]> The Tcpdump Group git mirrors - tcpdump/blob - tests/of13_ericsson-vv.out
CMake: Fix the comment about versions. [skip ci]
[tcpdump] / tests / of13_ericsson-vv.out
1 1 2013-10-19 15:52:49.322823 IP (tos 0x0, ttl 64, id 348, offset 0, flags [DF], proto TCP (6), length 236)
2 127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfee0 (incorrect -> 0x21d3), seq 3305197767:3305197951, ack 3938018648, win 100, options [nop,nop,TS val 534888 ecr 533649], length 184: OpenFlow
3 version 1.3, type FLOW_MOD, length 184, xid 0x00000199
4 2 2013-10-19 15:52:49.362355 IP (tos 0x0, ttl 64, id 61731, offset 0, flags [DF], proto TCP (6), length 52)
5 127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1ad3), seq 1, ack 184, win 98, options [nop,nop,TS val 534898 ecr 534888], length 0
6 3 2013-10-19 15:52:49.367093 IP (tos 0x0, ttl 64, id 349, offset 0, flags [DF], proto TCP (6), length 60)
7 127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfe30 (incorrect -> 0x1512), seq 184:192, ack 1, win 100, options [nop,nop,TS val 534899 ecr 534898], length 8: OpenFlow
8 version 1.3, type ECHO_REQUEST, length 8, xid 0x0000019a
9 4 2013-10-19 15:52:49.367137 IP (tos 0x0, ttl 64, id 61732, offset 0, flags [DF], proto TCP (6), length 52)
10 127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1abf), seq 1, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 0
11 5 2013-10-19 15:52:49.367403 IP (tos 0x0, ttl 64, id 61733, offset 0, flags [DF], proto TCP (6), length 60)
12 127.0.0.1.35359 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x150a), seq 1:9, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 8: OpenFlow
13 version 1.3, type ECHO_REPLY, length 8, xid 0x0000019a
14 6 2013-10-19 15:52:49.367421 IP (tos 0x0, ttl 64, id 350, offset 0, flags [DF], proto TCP (6), length 52)
15 127.0.0.1.6633 > 127.0.0.1.35359: Flags [.], cksum 0xfe28 (incorrect -> 0x1ab5), seq 192, ack 9, win 100, options [nop,nop,TS val 534899 ecr 534899], length 0
16 7 2013-10-20 12:15:37.979676 IP (tos 0x0, ttl 64, id 46225, offset 0, flags [DF], proto TCP (6), length 420)
17 127.0.0.1.6633 > 127.0.0.1.43230: Flags [P.], cksum 0xff98 (incorrect -> 0xd79d), seq 402287444:402287812, ack 1282739451, win 98, options [nop,nop,TS val 2953476 ecr 2952724], length 368: OpenFlow
18 version 1.3, type FLOW_MOD, length 368, xid 0x00000012
19 8 2013-10-20 12:15:37.985455 IP (tos 0x0, ttl 64, id 55504, offset 0, flags [DF], proto TCP (6), length 432)
20 127.0.0.1.43230 > 127.0.0.1.6633: Flags [P.], cksum 0xffa4 (incorrect -> 0xcda4), seq 1:381, ack 368, win 90, options [nop,nop,TS val 2953478 ecr 2953476], length 380: OpenFlow
21 version 1.3, type ERROR, length 380, xid 0x00000012
22 type BAD_ACTION, code BAD_EXPERIMENTER
23 data (368 octets)
24 0x0000: 040e 0170 0000 0012 0000 0000 0001 e240 ...p...........@
25 0x0010: 0000 0000 0009 fbf1 2a00 03e8 07d0 01f4 ........*.......
26 0x0020: ffff ffff ffff ffff ffff ffff 0000 0000 ................
27 0x0030: 0001 006d 8000 0004 0000 0001 8000 0204 ...m............
28 0x0040: 0000 0002 8000 0510 0102 0304 0000 0000 ................
29 0x0050: 0000 0000 ffff ffff 8000 0606 0a0b 0c0d ................
30 0x0060: 0e0f 8000 0806 8f8e 8d8c 8b8a 8000 0a02 ................
31 0x0070: 0800 8000 0c02 03e8 8000 1401 0680 0016 ................
32 0x0080: 04c0 a801 0180 0019 08c0 a802 0000 0000 ................
33 0x0090: ff80 001a 0203 e880 001c 0200 5000 0000 ............P...
34 0x00a0: 0003 0070 0000 0000 0000 0010 0000 0001 ...p............
35 0x00b0: 0080 0000 0000 0000 0000 0010 0000 0001 ................
36 0x00c0: ffff 0000 0000 0000 0016 0008 0000 03e8 ................
37 0x00d0: 0015 0008 0000 07d0 000f 0008 0500 0000 ................
38 0x00e0: 0010 0008 0000 0000 0017 0008 0500 0000 ................
39 0x00f0: 0018 0008 0000 0000 000b 0008 0000 0000 ................
40 0x0100: ffff 0010 00d0 f0db 0001 0203 0405 0607 ................
41 0x0110: 0004 0060 0000 0000 000c 0008 0000 0000 ...`............
42 0x0120: 0011 0008 0800 0000 0012 0008 0000 0000 ................
43 0x0130: 0013 0008 8847 0000 0014 0008 86dd 0000 .....G..........
44 0x0140: 001a 0008 88a8 0000 0019 0010 8000 1604 ................
45 0x0150: c0a8 0a01 0000 0000 0019 0018 8000 3610 ..............6.
46 0x0160: 2001 4860 4860 0000 0000 0000 0000 8888 ..H`H`..........
47 9 2013-10-20 12:15:37.985482 IP (tos 0x0, ttl 64, id 46226, offset 0, flags [DF], proto TCP (6), length 52)
48 127.0.0.1.6633 > 127.0.0.1.43230: Flags [.], cksum 0xfe28 (incorrect -> 0xb37b), seq 368, ack 381, win 103, options [nop,nop,TS val 2953478 ecr 2953478], length 0
49 10 2013-10-21 14:53:56.336558 IP (tos 0x0, ttl 64, id 63838, offset 0, flags [DF], proto TCP (6), length 172)
50 127.0.0.1.6633 > 127.0.0.1.56562: Flags [P.], cksum 0xfea0 (incorrect -> 0x8c0a), seq 4055369935:4055370055, ack 963939871, win 94, options [nop,nop,TS val 3963146 ecr 3962600], length 120: OpenFlow
51 version 1.3, type GROUP_MOD, length 120, xid 0x0000008a
52 11 2013-10-21 14:53:56.339805 IP (tos 0x0, ttl 64, id 30929, offset 0, flags [DF], proto TCP (6), length 184)
53 127.0.0.1.56562 > 127.0.0.1.6633: Flags [P.], cksum 0xfeac (incorrect -> 0x8455), seq 1:133, ack 120, win 86, options [nop,nop,TS val 3963147 ecr 3963146], length 132: OpenFlow
54 version 1.3, type ERROR, length 132, xid 0x0000008a
55 type GROUP_MOD_FAILED, code INVALID_GROUP
56 data (120 octets)
57 0x0000: 040f 0078 0000 008a 0001 0300 0000 1388 ...x............
58 0x0010: 0030 0064 ffff ffff ffff ffff 0000 0000 .0.d............
59 0x0020: 0000 0010 0000 0001 ffff 0000 0000 0000 ................
60 0x0030: 0016 0008 0000 03e8 0015 0008 0000 07d0 ................
61 0x0040: 0028 0064 0000 1388 ffff ffff 0000 0000 .(.d............
62 0x0050: 0017 0008 0500 0000 0018 0008 0000 0000 ................
63 0x0060: 000b 0008 0000 0000 0010 0064 ffff ffff ...........d....
64 0x0070: 0000 0064 0000 0000 ...d....
