Next Article in Journal
Sound-Based Localization Using LSTM Networks for Visually Impaired Navigation
Next Article in Special Issue
DGTTSSA: Data Gathering Technique Based on Trust and Sparrow Search Algorithm for WSNs
Previous Article in Journal
An Image Information-Based Objective Assessment Method of Technical Manipulation Skills for Intravascular Interventions
Previous Article in Special Issue
MIA-NDN: Microservice-Centric Interest Aggregation in Named Data Networking
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Implementing Dual Base Stations within an IoT Network for Sustaining the Fault Tolerance of an IoT Network through an Efficient Path Finding Algorithm

1
Department of ECM, K L Deemed to be University, Vaddeswaram 522302, India
2
Oracle America Inc., Scottfield Street, Dublin, CA 94568, USA
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(8), 4032; https://doi.org/10.3390/s23084032
Submission received: 16 March 2023 / Revised: 6 April 2023 / Accepted: 12 April 2023 / Published: 17 April 2023
(This article belongs to the Special Issue Ambient Intelligence Based on the Internet of Things)

Abstract

:
The IoT networks for implementing mission-critical applications need a layer to effect remote communication between the cluster heads and the microcontrollers. Remote communication is affected through base stations using cellular technologies. Using a single base station in this layer is risky as the fault tolerance level of the network will be zero when the base stations break down. Generally, the cluster heads are within the base station spectrum, making seamless integration possible. Implementing a dual base station to cater for a breakdown of the first base station creates huge remoteness as the cluster heads are not within the spectrum of the second base station. Furthermore, using the remote base station involves huge latency affecting the performance of the IoT network. In this paper, a relay-based network is presented with intelligence to fetch the shortest path for communicating to reduce latency and sustain the fault tolerance capability of the IoT network. The results demonstrate that the technique improved the fault tolerance of the IoT network by 14.23%.

1. Introduction

Fault tolerance of any network is generally defined as the reliability of the availability of the IoT system in working conditions. The more reliable the IoT network, the more tolerable the network, leading to the high acceptance of such a network. The IoT networks relating to mission criticality systems must be tolerable to the extent of 99% [1].
IoT networks use networking topologies (butterfly, Crossbar, Hybrid) in different layers connecting small devices (sensors, actuators, controllers) and big devices such as high-end servers, base stations, gateways, and splitters. Small devices often fail and induce different faults, rendering the entire IoT network less fault tolerant [2].
The devices within an IoT system are heterogenous and are driven through different protocols requiring conversions, speed matching and the use of several sophisticated algorithms for dealing with data transmission for the purpose of performance enhancements [3,4,5,6,7].
The fault tolerance of an IoT network can be measured in terms of success rate, failure rate, false alarm rate, and power depletion rate [8] and the computation of these metrics. In addition, different computation models are to be used, which include FTA (Fault Tree Analysis) [9] for linear models, probability models [10], hybrid models [11] that combine linear and probability models, empirical model [12], and bipartite flow graph modeling [13].
Small devices tend to fail, inducing different faults, sometimes rendering the entire IoT system non-operational and producing unpredictable behaviour. The faults that are generally induced in the IoT system include Cascading faults [14,15], Pattern faults [16], and device-to-device communication faults [17]. Various faults occurring within the devices have been reviewed by Norris et al. [18,19].
Several methods have been implemented to enhance the fault tolerance of an IoT system in the presence of the faults mentioned above. The methods aim to enhance the robustness [14], carry complex event processing [20], minimization of bandwidth [21], alternate Networking butterfly [22], Crossbar [23], and handle demand uncertainty [24]. S. Kumar, P. Ranjan et al. [25] presented an artificial-intelligence-based method for analyzing the fault tolerance level of the IoT network in the presence of network failures within software-defined IoT networks.
The cluster heads transmit the sensed data routed by the devices through base stations to the microcontrollers due to the existence of both devices over long distances. Cellular technologies are used to effect communication between devices. A base station is placed to provide a nearby spectrum for the cluster heads to communicate with the microcontrollers to transmit data and for receiving the actuating commands. The network becomes isolated when the base station fails, and the fault tolerance of such a network is zero. It will be dangerous when the fault tolerance of a mission-critical system becomes zero.
K. M. Malarski et al. [17] presented a D2D-enabled Fault-tolerance in Cellular IoT. They have yet to consider the issue of the remoteness of the second base station and also based their discussion on a single relay system which generally cannot support a huge number of cluster heads.
Building an IoT network considering more than two base stations, is very complex. When a base station is placed in a distant location, the latency is bound to increase, affecting the performance of the IoT system. The placement and connectivity of cluster heads and the microcontroller with the base station is a complex issue that must be addressed to minimize the latency. There should be alternate paths of communication to cater for the failure of one of the base stations.
It is necessary to build alternative methods of communication between the cluster heads and microcontrollers through a pair of redundant base stations, which are situated between cluster heads and the microcontrollers. A networking topology and routing algorithm must be developed to connect the cluster heads to the microcontrollers through a remotely situated base station. The communication between the base stations and the microcontrollers is proposed to be undertaken in peer-to-peer mode using four different channels to synchronize the communication speeds between slow-speed microcontrollers and high-speed base stations.
The latest 5th-generation networks have provided significant growth in low latency communication and high speeds, which support many missions’ critical applications [26,27], such as industrial automation, e-health, smart cities and autonomous cars, imposing stringent network performance requirements from communication networks.
Healthcare-related mission-critical applications must have high availability, dependability, and low end-to-end latency [28]. For machine-type communication, the Internet of Things uses two cellular communication technologies: narrowband-IoT (NB-IoT) and LTE-M, which were created for low-power consumption devices and include expanded coverage, deep door signal penetration, and high availability [29,30,31]. These channels must adhere to duty cycle limitations, use permitted spectrum, and minimise interference from nearby devices. These conditions can be met using the Device-to-Device (D2D) paradigm to prevent complete disconnection between Cellular IoT (CIoT) devices [32]. Although NB-IoT does not entirely support LTE, it only uses 180 kHz of available bandwidth and offers three deployment options: in-band, guard band, and standalone.
When two CIoT devices are close to one another, and one is still connected to an evolved node-b (eNB), it is possible to establish a direct communication link using D2D and relay packets from the failed device to the network infrastructure [33]. D2D might also be used to offload traffic from the CIoT network. Reducing energy consumption and E2E delay can be accomplished by offloading device traffic from the network [34,35].
The use of a separate D2D network will help in improving the fault tolerance of the network. However, the real challenge is that the base stations are remotely situated from the devices making it more complicated to establish communication between the cluster heads and the remote controllers through base stations. More efficient networking that provides alternate paths of communication is required. The shortest path must be selected for communication, so that the data move to the service server with the least latency.
There is a need to establish communication between the slow-speed and high-speed devices and networks, which leads to heavy failures. Heterogeneity results in significant failures and thus needs to be managed. Communication between the cluster heads and remotely situated microcontrollers is affected through base stations. The cluster heads and the microcontrollers communicate with the base stations through cellular communication. The risk of failure of the IoT network is very high due to failure of the base station and the presence of heterogeneity in the communication protocol. The remote base stations are out of sight to the devices that sense and transport data.
A specialized networking topology is required to connect the devices to a redundant base station remotely situated from the cluster heads. Redundant base stations enhance the fault tolerance of the IoT network. The base stations communicate with the microcontrollers in peer-to-peer mode using parallel communication so that the speeds match. There should be an element of redundancy in the network to accommodate the link failures. Furthermore, communication must be done via the shortest path with the least traffic so as to minimise latency.
The following research questions are answered in this paper:
  • How will the longevity of the IoT network be affected due to the use of a single base station in the IoT network?
  • How to determine fault-free and fast responsive paths in a given IoT network
  • What parameters must be considered to decide the path to effect the fastest communication through the 2nd base station?
  • How many base stations are required to guarantee a 100% fault tolerant system
Major Contributions of this research
  • A method to determine the shortest and fastest fault-free path for data transmission from cluster heads to microcontrollers en route to the redundant base station.
  • A method to facilitate communication between the base stations and the microcontrollers.
  • A method to convert a networking diagram to a Fault tree Analysis diagram considering different networking topologies used to connect both the device layer and the controller layer.
Outline of the paper
The rest of this paper is presented in Section 3, Section 4, Section 5, Section 6, Section 7, Section 8, Section 9 and Section 10. The related work and the GAP are presented in Section 2. In Section 3, the overall method used for improving the fault tolerance of the IoT network through modifications effected in the controller layer is presented. Section 4 presents an updated and improved IoT network up to the device level, along with its fault tolerance diagram and computations. The revised IoT network and the changes effected in the controller layer of the IoT network are explained in Section 5. Section 6 explains the networking topology and the devices used in the network connecting the cluster heads and the base station. A novel fault-free, shortest and fastest path-finding algorithm is discussed in Section 7. Results of the experiments on the revised network and a discussion on the same are presented in Section 8 and Section 9, respectively. Conclusions and future scope are presented in Section 10.

2. Related Work

D. Koziol et al. [36] proposed that achieving QoS between the base station and the remote user equipment (UE) requires resolving many trade-offs regarding signalling overhead, implementation complexity and overall delay. They did not recommend any alternate mechanisms to ensure fault tolerance is maintained in the event of failures while achieving the required level of QoS.
Skorin-Kapov [37] presented Machine-Type Communication (MTC) which considers simplification of the channels and interfaces such that the communication system is suitable for NB-IoT and LTE-M-based applications. They did not consider any specific networking topology or failure situations.
C. Min et al. [38] expressed that MTC created an interest in D2D applications, especially in the automotive sector. They did not consider any specific networking topology or failure situations.
According to Hunukumbure et al. [39], adding D2D to cellular infrastructure will increase reliability, reduce power usage, and prevent network congestion. They suggested a random-access process that uses broadcast messages to announce the D2D mode of communication so that UEs can directly talk with one another, utilising CSMA with collision avoidance. Yet, the endeavour must consider IoT devices and the various resource limits they impose. The concerns with the distance between the base stations and the equipment on either side of the stations must still be considered.
A D2D approach for improving battery life and the accessibility of Cellular IoT (CIoT) deployment was proposed by J. Lianghai et al. [40]. With the help of the gathered environmental data, the network oversees and maintains the assignment of the UEs to the devices (remote devices, relays) (e.g., battery level and position). The authors create new signalling behaviour allowing UE attachment, transmission mode (re)configuration, and uplink data delivery. Applying a D2D solution controlled by a core network could address RAN (Radio Access Network) failure issues more effectively.
Al-Salihi NK [41] proposed an Internet of Things (IoT)-based position-fixing system instead of GPS as they are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. They proposed a redundancy-based model for improving the fault tolerance of the IOT-based position-fixing system. However, they did not account for alternate communication paths in the event of a failure occurring.
Bhupathi et al. [42] presented different metrics for computing the fault tolerance of the IoT network. They also presented [11] a crossbar network topology to connect the clusters to the cluster heads. Moreover, they implemented a method to predict the fault that a device will inject due to the power depletion rate. The devices are isolated before the fault can be injected into the system.
Many have proposed algorithms to find the shortest path from a source node to the sink node.
Daniel Foead et al. [43] presented a complete review of different variants of A*-based search algorithms and opined that the algorithm fails as the sizes of the network increase and dynamically change.
F. Xia et al. [44] presented a review of different variants of random walk algorithms, which are meant to find the shortest path in the network. They proposed that one has to select a variant of the algorithm string for a specific application. The algorithm, as such, does not consider the existence of the loops in the network.
Niranjane P. B. et al. [45] presented a comparison of variants of Yen’s algorithm for finding k-simple shortest paths, which is based on the number of deviations that the network contains. However, the need for k-shortest paths rarely arises when pruning the paths is achieved to eliminate the failure paths from the system.
Kyle E. et al. [46] studied the choice of a graph search algorithm to find the shortest path in a directed relation graph with error propagation (DRGEP and have compared the method with other algorithms that include depth-first search, basic and R-value-based breadth-first search (RBFS), and Dijkstra’s algorithm and found that Dijkstra’s algorithm combined with coefficient scaling approach most accurate results when applied to bio application.
Kalyan Mohanta B. P. et al. [47] presented a comprehensive review of the existing k-shortest algorithms and showed the computational efficiency of each of the algorithms. Andrej Brodnik et al. [48] presented an all-pairs shortest path algorithm for directed acrylic graphs and arbitrary edge lengths. Muteb Alshmmari et al. [49] proposed an algorithm (single source shortest path) for dynamic graphs with large change frequency.
The methods proposed in the literature did not focus on the issue of failure of the main base station and the need for a second redundant base station, and the way the second base station is to be connected to cluster heads considering distance limitations and non-crossover of the communication spectrum. None have attempted to determine the fail free shortest and fastest path that should be used for affecting communication between cluster heads and the second base station.

3. Methodology

A flow diagram depicting the execution of the proposed methods is shown in Figure 1. The blocks relating to metrics development, initial prototype development and its FTA development, implementing a crossbar network in the device layer, implementing fault detection and isolation method in the sensing and actuating devices to counter the possible fault in injection in the device layer and its related FTA model and the improvement in fault tolerance capability of the IoT network were explained by Bhupathi et al. [11,42]. Further to the implementations carried out in the device layer, a second base station has been added to the controller layer. The second base station has been connected to the cluster heads through an intelligent-relay-based network with built-in redundancy to tackle the issue of remoteness of the base station from the cluster heads. An intelligent pathfinding algorithm is implemented in each relay to find the shortest path with the least traffic to significantly reduce the latency. An FTA diagram for the newly introduced network is developed and combined with the FTA diagram of the prototype model. Fault tolerance values have been computed through the generation of a fault table. A comparison of the stage improvements in the fault tolerance of the IoT network due to the implementation of different methods in the device layer and the controller layer has been presented.

4. The Updated IoT Network

An IoT network with changes at the device level is presented in Figure 2. The updated IoT system implements the following in the device layers to enhance the fault tolerance of the network [11,42].
  • Implement a fault detection system in the device layer that detects possible power-related faults and then isolates the faulty devices.
  • Establishing a crossbar network between the cluster heads and the device clusters to provide alternative redundant communication paths.
  • Develop redundant networks using different topologies connecting base stations and cluster heads.
  • Connecting the base stations to the microcontrollers in peer-to-peer mode.
  • A method to compute fault tolerance considering linear and probability models.
  • Connecting several controllers to a single services server
  • Connecting a services server to a gateway en route to the internet connecting the cloud.
The devices in a cluster are linearized and connected to a cluster head free from sensing or actuating function. A crossbar network connects the linearized clusters’ outputs to the cluster heads. The cluster heads are connected to a base station in a parallel computing mode, and the base stations communicate with multiple microcontrollers in a peer–peer computing mode.
The microcontrollers are connected to the server of the service in many-to-one mode. The services server receives the requests from the devices or the users, executes the service-related code, and transmits the results back to controllers or the user.
The revised IoT network with changes made in the device layer is shown in the Figure 2.
For developing a fault tree of the sample IoT network, the crossbar network is replaced by a single device whose success rate is computed using probability models connected with the crossbar network [11]. The success rate of such a network is computed as 0.842. The fault tree of the residual network and a table showing the success rate computations are generated through the algorithms presented by Bhupathi et al. [11]. The fault tree generated for the updated network is shown in Figure 3.
From the sample network, the single base station is the real bottleneck and forms the most vulnerable areas of failure of the entire IoT network. Any fault accruing in this patch will disconnect the entire network, and the fault tolerance of such a network becomes zero. The need for implementation of redundancy of the base stations thus arises.

5. Revised IoT Network

The sample IoT network has been modified, as shown in Figure 4.
The following changes have been made in the controller layer.
  • A second base station, which is remotely situated due to spectrum reasons, has been added. The second base station is connected to cluster heads using a separate network established by relays/switches placed strategically because of the distant locations. Two layers of relays have been considered keeping in view the maximum connectivity distance to be 100 km.
  • An algorithm is implemented that finds the shortest distance from a source node to a sink node and ensures that the traffic is minimum in that path. The number of bytes to be transmitted over a path is considered as the decision to select the path.
  • Parallel communication is implemented to establish communication between the first base station and the cluster heads and between the base station.
  • A relay-driven network with built-in redundancy establishes communication between the second base station and cluster heads. Parallel communication affects the communication between the 2nd base station and the controller.
This paper discusses ways of improving the fault tolerance of the communication between the cluster heads, base stations and microcontrollers. This paper focuses on introducing topologies that connect the cluster heads to the base stations so that fail-free operations are carried out within the least possible response time, which is related to traffic/communication distance. Here, a path with minimum traffic/distance is chosen for communication.

6. The Network between the Cluster Heads and the 2nd Base Station

The second base station is situated very far from the cluster heads due to the requirement of avoiding spectrum collisions. A separate network with built-in redundancy is required to cater for the failures affecting communication between cluster heads and the base station. Figure 5 shows the network between the cluster heads and the second base station.
Nodes 1, 2, 3, 4 are cluster heads. Nodes 5, 6, 7 are first layer relays, and nodes 8 and 9 are the intelligent relays. Node 10 is the base station. Redundancy is maintained between the cluster heads and the first layer’s relays and between the first and second layers, as is the case with second layer relays and the base stations. Redundancy among the nodes is achieved by making available two paths from one node to the next superseding nodes. Each node is intelligent such that the node can run a path-finding algorithm.
The FTA equivalent of such a network can be developed using the linear cluster concept. No probability model can be developed as the network follows no specific structure. An algebraic path-finding algorithm is implemented in each node to select a path based on the distance and traffic on a specific path.

