Stream control transmission protocol (SCTP) : a reference guide = 流控制传输协议SCTP参考指南 /

副标题:无

作   者:Randall R. Stewart, Qiaobing Xie.

分类号:

ISBN:9787900643957

微信扫一扫,移动浏览光盘

简介

   流控制传输协议SCTP是新一代的通用IP传输协议,已由IETF标准化RFC2960。熟悉TCP/IP的人可以简单地将SCTP看作是“超级TCP”,因为SCTP不仅与TCP很像,而且扩展了TCP的许多功能。SCTP是在IP上建立下一代高质量通信和电子商务应用的关键部分,被一些标准化组织认为是TCP的继承者。SCTP对TCP和UDP的两项主要扩展是支持多地址主机和支持单个SCTP关联(association)具有多个流。多地址主机支持使一个SCTP关联横跨多条路径,实现了路径冗余。多流支持允许用户定义子流,消息在子流内按序传输,因此可以解决队首阻塞问题。    本书详细叙述了SCTP的协议内容和应用实现。主要内容为:1.SCTP简介;2.SCTP端点和关联;3.SCTP消息格式;4.关联的建立;5.用户数据传偷;6.拥塞控制和回避;7.故障检测和恢复;8.SCTP的包处理功能;9.关联的关闭;10.IANA和SCTP;11.SCTP的Socket API;12.SCTP与TCP对比;13.使用SCTP流;14.SCTP的用户空间实现。    本书是一本关于RFC2960 SCTP的权威论述。书中所附光盘包含完整的SCTP实现。本书可作高校计算机网络和通信相关专业的教材和教参,同时也可作网络通信开发人员的参考书。   

目录

foreword

preface

introduction and overview

1.1 ip networking basics

1.1.1 how messages are delivered in an ip network

1.1.2 ip protocols

1.1.3 ip multi-homing

1.2 what is sctp?

1.2.1 where does sctp fit in the ip architecture?

1.3 motivation for developing sctp

1.3.1 tcp limitations

1.3.2 udp limitations

1.3.3 sctp enhancements over tcp and udp

1.4 a short history of sctp development

1.4.1 early works before the ietf and mdtp

1.4.2 ietf refinements

1.5 major general sctp issues debated in the ietf

1.5.1 do we really need a new transport protocol?

1.5.2 over udp versus over ip

1.6 organization of this book

.1.7 summary

1.8 questions

2 sctp endpoint and association

2.1 sctp transport address

2.2 sctp endpoint

2.2.1 multi-homed sctp endpoint

2.3 sctp association

2.4 operation of an sctp association

2.4.1 functional view of an association

2.4.2 functional responsibilities of an sctp endpoint

2.4.3 operation states of an association

2.5 ietf debate and issues

2.6 summary

2.7 questions

3 format of sctp messages

3.1 basic layout--the bits on the wire

3.1.1 the sctp common header

3.1.2 elements in a chunk

3.1.3 defined chunk types and extensibility

3.1.4 general rules when dealing with chunks

3.1.5 chunk parameters

3.1.6 other considerations

3.2 basic chunk descriptions

3.2.1 the init chunk

3.2.2 the init-ack chunk

3.2.3 the cookie-echo chunk

3.2.4 the cookie-ack chunk

3.2.5 the data chunk

3.2.6 the sack chunk

3.2.7 the heartbeat chunk

3.2.8 the heartbeat-ack chunk

3.2.9 the shutdown chunk

3.2.10 the shutdown-ack chunk

3.2.11 the shutdown-complete chunk

3.2.12 the error chunk

3.2.13 the error cause parameters

3.2.14 the abort chunk

3.3 ietf debate and issue

3.4 summary

3.5 questions

4 setup of an association

4.1 the init chunk

4.1.1 formulating the chunk

4.1.2 init parameters

4.1.3 timer and retransmission for init

4.2 the init-ack response

4.2.1 formulating the response

4.2.2 init-ack parameters

4.2.3 preventing resource attacks

4.3 the cookie-echo chunk

4.3.1 formulating the chunk

4.3.2 bundling data with the cookie-echo

4.3.3 timer and retransmission for cookie-echo

4.4 the cookie-ack chunk

4.4.1 validating and unpacking the cookie

4.4.2 formulating the cookie-ack

4.4.3 bundling data and sack with cookie-ack

4.5 address usage when starting an association

4.6 chunk rejections during an association setup

4.6.1 when is an init not acceptable?

4.6.2 when is a cookie not worth eating?

4.7 handling unexpected initialization chunks

4.7.1 association tie-tags and their values

4.7.2 handling overlapping initialization chunks

4.7.3 case study 1: initialization collision

4.7.4 case study 2: peer restart

4.7.5 a lost cookie-ack

4.8 ietf debate and issues

4.9 summary

4.10 questions

5 user data transfer

5.1 user message transfer overview

5.1.1 how user messages are sent

5.1.2 how user messages are received

5.1.3 summary of data transfer overview

5.2 obeying the transmission rules

5.2.1 congestion window and receiver window

5.2.2 rules for data transmission

5.3 acknowledgment rules

5.3.1 where should a sack be sent?

5.3.2 when should a sack be sent?

5.3.3 what should be reported in a sack?

5.3.4 revoking an acknowledgment by the receiver

5.3.5 processing of received sack by data sender

5.4 management of retransmission timer

5.4.1 determine retransmission timeout (rto)

5.4.2 retransmission timer rules

5.4.3 handling retransmission timer expiration

5.5 multi-homed data sender and receiver

5.5.1 selection of primary transport address

5.5.2 transferring data between multi-homed endpoints

5.5.3 sending a sack on duplicate data

5.6 stream identifier and stream sequence number

5.6.1 ordered and unordered message delivery

5.7 passing a payload protocol identifier

5.8 fragmentation and bundling of user messages

5.8.1 when should user messages be fragmented?

5.8.2 how should a user message be fragmented?

5.8.3 reassembling a fragmented message at the data receiver

5.8.4 user message bundling

5.9 adler-32 checksum

5.9.1 generation of the adler-32 checksum by the data sender

5.9.2 validation of the adler-32 checksum by the data receiver

5.10 error handling

5.10.1 handling a data chunk with an invalid stream identifier

5.10.2 handling an empty data chunk

5.10.3 handling out-of-state data

5.11 ietf debate and issues

5.12 summary

5.13 questions

6 congestion control and a voidance

6.1 the cause of network congestion collapse

6.2 basic concept of congestion control

6.3 sctp congestion control algorithm

6.3.1 how does your cwnd grow?

6.3.2 how does your cwnd shrink?

6.4 interesting details of the algorithms

6.5 path mtu discovery

6.5.1 a refresher on how pmtu works

6.5.2 pmtu discovery in sctp

6.6 explicit congestion notification

6.7 ietf debate and issues

6.8 summary

6.9 questions

7 failure detection and recovery

7.1 the types of failure sctp detects

7.1.1 unreachable destination address

7.1.2 unreachable peer endpoint

7.2 how to detect an unreachable address

7.2.1 using heartbeat chunks to monitor reachability

7.2.2 address-unreachability detection algorithm

7.2.3 more on using the sctp heartbeat

7.2.4 handling an unreachable primary destination address

7.3 how to detect an unreachable peer

7.3.1 when an association enters the dormant state

7.4 fault resilience communication and routing configuration

7.4.1 maximizing path diversity

7.4.2 asymmetric multi-homing configuration

7.4.3 effects of source address selection

7.5 ietf debate and issues

7.6 summary

7.7 questions

8 auxiliary sctp packet handling functions

8.1 handling out-of-the-blue sctp packets

8.2 sctp packet verification tag rules

8.2.1 basic verification tag rules

8.2.2 special verification tag rules

8.3 ietf debate and discussion

8.4 summary

8.5 questions

9 close of an association

9.1 the graceful shutdown

9.1.1 sending shutdown

9.1.2 receiving shutdown

9.1.3 sending shutdown-complete

9.1.4 race conditions and lost messages

9.2 the abortive shutdown

9.2.1 abort usage

9.2.2 sending an abort

9.2.3 receiving an abort

9.3 ietf debate and issues

9.4 summary

9.5 questions

10 iana and future extension of sctp

10.1 sctp port number assignment

10.2 ietf chunk extensions

10.3 ietf parameter extensions

10.4 ietf extensions to error causes

10.5 payload protocol identifier

10.6 summary

11 a sockets api for sctp

11.1 a quick review of the tcp sockets api

11.1.1 the server-side application

11.1.2 the client-side application

11.2 the tcp-style sctp sockets api extension

11.3 the udp-style sctp sockets api extension

11.3.1 a view of a client using a udp-style sctp socket

11.3.2 a view of a server using a udp-style sctp socket

11.4 common api mechanisms for both models

11.4.1 using the sendmsg0 and recvmsg0 calls with sctp

11.4.2 notification information

11.5 summary

11.6 questions

12 comparing sctp to tcp

12.1 the similarities between sctp and tcp

12.1.1 startup

12.1.2 reliability and ordering

12.1.3 congestion control

12.1.4 closing down

12.2 the differences between sctp and tcp

12.2.1 differences at startup

12.2.2 head-of-line blocking

12.2.3 message boundaries

12.2.4 unordered delivery

12.2.5 selective acknowledgment

12.2.6 multi-homing

12.2.7 a closing difference

12.3 summary

12.4 questions

13 using streams in sctp

13.1 a file transfer application

13.2 a telephone call control application

13.3 a web browser

13.4 summary

13.5 questions

14 a user space implementation of sctp

14.1 the big picture

14.2 data structures

14.3 events and the api

14.4 association setup

14.4.1 when an upper layer issues an associate primitive

14.4.2 when a peer sends the sctp endpoint an init

14.5 data transfer

14.5.1 sack processing

14.5.2 inbound data chunk processing

14.5.3 finishing off by sending

14.6 congestion control, pmtu, and rto

14.6.1 congestion control

14.6.2 pmtu discovery

14.6.3 rto calculation

14.7 fault management

14.8 tag and out-of-the-blue handling

14.9 association close-down

14.9.1 at the upper layer's request

14.9.2 reception of a shutdown

14.10 summary

references

glossary and abbreviations

index


已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

Stream control transmission protocol (SCTP) : a reference guide = 流控制传输协议SCTP参考指南 /
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    亲爱的云图用户,
    光盘内的文件都可以直接点击浏览哦

    无需下载,在线查阅资料!

    loading icon