Adding a function pick_random_friend ()
[oweals/gnunet.git] / src / dht / gnunet_dht_profiler.c
index f9fb4cfe6168be651c917d63dc2abe7e0e80e9db..44f961af1fe13b9dabf7950f47055d38aad72815 100644 (file)
@@ -1,6 +1,6 @@
 /*
      This file is part of GNUnet.
-     (C) 2014 Christian Grothoff (and other contributing authors)
+     Copyright (C) 2014 Christian Grothoff (and other contributing authors)
 
      GNUnet is free software; you can redistribute it and/or modify
      it under the terms of the GNU General Public License as published
 /**
  * @file dht/gnunet_dht_profiler.c
  * @brief Profiler for GNUnet DHT
- * @author Sree Harsha Totakura <sreeharsha@totakura.in> 
+ * @author Sree Harsha Totakura <sreeharsha@totakura.in>
  */
 
 #include "platform.h"
 #include "gnunet_util_lib.h"
 #include "gnunet_testbed_service.h"
+#include "gnunet_dht_service.h"
+
+#define INFO(...)                                       \
+  GNUNET_log (GNUNET_ERROR_TYPE_INFO, __VA_ARGS__)
+
+#define DEBUG(...)                                           \
+  GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, __VA_ARGS__)
+
+/**
+ * Number of peers which should perform a PUT out of 100 peers
+ */
+#define PUT_PROBABILITY 50
+
+#if ENABLE_MALICIOUS
+/**
+ * Number of peers which should act as malicious peers
+ */
+#define MALICIOUS_PROBABILITY 20
+
+/**
+ * Context for a peer which should act maliciously.
+ */
+struct MaliciousContext;
+#endif
+
+
+/**
+ * Configuration
+ */
+static struct GNUNET_CONFIGURATION_Handle *cfg;
+
+/**
+ * Name of the file with the hosts to run the test over
+ */
+static char *hosts_file;
+
+/**
+ * Context for a peer which actively does DHT PUT/GET
+ */
+struct ActiveContext;
+
+/**
+ * Context to hold data of peer
+ */
+struct Context
+{
+  /**
+   * The testbed peer this context belongs to
+   */
+  struct GNUNET_TESTBED_Peer *peer;
+
+  /**
+   * Testbed operation acting on this peer
+   */
+  struct GNUNET_TESTBED_Operation *op;
+
+  /**
+   * Active context; NULL if this peer is not an active peer
+   */
+  struct ActiveContext *ac;
+
+#if ENABLE_MALICIOUS
+  /**
+   * Malicious context; NULL if this peer is NOT malicious.
+   */
+  struct MaliciousContext *mc;
+#endif
+};
+
+
+#if ENABLE_MALICIOUS
+/**
+ * Context for a peer which should act maliciously.
+ */
+struct MaliciousContext
+{
+  /**
+   * The linked peer context
+   */
+  struct Context *ctx;
+
+  /**
+   * Handler to the DHT service
+   */
+  struct GNUNET_DHT_Handle *dht;
+
+  /**
+   * Handler to malicious api
+   */
+  struct GNUNET_DHT_ActMaliciousHandle *dht_malicious;
+};
+
+/**
+ * List of all the malicious peers contexts.
+ */
+struct Context **malicious_peer_contexts = NULL;
+
+/**
+ * Context for a peer which should act maliciously.
+ */
+struct Malicious_Context
+{
+  /**
+   * The linked peer context
+   */
+  struct Context *ctx;
+
+  /**
+   * Handler to the DHT service
+   */
+  struct GNUNET_DHT_Handle *dht;
+};
+
+/**
+ * Array of malicious peers.
+ */
+static struct MaliciousContext *a_mc;
+
+/**
+ * Number or malicious peers.
+ */
+static unsigned int n_malicious;
+
+#endif
+
+/**
+ * Context for a peer which actively does DHT PUT/GET
+ */
+struct ActiveContext
+{
+  /**
+   * The linked peer context
+   */
+  struct Context *ctx;
+
+  /**
+   * Handler to the DHT service
+   */
+  struct GNUNET_DHT_Handle *dht;
+
+  /**
+   * The data used for do a PUT.  Will be NULL if a PUT hasn't been performed yet
+   */
+  void *put_data;
+
+  /**
+   * The active context used for our DHT GET
+   */
+  struct ActiveContext *get_ac;
+
+  /**
+   * The put handle
+   */
+  struct GNUNET_DHT_PutHandle *dht_put;
+
+  /**
+   * The get handle
+   */
+  struct GNUNET_DHT_GetHandle *dht_get;
+
+  /**
+   * The hash of the @e put_data
+   */
+  struct GNUNET_HashCode hash;
+
+  /**
+   * Delay task
+   */
+  struct GNUNET_SCHEDULER_Task * delay_task;
+
+  /**
+   * The size of the @e put_data
+   */
+  uint16_t put_data_size;
+
+  /**
+   * The number of peers currently doing GET on our data
+   */
+  uint16_t nrefs;
+};
+
+
+/**
+ * An array of contexts.  The size of this array should be equal to @a num_peers
+ */
+static struct Context *a_ctx;
+
+/**
+ * Array of active peers
+ */
+static struct ActiveContext *a_ac;
+
+/**
+ * The delay between rounds for collecting statistics
+ */
+static struct GNUNET_TIME_Relative delay_stats;
+
+/**
+ * The delay to start puts.
+ */
+static struct GNUNET_TIME_Relative delay_put;
+
+/**
+ * The delay to start puts.
+ */
+static struct GNUNET_TIME_Relative delay_get;
+
+/**
+ * The timeout for GET and PUT
+ */
+static struct GNUNET_TIME_Relative timeout;
+
+/**
+ * Number of peers
+ */
+static unsigned int num_peers;
+
+/**
+ * Number of active peers
+ */
+static unsigned int n_active;
+
+/**
+ * Number of DHT service connections we currently have
+ */
+static unsigned int n_dht;
+
+/**
+ * Number of DHT PUTs made
+ */
+static unsigned int n_puts;
+
+/**
+ * Number of DHT PUTs succeeded
+ */
