Next Article in Journal
EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing
Next Article in Special Issue
Analysis and Experimental Validation of Efficient Coded OFDM for an Impulsive Noise Environment
Previous Article in Journal
A Non-Linear Model of an All-Elastomer, in-Plane, Capacitive, Tactile Sensor Under the Application of Normal Forces
Previous Article in Special Issue
Multi-Robot Cyber Physical System for Sensing Environmental Variables of Transmission Line
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Delay Analysis for End-to-End Synchronous Communication in Monitoring Systems

Research Institute of Information Technology, Tsinghua University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(11), 3615; https://doi.org/10.3390/s18113615
Submission received: 22 August 2018 / Revised: 18 October 2018 / Accepted: 22 October 2018 / Published: 24 October 2018
(This article belongs to the Special Issue Smart Grid Networks and Energy Cyber Physical Systems)

Abstract

:
With the rapid development of smart grid technologies, communication systems are further integrated in the existing power grids. The real-time capability and reliability of the power applications are receiving increasing concerns. Thus, it is important to measure the end-to-end delay in communication systems. The network calculus theory has been widely applied in the communication delay measuring tasks. However, for better operation performance of power systems, most power applications require synchronous data communication, in which the network calculus theory cannot be directly applied. In this paper, we expand the network calculus theory such that it can be used to analyze the communication delay for power applications in smart grids. The problem of communication delay calculation for the synchronization system is converted into a maximum path problem in graph theory. Finally, our theoretical results are compared with the experimental ones obtained with the network simulation software EstiNet. The simulation results verify the feasibility and effectiveness of the proposed method.

1. Introduction

With the development of modern communication, computing, network and control technologies, the applications of information technology continue to expand. The combination of information and energy technology has become an inevitable trend of the development for future power systems. This combination has also spawned a new concept: smart grid, which is able to utilize advanced information technology to improve energy management [1,2,3,4]. With smart grid technologies, we are able to control energy flows in power systems more efficiently and precisely.
Communication networks play a key role in the operation and management of smart grids [5,6]. In the monitoring system of a smart grid, a large amount of data needs to be processed and analyzed for the control and dispatch of power systems. The performance of the end-to-end communication of network has an important impact on the real-time capability and reliability of the monitoring system. The end-to-end performance of a communication network concerns both network transmission performance and computational performance. In addition, based on the analysis of smart grid wide-area monitoring cases in [7,8], the data synchronization performance is also one of the basic requirements in smart grid monitoring systems.
The monitoring system for a smart grid is a typical network computing system [9]. For analysis, the network computing system can be regarded as a service system. Stochastic queuing theory, which is developed based on theories of Poisson process and Markov process, plays an important role in the performance analysis of network service systems such as telephone and telegraph networks [10]. However, with the development of computer network systems, network structures and network applications have become more complicated and diverse. The traffic flow in communication networks exhibits properties different from those of Poisson and Markov processes. Therefore, the stochastic queuing theory would produce large deviations when applied to analyze the modern computer networks [11]. On the other hand, the stochastic queuing theory can only provide limited performance metrics, such as the average waiting time and variance of the service system. It cannot be used to obtain the deterministic analysis of the system performance. In order to tackle more complicated analysis of modern network service systems, network calculus theory was proposed [12,13].
The network calculus theory can be applied to the performance analysis for service systems. It can be divided into two branches: deterministic network calculus theory and stochastic network calculus theory; see, e.g., [12,14]. The deterministic network calculus theory can be used to calculate the upper and lower bounds for different kinds of maximum performance of a service system. For example, the maximum delay, the maximum backlog, etc. The stochastic network calculus theory is able to provide the probability distributions for the performance boundaries of a service system, such as the distribution of the maximum delay and the distribution of the maximum backlog. Within the field of smart grids, there are also a number of related research outputs based on communication networks and power grids [15,16,17]. In [18,19], network calculus theory is used to construct a reliability model for a power system which consists of conventional power generation devices, loads and renewable energy sources such as photovoltaic panels and wind power generators, achieving better utilization of renewable energy in smart grids. In [20], network calculus theory is employed to calculate the performance of communication systems in home area networks. Targeting at the operational stability and security of power systems, a bounded model of communication delay is proposed based on network calculus theory in [21].
Despite the great success in applications within smart grids, network calculus theory is not able to handle the communication system with synchronous computing requirements [7]. Unfortunately, there are vast data synchronization requirements in smart grid applications. For a communication system which requires synchronous computing, the end-to-end delay of the system is not only related to the transmission delay, but also related to the difference of delay in different channels, which is not considered in network calculus theory. Thus, deterministic network calculus theory cannot be directly used to provide an estimation for the upper bound of the smart grid monitoring system’s end-to-end delay.
In this paper, based on network calculus theory and the analysis for delay of synchronous communication system, it is shown that the problem to calculate the upper bound for end-to-end delay in the synchronous communication system can be transformed to a general maximum/shortest path selection problem in graph theory. Next, we propose a new method to provide an estimation for the upper bound of the smart grid monitoring system’s end-to-end delay. To show the feasibility and effectiveness of our proposed method, several numerical simulations are performed.
The importance and contributions of this paper are stated as follows:
(1)
A class of typical communication model for the monitoring system is investigated in this paper. The transmission network in the smart grid monitoring system is modeled as a transmission service node, such that network calculus theory can be applied. In this sense, the analysis methods proposed in this paper can be used under most scenarios of monitoring systems in the field of smart grid.
(2)
It is notable that due to the synchronous property of the smart grid applications, the original network calculus theory cannot be directly applied in the delay analysis discussed in this paper. Based on the network calculus theory, an upper bound for the end-to-end delay in the synchronous communication system is derived. The simulations demonstrate the feasibility of the proposed method. With the development of the smart grid systems, there will be more applications based on the monitoring systems, and the theoretical results obtained in this paper can be utilized to improve the reliability and efficiency of the smart grid systems.
(3)
In this paper, three theorems are proposed as our main results. In Theorem 1, the upper bound for the transmission delay in a transmission service node with strict service curve is derived. The data transmission delay in different time periods are discussed in detail. In Theorem 2, the formula for upper bound of system’s delay with multiple times of data exchange is derived. In Theorem 3, a general upper bound for transmission delay in the considered system is proposed.
The rest of the paper is organized as follows: Section 2 introduces the considered synchronous calculation model. Section 3 presents the theoretical analysis for the upper bound of the end-to-end communication delay in the considered model. Section 4 provides several numerical simulations to evaluate our main results. Finally, a conclusion is given in Section 5.