65 12 2013-10-21 14:53:56.339839 IP (tos 0x0, ttl 64, id 63839, offset 0, flags [DF], proto TCP (6), length 52)
66 127.0.0.1.6633 > 127.0.0.1.56562: Flags [.], cksum 0xfe28 (incorrect -> 0xcbd6), seq 120, ack 133, win 98, options [nop,nop,TS val 3963147 ecr 3963147], length 0
67 13 2013-10-22 07:06:07.923021 IP (tos 0x0, ttl 64, id 53050, offset 0, flags [DF], proto TCP (6), length 60)
68 127.0.0.1.56439 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x17bd), seq 2797182347, win 43690, options [mss 65495,sackOK,TS val 1659569 ecr 0,nop,wscale 9], length 0
69 14 2013-10-22 07:06:07.923406 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
70 127.0.0.1.6633 > 127.0.0.1.56439: Flags [R.], cksum 0x7727 (correct), seq 0, ack 2797182348, win 0, length 0
71 15 2013-10-22 07:06:11.948050 IP (tos 0x0, ttl 64, id 25056, offset 0, flags [DF], proto TCP (6), length 60)
72 127.0.0.1.56440 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x9014), seq 2428319552, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 0,nop,wscale 9], length 0
73 16 2013-10-22 07:06:11.948123 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
74 127.0.0.1.6633 > 127.0.0.1.56440: Flags [S.], cksum 0xfe30 (incorrect -> 0xf3ee), seq 2308881340, ack 2428319553, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 1660576,nop,wscale 9], length 0
75 17 2013-10-22 07:06:11.948171 IP (tos 0x0, ttl 64, id 25057, offset 0, flags [DF], proto TCP (6), length 52)
76 127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc735), seq 1, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
77 18 2013-10-22 07:06:11.948588 IP (tos 0x0, ttl 64, id 25058, offset 0, flags [DF], proto TCP (6), length 60)
78 127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc10f), seq 1:9, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 8: OpenFlow
79 version 1.3, type HELLO, length 8, xid 0x83ea7e23
80 19 2013-10-22 07:06:11.948646 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 52)
81 127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc72d), seq 1, ack 9, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0
82 20 2013-10-22 07:06:11.951581 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 60)
83 127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0x5426), seq 1:9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660576], length 8: OpenFlow
84 version 1.0, type HELLO, length 8, xid 0x95b6dc37
85 21 2013-10-22 07:06:11.951654 IP (tos 0x0, ttl 64, id 25059, offset 0, flags [DF], proto TCP (6), length 52)
86 127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc723), seq 9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 0
87 22 2013-10-22 07:06:11.954851 IP (tos 0x0, ttl 64, id 25060, offset 0, flags [DF], proto TCP (6), length 150)
88 127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe8a (incorrect -> 0x83b9), seq 9:107, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 98: OpenFlow
89 version 1.3, type ERROR, length 98, xid 0xc4420f26
90 type HELLO_FAILED, code INCOMPATIBLE
91 data (86 octets)
92 0x0000: 5765 2073 7570 706f 7274 2076 6572 7369 We.support.versi
93 0x0010: 6f6e 7320 3078 3034 2074 6f20 3078 3034 ons.0x04.to.0x04
94 0x0020: 2069 6e63 6c75 7369 7665 2062 7574 2079 .inclusive.but.y
95 0x0030: 6f75 2073 7570 706f 7274 206e 6f20 6c61 ou.support.no.la
96 0x0040: 7465 7220 7468 616e 2076 6572 7369 6f6e ter.than.version
97 0x0050: 2030 7830 312e .0x01.
98 23 2013-10-22 07:06:11.956875 IP (tos 0x0, ttl 64, id 25061, offset 0, flags [DF], proto TCP (6), length 52)
99 127.0.0.1.56440 > 127.0.0.1.6633: Flags [F.], cksum 0xfe28 (incorrect -> 0xc6bf), seq 107, ack 9, win 86, options [nop,nop,TS val 1660578 ecr 1660577], length 0
100 24 2013-10-22 07:06:11.995263 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52)
101 127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc6b5), seq 9, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 0
102 25 2013-10-22 07:06:11.996996 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60)
103 127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0xc22e), seq 9:17, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 8: OpenFlow
104 version 1.0, type FEATURES_REQUEST, length 8, xid 0x852f7e3a
105 26 2013-10-22 07:06:11.997117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
106 127.0.0.1.56440 > 127.0.0.1.6633: Flags [R], cksum 0xf312 (correct), seq 2428319660, win 0, length 0
107 27 2013-10-22 20:23:02.447284 IP (tos 0x0, ttl 64, id 5822, offset 0, flags [DF], proto TCP (6), length 60)
108 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc972), seq 3295811422:3295811430, ack 623716506, win 94, options [nop,nop,TS val 683124 ecr 682086], length 8: OpenFlow
109 version 1.3, type HELLO, length 8, xid 0x0000015f
110 28 2013-10-22 20:23:02.487886 IP (tos 0x0, ttl 64, id 541, offset 0, flags [DF], proto TCP (6), length 52)
111 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xcad0), seq 1, ack 8, win 86, options [nop,nop,TS val 683135 ecr 683124], length 0
112 29 2013-10-22 20:23:03.289931 IP (tos 0x0, ttl 64, id 5823, offset 0, flags [DF], proto TCP (6), length 60)
113 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc47b), seq 8:16, ack 1, win 94, options [nop,nop,TS val 683335 ecr 683135], length 8: OpenFlow
114 version 1.3, type ECHO_REQUEST, length 8, xid 0x00000160
115 30 2013-10-22 20:23:03.290134 IP (tos 0x0, ttl 64, id 542, offset 0, flags [DF], proto TCP (6), length 52)
116 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc92d), seq 1, ack 16, win 86, options [nop,nop,TS val 683335 ecr 683335], length 0
117 31 2013-10-22 20:23:03.292620 IP (tos 0x0, ttl 64, id 543, offset 0, flags [DF], proto TCP (6), length 60)
118 127.0.0.1.37123 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc3b1), seq 1:9, ack 16, win 86, options [nop,nop,TS val 683336 ecr 683335], length 8: OpenFlow
119 version 1.3, type ECHO_REPLY, length 8, xid 0x00000160
120 32 2013-10-22 20:23:03.292690 IP (tos 0x0, ttl 64, id 5824, offset 0, flags [DF], proto TCP (6), length 52)
121 127.0.0.1.6633 > 127.0.0.1.37123: Flags [.], cksum 0xfe28 (incorrect -> 0xc91b), seq 16, ack 9, win 94, options [nop,nop,TS val 683336 ecr 683336], length 0
122 33 2013-10-22 20:23:03.674363 IP (tos 0x0, ttl 64, id 5825, offset 0, flags [DF], proto TCP (6), length 68)
123 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe38 (incorrect -> 0xc315), seq 16:32, ack 9, win 94, options [nop,nop,TS val 683431 ecr 683336], length 16: OpenFlow
124 version 1.3, type HELLO, length 16, xid 0x00000161
125 type VERSIONBITMAP, length 8, bitmap 0x00000015 (1.0, 1.2, 1.4)
126 34 2013-10-22 20:23:03.711246 IP (tos 0x0, ttl 64, id 544, offset 0, flags [DF], proto TCP (6), length 52)
127 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc84b), seq 9, ack 32, win 86, options [nop,nop,TS val 683441 ecr 683431], length 0
128 35 2013-10-24 09:18:28.508689 IP (tos 0x0, ttl 64, id 8726, offset 0, flags [DF], proto TCP (6), length 60)
129 127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe30 (incorrect -> 0x5466), seq 2774334230:2774334238, ack 3518786755, win 94, options [nop,nop,TS val 2174690 ecr 2173441], length 8: OpenFlow
130 version 1.3, type ECHO_REQUEST, length 8, xid 0x0000004d
131 36 2013-10-24 09:18:28.512206 IP (tos 0x0, ttl 64, id 48675, offset 0, flags [DF], proto TCP (6), length 60)
132 127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4f83), seq 1:9, ack 8, win 86, options [nop,nop,TS val 2174691 ecr 2174690], length 8: OpenFlow
133 version 1.3, type ECHO_REPLY, length 8, xid 0x0000004d
134 37 2013-10-24 09:18:28.512310 IP (tos 0x0, ttl 64, id 8727, offset 0, flags [DF], proto TCP (6), length 52)
135 127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x53da), seq 8, ack 9, win 94, options [nop,nop,TS val 2174691 ecr 2174691], length 0
136 38 2013-10-24 09:18:29.938866 IP (tos 0x0, ttl 64, id 8728, offset 0, flags [DF], proto TCP (6), length 73)
137 127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe3d (incorrect -> 0x23cf), seq 8:29, ack 9, win 94, options [nop,nop,TS val 2175048 ecr 2174691], length 21: OpenFlow
138 version 1.3, type ECHO_REQUEST, length 21, xid 0x0000004e
139 data (13 octets)
140 0x0000: 0001 0203 0405 0607 0809 0a0b 0c .............
