Openflow error while using pox l3_learning.py module on a 64-host tree topology in mininet

555 views Asked by At

I'm running mininet with a Tree Topology with 64 hosts (depth=2, fanout=4).I've used the L3_learning.py module of pox(version:eel) for my controller(I've just added some functions to this module, the code,itself is unchanged,so the l3_learning is used for routing).

I want to try running normal and ddos attack traffic on this network. The problem is that when i run normal traffic on a small number of hosts(less than 15 hosts), for example with interval 0.1 sec.( 10 packets per second), and some 3-victim attacks from 3 or 4 different sources, with interval 0.05 sec(20 packets per second) for a short time (just about 3-4 minutes!!),in the pox log i get this error:

ERROR:openflow.of_01:[00-00-00-00-00-01 1] OpenFlow Error:
[00-00-00-00-00-01 1] Error: header:
[00-00-00-00-00-01 1] Error: version: 1
[00-00-00-00-00-01 1] Error: type: 1 (OFPT_ERROR)
[00-00-00-00-00-01 1] Error: length: 76
[00-00-00-00-00-01 1] Error: xid: 11304
[00-00-00-00-00-01 1] Error: type: OFPET_BAD_REQUEST (1)
[00-00-00-00-00-01 1] Error: code: OFPBRC_BUFFER_UNKNOWN (8)
[00-00-00-00-00-01 1] Error: datalen: 64
[00-00-00-00-00-01 1] Error: 0000: 01 0e 00 60 00 00 2c 27  00 00 00 00 00 04 da 53 |...;............|
 .
 .
 .
 .

The rates i have used for traffics(10 packets/s, 20 packets/s) are very low, what is the cause of this error? Is there any packet rate limitation in mininet? Or is the problem related to using the l3_learning.py module of pox for the routing? I don't know how sholud i write my own routing solution!

And also one warning message is displayed through the simulation:

WARNING:forwarding.l3_learning: 5 4 not sending packet for 10.0.0.28 back out of the inport port
WARNING:forwarding.l3_learning: 2 7 not sending packet for 10.0.0.7 back out of the inport port
.
.
.

what does this message mean?

the normal and attack traffic sources are generated with this code:

def source():
  not_valid =[10,127,254,255,1,2,169,172,192]          
  first = randrange(1,256)      

  while first in not_valid:        
    first = randrange(1,256)         

  ip = ".".join([str(first),str(randrange(1,256)),                    
       str(randrange(1,256)),str(randrange(1,256))])    
  return ip

the destinations for attack is entered by the user(among 64 hosts). and the following lines sends the attack packets:

for i in xrange(0,10000):         
 packets = Ether()/IP(dst=dstIP,src=source())/TCP (dport=1,sport=80)         


sendp( packets,iface=interface.rstrip(),inter=0.05)

Thanks for your attention.

0

There are 0 answers