1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
|
1 2013-10-19 15:52:49.322823 IP (tos 0x0, ttl 64, id 348, offset 0, flags [DF], proto TCP (6), length 236)
127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfee0 (incorrect -> 0x21d3), seq 3305197767:3305197951, ack 3938018648, win 100, options [nop,nop,TS val 534888 ecr 533649], length 184: OpenFlow
version 1.3, type FLOW_MOD, length 184, xid 0x00000199
2 2013-10-19 15:52:49.362355 IP (tos 0x0, ttl 64, id 61731, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1ad3), ack 184, win 98, options [nop,nop,TS val 534898 ecr 534888], length 0
3 2013-10-19 15:52:49.367093 IP (tos 0x0, ttl 64, id 349, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfe30 (incorrect -> 0x1512), seq 184:192, ack 1, win 100, options [nop,nop,TS val 534899 ecr 534898], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000019a
4 2013-10-19 15:52:49.367137 IP (tos 0x0, ttl 64, id 61732, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1abf), ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 0
5 2013-10-19 15:52:49.367403 IP (tos 0x0, ttl 64, id 61733, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.35359 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x150a), seq 1:9, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x0000019a
6 2013-10-19 15:52:49.367421 IP (tos 0x0, ttl 64, id 350, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.35359: Flags [.], cksum 0xfe28 (incorrect -> 0x1ab5), ack 9, win 100, options [nop,nop,TS val 534899 ecr 534899], length 0
7 2013-10-20 12:15:37.979676 IP (tos 0x0, ttl 64, id 46225, offset 0, flags [DF], proto TCP (6), length 420)
127.0.0.1.6633 > 127.0.0.1.43230: Flags [P.], cksum 0xff98 (incorrect -> 0xd79d), seq 402287444:402287812, ack 1282739451, win 98, options [nop,nop,TS val 2953476 ecr 2952724], length 368: OpenFlow
version 1.3, type FLOW_MOD, length 368, xid 0x00000012
8 2013-10-20 12:15:37.985455 IP (tos 0x0, ttl 64, id 55504, offset 0, flags [DF], proto TCP (6), length 432)
127.0.0.1.43230 > 127.0.0.1.6633: Flags [P.], cksum 0xffa4 (incorrect -> 0xcda4), seq 1:381, ack 368, win 90, options [nop,nop,TS val 2953478 ecr 2953476], length 380: OpenFlow
version 1.3, type ERROR, length 380, xid 0x00000012
type BAD_ACTION, code BAD_EXPERIMENTER
data (368 octets)
9 2013-10-20 12:15:37.985482 IP (tos 0x0, ttl 64, id 46226, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.43230: Flags [.], cksum 0xfe28 (incorrect -> 0xb37b), ack 381, win 103, options [nop,nop,TS val 2953478 ecr 2953478], length 0
10 2013-10-21 14:53:56.336558 IP (tos 0x0, ttl 64, id 63838, offset 0, flags [DF], proto TCP (6), length 172)
127.0.0.1.6633 > 127.0.0.1.56562: Flags [P.], cksum 0xfea0 (incorrect -> 0x8c0a), seq 4055369935:4055370055, ack 963939871, win 94, options [nop,nop,TS val 3963146 ecr 3962600], length 120: OpenFlow
version 1.3, type GROUP_MOD, length 120, xid 0x0000008a
11 2013-10-21 14:53:56.339805 IP (tos 0x0, ttl 64, id 30929, offset 0, flags [DF], proto TCP (6), length 184)
127.0.0.1.56562 > 127.0.0.1.6633: Flags [P.], cksum 0xfeac (incorrect -> 0x8455), seq 1:133, ack 120, win 86, options [nop,nop,TS val 3963147 ecr 3963146], length 132: OpenFlow
version 1.3, type ERROR, length 132, xid 0x0000008a
type GROUP_MOD_FAILED, code INVALID_GROUP
data (120 octets)
12 2013-10-21 14:53:56.339839 IP (tos 0x0, ttl 64, id 63839, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.56562: Flags [.], cksum 0xfe28 (incorrect -> 0xcbd6), ack 133, win 98, options [nop,nop,TS val 3963147 ecr 3963147], length 0
13 2013-10-22 07:06:07.923021 IP (tos 0x0, ttl 64, id 53050, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.56439 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x17bd), seq 2797182347, win 43690, options [mss 65495,sackOK,TS val 1659569 ecr 0,nop,wscale 9], length 0
14 2013-10-22 07:06:07.923406 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
127.0.0.1.6633 > 127.0.0.1.56439: Flags [R.], cksum 0x7727 (correct), seq 0, ack 2797182348, win 0, length 0
15 2013-10-22 07:06:11.948050 IP (tos 0x0, ttl 64, id 25056, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.56440 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x9014), seq 2428319552, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 0,nop,wscale 9], length 0
16 2013-10-22 07:06:11.948123 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.56440: Flags [S.], cksum 0xfe30 (incorrect -> 0xf3ee), seq 2308881340, ack 2428319553, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 1660576,nop,wscale 9], length 0
17 2013-10-22 07:06:11.948171 IP (tos 0x0, ttl 64, id 25057, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc735), ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
18 2013-10-22 07:06:11.948588 IP (tos 0x0, ttl 64, id 25058, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc10f), seq 1:9, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 8: OpenFlow
version 1.3, type HELLO, length 8, xid 0x83ea7e23
19 2013-10-22 07:06:11.948646 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc72d), ack 9, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
20 2013-10-22 07:06:11.951581 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0x5426), seq 1:9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660576], length 8: OpenFlow
version 1.0, type HELLO, length 8, xid 0x95b6dc37
21 2013-10-22 07:06:11.951654 IP (tos 0x0, ttl 64, id 25059, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc723), ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 0
22 2013-10-22 07:06:11.954851 IP (tos 0x0, ttl 64, id 25060, offset 0, flags [DF], proto TCP (6), length 150)
127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe8a (incorrect -> 0x83b9), seq 9:107, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 98: OpenFlow
version 1.3, type ERROR, length 98, xid 0xc4420f26
type HELLO_FAILED, code INCOMPATIBLE
data (86 octets)
23 2013-10-22 07:06:11.956875 IP (tos 0x0, ttl 64, id 25061, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.56440 > 127.0.0.1.6633: Flags [F.], cksum 0xfe28 (incorrect -> 0xc6bf), seq 107, ack 9, win 86, options [nop,nop,TS val 1660578 ecr 1660577], length 0
24 2013-10-22 07:06:11.995263 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc6b5), ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 0
25 2013-10-22 07:06:11.996996 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0xc22e), seq 9:17, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 8: OpenFlow
version 1.0, type FEATURES_REQUEST, length 8, xid 0x852f7e3a
26 2013-10-22 07:06:11.997117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
127.0.0.1.56440 > 127.0.0.1.6633: Flags [R], cksum 0xf312 (correct), seq 2428319660, win 0, length 0
27 2013-10-22 20:23:02.447284 IP (tos 0x0, ttl 64, id 5822, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc972), seq 3295811422:3295811430, ack 623716506, win 94, options [nop,nop,TS val 683124 ecr 682086], length 8: OpenFlow
version 1.3, type HELLO, length 8, xid 0x0000015f
28 2013-10-22 20:23:02.487886 IP (tos 0x0, ttl 64, id 541, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xcad0), ack 8, win 86, options [nop,nop,TS val 683135 ecr 683124], length 0
29 2013-10-22 20:23:03.289931 IP (tos 0x0, ttl 64, id 5823, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc47b), seq 8:16, ack 1, win 94, options [nop,nop,TS val 683335 ecr 683135], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000160
30 2013-10-22 20:23:03.290134 IP (tos 0x0, ttl 64, id 542, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc92d), ack 16, win 86, options [nop,nop,TS val 683335 ecr 683335], length 0
31 2013-10-22 20:23:03.292620 IP (tos 0x0, ttl 64, id 543, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.37123 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc3b1), seq 1:9, ack 16, win 86, options [nop,nop,TS val 683336 ecr 683335], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x00000160
32 2013-10-22 20:23:03.292690 IP (tos 0x0, ttl 64, id 5824, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.37123: Flags [.], cksum 0xfe28 (incorrect -> 0xc91b), ack 9, win 94, options [nop,nop,TS val 683336 ecr 683336], length 0
33 2013-10-22 20:23:03.674363 IP (tos 0x0, ttl 64, id 5825, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe38 (incorrect -> 0xc315), seq 16:32, ack 9, win 94, options [nop,nop,TS val 683431 ecr 683336], length 16: OpenFlow
version 1.3, type HELLO, length 16, xid 0x00000161
type VERSIONBITMAP, length 8, bitmap 0x00000015 (1.0, 1.2, 1.4)
34 2013-10-22 20:23:03.711246 IP (tos 0x0, ttl 64, id 544, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc84b), ack 32, win 86, options [nop,nop,TS val 683441 ecr 683431], length 0
35 2013-10-24 09:18:28.508689 IP (tos 0x0, ttl 64, id 8726, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe30 (incorrect -> 0x5466), seq 2774334230:2774334238, ack 3518786755, win 94, options [nop,nop,TS val 2174690 ecr 2173441], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000004d
36 2013-10-24 09:18:28.512206 IP (tos 0x0, ttl 64, id 48675, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4f83), seq 1:9, ack 8, win 86, options [nop,nop,TS val 2174691 ecr 2174690], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x0000004d
37 2013-10-24 09:18:28.512310 IP (tos 0x0, ttl 64, id 8727, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x53da), ack 9, win 94, options [nop,nop,TS val 2174691 ecr 2174691], length 0
38 2013-10-24 09:18:29.938866 IP (tos 0x0, ttl 64, id 8728, offset 0, flags [DF], proto TCP (6), length 73)
127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe3d (incorrect -> 0x23cf), seq 8:29, ack 9, win 94, options [nop,nop,TS val 2175048 ecr 2174691], length 21: OpenFlow
version 1.3, type ECHO_REQUEST, length 21, xid 0x0000004e
data (13 octets)
39 2013-10-24 09:18:29.940525 IP (tos 0x0, ttl 64, id 48676, offset 0, flags [DF], proto TCP (6), length 73)
127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe3d (incorrect -> 0x225c), seq 9:30, ack 29, win 86, options [nop,nop,TS val 2175048 ecr 2175048], length 21: OpenFlow
version 1.3, type ECHO_REPLY, length 21, xid 0x0000004e
data (13 octets)
40 2013-10-24 09:18:29.940621 IP (tos 0x0, ttl 64, id 8729, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x50e6), ack 30, win 94, options [nop,nop,TS val 2175048 ecr 2175048], length 0
41 2013-10-24 15:41:10.777155 IP (tos 0x0, ttl 64, id 14454, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe38 (incorrect -> 0x994a), seq 2142345193:2142345209, ack 115176160, win 94, options [nop,nop,TS val 175830 ecr 174634], length 16: OpenFlow
version 1.3, type EXPERIMENTER, length 16, xid 0x00000041
experimenter 0x00d0f0db (Ericsson), exp_type 0x00000065
42 2013-10-24 15:41:10.782182 IP (tos 0x0, ttl 64, id 51401, offset 0, flags [DF], proto TCP (6), length 80)
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe44 (incorrect -> 0x9024), seq 1:29, ack 16, win 86, options [nop,nop,TS val 175831 ecr 175830], length 28: OpenFlow
version 1.3, type ERROR, length 28, xid 0x00000041
type BAD_REQUEST, code BAD_LEN
data (16 octets)
43 2013-10-24 15:41:10.782279 IP (tos 0x0, ttl 64, id 14455, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8aee), ack 29, win 94, options [nop,nop,TS val 175831 ecr 175831], length 0
44 2013-10-24 15:41:10.978145 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0x8661), seq 16:24, ack 29, win 94, options [nop,nop,TS val 175880 ecr 175831], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000042
45 2013-10-24 15:41:10.981725 IP (tos 0x0, ttl 64, id 51402, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x862e), seq 29:37, ack 24, win 86, options [nop,nop,TS val 175881 ecr 175880], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x00000042
46 2013-10-24 15:41:10.981828 IP (tos 0x0, ttl 64, id 14457, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8a7a), ack 37, win 94, options [nop,nop,TS val 175881 ecr 175881], length 0
47 2013-10-24 15:41:11.640555 IP (tos 0x0, ttl 64, id 14458, offset 0, flags [DF], proto TCP (6), length 85)
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe49 (incorrect -> 0x4af3), seq 24:57, ack 37, win 94, options [nop,nop,TS val 176046 ecr 175881], length 33: OpenFlow
version 1.3, type EXPERIMENTER, length 33, xid 0x00000043
experimenter 0x00d0f0db (Ericsson), exp_type 0x00000065
data (17 octets)
48 2013-10-24 15:41:11.649632 IP (tos 0x0, ttl 64, id 51403, offset 0, flags [DF], proto TCP (6), length 97)
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe55 (incorrect -> 0x45af), seq 37:82, ack 57, win 86, options [nop,nop,TS val 176048 ecr 176046], length 45: OpenFlow
version 1.3, type ERROR, length 45, xid 0x00000043
type BAD_REQUEST, code BAD_LEN
data (33 octets)
49 2013-10-24 15:41:11.649721 IP (tos 0x0, ttl 64, id 14459, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x88de), ack 82, win 94, options [nop,nop,TS val 176048 ecr 176048], length 0
50 2013-10-24 15:47:18.960105 IP (tos 0x0, ttl 64, id 14608, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0xb4f6), seq 649:657, ack 698, win 94, options [nop,nop,TS val 267876 ecr 267134], length 8: OpenFlow
version 1.3, type FEATURES_REQUEST, length 8, xid 0x0000008e
51 2013-10-24 15:47:18.962238 IP (tos 0x0, ttl 64, id 51478, offset 0, flags [DF], proto TCP (6), length 84)
127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xbbc3), seq 698:730, ack 657, win 86, options [nop,nop,TS val 267876 ecr 267876], length 32: OpenFlow
version 1.3, type FEATURES_REPLY, length 32, xid 0x0000008e
dpid 0x000026a2b46fd9ba, n_buffers 256, n_tables 64, auxiliary_id 0
capabilities 0x0000004f (FLOW_STATS, TABLE_STATS, PORT_STATS, GROUP_STATS, QUEUE_STATS)
52 2013-10-24 15:47:18.962333 IP (tos 0x0, ttl 64, id 14609, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0xb693), ack 730, win 94, options [nop,nop,TS val 267876 ecr 267876], length 0
53 2013-10-24 16:32:34.623939 IP (tos 0x0, ttl 64, id 44797, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3d62), seq 2583631865:2583631873, ack 3924671623, win 94, options [nop,nop,TS val 946792 ecr 945543], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002e
54 2013-10-24 16:32:34.625658 IP (tos 0x0, ttl 64, id 3493, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3880), seq 1:9, ack 8, win 86, options [nop,nop,TS val 946792 ecr 946792], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x0000002e
55 2013-10-24 16:32:34.625750 IP (tos 0x0, ttl 64, id 44798, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x3cb9), ack 9, win 94, options [nop,nop,TS val 946792 ecr 946792], length 0
56 2013-10-24 16:32:34.844806 IP (tos 0x0, ttl 64, id 44799, offset 0, flags [DF], proto TCP (6), length 64)
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe34 (incorrect -> 0x3760), seq 8:20, ack 9, win 94, options [nop,nop,TS val 946847 ecr 946792], length 12: OpenFlow
version 1.3, type SET_CONFIG, length 12, xid 0x0000002f
flags FRAG_REASM, miss_send_len 200
57 2013-10-24 16:32:34.883698 IP (tos 0x0, ttl 64, id 3494, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3c3d), ack 20, win 86, options [nop,nop,TS val 946857 ecr 946847], length 0
58 2013-10-24 16:32:36.376083 IP (tos 0x0, ttl 64, id 44800, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3667), seq 20:28, ack 9, win 94, options [nop,nop,TS val 947230 ecr 946857], length 8: OpenFlow
version 1.3, type GET_CONFIG_REQUEST, length 8, xid 0x00000030
59 2013-10-24 16:32:36.376174 IP (tos 0x0, ttl 64, id 3495, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3941), ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 0
60 2013-10-24 16:32:36.378403 IP (tos 0x0, ttl 64, id 3496, offset 0, flags [DF], proto TCP (6), length 64)
127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe34 (incorrect -> 0x3420), seq 9:21, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 12: OpenFlow
version 1.3, type GET_CONFIG_REPLY, length 12, xid 0x00000030
flags FRAG_DROP, miss_send_len 200
61 2013-10-24 16:32:36.378465 IP (tos 0x0, ttl 64, id 44801, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x392d), ack 21, win 94, options [nop,nop,TS val 947230 ecr 947230], length 0
62 2013-10-24 17:39:10.589931 IP (tos 0x0, ttl 64, id 28700, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe30 (incorrect -> 0x4e78), seq 359193673:359193681, ack 3843617605, win 111, options [nop,nop,TS val 1945783 ecr 1944534], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x000000a6
63 2013-10-24 17:39:10.592125 IP (tos 0x0, ttl 64, id 24186, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x49a6), seq 1:9, ack 8, win 86, options [nop,nop,TS val 1945784 ecr 1945783], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x000000a6
64 2013-10-24 17:39:10.592223 IP (tos 0x0, ttl 64, id 28701, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4e45), ack 9, win 111, options [nop,nop,TS val 1945784 ecr 1945784], length 0
65 2013-10-24 17:39:11.275605 IP (tos 0x0, ttl 64, id 28702, offset 0, flags [DF], proto TCP (6), length 152)
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xaa9b), seq 8:108, ack 9, win 111, options [nop,nop,TS val 1945955 ecr 1945784], length 100: OpenFlow
version 1.3, type PACKET_OUT, length 100, xid 0x000000a7
66 2013-10-24 17:39:11.278453 IP (tos 0x0, ttl 64, id 24187, offset 0, flags [DF], proto TCP (6), length 206)
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfec2 (incorrect -> 0xa12e), seq 9:163, ack 108, win 86, options [nop,nop,TS val 1945955 ecr 1945955], length 154: OpenFlow
version 1.3, type PACKET_IN, length 154, xid 0x00000000
67 2013-10-24 17:39:11.278747 IP (tos 0x0, ttl 64, id 28703, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4bec), ack 163, win 115, options [nop,nop,TS val 1945956 ecr 1945955], length 0
68 2013-10-24 17:39:11.293620 IP (tos 0x0, ttl 64, id 28704, offset 0, flags [DF], proto TCP (6), length 152)
127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xa8c9), seq 108:208, ack 163, win 115, options [nop,nop,TS val 1945959 ecr 1945955], length 100: OpenFlow
version 1.3, type PACKET_OUT, length 100, xid 0x000000a8
69 2013-10-24 17:39:11.296836 IP (tos 0x0, ttl 64, id 24188, offset 0, flags [DF], proto TCP (6), length 234)
127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfede (incorrect -> 0x2262), seq 163:345, ack 208, win 86, options [nop,nop,TS val 1945960 ecr 1945959], length 182: OpenFlow
version 1.3, type PACKET_IN, length 182, xid 0x00000000
70 2013-10-24 17:39:11.334896 IP (tos 0x0, ttl 64, id 28705, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4abb), ack 345, win 119, options [nop,nop,TS val 1945970 ecr 1945960], length 0
71 2013-10-25 10:22:45.030583 IP (tos 0x0, ttl 64, id 10058, offset 0, flags [DF], proto TCP (6), length 148)
127.0.0.1.6633 > 127.0.0.1.53146: Flags [P.], cksum 0xfe88 (incorrect -> 0xf671), seq 1089079797:1089079893, ack 1672614427, win 94, options [nop,nop,TS val 4009818 ecr 4009376], length 96: OpenFlow
version 1.3, type FLOW_MOD, length 96, xid 0x00000076
72 2013-10-25 10:22:45.067011 IP (tos 0x0, ttl 64, id 11330, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.53146 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x6e9c), ack 96, win 86, options [nop,nop,TS val 4009828 ecr 4009818], length 0
73 2013-10-25 10:22:46.038093 IP (tos 0x0, ttl 64, id 11331, offset 0, flags [DF], proto TCP (6), length 116)
127.0.0.1.53146 > 127.0.0.1.6633: Flags [P.], cksum 0xfe68 (incorrect -> 0xdcd4), seq 1:65, ack 96, win 86, options [nop,nop,TS val 4010070 ecr 4009818], length 64: OpenFlow
version 1.3, type FLOW_REMOVED, length 64, xid 0x00000000
74 2013-10-25 10:22:46.038127 IP (tos 0x0, ttl 64, id 10059, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.53146: Flags [.], cksum 0xfe28 (incorrect -> 0x6c66), ack 65, win 94, options [nop,nop,TS val 4010070 ecr 4010070], length 0
75 2013-10-25 13:15:24.725748 IP (tos 0x0, ttl 64, id 51120, offset 0, flags [DF], proto TCP (6), length 132)
127.0.0.1.38906 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xadc3), seq 2781543975:2781544055, ack 1865664008, win 86, options [nop,nop,TS val 1794904 ecr 1794249], length 80: OpenFlow
version 1.3, type PORT_STATUS, length 80, xid 0x00000000
reason ADD
port_no 2, hw_addr ca:02:9f:af:e9:1c, name 'veth0'
76 2013-10-25 13:15:24.725788 IP (tos 0x0, ttl 64, id 64306, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.38906: Flags [.], cksum 0xfe28 (incorrect -> 0x2614), ack 80, win 94, options [nop,nop,TS val 1794904 ecr 1794904], length 0
77 2013-10-31 16:37:49.792852 IP (tos 0x0, ttl 64, id 32480, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.34845: Flags [P.], cksum 0xfe38 (incorrect -> 0x4ae9), seq 2833437351:2833437367, ack 1981193718, win 98, options [nop,nop,TS val 130273 ecr 129636], length 16: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000004f
78 2013-10-31 16:37:49.796567 IP (tos 0x0, ttl 64, id 16409, offset 0, flags [DF], proto TCP (6), length 1124)
127.0.0.1.34845 > 127.0.0.1.6633: Flags [P.], cksum 0x0259 (incorrect -> 0x9472), seq 1:1073, ack 16, win 86, options [nop,nop,TS val 130274 ecr 130273], length 1072: OpenFlow
version 1.3, type MULTIPART_REPLY, length 1072, xid 0x0000004f
79 2013-10-31 16:37:49.796657 IP (tos 0x0, ttl 64, id 32481, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34845: Flags [.], cksum 0xfe28 (incorrect -> 0x48ae), ack 1073, win 103, options [nop,nop,TS val 130274 ecr 130274], length 0
80 2013-10-31 17:10:39.694164 IP (tos 0x0, ttl 64, id 18557, offset 0, flags [DF], proto TCP (6), length 116)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc9ae), seq 1963343585:1963343649, ack 2145731315, win 105, options [nop,nop,TS val 622748 ecr 622308], length 64: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000076
81 2013-10-31 17:10:39.695936 IP (tos 0x0, ttl 64, id 19461, offset 0, flags [DF], proto TCP (6), length 236)
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfee0 (incorrect -> 0x89dd), seq 1:185, ack 64, win 86, options [nop,nop,TS val 622748 ecr 622748], length 184: OpenFlow
version 1.3, type MULTIPART_REPLY, length 184, xid 0x00000076
82 2013-10-31 17:10:39.696001 IP (tos 0x0, ttl 64, id 18558, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5d19), ack 185, win 109, options [nop,nop,TS val 622749 ecr 622748], length 0
83 2013-10-31 17:10:39.706507 IP (tos 0x0, ttl 64, id 18559, offset 0, flags [DF], proto TCP (6), length 116)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc6f5), seq 64:128, ack 185, win 109, options [nop,nop,TS val 622751 ecr 622748], length 64: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000077
84 2013-10-31 17:10:39.708491 IP (tos 0x0, ttl 64, id 19462, offset 0, flags [DF], proto TCP (6), length 92)
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe50 (incorrect -> 0x4e7c), seq 185:225, ack 128, win 86, options [nop,nop,TS val 622752 ecr 622751], length 40: OpenFlow
version 1.3, type MULTIPART_REPLY, length 40, xid 0x00000077
85 2013-10-31 17:10:39.747947 IP (tos 0x0, ttl 64, id 18560, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5ca0), ack 225, win 109, options [nop,nop,TS val 622762 ecr 622752], length 0
86 2013-10-31 17:20:21.268792 IP (tos 0x0, ttl 64, id 18795, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe38 (incorrect -> 0xdced), seq 1072:1088, ack 2705, win 256, options [nop,nop,TS val 768142 ecr 767309], length 16: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x000000ed
87 2013-10-31 17:20:21.270799 IP (tos 0x0, ttl 64, id 19580, offset 0, flags [DF], proto TCP (6), length 1604)
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0439 (incorrect -> 0xedc3), seq 2705:4257, ack 1088, win 86, options [nop,nop,TS val 768142 ecr 768142], length 1552: OpenFlow
version 1.3, type MULTIPART_REPLY, length 1552, xid 0x000000ed
88 2013-10-31 17:20:21.270887 IP (tos 0x0, ttl 64, id 18796, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xd8b8), ack 4257, win 254, options [nop,nop,TS val 768142 ecr 768142], length 0
89 2013-10-31 17:21:32.610984 IP (tos 0x0, ttl 64, id 18829, offset 0, flags [DF], proto TCP (6), length 76)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0x48f2), seq 1248:1272, ack 4981, win 256, options [nop,nop,TS val 785977 ecr 784870], length 24: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x000000ff
90 2013-10-31 17:21:32.614400 IP (tos 0x0, ttl 64, id 19597, offset 0, flags [DF], proto TCP (6), length 628)
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0069 (incorrect -> 0x23f8), seq 4981:5557, ack 1272, win 86, options [nop,nop,TS val 785978 ecr 785977], length 576: OpenFlow
version 1.3, type MULTIPART_REPLY, length 576, xid 0x000000ff
91 2013-10-31 17:21:32.614511 IP (tos 0x0, ttl 64, id 18830, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x4793), ack 5557, win 255, options [nop,nop,TS val 785978 ecr 785978], length 0
92 2013-10-31 17:21:32.932077 IP (tos 0x0, ttl 64, id 18831, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0x4228), seq 1272:1280, ack 5557, win 256, options [nop,nop,TS val 786058 ecr 785978], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000100
93 2013-10-31 17:21:32.939513 IP (tos 0x0, ttl 64, id 19598, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4278), seq 5557:5565, ack 1280, win 86, options [nop,nop,TS val 786059 ecr 786058], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x00000100
94 2013-10-31 17:21:32.939617 IP (tos 0x0, ttl 64, id 18832, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x46e0), ack 5565, win 256, options [nop,nop,TS val 786059 ecr 786059], length 0
95 2013-10-31 17:27:12.201785 IP (tos 0x0, ttl 64, id 18969, offset 0, flags [DF], proto TCP (6), length 76)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0xa9d9), seq 1840:1864, ack 6277, win 256, options [nop,nop,TS val 870875 ecr 869809], length 24: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000147
96 2013-10-31 17:27:12.204185 IP (tos 0x0, ttl 64, id 19667, offset 0, flags [DF], proto TCP (6), length 228)
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfed8 (incorrect -> 0xa1c3), seq 6277:6453, ack 1864, win 86, options [nop,nop,TS val 870876 ecr 870875], length 176: OpenFlow
version 1.3, type MULTIPART_REPLY, length 176, xid 0x00000147
97 2013-10-31 17:27:12.204269 IP (tos 0x0, ttl 64, id 18970, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xaa7b), ack 6453, win 256, options [nop,nop,TS val 870876 ecr 870876], length 0
98 2013-10-31 17:27:12.931668 IP (tos 0x0, ttl 64, id 18971, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0xa464), seq 1864:1872, ack 6453, win 256, options [nop,nop,TS val 871057 ecr 870876], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000148
99 2013-10-31 17:27:12.938585 IP (tos 0x0, ttl 64, id 19668, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xa44e), seq 6453:6461, ack 1872, win 86, options [nop,nop,TS val 871059 ecr 871057], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x00000148
100 2013-10-31 17:27:12.938697 IP (tos 0x0, ttl 64, id 18972, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xa8fd), ack 6461, win 256, options [nop,nop,TS val 871059 ecr 871059], length 0
101 2013-10-31 17:57:16.110186 IP (tos 0x0, ttl 64, id 16966, offset 0, flags [DF], proto TCP (6), length 76)
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe40 (incorrect -> 0xcf7c), seq 555521909:555521933, ack 1543280532, win 105, options [nop,nop,TS val 1321852 ecr 1321585], length 24: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x0000001f
102 2013-10-31 17:57:16.113738 IP (tos 0x0, ttl 64, id 22868, offset 0, flags [DF], proto TCP (6), length 252)
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfef0 (incorrect -> 0x3421), seq 1:201, ack 24, win 86, options [nop,nop,TS val 1321853 ecr 1321852], length 200: OpenFlow
version 1.3, type MULTIPART_REPLY, length 200, xid 0x0000001f
103 2013-10-31 17:57:16.113974 IP (tos 0x0, ttl 64, id 16967, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xd1f7), ack 201, win 109, options [nop,nop,TS val 1321853 ecr 1321853], length 0
104 2013-10-31 17:57:17.127188 IP (tos 0x0, ttl 64, id 16968, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xcc99), seq 24:40, ack 201, win 109, options [nop,nop,TS val 1322106 ecr 1321853], length 16: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000020
105 2013-10-31 17:57:17.129487 IP (tos 0x0, ttl 64, id 22869, offset 0, flags [DF], proto TCP (6), length 204)
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfec0 (incorrect -> 0xad66), seq 201:353, ack 40, win 86, options [nop,nop,TS val 1322107 ecr 1322106], length 152: OpenFlow
version 1.3, type MULTIPART_REPLY, length 152, xid 0x00000020
106 2013-10-31 17:57:17.130202 IP (tos 0x0, ttl 64, id 16969, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcf4f), ack 353, win 113, options [nop,nop,TS val 1322107 ecr 1322107], length 0
107 2013-10-31 17:57:17.869382 IP (tos 0x0, ttl 64, id 16970, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xca33), seq 40:56, ack 353, win 113, options [nop,nop,TS val 1322292 ecr 1322107], length 16: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000021
108 2013-10-31 17:57:17.871408 IP (tos 0x0, ttl 64, id 22870, offset 0, flags [DF], proto TCP (6), length 108)
127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfe60 (incorrect -> 0xc5b3), seq 353:409, ack 56, win 86, options [nop,nop,TS val 1322292 ecr 1322292], length 56: OpenFlow
version 1.3, type MULTIPART_REPLY, length 56, xid 0x00000021
109 2013-10-31 17:57:17.871493 IP (tos 0x0, ttl 64, id 16971, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcd95), ack 409, win 113, options [nop,nop,TS val 1322292 ecr 1322292], length 0
