168 research outputs found

    Routing Optimization of AVB Streams in TSN Networks

    Get PDF

    A Survey of Scheduling in Time-Sensitive Networking (TSN)

    Full text link
    TSN is an enhancement of Ethernet which provides various mechanisms for real-time communication. Time-triggered (TT) traffic represents periodic data streams with strict real-time requirements. Amongst others, TSN supports scheduled transmission of TT streams, i.e., the transmission of their packets by edge nodes is coordinated in such a way that none or very little queuing delay occurs in intermediate nodes. TSN supports multiple priority queues per egress port. The TAS uses so-called gates to explicitly allow and block these queues for transmission on a short periodic timescale. The TAS is utilized to protect scheduled traffic from other traffic to minimize its queuing delay. In this work, we consider scheduling in TSN which comprises the computation of periodic transmission instants at edge nodes and the periodic opening and closing of queue gates. In this paper, we first give a brief overview of TSN features and standards. We state the TSN scheduling problem and explain common extensions which also include optimization problems. We review scheduling and optimization methods that have been used in this context. Then, the contribution of currently available research work is surveyed. We extract and compile optimization objectives, solved problem instances, and evaluation results. Research domains are identified, and specific contributions are analyzed. Finally, we discuss potential research directions and open problems.Comment: 34 pages, 19 figures, 9 tables 110 reference

    Pre-Shaping Bursty Transmissions under IEEE802.1Q as a Simple and Efficient QoS Mechanism

    Get PDF
    International audienceThe automotive industry is swiftly moving towards Ethernet as the high-speed communication network for in-vehicle communication. There is nonetheless a need for protocols that go beyond what standard Ethernet has to offer in order to provide additional QoS to demanding applications such as ADAS systems or audio/video streaming. The main protocols currently considered for that purpose are IEEE802.1Q, AVB with the Credit Based Shaper mechanism (IEEE802.1Qav) and TSN with its Time-Aware Shaper (IEEE802.1Qbv). AVB/CBS and TSN/TAS both provide efficient QoS mechanisms and they can be used in a combined manner, which offers many possibilities to the designer. Their use however requires dedicated hardware and software components, and clock synchronization in the case of TAS. Previous studies have also shown that the efficiency of these protocols depends much on the application at hand and the value of the configuration parameters. In this work, we explore the use of "pre-shaping" strategies under IEEE802.1Q for bursty traffic such as audio/video streams as a simple and efficient alternative to AVB/CBS and TSN/TAS. Pre-shaping means inserting on the sender side "well-chosen" pauses between successive frames of a burst (e.g., a camera frame), all the other characteristics of traffic remaining unchanged. We show on an automotive case-study how the use of pre-shaping for audio/video streams leads to a drastic reduction of the communication latencies for the best-effort streams while enabling to meet the timing constraints for the rest of the traffic. We then discuss the limitations of the pre-shaping mechanism and future works needed to facilitate its adoption

    Design Optimization of Cyber-Physical Distributed Systems using IEEE Time-sensitive Networks (TSN)

    Get PDF
    In this paper we are interested in safety-critical real-time applications implemented on distributed architectures supporting the Time-SensitiveNetworking (TSN) standard. The ongoing standardization of TSN is an IEEE effort to bring deterministic real-time capabilities into the IEEE 802.1 Ethernet standard supporting safety-critical systems and guaranteed Quality-of-Service. TSN will support Time-Triggered (TT) communication based on schedule tables, Audio-Video-Bridging (AVB) flows with bounded end-to-end latency as well as Best-Effort messages. We first present a survey of research related to the optimization of distributed cyber-physical systems using real-time Ethernet for communication. Then, we formulate two novel optimization problems related to the scheduling and routing of TT and AVB traffic in TSN. Thus, we consider that we know the topology of the network as well as the set of TT and AVB flows. We are interested to determine the routing of both TT and AVB flows as well as the scheduling of the TT flows such that all frames are schedulable and the AVB worst-case end-to-end delay is minimized. We have proposed an Integer Linear Programming (ILP) formulation for the scheduling problem and a Greedy Randomized Adaptive Search Procedure (GRASP)-based heuristic for the routing problem. The proposed approaches have been evaluated using several test cases

    Network Slicing in Industry 4.0 Applications:Abstraction Methods and End-to-End Analysis

    Get PDF

    Automotive Ethernet architecture and security: challenges and technologies

    Get PDF
    Vehicle infrastructure must address the challenges posed by today's advances toward connected and autonomous vehicles. To allow for more flexible architectures, high-bandwidth connections and scalability are needed to connect many sensors and electronic control units (ECUs). At the same time, deterministic and low latency is a critical and significant design requirement to support urgent real-time applications in autonomous vehicles. As a recent solution, the time-sensitive network (TSN) was introduced as Ethernet-based amendments in IEEE 802.1 TSN standards to meet those needs. However, it had hurdle to be overcome before it can be used effectively. This paper discusses the latest studies concerning the automotive Ethernet requirements, including transmission delay studies to improve worst-case end-to-end delay and end-to-end jitter. Also, the paper focuses on the securing Ethernet-based in-vehicle networks (IVNs) by reviewing new encryption and authentication methods and approaches
    corecore