Professional Documents
Culture Documents
Quantitative Performance Comparison of Various
Quantitative Performance Comparison of Various
Abstract—Owning to the sub-standards being developed by depend on the real-time capabilities of their communica-
IEEE Time-Sensitive Networking (TSN) Task Group, the tra- tion networks. Time-Sensitive Networking (TSN) [1] enhances
ditional IEEE 802.1 Ethernet is enhanced to support real-time standard Ethernet [2], aiming at providing deterministic com-
dependable communications for future time- and safety-critical
applications. Several sub-standards have been recently proposed munication for real-time traffic. Over the recent years, TSN
that introduce various traffic shapers (e.g., Time-Aware Shaper has become a high-profile and active standardization effort
(TAS), Asynchronous Traffic Shaper (ATS), Credit-Based Shaper with a strong research community both in academia and in the
(CBS), Strict Priority (SP)) for flow control mechanisms of queu- industry. Several companies, such as Belden, Cisco Systems,
ing and scheduling, targeting different application requirements. Intel Corporation, NXP Semiconductors, Siemens, TTTech
These shapers can be used in isolation or combination and there
is limited work that analyzes, evaluates, and compares their Computertechnik and Huawei Technologies are developing
performance, which makes it challenging for end-users to choose TSN switches with various capabilities. The Avnu Alliance
the right combination for their applications. This paper aims consortium has been established to evaluate the interoperabil-
at (i) quantitatively comparing various traffic shapers and their ity and conformance of such products to the TSN standards.
combinations, (ii) summarizing, classifying, and extending the TSN integrates multiple traffic types implemented by different
architectures of individual and combined traffic shapers and
their Network calculus (NC)-based performance analysis meth- scheduling mechanisms (traffic shapers), such as the Time-
ods, and (iii) filling the gap in the timing analysis research on Aware Shaper (TAS) standardized by IEEE 802.1Qbv [4],
handling ATS and CBS used for different priority queues, and the Asynchronous Traffic Shaper (ATS) standardized by IEEE
two novel hybrid architectures of combined traffic shapers, i.e., 802.1Qcr [5], the Credit-Based Shaper (CBS) standardized by
TAS+ATS+SP and TAS+ATS+CBS when ATS and CBS used IEEE 802.1Qav [7]. These shapers can be used separately
at the same queue. A large number of experiments, using both
synthetic and realistic test cases, are carried out for quantitative or in several combinations. TAS is based on a global clock
performance comparisons of various individual and combined synchronization (via IEEE 802.1AS [3]) implementing the
traffic shapers, from the perspective of upper bounds of delay, time-triggered traffic to guarantee deterministic transmission.
backlog, and jitter. To the best of our knowledge, we are the first ATS avoids using the global clock synchronization, but it is
to quantitatively compare the performance of the main traffic still able to provide real-time guarantees by reshaping traf-
shapers in TSN. The paper aims at supporting the researchers
and practitioners in the selection of suitable TSN sub-protocols fic flows per hop to reduce the burstiness of traffic. CBS is
for their use cases. an asynchronous traffic shaper that implements a bandwidth
reservation mechanism.
Index Terms—TSN, traffic shapers, combinations, real-time
performance, worst-case, comparison. Many related works have already been proposed for the
schedulability analysis and configuration for different traffic
shapers. For TAS, which relies on global clock synchroniza-
I. I NTRODUCTION tion, the scheduling synthesis for time-triggered (TT) traffic,
OWADAYS, modern cyber-physical and embedded which is also called scheduled traffic (ST), has been studied
N systems, including systems in the automotive, indus-
trial automation, avionics and aerospace domain increasingly
in [10]–[14] using different implementation methods to syn-
thesize Gate Control Lists (GCLs). Vlk et al. [14] increase
the schedulability and throughput of TT by proposing a sim-
Manuscript received 25 March 2021; revised 15 November 2021, ple hardware enhancement of a switch. Oliver et al. [15] relax
24 March 2022, and 27 May 2022; accepted 29 May 2022. Date of pub- the constraints of the scheduling model to increase the solution
lication 3 June 2022; date of current version 12 October 2022. This work
was supported by the National Natural Science Foundation of China under space at the expense of the deterministic scheduling of TAS.
Grant 62071023. The associate editor coordinating the review of this arti- A more flexible class-based (i.e., window-based) TAS model
cle and approving it for publication was V. Fodor. (Corresponding author: is proposed in [16], [17], which does not require strict flow
Luxi Zhao.)
Luxi Zhao is with the Department of Electronic and Information isolation in queues and supports unscheduled end systems.
Engineering, Beihang University, Beijing 100190, China (e-mail: Reusch et al. [40] propose the class-based schedule synthe-
zhaoluxi@buaa.edu.cn). sis for 802.1Qbv. Craciunas and Oliver [9] give an overview
Paul Pop is with the Department of Applied Mathematics and Computer
Science, Technical University of Denmark, 2800 Lyngby, Denmark (e-mail: of the comparison of scheduling mechanisms for TAS in TSN
paupo@dtu.dk). networks and time-triggered scheduling in TTEthernet. In [19],
Sebastian Steinhorst is with the Department of Electrical and Computer researchers solved the stability-aware integrated scheduling
Engineering, Technical University of Munich, 80333 Munich, Germany
(e-mail: sebastian.steinhorst@tum.de). and routing problem for networked cyber-physical systems
Digital Object Identifier 10.1109/TNSM.2022.3180160 based on the 802.1Qbv TSN standard. ATS is developed from
1932-4537
c 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2900 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
the urgency-based scheduler (UBS) proposed by Specht and on these novel combinations. We consider the coexistence
Samii [20] and aims at achieving low latency without design- between time-triggered shapers (TAS) and various event-
ing time schedules harmonized among all end systems and triggered shapers (ATS, CBS, SP). Our findings will support
switches based on global time synchronization. The same researchers and practitioners in understanding the performance
authors [21] propose the synthesis of queues and priority characteristics and mutual effects of different traffic shapers.
assignment for ATS. Zhou et al. [22], [23] present the simu- The main contributions of the paper are as follows,
lation model of ATS implemented in the Riverbed simulator. • We summarize the architectures of the main traffic
Reference [24] proves that ATS will not introduce extra over- shapers and their combinations in TSN. In order to
heads to the worst-case delay of the FIFO system. For CBS, perform a fair comparison, we use the same method
several methods related to performance and schedulability (Network Calculus, NC) to evaluate the performance of
analysis have been proposed in [25]–[29]. each shaper. Based on our and other researchers’ exist-
The above studies all assume the use of a single traffic ing NC-based analysis work for different traffic shapers
shaper. There are also some limited studies on the combination in TSN, we summarize and classify them. The existing
of different traffic shapers. An overview of the combined usage work for the NC-based analysis includes: ATS, CBS, SP
of TAS and CBS in controlling flows in in-vehicle networks individually used, and TAS+SP, TAS+CBS used in com-
was presented in [30]. A simulation study of the coexistence of bination. We complete the general uniform formula for
TAS and CBS is presented in [31]. Zhao et al. [33] propose the timing analysis of the arbitrary number of AVB classes
performance analysis of Audio Video Bridging (AVB) traffic when CBS is used individually.
under the coexistence of CBS and TAS. The same authors [34] • The NC-based performance analysis approach is extended
extend the timing analysis for the arbitrary number of AVB to the combination used of ATS and CBS for differ-
classes under the same architecture of TAS+CBS, consider- ent priority queues, including two cases of ATS+CBS
ing both standard credit behavior and more generally assumed (ATS for high priority queues and CBS for low priority
credit behavior but deviating from the standard 802.1Q [1]. queues) and CBS+ATS (CBS for high priority queues
Mohammadpour et al. [36] consider the combination of non- and ATS for low priority queues). Two novel hybrid
time-triggered control-data traffic (CDT), CBS and ATS, and architectures of traffic shapers, i.e., TAS+ATS+SP (com-
give the latency and backlog bounds for the traffic of CBS pared with TAS+SP) and TAS+ATS+CBS (compared
affected by ATS. However, the CDT model is not a stan- with TAS+CBS) are proposed to understand the impact
dard model required by the TSN standard. In [37], researchers of ATS reshaping on the combined architectures, where
present a simulation model of combined CBS and ATS within SP and CBS are used in the same queue. Even though
the OMNeT++ simulator. ATS+CBS on the same queue is not supported by the
With the increasing number of sub-standards for TSN standards, their combination is still worthwhile to be
networks, there have been several literature reviews related investigated from a research perspective. The NC-based
to TSN networks. Researchers [38] have given a comprehen- timing analysis method is extended to analyze the real-
sive survey on TSN networks, from TSN sub-standards to the time performance of traffic in these combinations. The
existing research of TSN before 2018. Maile et al. [39] provide combinations have been selected to provide comprehen-
an overview of the existing publications that use a Network sive coverage of possible combined traffic shapers in TSN
Calculus approach in the timing analysis for TSN networks. networks, supported by their corresponding NC-based
Researchers in [18] make a comparison between flow-based performance analysis.
(i.e., frame-based) and class-based TAS, which concludes that • A large number of experiments, using both synthetic and
class-based scheduling is easy to plan but loses the advantages realistic test cases, for quantitative performance compar-
of extremely low latency and jitter compared with the flow- isons of various individual and combined traffic shapers
based TAS. Nasrallah et al. [41] presented the performance are carried out, from the perspective of upper bounds of
comparison of class-based TAS and ATS based on simula- delay, backlog and jitter. Especially with ATS shaping,
tions. Nevertheless, the ATS architecture they considered does we highlight interesting results that do not always show
not exactly match the general model of ATS [5], [20]. They the superiority of ATS compared with other shapers, in
apply the ATS shaper at the ingress port of the switch instead, isolation or combination. Moreover, we compare the NC-
and consider another extra urgent queue with the highest prior- based analysis with the closed-form formula proposed
ity before ST traffic. Thus, as stated above, there are currently in [20] for the ATS shaper used individually. We also
no comprehensive and systematic guidelines on the quantita- show the positive function of ATS on the cyclic depen-
tive performance comparison of different traffic shapers, and dencies. We aim at providing a basic reference for the
their further coexistence possibilities and interactions in TSN selection of suitable TSN sub-protocols for researchers
networks. and practitioners.
This paper aims at (i) quantitatively comparing various The remainder of the paper is organized as follows.
traffic shapers, i.e., TAS, ATS, CBS, strict priority (SP) Section II gives the overview of performance metrics for the
scheduling and their combinations; (ii) summarizing, classify- TSN traffic evaluation. Section III summarizes and supple-
ing and extending the architectures of individual and combined ments the worst-case performance analysis for traffic transmis-
traffic shapers and their performance analysis methods; and sion with individual TAS, ATS and CBS shapers. Section IV
(iii) filling the gap in the timing analysis research handling presents novel combined architectures of shapers, and extends
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2901
TABLE I
the NC-based analysis. The evaluation of our performance S UMMARY OF N OTATION
comparison of individual traffic shapers and their combinations
is provided in Section V. Section VI concludes of the paper.
The background of the NC method used is briefly introduced
in Appendix A.
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2902 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
TABLE II
S UMMARY OF ACRONYM
A. Time-Aware-Shaper (TAS)
Relying on the global network clock (IEEE 802.1ASrev [3]),
IEEE 802.1Qbv [4] defines the Time-Aware Shaper (TAS)
used to control a gate for each queue of the output port to
enable time-triggered communication, enabling the determin-
istic transmission of extremely low latency and jitter using
Gate Control Lists (GCLs). In this paper, we consider the flow-
based TAS [11]–[14], which is a widely used model compared
to class-based TAS [16], [17]. Researchers in [18] have con-
C. End-to-End Jitter Upper Bounds cluded that it has much better performance in terms of latency
Jitter refers to the delay variation, i.e., the difference in and jitter compared with the class-based TAS. Moreover, we
end-to-end latency between any selected frames in a flow consider the case that both ESes and SWs can be sched-
transmitting over a network. Then, the upper bound of jitter of uled [11], [12]. With a scheduled ES, the task sending the
a flow f is calculated by the difference between the maximum message and the communication schedule on the ES egress
and minimum bounds of end-to-end latency of the flow f. The port are synchronized.
upper bound of end-to-end latency DE2E,f has been discussed Fig. 1 depicts a TAS architecture in an egress port of a node
previously in Eq. (2). The lower bound of end-to-end latency supporting 802.1Qbv. The switching fabric forwards input
dE2E,f of f is the sum of transmission delays along its route flows to the corresponding output port according to their rout-
without the interference from other flows, which can be given ing information. The traffic class filtering (TCF) dispatches
as follows, input frames to the corresponding queue of the output port
according to their traffic class. For each egress port, there are
dE2E,f = lf /C + Dpro + Dfwd − Dfwd . (4) eight queues, where there may be multiple queues used for
Q∈Rf TT traffic to achieve completely deterministic transmission,
depending on the TT traffic load and construction of GCLs.
Thus the upper bound of jitter for the flow f is,
Frames waiting in a queue are eligible for transmission only
JE2E,f = DE2E,f − dE2E,f . (5) when the corresponding queue gate is open. The TAS control
is implemented based on GCLs which dictate the state of the
As shown above, in order to obtain the performance metrics gates. The open and closed states are represented by 1 and
for different traffic shapers in TSN, the main objective is to 0 respectively in GCLs, as shown with the GCL table beside
construct the arrival curve αQ (t) and service curve βQ (t) for the TAS architecture in Fig. 1. For example, at time t1 , the
the corresponding traffic shapers. gate for the queue Q2 is open (1) while all the rest are closed
(0). Full control of frames can be implemented by mutually
III. P ERFORMANCE A NALYSIS OF I NDIVIDUAL exclusive opening queues.
T RAFFIC S HAPERS Currently, the flow-based TAS can only support periodic
In the following, the performance analyses for each indi- traffic scheduling. The problem of GCL synthesis is to find
vidual traffic shaper, including Time-Aware Shaper (TAS), feasible and optimized offsets and queue allocations for peri-
Asynchronous Traffic Shaper (ATS) and Credit-Based Shaper odic traffic. A frame of a TT flow f on a link (egress
(CBS), are summarized and extended from the state-of-the- port) h = [va , vb ] is defined by the tuple φhf , lf /C ,
art, and specified using a citation after the subtitle of each of which φhf and lf /C respectively denote the start time
performance analysis section to indicate where the relevant (i.e., offset) of transmission and transmission duration of
previous work. Their quantitative performance comparison in the frame on the respective link. Flow f repeatedly sends
Section V-A is based on these analyses. When discussing a cer- frames at times φhf , φhf + Tf , φhf + 2 · Tf , φhf + 3 · Tf , . . .
tain traffic shaper, it is assumed that all nodes, including end Fig. 2 shows an example of a GCL using a Gantt chart,
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2903
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2904 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
Note that not all the flows in the shared queue Qi− will enter
αq∗ (t) = rf · t + bf . (10)
into the same shaped queue q, as they may be forwarded to the
f ∈q
other egress port of the subsequent node. Moreover, according
Moreover, according to the queuing schemes, there will be one to the ATS queuing schemes QAR1 and QAR2, flows queuing
or more shaped queues connected to the shared queue. Thus, in the shaped queue q can only come from the same preceding
the input arrival curve αQ
ATS (t) of aggregate flows before the
i
shared queue Qi− .
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2905
Then, the service curve βqATS (t) for aggregate flows in the
shaped queue q can be given by means of the pure-delay
function [36]
q
βqATS (t) = δD (t) (13)
q
where δD (t) is the pure-delay function [42] which equals to
0 if t ≤ D and +∞ otherwise, while D = DqATS (Eq. (12))
is the delay upper bound of flows in the shaped queue q.
q (t) - ATS - Shaped Queue: The
Input Arrival Curve α ATS
Fig. 5. CBS Architecture.
input arrival curve αqATS (t) of aggregate flows before reach-
ing the corresponding shaped queue q is related to the output
arrival curve α∗ − (t) when these flows depart the preceding queues are implemented in a single physical queue. It should
Qi
shared queue Qi− , and can be given by, also note that the maximum backlogs in the shared queue
BQATS and shaped queues B ATS cannot be reached at the same
Q− Q− q
∗ i
αQ − (t) = αf i (t) δD i (t), (14) time.
i
f ∈[Qi− ,q]
C. Credit-Based Shaper (CBS)
Q−
where αf i (t) = rf · t + bf is the input arrival curve of the The Credit-Based Shaper (CBS) [7] is another queuing and
Q−
flow f before the shared queue Qi− , δD i (t) is the pure-delay forwarding rule proposed for the bandwidth reservation for
function of the delay bound D = D ATS for aggregate SP Audio-Video Bridging (AVB) traffic. Fig. 5(a) depicts a CBS
−
Qi architecture model of an output port of a node. Currently,
flows of priority i in the preceding shared queue Qi− . Note AVB classes (i.e., Stream Reservation (SR) classes) Mi are
that we use f ∈ [Qi− , q] instead of f ∈ Qi− to emphasize expanded from two to more (a maximum of seven, i ≤ 7) pri-
that not all flows queuing in the shared queue Qi− will be orities supported by TSN [1]. Each AVB class corresponds to a
forwarded to the same shaped queue q. FIFO queue, and has its credit value for the CBS shaper, which
Moreover, different flows sharing the same shaped queue is used to control the transmission of AVB frames. For each
q cannot arrive on the shared queue Qi at the same time, AVB Class Mi , the CBS algorithm has a credit value manip-
because flows sharing a common link are serialized. Thus, by ulated by two different parameters called “idleSlope” (idSli )
taking all flows from Qi− to q as a group, their output arrival and “sendSlope” (sdSli = idSli − C ). For the AVB traffic of
curve from Qi− can be refined by considering the constraint Class Mi , idSli decides its maximum guaranteed bandwidth
from the physical link with the shaping curve σ link (t) = C ·t. reservation, of which the minimum value is set according to
According to the ATS queuing schemes QAR1 and QAR2, all the actual bandwidth usage of AVB Class Mi traffic.
