:HiI lunch DDoS attack on host in mnininet with OpenFlow13 switches connected 
to Ryu controller. I send the traffic from topology code, so there is multiple 
hosts send huge traffic in small duration. When I collected the flows with 
there statistics, I saw three errors on the controller side: one returned from 
switches, and the other two is python errors
The first is with code 1 type  8, 
The second is [Error 32]: Broken pipe.
The third is [Error 104] Connection reset by peer.
what this errors? and when they are generated?


Regards,Eman
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are 
consuming the most bandwidth. Provides multi-vendor support for NetFlow, 
J-Flow, sFlow and other flows. Make informed decisions using capacity 
planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
_______________________________________________
Ryu-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ryu-devel

Reply via email to