110 2013-11-01 10:02:19.814878 IP (tos 0x0, ttl 64, id 47069, offset 0, flags [DF], proto TCP (6), length 76)
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x07aa), seq 260443467:260443491, ack 382342041, win 100, options [nop,nop,TS val 344035 ecr 343141], length 24: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000028
111 2013-11-01 10:02:19.815701 IP (tos 0x0, ttl 64, id 47114, offset 0, flags [DF], proto TCP (6), length 196)
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfeb8 (incorrect -> 0x3ff1), seq 1:145, ack 24, win 88, options [nop,nop,TS val 344035 ecr 344035], length 144: OpenFlow
version 1.3, type MULTIPART_REPLY, length 144, xid 0x00000028
112 2013-11-01 10:02:19.815724 IP (tos 0x0, ttl 64, id 47070, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x07fa), ack 145, win 105, options [nop,nop,TS val 344035 ecr 344035], length 0
113 2013-11-01 10:02:20.713618 IP (tos 0x0, ttl 64, id 47071, offset 0, flags [DF], proto TCP (6), length 76)
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x029c), seq 24:48, ack 145, win 105, options [nop,nop,TS val 344260 ecr 344035], length 24: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000029
114 2013-11-01 10:02:20.714133 IP (tos 0x0, ttl 64, id 47115, offset 0, flags [DF], proto TCP (6), length 132)
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xfe54), seq 145:225, ack 48, win 88, options [nop,nop,TS val 344260 ecr 344260], length 80: OpenFlow
version 1.3, type MULTIPART_REPLY, length 80, xid 0x00000029
115 2013-11-01 10:02:20.714160 IP (tos 0x0, ttl 64, id 47072, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x05d0), ack 225, win 105, options [nop,nop,TS val 344260 ecr 344260], length 0
116 2013-11-01 10:02:21.229978 IP (tos 0x0, ttl 64, id 47073, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe30 (incorrect -> 0x010b), seq 48:56, ack 225, win 105, options [nop,nop,TS val 344389 ecr 344260], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002a
117 2013-11-01 10:02:21.231013 IP (tos 0x0, ttl 64, id 47116, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x0092), seq 225:233, ack 56, win 88, options [nop,nop,TS val 344389 ecr 344389], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x0000002a
118 2013-11-01 10:02:21.231044 IP (tos 0x0, ttl 64, id 47074, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x04be), ack 233, win 105, options [nop,nop,TS val 344389 ecr 344389], length 0
119 2013-11-01 10:02:21.852874 IP (tos 0x0, ttl 64, id 47075, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe38 (incorrect -> 0xffb1), seq 56:72, ack 233, win 105, options [nop,nop,TS val 344545 ecr 344389], length 16: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000002b
120 2013-11-01 10:02:21.853489 IP (tos 0x0, ttl 64, id 47117, offset 0, flags [DF], proto TCP (6), length 84)
127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xeddf), seq 233:265, ack 72, win 88, options [nop,nop,TS val 344545 ecr 344545], length 32: OpenFlow
version 1.3, type MULTIPART_REPLY, length 32, xid 0x0000002b
121 2013-11-01 10:02:21.853515 IP (tos 0x0, ttl 64, id 47076, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x0356), ack 265, win 105, options [nop,nop,TS val 344545 ecr 344545], length 0
122 2013-11-01 10:30:09.945368 IP (tos 0x0, ttl 64, id 54874, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe30 (incorrect -> 0x68f4), seq 3359330522:3359330530, ack 3471458557, win 256, options [nop,nop,TS val 761568 ecr 760318], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000000d
123 2013-11-01 10:30:09.946140 IP (tos 0x0, ttl 64, id 56416, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x64b3), seq 1:9, ack 8, win 86, options [nop,nop,TS val 761568 ecr 761568], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x0000000d
124 2013-11-01 10:30:09.946173 IP (tos 0x0, ttl 64, id 54875, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x6829), ack 9, win 256, options [nop,nop,TS val 761568 ecr 761568], length 0
125 2013-11-01 10:30:10.672306 IP (tos 0x0, ttl 64, id 54876, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe38 (incorrect -> 0x6320), seq 8:24, ack 9, win 256, options [nop,nop,TS val 761749 ecr 761568], length 16: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000e
126 2013-11-01 10:30:10.673261 IP (tos 0x0, ttl 64, id 56417, offset 0, flags [DF], proto TCP (6), length 11844)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x30af), seq 9:11801, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761749], length 11792: OpenFlow
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
127 2013-11-01 10:30:10.673292 IP (tos 0x0, ttl 64, id 54877, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x38a9), ack 11801, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
128 2013-11-01 10:30:10.675065 IP (tos 0x0, ttl 64, id 56418, offset 0, flags [DF], proto TCP (6), length 11844)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xc66e), seq 11801:23593, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
129 2013-11-01 10:30:10.675124 IP (tos 0x0, ttl 64, id 54878, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x0a99), ack 23593, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
130 2013-11-01 10:30:10.675159 IP (tos 0x0, ttl 64, id 56419, offset 0, flags [DF], proto TCP (6), length 11844)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x62e9), seq 23593:35385, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
131 2013-11-01 10:30:10.675174 IP (tos 0x0, ttl 64, id 54879, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xdc94), ack 35385, win 232, options [nop,nop,TS val 761750 ecr 761750], length 0
132 2013-11-01 10:30:10.675194 IP (tos 0x0, ttl 64, id 56420, offset 0, flags [DF], proto TCP (6), length 11844)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xeed4), seq 35385:47177, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
