CSE 461: Introduction to Computer Communication Networks, Winter 2017
  CSE Home   About Us   Search   Contact Info 
GoPost Forum
    Project 3: Software Defined Networking
Out: Sunday, Feb 12th
Due: Sunday, March 5th 11 PM
Turnin: Online
Teams: Teams of 2

Project Overview.

In this project you will learn about Software Defined Networking (SDN). Using Virtualbox, Mininet, and Pox as the implementers of the OpenFlow protocol, you will build simple networks using SDN primitives.

  1. First you will learn to use mininet, a SDN-enabled network emulator.
  2. For the second portion you will be using POX to implement a simple L2 firewall.
  3. For the third portion you will be building an entire network, with multiple switches capable of handling ARP and other traffic.
  4. Lastly, you will be modifying your part 3 solution to implement an actual L3 IP router that handles ARP and routes traffic.


Software Defined Networking and OpenFlow

Software-Defined Networking (SDN) is a recently proposed networking paradigm in which thedata- and the control planes are decoupled from one another. One can think of the control plane as being the networks "brain", i.e., it is responsible for making all decisions, for example, how to forward data, while the data plane is what actually moves the data. In traditional networks, both the control- and data planes are tightly integrated and implemented in the forwarding devices that comprise a network. The SDN control plane is implemented by the "controller" and the data plane by "switches". The controller acts as the "brain" of the network, and sends commands (a.k.a. "rules") to the switches on how to handle traffic. OpenFlow has emerged as the de facto SDN standard and specifies how the controller and the switches communicate as well as the rules controllers install on switches.


Mininet is a software stack that creates a virtual network on your computer/laptop. It accomplishes this task by creating host namespaces (h1, h2, etc) and connecting them through virtual interfaces. So when we run ping between the linux namespaces h1 and h2, the ping will run from h1s namespace through a virtual interface pair created for h1 and h2, before it reaches h2. If h1 and h2 are connected through a switch as shown in the python code in the Mininet walkthrough, the ping will transit multiple virtual interface pairs. The switches that we will be using are running OpenVSwitch (OVS), a software-defined networking stack. Mininet will connect additional virtual interfaces between each virtual port on the switch with each connected host. The host name space allows each host to see the same file system, but operates as its own process that will run separately from each of the other host processes. The OVS version running on the Ubuntu image supports OpenFlow.


Pox is a research/academic implementation of an OpenVFlow controller. It provides python hooks to program mininet-based software emulated networks.


Part 1: Mininet Primer

VirtualBox Installation
Mininet is a virtual machine image with a number of network emulation tools built into it. The first step of getting mininet set up is to install a Virtualization Platform. We suggest VirtualBox, an open source and freely available stack. The manual is available here. If you wish to use other virtualization platforms that's fine, but the TAs and staff will not support them.
There are a well known set of issues in using virtualization. If you encounter issues, reach out online and we'll see how we can help. Some common issues and answers are:

  • - Did you download the correct version? (32-bit vs 64-bit)
  • - Is your computer really old? It might not be able to be virtualized -- talk to the TA.
  • - Make sure that virtualization is enabled in your BIOS.

Mininet Installation
With VirtualBox (or other virtualization platform) installed, we now need to grab the Mininet image from here. It is based off of Ubuntu 14.04 and includes a default set of mininet binaries and example scripts. Once you've downloaded an image that fits your own VM installation, import and it and boot them VM.

Using Mininet
Using mininet is described here. You can run it by typing: sudo mn
Inside of the the mininet CLI, try running other commands like help, net, nodes, links and dump. Mininet starts with a default network that you can poke at. Find the mac address of the hosts, the ethernet ports connected, and the hostnames in the system.

Programming Mininet Topologies
Mininet is also programmable using the python programming language. We have provided some sample topologies here. To install this in the virtual machine, you may with to use the wget command (outside of Mininet). Download and unzip this file and you'll find two different directories: topo and pox. Ignore the pox directory for now (it's used in part2). In the topo folder there are a variety of python files. These each define a basic skeleton topology for each of the following project portions. Run the project 1 file with sudo python project3/topos/part1.py. It will drop you into the CLI with the network topology defined in the python script.

Your task in project one is to modify part1.py to represent the following network topology:

[h3]----/    \-----[h4]

Where [x] means you create a host named x, {y} means a switch named y, and --- means there is a link between the node and the switch.

After creating the above architecture, provide the two items in a part1 folder in a compressed file:
  • 1) Your modified part1.py file
  • 2) Screenshots of the iperf, dump, and pingall commands (from mininet) in pdf format.

Part 2: SDN Controllers using POX

In part 1, we experimented with Mininet using its internal controller. In this (and future) parts, we will instead be using our own controller to send commands to the switches. We will be using the POX controller, which is written in Python.
For this assignment you will create a simple firewall using OpenFlow-enabled switches. The term "firewall" is derived from building construction: a firewall is a wall you place in buildings to stop a fire from spreading. In the case of networking, it is the act of providing security by not letting specified traffic pass through the firewall. This feature is good for minimizing attack vectors and limiting the network "surface" exposed to attackers. In this part, we will provide you with the Mininet configuration, part2.py, to setup your network which assumes a remote controller listening on the default IP address and port number You do not need to (and should not) modify this file. The configuration that this script will setup is as follows. Note that h1 and h4 are on the same subnet and a different one from h2 and h3.

