FREE ELECTRONIC LIBRARY - Books, dissertations, abstract

«Introduction to the Stream Control Transmission Protocol (SCTP): The next generation of the Transmission Control Protocol (TCP) Introduction We are ...»

Written by Paul Stalvig | Technical Marketing Manager

Introduction to the Stream Control

Transmission Protocol (SCTP):

The next generation of the Transmission Control Protocol (TCP)


We are guided through security scans at the airport, and then whisked away in a speeding

caravan of vehicles. As we reach the semi-secret world of the Internet Engineering Task Force

(IETF) working groups, we enter the glass doors that mark the point of no return. Ducking into a maze of hallways we come to a plain door. Lurking in the backroom, between the dark navy suits the Stream Control Transmission Protocol (SCTP) exists. Maneuvering for a closer view, we find AIX from IBM, BSD with three different variants, Cisco IOS, Linux, third-parties for the Microsoft operating system, and Sun Solaris. Each has implemented their interpretation of this standardsbased protocol. We stare at what could be the Holy Grail for IP-based multimedia and telecommunications. Passing between the cubicles, we enter a door curiously labeled “Test/Laboratory area.” Within the confines of the laboratory, badges on the clean-room suits indicate that SCTP is the result of the IETF Signal Transmission (SIGTRAN) working groups’ efforts. Their intent was to produce something akin to the telephone Signaling System 7 (SS7) switching network that was capable of traversing IP networks. Simply put, SCTP was built to carry call control signals using IP networks. SCTP is not new; it was created in 2000, and is taking some time to outgrow its confinement within the large telecommunications companies’ interconnects.

Quietly, we are informed that the secrecy was created to prevent a mass rush to implement SCTP when everyone finds out about SCTP’s capabilities. With more than twenty years of work under their belts, the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) were not singularly up to the task, but each provided parts and ideas to make SCTP possible.

Neither TCP nor UDP can handle multi-homing, or the ability to send information to an alternate address if the primary becomes unreachable. SCTP’s closest competition, TCP, will need to improve or become a relic.

Within the IP Multimedia Subsystem (IMS) specifications, SCTP provides connections between various Session Initiated Protocol (SIP) servers and proxy servers, collectively called Call Session Control Function (CSCF). The secrecy seems to reside around the fact that the SCTP communications that flow between or through the Proxy-CSCF, Interrogating-CSCF, ServingCSCF, and other selected pieces of the IMS infrastructure are handled in the control-plane versus the data-plane. (The data-plane contains the actual telecommunications data being delivered to a subscriber/user, and the support-plane provides the control and connectivity for the data-plane.) Since the SCTP is hidden behind the curtains of the support-plane networks, it has not received the publicity or the focus of some of the other IMS specifications. SIP and RTSP have broken through the curtain by being able to process Voice over IP (VoIP) telecommunications within the enterprise space. But, SIP and RTSP’s notoriety may be short lived when SCTP enters the enterprise space.

Now here is the crucial part: without SCTP’s capabilities the IMS would not have the capability to reliably pass call control signaling to the various systems and it would not be possible to use TCP or UDP. You could use these if you only allow twenty simultaneous sessions, which is inconsequential as most Service Providers count their subscribers in millions. Prying open the specifications for SCTP reveals many features or services similar to TCP.

–  –  –

having to wait. Within SCTP one interface is established as the primary and the rest become secondary. If the primary should fail for whatever reason, a secondary is selected and utilized.

When the primary becomes available again, the communications can be transferred back without the application being aware there was an issue. While establishing the connections, the primary and secondary interfaces are checked and monitored using a heartbeat/heartbeat acknowledgement process that validates addresses, and maintains a Round Trip Time (RTT) calculation for each address. The RTT can indicate that the primary is slower than a secondary and allow for the communications to migrate to the secondary interface.

Figure 2: Multi-homing

Multi-streaming Using TCP, only one single data stream is allowed per connection. All of the information must be passed through that one stream. SCTP allows multiple simultaneous data streams within a connection or association. Each message sent to a data stream can have a different final destination, but each must maintain message boundaries. For example, systems cannot send parts of the same message through different streams; one message must go through one stream.

When running an ordered data delivery system, if one of the packets is out of order or missing, the stream is blocked pending resolution to the order. This is called “Head-of-Line Blocking.” With the use of multi-streams, only the stream that is affected would be blocked; the other streams would continue to flow.

Figure 3: Multi-streaming

By using multi-streaming with SCTP, the issue with web browsers only having the ability to handle two simultaneous connections goes away. The client or the web server could immediately open additional streams and send pictures, text, etc. through each stream, reducing overall latency. This could also reduce overhead that servers often incur with the numerous separate connections required to fulfill a request.

