Hi KK, 

I am using a controller running on a VM in Virtualbox under bridged mode with 
its own IP address (192.168.1.203). In order to capture the packet in a cleaner 
fashion, I used two different setup, both with 6633 as OF port. In each of the 
setup, there is only the controller and the other device present in the subnet. 
Here are the four test cases I ran:

1) PC controller with pyswitch (192.168.1.203) <-----> Pronto switch 
(192.168.1.1)

This is working as intended. A connectivity test between the controller and 
switch is run every 15 seconds. Here is a slice of tcpdump of eth0 on the 
controller I included for you to compare with the AP one which doesn't work:
 
1a) When pyswitch is not activated, the switch cannot establish the connection 
as expected. It retries every 15 seconds.

11:25:54.413729 IP 192.168.1.1.47678 > 192.168.1.203.6633: Flags [S], seq 
632326855, win 5840, options [sackOK,TS val 148549274 ecr 0,mss 1460,nop,wscale 
5], length 0
11:25:54.413754 IP 192.168.1.203.6633 > 192.168.1.1.47678: Flags [R.], seq 0, 
ack 632326856, win 0, length 0
11:26:09.414071 IP 192.168.1.1.47679 > 192.168.1.203.6633: Flags [S], seq 
872002931, win 5840, options [sackOK,TS val 148553024 ecr 0,mss 1460,nop,wscale 
5], length 0
11:26:09.414108 IP 192.168.1.203.6633 > 192.168.1.1.47679: Flags [R.], seq 0, 
ack 872002932, win 0, length 0
11:26:14.411074 ARP, Request who-has 192.168.1.1 tell 192.168.1.203, length 28
11:26:14.411374 ARP, Reply 192.168.1.1 is-at e8:9a:8f:fb:c3:7f, length 46
11:26:24.414151 IP 192.168.1.1.47680 > 192.168.1.203.6633: Flags [S], seq 
1113043895, win 5840, options [sackOK,TS val 148556774 ecr 0,mss 
1460,nop,wscale 5], length 0
11:26:24.414176 IP 192.168.1.203.6633 > 192.168.1.1.47680: Flags [R.], seq 0, 
ack 1113043896, win 0, length 0
11:26:29.413669 ARP, Request who-has 192.168.1.203 tell 192.168.1.1, length 46
11:26:29.413691 ARP, Reply 192.168.1.203 is-at 08:00:27:60:e6:e7, length 28

1b) When pyswitch is activated, connection is established as intended. No 
random disconnect occurs. A message is sent between the controller and switch 
every 15 second.