2. Typical Models for the Synchronous Communication Systems

Consider the synchronous calculation and transmission model in Figure 1. Such a model has been extensively studied in [7], and it is a typical synchronous communication model for monitoring systems in smart grids.
In Figure 1, R 1 ( t ) and R 2 ( t ) stand for the input of two sets of monitoring data, and the corresponding arrival curves of the monitoring data are α 1 and α 2 . Similar to the data arrival curves proposed in network calculus theory [22], S 1 and S 2 represent for the equivalent transmission service nodes where the monitoring data go through the control center, and the corresponding service curves are denoted as β 1 and β 2 . Here, the data arrival curve is the characteristic curve which is used to describe the monitoring data. We denote S 3 as an equivalent computing service node, with the scaling function being S ( n ) and the calculation service curve being C . S 4 is denoted as a follow-up service model, with its the service curve denoted as β 4 . Before R 1 ( t ) and R 2 ( t ) enter into S 3 , they go through a synchronous link which causes the equivalent transmission service curve changing. Let us denote β 1 and β 2 as the equivalent transmission service curves after the synchronization link. Here, β 1 and β 2 are functions of β 1 and β 2 , i.e., β 1 = F 1 ( β 1 , β 2 ) , and β 2 = F 2 ( β 1 , β 2 ) .
The smart grid’s wide area measurement system has three components: power monitor unit (PMU), communication network and controller. The operation parameters of the utility grid within different regions are measured by PMU. Based on the time scale from the global positioning system, such data is sent to the control center for analysis and procession. Let G 1 ( t ) and G 2 ( t ) be defined as the amount of data that is generated by Sensor 1 and Sensor 2 with time scale t , respectively. Then, we have:
R 1 ( t ) = 0 t G 1 ( t ) d t ,
and:
R 2 ( t ) = 0 t G 2 ( t ) d t .
Next, the flow ratio is defined. Here, we assume that the sensor has a synchronous clock, and the time scale of data is marked at the same time, i.e., if G 2 ( t ) 0 , then G 1 ( t ) 0 . We assume that G 2 ( t ) 0 , and we define ρ m a x m a x G 1 ( t ) G 2 ( t ) , and ρ m i n m i n G 1 ( t ) G 2 ( t ) . The data arriving at S 3 is synchronized. The aggregate received data calculation service curve is C . Then, we have the minimal computational service curve for R 1 , which is ρ m i n 1 + ρ m i n C . Similarly, for R 2 , the minimal computational service curve is 1 1 + ρ m a x C .
According to the above assumptions and calculation model of unified service transmission, the equivalent end-to-end service model for monitoring data R 1 is obtained as follows:
β 1 ρ m i n 1 + ρ m i n [ C S 1 _ ( β 4 ) ] = F 1 ( β 1 , β 2 ) ρ m i n 1 + ρ m i n [ C S 1 _ ( β 4 ) ] ,
where the notation stands for the convolutional operator. Similarly, the equivalent end-to-end service model for monitoring data R 2 can be obtained as follows:
β 2 1 1 + ρ m a x [ C S 1 _ ( β 4 ) ] = F 2 ( β 1 , β 2 ) 1 1 + ρ m a x [ C S 1 _ ( β 4 ) ] .
In real-world scenarios, the monitoring data is normally the same. Hence, ρ m a x = ρ m i n = 1 . In the above model, both sensors R 1 and R 2 reach the service node S 3 simultaneously due to the synchronization process. Thus, their processing time is also the same. After the calculation processing, the data of sensor R 1 and R 2 go through the same service node S 4 with the same time delay. This refers to the so-called synchronization property; see, [7], and the references therein.
Based on the synchronous property, the end-to-end delay of the synchronization system can be analyzed. We assume that the data of sensor R 1 always arrives earlier than that of R 2 during a given time period [ 0 ,   t ] . This means that the data of R 1 always waits for that of R 2 in the section of synchronization. As soon as the data of R 2 arrives, it can be input into the service node S 3 . Hence, regarding R 2 the equivalent service curve is not changed via the synchronized transmission link, and we have β 2 = F 2 ( β 1 , β 2 ) = β 2 . According to [7], the end-to-end service curve of R 2 can be expressed as:
β 2 1 1 + ρ m a x [ C S 1 _ ( β 4 ) ] .
According to the service theorems in network calculus theory [22] and the obtained public network flow model, β 2 and β 4 can be obtained directly. We have the upper bound of the end-to-end delay of R 2 being:
h ( α 2 , β 2 1 1 + ρ m a x [ C S 1 _ ( β 4 ) ] ) .
However, the equivalent transmission service curve of R 1 has been changed, since the data of R 1 cannot go through service node S 3 until the arrival of the R 2 . Then, we have β 1 = F 1 ( β 1 , β 2 ) β 1 . In fact, due to the waiting time of data, the delay of R 1 ’s data may increase. Then, we have β 1 β 1 . According to the synchronization property, the end-to-end delay of R 1 and R 2 are the same, even if β 1 is unable to be obtained. The upper bound of the end-to-end delay of R 1 can be expressed by (3).
The problem is that the conclusion of (3) was tenable, only if we assume that R 1 ’s data always arrives earlier than R 2 ’s. If R 1 ’s data arrives later than R 2 ’s after time t , the expression of the end-to-end service curve of R 1 is presented as (4), which shall be investigated in Section 3:
β 1 ρ m i n 1 + ρ m i n [ C S 1 _ ( β 4 ) ] .
Although the data of R 1 arrives later, most of the equivalent transmission curve of R 1 has already changed before t . So, the service curve of R 1 cannot be β 1 , i.e., (4) cannot be the equivalent transmission service curve to R 1 . In order to calculate the end-to-end delay in this case, the delay theory of the suspension service system is discussed in Section 3.

3. Calculation of Equivalent Delay of Monitoring System

The main results of the equivalent delay calculation are provided as three theorems in this section.

3.1. Delay Theorem of Suspension Service System

Theorem 1.
Consider an input R ( t ) through a service node which has the strict service curve β ( t ) . The system does not provide any service during t 1 < t < t 2 . We assume that R ( t 1 ) is known and time delay of the original system is d ( t ) . For t > t 1 , the delay is denoted as d ( t ) . Then, d ( t ) satisfies the following inequality:
d ( t ) d ( t ) [ i n f { τ 0 ,   R ( t ) R ( t 1 ) β ( τ ) } + t 2 t ] ,
where ‘ ’ refers taking the maximum value.
The proof of Theorem 1 is given in Appendix A; see, Appendix A.1.
Before time t , data of R 1 always arrives earlier than that of R 2 . But after time t , on the contrary, R 2 ’s data arrives earlier. The service received by R 1 can be equivalent to a suspended service system, and the suspended time period is d 1 ( t ) < t < d 2 ( t ) , where d 1 ( t ) and d 2 ( t ) are obtained from (2) and (4), respectively. Because of the synchronization, the data which was supposed to be processed in d 1 ( t ) by R 1 will not be completed until d 2 ( t ) , and this is equivalent to the system being suspended for R 1 .

