Specialization Software-defined Networking (Winter 2014/2015): Difference between revisions

Jump to navigation Jump to search
Line 120: Line 120:
*** Now infect h1: python json_sender.py -n infected -l True --flow="{srcmac=00:00:00:00:00:01}" -a 127.0.0.1 -p 50001
*** Now infect h1: python json_sender.py -n infected -l True --flow="{srcmac=00:00:00:00:00:01}" -a 127.0.0.1 -p 50001
*** check h1 ping h2. We should be able to observe that this traffic is blocked.
*** check h1 ping h2. We should be able to observe that this traffic is blocked.
** Now, we move on to the debugging part
*** Now, we move on to the debugging part
*** check h2 ping h3, what happens?  
**** check h2 ping h3, what happens?  
*** Now, modify the given code to allow h2 traffic to pass through to h3, when h1 is "infected".  
**** Now, modify the given code to allow h2 traffic to pass through to h3, when h1 is "infected".  
** If time permits, check if the "exempt" case is working fine too
** If time permits, check if the "exempt" case is working fine too
** If time permits, try fixing [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/pyretic_gardenwall_internetsolution.py this] code for the "infected" case.
** If time permits, try fixing [https://dl.dropboxusercontent.com/u/1652374/SDN_Course/Exercises/pyretic_gardenwall_internetsolution.py this] code for the "infected" case.
783

edits

Navigation menu