Research Article
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack
Algorithm 6
Key lookup operation in the responsible tree of the proposed architecture.
.Search_Tree | //After finding the responsible tree, query will be forwarded towards the appropriate child of tree | (1) If lies on the root node, then | (2) Return | (3) Else // if key lies on one of its child | (4) Repeat for to 4 | (5) if (), then | (6) | (7) Break | (8) End for | (9) .Search_Tree() | (10) Return. | |
|