3.2. Synchronization System Delay Analysis

Since the data sent by sensors is in accordance with a fixed sampling interval, we denote the time scale of such data as T 1 < T 2 < T 3 < < T n . Then, we have:
R 1 ( t ) = k = 1 m ( T m t < T m + 1 ) G 1 ( T k ) ,   and   R 2 ( t ) = k = 1 m ( T m t < T m + 1 ) G 2 ( T k ) .
Let us introduce the following definitions.
Definition 1.
Let us denote β R 1 1 , β R 1 2 , β R 2 1 , β R 2 2 as service curves of flow R 1 and flow R 2 before and after the synchronous link, respectively, then we have β R 1 1 = β 1 ,   β R 2 1 = β 2 , and:
β R 1 2 = ρ m i n 1 + ρ m i n [ C S 1 _ ( β 4 ) ] , β R 2 2 = 1 1 + ρ m a x [ C S 1 _ ( β 4 ) ] .
Definition 2.
Denote d i x ( t ) as the delay upper bound calculated by the equivalent service model using flow i , after the data arrival sequence changes for the x -th time. Denote D i ( t ) as the upper bound of the system delay before time t , when the data arrival order has already changed i times. Then, we have:
D 0 ( t ) = d 1 0 ( t ) d 2 0 ( t ) ,
D 1 ( t ) = d 1 1 ( t ) d 2 1 ( t ) ,
D n ( t ) = d 1 n ( t ) d 2 n ( t ) .
We assume that the flow arrival curves for R 1 and R 2 are α 1 and α 2 , respectively, and data of R 1 always arrives earlier than that of R 2 at the synchronization service node no later than time T x 1 . The flow delay of R 2 is d 2 0 ( t ) . If there is no synchronization mechanism, flow delay of R 1 is d 1 0 ( t ) . Since R 1 ’s data always arrives earlier than R 2 ’s, the system delay should be R 2 ’s delay which is d 2 0 ( t ) . According to network calculus theory, we have d 2 0 ( t ) = h ( α 2 , β R 2 ) .
After time T x 1 , R 2 ’s data arrives earlier than R 1 ’s at the synchronization service node. Thereafter, the delay of R 1 should be taken as the system delay. However, due to the waiting time of flow R 1 , the original system delay β R 1 has changed. According to the analysis in Section 3.1, the equivalent time period of flow R 1 is obtained as follows:
T x 1 + d 1 0 ( T x 1 ) < t < T x 1 + d 2 0 ( T x 1 ) .
Flow R 1 can be seen as the output of the suspensive service β R 1 2 which comes from service β R 1 1 first. The suspension time for service β R 1 2 is the length of the time period given in (6). Assume that the data from flow R 1 passes by β R 1 1 , the output is R 1 1 ( t ) at time t , and the data from flow R 1 reaches the synchronization link at time t . Obviously, R 1 1 ( t ) = R 1 ( t ) .
Since the considered system is a periodic sampling monitoring system, data can only be transmitted in a fixed time period. The delay of the data transmission needs to be taken into consideration only when data is transmitted. Let us define t = T m . . Thus, t defined above stands for the time when data with time scale T m reaches the synchronize link.
Assuming that the output of flow R 1 by service β R 1 1 , synchronization and service β R 1 2 at time T m is R 1 ( t ) , then, for the suspended starting point T x 1 + d 1 0 ( T x 1 ) , we have:
R 1 ( T x 1 + d 1 0 ( T x 1 ) ) = k = 1 x 1 G 1 ( T k ) .
Discussions for the value of m in T m is given in Appendix A; see, Appendix A.2.
Let us assume that after time scale T x 2 , data R 1 arrives the synchronization node before data R 2 with the same time scale. R 2 ’s traffic can be seen as the output of the suspensive service β R 2 1 which gets through service β R 2 2 first. The suspension time is:
T x 2 + d 2 0 ( T x 2 ) < t < T x 2 + d 1 1 ( T x 2 ) .
Therefore, T m > T x 2 , the upper bound of data delay be expressed as:
d 2 2 ( T m ) = d 2 0 ( T m ) d 1 1 ( T m ) [ φ ( m , T x 2 , 2 ) + d 1 1 ( T x 2 ) + T x 2 T m ] .
In accordance with the discussion of above, when T ω T x 1 :
d 1 1 ( T ω ) = d 1 0 ( T ω ) d 2 0 ( T ω ) [ φ ( ω , T x 1 , 1 ) + d 2 0 ( T x 1 ) + T x 1 T ω ] .
If d 1 1 ( T x 2 ) = d 2 0 ( T x 2 ) , then the equivalent model of the service is not suspended, so ( T m ) = d 2 0 ( T m ) . Otherwise, we can obtain:
d 2 2 ( T m ) = d 2 0 ( T m ) d 1 0 ( T m ) [ φ ( m , T x 1 , 1 ) + d 2 0 ( T x 1 ) + T x 1 T m ] [ φ ( m , T x 2 , 2 ) + d 1 0 ( T x 2 ) + T x 2 T m ] [ φ ( m , T x 2 , 2 ) + φ ( T x 2 , T x 1 , 1 ) + d 2 0 ( T x 1 ) + T x 1 T m ] .
The problem is that the time of x 1 and x 2 cannot be obtained with the existing theory in network calculus [22]. The maximum of:
d 1 1 ( T ω ) = d 1 0 ( T ω ) d 2 0 ( T ω ) [ φ ( ω , T x 1 , 1 ) + d 2 0 ( T x 1 ) + T x 1 T ω ] .
is the bound of the system, which is:
M a x 1 x 1 , x 1 + 2 ω [ φ ( ω , T x 1 , 1 ) + d 2 0 ( T x 1 ) + T x 1 T ω ] .
So, for T x 2 T ω T x 1 ,
d 1 1 ( T ω ) d 1 0 ( T ω ) d 2 0 ( T ω ) M a x 1 θ , θ + 2   ω [ φ ( ω , T θ , 1 ) + d 2 0 ( T θ ) + T θ T ω ] d 1 0 ( T ω ) d 2 0 ( T ω ) M a x 1 θ   ω [ φ ( ω , T θ , 1 ) + d 2 0 ( T θ ) + T θ T ω ] .
Furthermore, for T m > T x 2 :
d 2 2 ( T m ) d 2 0 ( T m ) d 1 0 ( T m ) M a x 1 θ 1 m [ φ ( m , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] M a x 1 θ 2 m [ φ ( m , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + φ ( T θ 2 , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] .
Given θ 1 = θ 2 , according to (A1), we have:
M a x 1 θ 1 = θ 2 m [ φ ( m , T θ 2 , 2 ) + φ ( T θ 2 , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] = M a x 1 θ 1 m [ φ ( m , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] .
So, for T m T x 2 , we have:
d 2 2 ( T m ) d 2 0 ( T m ) d 1 0 ( T m ) M a x 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + φ ( T θ 2 , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] .
For T m > T x 2 , the upper bound of the system delay is d 1 2 ( T m ) . For T x 2 T ω T x 1 , the upper bound of the system delay is d 2 1 ( T ω ) . For T x 1 T φ , the upper bound of the system delay is d 1 0 ( T φ ) . Then, we have:
d 1 2 ( T m ) M a x 1 θ 2 m [ φ ( m , T θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 1 ) + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] d 2 0 ( T m ) d 1 0 ( T m ) ,
And:
d 2 1 ( T ω ) d 1 0 ( T ω ) d 2 0 ( T ω ) M a x 1 θ   ω [ φ ( ω , T θ , 2 ) + d 1 0 ( T θ ) + T θ T ω ] .
Therefore, we have
D 1 ( T ω ) = d 1 1 ( T ω ) d 2 1 ( T ω ) M a x 1 θ ω [ φ ( ω , θ , 1 ) + d 2 0 ( T θ ) + T θ T ω ] M a x 1 θ ω [ φ ( ω , θ , 2 ) + d 1 0 ( T θ ) + T θ T ω ] d 1 0 ( T ω ) d 2 0 ( T ω ) ,
and:
D 2 ( T m ) = d 1 2 ( T m ) d 2 2 ( T m ) d 2 0 ( T m ) d 1 0 ( T m ) M a x 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + φ ( T θ 2 , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] M a x 1 θ 2 m [ φ ( m , T θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 1 ) + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] .
If θ 1 = θ 2 , according to formula (A1), we have:
M a x 1 θ 1 = θ 2 m [ φ ( m , T θ 2 , 1 ) + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 t ] = M a x 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 t ] ,
M a x 1 θ 1 = θ 2 m [ φ ( m , T θ 2 , 2 ) + φ ( T θ 2 , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 t ] = M a x 1 θ 2 m [ φ ( m , T θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 t ] .
So:
D 2 ( T m ) M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + φ ( T θ 2 , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 1 ) + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] d 2 0 ( T m ) d 1 0 ( T m ) .

