This document provides an overview of transport layer protocols TCP, UDP, and SCTP. It discusses the history and evolution of TCP, including key developments like congestion control algorithms. UDP is described as a connectionless and unreliable protocol. SCTP is introduced as a protocol developed to transport telephony signaling over IP networks. It addresses limitations of TCP like head-of-line blocking and provides features like multi-homing and message orientation. The document defines SCTP terminology and describes its chunks, states, congestion control approach, and similarities to TCP. In summary, it serves as a high-level introduction to transport protocols with a focus on motivations and capabilities of SCTP.
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
The application layer is the highest layer in the protocol suite.
The application layer provides services to the user.
The protocols in this layer do not provide services to any other protocol in the
suite; they only receive services from the protocols in the transport layer.
Two application layers assume that there is an imaginary direct connection
through which they can send and receive messages.
The application layer is the only layer that provides services to the Internet user
The flexibility of the application layer allows new application protocols to be
easily added to the Internet.
Applications need their own protocols. These applications are part of network
protocol.
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
The application layer is the highest layer in the protocol suite.
The application layer provides services to the user.
The protocols in this layer do not provide services to any other protocol in the
suite; they only receive services from the protocols in the transport layer.
Two application layers assume that there is an imaginary direct connection
through which they can send and receive messages.
The application layer is the only layer that provides services to the Internet user
The flexibility of the application layer allows new application protocols to be
easily added to the Internet.
Applications need their own protocols. These applications are part of network
protocol.
In this tutorial on User Datagram Protocol, we will understand the working of a connectionless and unreliable network protocol. It is applied to transmit real-time data and live network services, like streaming gaming videos, and is active in the Transport layer of the OSI model.
Topics covered in this tutorial on User Datagram protocol are:
1. What Is User Datagram Protocol?
2. Features of User Datagram Protocol
3. UDP Header Format
4. Working of the UDP Protocol
5. Applications of the UDP Protocol
6. UDP vs TCP
In this presentation, we will discuss in details about the TCP/ IP framework, the backbone of every ebusiness.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
UNIT IV TRANSPORT LAYER 9
Introduction – Transport Layer Protocols – Services – Port Numbers – User Datagram Protocol – Transmission Control Protocol – SCTP.
By the end of this chapter, you will be able to:
1) Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
2) Describe how common application layer protocols interact with end user applications.
3) Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
4) Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
5) Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, 6) File Sharing Services, SMB protocol.
7) Explain how data is moved across the network, from opening an application to receiving data.
In this tutorial on User Datagram Protocol, we will understand the working of a connectionless and unreliable network protocol. It is applied to transmit real-time data and live network services, like streaming gaming videos, and is active in the Transport layer of the OSI model.
Topics covered in this tutorial on User Datagram protocol are:
1. What Is User Datagram Protocol?
2. Features of User Datagram Protocol
3. UDP Header Format
4. Working of the UDP Protocol
5. Applications of the UDP Protocol
6. UDP vs TCP
In this presentation, we will discuss in details about the TCP/ IP framework, the backbone of every ebusiness.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
UNIT IV TRANSPORT LAYER 9
Introduction – Transport Layer Protocols – Services – Port Numbers – User Datagram Protocol – Transmission Control Protocol – SCTP.
By the end of this chapter, you will be able to:
1) Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
2) Describe how common application layer protocols interact with end user applications.
3) Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
4) Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
5) Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, 6) File Sharing Services, SMB protocol.
7) Explain how data is moved across the network, from opening an application to receiving data.
transport protocols,unreliable message delivery service,goals for todays lecture,role of transport layer,internet transport protocols,sequence numbers,conclusion
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
This paper is comparative, throughput analysis, for
the TCP variants as for New Reno, Westwood & High Speed,
and it analyzes the outcomes in simulated environment for NS -3
(version 3.25) simulator with reference to multiple varying
network parameters that includes network simulation time,
router bandwidth, varying traffic source counts to observe which
is one of the best TCP variant in different scenarios. Analysis
was done using dumbbell topology to figure out the comparative
maximum throughput of TCP variants. The analysis gives result
as TCP Variant “NewReno” is good when low bandwidth is used,
while TCP Variant “HighS peed” is good in terms of using large
bandwidths in comparison to Westwood. Network traffic flow
was observed in NetAnim tool.
Overview of transport protocols as alternatives to TCP and UDP.
TCP and UDP are the two transport protocols (OSI layer 4) that are predominantly used by applications in IP based networks.
