The Method of Diversity-Based Ensuring the Reliability of the Router in the IIoT System
DOI:
https://doi.org/10.47839/ijc.23.3.3651Keywords:
IIoT, Reliability, N-version programming, Router, CPUAbstract
The architecture of the Industrial Internet of Things (IIoT) system assumes the presence of a router as the main subsystem, which will allow connecting the subsystems into a single network and connecting them to the equipment of the Internet service provider. Failure of the router can lead to downtime of industrial equipment and the whole workshop at the industrial enterprise, and to the failure of the IIoT system as a whole. Control processing units of industrial routers (RCPU) are complex microprocessor systems (MS). Violation of their operability can be caused by both hardware (HW) and software (SW) failures. Therefore, to increase the reliability of RCPU it is reasonable to use such methods of reliability assurance as HW redundancy (duplication of processors with comparison of results), as well as the use of modern means of control and diagnostics. However, the number of HW and SW failures in RCPUs, is still quite high. In this connection, the solution of issues related to the development of methods for ensuring high reliability of RCPU is of great urgency. This paper proposes a method of ensuring the reliability of RCPU using SW diversity on the basis of priority series. The method let to choose the variant of redundancy of HW and the number of versions of SW as diversity in RCPU.
References
М. Kolisnyk, V. Kharchenko, I. Piskachova, “Investigation of the Smart Business Center for IoT Systems Availability Considering Attacks on the Router,” Dependable IoT for Human and Industry. New York, 2022. pp. 169–195. https://doi.org/10.1201/9781003337843-11.
O. Duda et al., "Data Processing in IoT for Smart City Systems," 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Metz, France, 2019, pp. 96-99, https://doi.org/10.1109/IDAACS.2019.8924262.
A. Avizienis, J.-C. Laprie, “Reliability computing: From concepts to design diversity,” Proceeding of the IEEE, vol. 74. issue 5, pp. 629-638, 1986. https://doi.org/10.1109/PROC.1986.13527.
B. Littlewood, L. Strigini, “Software reliability and reliability: a roadmap,” Proceedings of the ACM Conference on the Future of Software Engineering (ICSE'00), May 2000, pp. 175–188. https://doi.org/10.1145/336512.336551.
B. Littlewood, P. T. Popov, L. Strigini, N. Shryane, “Modelling the effects of combining diverse Software fault detection techniques,” IEEE Transactions on Software Engineering, vol. 26. issue 12, pp. 1157–1167, 2000. https://doi.org/10.1109/32.888629.
L. Strigini, “Fault tolerance and resilience: Meanings, measures and assessment,” In: K. Wolter, A. Avritzer, M. Vieira, A. Van Moorsel, (Eds), Resilience Assessment and Evaluation of Computing Systems, Springer, Berlin, Heidelberg, November 2012, pp. 3–24. https://doi.org/10.1007/978-3-642-29032-9_1.
P. Popov, L. Strigini, A. Romanovsky, “Diversity for off-the-shelf components,” Proceeding of the International Conference on Dependable Systems & Networks (FTCS-30, DCCA-8) Fast Abstracts, New York, USA, 2000, pp. B60-B61. https://doi.org/10.1109/TDSC.2007.70208.
V. Kharchenko, Y. Ponochovnyi, I. Babeshko, E. Ruchkov, A. Panarin, “Safety assessment of maintained control systems with cascade two-version 2oo3/1oo2 structures considering version faults,” In: Zamojski W., Mazurkiewicz J., Sugier J., Walkowiak T., Kacprzyk J. (eds) Dependable Computer Systems and Networks. DepCoS-RELCOMEX Lecture Notes in Networks and Systems, 2023, vol. 737. Springer, Cham. https://doi.org/10.1007/978-3-031-37720-4_11.
W. Kuo, M. J. Zuo, Optimal reliability modeling: principles and applications, John Wiley & Sons, Book, 2003, 543 p.
L. Ozirkovskyy, B. Volochij et al., “Functional safety analysis of safety-critical system using state transition diagram,” Radioelectronic and Computer Systems, vol. 2, pp. 145-158, 2022. https://doi.org/10.32620/reks.2022.2.12.
A. Yanko, V. Krasnobayev, A. Martynenko, “Influence of the number system in residual classes on the fault tolerance of the computer system,” Radioelectronic and Computer Systems, vol. 3, pp. 159-172, 2023. https://doi.org/10.32620/reks.2023.3.13.
M. O. Kolisnyk, I. V. Piskachova, Reliability of Software Features of Microprocessor Devices for Controlling Telecommunication Systems, Kharkiv: UkrDAZT, 2012, 167 p.
C. Guo, S. Zhou, J. Li, F. Chen, D. Li and X. Huang, “A Novel software reliability growth model of safety-critical software considering fault severity classification,” Proceeding of the 2019 4th International Conference on System Reliability and Safety (ICSRS), Rome, Italy, 2019, pp. 25-29, https://doi.org/10.1109/ICSRS48664.2019.8987594.
M. Frihi, M. Boutalbi, S. Toumi, C. Tanougast and M. Heil, “Optimized and dependable router suitable for dynamic networks on chip,” Proceeding of the 2014 International Conference on Control, Decision and Information Technologies (CoDIT), Metz, France, 2014, pp. 783-788, https://doi.org/10.1109/CoDIT.2014.6996997.
R. Kammerer, R. Obermaisser, B. Frömel, “A router for the containment of timing and value failures in CAN,” EURASIP Journal on Embedded Systems, article 4, 2012. https://doi.org/10.1186/1687-3963-2012-4.
H. Ghareb, Software redundancy in Siemens PLC – Hardware versus Software [Online]. Available at: https://instrumentationtools.com/SW-redundancy-in-siemens-plc/.
Cisco Catalyst IR8300 Rugged Series Router Data Sheet. March 23, 2022. [Online]. Available at: https://www.cisco.com/c/en/us /products/collateral/routers/catalyst-ir8300-rugged-series-router/nb-06-cat-ir8340-rugged-ser-rout-ds-cte-en.html.
Juniper networks. Routers. [Online]. Available at: https://www.juniper.net/us/en/products/routers/mx-series/mx304-universal-routing-platform.html.
Fortinet. Router. Fortigate 200f-series datasheet. 2023. 10 p. [Online]. Available at: https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/fortigate-200f-series.pdf.
D. Liew, D. Schemmel, C. Cadar, A. F. Donaldson, R. Zahl and K. Wehrle, “Floating-point symbolic execution: A case study in N-version programming,” Proceeding of the 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), Urbana, IL, USA, 2017, pp. 601-612, https://doi.org/10.1186/1687-3963-2012-4.
C. Cadar and P. Hosek, “Multi-version software updates,” Proceeding of the 2012 4th International Workshop on Hot Topics in Software Upgrades (HotSWUp), Zurich, Switzerland, 2012, pp. 36-40, https://doi.org/10.1109/HotSWUp.2012.6226615.
N. Subasi, U. Guner, I. Ustoglu, “N-version programming approach with implicit safety guarantee for complex dynamic system stabilization applications,” Measurement and Control, vol. 54, issues 3-4, pp. 269-278, 2021. https://doi.org/10.1177/0020294019887473.
F. Machida, “N-version machine learning models for safety critical systems,” Proceedings of the 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Portland, OR, USA, 2019, pp. 48-51, https://doi.org/10.1109/DSN-W.2019.00017.
V. Girdhar and E. Al-Masri, “N-version programming for enhancing fault tolerance in fog-based IoT systems,” Proceedings of the 2020 6th International Conference on Science in Information Technology (ICSITech), Palu, Indonesia, 2020, pp. 109-114, https://doi.org/10.1109/ICSITech49800.2020.9392033.
Z. Jelinski and P. B. Moranda, “Software Reliability Research”, Freiberger, W. Ed., Statistical Computer Performance Evaluation, Academic Press, New York, 1972, pp. 465-484. https://doi.org/10.1016/B978-0-12-266950-7.50028-1.
Kolmogorov-Smirnov Goodness-of-Fit Test. [Online]. Available at: https://www.itl.nist.gov/div898/handbook/eda/section3/eda35g.htm.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.