You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

25 July 2017

A Novel Dual Separate Paths (DSP) Algorithm Providing Fault-Tolerant Communication for Wireless Sensor Networks

,
,
and
1
Department of Information and Communications Engineering, Myongji University, 116 Myongji-ro, Yongin-si, Gyeonggi-do 17058, Korea
2
Department of Electronic Engineering, Myongji University, 116 Myongji-ro, Yongin-si, Gyeonggi-do 17058, Korea
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Models, Systems and Applications for Sensors in Cyber Physical Systems

Abstract

Fault tolerance has long been a major concern for sensor communications in fault-tolerant cyber physical systems (CPSs). Network failure problems often occur in wireless sensor networks (WSNs) due to various factors such as the insufficient power of sensor nodes, the dislocation of sensor nodes, the unstable state of wireless links, and unpredictable environmental interference. Fault tolerance is thus one of the key requirements for data communications in WSN applications. This paper proposes a novel path redundancy-based algorithm, called dual separate paths (DSP), that provides fault-tolerant communication with the improvement of the network traffic performance for WSN applications, such as fault-tolerant CPSs. The proposed DSP algorithm establishes two separate paths between a source and a destination in a network based on the network topology information. These paths are node-disjoint paths and have optimal path distances. Unicast frames are delivered from the source to the destination in the network through the dual paths, providing fault-tolerant communication and reducing redundant unicast traffic for the network. The DSP algorithm can be applied to wired and wireless networks, such as WSNs, to provide seamless fault-tolerant communication for mission-critical and life-critical applications such as fault-tolerant CPSs. The analyzed and simulated results show that the DSP-based approach not only provides fault-tolerant communication, but also improves network traffic performance. For the case study in this paper, when the DSP algorithm was applied to high-availability seamless redundancy (HSR) networks, the proposed DSP-based approach reduced the network traffic by 80% to 88% compared with the standard HSR protocol, thus improving network traffic performance.

1. Introduction

A wireless sensor network (WSN) consists of a large number of wireless nodes connected to sensors. These sensors monitor and sense changes in environmental or physical conditions, then transmit this data to a sink node. Wireless nodes in WSNs are constrained by their limited power, computational capabilities, storage, and link bandwidth. WSNs often experience link failures due to the insufficient power of wireless nodes, the unstable state of wireless links, and unpredictable environmental interference. If any link failure occurs, a lack of fault-tolerant mechanisms may lead to the interruption of communications between the source and destination nodes [1,2]. A cyber physical system (CPS) consists of a collection of computing devices which communicate with each other and interact with the physical world via sensors [3]. CPS is a rapidly emerging field which is expected to affect all aspects of life in the near future [4]; the applications of CPS include automotive systems, smart space, healthcare, military systems, emergency real-time systems, environmental monitoring and control, smart transportation, traffic control and safety, power generation and distribution, aircraft, instrumentation, water management systems, trains, physical security, asset management, and distributed robotics [5,6]. WSN technology is used in the development of CPSs for real-time decision-making systems in the aforementioned applications [6]. CPS is increasingly used in life-critical applications, where the probability of failure must be kept below very low levels. Seamless fault-tolerant communication is therefore one of the key requirements for life-critical and mission-critical applications, and fault-tolerance has long been one of the major concerns for communications for sensors in CPS [7].
Fault-tolerance in a WSN ensures that the WSN is available for use without any interruption when any link or node failure occurs in the network. Therefore, fault-tolerance improves the availability, reliability, and dependability of the WSN [8]. Several techniques have been proposed to provide fault-tolerance in WSNs; these techniques can be classified into three categories, including redundancy-based techniques, clustering-based techniques, and deployment-based techniques [9]. Redundancy-based techniques provide fault-tolerance based on redundancy mechanisms such as path redundancy, node redundancy, and time redundancy. Clustering-based techniques use clustering mechanisms to provide fault-tolerance for WSNs. Clustering mechanisms divide a WSN into several disjointed or overlapping clusters. Each cluster elects one node as a representative of the cluster, called a cluster head. Clustering is an effective way to reduce energy consumption in WSNs. Finally, deployment-based techniques focus on the deployment of sensor nodes in WSNs to lead to effective design goals. There are several ways to deploy sensor nodes (SNs) in WSNs, including the pre-deployment of sensor nodes, the deployment of sensor nodes during use, and the post-deployment of nodes [8]. Several fault-tolerant techniques are described in Section 2.
In this paper, we propose a novel path redundancy-based algorithm, called the dual separate paths (DSP) algorithm, for providing fault-tolerant communication and improving network traffic performance in WSNs, as well as in other networks. The main idea of DSP is to find dual paths between a source node and a destination node in a network. The dual paths are node-disjoint paths with an optimal path distance. The dual paths are used to forward unicast frames from the source to the destination, resulting in seamless communication over the network. The proposed DSP algorithm can be applied to wired and wireless networks, such as high-availability seamless redundancy (HSR) networks and WSNs, to provide fault-tolerant communication with improved network traffic performance for applications that require high availability, such as fault-tolerant CPSs and substation automation systems. We perform a case study to analyze and evaluate the performance of the DSP-based approach, which applies the DSP algorithm to HSR networks. The motivation of this case study is to demonstrate that the DSP-based approach not only provides fault-tolerant communication, but also improves the network traffic performance for wired and wireless networks. In the case study, the DSP-based approach establishes dual paths between source and destination QuadBox pairs in an HSR network. The DSP-based approach then uses the dual paths to forward unicast frames from the source to the destination, instead of doubling and flooding the frames over the whole network, as is done using the standard HSR protocol. Therefore, the DSP approach not only provides seamless redundancy, but also significantly reduces redundant unicast traffic in HSR networks, thus improving the network performance.
The remainder of this paper is organized as follows. We describe related works in Section 2. In Section 3, we describe the DSP algorithm in more detail. Then, in Section 4, we introduce the case study, in which the DSP algorithm is applied to HSR networks to provide fault-tolerant communication as well as reducing redundant unicast traffic in the networks. We analyze and evaluate the performance of the proposed DSP-based approach in Section 5, while in Section 6, we describe several simulations and their results to evaluate and validate the performance analysis. Finally, we conclude the paper in Section 7.

