Computer Science ›› 2021, Vol. 48 ›› Issue (9): 278-285.doi: 10.11896/jsjkx.201200056

• Computer Network • Previous Articles     Next Articles

Hierarchical Management Mechanism of P2P Video Surveillance Network Based on CHBL

XIA Zhong, XIANG Min, HUANG Chun-mei   

  1. Key Laboratory of Industrial Internet of Things and Networked Control (Chongqing University of Posts and Telecommunications),Ministry of Education,Chongqing 400065,China
  • Received:2020-12-04 Revised:2021-03-26 Online:2021-09-15 Published:2021-09-10
  • About author:XIA Zhong,born in 1995,postgra-duates.His main research interests include P2P and video surveillance.
    XIANG Min,born in 1974,Ph.D,professor.His main research interests include smart grid,industrial Internet of things and automation control.
  • Supported by:
    Chongqing Technology Innovation and Application Development Project (cstc2020jscx-msxmX0126)

Abstract: Load balancing and response time are the key issues in video surveillance peer-to-peer networks.A hierarchical mana-gement mechanism of a P2P video surveillance network based on the consistent hash with bounded loads is proposed.According to the geographical location of the nodes,the P2P video surveillance network is divided into the different autonomous region,which is divided into one layer of super nodes and multiple layers of ordinary nodes.The ratio of the upstream bandwidth of the node to the bandwidth required by each video transmission channel is used as the upper limit of the node load.It is stratified when the total load of the upper layer nodes reaches the upper limit.CHBL algorithm is used to control the load balance of each layer nodes,which are mapped to different hash ring.The weight of each index of the node is calculated by the independent information data fluctuation weighting method,and then the comprehensive value of the node is obtained by linear weighting.The node with the highest comprehensive value in the child node layer is selected as a replacement node for the separated node.The node with the highest comprehensive value will converge to the upper layer between long-running P2P networks.Compared with the DHT-based P2P network,the simulation results show that the proposed management mechanism can effectively improve the load ba-lance and reduce the overall response time of the network.

Key words: Comprehensive value, Consistent hash with bounded loads, Hierarchical management, Load balancing, Peer-to-Peer, Video surveillance

CLC Number: 