3.3. Synchronization System Delay Upper Bound Theorem

Theorem 2.
The system’s delay upper bound of the n -th exchange of data arrival sequence before time T m can be expressed as:
D n ( T m ) = d 1 n ( T m ) d 2 n ( T m ) ,
where d 1 n ( T m ) and d 2 n ( T m ) have different expressions, which are determined by the property of n .
If n is an odd number, and if the equivalent model of data stream 1 is used after the last change, then data stream 1 arrives sooner than data stream 2 before the first exchange. If the equivalent model of data stream 2 is used after the last change, then data stream 2 arrives sooner than data stream 1 before the first exchange. Therefore, we have:
d 1 n ( T m ) M a x 1 θ 2 θ n m [ φ ( m , θ n , 1 ) + φ ( θ n , θ n 1 , 2 ) + + φ ( θ 3 , θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 θ n m [ φ ( m , θ n , 1 ) + φ ( θ n , θ n 1 , 2 ) + + φ ( θ 2 , θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] d 2 0 ( T m ) d 1 0 ( T m ) ,
And:
d 2 n ( T m ) M a x 1 θ 2 θ n m [ φ ( m , θ n , 2 ) + φ ( θ n , θ n 1 , 1 ) + + φ ( θ 3 , θ 2 , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 θ n m [ φ ( m , θ n , 2 ) + φ ( θ n , θ n 1 , 1 ) + + φ ( θ 2 , θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] d 2 0 ( T m ) d 1 0 ( T m ) .
If n is an even number, and if the equivalent model of data stream 1 is used after the last change, then data stream 2 arrives sooner than data stream 1 before the first exchange. If the equivalent model of data stream 2 is used after the last change, then data stream 1 arrives sooner than data stream 2 before the first exchange. Therefore, we have:
d 1 n ( T m ) M a x 1 θ 2 θ n m [ φ ( m , θ n , 1 ) + φ ( θ n , θ n 1 , 2 ) + + φ ( θ 3 , θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 θ n m [ φ ( m , θ n , 1 ) + φ ( θ n , θ n 1 , 2 ) + + φ ( θ 2 , θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] d 2 0 ( T m ) d 1 0 ( T m ) ,
And:
d 2 n ( T m ) M a x 1 θ 2 θ n m [ φ ( m , θ n , 2 ) + φ ( θ n , θ n 1 , 1 ) + + φ ( θ 3 , θ 2 , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 θ n m [ φ ( m , θ n , 2 ) + φ ( θ n , θ n 1 , 1 ) + + φ ( θ 2 , θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] d 2 0 ( T m ) d 1 0 ( T m ) .
The proof of Theorem 2 is given in the Appendix A (see, Appendix A.3).
In the above theorem, the system’s delay upper bound of the n -th exchange of data arrival sequence before time T m is obtained. Next, for any given time t , we drive the expression of system’s delay upper bound.
Let us define h ( α , β , t ) = s u p 0 s t { i n f τ 0 { α ( s ) β ( s + τ ) } } .
Theorem 3.
At any given time t, the system’s delay upper bound can be expressed as d ( t ) h ( α , β , t ) .
The proof of Theorem 2 is given in Appendix A; see, Appendix A.4.
According to Theorem 3, we have h ( α , β , t 1 ) h ( α , β , t 2 ) ,   t 1 t 2 . According to Theorem 3, D n ( t ) in Theorem 2 can be written as follows ( n is an odd number):
D n ( T m ) = d 1 n ( T m ) d 2 n ( T m ) h ( α 1 , β R 1 , T m ) h ( α 2 , β R 2 , T m ) M a x 1 θ 1 θ 2 θ n m [ φ ( m , T θ n , 1 ) φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 2 , T θ 1 , 2 ) + h ( α 1 , β R 1 , T θ 1 ) + T θ 1 T m ] M a x 1 θ 1 θ 2 θ n m [ φ ( m , θ n , 1 ) + φ ( θ n , θ n 1 , 2 ) + + φ ( θ 2 , θ 1 , 1 ) + h ( α 2 , β R 2 , T θ 1 ) + T θ 1 T m ] .

3.4. The Method of Calculation of the Upper Bound Equivalent Synchronization System Delay

Furthermore, consider the case of p -channel data, if it needs to be synchronized. The flows are represented as 1 , 2 ,   ,   p . According to the similar analysis in Section 3.2 and Section 3.3, the upper bound of the delays can be represented using the model as follows:
D n ( T m ) = d 1 n ( T m ) d 2 n ( T m ) d p n ( T m ) M a x 1 θ 1 θ 2 θ n 1 θ n m , x k x k + 1 ( 1 x k p ) [ φ ( m , T θ n , x n ) + φ ( T θ n , T θ n 1 , x n 1 ) + + φ ( T θ 2 , T θ 1 , x 2 ) + h ( α x 1 , β x 1 , T θ 1 ) + T θ 1 T m ] h ( α 1 , β R 1 , T m ) h ( α 2 , β R 2 , T m ) h ( α p , β R p , T m ) .
We define:
f ( t ) = { 1 θ 1 θ 2 θ n 1 θ n m ,   x k x k + 1 ( 1 x k p ) | φ ( m , T θ n , x n ) + φ ( T θ n , T θ n 1 , x n 1 ) + + φ ( T θ 2 , T θ 1 , x 2 ) + h ( α x 1 , β R x 1 , T θ 1 ) + T θ 1 } .
Therefore:
D n ( T m ) ( M a x f ( T m ) T m ) h ( α 1 , β R 1 , T m ) h ( α 2 , β R 2 , T m ) h ( α p , β R p , T m ) ,
where f ( t ) can be equivalent to any path from node 0 to node dest in Figure 2. M a x f ( t ) can be equivalent to obtaining the maximum path.
There are p m + 2 nodes in this graph, and the nodes in the same row do not connect with each other. There is no connection between the nodes of the same column, but there is a connection between the two nodes in different rows and different columns. Besides, node 0 and any other node are connected. Node dest is connected to the node km only, and the distance is 0. The defined distance is represented as l ( n o d e 1 , n o d e 2 ) . So, we have:
l ( 0 , k m + u ) = h ( α x k , β R x k , T u ) + T u , 0 k p 1 , 1 u m ,
l ( k m ,   d e s t ) = 0 , 1 k p ,
l ( k m + u , r m + v ) = φ ( v , u , r + 1 ) , 0 r , k p 1 ,   1 u < v m ,
φ ( v , u , r ) = { i n f { τ 0 , k = u + 1 v G r ( T k ) β R r 2 ( τ ) } , ( v u + 2 ) , 0 , e l s e .
In Figure 2, all paths from node 0 to node dest constitute the value of f ( t ) . For example, taking θ 1 = 1 , θ 2 = 2 , θ 3 = θ 4 = = θ n = θ 2 , x 1 = 1 , x 2 = 3 , x 3 = m , we have:
f ( T m ) = h ( α 1 , β R 1 , T u ) + φ ( 2 , 1 , 3 ) + φ ( m , 2 , p ) + T 1 T m .
It can be expressed as the path distance which is l ( 0 , 1 ) + l ( 1 , 2 m + 2 ) + l ( 2 m + 2 , p m ) .

4. Monitoring System Delay Experimental Tests

4.1. Network Topology Simulation and Experimental Design

The network simulation software EstiNet is used for the experiments. For the sake of simplicity and generality, this paper selects the network topology structure shown in Figure 3. In order to simulate the time delay of the synchronization system, the data transmission introduced in Algorithm 1 is carried out in the network of Figure 3.
Algorithm 1:
1. Node 1 and 3 send packets in size of 100 kb at intervals of one second to node 42, denoting arrived curves as α 1 ( t ) and α 2 ( t ) .
2. Send node 42 packets of data to node 11 after synchronization.
3. No. 5, 12, 14, 17, 18, 20, 21, 23, 22, 29 nodes send competing data packets to node 8, to constitute competing flow R 3 ( t ) , which reaches curve α 3 ( t ) .
4. No. 4, 13, 15, 16, 19, 24, 25, 26, 27, 28 nodes send competing data packets to node 8, to constitute competing flow R 4 ( t ) , which reaches curve α 4 ( t ) .
5. No. 31, 32, 33, 34, 35, 36, 37, 38, 39, 40 nodes send competing data packets to node 8, to constitute competing flow R 5 ( t ) , which reaches curve α 5 ( t ) .
6. All the links take bandwidth of 10 Mb. For all routers, the same configuration is used.
In order to assess the feasibility and effectiveness of the proposed method, we design different α 3 ( t ) , α 4 ( t ) , α 5 ( t ) in the experiment, which are given as follows. Deploying data generating program, such that data packets sent by R 3 are shown in Figure 4.
.
Deploying data generating program, such that data packets sent by R 4 are shown in Figure 5.
Deploying data generating program, such that data packets sent by R 5 are shown in Figure 6.
Make competing flows R 3 ( t ) , R 4 ( t ) and R 5 ( t ) consistent with data in BC-pAug89 [23] dataset. The stg-trace file command in software EstiNet can read network flows generated by the specified file.

4.2. Theoretical Analysis of Delay Bound for Monitoring System

4.2.1. First, the Computation Service Curve and the Scaling Function of Node 42 of the Synchronous Link Are Given

For simplicity, the synchronization process is to add the number of packets sent by node 1 and node 3. Then, the scaling function can be expressed as S ( a ) = 1 2 a . Further testing the processing time of a char type data. The total time of one million operations is less than 10 milliseconds, which means the average time for a single operation is less than 0.01 microseconds. In addition, defining the time complexity as O ( n ) , thus the equivalent service curve can be expressed as C ( t ) 100 t × 8 = 800 t , where t is in units of microseconds, and C ( t ) is in units of byte.

