# Copyright (C) 2011 Nippon Telegraph and Telephone Corporation.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#    http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
# implied.
# See the License for the specific language governing permissions and
# limitations under the License.

from ryu.base import app_manager
from ryu.controller import ofp_event
from ryu.controller.handler import CONFIG_DISPATCHER, MAIN_DISPATCHER
from ryu.controller.handler import set_ev_cls
from ryu.ofproto import ofproto_v1_3
from ryu.lib.packet import packet
from ryu.lib.packet import ethernet,ipv4,udp
from ryu.lib.packet import ether_types
import time
import threading
from struct import *
class SimpleSwitch13(app_manager.RyuApp):
    OFP_VERSIONS = [ofproto_v1_3.OFP_VERSION]

    def __init__(self, *args, **kwargs):
        super(SimpleSwitch13, self).__init__(*args, **kwargs)
        self.mac_to_port = {}
        self.start_time = time.time()
        self.iot_data = []
        self.iot_data_size = 0
        self.ip_ihl=5
        self.ip_ver=4
        self.ip_tos = 0
        self.ip_tot_len = 0  # kernel will fill the correct total length
        self.ip_id = 54321   #Id of this packet
        self.ip_frag_off = 0
        self.ip_ttl = 255
        self.ip_proto = 0
        self.ip_check = 0    # kernel will fill the correct checksum
        self.ip_saddr = 0   #Spoof the source ip address if you want to
        self.ip_daddr = 0
        self.ip_ihl_ver = (self.ip_ver << 4) + self.ip_ihl
    
    

    @set_ev_cls(ofp_event.EventOFPSwitchFeatures, CONFIG_DISPATCHER)
    def switch_features_handler(self, ev):
        datapath = ev.msg.datapath
        ofproto = datapath.ofproto
        parser = datapath.ofproto_parser

        # install table-miss flow entry
        #
        # We specify NO BUFFER to max_len of the output action due to
        # OVS bug. At this moment, if we specify a lesser number, e.g.,
        # 128, OVS will send Packet-In with invalid buffer_id and
        # truncated packet data. In that case, we cannot output packets
        # correctly.  The bug has been fixed in OVS v2.1.0.
        match = parser.OFPMatch()
        actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER,
                                          ofproto.OFPCML_NO_BUFFER)]
        self.add_flow(datapath, 0, match, actions)


    def add_flow(self, datapath, priority, match, actions, buffer_id=None):
        ofproto = datapath.ofproto
        parser = datapath.ofproto_parser

        inst = [parser.OFPInstructionActions(ofproto.OFPIT_APPLY_ACTIONS,
                                             actions)]
        if buffer_id:
            mod = parser.OFPFlowMod(datapath=datapath, buffer_id=buffer_id,
                                    priority=priority, match=match,
                                    instructions=inst)
        else:
            mod = parser.OFPFlowMod(datapath=datapath, priority=priority,
                                    match=match, instructions=inst)
        datapath.send_msg(mod)
    @set_ev_cls(ofp_event.EventOFPPacketIn, MAIN_DISPATCHER)
    def _packet_in_handler(self, ev):
        # If you hit this you might want to increase
        # the "miss_send_length" of your switch
        if ev.msg.msg_len < ev.msg.total_len:
            self.logger.debug("packet truncated: only %s of %s bytes",
                              ev.msg.msg_len, ev.msg.total_len)
        msg = ev.msg
        datapath = msg.datapath
        ofproto = datapath.ofproto
        parser = datapath.ofproto_parser
        in_port = msg.match['in_port']

        pkt = packet.Packet(msg.data)
        eth = pkt.get_protocols(ethernet.ethernet)[0]

        if eth.ethertype == ether_types.ETH_TYPE_LLDP:
            # ignore lldp packet
            return

        dst = eth.dst
        src = eth.src
        print "dst---->", dst
        ipv4_packet = pkt.get_protocol(ipv4.ipv4)
        if ipv4_packet:
            proto = ipv4_packet.proto
            total_len = ipv4_packet.total_length
            source=ipv4_packet.src
            destination= ipv4_packet.dst
            print "INFORMATION:", proto
            print total_len
            print "source address", source
        else:
            proto = total_len = 0

        dpid = datapath.id
        self.mac_to_port.setdefault(dpid, {})


