This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

CSQF-based Time-Sensitive Flow Scheduling in Long-distance Industrial IoT Networks

Yudong Huang, Tao Huang, , Xinyuan Zhang, Shuo Wang,
Hongyang Du, Dusit Niyato, , and Fei Richard Yu
Y. Huang and X. Zhang are with the State Key Laboratory of Networking and Switching Technology, BUPT, Beijing, 100876, P.R. China (e-mail: [email protected], [email protected]).
T. Huang and S. Wang are with the State Key Laboratory of Networking and Switching Technology, BUPT, Beijing, 100876, P.R. China. They are also with the Purple Mountain Laboratories, Nanjing, 211111, P.R. China (e-mail: [email protected], [email protected]).
H. Du and D. Niyato are with the School of Computer Science and Engineering, Nanyang Technological University, Singapore (e-mail: [email protected], [email protected]).
F. Richard Yu is with the Department of Systems and Computer Engineering, Carleton University, Ottawa, ON K1S 5B6, Canada (e-mail: [email protected]).
Abstract

Booming time-critical services, such as automated manufacturing and remote operations, stipulate increasing demands for facilitating large-scale Industrial Internet of Things (IoT). Recently, a cycle specified queuing and forwarding (CSQF) scheme has been advocated to enhance the Ethernet. However, CSQF only outlines a foundational equipment-level primitive, while how to attain network-wide flow scheduling is not yet determined. Prior endeavors primarily focus on the range of a local area, rendering them unsuitable for long-distance factory interconnection. This paper devises the cycle tags planning (CTP) mechanism, the first integer programming model for the CSQF, which makes the CSQF practical for efficient global flow scheduling. In the CTP model, the per-hop cycle alignment problem is solved by decoupling the long-distance link delay from cyclic queuing time. To avoid queue overflows, we discretize the underlying network resources into cycle-related queue resource blocks and detail the core constraints within multiple periods. Then, two heuristic algorithms named flow offset and cycle shift (FO-CS) and Tabu FO-CS are designed to calculate the flows’ cycle tags and maximize the number of schedulable flows, respectively. Evaluation results show that FO-CS increases the number of scheduled flows by 31.2%. The Tabu FO-CS algorithm can schedule 94.45% of flows at the level of 2000 flows.

Index Terms:
Bounded Latency, Flow Scheduling, Industrial Internet of Things, Time-Sensitive Networks.

I Introduction

The Internet has been prone to congestion, crumble, and long-tail delays in the past few decades. As an emerging branch of the Internet, the Industrial Internet of Things (IoT) is leading a new wave of industrial revolution and network innovation[1][2]. Different from traditional best-effort transmission of bit information, industrial time-critical applications, such as remote operations[3], smart grid[4], and digital twin[5], require task-oriented delivery with bounded delay and jitter. By leveraging the booming 5G and edge computing technologies, several works[6][7] have studied the predictable low-latency communication paradigm within the range of a factory or a local area. However, the possibility of providing long-distance deterministic forwarding services for large-scale cyber-physical systems remains to be explored.

In the sensor-controller-actuator environment of Industrial IoT, many time-sensitive data need to be collected and transmitted to the edge node of the factory or cloud server for further analysis and process. Some of them are aperiodic traffic, such as event alerts and critical message updates, while others exhibit the features of periodic sending. For example, remote control of a slave robotic arm requires issuing kinematic packets every 10 ms to synchronize the Cartesian coordinates, acceleration, and angular velocity information. According to the ITU report[8], machine-type devices could reach 97 billion in 2030. Rapidly growing IoT traffic leaves industrial proprietary buses facing bandwidth shortages, prohibitive costs, and compatibility issues. The Ethernet is on the rise and promises to enable converged industrial networks.

On the one hand, the time-sensitive networking (TSN) is a key candidate to enhance the Ethernet with real-time transmission capability. Since time synchronization struggles with guaranteeing accuracy in large-scale industrial sensor-controller-actuator environments, many TSN scheduling mechanisms, such as time-controlled gating, and cyclic queuing and forwarding (CQF), are limited to layer-2 local area networks (e.g., seven hops advised by the IEEE 802.1D protocol[9]). Moreover, TSN generally assumes that the propagation delay of the link is virtually non-existent, which is infeasible to be directly applied to long-distance networks.

On the other hand, the IETF DetNet working group is currently extending the TSN mechanisms to layer-3 deterministic networks. One of the promising solutions is cycle specified queuing and forwarding (CSQF)[10]. CSQF divides the sending time of an out-port into a series of equal time intervals; each time interval is called a cycle (noted as TT). By tagging a sequence of cycle information to the packet headers, packets are expected to be transmitted at precise reserved durations along the path. Hence, once the cycle size and label stacks are determined, the end-to-end latency is bounded. More importantly, the end-to-end jitter is theoretically independent of hop count, which is controlled to no more than 2T2T.

CSQF is essentially an underlying primitive that needs the special hardware support[11] for cycle mapping. CENI[12] testbed evaluations have shed light on the performance of devices equipped with CSQF capabilities in real-world systems. However, a cycle tag stack only explicitly defines the cyclic forwarding behavior of a single flow along a linear path. To make CSQF practical, network administrators necessitate an overarching strategy to effectively orchestrate network-wide traffic. Computing global scheduling cycle tags for time-sensitive flows continues to be a pressing challenge.

The scheduling task is analogous to the bin packing problem, with both being characterized as NP-hard[13][14]. While numerous TSN flow scheduling schemes[15][16] have been proposed with the time-controlled gating and CQF, they generally ignore the link delay and cannot reach the goal of long-distance deterministic transmission. Recently, the authors of [14] studied flow scheduling algorithms for CSQF, but their focus was primarily on path generation, utilizing straightforward constraints that only addressed capacity and delay aspects, ignoring the cycle mapping and bounded queue length constraints. Moreover, [14] performs admission control at the flow level, which is incapable of adaptively adjusting the cycle tags, whereas we focus on the per-packet granularity and address the cycle tag computation problem.

It is not trivial to model CSQF. First, in the end-to-end latency calculation, long-distance link delays are hard to normalize and align with cyclic scheduling behaviors, which prevents hop-by-hop delays from being considered a bounded constant value. Second, unlike traditional bandwidth allocation mechanisms, CSQF requires fine-grained time resource allocation. The industrial real-time applications send periodic traffic with different flow sending periods, which further arises challenges to unify cycle-related queue resource model. Third, since multiple flows will compete for the queue resources of each output port along the path, the cycle tag stack needs to be elaborately computed to avoid violating bounded queue length constraints. To our knowledge, this study is the inaugural effort to present the comprehensive integer programming mathematical model for the global scheduling of CSQF.

This paper targets to make the CSQF practical for efficient network-wide flow scheduling in long-distance Industrial IoT networks. The model hypotheses include: (1) Flow features and propagation delays are obtained prior, where flows are a set of periodic unicast flows marked by the highest priority. (2) CSQF-enabled switches adopt frequency synchronization, and the central controller applies zero phase deviation as a general scheduling basis. (3) All industrial terminals can send packets accurately, without considering the jitter from the source node. The main contributions are:

\bullet We present a key insight that queuing delay could be bounded by binding the maximum queue length to a cycle time factor. Then, we establish a novel cycle tags planning (CTP) model111 The open-source code of the CTP model is at https://github.com/Hyduni001/CTP-Model-for-CSQF., where the per-hop cycle alignment problem is solved by decoupling the long-distance link delay from cyclic queuing time. To avoid queue overflows under multi-flow aggregations, we discretize the network resources into cycle-related queue resource blocks and satisfy the bounded queue length requirement by constructing mapping constraints between flow and resource blocks.

\bullet We design a novel heuristic algorithm named flow offset and cycle shift (FO-CS) to incrementally calculate the network-wide traffic’s cycle tags and quickly generate per-flow scheduling solutions. By leveraging the Tabu search method, we also develop a Tabu FO-CS algorithm to maximize the number of schedulable flows.

\bullet We evaluate the FO-CS algorithm under wide-area topologies in remote industrial control scenarios. Simulation results demonstrate that FO-CS improves the scheduling flow number by 31.2% compared with the naive algorithm. Furthermore, the Tabu FO-CS algorithm can schedule 94.45% of flows at the flow level of 2000 under the realistic topology of Internet2.

The structure of this paper is as follows: Section II provides a brief overview of the CSQF under Industrial IoT scenarios. Section III delves into the motivation. In Section IV, we present the formulation of the CTP model, while Section V details the design of the FO-CS algorithm. Section VI showcases our evaluation results. Related works are discussed in Section VII. The paper concludes in Section VIII.

II Background

Currently, the Industrial IoT has brought a new era of network innovations. Unlike fast-fluctuation TCP applications, in the industrial automation and intelligent manufacturing scenarios, real-time applications (e.g., remote operations and cloud control) issue promised aperiodic/periodic traffic and require the bounded latency of milliseconds and jitter of microseconds[6][17]. The deterministic networking (DetNet) is generally considered as private WANs, rather than replacing the Internet. The difference is that private WANs allow closed access control while the Internet is managed by large groups of domains. DetNet is compatible with the existing Internet since the best-effort flow can still be transmitted by DetNet.

Table I summarizes the examples of delay, jitter, data rate, and payload size requirements for time-sensitive tasks in typical DetNet scenarios, such as discrete automation, process automation, and electricity distribution, according to 3GPP TS22261[18] and IETF RFC 8578[19]. A small payload means it is less than or equal to 256 bytes, and a big payload generally does not exceed the MTU size. Note that all the values in this table are example values, which are varied in specific deployment configurations.