7. Pathfinding through the Algebraic Method

Step-1 Capture the network
The following algorithm finds all the paths between the source and sink nodes and then finds the path that requires transmitting minimum data per KM distance. The steps involved are described below:
The algebraic method primarily involves capturing the network in terms of precedence matric, which predominantly represents the network’s structure. For the network shown in Figure 5, the precedence relationships are shown in Table 1. The table shows the number of bytes of data to be transmitted from a node at a point in time, the transmission speeds used by each node, the amount of time it takes to transmit the data, the preceding node and the distance of the preceding node from the current node. The details of the preceding connected nodes are captured for every existing node in the network.
Step-2 Capture traffic at the nodes
Based on the number of bytes transmitted from the base nodes and the number of bytes received at the base station, estimate the number of bytes yet to be transmitted at each node in the network. Every node is a relay/intelligent communicating device; all relays are assumed to communicate at the same speed of 11 Mbps. The size of the data pending transmission is recorded and the data distribution is performed based on equal proportions considering the number of outgoing paths from a specific node. The distance between any pair of nodes is known and recorded. Table 1 shows that the node with no preceding nodes is a starting node, and the node not succeeding is the sink node or terminal node.
Step-3 Generate algebraic equations using the precedence table
Considering the precedence of the nodes, the following algebraic equations are generated.
Initial nodes = 1, 2, 3, 4
Sink Node = 10
1 5 + 6
2 5 + 6
3 6 + 7
4 6 + 7
5 8 + 9
6 8 + 9
7 8 + 9
8 10
9 10
Step-4 Generate algebraic equations using the precedence table
For each source, the node implements substitutions and generates network paths by including node-specific equations. For example, include Equations (5) and (6) in Equation (1) Include Equations (5) and (6) in (1) 1→ 5 (8 + 9) + 6 (8 + 9)
1 5 8 + 5 9 + 6 8 + 6 9
Include Equations (8) and (9) in Equation (10).
1 5 8 10 + 5 9 10 + 6 8 10 + 6 9 10
Step-5 Generate paths from the source nodes
The paths generated from each source node are shown in Table 2. One can see that 16 Paths have been generated.
Step-6 Path pruning
If any node in the network fails, say node 6, the path containing node 6 is ignored and marked as pruned. The pruned status of the paths due to the failure of node 6 is shown in Table 2. A total of 8 Paths now remain for communication.
Step-7 computes the distance and extent of data to be transmitted for each source node
For all the non-pruned paths, the total distance and the extent of data transmitted are computed as shown in Table 3. It is seen from Table 3 that amount of data to be transmitted is the same due to the principle of distributing the data equally among all outgoing paths. The size of the data to be transmitted per km distance is shown in the table based on which the path that should be selected is decided.
Step-8 Path Selection
The path to be selected is based on the source node, and the number of bytes to be transmitted per km is minimum. In the case of source node 1, path-1 (1 + 5 + 8 + 10) is selected for transmission as it has the lowest number of bytes to be transmitted. Similarly, suitable paths for other source nodes are selected.

8. Results

Developing fault tree for the revised IoT network.
The crossbar network between the controllers and services servers is replaced by a single device assigned with a success rate that is the same as the crossbar network’s success rate using its related probability model. The additional network added to the network is converted to an FT diagram using AND/OR conditions based on the precedence and data flow designed through building redundancy in the network. The modified FT diagram related to the revised IoT diagram is shown in Figure 6.
The FTA diagram is generated using the algorithm presented by Bhupathi et al. [11]. Similarly, the crossbar network between the devices and the cluster heads is replaced by a single device assigned with a success rate the same as the crossbar network’s success rate using its related probability model. These transformations convert the FTA diagram into a linear model.

Success Rate Computations

Bhupathi et al. [11] presented the use of an algorithm to generate the success table, given the FTA diagram as the input. The generated success table is presented in Table 4. The success rates of every device are computed using its precedence relationships with other devices. From the table, it can be observed that the success rate of the revised IoT network is 0.980.

9. Discussion

The algebraic algorithm built into every node in the additional network to connect the second base station to the cluster heads performed well compared to its nearest pathfinding algorithm (single source shortest path). A comparison of the algorithms is shown in Table 5.
Several pathfinding algorithms proposed in the literature have been surveyed and the same is compared with the algebraic pathfinding algorithm presented in this paper. The comparison considers the number of nodes, edges, shortest paths, path pairs and several elements. The comparison is carried out considering the network shown in the revised IoT diagram. From the table, it can be observed that algebraic methods require fewer operations for selecting a path for data transmission, given that a source node from the transmission is initiated.
The failure rate of a base station is negligible. The success rate is around 98.0%. The entire IoT network will malfunction when a base station fails. The probability of which is 0.98. To ensure a failure-free situation (100% success rate), adding a second base station is necessary, which requires a different type of networking topology because the distance between the cluster head and the second base station becomes a major issue.Adding one redundant base station is sufficient as it provides a 100% success rate. With the addition of more base stations, the cluster heads will become overloaded, which leads to a depletion of response time due to increased latency.
The success rate of the revised IoT network is 0.948 when compared with an IoT network that caters for changes in the device, the fault rate of which is fixed at 0.827. A comparative analysis of improvements in the fault tolerance in the IoT network achieved with changes made into different layers of the IoT network is shown in Table 6. With the changes made to the IoT network, the fault tolerance level of the IoT network is increased by 14.63%.
Alternative Justification
The fault tolerance capacity of both the sample network and the revised network are computed considering different failure conditions, including communication failure between a cluster head and the base station. The computations are shown in Table 7. The table shows that the revised network retains the FTA level even though some failures happen in the communication paths that connect the cluster heads to the base stations. The combined failure of the IoT network, considering the failures between cluster heads and the base stations and the failures between the base stations and the controllers, improved from 0.45 to 0.64, a 42% improvement.