+static unsigned int n_puts_ok;
+
+/**
+ * Number of DHT PUTs failed
+ */
+static unsigned int n_puts_fail;
+
+/**
+ * Number of DHT GETs made
+ */
+static unsigned int n_gets;
+
+/**
+ * Number of DHT GETs succeeded
+ */
+static unsigned int n_gets_ok;
+
+/**
+ * Number of DHT GETs succeeded
+ */
+static unsigned int n_gets_fail;
+
+/**
+ * Replication degree
+ */
+static unsigned int replication;
+
+/**
+ * Number of times we try to find the successor circle formation
+ */
+static unsigned int max_searches;
+
+/**
+ * Testbed Operation (to get stats).
+ */
+static struct GNUNET_TESTBED_Operation *bandwidth_stats_op;
+
+/**
+ * To get successor stats.
+ */
+static struct GNUNET_TESTBED_Operation *successor_stats_op;
+
+/**
+ * Testbed peer handles.
+ */
+static struct GNUNET_TESTBED_Peer **testbed_handles;
+
+/**
+ * Total number of messages sent by peer.
+ */
+static uint64_t outgoing_bandwidth;
+
+/**
+ * Total number of messages received by peer.
+ */
+static uint64_t incoming_bandwidth;
+
+/**
+ * Average number of hops taken to do put.
+ */
+static double average_put_path_length;
+
+/**
+ * Average number of hops taken to do get.
+ */
+static double average_get_path_length;
+
+/**
+ * Total put path length across all peers.
+ */
+static unsigned int total_put_path_length;
+
+/**
+ * Total get path length across all peers.
+ */
+static unsigned int total_get_path_length;
+
+/**
+ * Hashmap to store pair of peer and its corresponding successor.
+ */
+static struct GNUNET_CONTAINER_MultiHashMap *successor_peer_hashmap;
+
+/**
+ * Key to start the lookup on successor_peer_hashmap.
+ */
+static struct GNUNET_HashCode *start_key;
+
+/**
+ * Flag used to get the start_key.
+ */
+static int flag = 0;
+
+/**
+ * Task to collect peer and its current successor statistics.
+ */
+static struct GNUNET_SCHEDULER_Task * successor_stats_task;
+
+/**
+ * Closure for successor_stats_task.
+ */
+struct Collect_Stat_Context
+{
+  /**
+   * Current Peer Context.
+   */
+  struct Context *service_connect_ctx;
+
+  /**
+   * Testbed operation acting on this peer
+   */
+  struct GNUNET_TESTBED_Operation *op;
+};
+
+/**
+ * List of all the peers contexts.
+ */
+struct Context **peer_contexts = NULL;
+
+/**
+ * Counter to keep track of peers added to peer_context lists.
+ */
+static int peers_started = 0;
+
+/**
+ * Should we do a PUT (mode = 0) or GET (mode = 1);
+ */
+static enum
+{
+  MODE_PUT = 0,
+
+  MODE_GET = 1
+} mode;
+
+
+/**
+ * Are we shutting down
+ */
+static int in_shutdown = 0;
+
+/**
+ * Total number of times to check if circle is formed or not.
+ */
+static unsigned int tries;
+
+/**
+ * Task that collects successor statistics from all the peers.
+ * @param cls
+ * @param tc
+ */
+static void
+collect_stats (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc);
+
+/**
+ * Connect to DHT services of active peers
+ */
+static void
+start_profiling();
+
+/**
+ * Shutdown task.  Cleanup all resources and operations.
+ *
+ * @param cls NULL
+ * @param tc scheduler task context
+ */
+static void
+do_shutdown (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  struct ActiveContext *ac;
+  unsigned int cnt;
+
+  in_shutdown = GNUNET_YES;
+  if (NULL != a_ctx)
+  {
+    for (cnt=0; cnt < num_peers; cnt++)
+    {
+      /* Cleanup active context if this peer is an active peer */
+      ac = a_ctx[cnt].ac;
+      if (NULL != ac)
+      {
+        if (NULL != ac->delay_task)
+          GNUNET_SCHEDULER_cancel (ac->delay_task);
+        if (NULL != ac->put_data)
+          GNUNET_free (ac->put_data);
+        if (NULL != ac->dht_put)
+          GNUNET_DHT_put_cancel (ac->dht_put);
+        if (NULL != ac->dht_get)
+          GNUNET_DHT_get_stop (ac->dht_get);
+      }
+      /* Cleanup testbed operation handle at the last as this operation may
+         contain service connection to DHT */
+      if (NULL != a_ctx[cnt].op)
+        GNUNET_TESTBED_operation_done (a_ctx[cnt].op);
+    }
+    GNUNET_free (a_ctx);
+    a_ctx = NULL;
+  }
+  //FIXME: Should we collect stats only for put/get not for other messages.
+  if(NULL != bandwidth_stats_op)
+    GNUNET_TESTBED_operation_done (bandwidth_stats_op);
+  bandwidth_stats_op = NULL;
+  GNUNET_free_non_null (a_ac);
+}
+
+
+/**
+ * Stats callback. Finish the stats testbed operation and when all stats have
+ * been iterated, shutdown the test.
+ *
+ * @param cls closure
+ * @param op the operation that has been finished
+ * @param emsg error message in case the operation has failed; will be NULL if
+ *          operation has executed successfully.
+ */
+static void
+bandwidth_stats_cont (void *cls,
+                      struct GNUNET_TESTBED_Operation *op,
+                      const char *emsg)
+{
+  INFO ("# Outgoing bandwidth: %u\n", outgoing_bandwidth);
+  INFO ("# Incoming bandwidth: %u\n", incoming_bandwidth);
+  GNUNET_SCHEDULER_shutdown ();
+}
+
+
+/**
+ * Process statistic values.
+ *
+ * @param cls closure
+ * @param peer the peer the statistic belong to
