SCTP – Stream Control Transmission Protocol

Acronym for Stream Control Transmission Protocol.

SCTP is a type of mobility management for IP-based networks that focuses on the transport and session layers, rather the network layer. SCTP, in general terms, is a reliable transport protocol operating on top of potentially unreliable connectionless packet service such as IP.

SCTP can be used as the transport protocol for applications where monitoring and detection of loss of session is required. For such applications, the SCTP path/session failure detection mechanisms, especially the heartbeat, will actively monitor the connectivity of the session. SCTP offers recognized error-free non-duplicated transfer of messages. Detection of data loss, data corruption and duplication of data is achieved by using checksums and sequence numbers. A selective retransmission mechanism is applied to correct loss or corruption of data.

SCTP connections are established after a 4-way handshake between two SCTP endpoints, usually a client and a server. The server, after having received the client s association setup request, returns an acknowledgement of the setup request containing a data structure called cookie, which is protected by a secure message authentication code, and does not change state. Only when this cookie is returned by the client unchanged does the server allocate resources and establish a new association.

With its inception, SCTP was designed to provide a general purpose transport protocol for message-oriented applications. It has been designed by the IETF SIGTRAN working group, which has released the SCTP standard draft document ( RFC2960 ) in October 2000. Its design includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...