flows in the shaped queue q must be from the same preceding The frame transmission based on the CBS functionality is
shared queue Qi− . Then, the input arrival curve αqATS (t) of shown using an example in Fig. 5(b). The credit is initialized
aggregate flows before the shaped queue q is given by, to zero and is increasing with the idleSlope (idSli ) when AVB
frames are waiting to be transmitted due to other higher pri-
∗
αqATS (t) = αQ − (t) ∧ σ
link max
(t) + lQ − , (15) ority AVB frames or due to the negative credit and decreasing
i i
where α∗ − (t) is given by Eq. (14), x ∧ y = min{x , y}, and with the sendSlope (sdSli ) during the transmission of an AVB
Qi frame. If the credit is positive and no frames are waiting in the
l max is the maximum frame size in the queue Qi− , which corresponding queue, then the credit is set to zero. However,
Qi−
needs to be taken into account since the frame is packetized if no frames are waiting in the queue, but the credit of the
at the switch input. corresponding queue is negative, it will increase with the idle
By applying αqATS (t) and βqATS (t) into Eq. (3), the upper slope until zero.
bound of backlog BqATS in the shaped queue q can be given. Since the standard 802.1Q [1] now supports a multiple num-
Remark: As discussed above, the ATS shaper only plays a ber of AVB classes, we extend the previous analysis work of
role in reshaping the flows, and will not increase the worst-case supporting two classes [27] and three classes [28] to an arbi-
delay of the flow in the node transmission. Thus, the end-to- trary number of AVB classes, as summarized in Section III-C1.
end latency bound for the flow can be obtained by summing The extension proof of credit bounds for an arbitrary num-
up latency bounds DQ ATS (t) only for each shared queue along ber of AVB classes can be found in our previous work [34].
i
its path. The backlogs for ATS are the sum of backlogs for the Although [34] is the NC-based performance analysis for com-
shared queue and the corresponding shaped queue connected bined TAS and CBS, and TT transmission delays AVB traffic,
to the shared queue, AVB credits will not be affected by TT traffic if credit is frozen
during the TT window and the protection interval (“guard
ATS ATS
BQ = BQ i
+ BqATS , (16) band” (GB)), which is one of the cases discussed in [34].
q→Qi 1) Performance Analysis–CBS [27]:
where q → Qi represents all the shaped queues q connected Q i (t) - CBS: The service for AVB traffic
Service Curve β CBS
to the shared queue Qi . This due to that shaped and shared in the individual CBS architecture depends only on the credit
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2906 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
state controlled by CBS. As opposed SP traffic, AVB traffic Appendix A. Finally, the input arrival curve αQ CBS (t) of
i
with low priority can obtain the service even if the queues of aggregate AVB flows of Class Mi before Qi is given by,
AVB traffic of higher priority are not empty. This is because
CBS
∗
link max
CBS max
αQ i (t) = α (t) ∧ σ (t) + l ∧ σ (t) + l − .
the AVB traffic cannot transmit if the CBS credit of its corre- Qi− Qi− Qi− Qi
Qi−
sponding class is negative. The guaranteed service for multiple
numbers of AVB classes Mi (i ∈ [1, nCBS ]) [27], (22)
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2907
Δt = Δt − + Δt + ,
Fig. 6. ATS+CBS/CBS+ATS Combined Shaper Architecture (H/L: high/low
priority).
where Δt − (resp. Δt + ) is the accumulated length of all
periods where the credit is decreasing (resp. increasing).
considered is to set the priority for ATS and CBS queues. In Δt − = ΔtQ CBS represents the transmission duration of AVB
i
this paper, it is assumed two cases: ATS and CBS respectively, Class Mi , and Δt + = ΔtQ CBS is the waiting time duration
j
have the higher priority, of which architectures are respectively of AVB Class Mi due to the transmission for higher priority
shown in Fig. 6(a) and (b). And there are nSP queues and SP flows reshaped by ATS or the transmission for other AVB
nCBS queues. We presume in this paper the non-preemptive Classes or due to the credit ci (t) < 0. And we have
integration mode for different traffic types. The frame trans-
mission based on the CBS functionality is shown with an Δt + = Δt − ΔtQ
CBS
i
.
example in Fig. 5(c), (d). The credit behavior is very simi-
lar to CBS individually used. Note that when CBS is used Due to the definition of s, for ∀u ∈ (s, t], the queue Qi
for low priority traffic, the credit of all AVB classes will be for AVB traffic is not possible to temporarily empty when
increased when the high priority SP frame is on transmis- ci (u) > 0. Thus, there is no case where the credit of AVB
sion. In the following, the NC approach is expanded to the Class Mi is reduced from some positive value P to 0 due to
performance analysis of ATS and AVB traffic in the ATS+CBS resets. Then the variation of credit for AVB Class Mi during
and CBS+ATS architectures. the time interval Δt = t − s satisfies,
1) Performance Analysis–ATS+CBS: Since the flows ci (t) − ci (s) = ci (t)
shaped by ATS have the highest priority, and there will be
= Δt + · idSli + Δt − · sdSli
at most one non-preemptive AVB frame that can impact their
CBS CBS
transmission. Therefore, the performance analysis for ATS is = Δt − ΔtQ i
· idSli + ΔtQ i
· sdSli
completely the same as ATS individually used, as discussed in CBS
max in the = Δt · idSli − ΔtQ · C,
Section III-B1. Note that the only difference is that l>i i
CBS = t − s − Δt
ATS − ΔtQi − ΔtLP and P ≥ 0,
a wide-sense increasing function, from which we derive Since Δt<i CBS
the above expression is modified into,
∗ CBS CBS cimax +
RQ (t) ≥ RQi (s) + idSl i t − s − CBS
i idSli c<i (t) − c<i (s) ≤ ΔtATS + ΔtQ + Δt LP · C
⎛
i
⎞
c max +
≥ inf RQCBS
(s) + idSli t − s − i .
i−1
0≤s≤t i idSli + (t − s) · ⎝ idSlj − C ⎠. (25)
j =1
Therefore, the service curve βQ CBS (t) for AVB Class M is
i i
c max For ΔtATS , we have,
βQi (t) = idSli [t − idSli ] , which is same to the expression
CBS i +
nSP
nSP
in Eq. (17). ATS ATS ATS
ΔtATS · C = RQ (t) − R (s) ≤ αQ (t − s),
In the following, we will derive the credit upper bound cimax k Qk k
k =1 k =1
for each AVB Class Mi (i ∈ [1, nCBS ]). Let t ∈ R+ be a time
point when AVB gates are in the open state, and ci (t) > 0. where αQ ATS (t) is the arrival curve of aggregate SP flows of
k
Then let us define s = sup{u ≤ t ∀Qj ∈ Q≤i CBS , c (u) ≤ 0},
j priority k before the shared queue of ATS, given by Eq. (11).
CBS
where Q≤i are the queues with priority no lower than AVB Thus, the above equation can be written,
Class Mi . This implies that ∀u ∈ (s, t], ∃Qj ∈ Q≤i CBS ,
nSP
cj (u) > 0, i.e., there always exists at least one queue in Q≤i CBS ΔtATS · C ≤ (rf (t − s) + bf ),
with some frame to send. Otherwise, we can always find k =1 q→Qk f ∈q
another s < s ≤ t that satisfies ∀Qj ∈ Q≤i CBS , c (s ) ≤ 0.
j where q → Qi represents all the shaped queues q con-
Consider the evolution of the credit value ci (t) of AVB nected to the shared queue Qi . Moreover, since ΔtLP ·
Class Mi between s and t. The credit ci (t) 1) decreases at C ≤ maxj ∈[i+1,nCBS ] {lQ
max , l max } = l max ,Eq. (25) can be
BE >i
speed sdSli = idSli − C when the frame in the queue Qi is rewritten to,
j
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2909
imum frame size of traffic with the priority lower than into,
priority i. n
CBS
Proof: Let RQ ATS (t) (resp. R CBS (t)) and R ∗ ATS (t) (resp. ∗ ATS ∗ ATS CBS
i Qi Qi RQ (t) − RQ (s) ≥ C (t − s) − αQ (t − s)
∗ CBS
RQi (t)) are the arrival and departure processes of SP flows
i i k
k =1
of priority i (i ∈ [1, nSP ]) reshaped by ATS (resp. AVB flows
i−1
of Class Mi (i ∈ [1, nCBS ])). It is assumed that t ∈ R+ be − ATS
αQ j
max
(t − s) − l>i ,
a time point when the queue Qi of SP traffic of priority i j =1
reshaped by ATS is backlogged, i.e., RQ ∗ ATS (t) < R ATS (t).
i Qi ∗ ATS (t) − R ∗ ATS (s) = R ∗ ATS (t) −
Since we have also RQ
Then, let s = sup{u ≤ t ∀k ∈ [1, nCBS ], RQ ∗ CBS (u) = i Qi Qi
k
RQATS (s) ≥ 0 and R ∗ ATS (t) is a wide-sense increasing
RQCBS (u); ∀j ∈ [1, i ], R ∗ ATS (u) = R ATS (u)}. i Q i
k Qj Qj function, from which we derive
During the time interval (s, t], flows of priority i in the n
CBS
shared queue Qi will obtain the service only when the queue ∗ ATS ATS CBS
for higher priority traffic is empty. Moreover, at most one non- RQi (t) ≥ RQi (s) + C (t − s) − αQ k
(t − s)
preemptable frame with lower priority is transmitted within k =1
⎤+
(s, t]. Thus, we have
i−1
ATS max ⎦
− αQ j
(t − s) − l>i
nCBS
j =1
∗ ATS ∗ ATS ∗ CBS ∗ CBS
RQ i
(t) − RQ i
(s) = C (t − s) − RQ k
(t) − RQ k
(s)
ATS ATS
k =1 ≥ inf RQ i
(s) + βQ i
(t − s) .
i−1
0≤s≤t
∗ ATS ∗ ATS
− RQ (t) − RQ (s) − ΔtLP ,
where the service curve βQ ATS (t − s) = [C (t − s) −
j j
j =1 i
nCBS CBS i−1 ATS
k =1 αQk (t − s) − j =1 αQj (t − s) − l>i ] .
