Changes between Version 2 and Version 3 of GENIExperimenter/Tutorials/GREESC13/OpenFlowWiMAX/Execute
- Timestamp:
- 06/24/13 15:40:28 (11 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIExperimenter/Tutorials/GREESC13/OpenFlowWiMAX/Execute
v2 v3 12 12 <area shape="rect" coords="18,18,135,110" 13 13 14 href="http://groups.geni.net/geni/wiki/GENIExperimenter/Tutorials/ OnlineTemplate/DesignSetup" alt="" title="" />14 href="http://groups.geni.net/geni/wiki/GENIExperimenter/Tutorials/GREESC13/OpenFlowWiMAX/Design-Setup" alt="" title="" /> 15 15 <area shape="rect" coords="180,18,297,111" 16 16 … … 18 18 <area shape="rect" coords="344,17,460,110" 19 19 20 href="http://groups.geni.net/geni/wiki/GENIExperimenter/Tutorials/ OnlineTemplate/Finish" alt="" title="" />20 href="http://groups.geni.net/geni/wiki/GENIExperimenter/Tutorials/GREESC13/OpenFlowWiMAX/Finish" alt="" title="" /> 21 21 <area shape="rect" coords="493,136,495,138" href="http://www.image-maps.com/index.php?aff=mapped_users_5201305222028436" 22 22 … … 401 401 two? OpenFlow filters packets by not only data like MAC and IP addresses, but also by the type of packet (its 402 402 '''ethertype'''). We need to forward all IP (ethertype=0x800) and all ARP (ethertype=0x806) packets in each direction in 403 404 403 order to achieve IP connectivity between the tap interface and the outside world. What we want to do is look for packets 405 406 404 from the port br_tap is assigned to, then send them out the tap-wifi port number (the patch port connected to the br_wifi 407 408 405 OVS bridge), then when they arrive at br_wifi, look for them on the wifi-tap port number and send them out the br_wifi 409 410 406 port number. Then we want to implement the same for the opposite direction. Examine the script and modify it as necessary 411 412 407 to allow packets to travel from the br_tap interface, to the br_wifi interface, and out to the host-only network. 413 408 7. Save the '''gree13_switchWiFi.py''' script. 414 409 8. Repeat and save for '''gree13_switchWiMAX.py'''. Use the port numbers noted in the json output to complete the 415 416 410 flows needed to send packets from the br_tap interface out the br_wimax interface. 417 418 411 419 412 == 5. Execute Experiment == … … 431 424 }}} 432 425 2. In another unused tab in the Root Terminal, run ping to the gateway IP. The default route is set to br_tap and IP 433 434 426 forwarding is disabled -- this forces all packets into the OVS network, where the interface switching is handled by 435 436 427 Floodlight and the Static Flow Pusher. 437 428 {{{ … … 454 445 455 446 1. Notice the delay introduced in the ping responses. When we configured and ran the '''system_setup.sh''' script, we 456 457 447 introduced a simulated delay to the "WiMAX" interface. This confirms the switch is occuring. Before and after the switch, 458 459 448 the source IP remains the br_tap IP, and the destination IP remains the gateway IP. 460 449 2. Congratuations! You have just completed a simulated vertical Layer-2 handoff! This project is being developed and 461 462 450 tested using actual GENI WiFi and WiMAX testbed at Clemson University. You can give it a try yourself outside the VM using 463 464 451 whatever physical interfaces you have available. 465 452