Refer to caption
Figure 1: The working mechanism of CSQF in the factory interconnection or cloud PLC scenarios, where the control plane has to compute the cycle tags (SID labels) for every packet along the path.
TABLE I: Typical usecases and requirements for DetNet
Scenarios / tasks Latency Jitter Data rate Payload size
Discrete automation 1-10 ms 1-100 μ\upmus 1-10 Mbps Small to big
Process automation-remote control 50 ms 20 ms 1-100 Mbps Small to big
Process automation-monitoring 50 ms 20 ms 1 Mbps Small
Electricity distribution-medium voltage 40-100 ms 1 ms 10 Mbps Small to big
Electricity distribution-high voltage 5-10 ms 100 μ\upmus 10 Mbps Small
Electricity distribution-extra-high voltage 5 ms 10 μ\upmus / Small
Intelligent transport systems- backhaul 10 ms 20 ms 10 Mbps Small to big
Tactile interaction 5 ms TBC 10 Mbps Small to big
Refer to caption
(a) The CQF mechanism. In each GCL, the ’o’ denotes open and the ’c’ denotes closed.
Refer to caption
(b) The end-to-end latency model for CQF.
Refer to caption
(c) CSQF instance. Three queues are rotated for transmission, each associated with a cycle.
Figure 2: Comparison of mechanisms evolving from local CQF to CSQF under long-distance Industrial IoT networks.

With the efforts of the DetNet working group, a cycle-based scheduling mechanism named CSQF is proposed. In CSQF, the key to achieve predictable latency and bounded jitter lies in the segment routing identifiers (SIDs)222The segment routing identifiers (SIDs) are equivalent to the cycle tags.. Specifically, each SID is a label recording the packet’s output port and sending cycle. For instance, in Fig. 1, the SID of 4076 identifies that the packet x should be sent out from the cycle 6 and the port 7 of the hop 4 (node D). Several SIDs are combined into a label stack that indicates the dedicated forwarding path of the packet. Two data-plane instantiations of segment routing (SR) are SR over MPLS (SR-MPLS) and SR over IPv6 (SRv6). In practice, both SR-MPLS and SRv6 can be used for the SID of CSQF. The label of the sending cycle could be specified in the local segment layer, which is allocated from the Segment Routing Local Block (SRLB) according to RFC8402.

The generation method and workflow of SIDs are as follows: (1) Once a talker at the source intends to issue time-sensitive traffic to a listener at the destination, it uploads the quality of service (QoS) requests to a centralized network controller. (2) The network devices learn from adjacent nodes to establish the cycle mapping tables. The controller calculates the feasible route and appropriate cycle parameters under the constraints of available spatial resources, temporal resources, and QoS requirements, and obtains the SID label stack corresponding to the path. (3) The control plane assigns the SIDs to the talker. Finally, CSQF-enabled network equipments reserve precise duration time for specified packets and forward them by parsing the topmost SID exhibited in the label stacks.

Theoretically, assuming that each output port contains two cyclic queues and the flow is successfully scheduled, a simple but general calculation method for the maximum delay DmaxD_{max} and the minimum delay DminD_{min} is:

Dmax=i=1h(LDi+PDi)+(h+1)T,D_{max}=\sum_{i=1}^{h}(LD_{i}+PD_{i})+(h+1)T\text{,} (1)
Dmin=i=1h(LDi+PDi)+(h1)T,D_{min}=\sum_{i=1}^{h}(LD_{i}+PD_{i})+(h-1)T\text{,} (2)
Je2e=DmaxDmin=2T,J_{e2e}=D_{max}-D_{min}=2T\text{,} (3)

where LDLD is the link delay, PDPD is the process delay, hh is the the number of hops, and TT is the cycle size. More importantly, since the packet can only fluctuate at the sending cycle of the first hop and the receiving cycle of the last hop, the end-to-end jitter Je2eJ_{e2e} is strictly limited to 2T2T regardless of network hops.

Furthermore, the segment routing (SR) used by CSQF is also a source routing technique that can implement the explicit route. At the source node, all forwarding decisions towards the destination node have been carried in the SID labels. Hence, the intermediate and egress nodes do not need to maintain per-flow states. This characteristic enhances the scalability of CSQF, enabling it to schedule an extensive array of flows.

III Motivation

This section presents the methods to construct the CSQF model and compute the global cycle tags.

III-A How to Model the CSQF?

CSQF only specifies an underlying packet scheduling mechanism on the data plane, which brings a significant problem of network-wide traffic planning to the control plane. To be more specific, how to construct the CSQF mathematical model and how to implement the SID calculation need to be solved. Next, We refer to the CQF in the range of local area to analyze the key points, i.e., link delays and cycle mapping relationships between adjacent nodes, in the process of modeling CSQF.

The features of local area include[13]: (1) The network diameter is restricted to a small scale, such as seven hops. (2) The time on switches can be strictly synchronized. (3) The propagation latency can be ignored. Based on these features, CQF supposes that the cycle length exceeds the summation of transmission latency, link latency, processing latency, and queueing latency. As detailed in Fig. 2(a), the CQF-enabled switch has two queues, and each queue’s behavior is controlled by the receive (Rx) and transmit (Tx) gates. Determined by the gate control list (GCL), the two queues conduct enqueue and dequeue actions alternately. Thus, in a single cycle of TT, the packet can be sent from the upstream device and received by the downstream device, then forwarded to the next-hop device in the subsequent cycle. As depicted in Fig. 2(b), if the packet is the last issued and first arrived, the minimum latency is (H1)×T(H-1)\times T, where HH is the number of hops. In contrast, a packet takes the maximum delay of (H+1)×T(H+1)\times T when it is the first sent and last received.

However, in wide-area networks, accurate time synchronization[20] is not easy to obtain and the varied propagation latency cannot be regarded as zero. Hence, it is not trivial to fix the per-hop latency to a certain cycle time TT. To address these challenges, CSQF relaxes the synchronized time to the frequency[21], i.e., all switches maintain the same clock frequency but do not require the same initial phase, which introduces the initial phase deviation between devices. Then, CSQF enlarges the two queues of CQF to multiple queues, where one queue is for transmitting packets and the others for receiving packets. Fig. 2(c) depicts an instance of three-queues CSQF. Each queue corresponds to a cycle, and the queues dequeue packets in a periodic pattern. More than one receiving queues are utilized to absorb a certain amount of traffic bursts, but the mapping relationship between link delays and cyclic queuing behavior is still undefined.

Based on the above analysis, we propose the cycle tags planning (CTP), an integer programming model for the CSQF. First, we argue that switches can be aware of the initial phase deviation and update it to the controller. The cycle mapping pattern still holds if we consider the phase deviation is 0 [14]. Thus, for simplicity but without loss of generality, CTP assumes an initial phase deviation of 0 in the control plane as the basis of the scheduling model. Second, our CTP model decouples link delays from the cycle time TT to hold a constant queue rotation duration. Specifically, the irregular link delay is divided by the cycle time and rounded up. Third, to unify the link delay and cyclic queuing behavior, we model the underlying network resources as time-discrete queue resource blocks. An auxiliary variable named arriving cycle is utilized to map the arriving time of packets to an appropriate receiving queue, which ensures aligned adjacent cycles. More details of CTP model are in Section IV.

III-B How to Calculate the Cycle Tags?

Another key challenge for CSQF is how to compute the cycle tags for each flow under the CTP model. Since multiple flows will compete for the queue resources of each output port along the path, an efficient scheduling algorithm is needed to not only maximize the number of flows that meet the deadline, but also avoid breaking the maximum queue length constraints. In addition, for different network scenarios, how to set appropriate configuration parameters (such as the queue number and the cycle size) also needs to be investigated.

Refer to caption
Figure 3: An access-aware scenario with the queue length of three packets. The node A is the access gateway device of the CSQF-enabled network domain.
Refer to caption
Figure 4: An example of the flow offset and cycle shift (FO-CS) method. The flow offset operation decides the packet’s arrival time at the first hop. The cycle shift optimizes the selection of receiving queues at each node.

Specifically, there are two typical traffic access situations in real deployment scenarios: access-aware[17][22], and access-unaware. Access-aware means that access network devices are gateways that can negotiate with terminal hosts and control when traffic will enter the CSQF-enabled network domain. Unawareness of the access indicates that the flow’s arrival time of the first hop is uncontrollable. Thus, to make the cycle tags computation adapt to practical deployments, we propose two intuitive flow scheduling methods. One is to set the flow offset at the first hop (i.e., access-aware), and the other is to control the cycle shift at each receiving queue (i.e., access-unaware).

To make it clear, we design a simple access-aware scenario where the maximum queue capacity is limited to three packets. As shown in Fig. 3, Node A functions as the access gateway device, and there’s a time-sensitive flow (f1f_{1}) directed towards the downstream node, Node B. It is not allowed to enqueue the receiving queue Q6Q_{6}, because Q6Q_{6} is already at full capacity. One method, as demonstrated in Fig. 4(a), is to change the flow offset. By delaying the sending start time of flow f1f_{1} at Node A by one cycle, the overflow at queue Q6Q_{6} can be circumvented. An alternative strategy involves adjusting the cycle shift, as seen in Fig. 4(b). Here, the flow f1f_{1} is deferred to enqueue the queue Q5Q_{5}. Consequently, both methods ensure that the flow f1f_{1} is successfully scheduled and transmitted out during Cycle 3. The difference is that the flow offset operation can search over the entire sending period time series, while the cycle shift operation is limited to available queue numbers. Note that Node A can execute both flow offset and cycle shift operations if it is access-aware, but can only execute the cycle shift operation if it is access-unaware. Moreover, if there is no available queue for choosing (e.g., all queues are full), the flow f1f_{1} will fail to be scheduled. In this case, the flow needs to wait until some resources occupied by other flows are released, or the underlying network resources need to be expanded.