The properties of TCP and UDP are complementary in that TCP provides many quality of service features that UDP lacks.
Therefore, TCP is mainly used in applications that require a certain level of reliable transport connection while UDP is used when reliability is of secondary importance but speed and simplicity are important.
There are, however, alternatives to TCP and UDP. SCTP (Stream Control Transmission Protocol) was defined some time ago and was meant to eventually replace TCP. It provides the same features as TCP but fixes some of the shortcomings of TCP. Alternatives for UDP exist as well such as Reliable UDP and UDP redundancy.
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
TCP congestion control mechanism is highly dependent on MAC layer Backoff algorithms that
predict the optimal Contention Window size to increase the TCP performance in wireless adhoc
network. This paper critically examines the impact of Contention Window in TCP congestion
control approaches. The modified TCP congestion control method gives the stability of
congestion window which provides higher throughput and shorter delay than the traditional TCP. Various Backoff algorithms that are used to adjust Contention Window are simulatedusing NS2 along with modified TCP and their performance are analyzed to depict the influence of Contention Window in TCP performance considering the metrics such as throughput, delay, packet loss and end-to-end delay
Introduction to Research Methodology
+ What is Research?
+ The purpose of Research
+ Specifications of High Quality Research
+ Motivations of Research
+ Types of Research
+ Steps of Conducting Research
+ Systematic Literature Review (SLR)
+ Analytical / Applied Research
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Hamidreza Bolhasani
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and Healthcare Systems
+ History of IoT
+ Internet of Nano Things (IoNT)
+ IoT and IoNT for Medical and Healthcare Systems
+ IoT and Artificial Intelligence (AI)
+ IoT and AI for Health
+ Deep Learning Accelerator
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
NFV +SDN
(Network Function Virtualization + Software Defined Networking)
- What, Why and When NFV and SDN?
- Basic concepts and definition of NFV, SDN.
- Benefits of NFV.
- NFV Architecture
5G New Services - Opportunities and Challenges
- Mobile Network Histories
- 2G to 5G roadmap
- 5G Spectrum Band (mmWave)
- 5G Primitives - IMT2020
- 5G New Services and Technologies
- eMBB, mMTC, URLLC Use Cases
- 5G Market, Key Players and third parties
- 5G role in Health, Economy and Sustainable Growth
- Conclusion
5G + AI Applications in Healthcare and Medical Sciences (A Lecture by Hamidreza Bolhasani in 10th Translational Ophthalmology Seminar with Focus on Artificial Intelligence, Robotics and Image Processing.)
An interdisciplinary collaboration between UCO, SOAS University of London and Tehran University of Medical Sciences (TUMS).
This presentation provides a basic introduction to quantum computers architecture including basic concepts related to the theory, quantum vs classical mechanics, qubits, quantum gates and some related algorithms.
High-Tech Telecommunication (4G/LTE) overview with focus on new servicesHamidreza Bolhasani
Telecommunication (4G/LTE) overview with focus on new services.
* IoT, V2X, MVNO
* Useful for Sales and Marketing Experts of Telecom Companies.
معرفی روند فناوری های نوین مخابراتی (نسل 4) با تأکید بر سرویسهای جدید
* مفید برای کارشناسان و مدیران فروش و بازاریابی شرکتهای مخابراتی
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
2. 2
Table of Contents
History
Introduction
TCP
UDP
MP-TCP
SCTP
Motivation of Developing SCTP
Comparison of Transport Protocols
Features and Advantages of SCTP
Role of SCTP in Fixed/Mobile Networks
Question & Answer
Conclusion
7. Transport Layer Role and Services
End-to-End Delivery, Addressing, Reliable Delivery, Flow Control, Multiplexing
Serve Application Layer
Track individual communications
Segment data and manage each peace of data
Re-assemble segments back into streams of application data at the receiving host
Identify the different applications using port numbers
Communication between processes
9. Evolution of TCP (1/2)
1975 1980 1985 1990
1982
TCP & IP
RFC 793 & 791
1974
TCP described by
Vint Cerf and Bob Kahn
In IEEE Trans Comm
1983
BSD Unix 4.2
supports TCP/IP
1984
Nagel’s algorithm
to reduce overhead
of small packets;
predicts congestion
collapse
1987
Karn’s algorithm
to better estimate
round-trip time
1986
Congestion collapse
observed
1988
Van Jacobson’s
algorithms
congestion avoidance and
congestion control
(most implemented in
4.3BSD Tahoe)
1990
4.3BSD Reno
fast retransmit
delayed ACK’s
1975
Three-way handshake
Raymond Tomlinson
In SIGCOMM 75
10. Evolution of TCP (2/2)
1993 1994 1996
1994
ECN
(Floyd)
Explicit
Congestion
Notification
1993
TCP Vegas
(Brakmo et al)
real congestion
avoidance
1994
T/TCP
(Braden)
Transaction
TCP
1996
SACK TCP
(Floyd et al)
Selective
Acknowledgement
1996
Hoe
Improving TCP
startup
1996
FACK TCP
(Mathis et al)
extension to SACK
11. TCP Introduction
Communication Abstraction
Reliable
Ordered
Point-to-Point
Byte-Stream
Full-Duplex
Flow and Congestion Controlled
Protocol Implemented entirely at the ends
Fate Sharing
Sliding Window with Cumulative Acks
Ack field contains last in-order packet received.
