2 This file is part of GNUnet.
3 (C) 2014 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @file dht/gnunet_dht_profiler.c
23 * @brief Profiler for GNUnet DHT
24 * @author Sree Harsha Totakura <sreeharsha@totakura.in>
28 #include "gnunet_util_lib.h"
29 #include "gnunet_testbed_service.h"
30 #include "gnunet_dht_service.h"
33 GNUNET_log (GNUNET_ERROR_TYPE_INFO, __VA_ARGS__)
36 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, __VA_ARGS__)
39 * Number of peers which should perform a PUT out of 100 peers
41 #define PUT_PROBABILITY 50
45 * Number of peers which should act as malicious peers
47 #define MALICIOUS_PROBABILITY 20
50 * Context for a peer which should act maliciously.
52 struct MaliciousContext;
59 static struct GNUNET_CONFIGURATION_Handle *cfg;
62 * Name of the file with the hosts to run the test over
64 static char *hosts_file;
67 * Context for a peer which actively does DHT PUT/GET
72 * Context to hold data of peer
77 * The testbed peer this context belongs to
79 struct GNUNET_TESTBED_Peer *peer;
82 * Testbed operation acting on this peer
84 struct GNUNET_TESTBED_Operation *op;
87 * Active context; NULL if this peer is not an active peer
89 struct ActiveContext *ac;
93 * Malicious context; NULL if this peer is NOT malicious.
95 struct MaliciousContext *mc;
102 * Context for a peer which should act maliciously.
104 struct MaliciousContext
107 * The linked peer context
112 * Handler to the DHT service
114 struct GNUNET_DHT_Handle *dht;
117 * Handler to malicious api
119 struct GNUNET_DHT_ActMaliciousHandle *dht_malicious;
123 * List of all the malicious peers contexts.
125 struct Context **malicious_peer_contexts = NULL;
128 * Context for a peer which should act maliciously.
130 struct Malicious_Context
133 * The linked peer context
138 * Handler to the DHT service
140 struct GNUNET_DHT_Handle *dht;
144 * Array of malicious peers.
146 static struct MaliciousContext *a_mc;
149 * Number or malicious peers.
151 static unsigned int n_malicious;
156 * Context for a peer which actively does DHT PUT/GET
161 * The linked peer context
166 * Handler to the DHT service
168 struct GNUNET_DHT_Handle *dht;
171 * The data used for do a PUT. Will be NULL if a PUT hasn't been performed yet
176 * The active context used for our DHT GET
178 struct ActiveContext *get_ac;
183 struct GNUNET_DHT_PutHandle *dht_put;
188 struct GNUNET_DHT_GetHandle *dht_get;
191 * The hash of the @e put_data
193 struct GNUNET_HashCode hash;
198 GNUNET_SCHEDULER_TaskIdentifier delay_task;
201 * The size of the @e put_data
203 uint16_t put_data_size;
206 * The number of peers currently doing GET on our data
213 * An array of contexts. The size of this array should be equal to @a num_peers
215 static struct Context *a_ctx;
218 * Array of active peers
220 static struct ActiveContext *a_ac;
223 * The delay between rounds for collecting statistics
225 static struct GNUNET_TIME_Relative delay_stats;
228 * The delay to start puts.
230 static struct GNUNET_TIME_Relative delay_put;
233 * The delay to start puts.
235 static struct GNUNET_TIME_Relative delay_get;
238 * The timeout for GET and PUT
240 static struct GNUNET_TIME_Relative timeout;
245 static unsigned int num_peers;
248 * Number of active peers
250 static unsigned int n_active;
253 * Number of DHT service connections we currently have
255 static unsigned int n_dht;
258 * Number of DHT PUTs made
260 static unsigned int n_puts;
263 * Number of DHT PUTs succeeded
265 static unsigned int n_puts_ok;
268 * Number of DHT PUTs failed
270 static unsigned int n_puts_fail;
273 * Number of DHT GETs made
275 static unsigned int n_gets;
278 * Number of DHT GETs succeeded
280 static unsigned int n_gets_ok;
283 * Number of DHT GETs succeeded
285 static unsigned int n_gets_fail;
290 static unsigned int replication;
293 * Number of times we try to find the successor circle formation
295 static unsigned int max_searches;
298 * Testbed Operation (to get stats).
300 static struct GNUNET_TESTBED_Operation *bandwidth_stats_op;
303 * To get successor stats.
305 static struct GNUNET_TESTBED_Operation *successor_stats_op;
308 * Testbed peer handles.