141 39 2013-10-24 09:18:29.940525 IP (tos 0x0, ttl 64, id 48676, offset 0, flags [DF], proto TCP (6), length 73)
142 127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe3d (incorrect -> 0x225c), seq 9:30, ack 29, win 86, options [nop,nop,TS val 2175048 ecr 2175048], length 21: OpenFlow
143 version 1.3, type ECHO_REPLY, length 21, xid 0x0000004e
144 data (13 octets)
145 0x0000: 0001 0203 0405 0607 0809 0a0b 0c .............
146 40 2013-10-24 09:18:29.940621 IP (tos 0x0, ttl 64, id 8729, offset 0, flags [DF], proto TCP (6), length 52)
147 127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x50e6), seq 29, ack 30, win 94, options [nop,nop,TS val 2175048 ecr 2175048], length 0
148 41 2013-10-24 15:41:10.777155 IP (tos 0x0, ttl 64, id 14454, offset 0, flags [DF], proto TCP (6), length 68)
149 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe38 (incorrect -> 0x994a), seq 2142345193:2142345209, ack 115176160, win 94, options [nop,nop,TS val 175830 ecr 174634], length 16: OpenFlow
150 version 1.3, type EXPERIMENTER, length 16, xid 0x00000041
151 experimenter 0x00d0f0db (Ericsson), exp_type 0x00000065
152 42 2013-10-24 15:41:10.782182 IP (tos 0x0, ttl 64, id 51401, offset 0, flags [DF], proto TCP (6), length 80)
153 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe44 (incorrect -> 0x9024), seq 1:29, ack 16, win 86, options [nop,nop,TS val 175831 ecr 175830], length 28: OpenFlow
154 version 1.3, type ERROR, length 28, xid 0x00000041
155 type BAD_REQUEST, code BAD_LEN
156 data (16 octets)
157 0x0000: 0404 0010 0000 0041 00d0 f0db 0000 0065 .......A.......e
158 43 2013-10-24 15:41:10.782279 IP (tos 0x0, ttl 64, id 14455, offset 0, flags [DF], proto TCP (6), length 52)
159 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8aee), seq 16, ack 29, win 94, options [nop,nop,TS val 175831 ecr 175831], length 0
160 44 2013-10-24 15:41:10.978145 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto TCP (6), length 60)
161 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0x8661), seq 16:24, ack 29, win 94, options [nop,nop,TS val 175880 ecr 175831], length 8: OpenFlow
162 version 1.3, type ECHO_REQUEST, length 8, xid 0x00000042
163 45 2013-10-24 15:41:10.981725 IP (tos 0x0, ttl 64, id 51402, offset 0, flags [DF], proto TCP (6), length 60)
164 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x862e), seq 29:37, ack 24, win 86, options [nop,nop,TS val 175881 ecr 175880], length 8: OpenFlow
165 version 1.3, type ECHO_REPLY, length 8, xid 0x00000042
166 46 2013-10-24 15:41:10.981828 IP (tos 0x0, ttl 64, id 14457, offset 0, flags [DF], proto TCP (6), length 52)
167 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8a7a), seq 24, ack 37, win 94, options [nop,nop,TS val 175881 ecr 175881], length 0
168 47 2013-10-24 15:41:11.640555 IP (tos 0x0, ttl 64, id 14458, offset 0, flags [DF], proto TCP (6), length 85)
169 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe49 (incorrect -> 0x4af3), seq 24:57, ack 37, win 94, options [nop,nop,TS val 176046 ecr 175881], length 33: OpenFlow
170 version 1.3, type EXPERIMENTER, length 33, xid 0x00000043
171 experimenter 0x00d0f0db (Ericsson), exp_type 0x00000065
172 data (17 octets)
173 0x0000: 0001 0203 0405 0607 0809 0a0b 0c0d 0e0f ................
174 0x0010: 10 .
175 48 2013-10-24 15:41:11.649632 IP (tos 0x0, ttl 64, id 51403, offset 0, flags [DF], proto TCP (6), length 97)
176 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe55 (incorrect -> 0x45af), seq 37:82, ack 57, win 86, options [nop,nop,TS val 176048 ecr 176046], length 45: OpenFlow
177 version 1.3, type ERROR, length 45, xid 0x00000043
178 type BAD_REQUEST, code BAD_LEN
179 data (33 octets)
180 0x0000: 0404 0021 0000 0043 00d0 f0db 0000 0065 ...!...C.......e
181 0x0010: 0001 0203 0405 0607 0809 0a0b 0c0d 0e0f ................
182 0x0020: 10 .
183 49 2013-10-24 15:41:11.649721 IP (tos 0x0, ttl 64, id 14459, offset 0, flags [DF], proto TCP (6), length 52)
184 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x88de), seq 57, ack 82, win 94, options [nop,nop,TS val 176048 ecr 176048], length 0
185 50 2013-10-24 15:47:18.960105 IP (tos 0x0, ttl 64, id 14608, offset 0, flags [DF], proto TCP (6), length 60)
186 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0xb4f6), seq 649:657, ack 698, win 94, options [nop,nop,TS val 267876 ecr 267134], length 8: OpenFlow
187 version 1.3, type FEATURES_REQUEST, length 8, xid 0x0000008e
188 51 2013-10-24 15:47:18.962238 IP (tos 0x0, ttl 64, id 51478, offset 0, flags [DF], proto TCP (6), length 84)
189 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xbbc3), seq 698:730, ack 657, win 86, options [nop,nop,TS val 267876 ecr 267876], length 32: OpenFlow
190 version 1.3, type FEATURES_REPLY, length 32, xid 0x0000008e
191 dpid 0x000026a2b46fd9ba, n_buffers 256, n_tables 64, auxiliary_id 0
192 capabilities 0x0000004f (FLOW_STATS, TABLE_STATS, PORT_STATS, GROUP_STATS, QUEUE_STATS)
193 52 2013-10-24 15:47:18.962333 IP (tos 0x0, ttl 64, id 14609, offset 0, flags [DF], proto TCP (6), length 52)
194 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0xb693), seq 657, ack 730, win 94, options [nop,nop,TS val 267876 ecr 267876], length 0
195 53 2013-10-24 16:32:34.623939 IP (tos 0x0, ttl 64, id 44797, offset 0, flags [DF], proto TCP (6), length 60)
196 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3d62), seq 2583631865:2583631873, ack 3924671623, win 94, options [nop,nop,TS val 946792 ecr 945543], length 8: OpenFlow
197 version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002e
198 54 2013-10-24 16:32:34.625658 IP (tos 0x0, ttl 64, id 3493, offset 0, flags [DF], proto TCP (6), length 60)
199 127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3880), seq 1:9, ack 8, win 86, options [nop,nop,TS val 946792 ecr 946792], length 8: OpenFlow
200 version 1.3, type ECHO_REPLY, length 8, xid 0x0000002e
201 55 2013-10-24 16:32:34.625750 IP (tos 0x0, ttl 64, id 44798, offset 0, flags [DF], proto TCP (6), length 52)
202 127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x3cb9), seq 8, ack 9, win 94, options [nop,nop,TS val 946792 ecr 946792], length 0
203 56 2013-10-24 16:32:34.844806 IP (tos 0x0, ttl 64, id 44799, offset 0, flags [DF], proto TCP (6), length 64)
204 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe34 (incorrect -> 0x3760), seq 8:20, ack 9, win 94, options [nop,nop,TS val 946847 ecr 946792], length 12: OpenFlow
205 version 1.3, type SET_CONFIG, length 12, xid 0x0000002f
206 flags FRAG_REASM, miss_send_len 200
207 57 2013-10-24 16:32:34.883698 IP (tos 0x0, ttl 64, id 3494, offset 0, flags [DF], proto TCP (6), length 52)
208 127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3c3d), seq 9, ack 20, win 86, options [nop,nop,TS val 946857 ecr 946847], length 0
209 58 2013-10-24 16:32:36.376083 IP (tos 0x0, ttl 64, id 44800, offset 0, flags [DF], proto TCP (6), length 60)
210 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3667), seq 20:28, ack 9, win 94, options [nop,nop,TS val 947230 ecr 946857], length 8: OpenFlow
211 version 1.3, type GET_CONFIG_REQUEST, length 8, xid 0x00000030
212 59 2013-10-24 16:32:36.376174 IP (tos 0x0, ttl 64, id 3495, offset 0, flags [DF], proto TCP (6), length 52)
213 127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3941), seq 9, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 0
214 60 2013-10-24 16:32:36.378403 IP (tos 0x0, ttl 64, id 3496, offset 0, flags [DF], proto TCP (6), length 64)
215 127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe34 (incorrect -> 0x3420), seq 9:21, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 12: OpenFlow
216 version 1.3, type GET_CONFIG_REPLY, length 12, xid 0x00000030
217 flags FRAG_DROP, miss_send_len 200
218 61 2013-10-24 16:32:36.378465 IP (tos 0x0, ttl 64, id 44801, offset 0, flags [DF], proto TCP (6), length 52)
219 127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x392d), seq 28, ack 21, win 94, options [nop,nop,TS val 947230 ecr 947230], length 0
220 62 2013-10-24 17:39:10.589931 IP (tos 0x0, ttl 64, id 28700, offset 0, flags [DF], proto TCP (6), length 60)
221 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe30 (incorrect -> 0x4e78), seq 359193673:359193681, ack 3843617605, win 111, options [nop,nop,TS val 1945783 ecr 1944534], length 8: OpenFlow
222 version 1.3, type ECHO_REQUEST, length 8, xid 0x000000a6
223 63 2013-10-24 17:39:10.592125 IP (tos 0x0, ttl 64, id 24186, offset 0, flags [DF], proto TCP (6), length 60)
224 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x49a6), seq 1:9, ack 8, win 86, options [nop,nop,TS val 1945784 ecr 1945783], length 8: OpenFlow
225 version 1.3, type ECHO_REPLY, length 8, xid 0x000000a6
226 64 2013-10-24 17:39:10.592223 IP (tos 0x0, ttl 64, id 28701, offset 0, flags [DF], proto TCP (6), length 52)
227 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4e45), seq 8, ack 9, win 111, options [nop,nop,TS val 1945784 ecr 1945784], length 0
228 65 2013-10-24 17:39:11.275605 IP (tos 0x0, ttl 64, id 28702, offset 0, flags [DF], proto TCP (6), length 152)
229 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xaa9b), seq 8:108, ack 9, win 111, options [nop,nop,TS val 1945955 ecr 1945784], length 100: OpenFlow
230 version 1.3, type PACKET_OUT, length 100, xid 0x000000a7
231 66 2013-10-24 17:39:11.278453 IP (tos 0x0, ttl 64, id 24187, offset 0, flags [DF], proto TCP (6), length 206)
232 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfec2 (incorrect -> 0xa12e), seq 9:163, ack 108, win 86, options [nop,nop,TS val 1945955 ecr 1945955], length 154: OpenFlow
233 version 1.3, type PACKET_IN, length 154, xid 0x00000000
234 67 2013-10-24 17:39:11.278747 IP (tos 0x0, ttl 64, id 28703, offset 0, flags [DF], proto TCP (6), length 52)
235 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4bec), seq 108, ack 163, win 115, options [nop,nop,TS val 1945956 ecr 1945955], length 0
236 68 2013-10-24 17:39:11.293620 IP (tos 0x0, ttl 64, id 28704, offset 0, flags [DF], proto TCP (6), length 152)
237 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xa8c9), seq 108:208, ack 163, win 115, options [nop,nop,TS val 1945959 ecr 1945955], length 100: OpenFlow
238 version 1.3, type PACKET_OUT, length 100, xid 0x000000a8
239 69 2013-10-24 17:39:11.296836 IP (tos 0x0, ttl 64, id 24188, offset 0, flags [DF], proto TCP (6), length 234)
240 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfede (incorrect -> 0x2262), seq 163:345, ack 208, win 86, options [nop,nop,TS val 1945960 ecr 1945959], length 182: OpenFlow
241 version 1.3, type PACKET_IN, length 182, xid 0x00000000
242 70 2013-10-24 17:39:11.334896 IP (tos 0x0, ttl 64, id 28705, offset 0, flags [DF], proto TCP (6), length 52)
243 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4abb), seq 208, ack 345, win 119, options [nop,nop,TS val 1945970 ecr 1945960], length 0
244 71 2013-10-25 10:22:45.030583 IP (tos 0x0, ttl 64, id 10058, offset 0, flags [DF], proto TCP (6), length 148)
245 127.0.0.1.6633 > 127.0.0.1.53146: Flags [P.], cksum 0xfe88 (incorrect -> 0xf671), seq 1089079797:1089079893, ack 1672614427, win 94, options [nop,nop,TS val 4009818 ecr 4009376], length 96: OpenFlow
246 version 1.3, type FLOW_MOD, length 96, xid 0x00000076
247 72 2013-10-25 10:22:45.067011 IP (tos 0x0, ttl 64, id 11330, offset 0, flags [DF], proto TCP (6), length 52)
248 127.0.0.1.53146 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x6e9c), seq 1, ack 96, win 86, options [nop,nop,TS val 4009828 ecr 4009818], length 0
249 73 2013-10-25 10:22:46.038093 IP (tos 0x0, ttl 64, id 11331, offset 0, flags [DF], proto TCP (6), length 116)
250 127.0.0.1.53146 > 127.0.0.1.6633: Flags [P.], cksum 0xfe68 (incorrect -> 0xdcd4), seq 1:65, ack 96, win 86, options [nop,nop,TS val 4010070 ecr 4009818], length 64: OpenFlow
251 version 1.3, type FLOW_REMOVED, length 64, xid 0x00000000
252 74 2013-10-25 10:22:46.038127 IP (tos 0x0, ttl 64, id 10059, offset 0, flags [DF], proto TCP (6), length 52)
253 127.0.0.1.6633 > 127.0.0.1.53146: Flags [.], cksum 0xfe28 (incorrect -> 0x6c66), seq 96, ack 65, win 94, options [nop,nop,TS val 4010070 ecr 4010070], length 0
254 75 2013-10-25 13:15:24.725748 IP (tos 0x0, ttl 64, id 51120, offset 0, flags [DF], proto TCP (6), length 132)
255 127.0.0.1.38906 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xadc3), seq 2781543975:2781544055, ack 1865664008, win 86, options [nop,nop,TS val 1794904 ecr 1794249], length 80: OpenFlow
256 version 1.3, type PORT_STATUS, length 80, xid 0x00000000
257 reason ADD
258 port_no 2, hw_addr ca:02:9f:af:e9:1c, name 'veth0'
259 config 0x00000000
260 state 0x00000004 (LIVE)
261 curr 0x00000840 (10GB_FD, COPPER)
262 advertised 0x00000000
263 supported 0x00000000
264 peer 0x00000000
265 curr_speed 10485760kbps
266 max_speed 0kbps
267 76 2013-10-25 13:15:24.725788 IP (tos 0x0, ttl 64, id 64306, offset 0, flags [DF], proto TCP (6), length 52)
268 127.0.0.1.6633 > 127.0.0.1.38906: Flags [.], cksum 0xfe28 (incorrect -> 0x2614), seq 1, ack 80, win 94, options [nop,nop,TS val 1794904 ecr 1794904], length 0
269 77 2013-10-31 16:37:49.792852 IP (tos 0x0, ttl 64, id 32480, offset 0, flags [DF], proto TCP (6), length 68)
270 127.0.0.1.6633 > 127.0.0.1.34845: Flags [P.], cksum 0xfe38 (incorrect -> 0x4ae9), seq 2833437351:2833437367, ack 1981193718, win 98, options [nop,nop,TS val 130273 ecr 129636], length 16: OpenFlow
271 version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000004f
272 78 2013-10-31 16:37:49.796567 IP (tos 0x0, ttl 64, id 16409, offset 0, flags [DF], proto TCP (6), length 1124)
273 127.0.0.1.34845 > 127.0.0.1.6633: Flags [P.], cksum 0x0259 (incorrect -> 0x9472), seq 1:1073, ack 16, win 86, options [nop,nop,TS val 130274 ecr 130273], length 1072: OpenFlow
274 version 1.3, type MULTIPART_REPLY, length 1072, xid 0x0000004f
275 79 2013-10-31 16:37:49.796657 IP (tos 0x0, ttl 64, id 32481, offset 0, flags [DF], proto TCP (6), length 52)
276 127.0.0.1.6633 > 127.0.0.1.34845: Flags [.], cksum 0xfe28 (incorrect -> 0x48ae), seq 16, ack 1073, win 103, options [nop,nop,TS val 130274 ecr 130274], length 0
277 80 2013-10-31 17:10:39.694164 IP (tos 0x0, ttl 64, id 18557, offset 0, flags [DF], proto TCP (6), length 116)
278 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc9ae), seq 1963343585:1963343649, ack 2145731315, win 105, options [nop,nop,TS val 622748 ecr 622308], length 64: OpenFlow
279 version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000076
280 81 2013-10-31 17:10:39.695936 IP (tos 0x0, ttl 64, id 19461, offset 0, flags [DF], proto TCP (6), length 236)
281 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfee0 (incorrect -> 0x89dd), seq 1:185, ack 64, win 86, options [nop,nop,TS val 622748 ecr 622748], length 184: OpenFlow
282 version 1.3, type MULTIPART_REPLY, length 184, xid 0x00000076
283 82 2013-10-31 17:10:39.696001 IP (tos 0x0, ttl 64, id 18558, offset 0, flags [DF], proto TCP (6), length 52)
284 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5d19), seq 64, ack 185, win 109, options [nop,nop,TS val 622749 ecr 622748], length 0
285 83 2013-10-31 17:10:39.706507 IP (tos 0x0, ttl 64, id 18559, offset 0, flags [DF], proto TCP (6), length 116)
286 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc6f5), seq 64:128, ack 185, win 109, options [nop,nop,TS val 622751 ecr 622748], length 64: OpenFlow
287 version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000077
288 84 2013-10-31 17:10:39.708491 IP (tos 0x0, ttl 64, id 19462, offset 0, flags [DF], proto TCP (6), length 92)
289 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe50 (incorrect -> 0x4e7c), seq 185:225, ack 128, win 86, options [nop,nop,TS val 622752 ecr 622751], length 40: OpenFlow
290 version 1.3, type MULTIPART_REPLY, length 40, xid 0x00000077
291 85 2013-10-31 17:10:39.747947 IP (tos 0x0, ttl 64, id 18560, offset 0, flags [DF], proto TCP (6), length 52)
292 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5ca0), seq 128, ack 225, win 109, options [nop,nop,TS val 622762 ecr 622752], length 0
293 86 2013-10-31 17:20:21.268792 IP (tos 0x0, ttl 64, id 18795, offset 0, flags [DF], proto TCP (6), length 68)
294 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe38 (incorrect -> 0xdced), seq 1072:1088, ack 2705, win 256, options [nop,nop,TS val 768142 ecr 767309], length 16: OpenFlow
295 version 1.3, type MULTIPART_REQUEST, length 16, xid 0x000000ed
296 87 2013-10-31 17:20:21.270799 IP (tos 0x0, ttl 64, id 19580, offset 0, flags [DF], proto TCP (6), length 1604)
297 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0439 (incorrect -> 0xedc3), seq 2705:4257, ack 1088, win 86, options [nop,nop,TS val 768142 ecr 768142], length 1552: OpenFlow
298 version 1.3, type MULTIPART_REPLY, length 1552, xid 0x000000ed
299 88 2013-10-31 17:20:21.270887 IP (tos 0x0, ttl 64, id 18796, offset 0, flags [DF], proto TCP (6), length 52)
300 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xd8b8), seq 1088, ack 4257, win 254, options [nop,nop,TS val 768142 ecr 768142], length 0
301 89 2013-10-31 17:21:32.610984 IP (tos 0x0, ttl 64, id 18829, offset 0, flags [DF], proto TCP (6), length 76)
302 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0x48f2), seq 1248:1272, ack 4981, win 256, options [nop,nop,TS val 785977 ecr 784870], length 24: OpenFlow
303 version 1.3, type MULTIPART_REQUEST, length 24, xid 0x000000ff
304 90 2013-10-31 17:21:32.614400 IP (tos 0x0, ttl 64, id 19597, offset 0, flags [DF], proto TCP (6), length 628)
305 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0069 (incorrect -> 0x23f8), seq 4981:5557, ack 1272, win 86, options [nop,nop,TS val 785978 ecr 785977], length 576: OpenFlow
306 version 1.3, type MULTIPART_REPLY, length 576, xid 0x000000ff
307 91 2013-10-31 17:21:32.614511 IP (tos 0x0, ttl 64, id 18830, offset 0, flags [DF], proto TCP (6), length 52)
308 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x4793), seq 1272, ack 5557, win 255, options [nop,nop,TS val 785978 ecr 785978], length 0
309 92 2013-10-31 17:21:32.932077 IP (tos 0x0, ttl 64, id 18831, offset 0, flags [DF], proto TCP (6), length 60)
310 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0x4228), seq 1272:1280, ack 5557, win 256, options [nop,nop,TS val 786058 ecr 785978], length 8: OpenFlow
311 version 1.3, type ECHO_REQUEST, length 8, xid 0x00000100
312 93 2013-10-31 17:21:32.939513 IP (tos 0x0, ttl 64, id 19598, offset 0, flags [DF], proto TCP (6), length 60)
313 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4278), seq 5557:5565, ack 1280, win 86, options [nop,nop,TS val 786059 ecr 786058], length 8: OpenFlow
314 version 1.3, type ECHO_REPLY, length 8, xid 0x00000100
315 94 2013-10-31 17:21:32.939617 IP (tos 0x0, ttl 64, id 18832, offset 0, flags [DF], proto TCP (6), length 52)
316 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x46e0), seq 1280, ack 5565, win 256, options [nop,nop,TS val 786059 ecr 786059], length 0
317 95 2013-10-31 17:27:12.201785 IP (tos 0x0, ttl 64, id 18969, offset 0, flags [DF], proto TCP (6), length 76)
318 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0xa9d9), seq 1840:1864, ack 6277, win 256, options [nop,nop,TS val 870875 ecr 869809], length 24: OpenFlow
319 version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000147
320 96 2013-10-31 17:27:12.204185 IP (tos 0x0, ttl 64, id 19667, offset 0, flags [DF], proto TCP (6), length 228)
321 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfed8 (incorrect -> 0xa1c3), seq 6277:6453, ack 1864, win 86, options [nop,nop,TS val 870876 ecr 870875], length 176: OpenFlow
322 version 1.3, type MULTIPART_REPLY, length 176, xid 0x00000147
323 97 2013-10-31 17:27:12.204269 IP (tos 0x0, ttl 64, id 18970, offset 0, flags [DF], proto TCP (6), length 52)
324 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xaa7b), seq 1864, ack 6453, win 256, options [nop,nop,TS val 870876 ecr 870876], length 0
325 98 2013-10-31 17:27:12.931668 IP (tos 0x0, ttl 64, id 18971, offset 0, flags [DF], proto TCP (6), length 60)
326 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0xa464), seq 1864:1872, ack 6453, win 256, options [nop,nop,TS val 871057 ecr 870876], length 8: OpenFlow
327 version 1.3, type ECHO_REQUEST, length 8, xid 0x00000148
328 99 2013-10-31 17:27:12.938585 IP (tos 0x0, ttl 64, id 19668, offset 0, flags [DF], proto TCP (6), length 60)
329 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xa44e), seq 6453:6461, ack 1872, win 86, options [nop,nop,TS val 871059 ecr 871057], length 8: OpenFlow
330 version 1.3, type ECHO_REPLY, length 8, xid 0x00000148
331 100 2013-10-31 17:27:12.938697 IP (tos 0x0, ttl 64, id 18972, offset 0, flags [DF], proto TCP (6), length 52)
332 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xa8fd), seq 1872, ack 6461, win 256, options [nop,nop,TS val 871059 ecr 871059], length 0
333 101 2013-10-31 17:57:16.110186 IP (tos 0x0, ttl 64, id 16966, offset 0, flags [DF], proto TCP (6), length 76)
334 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe40 (incorrect -> 0xcf7c), seq 555521909:555521933, ack 1543280532, win 105, options [nop,nop,TS val 1321852 ecr 1321585], length 24: OpenFlow
335 version 1.3, type MULTIPART_REQUEST, length 24, xid 0x0000001f
336 102 2013-10-31 17:57:16.113738 IP (tos 0x0, ttl 64, id 22868, offset 0, flags [DF], proto TCP (6), length 252)
337 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfef0 (incorrect -> 0x3421), seq 1:201, ack 24, win 86, options [nop,nop,TS val 1321853 ecr 1321852], length 200: OpenFlow
338 version 1.3, type MULTIPART_REPLY, length 200, xid 0x0000001f
339 103 2013-10-31 17:57:16.113974 IP (tos 0x0, ttl 64, id 16967, offset 0, flags [DF], proto TCP (6), length 52)
340 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xd1f7), seq 24, ack 201, win 109, options [nop,nop,TS val 1321853 ecr 1321853], length 0
341 104 2013-10-31 17:57:17.127188 IP (tos 0x0, ttl 64, id 16968, offset 0, flags [DF], proto TCP (6), length 68)
342 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xcc99), seq 24:40, ack 201, win 109, options [nop,nop,TS val 1322106 ecr 1321853], length 16: OpenFlow
343 version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000020
344 105 2013-10-31 17:57:17.129487 IP (tos 0x0, ttl 64, id 22869, offset 0, flags [DF], proto TCP (6), length 204)
345 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfec0 (incorrect -> 0xad66), seq 201:353, ack 40, win 86, options [nop,nop,TS val 1322107 ecr 1322106], length 152: OpenFlow
346 version 1.3, type MULTIPART_REPLY, length 152, xid 0x00000020
347 106 2013-10-31 17:57:17.130202 IP (tos 0x0, ttl 64, id 16969, offset 0, flags [DF], proto TCP (6), length 52)
348 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcf4f), seq 40, ack 353, win 113, options [nop,nop,TS val 1322107 ecr 1322107], length 0
349 107 2013-10-31 17:57:17.869382 IP (tos 0x0, ttl 64, id 16970, offset 0, flags [DF], proto TCP (6), length 68)
350 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xca33), seq 40:56, ack 353, win 113, options [nop,nop,TS val 1322292 ecr 1322107], length 16: OpenFlow
351 version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000021
352 108 2013-10-31 17:57:17.871408 IP (tos 0x0, ttl 64, id 22870, offset 0, flags [DF], proto TCP (6), length 108)
353 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfe60 (incorrect -> 0xc5b3), seq 353:409, ack 56, win 86, options [nop,nop,TS val 1322292 ecr 1322292], length 56: OpenFlow
354 version 1.3, type MULTIPART_REPLY, length 56, xid 0x00000021
355 109 2013-10-31 17:57:17.871493 IP (tos 0x0, ttl 64, id 16971, offset 0, flags [DF], proto TCP (6), length 52)
356 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcd95), seq 56, ack 409, win 113, options [nop,nop,TS val 1322292 ecr 1322292], length 0
357 110 2013-11-01 10:02:19.814878 IP (tos 0x0, ttl 64, id 47069, offset 0, flags [DF], proto TCP (6), length 76)
358 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x07aa), seq 260443467:260443491, ack 382342041, win 100, options [nop,nop,TS val 344035 ecr 343141], length 24: OpenFlow
359 version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000028
360 111 2013-11-01 10:02:19.815701 IP (tos 0x0, ttl 64, id 47114, offset 0, flags [DF], proto TCP (6), length 196)
361 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfeb8 (incorrect -> 0x3ff1), seq 1:145, ack 24, win 88, options [nop,nop,TS val 344035 ecr 344035], length 144: OpenFlow
362 version 1.3, type MULTIPART_REPLY, length 144, xid 0x00000028
363 112 2013-11-01 10:02:19.815724 IP (tos 0x0, ttl 64, id 47070, offset 0, flags [DF], proto TCP (6), length 52)
364 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x07fa), seq 24, ack 145, win 105, options [nop,nop,TS val 344035 ecr 344035], length 0
365 113 2013-11-01 10:02:20.713618 IP (tos 0x0, ttl 64, id 47071, offset 0, flags [DF], proto TCP (6), length 76)
366 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x029c), seq 24:48, ack 145, win 105, options [nop,nop,TS val 344260 ecr 344035], length 24: OpenFlow
367 version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000029
368 114 2013-11-01 10:02:20.714133 IP (tos 0x0, ttl 64, id 47115, offset 0, flags [DF], proto TCP (6), length 132)
369 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xfe54), seq 145:225, ack 48, win 88, options [nop,nop,TS val 344260 ecr 344260], length 80: OpenFlow
370 version 1.3, type MULTIPART_REPLY, length 80, xid 0x00000029
371 115 2013-11-01 10:02:20.714160 IP (tos 0x0, ttl 64, id 47072, offset 0, flags [DF], proto TCP (6), length 52)
372 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x05d0), seq 48, ack 225, win 105, options [nop,nop,TS val 344260 ecr 344260], length 0
373 116 2013-11-01 10:02:21.229978 IP (tos 0x0, ttl 64, id 47073, offset 0, flags [DF], proto TCP (6), length 60)
374 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe30 (incorrect -> 0x010b), seq 48:56, ack 225, win 105, options [nop,nop,TS val 344389 ecr 344260], length 8: OpenFlow
375 version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002a
376 117 2013-11-01 10:02:21.231013 IP (tos 0x0, ttl 64, id 47116, offset 0, flags [DF], proto TCP (6), length 60)
377 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x0092), seq 225:233, ack 56, win 88, options [nop,nop,TS val 344389 ecr 344389], length 8: OpenFlow
378 version 1.3, type ECHO_REPLY, length 8, xid 0x0000002a
379 118 2013-11-01 10:02:21.231044 IP (tos 0x0, ttl 64, id 47074, offset 0, flags [DF], proto TCP (6), length 52)
380 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x04be), seq 56, ack 233, win 105, options [nop,nop,TS val 344389 ecr 344389], length 0
381 119 2013-11-01 10:02:21.852874 IP (tos 0x0, ttl 64, id 47075, offset 0, flags [DF], proto TCP (6), length 68)
382 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe38 (incorrect -> 0xffb1), seq 56:72, ack 233, win 105, options [nop,nop,TS val 344545 ecr 344389], length 16: OpenFlow
383 version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000002b
384 120 2013-11-01 10:02:21.853489 IP (tos 0x0, ttl 64, id 47117, offset 0, flags [DF], proto TCP (6), length 84)
385 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xeddf), seq 233:265, ack 72, win 88, options [nop,nop,TS val 344545 ecr 344545], length 32: OpenFlow
386 version 1.3, type MULTIPART_REPLY, length 32, xid 0x0000002b
387 121 2013-11-01 10:02:21.853515 IP (tos 0x0, ttl 64, id 47076, offset 0, flags [DF], proto TCP (6), length 52)
388 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x0356), seq 72, ack 265, win 105, options [nop,nop,TS val 344545 ecr 344545], length 0
389 122 2013-11-01 10:30:09.945368 IP (tos 0x0, ttl 64, id 54874, offset 0, flags [DF], proto TCP (6), length 60)
390 127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe30 (incorrect -> 0x68f4), seq 3359330522:3359330530, ack 3471458557, win 256, options [nop,nop,TS val 761568 ecr 760318], length 8: OpenFlow
391 version 1.3, type ECHO_REQUEST, length 8, xid 0x0000000d
392 123 2013-11-01 10:30:09.946140 IP (tos 0x0, ttl 64, id 56416, offset 0, flags [DF], proto TCP (6), length 60)
393 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x64b3), seq 1:9, ack 8, win 86, options [nop,nop,TS val 761568 ecr 761568], length 8: OpenFlow
394 version 1.3, type ECHO_REPLY, length 8, xid 0x0000000d
395 124 2013-11-01 10:30:09.946173 IP (tos 0x0, ttl 64, id 54875, offset 0, flags [DF], proto TCP (6), length 52)
396 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x6829), seq 8, ack 9, win 256, options [nop,nop,TS val 761568 ecr 761568], length 0
397 125 2013-11-01 10:30:10.672306 IP (tos 0x0, ttl 64, id 54876, offset 0, flags [DF], proto TCP (6), length 68)
398 127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe38 (incorrect -> 0x6320), seq 8:24, ack 9, win 256, options [nop,nop,TS val 761749 ecr 761568], length 16: OpenFlow
399 version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000e
400 126 2013-11-01 10:30:10.673261 IP (tos 0x0, ttl 64, id 56417, offset 0, flags [DF], proto TCP (6), length 11844)
401 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x30af), seq 9:11801, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761749], length 11792: OpenFlow
402 version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
403 127 2013-11-01 10:30:10.673292 IP (tos 0x0, ttl 64, id 54877, offset 0, flags [DF], proto TCP (6), length 52)
404 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x38a9), seq 24, ack 11801, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
405 128 2013-11-01 10:30:10.675065 IP (tos 0x0, ttl 64, id 56418, offset 0, flags [DF], proto TCP (6), length 11844)
406 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xc66e), seq 11801:23593, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
407 version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
408 129 2013-11-01 10:30:10.675124 IP (tos 0x0, ttl 64, id 54878, offset 0, flags [DF], proto TCP (6), length 52)
409 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x0a99), seq 24, ack 23593, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0
410 130 2013-11-01 10:30:10.675159 IP (tos 0x0, ttl 64, id 56419, offset 0, flags [DF], proto TCP (6), length 11844)
411 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x62e9), seq 23593:35385, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
412 version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
413 131 2013-11-01 10:30:10.675174 IP (tos 0x0, ttl 64, id 54879, offset 0, flags [DF], proto TCP (6), length 52)
414 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xdc94), seq 24, ack 35385, win 232, options [nop,nop,TS val 761750 ecr 761750], length 0
415 132 2013-11-01 10:30:10.675194 IP (tos 0x0, ttl 64, id 56420, offset 0, flags [DF], proto TCP (6), length 11844)
416 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xeed4), seq 35385:47177, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
417 version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
418 133 2013-11-01 10:30:10.675206 IP (tos 0x0, ttl 64, id 54880, offset 0, flags [DF], proto TCP (6), length 52)
419 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xae91), seq 24, ack 47177, win 219, options [nop,nop,TS val 761750 ecr 761750], length 0
420 134 2013-11-01 10:30:10.675226 IP (tos 0x0, ttl 64, id 56421, offset 0, flags [DF], proto TCP (6), length 11844)
421 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x7ac0), seq 47177:58969, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
422 version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
423 135 2013-11-01 10:30:10.675238 IP (tos 0x0, ttl 64, id 54881, offset 0, flags [DF], proto TCP (6), length 52)
424 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x808d), seq 24, ack 58969, win 207, options [nop,nop,TS val 761750 ecr 761750], length 0
425 136 2013-11-01 10:30:10.675257 IP (tos 0x0, ttl 64, id 56422, offset 0, flags [DF], proto TCP (6), length 11844)
426 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x04c0), seq 58969:70761, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
427 version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
428 137 2013-11-01 10:30:10.675294 IP (tos 0x0, ttl 64, id 56423, offset 0, flags [DF], proto TCP (6), length 11844)
429 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x90ab), seq 70761:82553, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
430 version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
431 138 2013-11-01 10:30:10.675314 IP (tos 0x0, ttl 64, id 56424, offset 0, flags [DF], proto TCP (6), length 11844)
432 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x1c98), seq 82553:94345, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow
433 version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e
434 139 2013-11-01 10:30:10.675325 IP (tos 0x0, ttl 64, id 54882, offset 0, flags [DF], proto TCP (6), length 52)
435 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x2486), seq 24, ack 82553, win 182, options [nop,nop,TS val 761750 ecr 761750], length 0
436 140 2013-11-01 10:30:10.712539 IP (tos 0x0, ttl 64, id 54883, offset 0, flags [DF], proto TCP (6), length 52)
437 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xf621), seq 24, ack 94345, win 256, options [nop,nop,TS val 761760 ecr 761750], length 0
438 141 2013-11-01 10:46:50.838754 IP (tos 0x0, ttl 64, id 46973, offset 0, flags [DF], proto TCP (6), length 68)
439 127.0.0.1.6633 > 127.0.0.1.36548: Flags [P.], cksum 0xfe38 (incorrect -> 0x2338), seq 75556183:75556199, ack 3751019041, win 98, options [nop,nop,TS val 1011791 ecr 1010724], length 16: OpenFlow
440 version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000d
441 142 2013-11-01 10:46:50.839431 IP (tos 0x0, ttl 64, id 43209, offset 0, flags [DF], proto TCP (6), length 388)
442 127.0.0.1.36548 > 127.0.0.1.6633: Flags [P.], cksum 0xff78 (incorrect -> 0x0f3d), seq 1:337, ack 16, win 86, options [nop,nop,TS val 1011791 ecr 1011791], length 336: OpenFlow
443 version 1.3, type MULTIPART_REPLY, length 336, xid 0x0000000d
444 143 2013-11-01 10:46:50.839471 IP (tos 0x0, ttl 64, id 46974, offset 0, flags [DF], proto TCP (6), length 52)
445 127.0.0.1.6633 > 127.0.0.1.36548: Flags [.], cksum 0xfe28 (incorrect -> 0x21fc), seq 16, ack 337, win 103, options [nop,nop,TS val 1011791 ecr 1011791], length 0
446 144 2013-11-02 19:45:16.495434 IP (tos 0x0, ttl 64, id 17712, offset 0, flags [DF], proto TCP (6), length 60)
447 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0xe6e3), seq 1323837391:1323837399, ack 1278624979, win 94, options [nop,nop,TS val 6181422 ecr 6180173], length 8: OpenFlow
448 version 1.3, type ECHO_REQUEST, length 8, xid 0x0000006d
449 145 2013-11-02 19:45:16.496030 IP (tos 0x0, ttl 64, id 23686, offset 0, flags [DF], proto TCP (6), length 60)
450 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xe200), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6181423 ecr 6181422], length 8: OpenFlow
451 version 1.3, type ECHO_REPLY, length 8, xid 0x0000006d
452 146 2013-11-02 19:45:16.496057 IP (tos 0x0, ttl 64, id 17713, offset 0, flags [DF], proto TCP (6), length 52)
453 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0xe677), seq 8, ack 9, win 94, options [nop,nop,TS val 6181423 ecr 6181423], length 0
454 147 2013-11-02 19:45:17.176752 IP (tos 0x0, ttl 64, id 17714, offset 0, flags [DF], proto TCP (6), length 68)
455 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe38 (incorrect -> 0xe026), seq 8:24, ack 9, win 94, options [nop,nop,TS val 6181593 ecr 6181423], length 16: OpenFlow
456 version 1.3, type TABLE_MOD, length 16, xid 0x0000006e
457 table_id 1, config 0x00000000
458 148 2013-11-02 19:45:17.215970 IP (tos 0x0, ttl 64, id 23687, offset 0, flags [DF], proto TCP (6), length 52)
459 127.0.0.1.51984 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xe511), seq 9, ack 24, win 86, options [nop,nop,TS val 6181603 ecr 6181593], length 0
460 149 2013-11-02 19:53:23.472776 IP (tos 0x0, ttl 64, id 17917, offset 0, flags [DF], proto TCP (6), length 92)
461 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe50 (incorrect -> 0xb18a), seq 936:976, ack 1361, win 98, options [nop,nop,TS val 6303167 ecr 6302673], length 40: OpenFlow
462 version 1.3, type PORT_MOD, length 40, xid 0x000000d4
463 port_no 1, hw_addr 0a:ea:83:10:db:09
464 config 0x00000040 (NO_PACKET_IN)
465 mask 0x00000040 (NO_PACKET_IN)
466 advertise 0x0000080a (10MB_FD, 100MB_FD, COPPER)
467 150 2013-11-02 19:53:23.473744 IP (tos 0x0, ttl 64, id 23790, offset 0, flags [DF], proto TCP (6), length 132)
468 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x92a0), seq 1361:1441, ack 976, win 86, options [nop,nop,TS val 6303167 ecr 6303167], length 80: OpenFlow
469 version 1.3, type PORT_STATUS, length 80, xid 0x00000000
470 reason MODIFY
471 port_no 1, hw_addr 0a:ea:83:10:db:09, name 'veth0'
472 config 0x00000040 (NO_PACKET_IN)
473 state 0x00000004 (LIVE)
474 curr 0x00000840 (10GB_FD, COPPER)
475 advertised 0x00000000
476 supported 0x00000000
477 peer 0x00000000
478 curr_speed 10485760kbps
479 max_speed 0kbps
480 151 2013-11-02 19:53:23.473777 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [DF], proto TCP (6), length 52)
481 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x25f0), seq 976, ack 1441, win 98, options [nop,nop,TS val 6303167 ecr 6303167], length 0
482 152 2013-11-02 19:55:19.511983 IP (tos 0x0, ttl 64, id 17967, offset 0, flags [DF], proto TCP (6), length 60)
483 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0x3fa5), seq 1168:1176, ack 1633, win 98, options [nop,nop,TS val 6332177 ecr 6331422], length 8: OpenFlow
484 version 1.3, type BARRIER_REQUEST, length 8, xid 0x000000ed
