Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 29 Sep 2024Bibliometrics
Skip Abstract Section
Abstract

This document describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.

RFC Downloads

Cited By

  1. ACM
    Yang Y, Zhang Y, Wan T, Wang C, Duan H, Chen J and Li Y Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (265-276)
  2. ACM
    Piraux M, Barbette T, Rybowski N, Navarre L, Alfroy T, Pelsser C, Michel F and Bonaventure O (2022). The multiple roles that IPv6 addresses can play in today's internet, ACM SIGCOMM Computer Communication Review, 52:3, (10-18), Online publication date: 30-Jul-2022.
  3. ACM
    Lindberg A, Merle S and Stritzinger P Scaling Erlang distribution: going beyond the fully connected mesh Proceedings of the 18th ACM SIGPLAN International Workshop on Erlang, (48-55)
  4. Garrido P, Gómez D, Lanza J, Serrat J and Aguero R (2017). Providing Reliable Services over Wireless Networks Using a Low Overhead Random Linear Coding Scheme, Mobile Networks and Applications, 22:6, (1113-1123), Online publication date: 1-Dec-2017.
  5. Habib S, Qadir J, Ali A, Habib D, Li M and Sathiaseelan A (2016). The past, present, and future of transport-layer multipath, Journal of Network and Computer Applications, 75:C, (236-258), Online publication date: 1-Nov-2016.
  6. ACM
    Detal G, Hesmans B, Bonaventure O, Vanaubel Y and Donnet B Revealing middlebox interference with tracebox Proceedings of the 2013 conference on Internet measurement conference, (1-8)
  7. ACM
    Budzisz Ł, Garcia J, Brunstrom A and Ferrús R (2012). A taxonomy and survey of SCTP research, ACM Computing Surveys, 44:4, (1-36), Online publication date: 1-Aug-2012.
  8. Bergs J, Van de Velde E, Pareit D, Naudts D, Rovcanin M, De Baere I, Van Brussel W, Blondia C, Moerman I and Demeester P Design and prototype of a train-to-wayside communication architecture Proceedings of the 4th international conference on Communication Technologies for Vehicles, (137-150)
  9. Chang B, Tsai H, Lin Z, Chen C and Huang C Adaptive performance for VVoIP implementation in cloud computing environment Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III, (356-365)
  10. Al-Surmi I, Othman M and Mohd Ali B (2012). Review, Journal of Network and Computer Applications, 35:1, (295-315), Online publication date: 1-Jan-2012.
  11. ACM
    Zhou W, Li Q, Caesar M and Godfrey P ASAP Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies, (1-12)
  12. ACM
    Vatjus-Anttila J, Hickey S and Kuusela E Methods and network architecture for modifying extensible virtual environment to support mobility Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, (45-52)
  13. ACM
    Nagata A, Yamamura S and Tsuru M Web browsing over multiple heterogeneous challenged networks Proceedings of the 6th ACM workshop on Challenged networks, (57-60)
  14. ACM
    Wang Y, Bi J, Peng C and Hu H UNA Proceedings of the 6th International Conference on Future Internet Technologies, (13-18)
  15. ACM
    Higgins B, Reda A, Alperovich T, Flinn J, Giuli T, Noble B and Watson D Intentional networking Proceedings of the sixteenth annual international conference on Mobile computing and networking, (73-84)
  16. Andersson K, Forte A and Schulzrinne H Enhanced mobility support for roaming users Proceedings of the 8th international conference on Wired/Wireless Internet Communications, (52-63)
  17. De Souza Pereira J, Kofuji S and Rosa P Horizontal address ontology in internet architecture Proceedings of the 3rd international conference on New technologies, mobility and security, (116-121)
  18. De Souza Pereira J, Kofuji S and Rosa P Distributed systems ontology Proceedings of the 3rd international conference on New technologies, mobility and security, (69-73)
  19. ACM
    Neville-Neil G (2009). Whither Sockets?, Queue, 7:4, (34-35), Online publication date: 1-May-2009.
  20. ACM
    Lin Y and Wu Q On design of bandwidth scheduling algorithms for multiple data transfers in dedicated networks Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, (151-160)
  21. Nelson V, Tania J and Yezekael H Performance of SCTP in Wi-Fi and WiMAX networks with multi-homed mobiles Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools, (1-10)
  22. Tsai H and Lai W (2008). Improving fairness among TCP flows by stateless buffer control with early drop maximum, Information Sciences: an International Journal, 178:19, (3697-3715), Online publication date: 1-Oct-2008.
  23. ACM
    Wang J and Wu Q Porting VoIP applications to DCCP Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-6)
  24. ACM
    Goel A, Krasic C and Walpole J (2008). Low-latency adaptive streaming over tcp, ACM Transactions on Multimedia Computing, Communications, and Applications, 4:3, (1-20), Online publication date: 1-Aug-2008.