+ * @param subsystem name of subsystem that created the statistic
+ * @param name the name of the datum
+ * @param value the current value
+ * @param is_persistent GNUNET_YES if the value is persistent, GNUNET_NO if not
+ * @return GNUNET_OK to continue, GNUNET_SYSERR to abort iteration
+ */
+static int
+bandwidth_stats_iterator (void *cls,
+                          const struct GNUNET_TESTBED_Peer *peer,
+                          const char *subsystem,
+                          const char *name,
+                          uint64_t value,
+                          int is_persistent)
+{
+   static const char *s_sent = "# Bytes transmitted to other peers";
+   static const char *s_recv = "# Bytes received from other peers";
+
+   if (0 == strncmp (s_sent, name, strlen (s_sent)))
+     outgoing_bandwidth = outgoing_bandwidth + value;
+   else if (0 == strncmp(s_recv, name, strlen (s_recv)))
+     incoming_bandwidth = incoming_bandwidth + value;
+
+    return GNUNET_OK;
+}
+
+
+static void
+summarize ()
+{
+  INFO ("# PUTS made: %u\n", n_puts);
+  INFO ("# PUTS succeeded: %u\n", n_puts_ok);
+  INFO ("# PUTS failed: %u\n", n_puts_fail);
+  INFO ("# GETS made: %u\n", n_gets);
+  INFO ("# GETS succeeded: %u\n", n_gets_ok);
+  INFO ("# GETS failed: %u\n", n_gets_fail);
+  INFO ("# average_put_path_length: %f\n", average_put_path_length);
+  INFO ("# average_get_path_length: %f\n", average_get_path_length);
+
+  if (NULL == testbed_handles)
+  {
+    INFO ("No peers found\n");
+    return;
+  }
+  /* Collect Stats*/
+  bandwidth_stats_op = GNUNET_TESTBED_get_statistics (n_active, testbed_handles,
+                                                      "dht", NULL,
+                                                       bandwidth_stats_iterator,
+                                                       bandwidth_stats_cont, NULL);
+}
+
+
+/**
+ * Task to cancel DHT GET.
+ *
+ * @param cls NULL
+ * @param tc scheduler task context
+ */
+static void
+cancel_get (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  struct ActiveContext *ac = cls;
+  struct Context *ctx = ac->ctx;
+
+  ac->delay_task = NULL;
+  GNUNET_assert (NULL != ac->dht_get);
+  GNUNET_DHT_get_stop (ac->dht_get);
+  ac->dht_get = NULL;
+  n_gets_fail++;
+  GNUNET_assert (NULL != ctx->op);
+  GNUNET_TESTBED_operation_done (ctx->op);
+  ctx->op = NULL;
+
+  /* If profiling is complete, summarize */
+  if (n_active == n_gets_fail + n_gets_ok)
+  {
+    average_put_path_length = (double)total_put_path_length/(double)n_active;
+    average_get_path_length = (double)total_get_path_length/(double )n_gets_ok;
+    summarize ();
+  }
+}
+
+
+/**
+ * Iterator called on each result obtained for a DHT
+ * operation that expects a reply
+ *
+ * @param cls closure
+ * @param exp when will this value expire
+ * @param key key of the result
+ * @param get_path peers on reply path (or NULL if not recorded)
+ *                 [0] = datastore's first neighbor, [length - 1] = local peer
+ * @param get_path_length number of entries in @a get_path
+ * @param put_path peers on the PUT path (or NULL if not recorded)
+ *                 [0] = origin, [length - 1] = datastore
+ * @param put_path_length number of entries in @a put_path
+ * @param type type of the result
+ * @param size number of bytes in @a data
+ * @param data pointer to the result data
+ */
+static void
+get_iter (void *cls,
+          struct GNUNET_TIME_Absolute exp,
+          const struct GNUNET_HashCode *key,
+          const struct GNUNET_PeerIdentity *get_path,
+          unsigned int get_path_length,
+          const struct GNUNET_PeerIdentity *put_path,
+          unsigned int put_path_length,
+          enum GNUNET_BLOCK_Type type,
+          size_t size, const void *data)
+{
+  struct ActiveContext *ac = cls;
+  struct ActiveContext *get_ac = ac->get_ac;
+  struct Context *ctx = ac->ctx;
+
+  /* Check the keys of put and get match or not. */
+  GNUNET_assert (0 == memcmp (key, &get_ac->hash, sizeof (struct GNUNET_HashCode)));
+  /* we found the data we are looking for */
+  DEBUG ("We found a GET request; %u remaining\n", n_gets - (n_gets_fail + n_gets_ok)); //FIXME: It always prints 1.
+  n_gets_ok++;
+  get_ac->nrefs--;
+  GNUNET_DHT_get_stop (ac->dht_get);
+  ac->dht_get = NULL;
+  if (ac->delay_task != NULL)
+    GNUNET_SCHEDULER_cancel (ac->delay_task);
+  ac->delay_task = NULL;
+  GNUNET_assert (NULL != ctx->op);
+  GNUNET_TESTBED_operation_done (ctx->op);
+  ctx->op = NULL;
+
+  total_put_path_length = total_put_path_length + (double)put_path_length;
+  total_get_path_length = total_get_path_length + (double)get_path_length;
+  DEBUG ("total_put_path_length = %f,put_path \n",total_put_path_length);
+  /* Summarize if profiling is complete */
+  if (n_active == n_gets_fail + n_gets_ok)
+  {
+    average_put_path_length = (double)total_put_path_length/(double)n_active;
+    average_get_path_length = (double)total_get_path_length/(double )n_gets_ok;
+    summarize ();
+  }
+}
+
 