485 153 2013-11-02 19:55:19.513048 IP (tos 0x0, ttl 64, id 23815, offset 0, flags [DF], proto TCP (6), length 60)
486 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3cb5), seq 1633:1641, ack 1176, win 86, options [nop,nop,TS val 6332177 ecr 6332177], length 8: OpenFlow
487 version 1.3, type BARRIER_REPLY, length 8, xid 0x000000ed
488 154 2013-11-02 19:55:19.513081 IP (tos 0x0, ttl 64, id 17968, offset 0, flags [DF], proto TCP (6), length 52)
489 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x41bb), seq 1176, ack 1641, win 98, options [nop,nop,TS val 6332177 ecr 6332177], length 0
490 155 2013-11-02 20:10:12.609713 IP (tos 0x0, ttl 64, id 45627, offset 0, flags [DF], proto TCP (6), length 60)
491 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0x8da8), seq 2129684753:2129684761, ack 2572383599, win 96, options [nop,nop,TS val 6555451 ecr 6554199], length 8: OpenFlow
492 version 1.3, type ECHO_REQUEST, length 8, xid 0x0000007d
493 156 2013-11-02 20:10:12.610357 IP (tos 0x0, ttl 64, id 49206, offset 0, flags [DF], proto TCP (6), length 60)
494 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x88c5), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6555451 ecr 6555451], length 8: OpenFlow
495 version 1.3, type ECHO_REPLY, length 8, xid 0x0000007d
496 157 2013-11-02 20:10:12.610382 IP (tos 0x0, ttl 64, id 45628, offset 0, flags [DF], proto TCP (6), length 52)
497 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8d4b), seq 8, ack 9, win 96, options [nop,nop,TS val 6555451 ecr 6555451], length 0
498 158 2013-11-02 20:10:13.364783 IP (tos 0x0, ttl 64, id 45629, offset 0, flags [DF], proto TCP (6), length 68)
499 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe38 (incorrect -> 0x87d1), seq 8:24, ack 9, win 96, options [nop,nop,TS val 6555640 ecr 6555451], length 16: OpenFlow
500 version 1.3, type QUEUE_GET_CONFIG_REQUEST, length 16, xid 0x0000007e
501 port 1
502 159 2013-11-02 20:10:13.366754 IP (tos 0x0, ttl 64, id 49207, offset 0, flags [DF], proto TCP (6), length 132)
503 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x80dc), seq 9:89, ack 24, win 86, options [nop,nop,TS val 6555640 ecr 6555640], length 80: OpenFlow
504 version 1.3, type QUEUE_GET_CONFIG_REPLY, length 80, xid 0x0000007e
505 160 2013-11-02 20:10:13.366788 IP (tos 0x0, ttl 64, id 45630, offset 0, flags [DF], proto TCP (6), length 52)
506 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8b71), seq 24, ack 89, win 96, options [nop,nop,TS val 6555640 ecr 6555640], length 0
507 161 2013-11-02 20:24:40.574081 IP (tos 0x0, ttl 64, id 45979, offset 0, flags [DF], proto TCP (6), length 76)
508 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe40 (incorrect -> 0xba52), seq 1432:1456, ack 1497, win 96, options [nop,nop,TS val 6772442 ecr 6771701], length 24: OpenFlow
509 version 1.3, type ROLE_REQUEST, length 24, xid 0x0000012f
510 role MASTER, generation_id 0x00000000012e248a
511 162 2013-11-02 20:24:40.574726 IP (tos 0x0, ttl 64, id 49382, offset 0, flags [DF], proto TCP (6), length 76)
512 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe40 (incorrect -> 0xb75e), seq 1497:1521, ack 1456, win 86, options [nop,nop,TS val 6772442 ecr 6772442], length 24: OpenFlow
513 version 1.3, type ROLE_REPLY, length 24, xid 0x0000012f
514 role MASTER, generation_id 0x00000000012e248a
515 163 2013-11-02 20:24:40.574748 IP (tos 0x0, ttl 64, id 45980, offset 0, flags [DF], proto TCP (6), length 52)
516 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xe276), seq 1456, ack 1521, win 96, options [nop,nop,TS val 6772442 ecr 6772442], length 0
517 164 2013-11-02 20:28:52.608224 IP (tos 0x0, ttl 64, id 46086, offset 0, flags [DF], proto TCP (6), length 60)
518 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xf205), seq 1904:1912, ack 1985, win 96, options [nop,nop,TS val 6835451 ecr 6834201], length 8: OpenFlow
519 version 1.3, type ECHO_REQUEST, length 8, xid 0x00000165
520 165 2013-11-02 20:28:52.609219 IP (tos 0x0, ttl 64, id 49437, offset 0, flags [DF], proto TCP (6), length 60)
521 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xed24), seq 1985:1993, ack 1912, win 86, options [nop,nop,TS val 6835451 ecr 6835451], length 8: OpenFlow
522 version 1.3, type ECHO_REPLY, length 8, xid 0x00000165
523 166 2013-11-02 20:28:52.609246 IP (tos 0x0, ttl 64, id 46087, offset 0, flags [DF], proto TCP (6), length 52)
524 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xf292), seq 1912, ack 1993, win 96, options [nop,nop,TS val 6835451 ecr 6835451], length 0
525 167 2013-11-02 20:28:54.103683 IP (tos 0x0, ttl 64, id 46088, offset 0, flags [DF], proto TCP (6), length 84)
526 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe48 (incorrect -> 0xeb3a), seq 1912:1944, ack 1993, win 96, options [nop,nop,TS val 6835824 ecr 6835451], length 32: OpenFlow
527 version 1.3, type SET_ASYNC, length 32, xid 0x00000166
528 packet_in_mask[EM] 0x00000003 (NO_MATCH, ACTION)
529 packet_in_mask[S] 0x00000002 (ACTION)
530 port_status_mask[EM] 0x00000007 (ADD, DELETE, MODIFY)
531 port_status_mask[S] 0x00000002 (DELETE)
532 flow_removed_mask[EM] 0x00000007 (ADD, DELETE, MODIFY)
533 flow_removed_mask[S] 0x00000004 (MODIFY)
534 168 2013-11-02 20:28:54.140673 IP (tos 0x0, ttl 64, id 49438, offset 0, flags [DF], proto TCP (6), length 52)
535 127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xef88), seq 1993, ack 1944, win 86, options [nop,nop,TS val 6835834 ecr 6835824], length 0
536 169 2013-11-02 20:28:56.308694 IP (tos 0x0, ttl 64, id 46089, offset 0, flags [DF], proto TCP (6), length 60)
537 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xe7bd), seq 1944:1952, ack 1993, win 96, options [nop,nop,TS val 6836376 ecr 6835834], length 8: OpenFlow
538 version 1.3, type GET_ASYNC_REQUEST, length 8, xid 0x00000167
539 170 2013-11-02 20:28:56.308754 IP (tos 0x0, ttl 64, id 49439, offset 0, flags [DF], proto TCP (6), length 52)
540 127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xeb3a), seq 1993, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 0
541 171 2013-11-02 20:28:56.309209 IP (tos 0x0, ttl 64, id 49440, offset 0, flags [DF], proto TCP (6), length 84)
542 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xe557), seq 1993:2025, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 32: OpenFlow
543 version 1.3, type GET_ASYNC_REPLY, length 32, xid 0x00000167
544 packet_in_mask[EM] 0x00000003 (NO_MATCH, ACTION)
545 packet_in_mask[S] 0x00000002 (ACTION)
546 port_status_mask[EM] 0x00000007 (ADD, DELETE, MODIFY)
547 port_status_mask[S] 0x00000002 (DELETE)
548 flow_removed_mask[EM] 0x00000007 (ADD, DELETE, MODIFY)
549 flow_removed_mask[S] 0x00000004 (MODIFY)
550 172 2013-11-02 20:28:56.309230 IP (tos 0x0, ttl 64, id 46090, offset 0, flags [DF], proto TCP (6), length 52)
551 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xeb10), seq 1952, ack 2025, win 96, options [nop,nop,TS val 6836376 ecr 6836376], length 0
552 173 2013-11-02 20:37:22.358712 IP (tos 0x0, ttl 64, id 18246, offset 0, flags [DF], proto TCP (6), length 100)
553 127.0.0.1.6633 > 127.0.0.1.51989: Flags [P.], cksum 0xfe58 (incorrect -> 0x9b52), seq 1436436734:1436436782, ack 2087738396, win 96, options [nop,nop,TS val 6962888 ecr 6961981], length 48: OpenFlow
554 version 1.3, type METER_MOD, length 48, xid 0x00000010
555 174 2013-11-02 20:37:22.396699 IP (tos 0x0, ttl 64, id 23571, offset 0, flags [DF], proto TCP (6), length 52)
556 127.0.0.1.51989 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x9d9e), seq 1, ack 48, win 86, options [nop,nop,TS val 6962898 ecr 6962888], length 0