SCTP’s multi-streaming would also help with infrastructures that connect multiple means of communications simultaneously. For example, if we look at Figure 3 above, Stream 1 could be voice communications, Stream 2 could be video, Stream 3 a shared application, and so on. By enabling SCTP to meet future needs, the SIGTRAN working group has simplified the connectivity for developers. The developers would only need to tap into the appropriate streams to feed information to the applications.

–  –  –

SCTP Additional Benefits Compared to TCP Allow half-closed connections Half-closed connections can occur when one side of the conversation believes the connection is closed, but the other believes it is still open. TCP uses a four-way finish command consisting of bidirectional FIN and FIN-ACK messages. The half-open connection could exist if the red messages are not sent (see picture below). SCTP removes this possibility by using a three-way shutdown consisting of SHUTDOWN, SHUTDOWN-ACK, and SHUTDOWN-COMPLETION.

Once this is initiated, both sides immediately cease communications. If more information needs to be sent, then a new connection is required.

Preservation of message boundaries If a client sends a 100 byte and then a 50 byte message, the information is presented to the server with preserved message boundaries. With SCTP and UDP the messages are sent as 100 bytes and 50 bytes. With TCP the messages may be sent/received as a 150 byte message. In the example below, the message was received as one message. This forces the application to separate the messages back into their original format. With SCTP and UDP, the message’s boundaries are maintained and the application does not have to split the messages.

–  –  –

Protect against SYN flooding attacks In order to understand SYN flooding attacks, we need to look at how a typical connection is established. With TCP the client initiates communications with a synchronize request or a SYN packet. The server responds acknowledging with a SYN-ACK, and finally the client acknowledges the acknowledgement with an ACK packet. This is commonly referred to as a “three-way handshake.” Once all three steps are complete, communications can begin. By contrast SCTP uses a “four-way handshake,” but may begin sending information on the third step. Then, the SCTP client initiates communications with an INIT packet. The server acknowledges with the INIT-ACK packet and a cookie (unique context that identifies the connection). The client then sends the server’s cookie back to the server; the client can also send additional information after the COOKIE-ECHO. The server then acknowledges the COOKIE-ECHO with a COOKIE-ACK.

A SYN flood attack occurs when a client or multiple clients send SYN packets to a server. This causes the target to commit resources and will usually overload the server, causing it to reboot or worse. Within TCP, the server has already committed resources for the connection. Within a TCP connection, the two endpoints must commit ephemeral ports, memory, and CPU processing for each new connection. For the purposes of committing resources, TCP connections begin with receiving a SYN packet. Since UDP is a connection-less protocol it does not apply. Using SCTP, the servers do not commit resources for the connection until the COOKIE-ECHO is received. This means that the SCTP client must initially commit resources in order to be able send information.

Selective acknowledgements

In standard TCP, every message, or packet of information must be accounted for, resent as necessary, and processed in the order they were sent. SCTP has the ability to selectively acknowledge receipt of missing, disordered, or duplicated messages. Due to the nature of telecommunications most applications would end up discarding any unsynchronized messages.

Therefore, the need to send and receive the information is forgone. This would mean that a portion of a word, a portion of a video, or a piece of the whiteboard refresh would be skipped over. The applications and users may notice a slight skip in the voice, video, or refresh. This is referred to as jitter within the telecommunications world and a small amount of jitter is often preferred to having the packet resent and reprocessed which would double the amount of jitter, usually making it more noticeable to the users.

–  –  –

Unordered data delivery Due to the very nature of networks not all packets may travel across the exact same path. If there is a time-delay using one path over another, the original messages could be out of order when received. Unordered data delivery allows for this instance and can correct the issue by reordering the messages correctly. Using TCP’s reliable data transfer feature requires that packets be processed in order. If one is missing or out of order, the packet must be reordered before processing can continue. For example, in the diagram below, if we were using TCP, once Message 3 was received all processing would stop, and wait for Message 2, it would be processed and then Message 3 would be processed. SCTP allows for unordered data delivery and since it has multiple streams, only the one affected is temporarily blocked. As in the diagram below, SCTP would process the messages in the order they arrived, not waiting for them to be numerically ordered. With SCTPs reliable transfer, many networked disk solutions already provide ordering service; SCTP’s ability to simply pass the data on relieves the server of the unnecessary overhead of reordering.

Summary The intent of this paper is to familiarize the reader with both the vision and need for SCTP. While it currently has a very limited use, its capabilities will soon prove too tempting, and SCTP adoption will grow quickly. Within IMS architecture, SCTP provides the call signaling over IP. The key benefits of SCTP, multi-homing and multi-streaming, will allow development of numerous new devices which include the ability to support and carry this new protocol.

–  –  –

Similar works:

«Data Mining And Knowledge Management A System Analysis for Establishing a Tiered Knowledge Management Model (TKMM) Abstract Researchers are living in an era of quiet yet pervasive advancement in technology that has instigated an unforgiving expansion of data analysis techniques. This brings significant pressure to update skills and analysis tools. Researchers in higher education in particular have gradually begun to realize that yesterday’s modus operandi is dated, as technology is knocking...»