Duplicate Ack sent when out-of-order packet received
13. TCP Services
Port Protocol Use
21 FTP File Transfer
23 Telnet Remote login
25 SMTP E-mail
69 TFTP Trivial File Transfer Protocol
79 Finger Lookup info about a user
80 HTTP World Wide Web
110 POP-3 Remote e-mail access
119 NNTP USENET news
25. 25
History
Primary motivation: Transportation of telephony signaling messages
over IP Networks.
1991
TCP Failure
Oct. 2000
SCTP - RFC2960
1998
MDTP submission
(UDP based)
1997
MDTP work
began1992-1997
UDP Reliability
Experiments
RFC 3257
Apr. 2002
RFC 3286
May 2002
RFC 3309
Sep. 2002
RFC 3436
Dec. 2002
26. 26
What is SCTP?
SCTP (Stream Transmission Control Protocol, RFC 2960) is
a transport protocol on OSI layer 4, like TCP or UDP.
SCTP was specifically designed as a transport protocol for
telephony signaling message transport.
IP
Network
IPv4/IPv6
Application
Link Layer
UDP TCP SCTP
Physical Layer
27. 27
RFCs
RFC 2960 – Stream Control Transmission Protocol
RFC 3257 – SCTP Applicability Statement
RFC 3286 – An introduction to SCTP
RFC 3309 – SCTP Checksum Change
RFC 3436 – Transport Layer Security over SCTP
RFC 3758 – SCTP Partial Reliability Extension
RFC 4960 – Transport PSTN signaling message over IP networks
28. 28
Motivations for Developing SCTP
Developed by IETF SIGTRAN working group
All-IP Networks.
3GPP networks based on IPv6 possible.
To create a new, IP based transport protocol.
For transport of signaling data over IP-based networks.
Signaling between SG, STP, MGW, HSS, MSC,…
29. 29
Motivations for Developing SCTP
Problems of TCP
Byte-Stream Oriented
No built-in support for multi-homed IP hosts
Vulnerable for SYN flooding attacks
Provide strict ordering of information which causes HOL Blocking problem.
Problems of UDP
Unreliable Data Transfer
No Congestion/Flow control
30. 30
SYN Flooding
SYN
victim Flooded!!
TCB
TCB
TCB
TCB
TCB
• There is no ACK in response to the SYN-ACK, hence connection
remains half-open
• Other genuine clients cannot open connections to the victim
• The victim is unable to provide service
attackers
128.3.4.5
221.3.5.10
Unavailable, reserved resources
SYN-ACK
ACK
SYN
SYN-ACK
ACK
31. 31
Head-of-Line Blocking in TCP
Sender Receiver
ACK 1
1
2
3
4
5
ACK 2
ACK 2
ACK 2
Packet 3 is blocking the
head of the line.
1
2
Receiver’s App
32. 32
Head-of-Line Blocking Problem in TCP
TCP provides single data stream.
When a segment is lost, subsequent segments must wait to be processed.
Problem for some applications (Telephony)
33. 33
SCTP Features (1/3)
Provide an end-to-end reliable transmission service over IP networks
Support multiple streams per path
Support multi-homed hosts
Multiple IP Addresses per host
More tolerant to network failures
Message-oriented: Conserve message boundaries
Unordered delivery: SCTP can deliver messages as ordered or unordered.
Congestion control: SCTP congestion control is similar to TCP
SCTP is rate adaptive similar to TCP
34. 34
SCTP Features (2/3)
Fragmentation
Detection of path MTU and fragmentation of data chunks to fit into available path MTU.
Error Correction
Acknowledged error-free, non-duplicated data transfer.
Congestion Avoidance
Similar functionality as in TCP to avoid congestion to build up in the network.
40. 40
SCTP Payload (Data, ID=0)
Stream Identifier: Identifies the stream to which the following user data belongs to.
Stream Sequence Number: This value represents stream sequence number.
41. 41
Initiation (INIT)
Initiate Tag: This value MUST be placed into the verification tag field of every
SCTP packets.
Advertised Receiver Window Credit (a_rwnd): This value represents the
dedicated buffer space.
42. 42
Initiation Acknowledgment (INIT ACK)
The parameter part of INIT ack is formatted similarly to the INIT chunk. It uses
two extra variable parameters: The State Cookie and the Unrecognized parameter:
44. 44
Selective Acknowledgment (2/5)
SACK is sent to the peer endpoint to acknowledge received DATA chunks and to
inform the peer endpoint of gaps in the received subsequences of DATA chunks as
represented by their TSNs.
Cumulative TSN Ack: This parameter contains the TSN of the last DATA chunk
received in sequence before a gap.
Gap Ack Block Start: Indicates the Start offset TSN for this Gap Ack Block.
Gap Ack Block End: Indicates the End offset TSN for this Gap Ack Block.
Gap Ack Blocks: TSNs >= (Cumulative TSN Ack + Gap Ack Block Start) and
TSNs <= (Cumulative TSN Ack + Gap Ack Block End)
These TSNs are assumed to have been received correctly.
45. 45
Selective Acknowledgment (3/5)
Duplicate TSN
Indicates the number of times a TSN was received in duplicate since the
last SACK was sent.
Every time a receiver gets a duplicate TSN (before sending the SACK) it
adds it to the list of duplicates. The duplicate count is re-initialized to
zero after sending each SACK.
46. 46
Selective Acknowledgment (4/5)
TSN=17
miss
TSN=15
TSN=14
miss
TSN=12
TSN=11
TSN=10
Cumulative TSN Ack = 12
a_rwnd = 4660
Num of block=2 Num of dup=0
Block #1 start=2 Block #1 end=3
Block #2 start=5 Block #2 end=5
12+2 ~ 12+3
12+5 ~ 12+5
47. 47
Selective Acknowledgment (5/5)
TSN=16
TSN=15
TSN=14
TSN=13
TSN=13
TSN=12
miss
TSN=10
Cumulative TSN Ack = 10
a_rwnd = 4660
Num of block=1 Num of dup=1
Block #1 start=2 Block #1 end=6
Duplicate TSN 13
10+2 ~ 10+6
48. 48
SCTP States
Association Establishment and Shutdown.
SCTP uses a cookie mechanism in a four-way
handshake to establish an association.
The shutdown process is a three-way handshake.
49. 49
SCTP Congestion Control (1/5)
According to RFC2960, the congestion control behavior of an SCTP implementation
may have an impact where timely delivery of messages is required.
The congestion control mechanisms for SCTP have been derived from RFC 2581 - TCP
Congestion Control, and been adapted for multi-homing.
For each destination address (i.e. each possible path), a discrete set of flow and
congestion control parameters is kept.
From the point of view of the network, an SCTP association with a number of paths
may behave similarly as the same number of TCP connections.
50. 50
SCTP Congestion Control (2/5)
Similar to TCP, SCTP has two modes, Slow Start and Congestion Avoidance.
The mode is determined by a set of congestion control variables, which are path specific.
For successfully delivered and acknowledged data, the congestion window variable
(CWND) is steadily increased, and once it exceeds a certain boundary (called Slow
Start Threshold, SSTRESH), the mode changes from Slow Start to Congestion
Avoidance.
In Slow Start, the CWND is increased faster (roughly one MTU per received SACK
chunk), and in Congestion Avoidance mode, it is only increased by one MTU per Round
Trip Time (RTT) measurement.
51. 51
SCTP Congestion Control (3/5)
RTO timeout or fast retransmission will trigger retransmission and cause the
SSTHRESH to be cut down drastically and reset the CWND.
Fast Retransmission
ssthresh = max(cwnd/2, 2*MTU)
cwnd = ssthresh
RTO timeout
ssthresh = max(cwnd/2, 2*MTU)
cwnd = MTU