3. DSP Algorithm

3.1. Definitions

Definition 1 (Link weight).
The weight of a link in a network is a non-negative number assigned to the link to determine how good the link is.
The link weight can be calculated based on metrics such as the hop count, bandwidth, delay, load, throughput, bit error rate (BER), reliability, and maximum transmission unit (MTU). The weight of the link between two nodes n i and n j is denoted by w e i g h t   ( n i , n j ) .
Definition 2 (Link table).
The link table of a network is a table that contains the weights of all links in the network.
Definition 3 (Adjacent node).
One node is an adjacent node of another node if it is directly connected to the node.
Definition 4 (Path distance).
The distance of a path is the sum of the weights of its links. The shorter the distance, the better the path.
The distance of path p = { n 0 , n 1 , , n k } is determined as follows:
p . d i s t a n c e = i = 1 k w e i g h t ( n i 1 , n i ) .
where p . d i s t a n c e is the distance of path p , n i is the ith node in the path, and w e i g h t   ( n i 1 , n i ) is the weight of the link between two nodes n i 1 and n i 1 .
Definition 5 (Dual separate paths).
Two paths between a source and a destination are called dual separate paths if they are node-disjoint paths.

3.2. DSP Description

The main purpose of the proposed DSP algorithm is to provide fault-tolerant communication for wired and wireless networks by sending unicast frames from a source to a destination through redundant paths. Unlike other path redundancy-based techniques that discover redundant paths by exchanging control messages, the DSP algorithm finds paths based on the network topology information; namely, the link table. The paths are node-disjoint paths, thus providing seamless communication with zero switchover delay in the case of network failures. In addition, the proposed algorithm establishes two paths, called dual paths, between the source and the destination, instead of all possible paths; this results in the improvement of network traffic performance.
The DSP algorithm finds the dual separate paths between the source node and destination node in a network. The dual paths are chosen based on the following criteria:
  • Optimal paths: The dual paths have the best distance possible between the source and destination nodes.
  • Separate paths: The dual paths are node-disjoint paths.
The DSP algorithm works on any network topology that does not contain any single point of failure, particularly mesh and ring topologies.
The DSP algorithm consists of the following three phases:
  • Phase 1: Finding all possible paths between the source and destination nodes.
  • Phase 2: Sorting the possible paths in ascending order of path distance.
  • Phase 3: Selecting dual separate paths based on the sorted path list.

