计算机科学 ›› 2021, Vol. 48 ›› Issue (9): 278-285.doi: 10.11896/jsjkx.201200056

• 计算机网络 • 上一篇    下一篇

基于CHBL的P2P视频监控网络分层管理机制

夏中, 向敏, 黄春梅   

  1. 重庆邮电大学工业物联网与网络化控制教育部重点实验室 重庆400065
  • 收稿日期:2020-12-04 修回日期:2021-03-26 出版日期:2021-09-15 发布日期:2021-09-10
  • 通讯作者: 向敏(xiangmin@cqupt.edu.cn)
  • 作者简介:cqupt_xz@163.com
  • 基金资助:
    重庆市技术创新与应用发展专项面上项目(cstc2020jscx-msxmX0126)

Hierarchical Management Mechanism of P2P Video Surveillance Network Based on CHBL

XIA Zhong, XIANG Min, HUANG Chun-mei   

  1. Key Laboratory of Industrial Internet of Things and Networked Control (Chongqing University of Posts and Telecommunications),Ministry of Education,Chongqing 400065,China
  • Received:2020-12-04 Revised:2021-03-26 Online:2021-09-15 Published:2021-09-10
  • About author:XIA Zhong,born in 1995,postgra-duates.His main research interests include P2P and video surveillance.
    XIANG Min,born in 1974,Ph.D,professor.His main research interests include smart grid,industrial Internet of things and automation control.
  • Supported by:
    Chongqing Technology Innovation and Application Development Project (cstc2020jscx-msxmX0126)

摘要: 络的负载均衡性和响应时延是视频监控对等网络重点关注的问题。文中提出了一种基于有限负载一致性哈希的P2P视频监控网络分层管理机制。首先根据节点地理位置将P2P视频监控网络划分为不同的自治域,自治域内分为一层超级节点和多层普通节点,采用节点上行带宽与每条视频传输通道所需带宽的比值作为节点负载上限,当上层节点总负载量到达上限后进行分层,每一层节点均被映射到一个hash环上,并使用CHBL算法控制层内节点的负载均衡。然后采用独立信息数据波动赋权法计算出节点的各指标权重,通过线性加权得到节点综合价值,当节点脱离网络时,选择其子节点层中综合价值最高的节点作为脱离节点的替换节点。在长期运行的网络中,综合价值最高的节点将汇聚到上层。仿真结果表明,相比基于DHT的P2P网络,所提管理机制能有效改善网络的负载均衡性,同时也可降低网络的整体响应时延。

关键词: 有限负载一致性哈希, P2P, 视频监控, 分层管理, 负载均衡, 综合价值

Abstract: Load balancing and response time are the key issues in video surveillance peer-to-peer networks.A hierarchical mana-gement mechanism of a P2P video surveillance network based on the consistent hash with bounded loads is proposed.According to the geographical location of the nodes,the P2P video surveillance network is divided into the different autonomous region,which is divided into one layer of super nodes and multiple layers of ordinary nodes.The ratio of the upstream bandwidth of the node to the bandwidth required by each video transmission channel is used as the upper limit of the node load.It is stratified when the total load of the upper layer nodes reaches the upper limit.CHBL algorithm is used to control the load balance of each layer nodes,which are mapped to different hash ring.The weight of each index of the node is calculated by the independent information data fluctuation weighting method,and then the comprehensive value of the node is obtained by linear weighting.The node with the highest comprehensive value in the child node layer is selected as a replacement node for the separated node.The node with the highest comprehensive value will converge to the upper layer between long-running P2P networks.Compared with the DHT-based P2P network,the simulation results show that the proposed management mechanism can effectively improve the load ba-lance and reduce the overall response time of the network.

Key words: Consistent hash with bounded loads, Peer-to-Peer, Video surveillance, Hierarchical management, Load balancing, Comprehensive value

中图分类号: 

