2019 SDN上机第3次作业 1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性 2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

设置h1主机的IP为10.0.0.1,h2的IP地址为10.0.0.2,开启CLI,并使其支持OpenFlow 1.0协议

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

第一个hello(交换机33586端口,控制器6633端口)

控制器6633端口(我最高能支持OpenFlow 1.0) ---> 交换机33586端口

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

第二个hello(交换机33586端口,控制器6633端口)

交换机35534端口(我最高能支持OpenFlow 1.0)--- 控制器6633端口
2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

于是双方建立连接,并使用OpenFlow 1.0

FEATURE_REQUEST(交换机33586端口,控制器6633端口)

控制器6633端口(我需要你的特征信息) ---> 交换机33586端口

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

SET_CONFIG(交换机33586端口,控制器6633端口)

控制器6633端口(请按照我给你的flag和max bytes of packet进行配置) ---> 交换机33586端口
2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

FEATURE_REPLY(交换机33586端口,控制器6633端口)

交换机33586端口(这是我的特征信息,请查收)--- 控制器6633端口
2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

Features 消息包括 OpenFlow Header 和 Features Reply Message
对照Features Reply Message结构

struct ofp_switch_features{
    struct ofp_header header;
    uint64_t datapath_id; /*唯一标识 id 号*/
    uint32_t n_buffers; /*交缓冲区可以缓存的最大数据包个数*/
    uint8_t n_tables; /*流表数量*/
    uint8_t pad[3]; /*align to 64 bits*/
    uint32_t capabilities; /*支持的特殊功能,具体见 ofp_capabilities*/
    uint32_t actions; /*支持的动作,具体见 ofp_actions_type*/
    struct ofp_phy_port ports[0]; /*物理端口描述列表,具体见 ofp_phy_port*/
};

报文内容

OpenFlow 1.0
    .000 0001 = Version: 1.0 (0x01)
    Type: OFPT_FEATURES_REPLY (6)
    Length: 176
    Transaction ID: 1171628170
    Datapath unique ID: 0x0000000000000001
        MAC addr: 00:00:00_00:00:00 (00:00:00:00:00:00)
        Implementers part: 0x0001
    n_buffers: 0
    n_tables: 254
    Pad: 000000
    capabilities: 0x000000c7
        .... .... .... .... .... .... .... ...1 = Flow statistics: True
        .... .... .... .... .... .... .... ..1. = Table statistics: True
        .... .... .... .... .... .... .... .1.. = Port statistics: True
        .... .... .... .... .... .... .... 0... = Group statistics: False
        .... .... .... .... .... .... ..0. .... = Can reassemble IP fragments: False
        .... .... .... .... .... .... .1.. .... = Queue statistics: True
        .... .... .... .... .... ...0 .... .... = Switch will block looping ports: False
    actions: 0x00000fff
        .... .... .... .... .... .... .... ...1 = Output to switch port: True
        .... .... .... .... .... .... .... ..1. = Set the 802.1q VLAN id: True
        .... .... .... .... .... .... .... .1.. = Set the 802.1q priority: True
        .... .... .... .... .... .... .... 1... = Strip the 802.1q header: True
        .... .... .... .... .... .... ...1 .... = Ethernet source address: True
        .... .... .... .... .... .... ..1. .... = Ethernet destination address: True
        .... .... .... .... .... .... .1.. .... = IP source address: True
        .... .... .... .... .... .... 1... .... = IP destination address: True
        .... .... .... .... .... ...1 .... .... = IP ToS (DSCP field, 6 bits): True
        .... .... .... .... .... ..1. .... .... = TCP/UDP source port: True
        .... .... .... .... .... .1.. .... .... = TCP/UDP destination port: True
        .... .... .... .... .... 1... .... .... = Output to queue: True
    Port data 1
        Port number: 65534
        HW Address: c2:0c:a4:bc:c3:4d (c2:0c:a4:bc:c3:4d)
        Port Name: s1
        Config flags: 0x00000001
            .... .... .... .... .... .... .... ...1 = Port is administratively down: True
            .... .... .... .... .... .... .... ..0. = Disable 802.1D spanning tree on port: False
            .... .... .... .... .... .... .... .0.. = Drop all packets except 802.1D spanning tree packets: False
            .... .... .... .... .... .... .... 0... = Drop received 802.1D STP packets: False
            .... .... .... .... .... .... ...0 .... = Do not include this port when flooding: False
            .... .... .... .... .... .... ..0. .... = Drop packets forwarded to port: False
            .... .... .... .... .... .... .0.. .... = Do not send packet-in msgs for port: False
        State flags: 0x00000001
            .... .... .... .... .... .... .... ...1 = No physical link present: True
        Current features: 0x00000000
            .... .... .... .... .... .... .... ...0 = 10 Mb half-duplex rate support: False
            .... .... .... .... .... .... .... ..0. = 10 Mb full-duplex rate support: False
            .... .... .... .... .... .... .... .0.. = 100 Mb half-duplex rate support: False
            .... .... .... .... .... .... .... 0... = 100 Mb full-duplex rate support: False
            .... .... .... .... .... .... ...0 .... = 1 Gb half-duplex rate support: False
            .... .... .... .... .... .... ..0. .... = 1 Gb full-duplex rate support: False
            .... .... .... .... .... .... .0.. .... = 10 Gb full-duplex rate support: False
            .... .... .... .... .... .... 0... .... = Copper medium: False
            .... .... .... .... .... ...0 .... .... = Fiber medium: False
            .... .... .... .... .... ..0. .... .... = Auto-negotiation: False
            .... .... .... .... .... .0.. .... .... = Pause: False
            .... .... .... .... .... 0... .... .... = Asymmetric pause: False
        Advertised features: 0x00000000
        Features supported: 0x00000000
        Features advertised by peer: 0x00000000
    Port data 2
        Port number: 1
        HW Address: ae:08:29:ac:eb:ae (ae:08:29:ac:eb:ae)
        Port Name: s1-eth1
        Config flags: 0x00000000
            .... .... .... .... .... .... .... ...0 = Port is administratively down: False
            .... .... .... .... .... .... .... ..0. = Disable 802.1D spanning tree on port: False
            .... .... .... .... .... .... .... .0.. = Drop all packets except 802.1D spanning tree packets: False
            .... .... .... .... .... .... .... 0... = Drop received 802.1D STP packets: False
            .... .... .... .... .... .... ...0 .... = Do not include this port when flooding: False
            .... .... .... .... .... .... ..0. .... = Drop packets forwarded to port: False
            .... .... .... .... .... .... .0.. .... = Do not send packet-in msgs for port: False
        State flags: 0x00000000
            .... .... .... .... .... .... .... ...0 = No physical link present: False
        Current features: 0x000000c0
            .... .... .... .... .... .... .... ...0 = 10 Mb half-duplex rate support: False
            .... .... .... .... .... .... .... ..0. = 10 Mb full-duplex rate support: False
            .... .... .... .... .... .... .... .0.. = 100 Mb half-duplex rate support: False
            .... .... .... .... .... .... .... 0... = 100 Mb full-duplex rate support: False
            .... .... .... .... .... .... ...0 .... = 1 Gb half-duplex rate support: False
            .... .... .... .... .... .... ..0. .... = 1 Gb full-duplex rate support: False
            .... .... .... .... .... .... .1.. .... = 10 Gb full-duplex rate support: True
            .... .... .... .... .... .... 1... .... = Copper medium: True
            .... .... .... .... .... ...0 .... .... = Fiber medium: False
            .... .... .... .... .... ..0. .... .... = Auto-negotiation: False
            .... .... .... .... .... .0.. .... .... = Pause: False
            .... .... .... .... .... 0... .... .... = Asymmetric pause: False
        Advertised features: 0x00000000
        Features supported: 0x00000000
        Features advertised by peer: 0x00000000
    Port data 3
        Port number: 2
        HW Address: da:07:1d:af:22:c2 (da:07:1d:af:22:c2)
        Port Name: s1-eth2
        Config flags: 0x00000000
            .... .... .... .... .... .... .... ...0 = Port is administratively down: False
            .... .... .... .... .... .... .... ..0. = Disable 802.1D spanning tree on port: False
            .... .... .... .... .... .... .... .0.. = Drop all packets except 802.1D spanning tree packets: False
            .... .... .... .... .... .... .... 0... = Drop received 802.1D STP packets: False
            .... .... .... .... .... .... ...0 .... = Do not include this port when flooding: False
            .... .... .... .... .... .... ..0. .... = Drop packets forwarded to port: False
            .... .... .... .... .... .... .0.. .... = Do not send packet-in msgs for port: False
        State flags: 0x00000000
            .... .... .... .... .... .... .... ...0 = No physical link present: False
        Current features: 0x000000c0
            .... .... .... .... .... .... .... ...0 = 10 Mb half-duplex rate support: False
            .... .... .... .... .... .... .... ..0. = 10 Mb full-duplex rate support: False
            .... .... .... .... .... .... .... .0.. = 100 Mb half-duplex rate support: False
            .... .... .... .... .... .... .... 0... = 100 Mb full-duplex rate support: False
            .... .... .... .... .... .... ...0 .... = 1 Gb half-duplex rate support: False
            .... .... .... .... .... .... ..0. .... = 1 Gb full-duplex rate support: False
            .... .... .... .... .... .... .1.. .... = 10 Gb full-duplex rate support: True
            .... .... .... .... .... .... 1... .... = Copper medium: True
            .... .... .... .... .... ...0 .... .... = Fiber medium: False
            .... .... .... .... .... ..0. .... .... = Auto-negotiation: False
            .... .... .... .... .... .0.. .... .... = Pause: False
            .... .... .... .... .... 0... .... .... = Asymmetric pause: False
        Advertised features: 0x00000000
        Features supported: 0x00000000
        Features advertised by peer: 0x00000000

PACKET_IN(交换机33586端口,控制器6633端口)

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

分析抓取的数据包,可以发现是因为交换机发现此时自己并没有匹配的流表(Reason: No matching flow (table-miss flow entry) (0)),所以要问控制器如何处理

报文内容

OpenFlow 1.0
    .000 0001 = Version: 1.0 (0x01)
    Type: OFPT_PACKET_IN (10)
    Length: 128
    Transaction ID: 0
    Buffer Id: 0xffffffff
    Total length: 110
    In port: 1
    Reason: No matching flow (table-miss flow entry) (0)
    Pad: 00
    Ethernet II, Src: e6:81:3e:4d:12:66 (e6:81:3e:4d:12:66), Dst: IPv6mcast_16 (33:33:00:00:00:16)
        Destination: IPv6mcast_16 (33:33:00:00:00:16)
            Address: IPv6mcast_16 (33:33:00:00:00:16)
            .... ..1. .... .... .... .... = LG bit: Locally administered address (this is NOT the factory default)
            .... ...1 .... .... .... .... = IG bit: Group address (multicast/broadcast)
        Source: e6:81:3e:4d:12:66 (e6:81:3e:4d:12:66)
            Address: e6:81:3e:4d:12:66 (e6:81:3e:4d:12:66)
            .... ..1. .... .... .... .... = LG bit: Locally administered address (this is NOT the factory default)
            .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
        Type: IPv6 (0x86dd)
    Internet Protocol Version 6, Src: fe80::e481:3eff:fe4d:1266, Dst: ff02::16
        0110 .... = Version: 6
        .... 0000 0000 .... .... .... .... .... = Traffic Class: 0x00 (DSCP: CS0, ECN: Not-ECT)
            .... 0000 00.. .... .... .... .... .... = Differentiated Services Codepoint: Default (0)
            .... .... ..00 .... .... .... .... .... = Explicit Congestion Notification: Not ECN-Capable Transport (0)
        .... .... .... 0000 0000 0000 0000 0000 = Flow Label: 0x00000
        Payload Length: 56
        Next Header: IPv6 Hop-by-Hop Option (0)
        Hop Limit: 1
        Source: fe80::e481:3eff:fe4d:1266
        Destination: ff02::16
        IPv6 Hop-by-Hop Option
            Next Header: ICMPv6 (58)
            Length: 0
            [Length: 8 bytes]
            Router Alert
                Type: Router Alert (0x05)
                    00.. .... = Action: Skip and continue (0)
                    ..0. .... = May Change: No
                    ...0 0101 = Low-Order Bits: 0x05
                Length: 2
                Router Alert: MLD (0)
            PadN
                Type: PadN (0x01)
                    00.. .... = Action: Skip and continue (0)
                    ..0. .... = May Change: No
                    ...0 0001 = Low-Order Bits: 0x01
                Length: 0
                PadN: <none>
    Internet Control Message Protocol v6
        Type: Multicast Listener Report Message v2 (143)
        Code: 0
        Checksum: 0x260e [correct]
        [Checksum Status: Good]
        Reserved: 0000
        Number of Multicast Address Records: 2
        Multicast Address Record Changed to exclude: ff02::fb
            Record Type: Changed to exclude (4)
            Aux Data Len: 0
            Number of Sources: 0
            Multicast Address: ff02::fb
        Multicast Address Record Changed to exclude: ff02::1:ff4d:1266
            Record Type: Changed to exclude (4)
            Aux Data Len: 0
            Number of Sources: 0
            Multicast Address: ff02::1:ff4d:1266

PACKET_OUT(交换机33586端口,控制器6633端口)

控制器6633端口 ---> 交换机33586端口
2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

结合Packet_out的结构

struct ofp_packet_out {
    struct ofp_header header;
    uint32_t buffer_id; /*交换机缓存区id,如果为-1则指定的为packet-out消息携带的data字段*/
    uint16_t in_port; /*如果buffer_id为‐1,并且action列表中指定了Output=TABLE的动作,in_port将作为data段数据包的额外匹配信息进行流表查询*/
    uint16_t actions_len; /*action列表的长度,可以用来区分actions和data段*/
    struct ofp_action_header actions[0]; /*动作列表*/
    uint8_t data[0]; /*数据缓存区,可以存储一个以太网帧,可选*/
}

告诉输出到65531端口
报文内容

OpenFlow 1.0
    .000 0001 = Version: 1.0 (0x01)
    Type: OFPT_PACKET_OUT (13)
    Length: 131
    Transaction ID: 0
    Buffer Id: 0xffffffff
    In port: 1
    Actions length: 8
    Actions type: Output to switch port (0)
    Action length: 8
    Output port: 65531
    Max length: 0
    Ethernet II, Src: e6:81:3e:4d:12:66 (e6:81:3e:4d:12:66), Dst: IPv6mcast_fb (33:33:00:00:00:fb)
        Destination: IPv6mcast_fb (33:33:00:00:00:fb)
            Address: IPv6mcast_fb (33:33:00:00:00:fb)
            .... ..1. .... .... .... .... = LG bit: Locally administered address (this is NOT the factory default)
            .... ...1 .... .... .... .... = IG bit: Group address (multicast/broadcast)
        Source: e6:81:3e:4d:12:66 (e6:81:3e:4d:12:66)
            Address: e6:81:3e:4d:12:66 (e6:81:3e:4d:12:66)
            .... ..1. .... .... .... .... = LG bit: Locally administered address (this is NOT the factory default)
            .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
        Type: IPv6 (0x86dd)
    Internet Protocol Version 6, Src: fe80::e481:3eff:fe4d:1266, Dst: ff02::fb
        0110 .... = Version: 6
        .... 0000 0000 .... .... .... .... .... = Traffic Class: 0x00 (DSCP: CS0, ECN: Not-ECT)
            .... 0000 00.. .... .... .... .... .... = Differentiated Services Codepoint: Default (0)
            .... .... ..00 .... .... .... .... .... = Explicit Congestion Notification: Not ECN-Capable Transport (0)
        .... .... .... 0010 1000 1001 0100 1011 = Flow Label: 0x2894b
        Payload Length: 53
        Next Header: UDP (17)
        Hop Limit: 255
        Source: fe80::e481:3eff:fe4d:1266
        Destination: ff02::fb
    User Datagram Protocol, Src Port: 5353, Dst Port: 5353
        Source Port: 5353
        Destination Port: 5353
        Length: 53
        Checksum: 0xa183 [unverified]
        [Checksum Status: Unverified]
        [Stream index: 15]
    Multicast Domain Name System (query)
        Transaction ID: 0x0000
            [Expert Info (Warning/Protocol): DNS query retransmission. Original request in frame 174]
                [DNS query retransmission. Original request in frame 174]
                [Severity level: Warning]
                [Group: Protocol]
        Flags: 0x0000 Standard query
            0... .... .... .... = Response: Message is a query
            .000 0... .... .... = Opcode: Standard query (0)
            .... ..0. .... .... = Truncated: Message is not truncated
            .... ...0 .... .... = Recursion desired: Don't do query recursively
            .... .... .0.. .... = Z: reserved (0)
            .... .... ...0 .... = Non-authenticated data: Unacceptable
        Questions: 2
        Answer RRs: 0
        Authority RRs: 0
        Additional RRs: 0
        Queries
            _ipps._tcp.local: type PTR, class IN, "QM" question
                Name: _ipps._tcp.local
                [Name Length: 16]
                [Label Count: 3]
                Type: PTR (domain name PoinTeR) (12)
                .000 0000 0000 0001 = Class: IN (0x0001)
                0... .... .... .... = "QU" question: False
            _ipp._tcp.local: type PTR, class IN, "QM" question
                Name: _ipp._tcp.local
                [Name Length: 15]
                [Label Count: 3]
                Type: PTR (domain name PoinTeR) (12)
                .000 0000 0000 0001 = Class: IN (0x0001)
                0... .... .... .... = "QU" question: False
        [Retransmitted request. Original request in: 174]
        [Retransmission: True]

接下来是另一台交换机(端口33588)与控制器(端口6633)的交互过程

交换机向控制器发送HELLO

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

控制器回应

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

控制器向交换机请求特征消息

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

控制器发送配置信息

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

交换机向控制器发送特征消息

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

交换机向控制器发送消息

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

控制器回应

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

PACKET_IN

2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。

FLOW_MOD

结合flow_mod结构

struct ofp_flow_mod {
    struct ofp_header header;
    struct ofp_match match; /*流表的匹配域*/ 
    uint64_t cookie; /*流表项标识符*/
    uint16_t command; /*可以是ADD,DELETE,DELETE-STRICT,MODIFY,MODIFY-STRICT*/
    uint16_t idle_timeout; /*空闲超时时间*/
    uint16_t hard_timeout; /*最大生存时间*/
    uint16_t priority; /*优先级,优先级高的流表项优先匹配*/
    uint32_t buffer_id; /*缓存区ID ,用于指定缓存区中的一个数据包按这个消息的action列表处理*/  
    uint16_t out_port; /*如果这条消息是用于删除流表则需要提供额外的匹配参数*/
    uint16_t flags; /*标志位,可以用来指示流表删除后是否发送flow‐removed消息,添加流表时是否检查流表重复项,添加的流表项是否为应急流表项。*/
    struct ofp_action_header actions[0]; /*action列表*/
};

分析抓取的flow_mod数据包,控制器通过6633端口向交换机33586端口、交换机33586端口下发流表项,指导数据的转发处理
2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。
2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。
2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。
2019 SDN上机第3次作业
1. 利用Mininet仿真平台构建如下图所示的网络拓扑,配置主机h1和h2的IP地址(h1:10.0.0.1,h2:10.0.0.2),测试两台主机之间的网络连通性
2. 利用Wireshark工具,捕获拓扑中交换机与控制器之间的通信数据,对OpenFlow协议类型的各类报文(hello, features_request, features_reply, set_config, packet_in, packet_out等)进行分析,对照wireshark截图写出你的分析内容。