rcp_client.py 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. from dht_common import compute_document_ID, SIZE_OF_HASH, SIZE_OF_IP_ADDRESS, SIZE_OF_KEY, SIZE_OF_SIGNATURE, SIZE_OF_TIMESTAMP
  2. from base_client import Base_Client
  3. from random import Random
  4. class RCP_Client(Base_Client):
  5. def __init__(self, DHT, knownQuorum, documentSize, numNodes):
  6. Base_Client.__init__(self, DHT, knownQuorum, documentSize)
  7. self.numNodes = numNodes
  8. self.cryptogen = Random(self.DHT.access_node(knownQuorum).nodeID)
  9. # Needs to be here to use new iterative search
  10. def test_iterative_search(self):
  11. if self.DHT.get_num_nodes() == 10:
  12. return self.__iterative_search__(b'\xb5\xe0\xf4\xd8\xe9\x1e\xf6i\xc4=^\xc2Y\xac\xdc\x88p\x8a+\x10t\x90\xa5\xc9\x1f\x98\xc61\xda\x7fH\x92') == 7
  13. else:
  14. print("Assumed testing conditions not met; no tests run.")
  15. return False
  16. def __iterative_search_prelude__(self, documentID):
  17. whichQuorum = self.knownNode
  18. [self.DHT.access_node(whichQuorum).get_first_auth(whichNode) for whichNode in range(self.numNodes)]
  19. # Asker's ID
  20. sizeOfRequest = SIZE_OF_HASH
  21. # timestamp
  22. sizeOfRequest += SIZE_OF_TIMESTAMP
  23. # response is just the whole thing signed
  24. sizeOfResponse = sizeOfRequest + SIZE_OF_SIGNATURE
  25. self.numRounds += 1
  26. self.numMessagesSent += self.numNodes - 1
  27. self.numMessagesRecv += self.numNodes - 1
  28. self.numBytesSent += (self.numNodes - 1) * sizeOfRequest
  29. self.numBytesRecv += (self.numNodes - 1) * sizeOfResponse
  30. options = [x for (x,y) in self.actualNodeEntry.table.items() if x <= documentID]
  31. closest = max(options) if len(options) > 0 else max([x for (x,y) in self.actualNodeEntry.table.items()])
  32. whichQuorum = self.actualNodeEntry.table[closest]
  33. # This group's key is the only one to start,
  34. numKeys = 1
  35. # and the group signature from the first authorization is there
  36. numSignatures = 1
  37. return whichQuorum, numKeys, numSignatures
  38. # implements a simulation of iteratively searching the DHT (captured as the dht_simulator, or here "DHT")
  39. # main change from base_client is the inclusion of keys and signatures
  40. def __iterative_search__(self, documentID):
  41. whichQuorum, numKeys, numSignatures = self.__iterative_search_prelude__(documentID)
  42. flagFound = False
  43. while not flagFound:
  44. randomNode = self.cryptogen.randrange(self.numNodes)
  45. recv = self.DHT.access_node(whichQuorum).get_finger_table_val(randomNode, documentID, numKeys, numSignatures)
  46. # key of previous group
  47. sizeOfResponse = SIZE_OF_KEY
  48. # next groups ID/routing information
  49. sizeOfResponse += SIZE_OF_IP_ADDRESS * self.numNodes + SIZE_OF_HASH
  50. # key of next group
  51. sizeOfResponse += SIZE_OF_KEY
  52. # sign the whole thing
  53. sizeOfResponse += SIZE_OF_SIGNATURE
  54. # Asker's ID
  55. sizeOfRequest = SIZE_OF_HASH
  56. # timestamp
