Final Project: Implementing a Simple Router Solution

$30.00 $24.90

You'll get a: . zip file solution, download link after Payment


In the previous lab you implemented a simple firewall that allowed ICMP and ARP packets, but blocked all other packets. For your final project, you will be expanding on this to implement routing between subnets, and implementing firewalls for certain subnets. The idea is to simulate an actual production network.


For this lab, we will be constructing a network for a small company. The company has a 3 floor building, with each floor having its own switch and subnet. Additionally, we have a switch and subnet for all the servers in the data center, and a core switch connecting everything together.

The topology will look as follows:

lu3882ujy27u tmp 16009101da5ee454

Your goal will be to allow traffic to be transmitted between all the hosts. In this assignment, you will be allowed

to flood all non-IP traffic in the same method that you did in Lab 3 (using a destination port of

of.OFPP_FLOOD). However, you will need to specify specific ports for all IP traffic. You may do this however

you choose– however, you may find it easiest to determine the correct destination port by using the destination

IP address and source IP address, as well as the source port on the switch that the packet originated from.

Additionally, to protect our servers from the untrusted Internet, we will be blocking all IP traffic from the Untrusted Host to Server 1. To block the Internet from discovering our internal IP addresses, we will also block all ICMP traffic from the Untrusted Host. However, the trusted host must be able to communicate with all the internal hosts and server. We will allow all traffic between the trusted host any other host/server. You will need to explain how you implemented the various requirements and show that they work properly.




Hosts 10/20/30

Allowed to communicate with any host, except ICMP

queries from untrusted host. ICMP from untrusted host

must be blocked.

Trusted Host

Allowed to communicate with any host/server.

Untrusted Host

Should not be allowed to send ICMP traffic to Hosts

10/20/30, as well as IP traffic to server.


Should not accept IP traffic from untrusted host. Must

accept all other traffic from other hosts.

Provided Code:

Available in a ZIP file here.

We have provided you with starter code (skeleton files) to get you started on this assignment. The controller file ( needs to be placed in ~/pox/pox/misc, and the mininet file ( should be placed in your home directory (~). This time, you will need to modify both files to meet the lab requirements.

You will be using slightly different commands to create the Hosts and Links in the Mininet file to give you more information to make decisions within the Controller file. Additionally, you will notice that you have additional information provided in the do_final function. This is documented in the comments within the files.

Summary of Goals:

  • Create a Mininet Topology (See Lab 1 for help) to represent the above topology.

  • Create a Pox controller (See Lab 3 for help) with the following features:

    • All hosts able to communicate, EXCEPT:

      • Untrusted Host cannot send ICMP traffic to Host 10, Host 20, Host 30, or Server 1.

      • Untrusted Host cannot send any IP traffic to Server 1.

Project Report:

You will have to write a report of the work done in this project. It should have two main sections, in the first one you will present the logic of your controller in plain English; in the second part you will present test evidence to show that your code works, or explain any problems that might have happened.

You may test with any mininet commands such as ping and iperf or observing packets with Wireshark inside your VM. Please include screenshots of the executed tests.


You will be required to demonstrate your project to the TAs. Note that demos are mandatory. You will need to explain how you implemented the various requirements and show that they work properly. If you need help figuring out how to do this, look back to previous assignments and see how you tested them.

Please have a plan in place to show you have implemented all the requirements during your demonstration to the TAs.

Grading Rubric:

Total: 100 points

20 points: Mininet Topology

  1. Devices successfully created.

  1. Links successfully created.

  1. IP addresses correct.

40 points: Pox Controller

  1. All hosts except untrusted host can communicate. -10 if rules not installed in flow table.

-20 if IP traffic is implemented using OFPP_FLOOD.

10: Untrusted Host cannot send ICMP traffic to Host 10, Host 20, Host 30

-5 if Untrusted Host cannot send ANY traffic to these hosts 10: Untrusted Host cannot send any traffic to Server 1

20 points: Project Report

5: Screenshot showing the result of running pingall

  1. Screenshots showing the result of running iperf between two company hosts, between one company host and untrusted host, between company host and trusted host, and between untrusted host and server

  1. Screenshot of running dpctl dump-flowsafter running the above commands

  1. High-level explanation of the logic of the controller

20 points: Demo


  1. final.pdf: Project report, as described above.

  1. topology file that you created from the skeleton.

  1. controller file that you created from the skeleton.

Submission and Due Date:

  • The project can be demo’ed during the last week of class (week of 03/11) during a lab session.

  • Everything must be submitted to canvas by Wednesday 03/13 by 11:59PM.

  • Must sign up for checkoff by Wednesday 03/13. Further instructions will be given later.