diff options
Diffstat (limited to 'tests/of13_ericsson-v.out')
-rw-r--r-- | tests/of13_ericsson-v.out | 495 |
1 files changed, 495 insertions, 0 deletions
diff --git a/tests/of13_ericsson-v.out b/tests/of13_ericsson-v.out new file mode 100644 index 0000000..9c54a83 --- /dev/null +++ b/tests/of13_ericsson-v.out @@ -0,0 +1,495 @@ + 1 15:52:49.322823 IP (tos 0x0, ttl 64, id 348, offset 0, flags [DF], proto TCP (6), length 236) + 127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfee0 (incorrect -> 0x21d3), seq 3305197767:3305197951, ack 3938018648, win 100, options [nop,nop,TS val 534888 ecr 533649], length 184: OpenFlow + version 1.3, type FLOW_MOD, length 184, xid 0x00000199 + 2 15:52:49.362355 IP (tos 0x0, ttl 64, id 61731, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1ad3), ack 184, win 98, options [nop,nop,TS val 534898 ecr 534888], length 0 + 3 15:52:49.367093 IP (tos 0x0, ttl 64, id 349, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfe30 (incorrect -> 0x1512), seq 184:192, ack 1, win 100, options [nop,nop,TS val 534899 ecr 534898], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x0000019a + 4 15:52:49.367137 IP (tos 0x0, ttl 64, id 61732, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1abf), ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 0 + 5 15:52:49.367403 IP (tos 0x0, ttl 64, id 61733, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.35359 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x150a), seq 1:9, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x0000019a + 6 15:52:49.367421 IP (tos 0x0, ttl 64, id 350, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.35359: Flags [.], cksum 0xfe28 (incorrect -> 0x1ab5), ack 9, win 100, options [nop,nop,TS val 534899 ecr 534899], length 0 + 7 12:15:37.979676 IP (tos 0x0, ttl 64, id 46225, offset 0, flags [DF], proto TCP (6), length 420) + 127.0.0.1.6633 > 127.0.0.1.43230: Flags [P.], cksum 0xff98 (incorrect -> 0xd79d), seq 402287444:402287812, ack 1282739451, win 98, options [nop,nop,TS val 2953476 ecr 2952724], length 368: OpenFlow + version 1.3, type FLOW_MOD, length 368, xid 0x00000012 + 8 12:15:37.985455 IP (tos 0x0, ttl 64, id 55504, offset 0, flags [DF], proto TCP (6), length 432) + 127.0.0.1.43230 > 127.0.0.1.6633: Flags [P.], cksum 0xffa4 (incorrect -> 0xcda4), seq 1:381, ack 368, win 90, options [nop,nop,TS val 2953478 ecr 2953476], length 380: OpenFlow + version 1.3, type ERROR, length 380, xid 0x00000012 + type BAD_ACTION, code BAD_EXPERIMENTER + data (368 octets) + 9 12:15:37.985482 IP (tos 0x0, ttl 64, id 46226, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.43230: Flags [.], cksum 0xfe28 (incorrect -> 0xb37b), ack 381, win 103, options [nop,nop,TS val 2953478 ecr 2953478], length 0 + 10 14:53:56.336558 IP (tos 0x0, ttl 64, id 63838, offset 0, flags [DF], proto TCP (6), length 172) + 127.0.0.1.6633 > 127.0.0.1.56562: Flags [P.], cksum 0xfea0 (incorrect -> 0x8c0a), seq 4055369935:4055370055, ack 963939871, win 94, options [nop,nop,TS val 3963146 ecr 3962600], length 120: OpenFlow + version 1.3, type GROUP_MOD, length 120, xid 0x0000008a + 11 14:53:56.339805 IP (tos 0x0, ttl 64, id 30929, offset 0, flags [DF], proto TCP (6), length 184) + 127.0.0.1.56562 > 127.0.0.1.6633: Flags [P.], cksum 0xfeac (incorrect -> 0x8455), seq 1:133, ack 120, win 86, options [nop,nop,TS val 3963147 ecr 3963146], length 132: OpenFlow + version 1.3, type ERROR, length 132, xid 0x0000008a + type GROUP_MOD_FAILED, code INVALID_GROUP + data (120 octets) + 12 14:53:56.339839 IP (tos 0x0, ttl 64, id 63839, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.56562: Flags [.], cksum 0xfe28 (incorrect -> 0xcbd6), ack 133, win 98, options [nop,nop,TS val 3963147 ecr 3963147], length 0 + 13 07:06:07.923021 IP (tos 0x0, ttl 64, id 53050, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.56439 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x17bd), seq 2797182347, win 43690, options [mss 65495,sackOK,TS val 1659569 ecr 0,nop,wscale 9], length 0 + 14 07:06:07.923406 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) + 127.0.0.1.6633 > 127.0.0.1.56439: Flags [R.], cksum 0x7727 (correct), seq 0, ack 2797182348, win 0, length 0 + 15 07:06:11.948050 IP (tos 0x0, ttl 64, id 25056, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.56440 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x9014), seq 2428319552, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 0,nop,wscale 9], length 0 + 16 07:06:11.948123 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.56440: Flags [S.], cksum 0xfe30 (incorrect -> 0xf3ee), seq 2308881340, ack 2428319553, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 1660576,nop,wscale 9], length 0 + 17 07:06:11.948171 IP (tos 0x0, ttl 64, id 25057, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc735), ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0 + 18 07:06:11.948588 IP (tos 0x0, ttl 64, id 25058, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc10f), seq 1:9, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 8: OpenFlow + version 1.3, type HELLO, length 8, xid 0x83ea7e23 + 19 07:06:11.948646 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc72d), ack 9, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0 + 20 07:06:11.951581 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0x5426), seq 1:9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660576], length 8: OpenFlow + version 1.0, type HELLO, length 8, xid 0x95b6dc37 + 21 07:06:11.951654 IP (tos 0x0, ttl 64, id 25059, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc723), ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 0 + 22 07:06:11.954851 IP (tos 0x0, ttl 64, id 25060, offset 0, flags [DF], proto TCP (6), length 150) + 127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe8a (incorrect -> 0x83b9), seq 