  57. sizeOfRequest += SIZE_OF_TIMESTAMP
  58. # Keys in request
  59. sizeOfRequest += SIZE_OF_KEY * numKeys
  60. # signatures in request
  61. sizeOfRequest += SIZE_OF_SIGNATURE * numSignatures
  62. # ID being searched for
  63. sizeOfRequest += SIZE_OF_HASH
  64. self.numRounds += 1
  65. self.numMessagesSent += 1
  66. self.numMessagesRecv += 1
  67. self.numBytesSent += sizeOfRequest
  68. self.numBytesRecv += sizeOfResponse
  69. _, nextFind = recv
  70. if nextFind == -1:
  71. flagFound = True
  72. else:
  73. whichQuorum = nextFind
  74. numKeys += 1
  75. numSignatures += 1
  76. return whichQuorum, numKeys, numSignatures
  77. # Needs to be here to use new iterative search
  78. def insert_file(self, document):
  79. documentID = compute_document_ID(document)
  80. whichQuorum, numKeys, numSignatures = self.__iterative_search__(documentID)
  81. self.DHT.access_node(whichQuorum).insert(numKeys, numSignatures)
  82. # Asker's ID
  83. sizeOfRequest = SIZE_OF_HASH
  84. # timestamp
  85. sizeOfRequest += SIZE_OF_TIMESTAMP
  86. # keys in request
  87. sizeOfRequest += SIZE_OF_KEY * numKeys
  88. # signatures in request
  89. sizeOfRequest += SIZE_OF_SIGNATURE * numSignatures
  90. # actual document sent
  91. sizeOfRequest += self.documentSize
  92. # signature over whole thing
  93. sizeOfRequest += SIZE_OF_SIGNATURE
  94. sizeOfResponse = SIZE_OF_HASH + SIZE_OF_SIGNATURE
  95. self.numRounds += 1
  96. self.numMessagesSent += 1
  97. self.numMessagesRecv += 1
  98. self.numBytesSent += sizeOfRequest
  99. self.numBytesRecv += sizeOfResponse
  100. return documentID
  101. # Minor change from base_client; retrieving from a quorum, you should specify which specific node to retrieve from
  102. def retrieve_file(self, documentID):
  103. whichQuorum, numKeys, numSignatures = self.__iterative_search__(documentID)
  104. randomNode = self.cryptogen.randrange(self.numNodes)
  105. self.DHT.access_node(whichQuorum).retrieve(randomNode, numKeys, numSignatures)
  106. # Asker's ID
  107. sizeOfRequest = SIZE_OF_HASH
  108. # timestamp
  109. sizeOfRequest += SIZE_OF_TIMESTAMP
  110. # keys in request
  111. sizeOfRequest += SIZE_OF_KEY * numKeys
  112. # signatures in request
  113. sizeOfRequest += SIZE_OF_SIGNATURE * numSignatures
  114. # actual hash requested
  115. sizeOfRequest += SIZE_OF_HASH
  116. # signature over whole thing
  117. sizeOfRequest += SIZE_OF_SIGNATURE
  118. sizeOfResponse = self.documentSize + SIZE_OF_SIGNATURE
  119. self.numRounds += 1
  120. self.numMessagesSent += 1
  121. self.numMessagesRecv += 1
  122. self.numBytesSent += sizeOfRequest
  123. self.numBytesRecv += sizeOfResponse
  124. # TODO: Add unit tests for size calculations
  125. if __name__ == "__main__":
  126. from dht_simulator import DHT_Simulator
  127. from rcp_node import RCP_Quorum
  128. NUM_QUORUMS_IN_TEST = 10
  129. SIZE_OF_DOCUMENTS_IN_TEST = 1024
  130. NUM_NODES_PER_QUORUM_IN_TEST = 10