Inspired by the aforementioned exploration, our objective is to devise a heuristic flow scheduling algorithm called flow offset and cycle shift (FO-CS) that possesses the following characteristics:

Predictable performance: The algorithms should adhere to the constraints of bounded queue length and ensure time-sensitive flows reach their destination within the stipulated deadline and jitter.

High scalability: Our approach ought to exhibit high scalability, scheduling thousands of time-sensitive flows across long-distance industrial IoT networks.

Feasible execution time: Employing heuristic methods, our scheme aims for a practical algorithm execution time.

The FO-CS algorithm are elaborated in Section V.

IV Cycle Tags Planning

In this section, we detail the CTP[23] model, including the integer programming inputs, decision variables, and core constraints.

IV-A CTP Model

We denote sets using calligraphic letters (e.g., 𝒱,,\mathcal{V,E,F}) and vectors with bold letters. The physical network topology is conceptualized as a graph 𝒢={𝒱,}\mathcal{G}=\left\{\mathcal{V},\mathcal{E}\right\}, where 𝒱\mathcal{V} represents vertices, encompassing switches 𝒮\mathcal{S} and hosts \mathcal{H}. \mathcal{E} symbolizes tuples indicative of network links, defined as ={(vi,vj)vi,vj𝒱,ij}\mathcal{E}=\left\{(v_{i},v_{j})\mid v_{i},v_{j}\in\mathcal{V},i\neq j\right\}, signifying a link exists between viv_{i} and vjv_{j}. Additionally, every edge possesses a link delay attribute of LDLD.

A loop-free path pp comprised of edges eke_{k} is depicted in (4). Here, e1e_{1} signifies the edge associated with the output port of the first switch (hop) of the path, while eje_{j} is associated with the last switch:

ekp,k{1,2,,j},p=e1,e2,,ej.\displaystyle e_{k}\in p,\quad k\in\left\{1,2,...,j\right\},\quad p=\left\langle e_{1},e_{2},...,e_{j}\right\rangle. (4)

A periodic TS flow is characterized as a single unicast traffic from a source node to a destination node. The collection of periodic TS flows is denoted as ={fi},i={0,,n1}\mathcal{F}=\left\{f_{i}\right\},i=\left\{0,...,n-1\right\}. The flow feature of each flow fif_{i} is defined as

fi={si,di,SPi,PKi,Di,pi,Ωi},fif_{i}=\left\{s_{i},d_{i},SP_{i},PK_{i},D_{i},p_{i},\Omega_{i}\right\},\quad\forall f_{i}\in\mathcal{F} (5)

where sis_{i} is the source node, did_{i} is the destination node, SPiSP_{i} is the flow’s sending period333The flow’s sending period is an inherent attribute determined by the industrial terminal. If a flow starts sending at 1.2 ms and the sending period is 4 ms, it will send packets at 1.2 ms, 5.2 ms, 9.2 ms, and so on., PKiPK_{i} is the packet number, DiD_{i} denotes the specific time by which the flow should reach its destination. Given their per-flow granularity, both the path information pip_{i} and the adjustable flow offset Ωi\Omega_{i} are incorporated into the flow’s attributes. The basic unit of Ωi\Omega_{i} is the cycle time.

Refer to caption
Figure 5: The CTP model from the perspective of the output port.
Refer to caption
Figure 6: An illustration of CTP from a holistic flow perspective. The dashed gray block is an instance of queue resource blocks. For simplicity but without loss of generality, we draw frequency synchronization with the same initial phase (i.e., time synchronization).
TABLE II: Graph related and flow related parameters
\mathcal{E}\subset\mathbb{N} set of edges
𝒱\mathcal{V}\subset\mathbb{N} set of vertexes
\mathcal{F}\subset\mathbb{N} set of flow indexes
si𝒱Fs_{i}\in\mathcal{V}^{\mid F\mid}
source of flow fif_{i}
di𝒱F{d}_{i}\in\mathcal{V}^{\mid F\mid}
destination of flow fif_{i}
SPiF{SP}_{i}\in\mathbb{N}^{\mid F\mid}
sending period of flow fif_{i}
PKiFPK_{i}\in\mathbb{N}^{\mid F\mid}
packet number of flow fif_{i}
DiF{D}_{i}\in\mathbb{N}^{\mid F\mid}
deadline of flow fif_{i}
pi𝒫F{p}_{i}\in\mathcal{P}^{\mid F\mid}
path of flow fif_{i}
ΩiF\Omega_{i}\in\mathbb{N}^{\mid F\mid}
flow offset of flow fif_{i}
Δ(fi,ek)\Delta_{(f_{i},e_{k})}
cycle shift of flow fif_{i} at edge eke_{k}
LD(fi,h)LD_{(f_{i},h)}
flow fif_{i} traverses the hh hop of a path
with link delay of LD(fi,h)LD_{(f_{i},h)}
QE(ek)T(t)Q_{E_{(e_{k})}}^{T_{(t)}}
resource block at edge E(ek)E_{(e_{k})} and cycle T(t)T_{(t)}
LL\in\mathbb{N}
maximum queue length
NN\in\mathbb{N}
maximum queue number
TcycleT_{cycle}\in\mathbb{N}
cycle size at the output port
HypercycleHyper_{cycle}
hyper-cycle, which is equal to the least
common multiple of all flows’ sending periods
β\beta
the number of TcycleT_{cycle} in a HypercycleHyper_{cycle}

The transmission time of each output interface is segmented into a series of equal time intervals, each lasting a duration of TcycleT_{cycle}, commonly referred to as a cycle. Each cycle corresponds to a queue. Thus, each output port consists of a sequence of cycle-related queue resource blocks that can be defined as QE(ek)T(t)Q_{E_{(e_{k})}}^{T_{(t)}}, and the superscript of T(t)T_{(t)} is a variable that denotes the specific location of the cycle in the sequence. Specifically, t{0,1,,β1}t\in\left\{0,1,...,\beta-1\right\}, and T(1)T_{(1)} denotes the Cycle 1 as exhibited in Fig. 6. The parameters related to the graph and flow, which are used in the CTP problem formulation, are presented in Table II.

As illustrated in Fig. 5, the buffer allocated for TS traffic is partitioned into NN TS-queues. Of these, one queue is designated for transmission while the other N1N-1 queues are for receiving. The buffer is used to store the packet data, while the metadata of packets is stored in the queue. Each of the TS-queues is assigned the topmost priority level of seven. As per the CSQF mechanism, the queue for transmission is chosen cyclically. In addition, the queue capacity LL is constrained and correlates with the size of TcycleT_{cycle}. A flow must determine the appropriate receiving TS-queue for enqueueing, upon arrival at an interface (edge). The variable Δ(fi,ek)\Delta_{(f_{i},e_{k})} represents the distance between the chosen receiving queue and the transmitting queue, measured by cycle shift operations at the associated edge eke_{k}. Typically, the Δ\Delta is an integer value that ranges from 0 to N2N-2.

Fig. 6 presents an illustration of the CTP model from a comprehensive flow perspective. Flow f1f_{1} initiates transmission at the first hop, specifically edge e1e_{1}, during the flow offset of Cycle 0. Following a link latency equivalent to nearly two cycles, f1f_{1} arrives at the edge e2e_{2} in the Cycle 2. Then, it enqueues the second receiving queue, thus the value of Δ(f1,e2)\Delta(f_{1},e_{2}) is one cycle and f1f_{1} will be transmitted at the edge e2e_{2} in the Cycle 3. After that, it is received at the edge e3e_{3} with Δ(f1,e3)\Delta(f_{1},e_{3}) of zero and transmitted in the Cycle 5. In its entirety, f1f_{1} traverses through the path e1,e2,e3\left\langle e_{1},e_{2},e_{3}\right\rangle adhering to the designated cycle tags 0,3,5\left\langle 0,3,5\right\rangle.

IV-B Integer Programming Inputs and Variables

Integer programming is a widely recognized mathematical method used to model network scheduling problems. The following are the inputs and decision variables.

1) Integer Programming Inputs:

\bullet Physical topology graph 𝒢={𝒱,}\mathcal{G}=\left\{\mathcal{V},\mathcal{E}\right\}.

\bullet A collection of periodic time sensitive flows \mathcal{F}.

\bullet Queue length LL, queue number NN, cycle size TcycleT_{cycle}.

2) Decision Variables:

\bullet Flow offset, {ΩiΩiΩ}\left\{\Omega_{i}\mid\Omega_{i}\in\Omega\right\}.

\bullet Cycle shift, {Δ(fi,ek)fiF,ekpi}\left\{\Delta_{(f_{i},e_{k})}\mid f_{i}\in F,e_{k}\in p_{i}\right\}.

IV-C Core Constraints

1) Hyper-cycle Constraint: Various flows have different sending periods. A hyper-cycle is used to determine the time series bounds for the scheduling solution. As shown in (6), the hyper-cycle is defined as the least common multiple of all flows’ sending periods (𝒮𝒫\mathcal{SP}). Thus, the sending pattern repeats from the global perspective, and we only need to make the flow satisfy the scheduling constraints in one hyper-cycle. The hyper-cycle is a widely-used term in real-time system fields[13][24]. In the same vein, this paper focuses on scheduling periodic TS flows, where the sending period is considered as an integer within a reasonable range to comply with industrial tasks. The sporadic flows can be delivered with other QoS methods, such as asynchronous traffic shaping and frame preemption. Moreover, in specific industrial scenarios, such as 5G TSCAI[25], IEC 60802[26], and DetNet use cases[19], it is possible to register all types of devices and the periods of flows in advance. Consequently, the hyper-cycle can be established as the greatest value of the least common multiple derived from the flow periods of all known devices.

