Skip to main content
Log in

Efficient peer-to-peer context awareness data forwarding scheme in emergency situations

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Recently, we usually use these words “Edge of Innovation”. It is caused by deployment of smartphone and various hand-held device including wearable devices. In most cases, the devices can easily communicate with other people or devices, and most of modern IT services are the converged services. These are very common phenomenon even in management of the disaster and safety fields. Generally, the emergency situations involve extreme situations such as a horrible congestion, bottleneck, some damaged infrastructure, and so on. Nonetheless, the infrastructure should support communications to the users in these situations. In this case, P2P communications and networking can be one of the best alternatives. In addition, if the P2P communications and networking method which is based on the device location can operate, it will be better solution than others. However, these solutions have been developing now, and the technology level is just a toddler stage, especially measuring indoor location. This is why we proposed the efficient peer-to-peer context awareness data forwarding scheme based on the devices location. The proposed P2P scheme has 2 operation modes. One is the normal mode, the other is the emergency mode. In normal mode, although the proposed P2P scheme is almost same as the existing P2P communication and networking scheme, the proposed P2P scheme is based on the synchronization between each peer when they need to communicate with other peers. In addition, the proposed P2P scheme dynamically assigns a bandwidth to users by the traffic types when the scheme is aware of P2P context. This is reason that it is a purpose to increase user throughput and to guarantee minimum user throughput. On the other hand, the propose P2P scheme will operate not only to find a best path, but also to transfer an emergency message, and the operation mode will automatically change to the emergency mode when the scheme is aware of the emergency situations based on P2P context awareness. Based on the proposed P2P scheme, the user can communicate with other people, and relay the message to outside in the emergency mode. To prove the excellence of proposed P2P scheme, we verified that the proposed P2P scheme outperforms than legacy scheme in various aspects, and we show these simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Harle R (2012) A survey of indoor inertial positioning systems for pedestrians. IEEE Commun Surv Tutorials 15(3):1281–1293

    Article  Google Scholar 

  2. Chun-Feng L, Kung-Huan L (2014) A rapid-prototyping platform for PDR-based indoor positioning system on smart phones. Information Science, Electronics and Electrical Engineering (ISEEE), 2014 International Conference 2:1226–1230

  3. Sanghoon J, Jeamyeon L, HyunSu H, Seunghyuck S, Hansung L (2014) Indoor WPS/PDR performance enhancement using map matching algorithm with mobile phone. Position, Location and Navigation Symposium - PLANS 2014, 2014 IEEE/ION, pp. 385-392

  4. Golden SA, Bateman SS (2007) Sensor measurements for Wi-Fi location with emphasis on time of arrival ranging. IEEE Trans Mob Comput 6(10):1185–1198

    Article  Google Scholar 

  5. di Costanzo A, de Assuncao MD, Buyya R (2009) Harnessing cloud technologies for virtualized distributed computing infrastructure. IEEE Internet Comput 13(5):24–33

    Article  Google Scholar 

  6. Katarzyna K, Tsugawa M, Matsunaga A, Fortes JAB (2009) Sky computing. IEEE Internet Comput 13(5):43–51

    Article  Google Scholar 

  7. Pallis G (2010) Cloud computing – the new frontier of internet computing. IEEE Internet Comput 13(5):70–73

    Article  Google Scholar 

  8. Hwang K, Deyi L (2010) Trusted cloud computing with secure resource and data coloring. IEEE Internet Comput 13(5):14–22

    Article  Google Scholar 

  9. Le C, Jianping P, Min X (2013) Effective utilization of user resources in PA-VoD systems with channel heterogeneity. IEEE J Sel Areas Commun 31(9):227–236

    Article  Google Scholar 

  10. Parashar M, AbdelBaky M, Rodero I, Devarakonda A (2013) Cloud paradigms and practices for computational and data-enabled science and engineering. Comput Sci Eng 15(4):10–18

    Article  Google Scholar 

  11. Yan Z, Xu Z, Yinlong L, Bo W, Song C (2013) A novel cooperative caching algorithm for massive P2P caches. Peer-to-Peer Netw Appl 6(4):425–433

    Article  Google Scholar 

  12. Haiying S, Ze L, Jin L (2013) A DHT-aided chunk-driven overlay for scalable and efficient peer-to-peer live streaming. IEEE Trans Parallel Distrib Syst 24(11):2125–2137

    Article  Google Scholar 

  13. I-Shyan H, Liem AT (2013) A hybrid scalable peer-to-peer IP-based multimedia services architecture in ethernet passive optical networks. J Lightwave Technol 31(2):213–222

    Article  Google Scholar 

  14. Montazeri A, Akbari B, Ghanbari M (2012) An incentive scheduling mechanism for peer-to-peer video streaming. Peer-to-Peer Netw Appl 5(3):257–278

    Article  Google Scholar 

  15. Ferrant J-L, Ruffini S (2011) Evolution of the standards for packet network synchronization. IEEE Commun Mag 49(2):132–138

    Article  Google Scholar 

  16. Ouellette M, Kuiwen J, Song L, Han L (2011) Using IEEE 1588 and boundray clocks for clock synchronization in telecom networks. IEEE Commun Mag 49(2):164–171

    Article  Google Scholar 

  17. IEEE (2011) IEEE standard profile for use of IEEE 1588 precision time protocol in power system applications. IEEE Standard C37.238, pp. 1–66

  18. Chao H, Ming C, Changyou X, Bo X (2012) EUE principle of resource scheduling for live streaming systems underlying CDN-P2P hybrid architecture. Peer-to-Peer Netw Appl 5(4):312–322

    Article  Google Scholar 

  19. Shakkottai S, Srikant R, Lei Y (2011) The asymptotic behavior of minimum buffer size requirements in large P2P streaming networks. IEEE J Sel Areas Commun 29(5):928–937

    Article  Google Scholar 

  20. Luan H, Kwong K-W, Hei X, Tsang DHK (2010) Adaptive topology formation for peer-to-peer video streaming. Peer-to-Peer Netw Appl 3(3):186–207

    Article  Google Scholar 

  21. Kleis M, Radier B, Elmoumouhi S, Carle G, Salaün M (2010) A decentralised service composition approach for peer-to-peer video delivery. Peer-to-Peer Netw Appl 3(3):222–236

    Article  Google Scholar 

  22. Papagianni C, Leivadeas A, Papavassiliou S, Maglaris V, Cervello-Pastor C, Monje A (2013) On the optimal allocation of virtual resources in cloud computing networks. IEEE Trans Comput 62(6):1060–1071

    Article  MathSciNet  Google Scholar 

  23. Chen W, Cao J, Wan Y (2013) QoS-aware virtual machine scheduling for video streaming services in multi-cloud. Tsinghua Sci Technol 18(3):308–317

    Article  Google Scholar 

  24. Kim S, Ryoo I (2010) Packet forwarding scheme based on interworking architecture for future internet. IEICE Trans Commun E93-B(3):546–550

    Article  Google Scholar 

  25. Kim S (2015) QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networks. Peer-to-Peer Netw Appl 8(4):557–566

    Article  Google Scholar 

  26. Ryoo I, Na W, Kim S (2015) Information exchange architecture based on software defined networking for cooperative intelligent transportation systems. Clust Comput 18(2):771–782

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(2014R1A1A2060035)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seokhoon Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, S., Suk, J. Efficient peer-to-peer context awareness data forwarding scheme in emergency situations. Peer-to-Peer Netw. Appl. 9, 477–486 (2016). https://doi.org/10.1007/s12083-015-0401-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0401-8

Keywords

Navigation