11:28:09.413993 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], ack 1, 
win 183, options [nop,nop,TS val 148583024 ecr 40338360], length 0
11:28:09.414043 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [P.], seq 1:9, 
ack 1, win 183, options [nop,nop,TS val 148583024 ecr 40338360], length 8
11:28:09.414056 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [.], ack 9, 
win 91, options [nop,nop,TS val 40338360 ecr 148583024], length 0
11:28:09.414472 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [P.], seq 1:9, 
ack 9, win 91, options [nop,nop,TS val 40338360 ecr 148583024], length 8
11:28:09.414607 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [P.], seq 
9:17, ack 9, win 91, options [nop,nop,TS val 40338360 ecr 148583024], length 8
11:28:09.414690 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], ack 9, 
win 183, options [nop,nop,TS val 148583024 ecr 40338360], length 0
11:28:09.414819 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], ack 17, 
win 183, options [nop,nop,TS val 148583024 ecr 40338360], length 0
11:28:09.414927 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [P.], seq 
17:29, ack 9, win 91, options [nop,nop,TS val 40338361 ecr 148583024], length 12
11:28:09.415514 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], ack 29, 
win 183, options [nop,nop,TS val 148583024 ecr 40338361], length 0
11:28:09.416910 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], seq 
9:1457, ack 29, win 183, options [nop,nop,TS val 148583024 ecr 40338361], 
length 1448
11:28:09.416949 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [P.], seq 
1457:2633, ack 29, win 183, options [nop,nop,TS val 148583024 ecr 40338361], 
length 1176
11:28:09.416962 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [.], ack 2633, 
win 181, options [nop,nop,TS val 40338361 ecr 148583024], length 0
11:28:09.417200 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [P.], seq 
29:53, ack 2633, win 181, options [nop,nop,TS val 40338361 ecr 148583024], 
length 24
11:28:09.418380 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [P.], seq 
2633:2669, ack 53, win 183, options [nop,nop,TS val 148583025 ecr 40338361], 
length 36
11:28:09.418596 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [P.], seq 
53:125, ack 2669, win 181, options [nop,nop,TS val 40338361 ecr 148583025], 
length 72
11:28:09.457692 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], ack 125, 
win 183, options [nop,nop,TS val 148583035 ecr 40338361], length 0
11:28:24.413293 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [P.], seq 
2669:2677, ack 125, win 183, options [nop,nop,TS val 148586774 ecr 40338361], 
length 8
11:28:24.413536 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [P.], seq 
125:133, ack 2677, win 181, options [nop,nop,TS val 40342110 ecr 148586774], 
length 8
11:28:24.413725 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], ack 133, 
win 183, options [nop,nop,TS val 148586774 ecr 40342110], length 0
11:28:39.413913 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [P.], seq 
2677:2685, ack 133, win 183, options [nop,nop,TS val 148590524 ecr 40342110], 
length 8
11:28:39.414183 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [P.], seq 
133:141, ack 2685, win 181, options [nop,nop,TS val 40345860 ecr 148590524], 
length 8
11:28:39.414403 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], ack 141, 
win 183, options [nop,nop,TS val 148590524 ecr 40345860], length 0
11:28:54.413935 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [P.], seq 
2685:2693, ack 141, win 183, options [nop,nop,TS val 148594274 ecr 40345860], 
length 8
11:28:54.414204 IP 192.168.1.203.6633 > 192.168.1.1.33405: Flags [P.], seq 
141:149, ack 2693, win 181, options [nop,nop,TS val 40349610 ecr 148594274], 
length 8
11:28:54.414484 IP 192.168.1.1.33405 > 192.168.1.203.6633: Flags [.], ack 149, 
win 183, options [nop,nop,TS val 148594274 ecr 40349610], length 0

2) PC controller with pyswitch (192.168.1.203) <-----> Pc Engine AP 
(192.168.1.189)

Now for the case where it doesn't really work as intended. The AP connect and 
disconnect from the controller due to " no response to inactivity probe after 5 
seconds, disconnecting". 

2a) pyswitch not activated. The AP retries every 8 second or so. Just like with 
the switch, the behaviour seems as expected.

11:03:35.149878 IP 192.168.1.189.60392 > 192.168.1.203.6633: Flags [S], seq 
3709438136, win 5840, options [mss 1460,sackOK,TS val 579519 ecr 0,nop,wscale 
4], length 0
11:03:35.149907 IP 192.168.1.203.6633 > 192.168.1.189.60392: Flags [R.], seq 0, 
ack 3709438137, win 0, length 0
11:03:43.147437 IP 192.168.1.189.60393 > 192.168.1.203.6633: Flags [S], seq 
3834847840, win 5840, options [mss 1460,sackOK,TS val 581519 ecr 0,nop,wscale 
4], length 0
11:03:43.147466 IP 192.168.1.203.6633 > 192.168.1.189.60393: Flags [R.], seq 0, 
ack 3834847841, win 0, length 0
11:03:48.146873 ARP, Request who-has 192.168.1.189 tell 192.168.1.203, length 28
11:03:48.147436 ARP, Reply 192.168.1.189 is-at 00:23:20:d6:06:1f, length 46
11:03:51.140086 IP 192.168.1.189.60394 > 192.168.1.203.6633: Flags [S], seq 
3969455372, win 5840, options [mss 1460,sackOK,TS val 583518 ecr 0,nop,wscale 
4], length 0
11:03:51.140110 IP 192.168.1.203.6633 > 192.168.1.189.60394: Flags [R.], seq 0, 
ack 3969455373, win 0, length 0
11:03:59.137615 IP 192.168.1.189.60395 > 192.168.1.203.6633: Flags [S], seq 
4090766827, win 5840, options [mss 1460,sackOK,TS val 585518 ecr 0,nop,wscale 
4], length 0
11:03:59.137640 IP 192.168.1.203.6633 > 192.168.1.189.60395: Flags [R.], seq 0, 
ack 4090766828, win 0, length 0
11:04:07.130442 IP 192.168.1.189.60396 > 192.168.1.203.6633: Flags [S], seq 
4211263035, win 5840, options [mss 1460,sackOK,TS val 587517 ecr 0,nop,wscale 
4], length 0
11:04:07.130469 IP 192.168.1.203.6633 > 192.168.1.189.60396: Flags [R.], seq 0, 
ack 4211263036, win 0, length 0
11:04:12.127764 ARP, Request who-has 192.168.1.203 tell 192.168.1.189, length 46
11:04:12.127788 ARP, Reply 192.168.1.203 is-at 08:00:27:60:e6:e7, length 28