  • TP393
[1]HUANG K Q,CHEN X T,KANG Y F,et al.Overview of Intelligent Video Surveillance Technology[J].Chinese Journal of Computers,2015,38(6):1093-1118.
[2]ZHU X,DENG H T,CHEN Z,et al.Design of Large-Scale Vi-deo Surveillance System Based on P2P Streaming[C]//2011 3rd International Workshop on Intelligent Systems and Applications.Wuhan:IEEE,2011:1-4.
[3]KUNWAR P,MAHESH C G,MUSHTAQ A.Priority-basedscheduling scheme for live video streaming in peer-to-peer network[J].Multimedia Tools and Applications,2018,77(18):24427-24457.
[4]RUSSO A,LO C R.Delay-aware push/pull protocols for live video streaming in p2p systems[C]//IEEE International Conference on Communications.Cape Town:IEEE,2010:3-7.
[5]LI M F.Queueing Analysis of Unicast IPTV With AdaptiveModulation and Coding in Wireless Cellular Networks[J].IEEE Transactions on Vehicular Technology,2017,66(10):9241-9253.
[6]LIANG C,TAN Y,ZHANG X S,et al.Building packet length convert channel over mobile VoIP traffics[J].Journal of Network and Computer Applications,2018,118(15):144-153.
[7]LI L F,ZHANG J Z,WANG P D,et al.P2P network searchmechanism based on node interest and Q-learning[J].Computer Science,2020,47(2):221-226.
[8]LI W X,XIONG Q G,YANG L T.A DHT overlay network that realizes efficient copy publishing and query[J].Computer Science,2010,37(7):87-90.
[9]ZENG B,WANG R.A novel lookup and routing protocol based on CAN for structured P2P network[C]//1st IEEE Internatio-nal Conference on Computer Communication and the Internet (ICCCI).Wuhan:IEEE,2016:6-9.
[10]AZMY N,MERZ S,WEIDENBACH C.A machine-checked correctness proof for Pastry[J].Science of Computer Programming,2018,158:64-80.
[11]CHERBAL S,BOUKERRAM A,BOUBETRA A.A survey of DHT solutions in fixed and mobile networks[J].International Journal of Communication Networks and Distributed Systems,2016,17(1):14-42.
[12]SAH A,HWANG I S,RIANTO A,et al.Gnutella-Based P2PApplications for SDN over TWDM-PON Architecture[J].International Journal of Computer Theory and Engineering,2020,12(2):32-39.
[13]YAN Y,TANG H.Data collection and analysis of traffic be-tween nodes in BitTorrent network[J].Computer Science,2014,41(6):75-78.
[14]KISEMBE P,JEBERSON W.Future of Peer-To-Peer Technology with the Rise of Cloud Computing[J].International Journal of Peer to Peer Networks (IJP2P),2017,8(2/3):45-54.
[15]ZHENG Z,WANG Y J,MA X K.Laurel:A Hybrid Data Distribution Coverage Network[J].Journal of Software,2011,22(4):722-735.
[16]MAHESWARI B U,SUDARSHAN T S B.Reputation basedmesh-tree-mesh cluster hybrid architecture for P2P live strea-ming[C]//Proceedings of the 3rd International Conference on Devices,Circuits and Systems.Coimbatore:IEEE,2016:240-243.
[17]JAHROMI N T,AKBARI B,MOVAGHAR A.A hybrid mesh-tree peer-to-peer overlay structure for layered video streaming[C]//2010 5th International Symposium on Telecommunications.Tehran:IEEE,2010,706-709.
[18]AMAD M,MEDDAHI A,AISSANI D,et al.HPM:A novelhierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity[J].Journal of Network and Computer Applications,2012,35(6):1818-1830.
[19]GUPTA B,RAHIMI N,HEXMOOR H.Design of Very Efficient Lookup Algorithms for a Low Diameter Hierarchical Structured Peer-to-Peer Network[C]//16th IEEE International Conference on Industrial Informatics (INDIN).Porto:IEEE,2018:861-868.
[20]HASIMOTO-BELTRAN R,LOPEZ-FUENTES F D A,VERA-LOPEZ M.Hierarchical P2P architecture for efficient content distribution[J].Peer-to-Peer Networking and Applications,2019,12(4):724-739.
[21]LI J,LI C,FANG Z,et al.Optimal layer division for low latency in DHT-based hierarchical P2P network[J].International Journal of Network Management,2016,26(2):95-110.
[22]MIRROKNI V,THORUP M,ZADIMOGHADDAM M.Con-sistent Hashing with Bounded Loads[C]//29th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA).New Or-leans:Society for Industrial and Applied Mathematics,2018:587-604.
[23]XIANG M,JIANG Y Z,XIA Z,et al.Consistent hashing with bounded loads and virtual nodes-based load balancing strategy
for proxy cache cluster[J].Cluster Computing,2020,23(4):3139-3155.
[24]CHEN Y,ZHAO E D,GAO G,et al.Multi-view video wireless resource optimization[J].Chinese Journal of Computers,2020,43(3):492-511.
[25]YU A J,YANG S M.Research on web server cluster load balancing algorithm in web education system[J].Journal of Supercomputing,2020,76(5):3364-3373.
[1] 屈立成, 吕娇, 屈艺华, 王海飞. 基于模糊神经网络的运动目标智能分配定位算法[J]. 计算机科学, 2021, 48(8): 246-252.
[2] 宋海宁, 焦健, 刘永. 高速公路中的移动边缘计算研究[J]. 计算机科学, 2021, 48(6A): 383-386.
[3] 王政, 姜春茂. 一种基于三支决策的云任务调度优化算法[J]. 计算机科学, 2021, 48(6A): 420-426.
[4] 郑增乾, 王锟, 赵涛, 蒋维, 孟利民. 带宽和时延受限的流媒体服务器集群负载均衡机制[J]. 计算机科学, 2021, 48(6): 261-267.
[5] 杨紫淇, 蔡英, 张皓晨, 范艳芳. 基于负载均衡的VEC服务器联合计算任务卸载方案[J]. 计算机科学, 2021, 48(1): 81-88.
[6] 郭飞雁, 唐兵. 基于用户延迟感知的移动边缘服务器放置方法[J]. 计算机科学, 2021, 48(1): 103-110.
[7] 王国澎, 杨剑新, 尹飞, 蒋生健. 负载均衡的处理器运算资源分配方法[J]. 计算机科学, 2020, 47(8): 41-48.
[8] 金琪, 王俊昌, 付雄. 基于智能放置策略的Cuckoo哈希表[J]. 计算机科学, 2020, 47(8): 80-86.
[9] 姚兰, 赵永恒, 施雨晴, 于明鹤. 一种基于视频分析的高速公路交通异常事件检测算法[J]. 计算机科学, 2020, 47(8): 208-212.
[10] 高子妍, 王勇. 面向云服务的分布式消息系统负载均衡策略[J]. 计算机科学, 2020, 47(6A): 318-324.
[11] 黄梅根, 汪涛, 刘亮, 庞瑞琴, 杜欢. 基于软件定义网络资源优化的虚拟网络功能部署策略[J]. 计算机科学, 2020, 47(6A): 404-408.
[12] 蔡玉鑫, 汤志伟, 赵博, 杨明, 吴禹非. 基于嵌入式多核DSP的加速软件系统[J]. 计算机科学, 2020, 47(6A): 622-625.
[13] 周建新, 张志鹏, 周宁. 基于CKSP的分段路由负载均衡技术[J]. 计算机科学, 2020, 47(4): 256-261.
[14] 李龙飞,张泾周,王鹏德,郭鹏军. 基于节点兴趣和Q-learning的P2P网络搜索机制[J]. 计算机科学, 2020, 47(2): 221-226.
[15] 朱岸青, 李帅, 唐晓东. Spark平台中的并行化FP_growth关联规则挖掘方法[J]. 计算机科学, 2020, 47(12): 139-143.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 张文博,侯晓荣. 基于高斯分布的大气光估计算法[J]. 计算机科学, 2018, 45(4): 301 -305 .
[2] 徐晓玲, 金忠, 贲圣兰. 基于标签敏感最大间隔准则的人脸年龄两步估计算法[J]. 计算机科学, 2018, 45(6): 284 -290 .
[3] 张婧,周安民,刘亮,贾鹏,刘露平. Crash可利用性分析方法研究综述[J]. 计算机科学, 2018, 45(5): 5 -14 .
[4] 王国豪,李庆华,刘安丰. 多目标最优化云工作流调度进化遗传算法[J]. 计算机科学, 2018, 45(5): 31 -37 .
[5] 庄陵,尹耀虎. 认知异构网络中基于不完全频谱感知的资源分配算法[J]. 计算机科学, 2018, 45(5): 49 -53 .
[6] 苏涛,顾晶晶,黄涛涛. 无线传感器网络分布式拓扑图生成模型[J]. 计算机科学, 2018, 45(5): 54 -58 .
[7] 韩莉,钱焕延. 流间编码与流内编码相结合的机会路由算法[J]. 计算机科学, 2018, 45(5): 69 -74 .
[8] 廖湖声, 黄珊珊, 徐俊刚, 刘仁峰. Spark性能优化技术研究综述[J]. 计算机科学, 2018, 45(7): 7 -15 .
[9] 李月,王芳. 基于NVM的存储安全综述[J]. 计算机科学, 2018, 45(7): 53 -60 .
[10] 严娇娇,种兰祥,李婷. 一种人手背静脉特征识别方法[J]. 计算机科学, 2018, 45(6A): 206 -209 .