3.2.1. Phase 1: Finding All Possible Paths

In this phase, the DSP algorithm searches all possible paths between the source and destination nodes in the network based on the network link table. A new search algorithm 1, called the Search Path algorithm, was developed to perform the searching task. The searched paths associated with their path distance are then added to a path list.
The pseudocode of the Algorithm 1 is as follows:
Algorithm 1
s = s o u r c e _ n o d e
d = d e s t i n a t i o n _ n o d e
Q = { a l l _ n o d e s }
P a t h _ L i s t = { }
p a t h = { s }
p a t h . d i s t a n c e = 0
S e a r c h _ P a t h ( s , d , Q , p a t h , p a t h . d i s t a n c e )
{
  if ( s = = d )
P a t h _ L i s t = P a t h _ L i s t { p a t h }
  else
     foreach adjacent node v of s
     {
Q * = Q { s }
p a t h * = p a t h { v }
p a t h * . d i s t a n c e = p a t h . d i s t a n c e + w e i g h t   ( s , v )
S e a r c h _ P a t h ( v , d , Q * , p a t h * , p a t h * . d i s t a n c e )
     }
}

3.2.2. Phase 2: Sorting the Searched Paths

In the sorting phase, the path list found in the searching phase is sorted using the existing, well-known Quicksort algorithm [22].

3.2.3. Phase 3: Selecting Dual Separate Paths

In this final phase, based on the sorted path list, the DSP algorithm uses a new algorithm 2, called the Select DP algorithm, to select two separated paths that are node-disjoint paths and have the best path distances.
The pseudocode of the Algorithm 2 is as follows:
Algorithm 2
S e l e c t _ D P ( P a t h _ L i s t )
  {
    for i = 1 to P a t h _ L i s t . L e n g t h 1
    {
P a t h 1 = P a t h _ L i s t [ i ]
     for j = i + 1 to P a t h _ L i s t . L e n g t h
     {
P a t h 2 = P a t h _ L i s t [ j ]
       if ( C o m m o n N o d e ( P a t h 1 , P a t h 2 ) = = 0 )
         return P a t h 1 , P a t h 2
     }
    }
  }

3.3. DSP Operations

To describe the operations of the DSP algorithm, a sample network with seven nodes and link weights is considered, as shown in Figure 1. In this case, the DSP algorithm is applied to the network in order to establish two separate paths between source node 1 and destination node 5.
Figure 1. A sample network with seven nodes.
First, the DSP applies the Search Path algorithm to find all possible paths from node 1 to node 5. There were 21 possible paths between nodes 1 and 5 found by the Search Path algorithm. The possible path list is then sorted using Quicksort. The searched paths and sorted paths are shown in Table 1. Based on the sorted path list, the DSP selects two separate paths that have the best path distances, and that have no common nodes, by applying the Select DP algorithm to the sorted path list. The selected dual paths are shown in Table 2.
Table 1. Lists of all possible paths and sorted paths from source 1 to destination 5.
Table 2. The selected dual paths from source 1 to destination 5.
The dual paths between source 1 and destination 5 found by DSP are shown in Figure 2.
Figure 2. The dual separate paths (DSPs) from source 1 to destination 5.
When source node 1 sends unicast frames to destination node 5, the frames are forwarded to the destination through the pre-established dual paths. In the failure-free case, the destination receives two identical copies of each sent frame, processes the first copy, and discards the duplicate. When the link between node 4 and node 5 fails, only one copy of each frame delivered through path 2 is lost; the other copy still reaches the destination node without switchover delay, as shown in Figure 3. Therefore, the DSP provides fault-tolerant communication in the case of network failure.
Figure 3. Fault-tolerant communication in the failure case.
Once the source node detects the failure, it updates its link table and re-runs the DSP algorithm to find the second path to the destination, as shown in Figure 4.
Figure 4. Path recovery in the failure case.

4. Case Study

HSR [23,24,25] is an Ethernet redundancy protocol that provides fault-tolerant communication for HSR networks, based on the principle of sending duplicate frames over all available paths. The HSR protocol is usually used in ring topologies, including single rings and connected rings. An HSR single-ring network consists of only HSR terminal nodes, including a doubly-attached node for HSR (DANH) and redundancy box (RedBox) nodes, whereas quadruple port devices (QuadBoxes) are used to connect rings in an HSR connected-ring network. The standard HSR protocol works very well in single-ring networks; however, the HSR generates excessively redundant unicast traffic in connected-ring networks. This drawback causes the degradation of network performance.
This section describes the DSP-based approach, which applies the DSP algorithm to HSR networks for providing fault-tolerant communication and significantly reducing the redundant unicast traffic in the HSR networks. The motivation of the case study is to demonstrate that the DSP-based approach not only provides fault-tolerant communication but also improves network traffic performance for wired and wireless networks.