2b) pyswitch activated. The AP connects to the controller, but then disconnect 
shortly because it fails to receive keep-alive messages. Here is two cycles of 
connect/disconnect:

11:36:18.979394 IP 192.168.1.189.56840 > 192.168.1.203.6633: Flags [S], seq 
156517514, win 5840, options [mss 1460,sackOK,TS val 1070398 ecr 0,nop,wscale 
4], length 0
11:36:18.979424 IP 192.168.1.203.6633 > 192.168.1.189.56840: Flags [R.], seq 0, 
ack 156517515, win 0, length 0
11:36:26.976537 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [S], seq 
288016471, win 5840, options [mss 1460,sackOK,TS val 1072397 ecr 0,nop,wscale 
4], length 0
11:36:26.976577 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [S.], seq 
631201559, ack 288016472, win 5792, options [mss 1460,sackOK,TS val 40462751 
ecr 1072397,nop,wscale 6], length 0
11:36:26.977088 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [.], ack 1, 
win 365, options [nop,nop,TS val 1072397 ecr 40462751], length 0
11:36:26.977144 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [P.], seq 
1:9, ack 1, win 365, options [nop,nop,TS val 1072397 ecr 40462751], length 8
11:36:26.977160 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [.], ack 9, 
win 91, options [nop,nop,TS val 40462751 ecr 1072397], length 0
11:36:26.977600 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
1:9, ack 9, win 91, options [nop,nop,TS val 40462751 ecr 1072397], length 8
11:36:26.977692 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
9:17, ack 9, win 91, options [nop,nop,TS val 40462751 ecr 1072397], length 8
11:36:26.977786 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
17:29, ack 9, win 91, options [nop,nop,TS val 40462751 ecr 1072397], length 12
11:36:26.977863 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [.], ack 9, 
win 365, options [nop,nop,TS val 1072397 ecr 40462751], length 0
11:36:26.977985 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [.], ack 17, 
win 365, options [nop,nop,TS val 1072397 ecr 40462751], length 0
11:36:26.978079 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [.], ack 29, 
win 365, options [nop,nop,TS val 1072397 ecr 40462751], length 0
11:36:26.978884 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [P.], seq 
9:185, ack 29, win 365, options [nop,nop,TS val 1072397 ecr 40462751], length 
176
11:36:26.979084 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
29:53, ack 185, win 108, options [nop,nop,TS val 40462752 ecr 1072397], length 
24
11:36:26.979634 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [P.], seq 
185:221, ack 53, win 365, options [nop,nop,TS val 1072397 ecr 40462752], length 
36
11:36:26.979888 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
53:125, ack 221, win 108, options [nop,nop,TS val 40462752 ecr 1072397], length 
72
11:36:27.182869 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
53:125, ack 221, win 108, options [nop,nop,TS val 40462803 ecr 1072397], length 
72
11:36:27.590900 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
53:125, ack 221, win 108, options [nop,nop,TS val 40462905 ecr 1072397], length 
72
11:36:28.406907 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
53:125, ack 221, win 108, options [nop,nop,TS val 40463109 ecr 1072397], length 
72
11:36:30.038873 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
53:125, ack 221, win 108, options [nop,nop,TS val 40463517 ecr 1072397], length 
72
11:36:33.303980 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
53:125, ack 221, win 108, options [nop,nop,TS val 40464333 ecr 1072397], length 
72
11:36:39.830905 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [P.], seq 
53:125, ack 221, win 108, options [nop,nop,TS val 40465965 ecr 1072397], length 
72
11:36:46.975768 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [S], seq 
604390870, win 5840, options [mss 1460,sackOK,TS val 1077396 ecr 0,nop,wscale 
4], length 0
11:36:46.975789 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [S.], seq 