«MEETBIKE EUROPEAN CONFERENCE ON BICYCLE TRANSPORT AND NETWORKING INTERDEPENDENCIES OF BICYCLE AND PUBLIC TRANSPORT USE 3rd – 4th April 2008 Dresden, Germany Organizers: Intelligent Energy Europe Programme http://ec.europa.eu/energy/intelligent/index_en.html German Federal Ministry of Transport, Building and Urban Affairs http://www.bmvbs.de City of Dresden http://www.dresden.de Dresdner Verkehrsbetriebe AG, Service Provider for Local Public Transport http://www.dvbag.de Verkehrsverbund...»

«Einleitung 1. Einleitung 1.1. Apoptose Vielzellige Lebewesen sind oft in der Situation, sich von Zellen, die überflüssig, potentiell gefährlich oder einfach im Weg sind, befreien zu müssen. Für diesen Zweck benutzen sie einen aktiven molekularen Mechanismus, den programmierten Zelltod. Vielfach untersucht und benannt, wurde letztlich 1972 der Begriff Apoptose von Currie und seinen Kollegen geprägt.1 Die Apoptose erlaubt dem Organismus, seine Zellanzahl und Gewebsgröße streng zu...»

«MANUAL OF ANALOGUE SOUND RESTORATION TECHNIQUES by Peter Copeland The British Library Analogue Sound Restoration Techniques MANUAL OF ANALOGUE SOUND RESTORATION TECHNIQUES by Peter Copeland This manual is dedicated to the memory of Patrick Saul who founded the British Institute of Recorded Sound, * and was its director from 1953 to 1978, thereby setting the scene which made this manual possible. Published September 2008 by The British Library 96 Euston Road, London NW1 2DB Copyright 2008, The...»

«Spooky Action at a Distance (Artes Mechanicae and Witch’s Cradle) A group exhibition at Corner College with Amélie Brisson-Darveau, Andreas Marti, Conor McFeely, Mareike Spalteholz. Opening on 23 April, finissage on 22 May 2015. Both at the opening and at the finissage, there will be a sound intervention, Lointain (2015) by Brandon Farnsworth, Benjamin Ryser and HannaH Walter. Curated by Gabriel Gee (TETI) and Dimitrina Sevova (Corner College). The exhibition is organized by Corner College...»

«You can read the recommendations in the user guide, the technical guide or the installation guide for JVC CH-X550. You'll find the answers to all your questions on the JVC CH-X550 in the user manual (information, specifications, safety advice, size, accessories, etc.). Detailed instructions for use are in the User's Guide. User manual JVC CH-X550 User guide JVC CH-X550 Operating instructions JVC CH-X550 Instructions for use JVC CH-X550 Instruction manual JVC CH-X550 You're reading an excerpt....»

«Experimental Arthritis: in vitro and in vivo Models           A catalogue record is available from the Eindhoven University of Technology Library  ISBN: 978‐90‐386‐1270‐6    Printed in the United States of America  Wang, Susanne X.  Experimental Arthritis: in vitro and in vivo Models/ Susanne X. Wang  Cover design: Ryan H. Tam and Susanne X. Wang    Copyright ©2008 by Susanne Xuanhui Wang  All rights reserved. ...»

«TABLE OF CONTENTS: Summary 3 Mission 4 Responsibilities 4 Social Media 5 Collaborations 6 Acquisition & Processing Activities 7 Digital Commons 8 Host Activities 9 Preservation Accounts 9 Exhibits 10 Last Year’s Goals 11 Future Goals 13 Statistics 15 Cover Image: Excerpt from The Voice of the Phi Sigma 1921 (1921). Phi Sigma Voice. Book 92. http://digitalcommons.colum.edu/phisigma_voice/92 SUMMARY: STAFF: One new staff position was created through the transfer of an open position in the...»

«Czech Technical University in Prague Faculty of Electrical Engineering ˇ CVUT FEL katedra poc´tac ˚ ˇı ˇu Master Thesis Design of Integrity Check And Repair Algorithms For PostgreSQL Data File Robert Mach Supervisor: Ing. Zdenk Kotala e Master Study Program: Electrical Engineering and Information Technology M2612/2246 Specialization: Computer Science and Engineering January 2008 ii Podkovn e a M nejvt dky pat vedoucmu m diplomov prce Ing.Zdekovi Kotalovi, bez kterho e e...»

«Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Cyber Essentials Scheme: Requirements for basic technical protection from cyber attacks Contents Contents Introduction Who should use this document? What can these requirements help an organisation protect? Understanding and using this requirements document Threats Requiring Mitigation Controls required for basic technical cyber protection 1. Boundary firewalls and internet gateways 2....»

<<  HOME   |    CONTACTS
2016 www.book.dislib.info - Free e-library - Books, dissertations, abstract

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.