310 static struct GNUNET_TESTBED_Peer **testbed_handles;
313 * Total number of messages sent by peer.
315 static uint64_t outgoing_bandwidth;
318 * Total number of messages received by peer.
320 static uint64_t incoming_bandwidth;
323 * Average number of hops taken to do put.
325 static double average_put_path_length;
328 * Average number of hops taken to do get.
330 static double average_get_path_length;
333 * Total put path length across all peers.
335 static unsigned int total_put_path_length;
338 * Total get path length across all peers.
340 static unsigned int total_get_path_length;
343 * Hashmap to store pair of peer and its corresponding successor.
345 static struct GNUNET_CONTAINER_MultiHashMap *successor_peer_hashmap;
348 * Key to start the lookup on successor_peer_hashmap.
350 static struct GNUNET_HashCode *start_key;
353 * Flag used to get the start_key.
358 * Task to collect peer and its current successor statistics.
360 static GNUNET_SCHEDULER_TaskIdentifier successor_stats_task;
363 * Closure for successor_stats_task.
365 struct Collect_Stat_Context
368 * Current Peer Context.
370 struct Context *service_connect_ctx;
373 * Testbed operation acting on this peer
375 struct GNUNET_TESTBED_Operation *op;
379 * List of all the peers contexts.
381 struct Context **peer_contexts = NULL;
384 * Counter to keep track of peers added to peer_context lists.
386 static int peers_started = 0;
389 * Should we do a PUT (mode = 0) or GET (mode = 1);
400 * Are we shutting down
402 static int in_shutdown = 0;
405 * Total number of times to check if circle is formed or not.
407 static unsigned int tries;
410 * Task that collects successor statistics from all the peers.
415 collect_stats (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc);
418 * Connect to DHT services of active peers
424 * Shutdown task. Cleanup all resources and operations.
427 * @param tc scheduler task context
430 do_shutdown (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
432 struct ActiveContext *ac;
435 in_shutdown = GNUNET_YES;
438 for (cnt=0; cnt < num_peers; cnt++)
440 /* Cleanup active context if this peer is an active peer */
444 if (GNUNET_SCHEDULER_NO_TASK != ac->delay_task)
445 GNUNET_SCHEDULER_cancel (ac->delay_task);
446 if (NULL != ac->put_data)
447 GNUNET_free (ac->put_data);
448 if (NULL != ac->dht_put)
449 GNUNET_DHT_put_cancel (ac->dht_put);
450 if (NULL != ac->dht_get)
451 GNUNET_DHT_get_stop (ac->dht_get);
453 /* Cleanup testbed operation handle at the last as this operation may
454 contain service connection to DHT */
455 if (NULL != a_ctx[cnt].op)
456 GNUNET_TESTBED_operation_done (a_ctx[cnt].op);
461 //FIXME: Should we collect stats only for put/get not for other messages.
462 if(NULL != bandwidth_stats_op)
463 GNUNET_TESTBED_operation_done (bandwidth_stats_op);
464 bandwidth_stats_op = NULL;
465 GNUNET_free_non_null (a_ac);
470 * Stats callback. Finish the stats testbed operation and when all stats have
471 * been iterated, shutdown the test.
474 * @param op the operation that has been finished
475 * @param emsg error message in case the operation has failed; will be NULL if
476 * operation has executed successfully.
479 bandwidth_stats_cont (void *cls,
480 struct GNUNET_TESTBED_Operation *op,
483 INFO ("# Outgoing bandwidth: %u\n", outgoing_bandwidth);
484 INFO ("# Incoming bandwidth: %u\n", incoming_bandwidth);
485 GNUNET_SCHEDULER_shutdown ();
490 * Process statistic values.
493 * @param peer the peer the statistic belong to
494 * @param subsystem name of subsystem that created the statistic
495 * @param name the name of the datum
496 * @param value the current value
497 * @param is_persistent GNUNET_YES if the value is persistent, GNUNET_NO if not
498 * @return GNUNET_OK to continue, GNUNET_SYSERR to abort iteration
501 bandwidth_stats_iterator (void *cls,
502 const struct GNUNET_TESTBED_Peer *peer,
503 const char *subsystem,
508 static const char *s_sent = "# Bytes transmitted to other peers";
509 static const char *s_recv = "# Bytes received from other peers";
511 if (0 == strncmp (s_sent, name, strlen (s_sent)))
512 outgoing_bandwidth = outgoing_bandwidth + value;
513 else if (0 == strncmp(s_recv, name, strlen (s_recv)))
514 incoming_bandwidth = incoming_bandwidth + value;
523 INFO ("# PUTS made: %u\n", n_puts);
524 INFO ("# PUTS succeeded: %u\n", n_puts_ok);
525 INFO ("# PUTS failed: %u\n", n_puts_fail);
526 INFO ("# GETS made: %u\n", n_gets);
527 INFO ("# GETS succeeded: %u\n", n_gets_ok);
528 INFO ("# GETS failed: %u\n", n_gets_fail);
529 INFO ("# average_put_path_length: %f\n", average_put_path_length);
530 INFO ("# average_get_path_length: %f\n", average_get_path_length);
532 if (NULL == testbed_handles)
534 INFO ("No peers found\n");
538 bandwidth_stats_op = GNUNET_TESTBED_get_statistics (n_active, testbed_handles,
540 bandwidth_stats_iterator,
541 bandwidth_stats_cont, NULL);
546 * Task to cancel DHT GET.
549 * @param tc scheduler task context
552 cancel_get (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
554 struct ActiveContext *ac = cls;
555 struct Context *ctx = ac->ctx;
557 ac->delay_task = GNUNET_SCHEDULER_NO_TASK;
558 GNUNET_assert (NULL != ac->dht_get);
559 GNUNET_DHT_get_stop (ac->dht_get);
562 GNUNET_assert (NULL != ctx->op);
563 GNUNET_TESTBED_operation_done (ctx->op);
566 /* If profiling is complete, summarize */
567 if (n_active == n_gets_fail + n_gets_ok)
569 average_put_path_length = (double)total_put_path_length/(double)n_active;
570 average_get_path_length = (double)total_get_path_length/(double )n_gets_ok;
577 * Iterator called on each result obtained for a DHT
578 * operation that expects a reply
581 * @param exp when will this value expire
582 * @param key key of the result
583 * @param get_path peers on reply path (or NULL if not recorded)
584 * [0] = datastore's first neighbor, [length - 1] = local peer
585 * @param get_path_length number of entries in @a get_path
586 * @param put_path peers on the PUT path (or NULL if not recorded)
587 * [0] = origin, [length - 1] = datastore
588 * @param put_path_length number of entries in @a put_path
589 * @param type type of the result
590 * @param size number of bytes in @a data
591 * @param data pointer to the result data
595 struct GNUNET_TIME_Absolute exp,
596 const struct GNUNET_HashCode *key,
597 const struct GNUNET_PeerIdentity *get_path,
598 unsigned int get_path_length,
599 const struct GNUNET_PeerIdentity *put_path,
600 unsigned int put_path_length,
601 enum GNUNET_BLOCK_Type type,
602 size_t size, const void *data)
604 struct ActiveContext *ac = cls;
605 struct ActiveContext *get_ac = ac->get_ac;
606 struct Context *ctx = ac->ctx;
608 /* Check the keys of put and get match or not. */
609 GNUNET_assert (0 == memcmp (key, &get_ac->hash, sizeof (struct GNUNET_HashCode)));
610 /* we found the data we are looking for */
611 DEBUG ("We found a GET request; %u remaining\n", n_gets - (n_gets_fail + n_gets_ok)); //FIXME: It always prints 1.
614 GNUNET_DHT_get_stop (ac->dht_get);
616 if (ac->delay_task != GNUNET_SCHEDULER_NO_TASK)
617 GNUNET_SCHEDULER_cancel (ac->delay_task);
618 ac->delay_task = GNUNET_SCHEDULER_NO_TASK;
619 GNUNET_assert (NULL != ctx->op);
620 GNUNET_TESTBED_operation_done (ctx->op);
623 total_put_path_length = total_put_path_length + (double)put_path_length;
624 total_get_path_length = total_get_path_length + (double)get_path_length;
625 DEBUG ("total_put_path_length = %f,put_path \n",total_put_path_length);
626 /* Summarize if profiling is complete */
627 if (n_active == n_gets_fail + n_gets_ok)
629 average_put_path_length = (double)total_put_path_length/(double)n_active;
630 average_get_path_length = (double)total_get_path_length/(double )n_gets_ok;
637 * Task to do DHT GETs
639 * @param cls the active context
640 * @param tc the scheduler task context
643 delayed_get (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
645 struct ActiveContext *ac = cls;
646 struct ActiveContext *get_ac;
649 ac->delay_task = GNUNET_SCHEDULER_NO_TASK;
653 r = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, n_active);
655 if (NULL != get_ac->put_data)
660 DEBUG ("GET_REQUEST_START key %s \n", GNUNET_h2s((struct GNUNET_HashCode *)ac->put_data));
661 ac->dht_get = GNUNET_DHT_get_start (ac->dht,
662 GNUNET_BLOCK_TYPE_TEST,
664 1, /* replication level */
666 NULL, 0, /* extended query and size */
667 get_iter, ac); /* GET iterator and closure
671 /* schedule the timeout task for GET */
672 ac->delay_task = GNUNET_SCHEDULER_add_delayed (timeout, &cancel_get, ac);
677 * Task to teardown the dht connection. We do it as a task because calling
678 * GNUNET_DHT_disconnect() from put_continutation_callback seems illegal (the
679 * put_continuation_callback() is getting called again synchronously). Also,
680 * only free the operation when we are not shutting down; the shutdown task will
681 * clear the operation during shutdown.