2165900425, ack 604390871, win 5792, options [mss 1460,sackOK,TS val 40467751 
ecr 1077396,nop,wscale 6], length 0
11:36:46.976299 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [.], ack 1, 
win 365, options [nop,nop,TS val 1077396 ecr 40467751], length 0
11:36:46.976456 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [P.], seq 
1:9, ack 1, win 365, options [nop,nop,TS val 1077396 ecr 40467751], length 8
11:36:46.976466 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [.], ack 9, 
win 91, options [nop,nop,TS val 40467751 ecr 1077396], length 0
11:36:46.976558 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
1:9, ack 9, win 91, options [nop,nop,TS val 40467751 ecr 1077396], length 8
11:36:46.976618 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
9:17, ack 9, win 91, options [nop,nop,TS val 40467751 ecr 1077396], length 8
11:36:46.976668 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
17:29, ack 9, win 91, options [nop,nop,TS val 40467751 ecr 1077396], length 12
11:36:46.976852 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [.], ack 9, 
win 365, options [nop,nop,TS val 1077396 ecr 40467751], length 0
11:36:46.976904 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [.], ack 17, 
win 365, options [nop,nop,TS val 1077396 ecr 40467751], length 0
11:36:46.976956 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [.], ack 29, 
win 365, options [nop,nop,TS val 1077396 ecr 40467751], length 0
11:36:46.977759 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [P.], seq 
9:185, ack 29, win 365, options [nop,nop,TS val 1077396 ecr 40467751], length 
176
11:36:46.977831 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
29:53, ack 185, win 108, options [nop,nop,TS val 40467751 ecr 1077396], length 
24
11:36:46.978361 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [P.], seq 
185:221, ack 53, win 365, options [nop,nop,TS val 1077396 ecr 40467751], length 
36
11:36:46.978462 IP 192.168.1.203.6633 > 192.168.1.189.56841: Flags [FP.], seq 
125:133, ack 221, win 108, options [nop,nop,TS val 40467751 ecr 1072397], 
length 8
11:36:46.978515 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
53:125, ack 221, win 108, options [nop,nop,TS val 40467751 ecr 1077396], length 
72
11:36:46.979196 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [P.], seq 
221:313, ack 125, win 365, options [nop,nop,TS val 1077397 ecr 40467751], 
length 92
11:36:46.979300 IP 192.168.1.189.56844 > 192.168.1.203.6633: Flags [P.], seq 
313:385, ack 125, win 365, options [nop,nop,TS val 1077397 ecr 40467751], 
length 72
11:36:46.979306 IP 192.168.1.189.56841 > 192.168.1.203.6633: Flags [R], seq 
288016692, win 0, length 0
11:36:46.980084 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
125:149, ack 385, win 108, options [nop,nop,TS val 40467752 ecr 1077397], 
length 24
11:36:46.980990 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
149:229, ack 385, win 108, options [nop,nop,TS val 40467752 ecr 1077397], 
length 80
11:36:47.182857 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
125:149, ack 385, win 108, options [nop,nop,TS val 40467803 ecr 1077397], 
length 24
11:36:47.590882 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
125:149, ack 385, win 108, options [nop,nop,TS val 40467905 ecr 1077397], 
length 24
11:36:48.407692 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
125:149, ack 385, win 108, options [nop,nop,TS val 40468109 ecr 1077397], 
length 24
11:36:50.038876 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
125:149, ack 385, win 108, options [nop,nop,TS val 40468517 ecr 1077397], 
length 24
11:36:53.302861 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
125:149, ack 385, win 108, options [nop,nop,TS val 40469333 ecr 1077397], 
length 24
11:36:59.831044 IP 192.168.1.203.6633 > 192.168.1.189.56844: Flags [P.], seq 
125:149, ack 385, win 108, options [nop,nop,TS val 40470965 ecr 1077397], 
length 24