 /**
- * Number of peers which should perform a PUT out of 100 peers
+ * Task to do DHT GETs
+ *
+ * @param cls the active context
+ * @param tc the scheduler task context
  */
-#define PUT_PROBABILITY 50
+static void
+delayed_get (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  struct ActiveContext *ac = cls;
+  struct ActiveContext *get_ac;
+  unsigned int r;
+
+  ac->delay_task = NULL;
+  get_ac = NULL;
+  while (1)
+  {
+    r = GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, n_active);
+    get_ac = &a_ac[r];
+    if (NULL != get_ac->put_data)
+      break;
+  }
+  get_ac->nrefs++;
+  ac->get_ac = get_ac;
+  DEBUG ("GET_REQUEST_START key %s \n", GNUNET_h2s((struct GNUNET_HashCode *)ac->put_data));
+  ac->dht_get = GNUNET_DHT_get_start (ac->dht,
+                                      GNUNET_BLOCK_TYPE_TEST,
+                                      &get_ac->hash,
+                                      1, /* replication level */
+                                      GNUNET_DHT_RO_NONE,
+                                      NULL, 0, /* extended query and size */
+                                      get_iter, ac); /* GET iterator and closure
+                                                        */
+  n_gets++;
+
+  /* schedule the timeout task for GET */
+  ac->delay_task = GNUNET_SCHEDULER_add_delayed (timeout, &cancel_get, ac);
+}
+
 