  • TP393
[1]HUANG K Q,CHEN X T,KANG Y F,et al.Overview of Intelligent Video Surveillance Technology[J].Chinese Journal of Computers,2015,38(6):1093-1118.
[2]ZHU X,DENG H T,CHEN Z,et al.Design of Large-Scale Vi-deo Surveillance System Based on P2P Streaming[C]//2011 3rd International Workshop on Intelligent Systems and Applications.Wuhan:IEEE,2011:1-4.
[3]KUNWAR P,MAHESH C G,MUSHTAQ A.Priority-basedscheduling scheme for live video streaming in peer-to-peer network[J].Multimedia Tools and Applications,2018,77(18):24427-24457.
[4]RUSSO A,LO C R.Delay-aware push/pull protocols for live video streaming in p2p systems[C]//IEEE International Conference on Communications.Cape Town:IEEE,2010:3-7.
[5]LI M F.Queueing Analysis of Unicast IPTV With AdaptiveModulation and Coding in Wireless Cellular Networks[J].IEEE Transactions on Vehicular Technology,2017,66(10):9241-9253.
[6]LIANG C,TAN Y,ZHANG X S,et al.Building packet length convert channel over mobile VoIP traffics[J].Journal of Network and Computer Applications,2018,118(15):144-153.
[7]LI L F,ZHANG J Z,WANG P D,et al.P2P network searchmechanism based on node interest and Q-learning[J].Computer Science,2020,47(2):221-226.
[8]LI W X,XIONG Q G,YANG L T.A DHT overlay network that realizes efficient copy publishing and query[J].Computer Science,2010,37(7):87-90.
[9]ZENG B,WANG R.A novel lookup and routing protocol based on CAN for structured P2P network[C]//1st IEEE Internatio-nal Conference on Computer Communication and the Internet (ICCCI).Wuhan:IEEE,2016:6-9.
[10]AZMY N,MERZ S,WEIDENBACH C.A machine-checked correctness proof for Pastry[J].Science of Computer Programming,2018,158:64-80.
[11]CHERBAL S,BOUKERRAM A,BOUBETRA A.A survey of DHT solutions in fixed and mobile networks[J].International Journal of Communication Networks and Distributed Systems,2016,17(1):14-42.
[12]SAH A,HWANG I S,RIANTO A,et al.Gnutella-Based P2PApplications for SDN over TWDM-PON Architecture[J].International Journal of Computer Theory and Engineering,2020,12(2):32-39.
[13]YAN Y,TANG H.Data collection and analysis of traffic be-tween nodes in BitTorrent network[J].Computer Science,2014,41(6):75-78.
[14]KISEMBE P,JEBERSON W.Future of Peer-To-Peer Technology with the Rise of Cloud Computing[J].International Journal of Peer to Peer Networks (IJP2P),2017,8(2/3):45-54.
[15]ZHENG Z,WANG Y J,MA X K.Laurel:A Hybrid Data Distribution Coverage Network[J].Journal of Software,2011,22(4):722-735.
[16]MAHESWARI B U,SUDARSHAN T S B.Reputation basedmesh-tree-mesh cluster hybrid architecture for P2P live strea-ming[C]//Proceedings of the 3rd International Conference on Devices,Circuits and Systems.Coimbatore:IEEE,2016:240-243.
[17]JAHROMI N T,AKBARI B,MOVAGHAR A.A hybrid mesh-tree peer-to-peer overlay structure for layered video streaming[C]//2010 5th International Symposium on Telecommunications.Tehran:IEEE,2010,706-709.
[18]AMAD M,MEDDAHI A,AISSANI D,et al.HPM:A novelhierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity[J].Journal of Network and Computer Applications,2012,35(6):1818-1830.
[19]GUPTA B,RAHIMI N,HEXMOOR H.Design of Very Efficient Lookup Algorithms for a Low Diameter Hierarchical Structured Peer-to-Peer Network[C]//16th IEEE International Conference on Industrial Informatics (INDIN).Porto:IEEE,2018:861-868.
[20]HASIMOTO-BELTRAN R,LOPEZ-FUENTES F D A,VERA-LOPEZ M.Hierarchical P2P architecture for efficient content distribution[J].Peer-to-Peer Networking and Applications,2019,12(4):724-739.
[21]LI J,LI C,FANG Z,et al.Optimal layer division for low latency in DHT-based hierarchical P2P network[J].International Journal of Network Management,2016,26(2):95-110.
[22]MIRROKNI V,THORUP M,ZADIMOGHADDAM M.Con-sistent Hashing with Bounded Loads[C]//29th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA).New Or-leans:Society for Industrial and Applied Mathematics,2018:587-604.
[23]XIANG M,JIANG Y Z,XIA Z,et al.Consistent hashing with bounded loads and virtual nodes-based load balancing strategy
for proxy cache cluster[J].Cluster Computing,2020,23(4):3139-3155.
[24]CHEN Y,ZHAO E D,GAO G,et al.Multi-view video wireless resource optimization[J].Chinese Journal of Computers,2020,43(3):492-511.
[25]YU A J,YANG S M.Research on web server cluster load balancing algorithm in web education system[J].Journal of Supercomputing,2020,76(5):3364-3373.
[1] TIAN Zhen-zhen, JIANG Wei, ZHENG Bing-xu, MENG Li-min. Load Balancing Optimization Scheduling Algorithm Based on Server Cluster [J]. Computer Science, 2022, 49(6A): 639-644.
[2] GAO Jie, LIU Sha, HUANG Ze-qiang, ZHENG Tian-yu, LIU Xin, QI Feng-bin. Deep Neural Network Operator Acceleration Library Optimization Based on Domestic Many-core Processor [J]. Computer Science, 2022, 49(5): 355-362.
[3] TAN Shuang-jie, LIN Bao-jun, LIU Ying-chun, ZHAO Shuai. Load Scheduling Algorithm for Distributed On-board RTs System Based on Machine Learning [J]. Computer Science, 2022, 49(2): 336-341.
[4] QU Li-cheng, LYU Jiao, QU Yi-hua, WANG Hai-fei. Intelligent Assignment and Positioning Algorithm of Moving Target Based on Fuzzy Neural Network [J]. Computer Science, 2021, 48(8): 246-252.
[5] SONG Hai-ning, JIAO Jian, LIU Yong. Research on Mobile Edge Computing in Expressway [J]. Computer Science, 2021, 48(6A): 383-386.
[6] WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426.
[7] ZHENG Zeng-qian, WANG Kun, ZHAO Tao, JIANG Wei, MENG Li-min. Load Balancing Mechanism for Bandwidth and Time-delay Constrained Streaming Media Server Cluster [J]. Computer Science, 2021, 48(6): 261-267.
[8] YAO Ze-wei, LIU Jia-wen, HU Jun-qin, CHEN Xing. PSO-GA Based Approach to Multi-edge Load Balancing [J]. Computer Science, 2021, 48(11A): 456-463.
[9] YANG Zi-qi, CAI Ying, ZHANG Hao-chen, FAN Yan-fang. Computational Task Offloading Scheme Based on Load Balance for Cooperative VEC Servers [J]. Computer Science, 2021, 48(1): 81-88.
[10] GUO Fei-yan, TANG Bing. Mobile Edge Server Placement Method Based on User Latency-aware [J]. Computer Science, 2021, 48(1): 103-110.
[11] YAO Lan, ZHAO Yong-heng, SHI Yu-qing, YU Ming-he. Highway Abnormal Event Detection Algorithm Based on Video Analysis [J]. Computer Science, 2020, 47(8): 208-212.
[12] GAO Zi-yan and WANG Yong. Load Balancing Strategy of Distributed Messaging System for Cloud Services [J]. Computer Science, 2020, 47(6A): 318-324.
[13] HUANG Mei-gen, WANG Tao, LIU Liang, PANG Rui-qin and DU Huan. Virtual Network Function Deployment Strategy Based on Software Defined Network Resource Optimization [J]. Computer Science, 2020, 47(6A): 404-408.
[14] ZHOU Jian-xin, ZHANG Zhi-peng, ZHOU Ning. Load Balancing Technology of Segment Routing Based on CKSP [J]. Computer Science, 2020, 47(4): 256-261.
[15] ZHU An-qing, LI Shuai, TANG Xiao-dong. Parallel FP_growth Association Rules Mining Method on Spark Platform [J]. Computer Science, 2020, 47(12): 139-143.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!