683 * @param cls the context
684 * @return tc scheduler task context.
687 teardown_dht_connection (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
689 struct Context *ctx = cls;
690 struct GNUNET_TESTBED_Operation *op;
692 if (0 != (GNUNET_SCHEDULER_REASON_SHUTDOWN & tc->reason))
694 GNUNET_assert (NULL != ctx);
695 GNUNET_assert (NULL != (op = ctx->op));
697 GNUNET_TESTBED_operation_done (op);
702 * Queue up a delayed task for doing DHT GET
704 * @param cls the active context
705 * @param success #GNUNET_OK if the PUT was transmitted,
706 * #GNUNET_NO on timeout,
707 * #GNUNET_SYSERR on disconnect from service
708 * after the PUT message was transmitted
709 * (so we don't know if it was received or not)
712 put_cont (void *cls, int success)
714 struct ActiveContext *ac = cls;
715 struct Context *ctx = ac->ctx;
722 GNUNET_assert (NULL != ctx);
723 (void) GNUNET_SCHEDULER_add_now (&teardown_dht_connection, ctx);
728 * Task to do DHT PUTS
730 * @param cls the active context
731 * @param tc the scheduler task context
734 delayed_put (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
736 struct ActiveContext *ac = cls;
738 ac->delay_task = GNUNET_SCHEDULER_NO_TASK;
739 /* Generate and DHT PUT some random data */
740 ac->put_data_size = 16; /* minimum */
741 ac->put_data_size += GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK,
743 ac->put_data = GNUNET_malloc (ac->put_data_size);
744 GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
745 ac->put_data, ac->put_data_size);
746 GNUNET_CRYPTO_hash (ac->put_data, ac->put_data_size, &ac->hash);
747 DEBUG ("PUT_REQUEST_START key %s \n", GNUNET_h2s((struct GNUNET_HashCode *)ac->put_data));
748 ac->dht_put = GNUNET_DHT_put (ac->dht, &ac->hash,
750 GNUNET_DHT_RO_RECORD_ROUTE,
751 GNUNET_BLOCK_TYPE_TEST,
754 GNUNET_TIME_UNIT_FOREVER_ABS, /* expiration time */
755 timeout, /* PUT timeout */
756 put_cont, ac); /* continuation and its closure */
762 * Connection to DHT has been established. Call the delay task.
764 * @param cls the active context
765 * @param op the operation that has been finished
766 * @param ca_result the service handle returned from GNUNET_TESTBED_ConnectAdapter()
767 * @param emsg error message in case the operation has failed; will be NULL if
768 * operation has executed successfully.
771 dht_connected (void *cls,
772 struct GNUNET_TESTBED_Operation *op,
776 struct ActiveContext *ac = cls;
777 struct Context *ctx = ac->ctx;
779 GNUNET_assert (NULL != ctx); //FIXME: Fails
780 GNUNET_assert (NULL != ctx->op);
781 GNUNET_assert (ctx->op == op);
782 ac->dht = (struct GNUNET_DHT_Handle *) ca_result;
785 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Connection to DHT service failed: %s\n", emsg);
786 GNUNET_TESTBED_operation_done (ctx->op); /* Calls dht_disconnect() */
794 struct GNUNET_TIME_Relative peer_delay_put;
795 peer_delay_put.rel_value_us =
796 GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
797 delay_put.rel_value_us);
798 ac->delay_task = GNUNET_SCHEDULER_add_delayed (peer_delay_put, &delayed_put, ac);
803 struct GNUNET_TIME_Relative peer_delay_get;
804 peer_delay_get.rel_value_us =
805 delay_get.rel_value_us +
806 GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
807 delay_get.rel_value_us);
808 ac->delay_task = GNUNET_SCHEDULER_add_delayed (peer_delay_get, &delayed_get, ac);
816 * Connect to DHT service and return the DHT client handler
818 * @param cls the active context
819 * @param cfg configuration of the peer to connect to; will be available until
820 * GNUNET_TESTBED_operation_done() is called on the operation returned
821 * from GNUNET_TESTBED_service_connect()
822 * @return service handle to return in 'op_result', NULL on error
825 dht_connect (void *cls, const struct GNUNET_CONFIGURATION_Handle *cfg)
828 DEBUG("\n Inside dht_connect , n_dht = %u",n_dht);
829 return GNUNET_DHT_connect (cfg, 10);
834 * Adapter function called to destroy a connection to
837 * @param cls the active context
838 * @param op_result service handle returned from the connect adapter
841 dht_disconnect (void *cls, void *op_result)
843 struct ActiveContext *ac = cls;
845 GNUNET_assert (NULL != ac->dht);
846 GNUNET_assert (ac->dht == op_result);
847 GNUNET_DHT_disconnect (ac->dht);
852 if (GNUNET_YES == in_shutdown)
857 if ((n_puts_ok + n_puts_fail) != n_active)
859 /* Start GETs if all PUTs have been made */
861 //(void) GNUNET_SCHEDULER_add_now (&call_start_profiling, NULL);
865 if ((n_gets_ok + n_gets_fail) != n_active)
872 * Connect to DHT services of active peers
880 DEBUG("GNUNET_TESTBED_service_connect \n");
881 GNUNET_break (GNUNET_YES != in_shutdown);
882 for(i = 0; i < n_active; i++)
884 struct ActiveContext *ac = &a_ac[i];
885 GNUNET_assert (NULL != (ctx = ac->ctx));
886 GNUNET_assert (NULL == ctx->op);
888 GNUNET_TESTBED_service_connect (ctx,
900 * Count of total number of malicious peers.
902 static unsigned int count_malicious;
905 * Continuation of GNUNET_DHT_act_malicious
906 * @param cls Malicious context
907 * @param success #GNUNET_OK if the ACT_MALICIOUS was transmitted,
908 * #GNUNET_NO on timeout,
909 * #GNUNET_SYSERR on disconnect from service
910 * after the ACT_MALICIOUS message was transmitted
911 * (so we don't know if it was received or not)
914 act_malicious_cont (void *cls, int success)
916 struct MaliciousContext *mc = cls;
917 struct Context *ctx = mc->ctx;
919 GNUNET_TESTBED_operation_done (ctx->op);
926 * Call malicious API for all the malicious peers.
927 * @param cls the malicious context.
928 * @param op the operation that has been finished
929 * @param ca_result the service handle returned from GNUNET_TESTBED_ConnectAdapter()
930 * @param emsg error message in case the operation has failed; will be NULL if
931 * operation has executed successfully.
934 dht_set_malicious(void *cls,
935 struct GNUNET_TESTBED_Operation *op,
939 struct MaliciousContext *mc = cls;
940 struct Context *ctx = mc->ctx;
942 GNUNET_assert (NULL != ctx);
943 GNUNET_assert (NULL != ctx->op);
944 GNUNET_assert (ctx->op == op);
945 mc->dht = (struct GNUNET_DHT_Handle *) ca_result;
948 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Connection to DHT service failed: %s\n", emsg);
949 GNUNET_TESTBED_operation_done (ctx->op); /* Calls dht_disconnect_malicious() */
953 mc->dht_malicious = GNUNET_DHT_act_malicious(mc->dht, 1, act_malicious_cont, mc);
958 * Adapter function called to destroy a connection to
961 * @param cls the active context
962 * @param op_result service handle returned from the connect adapter
965 dht_disconnect_malicious (void *cls, void *op_result)
967 struct MaliciousContext *mc = cls;
969 GNUNET_assert (NULL != mc->dht);
970 GNUNET_assert (mc->dht == op_result);
971 GNUNET_DHT_disconnect (mc->dht);
979 if(n_malicious == count_malicious)
981 DEBUG("\n Call start_profiling()");
988 * Set the malicious variable in peer malicious context.
994 DEBUG ("Setting %u peers malicious",n_malicious);
996 for(i = 0; i < n_malicious; i++)
998 DEBUG("\n Inside loop , i = %u",i);
999 struct MaliciousContext *mc = &a_mc[i];
1001 GNUNET_TESTBED_service_connect (mc->ctx,
1004 &dht_set_malicious, mc,
1006 &dht_disconnect_malicious,
1015 * Start collecting relevant statistics. If ENABLE_MALICIOUS set, first
1016 * set the malicious peers. If not, then start with PUT operation on active
1022 #if ENABLE_MALICIOUS
1031 * Remove entry from successor peer hashmap.
1032 * @param cls closure
1033 * @param key current public key
1034 * @param value value in the hash map
1035 * @return #GNUNET_YES if we should continue to iterate,
1036 * #GNUNET_NO if not.
1039 hashmap_iterate_remove(void *cls,
1040 const struct GNUNET_HashCode *key,
1043 GNUNET_assert (GNUNET_YES ==
1044 GNUNET_CONTAINER_multihashmap_remove(successor_peer_hashmap, key, value));
1050 * Stats callback. Iterate over the hashmap and check if all th peers form
1051 * a virtual ring topology.
1053 * @param cls closure
1054 * @param op the operation that has been finished
1055 * @param emsg error message in case the operation has failed; will be NULL if
1056 * operation has executed successfully.
1059 successor_stats_cont (void *cls,
1060 struct GNUNET_TESTBED_Operation *op,
1063 struct GNUNET_HashCode *val;
1064 struct GNUNET_HashCode *start_val;
1065 struct GNUNET_HashCode *key;
1068 /* Don't schedule the task till we are looking for circle here. */
1069 successor_stats_task = GNUNET_SCHEDULER_NO_TASK;
1070 GNUNET_TESTBED_operation_done (successor_stats_op);
1071 successor_stats_op = NULL;
1072 if (0 == max_searches)
1078 GNUNET_assert (NULL != start_key);
1080 (struct GNUNET_HashCode *) GNUNET_CONTAINER_multihashmap_get(successor_peer_hashmap,
1084 for (count = 0; count < num_peers; count++)
1087 val = GNUNET_CONTAINER_multihashmap_get (successor_peer_hashmap,
1093 /* Remove the entry from hashmap. This is done to take care of loop. */
1095 GNUNET_CONTAINER_multihashmap_remove (successor_peer_hashmap,
1098 DEBUG ("Failed to remove entry from hashmap\n");
1101 /* If a peer has its own identity as its successor. */
1102 if (0 == memcmp(key, val, sizeof (struct GNUNET_HashCode)))
1108 GNUNET_assert(GNUNET_SYSERR !=
1109 GNUNET_CONTAINER_multihashmap_iterate (successor_peer_hashmap,
1110 hashmap_iterate_remove,
1113 successor_peer_hashmap = GNUNET_CONTAINER_multihashmap_create (num_peers,
1115 if ((start_val == val) && (count == num_peers))
1117 DEBUG("CIRCLE COMPLETED after %u tries", tries);
1118 if(GNUNET_SCHEDULER_NO_TASK == successor_stats_task)
1126 if (max_searches == ++tries)
1128 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1129 "Maximum tries %u exceeded while checking successor TOTAL TRIES %u"
1130 " circle formation. Exiting\n",
1131 max_searches,tries);
1132 if (GNUNET_SCHEDULER_NO_TASK != successor_stats_task)
1134 successor_stats_task = GNUNET_SCHEDULER_NO_TASK;
1136 if(GNUNET_SCHEDULER_NO_TASK == successor_stats_task)
1146 successor_stats_task = GNUNET_SCHEDULER_add_delayed (delay_stats, &collect_stats, cls);
1153 * Process successor statistic values.
1155 * @param cls closure
1156 * @param peer the peer the statistic belong to
1157 * @param subsystem name of subsystem that created the statistic
1158 * @param name the name of the datum
1159 * @param value the current value
1160 * @param is_persistent GNUNET_YES if the value is persistent, GNUNET_NO if not
1161 * @return GNUNET_OK to continue, GNUNET_SYSERR to abort iteration
1164 successor_stats_iterator (void *cls,
1165 const struct GNUNET_TESTBED_Peer *peer,
1166 const char *subsystem,
1171 static const char *key_string = "XDHT";
1172 if (0 == max_searches)
1175 if (0 == strncmp (key_string, name, strlen (key_string)))
1178 char successor_str[13];
1179 char truncated_my_id_str[13];
1180 char truncated_successor_str[13];
1181 struct GNUNET_HashCode *my_id_key;
1182 struct GNUNET_HashCode *succ_key;
1184 strtok((char *)name,":");
1185 my_id_str = strtok(NULL,":");
1187 strncpy(truncated_my_id_str, my_id_str, 12);
1188 truncated_my_id_str[12] = '\0';
1189 my_id_key = GNUNET_new(struct GNUNET_HashCode);
1190 GNUNET_CRYPTO_hash (truncated_my_id_str, sizeof(truncated_my_id_str),my_id_key);
1191 GNUNET_STRINGS_data_to_string(&value, sizeof(uint64_t), successor_str, 13);
1192 strncpy(truncated_successor_str, successor_str, 12);
1193 truncated_successor_str[12] ='\0';
1195 succ_key = GNUNET_new(struct GNUNET_HashCode);
1196 GNUNET_CRYPTO_hash (truncated_successor_str, sizeof(truncated_successor_str),succ_key);
1200 GNUNET_assert(NULL != my_id_key);
1201 start_key = my_id_key;
1202 GNUNET_assert(NULL != start_key);
1205 GNUNET_CONTAINER_multihashmap_put (successor_peer_hashmap,
1206 my_id_key, (void *)succ_key,
1207 GNUNET_CONTAINER_MULTIHASHMAPOPTION_REPLACE);
1215 * Task that collects peer and its corresponding successors.
1217 * @param cls Closure (NULL).
1218 * @param tc Task Context.
1221 collect_stats (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
1223 if ((GNUNET_SCHEDULER_REASON_SHUTDOWN & tc->reason) != 0)
1226 GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Start collecting statistics...\n");
1227 GNUNET_assert(NULL != testbed_handles);
1229 if (0 != max_searches)
1230 successor_peer_hashmap = GNUNET_CONTAINER_multihashmap_create (num_peers,
1232 successor_stats_op =
1233 GNUNET_TESTBED_get_statistics (num_peers, testbed_handles,
1235 successor_stats_iterator,
1236 successor_stats_cont, cls);
1238 GNUNET_assert(NULL != successor_stats_op);
1243 * Callback called when DHT service on the peer is started
1245 * @param cls the context
1246 * @param op the operation that has been finished
1247 * @param emsg error message in case the operation has failed; will be NULL if
1248 * operation has executed successfully.
1251 service_started (void *cls,
1252 struct GNUNET_TESTBED_Operation *op,
1255 struct Context *ctx = cls;
1257 GNUNET_assert (NULL != ctx);
1258 GNUNET_assert (NULL != ctx->op);
1259 GNUNET_TESTBED_operation_done (ctx->op);
1262 DEBUG("Peers Started = %d; num_peers = %d \n", peers_started, num_peers);
1263 if (GNUNET_SCHEDULER_NO_TASK == successor_stats_task && peers_started == num_peers)
1265 DEBUG("successor_stats_task \n");
1266 struct Collect_Stat_Context *collect_stat_cls = GNUNET_new(struct Collect_Stat_Context);
1267 collect_stat_cls->service_connect_ctx = cls;
1268 collect_stat_cls->op = op;
1270 successor_stats_task = GNUNET_SCHEDULER_add_delayed (delay_stats,
1278 * Signature of a main function for a testcase.
1280 * @param cls closure
1281 * @param h the run handle
1282 * @param num_peers number of peers in 'peers'
1283 * @param peers handle to peers run in the testbed
1284 * @param links_succeeded the number of overlay link connection attempts that
1286 * @param links_failed the number of overlay link
1289 test_run (void *cls,
1290 struct GNUNET_TESTBED_RunHandle *h,
1291 unsigned int num_peers, struct GNUNET_TESTBED_Peer **peers,
1292 unsigned int links_succeeded,
1293 unsigned int links_failed)
1296 unsigned int ac_cnt;
1297 unsigned int malicious_peers;
1298 testbed_handles = peers;
1304 INFO ("%u peers started\n", num_peers);
1305 a_ctx = GNUNET_malloc (sizeof (struct Context) * num_peers);
1307 /* select the peers which actively participate in profiling */
1308 n_active = num_peers * PUT_PROBABILITY / 100;
1311 GNUNET_SCHEDULER_shutdown ();
1312 GNUNET_free (a_ctx);
1316 a_ac = GNUNET_malloc (n_active * sizeof (struct ActiveContext));
1319 #if ENABLE_MALICIOUS
1321 if(PUT_PROBABILITY + MALICIOUS_PROBABILITY > 100)
1323 DEBUG ("Reduce either number of malicious peer or active peers. ");
1324 GNUNET_SCHEDULER_shutdown ();
1325 GNUNET_free (a_ctx);
1329 /* Select the peers which should act maliciously. */
1330 n_malicious = num_peers * MALICIOUS_PROBABILITY / 100;
1332 a_mc = GNUNET_malloc (n_malicious * sizeof (struct MaliciousContext));
1333 malicious_peers = 0;
1335 for (cnt = 0; cnt < num_peers && malicious_peers < n_malicious; cnt++)
1337 if (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, 100) >=
1338 MALICIOUS_PROBABILITY)
1340 a_ctx[cnt].mc = &a_mc[malicious_peers];
1341 a_mc[malicious_peers].ctx = &a_ctx[cnt];
1344 n_malicious = malicious_peers;
1345 INFO ("Malicious Peers: %u\n",malicious_peers);
1349 a_ac = GNUNET_malloc (n_active * sizeof (struct ActiveContext));
1351 for (cnt = 0; cnt < num_peers && ac_cnt < n_active; cnt++)
1353 if ((GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, 100) >=
1354 PUT_PROBABILITY) || (a_ctx[ac_cnt].mc != NULL))
1357 a_ctx[cnt].ac = &a_ac[ac_cnt];
1358 a_ac[ac_cnt].ctx = &a_ctx[cnt];
1362 INFO ("Active peers: %u\n", n_active);
1364 /* start DHT service on all peers */
1365 for (cnt = 0; cnt < num_peers; cnt++)
1367 a_ctx[cnt].peer = peers[cnt];
1368 a_ctx[cnt].op = GNUNET_TESTBED_peer_manage_service (&a_ctx[cnt],
1379 * Main function that will be run by the scheduler.
1381 * @param cls closure
1382 * @param args remaining command-line arguments
1383 * @param cfgfile name of the configuration file used (for saving, can be NULL!)
1384 * @param config configuration
1387 run (void *cls, char *const *args, const char *cfgfile,
1388 const struct GNUNET_CONFIGURATION_Handle *config)
1390 uint64_t event_mask;
1394 GNUNET_log (GNUNET_ERROR_TYPE_ERROR, _("Exiting as the number of peers is %u\n"),
1398 cfg = GNUNET_CONFIGURATION_dup (config);
1400 GNUNET_TESTBED_run (hosts_file, cfg, num_peers, event_mask, NULL,
1401 NULL, &test_run, NULL);
1402 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &do_shutdown,
1410 * @return 0 on success
1413 main (int argc, char *const *argv)
1417 static struct GNUNET_GETOPT_CommandLineOption options[] = {
1418 {'n', "peers", "COUNT",
1419 gettext_noop ("number of peers to start"),
1420 1, &GNUNET_GETOPT_set_uint, &num_peers},
1421 {'s', "searches", "COUNT",
1422 gettext_noop ("maximum number of times we try to search for successor circle formation (0 for R5N)"),
1423 1, &GNUNET_GETOPT_set_uint, &max_searches},
1424 {'H', "hosts", "FILENAME",
1425 gettext_noop ("name of the file with the login information for the testbed"),
1426 1, &GNUNET_GETOPT_set_string, &hosts_file},
1427 {'D', "delay", "DELAY",
1428 gettext_noop ("delay between rounds for collecting statistics (default: 30 sec)"),
1429 1, &GNUNET_GETOPT_set_relative_time, &delay_stats},
1430 {'P', "PUT-delay", "DELAY",
1431 gettext_noop ("delay to start doing PUTs (default: 1 sec)"),
1432 1, &GNUNET_GETOPT_set_relative_time, &delay_put},
1433 {'G', "GET-delay", "DELAY",
1434 gettext_noop ("delay to start doing GETs (default: 5 min)"),
1435 1, &GNUNET_GETOPT_set_relative_time, &delay_get},
1436 {'r', "replication", "DEGREE",
1437 gettext_noop ("replication degree for DHT PUTs"),
1438 1, &GNUNET_GETOPT_set_uint, &replication},
1439 {'t', "timeout", "TIMEOUT",
1440 gettext_noop ("timeout for DHT PUT and GET requests (default: 1 min)"),
1441 1, &GNUNET_GETOPT_set_relative_time, &timeout},
1442 GNUNET_GETOPT_OPTION_END
1446 if (GNUNET_OK != GNUNET_STRINGS_get_utf8_args (argc, argv, &argc, &argv))
1448 /* set default delays */
1449 delay_stats = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
1450 delay_put = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
1451 delay_get = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
1452 timeout = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
1453 replication = 1; /* default replication */
1456 GNUNET_PROGRAM_run (argc, argv, "dht-profiler",
1458 ("Measure quality and performance of the DHT service."),
1459 options, &run, NULL))