  25. Mouskos K, Uyar M, Kawaguchi A and Parker N A real-time integrated transport/communication/database architecture to support traffic simulation Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, (1-6)
  26. ACM
    Kuo F and Fu X (2008). Probe-Aided MulTCP, ACM SIGCOMM Computer Communication Review, 38:1, (17-28), Online publication date: 30-Jan-2008.
  27. ACM
    Andersson K, Granlund D and Åhlund C M: multimedia mobility manager Proceedings of the 6th international conference on Mobile and ubiquitous multimedia, (6-13)
  28. ACM
    Koponen T, Chawla M, Chun B, Ermolinskiy A, Kim K, Shenker S and Stoica I (2007). A data-oriented (and beyond) network architecture, ACM SIGCOMM Computer Communication Review, 37:4, (181-192), Online publication date: 1-Oct-2007.
  29. Penoff B, Tsai M, Iyengar J and Wagner A Using CMT in SCTP-based MPI to exploit multiple interfaces in cluster nodes Proceedings of the 14th European conference on Recent Advances in Parallel Virtual Machine and Message Passing Interface, (204-212)
  30. Kolano P Maintaining high performance communication under least privilege using dynamic perimeter control Proceedings of the 12th European conference on Research in Computer Security, (38-54)
  31. ACM
    Harcsik S, Petlund A, Griwodz C and Halvorsen P Latency evaluation of networking mechanisms for game traffic Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games, (129-134)
  32. ACM
    Rong L, Fredj M, Issarny V and Georgantas N Mobility management in B3G networks International workshop on Engineering of software services for pervasive environments: in conjunction with the 6th ESEC/FSE joint meeting, (41-45)
  33. ACM
    Mitsuya K, Kuntz R, Sugimoto S, Wakikawa R and Murai J A policy management framework for flow distribution on multihomed end nodes Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-7)
  34. ACM
    Koponen T, Chawla M, Chun B, Ermolinskiy A, Kim K, Shenker S and Stoica I A data-oriented (and beyond) network architecture Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (181-192)
  35. ACM
    Sheu T and Tu C Dynamic chunk adjustment for prioritized SCTP video streaming in heterogeneous WLAN and UMTS networks Proceedings of the 2007 international conference on Wireless communications and mobile computing, (612-617)
  36. ACM
    O'Hara J (2007). Toward a Commodity Enterprise Middleware, Queue, 5:4, (48-55), Online publication date: 1-May-2007.
  37. Niamanesh M, Sabetghadam S, Rahaghi R and Jalili R Design and implementation of a dynamic-reconfigurable architecture for protocol stack Proceedings of the 2007 international conference on Fundamentals of software engineering, (396-403)
  38. Niamanesh M and Jalili R Formalizing compatibility and substitutability in communication protocols using I/O-constraint automata Proceedings of the 2007 international conference on Fundamentals of software engineering, (49-64)
  39. Budzisz L, Ferrus R, Grinnemo K, Brunstrom A and Casadevall F An Analytical Estimation of the Failover Time in SCTP Multihoming Scenarios Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3929-3934)
  40. Iyengar J, Amer P and Stewart R (2007). Performance implications of a bounded receive buffer in concurrent multipath transfer, Computer Communications, 30:4, (818-829), Online publication date: 15-Feb-2007.
  41. ACM
    Chassot C, Drira K, Armando F, Exposito E and Lozes A A model-based coordinated adaptability framework for QoS management in cooperative mobile and wireless applications Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems, (118-125)
  42. Bertolino A, Bonivento A, De Angelis G and Vincentelli A Modeling and early performance estimation for network processor applications Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems, (753-767)
  43. ACM
    Gauch A and Nishida Y SCTP profiling framework for multi-homed environment Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, (54-56)
  44. ACM
    Sakakibara H, Saito M and Tokuda H Design and implementation of a socket-level bandwidth aggregation mechanism for wireless networks Proceedings of the 2nd annual international workshop on Wireless internet, (11-es)
  45. Tschofenig H and Fu X (2006). Securing the Next Steps In Signalling (NSIS) protocol suite, International Journal of Internet Protocol Technology, 1:4, (271-282), Online publication date: 1-Aug-2006.
  46. Hohendorf C, Rathgeb E, Unurkhaan E and Tüxen M Secure end-to-end transport over SCTP Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security, (381-395)
  47. ACM
    Natarajan P, Iyengar J, Amer P and Stewart R SCTP Proceedings of the 15th international conference on World Wide Web, (615-624)
  48. Mölsä J Cross-layer designs for mitigating range attacks in ad hoc networks Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks, (64-69)
  49. ACM
    Pang R, Allman M, Paxson V and Lee J (2006). The devil and packet trace anonymization, ACM SIGCOMM Computer Communication Review, 36:1, (29-38), Online publication date: 10-Jan-2006.