9:107, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 98: OpenFlow + version 1.3, type ERROR, length 98, xid 0xc4420f26 + type HELLO_FAILED, code INCOMPATIBLE + data (86 octets) + 23 07:06:11.956875 IP (tos 0x0, ttl 64, id 25061, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.56440 > 127.0.0.1.6633: Flags [F.], cksum 0xfe28 (incorrect -> 0xc6bf), seq 107, ack 9, win 86, options [nop,nop,TS val 1660578 ecr 1660577], length 0 + 24 07:06:11.995263 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc6b5), ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 0 + 25 07:06:11.996996 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0xc22e), seq 9:17, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 8: OpenFlow + version 1.0, type FEATURES_REQUEST, length 8, xid 0x852f7e3a + 26 07:06:11.997117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) + 127.0.0.1.56440 > 127.0.0.1.6633: Flags [R], cksum 0xf312 (correct), seq 2428319660, win 0, length 0 + 27 20:23:02.447284 IP (tos 0x0, ttl 64, id 5822, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc972), seq 3295811422:3295811430, ack 623716506, win 94, options [nop,nop,TS val 683124 ecr 682086], length 8: OpenFlow + version 1.3, type HELLO, length 8, xid 0x0000015f + 28 20:23:02.487886 IP (tos 0x0, ttl 64, id 541, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xcad0), ack 8, win 86, options [nop,nop,TS val 683135 ecr 683124], length 0 + 29 20:23:03.289931 IP (tos 0x0, ttl 64, id 5823, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc47b), seq 8:16, ack 1, win 94, options [nop,nop,TS val 683335 ecr 683135], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x00000160 + 30 20:23:03.290134 IP (tos 0x0, ttl 64, id 542, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc92d), ack 16, win 86, options [nop,nop,TS val 683335 ecr 683335], length 0 + 31 20:23:03.292620 IP (tos 0x0, ttl 64, id 543, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.37123 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc3b1), seq 1:9, ack 16, win 86, options [nop,nop,TS val 683336 ecr 683335], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x00000160 + 32 20:23:03.292690 IP (tos 0x0, ttl 64, id 5824, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.37123: Flags [.], cksum 0xfe28 (incorrect -> 0xc91b), ack 9, win 94, options [nop,nop,TS val 683336 ecr 683336], length 0 + 33 20:23:03.674363 IP (tos 0x0, ttl 64, id 5825, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe38 (incorrect -> 0xc315), seq 16:32, ack 9, win 94, options [nop,nop,TS val 683431 ecr 683336], length 16: OpenFlow + version 1.3, type HELLO, length 16, xid 0x00000161 + type VERSIONBITMAP, length 8, bitmap 0x00000015 (1.0, 1.2, 1.4) + 34 20:23:03.711246 IP (tos 0x0, ttl 64, id 544, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc84b), ack 32, win 86, options [nop,nop,TS val 683441 ecr 683431], length 0 + 35 09:18:28.508689 IP (tos 0x0, ttl 64, id 8726, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe30 (incorrect -> 0x5466), seq 2774334230:2774334238, ack 3518786755, win 94, options [nop,nop,TS val 2174690 ecr 2173441], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x0000004d + 36 09:18:28.512206 IP (tos 0x0, ttl 64, id 48675, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4f83), seq 1:9, ack 8, win 86, options [nop,nop,TS val 2174691 ecr 2174690], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x0000004d + 37 09:18:28.512310 IP (tos 0x0, ttl 64, id 8727, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x53da), ack 9, win 94, options [nop,nop,TS val 2174691 ecr 2174691], length 0 + 38 09:18:29.938866 IP (tos 0x0, ttl 64, id 8728, offset 0, flags [DF], proto TCP (6), length 73) + 127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe3d (incorrect -> 0x23cf), seq 8:29, ack 9, win 94, options [nop,nop,TS val 2175048 ecr 2174691], length 21: OpenFlow + version 1.3, type ECHO_REQUEST, length 21, xid 0x0000004e + data (13 octets) + 39 09:18:29.940525 IP (tos 0x0, ttl 64, id 48676, offset 0, flags [DF], proto TCP (6), length 73) + 127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe3d (incorrect -> 0x225c), seq 9:30, ack 29, win 86, options [nop,nop,TS val 2175048 ecr 2175048], length 21: OpenFlow + version 1.3, type ECHO_REPLY, length 21, xid 0x0000004e + data (13 octets) + 40 09:18:29.940621 IP (tos 0x0, ttl 64, id 8729, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x50e6), ack 30, win 94, options [nop,nop,TS val 2175048 ecr 2175048], length 0 + 41 15:41:10.777155 IP (tos 0x0, ttl 64, id 14454, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe38 (incorrect -> 0x994a), seq 2142345193:2142345209, ack 115176160, win 94, options [nop,nop,TS val 175830 ecr 174634], length 16: OpenFlow + version 1.3, type EXPERIMENTER, length 16, xid 0x00000041 + experimenter 0x00d0f0db (Ericsson), exp_type 0x00000065 + 42 15:41:10.782182 IP (tos 0x0, ttl 64, id 51401, offset 0, flags [DF], proto TCP (6), length 80) + 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe44 (incorrect -> 0x9024), seq 1:29, ack 16, win 86, options [nop,nop,TS val 175831 ecr 175830], length 28: OpenFlow + version 1.3, type ERROR, length 28, xid 0x00000041 + type BAD_REQUEST, code BAD_LEN + data (16 octets) + 43 15:41:10.782279 IP (tos 0x0, ttl 64, id 14455, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8aee), ack 29, win 94, options [nop,nop,TS val 175831 ecr 175831], length 0 + 44 15:41:10.978145 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0x8661), seq 16:24, ack 29, win 94, options [nop,nop,TS val 175880 ecr 175831], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x00000042 + 45 15:41:10.981725 IP (tos 0x0, ttl 64, id 51402, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x862e), seq 29:37, ack 24, win 86, options [nop,nop,TS val 175881 ecr 175880], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x00000042 + 46 