1. Introduction
With the rapid advancement of intelligent driving vehicle networks, the industrial Internet, and 5G communication technologies, an increasing number of data acquisition nodes and computing nodes have complicated network design and imposed significant data loads on communication links. Although the traditional Ethernet meets high bandwidth requirements and facilitates seamless connectivity among various specialized devices, it lacks essential real-time functionalities such as low jitter, minimal network latency, and efficient bandwidth allocation [1]. To address these limitations, the IEEE 802.1 standards have introduced a Time-Sensitive Networking (TSN) [2] solution that combines the cost-effectiveness and high-bandwidth capabilities of Ethernet with high-quality data transmission. Consequently, TSN-related technologies have garnered significant attention from both academia and industry. However, practical analysis and computation in TSN systems can become complex due to diverse network architectures and varying Quality of Service (QoS) requirements for different data flows. Studies indicate that routing and scheduling challenges within TSN are classified as NP-complete problems [3].
While most research has focused on addressing traffic scheduling using methods such as Satisfiability Modulo Theories (SMT) [4] and Integer Linear Programming (ILP) [5,6], these approaches often suffer from long solution times, limiting their practical applicability and scalability. In contrast, heuristic algorithms offer inherent scalability for solving routing and scheduling problems, leading to increased attention from researchers exploring TSN-based methods. In this paper, we focus on the routing and scheduling problem of TSN using evolutionary algorithms. A time-sensitive network routing and scheduling optimization scheme that deeply integrates genetic algorithm (GA) and differential evolution (DE) algorithms is proposed. Both evolutionary computing methods are inspired by the bionic simulation of biological evolution mechanisms. Genetic algorithms encode feasible routes as chromosomes, simulating the “survival of the fittest” principle in nature, and achieve iterative solution optimization through operations such as selection, crossover, and mutation. Differential evolution algorithms leverage the intelligent behavior of differentiated collaboration among biological populations, enhancing global search capabilities via vector differential perturbation. The synergy between the two algorithms mirrors the phenomenon of species coevolution in nature. Specifically, the genetic algorithm focuses on generating high-quality routing schemes, while the differential evolution algorithm refines the scheduling strategy, ultimately forming a bionic intelligent optimization framework. This approach not only demonstrates the robust adaptability of biological evolution principles in engineering optimization but also offers a novel bionic solution for complex constraint problems, such as those encountered in time-sensitive networks.
From the perspective of bionics, this method effectively translates the evolutionary intelligence of nature into engineering optimization tools. The fitness function in genetic algorithms mimics environmental selection pressure, the population cooperation mechanism in differential evolution replicates biological swarm intelligence, and the treatment of constraint conditions parallels the survival competition principle within an ecosystem. This bionic optimization strategy not only ensures the robustness of the algorithm in complex network environments but also, its hierarchical evolution architecture demonstrates self-organizing characteristics akin to those observed in biological systems. The research findings have comprehensively validated the practical significance of bionic intelligence theory in industrial communication systems, offering a critical methodological reference for the optimization of future intelligent networks.
The main contributions of our work are as follows.
(1). We proposed an innovative approach for route selection in TSN using a genetic algorithm for each flow. A fitness function that incorporates multiple factors including flow combinability, route length, and network load is formulated to identify routes that enhance efficient implementation of scheduling. To reduce the search space of the GA, we developed a method to eliminate infeasible routes by leveraging flow combinability analysis. (2). An efficient method for finding a feasible scheduling solution for TSN based on differential evolution algorithm was developed. We proposed a straightforward and effective encoding scheme designed to substantially reduce the search space of the algorithm. Furthermore, we employ the differential evolution algorithm to tackle the feasible scheduling problem in TSN utilizing the number of constraints that must be satisfied by a feasible schedule as our objective function.
The rest of this paper is organized as follows. Section 2 provides a comprehensive review of the existing literature on the routing and scheduling of TSN. The route selection method based on the genetic algorithm is presented in Section 3. Section 4 details the scheduling approach for TSN that employs the differential evolution algorithm. The simulation results are analyzed in Section 5. Finally, Section 6 summarizes the findings of this study and outlines directions for future research.
2. Related Work
Real-time scheduling for TSN aims to determine a feasible network-wide configuration, including routing paths and schedules, which meets the end-to-end timing requirements of a given set of flows. In this section, we review related work on real-time scheduling of TSN. Existing work on time-sensitive network scheduling can be categorized into three distinct groups. The first category includes fixed route scheduling methods, which concentrate on determining the optimal routes for each flow to improve the scheduling success rate. The second category covers joint routing and scheduling (JRS) approaches, which aim to establish an integrated framework combining routing and scheduling while proposing solution strategies to tackle these associated challenges. The third category involves scheduling techniques for pre-determined routes, emphasizing the design of effective scheduling mechanisms to ensure flow schedulability once the routes are determined. We refer to these three categories as routing problems, joint routing and scheduling problems, and scheduling problems, respectively.
2.1. Routing
Greedy algorithms are widely employed to solve routing problems in TSN. By incorporating network performance metrics, researchers have developed various greedy algorithms to identify optimal route for each flow. For instance, A. Alnajim et al. proposed an incremental QoS-aware path selection algorithm that leverages QoS measurement to route TSN flows [7]. Shih-Hung Chang et al. proposed a real-time routing scheduler (RTRS) which determines both the shortest path and the path with the worst-case end-to-end delay (WCED) between source and destination nodes [8]. M. A. Ojewale et al. proposed selecting routes based on optimal load distribution among all valid paths [9]. Kai Huang et al. proposed a period-aware routing algorithm to alleviate scheduling bottlenecks, thereby accommodating a greater number of flows [10]. Despite their effectiveness, greedy algorithms suffer from an excessively large search space, leading to high time complexity. To address this issue, researchers have enhanced greedy algorithms through methods such as the K-shortest path approach [11] and the improved Dijkstra algorithm [12]. Additionally, heuristic search-based routing strategies have been proposed to effectively reduce the search space [13,14,15]. Moreover, some researchers have explored route selection methodologies using linear programming [16] and reinforcement learning [17,18], although these approaches demand substantial computational resources and runtime.
2.2. Joint Routing and Scheduling
The joint routing and scheduling approach offers the advantage of enabling integrated decision making for both the routing and scheduling of each flow. This integration enhances network resources utilization and improves schedulability. Integer Linear Programming and Satisfiability Modulus Theory can be employed to address the JRS problem, thereby minimizing the occurrences where the scheduling algorithm fails to find feasible solutions. The JRS problem can be formulated as an ILP model and solved using CPLEX and SMT solvers [19,20,21,22,23]. However, these methods are limited to small-scale problems due to their computational complexity, which increases significantly with the size of the problem. To address the challenges associated with large-scale JRS problems, researchers have explored alternative approaches. Xiaolong Wang et al. developed a greedy algorithm for JRS that incorporates load balancing [24]. Hao Yu et al. proposed a deep reinforcement learning-based deterministic flow scheduler to handle deterministic flow routing and scheduling [25]. N. Reusch et al. developed a novel way that integrates a simulated annealing metaheuristic with an ASAP list scheduling technique [26]. Jie Jia et al. proposed the two-level iterative JOORS algorithm, which is based on the differential evolution algorithm, to determine the injection time offset and routing strategies that maximize the scheduling success rate [27]. M. Pahlevan and R. Obermaisser et al. presented a genetic algorithm-based method for solving the JRS problem [28].
2.3. Scheduling
For the fixed route scheduling method, designing an efficient scheduling algorithm after the route has been computed is a critical issue. Many SMT and ILP formulations have been presented to determine a communication schedule based on precomputed routes [29,30,31]. A.A. Atallah et al. introduced a novel DoC-aware flow partitioning approach aimed at enhancing the success rate of iterated ILP-based scheduling [32]. However, due to the substantial computational demands associated with linear programming, researchers have increasingly focused on heuristic algorithms for scheduling methods. For instance, A. Berisa et al. proposed an AVB-aware heuristic scheduling algorithm which ensures the timely delivery of flows while optimizing the schedulability of AVB traffic [33]. M. Vlk et al. developed an Efficient Probing Instructed by Conflicts (EPIC)algorithm, which operates independently of third-party solvers [34]. F. Dürr et al. presented a Tabu search algorithm for efficient schedule computation and schedule compression technique to minimize the number of guard bands [29]. Mingwu Yao et al. presented a Mixed Initial Population Genetic Algorithm (MGA) to address the scheduling problem [35].
3. Routing Based on Flow Combinability
In this section, we present a routing method that is grounded in the concept of flow combinability. Initially, flows are grouped based on the greatest common divisor of their respective periods. Subsequently, a genetic algorithm is employed to facilitate routing according to flow combinability.
3.1. Flow Grouping Method Utilizing the Greatest Common Divisor
Kai Huang et al. demonstrated that if the greatest common divisor (GCD) of the periods of two flows is 1, it indicates a potential conflict when both flows traverse the same link, meaning these two flows cannot be combined [10]. In this paper, we categorize flows according to their GCDs, ensuring that uncombinable flows are separated into different groups. Furthermore, within any given group, the GCD of any two flows must be greater than 1.
Let be a set of flows. The flow grouping method based on the greatest common divisor is presented in Algorithm 1. In the first line, flows are sorted in ascending order by their periods, and the result is recorded as . Lines 4 to 8 identify the flow with the smallest period that has not yet been grouped within . Lines 10 to 14 group the flows whose periods share a GCD greater than 1.
Algorithm 1. Flow Grouping Based on Greatest Common Divisor |
Input: flow set |
3.2. Route Selection Based on Genetic Algorithm
In this section, we present a routing method that utilizes a genetic algorithm [35]. This method is grounded in the definition of individual encoding, the construction of a fitness function for individuals, and the implementation of genetic operations. The tailored genetic algorithm is specifically designed to optimize the routing for each group of flows.
3.2.1. Individual Coding
Let denote the -th group of , which encompasses flows , , …, . Each flow is associated with a corresponding set of feasible paths , , …, . The individual encoding employs a decimal representation in which each gene bit corresponds to a selected feasible path for each flow. An example of the individual coding is illustrated in Figure 1. The variable represents the number of the path selected by flow , where .
3.2.2. Fitness Function
The individual fitness function serves as the foundation for evaluating the quality of an individual within a genetic algorithm. The calculation of the individual fitness value should consider four critical factors: (1) flow combinability, (2) link load, (3) path length, and (4) the number of remaining feasible paths.
Let represent an individual in the population, and let the components denote the number of paths chosen by these flows. The corresponding paths are represented as , respectively. Following the methodologies established in the literature [10], we define the sum of weights of all flows passing through link within the path selected by the -th group of flows as . The formula for this calculation is presented in Equation (1).
(1)
where is the link on , denotes the set of flow, denotes the periods of i-th flow, and denotes the greatest common divisor of the periods of flows that traverse the link .When is larger, it indicates that the bandwidth of the link is occupied by a greater number of flows. Consequently, the flow combinability on this link decreases, resulting in lower schedulability for these flows traversing the same link. Conversely, when is smaller, fewer flows occupy the bandwidth of the link , thereby enhancing flow combinability for flows traversing the same link. This improvement facilitates higher schedulability for these flows as they pass through the same link.
However, if each flow exclusively prioritizes paths with high combinability during path selection, three potential issues may arise: (1) the number of network nodes that the time-triggered flow traversed might increase accordingly, thereby imposing a heavier load on the network; (2) this strategy could result in an excessive concentration of time-triggered flows passing through a single link; and (3) it might substantially reduce the number of remaining feasible paths for certain flows or even leave some flows without any viable paths. All these scenarios negatively affect the schedulability of the entire network. To address these challenges, the fitness function should consider , the total path lengths, the number of flows traversing link , and the number of remaining feasible paths, simultaneously.
The total path lengths is calculated by Equation (2).
(2)
where is defined for 0 and 1 variables. If is the link on , = 1. Otherwise, = 0.The intersection of paths and is defined as follows: If there exists a link that is both a link on path and , then , otherwise .
Assume that all flows are categorized into groups based on Algorithm 1. Let denote the path chosen by each flow in group , while represents the paths selected by all flows from group 1 to group . We define as the total number of remaining feasible paths for all flows from group to group , which is contingent upon individual variable . is calculated according to Equation (3).
(3)
where represents the -th flow group of classflow, and consists of all simple paths associated with the flow . is utilized to evaluate whether the simple path is a feasible route for these flows. For a given simple path of flow , if there exists a flow in the first groups with an associated path , such that flows and cannot be combined, and the intersection of paths and is non-empty, then the simple path is not a feasible path for flow . can be determined using Equation (4).(4)
Let denote the fitness function of individual . The definition of is as follows:
(5)
The function is defined by four distinct formulas. The first formula quantifies the flow combinability, while the second reflects the magnitude of link load. The third formula indicates the number of remaining feasible paths, and the fourth assesses the length of the selected route path. Here, represents a penalty factor associated with the total flow traversing through link ; whereas denotes a penalty factor related to the count of available remaining paths.
3.2.3. Feasible Path for Flow
Since two uncombinable flows traversing the same link will inevitably collide, effective scheduling in time-sensitive networks cannot be guaranteed. As a result, not all simple paths for a flow within the network are feasible. For instance, if the route selected by flow includes link , and flow is incompatible with flow , then any path for flow that contains link becomes invalid. Consequently, it is essential to determine which paths are feasible for each specific flow. This section presents the methodology for identifying such feasible paths.
Let us first define a function named Optional Path Set Construction, which is designed to identify a simple path that does not contains specified link. The detailed implementation of this function is presented in Algorithm 2. The function determines whether each simple path in flow includes any link from the set of (line 2~12). If a simple path contains a link from the , this path is marked with 0. Otherwise, it is marked with 1. Subsequently, the marker of each simple path of flow is analyzed, and the path designated with the value of 1 is considered an optional path for flow (line 13~16). If a simple path contains a link from the , this path is marked with 0. Otherwise, it is marked with 1. Subsequently, the marker of each simple path of flow is analyzed, and the path designated with the value of 1 is considered an optional path for flow (line 13~16).
Algorithm 2 Optional Path Set Construction |
Input: A simple path set of , flow , a link set of |
Based on Algorithm 2, we propose a function referred to as Feasible Path Set Construction, as shown in Algorithm 3, which is specifically designed to identify the feasible paths for each flow within the -th group of . This function consists of five parameters: the simple path for all flows (), the flows set (), the flows grouping (), the order number of groups (), and the selected paths of all flows in the preceding group (). When , there are no selected paths for flow, that is, . Consequently, the feasible paths for each flow within this group comprise all its simple paths in the network. When , lines 9 to 25 of the function are employed to identify the feasible path for each flow within the group. Firstly, we obtain a flow from group , denoted as a (line 12). Additionally, we acquire a flow from the set of , represented as (line 13). If and cannot be combined, each link along the path of flow is added to the set of (line 14~21). Subsequently, Function 1 is invoked to identify a viable path for flow a (line 23).
Algorithm 3 Feasible Path Set Construction |
Input: , |
3.2.4. Route Selection Algorithm
We present a route selection method for each flow using a genetic algorithm, as detailed in Algorithm 4. This algorithm employs a set named to record the paths chosen by each flow, with this set being initially as empty. The k-th iteration of the algorithm’s outer loop focuses on identifying the route for the flow within the group . Each iteration starts by invoking the Feasible Path Set Construction function to determine the feasible paths for each flow within group (line 3). Subsequently, the parameters of the genetic algorithm are initialized, and the initial population is generated (line 4~5). The inner loop executes genetic operations such as selection, crossover, and mutation, while also updating the best individual (line 6~9). Once the paths for group have been determined, the set is updated accordingly (line 10).
Algorithm 4 Route selection based on genetic algorithm |
Input: the simple path for all flows (), flows set (), flows grouping () |
4. Scheduling for TSN Based on Differential Evolution Algorithm
4.1. Scheduling Problem and Modeling
In the preceding section, we have introduced a routing selection method that considers flow combinability. Once the routing for all flows has been established, it becomes crucial to determine the transmission timing of each frame within every flow at each node along its path, ensuring that all frames of each flow can be transmitted and received within the designated time during the super period, while also guaranteeing that no two transmissions on a link (in the same direction) overlap. This concept is referred to as network scheduling.
In this section, we propose a novel approach to find a feasible scheduling scheme for TSN based on the differential evolution algorithm. We assume that the time sensitive network satisfies zero jitter and no frame loss. Let the path of flow be denoted as . The duration required to transmit flow from any given node to its adjacent nodes is represented as . The latest deadline by which the listener must acquire the data is denoted as . The period of flow is indicated by and the hyper-period of the network is represented as . Let denote the sending time of the t-th frame for flow at the k-th node. A feasible scheduling solution of TSN must satisfy the following four constraints:
(1) Precedence Constraint
A frame transmission along the path must satisfy the precedence constraint, meaning that the transmission time of a frame at node cannot be earlier than the sum of the transmission time of the frame at node and the propagation delay between two adjacent nodes. This constraint can be described by Formula (6).
(6)
where , represents the total number of nodes traversed by flow along its path.(2) Deadline Constraint
The time interval between the listener and the talker node must not exceed . This constraint can be described by Formula (7).
(7)
(3) Period Constraint
The reception time of the final frame in flow must not surpass the hyper-period. This constraint can be described by Formula (8).
(8)
(4) Resource Constraint
For each pair of different frames on a link, one frame must be transmitted only after the preceding frame has been fully transferred. For any two flow and , if both flows traverse the link , any and any must satisfy the following constraint:
(9)
where .If the transmission time of the first frame of flow i satisfies the precedence constraint, it follows that the transmission time of the t-th frame of flow i also satisfies the precedence constraint, where .
The proof is given in Appendix A.1.
If the first frame of flow satisfies the deadline constraint, the t-th frame of flow also satisfies the deadline constraint, where .
The proof is given in Appendix A.2.
If , flow i meets the period constraint.
The proof is given in Appendix A.3.
Let the paths of flows and share a common link , where the serial number of node on the path of flow is denoted as , and the serial number of node on the path of flow is denoted as . The expression of Formula (9) can be equivalently represented as Formula (10), which is detailed as follows:
(10)
The proof is given in Appendix A.4.
According to the conclusions drawn from the aforementioned four theorems, it is sufficient to determine the transmission time of the first frame of each flow at the talker. Subsequently, we can compute the transmission times for this frame at other nodes and ascertain the transmission times for additional frames at each node. This process enables us to evaluate whether scheduling is feasible. Consequently, our scheduling algorithm requires only solving for the transmission time of the first frame at the talker. Thus, this approach significantly reduces the complexity associated with addressing this problem.
Let represent the number of nodes in the path of flow respectively. Assume that for the links (,), (,), …, (,), each link carries two or more flows, denoted respectively as {, , … },{, , … }, …,{, , … }. Let the number of constraints that a feasible scheduling must satisfy be denoted as CN. Consequently, it follows that the value of CN is equivalent to the value presented in Formula (11).
(11)
The proof is given in Appendix A.5.
4.2. Gene Coding
According to Theorems 1 to 4, once the transmission time of the first frame in a flow at the sending node is established, it becomes possible to determine the transmission times for all frames within that flow across each node. Subsequently, this allows us to assess whether the scheduling of the flow adheres to relevant constraints. Therefore, the problem of scheduling in time-sensitive networks fundamentally revolves around determining the transmission time of the first frame for each flow at its respective talker. To address this issue, we can represent the time-sensitive network scheduling encoding for flows as a real number encoding with a length of m, as shown in Figure 2.
According to the genetic code, the solution to scheduling problem fundamentally involves determining the transmission time of the first frame for each flow at the talker. A larger range of transmission time results in an extended algorithmic solution time, whereas a smaller range leads to a reduced solution time. We present the following theorem concerning the upper limit of this value.
Given that the path of flow is denoted as = , the duration required to transmit flow from any given node to its adjacent nodes is represented as , and the deadline of flow is denoted as , it can be concluded that value of must not surpass , where .
The proof of is given in Appendix A.6.
To ascertain whether the flow scheduling adheres to the relevant constraints, it is essential to determine the transmission time of each flow at every node. Let us denote the transmission time of the first frame of flow at the talker as . Consequently, the transmission times for this frame at nodes can be expressed as , , …, and , respectively. Therefore, based on the encoding , , , , , each flow can be derived at each node during transmission time.
Let represent the sending times of the first frame of each flow at the talker. The transmission times for each flow at every node are determined using Algorithm 5. Let be utilized to store the transmission times of each flow across all nodes. A for loop is employed to traverse through each flow, where denotes the transmission times of flow at the talker. The while loop is designed to compute the transmission times for the subsequent nodes of flow (line 5~8). Here, signifies the transmission time of flow in an adjacent node.
Algorithm 5 Computing the transmission time of each frame at every node along its path |
Input: The transmission time of the first frame |
4.3. The Fitness Function and Its Calculation
According to Theorem 5, we gain insight into the number of constraints that a feasible scheduling solution must fulfill. Consequently, we regard the quantity of satisfiable constraints as the fitness function for the differential evolution algorithm. The fitness function is defined as Equation (12).
(12)
where represents the number of constraints that individual satisfies the precedence constraint, denotes the number of constraints that meets the deadline constraint, indicates the number of constraints that satisfies period constraint, and signifies the number of constraints that adheres to with respect to the resource constraint.If a link is traversed by multiple flows, it is referred to as a shared link. The key of determining the value of lies in calculating the quantity of constraints that meets the resource constraint. In order to compute the number of constraints that satisfies the resource constraint, we must identify all shared links. Firstly, an algorithm is developed to address the link information according to the path of all flows, as detailed in Algorithm 6. The link information is represented by a three-tuple: , where denotes the flow number, represents the j-th link on path , and denotes the number associated with this link. Each iteration of the outer loop begins by calculating the length of the path (line 3). Subsequently, it obtains every link of the path and assigns its numerical identifiers (line 4~7).
Algorithm 6 Deriving Link Information |
Input: and its path |
Given flow and its path , we present a way to obtain shared links based on the link information, which is determined by Algorithm 6. Algorithm 7 provides a detailed description of the process for identifying shared links. In each iterate, creating a temporary set named and this set contains the iterated tuple (line 2). It then retrieves the flow and the link associated with this tuple (line 3~4). Subsequently, it examines the flow and the link present in other tuples. If two different flows share a common link, such a tuple is added to (line 6~12). In cases where multiple elements exist within , it is incorporated into the set of (line 14~16).
Algorithm 7 Finding Shared Link |
Input: Link information |
Based on the shared link derived from Algorithm 7, we present the algorithm for calculating the value of , as illustrated in Algorithm 8. Firstly, Algorithm 5 is applied to compute the transmission time of each frame at every node along its path (line 2). Then, the corresponding subscript in for the transmission time of flow at its talker is determined (line 4). Subsequently, the quantity of the precedence constraint that a flow must satisfy is calculated (lines 6–9), the quantity of the deadline constraint that a flow must meet is established (line 10), and the quantity of the period constraint that a flow must adhere to is evaluated (lines 11–13). For each set within the , consider any two tuples contained in that set. First, extract the flow associated with these two tuples. Subsequently, obtain the corresponding subscript in for the transmission time of both flows at the talker (line 19~20). Finally, whether flows and satisfy the resource constraint is assessed and the quantity of this constraint is computed (line 21~27).
Algorithm 8 Computing the fitness of individual |
Input: Individual |
4.4. Optimization Objective of Differential Evolution Algorithm
Based on the preceding analysis, it can be concluded that if the value of equals to the number of constraints that a feasible scheduling solution must satisfy, then the individual is indeed a feasible scheduling solution. Therefore, we utilize a differential evolution algorithm to maximize the value of . During the iterative process of this algorithm, the execution will terminate under one of two conditions: either equals , or the maximum iteration limit is reached. Upon completion of the algorithm, if equals , we provide the scheduling results for each flow based on . Conversely, if , it indicates that the algorithm cannot find a feasible scheduling for TSN.
4.5. Differential Evolution Algorithm for TSN Scheduling
The differential evolution algorithm is an efficient global optimization algorithm [36]. Additionally, it is a population-based heuristic search algorithm, where each individual within the population represents a solution vector. The evolutionary process of differential evolution closely resembles that of genetic algorithms, involving mutation, crossover, and selection operations. However, the specific definitions and implementations of these operations differ significantly from those in genetic algorithms.
4.5.1. Scheduling Coding
Given that the scheduling coding of flows is represented as [,, , ], according to Theorem 6, the value range of extends from 0 to , where . The initial values of the component is computed using the following formula:
(13)
Here, denotes a random integer between and .
4.5.2. Operators of Differential Evolution Algorithm
The operations of differential evolution algorithms include mutation, crossover, and selection operations.
(1) Mutation
For each individual xi within the population, its mutation vector is generated based on the following formula:
(14)
where , , were randomly selected from the population and . The parameter is utilized to regulate the extent of bias amplification. In this paper, we employ an adaptive adjustment strategy for the value as follows:(15)
(16)
where is the maximum number of iterations of DE algorithm, is the number of iterations, and . usually takes 0.4.(2) Crossover
The objective of crossover is to recombine the components of an individual and its mutation individual in order to generate a new individual. The crossover process is conducted as follows:
(17)
where CR is the crossover probability and D is the number of individual components.(3) Selection
According to the greedy criterion, the differential evolution algorithm compares the new individual and the original individual obtained by mutation and crossover, and the one with the highest fitness value is selected as the individual of the next generation of the population. The selection is as follows:
(18)
5. Simulation Experiment
In this section, we evaluate the validity of the proposed flow-combinability-based genetic algorithm for routing in TSN and the developed differential evolution algorithm for scheduling in TSN. Specifically, we compare the proposed algorithm with the shortest path-based ILP method [29] denoted as SP-ILP, the degree of conflict (DoC)-aware flows partitioning-based ILP method [32] denoted as DA-ILP, and the joint routing and scheduling (JRS)-based ILP method [37] denoted as JRS-ILP. The proposed algorithm was implemented using Python 3.8, and all simulations were executed on a PC equipped with an Intel® Core (TM) i7-10510U CPU (1.80 GHz base frequency, boosting up to 2.30 GHz) 16 GB RAM, and running Windows 10.
5.1. TSN with Each Flow Has a Unique Shortest Path and All Flows Can Be Combined
In this series of experiments, we investigate whether each flow in TSN can transmit information via the shortest path and be successfully scheduled, assuming that the shortest path for each flow is unique and all flows are combinable.
5.1.1. Experiment 1
In this case, we first examine a small-scale mesh network illustrated in Figure 3, which has three switches, five end stations, and three flows. The set of flows is defined as , with their corresponding parameters detailed in Table 1. The delay of the switch is 1 unit. For flow0, the transmission time between adjacent nodes is 35 units; conversely, both flow1 and flow2 have a transmission time of 24 units between adjacent nodes.
The proposed method effectively schedules each flow via the shortest path. The Gantt chart depicting the schedule is presented in Figure 4, where flow0, flow1, and flow2 are indicated by blue, red, and purple, respectively. In this experiment, all flows can be successfully scheduled using SP-ILP, DA-ILP, and JRS-ILP methods.
5.1.2. Experiment 2
In this case, we examine a line network illustrated in Figure 5, which has eight switches, eight end stations, and nine flows. The set of flows is defined as , with their corresponding parameters detailed in Table 2. Each switch incurs a delay of 1 unit, and each flow is transmitted between two adjacent nodes with a transmission time of 24 units.
The proposed method effectively schedules each flow by utilizing the shortest path. As illustrated in Figure 6 through a Gantt chart, flows 0 to 8 are respectively indicated by cyan, blue, sky-blue, purple, pink, orange, black, brown, and red. In this scenario, each flow follows a distinct path. Moreover, due to the seamless integration of all flows, it is evident that each flow can also be scheduled using DE, SP-ILP, DA-ILP, and JRS-ILP methods.
5.1.3. Experiment 3
In this case, we examine a ring network illustrated in Figure 7, which has 18 switches, 18 end stations, and 10 flows. The set of flows is defined as , with their corresponding parameters detailed in Table 3. Each switch incurs a delay of 1 unit, and each flow is transmitted between two adjacent nodes with a transmission time of 35 units.
The method proposed in this paper ensures that each flow is scheduled along the shortest path with a probability of 100%. Specific routing details for each flow are provided in Table 3. Additionally, the Gantt chart depicting the schedule is shown in Figure 8, where flows 0 to 9 are represented by cyan, blue, sky-blue, purple, pink, orange, black, brown, red, and green, respectively.
In this case, all flows can be effectively combined, and each flow is successfully scheduled using the proposed method, as well as the SP-ILP method and the JRS-ILP method. However, it is important to note that the JRS-ILP method without optimization of path length does not guarantee the successful scheduling of each flow along the shortest path. The DA-ILP method could not find a feasible solution, as the DoC-aware routing method is not always stable.
5.2. TSN with Each Flow Has a Unique Shortest Path but Not All Flows Can Be Combined
In this section, we investigate the TSN scenario where each flow is assigned a unique shortest path, yet not all flows can be combined. Specifically, our aim is to quantify the number of flows that can successfully transmit information via their shortest path, assuming that each flow is scheduled without conflict.
In this experiment, we examine a mesh network illustrated in Figure 9, which has 12 switches, 12 end stations and 5 flows. The set of flows is defined as , with their corresponding parameters detailed in Table 4. Each switch incurs a delay of 0.1 units, and the transmission time between two adjacent nodes for each flow is 1 unit.
According to Algorithm 4, the path selected by flow0 corresponds to the second shortest path, specifically: 1-13-12-16-17-18-19-7. By contrast, all other flows adopt the shortest paths. Moreover, four flows transmit data via the shortest path. Based on these routing results, effective flow scheduling can be achieved by applying Algorithm 8. The Gantt chart depicting this schedule is shown in Figure 10, where flow0 is indicated in red, flow1 in blue, flow2 in green, flow3 in black, and flow4 in orange.
The shortest paths for both flow0 and flow1 include the links (14,15). However, it is not possible to combine flow0 and flow1. Consequently, the successful implementation of flow scheduling under the routing policy based solely on the shortest path cannot be achieved, leading to a probability of successful scheduling of zero.
In this instance, the SP-ILP method and DA-ILP method could not find a successful schedule. The reason is that, whether it is the SP-ILP method or the DA-ILP method, they both belong to the fixed route scheduling method, that is, the implementation adopts a specific method to set a fixed route for each flow before scheduling, without comprehensively considering the route and scheduling. However, regarding the JRS-ILP method without optimization of path length, while it is true that every flow can be scheduled successfully during each run, there is no assurance that the number of flows transmitting messages over the shortest path will simultaneously reach four.
5.3. TSN with Some Flows Have Multiple Shortest Paths and Not All Flows Can Be Combined
In this section, we explore the TSN scenario in which certain flows have multiple shortest paths available, and not all flows can be simultaneously combined. We mainly evaluate the probability of successfully scheduling each flow along its shortest path. To illustrate this, we analyze a mesh network depicted in Figure 11, which has 12 switches, 10 end stations, and six flows. The set of flows is defined as , with their corresponding parameters detailed in Table 5. In this setup, each switch incurs a delay of 0.1 units, and the transmission time between two adjacent nodes for each flow is 1 unit.
The shortest path for flow1 includes the links (13,14). Since flows 1 and 0 are not combinable, if flow1 transmits a message via its shortest path, flow0 is unable to utilize any of its shortest path that contain the link (13,14). Similarly, the shortest path for flow2 comprises the link (19,20). Given that flows 2 and 0 are also non-combinable, flow0 cannot send messages through any of its shortest paths containing link (19,20) while flow2 is active. For flow5, its shortest path consists of the link (18,17), since flows 5 and 3 are non-combinable as well. flow5’s transmission along this route prevents flow3 from using any of its shortest paths containing (18,17). If flow3 transmits its message via the shortest path involving (21,14), then flow0 is again precluded from sending messages via this route because both remaining shortest paths available to it include these same links. Thus far, it has been established that flow3 can only transmit messages through an alternative route: 8-18-21-16-15-5. Notably, one of the two shortest paths for flow0 includes (18,21), and since flow0 and flow3 are not combinable, flow0 can only send messages via the shortest path 0-10-11-20-21-14-4. Therefore, the scheme in which every flow is capable of transmitting messages via its shortest path is unique.
Based on the shortest path method, if a unique shortest path exists, it must be selected. When multiple shortest paths are available, one is randomly chosen as the flow route. Given that the scheme where every flow transmits messages via the shortest path is unique, the probability of successfully scheduling each flow along the shortest path using the shortest path method [11] is calculated as .
Based on the two-shortest path method, we calculate the probability that the shortest path for flow0, which includes the link (18,21), is chosen as an alternative path. The total number of combinations for selecting two paths from a set of six paths is given by . Among these combinations, there are five combinations that include the link (18,21). Therefore, the probability of selecting a path containing (18,21) as an alternative path can be expressed as . Similarly, we assess the probability that the shortest path for flow3, which contains the link (18,17), is selected as an alternative path. In this case, there are two valid combinations out of possibilities. Thus, this probability can be calculated as =. Consequently, using this method, the overall probability that all flows can be successfully scheduled utilizing their respective shortest paths is computed to be .
Based on the three-shortest path method, the probability of selecting the shortest path of flow0, which includes the link (18,21), as the alternative path can be calculated as follows. The total number of combinations for selecting three paths from out of six paths is represented by . Simultaneously, the number of combinations that include the link (18,21) is denoted by . Therefore, the probability of selecting a path containing (18,21) as an alternative path can be expressed as: = . Similarly, for flow3, whose shortest path includes the link (18,17), this specific path is selected as an alternative with a probability of 1. Consequently, under this method, the probability that each flow can be successfully scheduled using one of the shortest paths is 0.5.
The proposed method in this paper ensures that each flow is scheduled along the shortest path with a probability of 1. As illustrated in Figure 12, the Gantt chart shows the schedule, where flow0, flow1, flow2, flow3, flow4, and flow5 are represented by red, blue, green, black, orange, and purple, respectively. The SP-ILP method and DA-ILP method could not find a successful schedule in this experiment.
5.4. Runtime
Table 6 describes the comparison of the runtime of the GA-DE method proposed in this paper with the SP-ILP, DA-ILP, and JRS-ILP methods in the designed five experiments. It can be seen that with the differences in network scale and traffic characteristics, the SP-ILP method cannot find feasible solutions in Experiment 4 and Experiment 5, and the DA-ILP method cannot find feasible solutions in Experiment 3, Experiment 4, and Experiment 5. The reasons have been analyzed in the previous text. Both the JRS-ILP method and the GA-DE method proposed in this paper can find feasible solutions in all experiments. In terms of the running time of the algorithm, with the expansion of the network scale and the increase in the amount of traffic, the running time of the JRS-ILP method will increase sharply because the number of constraints that need to be solved increases exponentially. However, the GA-DE method proposed in this paper does not have this problem.
5.5. Discussions
The routing and scheduling problem for critical flow in time-sensitive networks has consistently been a focal point of research. Existing studies predominantly address the routing and scheduling challenges either by jointly solving them using SMT or ILP solvers, or by first performing pre-routing with techniques such as shortest path or conflict-aware methods, followed by solver-based scheduling. However, as the network size and the number of time-sensitive flows increase, the number of constraints required to be established by SMT and ILP methods grows exponentially, leading to prolonged solution times and, thereby, restricting their practical applicability and scalability. In contrast, while heuristic algorithms like bio-evolutionary algorithms exhibit relatively high computational complexity, their complexity does not escalate dramatically with the expansion of problem scale, thus inherently offering better scalability for addressing routing and scheduling issues. This paper proposes a TSN path selection method based on the genetic algorithm. A fitness function is designed to comprehensively consider factors such as flow combinability, route length, and network load, thereby enabling effective route selection. To further reduce the search space of the genetic algorithm, infeasible paths are eliminated in advance by leveraging the theory of flow combinability analysis. For the scheduling problem, the differential evolution algorithm is employed. By taking the number of constraints that a feasible schedule must satisfy as the objective function, a direct and efficient coding scheme is devised to significantly reduce the algorithm’s search space. Experiments conducted on networks with varying topological architectures and flow characteristics validate the feasibility of the proposed method. However, this method, which simulates biological evolution, relies on continuous iteration to search for feasible solutions, unlike exact solvers that can guarantee optimal solutions. Additionally, when addressing flow routing and scheduling in small-scale networks, the algorithm exhibits high complexity and requires extended solution times.
6. Conclusions
In this paper, a novel method based on evolutionary algorithm is introduced for the routing and scheduling of time-triggered flows in TSN. The proposed genetic algorithm approach optimizes routing by leveraging flow combinability to enhance effective flow grouping, thereby improving schedulability. Furthermore, we developed a differential evolution algorithm-based scheduling approach for TSN. The proposed encoding technique effectively reduces the search space. Five experiments were designed to evaluate the performance of proposed method across different scale topologies with various numbers of flows. The results indicate that the proposed method not only enhances the flow along the shortest paths for scheduling, but also significantly reduces execution time in large-scale scheduling scenarios. However, the proposed TSN scheduling method based on the differential evolution algorithm is currently limited to scenarios with zero jitter and no frame loss. In future work, we aim to extend the differential evolution-based scheduling approaches to handle scenarios involving jitter and frame loss.
Z.W. (Zengkai Wang): conceptualization, methodology, formal analysis, investigation, writing—original draft. W.L.: conceptualization, methodology, writing—review and editing. X.X.: conceptualization, methodology, supervision, writing—review and editing. Z.W. (Zijia Wang): validation, writing—review and editing, supervision. Y.D.: validation, writing—review and editing. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Not applicable.
The data that support the findings of this study are available from the corresponding author upon request. There are no restrictions on data availability.
This work was supported by the National Natural Science Foundation of China (62106055, 61703183), National Key Research and Development Program of China (2023YFC3305900, 2023YFC3305903), Natural Science Foundation of Zhejiang Province (LGG19F030010), Guangdong Natural Science Foundation (2025A1515010256), Guangzhou Science and Technology Planning Project (2023A04J0388, 2023A03J0662), and the Qin Shen Scholar Program of Jiaxing University.
Author Xiaoyun Xia and Yaolong Duan was employed by the company Technology Research and Development Centre, Xuelong Group Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
The following abbreviations are used in this manuscript:
TSN | Time-Sensitive Networking |
QoS | Quality of Service |
SMT | Satisfiability Modulo Theories |
ILP | Integer Linear Program |
GA | Genetic Algorithm |
DE | Differential Evolution |
RTRS | Real-Time Routing Scheduler |
WCED | Worst-Case End-to-End Delay |
JRS | Joint Routing and Scheduling |
DoC | Degree of Conflict |
EPIC | Efficient Probing Instructed by Conflicts |
MGA | Mixed Initial Population Genetic Algorithm |
GCD | Greatest Common Divisor |
SOW | Sum of Weights |
LCM | Least Common Multiple |
SP | Shortest Path |
DA | Doc Aware |
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 1 Routing selection encoding.
Figure 2 Gene coding for scheduling.
Figure 3 The network of Experiment 1. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 4 The schedule Gantt chart of Experiment 1. The schedult results of flow0, flow1, and flow2 are indicated by bule, red, and purple, respectively.
Figure 5 The network of Experiment 2. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 6 The schedule Gantt chart of Experiment 2. The schedule results of flows 0 to 8 are respectively indicated by cyan, blue, sky-blue, purple, pink, orange, black, brown, and red.
Figure 7 The network of Experiment 3. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 8 The schedule Gantt chart of Experiment 3. The schedule results of flows 0 to 9 are represented by cyan, blue, sky-blue, purple, pink, orange, black, brown, red, and green, respectively.
Figure 9 The network of Experiment 4. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 10 The schedule Gantt chart of Experiment 4. The schedule results of flow 0 to 4 are indicated in red, blue, green, black, and orange, respectively.
Figure 11 The network of Experiment 5. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 12 The schedule Gantt chart of Experiment 5. The schedule results of flow 0 to 5 are represented by red, blue, green, black, orange, and purple, respectively.
Flow parameters of Experiment 1.
Talker | Listener | Size | Deadline | Period | The Shortest Path | |
---|---|---|---|---|---|---|
Flow0 | 1 | 5 | 35 | 150 | 150 | 1-6-8-5 |
Flow1 | 2 | 4 | 24 | 100 | 100 | 2-6-8-4 |
Flow2 | 3 | 4 | 24 | 100 | 100 | 3-7-8-4 |
Flow parameters of Experiment 2.
Talker | Listener | Size | Deadline | Period | The Shortest Path | |
---|---|---|---|---|---|---|
Flow0 | 11 | 9 | 24 | 300 | 300 | 11-3-2-1-9 |
Flow1 | 9 | 13 | 24 | 300 | 300 | 9-1-2-3-4-5-13 |
Flow2 | 13 | 9 | 24 | 300 | 300 | 13-5-4-3-2-1-9 |
Flow3 | 9 | 8 | 24 | 300 | 300 | 9-1-0-8 |
Flow4 | 13 | 8 | 24 | 300 | 300 | 13-5-4-3-2-1-0-8 |
Flow5 | 11 | 10 | 24 | 300 | 300 | 11-3-2-10 |
Flow6 | 8 | 9 | 24 | 300 | 300 | 8-0-1-9 |
Flow7 | 9 | 10 | 24 | 300 | 300 | 9-1-2-10 |
Flow8 | 10 | 12 | 24 | 300 | 300 | 10-2-3-4-12 |
Flow parameters of Experiment 3.
Talker | Listener | Size | Deadline | Period | The Shortest Path | |
---|---|---|---|---|---|---|
Flow0 | 34 | 31 | 35 | 500 | 500 | 34-16-15-14-13-31 |
Flow1 | 34 | 28 | 35 | 500 | 500 | 34-16-15-14-13-12-11-10-28 |
Flow2 | 30 | 31 | 35 | 500 | 500 | 30-12-13-31 |
Flow3 | 21 | 35 | 35 | 500 | 500 | 21-3-2-1-0-17-35 |
Flow4 | 20 | 18 | 35 | 500 | 500 | 20-2-1-0-18 |
Flow5 | 18 | 33 | 35 | 500 | 500 | 18-0-17-16-15-33 |
Flow6 | 31 | 19 | 35 | 500 | 500 | 31-13-14-15-16-17-0-1-19 |
Flow7 | 18 | 35 | 35 | 500 | 500 | 18-0-17-35 |
Flow8 | 25 | 20 | 35 | 500 | 500 | 25-7-6-5-4-3-2-20 |
Flow9 | 31 | 18 | 35 | 500 | 500 | 31-13-14-15-16-17-0-18 |
Flow parameters of Experiment 4.
Talker | Listener | Size | Deadline | Period | The Shortest Path | |
---|---|---|---|---|---|---|
Flow0 | 1 | 7 | 1 | 8 | 10 | 1-13-14-15-19-7 |
Flow1 | 2 | 6 | 1 | 9 | 9 | 2-14-15-19-18-6 |
Flow2 | 4 | 7 | 1 | 8 | 10 | 4-16-17-18-19-7 |
Flow3 | 3 | 5 | 1 | 9 | 9 | 3-15-19-18-17-5 |
Flow4 | 0 | 8 | 1 | 8 | 10 | 0-12-16-20-8 |
Flow parameters of Experiment 5.
Talker | Listener | Size | Deadline | Period | The Shortest Path | |
---|---|---|---|---|---|---|
Flow0 | 0 | 4 | 1 | 10 | 10 | 0-10-11-20-21-14-4 |
0-10-11-12-13-14-4 | ||||||
0-10-19-20-21-14-4 | ||||||
0-10-19-20-13-14-4 | ||||||
0-10-19-18-21-14-4 | ||||||
0-10-11-20-13-14-4 | ||||||
Flow1 | 1 | 6 | 1 | 9 | 9 | 1-11-12-13-14-15-16-6 |
Flow2 | 9 | 3 | 1 | 9 | 9 | 9-19-20-13-3 |
Flow3 | 8 | 5 | 1 | 9 | 9 | 8-18-21-16-15-5 |
8-18-21-14-15-5 | ||||||
8-18-17-16-15-5 | ||||||
Flow4 | 2 | 5 | 1 | 9 | 9 | 2-12-13-14-15-5 |
Flow5 | 0 | 7 | 1 | 10 | 10 | 0-10-19-18-17-7 |
Comparison of runtime (s) between DE algorithm and ILP based methods.
Instance | GA-DE | SP-ILP [ | DA-ILP [ | JRS-ILP [ |
---|---|---|---|---|
Example1 | 0.34 | 1.02 | 1.36 | 0.80 |
Example2 | 3.19 | 1.20 | 1.69 | 0.94 |
Example3 | 3.09 | 1.58 | NA | 2.41 |
Example4 | 1.16 | NA | NA | 15.75 |
Example5 | 0.94 | NA | NA | 41 |
Appendix A
Appendix A.1. Proof of Theorem 1
Since the requirement is zero jitter, we have
Since
It implies that
Consequently, the transmission time of the t-th frame of flow
Appendix A.2. Proof of Theorem 2
Since
The transmission time
Given that the first frame of flow
Thus, it can be concluded that the t-th frame of flow
Appendix A.3. Proof of Theorem 3
Let
Let the transmission time of the last frame at node
Thus, we have
Given that
According to Formulas (A9) and (A10), it follows that
Therefore, flow
Appendix A.4. Proof of Theorem 4
Let
Similarly, it follows that
We employ Formulas (A12) and (A13) to substitute
Appendix A.5. Proof of Theorem 5
(1) According to the precedence constraint and Theorem 1, if a path of a flow has n nodes, then, the transmission time of a frame from the second node to the
(2) According to Theorem 2, if the interval between the reception time of the first frame of flow
(3) According to Theorem 3, the receiving time of the last frame of each flow cannot exceed the hyper-period, so
(4) According to resource constraint, for the flow
Thus, we have
By integrating the four types of constraints discussed above, the number of constraints that a feasible scheduling solution must satisfy is represented by Formula (11).
Appendix A.6. Proof of Theorem 6
Let the transmission time of flow
It follows that
It implies that the frame received time is longer than
1. Akram, B.O.; Noordin, N.K.; Hashim, F.; Rasid, M.A.F.; Salman, M.I.; Abdulghani, A.M. Enhancing reliability of time-triggered traffic in joint scheduling and routing optimization within time-sensitive networks. IEEE Access; 2024; 12, pp. 78379-78396. [DOI: https://dx.doi.org/10.1109/ACCESS.2024.3408923]
2. Messenger, J.L. Time-sensitive networking: An introduction. IEEE Commun. Stand. Mag.; 2018; 2, pp. 29-33. [DOI: https://dx.doi.org/10.1109/MCOMSTD.2018.1700047]
3. Chen, Z.; Lu, Y.; Wang, H.; Qin, J.; Wang, M.; Pan, W. Dynamic stream partitioning for time-triggered traffic in Time-Sensitive Networking. Comput. Netw.; 2024; 248, 110492. [DOI: https://dx.doi.org/10.1016/j.comnet.2024.110492]
4. Zhou, Y.; Samii, S.; Eles, P.; Peng, Z. Time-triggered scheduling for time-sensitive networking with preemption. Proceedings of the 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC); Taipei, China, 17–20 January 2022; IEEE: Piscataway, NJ, USA, 2022; [DOI: https://dx.doi.org/10.1109/ASP-DAC52403.2022.9712545]
5. Xue, C.; Zhang, T.; Zhou, Y.; Nixon, M.; Loveless, A.; Han, S. Real-time scheduling for time-sensitive networking: A systematic review and experimental study. arXiv; 2023; [DOI: https://dx.doi.org/10.48550/arXiv.2305.16772] arXiv: 2305.16772
6. Stüber, T.; Osswald, L.; Lindner, S.; Menth, M. A survey of scheduling algorithms for the time-aware shaper in time-sensitive networking (TSN). IEEE Access; 2023; 11, pp. 61192-61233. [DOI: https://dx.doi.org/10.1109/ACCESS.2023.3286370]
7. Alnajim, A.; Salehi, S.; Shen, C.-C. Incremental path-selection and scheduling for time-sensitive networks. Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM); Big Island, HI, USA, 9–13 December 2019; IEEE: Piscataway, NJ, USA, 2019; [DOI: https://dx.doi.org/10.1109/GLOBECOM38437.2019.9013427]
8. Chang, S.-H.; Chen, H.; Cheng, B.-C. Time-predictable routing algorithm for Time-Sensitive Networking: Schedulable guarantee of Time-Triggered streams. Comput. Commun.; 2021; 172, pp. 183-195. [DOI: https://dx.doi.org/10.1016/j.comcom.2021.03.019]
9. Ojewale, M.A.; Yomsi, P.M. Routing heuristics for load-balanced transmission in TSN-based networks. ACM Sigbed Rev.; 2020; 16, pp. 20-25. [DOI: https://dx.doi.org/10.1145/3378408.3378411]
10. Huang, K.; Wu, J.; Jiang, X.; Xiong, D.; Huang, K.; Yao, H.; Xu, W.; Peng, Y.; Liu, Z. A period-aware routing method for IEEE 802.1 Qbv TSN networks. Electronics; 2020; 10, 58. [DOI: https://dx.doi.org/10.3390/electronics10010058]
11. Gavrilut, V.; Zhao, L.; Raagaard, M.L.; Pop, P. AVB-aware routing and scheduling of time-triggered traffic for TSN. IEEE Access; 2018; 6, pp. 75229-75243. [DOI: https://dx.doi.org/10.1109/ACCESS.2018.2883644]
12. Huang, J.-Y.; Hsu, M.-H.; Shen, C.-A. A novel routing algorithm for the acceleration of flow scheduling in time-sensitive networks. Sensors; 2020; 20, 6400. [DOI: https://dx.doi.org/10.3390/s20216400]
13. Li, Y.; Yin, Z.; Ma, Y.; Xu, F.; Yu, H.; Han, G.; Bi, Y. Heuristic routing algorithms for time-sensitive networks in smart factories. Sensors; 2022; 22, 4153. [DOI: https://dx.doi.org/10.3390/s22114153] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/35684773]
14. Pahlevan, M.; Tabassam, N.; Obermaisser, R. Heuristic list scheduler for time triggered traffic in time sensitive networks. ACM Sigbed Rev.; 2019; 16, pp. 15-20. [DOI: https://dx.doi.org/10.1145/3314206.3314208]
15. Huang, K.; Wan, X.; Wang, K.; Jiang, X.; Chen, J.; Deng, Q.; Xu, W.; Peng, Y.; Liu, Z. Reliability-aware multipath routing of time-triggered traffic in time-sensitive networks. Electronics; 2021; 10, 125. [DOI: https://dx.doi.org/10.3390/electronics10020125]
16. Nayak, N.G.; Dürr, F.; Rothermel, K. Routing algorithms for IEEE802. 1Qbv networks. ACM Sigbed Rev.; 2018; 15, pp. 13-18. [DOI: https://dx.doi.org/10.1145/3267419.3267421]
17. Li, J.; Wei, M.; Huo, C.; Kim, K. A Time-Sensitive Networking Traffic Scheduling Method Based on Q-Learning Routing Optimization. Proceedings of the 2024 18th International Conference on Ubiquitous Information Management and Communication (IMCOM); Kuala Lumpur, Malaysia, 3–5 January 2024; IEEE: Piscataway, NJ, USA, 2024; [DOI: https://dx.doi.org/10.1109/imcom60618.2024.10418305]
18. Min, J.; Kim, Y.; Kim, M.; Paek, J.; Govindan, R. Reinforcement learning based routing for time-aware shaper scheduling in time-sensitive networks. Comput. Netw.; 2023; 235, 109983. [DOI: https://dx.doi.org/10.1016/j.comnet.2023.109983]
19. Schweissguth, E.; Timmermann, D.; Parzyjegla, H.; Danielis, P.; Muhl, G. ILP-based routing and scheduling of multicast realtime traffic in time-sensitive networks. Proceedings of the 2020 IEEE 26th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA); Gangnueng, Republic of Korea, 19–21 August 2020; IEEE: Piscataway, NJ, USA, 2020; [DOI: https://dx.doi.org/10.1109/rtcsa50079.2020.9203662]
20. Nie, H.; Li, S.; Liu, Y. An enhanced routing and scheduling mechanism for time-triggered traffic with large period differences in time-sensitive networking. Appl. Sci.; 2022; 12, 4448. [DOI: https://dx.doi.org/10.3390/app12094448]
21. Pang, Z.; Huang, X.; Li, Z.; Zhang, S.; Xu, Y.; Wan, H.; Zhao, X. Flow scheduling for conflict-free network updates in time-sensitive software-defined networks. IEEE Trans. Ind. Inform.; 2020; 17, pp. 1668-1678. [DOI: https://dx.doi.org/10.1109/TII.2020.2998224]
22. Yu, Q.; Gu, M. Adaptive group routing and scheduling in multicast time-sensitive networks. IEEE Access; 2020; 8, pp. 37855-37865. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.2974580]
23. Vlk, M.; Hanzálek, Z.; Tang, S. Constraint programming approaches to joint routing and scheduling in time-sensitive networks. Comput. Ind. Eng.; 2021; 157, 107317. [DOI: https://dx.doi.org/10.1016/j.cie.2021.107317]
24. Wang, X.; Yao, H.; Mai, T.; Xiong, Z.; Wang, F.; Liu, Y. Joint routing and scheduling with cyclic queuing and forwarding for time-sensitive networks. IEEE Trans. Veh. Technol.; 2022; 72, pp. 3793-3804. [DOI: https://dx.doi.org/10.1109/TVT.2022.3216958]
25. Yu, H.; Taleb, T.; Zhang, J. Deep reinforcement learning-based deterministic routing and scheduling for mixed-criticality flows. IEEE Trans. Ind. Inform.; 2022; 19, pp. 8806-8816. [DOI: https://dx.doi.org/10.1109/TII.2022.3222314]
26. Reusch, N.; Craciunas, S.S.; Pop, P. Dependability-aware routing and scheduling for Time-Sensitive Networking. IET Cyber-Phys. Syst. Theory Appl.; 2022; 7, pp. 124-146. [DOI: https://dx.doi.org/10.1049/cps2.12030]
27. Jia, J.; Zhang, Y.; Xue, Y.; Chen, J.; Du, A.; Wang, X. Joint scheduling and routing for end-to-end deterministic transmission in TSN. Peer–Peer Netw. Appl.; 2025; 18, 87. [DOI: https://dx.doi.org/10.1007/s12083-024-01878-6]
28. Pahlevan, M.; Obermaisser, R. Genetic algorithm for scheduling time-triggered traffic in time-sensitive networks. Proceedings of the 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA); Torino, Italy, 4–7 September 2018; IEEE: Piscataway, NJ, USA, 2018; [DOI: https://dx.doi.org/10.1109/etfa.2018.8502515]
29. Dürr, F.; Nayak, N.G. No-wait packet scheduling for IEEE time-sensitive networks (TSN). Proceedings of the 24th International Conference on Real-Time Networks and Systems; Brest, France, 19–21 October 2016; [DOI: https://dx.doi.org/10.1145/2997465.2997494]
30. Craciunas, S.S.; Oliver, R.S.; Chmelík, M.; Steiner, W. Scheduling real-time communication in IEEE 802.1 Qbv time sensitive networks. Proceedings of the 24th International Conference on Real-Time Networks and Systems; Brest, France, 19–21 October 2016; [DOI: https://dx.doi.org/10.1145/2997465.2997470]
31. Pop, P.; Raagaard, M.L.; Craciunas, S.S.; Steiner, W. Design optimisation of cyber-physical distributed systems using IEEE time-sensitive networks. IET Cyber-Phys. Syst. Theory Appl.; 2016; 1, pp. 86-94. [DOI: https://dx.doi.org/10.1049/iet-cps.2016.0021]
32. Atallah, A.A.; Hamad, G.B.; Mohamed, O.A. Routing and scheduling of time-triggered traffic in time-sensitive networks. IEEE Trans. Ind. Inform.; 2019; 16, pp. 4525-4534. [DOI: https://dx.doi.org/10.1109/TII.2019.2950887]
33. Berisa, A.; Zhao, L.; Craciunas, S.S.; Ashjaei, M.; Mubeen, S.; Daneshtalab, M.; Sjödin, M. AVB-aware routing and scheduling for critical traffic in time-sensitive networks with preemption. Proceedings of the 30th International Conference on Real-Time Networks and Systems; Paris, France, 6–7 June 2022; [DOI: https://dx.doi.org/10.1145/3534879.3534926]
34. Vlk, M.; Brejchová, K.; Hanzálek, Z.; Tang, S. Large-scale periodic scheduling in time-sensitive networks. Comput. Oper. Res.; 2022; 137, 105512. [DOI: https://dx.doi.org/10.1016/j.cor.2021.105512]
35. Yao, M.; Liu, J.; Du, J.; Yan, D.; Zhang, Y.; Liu, W.; So, A.M.-C. A unified flow scheduling method for time sensitive networks. Comput. Netw.; 2023; 233, 109847. [DOI: https://dx.doi.org/10.1016/j.comnet.2023.109847]
36. Gong, W.; Wang, Y.; Cai, Z.; Wang, L. Finding multiple roots of nonlinear equation systems via a repulsion-based adaptive differential evolution. IEEE Trans. Syst. Man Cybern. Syst.; 2018; 50, pp. 1499-1513. [DOI: https://dx.doi.org/10.1109/TSMC.2018.2828018]
37. Hellmanns, D.; Haug, L.; Hildebrand, M.; Dürr, F.; Kehrer, S.; Hummen, R. How to optimize joint routing and scheduling models for TSN using integer linear programming. Proceedings of the 29th International Conference on Real-Time Networks and Systems; Nantes, France, 7–9 April 2021; [DOI: https://dx.doi.org/10.1145/3453417.3453421]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Routing and scheduling in Time-Sensitive Networking (TSN) is an NP-hard problem. In this paper, we propose a novel routing and scheduling approach for TSN based on evolutionary algorithm. Specifically, we introduce a flow grouping method that leverages the greatest common divisor to optimize flow aggregation. On this basis, we develop a flow routing strategy that employs a genetic algorithm, where the evaluation function considers not only flow combinability but also path length and network load. By exploiting the non-combinable properties of flows, we effectively reduce the search space for the genetic algorithm. Furthermore, we design a scheduling method based on differential evolution algorithms tailored to TSN’s requirements of zero jitter and no frame loss. We propose a gene coding method and rigorously prove its correctness, which significantly reduces the search space of the differential evolution algorithm. The experimental results demonstrate that our approach enables more flows to traverse along the shortest path compared to both k-shortest path methods and integer linear programming approaches, while achieving a faster execution time in large-scale scheduling scenarios.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details


1 School of Artificial Intelligence, Jiaxing University, Jiaxing 314001, China; [email protected] (Z.W.); [email protected] (W.L.)
2 School of Artificial Intelligence, Jiaxing University, Jiaxing 314001, China; [email protected] (Z.W.); [email protected] (W.L.), Technology Research and Development Centre, Xuelong Group Co., Ltd., Ningbo 315899, China; [email protected]
3 School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China
4 Technology Research and Development Centre, Xuelong Group Co., Ltd., Ningbo 315899, China; [email protected]