Hypercycle=LCM(𝒮𝒫).\displaystyle Hyper_{cycle}=LCM(\mathcal{SP}). (6)

2) Cycle Constraint: In this study, we define the granularity of scheduling by the cycle time. This mandates that every sending period must be divisible by the cycle time. Consequently, the upper bound of TcycleT_{cycle} aligns with the greatest common divisor of the sending periods of all flows, as depicted in (7). On the other hand, the lower bound of TcycleT_{cycle} must ensure that during its duration, all packets stored in a queue are dispatched. This duration encompasses the cumulative value of the processing latency δp\delta_{p}, maximum queuing latency δq\delta_{q}, and transmission latency δm\delta_{m}, , as represented in (8).

max(Tcycle)=GCD(𝒮𝒫).\displaystyle\max(T_{cycle})=GCD(\mathcal{SP}). (7)
min(Tcycle)=\displaystyle\min(T_{cycle})= δp+max(δq+δm)\displaystyle\lceil\delta_{p}+\max\left(\delta_{q}+\delta_{m}\right)\rceil (8)
=\displaystyle= δp+L×MTUBw.\displaystyle\lceil\delta_{p}+\frac{L\times MTU}{Bw}\rceil.

In (8), BwBw is the link capacity, MTUMTU is the maximum transmission unit of packet size, and LL is the maximum queue length. Typically, the value of TcycleT_{cycle} is chosen to be greater than its minimum, and HypercycleHyper_{cycle} is divisible by TcycleT_{cycle}. Then, β\beta is utilized to denote the total count of TcycleT_{cycle} in a HypercycleHyper_{cycle} as presented in (9).

β=HypercycleTcycle.\displaystyle\beta=\frac{Hyper_{cycle}}{T_{cycle}}. (9)

3) Offset Constraint: The offset of each flow determines the sending initial cycle at the first switch device (Ωi\Omega_{i}) linked to the terminal node, which must be less than the defined sending period of the flow, as outlined in (10). In other words, the TS flow should be entirely forwarded within the current sending period to avoid stream interference that may occur during adjacent sending periods.

i\displaystyle\forall i {0,1,2,,n1}, 0Ωi<SPiTcycle.\displaystyle\in\left\{0,1,2,...,n-1\right\},\ \ 0\leq\Omega_{i}<\frac{SP_{i}}{T_{cycle}}. (10)

4) Arriving Cycle Constraint: As defined in (11), A(fi,ek)A_{(f_{i},e_{k})} denotes the arriving cycle when the flow is arriving at the output port of a node. tA(fi,ek)t_{A_{(f_{i},e_{k})}} is the specific time point that packets may arrive. This constraint is satisfied by default if the cycle size is set to no less than the minimal value of TcycleT_{cycle} defined in (8).

\displaystyle\forall i{0,1,2,,n1},ekpi,k{1,2,,j},\displaystyle i\in\left\{0,1,2,...,n-1\right\},\ \forall e_{k}\in p_{i},k\in\left\{1,2,...,j\right\}, (11)
A(fi,ek)=Ωi+h=0k1LD(fi,h)Tcycle+h=0k1Δ(fi,h),\displaystyle A_{(f_{i},e_{k})}=\Omega_{i}+{\sum_{h=0}^{k-1}}\left\lceil\frac{LD_{(f_{i},h)}}{T_{cycle}}\right\rceil+{\sum_{h=0}^{k-1}}\Delta_{(f_{i},h)},
A(fi,ek)×TcycletA(fi,ek)(A(fi,ek)+1)×Tcycle.\displaystyle A_{(f_{i},e_{k})}\times T_{cycle}\leq t_{A_{(f_{i},e_{k})}}\leq(A_{(f_{i},e_{k})}+1)\times T_{cycle}.

and LD(fi,0)=0LD_{(f_{i},0)}=0 , Δ(fi,0)=0\Delta_{(f_{i},0)}=0.

5) Deadline Constraint: For each flow, all packets need to reach their destination within the designated deadline, i.e.,

i\displaystyle\forall i {0,1,2,,n1},\displaystyle\in\left\{0,1,2,...,n-1\right\}, (12)
1+h=1jLD(fi,h)Tcycle+h=1jΔ(fi,h)DiTcycle.\displaystyle 1+{\sum_{h=1}^{j}}\left\lceil\frac{LD_{(f_{i},h)}}{T_{cycle}}\right\rceil+{\sum_{h=1}^{j}}\Delta_{(f_{i},h)}\leq\frac{D_{i}}{T_{cycle}}.

6) Flow and Edge-Cycle Mapping Constraint: This constraint gives the mapping relationship between flow fif_{i} and queue resource block QE(ek)T(t)Q_{E_{(e_{k})}}^{T_{(t)}} at the edge eke_{k} and cycle tt. If a flow fif_{i} maps to a QE(ek)T(t)Q_{E_{(e_{k})}}^{T_{(t)}} successfully, i.e., the utilization of queue resource block does not exceed the queue length LL, the value of the auxiliary variable M(fi,QE(ek)T(t))M\left(f_{i},Q_{E_{(e_{k})}}^{T_{(t)}}\right) is 1, as depicted in (13). Otherwise, it is 0.

\displaystyle\forall i{0,1,2,,n1},\displaystyle i\in\left\{0,1,2,...,n-1\right\}, (13)
\displaystyle\forall ekpi,k{1,2,,j},t{0,1,,β1},\displaystyle e_{k}\in p_{i},k\in\left\{1,2,...,j\right\},\forall t\in\left\{0,1,...,\beta-1\right\},
M(fi,QE(ek)T(t))=1.\displaystyle M\left(f_{i},Q_{E_{(e_{k})}}^{T_{(t)}}\right)=1.
s.t.\displaystyle s.t.
λ{0,,HypercycleSPi1},\displaystyle\lambda\in\left\{0,...,\frac{Hyper_{cycle}}{SP_{i}}-1\right\},
t=(A(fi,ek)+Δ(fi,ek)+λ×SPiTcycle)%β.\displaystyle t=\left(A_{(f_{i},e_{k})}+\Delta_{(f_{i},e_{k})}+\frac{\lambda\times SP_{i}}{T_{cycle}}\right)\%\beta.

The actual transmitting cycle at the edge is determined by the sum of the arriving cycle A(fi,ek)A_{(f_{i},e_{k})} and the cycle shift Δ(fi,ek)\Delta_{(f_{i},e_{k})}. Given that a flow can be issued from its source multiple times within a HypercycleHyper_{cycle}, the variable λ\lambda specifies the sending period to which the flow pertains. Moreover, to ensure that the arriving time of flows does not exceed a HypercycleHyper_{cycle}, the transmitting cycle is subjected to a modulus operation with β\beta. In summary, the variable of tt encapsulates all the transmitting cycles a flow undergoes along its path within the range of a hyper-cycle.

7) Bounded Queue Length Constraint: As defined in (14), if a flow fif_{i} is scheduled along the path successfully, i.e., for all the edges along the path the value M(fi,QE(ek)T(t))M\left(f_{i},Q_{E_{(e_{k})}}^{T_{(t)}}\right) is 1 while the deadline constraint and bounded queue length constraint are satisfied, then the value of SiS_{i} is 1. We call this kind of flow a schedulable flow. Otherwise, it is 0.

Si={1,if fi is a schedulable flow0,otherwise.\displaystyle S_{i}=\left\{\begin{matrix}1,&\text{if $f_{i}$ is a schedulable flow}\\ 0,&\text{otherwise}\end{matrix}\right.\text{.} (14)

The constraint on bounded queue length necessitates that the cumulative number of packets from all flows in any given queue not surpass the designated queue capacity, i.e.,

\displaystyle\forall i{0,1,2,,n1},\displaystyle i\in\left\{0,1,2,...,n-1\right\}, (15)
\displaystyle\forall ekpi,k{1,2,,j},t{0,1,,β1},\displaystyle e_{k}\in p_{i},k\in\left\{1,2,...,j\right\},\forall t\in\left\{0,1,...,\beta-1\right\},
i=0n1Si×M(fi,QE(ek)T(t))×PKiL.\displaystyle\sum_{i=0}^{n-1}S_{i}\times M(f_{i},Q_{E_{(e_{k})}}^{T_{(t)}})\times PK_{i}\leq L.

In this paper, the optimization objective is to maximize the number of schedulable TS flows, which is described as:

𝐂𝐓𝐏:max𝛀,𝚫i=0n1Si\mathbf{CTP:}\quad\max_{\mathbf{\Omega},\mathbf{\Delta}}\ \sum_{i=0}^{n-1}S_{i}\qquad\quad (16)
𝐬.𝐭.(6),(7),(8),(10),(12),(13),(14),(15)\mathbf{s.t.}\quad(6),(7),(8),(10),(12),(13),(14),(15)

where 𝛀\mathbf{\Omega} is the variable of flow offsets ( 𝛀=[Ω0,,Ωn1]T\mathbf{\Omega}=\left[\Omega_{0},...,\Omega_{n-1}\right]^{T}), and 𝚫\mathbf{\Delta} is the variable of cycle shifts of flows (𝚫=[𝚫0,,𝚫n1]T\mathbf{\ \Delta}=\left[\mathbf{\Delta}_{0},...,\mathbf{\Delta}_{n-1}\right]^{T}, 𝚫i=[Δi,1,,Δi,j]T\mathbf{\ \Delta}_{i}=\left[\Delta_{i,1},...,\Delta_{i,j}\right]^{T}).