4.1. Concepts

The primary aim of the proposed approach is to find dual separate paths between each QuadBox to all other QuadBoxes in an HSR network. A QuadBox is used to connect rings in an HSR network. To prevent a single point of failure in HSR networks, a pair of two QuadBoxes are used to connect rings [23].
There are three types of QuadBoxes defined in this paper: access QuadBox, trunk QuadBox, and QuadBox pair. Each access QuadBox connects to at least one DANH ring, whereas trunk QuadBoxes do not connect to any DANH ring. A QuadBox pair consists of two access QuadBoxes that are used as a pair to connect to the same DANH ring.
Figure 5 shows a sample HSR connected-ring network with eight DANH rings, where each ring connects to one QuadBox pair.
Figure 5. A sample high-availability seamless redundancy (HSR) connected-ring network.

4.2. Operations

The proposed DSP-based approach first learns medium access control (MAC) addresses, then builds a link table for each QuadBox pair, and finally finds and establishes dual paths between QuadBox pairs by applying the DSP algorithm to the link table.

4.2.1. Learning MAC Addresses

Both access QuadBoxes and trunk QuadBoxes learn MAC addresses. Access QuadBoxes learn the MAC addresses of nodes connected to its DANH ring, whereas trunk QuadBoxes learn the MAC addresses of all nodes in the network.

Access QuadBox

Periodically, each HSR terminal node, such as a DANH node or a RedBox node, sends an HSR_Supervision frame over both its ports. Upon receiving the supervision frames, each access QuadBox learns and builds its MAC table, which contains the MAC addresses of all terminal nodes that belong to its DANH ring. An access QuadBox forwards a received unicast frame to its DANH ring if, and only if, its MAC table contains the MAC address of the destination node.

Trunk QuadBox

The process of learning MAC addresses for trunk QuadBoxes is similar to that of Ethernet switches. Trunk QuadBoxes learn the MAC addresses of all terminal nodes in the network. By learning the MAC addresses, each trunk QuadBox builds its MAC table, which contains the MAC addresses of all terminal nodes associated with the node IDs of QuadBox pairs to which the terminal nodes connect. Based on the MAC table, a trunk QuadBox can determine the source and destination QuadBox pairs of a received unicast frame. When a trunk QuadBox receives a unicast frame, it maps the frame’s source and destination addresses into source and destination QuadBox pairs, respectively, by looking up the MAC table. It then forwards the frame based on the source and destination QuadBox pairs by looking up the forwarding table.

4.2.2. Building the Link Table

Periodically, each QuadBox sends a “Hello message that contains its identity (ID), called its node ID, over all its ports. Two access QuadBoxes of the same QuadBox pair have the same node ID, which is the node ID of the QuadBox pairs. Based on the “Hello” messages received from neighboring QuadBoxes, each QuadBox then builds its neighbor list. Two access QuadBoxes of the same QuadBox pair share the same neighbor list.
The DSP algorithm finds dual paths based on the network link-state information, called the link table. To build the link table, each QuadBox broadcasts a link (LINK) message that contains its neighbor list. Based on LINK messages received from trunk QuadBoxes and other QuadBox pairs, each QuadBox pair builds its link table. All QuadBoxes in an HSR network have the same link table for the network.

4.2.3. Finding Dual Paths

Each QuadBox pair finds separated dual paths to all other QuadBox pairs. To find the dual paths between the QuadBox pair and the other QuadBox pairs, the QuadBox pair applies the DSP algorithm to the network link table. The operations of the DSP algorithm are described in Section 2.

4.2.4. Establishing Dual Paths

After finding the dual paths between two QuadBox pairs, the QuadBox pair with a lower node ID sends a path setup (PSET) message through each path of the dual path to the corresponding QuadBox pair. The PSET message contains the node ID of the source QuadBox pair, the node ID of the destination QuadBox pair, and the dual paths. The corresponding QuadBox pair then replies by sending a path acknowledgement (PACK) message once it receives the PSET message. The PACK message also contains the node ID of the source QuadBox pair, the node ID of the destination QuadBox pair, and the dual paths.
Upon receiving the PSET and PACK messages, trunk QuadBoxes update their forwarding table. Each entry in the table consists of the source QuadBox pair ID, the destination QuadBox pair ID, and the corresponding output port.

4.3. Forwarding Principle

Figure 6 shows the process of sending a unicast frame from source node 1 in ring 1 to destination node 10 in ring 3 using the DSP-based approach. QuadBox pairs 1 and 3 are connected to rings 1 and 3, respectively.
Figure 6. The process of forwarding a unicast frame using the DSP-based approach.
In this case, the DSP algorithm established dual paths between QuadBox pairs 1 and 3. These dual paths are used to forward unicast frames from source node 1 to destination node 10, instead of duplicating and flooding the frames to the whole network as is done using the standard HSR protocol.

4.4. Monitoring and Fault Recovery

“Hello” messages are periodically sent on network links to monitor the states of the links. If a link has failed, the QuadBox that find the failure broadcasts a link failure (LFLR) message to inform all other QuadBoxes of the failure. The QuadBoxes then update their link table and recalculate dual paths for connection pairs that include the failed link. Each QuadBox also broadcasts a LINK message every 30 min even if no topology changes occur to synchronize and update the link table.

5. Performance Analysis

This section describes the performance analysis of the DSP-based approach compared with that of the standard HSR protocol. We evaluated a sample HSR network as shown in Figure 5. In this paper, the network traffic is used to analyze and evaluate the traffic performance. When unicast frames are sent from a source to a destination in a network, the network traffic is the total number of the frames’ copies that are delivered and received in the network.

5.1. Standard HSR Protocol

Figure 7 shows the process of sending a unicast frame under the standard HSR protocol. When a source node sends a unicast frame to a destination node, the standard HSR protocol floods and duplicates the frame in all rings except for the destination ring.
Figure 7. Network traffic under the standard HSR protocol.
The network traffic when a source node sends a unicast frame to a destination node under the standard HSR protocol, denoted by n t h s r 1 , is determined by:
n t h s r 1 = n l i n k D   +   i D R D 2 n l i n k i   +   i Q R 2 n l i n k i ,
where n l i n k D is the number of links in the destination ring, n l i n k i is the number of links in the ith ring, D R D is a set of all DANH rings except the destination ring, and QR is a set of all QuadBox rings.
i D R D 2 n l i n k i = i D R 2 n l i n k i     2 n l i n k D ,
where D R is a set of all DANH rings.
i D R 2 n l i n k i   +   i Q R 2 n l i n k i = 2 n l i n k ,
where n l i n k is the total number of links in the network.
Therefore, n t H S R 1 can be re-calculated as follows:
n t h s r 1 = 2 n l i n k     n l i n k D .
Generally, the network traffic when a source node sends N unicast frames to a destination node under the standard HSR protocol, denoted by n t h s r , can be calculated by:
n t h s r = N ( 2 n l i n k     n l i n k D ) .
For the sample network in Figure 5, n t h s r = 138 N   ( f r a m e s ) .

5.2. DSP-Based Approach

Figure 8 shows the process of sending a unicast frame from the source node to the destination node under the DSP-based approach. Unlike the standard HSR protocol, which duplicates and floods the frame to the whole network, the DSP-based approach forwards the frame through two pre-established paths between the source and the destination.
Figure 8. Network traffic under the DSP-based approach.
The network traffic when a source node sends a unicast frame to a destination node under the DSP-based approach, denoted by n t d s p 1 , is calculated by:
n t d s p 1 = n l i n k p 1   +   n l i n k p 2 ,
where n l i n k p 1 and n l i n k p 2 are the number of links in these two paths.
Generally, when a source node sends N unicast frames to a destination node under the DSP-based approach, the network traffic, denoted by n t d s p , is determined as follows:
n t d s p = N ( n l i n k p 1   +   n l i n k p 2 ) .
For the sample network in Figure 5, n t d s p = 22 N   ( f r a m e s ) .

6. Simulations and Discussion

6.1. Simulations

Several simulations were conducted using the OMNeT++ simulator [26] to validate the analyzed performance and to evaluate the traffic performance of the DSP.
We conducted two simulations to evaluate and validate the DSP algorithm.
  • Simulation 1: Fault-tolerant performance. This simulation was performed to validate and evaluate the fault-tolerant capability provided by the DSP algorithm when it was applied to wireless networks such as WSNs.
  • Simulation 2: Network traffic performance. This simulation was conducted to validate and compare the network traffic performance of the DSP-based approach with the standard HSR protocol and some state-of-the-art techniques when it was applied to HSR networks.

6.1.1. Simulation Description

Simulation 1: Fault-Tolerant Performance

In this simulation, we considered a sample WSN as shown in Figure 9. A source node sent unicast frames to the sink node. During the communications, we assumed that a node failure occurred at node 14, which belonged to a path between the source node and the sink node. In the simulation, the source node sent N unicast frames to the sink node (N = 10, 20, …, 100). The number of unicast frames received at the sink node was recorded to evaluate the fault-tolerant performance of the DSP algorithm.
Figure 9. The sample wireless sensor network (WSN) used in Simulation 1.

Simulation 2: Network Traffic Performance

The objective of the simulation was to validate, evaluate, and compare the traffic performance of the DSP-based approach with that of the standard HSR protocol and some state-of-the-art techniques for reducing redundant unicast traffic in HSR networks, including the quick removing (QR) technique [27], the port locking (PL) technique [28], and the dual virtual paths (DVP) [29] technique. We considered a sample HSR as shown in Figure 5. The sample network has eight DANH rings; each DANH ring included four DANH nodes and connected one QuadBox pair. We conducted the simulation for three cases, as shown in Figure 10. In the simulation, source node 1 send unicast frames to destination 6, destination 10, and destination 15 in case 1, case 2, and case 3, respectively.
Figure 10. The sample HSR network used in Simulation 2.

6.1.2. Simulation Results

Simulation 1

Table 3 shows the network traffic frames recorded from the simulation. The simulation result shows that there was no lost frame during the communication. Therefore, the DSP algorithm can provide fault-tolerant communication for WSNs.
Table 3. The results of Simulation 1.

Simulation 2

Figure 11, Figure 12 and Figure 13 show comparisons of the network traffic under the DSP-based approach and the standard HSR protocol in cases 1, 2, and 3, respectively. The horizontal axis of these figures shows the number of unicast frames sent from the source to the destination, and the vertical axis shows the number of network traffic frames generated and delivered in the network when the source node sends the unicast frames to the destination node.
Figure 11. A comparison of traffic performance in Case 1.
Figure 12. A comparison of traffic performance in Case 2.
Figure 13. A comparison of traffic performance in Case 3.
The simulation results in Case 1 show that the proposed DSP-based approach reduces network traffic by up to 88%, 80%, and 76% compared with the standard HSR protocol, the QR technique, and the PL technique, respectively. The network traffic of the DSP-based approach is the same as that of the DVP approach.
The simulation results in Case 2 show that the proposed DSP-based approach reduces network traffic by up to 84%, 73%, and 68% compared with the standard HSR protocol, the QR technique, and the PL technique, respectively. The network traffic of the DSP-based approach is the same as that of the DVP approach.
The simulation results in Case 3 show that the proposed DSP-based approach reduces network traffic by up to 80%, 66%, and 59% compared with the standard HSR protocol, the QR technique, and the PL technique, respectively. The network traffic of the DSP-based approach is the same as that of the DVP approach.

6.2. Discussion

The results of Simulation 1 are shown in Table 3. The results demonstrated that the DSP algorithm provided fault-tolerant communication for WSNs.
The results of Simulation 2 showed that the traffic performance of the DSP-based approach was much better than that of the standard HSR protocol and other techniques. By forwarding unicast frames through redundant paths from the source to the destination, the DSP-based approach provides fault-tolerant communication with improved traffic performance. Unlike the standard HSR protocol, which duplicates and floods unicast frames to all rings of HSR networks, the DSP-based approach forwards the unicast frames through two paths that are pre-established between the source and the destination. Therefore, the DSP-based approach significantly reduces redundant unicast traffic in HSR network compared with the standard HSR protocol. Numerically, for the simulation networks used in this paper, the DSP-based approach reduces network traffic by 80% to 88% compared with the standard HSR protocol, by 66% to 80% compared with the QR technique, and by 59% to 76% compared with to the PL technique, thus improving network traffic performance. Additionally, the DSP-based approach has the same network traffic performance as the DVP technique. Unlike DVP, which establishes node-based dual paths for each connection pair of HSR terminal nodes, the proposed approach sets up dual paths for each connection pair of QuadBox pairs. In addition, unlike the DVP, under which each terminal node broadcasts an additional frame to learn MAC addresses and build neighbor tables, the DSP-based approach learns and builds MAC tables based on the existing supervision frames of the standard HSR protocol sent periodically by HSR terminal nodes. Therefore, the proposed DSP-based approach significantly reduces the control overhead for establishing dual paths as well as the memory space required to store these dual paths in networks compared to the DVP technique.

7. Conclusions

In this paper, we proposed a novel dual separate paths algorithm, called DSP, to provide fault-tolerant communication for WSNs. The proposed DSP algorithm is a fault-tolerant technique based on the path redundancy-based mechanism. The DSP algorithm establishes two node-disjoint paths with an optimal path distance between a source and a destination in a network, then forwards unicast frames through the pre-established dual paths. Unlike some existing path redundancy-based techniques which discover redundant paths based on exchanging control messages, the proposed DSP algorithm establishes the paths based on network topology information. In addition, the proposed algorithm delivers unicast frames from a source to a destination through two pre-established paths instead of all possible paths between the source and the destination, as is done in existing algorithms, thus improving network traffic performance. The DSP algorithm can be applied to WSNs to provide seamless fault-tolerant communication for life-critical applications, such as fault-tolerant CPSs. For our case study, the DSP algorithm was applied to HSR networks in order to provide fault-tolerant communication, as well as reducing redundant unicast traffic for the networks. The DSP-based approach significantly reduces unicast traffic compared with the standard HSR protocol. The analytical and simulation results showed that, for the sample network, the DSP-based approach reduced network traffic by 80% to 88% compared with the standard HSR protocol and by 59% to 80% compared with other existing traffic reduction techniques, including QR and PL techniques. Therefore, the DSP-based approach is a very effective solution for reducing redundant unicast traffic in HSR networks for mission-critical applications such as substation automation systems.

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (grant number: 2016R1D1A1B03933315), and the INNOPOLIS Foundation funded with a grant in aid from the Korean government through MPEES Co., Ltd. and Myongji University (No. A201602DD0101).