 /**
- * Configuration
+ * Task to teardown the dht connection.  We do it as a task because calling
+ * GNUNET_DHT_disconnect() from put_continutation_callback seems illegal (the
+ * put_continuation_callback() is getting called again synchronously).  Also,
+ * only free the operation when we are not shutting down; the shutdown task will
+ * clear the operation during shutdown.
+ *
+ * @param cls the context
+ * @return tc scheduler task context.
  */
-static struct GNUNET_CONFIGURATION_Handle *cfg;
+static void
+teardown_dht_connection (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  struct Context *ctx = cls;
+  struct GNUNET_TESTBED_Operation *op;
+
+  if (0 != (GNUNET_SCHEDULER_REASON_SHUTDOWN & tc->reason))
+    return;
+  GNUNET_assert (NULL != ctx);
+  GNUNET_assert (NULL != (op = ctx->op));
+  ctx->op = NULL;
+  GNUNET_TESTBED_operation_done (op);
+}
+
 
 /**
- * Name of the file with the hosts to run the test over
+ * Queue up a delayed task for doing DHT GET
+ *
+ * @param cls the active context
+ * @param success #GNUNET_OK if the PUT was transmitted,
+ *                #GNUNET_NO on timeout,
+ *                #GNUNET_SYSERR on disconnect from service
+ *                after the PUT message was transmitted
+ *                (so we don't know if it was received or not)
  */
-static char *hosts_file;
+static void
+put_cont (void *cls, int success)
+{
+  struct ActiveContext *ac = cls;
+  struct Context *ctx = ac->ctx;
+
+  ac->dht_put = NULL;
+  if (success)
+    n_puts_ok++;
+  else
+    n_puts_fail++;
+  GNUNET_assert (NULL != ctx);
+  (void) GNUNET_SCHEDULER_add_now (&teardown_dht_connection, ctx);
+}
+
 
 /**
- * Number of peers
+ * Task to do DHT PUTS
+ *
+ * @param cls the active context
+ * @param tc the scheduler task context
  */
-static unsigned int num_peers;
+static void
+delayed_put (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  struct ActiveContext *ac = cls;
+
+  ac->delay_task = NULL;
+  /* Generate and DHT PUT some random data */
+  ac->put_data_size = 16;       /* minimum */
+  ac->put_data_size += GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK,
+                                                 (63*1024));
+  ac->put_data = GNUNET_malloc (ac->put_data_size);
+  GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
+                              ac->put_data, ac->put_data_size);
+  GNUNET_CRYPTO_hash (ac->put_data, ac->put_data_size, &ac->hash);
+  DEBUG ("PUT_REQUEST_START key %s \n", GNUNET_h2s((struct GNUNET_HashCode *)ac->put_data));
+  ac->dht_put = GNUNET_DHT_put (ac->dht, &ac->hash,
+                                replication,
+                                GNUNET_DHT_RO_RECORD_ROUTE,
+                                GNUNET_BLOCK_TYPE_TEST,
+                                ac->put_data_size,
+                                ac->put_data,
+                                GNUNET_TIME_UNIT_FOREVER_ABS, /* expiration time */
+                                timeout,                      /* PUT timeout */
+                                put_cont, ac);                /* continuation and its closure */
+  n_puts++;
+}
+
 
 /**
- * Context to hold data of peer
+ * Connection to DHT has been established.  Call the delay task.
+ *
+ * @param cls the active context
+ * @param op the operation that has been finished
+ * @param ca_result the service handle returned from GNUNET_TESTBED_ConnectAdapter()
+ * @param emsg error message in case the operation has failed; will be NULL if
+ *          operation has executed successfully.
  */
-struct Context
+static void
+dht_connected (void *cls,
+               struct GNUNET_TESTBED_Operation *op,
+               void *ca_result,
+               const char *emsg)
 {
-  /**
-   * Testbed operation acting on this peer
-   */
-  struct GNUNET_TESTBED_Operation *op;
+  struct ActiveContext *ac = cls;
+  struct Context *ctx = ac->ctx;
 
-  /**
-   * Delay task
-   */
-  struct GNUNET_SCHEDULER_TaskIdentifier delay_task;
-};
+  GNUNET_assert (NULL != ctx); //FIXME: Fails
+  GNUNET_assert (NULL != ctx->op);
+  GNUNET_assert (ctx->op == op);
+  ac->dht = (struct GNUNET_DHT_Handle *) ca_result;
+  if (NULL != emsg)
+  {
+    GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Connection to DHT service failed: %s\n", emsg);
+    GNUNET_TESTBED_operation_done (ctx->op); /* Calls dht_disconnect() */
+    ctx->op = NULL;
+    return;
+  }
+  switch (mode)
+  {
+  case MODE_PUT:
+  {
+    struct GNUNET_TIME_Relative peer_delay_put;
+    peer_delay_put.rel_value_us =
+      GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
+                                delay_put.rel_value_us);
+    ac->delay_task = GNUNET_SCHEDULER_add_delayed (peer_delay_put, &delayed_put, ac);
+    break;
+  }
+  case MODE_GET:
+  {
+    struct GNUNET_TIME_Relative peer_delay_get;
+    peer_delay_get.rel_value_us =
+      delay_get.rel_value_us +
+      GNUNET_CRYPTO_random_u64 (GNUNET_CRYPTO_QUALITY_WEAK,
+                                delay_get.rel_value_us);
+    ac->delay_task = GNUNET_SCHEDULER_add_delayed (peer_delay_get, &delayed_get, ac);
+    break;
+  }
+  }
+}
 
 
 /**
- * Context for the data we put into DHT
+ * Connect to DHT service and return the DHT client handler
+ *
+ * @param cls the active context
+ * @param cfg configuration of the peer to connect to; will be available until
+ *          GNUNET_TESTBED_operation_done() is called on the operation returned
+ *          from GNUNET_TESTBED_service_connect()
+ * @return service handle to return in 'op_result', NULL on error
  */
-struct DataContext
+static void *
+dht_connect (void *cls, const struct GNUNET_CONFIGURATION_Handle *cfg)
 {
-  /**
-   * next ptr for the DLL
-   */
-  struct Data *next;
+  n_dht++;
+  return GNUNET_DHT_connect (cfg, 10);
+}
 
-  /**
-   * prev ptr for the DLL
-   */
-  struct Data *prev;
 
-  /**
-   * The size of the data
-   */
-  size_t size;
+/**
+ * Adapter function called to destroy a connection to
+ * a service.
+ *
+ * @param cls the active context
+ * @param op_result service handle returned from the connect adapter
+ */
+static void
+dht_disconnect (void *cls, void *op_result)
+{
+  struct ActiveContext *ac = cls;
 
-  /**
-   * The data follows here
-   */
-};
+  GNUNET_assert (NULL != ac->dht);
+  GNUNET_assert (ac->dht == op_result);
+  GNUNET_DHT_disconnect (ac->dht);
+  ac->dht = NULL;
+  n_dht--;
+  if (0 != n_dht)
+    return;
+  if (GNUNET_YES == in_shutdown)
+    return;
+  switch (mode)
+  {
+  case MODE_PUT:
+    if ((n_puts_ok + n_puts_fail) != n_active)
+      return;
+    /* Start GETs if all PUTs have been made */
+    mode = MODE_GET;
+    //(void) GNUNET_SCHEDULER_add_now (&call_start_profiling, NULL);
+    start_profiling ();
+    return;
+  case MODE_GET:
+    if ((n_gets_ok + n_gets_fail) != n_active)
+      return;
+    break;
+  }
+}
+
+/**
+ * Connect to DHT services of active peers
+ */
+static void
+start_profiling()
+{
+  struct Context *ctx;
+  unsigned int i;
 
+  DEBUG("GNUNET_TESTBED_service_connect \n");
+  GNUNET_break (GNUNET_YES != in_shutdown);
+  for(i = 0; i < n_active; i++)
+  {
+    struct ActiveContext *ac = &a_ac[i];
+    GNUNET_assert (NULL != (ctx = ac->ctx));
+    GNUNET_assert (NULL == ctx->op);
+    ctx->op =
+        GNUNET_TESTBED_service_connect (ctx,
+                                        ctx->peer,
+                                        "dht",
+                                        &dht_connected, ac,
+                                        &dht_connect,
+                                        &dht_disconnect,
+                                        ac);
+  }
+}
 
+#if ENABLE_MALICIOUS
 /**
- * An array of contexts.  The size of this array should be equal to @a num_peers
+ * Count of total number of malicious peers.
+ */
+static unsigned int count_malicious;
+
+/**
+ * Continuation of GNUNET_DHT_act_malicious
+ * @param cls Malicious context
+  * @param success #GNUNET_OK if the ACT_MALICIOUS was transmitted,
+ *                 #GNUNET_NO on timeout,
+ *                 #GNUNET_SYSERR on disconnect from service
+ *                 after the ACT_MALICIOUS message was transmitted
+ *                 (so we don't know if it was received or not)
+ */
+static void
+act_malicious_cont (void *cls, int success)
+{
+  struct MaliciousContext *mc = cls;
+  struct Context *ctx = mc->ctx;
+
+  GNUNET_TESTBED_operation_done (ctx->op);
+  ctx->op = NULL;
+  return;
+}
+
+
+/**
+ * Call malicious API for all the malicious peers.
+ * @param cls the malicious context.
+ * @param op the operation that has been finished
+ * @param ca_result the service handle returned from GNUNET_TESTBED_ConnectAdapter()
+ * @param emsg error message in case the operation has failed; will be NULL if
+ *          operation has executed successfully.
  */
-struct Context *a_ctx;
+static void
+dht_set_malicious(void *cls,
+                  struct GNUNET_TESTBED_Operation *op,
+                  void *ca_result,
+                  const char *emsg)
+{
+  struct MaliciousContext *mc = cls;
+  struct Context *ctx = mc->ctx;
+
+  GNUNET_assert (NULL != ctx);
+  GNUNET_assert (NULL != ctx->op);
+  GNUNET_assert (ctx->op == op);
+  mc->dht = (struct GNUNET_DHT_Handle *) ca_result;
+  if (NULL != emsg)
+  {
+    GNUNET_log (GNUNET_ERROR_TYPE_ERROR, "Connection to DHT service failed: %s\n", emsg);
+    GNUNET_TESTBED_operation_done (ctx->op); /* Calls dht_disconnect_malicious() */
+    ctx->op = NULL;
+    return;
+  }
+  mc->dht_malicious = GNUNET_DHT_act_malicious(mc->dht, 1, act_malicious_cont, mc);
+}
 
 
 /**
- * Shutdown task.  Cleanup all resources and operations
+ * Adapter function called to destroy a connection to
+ * a service.
  *
- * @param cls NULL
- * @param tc scheduler task context
+ * @param cls the active context
+ * @param op_result service handle returned from the connect adapter
  */
 static void
-do_shutdown (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
+dht_disconnect_malicious (void *cls, void *op_result)
 {
-  unsigned int cnt;
-  
-  if (NULL != a_ctx)
+  struct MaliciousContext *mc = cls;
+  count_malicious++;
+  GNUNET_assert (NULL != mc->dht);
+  GNUNET_assert (mc->dht == op_result);
+  GNUNET_DHT_disconnect (mc->dht);
+  mc->dht = NULL;
+  mc->ctx->op = NULL;
+  n_dht--;
+
+  if (0 != n_dht)
+    return;
+
+  if(n_malicious == count_malicious)
+  {
+    DEBUG("\n Call start_profiling()");
+    start_profiling();
+  }
+}
+
+
+/**
+ * Set the malicious variable in peer malicious context.
+ */
+static void
+set_malicious()
+{
+  unsigned int i;
+
+  DEBUG ("Setting %u peers malicious",
+         n_malicious);
+  for(i = 0; i < n_malicious; i++)
+  {
+    struct MaliciousContext *mc = &a_mc[i];
+    mc->ctx->op =
+        GNUNET_TESTBED_service_connect (mc->ctx,
+                                        mc->ctx->peer,
+                                        "dht",
+                                        &dht_set_malicious, mc,
+                                        &dht_connect,
+                                        &dht_disconnect_malicious,
+                                        mc);
+  }
+}
+
+#endif
+
+
+/**
+ * Start collecting relevant statistics. If ENABLE_MALICIOUS set, first
+ * set the malicious peers. If not, then start with PUT operation on active
+ * peers.
+ */
+static void
+start_func()
+{
+#if ENABLE_MALICIOUS
+  set_malicious();
+#else
+  start_profiling();
+#endif
+}
+
+
+/**
+ * Remove entry from successor peer hashmap.
+ * @param cls closure
+ * @param key current public key
+ * @param value value in the hash map
+ * @return #GNUNET_YES if we should continue to iterate,
+ *         #GNUNET_NO if not.
+ */
+static int
+hashmap_iterate_remove(void *cls,
+                       const struct GNUNET_HashCode *key,
+                       void *value)
+{
+  GNUNET_assert (GNUNET_YES ==
+                GNUNET_CONTAINER_multihashmap_remove(successor_peer_hashmap, key, value));
+  return GNUNET_YES;
+}
+
+
+/**
+ * Stats callback. Iterate over the hashmap and check if all th peers form
+ * a virtual ring topology.
+ *
+ * @param cls closure
+ * @param op the operation that has been finished
+ * @param emsg error message in case the operation has failed; will be NULL if
+ *          operation has executed successfully.
+ */
+static void
+successor_stats_cont (void *cls,
+                      struct GNUNET_TESTBED_Operation *op,
+                      const char *emsg)
+{
+  struct GNUNET_HashCode *val;
+  struct GNUNET_HashCode *start_val;
+  struct GNUNET_HashCode *key;
+  int count;
+
+  /* Don't schedule the task till we are looking for circle here. */
+  successor_stats_task = NULL;
+  GNUNET_TESTBED_operation_done (successor_stats_op);
+  successor_stats_op = NULL;
+  if (0 == max_searches)
+  {
+    start_func();
+    return;
+  }
+
+  GNUNET_assert (NULL != start_key);
+  start_val = GNUNET_CONTAINER_multihashmap_get (successor_peer_hashmap,
+                                                 start_key);
+  GNUNET_assert (NULL != start_val);
+  val = start_val;
+  for (count = 0; count < num_peers; count++)
   {
-    for (cnt=0; cnt < num_peers, cnt++)
+    key = val;
+    val = GNUNET_CONTAINER_multihashmap_get (successor_peer_hashmap,
+                                             key);
+    if (NULL == val)
+      break;
+    /* Remove the entry from hashmap. This is done to take care of loop. */
+    if (GNUNET_NO ==
+        GNUNET_CONTAINER_multihashmap_remove (successor_peer_hashmap,
+                                              key, val))
     {
-      if (NULL == a_ctx[cnt].op)
-        continue;
-      GNUNET_TESTBED_operation_done (a_ctx[cnt].op);
-      a_ctx[cnt].op = NULL;
+      DEBUG ("Failed to remove entry from hashmap\n");
+      break;
     }
-    GNUNET_free (a_ctx);
-    a_ctx = NULL;
+    /* If a peer has its own identity as its successor. */
+    if (0 == memcmp(key, val, sizeof (struct GNUNET_HashCode)))
+      break;
+  }
+
+  GNUNET_assert (GNUNET_SYSERR !=
+                 GNUNET_CONTAINER_multihashmap_iterate (successor_peer_hashmap,
+                                                        &hashmap_iterate_remove,
+                                                        NULL));
+
+  successor_peer_hashmap = GNUNET_CONTAINER_multihashmap_create (num_peers,
+                                                                 GNUNET_NO);
+  if ((start_val == val) && (count == num_peers))
+  {
+    DEBUG("CIRCLE COMPLETED after %u tries", tries);
+    if(NULL == successor_stats_task)
+    {
+      start_func();
+    }
+    return;
+  }
+  else
+  {
+    if (max_searches == ++tries)
+    {
+      GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+                  "Maximum tries %u exceeded while checking successor TOTAL TRIES %u"
+                  " circle formation.  Exiting\n",
+                  max_searches,tries);
+      if (NULL != successor_stats_task)
+      {
+        successor_stats_task = NULL;
+      }
+      if(NULL == successor_stats_task)
+      {
+        start_func();
+      }
+
+      return;
+    }
+    else
+    {
+      flag = 0;
+      successor_stats_task = GNUNET_SCHEDULER_add_delayed (delay_stats,
+                                                           &collect_stats, cls);
+    }
+  }
+}
+
+
+/**
+ * Process successor statistic values.
+ *
+ * @param cls closure
+ * @param peer the peer the statistic belong to
+ * @param subsystem name of subsystem that created the statistic
+ * @param name the name of the datum
+ * @param value the current value
+ * @param is_persistent GNUNET_YES if the value is persistent, GNUNET_NO if not
+ * @return GNUNET_OK to continue, GNUNET_SYSERR to abort iteration
+ */
+static int
+successor_stats_iterator (void *cls,
+                          const struct GNUNET_TESTBED_Peer *peer,
+                          const char *subsystem,
+                          const char *name,
+                          uint64_t value,
+                          int is_persistent)
+{
+  static const char *key_string = "XDHT";
+  if (0 == max_searches)
+    return GNUNET_OK;
+
+  if (0 == strncmp (key_string, name, strlen (key_string)))
+  {
+    char *my_id_str;
+    char successor_str[13];
+    char truncated_my_id_str[13];
+    char truncated_successor_str[13];
+    struct GNUNET_HashCode *my_id_key;
+    struct GNUNET_HashCode *succ_key;
+
+    strtok((char *)name,":");
+    my_id_str = strtok(NULL,":");
+
+    strncpy(truncated_my_id_str, my_id_str, 12);
+    truncated_my_id_str[12] = '\0';
+    my_id_key = GNUNET_new(struct GNUNET_HashCode);
+    GNUNET_CRYPTO_hash (truncated_my_id_str, sizeof(truncated_my_id_str),my_id_key);
+    GNUNET_STRINGS_data_to_string(&value, sizeof(uint64_t), successor_str, 13);
+    strncpy(truncated_successor_str, successor_str, 12);
+    truncated_successor_str[12] ='\0';
+
+    succ_key = GNUNET_new(struct GNUNET_HashCode);
+    GNUNET_CRYPTO_hash (truncated_successor_str, sizeof(truncated_successor_str),succ_key);
+
+    if (0 == flag)
+    {
+      GNUNET_assert(NULL != my_id_key);
+      start_key = my_id_key;
+      GNUNET_assert(NULL != start_key);
+      flag = 1;
+    }
+    GNUNET_CONTAINER_multihashmap_put (successor_peer_hashmap,
+                                       my_id_key, (void *)succ_key,
+                                       GNUNET_CONTAINER_MULTIHASHMAPOPTION_REPLACE);
   }
+
+  return GNUNET_OK;
+}
+
+
+/*
+ * Task that collects peer and its corresponding successors.
+ *
+ * @param cls Closure (NULL).
+ * @param tc Task Context.
+ */
+static void
+collect_stats (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+  if ((GNUNET_SCHEDULER_REASON_SHUTDOWN & tc->reason) != 0)
+    return;
+
+  GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Start collecting statistics...\n");
+  GNUNET_assert(NULL != testbed_handles);
+
+  if (0 != max_searches)
+  successor_peer_hashmap = GNUNET_CONTAINER_multihashmap_create (num_peers,
+                                                                    GNUNET_NO);
+  successor_stats_op =
+          GNUNET_TESTBED_get_statistics (num_peers, testbed_handles,
+                                         "dht", NULL,
+                                          successor_stats_iterator,
+                                          successor_stats_cont, cls);
+
+  GNUNET_assert(NULL != successor_stats_op);
 }
 
 
@@ -142,10 +1253,19 @@ service_started (void *cls,
   GNUNET_assert (NULL != ctx->op);
   GNUNET_TESTBED_operation_done (ctx->op);
   ctx->op = NULL;
-  if (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, 100)
-      >= PUT_PROBABILITY)
-    return;
-  /* FIXME: connect to the DHT service and wait initwait before starting a PUT */
+  peers_started++;
+  DEBUG("Peers Started = %d; num_peers = %d \n", peers_started, num_peers);
+  if (NULL == successor_stats_task && peers_started == num_peers)
+  {
+     DEBUG("successor_stats_task \n");
+     struct Collect_Stat_Context *collect_stat_cls = GNUNET_new(struct Collect_Stat_Context);
+     collect_stat_cls->service_connect_ctx = cls;
+     collect_stat_cls->op = op;
+
+     successor_stats_task = GNUNET_SCHEDULER_add_delayed (delay_stats,
+                                                          &collect_stats,
+                                                          collect_stat_cls);
+  }
 }
 
 
@@ -167,16 +1287,83 @@ test_run (void *cls,
           unsigned int links_succeeded,
           unsigned int links_failed)
 {
-  int cnt;
-
+  unsigned int cnt;
+  unsigned int ac_cnt;
+  testbed_handles = peers;
   if (NULL == peers)
   {
     /* exit */
     GNUNET_assert (0);
   }
+  INFO ("%u peers started\n", num_peers);
   a_ctx = GNUNET_malloc (sizeof (struct Context) * num_peers);
-  for (cnt = 0; cnt < num_peers, cnt++)
+
+  /* select the peers which actively participate in profiling */
+  n_active = num_peers * PUT_PROBABILITY / 100;
+  if (0 == n_active)
+  {
+    GNUNET_SCHEDULER_shutdown ();
+    GNUNET_free (a_ctx);
+    return;
+  }
+
+  a_ac = GNUNET_malloc (n_active * sizeof (struct ActiveContext));
+  ac_cnt = 0;
+
+#if ENABLE_MALICIOUS
+  unsigned int malicious_peers;
+  if(PUT_PROBABILITY + MALICIOUS_PROBABILITY > 100)
+  {
+    DEBUG ("Reduce either number of malicious peer or active peers. ");
+    GNUNET_SCHEDULER_shutdown ();
+    GNUNET_free (a_ctx);
+    return;
+  }
+
+  /* Select the peers which should act maliciously. */
+  n_malicious = num_peers * MALICIOUS_PROBABILITY / 100;
+
+  a_mc = GNUNET_malloc (n_malicious * sizeof (struct MaliciousContext));
+  malicious_peers = 0;
+
+  for (cnt = 0; cnt < num_peers && malicious_peers < n_malicious; cnt++)
+  {
+    if (GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, 100) >=
+        MALICIOUS_PROBABILITY)
+      continue;
+    a_ctx[cnt].mc = &a_mc[malicious_peers];
+    a_mc[malicious_peers].ctx = &a_ctx[cnt];
+    malicious_peers++;
+  }
+  n_malicious = malicious_peers;
+  INFO ("Malicious Peers: %u\n",malicious_peers);
+
+#endif
+
+  a_ac = GNUNET_malloc (n_active * sizeof (struct ActiveContext));
+  ac_cnt = 0;
+  for (cnt = 0; cnt < num_peers && ac_cnt < n_active; cnt++)
+  {
+    if ((GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK, 100) >=
+        PUT_PROBABILITY))
+      continue;
+
+#if ENABLE_MALICIOUS
+    if(a_ctx[ac_cnt].mc != NULL)
+      continue;
+#endif
+
+    a_ctx[cnt].ac = &a_ac[ac_cnt];
+    a_ac[ac_cnt].ctx = &a_ctx[cnt];
+    ac_cnt++;
+  }
+  n_active = ac_cnt;
+  INFO ("Active peers: %u\n", n_active);
+
+  /* start DHT service on all peers */
+  for (cnt = 0; cnt < num_peers; cnt++)
   {
+    a_ctx[cnt].peer = peers[cnt];
     a_ctx[cnt].op = GNUNET_TESTBED_peer_manage_service (&a_ctx[cnt],
                                                         peers[cnt],
                                                         "dht",
@@ -200,20 +1387,19 @@ run (void *cls, char *const *args, const char *cfgfile,
      const struct GNUNET_CONFIGURATION_Handle *config)
 {
   uint64_t event_mask;
-  
+
   if (0 == num_peers)
   {
-    LOG (GNUNET_ERROR_TYPE_ERROR, _("Exiting as the number of peers is %u\n"),
-         num_peers);
+    GNUNET_log (GNUNET_ERROR_TYPE_ERROR, _("Exiting as the number of peers is %u\n"),
+                num_peers);
     return;
   }
   cfg = GNUNET_CONFIGURATION_dup (config);
   event_mask = 0;
   GNUNET_TESTBED_run (hosts_file, cfg, num_peers, event_mask, NULL,
                       NULL, &test_run, NULL);
-  abort_task =
-      GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &do_abort,
-                                    NULL);
+  GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL, &do_shutdown,
+                                NULL);
 }
 
 
@@ -225,29 +1411,51 @@ run (void *cls, char *const *args, const char *cfgfile,
 int
 main (int argc, char *const *argv)
 {
+  int rc;
+
   static struct GNUNET_GETOPT_CommandLineOption options[] = {
     {'n', "peers", "COUNT",
      gettext_noop ("number of peers to start"),
      1, &GNUNET_GETOPT_set_uint, &num_peers},
+    {'s', "searches", "COUNT",
+     gettext_noop ("maximum number of times we try to search for successor circle formation (0 for R5N)"),
+     1, &GNUNET_GETOPT_set_uint, &max_searches},
     {'H', "hosts", "FILENAME",
      gettext_noop ("name of the file with the login information for the testbed"),
      1, &GNUNET_GETOPT_set_string, &hosts_file},
-    {'d', "initwait", "DELAY",
-     gettext_noop ("delay to allow DHT to stabilize after starting the peers"),
-     1, &GNUNET_GETOPT_set_relative_time, &init_wait},
-    {'w', "wait", "DELAY",
-     gettext_noop ("delay between rounds"),
-     1, &GNUNET_GETOPT_set_relative_time, &wait_time},
+    {'D', "delay", "DELAY",
+     gettext_noop ("delay between rounds for collecting statistics (default: 30 sec)"),
+     1, &GNUNET_GETOPT_set_relative_time, &delay_stats},
+    {'P', "PUT-delay", "DELAY",
+     gettext_noop ("delay to start doing PUTs (default: 1 sec)"),
+     1, &GNUNET_GETOPT_set_relative_time, &delay_put},
+    {'G', "GET-delay", "DELAY",
+     gettext_noop ("delay to start doing GETs (default: 5 min)"),
+     1, &GNUNET_GETOPT_set_relative_time, &delay_get},
+    {'r', "replication", "DEGREE",
+     gettext_noop ("replication degree for DHT PUTs"),
+     1, &GNUNET_GETOPT_set_uint, &replication},
+    {'t', "timeout", "TIMEOUT",
+     gettext_noop ("timeout for DHT PUT and GET requests (default: 1 min)"),
+     1, &GNUNET_GETOPT_set_relative_time, &timeout},
     GNUNET_GETOPT_OPTION_END
   };
 
+  max_searches = 5;
   if (GNUNET_OK != GNUNET_STRINGS_get_utf8_args (argc, argv, &argc, &argv))
     return 2;
+  /* set default delays */
+  delay_stats = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
+  delay_put = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
+  delay_get = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
+  timeout = GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 10);
+  replication = 1;      /* default replication */
+  rc = 0;
   if (GNUNET_OK !=
       GNUNET_PROGRAM_run (argc, argv, "dht-profiler",
                          gettext_noop
                          ("Measure quality and performance of the DHT service."),
                          options, &run, NULL))
-    ok = 1;
-  return ok;
+    rc = 1;
+  return rc;
 }