\                \               /               /
 \                \             /               /
  \                \----{s1}---/               /
   \-------------------/ |  \-----------------/

For part 2, we will also provide you with a skeleton POX controller: part2controller.py. This file will be where you will make your modifications to create the firewall. To run the controller, place project3/pox/part2controller.py in the ~/pox/pox/misc directory. You can then launch the controller with the command sudo ~/pox/pox.py misc.part2controller. To run the mininet file, place it in ~ and run the command sudo python ~/project3/topos/part2.py
The rules s1 will need to implement are as follows:

src ip dst ip protocol action
any ipv4 any ipv4 icmp accept
any any arp accept
any ipv4 any ipv4 - drop

Basically, your Firewall should allow all ARP and ICMP traffic to pass. However, any other type of traffic should be dropped. It as acceptable to flood the allowable traffic out all ports. Be careful! Flow tables match the rule with highest priority first, where priority is established based on the order rules are placed in the table. When you create a rule in the POX controller, you need to also have POX "install" the rule in the switch. This makes it so the switch "remembers" what to do for a few seconds. Do not handle each packet individually inside of the controller! Hint: To do this, look up ofp_flow_mod. http://archive.openflow.org/wk/index.php/OpenFlow_Tutorial#Sending_OpenFlow_messages_with_POX and https://openflow.stanford.edu/display/ONL/POX+Wiki are both useful resources for understanding how to use POX.

  • 1) (10 Points) A screenshot of the pingall command. Note that h1 and h4 should be able to ping each other, and h2 and h3, but not across subnets. Also, the iperf command should fail (as you're blocking IP traffic). This is realized as the command hanging.
  • 2) (20 Points) A screenshot of the output of the dpctl dump-flows command. This should contain all of the rules you've inserted into your switch.
  • 3) Your part2controller.py file.

Part 3: A real network

In part 2 you implemented a simple firewall that allowed ICMP packets, but blocked all other packets. For your part 3, you will be expanding on this to implement routing between subnets, and implementing firewalls for certain subnets. The idea is to simulate an actual production network.
We will be simulating a network for a small company. The company has a 3 floor building, with each floor having its own switch and subnet. Additionally, we have a switch and subnet for all the servers in the data center, and a core switch connecting everything together. Note that the names and IPs are not to be changed. As with prior assignments, we have provided a skeleton file for both the topology (project3/topos/part3.py) and controller (project3/pox/part3controller.py). This time you will need to modify both files to complete the assignment.

[h30@]--{s3}--/    |

Your goal will be to allow traffic to be transmitted between all the hosts. In this assignment, you will be allowed to flood all non-IP traffic in the same method that you did in part2 (using a destination port of of.OFPP_FLOOD). However, you will need to specify specific ports for all IP traffic. You may do this however you choose-- however, you may find it easiest to determine the correct destination port by using the destination IP address and source IP address, as well as the source port on the switch that the packet originated from. Additionally, to protect our servers from the untrusted Internet, we will be blocking all IP traffic from the Untrusted Host to Server 1. To block the Internet from discovering our internal IP addresses, we will also block all ICMP traffic from the Untrusted Host. In summary of your goals:
  • Create a Mininet Topology (as per part 1) to represent the above topology.
  • Create a Pox controller (as per part 2) with the following features: All nodes able to communicate EXCEPT
    • hnotrust1 cannot send ICMP traffic to h10, h20, h30, or serv1.
    • hnotrust1 cannot send any IP traffic to serv1.

  • 1) A screenshot of the pingall command. All nodes but hnotrust should be able to send and respond to pings.
  • 2) A screenshot of the iperf hnotrust1 h10 and iperf h10 serv1 commands. Though not shown in these commands, hnotrust should not be able to transfer to serv1. It should be able to transfer to other hosts.
  • 3) A screenshot of the output of the dpctl dump-flows command. This should contain all of the rules you've inserted into your switches.
  • 4) Your part3.py and part3controller.py files.

Part 4: Adding a router

For part 4, we're extending your part 3 code to implement an actual level-3 router out of the cores21 switch. Copy the part3.py and part3controller.py files to part4.py and part4controller.py appropriately. For the topology, you'll need to change the default route for the hosts from 'h10-eth0' to 'via' where '' is the IP address of the router for that particular subnet. To complete the assignment cores21 will need to:

  • Handle ARP traffic across subnets (without forwarding) and;
  • Forward IP traffic across link domains (changing the ethernet header).
This can be done with the static ARP and IP tables provided (though if you do it dynamically, that's super cool). You may also handle the individual ARP packets in the controller (i.e., not with flow rules) for part 4. The other switches (e.g., s1) do not need to be modified (and can continue to flood ARP). IP traffic forwarding still requires rules and both the switches and the router.

  • 1) A screenshot of the pingall command. All nodes but hnotrust should be able to send and respond to pings.
  • 2) A screenshot of the iperf hnotrust1 h10 and iperf h10 serv1 commands. hnotrust should not be able to transfer to serv1, but should be able to transfer to other hosts
  • 3) A screenshot of the output of the dpctl dump-flows command. This should contain all of the rules you've inserted into your switches.
  • 4) Your part4.py and part4controller.py files.

When you're ready to turn in your assignment, do the following:
  1. The files you submit should be placed in a directory named project3. There should be no other files in that directory.
  2. Create a README.txt file that contains the names and UW netid of the member(s) of your team.
  3. Inside of the project3 directory, create subdirectories for each of the project parts (part1/,part2/,...).
  4. Inside of each part directory, place your topo file (e.g., part1.py), controller file (part1controller.py) if they exist (no controller for part 1), and your screenshots.
  5. Archive all the materials (project3 folder and everything in it) in a single .tar file named partner1netid_partner2netid.tar.
  6. Submit the partner1netid_partner2netid.tar file to the course dropbox.

Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 fax
[comments to kheimerl at cs.washington.edu]