Changes between Version 8 and Version 9 of Internal/OpenFlow/SandBoxSetup


Ignore:
Timestamp:
Jul 16, 2009, 9:01:22 PM (15 years ago)
Author:
akoshibe
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Internal/OpenFlow/SandBoxSetup

    v8 v9  
    4040Eth1 should be down because it compromises the routing table.   
    4141
    42 == Making the controller from the OpenFlow Reference System Code. (7/15) ==
     42== Making the controller from the !OpenFlow Reference System Code. (7/14, 7/15) ==
    4343The !OpenFlow reference system contains code for a controller that makes an !OpenFlow switch into a learning switch. This was built (but not installed) on the Console by following instructions on the !OpenFlow site: http://www.openflowswitch.org/wk/index.php/Ubuntu_Install
    4444
    4545The console was then configured to be VLAN aware for VLANs 27,28, and 100. The site referenced: http://ubuntuforums.org/showthread.php?t=703387
    4646
    47 The interfaces, according to /etc/network/interfaces
     47The interfaces looked like this at the end:
    4848{{{
    4949# The primary network interface
     
    129129=== establishing switch-controller connections ===
    130130The code for the controller is found intuitively in the controller directory. Using `ptcp:[port]` as the connection method seems to work.
    131 we also wanted an output and log of everything, so the full command was this (from the controller's directory) :
     131we also wanted an output and a log of everything, so the full command was this (from the controller's directory) :
    132132
    133133./controller ptcp:6633 -v --log-file=test.log
     
    163163}}}
    164164
    165    
     165=== packet sniffing ===
     166The experiment that was packet-sniffed included the following steps:
    166167 
     168 1. unplug all hosts connected to the virtual switch (VLAN 28 ports)
     169 1. start the controller
     170 1. plug in one host at a time
    167171
     172tcpdump was used to packet sniff on the VLAN100 interface on SB9 with this command:
    168173
     174 tcpdump -i eth1.100 -w foo.pcap
     175
     176Here, the log is saved in foo.pcap. This was later opened in wireshark on another PC (Given X11 didn't break, wireshark on sb9 would would have worked) using the command
     177
     178 wireshark -r foo.pcap &
     179 
     180Wireshark can be updated with a !OpenFlow dissector that comes with the !OpenFlow reference system. [[BR]]
     181Directions on updating wireshark: http://www.openflowswitch.org/wk/index.php/Ubuntu_Install#Install_Wireshark_Dissector 
     182
     183The experiment was later recreated with the Sandbox nodes.
     184
     185 1. start packetsniffer
     186 1. start controller
     187 1. bring nodes up
     188 1. have one node ping another
     189 1. 60 second idle time
     190 1. ping again
    169191
    170192[[BR]]