I noticed that the controller 192.168.1.203, shortly after establishing 
connection, tries to send a packet to the AP continuously because it doesn't 
receive any response from the AP. This happened at 11:36:26.979888 and 
11:36:46.980084. And then, the AP disconnects from the controller with message 
" no response to inactivity probe after 5 seconds, disconnecting". I wasn't 
able to obtain a good slice of the tcpdump on the AP side because the traffic 
level was extremely high. I'll try to filter out some of it and see if if the 
AP ever received the message from the controller.

Do you have any suggestions for this issue? Should I use a different controller 
(not pyswitch)?

(I apologize for the long log files) 

Thank you,
Regards,

Heming
________________________________________
From: yap...@gmail.com [yap...@gmail.com] on behalf of kk yap 
[yap...@stanford.edu]
Sent: May 10, 2012 17:52
To: Heming Wen
Cc: Dan Talayco; openflow-discuss@lists.stanford.edu
Subject: Re: [openflow-discuss] OpenRoads controller link with PC Engine AP

Can you grab a tcpdump of the controller traffic and take a look
there?  Why is the controller going silent?  It should have some
keep-alive going.  Which switch would this be on the AP?

Regards
KK

On 10 May 2012 13:56, Heming Wen <heming....@mail.mcgill.ca> wrote:
> Hi KK,
>
> Here is a "slice" of the log from the AP point of view (accessed through 
> serial interface):
>
> Dec 31 16:00:51|00018|rconn|INFO|dp0<->tcp:192.168.1.203:6633: connected
> Dec 31 16:00:51|00019|fail_open|WARN|No longer in fail-open mode
> [   40.682489] ath5k phy0: unsupported jumbo
> Dec 31 16:01:01|00020|rconn|ERR|dp0<->tcp:192.168.1.203:6633: no response to 
> inactivity probe after 5 seconds, disconnecting
> [   44.599003] ath5k phy0: unsupported jumbo
> [   44.663382] ath5k phy0: unsupported jumbo
> Dec 31 16:01:02|00021|rconn|INFO|dp0<->tcp:192.168.1.203:6633: connecting...
> Dec 31 16:01:03|00022|rconn|INFO|dp0<->tcp:192.168.1.203:6633: connection 
> timed out
> Dec 31 16:01:03|00023|rconn|INFO|dp0<->tcp:192.168.1.203:6633: waiting 2 
> seconds before reconnect
> [   46.695553] ath5k phy0: unsupported jumbo
> Dec 31 16:01:05|00024|rconn|INFO|dp0<->tcp:192.168.1.203:6633: connecting...
> Dec 31 16:01:07|00025|fail_open|WARN|Could not connect to controller (or 
> switch failed controller's post-connection admission control policy) for 15 
> seconds, failing open
> Dec 31 16:01:07|00026|rconn|INFO|dp0<->tcp:192.168.1.203:6633: connection 
> timed out
> Dec 31 16:01:07|00027|rconn|INFO|dp0<->tcp:192.168.1.203:6633: waiting 4 
> seconds before reconnect
> [   50.176894] ath5k phy0: unsupported jumbo
> [   53.487164] ath5k phy0: unsupported jumbo
> Dec 31 16:01:11|00028|rconn|INFO|dp0<->tcp:192.168.1.203:6633: connecting...
> Dec 31 16:01:11|00029|rconn|INFO|dp0<->tcp:192.168.1.203:6633: connected
>
> The problem is: " no response to inactivity probe after 5 seconds, 
> disconnecting". This connect/disconnect cycle continues endlessly.
>
> On the controller side, here is a slice of the message:
>
> 00025|nox.coreapps.examples.pyswitch|INFO: Switch 1 has joined the network
> 00026|nox.coreapps.examples.pyswitch|INFO: Switch 1 has left the network
> 00027|nox.coreapps.examples.pyswitch|INFO: Switch 1 has joined the network
> 00028|nox.coreapps.examples.pyswitch|INFO: Switch 1 has left the network
>
> So it seems it's AP who's disconnecting on its own, not the controller. Do 
> you know if this is a normal behavior? Did I miss something in the setup of 
> the wireless AP?
>
> @Dan:
>
> Currently, the error I see above occur even if I have a direct ethernet 
> connection between the AP and the controller PC.
>
> However, in the future setup, I plan to use a desktop switch to allow the 
> same controller to control both the management port of the switch and the AP 
> attached to the switching plane of the switch. In that setup, there will be a 
> situation where the controller connection with the AP needs to be configured 
> through OpenFlow.  So I was wondering if the following still holds:
>
>> The main thing you want (need) to avoid is having the traffic for an
>> OpenFlow controller connection travel over a data plane that is itself
>> controlled by the same connection
>
> Because technically in my setup, the traffic of the OpenFlow controller 
> connection with AP are travelling over the data plane controlled by a 
> connection between the switch and the OpenFlow controller. So technically, 
> it's two connections, one between switch and controller, the other between AP 
> and controller. The controller connection with the switch does not go through 