15:41:10.981828 IP (tos 0x0, ttl 64, id 14457, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8a7a), ack 37, win 94, options [nop,nop,TS val 175881 ecr 175881], length 0 + 47 15:41:11.640555 IP (tos 0x0, ttl 64, id 14458, offset 0, flags [DF], proto TCP (6), length 85) + 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe49 (incorrect -> 0x4af3), seq 24:57, ack 37, win 94, options [nop,nop,TS val 176046 ecr 175881], length 33: OpenFlow + version 1.3, type EXPERIMENTER, length 33, xid 0x00000043 + experimenter 0x00d0f0db (Ericsson), exp_type 0x00000065 + data (17 octets) + 48 15:41:11.649632 IP (tos 0x0, ttl 64, id 51403, offset 0, flags [DF], proto TCP (6), length 97) + 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe55 (incorrect -> 0x45af), seq 37:82, ack 57, win 86, options [nop,nop,TS val 176048 ecr 176046], length 45: OpenFlow + version 1.3, type ERROR, length 45, xid 0x00000043 + type BAD_REQUEST, code BAD_LEN + data (33 octets) + 49 15:41:11.649721 IP (tos 0x0, ttl 64, id 14459, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x88de), ack 82, win 94, options [nop,nop,TS val 176048 ecr 176048], length 0 + 50 15:47:18.960105 IP (tos 0x0, ttl 64, id 14608, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0xb4f6), seq 649:657, ack 698, win 94, options [nop,nop,TS val 267876 ecr 267134], length 8: OpenFlow + version 1.3, type FEATURES_REQUEST, length 8, xid 0x0000008e + 51 15:47:18.962238 IP (tos 0x0, ttl 64, id 51478, offset 0, flags [DF], proto TCP (6), length 84) + 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xbbc3), seq 698:730, ack 657, win 86, options [nop,nop,TS val 267876 ecr 267876], length 32: OpenFlow + version 1.3, type FEATURES_REPLY, length 32, xid 0x0000008e + dpid 0x000026a2b46fd9ba, n_buffers 256, n_tables 64, auxiliary_id 0 + capabilities 0x0000004f (FLOW_STATS, TABLE_STATS, PORT_STATS, GROUP_STATS, QUEUE_STATS) + 52 15:47:18.962333 IP (tos 0x0, ttl 64, id 14609, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0xb693), ack 730, win 94, options [nop,nop,TS val 267876 ecr 267876], length 0 + 53 16:32:34.623939 IP (tos 0x0, ttl 64, id 44797, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3d62), seq 2583631865:2583631873, ack 3924671623, win 94, options [nop,nop,TS val 946792 ecr 945543], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002e + 54 16:32:34.625658 IP (tos 0x0, ttl 64, id 3493, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3880), seq 1:9, ack 8, win 86, options [nop,nop,TS val 946792 ecr 946792], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x0000002e + 55 16:32:34.625750 IP (tos 0x0, ttl 64, id 44798, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x3cb9), ack 9, win 94, options [nop,nop,TS val 946792 ecr 946792], length 0 + 56 16:32:34.844806 IP (tos 0x0, ttl 64, id 44799, offset 0, flags [DF], proto TCP (6), length 64) + 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe34 (incorrect -> 0x3760), seq 8:20, ack 9, win 94, options [nop,nop,TS val 946847 ecr 946792], length 12: OpenFlow + version 1.3, type SET_CONFIG, length 12, xid 0x0000002f + flags FRAG_REASM, miss_send_len 200 + 57 16:32:34.883698 IP (tos 0x0, ttl 64, id 3494, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3c3d), ack 20, win 86, options [nop,nop,TS val 946857 ecr 946847], length 0 + 58 16:32:36.376083 IP (tos 0x0, ttl 64, id 44800, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3667), seq 20:28, ack 9, win 94, options [nop,nop,TS val 947230 ecr 946857], length 8: OpenFlow + version 1.3, type GET_CONFIG_REQUEST, length 8, xid 0x00000030 + 59 16:32:36.376174 IP (tos 0x0, ttl 64, id 3495, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3941), ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 0 + 60 16:32:36.378403 IP (tos 0x0, ttl 64, id 3496, offset 0, flags [DF], proto TCP (6), length 64) + 127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe34 (incorrect -> 0x3420), seq 9:21, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 12: OpenFlow + version 1.3, type GET_CONFIG_REPLY, length 12, xid 0x00000030 + flags FRAG_DROP, miss_send_len 200 + 61 16:32:36.378465 IP (tos 0x0, ttl 64, id 44801, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x392d), ack 21, win 94, options [nop,nop,TS val 947230 ecr 947230], length 0 + 62 17:39:10.589931 IP (tos 0x0, ttl 64, id 28700, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe30 (incorrect -> 0x4e78), seq 359193673:359193681, ack 3843617605, win 111, options [nop,nop,TS val 1945783 ecr 1944534], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x000000a6 + 63 17:39:10.592125 IP (tos 0x0, ttl 64, id 24186, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x49a6), seq 1:9, ack 8, win 86, options [nop,nop,TS val 1945784 ecr 1945783], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x000000a6 + 64 17:39:10.592223 IP (tos 0x0, ttl 64, id 28701, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4e45), ack 9, win 111, options [nop,nop,TS val 1945784 ecr 1945784], length 0 + 65 17:39:11.275605 IP (tos 0x0, ttl 64, id 28702, offset 0, flags [DF], proto TCP (6), length 152) + 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xaa9b), seq 8:108, ack 9, win 111, options [nop,nop,TS val 1945955 ecr 1945784], length 100: OpenFlow + version 1.3, type PACKET_OUT, length 100, xid 0x000000a7 + 66 17:39:11.278453 IP (tos 0x0, ttl 64, id 24187, offset 0, flags [DF], proto TCP (6), length 206) + 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfec2 (incorrect -> 0xa12e), seq 9:163, ack 108, win 86, options [nop,nop,TS val 1945955 ecr 1945955], length 154: OpenFlow + version 1.3, type PACKET_IN, length 154, xid 0x00000000 + 67 17:39:11.278747 IP (tos 0x0, ttl 64, id 28703, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4bec), ack 163, win 115, options [nop,nop,TS val 1945956 ecr 1945955], length 0 + 68 17:39:11.293620 IP (tos 0x0, ttl 