IV-D Schedulability Analysis

In this paper, schedulability refers to the number of time-sensitive flows that could be scheduled by the network under constrained network resources and desired quality of service. Many factors such as traffic characteristics, flow sequence, and topology size, may affect scheduling capabilities. One of the most important factors is the configurable parameter of queue length LL. In (15), it seems that as LL becomes larger, the number of packets each queue can hold increases, so the number of schedulable flows i=0n1Si\sum_{i=0}^{n-1}S_{i} improves (i.e., i=0n1SiL\sum_{i=0}^{n-1}S_{i}\propto L). Instead, we derive Theorem 1:

Theorem 1.

When the total network resources are constant (due to limited on-chip memory), the schedulability increases as the queue length LL becomes smaller, i.e.,

i=0n1Si1L.\displaystyle\sum_{i=0}^{n-1}S_{i}\propto\frac{1}{L}. (17)
Proof.

In (13), the total network resources are the number of resource blocks QE(ek)T(t)Q_{E_{(e_{k})}}^{T_{(t)}} with the cycle T(t)T_{(t)} and edge E(ek)E_{(e_{k})}. For the flow mapping M(fi,QE(ek)T(t))M(f_{i},Q_{E_{(e_{k})}}^{T_{(t)}}), the search space is i=0n1SPiTcycle×(N1)n\prod_{i=0}^{n-1}\frac{SP_{i}}{T_{cycle}}\times(N-1)^{n}, where nn is the number of flows and NN is the queue number. Thus, we have:

i=0n1Sii=0n1M(fi,QE(ek)T(t))1Tcycle.\displaystyle\sum_{i=0}^{n-1}S_{i}\propto\sum_{i=0}^{n-1}M(f_{i},Q_{E_{(e_{k})}}^{T_{(t)}})\propto\frac{1}{T_{cycle}}. (18)

In (8), there is:

Tcycleδp+L×MTUBwL.\displaystyle T_{cycle}\geq\delta_{p}+\frac{L\times MTU}{Bw}\propto L. (19)

Hence, derived from (18) and (19), there is i=0n1Si1L\sum_{i=0}^{n-1}S_{i}\propto\frac{1}{L}. Theorem 1 is proofed. ∎

Corollary 1.

When the queue length LL is set to the minimum value of 1, (13)-(15) can be relaxed to the well-investigated frame isolation constraints [24], in which the schedulability is maximized.

Proof.

When LL takes the minimum value of 1, it means that each cycle T(t)T_{(t)} of each edge E(ek)E_{(e_{k})} can only store one packet. We assume that the packet number of each flow (i.e., PKiPK_{i}) is no more than one. Then, the bounded queue length constraints in (13)-(15) will be relaxed as follows:

fi,fj,ek=(pipj),ij,\forall f_{i},f_{j}\in\mathcal{F},\ e_{k}=(p_{i}\cap p_{j})\in\mathcal{E},i\neq j,

x{0,,HypercycleSPi1},\forall x\in\left\{0,...,\frac{Hyper_{cycle}}{SP_{i}}-1\right\},

y{0,,HypercycleSPj1}:\forall y\in\left\{0,...,\frac{Hyper_{cycle}}{SP_{j}}-1\right\}:

(A(fi,ek)+Δ(fi,ek)+xSPiTcycleA(fj,ek)+Δ(fj,ek)+ySPjTcycle)(A_{(f_{i},e_{k})}+\Delta_{(f_{i},e_{k})}+x\cdot\frac{SP_{i}}{T_{cycle}}\geq A_{(f_{j},e_{k})}+\Delta_{(f_{j},e_{k})}+y\cdot\frac{SP_{j}}{T_{cycle}})\vee
(A(fj,ek)+Δ(fj,ek)+ySPjTcycleA(fi,ek)+Δ(fi,ek)+xSPiTcycle)(A_{(f_{j},e_{k})}+\Delta_{(f_{j},e_{k})}+y\cdot\frac{SP_{j}}{T_{cycle}}\geq A_{(f_{i},e_{k})}+\Delta_{(f_{i},e_{k})}+x\cdot\frac{SP_{i}}{T_{cycle}}) (20)

Equation (20) indicates that for any two flows fif_{i} and fjf_{j} in any sending period, there are two ways to avoid scheduling conflicts. The first is that the transmission time slot of flow fif_{i} is after flow fjf_{j}, i.e., the left side of \vee. The second is that the transmission time slot of flow fif_{i} is before flow fjf_{j}, i.e., the right side of \vee. Then, each flow independently occupies a cycle that can transimit an MTU-sized Ethernet frame. Since the packet size of flows (e.g., 100 Bytes) may be smaller than the MTU size, (20) still causes the waste of underlying time slot resources. Further, we assume the specific transmission duration of a flow fif_{i} is Θi\Theta_{i} and tA(fi,ek)t_{A_{(f_{i},e_{k})}} is the specific time point that packet may arrive. (20) is converted to:

fi,fj,ek=(pipj),ij,\forall f_{i},f_{j}\in\mathcal{F},\ e_{k}=(p_{i}\cap p_{j})\in\mathcal{E},i\neq j,

x{0,,HypercycleSPi1},\forall x\in\left\{0,...,\frac{Hyper_{cycle}}{SP_{i}}-1\right\},

y{0,,HypercycleSPj1}:\forall y\in\left\{0,...,\frac{Hyper_{cycle}}{SP_{j}}-1\right\}:

(tA(fi,ek)+xSPitA(fj,ek)+Θj+ySPj)(t_{A_{(f_{i},e_{k})}}+x\cdot SP_{i}\geq t_{A_{(f_{j},e_{k})}}+\Theta_{j}+y\cdot SP_{j})\vee
(tA(fj,ek)+ySPjtA(fi,ek)+Θi+xSPi)(t_{A_{(f_{j},e_{k})}}+y\cdot SP_{j}\geq t_{A_{(f_{i},e_{k})}}+\Theta_{i}+x\cdot SP_{i}) (21)

Equation (21) is the frame isolation constraints [24], in which the discrete equal cycles are converted to continuous time resources. Each frame occupies a minimum time slot resource that is the same as its transmission duration. Hence, the scheduling capacity is maximized. ∎

We adopt the bounded queue length constraints in (15) instead of frame isolation constraints in (21) for the following reasons. First, unlike LANs, it is hard to obtain fine-grained traffic characteristics (such as packet size or transmission duration) for all Industrial IoT flows in wide-area scheduling. Second, there is inevitable traffic aggregation in wide-area networks that causes queuing. Finally, the execution time of the solution grows exponentially as the queue length gets smaller. Thus, the queue length LL should be set to an appropriate value to balance the schedulability and time costs.

V Algorithm Design

This section elaborates on the implementation of cycle tags computation, including the path selection, the basic flow scheduling, and the enhanced flow sequence algorithm.

V-A Design Guidelines

The most naive method to calculate the SID information for TS flows is formulating multiple constraints and inputting the flows’ parameters to the integer programming solver. However, this method is memory-intensive and may cost several hours to obtain a premium scheme for long-distance Industrial IoT scenarios. Fundamentally, the scheduling problem parallels the bin packing problem, which is NP-hard[14]. Hence, obtaining the optimal solution within a practical timeframe might be unattainable.

To reduce the complexity and improve the schedulability, we opt for computation-intensive heuristic methods to address this issue. Similar to the idea in [27], we split the CTP problem into a basic flow scheduling problem and an enhanced flow sequencing problem. In incremental online scheduling scenarios, the basic flow scheduling algorithm targets to quickly compute cycle tags for an ordered set of flows. For offline optimization contexts, the enhanced flow sequencing algorithm, which leverages the meta-heuristic Tabu search, focuses on establishing a complete order of the flow set to optimize the count of schedulable flows.

Input: Flow set: \mathcal{F}, Edge-cycle resource: QE(ek)T(t)Q_{E_{(e_{k})}}^{T(t)}
Output: Scheduled flow set suc\mathcal{F}_{suc}
1 for  fif_{i} in \mathcal{F}  do
2       initΩi=0,𝚫i=0init\ \forall\ \Omega_{i}=0,\mathbf{\Delta}_{i}=0;
3       Init_result(fi,QE(ek)T(t))Init\_result(f_{i},Q_{E_{(e_{k})}}^{T(t)}) according to (12)-(15);
4       if S(fi)=1S(f_{i})=1 then
5             FsucfiF_{suc}\leftarrow f_{i};
6             Break;
7            
8      else
9            
10            while Ωi<SPiTcycle\Omega_{i}<\frac{SP_{i}}{T_{cycle}} do
11                   for  eke_{k} in pip_{i} and M(fi,QE(ek)T(t))=0M(f_{i},Q_{E_{(e_{k})}}^{T(t)})=0  do
12                         while Δ(fi,ek)N2\Delta_{(f_{i},e_{k})}\leqslant N-2  do
                               Δ(fi,ek)++\Delta_{(f_{i},e_{k})}++, Compute(fi,QE(ek)T(t))Compute(f_{i},Q_{E_{(e_{k})}}^{T(t)}) according to (13) ;
                                /* Cycle Shift Part */
13                               if M(fi,QE(ek)T(t))=1M(f_{i},Q_{E_{(e_{k})}}^{T(t)})=1 then
14                                     Break;
15                              
16                        
17                  if S(fi)=1S(f_{i})=1 then
18                         FsucfiF_{suc}\leftarrow f_{i};
19                         Break;
20                        
21                  else
                         Ωi++\Omega_{i}++ ;
                          /* Flow Offset Part */
22                        
23                  
24                  FfaifiF_{fai}\leftarrow f_{i};
25                  
26            
27      
28
29return Ωi,𝚫i,suc\Omega_{i},\mathbf{\Delta}_{i},\mathcal{F}_{suc};
Algorithm 1 FO-CS Algorithm

V-B Path Selection

Generally, periodic TS flows account for a relatively small portion of bandwidth (e.g., 7% for scheduled flows in literature[6] and no more than 20% for critical control streams in literature [19]) compared to BE flows. For example, the differential protection traffic is just 64 kbps [4], but requires millisecond-level delay and microsecond-level jitter. Thus, to meet such stringent delay demands, the link delay weighs more than the bandwidth. In this study, we focus on CSQF scheduling and employ a weighted shortest path routing approach based on Dijkstra’s algorithm. The link delay is denoted as the weight of each edge, and the path with the smallest end-to-end weight is selected as the routing path. The time complexity is O(|V|log|V|+|E|)O(\left|V\right|\log\left|V\right|+\left|E\right|), where |V|\left|V\right| is the number of vertexes and |E|\left|E\right| is the number of edges. Moreover, plenty of works have been done on the realization of routing for time-sensitive networks[9], such as Equal Cost Multi-Pathing (ECMP), Maximum Scheduled Traffic Load (MSTL), and segment routing. A load balancing based on CSQF is presented in [10], which can be applied to reduce the single point of congestion with additional complexity. Routing optimization with heuristic algorithms will be considered as future work.

V-C Basic Flow Scheduling Algorithm

Based on the insights from Section III.C, our basic scheduling algorithm encompasses the cycle shift (CS), flow offset (FO), and a combined FO-CS algorithm. The FO-CS algorithm integrates elements from both the FO and CS. The FO algorithm operates under the premise that cycle shift operations in network output ports are zero, catering to situations where switches lack more than two queues. Simultaneously, the CS algorithm posits that TS traffic is dispatched with unpredictable initial times (offsets), addressing instances where the access arrival time point is uncontrolled.

The FO-CS algorithm sets both the offset value and cycle shift value to zero, sequencing the flows in a predetermined order, as outlined in Algorithm 1. For each flow fif_{i}, the initial step determines whether S(fi)S(f_{i}) is 1 according to constraints (12)-(15). If S(fi)S(f_{i}) is 1, fif_{i} will be put into FsucF_{suc} (lines 1-6). Subsequently, if the flow is deemed unschedulable, the algorithm identifies the node where the mapping was unsuccessful. It then incrementally adjusts the cycle at that specific node, ensuring it stays within the constraints of the receiving queue’s capacity (lines 9-13). Once a flow fif_{i} is scheduled successfully along a route, it will be placed into the FsucF_{suc} set (lines 14-16). Otherwise, the value of flow offset is increased by one and re-operates the cycle shift part considering the constraint of offset(lines 17-18). If the flow still cannot be scheduled after traversing all the flow offset and cycle shift operations, the flow will be placed into FfaiF_{fai} (line 19). Finally, the algorithm outputs scheduling parameters of Ωi\Omega_{i} and 𝚫i\mathbf{\Delta}_{i} for each scheduled flow fif_{i} in schedulable flow set FsucF_{suc}. The CS part is preferentially executed because it has a smaller search space and lower time complexity than FO. Note that the worst-case time complexity of this FO-CS algorithm is O(i=0n1SPiTcycle×N×H)O(\sum_{i=0}^{n-1}\frac{SP_{i}}{T_{cycle}}\times N\times H), where nn is the number of flows, NN is the queue number at each output port, and HH is the number of hops. The queue number NN and the hop number HH are bounded in a specific network. Therefore, the worst-case time complexity is O(i=0n1SPiTcycle)O(\sum_{i=0}^{n-1}\frac{SP_{i}}{T_{cycle}}) for the FO-CS algorithm.

The FO-CS algorithm is flexible and efficient within the following three aspects. First, the maximum queue length and queue number can be adjusted with the increase of flow number and topology size. Second, the FO algorithm and CS algorithm can be utilized respectively under different scheduling scenarios, such as symmetric and asymmetric topologies. In symmetric topologies, traffic aggregation can be greatly alleviated by first-hop shaping of access switches; thus the flow offset algorithm works well independently and reduces the computational overhead. Third, the FO-CS algorithm quickly generates incremental flow scheduling solutions, which supports online long-distance Industrial IoT traffic transmission.

Input: Flow set: \mathcal{F}, Edge-cycle resource: QE(ek)T(t)Q_{E_{(e_{k})}}^{T(t)}
Output: Scheduled flow set suc\mathcal{F}_{suc}
1 curr_resultInit_result(,QE(ek)T(t))curr\_result\leftarrow Init\_result(\mathcal{F},Q_{E_{(e_{k})}}^{T(t)}) ;
2 best_orderCurr_order(curr_result)best\_order\leftarrow Curr\_order(curr\_result) ;
3 best_resultcurr_resultbest\_result\leftarrow curr\_result ;
4 while Termination criteria not satisifed do
5       curr_orderNeighbor(curr_order)curr\_order\leftarrow Neighbor(curr\_order) ;
6       curr_resultGen_best(curr_order)curr\_result\leftarrow Gen\_best(curr\_order) ;
7       if curr_resultcurr\_result better than best_resultbest\_result then
8             best_ordercurr_orderbest\_order\leftarrow curr\_order ;
9             best_resultcurr_resultbest\_result\leftarrow curr\_result ;
10            
11      
12return best_order,best_result,F_sucbest\_order,best\_result,F\_{suc};
Algorithm 2 Tabu FO-CS Algorithm

V-D Enhanced Flow Sequence Algorithm

The enhanced flow sequence algorithm creates a varied scheduling order for the flow set FF, to maximize the resulting number of schedulable time-sensitive flows computed by the FO-CS algorithm. The maximum number of the search space for the sequencing problem is n!n!, where nn is the number of flows. Since the brute force approach cannot be scaled to large problem sizes, it is unacceptable in real-world applications. There are many mete-heuristic algorithms to approximate the optimal solution. Due to the advantage of recording the previously searched solutions, we utilize the Tabu search[27] with a simplified Tabu list as a guided exploration of the solution space. Wide-area deployment often is incapable of knowing all traffic prior. Thus, feasible online solutions are more appropriate than optimal offline solutions. We leave other mete-heuristic offline searching strategy with domain-specific knowledge (DSK) as future work.

As outlined in Algorithm 2, the Tabu FO-CS algorithm generates the initial results using a random order, and defines it as the current result (lines 1-3). Then, the neighborhood of the current order is derived from the exchanging mode[13]. In this mode, a subset of mapped flows in FsucF_{suc} are randomly removed by cleaning the queue resource block associated with these flows. Following this, the flows in FfaiF_{fai} are integrated into FsucF_{suc} until no enough network resources can be allocated (lines 5-6). Exchange operations are recorded in (and removed from) the Tabu list to avoid local optima. If the current result is better than the previous best result, it will be marked as the best result and selected as the next solution for the next iteration. To reduce the superfluous search, the termination criteria are set based on two conditions: either the number of iterations surpasses the maximum threshold KK, or there is no improvement observed in the best result over the past PP iterations (line 4). The efficacy of the Tabu FO-CS algorithm can be adjusted by varying the values of KK and PP. While setting larger values for both parameters might lead to superior outcomes, it could significantly prolong the computation time.

Refer to caption
Figure 7: ER topology: an example of graph G(15, 18).
Refer to caption
(a) Naive vs Flow offset and cycle shift (FO-CS).
Refer to caption
(b) Effect of queue number on cycle shift (CS).
Refer to caption
(c) Effect of memory allocation on FO-CS.
Figure 8: Simulation results for the influence of FO-CS algorithms on the number of schedulable flows.

VI Evaluations

This section presents the simulation results of FO-CS and Tabu FO-CS algorithms. Firstly, we outline the simulation setup. Then, we analyze the algorithm performance, including the number of schedulable flows, time costs, and scalability.

VI-A Simulation Setup

All evaluations are conducted on a computing device powered by four Intel i5-8259U CPUs, operating at a base clock speed of 2.3 GHz, and complemented with 16 GB of RAM.

VI-A1 Topology Selection

The INTERNET2[28] stands as a pivotal advanced network where research and trials of emerging technologies are conducted. These innovations are then integrated into the next iteration of the Internet, including technologies like IPv6, MPLS, and QoS. Industrial control from remote locations frequently encompasses long-distance transmissions across various regions. To assess the efficacy of our proposed mechanism, we select a segment from the advanced Layer 3 service of INTERNET2’s backbone in 2016 as a test topology[28]. This segment comprises eight nodes situated in cities including Atlanta, Chicago, Cleveland, Ashburn, Washington, and New York. The geographical distance between these nodes serves as a proxy for the link length. The link delay is computed by dividing the link length by two-thirds the speed of light. To verify the effect of the link connectivity, we leverage the Erdo¨\ddot{o}s–Re´\acute{e}nyi (ER) model to build a directed weighted random graph with fifteen vertices. An instance of the G(n,m)G_{(n,m)} random topology is depicted in Fig. 7, where nn indicates the number of nodes and mm indicates the number of edges[9][16]. The link delay is randomly selected from 0.1 ms to 2 ms.

VI-A2 Resource Configuration

In our experiments, we configure resources based on parameters such as link bandwidth, queue length, TcycleT_{cycle} size, and queue count. Specifically, we allocate a reserved link bandwidth of 1 Gbps, establish each CSQF queue’s length at 10, and define the TcycleT_{cycle} size as 125 μs\mu s. If the time-sensitive packets do not require a relatively low deadline and the on-chip memory is surplus, the queue length can be set larger. The TcycleT_{cycle} size is set to 125 μs\mu s for three reasons. First, the transmission delay for 10 MTU-sized packets is about 120 μs\mu s according to the (8). Second, the minimum value of TcycleT_{cycle} is selected to increase the search space of the cycle time. Third, the TcycleT_{cycle} better be a divisor of HypercycleHyper_{cycle} to simplify the calculation. For TS traffic, the queue count NN is set to vary between 2 and 6. When NN equals 2, it implies that additional cycle shifts cannot be accommodated.

VI-A3 Traffic Characteristics

For each flow ff, its source and destination are determined by randomly selecting two distinct nodes with a uniform probability. Flows are created in alignment with the traffic patterns observed in wide area control and monitoring systems (as outlined in the IEC 61850) and the industrial machine-to-machine context of the DetNet use case[26][19][29]. Typically, the sending period of every flow is in the range of milliseconds, we emulate it by stochastically selecting one item from the assembly of {4,8,16,32}\left\{4,8,16,32\right\} ms. The number of packets in each period for a given flow is chosen from the assembly of {1,2,3}\left\{1,2,3\right\}. The deadline of flows ranges from 30 ms to 50 ms.

Refer to caption
(a) Naive vs Flow offset and cycle shift (FO-CS).
Refer to caption
(b) Effect of queue number on cycle shift (CS).
Refer to caption
(c) Effect of memory allocation on FO-CS.
Figure 9: Simulation results for the influence of FO-CS algorithms on the execution time.

VI-B Simulation Results for FO-CS

VI-B1 Impact on the Schedulability

The schedulability is indicated by the number of schedulable flows. Under the condition of Internet2 topology, we partition the flow counts into four groups from 1000 to 4000, and each group is executed five times to count average scheduled flows. The default queue number is set to 3.

Firstly, we juxtapose the performance of FO-CS algorithm with that of FO, CS, and naive algorithms, considering varying flow counts as presented in Fig. 8(a). Specifically, the naive algorithm dispatches packets as they’re produced, without regulating the cycle shift or sending time. To compare the performances of CSQF with other mechanisms, the FO algorithm with two queues, which decides the packet’s arrival cycle offset at the first hop, can be considered a benchmark of the ITP[13]. Damper[30] defers packets for a specified amount of time hop by hop. The CS algorithm with more than two queues, which optimizes the selection of receiving queues at each node, can be considered a variant of the Damper. As we scale up the flow number, the advantages of FO-CS become more pronounced compared to the naive approach. The maximum improvement observed is a commendable 31.2% over the naive approach and 9.2% over the CS under dealing with 4000 flows. Fig. 8(a) further indicates that FO’s scheduling capability is nearly on par with FO-CS. This is because the flow offset operation offers a broader search space than the cycle shift, making offset control more impactful than managing the cycle shift at every hop. For individual flow scheduling in high-volume traffic scenarios, FO-CS remains valuable, offering the benefit of incremental cycle adjustments at each hop.

In situations where the flow offset is unmanageable at the access node, the CS algorithm can operate independently with varying queue numbers. Fig. 8(b) examines the distinctions among the CS-3Q, CS-4Q, CS-5Q, and CS-6Q algorithms. The CS-6Q algorithm consistently outperforms the others across all flow levels. The performance disparity between CS-6Q and CS-3Q fluctuates between 2.4% and 7.18%. Notably, as flow numbers rise, the effectiveness of the CS algorithm improves more markedly with a large queue number.

Since the on-chip memory is limited, Fig. 8(c) evaluates the effect of memory allocation for FO-CS algorithm. Assuming the buffer is sixty packets at each output port, we divide the buffer into three solutions: L=10 and N=6, L=15 and N=4, L=20 and N=3. Evaluation results show that the queue length of 10 has better schedulability than the other two. The maximal improvement is 7.2% compared to the queue length of 20 when the flow number is 3000. Thus, fine-grained queue division can improve the scheduling capability.

VI-B2 Impact on the Execution Time

The algorithm execution time is independent of the flows’ sending period. Before sending packets, the talker sends requests to the controller, ensuring that time slot resources are strictly reserved in all sending periods. Thus, the algorithm just needs to be executed once when a flow is initially considered to be accommodated. Fig. 9(a) depicts the cumulative distribution function (CDF) of per-flow execution time for FO-CS, FO, CS, and naive algorithms. For the FO-CS approach, each flow’s execution time does not exceed 18 milliseconds, 90% of per-flow execution times are under 6 milliseconds, and the total time for 4000 flows is about 20 seconds, revealing that all our algorithms have a feasible time for execution. The CS curve is on top of the FO and the FO-CS, suggesting that managing the per-flow offset operation is more time-consuming than adjusting the per-node cycle shift. Fig. 9(b) shows the total execution time of the CS algorithm when scheduling 1000, 2000, 3000, and 4000 flows respectively. The total execution time of CS algorithms with different queue numbers varies from 0.41 seconds to 2.87 seconds. The cycle shift with a larger queue number will slightly increase the running time.

Fig. 9(c) shows the total running time of the FO-CS algorithm with different flow number groups and memory allocation solutions. When scheduling 1000 flows, the execution time for all solutions maintains at the same low level. However, the execution time of the first solution (L=10 and N=6) increases sharply when the flow number increases. At the flow level of 4000, the execution time of the first solution is twice that of the second solution and four times that of the third solution. Consequently, the queue division is not as fine as possible when considering the execution time overhead.

Refer to caption
(a) Impact on the schedulable flow number.
Refer to caption
(b) Impact on the execution time.
Refer to caption
(c) Effect of the link connectivity.
Figure 10: Simulation results for the Tabu FO-CS algorithms under different topologies.

VI-C Simulation Results for Tabu FO-CS

Furthermore, we evaluate the performance of Tabu FO-CS under different topologies, including the linear, the ring, and a part of Internet2. For the termination criteria in Algorithm 2, we set the maximum iterations KK to 1000 and the maximum repetitions PP to 100. The queue length of 10 and queue number of 4 are adopted for the FO-CS algorithm based on the previous evaluations. Each test is performed five times, and we calculate the average number of schedulable flows and the mean time consumed.

VI-C1 Impact on the Schedulability

In Fig. 10(a), we juxtapose the performance of the Tabu FO-CS algorithm against the FO-CS and naive algorithms. The evaluations show that the Tabu FO-CS algorithm can schedule 94.45% of flows at the level of 2000 flows under the topology of Internet2. In all topologies, the Tabu FO-CS algorithm consistently outperforms the FO-CS algorithm in scheduling outcomes. The maximal improvement is 7.9% compared to FO-CS under the ring topology, and 31.65% compared to the naive algorithm under the topology of Internet2.

VI-C2 Impact on the Execution Time

Fig. 10(b) illustrates the execution time of the above algorithms. We take the logarithmic function of log10 for the execution time as its value varies widely. The evaluations exhibit that the execution time of the Tabu FO-CS algorithm is on the order of ten thousand seconds, while the FO-CS algorithm is on the order of ten seconds. Thus, the Tabu FO-CS algorithm is suitable for offline optimization scenarios, and the FO-CS algorithm can be applied to the rapid generation of a scheduling solution.

VI-C3 Effect of the Link Connectivity

Another key performance of the algorithm is scalability. The number of links in the network will have a certain impact on the number of schedulable flows and algorithm execution time. As depicted in Fig. 10(c), in the case of 15 links, the Tabu FO-CS algorithm successfully schedules 88.25% of the flows with an average time cost of 2.9 hours. In the case of 24 links, the number of schedulable flows improves by 11.75% with a reduction of 36.68% in the average execution time. The reason is that increased links provide more time slot resources and reduce the possibility of scheduling failures.

VII Related Works

There are plenty of related works about small-scale deterministic flow transmission in local Industrial IoT systems, but few works on that in large-scale Industrial Internet. Next, we mainly present related works around the CSQF-based time-sensitive scheduling mechanism.

Small-scale Time-sensitive Networks: In automotive, aerospace, and Industrial IoT scenarios, the enhanced real-time Ethernet technologies, such as the Time-Triggered Ethernet and TSN, are replacing the traditional fieldbus. Based on global time synchronization, TTE requires strict planning of the sending start time of each packet. The authors in [31] studied the synthesis of scheduling time tables in TTE with SMT/OMT solver. Furthermore, TSN provides a series of time-based gate-controlled mechanisms to guarantee bounded-delay transmission. The majority of research on TSN centers around the creation and refinement of gate control lists[16][32][33]. Recently, Yan et al.[13] proposed planning methods to map the flows onto the ping-pong queue resources of CQF.

Long-distance Industrial IoT Networks: CQF is extended to the CSQF to enable the multi-queues scheduling by the IETF DetNet working group. The study [34] examined the CQF and Paternoster mechanisms within a standard industrial control loop, taking into account different link delays. The authors of [35] proposed a C-TSDN architecture, in which the CQF and CSQF protocols are jointly designed to realize seamless scheduling for factory IoT infrastructure. [17] managed to provide layer-3 time-sensitive transmission down to the field level, which achieves remote industrial control in a heterogeneous network. Moreover, Large-scale Deterministic Network (LDN)[36] classifies cycle mapping into swap mode and stack mode, and emphasizes the ingress shaping function[22]. CSQF can be considered as the stack-mode-based LDN. The authors of [14] addressed the joint routing and scheduling issues for CSQF. They target to the path generation with feasible arc-cycle capacity, which cannot adaptively adjust the cycle tags. We solve the cycle tag computation problem, especially considering the long-distance link delay and adjacent cycle mapping relationship. To our knowledge, this is the pioneering study introducing the global cycle tag planning for the CSQF.

VIII Conclusion

This study introduced the CTP, a comprehensive integer programming framework tailored for CSQF-driven network-wide TS flow scheduling, which can make CSQF practical for long-distance Industrial IoT scenarios. The model decouples link delays from the cycle time, ensuring uniform queue rotation durations and addressing varying link delays by mapping the arriving cycle to a specific receiving queue. To avoid queue overflows under traffic aggregations, we devised the heuristic FO-CS algorithm for efficient cycle tag calculation. Empirical evaluations underscored the efficacy of FO-CS, marking a notable 31.2% enhancement in the number of schedulable flows compared to the Naive method. The Tabu FO-CS algorithm approaches 94.45% in scheduling 2000 flows. In the future, we will optimize multiple objectives and leverage deep reinforcement learning to solve the model.

References

  • [1] S. Vitturi, C. Zunino, and T. Sauter, “Industrial communication systems and their future challenges: next-generation Ethernet, IIoT, and 5G,” Proceedings of the IEEE, vol. 107, no. 6, pp. 944–961, 2019.
  • [2] M. Ulbricht, S. Senk, H. K. Nazari, H.-H. Liu, M. Reisslein, G. T. Nguyen, and F. H. P. Fitzek, “Tsn-flextest: Flexible tsn measurement testbed,” IEEE Transactions on Network and Service Management, 2023.
  • [3] I. Pelle, F. Paolucci, B. Sonkoly, and F. Cugini, “Latency-sensitive edge/cloud serverless dynamic deployment over telemetry-based packet-optical network,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 9, pp. 2849–2863, 2021.
  • [4] B. Hu and H. Gharavi, “A hybrid wired/wireless deterministic network for smart grid,” IEEE Wireless Communications, vol. 28, no. 3, pp. 138–143, 2021.
  • [5] M. Groshev, C. Guimarães, J. Martín-Pérez, and A. de la Oliva, “Toward intelligent cyber-physical systems: digital twin meets artificial intelligence,” IEEE Communications Magazine, vol. 59, no. 8, pp. 14–20, 2021.
  • [6] A. Nasrallah, A. S. Thyagaturu, Z. Alharbi, C. Wang, X. Shao, M. Reisslein, and H. ElBakoury, “Ultra-low latency (ULL) networks: the IEEE TSN and IETF DetNet standards and related 5G ULL research,” IEEE Communications Surveys Tutorials, vol. 21, no. 1, pp. 88–145, 2019.
  • [7] L. Zhao, P. Pop, and S. Steinhorst, “Quantitative performance comparison of various traffic shapers in time-sensitive networking,” IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 2899–2928, 2022.
  • [8] ITU-R, IMT traffic estimates for the years 2020 to 2030, 2015, https://www.itu.int/dms_pub/itu-r/opb/rep/R-REP-M.2370-2015-PDF-E.pdf.
  • [9] N. G. Nayak, F. Dürr, and K. Rothermel, “Incremental flow scheduling and routing in time-sensitive software-defined networks,” IEEE Transactions on Industrial Informatics, vol. 14, no. 5, pp. 2066–2075, 2017.
  • [10] S. Chen, J. Leguay, S. Martin, and P. Medagliani, “Load balancing for deterministic networks,” in Proc. 2020 IFIP Networking, 2020, pp. 785–790.
  • [11] Y. Huang, S. Wang, S. Zhu et al., “Programmable cycle-specified queue for deterministic networking,” in Proceedings of the ACM SIGCOMM Conference, 2023, pp. 1132–1134.
  • [12] S. Wang, B. Wu, C. Zhang, Y. Huang, T. Huang, and Y. Liu, “Large-scale deterministic IP networks on CENI,” in Proc. IEEE INFOCOM WKSHPS, 2021, pp. 1–6.
  • [13] J. Yan, W. Quan, X. Jiang, and Z. Sun, “Injection time planning: making CQF practical in time-sensitive networking,” in Proc. IEEE INFOCOM, 2020, pp. 616–625.
  • [14] J. Krolikowski, S. Martin, P. Medagliani, J. Leguay, S. Chen, X. Chang, and X. Geng, “Joint routing and scheduling for large-scale deterministic ip networks,” Computer Communications, vol. 165, pp. 33–42, 2021.
  • [15] Y. Huang, S. Wang, X. Zhang, T. Huang, and Y. Liu, “Flexible cyclic queuing and forwarding for time-sensitive software-defined networks,” IEEE Transactions on Network and Service Management, vol. 20, no. 1, pp. 533–546, 2023.
  • [16] J. Falk, F. Dürr, and K. Rothermel, “Exploring practical limitations of joint routing and scheduling for TSN with ILP,” in Proc. IEEE Embedded and Real-Time Computing Systems and Applications, 2018, pp. 136–146.
  • [17] A. Badar, D. Z. Lou, U. Graf, C. Barth, and C. Stich, “Intelligent edge control with deterministic-IP based industrial communication in process automation,” in Proc. Network and Service Management, 2019, pp. 1–7.
  • [18] 3GPP TS22261 v16.2.0. Service requirements for the 5G system, 2017, https://www.3gpp.org/ftp//Specs/archive/22_series/22.261/22261-g20.zip.
  • [19] IETF deterministic networking use cases. [Online]. Available: https://datatracker.ietf.org/doc/rfc8578/.
  • [20] “IEEE standard for local and metropolitan area networks - timing and synchronization for time-sensitive applications in bridged local area networks,” IEEE Std 802.1AS-2011, pp. 1–292, 2011.
  • [21] J.-L. Ferrant, M. Gilson, S. Jobert, M. Mayer, M. Ouellette, L. Montini, S. Rodrigues, and S. Ruffini, “Synchronous Ethernet: a method to transport synchronization,” IEEE Communications Magazine, vol. 46, no. 9, pp. 126–134, 2008.
  • [22] B. Liu, S. Ren, C. Wang et al., “Towards large-scale deterministic IP networks,” in IFIP Networking Conference, 2021, pp. 1–9.
  • [23] Y. Huang, S. Wang, T. Feng, J. Wang, T. Huang, R. Huo, and Y. Liu, “Towards network-wide scheduling for cyclic traffic in IP-based deterministic networks,” in 2021 4th International Conference on Hot Information-Centric Networking (HotICN), 2021.
  • [24] M. Vlk, Z. Hanzálek, K. Brejchová, S. Tang, S. Bhattacharjee, and S. Fu, “Enhancing schedulability and throughput of time-triggered traffic in ieee 802.1qbv time-sensitive networks,” IEEE Transactions on Communications, vol. 68, no. 11, pp. 7023–7038, 2020.
  • [25] A. Larrañaga, M. C. Lucas-Estañ, I. Martinez, I. Val, and J. Gozalvez, “Analysis of 5g-tsn integration to support industry 4.0,” in IEEE ETFA, 2020, pp. 1111–1114.
  • [26] IEC 60802 Standard. [Online]. Available: http://grouper.ieee.org/groups/802/1/files/public/docs2019/60802-Hotta-Traffic-Types-Mapping-to-TSN-Mechanism-0119-v01.
  • [27] R. Macchiaroli, S. Mole, and S. Riemma, “Modelling and optimization of industrial manufacturing processes subject to no-wait constraints,” International Journal of Production Research, vol. 37, no. 11, pp. 2585–2607, 1999.
  • [28] J. Castillo-Velazquez, D. Serrano-Martinez, and A. Morales, “Emulation of the connectivity of backbone and management for the layer 3 service of internet2: 2016 Topology,” in Proc. IEEE Central America and Panama Convention, 2017, pp. 1–4.
  • [29] D. Paul, A. Astrit, and P. David, “Time sensitive networks for flexible manufacturing testbed - description of converged traffic types.” [Online]. Available: https://hub.iiconsortium.org/tsn-converged-traffic-types.
  • [30] E. Mohammadpour and J.-Y. Le Boudec, “Analysis of dampers in time-sensitive networks with non-ideal clocks,” IEEE/ACM Transactions on Networking, vol. 30, no. 4, pp. 1780–1794, 2022.
  • [31] W. Steiner, “An evaluation of SMT-based schedule synthesis for time-triggered multi-hop networks,” in Proc. Real Time Syst. Symp., 2010, pp. 375–384.
  • [32] Z. Feng, M. Cai, and Q. Deng, “An efficient pro-active fault-tolerance scheduling of ieee 802.1qbv time-sensitive network,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14 501–14 510, 2022.
  • [33] G. Miranda, E. Municio, J. Haxhibeqiri, J. Hoebeke, I. Moerman, and J. M. Marquez-Barja, “Enabling time-sensitive network management over multi-domain wired/wi-fi networks,” IEEE Transactions on Network and Service Management, vol. 20, no. 3, pp. 2386–2399, 2023.
  • [34] A. Nasrallah, V. Balasubramanian, A. S. Thyagaturu, M. Reisslein, and H. Elbakoury, “Large scale deterministic networking: a simulation evaluation,” ArXiv, vol. abs/1910.00162, 2019.
  • [35] Y. Huang, S. Wang, T. Huang, and Y. Liu, “Cycle-based time-sensitive and deterministic networks: Architecture, challenges, and open issues,” IEEE Communications Magazine, vol. 60, no. 6, pp. 81–87, 2022.
  • [36] Q. li, X. Geng, B. Liu, T. Eckert, L. Geng, and G. Li, Large-Scale Deterministic IP Network, 2019, https://datatracker.ietf.org/doc/html/draft-qiang-detnet-large-scale-detnet-05.