Quoting Loic Dachary <l...@dachary.org> from ml.p2p.hackers:
:Thanks for sharing this document. Is there a reference implementation
:matching the paper ?

There is, but if I trust Thibault's statements (the main author of the paper),
it is implemented in Python and done by graduate students or interns. Code
is not commented.

I recommend you look at the C implementation in gtk-gnutella which is clearly
commented and can be exercised easily (by running gtk-gnutella and activating
the necessary debugging traces to see the algorithm run).

Grab the source code via this command:

$ svn co 
https://gtk-gnutella.svn.sourceforge.net/svnroot/gtk-gnutella/trunk/gtk-gnutella/

Then look in src/dht/lookup.c:

* Passive protection of the lookup path is done in lookup_node_is_safe().
* Active protection using the K-L divergence is in lookup_path_is_safe().

Cheers,
Raphael
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to