Changes between Version 8 and Version 9 of Internal/OpenFlow/SandBoxSetup
- Timestamp:
- Jul 16, 2009, 9:01:22 PM (15 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Internal/OpenFlow/SandBoxSetup
v8 v9 40 40 Eth1 should be down because it compromises the routing table. 41 41 42 == Making the controller from the OpenFlow Reference System Code. (7/15) ==42 == Making the controller from the !OpenFlow Reference System Code. (7/14, 7/15) == 43 43 The !OpenFlow reference system contains code for a controller that makes an !OpenFlow switch into a learning switch. This was built (but not installed) on the Console by following instructions on the !OpenFlow site: http://www.openflowswitch.org/wk/index.php/Ubuntu_Install 44 44 45 45 The console was then configured to be VLAN aware for VLANs 27,28, and 100. The site referenced: http://ubuntuforums.org/showthread.php?t=703387 46 46 47 The interfaces , according to /etc/network/interfaces47 The interfaces looked like this at the end: 48 48 {{{ 49 49 # The primary network interface … … 129 129 === establishing switch-controller connections === 130 130 The code for the controller is found intuitively in the controller directory. Using `ptcp:[port]` as the connection method seems to work. 131 we also wanted an output and log of everything, so the full command was this (from the controller's directory) :131 we also wanted an output and a log of everything, so the full command was this (from the controller's directory) : 132 132 133 133 ./controller ptcp:6633 -v --log-file=test.log … … 163 163 }}} 164 164 165 165 === packet sniffing === 166 The experiment that was packet-sniffed included the following steps: 166 167 168 1. unplug all hosts connected to the virtual switch (VLAN 28 ports) 169 1. start the controller 170 1. plug in one host at a time 167 171 172 tcpdump was used to packet sniff on the VLAN100 interface on SB9 with this command: 168 173 174 tcpdump -i eth1.100 -w foo.pcap 175 176 Here, the log is saved in foo.pcap. This was later opened in wireshark on another PC (Given X11 didn't break, wireshark on sb9 would would have worked) using the command 177 178 wireshark -r foo.pcap & 179 180 Wireshark can be updated with a !OpenFlow dissector that comes with the !OpenFlow reference system. [[BR]] 181 Directions on updating wireshark: http://www.openflowswitch.org/wk/index.php/Ubuntu_Install#Install_Wireshark_Dissector 182 183 The experiment was later recreated with the Sandbox nodes. 184 185 1. start packetsniffer 186 1. start controller 187 1. bring nodes up 188 1. have one node ping another 189 1. 60 second idle time 190 1. ping again 169 191 170 192 [[BR]]