#               match = parser.OFPMatch(eth_dst="c8:d3:a3:98:63:71")
#               actions = [parser.OFPActionOutput(ofproto.OFPP_CONTROLLER,
#                                      ofproto.OFPCML_NO_BUFFER)]
#        self.add_flow(datapath, 20,match,actions)

        self.logger.info("packet in %s %s %s %s", dpid, src, dst, in_port)
	def timeit():
    				time.sleep(5)
				aggr()
				return

	def aggr():
                                self.no_of_data=len(self.iot_data)
                                self.ip_proto=proto
                                self.ip_saddr=source
                                self.ip_daddr=destination
                                ip_head= pack('!BBHHHBBH16s16s' , self.ip_ihl_ver, self.ip_tos, self.ip_tot_len, self.ip_id, self.ip_frag_off, self.ip_ttl,self.ip_check,self.ip_proto, self.ip_saddr, self.ip_daddr)
                                total_pkts= pack('!I', self.no_of_data)
                                print "TOTALLLL,,,,",self.no_of_data
                                ip_head="{" + ip_head + "}"
                                total_pkts="{" + total_pkts + "}"
                                s='$'
                                data = s.join(self.iot_data)
                                data="$" + data
                                pckt= ip_head + total_pkts + data
                                self.iot_data = []
                                print "BUFFER: ", self.iot_data
                                self.iot_data_size = 0
                                self.start_time = time.time()
                                self.logger.info("packet-out %s" % (repr(pckt),))
                                out_port = ofproto.OFPP_FLOOD
								actions = [parser.OFPActionOutput(out_port)]
                                out = parser.OFPPacketOut(datapath=datapath,
                                          buffer_id=ofproto.OFP_NO_BUFFER,
                                          in_port=in_port, actions=actions,
                                         data=pckt)
                                print "out--->" , out
                                datapath.send_msg(out)
				

	#thread1 = threading.Thread(target=timeit)
#	thread1.start()
    if  proto  == 150 and total_len  < 1500:
			thread1 = threading.Thread(target=timeit)
			thread1.start()
			if not thread1.isAlive():
        			thread1.run()
            print "ifff"
            data = msg.data
            #print " # stores the packet data"
            self.iot_data.append(data)
            #print "# increment size counter"
            self.iot_data_size += total_len
            #elapsed_time = time.time() - self.start_time
            print "ELAPSED: ", elapsed_time
            print "BUFFER: ", self.iot_data
	



    else:

        # learn a mac address to avoid FLOOD next time.
                self.mac_to_port[dpid][src] = in_port
                if dst in self.mac_to_port[dpid]:
                        out_port = self.mac_to_port[dpid][dst]
                else:
                        out_port = ofproto.OFPP_FLOOD
                actions = [parser.OFPActionOutput(out_port)]
        # install a flow to avoid packet_in next time
                if out_port != ofproto.OFPP_FLOOD:
                        match = parser.OFPMatch(in_port=in_port, eth_dst=dst)
            # verify if we have a valid buffer_id, if yes avoid to send both
            # flow_mod & packet_out
                        if msg.buffer_id != ofproto.OFP_NO_BUFFER:
                                self.add_flow(datapath, 1, match, actions, msg.buffer_id)
                                return
                        else:
                                self.add_flow(datapath, 1, match, actions)
                data = None
                if msg.buffer_id == ofproto.OFP_NO_BUFFER:
                    data = msg.data
                out = parser.OFPPacketOut(datapath=datapath, buffer_id=msg.buffer_id,
                                 in_port=in_port, actions=actions, data=data)
                datapath.send_msg(out)
