Created
October 11, 2014 21:04
-
-
Save jeffra/842a29e65cf122ecdedd to your computer and use it in GitHub Desktop.
Basic L2 learning switch (OF1.3) using 2 tables based on Ryu's simple_switch_13.py (https://github.com/osrg/ryu-book/blob/master/en/source/sources/simple_switch_13.py)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from ryu.base import app_manager | |
from ryu.controller import ofp_event | |
from ryu.controller.handler import CONFIG_DISPATCHER, MAIN_DISPATCHER | |
from ryu.controller.handler import set_ev_cls | |
from ryu.ofproto import ofproto_v1_3 | |
from ryu.lib.packet import packet | |
from ryu.lib.packet import ethernet | |
class SimpleSwitch13(app_manager.RyuApp): | |
OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION] | |
def __init__(self, *args, **kwargs): | |
super(SimpleSwitch13, self).__init__(*args, **kwargs) | |
self.mac_to_port = {} | |
@set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER) | |
def switch_features_handler(self, ev): | |
datapath = ev.msg.datapath | |
ofproto = datapath.ofproto | |
parser = datapath.ofproto_parser | |
# install table-miss flow entry | |
# | |
# We specify NO BUFFER to max_len of the output action due to | |
# OVS bug. At this moment, if we specify a lesser number, e.g., | |
# 128, OVS will send Packet-In with invalid buffer_id and | |
# truncated packet data. In that case, we cannot output packets | |
# correctly. | |
match = parser.OFPMatch() | |
actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER, | |
ofproto.OFPCML_NO_BUFFER)] | |
self.add_flow(datapath, 0, match, actions, 0) | |
self.add_flow(datapath, 0, match, actions, 1) | |
def add_flow(self, datapath, priority, match, actions, table_id, inst=None): | |
ofproto = datapath.ofproto | |
parser = datapath.ofproto_parser | |
if inst==None: | |
inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS, | |
actions)] | |
mod = parser.OFPFlowMod(datapath=datapath, priority=priority, | |
match=match, table_id=table_id, instructions=inst) | |
datapath.send_msg(mod) | |
@set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER) | |
def _packet_in_handler(self, ev): | |
msg = ev.msg | |
datapath = msg.datapath | |
ofproto = datapath.ofproto | |
parser = datapath.ofproto_parser | |
in_port = msg.match['in_port'] | |
pkt = packet.Packet(msg.data) | |
eth = pkt.get_protocols(ethernet.ethernet)[0] | |
dst = eth.dst | |
src = eth.src | |
dpid = datapath.id | |
self.mac_to_port.setdefault(dpid, {}) | |
self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port) | |
# learn a mac address to avoid FLOOD next time and install rule in table 0. | |
if src not in self.mac_to_port[dpid]: | |
match = parser.OFPMatch(eth_src=src) | |
inst = [datapath.ofproto_parser.OFPInstructionGotoTable(1)] | |
self.add_flow(datapath, 1, match, actions=None, table_id=0, inst=inst) | |
self.mac_to_port[dpid][src] = in_port | |
if dst in self.mac_to_port[dpid]: | |
out_port = self.mac_to_port[dpid][dst] | |
else: | |
out_port = ofproto.OFPP_FLOOD | |
actions = [parser.OFPActionOutput(out_port)] | |
# install a flow to avoid packet_in next time | |
if out_port != ofproto.OFPP_FLOOD: | |
match = parser.OFPMatch(eth_dst=dst) | |
self.add_flow(datapath, 1, match, actions, table_id=1) | |
data = None | |
if msg.buffer_id == ofproto.OFP_NO_BUFFER: | |
data = msg.data | |
out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id, | |
in_port=in_port, actions=actions, data=data) | |
datapath.send_msg(out) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment