-allow caller ID to differ from zone used for resolution
[oweals/gnunet.git] / src / dht / gnunet-service-xdht_neighbours.c
index cb1af96c35c67a66b2560131efb7b5b953b4e2d5..ef19beed8360f8fded8afd93fe39ffbdf1d3dc15 100644 (file)
@@ -1,6 +1,6 @@
 /*
      This file is part of GNUnet.
-     (C) 2009-2013 Christian Grothoff (and other contributing authors)
+     (C) 2009-2014 Christian Grothoff (and other contributing authors)
 
      GNUnet is free software; you can redistribute it and/or modify
      it under the terms of the GNU General Public License as published
 #include "gnunet_hello_lib.h"
 #include "gnunet_constants.h"
 #include "gnunet_protocols.h"
-#include "gnunet_nse_service.h"
 #include "gnunet_ats_service.h"
 #include "gnunet_core_service.h"
 #include "gnunet_datacache_lib.h"
 #include "gnunet_transport_service.h"
-#include "gnunet_hello_lib.h"
 #include "gnunet_dht_service.h"
 #include "gnunet_statistics_service.h"
 #include "gnunet-service-xdht.h"
 #include "gnunet-service-xdht_clients.h"
 #include "gnunet-service-xdht_datacache.h"
-#include "gnunet-service-xdht_hello.h"
 #include "gnunet-service-xdht_neighbours.h"
-#include "gnunet-service-xdht_nse.h"
 #include "gnunet-service-xdht_routing.h"
 #include <fenv.h>
 #include "dht.h"
 
+/**
+ * Maximum possible fingers (including predecessor) of a peer 
+ */
+#define MAX_FINGERS 65
+
+/**
+ * Maximum allowed number of pending messages per friend peer.
+ */
+#define MAXIMUM_PENDING_PER_FRIEND 64
+
+/**
+ * How long to wait before sending another find finger trail request
+ */
+#define DHT_FIND_FINGER_TRAIL_INTERVAL GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 30)
 
-/* FIXME:
- 1. Add content and route replication later. 
- *2. Algorithm to shorten the trail length - one possible solution could be
- * when we are in trail seutp result part. each peer in the trail check if any of
- * the corresponding peers is its friend list. Then it can shortcut the path.
- * But this will have O(n) run time at each peer, where n = trail_length.\
- * or rather O(n)+O(n-1)+..O(1) =O(n). 
- * 4. As we start looking for finger from i = 0, using this parameter to 
- * generate random value does not look smart in send_find_finger_trail_message. 
- * 6. Need to add a new task, fix fingers. For node join/leave, we need to 
- * upgrade our finger table periodically. So, we should call fix_fingers 
- * and change our finger table. 
- * 7. Should we look for fingers one by one in send_find_finger_trail_setup
- * 8. Change the message is gnunet_protocols.h 
+/**
+ * How long at most to wait for transmission of a request to another peer?
  */
+#define GET_TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MINUTES, 2)
 
+/**
+ * Duration for which I may remain congested. 
+ * Note: Its a static value. In future, a peer may do some analysis and calculate 
+ * congestion_timeout based on 'some' parameters. 
+ */
+#define CONGESTION_TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MINUTES, 2)
 
 /**
- * Maximum possible fingers of a peer.
- * FIXME: Should it be 64 as we are doing all the operation on 64 bit numbers now? 
+ * Maximum number of trails allowed to go through a friend.
  */
-#define MAX_FINGERS 64
+#define TRAILS_THROUGH_FRIEND_THRESHOLD 64
 
 /**
- * Maximum allowed number of pending messages per friend peer.
+ * Maximum number of trails stored per finger.
  */
-#define MAXIMUM_PENDING_PER_FRIEND 64
+#define MAXIMUM_TRAILS_PER_FINGER 2
 
 /**
- * How long at least to wait before sending another find finger trail request.
+ * Finger map index for predecessor entry in finger peermap.
  */
-#define DHT_MINIMUM_FIND_FINGER_TRAIL_INTERVAL GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_SECONDS, 30)
+#define PREDECESSOR_FINGER_ID 64
 
 /**
- * How long at most to wait before sending another find finger trail request.
+ * Wrap around in peer identity circle. 
+ * FIXME: not used anywhere, should be used in
+ * find_successor() while comparing two peers.
  */
-#define DHT_MAXIMUM_FIND_FINGER_TRAIL_INTERVAL GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, 10)
+#define PEER_IDENTITES_WRAP_AROUND pow(2, 64) - 1
 
 /**
- * FIXME: Currently used in GDS_NEIGHBOURS_handle_trail_setup.
- * I have just copied it from gnunet-service-dht_neighbours. Will it work here? 
- * How long at most to wait for transmission of a GET request to another peer?
+ * To check if a finger is predecessor or not. 
  */
-#define GET_TIMEOUT GNUNET_TIME_relative_multiply(GNUNET_TIME_UNIT_MINUTES, 2)
+enum GDS_NEIGHBOURS_finger_type
+{
+  GDS_FINGER_TYPE_PREDECESSOR = 0,
+  GDS_FINGER_TYPE_NON_PREDECESSOR = 1
+};
 
 GNUNET_NETWORK_STRUCT_BEGIN
 
-/* FIXME:
- * 1) Bloomfilter is not required for X-Vine.
- * Keep the field now but remove it when implementing PUT/GET.
- * 2) also, check the field of put/get/result if all are required for
- * x-vine or not. */
-  
 /**
  * P2P PUT message
  */
@@ -120,7 +122,7 @@ struct PeerPutMessage
   /**
    * Content type.
    */
-  uint32_t type GNUNET_PACKED;
+  uint32_t block_type GNUNET_PACKED;
 
   /**
    * Hop count
@@ -129,6 +131,7 @@ struct PeerPutMessage
 
   /**
    * Replication level for this message
+   * In the current implementation, this value is not used. 
    */
   uint32_t desired_replication_level GNUNET_PACKED;
 
@@ -136,64 +139,133 @@ struct PeerPutMessage
    * Length of the PUT path that follows (if tracked).
    */
   uint32_t put_path_length GNUNET_PACKED;
-
+  
+  /** 
+   * Best known destination (could be my friend or finger) which should
+   * get this message next. 
+   */
+  struct GNUNET_PeerIdentity best_known_destination;
+  
+  /**
+   * In case best_known_destination is a finger, then trail to reach
+   * to that finger. Else its default value is 0. 
+   */
+  struct GNUNET_HashCode intermediate_trail_id;
+  
   /**
    * When does the content expire?
    */
   struct GNUNET_TIME_AbsoluteNBO expiration_time;
+  
+  /**
+   * The key to store the value under.
+   */
+  struct GNUNET_HashCode key GNUNET_PACKED;
+
+  /* put path (if tracked) */
 
+  /* Payload */
+};
+
+/**
+ * P2P GET message
+ */
+struct PeerGetMessage
+{
+  /**
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_GET
+   */
+  struct GNUNET_MessageHeader header;
+  
   /**
-   * Bloomfilter (for peer identities) to stop circular routes
+   * Processing options
    */
-  char bloomfilter[DHT_BLOOM_SIZE];
+  uint32_t options GNUNET_PACKED;
 
   /**
-   * The key we are storing under.
+   * Desired content type.
+   */
+  uint32_t block_type GNUNET_PACKED;
+  
+  /**
+   * Hop count
+   */
+  uint32_t hop_count GNUNET_PACKED;
+  /**
+   * Desired replication level for this request.
+   * In the current implementation, this value is not used. 
+   */
+  uint32_t desired_replication_level GNUNET_PACKED;
+  
+  /**
+   * Total number of peers in get path. 
+   */
+  unsigned int get_path_length;
+  
+  /**
+   * Best known destination (could be my friend or finger) which should
+   * get this message next. 
+   */
+  struct GNUNET_PeerIdentity best_known_destination;
+  
+  /**
+   * In case best_known_destination is a finger, then trail to reach
+   * to that finger. Else its default value is 0. 
+   */
+  struct GNUNET_HashCode intermediate_trail_id;
+  /**
+   * The key we are looking for.
    */
   struct GNUNET_HashCode key;
-
-  /* put path (if tracked) */
-
-  /* Payload */
+  
+  /* Get path. */
 
 };
 
-
 /**
  * P2P Result message
  */
-struct PeerResultMessage
+struct PeerGetResultMessage
 {
   /**
-   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_RESULT
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_GET_RESULT
    */
   struct GNUNET_MessageHeader header;
 
   /**
-   * Content type.
+   * The type for the data.
    */
   uint32_t type GNUNET_PACKED;
-
+  
   /**
-   * Length of the PUT path that follows (if tracked).
+   * Number of peers recorded in the outgoing path from source to the
+   * stored location of this message.
    */
   uint32_t put_path_length GNUNET_PACKED;
-
+  
   /**
    * Length of the GET path that follows (if tracked).
    */
   uint32_t get_path_length GNUNET_PACKED;
-
+  
+  /**
+   * Peer which queried for get and should get the result. 
+   */
+  struct GNUNET_PeerIdentity querying_peer;
+  
   /**
    * When does the content expire?
    */
-  struct GNUNET_TIME_AbsoluteNBO expiration_time;
+  struct GNUNET_TIME_Absolute expiration_time;
 
   /**
    * The key of the corresponding GET request.
    */
   struct GNUNET_HashCode key;
-
   /* put path (if tracked) */
 
   /* get path (if tracked) */
@@ -202,380 +274,586 @@ struct PeerResultMessage
 
 };
 
-
 /**
- * P2P GET message
+ * P2P Trail setup message
  */
-struct PeerGetMessage
+struct PeerTrailSetupMessage
 {
   /**
-   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_GET
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_SETUP
    */
   struct GNUNET_MessageHeader header;
-
-  /**
-   * Processing options
-   */
-  uint32_t options GNUNET_PACKED;
-
+  
   /**
-   * Desired content type.
+   * Is source_peer trying to setup the trail to any finger or predecessor.
    */
-  uint32_t type GNUNET_PACKED;
-
+  uint32_t is_predecessor; 
+  
   /**
-   * Hop count
+   * Peer closest to this value will be our finger.
    */
-  uint32_t hop_count GNUNET_PACKED;
+  uint64_t ultimate_destination_finger_value;
 
   /**
-   * Desired replication level for this request.
+   * Source peer which wants to setup the trail to one of its finger.
    */
-  uint32_t desired_replication_level GNUNET_PACKED;
+  struct GNUNET_PeerIdentity source_peer;
 
   /**
-   * Size of the extended query.
+   * Best known destination (could be my friend or finger) which should
+   * get this message next. 
    */
-  uint32_t xquery_size;
+  struct GNUNET_PeerIdentity best_known_destination; 
 
   /**
-   * Bloomfilter mutator.
+   * Trail id of any intermediate trail we may encounter while doing trail setup.
    */
-  uint32_t bf_mutator;
-
+  struct GNUNET_HashCode intermediate_trail_id;
+  
   /**
-   * Bloomfilter (for peer identities) to stop circular routes
+   * Trail id for trail which we are trying to setup.
    */
-  char bloomfilter[DHT_BLOOM_SIZE];
+  struct GNUNET_HashCode trail_id; 
 
-  /**
-   * The key we are looking for.
+  /* List of peers which are part of trail setup so far.
+   * Trail does NOT include source_peer and peer which will be closest to
+   * ultimate_destination_finger_value.
+   * struct GNUNET_PeerIdentity trail_list[]
    */
-  struct GNUNET_HashCode key;
-
 };
 
-
 /**
- * A destination can be either a friend or finger.
+  * P2P Trail Setup Result message
  */
-enum current_destination_type
+struct PeerTrailSetupResultMessage
 {
-  /* Friend */
-  FRIEND ,
-  
-  /* Finger */
-  FINGER ,
 
-  /* My own identity */
-  MY_ID        
-};
-
-/**
- * P2P Trail setup message
- * TODO: Take reference from put_path and get_path to understand how to use size of trail list.  
- */
-struct PeerTrailSetupMessage
-{
   /**
-   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_SETUP
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_SETUP_RESULT
    */
   struct GNUNET_MessageHeader header;
 
   /**
-   * Source peer which wants to find trail to one of its finger. 
+   * Finger to which we have found the path.
    */
-  struct GNUNET_PeerIdentity source_peer;
-
-  /**
-   * As we are not sending any hello messages to this destination
-   * finger, we are only searching for it, we can just send 64 bit. 
-   * Finger id to which we want to set up the trail to. 
-   *
-  struct GNUNET_PeerIdentity destination_finger; */
+  struct GNUNET_PeerIdentity finger_identity;
 
   /**
-   * Finger id to which we want to set up the trail to. 
+   * Peer which started trail_setup to find trail to finger_identity
    */
-  uint64_t destination_finger;
-  
+  struct GNUNET_PeerIdentity querying_peer; 
+
   /**
-   * If set to 1, then we are looking for trail to our immediate successor. 
+   * Is the trail setup to querying_peer's predecessor or finger?
    */
-  unsigned int successor_flag;
-  
+  uint32_t is_predecessor; 
+
   /**
-   * If the message is forwarded to finger or friend
+   * Value to which finger_identity is the closest peer
    */
-  enum current_destination_type current_destination_type;
+  uint64_t ulitmate_destination_finger_value;
   
   /**
-   * This field contains the peer to which this packet is forwarded.
+   * Identifier of the trail from querying peer to finger_identity, NOT
+   * including both endpoints. 
    */
-  struct GNUNET_PeerIdentity current_destination;
-  /**
-   * Number of entries in trail list.
-   * FIXME: Is this data type correct?
-   * FIMXE: Is usage of GNUNET_PACKED correct?
+  struct GNUNET_HashCode trail_id;
+
+  /* List of peers which are part of the trail from querying peer to 
+   * finger_identity, NOT including both endpoints.
+   * struct GNUNET_PeerIdentity trail[] 
    */
-  uint32_t trail_length GNUNET_PACKED;
-  
-  /* FIXME: Add this field later. 
-   * The finger index in finger map. 
-  unsigned int finger_index;*/
-  
 };
 
 /**
- *
+ * P2P Verify Successor Message.
  */
-struct PeerVerifySuccessor
+struct PeerVerifySuccessorMessage
 {
-  
-};
+  /**
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_VERIFY_SUCCESSOR
+   */
+  struct GNUNET_MessageHeader header;
 
+  /**
+   * Peer which wants to verify its successor.
+   */
+  struct GNUNET_PeerIdentity source_peer;
 
-/**
- *
- */
-struct PeerVerifySuccessorResult
-{
-  
-};
+  /**
+   * Source Peer's current successor.
+   */
+  struct GNUNET_PeerIdentity successor;
 
-/**
- *
- */
-struct PeerNotifyNewSuccessor
-{
-  
+  /**
+   * Identifier of trail to reach from source_peer to successor.
+   */
+  struct GNUNET_HashCode trail_id;
+
+  /* List of the peers which are part of trail to reach  from source_peer 
+   * to successor, NOT including them
+   * struct GNUNET_PeerIdentity trail[] 
+   */
 };
+
 /**
- * P2P Trail setup Result message
+ * FIXME: In case you append the trail it may contain the same peer twice.
+ * So, when you call search_my_index it can return error. Solution is while
+ * appending the entry first check for duplicate entries or may be don't
+ * send the current_predecessor at all. 
+ * P2P Verify Successor Result Message
  */
-struct PeerTrailSetupResultMessage
+struct PeerVerifySuccessorResultMessage
 {
   /**
-   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_RESULT_SETUP
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_VERIFY_SUCCESSOR_RESULT
    */
   struct GNUNET_MessageHeader header;
-  
+
   /**
-   * Finger to which we have found the path. 
+   * Peer which sent the request to verify its successor.
    */
-  struct GNUNET_PeerIdentity finger;
+  struct GNUNET_PeerIdentity querying_peer;
 
   /**
-   * Peer which was looking for the trail to finger. 
+   * Successor to which PeerVerifySuccessorMessage was sent.
    */
-  struct GNUNET_PeerIdentity destination_peer;
+  struct GNUNET_PeerIdentity source_successor;
 
   /**
-   * This field contains the peer to which this packet is forwarded.
+   * Current Predecessor of source_successor. It can be same as querying peer
+   * or different.
    */
-  struct GNUNET_PeerIdentity current_destination;
-  
+  struct GNUNET_PeerIdentity current_predecessor;
+
   /**
-   * FIXME: Temporary field used to remember at which index we should read
-   * to get our next peer. 
+   * Trail identifier of trail from querying_peer to source_successor.
    */
-  unsigned int current_index;
-  
+  struct GNUNET_HashCode trail_id;
+
   /**
-   * If set to 1, then this trail is the trail to succcessor of our finger. 
+   * Direction in which we are looking at the trail.
    */
-  unsigned int successor_flag;
-  
-  /**
-   * Number of entries in trail list.
-   * FIXME: Is this data type correct?
-   * FIXME: Is usage of GNUNET_PACKED correct?
+  uint32_t trail_direction;
+
+  /* In case current_predecessor != querying_peer, then trail to reach from
+   * querying_peer to current_predecessor, NOT including end points.
+   * struct GNUNET_PeerIdentity trail[]
    */
-  uint32_t trail_length GNUNET_PACKED;
-  
 };
 
-GNUNET_NETWORK_STRUCT_END
-
-
 /**
- * Linked list of messages to send to a particular other peer.
+ * P2P Notify New Successor Message.
  */
-struct P2PPendingMessage
+struct PeerNotifyNewSuccessorMessage
 {
   /**
-   * Pointer to next item in the list
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_NOTIFY_NEW_SUCCESSOR
    */
-  struct P2PPendingMessage *next;
+  struct GNUNET_MessageHeader header;
 
   /**
-   * Pointer to previous item in the list
+   * Peer which wants to notify its new successor.
    */
-  struct P2PPendingMessage *prev;
+  struct GNUNET_PeerIdentity source_peer;
 
   /**
-   * When does this message time out?
+   * New successor of source_peer.
    */
-  struct GNUNET_TIME_Absolute timeout;
+  struct GNUNET_PeerIdentity new_successor;
 
-   /**
-   * Message importance level.  FIXME: used? useful?
+  /**
+   * Unique identifier of the trail from source_peer to new_successor,
+   * NOT including the endpoints.
    */
-  unsigned int importance;
+  struct GNUNET_HashCode trail_id;
+
+  /* List of peers in trail from source_peer to new_successor, 
+   * NOT including the endpoints. 
+   * struct GNUNET_PeerIdentity trail[]
+   */
+};
 
+/**
+ * FIXME: Check if you can merge trail compression and trail teardown
+ * by modifying routing table structure a little bit. PRIORITY: at the end
+ * less code. 
+ * P2P Trail Compression Message.
+ */
+struct PeerTrailCompressionMessage
+{
   /**
-   * Actual message to be sent, allocated at the end of the struct:
-   * // msg = (cast) &pm[1];
-   * // memcpy (&pm[1], data, len);
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_COMPRESSION
    */
-  const struct GNUNET_MessageHeader *msg;
+  struct GNUNET_MessageHeader header;
 
-};
+  /**
+   * Source peer of this trail.
+   */
+  struct GNUNET_PeerIdentity source_peer;
 
+  /**
+   * Destination of this trail.
+   */
+  struct GNUNET_PeerIdentity destination_peer;
 
- /**
-  * Linked List of peers which are part of trail to reach a particular Finger.
-  */
-struct TrailPeerList
-{
-   /**
-   * Pointer to next item in the list
+  /**
+   * Trail from source_peer to destination_peer compressed such that
+   * new_first_friend is the first hop in the trail from source to
+   * destination.
    */
-   struct TrailPeerList *next;
+  struct GNUNET_PeerIdentity new_first_friend;
 
-   /**
-   * Pointer to previous item in the list
+  /**
+   * Unique identifier of trail.
    */
-   struct TrailPeerList *prev;
-   
-   /**
-    * An element in this trail list
-    */
-   struct GNUNET_PeerIdentity peer;
-  
+  struct GNUNET_HashCode trail_id;
 };
 
 
 /**
- *  Entry in friend_peermap.
+ * P2P Trail Tear Down message.
  */
-struct FriendInfo
+struct PeerTrailTearDownMessage
 {
   /**
-   * What is the identity of the peer?
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_TEARDOWN
    */
-  struct GNUNET_PeerIdentity id;
+  struct GNUNET_MessageHeader header;
 
   /**
-   * Count of outstanding messages for peer.
+   * Source peer of the trail.
    */
-  unsigned int pending_count;
-  
+  struct GNUNET_PeerIdentity source_peer;
+
   /**
-   * Successor of this finger.
+   * Destination peer of the trail.
    */
-  struct GNUNET_PeerIdentity successor_identity;
-  
+  struct GNUNET_PeerIdentity destination_peer;
+
   /**
-   * Predecessor of this finger.
+   * Unique identifier of the trail.
    */
-  struct GNUNET_PeerIdentity predecessor_identity;
-  
+  struct GNUNET_HashCode TRAIL_ID;
+
   /**
-   * Head of pending messages to be sent to this peer.
+   * Direction of trail.
    */
- struct P2PPendingMessage *head;
-
- /**
-  * Tail of pending messages to be sent to this peer.
-  */
- struct P2PPendingMessage *tail;
- /**
-  * TODO - How and where to use this?
-  * Core handle for sending messages to this peer.
-  */
- struct GNUNET_CORE_TransmitHandle *th;
-
+  uint32_t trail_direction;
 };
 
 
 /**
- * FIXME: As in chord , where we store the actual finger identity we were looking
- * for and the real id which we got as successor. If we want to store like that 
- * then we will need to add a new field and search actual peer id. 
- * FIXME: Should we use another PeerIdentity which is smaller
- * than 256 bits while storing. 
- * SUPU
- * finger_identity is the actual finger that we were looking for.
- * successor is the peer id which is our finger in place of finger_identity
- * that we were actually looking for. It may happen that finger_identity
- * was not in the network and we found the successor closest to that
- * finger_identity.
- * Predcessor is needed in case of node join/fail. 
- * Entry in finger_peermap.
+ * P2P Trail Rejection Message.
  */
-struct FingerInfo
+struct PeerTrailRejectionMessage
 {
   /**
-   * Finger identity.
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_REJECTION
    */
-  struct GNUNET_PeerIdentity finger_identity;
-  
+  struct GNUNET_MessageHeader header;
+
   /**
-   * If 1, then this finger entry is first finger /successor of the peer.
+   * Peer which wants to set up the trail.
    */
-  unsigned int successor;
+  struct GNUNET_PeerIdentity source_peer;
+
   /**
-   * List of peers in the trail.
+   * Peer which sent trail rejection message as it it congested. 
    */
-  const struct GNUNET_PeerIdentity *trail_peer_list;
-};
+  struct GNUNET_PeerIdentity congested_peer;
 
-/**
- * Task that sends FIND FINGER TRAIL requests.
- */
-static GNUNET_SCHEDULER_TaskIdentifier find_finger_trail_task;
+  /**
+   * Peer identity closest to this value will be finger of
+   * source_peer.
+   */
+  uint64_t ultimate_destination_finger_value;
+
+  /**
+   * Is source_peer trying to setup the trail to its predecessor or finger.
+   */
+  uint32_t is_predecessor;
+
+  /**
+   * Identifier for the trail that source peer is trying to setup.
+   */
+  struct GNUNET_HashCode trail_id;
+  
+  /**
+   * Relative time for which congested_peer will remain congested.
+   */
+  struct GNUNET_TIME_Relative congestion_time;
+
+  /* Trail_list from source_peer to peer which sent the message for trail setup
+   * to congested peer. This trail does NOT include source_peer.
+   struct GNUNET_PeerIdnetity trail[]*/
+};
 
 /**
- * FIXME: As we should check for our immediate successor
- * in case of node join/fail, the immediate successor will change. 
- * Hence we define a process which will be scheduled in regular interval.
- * But you should schedule this process once you have found your successor.
- * so, in finger_table_add_entry, when finger_peermap is size 1 then start
- * this task, and periodically call it within it self like find_finger_trail_setup
- * 
- * Task that periodically checks for the immediate successor. 
+ * P2P Add Trail Message.
  */
-static GNUNET_SCHEDULER_TaskIdentifier verify_successor;
+struct PeerAddTrailMessage
+{
+  /**
+   * Type: #GNUNET_MESSAGE_TYPE_DHT_P2P_ADD_TRAIL
+   */
+  struct GNUNET_MessageHeader header;
+
+  /**
+   * Source of the routing trail.
+   */
+  struct GNUNET_PeerIdentity source_peer;
+
+  /**
+   * Destination of the routing trail.
+   */
+  struct GNUNET_PeerIdentity destination_peer;
+
+  /**
+   * Unique identifier of the trail from source_peer to destination_peer,
+   * NOT including the endpoints.
+   */
+  struct GNUNET_HashCode trail_id;
+
+  /* Trail from source peer to destination peer, NOT including them.
+   * struct GNUNET_PeerIdentity trail[]
+   */
+};
+
+GNUNET_NETWORK_STRUCT_END
 
 /**
- * Identity of this peer.
+ * Linked list of messages to send to a particular other peer.
  */
-static struct GNUNET_PeerIdentity my_identity;
+struct P2PPendingMessage
+{
+  /**
+   * Pointer to next item in the list
+   */
+  struct P2PPendingMessage *next;
+
+  /**
+   * Pointer to previous item in the list
+   */
+  struct P2PPendingMessage *prev;
+
+  /**
+   * Message importance level.  FIXME: used? useful?
+   */
+  unsigned int importance;
+
+  /**
+   * When does this message time out?
+   */
+  struct GNUNET_TIME_Absolute timeout;
+
+  /**
+   * Actual message to be sent, allocated at the end of the struct:
+   * // msg = (cast) &pm[1];
+   * // memcpy (&pm[1], data, len);
+   */
+  const struct GNUNET_MessageHeader *msg;
+
+};
+
+
+/**
+ *  Entry in friend_peermap.
+ */
+struct FriendInfo
+{
+  /**
+   * Friend Identity
+   */
+  struct GNUNET_PeerIdentity id;
+
+  /**
+   * Number of trails for which this friend is the first hop or if the friend
+   * is finger. 
+   */
+  unsigned int trails_count;
+
+  /**
+   * Count of outstanding messages for this friend.
+   */
+  unsigned int pending_count;
+
+  /**
+   * In case not 0, then amount of time for which this friend is congested.
+   */
+  struct GNUNET_TIME_Absolute congestion_timestamp;
+
+  /**
+   * Head of pending messages to be sent to this friend.
+   */
+  struct P2PPendingMessage *head;
+
+  /**
+   * Tail of pending messages to be sent to this friend.
+   */
+  struct P2PPendingMessage *tail;
+
+  /**
+   * Core handle for sending messages to this friend.
+   */
+  struct GNUNET_CORE_TransmitHandle *th;
+
+};
+
+/**
+ * An individual element of the trail to reach to a finger.
+ */
+struct Trail_Element 
+{
+  /**
+    * Pointer to next item in the list
+    */
+  struct Trail_Element *next;
+
+  /**
+    * Pointer to prev item in the list
+    */
+  struct Trail_Element *prev;
+
+  /**
+   * An element in this trail.
+   */
+  struct GNUNET_PeerIdentity peer;
+};
+
+/**
+ * FIXME: removed first_friend_trails_count, need to write a function
+ * to calculate each time we need it. Else, keep a pointer to first
+ * friend of in the trail. 
+ * Information about an individual trail. 
+ */
+struct Trail 
+{
+  /**
+   * Head of trail.
+   */
+  struct Trail_Element *trail_head;
+
+  /**
+   * Tail of trail.
+   */
+  struct Trail_Element *trail_tail;
+
+  /**
+   * Unique identifier of this trail.
+   */
+  struct GNUNET_HashCode trail_id;
+
+  /**
+   * Length of trail pointed
+   */
+  unsigned int trail_length;
+};
+
+/**
+ * An entry in finger_hashmap.
+ */
+struct FingerInfo
+{
+  /**
+   * Finger identity.
+   */
+  struct GNUNET_PeerIdentity finger_identity;
+
+  /**
+   * Index in finger peer map
+   */
+  uint32_t finger_map_index;
+
+  /**
+   * Number of trails setup so far for this finger.
+   * Should not cross MAXIMUM_TRAILS_PER_FINGER.
+   */
+  uint32_t trails_count;
+
+  /**
+   * Array of trails to reach to this finger.
+   */
+  struct Trail trail_list[MAXIMUM_TRAILS_PER_FINGER]; 
+};
+
+/**
+ * FIXME: Need to check if we need all the fields or not. 
+ * Data structure to keep track of closest peer seen so far in find_successor()
+ */
+struct Closest_Peer
+{
+  /**
+   * 64 bit value of the peer
+   */
+  uint64_t value;
+
+  /**
+   * Trail id to reach to peer.
+   */
+  struct GNUNET_HashCode trail_id;
+
+  /**
+   * FIXME: see the usage of this field and write comment. 
+   */
+  struct GNUNET_PeerIdentity next_hop;
+
+  /**
+   * Next destination. In case of friend and my_identity , it is same as next_hop
+   * In case of finger it is finger identity.
+   */
+  struct GNUNET_PeerIdentity best_known_destination;
+};
+
+/**
+ * FIXME: now I have removed the first_friend_trail_count,
+ * Need to update the code to find the count.
+ * Data structure to store the trail chosen to reach to finger.
+ */
+struct Selected_Finger_Trail
+{
+  /**
+   * First friend in the trail to reach finger.
+   */
+  struct FriendInfo friend;
+
+  /**
+   * Identifier of this trail.
+   */
+  struct GNUNET_HashCode trail_id;
+
+  /**
+   * Total number of peers in this trail.
+   */
+  unsigned int trail_length;
+};
+
+/**
+ * Task that sends FIND FINGER TRAIL requests. This task is started when we have
+ * get our first friend.
+ */
+static GNUNET_SCHEDULER_TaskIdentifier find_finger_trail_task;
 
 /**
- * FIXME: Not used anywhere in the code yet. 
- * Hash of the identity of this peer.
+ * Identity of this peer.
  */
-static struct GNUNET_HashCode my_identity_hash;
+static struct GNUNET_PeerIdentity my_identity;
 
 /**
- * Hash map of all the friends of a peer
+ * Peer map of all the friends of a peer
  */
 static struct GNUNET_CONTAINER_MultiPeerMap *friend_peermap;
 
 /**
  * Hash map of all the fingers of a peer
  */
-static struct GNUNET_CONTAINER_MultiPeerMap *finger_peermap;
+static struct GNUNET_CONTAINER_MultiHashMap32 *finger_hashmap;
 
 /**
- * TODO: Ask whats the use of ATS.
- * Handle to ATS.
- */
-static struct GNUNET_ATS_PerformanceHandle *atsAPI;
+ * FIXME: Check if you can replace finger_hashmap by an array of fingers. 
+ * Array of all the fingers. 
+ *
+static struct FingerInfo finger_table [MAX_FINGERS];*/
 
 /**
  * Handle to CORE.
@@ -583,16 +861,19 @@ static struct GNUNET_ATS_PerformanceHandle *atsAPI;
 static struct GNUNET_CORE_Handle *core_api;
 
 /**
- * The current finger index that we have found trail to.
+ * The current finger index that we have want to find trail to. We start the
+ * search with value = 0, i.e. successor  and then go to PREDCESSOR_FINGER_ID
+ * and decrement it. For any index 63 <= index < 0, if finger is same as successor,
+ * we reset this index to 0.
  */
-static unsigned int current_finger_index;
+static unsigned int current_search_finger_index;
 
 
 /**
  * Called when core is ready to send a message we asked for
  * out to the destination.
  *
- * @param cls the 'struct PeerInfo' of the target peer
+ * @param cls the 'struct FriendInfo' of the target friend
  * @param size number of bytes available in buf
  * @param buf where the callee should write the message
  * @return number of bytes written to buf
@@ -605,13 +886,13 @@ core_transmit_notify (void *cls, size_t size, void *buf)
   struct P2PPendingMessage *pending;
   size_t off;
   size_t msize;
-  
+
   peer->th = NULL;
   while ((NULL != (pending = peer->head)) &&
          (0 == GNUNET_TIME_absolute_get_remaining (pending->timeout).rel_value_us))
   {
     peer->pending_count--;
-    GNUNET_CONTAINER_DLL_remove (peer->head, peer->tail, pending);  
+    GNUNET_CONTAINER_DLL_remove (peer->head, peer->tail, pending);
     GNUNET_free (pending);
   }
   if (NULL == pending)
@@ -655,6 +936,7 @@ core_transmit_notify (void *cls, size_t size, void *buf)
                                            &core_transmit_notify, peer);
     GNUNET_break (NULL != peer->th);
   }
+
   return off;
 }
 
@@ -668,18 +950,17 @@ static void
 process_friend_queue (struct FriendInfo *peer)
 {
   struct P2PPendingMessage *pending;
-  
+
   if (NULL == (pending = peer->head))
     return;
   if (NULL != peer->th)
     return;
-  
+
   GNUNET_STATISTICS_update (GDS_stats,
                             gettext_noop
                             ("# Bytes of bandwidth requested from core"),
                             ntohs (pending->msg->size), GNUNET_NO);
-  
-  /* FIXME: Are we correctly initializing importance and pending. */
+
   peer->th =
       GNUNET_CORE_notify_transmit_ready (core_api, GNUNET_NO,
                                          pending->importance,
@@ -692,1168 +973,3605 @@ process_friend_queue (struct FriendInfo *peer)
 
 
 /**
- * SUPU:
- * We add the next destination i.e. friend to which we are sending the packet
- * to our peer list in the calling function and we also increment trail_length
- * in calling function i.e. send_find_finger_trail and handle_dht_p2p_trail_setup.
- * Here we only copy the whole trail into our peer_list. 
- * Setup the trail message and forward it to a friend. 
- * @param source_peer Peer which wants to set up the trail to one of its finger.
- * @param destination_finger Peer to which we want to set up the trail to.
- * @param current_destination Current peer to which this message should be forwarded.
- * @param trail_length Numbers of peers in the trail.
- * @param trail_peer_list peers this request has traversed so far
- * @param successor_flag If 1 then we are looking for trail to our successor. 
+ * Construct a trail setup message and forward it to target_friend
+ * @param source_peer Peer which wants to setup the trail
+ * @param ultimate_destination_finger_value Peer identity closest to this value 
+ *                                          will be finger to @a source_peer
+ * @param best_known_destination Best known destination (could be finger or friend)
+ *                               which should get this message.
+ * @param target_friend Friend to which message is forwarded now.
+ * @param trail_length Total number of peers in trail setup so far.
+ * @param trail_peer_list Trail setup so far
+ * @param is_predecessor Is source_peer looking for trail to a predecessor or not.
+ * @param trail_id Unique identifier for the trail we are trying to setup.
+ * @param intermediate_trail_id Trail id of intermediate trail to reach to 
+ *                              best_known_destination when its a finger. If not 
+ *                              used then set to 0.
  */
 void
-GDS_NEIGHBOURS_handle_trail_setup(struct GNUNET_PeerIdentity *source_peer,
-                                  uint64_t *destination_finger,
-                                  struct FriendInfo *current_destination,
-                                  unsigned int trail_length,
-                                  struct GNUNET_PeerIdentity *trail_peer_list,
-                                  unsigned int successor_flag)
+GDS_NEIGHBOURS_send_trail_setup (struct GNUNET_PeerIdentity source_peer,
+                                 uint64_t ultimate_destination_finger_value,
+                                 struct GNUNET_PeerIdentity best_known_destination,
+                                 struct FriendInfo *target_friend,
+                                 unsigned int trail_length,
+                                 const struct GNUNET_PeerIdentity *trail_peer_list,
+                                 unsigned int is_predecessor,
+                                 struct GNUNET_HashCode trail_id,
+                                 struct GNUNET_HashCode *intermediate_trail_id)
 {
   struct P2PPendingMessage *pending;
   struct PeerTrailSetupMessage *tsm;
   struct GNUNET_PeerIdentity *peer_list;
   size_t msize;
-  
-  msize = sizeof(struct PeerTrailSetupMessage) + 
-          (trail_length * sizeof(struct GNUNET_PeerIdentity));
-  
+
+  msize = sizeof (struct PeerTrailSetupMessage) +
+          (trail_length * sizeof (struct GNUNET_PeerIdentity));
+
   if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
   {
     GNUNET_break (0);
     return;
   }
-  
-  if (current_destination->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
-  {  
+
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
+  {
     GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# P2P messages dropped due to full queue"),
                                1, GNUNET_NO);
   }
-    
-  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize); 
-  pending->importance = 0;    /* FIXME */
+
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
   pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
-  tsm = (struct PeerTrailSetupMessage *) &pending[1]; 
+  tsm = (struct PeerTrailSetupMessage *) &pending[1];
   pending->msg = &tsm->header;
   tsm->header.size = htons (msize);
   tsm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_SETUP);
-  memcpy(&(tsm->destination_finger), destination_finger, sizeof (uint64_t)); //FIXME: Is this copy correct?
-  memcpy(&(tsm->source_peer), source_peer, sizeof (struct GNUNET_PeerIdentity));
-  memcpy(&(tsm->current_destination),&(current_destination->id), sizeof (struct GNUNET_PeerIdentity));
-  tsm->current_destination_type = htonl(FRIEND); 
-  tsm->trail_length = htonl(trail_length); 
-  if(successor_flag == 1)
-    tsm->successor_flag = 1;
-  peer_list = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity) * trail_length); 
-  peer_list = (struct GNUNET_PeerIdentity *) &tsm[1];
-  memcpy(peer_list, trail_peer_list, trail_length * sizeof(struct GNUNET_PeerIdentity));
-  
-  GNUNET_CONTAINER_DLL_insert_tail (current_destination->head, current_destination->tail, pending);
-  current_destination->pending_count++;
-  process_friend_queue (current_destination);
+  tsm->ultimate_destination_finger_value = GNUNET_htonll (ultimate_destination_finger_value);
+  tsm->source_peer = source_peer;
+  tsm->best_known_destination = best_known_destination;
+  tsm->is_predecessor = htonl (is_predecessor);
+  tsm->trail_id = trail_id;
+  
+  if (NULL == intermediate_trail_id)
+    memset (&tsm->intermediate_trail_id, 0, sizeof (tsm->intermediate_trail_id));
+  else
+    tsm->intermediate_trail_id = *intermediate_trail_id;
   
+  if (trail_length > 0)
+  {
+    peer_list = (struct GNUNET_PeerIdentity *) &tsm[1];
+    memcpy (peer_list, trail_peer_list, trail_length * sizeof(struct GNUNET_PeerIdentity));
+  }
+
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
 }
 
+
 /**
- * Handle a tail setup result message. 
- * @param destination_peer Peer which will get the trail to one of its finger.
- * @param source_finger Peer to which the trail has been setup to.
- * @param current_destination Current peer to which this message should be forwarded.
+ * Construct a trail setup result message and forward it to target friend.
+ * @param querying_peer Peer which sent the trail setup request and should get
+ *                      the result back. 
+ * @param Finger Peer to which the trail has been setup to.
+ * @param target_friend Friend to which this message should be forwarded.
  * @param trail_length Numbers of peers in the trail.
- * @param trail_peer_list peers this request has traversed so far 
- * @param current_trail_index Index in trail_peer_list. 
+ * @param trail_peer_list Peers which are part of the trail from q
+ *                        querying_peer to Finger, NOT including them. 
+ * @param is_predecessor Is @a Finger predecessor to @a querying_peer
+ * @param ultimate_destination_finger_value Value to which @a finger is the closest
+ *                                          peer. 
+ * @param trail_id Unique identifier of the trail.
  */
 void
-GDS_NEIGHBOURS_handle_trail_setup_result(struct GNUNET_PeerIdentity *destination_peer,
-                                  struct GNUNET_PeerIdentity *source_finger,
-                                  struct FriendInfo *current_destination,
-                                  unsigned int trail_length,
-                                  const struct GNUNET_PeerIdentity *trail_peer_list,
-                                  unsigned int current_trial_index,
-                                  unsigned int successor_flag)
+GDS_NEIGHBOURS_send_trail_setup_result (struct GNUNET_PeerIdentity querying_peer,
+                                        struct GNUNET_PeerIdentity finger,
+                                        struct FriendInfo *target_friend,
+                                        unsigned int trail_length,
+                                        const struct GNUNET_PeerIdentity *trail_peer_list,
+                                        unsigned int is_predecessor,
+                                        uint64_t ultimate_destination_finger_value,
+                                        struct GNUNET_HashCode trail_id)
 {
   struct P2PPendingMessage *pending;
   struct PeerTrailSetupResultMessage *tsrm;
   struct GNUNET_PeerIdentity *peer_list;
   size_t msize;
-  
-  msize = sizeof(struct PeerTrailSetupMessage) + 
-          (trail_length * sizeof(struct GNUNET_PeerIdentity));
-  
+
+  msize = sizeof (struct PeerTrailSetupResultMessage) +
+          (trail_length * sizeof (struct GNUNET_PeerIdentity));
+
   if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
   {
     GNUNET_break (0);
     return;
   }
-  
-  if (current_destination->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
-  {  
+
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
+  {
     GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# P2P messages dropped due to full queue"),
                                1, GNUNET_NO);
   }
 
-  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize); 
-  pending->importance = 0;    /* FIXME */
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;
   pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
-  tsrm = (struct PeerTrailSetupResultMessage *) &pending[1]; 
+  tsrm = (struct PeerTrailSetupResultMessage *) &pending[1];
   pending->msg = &tsrm->header;
   tsrm->header.size = htons (msize);
   tsrm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_SETUP_RESULT);
-  memcpy(&(tsrm->current_destination), &(current_destination->id), sizeof(struct GNUNET_PeerIdentity));
-  memcpy(&(tsrm->destination_peer), destination_peer, sizeof(struct GNUNET_PeerIdentity));
-  memcpy(&(tsrm->finger), source_finger, sizeof(struct GNUNET_PeerIdentity));
-  tsrm->trail_length = htonl(trail_length);
-  tsrm->current_index = htonl(current_trial_index);
-  tsrm->successor_flag = htonl(successor_flag);
+  tsrm->querying_peer = querying_peer;
+  tsrm->finger_identity = finger;
+  tsrm->is_predecessor = htonl (is_predecessor);
+  tsrm->trail_id = trail_id;
+  tsrm->ulitmate_destination_finger_value = 
+          GNUNET_htonll (ultimate_destination_finger_value);
   peer_list = (struct GNUNET_PeerIdentity *) &tsrm[1];
-  memcpy(peer_list, trail_peer_list, trail_length * sizeof(struct GNUNET_PeerIdentity));
-  
+  if (trail_length > 0)
+  {
+    memcpy (peer_list, trail_peer_list, trail_length * sizeof (struct GNUNET_PeerIdentity));
+  }
   /* Send the message to chosen friend. */
-  GNUNET_CONTAINER_DLL_insert_tail (current_destination->head, current_destination->tail, pending);
-  current_destination->pending_count++;
-  process_friend_queue (current_destination);
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
 }
 
 
 /**
- * This function is called from send_verify_successor_message funciton
- * and handle_dht_p2p_verify_successor. 
- * Construct a PeerVerifySuccessor message and send it to friend.
+ * Send trail rejection message to next_hop
+ * @param source_peer Peer which is trying to setup the trail.
+ * @param ultimate_destination_finger_value Peer closest to this value will be 
+ *                                          @a source_peer's finger
+ * @param congested_peer Peer which sent this message as it is congested.
+ * @param is_predecessor Is source_peer looking for trail to a predecessor or not.
+ * @param trail_peer_list Trails seen so far in trail setup before getting rejected
+ *                        by congested_peer. This does not include @a source_peer
+ * @param trail_length Total number of peers in trail_peer_list, not including
+ *                     @a source_peer
+ * @param trail_id Unique identifier of this trail.
+ * @param congestion_timeout Duration given by congested peer as an estimate of
+ *                           how long it may remain congested.
  */
-void GDS_NEIGUBOURS_handle_verify_successor()
+void
+GDS_NEIGHBOURS_send_trail_rejection (struct GNUNET_PeerIdentity source_peer,
+                                     uint64_t ultimate_destination_finger_value,
+                                     struct GNUNET_PeerIdentity congested_peer,
+                                     unsigned int is_predecessor,
+                                     const struct GNUNET_PeerIdentity *trail_peer_list,
+                                     unsigned int trail_length,
+                                     struct GNUNET_HashCode trail_id,
+                                     struct FriendInfo *target_friend,
+                                     const struct GNUNET_TIME_Relative congestion_timeout)
 {
-  /* In this funciton, you receive 
-   1. successor
-   2. trial to reach that successor
-   3. trail_length.
-   4. current trail index --> this gives the next_hop on whose pending queue you should
-   add the message. */
-}
+  struct PeerTrailRejectionMessage *trm;
+  struct P2PPendingMessage *pending;
+  struct GNUNET_PeerIdentity *peer_list;
+  size_t msize;
 
+  msize = sizeof (struct PeerTrailRejectionMessage) +
+          (trail_length * sizeof (struct GNUNET_PeerIdentity));
 
-/**
- * this function will be called by destination successor. 
- * Construct a PeerVerifySuccessorResult message and send it to friend.
- */
-void GDS_NEIGHBOURS_handle_verify_successor_result()
-{
-  /* In this funciton, you receive 
-   1. successor
-   2. trial to reach that successor
-   3. trail_length.
-   4. current trail index --> this gives the next_hop on whose pending queue you should
-   add the message. */
-}
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
+  }
 
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
+  {
+    GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# P2P messages dropped due to full queue"),
+                               1, GNUNET_NO);
+  }
 
-/**
- * Construct a PeerNotifyNewSuccessor message and send it to friend.
- */
-void GDS_NEIGHBOURS_handle_notify_new_successor()
-{
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;
+  pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
+  trm = (struct PeerTrailRejectionMessage *)&pending[1];
+  pending->msg = &trm->header;
+  trm->header.size = htons (msize);
+  trm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_REJECTION);
+  trm->source_peer = source_peer;
+  trm->congested_peer = congested_peer;
+  trm->congestion_time = congestion_timeout;
+  trm->is_predecessor = htonl (is_predecessor);
+  trm->trail_id = trail_id;
+  trm->ultimate_destination_finger_value = GNUNET_htonll (ultimate_destination_finger_value);
+
+  peer_list = (struct GNUNET_PeerIdentity *) &trm[1];
+  if (trail_length > 0)
+  {
+    memcpy (peer_list, trail_peer_list, trail_length * sizeof (struct GNUNET_PeerIdentity));
+  }
   
+  /* Send the message to chosen friend. */
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
 }
 
 
-/**FIXME: Old implementation just to remove error
- * TODO: Modify this function to handle our get request. 
- * Perform a GET operation.  Forwards the given request to other
- * peers.  Does not lookup the key locally.  May do nothing if this is
- * the only peer in the network (or if we are the closest peer in the
- * network).
- *
- * @param type type of the block
- * @param options routing options
- * @param desired_replication_level desired replication count
- * @param hop_count how many hops did this request traverse so far?
- * @param key key for the content
- * @param xquery extended query
- * @param xquery_size number of bytes in @a xquery
- * @param reply_bf bloomfilter to filter duplicates
- * @param reply_bf_mutator mutator for @a reply_bf
- * @param peer_bf filter for peers not to select (again)
+/**
+ * Construct a verify successor message and forward it to target_friend.
+ * @param source_peer Peer which wants to verify its successor.
+ * @param successor Peer which is @a source_peer's current successor.
+ * @param trail_id Unique Identifier of trail from @a source_peer to @a successor,
+ *                 NOT including them. 
+ * @param trail List of peers which are part of trail to reach from @a source_peer
+ *              to @a successor, NOT including them. 
+ * @param trail_length Total number of peers in @a trail.
+ * @param target_friend Next friend to get this message. 
  */
 void
-GDS_NEIGHBOURS_handle_get (enum GNUNET_BLOCK_Type type,
-                           enum GNUNET_DHT_RouteOption options,
-                           uint32_t desired_replication_level,
-                           uint32_t hop_count, const struct GNUNET_HashCode * key,
-                           const void *xquery, size_t xquery_size,
-                           const struct GNUNET_CONTAINER_BloomFilter *reply_bf,
-                           uint32_t reply_bf_mutator,
-                           struct GNUNET_CONTAINER_BloomFilter *peer_bf)
-{
-
-  /*
-   1. take the key, get the 64 bit value of the key.
-   2. call find_successor to get the successor of the key.
-   3. successor can be either a friend or finger.
-   4. update the field in get message to reflect if its a friend or finger table
-   5. add the put message to pending message and send it. 
-   */
-}
-
-/**FIXME: Old implementation just to remove error.
- * TODO: Modify this function to handle our put request. 
- * Perform a PUT operation.   Forwards the given request to other
- * peers.   Does not store the data locally.  Does not give the
- * data to local clients.  May do nothing if this is the only
- * peer in the network (or if we are the closest peer in the
- * network).
- *
- * @param type type of the block
- * @param options routing options
- * @param desired_replication_level desired replication count
- * @param expiration_time when does the content expire
- * @param hop_count how many hops has this message traversed so far
- * @param bf Bloom filter of peers this PUT has already traversed
- * @param key key for the content
- * @param put_path_length number of entries in @a put_path
- * @param put_path peers this request has traversed so far (if tracked)
- * @param data payload to store
- * @param data_size number of bytes in @a data
- */
-void
-GDS_NEIGHBOURS_handle_put (enum GNUNET_BLOCK_Type type,
-                           enum GNUNET_DHT_RouteOption options,
-                           uint32_t desired_replication_level,
-                           struct GNUNET_TIME_Absolute expiration_time,
-                           uint32_t hop_count,
-                           struct GNUNET_CONTAINER_BloomFilter *bf,
-                           const struct GNUNET_HashCode *key,
-                           unsigned int put_path_length,
-                           struct GNUNET_PeerIdentity *put_path,
-                           const void *data, size_t data_size)
-{
-
-   /*
-   1. take the key, get the 64 bit value of the key.
-   2. call find_successor to get the successor of the key.
-   3. successor can be either a friend or finger.
-   4. update the field in put message to reflect if its a friend or finger table
-   5. add the put message to pending message and send it. 
-   */
-}
+GDS_NEIGHBOURS_send_verify_successor_message (struct GNUNET_PeerIdentity source_peer,
+                                              struct GNUNET_PeerIdentity successor,
+                                              const struct GNUNET_HashCode trail_id,
+                                              struct GNUNET_PeerIdentity *trail,
+                                              unsigned int trail_length,
+                                              struct FriendInfo *target_friend)
+{
+  struct PeerVerifySuccessorMessage *vsm;
+  struct P2PPendingMessage *pending;
+  struct GNUNET_PeerIdentity *peer_list;
+  size_t msize;
 
+  msize = sizeof (struct PeerVerifySuccessorMessage);
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
+  }
 
-/**
- * FIXME: Check if this function actually iterates or not. 
- * Randomly choose one of your friends from the friends_peer map
- * @return Friend
- */
-static struct FriendInfo *
-select_random_friend()
-{  
-  unsigned int current_size;
-  unsigned int *index; 
-  unsigned int j = 0;
-  struct GNUNET_CONTAINER_MultiPeerMapIterator *iter;
-  struct GNUNET_PeerIdentity key_ret;
-  struct FriendInfo *friend;
-  
-  current_size = GNUNET_CONTAINER_multipeermap_size(friend_peermap);
-  
-  /* Element stored at this index in friend_peermap should be selected friend. */
-  index = GNUNET_CRYPTO_random_permute (GNUNET_CRYPTO_QUALITY_WEAK, current_size);
-  
-  /* Create an iterator for friend_peermap. */
-  iter = GNUNET_CONTAINER_multipeermap_iterator_create(friend_peermap);
-  
-  /* Set the position of iterator to index. */
-  while(j < (*index))
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
   {
-    if(GNUNET_YES == GNUNET_CONTAINER_multipeermap_iterator_next(iter,NULL,NULL))
-    {
-      /* FIXME: I don't think we are actually incrementing iter. iter is always
-       pointing to the same element. */
-      j++;
-    }
-    else 
-      return NULL;
-  }  
+    GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# P2P messages dropped due to full queue"),
+                               1, GNUNET_NO);
+  }
+
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;    /* FIXME */
+  pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
+  vsm = (struct PeerVerifySuccessorMessage *) &pending[1];
+  pending->msg = &vsm->header;
+  vsm->header.size = htons (msize);
+  vsm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_VERIFY_SUCCESSOR);
+  vsm->source_peer = source_peer;
+  vsm->successor = successor;
+  vsm->trail_id = trail_id;
   
-  if(GNUNET_YES == GNUNET_CONTAINER_multipeermap_iterator_next(iter,&key_ret,(const void **)&friend))
+  if (trail_length > 0)
   {
-    return friend;
+    peer_list = (struct GNUNET_PeerIdentity *) &vsm[1];
+    memcpy (peer_list, trail, trail_length * sizeof (struct GNUNET_PeerIdentity));
   }
 
-  return NULL;
+  /* Send the message to chosen friend. */
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
 }
 
 
 /**
- * Compute finger_identity to which we want to setup the trail
- * FIXME: If we maintain a index that is value of current_finger_index
- * to which a particular entry in finger map corresponds then should we first
- * check if there is already an entry for that index. If yes then don't
- * search for trail to that finger. 
- * @return finger_identity 
+ * FIXME: check if we can merge send_trail_teardown and trail_compression
+ * Construct a trail teardown message and send it to target_friend
+ * @param source_peer Source of the trail.
+ * @param destination_peer Destination of the trail.
+ * @param trail_id Unique identifier of the trail.
+ * @param trail_direction Direction of trail.
+ * @param target_friend Friend to get this message.
  */
-static uint64_t *
-compute_finger_identity()
+void
+GDS_NEIGHBOURS_send_trail_teardown (struct GNUNET_PeerIdentity source_peer,
+                                    struct GNUNET_PeerIdentity destination_peer,
+                                    struct GNUNET_HashCode trail_id,
+                                    enum GDS_ROUTING_trail_direction trail_direction,
+                                    struct FriendInfo *target_friend)
 {
-  uint64_t *my_id64 ;
-  uint64_t *finger_identity64;
-  
-  my_id64 = GNUNET_malloc (sizeof (uint64_t));
-  finger_identity64 = GNUNET_malloc (sizeof (uint64_t));
-  
-  memcpy(my_id64, &(my_identity.public_key.q_y), sizeof (uint64_t));
-  *finger_identity64 = fmod ((*my_id64 + pow (2,current_finger_index)),( (pow (2,MAX_FINGERS))));
-  
-  return finger_identity64;
-}
+  struct PeerTrailTearDownMessage *ttdm;
+  struct P2PPendingMessage *pending;
+  size_t msize;
 
+  msize = sizeof (struct PeerTrailTearDownMessage);
 
-/**
- * TODO: Implement after testing friend/finger map.
- * TODO: Handle the case when we already have a trail to our predecessor in
- * the network. 
- * This function will be needed when we are handling node joins/fails
- * to maintain correct pointer to our predecessor and successor in the network. 
- * Find immediate predecessor in the network.
- * @param me my own identity
- * @return peer identity of immediate predecessor.
- */
-static uint64_t *
-find_immediate_predecessor()
-{
-  /* Using your own peer identity, calculate your predecessor
-   * in the network. Try to setup path to this predecessor using
-   * the same logic as used for other fingers. 
-   * If we already have a trail to our predecessor then send NULL and 
-   * calling function should be able to handle that case.
-  */
-  /* FIXME: O could be a valid peer id, return something else. */
-  return 0;
-}
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
+  }
 
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
+  {
+    GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# P2P messages dropped due to full queue"),
+                               1, GNUNET_NO);
+  }
 
-/**
- * Periodically verify your own immediate successor and 
- * tell your successor about yourself. 
- * 
- * @param cls closure for this task
- * @param tc the context under which the task is running
- */
-static void
-send_verify_successor_message(void *cls,
-          const struct GNUNET_SCHEDULER_TaskContext *tc )
-{
-  /* 
-   * FIXME:
-   * Should we have a new message type
-   * 1. like who is your predecessor.
-   * 2. notify
-   In this function
-   1. ask your immediate successor ( its stored in your finger table with 
-   field that notes that its immediate successor) who is its predecessor.
-   2. Then after getting the reply, check if its you.
-   3. If not then update the new successor and your successor
-   and notify the new successor that you are its new predecessor.
-   */
-  
-  /* okay so you first need to construct a messsage that you want to send 
-   to your "successor". but here you should just call another function which 
-   will construct the message and send it to first friend in the trial to 
-   reach our successor. */
-  struct GNUNET_TIME_Relative next_send_time;
-  //struct GNUNET_PeerIdentity *successor;
-  //struct FingerInfo *finger;
-  
-  /* Iterate over your finger peermap to find the element with successor field set.
-   That field is your successor. */
-  
-  /* In this function you should send your successor id, trail to reach that successor,
-   trail_length, current_trial_index. */
-  GDS_NEIGUBOURS_handle_verify_successor();
-  
-  /* FIXME: Use a random value so that this message is send not at the same
-   interval as send_find_finger_trail_message. */
-  next_send_time.rel_value_us =
-      DHT_MINIMUM_FIND_FINGER_TRAIL_INTERVAL.rel_value_us +
-      GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
-                                DHT_MAXIMUM_FIND_FINGER_TRAIL_INTERVAL.rel_value_us /
-                                (current_finger_index + 1));
-  verify_successor =
-      GNUNET_SCHEDULER_add_delayed (next_send_time, &send_verify_successor_message,
-                                    NULL);
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;    /* FIXME */
+  pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
+  ttdm = (struct PeerTrailTearDownMessage *) &pending[1];
+  pending->msg = &ttdm->header;
+  ttdm->header.size = htons (msize);
+  ttdm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_TEARDOWN);
+  ttdm->source_peer = source_peer;
+  ttdm->destination_peer = destination_peer;
+  ttdm->TRAIL_ID = trail_id;
+  ttdm->trail_direction = htonl (trail_direction);
+
+  /* Send the message to chosen friend. */
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
 }
 
 
 /**
- * Task to send a find finger trail message. We attempt to find trail
- * to our finger and successor in the network.
- *
- * @param cls closure for this task
- * @param tc the context under which the task is running
+ * Construct a verify successor result message and send it to target_friend
+ * @param querying_peer Peer which sent the verify successor message. 
+ * @param source_successor Current_successor of @a querying_peer. 
+ * @param current_predecessor Current predecessor of @a successor. Could be same
+ *                            or different from @a querying_peer.
+ * @param trail_id Unique identifier of the trail from @a querying_peer to 
+ *                 @a successor, NOT including them.
+ * @param trail List of peers which are part of trail from @a querying_peer to 
+ *                 @a successor, NOT including them.
+ * @param trail_length Total number of peers in @a trail
+ * @param trail_direction Direction in which we are sending the message. In this
+ *                        case we are sending result from @a successor to @a querying_peer.
+ * @param target_friend Next friend to get this message. 
  */
-static void
-send_find_finger_trail_message (void *cls,
-                        const struct GNUNET_SCHEDULER_TaskContext *tc)
+void
+GDS_NEIGHBOURS_send_verify_successor_result (struct GNUNET_PeerIdentity querying_peer,
+                                             struct GNUNET_PeerIdentity source_successor,
+                                             struct GNUNET_PeerIdentity current_predecessor,
+                                             struct GNUNET_HashCode trail_id,
+                                             const struct GNUNET_PeerIdentity *trail,
+                                             unsigned int trail_length,
+                                             enum GDS_ROUTING_trail_direction trail_direction,
+                                             struct FriendInfo *target_friend)
 {
-  struct FriendInfo *friend;
-  struct GNUNET_TIME_Relative next_send_time;
-  uint64_t *finger_identity; /* FIXME: Better variable name */ 
+  struct PeerVerifySuccessorResultMessage *vsmr;
+  struct P2PPendingMessage *pending;
   struct GNUNET_PeerIdentity *peer_list;
-  unsigned int successor_flag; /* set to 1 if we are looking for first finger/
-  our succcessor, else 0. */
-
-  /* We already have found trail to each of our possible fingers in the network. */
-  if (GNUNET_CONTAINER_multipeermap_size (finger_peermap) == MAX_FINGERS)
-  {
-    /* FIXME: I call find_immediate_predecessor when I have found trail to 
-     * all the possible fingers in the network. But we need to find immediate
-     * predecessor when there is a node failure/join. It may happen before.
-     * Think of a better strategy to decide when to call this function. 
-     * We can find trail to our immediate predecessor in the network.
-     * I think its better to call this after we have trail to our successor set up.
-     */  
-    finger_identity = find_immediate_predecessor();  
-    
-    if(NULL == finger_identity)
-    {
-      /* We already have a trail to reach to immediate predecessor. */
-      goto new_find_finger_trail_request;
-    }
+  size_t msize;
+
+  msize = sizeof (struct PeerVerifySuccessorResultMessage) +
+          (trail_length * sizeof(struct GNUNET_PeerIdentity));
+
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
   }
-  else
+
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
   {
-    finger_identity = compute_finger_identity();
-    
-    if(finger_identity == NULL)
-    {
-      goto new_find_finger_trail_request;
-    }
+    GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# P2P messages dropped due to full queue"),
+                               1, GNUNET_NO);
   }
+
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;    /* FIXME */
+  pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
+  vsmr = (struct PeerVerifySuccessorResultMessage *) &pending[1];
+  pending->msg = &vsmr->header;
+  vsmr->header.size = htons (msize);
+  vsmr->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_VERIFY_SUCCESSOR_RESULT);
+  vsmr->querying_peer = querying_peer;
+  vsmr->source_successor = source_successor;
+  vsmr->current_predecessor = current_predecessor;
+  vsmr->trail_direction = htonl (trail_direction);
+  vsmr->trail_id = trail_id;
   
-  if(0 == current_finger_index)
+  if (trail_length > 0)
   {
-    /* We are searching for our successor in the network. */
-    successor_flag = 1;
-  }
-  friend = GNUNET_malloc (sizeof (struct FriendInfo));
-  friend = select_random_friend();
-  /* We found a friend.*/
-  if(NULL != friend)
-  { 
-    unsigned int trail_length = 2;
-    peer_list = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity) * trail_length);
-    memcpy(&peer_list[0], &(my_identity), sizeof (struct GNUNET_PeerIdentity)); 
-    memcpy(&peer_list[1], &(friend->id), sizeof (struct GNUNET_PeerIdentity)); 
-    GDS_NEIGHBOURS_handle_trail_setup(&my_identity, finger_identity, 
-                                      friend, trail_length, peer_list,successor_flag);
+    peer_list = (struct GNUNET_PeerIdentity *) &vsmr[1];
+    memcpy (peer_list, trail, trail_length * sizeof (struct GNUNET_PeerIdentity));
   }
-  
-  /* FIXME: Should we be using current_finger_index to generate random interval.*/
-  new_find_finger_trail_request:
-  next_send_time.rel_value_us =
-      DHT_MINIMUM_FIND_FINGER_TRAIL_INTERVAL.rel_value_us +
-      GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
-                                DHT_MAXIMUM_FIND_FINGER_TRAIL_INTERVAL.rel_value_us /
-                                (current_finger_index + 1));
-  find_finger_trail_task =
-      GNUNET_SCHEDULER_add_delayed (next_send_time, &send_find_finger_trail_message,
-                                    NULL);
+
+   /* Send the message to chosen friend. */
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
 }
 
 
 /**
- * Method called whenever a peer connects.
- *
- * @param cls closure
- * @param peer peer identity this notification is about
+ * Construct a notify new successor message and send it to target_friend
+ * @param source_peer Peer which wants to notify to its new successor that it
+ *                    could be its predecessor. 
+ * @param successor New successor of @a source_peer
+ * @param successor_trail List of peers in Trail to reach from 
+ *                            @a source_peer to @a new_successor, NOT including 
+ *                            the endpoints. 
+ * @param successor_trail_length Total number of peers in @a new_successor_trail.
+ * @param successor_trail_id Unique identifier of @a new_successor_trail. 
+ * @param target_friend Next friend to get this message. 
  */
-static void
-handle_core_connect (void *cls, const struct GNUNET_PeerIdentity *peer)
+void
+GDS_NEIGHBOURS_send_notify_new_successor (struct GNUNET_PeerIdentity source_peer,
+                                          struct GNUNET_PeerIdentity successor,
+                                          struct GNUNET_PeerIdentity *successor_trail,
+                                          unsigned int successor_trail_length,
+                                          struct GNUNET_HashCode succesor_trail_id,
+                                          struct FriendInfo *target_friend)
 {
-  struct FriendInfo *ret;
-  
-  /* Check for connect to self message */
-  if (0 == memcmp (&my_identity, peer, sizeof (struct GNUNET_PeerIdentity)))
-    return;
-  
-  GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
-             "Connected to %s\n",
-              GNUNET_i2s (peer));
-  
-  /* If peer already exists in our friend_peermap, then exit. */
-  if (GNUNET_YES ==
-      GNUNET_CONTAINER_multipeermap_contains (friend_peermap,
-                                              peer))
+  struct PeerNotifyNewSuccessorMessage *nsm;
+  struct P2PPendingMessage *pending;
+  struct GNUNET_PeerIdentity *peer_list;
+  size_t msize;
+
+  msize = sizeof (struct PeerNotifyNewSuccessorMessage) +
+          (successor_trail_length * sizeof(struct GNUNET_PeerIdentity));
+
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
   {
     GNUNET_break (0);
     return;
   }
 
-  GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# peers connected"), 1,
-                            GNUNET_NO);
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
+  {
+    GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# P2P messages dropped due to full queue"),
+                               1, GNUNET_NO);
+  }
 
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;    /* FIXME */
+  pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
+  nsm = (struct PeerNotifyNewSuccessorMessage *) &pending[1];
+  pending->msg = &nsm->header;
+  nsm->header.size = htons (msize);
+  nsm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_NOTIFY_NEW_SUCCESSOR);
+  nsm->new_successor = successor;
+  nsm->source_peer = source_peer;
+  nsm->trail_id = succesor_trail_id;
   
-  ret = GNUNET_new (struct FriendInfo);
-  ret->id = *peer;
-  
-  GNUNET_assert (GNUNET_OK ==
-                 GNUNET_CONTAINER_multipeermap_put (friend_peermap,
-                                                    peer, ret,
-                                                    GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
+  if (successor_trail_length > 0)
+  {
+    peer_list = (struct GNUNET_PeerIdentity *) &nsm[1];
+    memcpy (peer_list, successor_trail,
+            successor_trail_length * sizeof (struct GNUNET_PeerIdentity));
+  }
 
-  
-  /* got a first connection, good time to start with FIND FINGER TRAIL requests... */
-  if (1 == GNUNET_CONTAINER_multipeermap_size (friend_peermap))
-    find_finger_trail_task = GNUNET_SCHEDULER_add_now (&send_find_finger_trail_message, NULL);
+   /* Send the message to chosen friend. */
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
 }
 
 
 /**
- * FIXME: Implement after testing finger/friend table setup.
- * Method called whenever a peer disconnects.
- *
- * @param cls closure
- * @param peer peer identity this notification is about
+ * Construct an add_trail message and send it to target_friend
+ * @param source_peer Source of the trail.
+ * @param destination_peer Destination of the trail.
+ * @param trail_id Unique identifier of the trail from 
+ *                 @a source_peer to @a destination_peer, NOT including the endpoints.
+ * @param trail List of peers in Trail from @a source_peer to @a destination_peer,
+ *              NOT including the endpoints. 
+ * @param trail_length Total number of peers in @a trail.
+ * @param target_friend Next friend to get this message.
  */
-static void
-handle_core_disconnect (void *cls,
-                       const struct GNUNET_PeerIdentity *peer)
+void
+GDS_NEIGHBOURS_send_add_trail (struct GNUNET_PeerIdentity source_peer,
+                               struct GNUNET_PeerIdentity destination_peer,
+                               struct GNUNET_HashCode trail_id,
+                               struct GNUNET_PeerIdentity *trail,
+                               unsigned int trail_length,
+                               struct FriendInfo *target_friend)
 {
-  /**
-   * 1. remove the friend from the friend map.
-   * 2. remove the trail for the fingers for which this peer was the first hop.
-   * 3. start send_find_finger_trail for these fingers to find a new trail 
-   * in the network.
-   * 4. Also when a node gets disconnected, how should we update pointers of its
-   * immediate successor and predecessor in the network ?
-   * 5. Also how do we distribute the keys in the network?
-   * 6. Here is case where we started put operation but a peer got disconnected and 
-      we removed the entry from the table. How to handle such a case. 
-   */
-}
+  struct PeerAddTrailMessage *adm;
+  struct GNUNET_PeerIdentity *peer_list;
+  struct P2PPendingMessage *pending;
+  size_t msize;
 
+  msize = sizeof (struct PeerAddTrailMessage) +
+          (trail_length * sizeof(struct GNUNET_PeerIdentity));
 
-/**
- * To be called on core init/fail.
- *
- * @param cls service closure
- * @param identity the public identity of this peer
- */
-static void
-core_init (void *cls,
-           const struct GNUNET_PeerIdentity *identity)
-{
-  my_identity = *identity;
-  GNUNET_CRYPTO_hash (identity,
-                     sizeof (struct GNUNET_PeerIdentity),
-                     &my_identity_hash);
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
+  }
+
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
+  {
+    GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# P2P messages dropped due to full queue"),
+                               1, GNUNET_NO);
+  }
+
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;    /* FIXME */
+  pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
+  adm = (struct PeerAddTrailMessage *) &pending[1];
+  pending->msg = &adm->header;
+  adm->header.size = htons (msize);
+  adm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_ADD_TRAIL);
+  adm->source_peer = source_peer;
+  adm->destination_peer = destination_peer;
+  adm->trail_id = trail_id;
+
+  if (trail_length > 0)
+  {
+    peer_list = (struct GNUNET_PeerIdentity *)&adm[1];
+    memcpy (peer_list, trail, sizeof (struct GNUNET_PeerIdentity) * trail_length);
+  }
+
+  /* Send the message to chosen friend. */
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
 
 }
 
 
 /**
- * Core handler for p2p put requests.
- *
- * @param cls closure
- * @param peer sender of the request
- * @param message message
- * @param peer peer identity this notification is about
- * @return #GNUNET_OK to keep the connection open,
- *         #GNUNET_SYSERR to close it (signal serious error)
+ * FIXME: Merge into "teardown", add source and "last/new_first" in message struct.
+ * Construct a trail compression message and send it to target_friend.
+ * @param source_peer Source of the trail.
+ * @param destination_finger Destination of trail.
+ * @param trail_id Unique identifier of trail.
+ * @param first_friend First hop in compressed trail to reach from source to finger
+ * @param target_friend Next friend to get this message.
  */
-static int
-handle_dht_p2p_put (void *cls,
-                   const struct GNUNET_PeerIdentity *peer,
-                    const struct GNUNET_MessageHeader *message)
+void
+GDS_NEIGHBOURS_send_trail_compression (struct GNUNET_PeerIdentity source_peer,
+                                       struct GNUNET_PeerIdentity destination_peer,
+                                       struct GNUNET_HashCode trail_id,
+                                       struct GNUNET_PeerIdentity first_friend,
+                                       struct FriendInfo *target_friend)
 {
-    /**
-    1. Check if destination is friend or finger.
-    2. If finger then get the next hop from routing table and 
-     * call GDS_NEGIHBOURS_handle_get.
-    3. If friend then call find_successor to get the next hop and again
-     * call GDS_NEIGHBOURS_handle_get to send to chosen hop.
-     4. If you are the destination then do datacache_store.
-     */
-  return 0;
+  struct P2PPendingMessage *pending;
+  struct PeerTrailCompressionMessage *tcm;
+  size_t msize;
+
+  msize = sizeof (struct PeerTrailCompressionMessage);
+
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
+  }
+
+  if (target_friend->pending_count >= MAXIMUM_PENDING_PER_FRIEND)
+  {
+    GNUNET_STATISTICS_update (GDS_stats,
+                              gettext_noop ("# P2P messages dropped due to full queue"),
+                                                     1, GNUNET_NO);
+  }
+
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;    /* FIXME */
+  pending->timeout = GNUNET_TIME_relative_to_absolute (GET_TIMEOUT);
+  tcm = (struct PeerTrailCompressionMessage *) &pending[1];
+  pending->msg = &tcm->header;
+  tcm->header.size = htons (msize);
+  tcm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_COMPRESSION);
+  tcm->source_peer = source_peer;
+  tcm->new_first_friend = first_friend;
+  tcm->trail_id = trail_id;
+  tcm->destination_peer = destination_peer;
+
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
+
 }
 
 
 /**
- * Core handler for p2p get requests.
- *
- * @param cls closure
- * @param peer sender of the request
- * @param message message
- * @return #GNUNET_OK to keep the connection open,
- *         #GNUNET_SYSERR to close it (signal serious error)
+ * Search my location in trail.
+ * @param trail List of peers
+ * @return my_index if found
+ *         -1 if no entry found.
  */
 static int
-handle_dht_p2p_get (void *cls, const struct GNUNET_PeerIdentity *peer,
-                    const struct GNUNET_MessageHeader *message)
+search_my_index (const struct GNUNET_PeerIdentity *trail,
+                 int trail_length)
 {
-  /**
-    1. Check if destination is friend or finger.
-    2. If finger then get the next hop from routing table and 
-     * call GDS_NEGIHBOURS_handle_get.
-    3. If friend then call find_successor to get the next hop and again
-     * call GDS_NEIGHBOURS_handle_get to send to chosen hop.
-     4. If you are the destination then send the data back to source peer
-   * Assuming we have trail setup we can
-   * either store the whole trail or again do the search process..
-     */
-  return 0;
+  int i;
+
+  for (i = 0; i < trail_length; i++)
+  {
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity (&my_identity, &trail[i]))
+      return i;
+  }
+
+  return -1;
 }
 
 /**
- * Compare two peer identities.  Used with qsort or bsearch.
- *
- * @param p1 Some peer identity.
- * @param p2 Some peer identity.
- * @return 1 if p1 > p2, -1 if p1 < p2 and 0 if p1 == p2.
+ * Check if the friend is congested or have reached maximum number of trails
+ * it can be part of of. 
+ * @param friend Friend to be chechked.
+ * @return #GNUNET_YES if friend is not congested or have not crossed threshold.
+ *         #GNUNET_NO if friend is either congested or have crossed threshold 
  */
 static int
-peer_id_cmp (const void *p1, const void *p2)
+is_friend_congested (struct FriendInfo *friend)
 {
-  return memcmp (p1, p2, sizeof (uint64_t));
+  if ((friend->trails_count == TRAILS_THROUGH_FRIEND_THRESHOLD)||
+      ((0 != GNUNET_TIME_absolute_get_remaining
+             (friend->congestion_timestamp).rel_value_us)))
+    return GNUNET_YES;
+  else
+    return GNUNET_NO;
 }
 
+
 /**
- * Returns the previous element of value in all_known_peers.
- * @param all_known_peers list of all the peers
- * @param value value we have to search in the all_known_peers.
- * @return 
+ * FIXME: here we should also check if iterator is null or not. It can be NULL
+ * only if we insert randomly at locations. But as we are using trails_count
+ * as the parameter, it should not happen.
+ * Iterate over the list of all the trails of a finger. In case the first
+ * friend to reach the finger has reached trail threshold or is congested,
+ * then don't select it. In case there multiple available good trails to reach
+ * to Finger, choose the one with shortest trail length.
+ * Note: We use length as parameter. But we can use any other suitable parameter
+ * also. 
+ * @param finger Finger
+ * @return struct Selected_Finger_Trail which contains the first friend , trail id
+ * and trail length. NULL in case none of the trails are free.
  */
-static struct GNUNET_PeerIdentity *
-binary_search(struct GNUNET_PeerIdentity *all_known_peers, uint64_t *value,
-              unsigned int size)
+static struct Selected_Finger_Trail *
+select_finger_trail (struct FingerInfo *finger)
 {
-  unsigned int first;
-  unsigned int last;
-  unsigned int middle;
-  struct GNUNET_PeerIdentity *successor;
-  successor = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity));
-  
-  first = 0;
-  last = size - 1;
-  middle = (first + last)/2;
+  struct FriendInfo *friend;
+  struct Trail *iterator;
+  struct Selected_Finger_Trail *finger_trail;
+  unsigned int i;
+
+  finger_trail = GNUNET_new (struct Selected_Finger_Trail);
   
-  while(first <= last)
+  for (i = 0; i < finger->trails_count; i++)
   {
-    /* all_known_peers[middle] > value*/
-    if(0 > peer_id_cmp(&all_known_peers[middle], &value))
-    {
-      first = middle + 1; 
-    }
-    else if(0 == peer_id_cmp(&all_known_peers[middle], &value))
-    {
-      if(middle == 0)
-      {
-        successor = &(all_known_peers[size - 1]);
-      }
-      else
-        successor = &(all_known_peers[middle-1]);
-    }
-    else
+    iterator = &finger->trail_list[i];
+    friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                &iterator->trail_head->peer);
+    if (GNUNET_YES == is_friend_congested (friend))
+      continue;
+   
+    /* Check if the trail length of this trail is least seen so far. If yes then
+     set finger_trail to this trail.*/
+    if (finger_trail->trail_length > iterator->trail_length)
     {
-       last = middle - 1;
+      finger_trail->friend = *friend;
+      finger_trail->trail_id = iterator->trail_id;
+      finger_trail->trail_length = iterator->trail_length;
     }
-  
-    middle = (first + last)/2;  
   }
-  return successor;
-}
 
+  /* No trail found. */  
+  if (i == finger->trails_count)
+    finger_trail = NULL;
+  
+  return finger_trail;
+}
 
 
 /**
- * Find closest successor for the value.
- * @param value Value for which we are looking for successor
- * @param current_destination NULL if my_identity is successor else finger/friend 
- * identity 
- * @param type Next destination type
- * @return Peer identity of next destination i.e. successor of value. 
+ * Select closest finger to value.
+ * @param peer1 First peer
+ * @param peer2 Second peer
+ * @param value Value to be compare
+ * @return Closest peer
  */
 static struct GNUNET_PeerIdentity *
-find_successor(uint64_t *value, struct GNUNET_PeerIdentity *current_destination,
-               enum current_destination_type *type)
-{
-  /* 1. Create an array and copy all the peer identites from finger_peermap, 
-   friend_peermap, your own identity and value you are searching. 
-   2. Sort the array. 
-   3. Do a binary search on array to find the location of your value. 
-   4. previous element of the value is your successor. 
-   5. search for the successor in friend/finger/my_identity .
-   6. if my_identity, then return NULL and set type to my_identity 
-   7. if friend, then return friend->id and set type to friend.
-   8. if finger, then set current_destination = finger and return the first
-   element from the trail list of finger as next_hop. */
-  struct GNUNET_CONTAINER_MultiPeerMapIterator *friend_iter;
-  struct GNUNET_CONTAINER_MultiPeerMapIterator *finger_iter;
-  struct GNUNET_PeerIdentity key_ret;
-  struct FriendInfo *friend;
+select_closest_finger (struct GNUNET_PeerIdentity *peer1,
+                       struct GNUNET_PeerIdentity *peer2,
+                       uint64_t value)
+{
+#if 0
+  uint64_t peer1_value;
+  uint64_t peer2_value;
+
+  memcpy (&peer1_value, peer1, sizeof (uint64_t));
+  memcpy (&peer2_value, peer2, sizeof (uint64_t));
+
+  if ((peer1_value <= value) && (value <= peer2_value))
+    return peer2;
+  else if ((peer2_value <= value) && (value <= peer1_value))
+    return peer1;
+  else if ((peer1_value <= peer2_value) && (peer2_value <= value))
+    return peer1;
+  else if ((peer2_value <= peer1_value) && (peer1_value <= value))
+    return peer2;
+  else if ((value <= peer1_value) && (peer1_value <= peer2_value))
+    return peer1;
+  else /*if ((value <= peer2_value) && (peer2_value <= peer1_value))*/
+    return peer2;
+#endif
+  return NULL;
+}
+
+
+/**
+ * Select closest predecessor to value.
+ * @param peer1 First peer
+ * @param peer2 Second peer
+ * @param value Value to be compare
+ * @return Closest peer
+ */
+static struct GNUNET_PeerIdentity *
+select_closest_predecessor (struct GNUNET_PeerIdentity *peer1,
+                            struct GNUNET_PeerIdentity *peer2,
+                            uint64_t value)
+{
+  #if 0
+  uint64_t peer1_value;
+  uint64_t peer2_value;
+
+  memcpy (&peer1_value, peer1, sizeof (uint64_t));
+  memcpy (&peer2_value, peer2, sizeof (uint64_t));
+
+#endif
+  return NULL;
+}
+
+
+/**
+ * Select the closest peer among two peers (which should not be same)
+ * with respect to value and finger_map_index
+ * @param peer1 First peer
+ * @param peer2 Second peer
+ * @param value Value relative to which we find the closest
+ * @param finger_map_index Index in finger map. If equal to PREDECESSOR_FINGER_ID,
+ *                         then we use different logic than other
+ *                         finger_map_index
+ * @return Closest peer among two peers.
+ */
+static struct GNUNET_PeerIdentity *
+select_closest_peer (struct GNUNET_PeerIdentity *peer1,
+                     struct GNUNET_PeerIdentity *peer2,
+                     uint64_t value,
+                     unsigned int finger_map_index)
+{
+  struct GNUNET_PeerIdentity *closest_peer;
+
+  if (PREDECESSOR_FINGER_ID == finger_map_index)
+    closest_peer = select_closest_predecessor (peer1, peer2, value);
+  else
+    closest_peer = select_closest_finger (peer1, peer2, value);
+
+  return closest_peer;
+}
+
+
+/**
+ * Find the successor for destination_finger_value among my_identity, all my
+ * friend and all my fingers. Don't consider friends or fingers
+ * which are congested or have crossed the threshold.
+ * @param destination_finger_value Peer closest to this value will be the next successor.
+ * @param next_destination [out] Updated to friend identity in case a friend is
+ *                               successor, updated to first friend to reach to finger
+ *                               in case finger is the destination.
+ * @param new_intermediate_trail_id [out] In case we finger is the @a next_destination,
+ *                                then we updated the field with trail id to reach
+ *                                to that finger.
+ * @param finger_map_index Index in finger peermap for which we are
+ *                         looking for a finger, to discern between
+ *                         IS_PREDECESSOR or not.
+ * @return Closest successor for value. 
+ */
+static struct GNUNET_PeerIdentity *
+find_successor (uint64_t destination_finger_value,
+                struct GNUNET_PeerIdentity *best_known_destination,
+                struct GNUNET_HashCode *new_intermediate_trail_id,
+                unsigned int finger_map_index)
+{
+  struct Closest_Peer *current_successor;
+  struct GNUNET_PeerIdentity *next_hop;
+  struct GNUNET_CONTAINER_MultiPeerMapIterator *friend_iter;
+  struct GNUNET_CONTAINER_MultiHashMap32Iterator *finger_iter;
+  struct Selected_Finger_Trail *finger_trail;
+  struct FriendInfo *friend;
   struct FingerInfo *finger;
-  unsigned int finger_index;
-  unsigned int friend_index;
-  struct GNUNET_PeerIdentity *all_known_peers;
-  struct GNUNET_PeerIdentity *successor;
-  unsigned int size;
+  int i;
+  
+  /* Initialize current_successor to my_identity. */
+  current_successor = GNUNET_new (struct Closest_Peer);
+  memcpy (&current_successor->value, &my_identity, sizeof (uint64_t));
+  memset (&current_successor->trail_id, 0, sizeof (current_successor->trail_id)); 
+  current_successor->next_hop = my_identity;
+  current_successor->best_known_destination = my_identity;
+  
+  /* Iterate over friend_peermap and compare each friend with current_successor.*/
+  friend_iter = GNUNET_CONTAINER_multipeermap_iterator_create (friend_peermap);
+  for (i= 0; i < GNUNET_CONTAINER_multipeermap_size (friend_peermap); i++)
+  {
+    GNUNET_assert (GNUNET_YES ==
+      GNUNET_CONTAINER_multipeermap_iterator_next (friend_iter, NULL,
+                                                  (const void **)&friend));
+    
+    if (GNUNET_YES == is_friend_congested (friend))
+      continue;
+    
+    /* FIXME: select closest peer w.r.t. value. [friend_id, current_successor->id)
+     and [current_successor->id, friend_id). Check in which range value lies.
+     Also, check for wrap around. Set the value of current_successor accordingly.*/
+  }
+  
+  /* Iterate over finger_hashmap and compare each finger with current_successor.*/
+  finger_iter = GNUNET_CONTAINER_multihashmap32_iterator_create (finger_hashmap);
+  for (i = 0; i < GNUNET_CONTAINER_multihashmap32_size (finger_hashmap); i++)
+  {
+    GNUNET_assert (GNUNET_YES ==
+      GNUNET_CONTAINER_multihashmap32_iterator_next (finger_iter, NULL,
+                                                     (void *)&finger));
+    
+    /* If I am my own finger, then ignore this finger. */
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity (&finger->finger_identity,
+                                            &my_identity))
+      continue;
+    
+    /* If finger is friend. */
+    if(GNUNET_CONTAINER_multipeermap_get (friend_peermap, &finger->finger_identity))
+    {
+      /* If not congested then compare it with current_successor. */
+      if (GNUNET_NO == is_friend_congested (friend))
+      {
+        //compare it with current successor.   
+      }
+    }
+    /* Choose one of the trail to reach to finger. */
+    finger_trail = select_finger_trail (finger);
+    
+    /* In case no trail found, ignore this finger. */
+    if (NULL == finger_trail)
+      continue;
+    
+    /* FIXME: select closest peer w.r.t. value. [finger->friend_id, current_successor->id)
+     and [current_successor->id, finger->friend_id). Check in which range value lies.
+     Also, check for wrap around. But this will give you the immediate predecessor
+     For example. if we have 0,1,6 and I am 0 and one of my finger is 6. Then
+     for 1, we will have ranges like [0,6) and [6,0) 1 lies in range from [0,6)
+     but successor is 6 not 0 as 6 is > than 1. If you are the closest one, 
+     then set the values
+     in current_successor. Want to write a generic code so that it is used in 
+     * finger_table_add also while choosing the closest one among new and existing
+     * one. */
+  }
+  
+  best_known_destination = &current_successor->best_known_destination;
+  new_intermediate_trail_id = &current_successor->trail_id;
+  next_hop = &current_successor->next_hop;
+
+  return next_hop;
+}
+
+
+/**
+ * Construct a Put message and send it to target_peer.
+ * @param key Key for the content
+ * @param block_type Type of the block
+ * @param options Routing options
+ * @param desired_replication_level Desired replication count
+ * @param best_known_dest Peer to which this message should reach eventually,
+ *                        as it is best known destination to me. 
+ * @param intermediate_trail_id Trail id in case 
+ * @param target_peer Peer to which this message will be forwarded.
+ * @param hop_count Number of hops traversed so far.
+ * @param put_path_length Total number of peers in @a put_path
+ * @param put_path Number of peers traversed so far
+ * @param expiration_time When does the content expire
+ * @param data Content to store
+ * @param data_size Size of content @a data in bytes
+ */
+void
+GDS_NEIGHBOURS_send_put (const struct GNUNET_HashCode *key,
+                         enum GNUNET_BLOCK_Type block_type,
+                                          enum GNUNET_DHT_RouteOption options,
+                                          uint32_t desired_replication_level,
+                                          struct GNUNET_PeerIdentity *best_known_dest,
+                                          struct GNUNET_HashCode *intermediate_trail_id,
+                                          struct GNUNET_PeerIdentity *target_peer,
+                         uint32_t hop_count,
+                         uint32_t put_path_length,
+                         struct GNUNET_PeerIdentity *put_path,
+                         struct GNUNET_TIME_Absolute expiration_time,
+                         const void *data, size_t data_size)
+{
+  struct PeerPutMessage *ppm;
+  struct P2PPendingMessage *pending;
+  struct FriendInfo *target_friend;
+  struct GNUNET_PeerIdentity *pp;
+  size_t msize;
+
+  msize = put_path_length * sizeof (struct GNUNET_PeerIdentity) + data_size +
+          sizeof (struct PeerPutMessage);
+  
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    put_path_length = 0;
+    msize = data_size + sizeof (struct PeerPutMessage);
+  }
+  
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
+  }
+  
+   /* This is the first call made from clients file. So, we should search for the
+     target_friend. */
+  if (NULL == target_peer)
+  {
+    uint64_t key_value;
+    struct GNUNET_PeerIdentity *next_hop;
+   
+    memcpy (&key_value, key, sizeof (uint64_t));
+    next_hop = find_successor (key_value, best_known_dest, 
+                               intermediate_trail_id, GDS_FINGER_TYPE_NON_PREDECESSOR);
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity(next_hop, &my_identity)) 
+    {
+      /* I am the destination but we have already done datacache_put in client file.  */
+      return;
+    }
+    else
+      target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);   
+  }
+  
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->timeout = expiration_time;
+  ppm = (struct PeerPutMessage *) &pending[1];
+  pending->msg = &ppm->header;
+  ppm->header.size = htons (msize);
+  ppm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_PUT);
+  ppm->options = htonl (options);
+  ppm->block_type = htonl (block_type);
+  ppm->hop_count = htonl (hop_count + 1);
+  ppm->desired_replication_level = htonl (desired_replication_level);
+  ppm->put_path_length = htonl (put_path_length);
+  ppm->expiration_time = GNUNET_TIME_absolute_hton (expiration_time);
+  ppm->best_known_destination = *best_known_dest;
+  ppm->key = *key;
+  if (NULL == intermediate_trail_id)
+    memset (&ppm->intermediate_trail_id, 0, sizeof (ppm->intermediate_trail_id));
+  else
+    ppm->intermediate_trail_id = *intermediate_trail_id;
+  pp = (struct GNUNET_PeerIdentity *) &ppm[1];
+  if (put_path_length != 0)
+  {
+    memcpy (pp, put_path,
+            sizeof (struct GNUNET_PeerIdentity) * put_path_length);
+  }
+  memcpy (&pp[put_path_length], data, data_size);
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
+}
+
+
+
+/**
+ * Construct a Get message and send it to target_peer.
+ * @param key Key for the content
+ * @param block_type Type of the block
+ * @param options Routing options
+ * @param desired_replication_level Desired replication count
+ * @param best_known_dest 
+ * @param intermediate_trail_id 
+ * @param target_peer Peer to which this message will be forwarded.
+ * @param hop_count Number of hops traversed so far.
+ * @param data Content to store
+ * @param data_size Size of content @a data in bytes
+ * @param get_path_length Total number of peers in @a get_path
+ * @param get_path Number of peers traversed so far
+ */
+void
+GDS_NEIGHBOURS_send_get (const struct GNUNET_HashCode *key,
+                         enum GNUNET_BLOCK_Type block_type,
+                         enum GNUNET_DHT_RouteOption options,
+                         uint32_t desired_replication_level,
+                         struct GNUNET_PeerIdentity *best_known_dest,
+                         struct GNUNET_HashCode *intermediate_trail_id,
+                         struct GNUNET_PeerIdentity *target_peer,
+                         uint32_t hop_count,
+                         uint32_t get_path_length,
+                         struct GNUNET_PeerIdentity *get_path)
+{
+  struct PeerGetMessage *pgm;
+  struct P2PPendingMessage *pending;
+  struct FriendInfo *target_friend;
+  struct GNUNET_PeerIdentity *gp;
+  size_t msize;
+
+  msize = sizeof (struct PeerGetMessage) + 
+          (get_path_length * sizeof (struct GNUNET_PeerIdentity));
+  
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
+  }
+  
+  if (NULL == target_peer)
+  {
+    struct GNUNET_PeerIdentity *next_hop;
+    uint64_t key_value;
+    
+    memcpy (&key_value, key, sizeof (uint64_t));
+       // FIXME: endianess of key_value!?
+     /* FIXME: Here you should use enum GDS_NEIGHBOURS_FINGER_TYPE in place of 0. */
+    next_hop = find_successor (key_value, best_known_dest,
+                               intermediate_trail_id, GDS_FINGER_TYPE_NON_PREDECESSOR);
+    
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity(&my_identity,next_hop)) 
+    {
+      GDS_DATACACHE_handle_get (key,block_type, NULL, 0, 
+                                NULL, 0, 1, &my_identity, NULL,&my_identity);
+      return;
+    }
+    else
+    {
+      target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);
+    }
+  }
+  
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;    /* FIXME */
+  pgm = (struct PeerGetMessage *) &pending[1];
+  pending->msg = &pgm->header;
+  pgm->header.size = htons (msize);
+  pgm->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_GET);
+  pgm->get_path_length = htonl (get_path_length);
+  pgm->key = *key;
+  pgm->best_known_destination = *best_known_dest;
+  pgm->intermediate_trail_id = *intermediate_trail_id;
+  pgm->hop_count = htonl (hop_count + 1);
+  
+  if (get_path != 0)
+  {
+    gp = (struct GNUNET_PeerIdentity *) &pgm[1];
+    memcpy (gp, get_path, get_path_length * sizeof (struct GNUNET_PeerIdentity));
+  }
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
+}
+
+
+/**
+ * Send the get result to requesting client.
+ * @param key Key of the requested data.
+ * @param type Block type
+ * @param target_peer Next peer to forward the message to.
+ * @param source_peer Peer which has the data for the key.
+ * @param put_path_length Number of peers in @a put_path
+ * @param put_path Path taken to put the data at its stored location.
+ * @param get_path_length Number of peers in @a get_path
+ * @param get_path Path taken to reach to the location of the key.
+ * @param expiration When will this result expire?
+ * @param data Payload to store
+ * @param data_size Size of the @a data
+ */
+void
+GDS_NEIGHBOURS_send_get_result (const struct GNUNET_HashCode *key,
+                                enum GNUNET_BLOCK_Type type,
+                                struct GNUNET_PeerIdentity *target_peer,
+                                struct GNUNET_PeerIdentity *source_peer,
+                                unsigned int put_path_length,
+                                const struct GNUNET_PeerIdentity *put_path,
+                                unsigned int get_path_length,
+                                struct GNUNET_PeerIdentity *get_path,
+                                struct GNUNET_TIME_Absolute expiration,
+                                const void *data, size_t data_size)
+{
+  struct PeerGetResultMessage *get_result;
+  struct GNUNET_PeerIdentity *get_result_path;
+  struct GNUNET_PeerIdentity *pp;
+  struct P2PPendingMessage *pending;
+  struct FriendInfo *target_friend;
+  int current_path_index;
+  size_t msize;
+  
+  msize = get_path_length * sizeof (struct GNUNET_PeerIdentity) + data_size +
+          sizeof (struct PeerPutMessage);
+  if (msize >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
+  {
+    GNUNET_break (0);
+    return;
+  }
+  
+  if(get_path_length > 0)
+  {
+    current_path_index = search_my_index(get_path, get_path_length);
+    if (GNUNET_SYSERR == current_path_index)
+    {
+      GNUNET_break (0);
+      return;
+    }
+  }
+  if (0 == current_path_index)
+  {
+    GDS_CLIENTS_handle_reply (expiration, key, get_path_length, 
+                              get_path, put_path_length,
+                              put_path, type, data_size, data);
+    return;
+  }
+  
+  pending = GNUNET_malloc (sizeof (struct P2PPendingMessage) + msize);
+  pending->importance = 0;   
+  get_result = (struct PeerGetResultMessage *)&pending[1];
+  pending->msg = &get_result->header;
+  get_result->header.size = htons (msize);
+  get_result->header.type = htons (GNUNET_MESSAGE_TYPE_DHT_P2P_GET_RESULT);
+  get_result->key = *key;
+  /* FIXME: check if you are passing the correct querying_peer as described in
+   the get_result documentation. */
+  memcpy (&(get_result->querying_peer), source_peer, sizeof (struct GNUNET_PeerIdentity));
+  get_result->expiration_time = expiration;
+  
+  if (get_path_length != 0)
+  {
+    get_result_path = (struct GNUNET_PeerIdentity *)&get_result[1];
+    memcpy (get_result_path, get_path,
+            sizeof (struct GNUNET_PeerIdentity) * get_path_length);
+  }
+  memcpy (&get_result_path[get_path_length], data, data_size);
+  
+  /* FIXME: Is this correct? */
+  if (put_path_length != 0)
+  {
+    pp = (struct GNUNET_PeerIdentity *)&get_result_path[1];
+    memcpy (pp, put_path,sizeof (struct GNUNET_PeerIdentity) * put_path_length);
+  }
+  
+  target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, 
+                                                     &get_result_path[current_path_index - 1]);
+  GNUNET_CONTAINER_DLL_insert_tail (target_friend->head, target_friend->tail, pending);
+  target_friend->pending_count++;
+  process_friend_queue (target_friend);
+}
+
+
+/**
+ * Randomly choose one of your friends (which is not congested and have not crossed
+ * trail threshold) from the friends_peer map
+ * @return Friend Randomly chosen friend.
+ *         NULL in case friend peermap is empty, or all the friends are either
+ *              congested or have crossed trail threshold.
+ */
+static struct FriendInfo *
+select_random_friend ()
+{
+  unsigned int current_size;
+  uint32_t index;
+  unsigned int j = 0;
+  struct GNUNET_CONTAINER_MultiPeerMapIterator *iter;
+  struct GNUNET_PeerIdentity key_ret;
+  struct FriendInfo *friend;
+
+  current_size = GNUNET_CONTAINER_multipeermap_size (friend_peermap);
+  if (0 == current_size)
+    return NULL;
+
+  index = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, current_size);
+  iter = GNUNET_CONTAINER_multipeermap_iterator_create (friend_peermap);
+
+  for (j = 0; j < index ; j++)
+    GNUNET_assert (GNUNET_YES ==
+                   GNUNET_CONTAINER_multipeermap_iterator_next (iter, NULL, NULL));
+  do
+  {
+    if (j == current_size)
+    {
+      j = 0;
+      GNUNET_CONTAINER_multipeermap_iterator_destroy (iter);
+      iter = GNUNET_CONTAINER_multipeermap_iterator_create (friend_peermap);
+
+    }
+    GNUNET_assert (GNUNET_YES ==
+                GNUNET_CONTAINER_multipeermap_iterator_next (iter,
+                                                             &key_ret,
+                                                             (const void **)&friend));
+
+
+    if ((TRAILS_THROUGH_FRIEND_THRESHOLD == friend->trails_count) &&
+        (0 == GNUNET_TIME_absolute_get_remaining (friend->congestion_timestamp).rel_value_us))
+    {
+      break;
+    }
+    friend = NULL;
+    j++;
+  } while (j != index);
+
+  GNUNET_CONTAINER_multipeermap_iterator_destroy (iter);
+  return friend;
+}
+
+
+/**
+ * FIXME: pass current_search_finger_index as parameter
+ * Compute finger_identity to which we want to setup the trail
+ * @return finger_identity
+ */
+static uint64_t
+compute_finger_identity_value ()
+{
+  uint64_t my_id64;
+
+  memcpy (&my_id64, &my_identity, sizeof (uint64_t));
+  my_id64 = GNUNET_ntohll (my_id64);
+  return (my_id64 + (unsigned long) pow (2, current_search_finger_index));
+}
+
+
+/**
+ * Compute immediate predecessor identity in the network.
+ * @return peer identity of immediate predecessor.
+ */
+static uint64_t
+compute_predecessor_identity_value ()
+{
+  uint64_t my_id64;
+
+  memcpy (&my_id64, &my_identity, sizeof (uint64_t));
+  my_id64 = GNUNET_ntohll (my_id64);
+  return (my_id64 -1);
+}
+
+
+/*
+ * Choose a random friend and start looking for the trail to reach to
+ * finger identity through this random friend.
+ *
+ * @param cls closure for this task
+ * @param tc the context under which the task is running
+ */
+static void
+send_find_finger_trail_message (void *cls,
+                                const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  struct FriendInfo *target_friend;
+  struct GNUNET_TIME_Relative next_send_time;
+  struct GNUNET_HashCode trail_id;
+  unsigned int is_predecessor;
+  uint64_t finger_id_value;
+
+  next_send_time.rel_value_us =
+      DHT_FIND_FINGER_TRAIL_INTERVAL.rel_value_us +
+      GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
+                                DHT_FIND_FINGER_TRAIL_INTERVAL.rel_value_us);
+  find_finger_trail_task =
+      GNUNET_SCHEDULER_add_delayed (next_send_time, &send_find_finger_trail_message,
+                                    NULL);
+
+  target_friend = select_random_friend ();
+  if (NULL == target_friend)
+  {
+    return;
+  }
+
+  if (PREDECESSOR_FINGER_ID == current_search_finger_index)
+  {
+    finger_id_value = compute_predecessor_identity_value();
+    is_predecessor = 0;
+  }
+  else
+  {
+    finger_id_value = compute_finger_identity_value();
+    is_predecessor = 1;
+  }
+
+  GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_STRONG,
+                              &trail_id, sizeof (trail_id));
+  GDS_NEIGHBOURS_send_trail_setup (my_identity, finger_id_value,
+                                   target_friend->id, target_friend, 0, NULL,
+                                   is_predecessor, trail_id, NULL);
+}
+
+
+/**
+ * In case there are already maximum number of possible trails to reach to a
+ * finger, then check if the new trail's length is lesser than any of the
+ * existing trails.
+ * If yes then replace that old trail by new trail.
+ *
+ * Note: Here we are taking length as a parameter to choose the best possible
+ * trail, but there could be other parameters also like:
+ * 1. duration of existence of a trail - older the better.
+ * 2. if the new trail is completely disjoint than the
+ *    other trails, then may be choosing it is better.
+ *
+ * @param existing_finger
+ * @param new_finger_trail
+ * @param new_finger_trail_length
+ * @param new_finger_trail_id
+ */
+static void
+select_and_replace_trail (struct FingerInfo *existing_finger,
+                          const struct GNUNET_PeerIdentity *new_trail,
+                          unsigned int new_trail_length,
+                          struct GNUNET_HashCode new_trail_id)
+{
+  struct Trail *trail_list_iterator;
+  unsigned int largest_trail_length;
+  unsigned int largest_trail_index;
+  struct Trail_Element *trail_element;
+  unsigned int i;
+
+  largest_trail_length = new_trail_length;
+  largest_trail_index = MAXIMUM_TRAILS_PER_FINGER + 1;
+
+  GNUNET_assert (MAXIMUM_TRAILS_PER_FINGER == existing_finger->trails_count);
+
+  for (i = 0; i < existing_finger->trails_count; i++)
+  {
+    trail_list_iterator = &existing_finger->trail_list[i];
+    if (trail_list_iterator->trail_length > largest_trail_length)
+    {
+      largest_trail_length = trail_list_iterator->trail_length;
+      largest_trail_index = i;
+    }
+  }
+
+  if (largest_trail_index == (MAXIMUM_TRAILS_PER_FINGER + 1))
+  {
+    // tear down new trail: it's not better than the existing ones
+    return;
+  }
+
+  /* Send trail teardown message across the replaced trail. */
+  struct Trail *replace_trail = &existing_finger->trail_list[largest_trail_index];
+  struct FriendInfo *target_friend =
+      GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                         &replace_trail->trail_head->peer);
+
+  GDS_NEIGHBOURS_send_trail_teardown (my_identity,
+                                      existing_finger->finger_identity,
+                                      replace_trail->trail_id,
+                                      GDS_ROUTING_SRC_TO_DEST, target_friend);
+  /* Free the trail. */
+  while (NULL != (trail_element = replace_trail->trail_head))
+  {
+    GNUNET_CONTAINER_DLL_remove (replace_trail->trail_head,
+                                 replace_trail->trail_tail, trail_element);
+    GNUNET_free (trail_element);
+  }
+
+  /* Add new trial at that location. */
+  i = 0;
+  while (i < new_trail_length)
+  {
+    struct Trail_Element *element = GNUNET_new (struct Trail_Element);
+    element->peer = new_trail[i];
+
+    GNUNET_CONTAINER_DLL_insert_tail (replace_trail->trail_head,
+                                      replace_trail->trail_tail,
+                                      element);
+  }
+}
+
+
+/**
+ * Check if the new trail to reach to finger is unique or do we already have
+ * such a trail present for finger.
+ * @param existing_finger Finger identity
+ * @param new_trail New trail to reach @a existing_finger
+ * @param trail_length Total number of peers in new_trail.
+ * @return #GNUNET_YES if the new trail is unique
+ *         #GNUNET_NO if same trail is already present.
+ */
+static int
+is_new_trail_unique (struct FingerInfo *existing_finger,
+                     const struct GNUNET_PeerIdentity *new_trail,
+                     unsigned int trail_length)
+{
+  struct Trail *trail_list_iterator;
+  struct Trail_Element *trail_element;
+  int i;
+  int j;
+  int trail_unique = GNUNET_NO;
+
+  for (i = 0; i < existing_finger->trails_count; i++)
+  {
+    trail_list_iterator = &existing_finger->trail_list[i];
+    if (trail_list_iterator->trail_length != trail_length)
+      continue;
+    trail_element = trail_list_iterator->trail_head;
+    for (j = 0; j < trail_list_iterator->trail_length; j++)
+    {
+      if (0 != GNUNET_CRYPTO_cmp_peer_identity (&new_trail[j],
+                                                &trail_element->peer))
+      {
+        trail_unique = GNUNET_YES;
+        break;
+      }
+    }
+  }
+  return trail_unique;
+}
+
+
+/**
+ * Add a new trail to existing finger.
+ * @param existing_finger
+ * @param new_finger_trail
+ * @param new_finger_trail_length
+ * @param new_finger_trail_id
+ */
+static void
+add_new_trail (struct FingerInfo *existing_finger,
+               const struct GNUNET_PeerIdentity *new_trail,
+               unsigned int new_trail_length,
+               struct GNUNET_HashCode new_trail_id)
+{
+  struct Trail *trail_list_iterator;
+  struct FriendInfo *first_friend;
+  int i;
+
+  if (GNUNET_NO == is_new_trail_unique (existing_finger, new_trail,
+                                        new_trail_length))
+  {
+    return;
+  }
+
+  // FIXME checking trail_head is NOT a valid way to verify an open slot
+  for (i = 0; existing_finger->trail_list[i].trail_head != NULL; i++)
+    GNUNET_assert (i < MAXIMUM_TRAILS_PER_FINGER);
+
+  trail_list_iterator = &existing_finger->trail_list[i];
+
+  if (new_trail_length > 0)
+    first_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                      &new_trail[0]);
+  else
+    first_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                      &(existing_finger->finger_identity));
+  first_friend->trails_count++;
+  /* FIXME; we removed this field but read fixme. */
+  //trail_list_iterator->first_friend_trail_count = first_friend->trails_count;
+  trail_list_iterator->trail_length = new_trail_length;
+
+  for (i = 0; i < new_trail_length; i++)
+  {
+    struct Trail_Element *element;
+    element = GNUNET_new (struct Trail_Element);
+
+    element->peer = new_trail[i];
+    GNUNET_CONTAINER_DLL_insert_tail (trail_list_iterator->trail_head,
+                                      trail_list_iterator->trail_tail,
+                                      element);
+  }
+  existing_finger->trails_count++;
+}
+
+
+/**
+ * Send trail teardown message on all trails associated with finger.
+ * @param finger_to_be_removed
+ */
+static void
+send_trail_teardown (struct FingerInfo *finger)
+{
+  struct Trail *trail_list_iterator;
+  struct FriendInfo *target_friend;
+  int i;
+
+  if (0 == GNUNET_CRYPTO_cmp_peer_identity (&finger->finger_identity, &my_identity)
+     || (NULL != GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                    &finger->finger_identity)))
+    return;
+
+  for (i = 0; i < finger->trails_count; i++)
+  {
+    trail_list_iterator = &finger->trail_list[i];
+    if (trail_list_iterator->trail_length > 0)
+    {
+      target_friend =
+              GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                 &trail_list_iterator->trail_head->peer);
+      // check target_friend
+      GDS_NEIGHBOURS_send_trail_teardown (my_identity, finger->finger_identity,
+                                          trail_list_iterator->trail_id,
+                                          GDS_ROUTING_SRC_TO_DEST,
+                                          target_friend);
+    }
+  }
+}
+
+
+/**
+ * Decrement the trail count of the first friend to reach the finger
+ * In case finger is the friend, then decrement its trail count.
+ * @param finger
+ */
+static void
+decrement_friend_trail_count (struct FingerInfo *finger)
+{
+  struct Trail *trail_list_iterator;
+  struct FriendInfo *target_friend;
+  int i = 0;
+
+  if (0 == GNUNET_CRYPTO_cmp_peer_identity (&finger->finger_identity,
+                                            &my_identity))
+    return;
+
+  for (i = 0; i < finger->trails_count; i++)
+  {
+    trail_list_iterator = &finger->trail_list[i];
+    if (trail_list_iterator->trail_length > 0)
+      target_friend =
+              GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                 &trail_list_iterator->trail_head->peer);
+    else
+     target_friend =
+              GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                 &finger->finger_identity);
+
+    // check target_friend for NULL
+    /* FIXME: we have removed first_friend_trail_count field. */
+   target_friend->trails_count--;
+    //trail_list_iterator->first_friend_trail_count--;
+  }
+  return;
+}
+
+
+/**
+ * Free finger and its trail.
+ * @param finger Finger to be freed.
+ */
+static void
+free_finger (struct FingerInfo *finger)
+{
+  struct Trail *trail_list_iterator;
+  struct Trail_Element *trail_element;
+  unsigned int i;
+
+  for (i = 0; i < finger->trails_count; i++)
+  {
+    trail_list_iterator = &finger->trail_list[i];
+    while (NULL != (trail_element = trail_list_iterator->trail_head))
+    {
+      GNUNET_CONTAINER_DLL_remove (trail_list_iterator->trail_head,
+                                   trail_list_iterator->trail_tail,
+                                   trail_element);
+      GNUNET_free (trail_element);
+    }
+  }
+  GNUNET_free (finger);
+}
+
+
+/**
+ * Add a new entry in finger hashmap at finger_map_index
+ * @param finger_identity Peer Identity of new finger
+ * @param finger_trail Trail to reach from me to finger (excluding both end points).
+ * @param finger_trail_length Total number of peers in @a finger_trail.
+ * @param trail_id Unique identifier of the trail.
+ * @param finger_map_index Index in finger hashmap.
+ * @return #GNUNET_OK if new entry is added
+ *         #GNUNET_NO -- FIXME: need to check what value does hahsmap put
+ *                       returns on failure.
+ */
+static int
+add_new_entry (struct GNUNET_PeerIdentity finger_identity,
+               const struct GNUNET_PeerIdentity *finger_trail,
+               unsigned int finger_trail_length,
+               struct GNUNET_HashCode trail_id,
+               unsigned int finger_map_index)
+{
+  struct FingerInfo *new_entry;
+  struct FriendInfo *first_trail_hop;
+  struct Trail *first_trail;
+  int i = 0;
+
+  new_entry = GNUNET_new (struct FingerInfo);
+  new_entry->finger_identity = finger_identity;
+  new_entry->finger_map_index = finger_map_index;
+  new_entry->trails_count = 1;
+
+  if (0 != GNUNET_CRYPTO_cmp_peer_identity (&my_identity, &finger_identity))
+  {
+    if (finger_trail_length > 0)
+    {
+      first_trail_hop = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                           &finger_trail[0]);
+    }
+    else
+    {
+      first_trail_hop = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                           &finger_identity);
+    }
+
+    first_trail_hop->trails_count++;
+    first_trail = &new_entry->trail_list[0];
+    /* FIXME: We have removed this field. */
+    //first_trail->first_friend_trail_count = first_trail_hop->trails_count;
+
+    while (i < finger_trail_length)
+    {
+      struct Trail_Element *element = GNUNET_new (struct Trail_Element);
+
+      element->next = NULL;
+      element->prev = NULL;
+      element->peer = finger_trail[i];
+      GNUNET_CONTAINER_DLL_insert_tail (first_trail->trail_head,
+                                        first_trail->trail_tail,
+                                        element);
+      i++;
+    }
+  }
+
+  return GNUNET_CONTAINER_multihashmap32_put (finger_hashmap,
+                                              new_entry->finger_map_index,
+                                              new_entry,
+                                              GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY);
+}
+
+
+/**
+ * Scan the trail to check if there is any other friend in the trail other than
+ * first hop. If yes then shortcut the trail, send trail compression message to
+ * peers which are no longer part of trail and send back the updated trail
+ * and trail_length to calling function.
+ * @param finger_identity Finger whose trail we will scan.
+ * @param finger_trail [in, out] Trail to reach from source to finger,
+ * @param finger_trail_length  Total number of peers in original finger_trail.
+ * @param finger_trail_id Unique identifier of the finger trail.
+ * @return updated trail length in case we shortcut the trail, else original
+ *         trail length.
+ */
+static struct GNUNET_PeerIdentity *
+scan_and_compress_trail (struct GNUNET_PeerIdentity finger_identity,
+                         const struct GNUNET_PeerIdentity *trail,
+                         unsigned int trail_length,
+                         struct GNUNET_HashCode trail_id,
+                         int *new_trail_length)
+{
+  struct FriendInfo *target_friend;
+  struct GNUNET_PeerIdentity *new_trail;
+  int i;
+  
+  if (0 == GNUNET_CRYPTO_cmp_peer_identity (&my_identity, &finger_identity))
+  {
+    *new_trail_length = 0;
+    return NULL;
+  }
+
+  if (NULL != GNUNET_CONTAINER_multipeermap_get (friend_peermap, &finger_identity))
+  {
+    if (trail_length > 0)
+    {
+      target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                       &trail[0]);
+      GDS_NEIGHBOURS_send_trail_compression (my_identity, finger_identity,
+                                             trail_id, finger_identity,
+                                             target_friend);
+      *new_trail_length = 0;
+    }
+    return NULL;
+  }
+
+  for (i = trail_length - 1; i > 0; i--)
+  {
+    if (NULL != GNUNET_CONTAINER_multipeermap_get (friend_peermap, &trail[i]))
+    {
+      struct FriendInfo *target_friend;
+      int j = 0;
+
+      target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                         &trail[0]);
+      GDS_NEIGHBOURS_send_trail_compression (my_identity, finger_identity,
+                                             trail_id, trail[i],
+                                             target_friend);
+
+    
+      /* Copy the trail from index i to index trail_length -1 and change
+       trail length and return */
+      new_trail = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity) * i);
+      while (i < trail_length)
+      {
+        memcpy (&new_trail[j], &trail[i], sizeof(struct GNUNET_PeerIdentity));
+        j++;
+        i++;
+      }
+      *new_trail_length = j+1;
+      break;
+      return new_trail;
+    }
+  }
+  *new_trail_length = trail_length;
+  memcpy (new_trail, new_trail, trail_length * sizeof (struct GNUNET_PeerIdentity));
+  return new_trail;
+}
+
+
+/**
+ * FIXME: Ensure that we add trail in succession in the trail list.
+ * There are no free spots within the trail list. 
+ * Send verify successor message to your successor on all trails to reach
+ * the successor.
+ * @param successor My current successor
+ */
+static void
+send_verify_successor_message (struct FingerInfo *successor)
+{
+  struct Trail *trail_list_iterator;
+  struct GNUNET_HashCode trail_id;
+  struct GNUNET_PeerIdentity next_hop;
+  struct FriendInfo *target_friend;
+  struct GNUNET_PeerIdentity *trail;
+  unsigned int trail_length;
+  int i;
+  int j;
+
+  for (i = 0; i < successor->trails_count; i++)
+  {
+    trail_list_iterator = &successor->trail_list[i];
+    GNUNET_assert (NULL != trail_list_iterator->trail_head);
+
+    if (trail_list_iterator->trail_length > 0)
+    {
+      struct Trail_Element *element;
+
+      trail_length = trail_list_iterator->trail_length;
+      trail = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity)
+                             * trail_length);
+      element = trail_list_iterator->trail_head;
+      for (j = 0; j < trail_length; j++, element = element->next)
+        trail[j] = element->peer;
+      next_hop = trail_list_iterator->trail_head->peer;
+    }
+    else
+    {
+      trail = NULL;
+      trail_length = 0;
+      next_hop = successor->finger_identity;
+    }
+    trail_id = trail_list_iterator->trail_id;
+    GNUNET_assert (NULL != (target_friend = 
+                           GNUNET_CONTAINER_multipeermap_get (friend_peermap, &next_hop)));
+    
+    GDS_NEIGHBOURS_send_verify_successor_message (my_identity,
+                                                  successor->finger_identity,
+                                                  trail_id, trail, trail_length,
+                                                  target_friend);
+    GNUNET_free_non_null (trail);
+  }
+}
+
+
+/**
+ * FIXME: Is it safe to assume that current_search_finger_index == finger_map_index?
+ * Update the current search finger index. 
+ */
+static void
+update_current_search_finger_index (struct GNUNET_PeerIdentity new_finger_identity)
+{
+  struct FingerInfo *successor;
+  
+  successor = GNUNET_CONTAINER_multihashmap32_get (finger_hashmap, 0);
+  
+  if (0 == current_search_finger_index)
+  {
+    current_search_finger_index = PREDECESSOR_FINGER_ID;
+
+    if (0 != GNUNET_CRYPTO_cmp_peer_identity (&my_identity, &new_finger_identity))
+    {
+        send_verify_successor_message (successor);
+    }
+  }
+  else if (0 == GNUNET_CRYPTO_cmp_peer_identity (&new_finger_identity,
+                                                  &(successor->finger_identity)))
+  {
+     current_search_finger_index = 0;
+  }
+  else
+     current_search_finger_index = current_search_finger_index - 1;
+}
+
+/**
+ * FIXME: Is it sage to assume that finger_map_index == current_search_finger_index
+ * Calculate finger_map_index from initial value that we send in trail setup
+ * message. 
+ * @param ultimate_destination_finger_value Value that we calculated from our
+ * identity and finger_map_index.
+ * @param is_predecessor Is the entry for predecessor or not. 
+ * @return finger_map_index which is a value between 0 <= finger_map_index <= 64
+ *         -1, if no valid finger_map_index is found. 
+ */
+static int
+get_finger_map_index (uint64_t ultimate_destination_finger_value,
+                      unsigned int is_predecessor)
+{
+  uint64_t my_id64;
+  unsigned int finger_map_index;
+  
+  finger_map_index = -1;
+  memcpy (&my_id64, &my_identity, sizeof (uint64_t));
+  
+  if (is_predecessor)
+  {
+    if(1 == (my_id64 - ultimate_destination_finger_value))
+      finger_map_index = PREDECESSOR_FINGER_ID;
+  }
+  else
+  {
+    finger_map_index = log (ultimate_destination_finger_value - my_id64);
+  }
+  
+  if ((finger_map_index > PREDECESSOR_FINGER_ID) ||
+      (finger_map_index == current_search_finger_index))
+    finger_map_index = -1;
+  
+  return finger_map_index;
+}
+
+
+/**
+ * Check if there is already an entry in finger peermap for given finger map index.
+ * If yes, then select the closest finger. If new and existing finger are same,
+ * the check if you can store more trails. If yes then add trail, else keep the best
+ * trails to reach to the finger. If the new finger is closest, add it.
+ * Then, update current_search_finger_index.
+ * @param new_finger_identity Peer Identity of new finger
+ * @param new_finger_trail Trail to reach the new finger
+ * @param new_finger_length Total number of peers in @a new_finger_trail.
+ * @param is_predecessor Is this entry for predecessor in finger_peermap. 
+ * @param new_finger_trail_id Unique identifier of @new_finger_trail.
+ * @return #GNUNET_YES if the new entry is added
+ *         #GNUNET_NO if new entry is not added, either it was discarded or
+ *                    it was same as existing finger at finger map index.
+ */
+static int
+finger_table_add (struct GNUNET_PeerIdentity finger_identity, 
+                  const struct GNUNET_PeerIdentity *finger_trail, 
+                  unsigned int finger_trail_length,
+                  unsigned int is_predecessor,
+                  uint64_t finger_value,
+                  struct GNUNET_HashCode finger_trail_id)
+{
+  struct FingerInfo *existing_finger;
+  struct GNUNET_PeerIdentity *closest_peer;
+  int updated_finger_trail_length; 
+  struct GNUNET_PeerIdentity *updated_trail;
+  unsigned int finger_map_index;
+  unsigned int new_entry_added;
+  
+  new_entry_added = GNUNET_NO;
+  
+  finger_map_index = get_finger_map_index (finger_value,
+                                           is_predecessor);
+  
+  if (-1 == finger_map_index)
+  {
+    GNUNET_break_op (0);
+    return GNUNET_SYSERR;
+  }
+  
+  updated_trail =
+       scan_and_compress_trail (finger_identity, finger_trail,
+                                finger_trail_length, finger_trail_id, 
+                                &updated_finger_trail_length);
+  
+  existing_finger = GNUNET_CONTAINER_multihashmap32_get (finger_hashmap,
+                                                         finger_map_index);
+  
+  /* No entry present in finger hashmap for given finger map index. */
+  if (NULL == existing_finger)
+  {
+    add_new_entry (finger_identity, updated_trail, updated_finger_trail_length,
+                   finger_trail_id, finger_map_index);
+    update_current_search_finger_index (finger_identity);
+    return GNUNET_YES;
+  }
+  
+  /* If existing entry and finger identity are not same. */
+  if (0 != GNUNET_CRYPTO_cmp_peer_identity (&(existing_finger->finger_identity),
+                                            &finger_identity))
+  {
+    closest_peer = select_closest_peer (&existing_finger->finger_identity,
+                                        &finger_identity,
+                                        finger_value, finger_map_index);
+    
+    /* If the new finger is the closest peer. */
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity (&finger_identity, closest_peer))
+    {
+      GNUNET_assert (0 != GNUNET_CRYPTO_cmp_peer_identity (&my_identity,
+                                                           &finger_identity));
+
+      send_trail_teardown (existing_finger);
+      decrement_friend_trail_count (existing_finger);
+      free_finger (existing_finger);
+      add_new_entry (finger_identity, updated_trail, updated_finger_trail_length,
+                     finger_trail_id, finger_map_index);
+      new_entry_added = GNUNET_YES;
+    }
+  }
+  else
+  {
+    /* If both new and existing entry are same as my_identity, then do nothing. */
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity (&(existing_finger->finger_identity),
+                                              &my_identity))
+    {
+      return GNUNET_NO;
+    }
+    
+    /* If the existing finger is not a friend. */
+    if (NULL ==
+        GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                            &(existing_finger->finger_identity)))
+    {
+      if (existing_finger->trails_count < MAXIMUM_TRAILS_PER_FINGER)
+        add_new_trail (existing_finger, updated_trail,
+                       finger_trail_length, finger_trail_id);
+      else
+        select_and_replace_trail (existing_finger, updated_trail,
+                                  finger_trail_length, finger_trail_id);
+    }
+    new_entry_added = GNUNET_NO;
+  }
+  
+  update_current_search_finger_index (finger_identity);
+  return new_entry_added;
+}
+
+
+/**
+ * Core handler for P2P put messages.
+ * @param cls closure
+ * @param peer sender of the request
+ * @param message message
+ * @return #GNUNET_OK to keep the connection open,
+ *         #GNUNET_SYSERR to close it (signal serious error)
+ */
+static int
+handle_dht_p2p_put (void *cls, const struct GNUNET_PeerIdentity *peer,
+                    const struct GNUNET_MessageHeader *message)
+{
+   struct PeerPutMessage *put;
+  struct GNUNET_PeerIdentity *put_path;
+  struct GNUNET_HashCode test_key;
+  enum GNUNET_DHT_RouteOption options;
+  struct GNUNET_PeerIdentity best_known_dest;
+  struct GNUNET_HashCode intermediate_trail_id;
+  struct GNUNET_PeerIdentity *next_hop;
+  void *payload;
+  size_t msize;
+  uint32_t putlen;
+  size_t payload_size;
+  uint64_t key_value;
+  
+  msize = ntohs (message->size);
+  if (msize < sizeof (struct PeerPutMessage))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+  
+  put = (struct PeerPutMessage *) message;
+  putlen = ntohl (put->put_path_length);
+   
+  if ((msize <
+       sizeof (struct PeerPutMessage) +
+       putlen * sizeof (struct GNUNET_PeerIdentity)) ||
+      (putlen >
+       GNUNET_SERVER_MAX_MESSAGE_SIZE / sizeof (struct GNUNET_PeerIdentity)))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+
+  best_known_dest = put->best_known_destination;
+  put_path = (struct GNUNET_PeerIdentity *) &put[1];
+  payload = &put_path[putlen];
+  options = ntohl (put->options);
+  intermediate_trail_id = put->intermediate_trail_id;
+  
+  payload_size = msize - (sizeof (struct PeerPutMessage) + 
+                          putlen * sizeof (struct GNUNET_PeerIdentity));
+  
+  switch (GNUNET_BLOCK_get_key (GDS_block_context, ntohl (put->block_type),
+                                payload, payload_size, &test_key))
+  {
+    case GNUNET_YES:
+      if (0 != memcmp (&test_key, &put->key, sizeof (struct GNUNET_HashCode)))
+      {
+        char *put_s = GNUNET_strdup (GNUNET_h2s_full (&put->key));
+        GNUNET_break_op (0);
+        GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
+                    "PUT with key `%s' for block with key %s\n",
+                     put_s, GNUNET_h2s_full (&test_key));
+        GNUNET_free (put_s);
+        return GNUNET_YES;
+      }
+    break;
+    case GNUNET_NO:
+      GNUNET_break_op (0);
+      return GNUNET_YES;
+    case GNUNET_SYSERR:
+      /* cannot verify, good luck */
+      break;
+  }
+  
+   if (ntohl (put->block_type) == GNUNET_BLOCK_TYPE_REGEX) /* FIXME: do for all tpyes */
+  {
+    switch (GNUNET_BLOCK_evaluate (GDS_block_context,
+                                   ntohl (put->block_type),
+                                   NULL,    /* query */
+                                   NULL, 0, /* bloom filer */
+                                   NULL, 0, /* xquery */
+                                   payload, payload_size))
+    {
+    case GNUNET_BLOCK_EVALUATION_OK_MORE:
+    case GNUNET_BLOCK_EVALUATION_OK_LAST:
+      break;
+
+    case GNUNET_BLOCK_EVALUATION_OK_DUPLICATE:
+    case GNUNET_BLOCK_EVALUATION_RESULT_INVALID:
+    case GNUNET_BLOCK_EVALUATION_RESULT_IRRELEVANT:
+    case GNUNET_BLOCK_EVALUATION_REQUEST_VALID:
+    case GNUNET_BLOCK_EVALUATION_REQUEST_INVALID:
+    case GNUNET_BLOCK_EVALUATION_TYPE_NOT_SUPPORTED:
+    default:
+      GNUNET_break_op (0);
+      return GNUNET_OK;
+    }
+  }
+  
+  /* extend 'put path' by sender */
+  struct GNUNET_PeerIdentity pp[putlen + 1];
+  if (0 != (options & GNUNET_DHT_RO_RECORD_ROUTE))
+  {
+    memcpy (pp, put_path, putlen * sizeof (struct GNUNET_PeerIdentity));
+    pp[putlen] = *peer;
+    putlen++;
+  }
+  else
+    putlen = 0;
+  
+  memcpy (&key_value, &(put->key), sizeof (uint64_t));
+  if (0 != (GNUNET_CRYPTO_cmp_peer_identity (&best_known_dest, &my_identity)))
+  {
+    next_hop = GDS_ROUTING_get_next_hop (intermediate_trail_id, 
+                                         GDS_ROUTING_SRC_TO_DEST);
+  }
+  else
+  {
+     /*FIXME: Here you should use enum GDS_NEIGHBOURS_FINGER_TYPE in place of 0. */
+    next_hop = find_successor (key_value, &best_known_dest, 
+                               &intermediate_trail_id, GDS_FINGER_TYPE_NON_PREDECESSOR); 
+  }
+  
+  if (NULL == next_hop)
+  {
+    GNUNET_STATISTICS_update (GDS_stats,
+                              gettext_noop ("# Next hop to forward the packet not found "
+                              "trail setup request, packet dropped."),
+                              1, GNUNET_NO);
+    return GNUNET_SYSERR;
+  }
+  
+  GDS_CLIENTS_process_put (options,
+                           ntohl (put->block_type),
+                           ntohl (put->hop_count),
+                           ntohl (put->desired_replication_level),
+                           putlen, pp,
+                           GNUNET_TIME_absolute_ntoh (put->expiration_time),
+                           &put->key,
+                           payload,
+                           payload_size);
+  
+  if (0 == GNUNET_CRYPTO_cmp_peer_identity(&my_identity, next_hop)) /* I am the final destination */
+  {
+    GDS_DATACACHE_handle_put (GNUNET_TIME_absolute_ntoh (put->expiration_time),
+                              &(put->key),putlen, pp, ntohl (put->block_type), 
+                              payload_size, payload);
+    return GNUNET_YES;
+  }
+  else
+  {
+    GDS_NEIGHBOURS_send_put (&put->key,  
+                             ntohl (put->block_type),ntohl (put->options),
+                             ntohl (put->desired_replication_level),
+                             &best_known_dest, &intermediate_trail_id, next_hop,
+                             ntohl (put->hop_count), putlen, pp,
+                             GNUNET_TIME_absolute_ntoh (put->expiration_time),
+                             payload, payload_size);
+     return GNUNET_YES;
+  }
+  return GNUNET_SYSERR;
+}
+
+
+/**
+ * Core handler for p2p get requests.
+ *
+ * @param cls closure
+ * @param peer sender of the request
+ * @param message message
+ * @return #GNUNET_OK to keep the connection open,
+ *         #GNUNET_SYSERR to close it (signal serious error)
+ */
+static int
+handle_dht_p2p_get (void *cls, const struct GNUNET_PeerIdentity *peer,
+                    const struct GNUNET_MessageHeader *message)
+{
+  struct PeerGetMessage *get;
+  struct GNUNET_PeerIdentity *get_path;
+  struct GNUNET_PeerIdentity best_known_dest;
+  struct GNUNET_HashCode intermediate_trail_id;
+  struct GNUNET_PeerIdentity *next_hop;
+  uint32_t get_length;
+  uint64_t key_value;
+  size_t msize;
+  
+  msize = ntohs (message->size);
+  if (msize < sizeof (struct PeerGetMessage))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+  
+  get = (struct PeerGetMessage *)message;
+  get_length = ntohl (get->get_path_length);
+  best_known_dest = get->best_known_destination;
+  intermediate_trail_id = get->intermediate_trail_id;
+  if (get_length > 0)
+    get_path = (struct GNUNET_PeerIdentity *)&get[1];
+  
+  if ((msize <
+       sizeof (struct PeerGetMessage) +
+       get_length * sizeof (struct GNUNET_PeerIdentity)) ||
+       (get_length >
+        GNUNET_SERVER_MAX_MESSAGE_SIZE / sizeof (struct GNUNET_PeerIdentity)))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES; 
+  }
+
+  /* Add sender to get path */
+  struct GNUNET_PeerIdentity gp[get_length + 1];
+  memcpy (gp, get_path, get_length * sizeof (struct GNUNET_PeerIdentity));
+  gp[get_length + 1] = *peer;
+  get_length = get_length + 1;
+  
+  memcpy (&key_value, &(get->key), sizeof (uint64_t));
+  if (0 != (GNUNET_CRYPTO_cmp_peer_identity (&best_known_dest, &my_identity)))
+  {
+    next_hop = GDS_ROUTING_get_next_hop (intermediate_trail_id, 
+                                         GDS_ROUTING_SRC_TO_DEST);
+  }
+  else
+  {
+     /*FIXME: Here you should use enum GDS_NEIGHBOURS_FINGER_TYPE in place of 0. */
+    next_hop = find_successor (key_value, &best_known_dest, 
+                               &intermediate_trail_id, GDS_FINGER_TYPE_NON_PREDECESSOR);  
+  }
+  
+  if (NULL == next_hop)
+  {
+    GNUNET_STATISTICS_update (GDS_stats,
+                              gettext_noop ("# Next hop to forward the packet not found "
+                              "trail setup request, packet dropped."),
+                              1, GNUNET_NO);
+    return GNUNET_SYSERR;
+  }
+  if (0 == GNUNET_CRYPTO_cmp_peer_identity(&my_identity, next_hop))
+  {
+    /* I am the destination.*/
+    struct GNUNET_PeerIdentity final_get_path[get_length+1];
+    struct GNUNET_PeerIdentity next_hop;
+
+    memcpy (final_get_path, gp, get_length * sizeof (struct GNUNET_PeerIdentity));
+    memcpy (&final_get_path[get_length+1], &my_identity, sizeof (struct GNUNET_PeerIdentity));
+    get_length = get_length + 1;
+    memcpy (&next_hop, &final_get_path[get_length-2], sizeof (struct GNUNET_PeerIdentity));
+    GDS_DATACACHE_handle_get (&(get->key),(get->block_type), NULL, 0, NULL, 0,
+                              get_length, final_get_path,&next_hop, &my_identity);
+    
+    return GNUNET_YES;
+  }
+  else
+  {
+    GDS_NEIGHBOURS_send_get (&(get->key), get->block_type, get->options, 
+                             get->desired_replication_level, &best_known_dest,
+                             &intermediate_trail_id, next_hop, 0,
+                             get_length, gp);  
+  }
+  return GNUNET_SYSERR;
+}
+
+
+/**
+ * Core handler for get result
+ * @param cls closure
+ * @param peer sender of the request
+ * @param message message
+ * @return #GNUNET_OK to keep the connection open,
+ *         #GNUNET_SYSERR to close it (signal serious error)
+ */
+static int
+handle_dht_p2p_get_result (void *cls, const struct GNUNET_PeerIdentity *peer,
+                           const struct GNUNET_MessageHeader *message)
+{
+  struct PeerGetResultMessage *get_result;
+  struct GNUNET_PeerIdentity *get_path;
+  struct GNUNET_PeerIdentity *put_path;
+  void *payload;
+  size_t payload_size;
+  size_t msize;
+  unsigned int getlen;
+  unsigned int putlen;
+  int current_path_index;
+  
+  msize = ntohs (message->size);
+  if (msize < sizeof (struct PeerGetResultMessage))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+  
+  get_result = (struct PeerGetResultMessage *)message;
+  getlen = ntohl (get_result->get_path_length);
+  putlen = ntohl (get_result->put_path_length);
+  
+  if ((msize <
+       sizeof (struct PeerGetResultMessage) +
+       getlen * sizeof (struct GNUNET_PeerIdentity) + 
+       putlen * sizeof (struct GNUNET_PeerIdentity)) ||
+      (getlen >
+       GNUNET_SERVER_MAX_MESSAGE_SIZE / sizeof (struct GNUNET_PeerIdentity) ||
+      (putlen >
+         GNUNET_SERVER_MAX_MESSAGE_SIZE / sizeof (struct GNUNET_PeerIdentity))))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+  
+  if (getlen > 0)
+   get_path = (struct GNUNET_PeerIdentity *) &get_result[1];
+  payload = &get_path[getlen];
+  payload_size = msize - (sizeof (struct PeerGetResultMessage) + 
+                          getlen * sizeof (struct GNUNET_PeerIdentity));
+  
+  if (putlen > 0)
+    put_path = &get_path[1];
+  else
+    put_path = NULL;
+  
+  if (0 == (GNUNET_CRYPTO_cmp_peer_identity (&my_identity, &(get_path[0]))))
+  {
+    GDS_CLIENTS_handle_reply (get_result->expiration_time, &(get_result->key), 
+                              getlen, get_path, putlen,
+                              put_path, get_result->type, payload_size, payload);
+    return GNUNET_YES;
+  }
+  else
+  {
+    current_path_index = search_my_index (get_path, getlen);
+    if (GNUNET_SYSERR == current_path_index )
+    {
+      GNUNET_break (0);
+      return GNUNET_SYSERR;
+    }
+    GDS_NEIGHBOURS_send_get_result (&(get_result->key), get_result->type,
+                                    &get_path[current_path_index - 1],
+                                    &(get_result->querying_peer), putlen, put_path,
+                                    getlen, get_path, get_result->expiration_time,
+                                    payload, payload_size);
+    return GNUNET_YES;
+  }  
+  return GNUNET_SYSERR;
+}
+
+
+/* Core handle for PeerTrailSetupMessage.
+ * @param cls closure
+ * @param message message
+ * @param peer peer identity this notification is about
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
+ */
+static int
+handle_dht_p2p_trail_setup (void *cls, const struct GNUNET_PeerIdentity *peer,
+                            const struct GNUNET_MessageHeader *message)
+{
+  const struct PeerTrailSetupMessage *trail_setup;
+  const struct GNUNET_PeerIdentity *trail_peer_list;
+  struct GNUNET_PeerIdentity local_best_known_destination; 
+  struct GNUNET_PeerIdentity current_destination;
+  struct GNUNET_PeerIdentity *next_hop;
+  struct GNUNET_PeerIdentity next_peer;
+  struct FriendInfo *target_friend;
+  struct GNUNET_PeerIdentity source;
+  uint64_t ultimate_destination_finger_value;
+  struct GNUNET_HashCode new_intermediate_trail_id;
+  struct GNUNET_HashCode intermediate_trail_id;
+  struct GNUNET_HashCode trail_id;
+  unsigned int is_predecessor;
+  uint32_t trail_length;
+  size_t msize;
+
+  msize = ntohs (message->size);
+  /* There are PeerId's appended to the end of the message! */
+  if (msize < sizeof (struct PeerTrailSetupMessage))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+
+  trail_setup = (const struct PeerTrailSetupMessage *) message;
+  trail_length = (msize - sizeof (struct PeerTrailSetupMessage))/
+                  sizeof (struct GNUNET_PeerIdentity);
+  if ((msize - sizeof (struct PeerTrailSetupMessage)) % 
+      sizeof (struct GNUNET_PeerIdentity) != 0)
+  {
+    GNUNET_break_op (0);
+    return GNUNET_OK;      
+  }           
+  
+  trail_peer_list = (const struct GNUNET_PeerIdentity *)&trail_setup[1];
+  current_destination = trail_setup->best_known_destination;
+  trail_id = trail_setup->trail_id;
+  ultimate_destination_finger_value = 
+          GNUNET_ntohll (trail_setup->ultimate_destination_finger_value);
+  source = trail_setup->source_peer;
+  is_predecessor = ntohl (trail_setup->is_predecessor);
+  intermediate_trail_id = trail_setup->intermediate_trail_id;
+  
+  if (GNUNET_YES == GDS_ROUTING_threshold_reached())
+  {
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, peer);
+    GDS_NEIGHBOURS_send_trail_rejection (source, ultimate_destination_finger_value,
+                                         my_identity, is_predecessor,
+                                         trail_peer_list, trail_length,
+                                         trail_id, target_friend,
+                                         CONGESTION_TIMEOUT);
+    return GNUNET_OK;
+  }
+
+  
+  next_hop = find_successor (ultimate_destination_finger_value,
+                             &local_best_known_destination,
+                             &new_intermediate_trail_id, is_predecessor);
+
+  /* Are we just a part of a trail towards a finger (current_destination)? */
+  if (0 != (GNUNET_CRYPTO_cmp_peer_identity (&my_identity, &current_destination)))
+  {
+    struct GNUNET_PeerIdentity *closest_peer;
+    
+    /* Select best successor among one found locally and current_destination.*/
+    closest_peer = select_closest_peer (&local_best_known_destination,
+                                        &current_destination,
+                                        ultimate_destination_finger_value,
+                                        is_predecessor);
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity (&current_destination, 
+                                              closest_peer))
+    {
+      next_hop = GDS_ROUTING_get_next_hop (intermediate_trail_id,
+                                           GDS_ROUTING_SRC_TO_DEST);
+      if (NULL == next_hop) /* FIXME: Here we found next_hop NULL from routing table,
+                             * but we still have a next_hop from find_successor.
+                             * Should we not break and choose that next_hop. */
+      {
+        GNUNET_break_op (0);
+        return GNUNET_SYSERR;
+      }
+      
+      local_best_known_destination =  current_destination;
+      new_intermediate_trail_id = intermediate_trail_id;
+    }
+  }
+  
+  GNUNET_assert (NULL != next_hop);
+  
+  /* Am I the final destination? */
+  if (0 == (GNUNET_CRYPTO_cmp_peer_identity (next_hop, &my_identity)))
+  {
+    if (0 == trail_length)
+      memcpy (&next_peer, &source, sizeof (struct GNUNET_PeerIdentity));
+    else
+      memcpy (&next_peer, &trail_peer_list[trail_length-1], sizeof (struct GNUNET_PeerIdentity));
+
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, &next_peer);
+    GDS_NEIGHBOURS_send_trail_setup_result (source,
+                                            my_identity,
+                                            target_friend, trail_length,
+                                            trail_peer_list,
+                                            ultimate_destination_finger_value,
+                                            is_predecessor, trail_id);
+  }
+  else
+  {
+    struct GNUNET_PeerIdentity peer_list[trail_length + 1];
+
+    memcpy (peer_list, trail_peer_list, trail_length * sizeof (struct GNUNET_PeerIdentity));
+    peer_list[trail_length] = my_identity;
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);
+    GDS_NEIGHBOURS_send_trail_setup (source,
+                                     ultimate_destination_finger_value,
+                                     local_best_known_destination,
+                                     target_friend, trail_length + 1, peer_list,
+                                     is_predecessor, trail_id,
+                                     &new_intermediate_trail_id);
+  }
+  return GNUNET_OK;
+}
+
+
+/* FIXME: here we are calculating my_index and comparing also in this function.
+   And we are doing it again here in this function. Re factor the code. */
+/**
+ * Check if sender_peer and peer from which we should receive the message are
+ * same or different.
+ * @param trail_peer_list List of peers in trail
+ * @param trail_length Total number of peers in @a trail_peer_list
+ * @param sender_peer Peer from which we got the message. 
+ * @param finger_identity Finger to which trail is setup. It is not part of trail.
+ * @return #GNUNET_YES if sender_peer and peer from which we should receive the
+ *                    message are different.
+ *         #GNUNET_NO if sender_peer and peer from which we should receive the
+ *                    message are different. 
+ */
+static int
+is_sender_peer_correct (const struct GNUNET_PeerIdentity *trail_peer_list,
+                        unsigned int trail_length,
+                        const struct GNUNET_PeerIdentity *sender_peer,
+                        struct GNUNET_PeerIdentity finger_identity,
+                        struct GNUNET_PeerIdentity source_peer)
+{
+  int my_index;
+  
+  if (0 == (GNUNET_CRYPTO_cmp_peer_identity (&source_peer,
+                                             &my_identity)))
+  {
+    if (trail_length > 0)
+    {
+      // source, then trail_length > 0, trail_peer_list[0] != peer
+      if (0 != GNUNET_CRYPTO_cmp_peer_identity (&trail_peer_list[0],
+                                                sender_peer))
+        return GNUNET_NO;
+    }
+    else
+    {
+      // source, trail_length == 0, finger != peer
+      if (0 != GNUNET_CRYPTO_cmp_peer_identity (sender_peer,
+                                                &finger_identity))
+        return GNUNET_NO;
+    }
+  }
+  else
+  {
+    my_index = search_my_index (trail_peer_list, trail_length);
+    if (-1 == my_index)
+      return GNUNET_NO;
+    
+    // my_index == trail_length -1, finger != peer
+    if ((trail_length - 1) == my_index)
+    {
+      if (0 != GNUNET_CRYPTO_cmp_peer_identity (sender_peer,
+                                                &finger_identity))
+        return GNUNET_NO;
+    }
+    else
+    {
+      // FIXME: if trail_peer_list[my_index + 1] != peer
+      if (0 != GNUNET_CRYPTO_cmp_peer_identity (sender_peer,
+                                                &trail_peer_list[my_index + 1]))
+        return GNUNET_NO;
+    }
+  }
+  return GNUNET_YES;
+}
+
+
+/**
+ * Core handle for p2p trail setup result messages.
+ * @param closure
+ * @param message message
+ * @param peer sender of this message. 
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
+ */
+static int
+handle_dht_p2p_trail_setup_result(void *cls, const struct GNUNET_PeerIdentity *peer,
+                                  const struct GNUNET_MessageHeader *message)
+{
+  const struct PeerTrailSetupResultMessage *trail_result;
+  const struct GNUNET_PeerIdentity *trail_peer_list;
+  struct GNUNET_PeerIdentity next_hop;
+  struct FriendInfo *target_friend;
+  struct GNUNET_PeerIdentity querying_peer;
+  struct GNUNET_PeerIdentity finger_identity;
+  uint32_t trail_length;
+  uint64_t ulitmate_destination_finger_value;
+  uint32_t is_predecessor;
+  struct GNUNET_HashCode trail_id;
+  int my_index;
+  size_t msize;
+
+  msize = ntohs (message->size);
+  if (msize < sizeof (struct PeerTrailSetupResultMessage))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+
+  trail_result = (const struct PeerTrailSetupResultMessage *) message;
+  trail_length = (msize - sizeof (struct PeerTrailSetupResultMessage))/
+                  sizeof (struct GNUNET_PeerIdentity);
+  if ((msize - sizeof (struct PeerTrailSetupResultMessage)) % 
+      sizeof (struct GNUNET_PeerIdentity) != 0)
+  {
+    GNUNET_break_op (0);
+    return GNUNET_OK;      
+  }       
+  
+  is_predecessor = htonl (trail_result->is_predecessor);
+  querying_peer = trail_result->querying_peer;
+  finger_identity = trail_result->finger_identity;
+  trail_id = trail_result->trail_id;
+  trail_peer_list = (const struct GNUNET_PeerIdentity *) &trail_result[1];
+  ulitmate_destination_finger_value = 
+          GNUNET_ntohll (trail_result->ulitmate_destination_finger_value);
+  /* FIXME: here we are calculating my_index and comparing also in this function.
+   And we are doing it again here in this function. Re factor the code. */
+  /* Ensure that sender peer is the peer from which we were expecting the message. */
+  if (GNUNET_NO == is_sender_peer_correct (trail_peer_list,
+                                           trail_length,
+                                           peer, finger_identity, querying_peer))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_SYSERR;
+  }
+  
+  /* Am I the one who initiated the query? */
+  if (0 == (GNUNET_CRYPTO_cmp_peer_identity (&querying_peer,
+                                             &my_identity)))
+  {
+    finger_table_add (finger_identity, trail_peer_list,
+                      trail_length, ulitmate_destination_finger_value,
+                      is_predecessor, trail_id);
+    return GNUNET_YES;
+  }
+  
+  my_index = search_my_index(trail_peer_list, trail_length);
+  if (-1 == my_index)
+  {
+    GNUNET_break_op(0);
+    return GNUNET_SYSERR;
+  }
+  
+  if (my_index == 0)
+    next_hop = trail_result->querying_peer;
+  else
+    next_hop = trail_peer_list[my_index - 1];
+
+  /* If the querying_peer is its own finger, then don't add an entry in routing
+   * table as querying peer will discard the trail.
+   */
+  if (0 != (GNUNET_CRYPTO_cmp_peer_identity (&(trail_result->querying_peer),
+                                             &(trail_result->finger_identity))))
+  {
+    GDS_ROUTING_add (trail_id, next_hop, *peer);
+  }
+
+  target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, &next_hop);
+  GDS_NEIGHBOURS_send_trail_setup_result (querying_peer, finger_identity,
+                                          target_friend, trail_length, trail_peer_list,
+                                          is_predecessor, 
+                                          ulitmate_destination_finger_value,
+                                          trail_id);
+  return GNUNET_OK;
+}
+
+
+/**
+ * Invert the trail.
+ * @param trail Trail to be inverted
+ * @param trail_length Total number of peers in the trail.
+ * @return Updated trail
+ */
+static struct GNUNET_PeerIdentity *
+invert_trail (const struct GNUNET_PeerIdentity *trail,
+              unsigned int trail_length)
+{
+  int i;
+  int j;
+  struct GNUNET_PeerIdentity *inverted_trail;
+
+  inverted_trail = GNUNET_malloc (sizeof(struct GNUNET_PeerIdentity) *
+                                  trail_length);
+  i = 0;
+  j = trail_length - 1;
+  while (i < trail_length)
+  {
+    inverted_trail[i] = trail[j];
+    i++;
+    j--;
+  }
+  return inverted_trail;
+}
+
+
+/**
+ * FIXME: 
+ * my_current_predecessor != source_peer. get the trail to reach to 
+ * my_current_predecessor and append it to the trail from source to me.
+ * It can contain duplicate elements. Need to get the correct one. 
+ * In case the source peer of verify successor message is not my successor,
+ * then construct a trail from source peer to my current predecessor.
+ * @param my_predecessor my current predecessor.
+ * @param current_trail Trail from source to me.
+ * @param current_trail_length Total number of peers in @a current_trail
+ * @param new_trail_length [out] Total number of peers in updated trail.
+ * @return Updated trail from source peer to my_predecessor.
+ */
+static struct GNUNET_PeerIdentity *
+trail_source_to_my_predecessor (const struct GNUNET_PeerIdentity *current_trail,
+                                unsigned int current_trail_length,
+                                unsigned int *new_trail_length)
+{
+  struct GNUNET_PeerIdentity *new_trail;
+  struct Trail *trail_list_iterator;
+  struct Trail_Element *trail_iterator;
+  struct FingerInfo *my_predecessor;
+  unsigned int i;
   unsigned int j;
-  /* SUPU: 2 is added for my_identity and value. */
-  size = GNUNET_CONTAINER_multipeermap_size (friend_peermap)+
-         GNUNET_CONTAINER_multipeermap_size (finger_peermap)+
-         2;
+  unsigned int shortest_trail_length = 0;
+  unsigned int trail_index = 0;
+  my_predecessor = GNUNET_CONTAINER_multihashmap32_get (finger_hashmap,
+                                                        PREDECESSOR_FINGER_ID);
+
+  for (i = 0; i < my_predecessor->trails_count; i++)
+  {
+    trail_list_iterator = &my_predecessor->trail_list[i];
+    if (trail_list_iterator->trail_length > shortest_trail_length)
+      continue;
+    shortest_trail_length = trail_list_iterator->trail_length;
+    trail_index = i;
+  }
+
+  *new_trail_length = current_trail_length + shortest_trail_length + 1;
+  new_trail = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity) *
+                             *new_trail_length);
+  memcpy (new_trail, current_trail,
+         current_trail_length * sizeof (struct GNUNET_PeerIdentity));
+  new_trail[current_trail_length + 1] = my_identity;
+
+  i = 0;
+  j = current_trail_length + 1;
+  trail_list_iterator = &my_predecessor->trail_list[trail_index];
+  trail_iterator = trail_list_iterator->trail_head;
+  while ( i < shortest_trail_length)
+  {
+    new_trail[j] = trail_iterator->peer;
+    j++;
+    i++;
+    trail_iterator = trail_iterator->next;
+  }
+
+  *new_trail_length = j;
+  return new_trail;
+}
+
+
+/**
+ * FIMXE: IF you update your predecessor with new finger identity or added
+ * a new trail, then you should send add_trail message or else the peers
+ * which are part of the trail to reach to your new predecessor will not 
+ * know its existence.
+ * Check if we already have an entry for predecessor in our finger hashmap.
+ * If no, then add new predecessor.
+ * If yes, then compare new and existing entry. If both are same, and there is
+ * place to store more trail, then add entry. If both are different then choose
+ * the closest one. 
+ * @param finger Peer which claims to be our predecessor.
+ * @param trail Trail to reach from @a predecessor to me, NOT including both endpoints
+ * @param trail_length Total number of peers in @a trail.
+ * @return #GNUNET_YES if we added the new entry.
+ *         #GNUNET_NO, if new entry is not the closest predecessor or both new
+ *                     and existing entry are same. 
+ */
+static struct GNUNET_PeerIdentity 
+compare_and_update_predecessor (struct GNUNET_PeerIdentity finger_identity,
+                                const struct GNUNET_PeerIdentity *trail,
+                                unsigned int trail_length)
+{
+  struct FingerInfo *current_predecessor;
+  struct GNUNET_PeerIdentity *closest_peer;
+  struct GNUNET_PeerIdentity *inverted_trail;
+  struct GNUNET_HashCode trail_id;
+  uint64_t finger_value;
+  
+  current_predecessor = GNUNET_CONTAINER_multihashmap32_get (finger_hashmap,
+                                                             PREDECESSOR_FINGER_ID);
+  inverted_trail = invert_trail (trail, trail_length);
+  
+  /* No predecessor in finger table. Add the new predecessor. */
+  if (NULL == current_predecessor)
+  {
+    add_new_entry (finger_identity, inverted_trail, trail_length,
+                   trail_id, PREDECESSOR_FINGER_ID);
+    return finger_identity;
+  }
+  
+  /* If the new predecessor and current predecessor are not same, then choose
+   the closest one. */
+  if (0 != GNUNET_CRYPTO_cmp_peer_identity (&finger_identity, 
+                                            &current_predecessor->finger_identity))
+  {
+    finger_value = compute_predecessor_identity_value();
+    closest_peer = select_closest_peer (&current_predecessor->finger_identity,
+                                        &finger_identity,
+                                        finger_value, PREDECESSOR_FINGER_ID);
+    
+    /* If the finger is the closest predecessor, then add it in finger table
+     * and free resources of current_predecessor. */
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity (&finger_identity, closest_peer))
+    {
+      GNUNET_assert (0 != GNUNET_CRYPTO_cmp_peer_identity (&my_identity,
+                                                           &finger_identity));
+
+      send_trail_teardown (current_predecessor);
+      decrement_friend_trail_count (current_predecessor);
+      free_finger (current_predecessor);
+      add_new_entry (finger_identity, inverted_trail, trail_length,
+                     trail_id, PREDECESSOR_FINGER_ID);
+      return finger_identity;
+    }
+  }
   
-  all_known_peers = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity) * size);
+  /* If both finger and current_predecessor are same as my_identity, then do nothing. */
+  if (0 == GNUNET_CRYPTO_cmp_peer_identity (&finger_identity, &my_identity))
+      return current_predecessor->finger_identity;
+    
+  /* If the current_predecessor is not a friend. */
+  if (NULL ==
+        GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                           &current_predecessor->finger_identity))
+  {
+    if (current_predecessor->trails_count < MAXIMUM_TRAILS_PER_FINGER)
+      add_new_trail (current_predecessor, inverted_trail, 
+                     trail_length, trail_id);
+    //FIXME: here you should send add a new trail as you don't have this trail
+    // in the routing table. 
+    else
+      select_and_replace_trail (current_predecessor, inverted_trail,
+                                trail_length, trail_id);
+     //FIXME: here you should send add a new trail as you don't have this trail
+    // in the routing table. 
+  }
+  return current_predecessor->finger_identity;
+}
+
+
+/**
+ * Core handle for p2p verify successor messages.
+ * @param cls closure
+ * @param message message
+ * @param peer peer identity this notification is about
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
+ */
+static int
+handle_dht_p2p_verify_successor(void *cls, const struct GNUNET_PeerIdentity *peer,
+                                const struct GNUNET_MessageHeader *message)
+{
+  struct PeerVerifySuccessorMessage *vsm;
+  struct GNUNET_PeerIdentity successor;
+  struct GNUNET_PeerIdentity source_peer;
+  struct GNUNET_PeerIdentity *next_hop;
+  struct FriendInfo *target_friend;
+  struct GNUNET_HashCode trail_id;
+  struct GNUNET_PeerIdentity current_predecessor;
+  struct GNUNET_PeerIdentity *trail;
+  struct GNUNET_PeerIdentity *new_trail;
+  unsigned int trail_length;
+  unsigned int new_trail_length;
+  size_t msize;
+
+  msize = ntohs (message->size);
+  if (msize != sizeof (struct PeerVerifySuccessorMessage))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+
+  vsm = (struct PeerVerifySuccessorMessage *) message;
+  trail_length = (msize - sizeof (struct PeerVerifySuccessorMessage))/
+                  sizeof (struct GNUNET_PeerIdentity);
+  if ((msize - sizeof (struct PeerVerifySuccessorMessage)) % 
+      sizeof (struct GNUNET_PeerIdentity) != 0)
+  {
+    GNUNET_break_op (0);
+    return GNUNET_OK;      
+  }           
   
-  j = 0;
-  memcpy(&all_known_peers[j], &(my_identity), sizeof (struct GNUNET_PeerIdentity));
-  j++;
-  memcpy(&all_known_peers[j], value, sizeof(struct GNUNET_PeerIdentity));
+  trail = (struct GNUNET_PeerIdentity *)&vsm[1];
+  source_peer = vsm->source_peer;
+  successor = vsm->successor;
+  trail_id = vsm->trail_id;
+
+  /* I am not the successor of source_peer. Pass the message to next_hop on
+   * the trail. */
+  if(0 != (GNUNET_CRYPTO_cmp_peer_identity (&successor, &my_identity)))
+  {
+    next_hop = GDS_ROUTING_get_next_hop (trail_id, GDS_ROUTING_SRC_TO_DEST);
+    if (NULL == next_hop)
+    {
+      GNUNET_break (0);
+      return GNUNET_SYSERR;
+    }
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);
+    GDS_NEIGHBOURS_send_verify_successor_message (source_peer, successor,
+                                                  trail_id, trail, trail_length,
+                                                  target_friend);
+    return GNUNET_OK;
+  }
   
-  /* Iterate over friend peermap and copy all the elements into array. */
-  friend_iter = GNUNET_CONTAINER_multipeermap_iterator_create (friend_peermap); 
-  for (friend_index = 0; friend_index < GNUNET_CONTAINER_multipeermap_size (friend_peermap); friend_index++)
+  target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, peer);
+  current_predecessor = compare_and_update_predecessor (source_peer, 
+                                                        trail, trail_length);
+  /* source_peer is my current_predecessor. */
+  if(0 == (GNUNET_CRYPTO_cmp_peer_identity (&current_predecessor, &source_peer)))
+  {
+    /* Here we don't need to pass the trail as it is of new use. We can pass
+     NULL and trail length = 0. */
+    new_trail = NULL;
+    new_trail_length = 0;
+  }
+  else
+  { 
+    new_trail = trail_source_to_my_predecessor (trail, trail_length, 
+                                                &new_trail_length);
+  }
+  GDS_NEIGHBOURS_send_verify_successor_result (source_peer, my_identity,
+                                               current_predecessor, trail_id,
+                                               new_trail, new_trail_length,
+                                               GDS_ROUTING_DEST_TO_SRC,
+                                               target_friend);
+  return GNUNET_OK;
+}
+
+
+/**
+ * Here you may or may not be the predecessor. If you are then also while adding
+ * you have to check and if not then notify new successor. But again the trail
+ * may be a problem here. 
+ * FIXME: I will keep the logic to remove the old trail to reach from me to
+ * my old successor here and move adding a new trail from me to new successor to notify
+ * new successor. And in case if the new successor also take it as predecessor
+ * then call add_trail.
+ * Core handle for p2p verify successor result messages.
+ * @param cls closure
+ * @param message message
+ * @param peer peer identity this notification is about
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
+ */
+static int
+handle_dht_p2p_verify_successor_result(void *cls, const struct GNUNET_PeerIdentity *peer,
+                                       const struct GNUNET_MessageHeader *message)
+{
+  struct PeerVerifySuccessorResultMessage *vsrm;
+  enum GDS_ROUTING_trail_direction trail_direction;
+  struct GNUNET_HashCode trail_id;
+  unsigned int new_trail_length;
+  struct GNUNET_PeerIdentity *new_trail;
+  struct GNUNET_PeerIdentity querying_peer;
+  struct GNUNET_PeerIdentity current_predecessor;
+  //struct GNUNET_PeerIdentity old_successor;
+  struct GNUNET_PeerIdentity *next_hop;
+  struct FriendInfo *target_friend;
+  size_t msize;
+
+  msize = ntohs (message->size);
+  if (msize != sizeof (struct PeerVerifySuccessorResultMessage))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_YES;
+  }
+  vsrm = (struct PeerVerifySuccessorResultMessage *) message;
+  new_trail_length = (msize - sizeof (struct PeerTrailSetupMessage))/
+                      sizeof (struct GNUNET_PeerIdentity);
+  if ((msize - sizeof (struct PeerTrailSetupMessage)) % 
+      sizeof (struct GNUNET_PeerIdentity) != 0)
+  {
+    GNUNET_break_op (0);
+    return GNUNET_OK;      
+  }           
+  trail_direction = ntohl (vsrm->trail_direction);
+  trail_id = vsrm->trail_id;
+
+  new_trail = (struct GNUNET_PeerIdentity *) &vsrm[1];
+  querying_peer = vsrm->querying_peer;
+  current_predecessor = vsrm->current_predecessor;
+  //old_successor = vsrm->source_successor;
+
+  if(0 == (GNUNET_CRYPTO_cmp_peer_identity (&querying_peer, &my_identity)))
+  {
+#if 0
+    //Here I am the final quering peer and its verify successor result.
+    // now I know it is for successor and now I don't have any finger_map_index
+    // as parameter in finger_table_add. 
+    // BIG FIX HOW TO ADAPT IT FOR change in finger_table_add
+    struct GNUNET_HashCode new_finger_trail_id;
+    /* FIXME: generate a new trail id. */
+    if (GNUNET_YES == finger_table_add (my_new_successor,
+                                        new_trail,
+                                        new_trail_length,
+                                        PREDECESSOR_FINGER_ID, new_finger_trail_id))
+    {
+      if (new_trail_length > 0)
+        target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                           &new_trail[0]);
+      else
+        target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                           peer);
+      GDS_NEIGHBOURS_send_trail_teardown (my_identity, old_successor, trail_id,
+                                          GDS_ROUTING_SRC_TO_DEST, target_friend);
+      GDS_NEIGHBOURS_send_notify_new_successor (my_identity, my_new_successor,
+                                                new_trail,
+                                                new_trail_length,
+                                                new_finger_trail_id, target_friend);
+    }
+#endif
+    return GNUNET_OK;
+  }
+
+  GNUNET_assert (NULL != (next_hop =
+                         GDS_ROUTING_get_next_hop (trail_id, trail_direction)));
+  target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);
+  GDS_NEIGHBOURS_send_verify_successor_result (querying_peer,
+                                               vsrm->source_successor,
+                                               current_predecessor, trail_id,
+                                               new_trail,
+                                               new_trail_length,
+                                               trail_direction, target_friend);
+  return GNUNET_OK;
+}
+
+
+/*
+ * FIXME: here before adding the peer you again have to call to check 
+ * if its correct predecessor or not.
+ * Core handle for p2p notify new successor messages.
+ * @param cls closure
+ * @param message message
+ * @param peer peer identity this notification is about
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
+ */
+static int
+handle_dht_p2p_notify_new_successor(void *cls, const struct GNUNET_PeerIdentity *peer,
+                                    const struct GNUNET_MessageHeader *message)
+{
+  struct PeerNotifyNewSuccessorMessage *nsm;
+  struct GNUNET_PeerIdentity *trail;
+  struct GNUNET_PeerIdentity source;
+  struct GNUNET_PeerIdentity new_successor;
+  struct FriendInfo *target_friend;
+  struct GNUNET_PeerIdentity closest_successor;
+  struct GNUNET_HashCode trail_id;
+  unsigned int my_index;
+  struct GNUNET_PeerIdentity next_hop;
+  size_t msize;
+  uint32_t trail_length;
+
+  msize = ntohs (message->size);
+  if (msize != sizeof (struct PeerNotifyNewSuccessorMessage))
   {
-    /* FIXME: I don't think we are actually iterating.
-     Read about how to iterate over the multipeermap. */
-    if(GNUNET_YES == GNUNET_CONTAINER_multipeermap_iterator_next(friend_iter,&key_ret,(const void **)&friend)) 
-    {
-      memcpy(&all_known_peers[j], &(friend->id), sizeof (struct GNUNET_PeerIdentity));
-      j++;
-    }
+    GNUNET_break_op (0);
+    return GNUNET_YES;
   }
-  
-  /* Iterate over finger map and copy all the entries into all_known_peers array. */
-  finger_iter = GNUNET_CONTAINER_multipeermap_iterator_create (finger_peermap);  
-  for (finger_index = 0; finger_index < GNUNET_CONTAINER_multipeermap_size (finger_peermap); finger_index++)
+
+  nsm = (struct PeerNotifyNewSuccessorMessage *) message;
+  trail_length = (msize - sizeof (struct PeerNotifyNewSuccessorMessage))/
+                  sizeof (struct GNUNET_PeerIdentity);
+  if ((msize - sizeof (struct PeerTrailRejectionMessage)) % 
+      sizeof (struct GNUNET_PeerIdentity) != 0)
   {
-    /* FIXME: I don't think we are actually iterating.
-     Read about how to iterate over the multi peer map. */
-    if(GNUNET_YES == GNUNET_CONTAINER_multipeermap_iterator_next(finger_iter,&key_ret,(const void **)&finger)) 
-    {
-      memcpy(&all_known_peers[j], &(finger->finger_identity), sizeof (struct GNUNET_PeerIdentity));
-      j++;
-    }
-  }
-  
-  qsort(all_known_peers, size, sizeof (struct GNUNET_PeerIdentity), &peer_id_cmp);
-  
-  /* search value in all_known_peers array. */
-  successor = binary_search(all_known_peers, value, size);
-  
-  /* compare successor with my_identity, finger and friend */
-  if(0 == GNUNET_CRYPTO_cmp_peer_identity(&(my_identity), successor))
+    GNUNET_break_op (0);
+    return GNUNET_OK;      
+  }  
+
+  if ((msize < sizeof (struct PeerNotifyNewSuccessorMessage) +
+               trail_length * sizeof (struct GNUNET_PeerIdentity)) ||
+      (trail_length >
+       GNUNET_SERVER_MAX_MESSAGE_SIZE / sizeof (struct GNUNET_PeerIdentity)))
   {
-    *type = MY_ID;
-    return NULL;
+    GNUNET_break_op (0);
+    return GNUNET_YES;
   }
-  else if (GNUNET_YES == GNUNET_CONTAINER_multipeermap_contains (friend_peermap,
-                                              successor))
+
+  trail = (struct GNUNET_PeerIdentity *) &nsm[1];
+  source  = nsm->source_peer;
+  new_successor = nsm->new_successor;
+  trail_id = nsm->trail_id;
+
+  /* I am the new_successor to source_peer. */
+  if ( 0 == GNUNET_CRYPTO_cmp_peer_identity (&my_identity, &new_successor))
   {
-    *type = FRIEND;
-    memcpy(current_destination, successor, sizeof (struct GNUNET_PeerIdentity));
-    return successor;
+    closest_successor = compare_and_update_predecessor (source, trail, trail_length);
+    /* If the source peer is my new predecessor, then add trail in the
+     routing table of all the peers which are part of the trail to reach from 
+     me to source, NOT including endpoints. 
+     FIXME: In case we have same predecessor but we added just a new trail, then
+     we are not sending add a new trail message. Need to update this. */
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity (&closest_successor, &source))
+    {
+      struct GNUNET_HashCode new_trail_id;
+      target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                         peer);
+      GDS_NEIGHBOURS_send_add_trail (my_identity, source, new_trail_id,
+                                     trail, trail_length, target_friend);
+    }
+    return GNUNET_OK;
   }
-  else if (GNUNET_YES == GNUNET_CONTAINER_multipeermap_contains (finger_peermap,
-                                              successor))
+
+  my_index = search_my_index (trail, trail_length);
+  if (-1 == my_index)
   {
-    *type = FINGER;
-    memcpy(current_destination, successor, sizeof (struct GNUNET_PeerIdentity));
-    /* get the corresponding finger for succcesor and read the first element from
-     the trail list and return that element. */
-    struct FingerInfo *successor_finger;
-    struct GNUNET_PeerIdentity *next_hop;
-    next_hop = GNUNET_malloc(sizeof (struct GNUNET_PeerIdentity));
-    successor_finger = GNUNET_malloc (sizeof (struct FingerInfo));
-    successor_finger = GNUNET_CONTAINER_multipeermap_get (finger_peermap, successor);
-    memcpy(next_hop, &(successor_finger->trail_peer_list[0]), sizeof (struct GNUNET_PeerIdentity));
-    return next_hop;
+    GNUNET_break_op (0);
+    return GNUNET_SYSERR;
   }
-  return NULL;
+  if (trail_length == my_index)
+    next_hop = new_successor;
+  else
+    next_hop = trail[my_index + 1];
+  GNUNET_assert (GNUNET_OK == GDS_ROUTING_add (trail_id, *peer, next_hop));
+  target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, &next_hop);
+  GDS_NEIGHBOURS_send_notify_new_successor (source, new_successor, trail,
+                                            trail_length,
+                                            trail_id, target_friend);
+  return GNUNET_OK;
 }
 
 
 /**
- * Handle a PeerTrailSetupMessage. 
+ * FIXME: Here you should keep the trail id with you.
+ * Core handler for P2P trail rejection message
  * @param cls closure
  * @param message message
  * @param peer peer identity this notification is about
- * @return GNUNET_OK on success, GNUNET_SYSERR on error
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
  */
 static int
-handle_dht_p2p_trail_setup(void *cls, const struct GNUNET_PeerIdentity *peer,
-                    const struct GNUNET_MessageHeader *message)
+handle_dht_p2p_trail_rejection(void *cls, const struct GNUNET_PeerIdentity *peer,
+                               const struct GNUNET_MessageHeader *message)
 {
-  struct PeerTrailSetupMessage *trail_setup; 
-  struct GNUNET_PeerIdentity *next_hop; 
+  struct PeerTrailRejectionMessage *trail_rejection;
+  unsigned int trail_length;
+  struct GNUNET_PeerIdentity *trail_peer_list;
   struct FriendInfo *target_friend;
+  struct GNUNET_TIME_Relative congestion_timeout;
+  struct GNUNET_HashCode trail_id;
+  struct GNUNET_PeerIdentity next_destination;
+  struct GNUNET_HashCode new_intermediate_trail_id;
+  struct GNUNET_PeerIdentity next_peer;
+  struct GNUNET_PeerIdentity source;
+  struct GNUNET_PeerIdentity *next_hop;
+  uint64_t ultimate_destination_finger_value;
+  unsigned int is_predecessor;
   size_t msize;
-  uint32_t trail_length;
-  enum current_destination_type peer_type;
-  struct GNUNET_PeerIdentity *trail_peer_list; 
-  uint32_t current_trail_index;
-  struct GNUNET_PeerIdentity *next_peer;
 
-  
-  /* parse and validate message. */
   msize = ntohs (message->size);
-  if (msize < sizeof (struct PeerTrailSetupMessage))
+  if (msize != sizeof (struct PeerTrailRejectionMessage))
   {
     GNUNET_break_op (0);
     return GNUNET_YES;
   }
-  
-  trail_setup = (struct PeerTrailSetupMessage *) message; 
-  trail_length = ntohl (trail_setup->trail_length); 
-  peer_type = ntohl (trail_setup->current_destination_type);
-  trail_peer_list = (struct GNUNET_PeerIdentity *) &trail_setup[1];
-  
-  if ((msize <
-       sizeof (struct PeerTrailSetupMessage) +
-       trail_length * sizeof (struct GNUNET_PeerIdentity)) ||
-      (trail_length >
-       GNUNET_SERVER_MAX_MESSAGE_SIZE / sizeof (struct GNUNET_PeerIdentity)))
+
+  trail_rejection = (struct PeerTrailRejectionMessage *) message;
+  trail_length = (msize - sizeof (struct PeerTrailRejectionMessage))/
+                  sizeof (struct GNUNET_PeerIdentity);
+  if ((msize - sizeof (struct PeerTrailRejectionMessage)) % 
+      sizeof (struct GNUNET_PeerIdentity) != 0)
   {
     GNUNET_break_op (0);
-    return GNUNET_YES; /*TODO: Why do we send GNUNET_YES here? */
+    return GNUNET_OK;      
+  }           
+
+  trail_peer_list = (struct GNUNET_PeerIdentity *)&trail_rejection[1];
+  is_predecessor = ntohl (trail_rejection->is_predecessor);
+  congestion_timeout = trail_rejection->congestion_time;
+  source = trail_rejection->source_peer;
+  trail_id = trail_rejection->trail_id;
+  ultimate_destination_finger_value = 
+          trail_rejection->ultimate_destination_finger_value;
+
+  /* First set the congestion time of the friend that sent you this message. */
+  target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, peer);
+  target_friend->congestion_timestamp = GNUNET_TIME_absolute_add (GNUNET_TIME_absolute_get(),
+                                                                 congestion_timeout);
+
+  if(0 == (GNUNET_CRYPTO_cmp_peer_identity (&my_identity, &source)))
+  {
+    return GNUNET_OK;
   }
-  
-  GNUNET_STATISTICS_update (GDS_stats,
-                            gettext_noop ("# TRAIL SETUP requests received"), 1,
-                            GNUNET_NO);
-  GNUNET_STATISTICS_update (GDS_stats,
-                            gettext_noop ("# TRAIL SETUP bytes received"), msize,
-                            GNUNET_NO);
-  
-  if(peer_type == FRIEND)
+
+  /* If I am congested then pass this message to peer before me in trail. */
+  if(GNUNET_YES == GDS_ROUTING_threshold_reached())
   {
-    if(0 == (GNUNET_CRYPTO_cmp_peer_identity(&(trail_setup->current_destination),&my_identity)))
+    struct GNUNET_PeerIdentity *new_trail;
+    unsigned int new_trail_length;
+
+    if (trail_length == 1)
     {
-      next_hop = find_successor(&(trail_setup->destination_finger),&(trail_setup->current_destination),&(peer_type));
+      new_trail = NULL;
+      new_trail_length = 0;
+      next_hop = &source;
     }
     else
-      return GNUNET_SYSERR; /*TODO: Should we handle this case differently? */
+    {
+      next_hop = &trail_peer_list[trail_length - 2];
+      /* Remove myself from the trail. */
+      new_trail_length = trail_length -1;
+      new_trail = GNUNET_malloc (new_trail_length * sizeof (struct GNUNET_PeerIdentity));
+      memcpy (new_trail, trail_peer_list, new_trail_length * sizeof (struct GNUNET_PeerIdentity));
+    }
+
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);
+    GDS_NEIGHBOURS_send_trail_rejection (source,
+                                         ultimate_destination_finger_value,
+                                         my_identity, is_predecessor,
+                                         new_trail,new_trail_length,trail_id,
+                                         target_friend, CONGESTION_TIMEOUT);
+    return GNUNET_YES;
   }
-  else if(peer_type == FINGER)
+
+  /* Look for next_hop to pass the trail setup message */
+  next_hop = find_successor (ultimate_destination_finger_value,
+                             &next_destination,
+                             &new_intermediate_trail_id,
+                             is_predecessor);
+
+  if (0 == (GNUNET_CRYPTO_cmp_peer_identity (next_hop, &my_identity)))/* This means I am the final destination */
   {
-    if(0 != (GNUNET_CRYPTO_cmp_peer_identity(&(trail_setup->current_destination),&my_identity)))
-    {
-      /* I am part of trail. 
-       SUPU: So, I should ask for next hop to reach the current_destination which is the finger
-       for which this packet has been sent. */
-      next_hop = GDS_ROUTING_search(&(trail_setup->source_peer),&(trail_setup->current_destination));
-      
-      /*TODO: 
-       call find_successor and compare the two peer ids 
-       and choose whichever is closest to the destination finger. */
-    } 
+    if (0 == trail_length)
+      next_peer = source;
     else
-    {
-      /* I am the current_destination finger
-       FIXME: Why are we sending current_destination to find_successor. 
-       In this case, is it safe to assume current_Destination = my_identity.
-       I guess we are sending current_destination so that we update it with new
-       current_destination, if could either me, friend or finger.*/
-      next_hop = find_successor(&(trail_setup->destination_finger),&(trail_setup->current_destination),&(peer_type));
-    }
+      next_peer = trail_peer_list[trail_length-1];
+
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, &next_peer);
+    GDS_NEIGHBOURS_send_trail_setup_result (source,
+                                            my_identity,
+                                            target_friend, trail_length,
+                                            trail_peer_list,
+                                            is_predecessor, 
+                                            ultimate_destination_finger_value,
+                                            trail_id);
   }
-   
-  /* If you are the next hop */
-  if(peer_type == MY_ID)
-  {
-    /* FIXME: Verify if its allowed here to definer peer_list and define it
-       again in the next block below? */
-      struct GNUNET_PeerIdentity *peer_list;
-      peer_list = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity) * (trail_length));
-      memcpy(peer_list, trail_peer_list, trail_length * sizeof (struct GNUNET_PeerIdentity));
-      current_trail_index = trail_length - 2;
-      next_peer = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity)); //FIXME: Do we need to allocate the memory?
-      memcpy(next_peer, &peer_list[current_trail_index], sizeof (struct GNUNET_PeerIdentity));
-      
-      target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_peer);
-     
-      /* FIXME: It does not find a friend. Could be possible error in find_successor 
-       function. Change the logic in find_successor and change it again. */
-   
-      /* FIXME: Here as destination_finger is 64 bit instead of struct
-       GNUNET_PeerIdentity, but you need destination_peer id. If you calling the 
-       function handle_Trail_setup_result from here, it means you are the
-       destination. So, you can send your own identity. */
-      GDS_NEIGHBOURS_handle_trail_setup_result(&(trail_setup->source_peer),
-                                               &(my_identity),
-                                               target_friend, trail_length,
-                                               peer_list,current_trail_index,
-                                               trail_setup->successor_flag);
-  
-    return GNUNET_YES;
+  else
+  {
+    struct GNUNET_PeerIdentity peer_list[trail_length + 1];
+
+    memcpy (peer_list, trail_peer_list, trail_length * sizeof (struct GNUNET_PeerIdentity));
+    peer_list[trail_length] = my_identity;
+
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);
+    GDS_NEIGHBOURS_send_trail_setup (source,
+                                     ultimate_destination_finger_value,
+                                     next_destination,
+                                     target_friend, trail_length + 1, peer_list,
+                                     is_predecessor, trail_id,
+                                     &new_intermediate_trail_id);
   }
-  
-  /* Add next_hop to list of peers that trail setup message have traversed so far
-   and increment trail length. */
-  struct GNUNET_PeerIdentity *peer_list;
-  peer_list = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity) * (trail_length + 1));
-  memcpy(peer_list, trail_peer_list, trail_length * sizeof (struct GNUNET_PeerIdentity));
-  memcpy(&peer_list[trail_length], next_hop, sizeof (struct GNUNET_PeerIdentity));
-  trail_length++;
-  
-  target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);
-  
-  if(peer_type == FINGER)
+  return GNUNET_OK;
+}
+
+
+/*
+ * Core handle for p2p trail tear down messages.
+ * @param cls closure
+ * @param message message
+ * @param peer peer identity this notification is about
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
+ */
+static int
+handle_dht_p2p_trail_compression (void *cls, const struct GNUNET_PeerIdentity *peer,
+                               const struct GNUNET_MessageHeader *message)
+{
+  struct PeerTrailCompressionMessage *trail_compression;
+  struct GNUNET_PeerIdentity *next_hop;
+  struct GNUNET_HashCode trail_id;
+  struct FriendInfo *target_friend;
+  size_t msize;
+
+  msize = ntohs (message->size);
+  if (msize != sizeof (struct PeerTrailCompressionMessage))
   {
-    GDS_ROUTING_add(&(trail_setup->source_peer),&(trail_setup->current_destination),next_hop);
+    GNUNET_break_op (0);
+    return GNUNET_OK;
   }
-  
-  GDS_NEIGHBOURS_handle_trail_setup(&(trail_setup->source_peer),
-                                    &(trail_setup->destination_finger),
-                                    target_friend,
-                                    trail_setup->trail_length,
-                                    peer_list,trail_setup->successor_flag);
-return GNUNET_YES;
+
+  trail_compression = (struct PeerTrailCompressionMessage *) message;
+  trail_id = trail_compression->trail_id;
+
+  if (0 == (GNUNET_CRYPTO_cmp_peer_identity (&(trail_compression->new_first_friend),
+                                             &my_identity)))
+  {
+     if(0 != (GNUNET_CRYPTO_cmp_peer_identity (&(trail_compression->destination_peer),
+                                               &my_identity)))
+     {
+       GDS_ROUTING_update_trail_prev_hop (trail_id,
+                                          trail_compression->source_peer);
+     }
+     return GNUNET_OK;
+  }
+
+  next_hop = GDS_ROUTING_get_next_hop (trail_id, GDS_ROUTING_SRC_TO_DEST);
+  if (NULL == next_hop)
+  {
+    GNUNET_break (0); /*FIXME: How to handle this case.  */
+    return GNUNET_OK;
+  }
+  GNUNET_assert (GNUNET_YES == GDS_ROUTING_remove_trail (trail_id));
+  target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_hop);
+  GDS_NEIGHBOURS_send_trail_compression (trail_compression->source_peer,
+                                         trail_compression->destination_peer,
+                                         trail_id,
+                                         trail_compression->new_first_friend,
+                                         target_friend);
+  return GNUNET_OK;
 }
 
 
 /**
- * FIXME : Add interval field. 
- * When adding successor or predeccsor, update a field to
- * specify that this entry is not a finger but immediate
- * successor or predeccesor. 
- * Add an entry in finger table. 
- * @param finger Finger to be added to finger table
- * @param peer_list peers this request has traversed so far
- * @param trail_length Numbers of peers in the trail.
+ * Core handler for trail teardown message.
+ * @param cls closure
+ * @param message message
+ * @param peer peer identity this notification is about
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
  */
-static 
-void finger_table_add(struct GNUNET_PeerIdentity *finger,
-                      const struct GNUNET_PeerIdentity *peer_list,
-                      unsigned int trail_length,
-                      unsigned int successor_flag)
-{
-  /*FIXME: okay so there are two fields. one we should remember what finger 
-   identity we were looking for and what successor id we got. */
-  struct FingerInfo *finger_entry;
-  finger_entry = GNUNET_malloc(sizeof(struct GNUNET_PeerIdentity));
-  memcpy(&(finger_entry->finger_identity), finger, sizeof(struct GNUNET_PeerIdentity));
-  memcpy(&(finger_entry->trail_peer_list), peer_list, sizeof(struct GNUNET_PeerIdentity)
-                                                      * trail_length);
-  finger_entry->successor = successor_flag;
-  if (1 == GNUNET_CONTAINER_multipeermap_size (finger_peermap))
-    verify_successor = GNUNET_SCHEDULER_add_now (&send_verify_successor_message, NULL);
+static int
+handle_dht_p2p_trail_teardown (void *cls, const struct GNUNET_PeerIdentity *peer,
+                               const struct GNUNET_MessageHeader *message)
+{
+  struct PeerTrailTearDownMessage *trail_teardown;
+  struct GNUNET_HashCode trail_id;
+  enum GDS_ROUTING_trail_direction trail_direction;
+  size_t msize;
+
+  msize = ntohs (message->size);
+  if (msize != sizeof (struct PeerTrailTearDownMessage))
+  {
+    GNUNET_break_op (0);
+    return GNUNET_OK;
+  }
+
+  trail_teardown = (struct PeerTrailTearDownMessage *) message;
+  trail_direction = ntohl (trail_teardown->trail_direction);
+  trail_id = trail_teardown->TRAIL_ID;
+
+  if (0 != GNUNET_CRYPTO_cmp_peer_identity (&my_identity,
+                                            &trail_teardown->destination_peer))
+  {
+    struct GNUNET_PeerIdentity *next_hop;
+    struct FriendInfo *target_friend;
+
+    next_hop = GDS_ROUTING_get_next_hop (trail_id, trail_direction);
+    if (NULL == next_hop)
+    {
+      GNUNET_break (0);
+      return GNUNET_SYSERR;
+    }
+
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap,
+                                                       next_hop);
+    GNUNET_assert (GNUNET_YES == GDS_ROUTING_remove_trail (trail_id));
+    GDS_NEIGHBOURS_send_trail_teardown (trail_teardown->source_peer,
+                                        trail_teardown->destination_peer,
+                                        trail_id, trail_direction,
+                                        target_friend);
+  }
+  return GNUNET_OK;
 }
 
 
 /**
- * Core handle for p2p trail construction result messages.
+ * Fixme: this function is called only in case in notify new successor, the new
+ * successor wants to add the source of the peer as its predecessor. Identify
+ * if there is any other use case where it is required and if yes then adapt the
+ * code for it.
+ * Core handle for p2p add trail message.
  * @param cls closure
  * @param message message
  * @param peer peer identity this notification is about
- * @return GNUNET_OK on success, GNUNET_SYSERR on error
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
  */
 static int
-handle_dht_p2p_trail_setup_result(void *cls, const struct GNUNET_PeerIdentity *peer,
-                    const struct GNUNET_MessageHeader *message)
+handle_dht_p2p_add_trail (void *cls, const struct GNUNET_PeerIdentity *peer,
+                          const struct GNUNET_MessageHeader *message)
 {
-  struct PeerTrailSetupResultMessage *trail_result;
+  struct PeerAddTrailMessage *add_trail;
+  struct GNUNET_PeerIdentity *trail;
+  struct GNUNET_HashCode trail_id;
+  struct GNUNET_PeerIdentity destination_peer;
+  struct GNUNET_PeerIdentity source_peer;
+  struct GNUNET_PeerIdentity next_hop;
+  unsigned int trail_length;
+  unsigned int my_index;
   size_t msize;
-  uint32_t trail_length;
-  const struct GNUNET_PeerIdentity *trail_peer_list;
-  uint32_t current_trail_index;
-  struct GNUNET_PeerIdentity *next_peer;
-  struct FriendInfo *target_friend;
-  
+
   msize = ntohs (message->size);
-  if (msize < sizeof (struct PeerTrailSetupMessage))
+  if (msize != sizeof (struct PeerAddTrailMessage))
   {
     GNUNET_break_op (0);
-    return GNUNET_YES;
+    return GNUNET_OK;
   }
-  
-  trail_result = (struct PeerTrailSetupResultMessage *) message; 
-  trail_length = ntohl (trail_result->trail_length); 
-  current_trail_index = ntohl(trail_result->current_index);
-  trail_peer_list = (struct GNUNET_PeerIdentity *) &trail_result[1];
-  
-  if ((msize <
-       sizeof (struct PeerTrailSetupResultMessage) +
-       trail_length * sizeof (struct GNUNET_PeerIdentity)) ||
+
+  add_trail = (struct PeerAddTrailMessage *) message;
+  trail_length = (msize - sizeof (struct PeerAddTrailMessage))/
+                  sizeof (struct GNUNET_PeerIdentity);
+  if ((msize - sizeof (struct PeerAddTrailMessage)) % 
+      sizeof (struct GNUNET_PeerIdentity) != 0)
+  {
+    GNUNET_break_op (0);
+    return GNUNET_OK;      
+  }           
+
+  if ((msize < sizeof (struct PeerAddTrailMessage) +
+               trail_length * sizeof (struct GNUNET_PeerIdentity)) ||
       (trail_length >
        GNUNET_SERVER_MAX_MESSAGE_SIZE / sizeof (struct GNUNET_PeerIdentity)))
   {
     GNUNET_break_op (0);
-    return GNUNET_YES;
+    return GNUNET_OK;
   }
-  if(0 == (GNUNET_CRYPTO_cmp_peer_identity (&(trail_result->current_destination), &my_identity)))
+
+  trail = (struct GNUNET_PeerIdentity *)&add_trail[1];
+  destination_peer = add_trail->destination_peer;
+  source_peer = add_trail->source_peer;
+  trail_id = add_trail->trail_id;
+
+  if (0 != GNUNET_CRYPTO_cmp_peer_identity (&my_identity,
+                                            &destination_peer))
   {
-    /* Am I the destination? */
-    if( 0 == (GNUNET_CRYPTO_cmp_peer_identity(&(trail_result->destination_peer), &my_identity)))
+    struct FriendInfo *target_friend;
+
+    my_index = search_my_index (trail, trail_length);
+    if (GNUNET_SYSERR == my_index)
     {
-      finger_table_add(&(trail_result->finger), trail_peer_list,trail_length,trail_result->successor_flag);
-      return GNUNET_YES;
+      GNUNET_break_op (0);
+      return GNUNET_SYSERR;
     }
+
+    if (0 == my_index)
+      next_hop = source_peer;
     else
-    {
-      next_peer = GNUNET_malloc (sizeof (struct GNUNET_PeerIdentity));
-      current_trail_index = current_trail_index - 1;
-      memcpy(next_peer, &(trail_peer_list[trail_length-1]), sizeof (struct GNUNET_PeerIdentity));
-      target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, next_peer);
-    
-      GDS_NEIGHBOURS_handle_trail_setup_result(&(trail_result->destination_peer),
-                                               &(trail_result->finger),
-                                               target_friend, trail_length,
-                                               trail_peer_list,current_trail_index,
-                                               trail_result->successor_flag);
-      return GNUNET_YES;
-    }
+      next_hop = trail[trail_length - 1];
+
+    GNUNET_assert (GNUNET_OK == GDS_ROUTING_add (trail_id, next_hop, *peer));
+    target_friend = GNUNET_CONTAINER_multipeermap_get (friend_peermap, &next_hop);
+    GDS_NEIGHBOURS_send_add_trail (source_peer, destination_peer, trail_id,
+                                   trail, trail_length, target_friend);
   }
-  else
-    return GNUNET_SYSERR;
+  return GNUNET_OK;
 }
 
 
 /**
- * Core handle for p2p verify successor messages.
- * @return GNUNET_OK on success, GNUNET_SYSERR on error
+ *FIXME; call send_trail_teardown_message on all the trails of the finger that
+ * you remove. Also you don't need to decerement friend trail count as that
+ * friend is removed. But you can not send trail teardown message as the friend
+ * is disconnected. then you don't have any next_hop. and in case there are
+ * multiple trails. and friend is the first trail then you remove only the trail.
+ * Iterate over finger_hashmap, and remove entries if finger is the disconnected
+ * peer or if disconnected peer is the first friend in the trail to reach the
+ * finger.
+ * @param cls closure
+ * @param key current public key
+ * @param value value in the hash map
+ * @return #GNUNET_YES if we should continue to
+ *         iterate,
+ *         #GNUNET_NO if not.
  */
 static int
-handle_dht_p2p_verify_successor()
+remove_matching_finger (void *cls,
+                        uint32_t key,
+                        void *value)
 {
-  /*
-   * In this function you have received the message verify successor,
-   * Now, either you are the destination or just part of the trail.
-   * As we already know the whole path find out the next destination
-   * and pass the packet forward.
-   * If you are the final destination, check who is your predecessor.  
-   * and send your predecessor back to calling function. 
-   * FIXME: Should we have a different handler function for it. 
-   */
+  struct FingerInfo *remove_finger = value;
+  const struct GNUNET_PeerIdentity *disconnected_peer = cls;
+  struct Trail *trail_list;
+  int i;
+
+  if (0 == GNUNET_CRYPTO_cmp_peer_identity (&remove_finger->finger_identity,
+                                            disconnected_peer))
+  {
+    GNUNET_assert (GNUNET_YES ==
+                   GNUNET_CONTAINER_multihashmap32_remove (finger_hashmap,
+                                                         key,
+                                                         remove_finger));
+    free_finger (remove_finger);
+    return GNUNET_YES;
+  }
+
+  for (i = 0; i< remove_finger->trails_count; i++)
+  {
+    trail_list = &remove_finger->trail_list[i];
+    if (0 == GNUNET_CRYPTO_cmp_peer_identity (&trail_list->trail_head->peer,
+                                                disconnected_peer))
+    {
+      GNUNET_assert (GNUNET_YES ==
+                     GNUNET_CONTAINER_multihashmap32_remove (finger_hashmap,
+                                                           key,
+                                                           remove_finger));
+       free_finger (remove_finger);
+    }
+  }
+
   return GNUNET_YES;
 }
 
+
 /**
- * Core handle for p2p notify successor messages.
- * @return GNUNET_OK on success, GNUNET_SYSERR on error
+ * Method called whenever a peer disconnects.
+ *
+ * @param cls closure
+ * @param peer peer identity this notification is about
  */
-static int
-handle_dht_p2p_notify_new_successor()
+static void
+handle_core_disconnect (void *cls,
+                                         const struct GNUNET_PeerIdentity *peer)
 {
-  /*
-   * So, if you are the destination you should update your
-   * predecessor field with peer id of source peer of this message.
-   * If you are not the destination peer, then just check your routing
-   * table and pass on the message. 
-   */
-  return GNUNET_YES;
+  struct FriendInfo *remove_friend;
+
+  if (0 == memcmp (&my_identity, peer, sizeof (struct GNUNET_PeerIdentity)))
+    return;
+
+  remove_friend =
+      GNUNET_CONTAINER_multipeermap_get (friend_peermap, peer);
+
+  if (NULL == remove_friend)
+  {
+    GNUNET_break (0);
+    return;
+  }
+
+  GNUNET_assert (GNUNET_SYSERR !=
+                 GNUNET_CONTAINER_multihashmap32_iterate (finger_hashmap,
+                                                          &remove_matching_finger,
+                                                          (void *)peer));
+  GDS_ROUTING_remove_trail_by_peer (peer);
+  GNUNET_assert (GNUNET_YES ==
+                 GNUNET_CONTAINER_multipeermap_remove (friend_peermap,
+                                                       peer,
+                                                       remove_friend));
+
+  if (0 != GNUNET_CONTAINER_multipeermap_size (friend_peermap))
+    return;
+
+  if (GNUNET_SCHEDULER_NO_TASK != find_finger_trail_task)
+  {
+      GNUNET_SCHEDULER_cancel (find_finger_trail_task);
+      find_finger_trail_task = GNUNET_SCHEDULER_NO_TASK;
+  }
+  else
+    GNUNET_break (0);
 }
 
+
 /**
- * Core handle for p2p verify successor result messages.
- * @return GNUNET_OK on success, GNUNET_SYSERR on error
+ * Method called whenever a peer connects.
+ *
+ * @param cls closure
+ * @param peer_identity peer identity this notification is about
  */
-static int
-handle_dht_p2p_verify_successor_result()
+static void
+handle_core_connect (void *cls, const struct GNUNET_PeerIdentity *peer_identity)
 {
-  /*
-   * In this function you have received the message verify successor result,
-   If you are not the destination, just pass this message forward
-   * if you are destination,
-   * then check if immediate predecessor of this peer is you or someone else.
-   * If its you, then don't do anything.
-   * If its some one else, then call notify method to let your new successor
-   * know that you are its predecessor. 
-   */
-  return GNUNET_YES;
+  struct FriendInfo *friend;
+
+  /* Check for connect to self message */
+  if (0 == memcmp (&my_identity, peer_identity, sizeof (struct GNUNET_PeerIdentity)))
+    return;
+
+  GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Connected to %s\n", GNUNET_i2s (peer_identity));
+
+  /* If peer already exists in our friend_peermap, then exit. */
+  if (GNUNET_YES == GNUNET_CONTAINER_multipeermap_contains (friend_peermap, peer_identity))
+  {
+    GNUNET_break (0);
+    return;
+  }
+
+  GNUNET_STATISTICS_update (GDS_stats, gettext_noop ("# peers connected"), 1,
+                            GNUNET_NO);
+
+  friend = GNUNET_new (struct FriendInfo);
+  friend->id = *peer_identity;
+
+  GNUNET_assert (GNUNET_OK ==
+                 GNUNET_CONTAINER_multipeermap_put (friend_peermap,
+                                                    peer_identity, friend,
+                                                    GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY));
+
+  /* got a first connection, good time to start with FIND FINGER TRAIL requests... */
+  if (GNUNET_SCHEDULER_NO_TASK == find_finger_trail_task)
+    find_finger_trail_task = GNUNET_SCHEDULER_add_now (&send_find_finger_trail_message, NULL);
+}
+
+
+/**
+ * To be called on core init/fail.
+ *
+ * @param cls service closure
+ * @param identity the public identity of this peer
+ */
+static void
+core_init (void *cls,
+           const struct GNUNET_PeerIdentity *identity)
+{
+  my_identity = *identity;
 }
 
 
 /**
  * Initialize neighbours subsystem.
- * @return GNUNET_OK on success, GNUNET_SYSERR on error
+ * @return #GNUNET_OK on success, #GNUNET_SYSERR on error
  */
 int
-GDS_NEIGHBOURS_init()
+GDS_NEIGHBOURS_init (void)
 {
   static struct GNUNET_CORE_MessageHandler core_handlers[] = {
-    {&handle_dht_p2p_get, GNUNET_MESSAGE_TYPE_DHT_P2P_GET, 0},
     {&handle_dht_p2p_put, GNUNET_MESSAGE_TYPE_DHT_P2P_PUT, 0},
+    {&handle_dht_p2p_get, GNUNET_MESSAGE_TYPE_DHT_P2P_GET, 0},
+    {&handle_dht_p2p_get_result, GNUNET_MESSAGE_TYPE_DHT_P2P_GET_RESULT, 0},
     {&handle_dht_p2p_trail_setup, GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_SETUP, 0},
     {&handle_dht_p2p_trail_setup_result, GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_SETUP_RESULT, 0},
     {&handle_dht_p2p_verify_successor, GNUNET_MESSAGE_TYPE_DHT_P2P_VERIFY_SUCCESSOR, 0},
-    {&handle_dht_p2p_notify_new_successor, GNUNET_MESSAGE_TYPE_DHT_P2P_NOTIFY_NEW_SUCCESSOR, 0},
     {&handle_dht_p2p_verify_successor_result, GNUNET_MESSAGE_TYPE_DHT_P2P_VERIFY_SUCCESSOR_RESULT, 0},
+    {&handle_dht_p2p_notify_new_successor, GNUNET_MESSAGE_TYPE_DHT_P2P_NOTIFY_NEW_SUCCESSOR, 0},
+    {&handle_dht_p2p_trail_rejection, GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_REJECTION, 0},
+    {&handle_dht_p2p_trail_compression, GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_COMPRESSION, 0},
+    {&handle_dht_p2p_trail_teardown, GNUNET_MESSAGE_TYPE_DHT_P2P_TRAIL_TEARDOWN, 0},
+    {&handle_dht_p2p_add_trail, GNUNET_MESSAGE_TYPE_DHT_P2P_ADD_TRAIL, 0},
     {NULL, 0, 0}
   };
 
-  /*TODO: What is ATS? Why do we need it? */
-  atsAPI = GNUNET_ATS_performance_init (GDS_cfg, NULL, NULL);
   core_api =
     GNUNET_CORE_connect (GDS_cfg, NULL, &core_init, &handle_core_connect,
-                           &handle_core_disconnect, NULL, GNUNET_NO, NULL,
-                           GNUNET_NO, core_handlers);
-  if (core_api == NULL)
+                         &handle_core_disconnect, NULL, GNUNET_NO, NULL,
+                         GNUNET_NO, core_handlers);
+  if (NULL == core_api)
     return GNUNET_SYSERR;
 
   friend_peermap = GNUNET_CONTAINER_multipeermap_create (256, GNUNET_NO);
-  finger_peermap = GNUNET_CONTAINER_multipeermap_create (MAX_FINGERS, GNUNET_NO); 
+  finger_hashmap = GNUNET_CONTAINER_multihashmap32_create (MAX_FINGERS * 4/3);
+
   return GNUNET_OK;
 }
 
-
 /**
  * Shutdown neighbours subsystem.
  */
 void
-GDS_NEIGHBOURS_done ()
+GDS_NEIGHBOURS_done (void)
 {
   if (NULL == core_api)
     return;
-  
+
   GNUNET_CORE_disconnect (core_api);
   core_api = NULL;
-  GNUNET_ATS_performance_done (atsAPI);
-  atsAPI = NULL;
 
-  /* FIXME: Once handle_core_disconnect is implemented, both below assertion should not
-   fail. */
   GNUNET_assert (0 == GNUNET_CONTAINER_multipeermap_size (friend_peermap));
   GNUNET_CONTAINER_multipeermap_destroy (friend_peermap);
   friend_peermap = NULL;
 
-  GNUNET_assert (0 == GNUNET_CONTAINER_multipeermap_size (finger_peermap));
-  GNUNET_CONTAINER_multipeermap_destroy (finger_peermap);
-  finger_peermap = NULL;
+  GNUNET_assert (0 == GNUNET_CONTAINER_multihashmap32_size (finger_hashmap));
+  GNUNET_CONTAINER_multihashmap32_destroy (finger_hashmap);
+  finger_hashmap = NULL;
 
   if (GNUNET_SCHEDULER_NO_TASK != find_finger_trail_task)
   {
+    GNUNET_break (0);
     GNUNET_SCHEDULER_cancel (find_finger_trail_task);
     find_finger_trail_task = GNUNET_SCHEDULER_NO_TASK;
   }
-  
-  /* FIXME: fix_fingers will also be a task like this.
-     Add it later. */
-  if (GNUNET_SCHEDULER_NO_TASK != verify_successor)
-  {
-    GNUNET_SCHEDULER_cancel (verify_successor);
-    verify_successor = GNUNET_SCHEDULER_NO_TASK;
-  }
-  
 }
 
 
 /**
- * Get the ID of the local node.
+ * Get my identity
  *
- * @return identity of the local node
+ * @return my identity
  */
-struct GNUNET_PeerIdentity *
-GDS_NEIGHBOURS_get_id ()
+struct GNUNET_PeerIdentity
+GDS_NEIGHBOURS_get_my_id (void)
 {
-  return &my_identity;
+  return my_identity;
 }
-
-
-/* end of gnunet-service-xdht_neighbours.c */
\ No newline at end of file