SCTP Full Form Last Updated : 18 Sep, 2024 Comments Improve Suggest changes Like Article Like Report SCTP stands for Stream Control Transmission Protocol. It is a connection- oriented protocol in computer networks which provides a full-duplex association i.e., transmitting multiple streams of data between two end points at the same time that have established a connection in network. It is sometimes referred to as next generation TCP or TCPng, SCTP makes it easier to support telephonic conversation on Internet. A telephonic conversation requires transmitting of voice along with other data at the same time on both ends, SCTP protocol makes it easier to establish reliable connection. SCTP is also intended to make it easier to establish connection over wireless network and managing transmission of multimedia data. SCTP is a standard protocol (RFC 2960) and is developed by Internet Engineering Task Force (IETF). SCTP as a standard protocolCharacteristics of SCTP Unicast with Multiple properties - It is a point-to-point protocol which can use different paths to reach end host.Reliable Transmission - It uses SACK and checksums to detect damaged, corrupted, discarded, duplicate and reordered data. It is similar to TCP but SCTP is more efficient when it comes to reordering of data.Message oriented - Each message can be framed and we can keep order of datastream and tabs on structure. For this, In TCP, we need a different layer for abstraction.Multi-homing - It can establish multiple connection paths between two end points and does not need to rely on IP layer for resilience.Security - Another characteristic of SCTP that is security. In SCTP, resource allocation for association establishment only takes place following cookie exchange identification verification for the client (INIT ACK). Man-in-the-middle and denial-of-service attacks are less likely as a result. Furthermore, SCTP doesn't allow for half-open connections, making it more resistant to network floods and masquerade attacks.Advantages of SCTP It is a full- duplex connection i.e. users can send and receive data simultaneously.It allows half- closed connections.The message's boundaries are maintained and application doesn't have to split messages.It has properties of both TCP and UDP protocol.It doesn't rely on IP layer for resilience of paths.Disadvantages of SCTP One of key challenges is that it requires changes in transport stack on node.Applications need to be modified to use SCTP instead of TCP/UDP.Applications need to be modified to handle multiple simultaneous streams.ConclusionIt is a connection-oriented, reliable protocol that allows multiple data streams between two endpoints. SCTP does provide some profound enhancements to traditional TCP and UDP by supporting multi-homing, message orientation, and security enhancements. Applications most suited to exploit its advantages are VoIP and multimedia transmission. This comes with certain overhead, like alteration of the existing transport stack and modifications to the applications for SCTP adoption. Comment More infoAdvertise with us Next Article What is Data Encryption? P pratiksha6294 Follow Improve Article Tags : Computer Networks Full Form Similar Reads What is OSI Model? - Layers of OSI Model The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. OSI Model was developed by the International Organization for Standardization (ISO). The OSI Model consists of 7 layers and each layer has specific functions and re 13 min read OSI Model BasicsOSI Model Full Form - Open System InterconnectionThe OSI stands for Open System Interconnection. OSI model is a conceptual framework that defines how computers communicate with each other over a network. It consists of seven layers, each with its own specific function and set of protocols. In this article, we are going to discuss OSI model, its se 9 min read OSI Full FormOSI stands for Open Systems Interconnection. It is a model used in computer networking to explain how data moves from one device to another across a network. The OSI model has 7 layers, and each layer has a specific function, from sending raw data to delivering it to the right application. It helps 5 min read Working of ISO-OSI ModelThe ISO-OSI (International organization of Standardization - Open System Interconnection) says to group together the functions which are related to each other. The Functions in OSI Model that are needed for proper communication can be divided into 2 types :- 1. Mandatory Functions: Here the implemen 7 min read Critique of OSI Model and ProtocolsOpen System Interconnection (OSI) model is reference model that is used to describe and explain how does information from software application in one of computers moves freely through physical medium to software application on another computer. This model consists of total of seven layers and each o 4 min read OSI Model and TCP/IP ModelSimilarities Between OSI Model and TCP/IP ModelOSI Model or Open