64, id 28704, offset 0, flags [DF], proto TCP (6), length 152) + 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xa8c9), seq 108:208, ack 163, win 115, options [nop,nop,TS val 1945959 ecr 1945955], length 100: OpenFlow + version 1.3, type PACKET_OUT, length 100, xid 0x000000a8 + 69 17:39:11.296836 IP (tos 0x0, ttl 64, id 24188, offset 0, flags [DF], proto TCP (6), length 234) + 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfede (incorrect -> 0x2262), seq 163:345, ack 208, win 86, options [nop,nop,TS val 1945960 ecr 1945959], length 182: OpenFlow + version 1.3, type PACKET_IN, length 182, xid 0x00000000 + 70 17:39:11.334896 IP (tos 0x0, ttl 64, id 28705, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4abb), ack 345, win 119, options [nop,nop,TS val 1945970 ecr 1945960], length 0 + 71 10:22:45.030583 IP (tos 0x0, ttl 64, id 10058, offset 0, flags [DF], proto TCP (6), length 148) + 127.0.0.1.6633 > 127.0.0.1.53146: Flags [P.], cksum 0xfe88 (incorrect -> 0xf671), seq 1089079797:1089079893, ack 1672614427, win 94, options [nop,nop,TS val 4009818 ecr 4009376], length 96: OpenFlow + version 1.3, type FLOW_MOD, length 96, xid 0x00000076 + 72 10:22:45.067011 IP (tos 0x0, ttl 64, id 11330, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.53146 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x6e9c), ack 96, win 86, options [nop,nop,TS val 4009828 ecr 4009818], length 0 + 73 10:22:46.038093 IP (tos 0x0, ttl 64, id 11331, offset 0, flags [DF], proto TCP (6), length 116) + 127.0.0.1.53146 > 127.0.0.1.6633: Flags [P.], cksum 0xfe68 (incorrect -> 0xdcd4), seq 1:65, ack 96, win 86, options [nop,nop,TS val 4010070 ecr 4009818], length 64: OpenFlow + version 1.3, type FLOW_REMOVED, length 64, xid 0x00000000 + 74 10:22:46.038127 IP (tos 0x0, ttl 64, id 10059, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.53146: Flags [.], cksum 0xfe28 (incorrect -> 0x6c66), ack 65, win 94, options [nop,nop,TS val 4010070 ecr 4010070], length 0 + 75 13:15:24.725748 IP (tos 0x0, ttl 64, id 51120, offset 0, flags [DF], proto TCP (6), length 132) + 127.0.0.1.38906 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xadc3), seq 2781543975:2781544055, ack 1865664008, win 86, options [nop,nop,TS val 1794904 ecr 1794249], length 80: OpenFlow + version 1.3, type PORT_STATUS, length 80, xid 0x00000000 + reason ADD + port_no 2, hw_addr ca:02:9f:af:e9:1c, name 'veth0' + 76 13:15:24.725788 IP (tos 0x0, ttl 64, id 64306, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.38906: Flags [.], cksum 0xfe28 (incorrect -> 0x2614), ack 80, win 94, options [nop,nop,TS val 1794904 ecr 1794904], length 0 + 77 16:37:49.792852 IP (tos 0x0, ttl 64, id 32480, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.34845: Flags [P.], cksum 0xfe38 (incorrect -> 0x4ae9), seq 2833437351:2833437367, ack 1981193718, win 98, options [nop,nop,TS val 130273 ecr 129636], length 16: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000004f + 78 16:37:49.796567 IP (tos 0x0, ttl 64, id 16409, offset 0, flags [DF], proto TCP (6), length 1124) + 127.0.0.1.34845 > 127.0.0.1.6633: Flags [P.], cksum 0x0259 (incorrect -> 0x9472), seq 1:1073, ack 16, win 86, options [nop,nop,TS val 130274 ecr 130273], length 1072: OpenFlow + version 1.3, type MULTIPART_REPLY, length 1072, xid 0x0000004f + 79 16:37:49.796657 IP (tos 0x0, ttl 64, id 32481, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34845: Flags [.], cksum 0xfe28 (incorrect -> 0x48ae), ack 1073, win 103, options [nop,nop,TS val 130274 ecr 130274], length 0 + 80 17:10:39.694164 IP (tos 0x0, ttl 64, id 18557, offset 0, flags [DF], proto TCP (6), length 116) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc9ae), seq 1963343585:1963343649, ack 2145731315, win 105, options [nop,nop,TS val 622748 ecr 622308], length 64: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000076 + 81 17:10:39.695936 IP (tos 0x0, ttl 64, id 19461, offset 0, flags [DF], proto TCP (6), length 236) + 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfee0 (incorrect -> 0x89dd), seq 1:185, ack 64, win 86, options [nop,nop,TS val 622748 ecr 622748], length 184: OpenFlow + version 1.3, type MULTIPART_REPLY, length 184, xid 0x00000076 + 82 17:10:39.696001 IP (tos 0x0, ttl 64, id 18558, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5d19), ack 185, win 109, options [nop,nop,TS val 622749 ecr 622748], length 0 + 83 17:10:39.706507 IP (tos 0x0, ttl 64, id 18559, offset 0, flags [DF], proto TCP (6), length 116) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc6f5), seq 64:128, ack 185, win 109, options [nop,nop,TS val 622751 ecr 622748], length 64: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000077 + 84 17:10:39.708491 IP (tos 0x0, ttl 64, id 19462, offset 0, flags [DF], proto TCP (6), length 92) + 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe50 (incorrect -> 0x4e7c), seq 185:225, ack 128, win 86, options [nop,nop,TS val 622752 ecr 622751], length 40: OpenFlow + version 1.3, type MULTIPART_REPLY, length 40, xid 0x00000077 + 85 17:10:39.747947 IP (tos 0x0, ttl 64, id 18560, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5ca0), ack 225, win 109, options [nop,nop,TS val 622762 ecr 622752], length 0 + 86 17:20:21.268792 IP (tos 0x0, ttl 64, id 18795, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe38 (incorrect -> 0xdced), seq 1072:1088, ack 2705, win 256, options [nop,nop,TS val 768142 ecr 767309], length 16: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 16, xid 0x000000ed + 87 17:20:21.270799 IP (tos 0x0, ttl 64, id 19580, offset 0, flags [DF], proto TCP (6), length 1604) + 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0439 (incorrect -> 0xedc3), seq 2705:4257, ack 1088, win 86, options [nop,nop,TS val 768142 ecr 768142], length 1552: OpenFlow + version 1.3, type MULTIPART_REPLY, length 1552, xid 0x000000ed + 88 17:20:21.270887 