On Fri, Feb 08, 2013 at 12:08:06PM -0800, Murphy McCauley wrote:
> I'd suggest that you try running POX's openflow.discovery component and see 
> if it works, since it would seem to do pretty much what you're trying to do 
> here (generate LLDP messages from scratch).  If it works, check out the 
> messages it's generating and compare them with your own (you can use 
> openflow.debug to save it all as PCAP traces).

That was a very helpful suggestion.   I ran openflow.discovery and I *did*
see discovery messages received on the host connected to the switch
port.   However I was puzzled because the destination MAC address was
01:23:20:00:00:01, rather than the LLDP multicast address.  Examing the
disccovery.py code, I see that it's using the "Nicira Discovery Protocol"
Multicast adress rather than the LLDP Multicast Address.  

I changed our code to use the NDP_MULTICAST address rather than
LLDP_MULTICAST and now I see the packets generated by my code!

So, now the question is why doesn't it like the LLDP_MULTICAST address?
Is the openflow switch refusing to send these for some reason?  Or 
perhaps the connected host running wireshark is eating them at a layer
below where wireshark can see them?  Or something else?

-- 
Peter Fales
Alcatel-Lucent
Member of Technical Staff
1960 Lucent Lane
Room: 9H-505
Naperville, IL 60566-7033
Email: peter.fa...@alcatel-lucent.com
Phone: 630 979 8031
_______________________________________________
openflow-discuss mailing list
openflow-discuss@lists.stanford.edu
https://mailman.stanford.edu/mailman/listinfo/openflow-discuss

Reply via email to