(28) max +
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2910 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2911
When the gate for the AVB queue is closed, i.e., during TT (Eq. (18)).
transmission, the credit is frozen. In particular, during GB, the • M=NF: Although there is a GB before each TT window,
gates for all AVB queues are open without any frame transmis- and no AVB traffic class can transmit during GB+TT, the
sion, however. Then, the variation of credit during GB has two credit of the corresponding AVB class will be increased
cases, frozen and non-frozen, which will impact the service during GB, however. Therefore, when deriving the service
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2912 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2913
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2914 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
ATS + CBS
in which α[TAS
M ] (t) (Eq. (29)) is only related to the TT traffic curve αq[ M]
(t) of aggregate AVB flows before entering
and the credit behavior during GB, Δt 0 is not affected by ATS the shaped queue q is also related to the CBS shaping curve
reshaping. σ ATS + CBS
(t).
Qi− [ M ]
Moreover, ci (t) in Eq. (49) can be lower and upper As can be seen from the CBS shaping curve under the
bounded by, TAS+CBS architecture in Eq. (35), it is related to, on the
one hand, the service curve βTT TAS (t) (Eq. (36)) supplied to
cimin ≤ ci (t) ≤ ci[
max
M ], (51)
TT traffic, which is only related to the time slots reserved for
where cimin is given by Eq. (19), which is only related to the TT frames. On the other hand, the credit lower bound cimin
max = c max is given by Eq. (18) (Eq. (19)) and upper bound ci[ max = {c max , c max } for AVB
maximum frame size in Qi . ci[ M] i M] i i
for the case of credit frozen during GB, which is associated flows in Qi− , which have been discussed in Corollary 7, are not
with the credit lower bound cjmin of AVB traffic with the pri- related to the arrival pattern of AVB flows before the shared
ority Mj higher than Mi , and the maximum frame size l>i max
queue Qi− . Since ATS only has an impact on the flows’ arrival
of AVB traffic with the priority lower than Mi . ci[ M ] = c max
max
i pattern before shared queues Qi− , and shaped queue q, the
is given by Eq. (33) for the case of credit non-frozen during CBS shaping curve σ ATS −
+ CBS
(t) in the TAS+ATS+CBS
Qi [ M ]
GB, which besides the above-mentioned parameters in cimax ,
architecture is the same as the CBS shaping curve σ CBS (t)
is also related to the linear upper envelope for GB duration. Qi− [ M ]
As can be found, ci (t) ≤ ci[max is not related to flows arrival in the TAS+CBS architecture.
The discussion for the aggregate arrival curve α∗ − (t) of
M]
pattern of AVB flows before the share queue Qi . Qi
By the analysis of Eq. (50) and Eq. (51), it is known AVB flows departure from the shared queue Qi− to the shaped
that ATS reshaping on AVB traffic does not change the abil- queue q is similar to the one in Corollary 5.
+CBS
ity to serve AVB traffic of different priorities in the shared Service Curve β ATS
q [M]
(t) - CBS - Shaped Queue:
queue, compared with the service capability for AVB traffic ATS + CBS
Corollary 9: The service curve βq[ M]
(t) for aggre-
under the TAS+CBS architecture. Then, by inducing Eq. (50)
gate AVB flows in the shaped queue q is
and Eq. (51) into Eq. (49), we can obtain the service curve
(Eq. (48)) for AVB traffic in the shared queue under the ATS + CBS q
βq[ M]
(t) = δD (t), (55)
TAS+ATS+CBS architecture, the same as the one (Eq. (32)
q
in Appendix A-B2) under the TAS+AVB architecture. where δD (t) is the pure-delay function with D =
ATS + CBS ATS + CBS
By applying αQ (t) and βQ (t) into ATS + CBS
Dq[ M ] = D ATS + CBS
− lqmin /C , and D ATS + CBS
is
i[ M ]
Qi− [ M ] Qi− [ M ]
i
Eq. (62) and Eq. (63), we can determine the upper bound
from Eq. (52).
of latency
Proof: The discussion is similar to Corollary 6, by consid-
ATS + CBS
DQ ATS + CBS
= h(αQ ATS + CBS
(t), βQ (t)), (52) ering the latency upper bound D ATS−
+ CBS
in Eq. (52) instead
[M]
i i [M] i Qi [ M ]
and backlog of D ATS
−
+ SP
in Eq. (43).
Qi
ATS + CBS ATS + CBS ATS + CBS
BQ = v (αQ (t), βQ (t)) (53)
i[ M ] i i[ M ]
V. P ERFORMANCE C OMPARISON E VALUATION
for SP flows of priority Mi passing through the shared queue
In this section, in order to compare the performance evalu-
Qi under TAS+ATS+CBS.
+CBS ation of individual traffic shapers and their combinations, we
Input Arrival Curve α ATS q [M]
(t) - CBS - Shaped
use a large set of synthetic test cases 3 with different topolo-
Queue:
ATS + CBS gies and a realistic test case, i.e., the Orion Crew Exploration
Corollary 8: The input arrival curve αq[ M]
(t) of
Vehicle (CEV) from NASA [49].
aggregate AVB flows before the shaped queue q is,
ATS + CBS ∗ link max
αq[ M]
(t) = α Q − (t) ∧ σ (t) + l −
Qi
A. Individual Traffic Shapers
i 1) Comparison of NC and Non-NC Approaches for ATS
ATS + CBS max
∧ σ − (t) + lQ − . (54) Evaluation: Before discussing the various traffic shapers, we
Qi [ M ] i
first compare the two different methods used for ATS eval-
where σ ATS + CBS
(t) is same to Eq. (35) of the case with- uation, i.e., the Network Calculus (NC) used in this article
Qi− [ M ]
out ATS, and the output arrival curve α∗ − (t) is from and a non-NC approach proposed in [20]. By comparing the
Qi upper bound of the delay obtained by the two methods, the
Q−
Eq. (14), by replacing the delay bound D in δD i (t) with latency bound for a flow f in an egress port calculated by NC
D = D ATS −
+ CBS
= h(αATS−
+ CBS
(t), β ATS
−
+ CBS
(t)) of is ΔDfQ more pessimistic than the result calculated by the
Qi [ M ] Qi Qi [ M ]
non-NC approach [20],
AVB traffic in the preceding shared queue Qi− , in which
αATS + CBS
(t) and β ATS + CBS
(t) are respectively from lf lf
Qi− Qi− [ M ] Q
ΔDf = max − , (56)
Eq. (47) and Eq. (48). ∀f ∈Q(f ) C − f ∈QH rf C
Proof: In the TAS+ATS+CBS architecture, in addition to
the shaping curve σ link (t) of the physical link due to seri- 3 Details of flows, routes and GCLs for all the test cases can be downloaded
alization of all AVB flows from Qi− to q, the input arrival from https://zenodo.org/record/6378112#.YjqQReeZNPY.
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2916 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
TABLE III
S TATISTICAL H OPS AND T RAFFIC L OAD FOR 100 T EST C ASES
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2917
TABLE IV
D IFFERENCE R ATIO ON M ETRICS OF T WO I NDIVIDUAL T RAFFIC S HAPERS
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2918 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
CBS, a finding that has not been reported in the related work. experiments, we chose the same topology (MM) to study the
Due to the reshaping function of ATS, which avoids burstiness comparative performance between ATS and SP mechanisms
cascades, we initially hypothesized that ATS would improve when the average traffic load is increasing from 10% to 90%.
the performance of flows. However, as it can be observed in We used 20 random synthetic test cases under each traffic load.
Fig. 13(a), (b), (c) and the fourth and fifth columns in Table IV, The frame sizes and intervals are selected in the same way as
in terms of upper bounds of delay, backlog or jitter, ATS did for the use cases in the previous section. As the comparison
not perform superiorly. trend of individual shapers on the upper bounds of latency and
In the following, we will only focus on the comparison jitter is very similar, we will only show the comparison of the
of ATS and SP, as ATS compared with CBS can be inferred upper bounds of delay and backlog in the following.
from the comparison of SP and CBS discussed above. From We still use the difference ratio from Eq. (57) to represent
the current results, we can draw a conclusion and a hypothe- the performance comparison result of ATS and SP under the
sis. The conclusion is that the advantages of ATS are getting current use case, where Xi can represent the upper bound of
worse with the increase in the concentration of flows transmis- the end-to-end latency of flow fi or the upper bound of the
sion and the number of hops (under the same concentration backlog for the queue Qi at the egress port.
of flows transmission). This is because the more concentrated In order to test the performance of ATS in isolation, we first
the flows are in the network, the more obvious is the serializa- assume that all flows have the same priority, and that there is
tion of flows in transmission, which increases the determinism no interference from other traffic types. This situation can also
of traffic transmission at subsequent nodes. Moreover, in the be similar to the network adopting the preemption integration
case of the constant concentration of flows transmission, as mode. The comparison results of ATS versus SP are shown
the number of hops increases, serialization leads to the same in Fig. 14(a) and (b). As it can be seen, for the upper bound
determinism of traffic transmission, but the time cost of ATS of end-to-end delay (Fig. 14(a)), with the increase of average
reshaping increases accordingly. The hypothesis is that as the traffic load, the performance relationship between ATS and SP
load increases, the advantages of ATS will also increase, which changes. When the average traffic load is lower than 70%, SP
will be discussed in the next section. The reasoning behind this performs better than ATS. ATS shows its superiority only when
hypothesis is that the time cost of ATS reshaping traffic can- the average traffic load increases by more than 70%. For the
not offset the queuing time of traffic with the burst cascade upper bound of the backlog (Fig. 14(b)), the difference ratio
without ATS. Thus, ATS has a negative effect when the traffic between ATS and SP does not change significantly, and when
load has not reached a certain level. Therefore, it is reasonable considering ATS used individually, the backlog performance is
to infer that when the traffic load increases, the impact of ATS always worse than that of SP. This is due to the fact that ATS
will gradually turn positive. is a kind of non-work conserving scheduler that implements
Next, we analyze the results on column 4 in Table IV. Since reshaping through frame waiting. Moreover, as noted, shaped
each test case is applied under five topologies, for some use queues and the shared queue are implemented in a single
cases, the five topologies have the same flows, but just with physical queue, and the backlog for ATS are the sum of back-
different routes. Moreover, the traffic load in Table III reflects logs in shaped and shared queues. It is furthermore assumed
the degree of dispersion of flows transmission in the network. that all flows still have the same priority, but there exists the
For example, the traffic load under the MM topology is the interference of BE traffic with the maximum Ethernet frame
lowest. This is because the MM has the largest number of size of 1,522 bytes. If the preemption integration mode is con-
selectable paths, and thus the flows are more dispersed than sidered, the compared results will be similar to the discussion
the traffic in other topologies. Hence, although the traffic load above (Fig. 14(a), (b)). If the non-preemption integration mode
in MM is lower than that in SRM, the performance comparison is taken into account (as considered in this paper), there will
between ATS and SP is not much different from that in SRM. be at most one BE frame interference when the flow of interest
Compared with MR, the traffic load in MM is close to that of obtains the service. The results with and without ATS reshap-
MR, but the transmission of traffic in MR is more concentrated ing are shown in Fig. 14(c) and (d). As can be observed from
than in MM. Therefore, the advantage of ATS under the MM the figure, low-priority non-preemptible frames have no sig-
topology is higher than under the MR topology. For the ST nificant impact on the performance with or without ATS from
topology, although its traffic load is close to the traffic load in the perspective of upper bounds of end-to-end delays. Latency
SRM, its number of hops is higher, which leads to more times performance comparison results still mainly depend on the
of ATS reshaping along the flow’s route. Thus, compared with traffic load. However, the performance with ATS and without
SRM, the performance of ATS under the ST topology is far ATS from the perspective of backlog upper bounds is signif-
worse than SP. A similar explanation can be extended to the icantly changed, even though ATS still performs worse than
results for the MT topology. without ATS. This implies that the non-preemptible frames
3) Comparison Between ATS and SP Under Changing from low priority traffic have a larger impact on the backlog
Traffic Load: In the previous section, the traffic load of all performance of egress ports without ATS reshaping compared
test cases is in the range from 6% to 47%, and in all these to ports with ATS reshaping. From here, we can also see that
test cases, ATS does not show its advantages in real-time the backlog bounds comparison between individual ATS and
performance compared with TAS, CBS and SP. In order to SP (one priority) is more related to the frame length.
rule out the influence of traffic dispersion degree and num- Moreover, we assign high and low priorities to the traf-
ber of hops under different topologies, for the second set of fic, and the high and low priority traffic each account for
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2919
50% of the overall traffic load. The comparison results of priority and are interfered by a BE frame. Moreover, the max-
ATS vs SP in terms of upper bound of the delays and back- imum average load of the high-priority traffic is only 45%.
logs for the high and low priority traffic, with and without Nevertheless, for low priority, ATS shows its performance
reshaping by ATS, are shown in Fig. 14 (e) and (f), respec- advantage from the perspective of latency bounds when the
tively, using light blue and dark blue box plots. It can be seen overall average traffic load reaches 30% while low priority
from the figure that for the high priority traffic, the results average traffic load reaches 15%. From the perspective of
are similar to the top 40% compared results in Fig. 14 (c) backlog, no matter for the high-priority or the low-priority
and (d), and similarly ATS does not show its superiority for traffic, the backlogs of ATS are still worse than that with-
high-priority traffic. This is because the transmission of the out ATS when the overall average traffic load is increasing
high priority traffic will only be interfered by at most one from 10% to 80% (the average traffic load for low priority is
low priority frame whose frame length ranges from the mini- from 5% to 40% accordingly). The ATS backlogs of a few
mum (64 bytes) to the maximum (1,522 bytes) Ethernet frame cases shows its superiority when the average load is as high
size, which is same as the case if all flows have the same as 90%.
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2920 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2921
Fig. 16. Comparison of TAS+ATS+SP and TAS+SP under different traffic load.
CBS(H)+ATS(L) may be better than under the architecture by ATS have the same priority and with no interference from
ATS(H)+CBS(L), especially when the average traffic load is other traffic types of lower priority (BE for example).
high. The compared results are shown in Fig. 15(c), in which As can be seen from Fig. 16(a) and (b), similar to ATS
for ATS(H)+CBS(L) are depicted with blue circles and for used individually, with the increase of average traffic load, the
CBS(H)+ATS(L) are with yellow triangles. The reason is that performance of traffic shaped by ATS is gradually improved.
the variation in worst-case end-to-end latencies of ATS from However, with the influence of TT traffic implemented by
high priority to low priority is not as large as that of CBS. TAS, it is obvious that the optimization effect on latency
From the previous experimental results, we conclude that, on bounds of ATS reshaping is better than that of the individ-
the one hand, when the average traffic load is low, the positive ual ATS traffic shaper. For the end-to-end latency bounds,
effect of ATS is not prominent, but only when the traffic load the ATS traffic shaper used individually performs better only
reaches a certain level, its advantages will become more and when the average traffic load is above 70%. However, in the
more obvious (Fig. 14(a), (c)). On the other hand, ATS has a combined traffic shaper TAS+ATS+SP, as long as the aver-
greater positive effect on low-priority traffic (Fig. 14(e)). age traffic load shaped by ATS reaches 20% (overall average
In the leftover section, we will see the impact of ATS on load is 40%), the ATS traffic shaper is superior. Nevertheless,
the combined traffic shapers (TAS+SP or TAS+CBS) under for the backlog bounds, ATS does not show its superiority
different levels of traffic load, as discussed for individual traf- in the combined architecture of TAS+ATS+SP either, due to
fic shapers. The architectures of TAS+ATS+SP and TAS+SP the usage of shaped queues. The performance advantage of
without ATS are first compared. We still use the same topology ATS in combination with TAS is similar to the performance
(MM) as in the Section V-A3. In the first set of experiments, advantage of reshaping for low priority traffic when ATS is
it is assumed that there is 20% of TT traffic achieving deter- used individually. This is because TT traffic based on TAS
ministic transmission based on the TAS, and 10% to 70% of has fixed transmission time slots and has the highest priority,
traffic is SP. Therefore, the overall average traffic load on the and other traffic types cannot use the time slots allocated to
network is 30%-90%. For each traffic load, we have used 20 TT traffic. The existence of TT traffic will greatly increase the
randomly generated test cases. In order to fairly compare with possibility of mutual interference and backlog of other types
ATS used individually, we still assume that all flows reshaped of traffic. Then, the burst cascade of the flow on its route will
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2922 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
Fig. 17. Comparison of TAS+ATS+CBS and TAS+CBS under different traffic load.
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2923
Fig. 19. Comparison of combined traffic shapers under the Orion CEV TCOrion 1 (TT - 1.5%, SP/AVB with 1 priority).
TABLE V
P ERFORMANCE A NALYSIS OF D IFFERENT T RAFFIC S HAPERS
ON C YCLIC D EPENDENCY T OPOLOGY
dependencies between flows in the network, it would be sug- Exploration Vehicle (CEV) from NASA [49]. The test case
gested to use the ATS on node ports along the path of the topology is shown in Fig. 20. The Orion CEV case has 31
cyclic-dependency flow to break the cycles to guarantee the ESes, 15 SWs, 188 dataflow routes connected by a physical
deterministic transmission for the flows. link transmitting at 100 Mbps. In the last set of experi-
2) Evaluation on the Realistic Test Case: In the last ments, we are interested to see the effect of ATS on the
experiment, we use the realistic case of the Orion Crew three novel hybrid architectures of combined traffic shapers
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2924 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
Fig. 21. Comparison of combined traffic shapers under the Orion CEV TCOrion 2 (TT - 15%, SP/AVB with 4 priorities).
TAS+ATS+SP, TAS+ATS+CBS and ATS+CBS. We have is relatively low. The results for Orion CEV conform to the
run the NC-based performance analysis method for both com- outcomes shown in Fig. 16(a), (b) and Fig. 17.
binations TAS+SP and TAS+ATS+SP (resp. TAS+CBS and Then we increase the traffic load in Orion CEV by rais-
TAS+ATS+CBS, ATS(H)+CBS(L) and CBS(H)+ATS(L)) on ing the rate and keeping the frame size of the flow (called
the Orion CEV case, and obtained for each combined traf- TCOrion 2 ). The average network load (resp. maximum link
fic shaper the upper bounds of the maximum latency (WCD) load) for TT traffic is increased to 15% (resp. 54%). The over-
for each flow and the upper bounds of the maximum backlog all traffic load on the network is 25% on average and 69% on
(WCB) for each priority queue in an egress port. maximum. Moreover, we are interested in taking a look at
We first use the original traffic parameters [50] of the ATS’s effect on multiple priorities, and thus we classify the
Orion CEV (TCOrion 1 ), including 99 TT flows and 87 Rate SP/AVB traffic into four priorities. There are 25 flows of pri-
Constraint (RC) flows of the same priority. RC flows are con- ority P1 , 25 of priority P2 , 25 of priority P3 and 12 of priority
sidered as SP and AVB flows under respective combinations P4 . For the AVB traffic, due to the increased traffic load and
of traffic shapers in this paper. The idle slope for AVB traf- the uneven load for each traffic type on each link, it is dif-
fic is set to 75%. The average network load (resp. maximum ficult to assign a fixed idleSlope for each AVB traffic class
link load) for TT traffic is around 1.5% (resp. 5.5%), and the across the entire network. Thus, we calculate the idle slope
overall traffic load on the network is 3.5% on average and of AVB Class Mi for each egress port according to the actual
10% on maximum. The results are shown in Fig. 19, where bandwidth utilization [1, Sec. 8.6.8.2], i.e.,
the upper bounds are normalized to 100 × ln(X ) with X = OperCycleTime
{WCD, WCB}. The obtained results are sorted in increasing idSli = operIdleSlope(Mi ) · ,
GateOpenTime
order by results. As can be seen from the figure, ATS does
not show a positive impact on both the upper bounds of end- where operIdleSlope(Mi ) [1, Sec. 34.3] is the actual band-
to-end latencies of the flows and the backlog upper bounds of width that is currently reserved for the AVB class Mi for each
egress ports under the architecture TAS+ATS+SP/AVB. This port, and OperCycleTime
GateOpenTime is the fraction of effective time that
is because the average traffic load for both TT and SP/AVB the gate is open for AVB traffic. Similarly, the results are
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2925
VI. C ONCLUSION
This paper has studied the qualitative performance compar-
ison of the various individual traffic shapers and their possible
combinations. The analysis is based on the Network Calculus
(NC) approach. The paper summarized the existing NC-based
analysis for ATS, CBS, SP individually used, and TAS+SP,
TAS+CBS used in combination, and extended the NC-based
analysis for some other traffic shapers used in combination
which have not been discussed, including ATS and CBS used
in combination for different priority queues, the novel archi-
tectures TAS+ATS+SP and TAS+ATS+CBS when ATS and
CBS are used for the same queue. From plenty of test cases,
we can conclude that SP and CBS have advantages in that SP is
more beneficial to the transmission delay of high-priority traf-
Fig. 22. Comparison of ATS(H)+CBS(L) and CBS(H)+ATS(L) under the
Orion CEV TCOrion 3 . fic. While CBS can specify bandwidth reservations for each
priority of traffic. In addition, due to the credit controlled
by CBS, the long-term rate of traffic arrival is reduced, so
the backlog upper bounds of AVB traffic are probably lower
shown in Fig. 21. The obtained results are grouped by differ- than SP traffic. Compared with SP and CBS, ATS has limited
ent priorities with vertical dotted lines and, respectively, sorted advantages for high-priority traffic. Only when the average
in increasing order by results within each priority. From the traffic load of high-priority traffic in the network reaches
figure, we can find that with the increasing traffic load, the around 80%, ATS shows its superiority. The positive effect of
combination shaper TAS+ATS+SP (resp. TAS+ATS+CBS) ATS on low-priority traffic is more obvious. When the average
outperforms TAS+SP (resp. TAS+CBS) from the latency traffic load of low-priority traffic on the entire network reaches
upper bounds. For the backlog bounds, TAS+ATS+SP does about 20% (overall load 40%), the positive effect of ATS
not perform better than TAS+SP as conforming to results in on the upper bound of delay performance begins to become
Fig. 16. However, more than half of the backlog bounds under prominent.
the TAS+ATS+CBS are better than under the TAS+CBS. For the combined traffic shapers, we first investigate the
This is due to the idle slope of CBS, which is related to performance of ATS and CBS used for different queues.
the serviceability and is set according to the actual band- Whether to use ATS for high priority or CBS for high
width of AVB traffic. The relative load of AVB is very priority is not a definite conclusion, as each has its advan-
large. What is more interesting is that, with the combina- tages. Compared with all the above traffic shapers, TT traffic
tion of ATS, the performance of SP and CBS gets close to implemented with flow-based scheduling by TAS has the high-
each other, but CBS allows the bandwidth reservation for the est performance, with ultra-low latency, jitter and backlog.
traffic. However, it is well known that TAS requires the synthesis
In the last experiment, we are interested in testing combina- of optimized GCLs, which do not scale to large networks
tions ATS(H)+CBS(L) and CBS(H)+ATS(L) using the case with many flows. This problem can be mitigated by combin-
adapted from Orion CEV, that has 25 flows of priority P1 (the ing different traffic shapers in the same switch architecture, to
highest priority), 25 of priority P2 , 25 of priority P3 and 12 reduce the number of flows handled by TAS. Moreover, the
of priority P4 (called TCOrion 3 ). The average network load combined use of ATS with TAS will make ATS play a more
is 10%. One case is ATS used for flows with priority P0 and active role, of which the effect is similar to the reshaping
P1 , and CBS used for flows with priority P1 and P2 . In the impact of ATS used individually on low priority traffic, and at
other case, CBS(H)+ATS(L) is the other way round. The idle the same time, TAS will maintain unchanged its advantages
slopes for each AVB Class are, respectively, 45% and 30%. of ultra-low latency and jitter. Additionally, we have shown
The results are shown in Fig. 22, where the x-axis refers to that even though, from the perspective of worst-case latency
the flow ID, and the y-axis presents the WCD in microsec- and backlog, ATS does not always perform better than the
onds. It can be found that when both ATS and CBS are for other traffic shapers, adding the ATS model before other traf-
high-priority or low-priority traffic, most ATS results are better fic shapers (for example, SP and CBS) can always break the
than CBS. The average WCDs for ATS and CBS classes are cyclic dependency of flows and make the traditional network
given by horizontal lines. As can be seen from the figure, the calculus analysis method feasible.
average WCD of ATS is smaller than that of CBS under both
the CBS(H)+ATS(L) (purple solid line) and ATS(H)+CBS(L)
(green dotted line) architectures, which is conformed to the A PPENDIX A
results shown in Fig. 15(a), (b). Finally, the overall flows’ aver- N ETWORK C ALCULUS T HEORY
age WCDs under the ATS(H)+CBS(L) and CBS(H)+ATS(L) Network Calculus [42], [43] is a system theory proposed
are respectively 3091.7μs and 2899.4μs. This is due to the for analyzing performance guarantees in communication
relatively low overall traffic load of 10%, as can also be seen networks. By constructing arrival curve and service curve
in Fig. 15(c). models, the maximum amount of flow data entered into
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2926 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
network nodes and the minimum service offered by network the maximum horizontal deviation between the graphs of two
nodes can be obtained. Network Calculus is build on min-plus curves α(t) and β(t),
algebra, which includes two basic operators on non-decreasing
D = h(α, β) = sup{inf{τ ≥ 0 | α(s) ≤ β(s + τ )}}. (62)
functions: F↑ = {f : R+ → R|x1 < x2 ⇒ f (x1 ) ≤ f (x2 )}. s≥0
One is the convolution operator ⊗,
The backlog of the flow in the network node is bounded by
(f ⊗ g)(t) = inf {f (t − s) + g(s)}, the maximum vertical deviation between the graphs of two
0≤s≤t
curves α(t) and β(t),
and the other is the deconvolution operator ,
B = v(α, β) = sup{α(s) − β(s)}. (63)
(f g)(t) = sup{f (t + s) − g(s)}, s≥0
The output arrival curve for the output flow R ∗ (t) is bounded
s≥0
where inf means infimum and sup means supremum. by the arrival curve α∗ (t),
The arrival and service curves are defined by means of
the min-plus convolution. An arrival curve α(t) is a model α∗ (t) = α β(t) = sup{α(t + s) − β(s)}, (64)
s≥0
constraining the arrival process R(t) of a flow, where R(t) rep-
resents the input cumulative function counting the total data With the effect of packetization, the output arrival curve in
bits of the flow that has arrived on the network node up to Eq. (64) is changed into,
time t. We say that R(t) is constrained by α(t) iff, α∗ (t) = α (β − l max )(t), (65)
R(t) ≤ inf {R(s) + α(t − s)} = (R ⊗ α)(t). (58) which is proved by [43, Corollary 8.3], where l max is the max-
0≤s≤t
imum frame size of the flow. With the known latency upper
Note that an arrival curve α(t) should be a non-negative bound of the flow, the output arrival curve of the flow can also
wide-increasing function. A typical example of an arrival curve be given by,
is the “leaky bucket” constraint satisfying α(t) = b + r · t for
t > 0 and α(0) = 0, with the maximum burst tolerance b and α∗ (t) = α(t) δD (t), (66)
long-term rate r of the flow. where δD (t) is the pure-delay function which equals to 0 if
A service curve β(t) models the processing capability of the t ≤ D and +∞ otherwise. The output arrival curve can also be
available resource for the network node. Assume that R ∗ (t) is regarded as the input arrival curve of the flow before reaching
the departure process, which is the output cumulative function the next node. Note that in this paper, all the NC-based method
that counts the total data bits of the flow departure from the is based on the Total Flow Analysis (TFA). For TFA, using
network node up to time t. There are several definitions for the the delay bound D calculated from aggregate flows is always
service curve. We say that the network node offers the min- better than using the delay bound Df = h(αf , βf ) for the
plus minimal service curve β(t) (considered in this paper) for flow of interest f [43]. Moreover, the calculation of βf when
the flow iff considering FIFO multiplexing depends on the choice of an
R ∗ (t) ≥ inf {R(s) + β(t − s)} = (R ⊗ β)(t), (59) efficient θ, which is still an open research issue [51], [52],
0≤s≤t ⎡ ⎤+
and offers the strict service curve β(t) iff βf (t) = ⎣β − αj ⊗ δθ ⎦ ∧ δθ , ∀θ ∈ R+ . (67)
R ∗ (t + Δt) − R ∗ (t) ≥ β(Δt), (60) j =f
during any backlog period [t, t + Δt). Note that a service ACKNOWLEDGMENT
curve β(t) should be a non-negative wide-increasing function. The authors would like to thank Marc Boyer from ONERA
A shaping curve σ(t) characterizes the maximum number for the valuable suggestions on the review version of this
of bits that are served during any period of time Δt, which paper.
means that the departure process R ∗ (t) from the server is
always constrained by the shaping curve. A server offers a
R EFERENCES
shaping curve σ(t) iff,
[1] IEEE. “802.1Q—IEEE standard for local and metropolitan area
R ∗ (t + Δt) − R ∗ (t) ≤ σ(Δt), (61) networks—Bridges and bridged networks.” 2018. [Online]. Available:
https://standards.ieee.org/standard/802_1Q-2018.html
i.e., R ∗ (t) ≤ R ∗ ⊗ σ(t). Note that the shaping curve σ(t) in [2] 802.3 Standard for Ethernet, IEEE, Piscataway, NJ, USA, 2015.
[3] IEEE. “802.1AS-Rev—Timing and synchronization for time-sensitive
Eq. (61) is non-greedy shaping, which is different from the applications.” 2016. [Online]. Available: http://www.ieee802.org/1/
definition of greedy shaper satisfying R ∗ (t) = R ⊗ σ(t). The pages/802.1AS-rev.html
shaping curve can be used to additionally constrain the output [4] IEEE. “802.1Qbv—Enhancements for scheduled traffic.” 2016. [Online].
Available: http://www.ieee802.org/1/pages/802.1bv.html
arrival curve by the minimum operation. [5] IEEE. “802.1Qcr—IEEE standard for local and metropolitan area
Three basic results of network calculus are given as follows. networks—Bridges and bridged networks amendment: Asynchronous
If the flow R(t) constrained by the arrival curve α(t) traverses traffic shaping.” 2018. [Online]. Available: https://1.ieee802.org/tsn/
802-1qcr/
the network node offering the service curve β(t), the latency [6] IEEE. “802.1BA—Audio video bridging (AVB) systems.” 2011.
experienced by the flow in the network node is bounded by [Online]. Available: http://www.ieee802.org/1/pages/802.1ba.html
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
ZHAO et al.: QUANTITATIVE PERFORMANCE COMPARISON OF VARIOUS TRAFFIC SHAPERS 2927
[7] IEEE. “802.1Qav—Forwarding and queuing enhancements for time- [31] P. Meyer, T. Steinbach, F. Korf, and T. C. Schmidt, “Extending IEEE
sensitive streams.” 2009. [Online]. Available: https://www.ieee802.org/ 802.1 AVB with time-triggered scheduling: A simulation study of the
1/pages/802.1av.html coexistence of synchronous and asynchronous traffic,” in Proc. IEEE
[8] IEEE. “802.1Qbu–Frame preemption.” 2015. [Online]. Available: http:/ Veh. Netw. Conf., 2013, pp. 47–54.
/www:ieee802:org/1/pages/802.1bu.html [32] L. Zhao, P. Pop, Q. Li, J. Chen, and H. Xiong, “Timing analysis of rate-
[9] S. S. Craciunas and R. S. Oliver, “An overview of scheduling mecha- constrained traffic in TTEthernet using network calculus,” Real Time
nisms for time-sensitive networks,” in Proc. Real Time Summer School Syst. vol. 53, no. 2, pp. 254–287, 2017.
ETR, 2017, pp. 1–9. [33] L. Zhao, P. Pop, Z. Zheng, and Q. Li, “Timing analysis of AVB traffic
[10] F. Dürr and N. G. Nayak, “No-wait packet scheduling for IEEE time- in TSN networks using network calculus,” in Proc. IEEE Real Time
sensitive networks (TSN),” in Proc. 24th Int. Conf. Real Time Netw. Embedded Technol. Appl. Symp. (RTAS), 2018, pp. 25–36.
Syst., 2016, pp. 203–212. [34] L. Zhao, P. Pop, Z. Zheng, H. Daigmorte, and M. Boyer, “Latency
[11] S. S. Craciunas, R. S. Oliver, M. Chmelik, and W. Steiner, “Scheduling analysis of multiple classes of AVB traffic in TSN with standard credit
real-time communication in IEEE 802.1 Qbv time sensitive networks,” behavior using network calculus,” IEEE Trans. Ind. Electron., vol. 68,
in Proc. ACM 24th Int. Conf. Real Time Netw. Syst., 2016, pp. 183–192. no. 10, pp. 10291–10302, Nov. 2021.
[12] P. Pop, M. L. Raagaard, S. S. Craciunas, and W. Steiner, “Design optimi- [35] M. Ashjaei, G. Patti, M. Behnam, T. Nolte, G. Alderisi, and L. L. Bello,
sation of cyber-physical distributed systems using IEEE time-sensitive “Schedulability analysis of Ethernet audio video bridging networks with
networks,” IET Cyber Phys. Syst. Theory Appl., vol. 1, no. 1, pp. 86–94, scheduled traffic support,” Real Time Syst., vol. 53, no. 4, pp. 526–577,
2016. 2017.
[13] M. L. Raagaard, “Algorithms for the optimization of safety-critical [36] E. Mohammadpour, E. Stai, M. Mohiuddin, and J.-Y. Le Boudec, “End-
networks,” Ph.D. dissertation, Dept. Comput. Sci., Delhi Technol. Univ., to-end latency and backlog bounds in time-sensitive networking with
New Delhi, India, 2017. credit based shapers and asynchronous traffic shaping,” in Proc. 30th
[14] M. Vlk, Z. Hanzálek, K. Brejchová, S. Tang, S. Bhattacharjee, and Int. Teletraffic Congr., 2018, pp. 1–9.
S. Fu, “Enhancing schedulability and throughput of time-triggered traffic [37] B. Fang, L. Qiao, Z. Gong, and H. Xiong, “Simulative assessments of
in IEEE 802.1 QBV time-sensitive networks,” IEEE Trans. Commun., credit-based shaping and asynchronous traffic shaping in time-sensitive
vol. 68, no. 11, pp. 7023–7038, Nov. 2020. networking,” in Proc. 12th Int. Conf. Adv. Infocomm Technol., 2020,
[15] R. S. Oliver, S. S. Craciunas, and W. Steiner, “IEEE 802.1 Qbv gate pp. 111–118.
control list synthesis using array theory encoding,” in Proc. IEEE Real [38] A. Nasrallah et al., “Ultra-low latency (ULL) networks: The IEEE
Time Embedded Technol. Appl. Symp. (RTAS), 2018, pp. 1–8. TSN and IETF DetNet standards and related 5G ULL research,” IEEE
[16] L. Zhao, P. Paul, and S. S. Craciunas, “Worst-case latency analysis for Commun. Surveys Tuts., vol. 21, no. 1, pp. 88–145, 1st Quart., 2018.
IEEE 802.1 Qbv time sensitive networks using network calculus,” IEEE [39] L. Maile, K. S. Hielscher, and R. German, “Network calculus results for
Access, vol. 6, pp. 41803–41815, 2018. TSN: An introduction,” in Proc. Inf. Commun. Technol. Conf. (ICTC),
[17] L. Zhao, P. Pop, Z. Gong, and B. Fang, “Improving latency analysis for 2020, pp. 131–140.
flexible window-based gcl scheduling in TSN networks by integration [40] N. Reusch, L. Zhao, S. S. Craciunas, and P. Pop, “Window-based
of consecutive nodes offsets,” IEEE Internet Things J., vol. 7, no. 7, schedule synthesis for industrial IEEE 802.1 Qbv TSN networks,” in
pp. 5574–5584, Apr. 2021. Proc. 16th IEEE Int. Conf. Factory Commun. Syst. (WFCS), 2020,
pp. 1–4.
[18] D. Hellmanns, J. Falk, A. Glavackij, R. Hummen, S. Kehrer, and F. Durr,
[41] A. Nasrallah et al., “Performance comparison of IEEE 802.1 TSN
“On the performance of stream-based, class-based time-aware shaping
time aware shaper (TAS) and asynchronous traffic shaper (ATS),” IEEE
and frame preemption in TSN,” in Proc. IEEE Int. Conf. Ind. Technol.
Access, vol. 7, pp. 44165–44181, 2019.
(ICIT), 2020, pp. 298–303.
[42] J. Y. Le Boudec and P. Thiran, Network Calculus: A Theory of
[19] R. Mahfouzi, A. Aminifar, S. Samii, A. Rezine, P. Eles, and Z. Peng,
Deterministic Queuing Systems for the Internet (Lecture Notes on
“Stability-aware integrated routing and scheduling for control applica-
Computer Science), 5th ed. Heidelberg, Germany: Springer-Verlag,
tions in Ethernet networks,” in Proc. IEEE Design Autom. Test Europe
2001.
Conf. Exhibit. (DATE), 2018, pp. 682–687.
[43] A. Bouillard, M. Boyer, and E. Le Corronc, Deterministic Network
[20] J. Specht and S. Samii, “Urgency-based scheduler for time-sensitive Calculus: From Theory to Practical Implementation. Hoboken, NJ,
switched Ethernet networks,” in Proc. IEEE Euromicro Conf. Real Time USA: Wiley, 2018.
Syst. (ECRTS), 2016, pp. 75–85. [44] V. Gavriluţ and P. Pop, “Traffic-type assignment for TSN-based mixed-
[21] J. Specht and S. Samii, “Synthesis of queue and priority assignment criticality cyber-physical systems,” ACM Trans. Cyber Phys. Syst., vol. 4,
for asynchronous traffic shaping in switched Ethernet,” in Proc. IEEE no. 2, pp. 1–27, 2020.
Real-Time Syst. Symp. (RTSS), 2017, pp. 178–187. [45] S. S. Craciunas and R. S. Oliver, “Combined task-and network-level
[22] Z. Zhou, Y. Yan, M. Berger, and S. Ruepp, “Analysis and modeling of scheduling for distributed time-triggered systems,” Real Time Syst.,
asynchronous traffic shaping in time sensitive networks,” in Proc. 14th vol. 52, no. 2, pp. 161–200, 2016.
IEEE Int. Workshop Factory Commun. Syst., 2018, pp. 1–8. [46] A. Amari and A. Mifdaoui, “Worst-case timing analysis of ring networks
[23] Z. Zhou, M. S. Berger, S. R. Ruepp, and Y. Yan, “Insight into the IEEE with cyclic dependencies using network calculus,” in Proc. IEEE 23rd
802.1 Qcr asynchronous traffic shaping in time sensitive network,” Adv. Int. Conf. Embedded Real Time Comput. Syst. Appl. (RTCSA), 2017,
Sci. Technol. Eng. Syst. J., vol. 4, no. 1, pp. 292–301, 2019. pp. 1–10.
[24] J. Y. Le Boudec, “A theory of traffic regulators for deterministic [47] A. Finzi and S. S. Craciunas, “Breaking vs. solving: Analysis and
networks with application to interleaved regulators,” IEEE/ACM Trans. routing of real-time networks with cyclic dependencies using network
Netw., vol. 26, no. 6, pp. 2721–2733, Dec. 2018. calculus,” in Proc. 27th Int. Conf. Real Time Netw. Syst., 2019,
[25] J. Diemer, J. Rox, and R. Ernst, “Modeling of Ethernet AVB networks pp. 101–111.
for worst-case timing analysis,” IFAC Proc. Vol., vol. 45, no. 2, [48] L. Thomas, J. Y. L. Boudec, and A. Mifdaoui, “On cyclic dependencies
pp. 848–853, 2012. and regulators in time-sensitive networks,” in Proc. IEEE Real-Time
[26] U. D. Bordoloi, A. Aminifar, P. Eles, and Z. Peng, “Schedulability anal- Syst. Symp. (RTSS), 2019, pp. 299–311.
ysis of Ethernet AVB switches,” in Proc. IEEE 20th Int. Conf. Embedded [49] D. Tamas-Selicean, “Design of mixed-criticality applications on dis-
Real Time Comput. Syst. Appl., 2014, pp. 1–10. tributed real-time systems,” Ph.D. dissertation, Dept. Comput. Sci., Tech.
[27] J. A. R. De Azua and M. Boyer, “Complete modelling of AVB in Univ. Denmark, Kongens Lyngby, Denmark, 2014.
network calculus framework,” in Proc. 22nd Int. Conf. Real Time Netw. [50] M. Paulitsch, E. Schmidt, B. Gstottenbauer, C. Scherrer, and H. Kantz,
Syst., 2014, p. 55. “Time-triggered communication (industrial applications),” in Time-
[28] L. Zhao, F. He, and E. Li, “Improving worst-case delay analysis for Triggered Communication. Boca Raton, FL, USA: CRC Press, 2011,
traffic of additional stream reservation class in Ethernet-AVB Network,” pp. 121–152.
Sensors, vol. 18, no. 11, p. 3849, 2018. [51] M. Boyer, A. Graillat, B. D. De Dinechin, and J. Migge, “Bounding
[29] J. Cao, P. J. L. Cuijpers, R. J. Bril, and J. J. Lukkien, “Tight worst-case the delays of the MPPA network-on-chip with network calculus:
response-time analysis for Ethernet AVB using eligible intervals,” in Models and benchmarks,” Perform. Eval., vol. 143, Nov. 2020,
Proc. IEEE World Conf. Factory Commun. Syst. (WFCS), 2016, pp. 1–8. Art. no. 102124.
[30] L. L. Bello, “Novel trends in automotive networks: A perspective on [52] A. Scheffler and S. Bondorf, “Network calculus for bounding delays in
Ethernet and the IEEE Audio Video Bridging,” in Proc. IEEE Emerg. feedforward networks of FIFO queueing systems,” in Proc. Int. Conf.
Technol. Factory Autom. (ETFA), 2014, pp. 1–8. Quant. Eval. Syst., 2021, pp. 149–167.
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti
2928 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 19, NO. 3, SEPTEMBER 2022
Luxi Zhao received the Ph.D. degree in com- Sebastian Steinhorst (Senior Member, IEEE)
munication and information system from Beihang received the M.Sc. (Dipl.-Inf.) and Ph.D. (Dr. phil.
University, Beijing, China, in 2017, where she is nat.) degrees in computer science from Goethe
currently an Associate Professor of Communication University, Frankfurt, Germany, in 2005 and 2011,
and Information System with the Department of respectively. He is currently an Associate Professor
Electronic and Information Engineering. She was a with the Technical University of Munich, Germany,
Postdoctoral Fellow with DTU Compute, Technical where he leads the Embedded Systems and Internet
University of Denmark from 2017 to 2019. She of Things Group, Department of Electrical and
has been a Marie-Curie Research Fellow with the Computer Engineering. He was also a Co-Program
Department of Electrical and Computer Engineering, PI with the Electrification Suite and Test Laboratory,
Technical University of Munich. Her main research Research Center TUMCREATE, Singapore. His
interest concerns worst-case analysis and performance evaluation of determin- research interests include design methodology and hardware/software archi-
istic real-time and safety-critical networks. tecture co-design of secure distributed embedded systems for use in IoT,
automotive, and smart energy applications.
licensed use limited to: Alvas Institute of Engineering and Technology Department of Library and Information Centre. Downloaded on December 10,2023 at 06:34:01 UTC from IEEE Xplore. Restricti