> the switching plane of itself (instead it goes through the switching plane of 
> a third non-openflow switch). Would the concern you have still be valid in 
> this case? Also, would the introduction of a third non-openflow switch be 
> problematic?
>
> Here is a schematic of my planned setup:
>
> [controller PC] <----------> [D-link desktop switch (No Openflow)]
> [Pronto switch management port] <----------> [D-link desktop switch (No 
> Openflow)]
> [Pronto switching plane port] <------------> [D-link desktop switch (No 
> Openflow)]
> [Pc Engine AP] <---------------> [Pronto switching plane port]
>
> So the ports controlled by Openflow are the Pronto switch port. Since the 
> only way the AP can be accessed by the controller is through the Pronto 
> switch, the OF control messages with AP would be themselves flow entries in 
> the OF-controlled switch. Would that be an issue?
>
> Thank you for your kind response,
> Regards,
>
> Heming
> ________________________________________
> From: yap...@gmail.com [yap...@gmail.com] on behalf of kk yap 
> [yap...@stanford.edu]
> Sent: May 10, 2012 15:51
> To: Dan Talayco
> Cc: Heming Wen; openflow-discuss@lists.stanford.edu
> Subject: Re: [openflow-discuss] OpenRoads controller link with PC Engine AP
>
> Hi,
>
> If you are having the connection to AP come and go, you are probably
> having a connection.  Question is why is the AP disconnecting.  Look
> at the log of the controller.  That should say something.
>
> Regards
> KK
>
> On 10 May 2012 12:30, Dan Talayco <dtala...@stanford.edu> wrote:
>> Sorry for the non-specific response.
>>
>> The main thing you want (need) to avoid is having the traffic for an
>> OpenFlow controller connection travel over a data plane that is itself
>> controlled by the same connection.  In theory this can be made to work, but
>> probably not without firmware changes to one or more of the devices
>> involved.
>>
>> -Dan
>>
>> On Thursday, May 10, 2012 at 12:09 PM, Heming Wen wrote:
>>
>> Hi KK,
>>
>> Thanks for the heads up. I am currently trying approach #1 (using extra
>> switch to connect everything under 1 subnet). Before doing that though, I
>> was trying to test the connection between nox and the PC engine AP. When I
>> was using pyswitch to test the connection, it seems that the AP's connection
>> to the controller is constantly on and off (join and left the network
>> constantly). I am not sure if this is the normal behavior because pyswitch
>> probably was not designed for controlling the APs. Right now, the AP keeps
>> disconnecting from the controller. However, it did recognize the DPID I set
>> for the AP (which was "1").
>>
>> I am not sure if this is because I am using pyswitch instead of the intended
>> OpenRoads controller. I will be using a different controller eventually but
>> I wanted to know if there was something wrong with the AP-controller
>> connection to start off with.
>>
>> Thank you again,
>>
>> Heming
>> ________________________________________
>> From: yap...@gmail.com [yap...@gmail.com] on behalf of kk yap
>> [yap...@stanford.edu]
>> Sent: May 10, 2012 13:55
>> To: Heming Wen
>> Cc: Dan Talayco; openflow-discuss@lists.stanford.edu
>> Subject: Re: [openflow-discuss] OpenRoads controller link with PC Engine AP
>>
>> Hi Heming,
>>
>> Some comments inline.
>>
>> Regards
>> KK
>>
>> On 10 May 2012 09:18, Heming Wen <heming....@mail.mcgill.ca> wrote:
>>
>> Hi KK,
>>
>> In terms of physical hardware, I believe we have the exact same set of
>> hardware mentioned in the Stanford OpenRoads testbed. We are using PC Engine
>> AP and Pronto 3290 switches with Indigo installed. Right now, a controller
>> VM is running on a PC workstation connected to the management port of the
>> Pronto switch. Using simple pyswitch.py controller to detect devices, a
>> successful connection has been established between the switch and the
>> controller.
>>
>> When you say "make sure the controller is also accessible to the AP on the
>> datapath", I am not extremely sure about the approach I should take. Do you
>> mean using a second switch (a smaller one, D-Link desktop switch for
>> instance) to connect the control port of the switch, the port of the Pc
>> workstation controller and the switching plane of the switch (on which the
>> AP is attached) together?
>>
>>
>> This should work in theory. I assume Indigo allows this. Dan should
>> be able to comment on this. It is setting up an out-of-band control
>> network.
>>
>> Or do you mean by having an extra network card installed on the controller
>> PC in order to be connected to both the control port of the switch and the
>> switching plane (using two subnets).
>>
>>
>> Yes, this is what Dan was describing and we have done this before.
>> With a NEC though.
>>
>> Or are you referring to something else entirely? Is it possible for us to
>> use the same approach you used in your setup so we can recreate it?
>>
>>
>> We had this setup in various forms over time, using different switches
>> and APs. There isn't a "particularly right" way to do this. It all
>> depends on the equipment you have at hand and what you are trying to
>> do.
>>
>>
>> Sorry for asking so many questions at once as I am still relatively new with
>> networking in general.
>>
>> Thank you for your swift response and support.
>>
>> Heming
>> ________________________________________
>> From: yap...@gmail.com [yap...@gmail.com] on behalf of kk yap
>> [yap...@stanford.edu]
>> Sent: May 9, 2012 22:19
>> To: Heming Wen
>> Cc: Dan Talayco; openflow-discuss@lists.stanford.edu
>> Subject: Re: [openflow-discuss] OpenRoads controller link with PC Engine AP
>>
>> Hi Heming,
>>
>> One way is to have only the AP in inband mode. Get your switch to the
>> controller, then make sure the controller is also accessible to the AP
>> on the datapath. We have had such a setup before. It should work.
>>
>> Regards
>> KK
>>
>> On 9 May 2012 18:42, Heming Wen <heming....@mail.mcgill.ca> wrote:
>>
>> Hi Dan,
>>
>> Actually, I was wondering about how the OpenRoads deployment was setup. I
>> thought the APs were attached to the OpenFlow switches? Or are they not
>> Pronto switches? In other words, how is the OpenRoads controller setup in
>> order to control both the switches and the AP at the same time?
>>
>> Thank you,
>>
>> Heming
>> ________________________________________
>> From: Dan Talayco [dan.tala...@bigswitch.com] on behalf of Dan Talayco
>> [dtala...@stanford.edu]
>> Sent: May 9, 2012 18:00
>> To: Heming Wen
>> Cc: openflow-discuss@lists.stanford.edu
>> Subject: Re: [openflow-discuss] OpenRoads controller link with PC Engine AP
>>
>> I believe you're basically asking the switch to route (or at least switch)
>> between the management port and the dataplane. The short answer is that the
>> switch won't do this and it's not planned to be supported.
>>
>> You probably want "physical in-band management" where the Pronto switch is
>> managed by a connection accessed through a data plane port. This feature is
>> not yet fully supported on the Pronto platforms, although some people are
>> working with it now. Note that although physically on a dataplane port, the
>> connection may still be logically separated from the OpenFlow controlled
>> traffic.
>>
>> If you take this approach (of physical in-band) would you expect to be able
>> to dedicate a VLAN to management (including the controller traffic)? The
>> alternative is to have OpenFlow controlling the traffic to the controller,
>> something that has enough pitfalls that no one has really gotten it to work
>> reliably.
>>
>> -Dan
>>
>>
>> On Wednesday, May 9, 2012 at 1:17 PM, Heming Wen wrote:
>>
>> Greetings,
>>
>> We are currently setting up a basic Openflow Wireless testbed with three PC
>> Engine AP and a Pronto 3290 switch in our labs. We have a few questions
>> regarding the connection between the elements:
>>
>> 1) There are three controller path setups possible: L3 inband, tunneling and
>> L2 inband. If we want to setup a small demo (n-casting for instance), is
>> there a preference for a particular configuration?
>>
>> 2) How must the Openflow controller connected to the network in order to
>> control the AP? Right now, the openflow controller is connected to the
>> special ethernet port of the Pronto switch (in order to control the switch).
>> The default pyswitch controller can detect the Indigo/Pronto switch.
>> However, the AP is connected to the switching plane of the Pronto switch. Is
>> there a way to access the switching plane ports from the control port or
>> must the controller be connected in a different fashion? Right now, pinging
>> doesn't work between the switching plane and the control plane.
>>
>> Thank you for your help,
>>
>> Heming
>> _______________________________________________
>> openflow-discuss mailing list
>> openflow-discuss@lists.stanford.edu<mailto:openflow-discuss@lists.stanford.edu>
>> https://mailman.stanford.edu/mailman/listinfo/openflow-discuss
>>
>> _______________________________________________
>> openflow-discuss mailing list
>> openflow-discuss@lists.stanford.edu
>> https://mailman.stanford.edu/mailman/listinfo/openflow-discuss
>>
>>
_______________________________________________
openflow-discuss mailing list
openflow-discuss@lists.stanford.edu
https://mailman.stanford.edu/mailman/listinfo/openflow-discuss

Reply via email to