  131. testbed = DHT_Simulator(RCP_Quorum, NUM_QUORUMS_IN_TEST, SIZE_OF_DOCUMENTS_IN_TEST, NUM_NODES_PER_QUORUM_IN_TEST)
  132. client = RCP_Client(testbed, 0, SIZE_OF_DOCUMENTS_IN_TEST, NUM_NODES_PER_QUORUM_IN_TEST)
  133. assert client.test_iterative_search()
  134. print("Iterative search functioning correctly.")
  135. file = b'\xc3\xa7\x0c\xc3\x97!\xc3\xb2offy\x13\xc2\x81~\xc2\x9f\xc3\xb5\xc3\xa1\xc3\xb9C\xc2\x92f\xc2\x968\x01\xc2\x9183D\xc3\x84\xc3\xa9\xc3\x8e\t\x0f\xc2\xa1<\xc2\xad%G\xc3\x9dq\xc2\xb7\x1b\x7f\xc2\x82\xc3\x84\xc3\xb4\xc3\x81\x1c\xc3\x8dqgH(H\\C&\x14\xc2\x98\xc3\x93`\xc3\xbe\xc3\x95\xc3\xad\xc3\x8d\xc3\xb5\xc2\x8d.\xc2\x94D\x13IK\xc3\x9a\xc2\x8dS\xc3\x8b\xc2\xa7\xc2\xb6\xc2\x9d\x1fY\xc3\xbe\xc3\x85[\r\xc2\x85\x0e#\xc2\xb85B4\x15\xc3\xaf\xc2\x81_g\xc3\xb3;!|\xc3\xbc\xc3\xaa;\xc3\xbd(m\xc2\xbd\xc3\x96b\xc2\x88\xc3\x9d\xc2\x87N\xc3\xb9\xc3\xb5\xc3\xa54\xc2\xb6(\xc2\xa7\xc3\x950\xc3\x82\x1c\xc3\x95\xc2\x85\xc2\x983\xc3\xbfy\xc2\x89lQ\xc2\x8aN\xc2\xb0\x05\xc2\x9f\xc2\xac\xc2\xa3T+z.D1\xc2\xae\xc2\xae+\xc3\x86\xc2\xb3\xc2\xb0\xc3\x8d,\x04\xc2\x96\xc2\xa7\xc3\xba\xc2\xb4A\xc2\x95P"*\x1d\x0b\xc3\xbd!e\xc2\xaa\xc2\xa4UL\xc3\x84j\xc2\xb9>h\x01\x08\xc3\xb1\xc2\x85\xc3\x81\xc2\xb0b\xc2\x9b\x0fY\xc3\xb7V ^\xc3\xb0Z~r%\xc2\x9c\xc2\x91Q\x03+9(\x14\xc2\xa1`\x17\xc3\x8c\x18+\xc3\xb4\xc2\xb4Z&l9L\xc2\x94\xc2\xae\xc2\x83\x7fJt\xc2\xbbt\xc2\x89\n\xc2\xab\xc2\x94\xc2\x90I3\xc3\xa8\xc2\xbb\x14\xc3\x9ekM\x170}r\xc2\x9c>\xc3\xa2!\xc2\x8d\xc2\x91f\xc3\xb2\xc3\xae<v\x07\xc3\xa5V\xc2\x81\xc2\x9a\xc2\xbe\xc2\xb9\xc3\x91\xc3\x97\xc3\xb01\xc2\x82b\xc3\x82\xc3\x93\x04\xc2\xb3\xc2\xb3\x0bdtR\xc2\x80\x0e\xc2\x96\xc3\x8c\xc2\x82\xc2\xba\x15\xc3\x8aO\xc2\xae\xc2\x8a\xc2\x9b\xc2\x9d\xc3\xb4\xc2\xbc\xc2\x8d\xc2\xad\xc3\x94\xc3\xab\x1b]\xc2\xaf\xc3\xadd\xc2\xb2[\xc3\x83]\xc2\x9d\xc3\x91\x1b\xc2\x82\'\x15\xc2\xbe\xc2\xad\xc3\xaf\xc3\x80\xc2\x90\xc2\x9c<xOh;\xc2\xb3\xc3\xae\x05m5\x14\xc2\xacm\xc3\xba\xc3\xbd;R*\xc3\xae$\xc2\x9d\xc2\x8ff\x178mU\xc3\xba?\\o{\xc2\xa6\xc2\xa3+\xc3\x9c\xc2\xa5\xc2\xa4\xc2\xabFv\t\xc3\x9b>h\xc3\x82\xc2\x94\x11*\xc2\x97D`\xc3\xba\xc3\xa0\x17\xc3\xab!An\x7f\xc2\x89Rrh\xc3\x80\xc2\xaf\x1f*}j\xc2\xaf\xc2\x84\xc2\xa4\xc2\x92\xc2\x97\xc2\x83\xc2\x8cf\xc3\xb6\x1f\xc3\xadfb\xc2\xb1\xc2\xa3\xc3\x8f7\xc3\x82 \xc3\xbb\xc2\x84\xc3\xb0sh\xc2\x9d|\x7f\xc3\xbda\xc3\x84\xc2\x80\x08\xc3\x88\xc2\xa8mBi\xc2\xae)\x02}K\xc3\x9f\xc2\xa7\xc3\x95\xc3\x94[[D\n\xc2\x98AQH\xc2\xb9\xc2\xb3\xc3\xb3"\x08\xc2\x9f\xc3\x98\xc3\x91B[\xc2\x8b\xc2\x86xhMK\xc3\xbb\xc2\x83`\xc2\xa7\x02\xc3\x8a\xc3\x89\xc3\x8f\xc3\xb0\xc2\xa9\xc3\x99\xc3\x9b\xc2\xb2\xc3\x9a\xc3\xaa5\xc2\xb7T\xc2\x81\x0f\xc3\x90\x0c\xc3\xb3\x05\xc3\x8d\xc3\x85S\xc2\xbb\x17\xc3\x86\xc3\xb2\xc3\xa3\xc3\xb0V\x07\x0e\xc2\xb0y\xc2\x8e\xc2\xb1\xc3\x8f;\xc2\xb9Tc\xc3\xadM\xc2\xad\xc2\x98#\xc2\xb0\x01`\x1c\xc2\x84d'
  136. fileID = b'\xb5\xe0\xf4\xd8\xe9\x1e\xf6i\xc4=^\xc2Y\xac\xdc\x88p\x8a+\x10t\x90\xa5\xc9\x1f\x98\xc61\xda\x7fH\x92'
  137. client.insert_file(file)
  138. client.retrieve_file(fileID)
  139. print("Basic insertion/retrieval fires correctly.")