4.2.2. When There Are no Competing flows α 3 ( t ) , α 4 ( t ) and α 5 ( t )

Because the propagation delay of the link is set relatively small (1 microsecond, which is negligible), the delay of the system is mainly composed of processing delay, transfer delay and queuing delay. The equivalent service model using common links and routers is as follows:
β R , T = R [ t T ] + = { R ( t T ) , t > T , 0 , t T .
Since the propagation delay is small, assuming the router processing delay can be ignored, then the equivalent service model for each link and router is the bandwidth of the link. Therefore, the equivalent transport service curve from node 1 to node 42 is β 1 , 42 = β 1 , 2 β 2 , 42 , where β 1 , 2 = 10 t . Based on the remaining service theorem [7], we have:
β 2 , 42 = 10 t α 2 ( t ) ,
β 3 , 42 = 10 t α 1 ( t ) .
The equivalent transport service curve from node 11 to node 42 is β 42 , 11 = 10 t . Due to the same amount of data in node 1 and node 3, and according to the previously obtained computing services curve C ( t ) of node 9 and scaling function S , we can obtain the equivalent service curve on node 1 and node 3 to node 11 as follows:
β 3 , 11 = β 1 , 11 = β 1 , 2 β 2 , 42 1 2 ( C S 1 _ ( β 42 , 11 ) ) = 10 t α 1 ( t ) .

4.2.3. When Adding Competing Flows of α 3 ( t ) , α 4 ( t ) and α 5 ( t )

According to the residual service curve theorem [7], the service curves of node 1 and node 3 to node 2 are as follows:
β 1 , 2 = 10 t α 3 ( t ) ,
β 3 , 2 = 10 t α 4 ( t ) .
The service curve from node 42 to node 11 is:
β 42 , 11 = 10 t α 5 ( t ) .
Thus, the equivalent service curves on node 1 and node 3 to node 11 are as follows:
β 1 , 11 = β 1 , 2 β 2 , 42 1 2 ( C S 1 _ ( β 42 , 11 ) ) ,
β 3 , 11 = β 3 , 42 β 3 , 42 1 2 ( C S 1 _ ( β 42 , 11 ) ) .

4.2.4. Time Delay Increasing due to Forwarding

Because we adopt socket for packet forwarding in the implementation process, which means the packets will not be sent to node 11 until the total packets arrive to node 42. Nevertheless, each arrived packet should be forwarded in normal condition. Thus, the additional time delay is the transmission delay for the same size of the data packet from node 2 to node 11. Because the link bandwidth is 10 MB, the increase of delay can be obtained with a packet size/bandwidth. Define the delay as Δ t . The system delay should be superimposed on Δ t in the original calculation of boundary value. Namely, D n ( t ) = D n ( t ) + Δ t .
Taking experimental verification of the above analysis, we get 22,625.8 microseconds of delay for 100 Kb packet to be sent from node 1 to node 11 transiting in node 42, and the delay directly sent from node 1 to node 11 is 12,896.8 μs, where Δ t = 9996.9 100   Kb / 10   Mbps .
Furthermore, multiple data links are considered to be forwarded. Therefore, the total delay is required to compose of the delay time for the last packet forwarded through an intermediate transmission. Intermediate delay δ can be calculated by:
δ = MTU   size × ( m 1 ) / 10   Mbps .

4.2.5. Arrival Flow Curve

(a) Arrival flow curve of monitoring sensors.
Since 100 kb monitoring data packet is sent, we can omit the time required for data transmission. The arrival flow curve on node 1 and node 3 can be represented by the following step function [14]:
α 1 ( t ) = t T × 100   k ,
α 2 ( t ) = t T × 100   k .
where time t is in units of microseconds, and T = 10 6 .
(b) Competing arrival flow curve according to Figure 4, Figure 5 and Figure 6.
Maximum flow within any one second is 10 Mb for competition flow R 3 and R 4 . Maximum flow within any two seconds is 13 Mb. Arbitrary maximum flow within three seconds is 14 Mb. So, we can get the curve as:
α 3 ( t ) = α 4 ( t ) = t 3 T × 10 M + t + 2 T 3 T × 3 M + t + T 3 T × 1 M .
While for competing flow R 5 , the largest flow within any one second is 1 Mb. Therefore, it can be expressed as:
α 5 ( t ) = t T × 1 M .
Furthermore, since the network bandwidth is 10 Mbps, the data packet size of any transmission time segment x is S x 10 x . We can further get constrained conditions for α 3 ( t ) , α 4 ( t ) , α 5 ( t ) as follows:
σ = t / ( 3 × 10 6 ) ,
τ = t % ( 3 × 10 6 ) ,
ϑ ( t ) = { σ × 14 M + 10 τ , ( 0 τ 10 6 ) , σ × 14 M + 10 M + 10 ( τ 10 ^ 6 ) , ( 10 6 < τ 2 × 10 6 ) , σ × 14 M + 13 M + 10 ( τ 2 × 10 ^ 6 ) , ( 2 × 10 6 < τ 3 × 10 6 ) ,
α 3 ( t ) = α 4 ( t ) = M i n ( α 3 ( t ) , ϑ ( t ) ) = M i n ( α 4 ( t ) , ϑ ( t ) ) ,
α 5 ( t ) = M i n ( α 5 ( t ) , 10 t ) .
(c) Competing flow using BC-pAug89 data set.
We describe the competing flow using flow model under Gaussian assumption, and we have:
α 3 ( t ) = α 4 ( t ) = α 5 ( t ) = ρ n + k n σ 2 + 2 σ 2 × i = 1 n 1 ( n i ) ( 1 + n α ) β α .
If there is no other flow in the system, t > 0 , we have:
h ( α 1 ( t ) , β 1 ( t ) , t ) = h ( α 2 ( t ) , β 2 ( t ) , t ) = 200 k 10 = 20,000 ,
Δ t = 100 k 10 M × 10 6 = 10,000 ,
δ = 1500 8 6 10 M × 10 6 6866 ,
φ ( T θ p , T θ q , 1 ) = φ ( T θ p , T θ q , 2 ) = 100 k × ( p q ) 10 .
According to the equivalent calculating method in Section 3.4, we have D n ( t ) h ( α 1 ( t ) , β 1 , 11 , t ) + Δ t + δ = 1,436,866 .
Using the theoretical analysis of BC-pAug89, we get competitive flow model under the generalized Cauchy hypothesis by Matlab calculation:
α 3 ( t ) = α 4 ( t ) = α 5 ( t ) < t .
The maximum transmission flow per second does not exceed 1 Mb. Therefore:
h ( α 1 ( t ) , β 1 , 11 , T ) = h ( α 1 ( t ) , β 1 , 11 ( t ) , 2 T ) = = h ( α 1 ( t ) , β 1 , 11 ( t ) , n T ) < 200 k 9 = 22,222 ,
φ ( T θ p , T θ q , 1 ) = φ ( T θ p , T θ q , 2 ) = 100 k × ( p q ) 9 .
According to the equivalent calculating method in Section 3.4, we can obtain:
D n ( t ) h ( α 1 ( t ) , β 1 , 11 , t ) + Δ t + δ = 22,222 + 10,000 + 6866 = 39,088 .

4.3. Simulation Results of Monitoring System Delay

In Figure 7, the simulated network delay is compared with the case where competing flow is not superimposed. In Figure 8, the simulated network delay is compared with the case where competing flows in Figure 4, Figure 5 and Figure 6 are superimposed. In Figure 9, the simulated network delay is compared with the case where competing flow in BC-pAug89 data set is superimposed.
Since delay caused by operations such as packet and packetization in the network communication and processing delay of the routers are not considered in the theoretical calculation, the upper bound of the theoretical delay calculated in Figure 7 and Figure 9 is smaller than the measured value. However, such deviation is within 5 milliseconds, which is quite small. According to Figure 7, Figure 8 and Figure 9, it can be seen that the theoretical results are close to those obtained by simulation, which indicates the feasibility and effectiveness of our proposed method.

5. Summary

In this paper, we propose a new method to provide an estimation for the upper bound of the smart grid monitoring system’s end-to-end delay. The graph theory approach is utilized to obtain the results, and simulations demonstrate the feasibility of the proposed method. It is notable that the main results in this paper are presented in forms of theorems. If the objectively existing system constraints and system parameter uncertainty are taken into consideration, the studied problem cannot be solved analytically. Instead, numerical methods, such as deep learning and reinforcement learning approaches, shall be applied to solve the new problem. On the other hand, with the development of smart grid technology, the concept of Energy Internet has developed rapidly in recent years [24,25]. Within the architecture of the Energy Internet, power systems and information systems are integrated, and energy and information are fused, such that a better scheduling and management of various kinds of energy can be achieved [3,25]. The latency problem of communication systems considered in this paper exists in the Energy Internet as well. In addition, the analysis of communication delay can be further extended to energy transmission systems [4,26]. In the future, we will conduct research on communication systems within scenarios of the Energy Internet.