133 2013-11-01 10:30:10.675206 IP (tos 0x0, ttl 64, id 54880, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xae91), ack 47177, win 219, options [nop,nop,TS val 761750 ecr 761750], length 0
134 2013-11-01 10:30:10.675226 IP (tos 0x0, ttl 64, id 56421, offset 0, flags [DF], proto TCP (6), length 11844)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x7ac0), seq 47177:58969, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
135 2013-11-01 10:30:10.675238 IP (tos 0x0, ttl 64, id 54881, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x808d), ack 58969, win 207, options [nop,nop,TS val 761750 ecr 761750], length 0
136 2013-11-01 10:30:10.675257 IP (tos 0x0, ttl 64, id 56422, offset 0, flags [DF], proto TCP (6), length 11844)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x04c0), seq 58969:70761, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
137 2013-11-01 10:30:10.675294 IP (tos 0x0, ttl 64, id 56423, offset 0, flags [DF], proto TCP (6), length 11844)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x90ab), seq 70761:82553, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
138 2013-11-01 10:30:10.675314 IP (tos 0x0, ttl 64, id 56424, offset 0, flags [DF], proto TCP (6), length 11844)
127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x1c98), seq 82553:94345, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
139 2013-11-01 10:30:10.675325 IP (tos 0x0, ttl 64, id 54882, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x2486), ack 82553, win 182, options [nop,nop,TS val 761750 ecr 761750], length 0
140 2013-11-01 10:30:10.712539 IP (tos 0x0, ttl 64, id 54883, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xf621), ack 94345, win 256, options [nop,nop,TS val 761760 ecr 761750], length 0
141 2013-11-01 10:46:50.838754 IP (tos 0x0, ttl 64, id 46973, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.36548: Flags [P.], cksum 0xfe38 (incorrect -> 0x2338), seq 75556183:75556199, ack 3751019041, win 98, options [nop,nop,TS val 1011791 ecr 1010724], length 16: OpenFlow
version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000d
142 2013-11-01 10:46:50.839431 IP (tos 0x0, ttl 64, id 43209, offset 0, flags [DF], proto TCP (6), length 388)
127.0.0.1.36548 > 127.0.0.1.6633: Flags [P.], cksum 0xff78 (incorrect -> 0x0f3d), seq 1:337, ack 16, win 86, options [nop,nop,TS val 1011791 ecr 1011791], length 336: OpenFlow
version 1.3, type MULTIPART_REPLY, length 336, xid 0x0000000d
143 2013-11-01 10:46:50.839471 IP (tos 0x0, ttl 64, id 46974, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.36548: Flags [.], cksum 0xfe28 (incorrect -> 0x21fc), ack 337, win 103, options [nop,nop,TS val 1011791 ecr 1011791], length 0
144 2013-11-02 19:45:16.495434 IP (tos 0x0, ttl 64, id 17712, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0xe6e3), seq 1323837391:1323837399, ack 1278624979, win 94, options [nop,nop,TS val 6181422 ecr 6180173], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000006d
145 2013-11-02 19:45:16.496030 IP (tos 0x0, ttl 64, id 23686, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xe200), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6181423 ecr 6181422], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x0000006d
146 2013-11-02 19:45:16.496057 IP (tos 0x0, ttl 64, id 17713, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0xe677), ack 9, win 94, options [nop,nop,TS val 6181423 ecr 6181423], length 0
147 2013-11-02 19:45:17.176752 IP (tos 0x0, ttl 64, id 17714, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe38 (incorrect -> 0xe026), seq 8:24, ack 9, win 94, options [nop,nop,TS val 6181593 ecr 6181423], length 16: OpenFlow
version 1.3, type TABLE_MOD, length 16, xid 0x0000006e
table_id 1, config 0x00000000
148 2013-11-02 19:45:17.215970 IP (tos 0x0, ttl 64, id 23687, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.51984 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xe511), ack 24, win 86, options [nop,nop,TS val 6181603 ecr 6181593], length 0
149 2013-11-02 19:53:23.472776 IP (tos 0x0, ttl 64, id 17917, offset 0, flags [DF], proto TCP (6), length 92)
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe50 (incorrect -> 0xb18a), seq 936:976, ack 1361, win 98, options [nop,nop,TS val 6303167 ecr 6302673], length 40: OpenFlow
version 1.3, type PORT_MOD, length 40, xid 0x000000d4
port_no 1, hw_addr 0a:ea:83:10:db:09
config 0x00000040 (NO_PACKET_IN)
mask 0x00000040 (NO_PACKET_IN)
advertise 0x0000080a (10MB_FD, 100MB_FD, COPPER)
150 2013-11-02 19:53:23.473744 IP (tos 0x0, ttl 64, id 23790, offset 0, flags [DF], proto TCP (6), length 132)
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x92a0), seq 1361:1441, ack 976, win 86, options [nop,nop,TS val 6303167 ecr 6303167], length 80: OpenFlow
version 1.3, type PORT_STATUS, length 80, xid 0x00000000
reason MODIFY
port_no 1, hw_addr 0a:ea:83:10:db:09, name 'veth0'
151 2013-11-02 19:53:23.473777 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x25f0), ack 1441, win 98, options [nop,nop,TS val 6303167 ecr 6303167], length 0
152 2013-11-02 19:55:19.511983 IP (tos 0x0, ttl 64, id 17967, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0x3fa5), seq 1168:1176, ack 1633, win 98, options [nop,nop,TS val 6332177 ecr 6331422], length 8: OpenFlow
version 1.3, type BARRIER_REQUEST, length 8, xid 0x000000ed
153 2013-11-02 19:55:19.513048 IP (tos 0x0, ttl 64, id 23815, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3cb5), seq 1633:1641, ack 1176, win 86, options [nop,nop,TS val 6332177 ecr 6332177], length 8: OpenFlow
version 1.3, type BARRIER_REPLY, length 8, xid 0x000000ed
154 2013-11-02 19:55:19.513081 IP (tos 0x0, ttl 64, id 17968, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x41bb), ack 1641, win 98, options [nop,nop,TS val 6332177 ecr 6332177], length 0
155 2013-11-02 20:10:12.609713 IP (tos 0x0, ttl 64, id 45627, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0x8da8), seq 2129684753:2129684761, ack 2572383599, win 96, options [nop,nop,TS val 6555451 ecr 6554199], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x0000007d
156 2013-11-02 20:10:12.610357 IP (tos 0x0, ttl 64, id 49206, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x88c5), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6555451 ecr 6555451], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x0000007d
157 2013-11-02 20:10:12.610382 IP (tos 0x0, ttl 64, id 45628, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8d4b), ack 9, win 96, options [nop,nop,TS val 6555451 ecr 6555451], length 0
158 2013-11-02 20:10:13.364783 IP (tos 0x0, ttl 64, id 45629, offset 0, flags [DF], proto TCP (6), length 68)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe38 (incorrect -> 0x87d1), seq 8:24, ack 9, win 96, options [nop,nop,TS val 6555640 ecr 6555451], length 16: OpenFlow
version 1.3, type QUEUE_GET_CONFIG_REQUEST, length 16, xid 0x0000007e
port 1
159 2013-11-02 20:10:13.366754 IP (tos 0x0, ttl 64, id 49207, offset 0, flags [DF], proto TCP (6), length 132)
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x80dc), seq 9:89, ack 24, win 86, options [nop,nop,TS val 6555640 ecr 6555640], length 80: OpenFlow
version 1.3, type QUEUE_GET_CONFIG_REPLY, length 80, xid 0x0000007e
160 2013-11-02 20:10:13.366788 IP (tos 0x0, ttl 64, id 45630, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8b71), ack 89, win 96, options [nop,nop,TS val 6555640 ecr 6555640], length 0
161 2013-11-02 20:24:40.574081 IP (tos 0x0, ttl 64, id 45979, offset 0, flags [DF], proto TCP (6), length 76)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe40 (incorrect -> 0xba52), seq 1432:1456, ack 1497, win 96, options [nop,nop,TS val 6772442 ecr 6771701], length 24: OpenFlow
version 1.3, type ROLE_REQUEST, length 24, xid 0x0000012f
role MASTER, generation_id 0x00000000012e248a
162 2013-11-02 20:24:40.574726 IP (tos 0x0, ttl 64, id 49382, offset 0, flags [DF], proto TCP (6), length 76)
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe40 (incorrect -> 0xb75e), seq 1497:1521, ack 1456, win 86, options [nop,nop,TS val 6772442 ecr 6772442], length 24: OpenFlow
version 1.3, type ROLE_REPLY, length 24, xid 0x0000012f
role MASTER, generation_id 0x00000000012e248a
163 2013-11-02 20:24:40.574748 IP (tos 0x0, ttl 64, id 45980, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xe276), ack 1521, win 96, options [nop,nop,TS val 6772442 ecr 6772442], length 0
164 2013-11-02 20:28:52.608224 IP (tos 0x0, ttl 64, id 46086, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xf205), seq 1904:1912, ack 1985, win 96, options [nop,nop,TS val 6835451 ecr 6834201], length 8: OpenFlow
version 1.3, type ECHO_REQUEST, length 8, xid 0x00000165
165 2013-11-02 20:28:52.609219 IP (tos 0x0, ttl 64, id 49437, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xed24), seq 1985:1993, ack 1912, win 86, options [nop,nop,TS val 6835451 ecr 6835451], length 8: OpenFlow
version 1.3, type ECHO_REPLY, length 8, xid 0x00000165
166 2013-11-02 20:28:52.609246 IP (tos 0x0, ttl 64, id 46087, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xf292), ack 1993, win 96, options [nop,nop,TS val 6835451 ecr 6835451], length 0
167 2013-11-02 20:28:54.103683 IP (tos 0x0, ttl 64, id 46088, offset 0, flags [DF], proto TCP (6), length 84)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe48 (incorrect -> 0xeb3a), seq 1912:1944, ack 1993, win 96, options [nop,nop,TS val 6835824 ecr 6835451], length 32: OpenFlow
version 1.3, type SET_ASYNC, length 32, xid 0x00000166
packet_in_mask[EM] 0x00000003 (NO_MATCH, ACTION)
packet_in_mask[S] 0x00000002 (ACTION)
port_status_mask[EM] 0x00000007 (ADD, DELETE, MODIFY)
port_status_mask[S] 0x00000002 (DELETE)
flow_removed_mask[EM] 0x00000007 (ADD, DELETE, MODIFY)
flow_removed_mask[S] 0x00000004 (MODIFY)
168 2013-11-02 20:28:54.140673 IP (tos 0x0, ttl 64, id 49438, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xef88), ack 1944, win 86, options [nop,nop,TS val 6835834 ecr 6835824], length 0
169 2013-11-02 20:28:56.308694 IP (tos 0x0, ttl 64, id 46089, offset 0, flags [DF], proto TCP (6), length 60)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xe7bd), seq 1944:1952, ack 1993, win 96, options [nop,nop,TS val 6836376 ecr 6835834], length 8: OpenFlow
version 1.3, type GET_ASYNC_REQUEST, length 8, xid 0x00000167
170 2013-11-02 20:28:56.308754 IP (tos 0x0, ttl 64, id 49439, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xeb3a), ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 0
171 2013-11-02 20:28:56.309209 IP (tos 0x0, ttl 64, id 49440, offset 0, flags [DF], proto TCP (6), length 84)
127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xe557), seq 1993:2025, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 32: OpenFlow
version 1.3, type GET_ASYNC_REPLY, length 32, xid 0x00000167
packet_in_mask[EM] 0x00000003 (NO_MATCH, ACTION)
packet_in_mask[S] 0x00000002 (ACTION)
port_status_mask[EM] 0x00000007 (ADD, DELETE, MODIFY)
port_status_mask[S] 0x00000002 (DELETE)
flow_removed_mask[EM] 0x00000007 (ADD, DELETE, MODIFY)
flow_removed_mask[S] 0x00000004 (MODIFY)
172 2013-11-02 20:28:56.309230 IP (tos 0x0, ttl 64, id 46090, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xeb10), ack 2025, win 96, options [nop,nop,TS val 6836376 ecr 6836376], length 0
173 2013-11-02 20:37:22.358712 IP (tos 0x0, ttl 64, id 18246, offset 0, flags [DF], proto TCP (6), length 100)
127.0.0.1.6633 > 127.0.0.1.51989: Flags [P.], cksum 0xfe58 (incorrect -> 0x9b52), seq 1436436734:1436436782, ack 2087738396, win 96, options [nop,nop,TS val 6962888 ecr 6961981], length 48: OpenFlow
version 1.3, type METER_MOD, length 48, xid 0x00000010
174 2013-11-02 20:37:22.396699 IP (tos 0x0, ttl 64, id 23571, offset 0, flags [DF], proto TCP (6), length 52)
127.0.0.1.51989 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x9d9e), ack 48, win 86, options [nop,nop,TS val 6962898 ecr 6962888], length 0
|