp introduction final2
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 

More from Laili Aidi

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging Markets
Laili Aidi
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Laili Aidi
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of Nobel
Laili Aidi
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and Opportunities
Laili Aidi
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Laili Aidi
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Laili Aidi
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Laili Aidi
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Laili Aidi
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0
Laili Aidi
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Laili Aidi
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Laili Aidi
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
Laili Aidi
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
Laili Aidi
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
Laili Aidi
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Laili Aidi
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Laili Aidi
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
Laili Aidi
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - Presentation
Laili Aidi
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final Report
Laili Aidi
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Laili Aidi
 

More from Laili Aidi (20)

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging Markets
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of Nobel
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and Opportunities
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - Presentation
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final Report
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Stream Control Transmission Protocol (SCTP) - Introduction

  • 1. Stream  Control  Transmission  Protocol  (SCTP)     LAILI  AIDI   Presented  as  part  of  candidacy  at  Employer_X  
  • 2. 2   Stream Control Transmission Protocol (SCTP) Laili  Aidi  –  Candidacy  at  Employer_X  Jakarta,  June  12,  2013   Transport  layer  is  responsible  for  process-­‐to-­‐process  delivery.—the  delivery  of   a  packet,  part  of  a  message,  from  one  process  to  another.  Two  processes   communicate  in  a  client/server  relaKonship.   Data  Delivery:   Transport Layer
  • 3. 3   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   Port Numbers Laili  Aidi  –  Candidacy  at  Employer_X  
  • 4. 4   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   IP Address and Port Numbers Socket  Address Laili  Aidi  –  Candidacy  at  Employer_X  
  • 5. 5   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   New Transport Protocols    Many  applicaKons  need  reliable  message  delivery  –  use  TCP  stream        TCP  provides  both  strict-­‐ordering  and  reliability  –  many  may  not  need  both      Need  new  protocol  to  reduce  user-­‐perceived  latency  and  improve  throughput   Laili  Aidi  –  Candidacy  at  Employer_X  
  • 6. 6   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   What is SCTP    SCTP  is  a  message-­‐oriented,  reliable  protocol  (RFC  2960)        On  top of a connectionless packet network    Perform  beXer  in  the  presence  of  losses:  no  strictly  ordered  delivery      Designed  for  new  Internet  applicaKons:  ISDN  over  IP  (IUA),  SS7  signaling   (M2UA,  M3UA),  Media  gateway  control  (H.248),  IP  Telephony  (H323,  SIP),  etc      MulK-­‐homing  support    MulK-­‐stream  support    Unordered  data  delivery  opKon    Reliable  data  transfer  with  SACK        Flow  Control        CongesKon  control        Message  fragmentaKon      Reliable  data  transfer  with  SACK        Flow  Control        CongesKon  control        Message  fragmentaKon   Laili  Aidi  –  Candidacy  at  Employer_X  
  • 7. 7   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   Multi-Homing    Two  fundamental  concepts  in  SCTP:     -­‐    Endpoints  (communicaKng  parKes)       -­‐  AssociaKons  (communicaKon  relaKonships)        SCTP  associaKon  allows  mulKple  IP  addresses  for  each  end  point.      This  can  be  represented  as  a  pair  of  SCTP  endpoints:   -­‐  assoc  =  {  [10.1.61.11  :  2223],    [161.10.8.221,  120.1.1.5  :  80]}   160.15.82.20 161.10.8.221 Laili  Aidi  –  Candidacy  at  Employer_X  
  • 8. 8   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   Multi-Streams    SCTP  associaKon  can  involve  mulKple  streams.      Reduces  unnecessary  head-­‐of-­‐line  blocking   Laili  Aidi  –  Candidacy  at  Employer_X  
  • 9. 9   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   SCTP Packet  TCP has segments; SCTP has packets.  Data chunks are identified by 3items: - TSN: cumulative number defines the association - SI: defines the stream - SSN: defines the chunk in a stream    Control  informaKon  &  data  informaKon  are  carried  in  separate  chunks.   Laili  Aidi  –  Candidacy  at  Employer_X  
  • 10. 10   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   SCTP Packet    Control  informaKon  and  data  informaKon  are  carried  in  separate  chunks   Laili  Aidi  –  Candidacy  at  Employer_X  
  • 11. 11   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   Handshake    SCTP  uses  a  four-­‐way  handshake  to  set  up  an  associaKon     -­‐  Cookie  to  defense  against  TCP  SYN-­‐  aXack   Laili  Aidi  –  Candidacy  at  Employer_X  
  • 12. 12   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   Simple Data Transfer  Only DATA chunks consume TSNs;  DATA chunks are the only chunks that are acknowledged.    Acknowledgment  defines  the  cumulaKve  TSN,      The  TSN  of  the  last  data  chunk  received  in  order.   Laili  Aidi  –  Candidacy  at  Employer_X  
  • 13. 13   Stream Control Transmission Protocol (SCTP) Jakarta,  June  12,  2013   Simple Data Transfer Associa<on  Termina<on      Acknowledgment  defines  the  cumulaKve  TSN,        The  TSN  of  the  last  data  chunk  received  in  order.   Laili  Aidi  –  Candidacy  at  Employer_X  
  • 14. Thank  You   References:        N.  Gupta,  S.  Kumar,  R.  Rajamani,  “SCTP  v/s  TCP  –  A  Comparison  of  Transport  Protocols  for  Web  Traffic”      Cisco,  “A  detailed  overview  of  the  protocol  and  a  examinaKon  of  the  socket  API”      Forouzan,  “Process-­‐to-­‐Process  Delivery:  UDP,  TCP,  and  SCTP”,  Chapter  16  and  23      Karl-­‐Johan  Grinnemo,  “Advanced  Internetworking,  Transport  Layer"