IP (tos 0x0, ttl 64, id 18796, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xd8b8), ack 4257, win 254, options [nop,nop,TS val 768142 ecr 768142], length 0 + 89 17:21:32.610984 IP (tos 0x0, ttl 64, id 18829, offset 0, flags [DF], proto TCP (6), length 76) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0x48f2), seq 1248:1272, ack 4981, win 256, options [nop,nop,TS val 785977 ecr 784870], length 24: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 24, xid 0x000000ff + 90 17:21:32.614400 IP (tos 0x0, ttl 64, id 19597, offset 0, flags [DF], proto TCP (6), length 628) + 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0069 (incorrect -> 0x23f8), seq 4981:5557, ack 1272, win 86, options [nop,nop,TS val 785978 ecr 785977], length 576: OpenFlow + version 1.3, type MULTIPART_REPLY, length 576, xid 0x000000ff + 91 17:21:32.614511 IP (tos 0x0, ttl 64, id 18830, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x4793), ack 5557, win 255, options [nop,nop,TS val 785978 ecr 785978], length 0 + 92 17:21:32.932077 IP (tos 0x0, ttl 64, id 18831, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0x4228), seq 1272:1280, ack 5557, win 256, options [nop,nop,TS val 786058 ecr 785978], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x00000100 + 93 17:21:32.939513 IP (tos 0x0, ttl 64, id 19598, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4278), seq 5557:5565, ack 1280, win 86, options [nop,nop,TS val 786059 ecr 786058], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x00000100 + 94 17:21:32.939617 IP (tos 0x0, ttl 64, id 18832, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x46e0), ack 5565, win 256, options [nop,nop,TS val 786059 ecr 786059], length 0 + 95 17:27:12.201785 IP (tos 0x0, ttl 64, id 18969, offset 0, flags [DF], proto TCP (6), length 76) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0xa9d9), seq 1840:1864, ack 6277, win 256, options [nop,nop,TS val 870875 ecr 869809], length 24: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000147 + 96 17:27:12.204185 IP (tos 0x0, ttl 64, id 19667, offset 0, flags [DF], proto TCP (6), length 228) + 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfed8 (incorrect -> 0xa1c3), seq 6277:6453, ack 1864, win 86, options [nop,nop,TS val 870876 ecr 870875], length 176: OpenFlow + version 1.3, type MULTIPART_REPLY, length 176, xid 0x00000147 + 97 17:27:12.204269 IP (tos 0x0, ttl 64, id 18970, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xaa7b), ack 6453, win 256, options [nop,nop,TS val 870876 ecr 870876], length 0 + 98 17:27:12.931668 IP (tos 0x0, ttl 64, id 18971, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0xa464), seq 1864:1872, ack 6453, win 256, options [nop,nop,TS val 871057 ecr 870876], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x00000148 + 99 17:27:12.938585 IP (tos 0x0, ttl 64, id 19668, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xa44e), seq 6453:6461, ack 1872, win 86, options [nop,nop,TS val 871059 ecr 871057], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x00000148 + 100 17:27:12.938697 IP (tos 0x0, ttl 64, id 18972, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xa8fd), ack 6461, win 256, options [nop,nop,TS val 871059 ecr 871059], length 0 + 101 17:57:16.110186 IP (tos 0x0, ttl 64, id 16966, offset 0, flags [DF], proto TCP (6), length 76) + 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe40 (incorrect -> 0xcf7c), seq 555521909:555521933, ack 1543280532, win 105, options [nop,nop,TS val 1321852 ecr 1321585], length 24: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 24, xid 0x0000001f + 102 17:57:16.113738 IP (tos 0x0, ttl 64, id 22868, offset 0, flags [DF], proto TCP (6), length 252) + 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfef0 (incorrect -> 0x3421), seq 1:201, ack 24, win 86, options [nop,nop,TS val 1321853 ecr 1321852], length 200: OpenFlow + version 1.3, type MULTIPART_REPLY, length 200, xid 0x0000001f + 103 17:57:16.113974 IP (tos 0x0, ttl 64, id 16967, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xd1f7), ack 201, win 109, options [nop,nop,TS val 1321853 ecr 1321853], length 0 + 104 17:57:17.127188 IP (tos 0x0, ttl 64, id 16968, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xcc99), seq 24:40, ack 201, win 109, options [nop,nop,TS val 1322106 ecr 1321853], length 16: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000020 + 105 17:57:17.129487 IP (tos 0x0, ttl 64, id 22869, offset 0, flags [DF], proto TCP (6), length 204) + 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfec0 (incorrect -> 0xad66), seq 201:353, ack 40, win 86, options [nop,nop,TS val 1322107 ecr 1322106], length 152: OpenFlow + version 1.3, type MULTIPART_REPLY, length 152, xid 0x00000020 + 106 17:57:17.130202 IP (tos 0x0, ttl 64, id 16969, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcf4f), ack 353, win 113, options [nop,nop,TS val 1322107 ecr 1322107], length 0 + 107 17:57:17.869382 IP (tos 0x0, ttl 64, id 16970, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xca33), seq 40:56, ack 353, win 113, options [nop,nop,TS val 1322292 ecr 1322107], length 16: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000021 + 108 17:57:17.871408 IP (tos 0x0, ttl 64, id 22870, offset 0, flags [DF], proto TCP (6), length 108) + 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfe60 (incorrect -> 0xc5b3), seq 353:409, ack 56, win 86, options [nop,nop,TS val 1322292 ecr 1322292], length 56: OpenFlow + version 1.3, type MULTIPART_REPLY, length 56, xid 0x00000021 + 109 17:57:17.871493 IP (tos 0x0, ttl 64, id 16971, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcd95), ack 409, win 113, options [nop,nop,TS val 1322292 ecr 1322292], length 0 + 110 10:02:19.814878 IP (tos 0x0, ttl 64, id 47069, offset 0, flags [DF], proto TCP (6), length 76) + 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x07aa), seq 260443467:260443491, ack 382342041, win 100, options [nop,nop,TS val 344035 ecr 343141], length 24: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000028 + 111 10:02:19.815701 IP (tos 0x0, ttl 64, id 47114, offset 0, flags [DF], proto TCP (6), length 196) + 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfeb8 (incorrect -> 0x3ff1), seq 1:145, ack 24, win 88, options [nop,nop,TS val 344035 ecr 344035], length 144: OpenFlow + version 1.3, type MULTIPART_REPLY, length 144, xid 0x00000028 + 112 10:02:19.815724 IP (tos 0x0, ttl 64, id 47070, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x07fa), ack 145, win 105, options [nop,nop,TS val 344035 ecr 344035], length 0 + 113 10:02:20.713618 IP (tos 0x0, ttl 64, id 47071, offset 0, flags [DF], proto TCP (6), length 76) + 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x029c), seq 24:48, ack 145, win 105, options [nop,nop,TS val 344260 ecr 344035], length 24: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000029 + 114 10:02:20.714133 IP (tos 0x0, ttl 64, id 47115, offset 0, flags [DF], proto TCP (6), length 132) + 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xfe54), seq 145:225, ack 48, win 88, options [nop,nop,TS val 344260 ecr 344260], length 80: OpenFlow + version 1.3, type MULTIPART_REPLY, length 80, xid 0x00000029 + 115 10:02:20.714160 IP (tos 0x0, ttl 64, id 47072, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x05d0), ack 225, win 105, options [nop,nop,TS val 344260 ecr 344260], length 0 + 116 10:02:21.229978 IP (tos 0x0, ttl 64, id 47073, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe30 (incorrect -> 0x010b), seq 48:56, ack 225, win 105, options [nop,nop,TS val 344389 ecr 344260], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002a + 117 10:02:21.231013 IP (tos 0x0, ttl 64, id 47116, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x0092), seq 225:233, ack 56, win 88, options [nop,nop,TS val 344389 ecr 344389], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x0000002a + 118 10:02:21.231044 IP (tos 0x0, ttl 64, id 47074, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x04be), ack 233, win 105, options [nop,nop,TS val 344389 ecr 344389], length 0 + 119 10:02:21.852874 IP (tos 0x0, ttl 64, id 47075, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe38 (incorrect -> 0xffb1), seq 56:72, ack 233, win 105, options [nop,nop,TS val 344545 ecr 344389], length 16: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000002b + 120 10:02:21.853489 IP (tos 0x0, ttl 64, id 47117, offset 0, flags [DF], proto TCP (6), length 84) + 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xeddf), seq 233:265, ack 72, win 88, options [nop,nop,TS val 344545 ecr 344545], length 32: OpenFlow + version 1.3, type MULTIPART_REPLY, length 32, xid 0x0000002b + 121 10:02:21.853515 IP (tos 0x0, ttl 64, id 47076, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x0356), ack 265, win 105, options [nop,nop,TS val 344545 ecr 344545], length 0 + 122 10:30:09.945368 IP (tos 0x0, ttl 64, id 54874, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe30 (incorrect -> 0x68f4), seq 3359330522:3359330530, ack 3471458557, win 256, options [nop,nop,TS val 761568 ecr 760318], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x0000000d + 123 10:30:09.946140 IP (tos 0x0, ttl 64, id 56416, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x64b3), seq 1:9, ack 8, win 86, options [nop,nop,TS val 761568 ecr 761568], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x0000000d + 124 10:30:09.946173 IP (tos 0x0, ttl 64, id 54875, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x6829), ack 9, win 256, options [nop,nop,TS val 761568 ecr 761568], length 0 + 125 10:30:10.672306 IP (tos 0x0, ttl 64, id 54876, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe38 (incorrect -> 0x6320), seq 8:24, ack 9, win 256, options [nop,nop,TS val 761749 ecr 761568], length 16: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000e + 126 10:30:10.673261 IP (tos 0x0, ttl 64, id 56417, offset 0, flags [DF], proto TCP (6), length 11844) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x30af), seq 9:11801, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761749], length 11792: OpenFlow + version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e + 127 10:30:10.673292 IP (tos 0x0, ttl 64, id 54877, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x38a9), ack 11801, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0 + 128 10:30:10.675065 IP (tos 0x0, ttl 64, id 56418, offset 0, flags [DF], proto TCP (6), length 11844) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xc66e), seq 11801:23593, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow + version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e + 129 10:30:10.675124 IP (tos 0x0, ttl 64, id 54878, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x0a99), ack 23593, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0 + 130 10:30:10.675159 IP (tos 0x0, ttl 64, id 56419, offset 0, flags [DF], proto TCP (6), length 11844) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x62e9), seq 23593:35385, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow + version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e + 131 10:30:10.675174 IP (tos 0x0, ttl 64, id 54879, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xdc94), ack 35385, win 232, options [nop,nop,TS val 761750 ecr 761750], length 0 + 132 10:30:10.675194 IP (tos 0x0, ttl 64, id 56420, offset 0, flags [DF], proto TCP (6), length 11844) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xeed4), seq 35385:47177, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow + version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e + 133 10:30:10.675206 IP (tos 0x0, ttl 64, id 54880, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xae91), ack 47177, win 219, options [nop,nop,TS val 761750 ecr 761750], length 0 + 134 10:30:10.675226 IP (tos 0x0, ttl 64, id 56421, offset 0, flags [DF], proto TCP (6), length 11844) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x7ac0), seq 47177:58969, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow + version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e + 135 10:30:10.675238 IP (tos 0x0, ttl 64, id 54881, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x808d), ack 58969, win 207, options [nop,nop,TS val 761750 ecr 761750], length 0 + 136 10:30:10.675257 IP (tos 0x0, ttl 64, id 56422, offset 0, flags [DF], proto TCP (6), length 11844) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x04c0), seq 58969:70761, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow + version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e + 137 10:30:10.675294 IP (tos 0x0, ttl 64, id 56423, offset 0, flags [DF], proto TCP (6), length 11844) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x90ab), seq 70761:82553, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow + version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e + 138 10:30:10.675314 IP (tos 0x0, ttl 64, id 56424, offset 0, flags [DF], proto TCP (6), length 11844) + 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x1c98), seq 82553:94345, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow + version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e + 139 10:30:10.675325 IP (tos 0x0, ttl 64, id 54882, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x2486), ack 82553, win 182, options [nop,nop,TS val 761750 ecr 761750], length 0 + 140 10:30:10.712539 IP (tos 0x0, ttl 64, id 54883, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xf621), ack 94345, win 256, options [nop,nop,TS val 761760 ecr 761750], length 0 + 141 10:46:50.838754 IP (tos 0x0, ttl 64, id 46973, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.36548: Flags [P.], cksum 0xfe38 (incorrect -> 0x2338), seq 75556183:75556199, ack 3751019041, win 98, options [nop,nop,TS val 1011791 ecr 1010724], length 16: OpenFlow + version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000d + 142 10:46:50.839431 IP (tos 0x0, ttl 64, id 43209, offset 0, flags [DF], proto TCP (6), length 388) + 127.0.0.1.36548 > 127.0.0.1.6633: Flags [P.], cksum 0xff78 (incorrect -> 0x0f3d), seq 1:337, ack 16, win 86, options [nop,nop,TS val 1011791 ecr 1011791], length 336: OpenFlow + version 1.3, type MULTIPART_REPLY, length 336, xid 0x0000000d + 143 10:46:50.839471 IP (tos 0x0, ttl 64, id 46974, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.36548: Flags [.], cksum 0xfe28 (incorrect -> 0x21fc), ack 337, win 103, options [nop,nop,TS val 1011791 ecr 1011791], length 0 + 144 19:45:16.495434 IP (tos 0x0, ttl 64, id 17712, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0xe6e3), seq 1323837391:1323837399, ack 1278624979, win 94, options [nop,nop,TS val 6181422 ecr 6180173], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x0000006d + 145 19:45:16.496030 IP (tos 0x0, ttl 64, id 23686, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xe200), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6181423 ecr 6181422], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x0000006d + 146 19:45:16.496057 IP (tos 0x0, ttl 64, id 17713, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0xe677), ack 9, win 94, options [nop,nop,TS val 6181423 ecr 6181423], length 0 + 147 19:45:17.176752 IP (tos 0x0, ttl 64, id 17714, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe38 (incorrect -> 0xe026), seq 8:24, ack 9, win 94, options [nop,nop,TS val 6181593 ecr 6181423], length 16: OpenFlow + version 1.3, type TABLE_MOD, length 16, xid 0x0000006e + table_id 1, config 0x00000000 + 148 19:45:17.215970 IP (tos 0x0, ttl 64, id 23687, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.51984 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xe511), ack 24, win 86, options [nop,nop,TS val 6181603 ecr 6181593], length 0 + 149 19:53:23.472776 IP (tos 0x0, ttl 64, id 17917, offset 0, flags [DF], proto TCP (6), length 92) + 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe50 (incorrect -> 0xb18a), seq 936:976, ack 1361, win 98, options [nop,nop,TS val 6303167 ecr 6302673], length 40: OpenFlow + version 1.3, type PORT_MOD, length 40, xid 0x000000d4 + port_no 1, hw_addr 0a:ea:83:10:db:09 + config 0x00000040 (NO_PACKET_IN) + mask 0x00000040 (NO_PACKET_IN) + advertise 0x0000080a (10MB_FD, 100MB_FD, COPPER) + 150 19:53:23.473744 IP (tos 0x0, ttl 64, id 23790, offset 0, flags [DF], proto TCP (6), length 132) + 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x92a0), seq 1361:1441, ack 976, win 86, options [nop,nop,TS val 6303167 ecr 6303167], length 80: OpenFlow + version 1.3, type PORT_STATUS, length 80, xid 0x00000000 + reason MODIFY + port_no 1, hw_addr 0a:ea:83:10:db:09, name 'veth0' + 151 19:53:23.473777 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x25f0), ack 1441, win 98, options [nop,nop,TS val 6303167 ecr 6303167], length 0 + 152 19:55:19.511983 IP (tos 0x0, ttl 64, id 17967, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0x3fa5), seq 1168:1176, ack 1633, win 98, options [nop,nop,TS val 6332177 ecr 6331422], length 8: OpenFlow + version 1.3, type BARRIER_REQUEST, length 8, xid 0x000000ed + 153 19:55:19.513048 IP (tos 0x0, ttl 64, id 23815, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3cb5), seq 1633:1641, ack 1176, win 86, options [nop,nop,TS val 6332177 ecr 6332177], length 8: OpenFlow + version 1.3, type BARRIER_REPLY, length 8, xid 0x000000ed + 154 19:55:19.513081 IP (tos 0x0, ttl 64, id 17968, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x41bb), ack 1641, win 98, options [nop,nop,TS val 6332177 ecr 6332177], length 0 + 155 20:10:12.609713 IP (tos 0x0, ttl 64, id 45627, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0x8da8), seq 2129684753:2129684761, ack 2572383599, win 96, options [nop,nop,TS val 6555451 ecr 6554199], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x0000007d + 156 20:10:12.610357 IP (tos 0x0, ttl 64, id 49206, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x88c5), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6555451 ecr 6555451], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x0000007d + 157 20:10:12.610382 IP (tos 0x0, ttl 64, id 45628, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8d4b), ack 9, win 96, options [nop,nop,TS val 6555451 ecr 6555451], length 0 + 158 20:10:13.364783 IP (tos 0x0, ttl 64, id 45629, offset 0, flags [DF], proto TCP (6), length 68) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe38 (incorrect -> 0x87d1), seq 8:24, ack 9, win 96, options [nop,nop,TS val 6555640 ecr 6555451], length 16: OpenFlow + version 1.3, type QUEUE_GET_CONFIG_REQUEST, length 16, xid 0x0000007e + port 1 + 159 20:10:13.366754 IP (tos 0x0, ttl 64, id 49207, offset 0, flags [DF], proto TCP (6), length 132) + 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x80dc), seq 9:89, ack 24, win 86, options [nop,nop,TS val 6555640 ecr 6555640], length 80: OpenFlow + version 1.3, type QUEUE_GET_CONFIG_REPLY, length 80, xid 0x0000007e + 160 20:10:13.366788 IP (tos 0x0, ttl 64, id 45630, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8b71), ack 89, win 96, options [nop,nop,TS val 6555640 ecr 6555640], length 0 + 161 20:24:40.574081 IP (tos 0x0, ttl 64, id 45979, offset 0, flags [DF], proto TCP (6), length 76) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe40 (incorrect -> 0xba52), seq 1432:1456, ack 1497, win 96, options [nop,nop,TS val 6772442 ecr 6771701], length 24: OpenFlow + version 1.3, type ROLE_REQUEST, length 24, xid 0x0000012f + role MASTER, generation_id 0x00000000012e248a + 162 20:24:40.574726 IP (tos 0x0, ttl 64, id 49382, offset 0, flags [DF], proto TCP (6), length 76) + 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe40 (incorrect -> 0xb75e), seq 1497:1521, ack 1456, win 86, options [nop,nop,TS val 6772442 ecr 6772442], length 24: OpenFlow + version 1.3, type ROLE_REPLY, length 24, xid 0x0000012f + role MASTER, generation_id 0x00000000012e248a + 163 20:24:40.574748 IP (tos 0x0, ttl 64, id 45980, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xe276), ack 1521, win 96, options [nop,nop,TS val 6772442 ecr 6772442], length 0 + 164 20:28:52.608224 IP (tos 0x0, ttl 64, id 46086, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xf205), seq 1904:1912, ack 1985, win 96, options [nop,nop,TS val 6835451 ecr 6834201], length 8: OpenFlow + version 1.3, type ECHO_REQUEST, length 8, xid 0x00000165 + 165 20:28:52.609219 IP (tos 0x0, ttl 64, id 49437, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xed24), seq 1985:1993, ack 1912, win 86, options [nop,nop,TS val 6835451 ecr 6835451], length 8: OpenFlow + version 1.3, type ECHO_REPLY, length 8, xid 0x00000165 + 166 20:28:52.609246 IP (tos 0x0, ttl 64, id 46087, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xf292), ack 1993, win 96, options [nop,nop,TS val 6835451 ecr 6835451], length 0 + 167 20:28:54.103683 IP (tos 0x0, ttl 64, id 46088, offset 0, flags [DF], proto TCP (6), length 84) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe48 (incorrect -> 0xeb3a), seq 1912:1944, ack 1993, win 96, options [nop,nop,TS val 6835824 ecr 6835451], length 32: OpenFlow + version 1.3, type SET_ASYNC, length 32, xid 0x00000166 + packet_in_mask[EM] 0x00000003 (NO_MATCH, ACTION) + packet_in_mask[S] 0x00000002 (ACTION) + port_status_mask[EM] 0x00000007 (ADD, DELETE, MODIFY) + port_status_mask[S] 0x00000002 (DELETE) + flow_removed_mask[EM] 0x00000007 (ADD, DELETE, MODIFY) + flow_removed_mask[S] 0x00000004 (MODIFY) + 168 20:28:54.140673 IP (tos 0x0, ttl 64, id 49438, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xef88), ack 1944, win 86, options [nop,nop,TS val 6835834 ecr 6835824], length 0 + 169 20:28:56.308694 IP (tos 0x0, ttl 64, id 46089, offset 0, flags [DF], proto TCP (6), length 60) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xe7bd), seq 1944:1952, ack 1993, win 96, options [nop,nop,TS val 6836376 ecr 6835834], length 8: OpenFlow + version 1.3, type GET_ASYNC_REQUEST, length 8, xid 0x00000167 + 170 20:28:56.308754 IP (tos 0x0, ttl 64, id 49439, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xeb3a), ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 0 + 171 20:28:56.309209 IP (tos 0x0, ttl 64, id 49440, offset 0, flags [DF], proto TCP (6), length 84) + 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xe557), seq 1993:2025, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 32: OpenFlow + version 1.3, type GET_ASYNC_REPLY, length 32, xid 0x00000167 + packet_in_mask[EM] 0x00000003 (NO_MATCH, ACTION) + packet_in_mask[S] 0x00000002 (ACTION) + port_status_mask[EM] 0x00000007 (ADD, DELETE, MODIFY) + port_status_mask[S] 0x00000002 (DELETE) + flow_removed_mask[EM] 0x00000007 (ADD, DELETE, MODIFY) + flow_removed_mask[S] 0x00000004 (MODIFY) + 172 20:28:56.309230 IP (tos 0x0, ttl 64, id 46090, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xeb10), ack 2025, win 96, options [nop,nop,TS val 6836376 ecr 6836376], length 0 + 173 20:37:22.358712 IP (tos 0x0, ttl 64, id 18246, offset 0, flags [DF], proto TCP (6), length 100) + 127.0.0.1.6633 > 127.0.0.1.51989: Flags [P.], cksum 0xfe58 (incorrect -> 0x9b52), seq 1436436734:1436436782, ack 2087738396, win 96, options [nop,nop,TS val 6962888 ecr 6961981], length 48: OpenFlow + version 1.3, type METER_MOD, length 48, xid 0x00000010 + 174 20:37:22.396699 IP (tos 0x0, ttl 64, id 23571, offset 0, flags [DF], proto TCP (6), length 52) + 127.0.0.1.51989 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x9d9e), ack 48, win 86, options [nop,nop,TS val 6962898 ecr 6962888], length 0 |