Author Contributions

Conceptualization, J.C. and Y.W.; Formal analysis, J.C., Y.W., H.H. and Y.Q.; Methodology, J.C. and Y.W.; Writing—Original draft, Y.W., H.H. and Y.Q.; Writing—review & editing, H.H. and Y.Q.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A.

Appendix A.1. Proof of Theorem 1

Proof. 
We prove this theorem on two cases.
(1) First, when t > t 2 , assuming the new system’s backlog is B ( t ) at time t , obviously, we have B ( t ) B ( t ) .
 (a) Let us consider the case of B ( t ) > B ( t ) .
For the suspension service system, the backlog for the system at time t 2 is R ( t 2 ) R ( t 1 ) . For the service system which is not suspended, the backlog at time t 2 is R ( t 2 ) R ( t 2 ) . Hence, the incremental backlog is R ( t 2 ) R ( t 1 ) at time t 2 , and this term is defined as a suspensive backlog caused by the suspension.
Under the same circumstances, we assume the process is after suspensive backlog. The server will only deal with the suspensive backlog in the idle moment. If the system suspensive backlog increases at time t , then we claim the suspensive backlog has not been finished yet, which means that the system is not idle from t 2 to t . Since B ( t ) > B ( t ) 0 , the system will still be busy until B ( t ) has been finished processing. Afterwards, whether the system is busy or not is not taken into consideration. Assuming that B ( t ) finishes at time t + τ , then d ( t ) = τ .
Since the system has always been busy from t 2 to t + τ , the amount of data that can be processed is at least β ( t + τ t 2 ) , while the actual amount of data from t 2 to t + τ is R ( t ) R ( t 1 ) . Then, we have:
β ( t + τ t 2 ) R ( t ) R ( t 1 ) .
Since β is a generalized increment function, we have:
τ [ i n f { τ 0 ,   R ( t ) R ( t 1 ) β ( τ ) } + t 2 t ] .
 (b) Let us consider the case of B ( t ) = B ( t ) .
System backlog at time t is not changed, which means the system delay at time t is unchanged, i.e., d ( t ) = d ( t ) . If we combine the above two situations, we obtain:
d ( t ) = d ( t ) τ d ( t ) [ i n f { τ 0 ,   R ( t ) R ( t 1 ) β ( τ ) } + t 2 t ] , t > t 2 .
(2) Second, we focus on the situation when t 1 < t < t 2 .
Since the system was suspended from t 1 to t 2 , the traffic flow within t 1 to t 2 will start to be processed after t 2 . Therefore, the completion time t f i n of its processing satisfies:
t f i n i n f { τ 0 ,   R ( t ) R ( t 1 ) β ( τ ) } + t 2 .
So, we obtain the delay as:
d ( t ) = t f i n t = [ i n f { τ 0 ,   R ( t ) R ( t 1 ) β ( τ ) } + t 2 t ] ,
which finishes the proof.  □

Appendix A.2. Discussions for the Value of m in T m

(a) For the case m = x 1 + 1 , we derive the upper bound of system delay d 1 1 ( T m ) .
 i
If t > T x 1 + d 2 0 ( T x 1 ) , data of R 1 with time scale T m arrives at the synchronization link after the data with the previous time scale is processed. It means that at time t , β R 1 2 ’s backlog would not increase. According to Theorem 1, d 1 1 ( T m ) = d 1 0 ( T m ) .
 ii
If t < T x 1 + d 2 0 ( T x 1 ) , according to the rules that first come first served, for β R 1 2 , data will not be processed until time T x 1 + d 2 0 ( T x 1 ) . Since data of R 2 arrives first, data of R 2 with time scale T m has arrived at time t . β R 2 2 would have to wait until T x 1 + d 2 0 ( T x 1 ) before processing the data. The system delay can be expressed by the equivalent delay of R 2 , and we have d 1 1 ( T m ) = d 2 0 ( T m ) .
According to Case i and Case ii, if m = x 1 + 1 , the upper bound of system delay can be expressed as d 1 1 ( T m ) = d 1 0 ( T m ) d 2 0 ( T m ) .
(b) For the case m x 1 + 2 , we derive the upper bound of system delay d 1 1 ( T m ) .
 iii If t > T x 1 + d 2 0 ( T x 1 ) at time t , the backlog of β R 1 2 may have increased. If so, according to Theorem 1, we can obtain the delay bound Δ as:
Δ = i n f { τ 0 , R 1 1 ( t ) R 1 ( T x 1 + d 1 0 ( T x 1 ) ) β R 1 2 ( τ ) } + T x 1 + d 2 0 ( T x 1 ) t .
Since R 1 1 ( t ) and R 1 ( T m ) are identical, and they stand for the total delay of the data which were sent at time T m and passed by β R 1 2 , we can obtain the data delay at time T m as:
d 1 1 ( T m ) = + t T m .
Therefore, if β R 1 2 ’s backlog has increased at time t , then:
d 1 1 ( T m ) = [ i n f { τ 0 , R 1 ( T m ) R 1 ( T x 1 + d 1 0 ( T x 1 ) ) β R 1 2 ( τ ) } + T x 1 + d 2 0 ( T x 1 ) T m ] .
Conversely, if it hasn’t, then d 1 1 ( T m ) = d 1 0 ( T m ) . Since:
R ( T m ) R 1 ( T x 1 + d 1 0 ( T x 1 ) ) = k = x 1 + 1 m ( m x 1 + 2 ) G 1 ( T k ) ,
We have:
d 1 1 ( T m ) = d 1 0 ( T m ) [ i n f { τ 0 , k = x 1 + 1 m ( m x 1 + 2 ) G 1 ( T k ) β R 1 2 ( τ ) } + T x 1 + d 2 0 ( T x 1 ) T m ] .
 iv If t < T x 1 + d 2 0 ( T x 2 ) , data will not be processed until T x 1 + d 2 0 ( T x 1 ) , and the upper bound of the finishing time is:
t f i n = i n f { τ 0 , R 1 1 ( t ) R 1 ( T x 1 + d 1 0 ( T x 1 ) ) β R 1 2 ( τ ) } + T x 1 + d 2 0 ( T x 1 ) .
Thereby, the system delay still satisfies:
d 1 1 ( T m ) = t f i n T m ,
d 1 1 ( T m ) = i n f { τ 0 , k = x 1 + 1 m ( m x 1 + 2 ) G 1 ( T k ) β R 1 2 ( τ ) } + T x 1 + d 2 0 ( T x 1 ) T m .
With the results in Case iii and Case iv, for the data sent at time T m , its upper bound of end-to-end delay can be expressed as:
d 1 1 ( T m ) = d 1 0 ( T m ) d 2 0 ( T m ) [ i n f { τ 0 , k = x 1 + 1 m ( m x 1 + 2 ) G 1 ( T k ) β R 1 2 ( τ ) } + T x 1 + d 2 0 ( T x 1 ) T m ] .
Apparently, for x > x 1 , d 2 0 ( T x ) d 1 1 ( T x ) .
We define the following formulas:
φ ( m , θ , 1 ) = { i n f { τ 0 , k = θ + 1 m G 1 ( T k ) β R 1 2 ( τ ) } , m θ + 2 , 0 , e l s e ,
φ ( m , θ , 2 ) = { i n f { τ 0 , k = θ + 1 m G 2 ( T k ) β R 2 2 ( τ ) } , m θ + 2 , 0 , e l s e ,
φ ( θ m , θ n , 1 ) = { i n f { τ 0 , k = θ m + 1 θ n G 1 ( T k ) β R 1 2 ( τ ) } , θ n θ m + 2 , 0 , e l s e ,
φ ( θ m , θ n , 2 ) = { i n f { τ 0 , k = θ m + 1 θ n G 2 ( T k ) β R 2 2 ( τ ) } , θ n θ m + 2 , 0 , e l s e .
Then, we have:
φ ( θ p , θ m , 2 ) + φ ( θ m , θ n , 1 ) = { φ ( θ p , θ n , 1 ) , ( θ n = θ m ) , φ ( θ p , θ m , 2 ) + φ ( θ m , θ n , 1 ) , ( θ m > θ m ) .
From Case (a) and Case (b), for data with time scale T m , its upper bound of delay can be expressed as:
d 1 1 ( T m ) = d 1 0 ( T m ) d 2 0 ( T m ) [ φ ( m , T x 1 , 1 ) + T x 1 + d 2 0 ( T x 1 ) T m ] .

Appendix A.3. Proof of Theorem 2

Proof. 
Using the mathematical induction, according to the analysis in Section 3.2, we have:
d 1 1 ( T m ) M a x 1 θ m [ φ ( m , θ , 1 ) + d 2 0 ( T θ ) + T θ T m ] d 1 0 ( T m ) d 2 0 ( T m ) ,
d 2 1 ( T m ) M a x 1 θ m [ φ ( m , θ , 2 ) + d 1 0 ( T θ ) + T θ T m ] d 1 0 ( t ) d 2 0 ( T m ) ,
d 2 2 ( T m ) M a x 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 2 ) + φ ( T θ 2 , T θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] d 1 0 ( T m ) d 2 0 ( T m ) ,
d 1 2 ( T m ) M a x 1 θ 2 m [ φ ( m , T θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 m [ φ ( m , T θ 2 , 1 ) + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] d 1 0 ( T m ) d 2 0 ( T m ) .
Assuming n is an odd number, and the following inequality is satisfied:
d 1 n 1 ( T ω ) M a x 1 θ 2 θ n 1 ω [ φ ( ω , θ n 1 , 1 ) + + φ ( θ 3 , θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T ω ] M a x 1 θ 1 θ 2 θ n 1 ω [ φ ( ω , θ n 1 , 1 ) + + φ ( θ 2 , θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T ω ] d 1 0 ( T ω ) d 2 0 ( T ω )
d 2 n 1 ( T ω ) M a x 1 θ 2 θ n 1 ω [ φ ( ω , θ n 1 , 2 ) + + φ ( θ 3 , θ 2 , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 T ω ] M a x 1 θ 1 θ 2 θ n 1 ω [ φ ( ω , θ n 1 , 2 ) + + φ ( θ 2 , θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T ω ] d 1 0 ( T ω ) d 2 0 ( T ω ) .
Consider exchanges for n times. First let us consider d 2 n ( t ) . It can be seen as equivalent to the output of R 2 through service β R 2 1 after the suspension of β R 2 2 , where the pause period is T x n + d 2 0 ( T x n ) < t < T x 2 + d 1 n 1 ( T x n ) . We have:
d 2 n ( T m ) d 2 0 ( T m ) d 1 n 1 ( T m ) M a x 1 θ 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + T θ n + d 1 n 1 ( T θ n ) T m ] .
If we assume d 1 n 1 ( T θ n ) = d 2 0 ( T θ n ) , then d 2 n ( T m ) = d 2 0 ( T m ) , and:
M a x 1 θ 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + T θ n + d 1 n 1 ( T θ n ) T m ] d 2 0 ( T m ) M a x 1 θ n m [ φ ( m , T θ n , 2 ) + T θ n + d 1 0 ( T θ n ) T m ] M a x 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + T θ n + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 3 , T θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T θ n T m ] M a x 1 θ 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + T θ n + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T θ n T m ] = d 2 0 ( T m ) M a x 1 θ 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + T θ n + d 1 0 ( T θ n ) T m ] M a x 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 3 , T θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ]
Apparently, if θ 1 = θ 2 = = θ n 1 = θ n , then:
M a x 1 θ 1 = θ 2 = = θ n 1 = θ n m [ φ ( m , T θ n , 2 ) + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 3 , T θ 2 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] = M a x 1 θ n m [ φ ( m , T θ n , 2 ) + T θ n + d 1 0 ( T θ n ) T m ] .
Therefore, we have:
d 2 n ( T m ) d 2 0 ( t ) d 1 n 1 ( T m ) M a x 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + φ ( T θ n , T θ n 1 , 1 ) + + + φ ( T θ 3 , T θ 2 , 1 ) d 2 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + φ : ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] .
Meanwhile, apparently:
M a x 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 3 , T θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] = M a x 1 θ 1 θ n 1 m [ φ ( m , θ n 1 , 1 ) + + φ ( θ 3 , θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] .
If we set θ n 1 = θ n , then:
M a x 1 θ 1 θ 2 θ n 1 = θ n m [ φ ( m , T θ n , 2 ) + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] = M a x 1 θ 1 θ 2 θ n 1 m [ φ ( m , θ n 1 , 1 ) + + φ ( θ 2 , θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] .
Thus, we have:
d 2 n ( T m ) M a x 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 3 , T θ 2 , 1 ) + d 2 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 θ n 1 θ n m [ φ ( m , T θ n , 2 ) + φ ( T θ n , T θ n 1 , 1 ) + + φ ( T θ 2 , T θ 1 , 2 ) + d 1 0 ( T θ 1 ) + T θ 1 T m ] d 2 0 ( T m ) d 1 0 ( T m ) .
In the same way, we can prove:
d 1 n ( T m ) M a x 1 θ 2 θ n m [ φ ( m , θ n , 1 ) + φ ( θ n , θ n 1 , 2 ) + + φ ( θ 3 , θ 2 , 2 ) + d 1 0 ( T θ 2 ) + T θ 2 T m ] M a x 1 θ 1 θ 2 θ n m [ φ ( m , θ n , 1 ) + φ ( θ n , θ n 1 , 2 ) + + φ ( θ 2 , θ 1 , 1 ) + d 2 0 ( T θ 1 ) + T θ 1 T m ] d 2 0 ( T m ) d 1 0 ( T m ) .
When n is an even number, a similar proof can be obtained. Here, we omit the details.  □

Appendix A.4. Proof of Theorem 3

Proof. 
The analytical methods are consistent with the proof of processing delays in the network calculus theory. For a given time t , taking τ d ( t ) , we have R ( t ) R ( t + τ ) . Meanwhile, according to the definition of the service curve, we have:
R ( t + τ ) R ( t + τ ) β ( t ) = i n f 0 s t + τ { R ( t + τ s ) + β ( s ) } .
Therefore, for 0 s 0 t + τ :
R ( t + τ ) = R ( t + τ s 0 ) + β ( s 0 ) .
Thus, we obtain:
R ( t ) R ( t + τ s 0 ) + β ( s 0 ) .
Furthermore, for t + τ s 0 t , we have:
R ( t ) R ( t + τ s 0 ) α ( s 0 τ ) .
Therefore:
β ( s 0 ) R ( t ) R ( t + τ s 0 ) α ( s 0 τ ) .
Define i n f τ 0 { α ( s ) β ( s + τ ) } = δ ( s ) . We have τ δ ( s 0 τ ) . According to 0 s 0 t + τ , we get s 0 τ t . While:
h ( α , β , t ) = s u p 0 s t { i n f τ 0 { α ( s ) β ( s + τ ) } } ,
We have τ h ( α , β , t ) . Since it is true for any τ d ( t ) , we have d ( t ) h ( α , β , t ) .  □

References

  1. Lasseter, R.H.; Paigi, P. Microgrid: A conceptual solution. In Proceedings of the IEEE 35th Annual Power Electronics Specialists Conference, Aachen, Germany, 20–25 June 2004; pp. 4285–4290. [Google Scholar]
  2. Cecati, C.; Mokryani, G.; Piccolo, A.; Siano, P. An overview on the smart grid concept. In Proceedings of the 36th Annual Conference on IEEE Industrial Electronics Society, Glendale, AZ, USA, 7–10 November 2010; pp. 3322–3327. [Google Scholar]
  3. Hua, H.; Hao, C.; Qin, Y.; Cao, J. A class of control strategies for energy Internet considering system robustness and operation cost optimization. Energies 2018, 11, 1593. [Google Scholar] [CrossRef]
  4. Hua, H.; Cao, J.; Yang, G.; Ren, G. Voltage control for uncertain stochastic nonlinear system with application to energy Internet: Nonfragile robust H approach. J. Math. Anal. Appl. 2018, 463, 93–110. [Google Scholar] [CrossRef]
  5. Galli, S.; Scaglione, A.; Wang, Z. For the grid and through the grid: The role of power line communications in the smart grid. Proc. IEEE 2011, 99, 998–1027. [Google Scholar] [CrossRef]
  6. Ancillotti, E.; Bruno, R.; Conti, M. The role of communication systems in smart grids: Architectures, technical solutions and research challenges. Comput. Commun. 2013, 36, 1665–1697. [Google Scholar] [CrossRef]
  7. Cao, J.; Wan, Y.; Hua, H.; Yang, G. Performance modelling for data monitoring services in smart grid. Unpublished work. 2018. [Google Scholar]
  8. Musleh, A.S.; Muyeen, S.M.; Al-Durra, A.; Kamwa, I.; Masoum, M.A.; Islam, S. Time-Delay Analysis of Wide-Area Voltage Control Considering Smart Grid Contingences in a Real-Time Environment. IEEE Trans. Ind. Inform. 2018, 14, 1242–1252. [Google Scholar] [CrossRef]
  9. He, D.; Chan, S.; Guizani, M. Cyber security analysis and protection of wireless sensor networks for smart grid monitoring. IEEE Wirel. Commun. 2017, 24, 98–103. [Google Scholar] [CrossRef]
  10. Cao, Y.; Lu, H.; Shi, X.; Duan, P. Evaluation model of the cloud systems based on queuing petri net. In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing, Zhangjiajie, China, 18–20 November 2015; pp. 413–423. [Google Scholar]
  11. Pramanik, S.; Datta, R.; Chatterjee, P. Self-similarity of data traffic in a Delay Tolerant Network. In Proceedings of the Wireless Days 2017, Porto, Portugal, 29–31 March 2017; pp. 39–42. [Google Scholar]
  12. Cruz, R.L. A calculus for network delay. I. Network elements in isolation. IEEE Trans. Inf. Theory 1991, 37, 114–131. [Google Scholar] [CrossRef]
  13. Ren, S.; Feng, Q.; Wang, Y.; Dou, W. A Service Curve of Hierarchical Token Bucket Queue Discipline on Soft-Ware Defined Networks Based on Deterministic Network Calculus: An Analysis and Simulation. J. Adv. Comput. Netw. 2017, 5, 8–12. [Google Scholar] [CrossRef]
  14. Le Boudec, J.Y.; Thiran, P. Network Calculus: A Theory of Deterministic Queuing Systems for the Internet, 1st ed.; Springer-Verlag: Berlin/Heidelberg, Germany, 2001; pp. 3–81. ISBN 978-3-540-45318-5. [Google Scholar]
  15. Fan, Z.; Kulkarni, P.; Gormus, S.; Efthymiou, C.; Kalogridis, G.; Sooriyabandara, M.; Chin, W.H. Smart grid communications: Overview of research challenges, solutions, and standardization activities. IEEE Commun. Surv. Tutor. 2013, 15, 21–38. [Google Scholar] [CrossRef]
  16. Bayram, I.S.; Shakir, M.Z.; Abdallah, M.; Qaraqe, K. A survey on energy trading in smart grid. In Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, Atlanta, GA, USA, 3–5 December 2014; pp. 258–262. [Google Scholar]
  17. Ciucu, F.; Schmitt, J. Perspectives on network calculus: No free lunch, but still good value. ACM SIGCOMM Comput. Commun. Rev. 2012, 42, 311–322. [Google Scholar] [CrossRef]
  18. Wang, K.; Low, S.; Lin, C. How stochastic network calculus concepts help green the power grid. In Proceedings of the 2011 IEEE International Conference on Smart Grid Communications, Brussels, Belgium, 17–20 October 2011; pp. 55–60. [Google Scholar]
  19. Wang, K.; Ciucu, F.; Lin, C.; Low, S.H. A stochastic power network calculus for integrating renewable energy sources into the power grid. IEEE J. Sel. Areas Commun. 2012, 30, 1037–1048. [Google Scholar] [CrossRef]
  20. Kounev, V.; Tipper, D. Advanced metering and demand response communication performance in Zigbee based HANs. In Proceedings of the 2013 IEEE Conference on Computer Communications Workshops, Turin, Italy, 14–19 April 2013; pp. 3405–3410. [Google Scholar]
  21. Huang, C.; Li, F.; Ding, T.; Jiang, Y.; Guo, J.; Liu, Y. A bounded model of the communication delay for system integrity protection schemes. IEEE Trans. Power Deliv. 2016, 31, 1921–1933. [Google Scholar] [CrossRef]
  22. Cruz, R.L. A calculus for network delay. II. Network analysis. IEEE Trans. Inf. Theory 1991, 37, 132–141. [Google Scholar] [CrossRef]
  23. BC-Ethernet Traces of LAN and WAN Traffic. Available online: http://ita.ee.lbl.gov/html/contrib/BC.html (accessed on 23 October 2018).
  24. Rifkin, J. The Third Industrial Revolution: How Lateral Power Is Transforming Energy, the Economy, and the World; Palgrave Macmillan: New York, NY, USA, 2013; pp. 31–46. [Google Scholar]
  25. Cao, J.; Hua, H.; Ren, G. Energy use and the Internet. In The SAGE Encyclopedia of the Internet; SAGE Publications: Thousand Oaks, CA, USA, 2018; pp. 344–350. [Google Scholar]
  26. Hua, H.; Qin, Y.; Cao, J. Coordinated frequency control for multiple microgrids in energy Internet: A stochastic H approach. In Proceedings of the 2018 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), Singapore, 22–25 May 2018; pp. 810–815. [Google Scholar] [CrossRef]
Figure 1. Synchronous calculation and transmission service model for the monitoring system.
Figure 1. Synchronous calculation and transmission service model for the monitoring system.
Sensors 18 03615 g001
Figure 2. Finding the upper bound of delay.
Figure 2. Finding the upper bound of delay.
Sensors 18 03615 g002
Figure 3. Network topology diagram of the synchronization delay test.
Figure 3. Network topology diagram of the synchronization delay test.
Sensors 18 03615 g003
Figure 4. Superimposed competing flows R 3 ( t ) .
Figure 4. Superimposed competing flows R 3 ( t ) .
Sensors 18 03615 g004
Figure 5. Superimposed competing flows R 4 ( t ) .
Figure 5. Superimposed competing flows R 4 ( t ) .
Sensors 18 03615 g005
Figure 6. Superimposed competing flows R 5 ( t ) .
Figure 6. Superimposed competing flows R 5 ( t ) .
Sensors 18 03615 g006
Figure 7. Results without competing flow.
Figure 7. Results without competing flow.
Sensors 18 03615 g007
Figure 8. Results superimposing competing flows in Figure 4, Figure 5 and Figure 6.
Figure 8. Results superimposing competing flows in Figure 4, Figure 5 and Figure 6.
Sensors 18 03615 g008
Figure 9. Results superimposing competing flows in BC-pAug89 data set.
Figure 9. Results superimposing competing flows in BC-pAug89 data set.
Sensors 18 03615 g009

Share and Cite

MDPI and ACS Style

Cao, J.; Wan, Y.; Hua, H.; Qin, Y. Delay Analysis for End-to-End Synchronous Communication in Monitoring Systems. Sensors 2018, 18, 3615. https://doi.org/10.3390/s18113615

AMA Style

Cao J, Wan Y, Hua H, Qin Y. Delay Analysis for End-to-End Synchronous Communication in Monitoring Systems. Sensors. 2018; 18(11):3615. https://doi.org/10.3390/s18113615

Chicago/Turabian Style

Cao, Junwei, Yuxin Wan, Haochen Hua, and Yuchao Qin. 2018. "Delay Analysis for End-to-End Synchronous Communication in Monitoring Systems" Sensors 18, no. 11: 3615. https://doi.org/10.3390/s18113615

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop