LET'S CONNECT!
Enter for a chance to win an eBook of your choice from InformIT. Fill out the form.
Register your product to gain access to bonus material or receive a coupon.
"This book...offers inside insights (by two of the SCTP designers) into the design of the protocol and discusses why the protocol operates as it does. This insight takes much of the 'black magic' out of SCTP and makes the protocol more accessible."
--From the Foreword by Mark Allman
Named one of the Top 10 Hottest Technologies of 2001 by Telecommunications Magazine, Stream Control Transmission Protocol (SCTP) is considered by many to be the TCP of the future. Originally designed for Internet telephony, SCTP has also proven itself a superb general purpose transport protocol for IP network data communications. More robust and secure than TCP, SCTP is the technology of choice for building next generation commercial grade infrastructures for telecommunications and e-commerce. Anyone involved with the technical aspects of Internet communications should have a working knowledge of this new transmission protocol, which is rapidly being adopted by standardization bodies and networking organizations.
Written by the creators of SCTP, Stream Control Transmission Protocol (SCTP): A Reference Guide is a comprehensive, practical, guide to SCTP technology. Examining the protocol in depth, the book provides useful perspective on design rationale and highlights SCTP's improvements over TCP in the areas of security and reliability. The book also demonstrates how to take full advantage of SCTP to make IP-based communications more reliable and robust.
Topics covered include:
Numerous examples and diagrams throughout the book clarify important concepts and techniques. The final chapter presents a user space implementation of SCTP, and the accompanying CD-ROM contains the open source code for this implementation.
An important complement to the official IETF standards specification, this book is required reading for all Internet programmers, developers, managers, and implementors of SCTP.
Introduction to Stream Control Transmission Protocol
Click below for Sample Chapter related to this title:
stewartch01.PDF
Preface.
1. Introduction and Overview.
IP Networking Basics.
How Messages are Delivered in an IP Network.
IP Protocols.
IP Multi-homing.
What Is SCTP?
Where Does SCTP Fit in the IP Architecture?
Motivation for Developing SCTP.
TCP Limitations.
UDP Limitations.
SCTP Enhancements Over TCP and UDP.
A Short History of SCTP Development.
Early Works Before IETF and MDTP.
IETF Refinements.
Major General SCTP Issues Debated in IETF.
Do We Really Need a New Transport Protocol?
Over UDP vs. Over IP.
Organization of This Book.
Summary.
Questions.
SCTP Transport Address.
SCTP Endpoint.
Multi-homed SCTP Endpoint.
SCTP Association.
Operation of an SCTP Association.
Functional View of an Association.
Functional Responsibilities of an SCTP Endpoint.
Operation States of an Association.
IETF Debate And Issues.
Summary.
Questions.
Basic Layout—the Bits on the Wire.
The SCTP Common Header.
Elements in a Chunk.
Defined Chunk Types and Extensibility.
General Rules When Dealing with Chunks.
Chunk Parameters.
Other Considerations.
Basic Chunk Descriptions.
The INIT Chunk.
The INIT-ACK Chunk.
The COOKIE-ECHO Chunk.
The COOKIE-ACK Chunk.
The DATA Chunk.
The SACK Chunk.
The HEARTBEAT Chunk 98.
The HEARTBEAT-ACK Chunk.
The SHUTDOWN chunk.
The SHUTDOWN-ACK Chunk.
The SHUTDOWN-COMPLETE Chunk.
The ERROR Chunk.
The Error Cause Parameters.
The ABORT Chunk.
IETF Debate And Issue.
Summary.
Questions.
The INIT Chunk.
Formulating the Chunk.
INIT Parameters.
Timer and Retransmission For INIT.
The INIT-ACK Response.
Formulating the Response.
INIT-ACK Parameters.
Preventing Resource Attacks.
The COOKIE-ECHO Chunk.
Formulating the Chunk.
Bundling Data with the COOKIE-ECHO.
Timer and Retransmission For COOKIE-ECHO.
The COOKIE-ACK Chunk.
Validating and Unpacking the Cookie.
Formulating The COOKIE-ACK.
Bundling DATA and SACK with COOKIE-ACK.
Address Usage When Starting An Association.
Chunk Rejections During an Association Setup.
When an INIT Is Unacceptable?
When is a Cookie Not Worth Eating?
Handle Unexpected Initialization Chunks.
Association Tie-Tags and their values.
Handle Overlapping Initialization Chunks.
Case Study #1: Initialization Collision.
Case Study #2: Peer Restart.
A lost COOKIE-ACK.
IETF Debate and Issues.
Summary.
Questions.
User Message Transfer Overview.
How User Messages Are Sent.
How User Messages Are Received.
Summary on Data Transfer Overview.
Obey The Transmission Rules.
Congestion Window And Receiver Window.
Rules for Data Transmission.
Acknowledgment Rules.
Where to Send a SACK?
When to Send a SACK?
What to Report in a SACK?
Revoke an Acknowledgment by Receiver.
Process Received SACK by Data Sender.
Management of Retransmission Timer.
Determine Retransmission Time-out (RTO).
Retransmission Timer Rules.
Handle Retransmission Timer Expiration.
Multi-homed Data Sender and Receiver.
Selection of Primary Transport Address.
Transfer Data Between Multi-homed Endpoints.
Sending SACK on Duplicate Data.
Stream Identifier and Stream Sequence Number.
Ordered and Un-ordered Message Delivery.
Passing Payload Protocol Identifier.
Fragmentation and Bundling Of User Messages.
When to Fragment?
How to Fragment a User Message?
Reassembling Fragmented Message at Data Receiver.
User Message Bundling.
Adler-32 Checksum.
Generation of Adler-32 Checksum by Data Sender.
Validate Adler-32 Checksum by Data Receiver.
Error Handling.
Handle Data Chunk with Invalid Stream Identifier.
Handle Empty Data Chunk.
Handle Out-of-state Data.
IETF Debate and Issues.
Summary.
Questions.
The Cause of Network Congestion Collapse.
Basic Concept of Congestion Control.
SCTP Congestion Control Algorithm.
How Does Your cwnd Grow?
How Does Your cwnd Shrink?
Interesting Details of the Algorithms.
Path MTU Discovery.
A Refresher on How PMTU Works.
PMTU Discoveryin SCTP.
Explicit Congestion Notification.
IETF Debate and Issues.
Summary.
Questions.
What Types of Failure SCTP Detects.
Destination Address Unreachable.
Peer Endpoint Unreachable.
How To Detect an Unreachable Address.
Use HEARTBEAT to Monitor Reachability.
Address Unreachability Detection Algorithm.
More on Using Heartbeat.
Handle Unreachable Primary Destination Address.
How To Detect an Unreachable Peer.
Association Entering Dormant State.
Fault Resilience Communication and Routing Configuration.
Maximize Path Diversity.
Asymmetric Multi-homing Configuration.
Effects of Source Address Selection.
IETF Debate and Issues.
Summary.
Questions.
Handle Out-of-the-blue SCTP Packets.
SCTP Packet Verification Tag Rules.
Basic Verification Tag Rules.
Special Verification Tag Rules.
IETF Debate and Discussion.
Summary.
Questions.
The Graceful Shutdown.
Sending SHUTDOWN.
Receiving SHUTDOWN.
Sending SHUTDOWN-COMPLETE.
Race Condition And Lost Message.
The Abortive Shutdown.
Abort Usage.
Sending ABORT.
Receiving ABORT.
IETF Debate and Issues.
Summary.
Questions.
SCTP Port Assignment.
IETF Chunk Extensions.
IETF Parameter Extensions.
IETF Extensions to the Error Causes.
Payload Protocol Identifier.
Summary.
A Quick Review of the TCP SOCKET API.
The Application Server Side.
The Application Client Side.
Applying the Typical TCP API to SCTP.
The Un-typical SCTP API.
A View of a Client.
The Receiving Side View.
Common API Mechanisms for Both Models.
Using the sendmsg and recvmsg Calls with SCTP.
Notification Information.
Summary.
Questions.
The Similarities Between SCTP and TCP.
Start-up.
Reliability and Ordering.
Congestion Control.
Closing Down.
The Differences between SCTP and TCP.
Differences at Start-up.
Head of Line Blocking.
Message Oriented Boundaries.
Un-ordered Delivery.
Selective Acknowledgment.
Multi-homing.
A Closing Difference.
Summary.
Questions.
A File Transfer Application.
A Call Control Application.
A Web Browser.
Summary.
Questions.
The Big Picture.
Data Structures.
Events and the API.
Association Setup.
When an Upper Layer Issues an Associate Primitive.
When a Peer Sends the SCTP Endpoint an INIT.
Data Transfer.
SACK Processing.
Inbound DATA Processing
Finishing Off By Sending.
Congestion Control, PMTU, And RTO.
Congestion Control.
PMTU Discovery.
RTO Calculation.
Fault Management.
Tag and Out-of-the-blue Handling.
Association Close-down.
At the Upper Layers Request.
Reception of a SHUTDOWN.
Summary.
This book describes, from the two primary designers' view, the design and operation of the Stream Control Transmission Protocol (SCTP)--a new general-purpose IP transport protocol recently standardized by the Internet Engineering Task Force (IETF).
For those who are familiar with TCP/IP networking, SCTP can be simply viewed as a "super-TCP," that is, a TCP-like, general-purpose reliable data transport protocol with an enhanced set of capabilities.
SCTP is a key piece of the puzzle for making IP a truly viable technology choice in building the next-generation commercial grade infrastructure for telecommunications and e-commerce. For instance, SCTP has been required by the 3rd Generation Partnership Project (3GPP) to carry call signaling traffic in the third-generation cellular systems, and recommended by the IETF to carry the mission-critical Authentication, Authorization, and Accounting (AAA) messages in any future IP service networks.
Telecommunications Magazine selected SCTP as one of the "10 Hottest Technologies of Year 2001" in a cover story in its May 2001 issue.
Why Do We Need SCTP?The basic design of TCP/IP has worked remarkably well and remained largely unchanged. All the while the Internet has gone through its exponential growth, from a network of only a few nodes connecting a few university campuses, to a truly global Internet with tens of millions of hosts.
The Internet's explosive growth, witnessed by the nineties, continues into the new millennium. At the same time, IP technology has been steadily transforming itself into a cornerstone of the new information-era economy. One of the most visible results of this transformation is that IP technology is beginning to see more and more commercial uses. This is in sharp contrast to the seventies and eighties, when almost the only mention of TCP/IP was heard in academic and research communities.
It is inevitable that this commercialization process has brought with it new requirements to the technology. The original design of TCP, which was conceived and incubated in a mostly academic and research environment, has started to show its limitations in meeting some of these new commercial requirements.
It is this commercialization challenge on IP technology that has brought on the birth of SCTP.
When we first brought the original idea of SCTP (then called MDTP) to the IETF, we were trying to create a protocol to solve a very particular and practical problem; that is, how to transport telephony signaling messages using IP technology in commercial-grade systems. But, at the end of the process, the success of SCTP has grown far beyond our widest expectations.
ReadersThis book is written with two different groups of readers in mind. The first group consists of those who want to understand SCTP. These readers may include programmers who need to work with SCTP, managers who want to make informed decisions about SCTP, students who want to learn the basics of SCTP, etcetera. For them, this book can serve as an easy-to-read alternative to the IETF standards specification.
In this book they will find not only detailed explanations of all the basic parts and operations of the protocol, often accompanied by a good deal of examples and diagrams, but also a thorough item-by-item comparison between functions of SCTP and TCP/UDP. Some of the chapters also give this group of readers guidance on which parts of the chapter they can safely skip without hindering their understanding of the general protocol operation.
The second group of readers we have in mind consists of the implementers of SCTP. For them, this book can be used as an annotation to the IETF standards specification. It is our hope that they will find some helpful clarifications of certain complex internal mechanisms of the protocol through the examples and illustrations we put in the book. Moreover, the recounts we have in the book on many important IETF debates and consensus-building processes may give them some insight into the protocol design. This in turn may improve their understanding over the rationale behind those same key design decisions.
PrerequisitesWe assume that the readers have preliminary knowledge about TCP/IP and IP networking. (An excellent book for this is W. Richard Stevens' and Gary R. Wright's The TCP/IP Illustrated, Volume 1: The Protocols, published by Addison-Wesley.) Moreover, some experience with C programming and Unix systems will be very helpful, though it is not an absolute requirement.
For those who would like to refresh their knowledge of IP networking, we have a short review of the IP networking basics at the beginning of Chapter 1.
CoverageThis book covers all aspects of SCTP standards as defined in the IETF's Request for Comments 2960 (RFC2960) (Stewart et al. 2000). We also include a preview of the proposed SCTP sockets API (application programming interface) extension, which is a work in progress in the IETF.
A CD-ROM containing the open-source user-space SCTP reference implementation is included in this book. Readers who want to read the reference implementation code can find a chapter at the end of the book explaining the overall design and internal structures of the code. This code has been compiled and tested with FreeBSD 4.2, Linux 2.2.17 and 2.4.1, and Solaris 2.8.1 operating systems. Updates and new releases of this open-source SCTP reference implementation can be found at http://www.sctp.org.
For those interested in doing experiments with the SCTP reference implementation, a good tool to use to capture and analyze SCTP traffic is the Ethereal Network Analyzer, which is freely downloadable from http://www.ethereal.com.
LISP Network, The: Evolution to the Next-Generation of Data Networks
Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.
This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.
To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:
For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.
For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.
Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.
Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.
If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.
On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.
We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.
Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.
Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.
This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.
This site currently does not respond to Do Not Track signals.
Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.
This site is not directed to children under the age of 13.
Pearson may send or direct marketing communications to users, provided that
Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.
If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.
Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.
Pearson does not rent or sell personal information in exchange for any payment of money.
While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.
California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.
Pearson may disclose personal information, as follows:
This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.
Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.
We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.
Last Update: November 17, 2020