  50. Kim K, Min S and Han Y Fast handover method for mSCTP using FMIPv6 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (846-855)
  51. Gu Y and Grossman R Supporting Configurable Congestion Control in Data Transport Services Proceedings of the 2005 ACM/IEEE conference on Supercomputing
  52. Kim H and Oh B Implementation of credit-control authorization with embedded mobile IPv6 authentication Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (250-260)
  53. ACM
    Koga H, Haraguchi H, Iida K and Oie Y A framework for network media optimization in multihomed QoS networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (38-42)
  54. Bertolino A, De Angelis G and Mirandola R UML-based Design of Network Processors Applications Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, (424-431)
  55. Dreibholz T and Rathgeb E RSerPool - Providing Highly Available Services using Unreliable Servers Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, (396-403)
  56. Uruena M and Larrabeiti D Nested Uniform Resource Identifiers Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, (380-385)
  57. Han B and Billington J Termination properties of TCP's connection management procedures Proceedings of the 26th international conference on Applications and Theory of Petri Nets, (228-249)
  58. Lindskog S, Grinnemo K and Brunstrom A Data protection based on physical separation Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (1331-1340)
  59. Hong K, Jeong K, Choi D and Hong C A performance improvement scheme of stream control transmission protocol over wireless networks Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (195-203)
  60. Subhadrabandhu D, Sarkar S and Anjum F RIDA Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (1069-1082)
  61. Jungmaier A and Rathgeb E A novel method for SCTP load sharing Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (1453-1456)
  62. Alamgir R, Atiquzzaman M and Ivancic W Impact of retransmission mechanisms on the performance of SCTP and TCP Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science, (1-6)
  63. Dreibholz T, Rathgeb E and Tüxen M Load distribution performance of the reliable server pooling framework Proceedings of the 4th international conference on Networking - Volume Part II, (564-574)
  64. Gineste M and Sénac P Quality of service solutions in satellite communication Proceedings of the 4th international conference on Networking - Volume Part I, (144-152)
  65. Welzl M (2005). Passing corrupt data across network layers, EURASIP Journal on Advances in Signal Processing, 2005, (242-247), Online publication date: 1-Jan-2005.
  66. ACM
    Eddy W, Ostermann S and Allman M (2004). New techniques for making transport protocols robust to corruption-based loss, ACM SIGCOMM Computer Communication Review, 34:5, (75-88), Online publication date: 15-Oct-2004.
  67. Renier T, Schwefel H, Bozinovski M, Larsen K, Prasad R and Seidl R Distributed redundancy or cluster solution? an experimental evaluation of two approaches for dependable mobile internet services Proceedings of the First international conference on Service Availability, (33-47)
  68. ACM
    Patel P, Whitaker A, Wetherall D, Lepreau J and Stack T (2003). Upgrading transport protocols using untrusted mobile code, ACM SIGOPS Operating Systems Review, 37:5, (1-14), Online publication date: 1-Dec-2003.
  69. ACM
    Patel P, Whitaker A, Wetherall D, Lepreau J and Stack T Upgrading transport protocols using untrusted mobile code Proceedings of the nineteenth ACM symposium on Operating systems principles, (1-14)
  70. Samtani S, Iyengar J and Fecko M SCTP multistreaming Proceedings of the 2003 IEEE conference on Military communications - Volume II, (966-970)
  71. ACM
    Kaur H, Kalyanaraman S, Weiss A, Kanwar S and Gandhi A (2003). BANANAS, ACM SIGCOMM Computer Communication Review, 33:4, (277-288), Online publication date: 1-Oct-2003.
  72. ACM
    Scott J and Mapp G (2003). Link layer-based TCP optimisation for disconnecting networks, ACM SIGCOMM Computer Communication Review, 33:5, (31-42), Online publication date: 1-Oct-2003.
  73. ACM
    Kaur H, Kalyanaraman S, Weiss A, Kanwar S and Gandhi A BANANAS Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (277-288)
  74. Mogul J TCP offload is a dumb idea whose time has come Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9, (5-5)
  75. ACM
    Saif U and Mazzola Paluska J Service-Oriented Network Sockets Proceedings of the 1st international conference on Mobile systems, applications and services, (159-172)
  76. ACM
    Conrad P, Caro A and Amer P ReMDoR Proceedings of the ninth ACM international conference on Multimedia, (169-180)
  77. ACM
    Lennox J, Murakami K, Karaul M and La Porta T (2001). Interworking internet telephony and wireless telecommunications networks, ACM SIGCOMM Computer Communication Review, 31:5, (25-36), Online publication date: 1-Oct-2001.
Contributors
  • Huawei Technologies Co., Ltd., USA
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations