def __init__(self, *args, **kwargs): super(SimpleSwitch13, self).__init__(*args, **kwargs) self.mac_to_port = {} self.net = nx.DiGraph() self.nodes = {} self.links = {} self.topology_api_app = self self.qos = QoSTracker()
def __init__(self, *args, **kwargs): super(QoSSwitch13, self).__init__(*args, **kwargs) self.mac_to_port = {} self.qos = QoSTracker(self) self._error_count = 0 self.switches = {} wsgi = kwargs["wsgi"] wsgi.register(QoSController, {simple_switch_instance_name: self})
def __init__(self, *args, **kwargs): super(QoSSwitch13, self).__init__(*args, **kwargs) self.mac_to_port = {} self.qos = QoSTracker(self) self._error_count = 0 self.switches = {} wsgi = kwargs["wsgi"] wsgi.register(QoSController, {simple_switch_instance_name : self})
class SimpleSwitch13(app_manager.RyuApp): OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION] def __init__(self, *args, **kwargs): super(SimpleSwitch13, self).__init__(*args, **kwargs) self.mac_to_port = {} self.net = nx.DiGraph() self.nodes = {} self.links = {} self.topology_api_app = self self.qos = QoSTracker() @set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER) def switch_features_handler(self, ev): datapath = ev.msg.datapath ofproto = datapath.ofproto parser = datapath.ofproto_parser # install table-miss flow entry # # We specify NO BUFFER to max_len of the output action due to # OVS bug. At this moment, if we specify a lesser number, e.g., # 128, OVS will send Packet-In with invalid buffer_id and # truncated packet data. In that case, we cannot output packets # correctly. The bug has been fixed in OVS v2.1.0. match = parser.OFPMatch() actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER, ofproto.OFPCML_NO_BUFFER)] self.add_flow(datapath, 0, match, actions) def add_flow(self, datapath, priority, match, actions, buffer_id=None): ofproto = datapath.ofproto parser = datapath.ofproto_parser inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS, actions)] if buffer_id: mod = parser.OFPFlowMod(datapath=datapath, buffer_id=buffer_id, priority=priority, match=match, instructions=inst) else: mod = parser.OFPFlowMod(datapath=datapath, priority=priority, match=match, instructions=inst) datapath.send_msg(mod) @set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER) def _packet_in_handler(self, ev): # If you hit this you might want to increase # the "miss_send_length" of your switch if ev.msg.msg_len < ev.msg.total_len: self.logger.debug("packet truncated: only %s of %s bytes", ev.msg.msg_len, ev.msg.total_len) msg = ev.msg datapath = msg.datapath ofproto = datapath.ofproto parser = datapath.ofproto_parser in_port = msg.match['in_port'] pkt = packet.Packet(msg.data) eth = pkt.get_protocols(ethernet.ethernet)[0] if eth.ethertype == ether_types.ETH_TYPE_LLDP: # ignore lldp packet return dst = eth.dst src = eth.src ip = pkt.get_protocols(ipv4.ipv4) if len(ip) > 0: ip_src = ip[0].src ip_dst = ip[0].dst else: arp_h = pkt.get_protocols(arp.arp) if arp_h: ip_src = arp_h[0].dst_ip ip_dst = arp_h[0].src_ip dpid = datapath.id if ip_src and ip_dst: res = self.qos.get_reservation_for_src_dst(ip_src, ip_dst) if res: print "MATCH FOR: " + str(ip_src) + " -- " + str(ip_dst) + " in datapath: " + str(dpid) self.mac_to_port.setdefault(dpid, {}) self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port) # learn a mac address to avoid FLOOD next time. self.mac_to_port[dpid][src] = in_port print "DPID: " + str(dpid) + ": " + str(self.mac_to_port) # DATAPATH represents a switch if dst in self.mac_to_port[dpid]: out_port = self.mac_to_port[dpid][dst] else: out_port = ofproto.OFPP_FLOOD actions = [parser.OFPActionOutput(out_port)] # install a flow to avoid packet_in next time if out_port != ofproto.OFPP_FLOOD: match = parser.OFPMatch(in_port=in_port, eth_dst=dst) # verify if we have a valid buffer_id, if yes avoid to send both # flow_mod & packet_out if msg.buffer_id != ofproto.OFP_NO_BUFFER: self.add_flow(datapath, 1, match, actions, msg.buffer_id) return else: self.add_flow(datapath, 1, match, actions) data = None if msg.buffer_id == ofproto.OFP_NO_BUFFER: data = msg.data out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id, in_port=in_port, actions=actions, data=data) datapath.send_msg(out)
class QoSSwitch13(app_manager.RyuApp): OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION] _CONTEXTS = { "wsgi": WSGIApplication } def __init__(self, *args, **kwargs): super(QoSSwitch13, self).__init__(*args, **kwargs) self.mac_to_port = {} self.qos = QoSTracker(self) self._error_count = 0 self.switches = {} wsgi = kwargs["wsgi"] wsgi.register(QoSController, {simple_switch_instance_name : self}) @set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER) def switch_features_handler(self, ev): datapath = ev.msg.datapath ofproto = datapath.ofproto parser = datapath.ofproto_parser # install table-miss flow entry # # We specify NO BUFFER to max_len of the output action due to # OVS bug. At this moment, if we specify a lesser number, e.g., # 128, OVS will send Packet-In with invalid buffer_id and # truncated packet data. In that case, we cannot output packets # correctly. The bug has been fixed in OVS v2.1.0. match = parser.OFPMatch() actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER, ofproto.OFPCML_NO_BUFFER)] self.add_flow(datapath, 0, match, actions) # Add a flow to forward from table_id:0 to table_id:1 match = parser.OFPMatch() inst = [parser.OFPInstructionGotoTable(CIR_TABLE_ID)] req = parser.OFPFlowMod(datapath=datapath, priority=2, match=match, instructions=inst, table_id=PIR_TABLE_ID) datapath.send_msg(req) match = parser.OFPMatch() inst = [parser.OFPInstructionGotoTable(FLOW_TABLE_ID)] req = parser.OFPFlowMod(datapath=datapath, priority=2, match=match, instructions=inst, table_id=CIR_TABLE_ID) datapath.send_msg(req) self.switches[datapath.id] = datapath def add_flow(self, datapath, priority, match, actions, table_id=FLOW_TABLE_ID, buffer_id=None): ofproto = datapath.ofproto parser = datapath.ofproto_parser inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS, actions)] print "About to add flow: dpid:" + str(datapath.id) + " match:" + str(match) + " actions:" + str(actions) if buffer_id: mod = parser.OFPFlowMod(datapath=datapath, buffer_id=buffer_id, priority=priority, match=match, instructions=inst, table_id=table_id) else: mod = parser.OFPFlowMod(datapath=datapath, priority=priority, match=match, instructions=inst, table_id=table_id) datapath.send_msg(mod) @set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER) def _packet_in_handler(self, ev): # If you hit this you might want to increase # the "miss_send_length" of your switch if ev.msg.msg_len < ev.msg.total_len: self.logger.debug("packet truncated: only %s of %s bytes", ev.msg.msg_len, ev.msg.total_len) msg = ev.msg datapath = msg.datapath ofproto = datapath.ofproto parser = datapath.ofproto_parser in_port = msg.match['in_port'] pkt = packet.Packet(msg.data) eth = pkt.get_protocols(ethernet.ethernet)[0] if eth.ethertype == ether_types.ETH_TYPE_LLDP: # ignore lldp packet return dst = eth.dst src = eth.src dpid = datapath.id self.mac_to_port.setdefault(dpid, {}) # self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port) # # learn a mac address to avoid FLOOD next time. # self.mac_to_port[dpid][src] = in_port # if dst in self.mac_to_port[dpid] and dst != "ff:ff:ff:ff:ff:ff": # return # else: # out_port = ofproto.OFPP_FLOOD # # self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port) # mpls_packet = pkt.get_protocols(mpls.mpls) # if mpls_packet: # if mpls_packet[0]: # self.logger.info("packet in %s %s %s %s %s", dpid, src, dst, in_port, str(mpls_packet[0])) # actions = [parser.OFPActionOutput(out_port)] # data = None # if msg.buffer_id == ofproto.OFP_NO_BUFFER: # data = msg.data # out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id, # in_port=in_port, actions=actions, data=data) # datapath.send_msg(out) # learn a mac address to avoid FLOOD next time. self.mac_to_port[dpid][src] = in_port if dst in self.mac_to_port[dpid]: out_port = self.mac_to_port[dpid][dst] else: out_port = ofproto.OFPP_FLOOD mpls_packet = pkt.get_protocols(mpls.mpls) if mpls_packet: if mpls_packet[0]: self.logger.info("packet in %s %s %s %s %s", dpid, src, dst, in_port, str(mpls_packet[0])) actions = [parser.OFPActionOutput(out_port)] # install a flow to avoid packet_in next time if out_port != ofproto.OFPP_FLOOD: match = parser.OFPMatch(in_port=in_port, eth_dst=dst) # verify if we have a valid buffer_id, if yes avoid to send both # flow_mod & packet_out if msg.buffer_id != ofproto.OFP_NO_BUFFER: print "About to add flow: dpid:" + str(datapath.id) + " match:" + str(match) + " actions:" + str(actions) self.add_flow(datapath, 1, match, actions, msg.buffer_id) return else: self.add_flow(datapath, 1, match, actions, table_id=2) self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port) data = None if msg.buffer_id == ofproto.OFP_NO_BUFFER: data = msg.data out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id, in_port=in_port, actions=actions, data=data) datapath.send_msg(out) @set_ev_cls(event.EventSwitchEnter) def get_topology_data(self, ev): switch_list = get_all_switch(self) self.qos.add_switches(switch_list) links_list = get_all_link(self) self.qos.add_links(links_list) @set_ev_cls(ofp_event.EventOFPErrorMsg, [HANDSHAKE_DISPATCHER, CONFIG_DISPATCHER, MAIN_DISPATCHER]) def _handle_reply(self, ev): msg = ev.msg datapath = msg.datapath self._error_count+=1 print "***** ERROR - TYPE:" + str(msg.type) + " CODE:" + str(msg.code) + "DPID:" + str(datapath.id) + " COUNT:" + str(self._error_count)
class QoSSwitch13(app_manager.RyuApp): OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION] _CONTEXTS = {"wsgi": WSGIApplication} def __init__(self, *args, **kwargs): super(QoSSwitch13, self).__init__(*args, **kwargs) self.mac_to_port = {} self.qos = QoSTracker(self) self._error_count = 0 self.switches = {} wsgi = kwargs["wsgi"] wsgi.register(QoSController, {simple_switch_instance_name: self}) @set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER) def switch_features_handler(self, ev): datapath = ev.msg.datapath ofproto = datapath.ofproto parser = datapath.ofproto_parser # install table-miss flow entry # # We specify NO BUFFER to max_len of the output action due to # OVS bug. At this moment, if we specify a lesser number, e.g., # 128, OVS will send Packet-In with invalid buffer_id and # truncated packet data. In that case, we cannot output packets # correctly. The bug has been fixed in OVS v2.1.0. match = parser.OFPMatch() actions = [ parser.OFPActionOutput(ofproto.OFPP_CONTROLLER, ofproto.OFPCML_NO_BUFFER) ] self.add_flow(datapath, 0, match, actions) # Add a flow to forward from table_id:0 to table_id:1 match = parser.OFPMatch() inst = [parser.OFPInstructionGotoTable(CIR_TABLE_ID)] req = parser.OFPFlowMod(datapath=datapath, priority=2, match=match, instructions=inst, table_id=PIR_TABLE_ID) datapath.send_msg(req) match = parser.OFPMatch() inst = [parser.OFPInstructionGotoTable(FLOW_TABLE_ID)] req = parser.OFPFlowMod(datapath=datapath, priority=2, match=match, instructions=inst, table_id=CIR_TABLE_ID) datapath.send_msg(req) self.switches[datapath.id] = datapath def add_flow(self, datapath, priority, match, actions, table_id=FLOW_TABLE_ID, buffer_id=None): ofproto = datapath.ofproto parser = datapath.ofproto_parser inst = [ parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS, actions) ] print "About to add flow: dpid:" + str( datapath.id) + " match:" + str(match) + " actions:" + str(actions) if buffer_id: mod = parser.OFPFlowMod(datapath=datapath, buffer_id=buffer_id, priority=priority, match=match, instructions=inst, table_id=table_id) else: mod = parser.OFPFlowMod(datapath=datapath, priority=priority, match=match, instructions=inst, table_id=table_id) datapath.send_msg(mod) @set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER) def _packet_in_handler(self, ev): # If you hit this you might want to increase # the "miss_send_length" of your switch if ev.msg.msg_len < ev.msg.total_len: self.logger.debug("packet truncated: only %s of %s bytes", ev.msg.msg_len, ev.msg.total_len) msg = ev.msg datapath = msg.datapath ofproto = datapath.ofproto parser = datapath.ofproto_parser in_port = msg.match['in_port'] pkt = packet.Packet(msg.data) eth = pkt.get_protocols(ethernet.ethernet)[0] if eth.ethertype == ether_types.ETH_TYPE_LLDP: # ignore lldp packet return dst = eth.dst src = eth.src dpid = datapath.id self.mac_to_port.setdefault(dpid, {}) # self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port) # # learn a mac address to avoid FLOOD next time. # self.mac_to_port[dpid][src] = in_port # if dst in self.mac_to_port[dpid] and dst != "ff:ff:ff:ff:ff:ff": # return # else: # out_port = ofproto.OFPP_FLOOD # # self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port) # mpls_packet = pkt.get_protocols(mpls.mpls) # if mpls_packet: # if mpls_packet[0]: # self.logger.info("packet in %s %s %s %s %s", dpid, src, dst, in_port, str(mpls_packet[0])) # actions = [parser.OFPActionOutput(out_port)] # data = None # if msg.buffer_id == ofproto.OFP_NO_BUFFER: # data = msg.data # out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id, # in_port=in_port, actions=actions, data=data) # datapath.send_msg(out) # learn a mac address to avoid FLOOD next time. self.mac_to_port[dpid][src] = in_port if dst in self.mac_to_port[dpid]: out_port = self.mac_to_port[dpid][dst] else: out_port = ofproto.OFPP_FLOOD mpls_packet = pkt.get_protocols(mpls.mpls) if mpls_packet: if mpls_packet[0]: self.logger.info("packet in %s %s %s %s %s", dpid, src, dst, in_port, str(mpls_packet[0])) actions = [parser.OFPActionOutput(out_port)] # install a flow to avoid packet_in next time if out_port != ofproto.OFPP_FLOOD: match = parser.OFPMatch(in_port=in_port, eth_dst=dst) # verify if we have a valid buffer_id, if yes avoid to send both # flow_mod & packet_out if msg.buffer_id != ofproto.OFP_NO_BUFFER: print "About to add flow: dpid:" + str( datapath.id) + " match:" + str(match) + " actions:" + str( actions) self.add_flow(datapath, 1, match, actions, msg.buffer_id) return else: self.add_flow(datapath, 1, match, actions, table_id=2) self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port) data = None if msg.buffer_id == ofproto.OFP_NO_BUFFER: data = msg.data out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id, in_port=in_port, actions=actions, data=data) datapath.send_msg(out) @set_ev_cls(event.EventSwitchEnter) def get_topology_data(self, ev): switch_list = get_all_switch(self) self.qos.add_switches(switch_list) links_list = get_all_link(self) self.qos.add_links(links_list) @set_ev_cls(ofp_event.EventOFPErrorMsg, [HANDSHAKE_DISPATCHER, CONFIG_DISPATCHER, MAIN_DISPATCHER]) def _handle_reply(self, ev): msg = ev.msg datapath = msg.datapath self._error_count += 1 print "***** ERROR - TYPE:" + str(msg.type) + " CODE:" + str( msg.code) + "DPID:" + str(datapath.id) + " COUNT:" + str( self._error_count)