Systems Interconnection is an architecture of 7 layers in which each layer has its work to perform. In contrast, TCP/IP is a concise version of the OSI Model. The TCP/IP Model consists of 4 layers rather than the 7 layers of the OSI Model. In this article, we will look into the sim 6 min read This is exactly why we still use the OSI model when we have TCP/IP ModelWhat is the OSI Model?OSI is an acronym for Open Systems Interconnection. The International Organization for Standardization (ISO) created the OSI model (ISO). It's a model for how applications communicate over the internet. In order to facilitate interoperability between diverse devices and applica 10 min read How Communication happens using OSI model The Open System Interconnection (OSI) model is a standard âreference modelâ created by an International Organization for Standardization (ISO) to describe how software and hardware components involved in network communication divide efforts and interact with each other. The OSI model defines a seven 4 min read Physical LayerTypes of Network TopologyNetwork topology refers to the arrangement of different elements like nodes, links, or devices in a computer network. Common types of network topology include bus, star, ring, mesh, and tree topologies, each with its advantages and disadvantages. In this article, we will discuss different types of n 12 min read Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)Transmission modes also known as communication modes, are methods of transferring data between devices on buses and networks designed to facilitate communication. They are classified into three types: Simplex Mode, Half-Duplex Mode, and Full-Duplex Mode. In this article, we will discuss Transmission 6 min read Data Link LayerLogical Link Control (LLC) Protocol Data UnitLogical Link Control (LLC) is a sublayer that generally provides the logic for the data link as it controls the synchronization, multiplexing, flow control, and even error-checking functions of DLL (Data Link Layer). DLL is divided into two sublayers i.e. LLC sublayer and MAC (Medium Access Control) 3 min read Framing in Data Link LayerFrames are the units of digital transmission, particularly in computer networks and telecommunications. Frames are comparable to the packets of energy called photons in the case of light energy. Frame is continuously used in Time Division Multiplexing process. Framing is a point-to-point connection 6 min read Error Control in Data Link LayerData-link layer uses the techniques of error control simply to ensure and confirm that all the data frames or packets, i.e. bit streams of data, are transmitted or transferred from sender to receiver with certain accuracy. Using or providing error control at this data link layer is an optimization, 4 min read Flow Control in Data Link LayerFlow control is design issue at Data Link Layer. It is a technique that generally observes the proper flow of data from sender to receiver. It is very essential because it is possible for sender to transmit data or information at very fast rate and hence receiver can receive this information and pro 4 min read Access Control in Computer NetworkAccess control is a security strategy that controls who or what can view or utilize resources in a computer system. It is a fundamental security concept that reduces risk to the company or organization. In this article, we are going to discuss every point about access control. In this article, we wi 7 min read Examples of Data Link Layer ProtocolsData Link Layer protocols are generally responsible for ensuring and confirming that the bits and bytes received are identical to the bits and bytes being transferred. It is a set of specifications that are used for the implementation of the data link layer just above the physical layer of the Open 5 min read Network LayerNetwork Layer ServicesThe network layer is a part of the communication process in computer networks. Its main job is to move data packets between different networks. It helps route these packets from the sender to the receiver across multiple paths and networks. Network-to-network connections enable the Internet to funct 6 min read Network ProtocolsNetwork Protocols are a set of guidelines governing the exchange of information in a simple, dependable and secure way. Network protocols are formal standards and policies comprised of rules, methodology, and configurations that define communication between two or more devices over a network. To eff 3 min read What is an IP Address?Imagine every device on the internet as a house. For you to send a letter to a friend living in one of these houses, you need their home address. In the digital world, this home address is what we call an IP (Internet Protocol) Address. It's a unique string of numbers separated by periods (IPv4) or 14 min read ARP, Reverse ARP(RARP), Inverse ARP (InARP), Proxy ARP and Gratuitous ARPPrerequisite IP Addressing, Introduction of MAC Addresses, Basics of Address Resolution Protocol (ARP) In this article, we will discuss about whole ARP-family, which are ARP, RARP, InARP, Proxy ARP and Gratuitous ARP. Let's try to understand each one by one.1. Address Resolution Protocol (ARP) -Addr 6 min read Internet Control Message Protocol (ICMP)Internet Control Message Protocol is known as ICMP. The protocol is at the network layer. It is mostly utilized on network equipment like routers and is utilized for error handling at the network layer. Since there are various kinds of network layer faults, ICMP can be utilized to report and trouble 11 min read What is IGMP(Internet Group Management Protocol)?IGMP is an acronym for Internet Group Management Protocol. IGMP is a communication protocol used by hosts and adjacent routers for multicasting communication with IP networks and uses the resources efficiently to transmit the message/data packets. Multicast communication can have single or multiple 9 min read Transport LayerTransport Layer responsibilitiesThe transport Layer is the second layer in the TCP/IP model and the fourth layer in the OSI model. It is an end-to-end layer used to deliver messages to a host. It is termed an end-to-end layer because it provides a point-to-point connection rather than hop-to-hop, between the source host and destin 5 min read Error Control in TCPPrerequisite - TCP/IP Model TCP protocol has methods for finding out corrupted segments, missing segments, out-of-order segments and duplicated segments. Error control in TCP is mainly done through the use of three simple techniques : Checksum - Every segment contains a checksum field which is used 2 min read What is TCP (Transmission Control Protocol)?Transmission Control Protocol (TCP) is a connection-oriented protocol for communications that helps in the exchange of messages between different devices over a network. It is one of the main protocols of the TCP/IP suite. In OSI model, it operates at the transport layer(Layer 4). It lies between th 5 min read User Datagram Protocol (UDP)User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. So, there is no need to establish a connection before data transfer. The UDP helps to establish low-late 10 min read SCTP Full FormSCTP stands for Stream Control Transmission Protocol. It is a connection- oriented protocol in computer networks which provides a full-duplex association i.e., transmitting multiple streams of data between two end points at the same time that have established a connection in network. It is sometimes 3 min read Presentation LayerWhat is Data Encryption?Data encryption is the process of converting readable information (plaintext) into an unreadable format (ciphertext) to protect it from unauthorized access. It is a method of preserving data confidentiality by transforming it into ciphertext, which can only be decoded using a unique decryption key p 10 min read Introduction to Data CompressionIn this article, we will discuss the overview of Data Compression and will discuss its method illustration, and also will cover the overview part entropy. Let's discuss it one by one. Overview :One important area of research is data compression. It deals with the art and science of storing informati 2 min read Application LayerProtocols in Application LayerThe Application Layer is the topmost layer in the Open System Interconnection (OSI) model. This layer provides several ways for manipulating the data which enables any type of user to access the network with ease. The Application Layer interface directly interacts with the application and provides c 7 min read File Transfer Protocol (FTP)File transfer protocol (FTP) is an Internet tool provided by TCP/IP. The first feature of FTP was developed by Abhay Bhushan in 1971. It helps to transfer files from one computer to another by providing access to directories or folders on remote computers and allows software, data, and text files to 8 min read HTTP Full Form - Hypertext Transfer ProtocolHTTP stands for Hypertext Transfer Protocol, and itâs the system that allows communication between web browsers (like Google Chrome or Firefox) and websites. When you visit a website, your browser uses HTTP to send a request to the server hosting that site, and the server sends back the data needed 7 min read Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol (SMTP) is an application layer protocol used for exchanging email messages between servers. It is essential in the email communication process and operates at the application layer of the TCP/IP stack.To send an email, the client opens a TCP connection to the SMTP serve 9 min read Introduction to TELNETTELNET stands for Teletype Network. It is a client/server application protocol that provides access to virtual terminals of remote systems on local area networks or the Internet. The local computer uses a telnet client program and the remote computers use a telnet server program. In this article, we 7 min read Like