10. Conclusions and Future Work

10.1. Conclusions

  • The fault-tolerance capability of an IoT network is critical, especially when mission-critical systems are built using IoT technologies.
  • The fault-tolerance capability of an IoT network can be enhanced by making suitable changes in each of the layers of the IoT. This paper focuses on enhancing the fault-tolerance capability considering the controller layer.
  • A single base station-based IoT is risky and unsuitable for implementing mission-critical systems.
  • The fault-tolerance capability of the IoT network improves when a redundant base station is added, and the same is connected via an intelligent-relay-based network. The success rate of the revised IoT network increased from 0.827 to 0.948, which is a 14.23% improvement.
  • Considering both parts of the network, the combined success rate, which includes the path from cluster heads to the base station and the path from the base station to the controller, improved from 0.45 to 0.64, a 42% improvement. The latency of communication using such a network is minimum.
  • The path-finding algorithm implemented in the intelligent relays requires fewer operations than any other algorithm presented in the literature.

10.2. Future Work

Further enhancement in the fault tolerance of the IoT network can be carried out at the controller level, services layer, and gateway layer by incorporating suitable changes considering the devices and the connectivity between devices in those layers.

Author Contributions

Conceptualization, J.K.R.S. and B.C.; Methodology, J.K.R.S. and B.C.; Software, R.R.B.; Validation, R.R.B.; Formal analysis, B.C.; Investigation, J.K.R.S. and B.C.; Writing—original draft, J.K.R.S.; Writing—review & editing, B.C.; Visualization, J.K.R.S.; Supervision, J.K.R.S.; Funding acquisition, R.R.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

The study did not require ethical approval.

Informed Consent Statement

The study did not involve humans.

Data Availability Statement

Not applicable.

Conflicts of Interest

There is no conflict of interest including any financial, personal, or other relationships with other people or organizations within three years of beginning the submitted work that could inappropriately influence, or be perceived to influence, our work.

References

  1. Ciccozzi, F. Model-Driven Engineering for Mission-Critical IoT Systems. IEEE Softw. 2017, 34, 46–53. [Google Scholar] [CrossRef]
  2. Mardiyah, N.; Setyawan, N.; Retno, B.; Has, Z. Active Fault Tolerance Control for Sensor Fault Problem in Wind Turbine Using SMO with LMI Approach. In Proceedings of the International Conference on Electrical Engineering, Computer Science, and Informatics (EECSI), Malang, Indonesia, 16–18 October 2018; pp. 336–340. [Google Scholar]
  3. Sowmya, K.V.; Sastry, J.K.R. Performance optimization within the device layer of IoT networks. J. Eng. Sci. Technol. 2021, 16, 5087–5109. [Google Scholar]
  4. Sowmya, K.V.; Sastry, J.K.R. Improving the Performance of Heterogeneous IoT Networks through Multi-Stage and Parallel Computing Systems. Iran. Sci. 2022. [Google Scholar] [CrossRef]
  5. Sowmya, K.V.; Sastry, J.K.R. Implementing load-balanced concurrent service layer to improve an IoT network’s response time. J. Eng. Sci. Technol. 2022, 17, 4487–4504. [Google Scholar]
  6. Sastry, J.K.R.; Ramya Sri, G.; Niharika, V.M.; Sowmya, K.V. Performance Optimization of IoT Networks Within the Gateway Layer. Recent Adv. Comput. Sci. Commun. 2020, 13, 1338–1346. [Google Scholar] [CrossRef]
  7. Sowmya, K.; Sastry, J.K.R. Enhancing Performance of IoT Networks through High-Performance Computing. Int. J. Adv. Trends Comput. Sci. Eng. 2019, 8, 432–442. [Google Scholar]
  8. Mohsin, A.; Naqvi, S.I.R.; Khan, A.U.; Naeem, T.; AsadUllah, M.A. A comprehensive framework to quantify fault tolerance metrics of web centric mobile applications. In Proceedings of the International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan, 19–21 April 2017. [Google Scholar]
  9. Dugan, J.B.; Bavuso, S.J. Dynamic Fault-Tree Models for Fault-Tolerant Computer Systems. IEEE Trans. Reliab. 1992, 41, 3–9. [Google Scholar] [CrossRef]
  10. Yazdi, M.; Nikfar, F.; Nasrabadi, M. Failure probability analysis by employing fuzzy fault tree analysis. Int. J. Syst. Assur. Eng. Manag. 2017, 8, 1177–1193. [Google Scholar] [CrossRef]
  11. Chokara, B.; Jammalamadaka, S.K.R. Hybrid models for computing fault tolerance of IoT networks. Telkomnika Telecommun. Comput. Electron. Control. 2023, 21, 333–345. [Google Scholar] [CrossRef]
  12. Rathore, S.S.; Kumar, S. An empirical study of some software fault prediction techniques for the number of faults prediction. Soft Comput. 2017, 21, 7417–7434. [Google Scholar] [CrossRef]
  13. Lin, J.; Chelliah, P.R.; Hsu, M.; Hou, J. Efficient Fault-Tolerant Routing in IoT Wireless Sensor Networks Based on Bipartite-Flow Graph Modeling. IEEE Access 2019, 7, 14022–14034. [Google Scholar] [CrossRef]
  14. Biabani, M.; Yazdani, N.; Fotouhi, H. REFIT: Robustness Enhancement Against Cascading Failure in IoT Networks. IEEE Access 2021, 9, 40768–40782. [Google Scholar] [CrossRef]
  15. Xing, L. Cascading Failures in Internet of Things: Review and Perspectives on Reliability and Resilience. IEEE Internet Things J. 2021, 8, 44–64. [Google Scholar] [CrossRef]
  16. Power Kotonya, G. BoboCEP: Distributed Complex Event Processing for Resilient Fault-Tolerance Support in IoT. In Proceedings of the IEEE Sixth International Conference on Big Data Computing Service and Applications (Bigdata Service), Oxford, UK, 3–6 August 2020; pp. 109–112. [Google Scholar]
  17. Malarski, K.M.; Ballal, K.D.; Ruepp, S. D2D-enabled Failure-tolerance in Cellular IoT. In Proceedings of the 12th International Conference on Network of the Future (NoF), Coimbra, Portugal, 6–8 October 2021; pp. 1–5. [Google Scholar]
  18. Safari, S.; Ansari, M.; Khdr, H.; Gohari-Nazari, P.; Yari-Karin, S.; Yeganeh-Khaksar, A.; Henkel, J. A Survey of Fault-Tolerance Techniques for Embedded Systems From the Perspective of Power, Energy, and Thermal Issues. IEEE Access 2022, 10, 12229–12251. [Google Scholar] [CrossRef]
  19. Norris, M.; Celik, B.; Venkatesh, P.; Zhao, S.; McDaniel, P.; Sivasubramaniam, A.; Tan, G. IoTRepair: Systematically Addressing Device Faults in Commodity IoT. In Proceedings of the IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI), Sydney, Australia, 21–24 April 2020; pp. 142–148. [Google Scholar]
  20. Power, G.K. Complex Patterns of Failure: Fault Tolerance via Complex Event Processing for IoT Systems. In Proceedings of the International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 14–17 July 2019; pp. 986–993. [Google Scholar]
  21. Zhao, X.; Lucani, D.E.; Shen, X.; Wang, H. Minimizing Bandwidth Use in IoT Storage with Random Device Failures. In Proceedings of the EuropeanWireless 2019, 25th EuropeanWireless Conference, Aarhus, Denmark, 2–4 May 2019; pp. 1–5. [Google Scholar]
  22. Sastry, J.K.R.; Bhupathi, S. Enhancing Fault Tolerance of IoT Networks within Device Layer. Int. J. Emerg. Trends Eng. Res. 2020, 8, 491–509. [Google Scholar]
  23. Geethika Reddy, A.; Upendra, Y.; Sastry, J.K.R.; Bhupathi, S. An Approach to Compute Fault Tolerance of an IoT Network Having Clustered Devices Using Cross Bar Networks. Int. J. Emerg. Trends Eng. Res. 2020, 8, 987–1004. [Google Scholar]
  24. Samanta, F.E.; Nguyen, T.G. Fault-Tolerant Mechanism for Edge-Based IoT Networks with Demand Uncertainty. IEEE Internet Things J. 2021, 8, 16963–16971. [Google Scholar] [CrossRef]
  25. Kumar, S.; Ranjan, P.; Singh, P.; Tripathy, M.R. Design and Implementation of Fault Tolerance Technique for Internet of Things (IoT). In Proceedings of the 12th International Conference on Computational Intelligence and Communication Networks (CICN), Bhimtal, India, 25–26 September 2020; pp. 154–159. [Google Scholar]
  26. Introducing 5G Technology and Networks (Speed, Use Cases and Rollout). Available online: https://www.thalesgroup.com/en/markets/digital-identity-and-security/mobile/inspired/5G (accessed on 20 December 2020).
  27. Isolani, P.H.; Kulenkamp, D.J.; Marquez-Barja, J.M.; Granville, L.Z.; Latr’e, S.; Syrotiuk, V.R. Support for 5g mission-critical applications in software-defined ieee 802.11 networks. Sensors 2021, 21, 693. [Google Scholar] [CrossRef] [PubMed]
  28. Skorin-Kapov, L.; Matijasevic, M. Analysis of QoS Requirements for e-Health Services and Mapping to Evolved Packet System QoS Classes. Int. J. Telemed. Appl. 2010, 2010, 1–18. [Google Scholar] [CrossRef]
  29. Min, C.; Yiming, M.; Hao, Y. Narrow Band Internet of Things. IEEE Access 2017, 5, 20557–20577. [Google Scholar]
  30. Nokia LTE Evolution for IoT Connectivity White Paper. Available online: https://onestore.nokia.com/asset/200178 (accessed on 21 February 2020).
  31. Schwarz, R. Narrowband Internet of Things Whitepaper. Available online: https://cdn.rohde-schwarz.com/pws/dl_downloads/dl_application/application_notes/1ma266/1MA266_0e_NB_IoT.pdf (accessed on 21 February 2020).
  32. Liberg, O.; Sundberg, M.; Wan, E.; Bergman, J.; Sachs, J. Cellular Internet of Things: Technologies, Standards, and Performance; Academic Press: Boston, MA, USA, 2018. [Google Scholar]
  33. Pedhadiya, M.K.; Jha, R.K.; Bhatt, H.G. Device to device communication: A survey. J. Netw. Comput. Appl. 2019, 129, 71–89. [Google Scholar] [CrossRef]
  34. Li, Y.; Liang, Y.; Liu, Q.; Wang, H. Resources Allocation in Multicell D2D Communications for Internet of Things. IEEE Internet Things J. 2019, 5, 4100–4108. [Google Scholar] [CrossRef]
  35. Li, M.; Tsai, H. Design and Evaluation of a Hybrid D2D Discovery Mechanism in 5G Cellular Networks. In Proceedings of the Tenth International Conference on Ubiquitous and Future Networks (ICUFN), Prague, Czech Republic, 3–6 July 2018; pp. 641–643. [Google Scholar]
  36. Koziol, D.; Moya, F.S.; Phan, L.Y.V.V.; Xu, S. QoS and service continuity in 3GPP D2D for IoT and wearables. IEEE Conf. Stand. Commun. Netw. 2017, 2017, 8088627. [Google Scholar]
  37. 3GPP. Study on Further Enhancements to LTE Device to Device (D2D), User Equipment (UE) to Network Relays for Internet of Things (IoT) and Wearables; Technical Report (TR) 36.746; 3rd Generation Partnership Project (3GPP), 04; 3GPP: Tokyo, Japan, 2018; Version 15.1.1. [Google Scholar]
  38. 3GPP. Study on NR Sidelink Relay 3GPP Draft (RP) 192118; 3rd Generation Partnership Project (3GPP), 12; 3GPP: Tokyo, Japan, 2019; TSG RAN Meeting No. 86. [Google Scholar]
  39. Hunukumbure, M.; Moulsley, T.; Oyawoye, A.; Vadgama, S.; Wilson, M. D2D for energy efficient communications in disaster and emergency situations. In Proceedings of the 21st International Conference on Software, Telecommunications and Computer Networks, Softcomputing, Split, Croatia, 18–20 September 2013; p. 6671863. [Google Scholar]
  40. Lianghai, J.; Han, B.; Liu, M.; Schotten, H.D. Applying device-to-device communication to enhance IoT services. IEEE Commun. Stand. Mag. 2017, 1, 7992937. [Google Scholar] [CrossRef]
  41. Al-Salihi, N.K. Improvement of the Fault Tolerance in IoT Based Positioning Systems by Applying for Redundancy in the Controller Layer. Baghdad Sci. J. 2021, 18, 1303. [Google Scholar]
  42. Bhupati, C.; Sastry, J.K.R. Improving the fault tolerance of an IoT Network through power detection and Isolation. JIFS 2023, in press.
  43. Foead, D.; Ghifari, A.; Budi Kusuma, M.; Hanafiah, N.; Gunawan, E. A Systematic Literature Review of A* Pathfinding. Procedia Comput. Sci. 2021, 179, 507–514. [Google Scholar] [CrossRef]
  44. Xia, F.; Liu, J.; Nie, H.; Fu, Y.; Wan, L.; Kong, X. Random Walks: A Review of Algorithms and Applications. IEEE Trans. Emerg. Top. Comput. Intell. 2020, 4, 95–107. [Google Scholar] [CrossRef]
  45. Niranjane, P.B.; Amdanin, S.Y. Comparison of Variants of Yen’s Algorithm for Finding K-Simple Shortest Paths. In Proceedings of the 2nd International Conference on Intelligent Technologies (CONIT), Karnataka, India, 24–26 June 2022. [Google Scholar]
  46. Niemeyer, K.E.; Sung, C.-J. On the importance of graph search algorithms for DRGEP-based mechanism reduction methods. Combust. Flame 2011, 158, 1439–1443. [Google Scholar] [CrossRef]
  47. Mohanta, K.; Poddar, B.P. Comprehensive Study on Computational Methods for K-Shortest Paths Problem. Int. J. Comput. Appl. 2012, 40, 975–8887. [Google Scholar] [CrossRef]
  48. Brodnik, A.; Grgurovič, M. Solving all-pairs shortest path by single-source computations: Theory and practice. Discret. Appl. Math. 2017, 231, 119–130. [Google Scholar] [CrossRef]
  49. Alshammari, M.; Rezgui, A. A single-source shortest path algorithm for dynamic graphs. AKCE Int. J. Graphs Comb. 2020, 17, 1063–1068. [Google Scholar] [CrossRef]
Figure 1. Overall method for improving the fault tolerance of the IoT network.
Figure 1. Overall method for improving the fault tolerance of the IoT network.
Sensors 23 04032 g001
Figure 2. Sample IoT network with a single base station.
Figure 2. Sample IoT network with a single base station.
Sensors 23 04032 g002
Figure 3. Fault tolerance diagram for the sample IoT network.
Figure 3. Fault tolerance diagram for the sample IoT network.
Sensors 23 04032 g003
Figure 4. Revised IoT diagram with redundancy created at the base station and controller levels.
Figure 4. Revised IoT diagram with redundancy created at the base station and controller levels.
Sensors 23 04032 g004
Figure 5. Networking Topology connecting cluster heads and redundant base station.
Figure 5. Networking Topology connecting cluster heads and redundant base station.
Sensors 23 04032 g005
Figure 6. FTA model for revised IoT network.
Figure 6. FTA model for revised IoT network.
Sensors 23 04032 g006
Table 1. Precedence Matrix for the Example Network Diagram.
Table 1. Precedence Matrix for the Example Network Diagram.
NodeType of NodeNumber of Bytes to Be TransmittedTransmission Speed on MbpsLatency in msPreceding NodeDistance in km
1Cluster Head-13,000,000110.27300
2Cluster Head-23,000,000110.27300
3Cluster Head-33,000,000110.27300
4Cluster Head-43,000,000110.27300
5SWITCH-51,500,000110.13613
5SWITCH-51,500,000110.13622
6SWITCH-61,500,000110.13631
6SWITCH-61,500,000110.13622
6SWITCH-61,500,000110.13632
6SWITCH-61,500,000110.13641
7SWITCH-71,500,000110.13634