Author Contributions

Authors Nguyen Xuan Tien, Semog Kim, Jong Myung Rhee, and Sang Yoon Park conceived and developed the ideas behind the research. Nguyen Xuan Tien carried out the performance analysis and simulations, and wrote the paper under supervision of Jong Myung Rhee. Jong Myung Rhee and Sang Yoon Park supervised the research and finalized the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Carlo, M.C.; Dharma, P.A. Ad Hoc and Sensor Networks—Theory and Applications, 2nd ed.; World Scientific Publishing Co. Pte. Ltd.: Singapore, 2011. [Google Scholar]
  2. Callaway, E.H. Wireless Sensor Networks—Architectures and Protocols; Auerbach Publications: Boca Raton, FL, USA, 2004. [Google Scholar]
  3. Alur, R. Principles of Cyber-Physical Systems; The MIT Press: Philadelphia, PA, USA, 2015. [Google Scholar]
  4. Rho, S.; Vasilakos, A.V.; Chen, W. Cyber physical systems technologies and applications. Future Gen. Comput. Syst. 2016, 56, 436–437. [Google Scholar] [CrossRef]
  5. Lee, E.A. The Past, Present and Future of Cyber-Physical Systems: A Focus on Models. Sensors 2015, 15, 4837–4869. [Google Scholar] [CrossRef] [PubMed]
  6. Lin, C.Y.; Zeadally, S.; Chen, T.S.; Chang, C.Y. Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies. Int. J. Distrib. Sens. Netw. 2012, 2012, 489794. [Google Scholar] [CrossRef]
  7. Krishna, C.M.; Koren, I. Adaptive Fault-Tolerance for Cyber-Physical Systems. In Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, USA, 28–31 January 2013; pp. 310–314. [Google Scholar]
  8. Alwan, H.; Agarwal, A. A Survey on Fault Tolerant Routing Techniques in Wireless Sensor networks. In Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications, Athens, Greece, 14–19 June 2009; pp. 366–371. [Google Scholar]
  9. Kakamanshadi, G.; Gupta, S.; Singh, S. A survey on Fault Tolerance Techniques in Wireless Sensor Networks. In Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, India, 8–10 October 2015; pp. 168–173. [Google Scholar]
  10. Deb, B.; Bhatnagar, S.; Nath, B. ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks. In Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks, Bonn, Germany, 20–24 October 2003. [Google Scholar]
  11. Stoica, I.; Shenker, S.; Zhang, H. Core-stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks. In Proceedings of the ACM SIGCOMM ’98 Conference on Applications, Technologies, Architectuers and Protocols for Computer Communication, Vancouver, BC, Canada, 31 August–4 September 1998; pp. 118–130. [Google Scholar]
  12. Felemban, E.; Lee, C.; Ekici, E. MMSPEED: Multipath Multi-SPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2006, 5, 738–754. [Google Scholar] [CrossRef]
  13. Liang, Q. Fault-Tolerant and Energy Efficient Wireless Sensor Networks: A Cross-Layer Approach. In Proceedings of the IEEE Military Communications Conference, Atlantic City, NJ, USA, 17–21 October 2005; pp. 1862–1868. [Google Scholar]
  14. Korbi, I.; Doudane, Y.G.; Jazi, R.; Saidane, L.A. Coverage-Connectivity based Fault Tolerance Procedure in Wireless Sensor Networks. In Proceedings of the 9th International Wireless Communication and Mobile Computing Conference (IWCMC), Sardinia, Italy, 1–5 July 2013; pp. 1540–1545. [Google Scholar]
  15. Lee, M.; Choi, Y. Fault detection of wireless sensor networks. J. Comput. Commun. 2008, 31, 3469–3475. [Google Scholar] [CrossRef]
  16. Halder, S.; Mazumdar, M.; Chanak, P.; Banerjee, I. FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor Network. Adv. Comput. Inf. Technol. 2012, 176, 621–631. [Google Scholar]
  17. Alippi, C.; Ntalampiras, S.; Roveri, M. Model-Free Fault Detection and Isolation in Large-Scale Cyber-Physical Systems. IEEE Trans. Emerg. Top. Comput. Intell. 2017, 1, 61–71. [Google Scholar] [CrossRef]
  18. Bansal, N.; Sharma, T.P.; Misra, M.; Joshi, R.C. FTEP: A Fault Tolerant Election Protocol for Multi-level Clustering in Homogeneous Wireless Sensor Networks. In Proceedings of the 16th IEEE International Conference on Networks, New Delhi, India, 12–14 December 2008. [Google Scholar]
  19. Kaur, A.; Sharma, T. FTTCP: Fault Tolerant Two-level Clustering protocol for WSN. Int. J. Netw. Secur. 2010, 1, 28–33. [Google Scholar]
  20. Karim, L.; Nasser, N.; Sheltami, T. A Fault Tolerant Dynamic Clustering Protocol of Wireless Sensor Networks. In Proceedings of the Global Telecommunications Conference 2009 (GLOBECOM 2009), Hianolulu, HI, USA, 30 November–4 December 2009; pp. 1–6. [Google Scholar]
  21. Bajaber, F.; Awan, I. Dynamic/Static Clustering Protocol for Wireless Sensor Network. In Proceedings of the Second UKSIM European Symposium on Computer Modeling and Simulation (EMS ’08), Liverpool, UK, 8–10 September 2008; pp. 524–529. [Google Scholar]
  22. Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms, 3rd ed.; The MIT Press: London, UK, 2009; pp. 170–190. [Google Scholar]
  23. International Electrotechnical Commission. IEC 62439–3 Standard. Industrial Communications Networks: High-Availability Automation Networks, Part 3: Parallel Redundancy Protocol (PRP) and High-Availability Seamless Redundancy (HSR); IEC: Geneva, Switzerland, 2012. [Google Scholar]
  24. Kirrmann, H.; Weber, K.; Kleineberg, O.; Weibel, H. HSR: Zero recovery time and low-cost redundancy for Industrial Ethernet (High availability seamless redundancy, IEC 62439-3). In Proceedings of the 2009 IEEE Conference on Emerging Technologies & Factory Automation (ETFA2009), Mallorca, Spain, 22–25 September 2009; pp. 1–4. [Google Scholar]
  25. Kirrmann, H.; Kleineberg, O. Seamless and low-cost redundancy for Substation Automation Systems (High availability Seamless Redundancy, HSR). In Proceedings of the Power and Energy Society General Meeting, Detroit, MI, USA, 24–29 July 2011. [Google Scholar]
  26. OMNeT++ Discrete Event Simulator Version 4.6. Available online: http://www.omnetpp.org/ (accessed on 15 April 2017).
  27. Nsaif, S.A.; Rhee, J.M. Improvement of high-availability seamless redundancy HSR traffic performance for smart grid communications. J. Commun. Netw. 2012, 14, 653–661. [Google Scholar] [CrossRef]
  28. Abdulsalam, I.R.; Rhee, J.M. Improvement of High-Availability Seamless Redundancy (HSR) Unicast Traffic Performance Using Port Locking. In Proceedings of the Fourth World Congress on Software Engineering, Hong Kong, China, 3–4 December 2013. [Google Scholar]
  29. Nsaif, S.A.; Rhee, J.M. DVP: A Novel High-Availability Seamless Redundancy (HSR) Protocol Traffic-Reduction Algorithm for a Substation Automation System Network. Energies 2014, 7, 1792–1810. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.