7SWITCH-71,500,000110.13641
8SWITCH-8750,000110.06852
8SWITCH-8750,000110.06861
8SWITCH-8750,000110.06871
9SWITCH-9750,000110.06854
9SWITCH-9750,000110.06863
9SWITCH-9750,000110.06872
10SWITCH-102,250,000110.20583
10SWITCH-102,250,000110.20592
Table 2. Enumerated paths commencing from all source nodes.
Table 2. Enumerated paths commencing from all source nodes.
Source Node and EquationPath NumberPathPruned Status Due to Failure of Node 6
1Path-11 + 5 + 8 + 10 
1Path-21 + 5 + 9 + 10 
1Path-31 + 6 + 8 + 10Pruned
1Path-41 + 6 + 9 + 10Pruned
2Path-52 + 5 + 8 + 10 
2Path-62 + 5 + 9 + 10 
2Path-72 + 6 + 8 + 10Pruned
2Path-82 + 6 + 9 + 10Pruned
3Path-93 + 6 + 8 + 10Pruned
3Path-103 + 6 + 9 + 10Pruned
3Path-113 + 7 + 8 + 10 
3Path-123 + 7 + 9 + 10 
4Path-134 + 6 + 8 + 10Pruned
4Path-144 + 6 + 9 + 10Pruned
4Path-154 + 7 + 8 + 10 
4Path-164 + 7 + 9 + 10
Table 3. Distance and traffic computations of pruned paths.
Table 3. Distance and traffic computations of pruned paths.
PathDistance in kmThe Extent of Data to Be Transmitted in BytesThe Extent of Data in Bytes to Be Transmitted/km
Path-1 = 1 + 5 + 8 + 102 + 2 + 3 = 71,500,000 + 750,000 + 2,250,000 = 4,500,000642,857
Path-2 = 1 + 5 + 9 + 102 + 4 + 2 = 8500,000 + 750,000 + 2,250,000 = 4,500,000562,500
Path-5 = 2 + 5 + 8 + 102 + 2 + 3 = 7500,000 + 750,000 + 2,250,000 = 4,500,000642,857
Path-6 = 2 + 5 + 9 + 102 + 4 + 2 = 8500,000 + 750,000 + 2,250,000 = 4,500,000562,500
Path-11 = 3 + 7 + 8 + 104 + 1 + 3 = 8500,000 + 750,000 + 2,250,000 = 4,500,000562,500
Path-12 = 3 + 7 + 9 + 104 + 1 + 2 = 7500,000 + 750,000 + 2,250,000 = 4,500,000642,857
Path-15 = 4 + 7 + 8 + 101 + 1 + 5 = 7500,000 + 750,000 + 2,250,000 = 4,500,000642,857
Path-16 = 4 + 7 + 9 + 101 + 1 + 2 = 4500,000 + 750,000 + 2,250,000 = 4,500,000112,500
Table 4. Success rate computations of the revised IoT network.
Table 4. Success rate computations of the revised IoT network.
Sl. NoDeviceSuccess
Rate
Gates Used
For Connection
Preceding DevicesCombined
Success
Rate
Device
Name D1
Device
Name D2
Device
Name D3
Device
Name D4
Success
Rate S1
Success
Rate S2
Success
Rate S3
Success
Rate S4
1Cluster Head10.950     0.950
2Cluster Head20.950     0.950
3Cluster Head30.950     0.950
4Cluster Head40.950     0.950
5D10.950ORCluster Head1
0.950
   0.950
6D20.950ORCluster Head2
0.950
   0.950
7D30.950ORCluster Head3
0.950
   0.950
8D40.950ORCluster Head4
0.950
   0.950
9Device Level
CrossBar NW
0.987ORD1
0.950
   0.987
10Device Level
CrossBar NW
LevelORD2
0.950
   0.987
11Device Level
CrossBar NW
0.987ORD3
0.950
   0.987
12Device Level
CrossBar NW
0.987ORD4
0.950
   0.987
13D50.950ORDLCB
0.987
   0.987
14D60.950ORDLCB
0.987
   0.987
15D70.950ORDLCB
0.987
   0.987
16D80.950ORDLCB
0.987
   0.987
17BS10.950ORD5
0.987
D6
0.987
D7
0.987
D8
0.987
0.987
18RL10.950ORCH1
0.950
CH2
0.950
  0.950
19RL20.950ORCH2
0.950
CH3
0.950
  0.950
20RL30.950ORCH3
0.950
CH4
0.950
  0.950
21RL40.950ORRL1
0.950
RL2
0.950
  0.950
22RL50.950ORRL1
0.950
RL2
0.950
  0.950
23BS20.950ORRL4
0.950
RL5
0.950
  0.950
24Controller10.979ORBS1
0.987
BS2
0.950
  0.987
25Controller20.979ORBS1
0.987
BS2
0.950
  0.987
26Controller30.979ORBS1
0.987
BS2
0.950
  0.987
27SERVER0.980ORController1
0.987
Controller2
0.987
Controller3
0.987
 0.987
28GATEWAY0.980ANDSERVER
0.987
   0.967
29INTERNET0.980ANDGATEWAY
0.967
   0.948
Table 5. Complexity analysis of different methods used for path generation.
Table 5. Complexity analysis of different methods used for path generation.
Serial NumberType of MethodComplexityNumber of Operations
1A* [43](ne/2) 2 6400
2Graph Search Algorithms [46](ne) 2 128,000
3Yen shortest paths citeref-journal45kn + m × log m170
4All Pair’s shortest paths [48]m × n + m × log ⁡n110
5Random walk [44]n × e160
6Single Source shortest path [49]f + f × log(f)62
7Algebraic methodn × Max(e) form a Node20
where k = number of shortest paths = 16; n = number of nodes = 10; m = number of path pairs = 10; e = number of edges = 16; f = number of elements = 5.
Table 6. Comparative analysis of enhancements for fault tolerance in different layers of the IoT network.
Table 6. Comparative analysis of enhancements for fault tolerance in different layers of the IoT network.
Serial NumberType of MethodFault Tree Value
1Prototype network [11]0.780
2Prototype with Changes Made in the device Levels—Proposed method [42]0.827
3Prototype with Changes Made in the device Level and controller Layer0.948
Table 7. Analysis of Failure conditions Vs. Fault tolerance level of the network.
Table 7. Analysis of Failure conditions Vs. Fault tolerance level of the network.
ParameterSample IoT NetworkRevised Network
Number of controllers33
Number of base stations12
Number of paths connecting the controllers and the base stations36
Number of paths connecting the cluster heads and base stations416
Fault tolerance in the event of failure of connectivity of a controller with a base station0.670.670
Fault tolerance in the event of failure of connectivity of a cluster head to a base station0.670.948
Fault tolerance considering independent failures in the controller layer0.450.640
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sastry, J.K.R.; Ch, B.; Budaraju, R.R. Implementing Dual Base Stations within an IoT Network for Sustaining the Fault Tolerance of an IoT Network through an Efficient Path Finding Algorithm. Sensors 2023, 23, 4032. https://doi.org/10.3390/s23084032

AMA Style

Sastry JKR, Ch B, Budaraju RR. Implementing Dual Base Stations within an IoT Network for Sustaining the Fault Tolerance of an IoT Network through an Efficient Path Finding Algorithm. Sensors. 2023; 23(8):4032. https://doi.org/10.3390/s23084032

Chicago/Turabian Style

Sastry, J. K. R., Bhupati Ch, and Raja Rao Budaraju. 2023. "Implementing Dual Base Stations within an IoT Network for Sustaining the Fault Tolerance of an IoT Network through an Efficient Path Finding Algorithm" Sensors 23, no. 8: 4032. https://doi.org/10.3390/s23084032

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop