Next Article in Journal
Development of an Equivalent Circuit to Analyze the Receiving Characteristics of a Class IV Flextensional Transducer
Previous Article in Journal
Comprehensive Review of Open-Source Fundus Image Databases for Diabetic Retinopathy Diagnosis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

TSN-Interworked Deterministic Transmission over WLAN

Department of Railroad Electrical and Information Engineering, Korea National University of Transportation, Uiwang 16106, Republic of Korea
Sensors 2025, 25(18), 5660; https://doi.org/10.3390/s25185660
Submission received: 14 August 2025 / Revised: 5 September 2025 / Accepted: 9 September 2025 / Published: 11 September 2025
(This article belongs to the Section Sensor Networks)

Abstract

Many Time-Sensitive Networking (TSN) workloads require deterministic service across heterogeneous links, yet commodity WLANs are contention-based. Although IEEE 802.11be introduced Restricted Target Wake Time (r-TWT) for prioritized access, its ability to robustly guarantee determinism in mixed deployments with legacy devices remains unverified. We propose a standards-aligned scheme that composes r-TWT, Quiet Time Period (QTP), and an optional Randomized Enqueue (RE) policy. These three mechanisms act in concert to protect the Scheduled Traffic (ST) service period (SP) while minimizing the impact on Non-Scheduled Traffic (NST). To analyze how the proposed scheme impacts existing WLANs, we focus the analysis on how the scheme reshapes the contention period (CP)—where opportunistic capacity is realized—by modeling SP/CP timing with renewal theory and embedding it into an EDCA Markov chain. Simulation results confirm that the proposed scheme protects ST determinism: ST throughput remains pinned to the ceiling with zero observed outage and bounded delay across a wide range of station counts. The proposed scheme minimizes NST throughput degradation in the system-peak throughput range (8–12 stations).

1. Introduction

In recent years, a broad class of mission-critical and interactive applications has pushed legacy best-effort IoT deployments toward delay-sensitive operation with bounded latency, low jitter, and low loss. Representative domains include industrial automation, intelligent transportation, smart cities, and media/entertainment, where end devices must exchange data predictably across heterogeneous stacks and networks. This shift is reflected in ongoing standards work on deterministic networking and time-sensitive communication [1,2,3,4].
Ethernet is an attractive substrate for such applications due to its ubiquity and cost efficiency, yet classical Ethernet remains best-effort and thus prone to queuing delays and timing uncertainty. The IEEE 802.1 Time-Sensitive Networking (TSN) suite addresses this gap by adding time synchronization (IEEE 802.1AS), scheduled access via the Time-Aware Shaper (TAS, IEEE 802.1Qbv), and frame preemption (IEEE 802.1Qbu/IEEE 802.3br), enabling deterministic coexistence of scheduled and best-effort traffic on the same physical network [5,6].
Even though TSN is gaining significant attention, it lacks native support for wireless networks, which present unique challenges such as asymmetric channels, unreliable latencies, and interference [7]. In heterogeneous applications that rely on wireless connectivity, such as mobile robotics or connected vehicles, the flexibility and mobility offered by wireless are even more critical than in traditional, static industrial environments. Current research has begun to concentrate on realizing TSN features in the wireless domain, but a mainstream wireless technology for TSN has not yet emerged [8].
Among the candidates for wireless TSN, both 5G and IEEE 802.11 wireless local area network (WLAN) are prominent. 5G networks aim to support TSN through URLLC (Ultra-Reliable Low-Latency Communication) services, focusing on centralized control and network slicing [9]. In contrast, Wi-Fi is considered a strong candidate for its deployment flexibility and cost-effectiveness. However, for WLAN, the primary obstacle is the contention-based channel access mechanism, EDCA (Enhanced Distributed Channel Access). The backoff procedure, fundamental to EDCA, introduces unpredictable jitter in transmission delay, which contradicts the deterministic latency that TSN seeks to achieve [10].
While past amendments of the IEEE 802.11 standard mostly focused on enhancing peak throughput, considerable effort is being made to enhance other aspects such as latency and reliability in the latest amendments. IEEE 802.11ax (Wi-Fi 6) introduced Target Wake Time (TWT), representing a fundamental shift toward scheduled channel access by allowing stations (STAs) to negotiate wake times with the access point (AP). This feature reduces contention and improves energy efficiency, and its potential for dynamic, traffic-aware scheduling has been actively explored [11,12,13]. Building upon this, IEEE 802.11be (Wi-Fi 7) introduced Restricted TWT (r-TWT), which provides exclusive, contention-free channel access during negotiated service periods, making it a key technology for real-time applications (RTAs) [8,14]. Recent studies have proposed mathematical models to optimize these R-TWT parameters to satisfy strict quality of service (QoS) requirements for a dedicated flow [15]. Furthermore, research on low-overhead time synchronization demonstrates ongoing efforts to adapt core TSN components for the wireless medium [16].
While IEEE 802.11ax/11be provides the building blocks for scheduled access (TWT) and exclusive service periods (r-TWT), the literature either studies r-TWT in isolation or does not quantify how to jointly guarantee deterministic Scheduled Traffic (ST) service while bounding the capacity impact on legacy BE traffic. For instance, the analytical work by [15] focuses on a dedicated R-TWT flow in isolation. To our knowledge, no prior work has proposed or analyzed a scheme that synergistically combines r-TWT with the Quiet Time Period (QTP) to realize a wireless equivalent of TSN’s Time-Aware Shaper.
This paper proposes a novel transmission scheme to support time-sensitive traffic in WLAN networks by minimizing transmission jitter. (i) We propose a practical r-TWT + QTP scheduling scheme that functionally emulates TAS—guarding ST slots and suppressing post-SP collision bursts—under standard WLAN. (ii) We develop a closed-form analytical model combining renewal theory for the CP residual life and a Markov chain EDCA analysis for NST. (iii) We also provide a standards-aligned control-plane mapping to TSN centralized user control and centralized network control (CUC/CNC) functional entities for deployability.
The remainder of this paper is organized as follows. In Section 2, we describe the proposed scheme in detail. In Section 3, we present a mathematical model to analyze system throughput. In Section 4, we validate the analysis through simulation. In Section 5, we discuss implementation considerations, limitations, and cross-technology comparisons. Finally, Section 6 concludes the paper.

2. The Proposed Scheme

2.1. Background: The Time-Aware Shaper (TAS) in TSN

Among the key features of Time-Sensitive Networking (TSN), the Time-Aware Shaper (TAS), defined in the IEEE 802.1Qbv standard, is a central mechanism that provides deterministic communication capabilities to standard Ethernet [17]. TAS ensures that high-priority Scheduled Traffic (ST) can be transmitted at a predictable time, free from interference by other traffic. As illustrated in Figure 1, its operation is defined by a sophisticated schedule controlled by the following key parameters:
  • Schedule Anchor and Synchronization (BaseTime): All TAS scheduling operates on an absolute time base that is synchronized across the entire network. The BaseTime parameter specifies the absolute, nanosecond-precision time at which the schedule begins its first cycle. All switches in the network, synchronized via the IEEE 802.1AS (generalized precision time protocol (gPTP)) protocol, start their Gate Control List (GCL) operations at this identical BaseTime [18]. This is a core concept that directly corresponds to the Target Wake Time parameter in our proposed wireless scheme, which likewise defines the absolute start time of each service period (SP).
  • Periodic Scheduling (CycleTime): The schedule initiated at BaseTime repeats indefinitely based on a fixed period known as the CycleTime. This periodic nature allows for the continuous and stable handling of ST streams that require data transmission at regular intervals.
  • Gate Control (GateControlEntry): Each cycle is divided into multiple ‘time slots’, and the behavior of each slot is determined by a gate control entry (GCE). A GCE specifies two key pieces of information:
    • TimeInterval: Defines the duration of the time slot.
    • GateState: An 8-bit mask that defines the ‘Open’ or ‘Closed’ state of the gates for each of the eight traffic queues.
    To support ST traffic, the GateState for a specific TimeInterval is configured to open the gate only for the ST-designated queue, while closing the gates for all other lower-priority queues. This creates an exclusive transmission opportunity, where contention is completely eliminated.
  • Guard Band for Interference Prevention: A critical challenge arises when a long, low-priority frame, which started transmission in the preceding time slot, overruns into the ST slot, thereby delaying the time-sensitive frame. To solve this, TAS inserts a guard band before the ST slot. The guard band is a special time slot where the GateState is set to close all gates, ensuring the medium is idle and available right before the ST frame is scheduled for transmission.
By combining a synchronized BaseTime, a periodic CycleTime, precise gate control entries, and protective guard bands, TAS strictly governs the transmission timing of ST frames, enabling deterministic communication in wired Ethernet environments.

2.2. Limitations of Existing WLAN Mechanisms

To implement the deterministic communication functions of wired Time-Sensitive Networking (TSN) in an IEEE 802.11 wireless LAN environment, three key technical challenges must be addressed:
  • Traffic Isolation: How can Scheduled Traffic (ST) be isolated from Non-Scheduled Traffic (NST) during medium access contention?
  • Guaranteeing Timeliness: How can a designated ST frame be guaranteed to transmit at its precise scheduled time, without delays caused by other traffic?
  • Network Efficiency: How can the negative performance impact of resource reservation for ST traffic on the overall network be minimized?
This section first examines the limitations of existing WLAN mechanisms in addressing these challenges. Subsequently, it proposes a novel wireless TSN scheme that synergistically combines Restricted TWT (r-TWT) from IEEE 802.11be and Quiet Time Period (QTP) from 802.11ax to overcome these limitations.

2.2.1. The Non-Deterministic Nature of Standard EDCA

The fundamental medium access method in WLAN, Enhanced Distributed Channel Access (EDCA), is inherently contention-based. As depicted in Figure 2, there are no reserved transmission opportunities for ST frames in a standard EDCA environment. An ST frame must contend for channel access through the backoff procedure just like any other NST frame, making it fundamentally impossible to guarantee deterministic, low-latency transmission [19].

2.2.2. Limitations of IEEE 802.11ax TWT

The Target Wake Time (TWT) feature introduced in IEEE 802.11ax enables scheduling by assigning stations to specific service periods (SPs). As shown in Figure 3, dedicating an individual TWT for ST frames can achieve isolation from NST traffic, but it introduces two critical problems:
  • Contention Period (CP) Overrun: A station that starts a NST frame transmission in the contention period (CP) just before the TWT SP can extend its transmission opportunity (TXOP) into the TWT SP. This ‘CP Overrun’ delays the start of the ST transmission, causing significant jitter that undermines timeliness.
  • Backoff Counter Drain and Synchronized Collision: During the TWT SP, other stations are forbidden from transmitting, but their backoff counters continue to decrement whenever the channel is sensed idle. This ‘Backoff Counter drain’ phenomenon causes the backoff counters of multiple stations to converge to zero simultaneously, leading to a massive ‘Synchronized collision’ at the exact moment the next CP begins.

2.3. A Novel Transmission Scheme for Deterministic WLAN

To overcome the limitations of existing mechanisms, we propose a scheme that orchestrates three features with distinct roles: (1) r-TWT acts as the functional guard band, (2) QTP breaks synchronized collisions inherent to distributed channel access, and (3) Randomized Enqueue smooths the CP’s initial access intensity. The overall scheduling architecture is shown in Figure 4.

2.3.1. r-TWT as a Functional Guard Band (GB)

Restricted TWT (r-TWT) is an IEEE 802.11be feature for deterministic low-latency service. Unlike standard TWT, r-TWT hard-protects SP boundaries: non-participating STAs are prohibited from starting any TXOP that could overrun into the r-TWT SP. This is functionally equivalent to the guard band in wired TSN, which blocks lower-priority traffic to protect an ST slot [17,18,20]. Hence, r-TWT provides a built-in GB without extra configuration, ensuring the medium is idle at each SP boundary and that the scheduled ST frame can start on time (Figure 5). The r-TWT SP is configured as trigger-enabled so that the AP explicitly solicits the intended ST frame with the dedicated access class or traffic identifier (AC/TID) at SP start, resolving any internal AC contention within the STA [20].
As illustrated in Figure 4, service periods (SPs) are anchored at absolute times and repeat with the ST service interval. Each SP reserves a short window dedicated to the stringent ST flow. We assume (i) a single STA is the r-TWT member for that flow; (ii) the SP is trigger-enabled so the AP explicitly solicits the intended AC/TID at the start; (iii) r-TWT protects the CP→SP boundary (functional guard band), so no CP TXOP can spill into the SP; (iv) early termination: the SP may end immediately after the first successful ACK.
The r-TWT parameters determine the balance between ST protection and NST opportunity. Increasing the SP duration ( T sp ) strengthens ST protection but shortens the contention period (CP) for NST, while increasing the guard band reduces boundary collisions at the cost of CP airtime. Once an ST transmission is triggered within the SP, it is allowed to complete, but if T sp is set too short under harsh channels, a failed first attempt may leave insufficient time for retries. In managed industrial or enterprise deployments, administrative controls (for example, bounding TXOP or PPDU sizes near SP boundaries) help maintain guard band efficiency. A quantitative sizing rule for T sp that meets a target outage while accounting for collisions, packet-error retransmissions, and protocol overhead is developed in Section 3.4; practical adaptive operation, where the AP updates TWT parameters over beacon intervals based on observed packet error rate and ST burst size, is also discussed there.

2.3.2. QTP for Breaking Synchronized Collisions

While r-TWT prevents CP overrun, synchronized backoff remains a problem in distributed access. To desynchronize contenders, we enable the Quiet Time Period (QTP) for the entire r-TWT SP. QTP suspends backoff for non-participating STAs, freezing their counters at current random values [21]. This breaks post-SP synchronized collisions and shortens the idle-to-first-NST gap when CP resumes. In this case, AP is not subject to backoff-suspend—its ACs keep counting down during QTP and, at SP start, the AP transmits a trigger on the minimum-counter AC, yielding near-instant access. Even with r-TWT boundary protection, legacy contenders below 11be (or OBSS neighbors that do not honor r-TWT) can still initiate a TXOP near the SP boundary. Since QTP is defined in 802.11ax and widely implemented, scheduling a short QTP window that begins before the SP also suppresses these legacy attempts, reducing the chance of boundary infringement. This benefit is deployment-dependent; when all contenders are 11be-aware, the incremental gain is small, but in mixed environments it provides additional robustness. In this work we size the effective guard band by the longest NST transmission time on the link, including headers, inter-frame spaces, and ACK. The idea is simple: the guard band must be long enough that even the longest permitted NST TXOP cannot spill into the r-TWT service period. We then align the QTP to begin one such NST transmission time before each service period and to remain active throughout the service period. For clarity in the rest of the paper, we assume all NST ACs share the same airtime; if they differ in practice, the guard band and the QTP lead time should be dimensioned against the largest NST airtime, with a small implementation margin if desired.

2.3.3. Randomized Enqueue for Smoothing CP Load Spikes

Even with desynchronization, NST frames that arrive during the r-TWT SP are buffered and would otherwise be burst-released at CP start, creating a sharp spike in access intensity. We therefore apply a Randomized Enqueue (RE) policy: buffered NST frames are re-enqueued over the subsequent CP at random offsets, spreading their channel access attempts over time (Figure 5). This converts a burst into a smoother process, reducing transient collisions and queue build-up at CP onset. For analytical tractability (Section 3.3.3), RE is reflected by an effective arrival rate in CP, which preserves the total arrivals per service interval while attenuating the instantaneous burst at CP start.
With these three pillars—r-TWT as GB, QTP for desync, and RE for CP smoothing—the scheme delivers deterministic ST service over standard WLAN while bounding the transient and steady-state impact on NST traffic.

3. Numerical Analysis

In this section, we mathematically analyze the performance of the proposed scheme. The analytical model follows the scheme’s periodic operation (Figure 6): Each service cycle comprises a contention period (CP) for NST and a Restricted TWT service period (SP) for ST. We normalize time by the application service interval; hence, one service cycle has duration T s t , i.e., T cycle T s t . Henceforth we drop T cycle and use T s t only. The functional guard band is provided by r-TWT boundary protection, and a QTP is aligned to start one maximum NST airtime before each SP and remains active throughout the SP. Our analysis derives the expected ST and NST throughputs by modeling the dynamics within these periods.

3.1. Analytical Model Overview

The application fixes the service interval, and each r-TWT service period (SP) is anchored at t 0 + n T s t . We therefore use the service interval itself as the normalization time. Let B s t and B n s t denote the expected payload bits successfully delivered per service interval by ST and NST traffic, respectively. The long-term system throughput is
H = B s t + B n s t T s t .
To obtain B s t and B n s t , we (i) use an outage model for the contention-free ST traffic under r-TWT with early termination, and (ii) adapt a well-established EDCA Markov chain model for NST traffic to the r-TWT/QTP context [22].

3.2. Scheduled Traffic (ST) Throughput Analysis

ST data is transmitted during the r-TWT SP without contention, so only channel errors affect success. Because the AP lets every AC keep counting down during the guard band, at least one AC reaches a near-zero counter when the SP starts. The AP immediately sends the trigger frame using that lowest-counter AC, and—since the scheduled ST-STA is the only awake device—faces no external contention. This makes the channel access delay just a few micro-seconds (≪TXOP duration), and we safely ignore it in the ST-throughput model.
Let p e be the packet error rate (PER) per attempt. We distinguish the durations of a successful vs. failed ST attempt inside the SP: T succ , s t and T fail , s t . If the first success occurs at the k-th attempt, the time consumed is S k = ( k 1 ) T fail , s t + T succ , s t . Define
K max max { k 1 : S k T r } , with K max = 0 if T r < T succ , s t .
An outage occurs if no success finishes within the SP, hence
p o = p e K max .
Let L s t be the ST payload per interval; then the expected ST payload and throughput are
B s t = ( 1 p o ) L s t , H s t = B s t T s t = ( 1 p e K max ) L s t T s t .
If an SP carries N f > 1 ST frames (or multiple stringent ST flows), (3) and (4) can be extended by modeling the number of successful frames as a binomial random variable, or by summing independent single-frame terms when independence holds. In this work we focus on the single stringent ST case for clarity.

3.3. Non-Scheduled Traffic (NST) Throughput Analysis

NST traffic receives service only during the contention period (CP); hence, its capacity hinges on (i) the effective CP duration per service interval, T ^ c p , and (ii) the contention dynamics inside that CP segment.

3.3.1. Modeling the Effective Contention Period Duration ( E [ T ^ c p ] )

The effective CP duration, T ^ c p , is a random variable that depends on the actual termination time of the preceding r-TWT service period (SP) and on the residual virtual-slot time at the CP boundary. The CP is treated as a renewal process of i.i.d. virtual slots (idle, success, collision), so the boundary overrun T c p + is the residual life of a renewal interval (see (10)). Some implementations may instead release the SP early upon the first ACK (early termination); in that case, an underrun term T r appears. Consequently, the average effective CP duration is
E [ T ^ c p ] = T c p + E [ T c p + ] E [ T r + ] + E [ T r ] ,
where T c p and T s t are the negotiated CP length and the negotiated SP length.
(i)
r-TWT SP Overrun and Underrun ( E [ T r + ] and E [ T r ] )
The r-TWT SP gates the start of transmissions: non-participating STAs must finish before the SP, whereas the participating STA, once it starts within the SP, may finish after the SP boundary. Hence underrun exists only if an explicit early termination policy is enabled; otherwise, we set E [ T r ] = 0 .
Let p e be the PER per attempt. We distinguish the durations of a successful vs. a failed ST attempt within the SP: T succ , s t and T fail , s t . If the first success occurs at the k-th attempt, the time consumed is
S k = ( k 1 ) T fail , s t + T succ , s t , k = 1 , 2 ,
Define the largest index whose success would finish within the SP as
K max max { k 1 : S k T r } , with K max = 0 if T r < T succ , s t .
(Equivalently, overrun begins at the ( K max + 1 ) -st attempt.)
r-TWT SP overrun occurs when no success finishes within the SP (i.e., k > K max ); attempts then continue across the boundary until one succeeds. The expected overrun is
E [ T r + ] = p e K max [ K max T fail , s t + T succ , s t T r residual   of   the   boundary-spanning   attempt + p e 1 p e T fail , s t extra   failures   entirely   after   the   SP ] .
If T r < T succ , s t then K max = 0 and E [ T r + ] = ( T succ , s t T r ) + p e 1 p e T fail , s t .
Underrun is only present if early termination is enabled; otherwise E [ T r ] = 0 . If early termination is enabled and success occurs at k K max , the returned time is T r S k . Taking expectation,
E [ T r ] = k = 1 K max T r S k ( 1 p e ) p e k 1 .
(ii)
Contention Period Overrun ( E [ T c p + ] )
The CP is a renewal process formed by i.i.d. virtual slots (idle, success, fail). Since the CP timer can expire at an arbitrary instant inside a slot, the overrun from the CP boundary is the residual life of a renewal interval. This directly yields the inspection paradox result E [ T c p + ] = E [ T vslot 2 ] / ( 2 E [ T vslot ] ) , avoiding per-boundary case analysis. We use this as a first-order approximation; the brief non-stationarity right after QTP release is negligible for sufficiently long CPs. Let T σ and T vslot denote the duration of a slot time (Table 1) and a virtual slot (idle, successful TXOP, or collision), respectively. By renewal theory (inspection paradox), the mean boundary overrun equals the mean residual life:
E [ T c p + ] = E T vslot 2 2 E T vslot ,
with moments
E [ T vslot ] = ( 1 p b ) T σ + p s T succ , nst + p f T fail , nst , E [ T vslot 2 ] = ( 1 p b ) T σ 2 + p s T succ , nst 2 + p f T fail , nst 2 .
Here p b , p s , p f are steady-state EDCA slot probabilities (busy, success, fail), and T succ , nst / T fail , nst denote the durations of successful/failed NST virtual slots assumed AC-invariant in this work.

3.3.2. Markov Chain Analysis for NST Throughput

The throughput of a single NST station, h n s t , is derived using a per-AC 2D Markov chain model for the EDCA backoff procedure, based on the analytical framework presented in [22]. The model, illustrated in Figure 7, captures the state transitions of a station’s backoff counter. In this section, the AC index j ranges over the NST access categories (AC) active in the CP. We use p f for the slot-level fail probability in the vslot moments, whereas p f j denotes the attempt-level failure probability for AC j in the Markov fixed point (“collision or channel error”), cf. (12). These are distinct quantities.
The core of the analysis is to solve a non-linear system of equations relating a station’s transmission probability, τ j , to the transmission failure probability, p f j , that it experiences. This system is solved using a fixed-point iteration method.
We model per-AC failure as the complement of “collision-free and error-free” success:
p f j = 1 1 p coll j 1 p e ,
where p coll j is the probability that an AC-j attempt collides. Equation (12) feeds the fixed-point relation for τ j in (13).
The stationary distribution of the Markov chain provides a relationship between these key probabilities. For brevity, we present the final key equation here and refer the reader to [22] for the detailed step-by-step derivation. Given the failure probability p f j , the transmission probability τ j is
τ j = 2 ( 1 2 p f j ) ( 1 2 p f j ) ( W + 1 ) + p f j W ( 1 ( 2 p f j ) m )
where W is the minimum contention window ( C W m i n ) and m is the maximum backoff stage.
Once the system of equations is solved, the resulting probabilities are used to calculate the average throughput for a single AC:
h nst j = p s j L nst E [ T vslot ] ,
where L n s t is the NST payload size and p s j is the success probability for that specific AC.
A key contribution of our work is modeling the impact of QTP on traffic arrival. Traffic that accumulates during the QTP is conserved and spread over the subsequent CP; we therefore normalize by the effective CP length E [ T ^ c p ] to obtain λ ^ . This abstraction is independent of whether Randomized Enqueue is enabled. We model the accumulation of NST packets during the quiet period by defining an effective packet arrival rate, λ j ^ :
λ ^ j = λ j 1 + T QTP E [ T ^ c p ]
where λ j is the original arrival rate. This effective rate is then used to calculate the non-empty queue probability p q j within the Markov model.
p q j = 1 e λ j ^ E [ T v s l o t ]
This links our system’s unique dynamics to the established EDCA analysis, allowing for a comprehensive performance evaluation.

3.3.3. NST Throughput Aggregation

Let N j be the number of NST STAs mapped to AC j { 0 , 1 , 2 , 3 } and h n s t j the per-AC NST rate (bit/s) obtained from the EDCA Markov chain. Given the effective CP share E [ T ^ c p ] , the expected NST payload bits per service interval are
B n s t = E [ T ^ c p ] j = 0 3 N j h n s t j .
Normalizing by the (fixed) service interval T s t yields
H n s t = B n s t T s t = E [ T ^ c p ] T s t j = 0 3 N j h n s t j .

3.3.4. Calculation of Key System Probabilities

The slot-level failure probability, p f , is derived from two fundamental system probabilities that must be calculated first: the channel busy probability, p b , and the aggregate success probability, p s . The methodology for calculating these is based on the main reference [22], but is adapted to account for the error-prone wireless channel in our model.
The channel busy probability, p b , represents the probability that at least one station is transmitting in an arbitrary time slot. The formula for p b is adopted directly from the reference model. It is derived from the 1D Markov chain for the contention period and depends on the transmission probability τ j of each station:
p b = n p z n 1 j J ( n ) ( 1 τ j ) N n j ,
where p z n is the stationary probability of being in contention zone n, and N n j is the number of stations of class j in that zone.
The aggregate success probability, p s , is the probability that exactly one station transmits successfully in an arbitrary time slot. While the fundamental structure for its calculation is based on the reference model, a crucial modification is required for our wireless environment.
The reference model assumes a perfect channel where a transmission failure is solely due to a collision. Our model, however, considers an error-prone channel. Therefore, a transmission is only truly successful if (1) exactly one station transmits (no collision), and (2) no packet error occurs. This is modeled by multiplying the reference model’s success probability by the probability of no channel error, ( 1 p e ) .
p s = ( 1 p e ) n p z n j J ( n ) N n j τ j ( 1 τ j ) N n j 1 h J ( n ) h j ( 1 τ h ) N n h ,
The term inside the parentheses is derived from the reference model (e.g., Equation (36) in [22]), and the channel error probability p e is integrated for the analysis of this paper.
Finally, the slot-level failure probability equals the busy probability minus the success probability:
p f = p b p s .
Figure 8 cross-validates our analytical model for the effective contention period E [ T ^ cp ] . Both the analysis and the simulations use the physical/medium access control layer (PHY/MAC) and timing parameters in Table 1. Across N = 2 20 , the curves match closely and show a gentle increase of E [ T ^ cp ] with N. The 4   kB case lies slightly above the 2   kB case, as longer transmissions increase the renewal residual and thus the effective contention period near the r-TWT SP boundary. These behaviors support our renewal (inspection paradox) treatment of boundary overrun and the EDCA Markov chain coupling adopted in this section.

3.4. Dimensioning the r-TWT Service Period Under Collisions and Packet Errors

To make the design reproducible and to avoid both under-provisioning (ST outage) and over-provisioning (bandwidth waste), practitioners need an explicit sizing rule for the service-period length T r that accounts for residual collisions and physical layer errors. This subsection closes that gap by deriving a constructive rule from the analytical elements established in the previous subsections.
Inside the ST service period, contention is removed by trigger-enabled access; nonetheless, residual failures can occur due to packet errors p e .
The probability that the ST burst is delivered within m attempts is
P succ ( m ) = 1 ( p e ) m , m K max + 1 .
Given a target outage p ^ o per cycle, the minimum attempt budget is
m = ln ( p ^ o ) ln ( p e ) ,
capped by K max + 1 . If m > K max + 1 , either the outage target or the PER must be relaxed, or the PHY rate/aggregation reduced.
Let H collect uplink triggering channel access overhead of the AP within an SP.
Choose the smallest integer m satisfying (23) and set
T r H + m T succ , s t + Δ ,
where Δ 0 is an optional safety margin (default Δ = 0 ) for implementation jitter or timestamping granularity. This allocates just enough SP time to meet the outage target under the measured/assumed p e ) and the configured K max .
For a cycle of length T st with guard band T gb and service period T r , the CP available to NST is
T cp = T st T gb T r .
Thus the ST–NST balance is tuned by jointly selecting { T gb , T r } . In managed deployments, bounding NST airtime near the boundary (e.g., TXOP/PPDU limits) allows T gb to be sized to a high percentile of the bounded NST airtime distribution, minimizing the CP tax while preserving ST timeliness.
(i) When p e rises, either modestly increase T r via (24) or reduce ST aggregation (which lowers T succ , s t ) to keep P succ ( m ) unchanged. (ii) The AP can adapt T r over beacon intervals (or via action frames) using recent estimates of p e , observed retries, and burst size L, thereby tracking the outage target without over-allocating the SP. (iv) Ensure T r T st T gb and that m K max + 1 ; otherwise, adjust the target or the PHY/aggregation.

4. Performance Evaluation

In this section, we discuss the performance evaluation of the proposed scheme. An event-driven MAC-level simulator, as described in [23,24], is used for the evaluation. The simulator was developed in MATLAB R2025a and implements IEEE 802.11 EDCA functions and relevant IEEE 802.11ax/be medium access control (MAC) layer features, such as TWT, QTP, and Triggered Uplink Access (TUA). The system parameters used for the simulation are listed in Table 1.
We evaluate the proposed scheme against EDCA under three configurations: Mode A = r-TWT only, Mode B = r-TWT + QTP, and Mode C = Mode B + Randomized Enqueue (RE). Unless otherwise noted, the stringent ST flow is trigger-enabled and served within an r-TWT SP in A/B/C, so ST determinism (throughput, outage, delay) is governed by PER and SP sizing and is essentially identical across these modes. We therefore place emphasis on the NST side: absolute NST throughput and EDCA-relative loss across the number of contenders ( N = { 2 , , 20 } ) and payload sizes ( L s t , L n s t { 2 , 4 } kB). All simulation parameters and timing assumptions are summarized in Table 1.
We first evaluate the proposed scheme on Scheduled Traffic (ST) and compare it against conventional EDCA. Figure 9a and Figure 9b report ST throughput and outage probability, respectively. Because Modes A/B/C all serve ST within an r-TWT SP (trigger-enabled), their ST performance is expected to be identical to statistical noise, while QTP/RE only affect the NST side.
In Figure 9a, the theoretical ceiling L s t / T s t is shown for reference. With T s t = 10 TU (10.24 ms), the ceilings are 1.562 Mbps for L s t = 2 kB and 3.125 Mbps for L s t = 4 kB. Across all tested N, Modes A/B/C remain at this ceiling, confirming that r-TWT boundary protection guarantees on-time channel access for ST. By contrast, EDCA degrades sharply with contention. For L s t = 4 kB, EDCA yields 1.557, 1.061, 0.722, 0.294, and 0.126 Mbps at N = { 8 , 10 , 12 , 16 , 20 } , i.e., 49.8%, 34.0%, 23.1%, 9.4%, and 4.0% of the ceiling, respectively (falls below 25% by N = 12 ). For L s t = 2 kB, EDCA attains 1.176, 0.786, 0.599, 0.329, and 0.193 Mbps at the same N values, i.e., 75.3%, 50.4%, 38.3%, 21.1%, and 12.4% of the ceiling (25%-collapse by N = 16 ). Representative points illustrate the gap: at N = 10 and L s t = 4 kB, Mode B achieves the ceiling 3.125 Mbps while EDCA achieves 1.061 Mbps (difference 2.064 Mbps); at N = 16 and L s t = 2 kB, Mode B remains at 1.562 Mbps while EDCA drops to 0.329 Mbps.
Figure 9b complements these results. Under EDCA, the outage probability (no success within the SP) rises with N and tends to 1 at high contention. In Modes A/B/C, we observed zero outages throughout the run. When no outages occur, we report the one-sided 95% upper bound by the rule of three:
p ^ o 3 T sim / T s t ,
which evaluates to p ^ o 7.68 × 10 4 for T sim = 40 s (3906 cycles). Taken together, these results show that the proposed scheduling guarantees deterministic ST throughput and reliability across contention levels; differences among A/B/C appear only on the NST side and are analyzed in the next subsection.
Figure 10 reports the average transmission delay of ST traffic. Since Modes A/B/C all serve ST within an r-TWT service period with a trigger at the boundary, their ST delays are essentially identical and insensitive to the number of stations; QTP and Randomized Enqueue only influence NST behavior and do not alter the AP’s trigger-driven sequence inside the SP.
For L s t = 2 kB, Modes A/B/C remain nearly flat at about 216 μs across the entire sweep ( N = 2 20 ). EDCA starts lower when the network is very lightly loaded and then increases with contention: from 199.18 to 259.79 μs. Thus EDCA is slightly smaller only at N = 2 (about 17 μs below the proposed modes due to the absence of trigger overhead); from N 4 the EDCA delay exceeds the proposed modes and the gap widens under contention. Over the practically relevant range N 8 , the average reduction achieved by Mode B relative to EDCA is about 39.4 μs.
For L s t = 4 kB, Modes A/B/C form a similarly flat plateau around 264 μs. EDCA increases from 251.38 to 303.52 μs as N grows. Again, EDCA is slightly smaller only at N = 2 (about 12–13 μs), but from N 4 , the proposed modes are equal or better; for N 8 , the average reduction of Mode B versus EDCA is about 50.7 μs, with representative gaps of 58.7 μs at N = 8 and 60.8 μs at N = 10 .
Two remarks are important when interpreting EDCA. First, EDCA delays are computed over successfully delivered packets only; as contention rises, cycles that suffer an ST outage are excluded from the averaging, so the plotted EDCA curve does not reflect worst-case latency. Second, the flat delay plateaus of Modes A/B/C indicate that the guard band has been dimensioned at least as long as the maximum NST transmission on the link; had the guard been shorter than the longest NST airtime, an NST starting just before the guard could infringe the SP boundary and cause a visible bump near peak utilization. Under the present configuration, no such bump appears for L s t { 2 , 4 } kB, and the proposed modes provide bounded and load-insensitive ST latency.
To complement Figure 10, Table 2 reports the variance of the ST transmission delay, defined as the sum of access delay and successful transmission time. To expose the impact of PHY errors, we include two error regimes: PER = 10 4 and 10 2 . The EDCA baselines exhibit intrinsically high variance, and the variance grows with the number of contenders N as contention intensifies. In contrast, Modes A/B/C monopolize the channel during the SP and are therefore essentially insensitive to N; at PER = 10 4 they show very small variances with occasional small bumps from rare retransmissions. At PER = 10 2 the retry frequency increases and variances rise across all modes, although the scheduled modes remain orders of magnitude lower than EDCA. These results reinforce that the SP should be dimensioned with respect to the observed PER and payload size; as discussed in Section 3.4, using a conservative SP (or reducing ST aggregation) preserves the outage target without excessive bandwidth waste.
Figure 11 shows three operating regimes for NST throughput. (i) Low intensity (STA N = 2 –6): The medium is frequently idle and EDCA and Modes A/B/C deliver nearly the same NST capacity; the average gap is within about ± 1 % across payloads. (ii) System-peak throughput range (STA N = 8 –12): Where total system throughput is maximized, Mode C (r-TWT + QTP + RE) consistently minimizes NST loss by smoothing the CP onset after each SP. Averaged over N = { 8 , 10 , 12 } , the NST reduction relative to EDCA is about 1.6 % at L s t = 2 kB and 3.8 % at L s t = 4 kB, smaller than Mode A ( 2.9 % , 5.6 % ) and Mode B ( 2.1 % , 4.0 % ). The detailed values in Table 3 confirm this. For L s t = 2 kB, at N = 8 , the three modes are essentially indistinguishable from EDCA (EDCA 49.66 Mbps, Mode A 50.06 Mbps, Mode B 49.99 Mbps, Mode C 50.23 Mbps), while at N = 10 , 12 , Mode C shows the smallest losses ( 2.6 % and 3.4 % ). For L s t = 4 kB, Mode C again yields the smallest losses at N = 8 , 10 , 12 ( 2.8 % , 4.2 % , 4.5 % , respectively), improving on Mode A ( 4.5 % , 6.4 % , 5.8 % ) and Mode B ( 2.9 % , 4.4 % , 4.8 % ). (iii) High intensity (STA N = 14 –20): NST throughput drops for all schemes as collisions and reservation overhead rise; here, Mode A (r-TWT only) often shows the smallest EDCA-relative loss because it does not pay the quiet-time overhead. Consistent with this, the winner table (Table 4) selects Mode C in the system-peak range for both payloads, while favoring Mode A in the highest-load band.
Additional observations from the absolute NST throughput plot in Figure 11 are as follows. Up to about 10 STAs, all three modes track EDCA closely, indicating that the capacity cost of determinism is small at low–mid density. Representative points: At N = 10 and L s t = 4 kB, EDCA is 98.00 Mbps while Modes A, B, and C attain 91.78, 93.67, 93.90 and Mbps; at N = 8 and L s t = 2 kB, EDCA is 49.66 Mbps and the modes are 50.06, 49.99, and 50.23 Mbps, essentially indistinguishable. Beyond 12 STAs, all curves decline as contention rises; the tables make clear where Mode C brings the most benefit (system-peak range, via desynchronization and burst smoothing) and where Mode A becomes preferable (extreme load, where avoiding quiet-time overhead helps preserve NST airtime).
Table 3a,b summarize the system-peak range at L s t { 2 , 4 } kB. For L s t = 2 kB, the EDCA baseline is 49.66/59.33/59.75 Mbps at N = 8 / 10 / 12 , and Mode C yields 50.23/57.77/57.74 Mbps with relative deltas of about + 1.1 % , 2.6 % , and 3.4 % ; these are the smallest reductions among A/B/C at N = 10 , 12 . For L s t = 4 kB, EDCA is 98.08/98.00/93.81 Mbps, and Mode C gives 95.37/93.90/89.60 Mbps, corresponding to 2.8 % , 4.2 % , and 4.5 % , again the smallest loss in each column. The winner table (Table 4) aggregates by STA band and payload: at low intensity, all modes are effectively tied; in the system-peak range, Mode C minimizes loss at both payloads; at high intensity, Mode A becomes the least costly due to the absence of quiet-time overhead. This pattern matches the design intent: QTP desynchronizes contenders and RE removes burstiness where it matters most, while avoiding QTP when the contention-driven overhead would dominate.
The previous results established that r-TWT guarantees on-time ST transmission and that Mode C preserves NST capacity best in the system-peak range ( N = 8 –12). To explain why these macroscopic trends emerge, Figure 12 examines the post-SP micro-dynamics. It partitions the CP timeline (origin at the ST acknowledgment (ACK)) into 80-μs bins and reports, for each bin, the average number of NST collisions per cycle. Let C b denote collisions/cycle in bin b. Define the CP-start bin index as
b s min { b C b > 0 } ,
i.e., the first active (non-zero) bin where the CP actually begins (typically b s = 0 , but it can be > 0 under SP overrun). We write C b for the collisions/cycle in bin b, define the boundary-bin value C start C b s , and measure the early-window collision burden from the true CP start as
A b s : K col b = b s b s + K C b ,
which aggregates the collisions/cycle over the first ( K + 1 ) bins anchored at b s (e.g., K = 5 , 20 correspond to 0.48 ms and 1.68 ms). Quantitative values for these metrics at N = 8 and L s t { 2 , 4 } kB are summarized in Table 5, which complements the histogram in Figure 12. Large C start and large A b s : K col reveal the transient collision pressure right after the SP, which directly reduces NST throughput at CP onset. We use N = 8 (system throughput peak) where mode differences are most visible.
EDCA does not separate SP and CP, so NST contention runs continuously around the scheduled ST instant. Consequently the collision profile shows a moderately elevated but temporally spread density near the anchor, rather than a sharp boundary spike. This continuous contention explains the rapid growth of EDCA’s ST delay with the number of contenders and serves as a baseline for quantifying collision suppression in the proposed modes.
In Mode A, non-participating STAs keep counting down during the SP; many reach small residual counters and then attempt almost simultaneously when the CP actually starts. Accordingly, the first active bin already carries nearly one collision per cycle: C start = 1.06 at L s t = 2 kB and C start = 0.97 at L s t = 4 kB. Early-window burdens anchored at b s are large—approximately A b s : 5 col 2.40 and 2.10 , and A b s : 20 col 4.00 and 3.70 for 2 kB and 4 kB, respectively. This near-certain boundary collision explains the NST capacity dip of Mode A in the peak range.
Mode B (r–TWT + QTP) desynchronizes residual backoff counters during the SP, but NST frames that arrive during the SP are released at once when QTP ends, yielding a strong yet time-spread burst of contention at CP start. QTP halts backoff drain for non-participating stations during the SP, so residual counters do not collapse to near-zero; meanwhile, NST arrivals accumulate in queues. When QTP ends, these non-idle stations resume together, producing a strong but time-spread burst across the first few CP bins rather than a single boundary spike. This de-synchronizes counters yet still releases buffered demand at CP start, which is why Mode B improves stability over Mode A but does not suppress the early-window burden as effectively as Mode C Approximate reads (collisions/cycle), anchored at b s : at L s t = 2 kB, C start 0.80 , A b s : 5 col 2.20 , A b s : 20 col 3.90 ; at L s t = 4 kB, C start 0.90 , A b s : 5 col 2.40 , A b s : 20 col 4.10 .
Mode C (r–TWT + QTP + Randomized Enqueue) disperses that boundary burst for short ST airtime by spreading buffered arrivals over the CP, but the benefit weakens under SP overrun because arrivals during the overrun are not shaped and re-create an early spike. Randomized Enqueue (RE) spreads buffered NST arrivals over the CP to soften Mode B’s boundary micro-burst. With L s t = 2 kB (short ST airtime, negligible overrun), the boundary pressure drops: C start 0.55 , A b s : 5 col 1.80 , A b s : 20 col 3.60 . With L s t = 4 kB, longer ST airtime raises the incidence of r-TWT SP overrun. Because QTP ends at the scheduled SP boundary, NST arrivals during the overrun interval are not shaped by RE and remain as regular EDCA arrivals; when the ST ACK finally releases the medium, they contend promptly, partially restoring the boundary spike: C start 0.78 , A b s : 5 col 2.20 , A b s : 20 col 4.00 . This explains why Mode C’s NST advantage shrinks at larger payloads: overrun short-circuits RE right at the boundary.

5. Discussion

5.1. Overview and Alignment with Objectives

The evaluation results indicate that our objectives have been met. Despite operating over a contention-based IEEE 802.11 WLAN, the composition of Restricted Target Wake Time (r-TWT) and Quiet Time Period (QTP) establishes a functional guard band that reliably protects the Scheduled Traffic (ST) service period (SP) while avoiding synchronized collision after SP ends. Furthermore, by leveraging trigger-enabled TWT, the access point (AP) can explicitly solicit the designated ST frames from stations (STAs) within the SP, thereby realizing the semantics of Time-Aware Shaper (TAS) gate control on top of WLAN. Importantly, only the contention period (CP) boundary dynamics are reshaped; the steady-state CP remains opportunistic for Non-Scheduled Traffic (NST), preserving overall WLAN efficiency. An optional Randomized Enqueue (RE) policy can further smooth early-CP micro-bursts without altering the PHY.

5.2. Interfacing with the TSN Control Plane

For the proposed scheme to operate within a real-world TSN environment, a standardized interfacing framework between the TSN control plane and the WLAN (AP/STA) is required. As no such standard currently exists for IEEE 802.11, this paper proposes a reference model based on standard architectures, as shown in Figure 13.
This model logically connects the centralized configuration model of TSN with the management entities of IEEE 802.11. The primary components and their operational flow are as follows:
  • CUC Client @ STA: An application generating ST traffic interfaces with a CUC (Centralized User Configuration) Client located at the Logical Link Control (LLC) layer of the station (STA). When a new ST stream is created, the CUC Client gathers its requirements—such as period, latency, and data size—and sends a Stream Registration Request to the central CUC server.
  • CNC Client @ AP: Once the CUC registers the stream, it instructs the CNC (Centralized Network Configuration), which manages the overall network schedule, to configure the necessary paths and schedules. To schedule the WLAN segment, the CNC communicates with a CNC Client residing within the Station Management Entity (SME) of the access point (AP).
  • Parameter Translation: The core function of the CNC Client is to translate the TAS parameters received from the CNC into equivalent TWT parameters suitable for the wireless environment. This translation process acts as the essential bridge between the two heterogeneous network technologies. In IEEE 802.1Qbv, each gate control entry (GCE) specifies a time interval and gate state; the mapping rules are summarized in Table 6.
  • Schedule Configuration: The TWT parameters, now translated by the CNC Client, are passed to the AP’s MLME (MAC Sublayer Management Entity). The MLME then uses these parameters to configure the final r-TWT schedule and disseminates it through Beacon frames or other management frames.
Through this model, the proposed scheme provides a concrete and standards-compliant method for interfacing with a standard TSN control plane, enabling the extension of end-to-end deterministic communication into the wireless domain.

5.3. Implementation Considerations

Building on this control-plane mapping, we outline a pragmatic realization path that preserves standard compliance and avoids chipset modifications. In practice, the AP and STAs share a common time base via IEEE 802.11 TSF bridged to a generalized precision time protocol (gPTP, IEEE 802.1AS), and this alignment lets the AP span QTP over the entire guard band T gb immediately before each SP and then issue trigger-enabled access at the SP start, thereby enforcing TAS-like gating semantics on WLAN.
On the implementation side, most Wi-Fi 6/6E/7 MAC functions reside in chipset firmware or ASIC, which makes deep MAC changes difficult for third parties. We therefore adopt a split design that requires no PHY changes:
  • AP side: The SME–MLME pipeline exposes r-TWT/QTP schedule attributes (for example, via MLME-SAP), allowing firmware to advertise SP/GB timing in Beacons/Action frames and to issue trigger frames during the SP for the intended AC/TID.
  • STA side (RE): While RE for NST is not yet standardized, SP/GB timing is visible to the host via SAP attributes, so a proprietary driver-level policy can pace NST dequeues around the CP restart. When the MLME indicates an imminent SP end (or CP start), the driver perturbs dequeue times (through LLC–MAC SAP interaction) to spread early-CP transmissions over a short window, implementing RE without modifying chipset firmware.
Putting the pieces together, the control flow is (i) CNC/CUC → AP/SME: deliver the TAS Gate Control List (GCL); (ii) the SME maps the GCL to {r-TWT T sp , QTP T gb , trigger pattern}; (iii) the AP/MLME advertises the schedule (Beacon/Action), enrolls ST STAs (TWT setup), and executes trigger-enabled ST during the SP; and (iv) the STA/MLME consumes the schedule attributes and, if acting as NST, applies RE pacing at CP restart via LLC–MAC SAP.
Finally, from a standardization perspective, IEEE 802.11 Working Group activities on TSN interworking and next-generation WLAN are actively discussing tighter time-aware operations; while RE can be prototyped as above, the most robust path is to standardize this functional suite—r-TWT scheduling profiles, QTP alignment semantics over the guard band, and an optional RE/pacing primitive (or MLME hint)—so that APs and STAs interoperate without proprietary hooks.

5.4. Limitations and Threats to Validity

First, there is an inherent trade-off between the timeliness of ST deliveries and the throughput tax introduced by the functional guard band (GB). Let T cycle denote the ST cycle period. The capacity loss scales with the GB fraction,
Δ ρ ρ CP · T gb T cycle ,
where ρ CP is the attainable utilization during CP-absent GB. As the variance of NST PPDU airtimes increases, a GB sized to cover the upper tail of NST transmissions must grow, further reducing efficiency; this sensitivity is most visible when large, highly aggregated NST frames are permitted near the SP boundary. In managed industrial or enterprise environments, however, GB efficiency can be restored through administrative controls that bound NST airtime: (i) enforce a per-BSS TXOP limit size, (ii) constrain application chunk sizes and pacing for traffic traversing the ST BSS, and (iii) prefer MCS/RU policies that limit worst-case airtime near the SP boundary. With these controls in place, T gb can be dimensioned conservatively (for example, to a high percentile of the bounded NST airtime distribution) without incurring an undue throughput penalty, preserving the ST timeliness–throughput balance.
A second limitation concerns dense overlapping BSS (OBSS) environments: external STAs may not honor the ST BSS’s QTP or r-TWT membership, so SP protection can be partially undermined by co-channel contenders. A systematic, quantitative treatment of OBSS impact—spanning density, channel reuse, BSS coloring/spatial reuse, and compliance rates—is left to future work. In managed industrial/enterprise deployments, much of the risk can be mitigated by (i) channel planning and spatial placement to avoid overlapping operating channels across co-located BSSs, (ii) stricter device policy within the ST BSS (for example, requiring QTP honor and r-TWT membership), and (iii) conservative perimeter settings (power, CCA) near SP boundaries. In addition, coordinated r-TWT across BSSs—currently under discussion for IEEE 802.11bn—aims to provide cross-BSS SP protection and can further reduce boundary collisions when available.
Beyond cross-BSS effects, residual variability can arise under elevated PER, time synchronization errors that misalign QTP and SP boundaries, or in-BSS legacy stations that ignore QTP. Our evaluation is simulation-based; heterogeneous over-the-air testbeds are left for future validation. Extremely large payloads may force conservative choices for T gb and T sp unless administratively bounded as discussed above.

5.5. Cross-Technology Comparison and Implications for Our Design

Consistent with our control-plane mapping in Section 5.2, we position the proposed WLAN path against contemporary 5G/URLLC deployments using quantitative evidence from industrial studies. Under the 3GPP indoor factory framework, a head-to-head evaluation finds that Wi-Fi 6 satisfies sub-1 ms application targets only at very low offered load and in interference-free spectra, whereas licensed 5G NR generally delivers the strongest sub-1 ms performance together with roughly 2–4× higher spectral efficiency; as latency requirements relax to 10–100 ms, the performance gap narrows and Wi-Fi becomes practical for local domains [25]. Complementing this, an indoor factory testbed reports that Wi-Fi 6 achieves the lowest median latency but exhibits heavy-tailed delay and higher loss—especially under mobility where the 99.99th-percentile latency can exceed ∼120 ms—while 5G SA yields stable, bounded tails. Furthermore, 5G+Wi-Fi multi-connectivity collapses the tails toward the 5G distribution, and the testbed itself relies on a private 5G deployment with an in-house 5G SA core, underscoring the core-integrated, centrally scheduled nature of that path [26].
In contrast, our path is purpose-built for owner-operated, local TSN islands—room- or cell-scale industrial or enterprise domains where the set of STAs is known and managed, the layout is fixed, and time sync (TSF bridged to IEEE 802.1AS) is available at the AP. Typical targets include factory cells and lines, labs and test benches, clean rooms, and campus rooms where TSN micro-windows (on the order of a few to a few tens of milliseconds) are needed but deploying licensed spectrum, a cellular RAN, or a 5G core is neither necessary nor cost-effective. In these environments, administrators can apply standard WLAN hygiene—channel planning and spatial separation to avoid OBSS overlap, policy control to bound PPDU size or TXOP near SP boundaries, and monitoring of PER to adapt T sp —so that deterministic windows are delivered at low CAPEX/OPEX on commodity Wi-Fi 6/7 gear. The approach leverages high per-link bandwidth (wide channels and, where available, 11be features such as multi-link operation) for bursty ST payloads, requires no PHY changes, and integrates with the TSN control plane at the AP management layer (CUC/CNC → TAS GCL → TWT/QTP/trigger mapping). ST STAs participate as TWT members with trigger-enabled uplink; NST STAs can remain unchanged, with an optional driver-level RE policy for variance reduction. The intended scope is indoor, low-mobility cells with strong administrative control; wide-area mobility and carrier-grade SLAs are better served by centrally scheduled licensed systems, making the two ecosystems complementary rather than competing.
An industrial review similarly frames 5G as a core-integrated platform for wide-area, SLA-driven scenarios and Wi-Fi 7 as a cost-effective enabler for local deterministic windows via TWT or r-TWT and EHT features (e.g., wide channels and multi-link operation), which aligns with our target environment and the functional guard band approach used here [4].

6. Conclusions

This paper presented a novel transmission scheme that orchestrates r-TWT, QTP, and Randomized Enqueue policy to deliver deterministic Scheduled Traffic (ST) over WLAN while limiting the impact on Non-Scheduled Traffic (NST). The roles are separated by design: r-TWT prevents CP overrun (functional guard band), QTP removes synchronized backoff collapse during the SP, and RE spreads buffered NST arrivals across the CP to soften the boundary micro-burst. A control-plane mapping from TAS to TWT/QTP was also outlined.
Our analysis used renewal theory for CP overrun and yielded closed forms for SP underrun/overrun under a geometric error model, with or without early termination. On the NST side, a standard EDCA Markov chain was aligned to the r-TWT/QTP timeline and augmented with RE via an effective arrival-shaping abstraction.
Evaluation confirms the intended behavior: Modes A/B/C keep ST throughput at the ceiling L s t / T s t with zero observed outage and bounded delay. For NST, the results are regime-dependent in a way that guides deployment choices. In the practically relevant operating region, where the system throughput peak around 8–12 STAs, Mode C (r-TWT + QTP + RE) consistently minimizes EDCA-relative loss (about −1.6% at 2 kB and −3.8% at 4 kB on average), thus preserving NST capacity while guaranteeing deterministic ST. Under extreme loads (14–20 STAs), Mode A (r-TWT only) may appear preferable thanks to lower reservation overhead, but that regime already departs from capacity-optimal operation and is less representative of intended TSN use. Focusing on the practically relevant system-peak range (about 8–12 stations), we recommend Mode C (r-TWT + QTP + RE) as the default: it preserves NST capacity while guaranteeing deterministic ST. Under sustained extreme loads (14–20 stations), where the network already departs from the capacity-optimal regime, the lighter r-TWT-only policy (Mode A) can be used as a fallback when NST capacity must be prioritized.
Future work includes (i) adaptive guard/QTP sizing driven by live measurements and PER estimates, (ii) fairness across multiple NST ACs and flows under mixed payloads, and (iii) impact analysis under overlapping BSS (OBSS), including how neighboring BSS activity interacts with r-TWT/QTP timing and RE shaping across contention domains.

Funding

This was supported by Korea National University of Transportation Industry-Academy Cooperation Foundation in 2023.

Data Availability Statement

The original data presented in this study are openly available at https://doi.org/10.22711/idr/1106.

Conflicts of Interest

The author declares no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Finn, N.; Thubert, P.; Varga, B.; Farkas, J. Deterministic Networking (DetNet) Architecture; RFC RFC 8655; Internet Engineering Task Force (IETF): Wilmington, DE, USA, 2019. [Google Scholar] [CrossRef]
  2. IEEE 802.1 Time-Sensitive Networking (TSN) Task Group. Charter: Deterministic Connectivity with Bounded Latency, Low Jitter, Low Loss. 2025. Available online: https://1.ieee802.org/tsn/ (accessed on 8 September 2025).
  3. Zhang, T.; Wang, G.; Xue, C.; Wang, J.; Nixon, M.; Han, S. Time-Sensitive Networking (TSN) for Industrial Automation. ACM Comput. Surv. 2024, 57, 1–38. [Google Scholar] [CrossRef]
  4. John, J.; Noor-A-Rahim, M.; Vijayan, A.; Poor, H.V.; Pesch, D. Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing. Future Internet 2024, 16, 345. [Google Scholar] [CrossRef]
  5. Fedullo, T.; Morato, A.; Tramarin, F.; Rovati, L.; Vitturi, S. A Comprehensive Review on Time Sensitive Networks with a Special Focus on Their Applicability to Distributed Measurement Systems. Sensors 2022, 22, 1638. [Google Scholar] [CrossRef] [PubMed]
  6. Xu, Y.; Huang, J. A Survey on Time-Sensitive Networking Standards and Practices. Processes 2023, 11, 2211. [Google Scholar] [CrossRef]
  7. Cavalcanti, D.; Cordeiro, C.; Smith, M.; Regev, A. WiFi TSN: Enabling Deterministic Wireless Connectivity over 802.11. IEEE Commun. Stand. Mag. 2022, 6, 22–29. [Google Scholar] [CrossRef]
  8. Adame, T.; Carrascosa-Zamacois, M.; Bellalta, B. Time-Sensitive Networking in IEEE 802.11be: On the Way to Low-Latency WiFi 7. Sensors 2021, 21, 4954. [Google Scholar] [CrossRef] [PubMed]
  9. Atiq, M.S.A.; Savazzi, S.; Galati-Giordano, L.; Dixit, S. When IEEE 802.11 and 5G Meet Time-Sensitive Networking. IEEE Open J. Ind. Electron. Soc. 2022, 3, 65–76. [Google Scholar] [CrossRef]
  10. Venkateswaran, S.K.; Tai, C.L.; Ahmed, A.; Sivakumar, R. Target Wake Time in IEEE 802.11 WLANs: Survey, Challenges, and Opportunities. Comput. Commun. 2025, 236, 108127. [Google Scholar] [CrossRef]
  11. Nurchis, M.; Bellalta, B. Target Wake Time: Scheduled Access in IEEE 802.11ax WLANs. IEEE Wirel. Commun. 2019, 26, 142–150. [Google Scholar] [CrossRef]
  12. Qiu, W.; Chen, G.; Nguyen, K.N.; Sehgal, A.; Nayak, P.; Choi, J. Category-Based 802.11ax Target Wake Time Solution. IEEE Access 2021, 9, 100154–100172. [Google Scholar] [CrossRef]
  13. Venkateswaran, S.K.; Tai, C.L.; Garnayak, R.; Ben-Yehezkel, Y.; Alpert, Y.; Sivakumar, R. IEEE 802.11ax Target Wake Time: Design and Performance Analysis in ns-3. In Proceedings of the 2024 Workshop on ns-3 (WNS3 ’24), ACM, Barcelona, Spain, 5–6 June 2024; pp. 10–18. [Google Scholar] [CrossRef]
  14. IEEE 802.11 Working Group. Liaison Communication to the IEEE 802.1 Working Group; Technical Report, IEEE 802.11; IEEE: Piscataway, NJ, USA, 2022; Doc. No. IEEE 802.11-22/1987r0. [Google Scholar]
  15. Belogaev, A.; Shen, X.; Pan, C.; Jiang, X.; Blondia, C.; Famaey, J. Dedicated Restricted Target Wake Time for Real-Time Applications in Wi-Fi 7. In Proceedings of the 2024 IEEE Wireless Communications and Networking Conference (WCNC), Dubai, United Arab Emirates, 21–24 April 2024. [Google Scholar] [CrossRef]
  16. Haxhibeqiri, J.; Jiao, X.; Aslam, M.; Moerman, I.; Hoebeke, J. Enabling TSN over IEEE 802.11: Low-overhead Time Synchronization for Wi-Fi Clients. In Proceedings of the 2021 22nd IEEE International Conference on Industrial Technology (ICIT), Valencia, Spain, 10–12 March 2021; pp. 1068–1073. [Google Scholar] [CrossRef]
  17. IEEE Std 802.1Qbv-2015: Bridges and Bridged Networks—Amendment 25: Enhancements for Scheduled Traffic, 2015. Time-Aware Shaper (TAS), Gate Control List (GCL), Guard Band. Available online: https://standards.ieee.org/ieee/802.1Qbv/6068/ (accessed on 8 September 2025).
  18. IEEE Std 802.1AS-2020: Timing and Synchronization for Time-Sensitive Applications. 2020. gPTP Time Synchronization for TSN. Available online: https://standards.ieee.org/ieee/802.1AS/7121/ (accessed on 8 September 2025).
  19. IEEE Std 802.11-2020: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2020. EDCA Operation; Quiet Element/Period Defined. Available online: https://standards.ieee.org/ieee/802.11/7028/ (accessed on 8 September 2025).
  20. IEEE Draft Std 802.11be/D7.0: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications—Amendment 2: Enhancements for Extremely High Throughput (EHT). 2024. Available online: https://ieeexplore.ieee.org/document/10622056/amendments?signout=success#amendments (accessed on 8 September 2025).
  21. Barannikov, A.; Levitsky, I.; Khorov, E. False Protection of Real-Time Traffic with Quieting in Heterogeneous Wi-Fi 7 Networks: An Experimental Study. Sensors 2023, 23, 8927. [Google Scholar] [CrossRef] [PubMed]
  22. Zheng, J.; Wu, Q. Performance modeling and analysis of the IEEE 802.11p EDCA mechanism for VANET. IEEE Trans. Veh. Technol. 2016, 65, 2673–2687. [Google Scholar] [CrossRef]
  23. Ahn, W.; Kim, R.Y. Distributed Triggered Access for BSM Dissemination in 802.11bd V2V Networks. Appl. Sci. 2019, 10, 311. [Google Scholar] [CrossRef]
  24. Ahn, W. Novel multi-AP coordinated transmission scheme for 7th generation WLAN 802.11 be. Entropy 2020, 22, 1426. [Google Scholar] [CrossRef] [PubMed]
  25. Maldonado, R.; Karstensen, A.; Pocovi, G.; Esswie, A.; Rosa, C.; Alanen, O.; Kasslin, M.; Kolding, T. Comparing Wi-Fi 6 and 5G Downlink Performance for Industrial IoT. IEEE Access 2021, 9, 86928–86937. [Google Scholar] [CrossRef]
  26. Segura, D.; Damsgaard, S.B.; Kabaci, A.; Mogensen, P.; Khatib, E.J.; Barco, R. An Empirical Study of 5G, Wi-Fi 6, and Multi-Connectivity Scalability in an Indoor Industrial Scenario. IEEE Access 2024, 12, 74406–74416. [Google Scholar] [CrossRef]
Figure 1. The operational cycle of the TSN Time-Aware Shaper (TAS), illustrating the scheduled slots for ST and NST traffic protected by a guard band.
Figure 1. The operational cycle of the TSN Time-Aware Shaper (TAS), illustrating the scheduled slots for ST and NST traffic protected by a guard band.
Sensors 25 05660 g001
Figure 2. The problem of non-prioritized medium access for ST frames in a standard Enhanced Distributed Channel Access (EDCA) contention period.
Figure 2. The problem of non-prioritized medium access for ST frames in a standard Enhanced Distributed Channel Access (EDCA) contention period.
Sensors 25 05660 g002
Figure 3. Limitations of legacy TWT: CP overrun and synchronized collision due to backoff counter drain.
Figure 3. Limitations of legacy TWT: CP overrun and synchronized collision due to backoff counter drain.
Sensors 25 05660 g003
Figure 4. Scheduling architecture of r-TWT.
Figure 4. Scheduling architecture of r-TWT.
Sensors 25 05660 g004
Figure 5. Role separation: r-TWT implements a functional guard band (no CP overrun), QTP suspends backoff for non-participating STAs to prevent synchronized collisions, and Randomized Enqueue spreads buffered NST arrivals to avoid a CP load spike.
Figure 5. Role separation: r-TWT implements a functional guard band (no CP overrun), QTP suspends backoff for non-participating STAs to prevent synchronized collisions, and Randomized Enqueue spreads buffered NST arrivals to avoid a CP load spike.
Sensors 25 05660 g005
Figure 6. The periodic structure of the proposed scheme for the analytical model.
Figure 6. The periodic structure of the proposed scheme for the analytical model.
Sensors 25 05660 g006
Figure 7. The analytical model for the EDCA mechanism, based on [22].
Figure 7. The analytical model for the EDCA mechanism, based on [22].
Sensors 25 05660 g007
Figure 8. Validation of E [ T ^ cp ] : analysis vs. simulation across N and L.
Figure 8. Validation of E [ T ^ cp ] : analysis vs. simulation across N and L.
Sensors 25 05660 g008
Figure 9. ST traffic performance evaluation.
Figure 9. ST traffic performance evaluation.
Sensors 25 05660 g009
Figure 10. Average transmission delay of ST traffic.
Figure 10. Average transmission delay of ST traffic.
Sensors 25 05660 g010
Figure 11. Absolute NST throughput vs. number of stations (L = 2/4 kB).
Figure 11. Absolute NST throughput vs. number of stations (L = 2/4 kB).
Sensors 25 05660 g011
Figure 12. Collision density at CP onset (N = 8, bin width 80 μs).
Figure 12. Collision density at CP onset (N = 8, bin width 80 μs).
Sensors 25 05660 g012
Figure 13. Proposed reference model for TSN-WLAN interfacing.
Figure 13. Proposed reference model for TSN-WLAN interfacing.
Sensors 25 05660 g013
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Evaluated modesEDCA, Mode A (r-TWT), Mode B (r-TWT + QTP),
Mode C (r-TWT + QTP + RE)
Number of STAs2, 4, 6, 8, 10, 12, 14, 16, 18, 20
Transmission bandwidth20 MHz
OFDM symbol duration (11be)16 μs
Preamble duration (Legacy)40 μs
Preamble duration (11be SU/TB)48 μs
Modulation and coding scheme (MCS) index (Control/data frame)4/2
Trigger frame MAC payload38 Bytes
Payload size ( L n s t = L s t = L)2000/4000 Bytes
ST transmission sequence[Legacy]Trigger Frame ++ [11be trigger-based (TB) PPDU]Data ++ [11be SU]ACK
NST transmission sequence[11be single user (SU) PPDU]Data ++ [11be SU]ACK
Packet Error Rate ( p e ) 10 4
Slot Time9 μs
Short inter-frame spacing (SIFS)16 μs
AIFS number (AIFSN) (for AC_VO, VI, BE, BK)[2, 2, 3, 7]
C W m i n (for AC_VO, VI, BE, BK)[7, 15, 31, 31]
C W m a x (for AC_VO, VI, BE, BK)[15, 31, 1023, 1023]
Retry Limit (for AC_VO, VI, BE, BK)[7, 7, 7, 7]
ST service interval ( T s t )10,240 μs (10 time unit (TU))
r-TWT SP duration ( T r )0.25 TU
Guard band durationMaximum NST transmission sequence duration
RE policyUniform randomization over the next CP interval
Simulation duration40,000 ms
Table 2. Variance of ST transmission delay (access delay + successful transmission time) under varying payloads and packet error rates.
Table 2. Variance of ST transmission delay (access delay + successful transmission time) under varying payloads and packet error rates.
PayloadPEREDCA N = 2EDCA N = 10EDCA N = 20Mode AMode BMode C
2000 B 10 4 2740.06370.06330.06.641610.5390310.60567
2000 B 10 2 3230.05980.06180.0400.18468350.14171374.30620
4000 B 10 4 3570.06910.07210.012.737639.8557412.68245
4000 B 10 2 3660.06890.04970.0532.89593576.43240600.65931
Table 3. System-peak NST throughput at N { 8 , 10 , 12 } for L { 2 , 4 } kB.
Table 3. System-peak NST throughput at N { 8 , 10 , 12 } for L { 2 , 4 } kB.
(a) L = 2 kB
NEDCA (Mbps)A (Mbps)ΔA[%]B (Mbps)ΔB[%]C (Mbps)ΔC[%]
849.6650.060.849.990.750.231.1
1059.3356.60−4.657.57−3.057.77−2.6
1259.7556.86−4.857.39−3.957.74−3.4
(b) L = 4 kB
NEDCA (Mbps)A (Mbps)ΔA[%]B (Mbps)ΔB[%]C (Mbps)ΔC[%]
898.0893.61−4.595.20−2.995.37−2.8
1098.0091.78−6.493.67−4.493.90−4.2
1293.8188.33−5.889.34−4.889.60−4.5
Table 4. Mode with least average NST reduction per STA band and L.
Table 4. Mode with least average NST reduction per STA band and L.
L (B)STA BandBest ModeΔ[%] (Avg)
2 KLow (N = 2–6)A−0.6
2 KSystem-peak (N = 8–12)C−1.6
2 KHigh (N = 14–20)A−4.6
4 KLow (N = 2–6)B0.0
4 KSystem-peak (N = 8–12)C−3.8
4 KHigh (N = 14–20)A−0.9
Table 5. Collision density near the CP boundary (N = 8, bin width Δ = 80 μs).
Table 5. Collision density near the CP boundary (N = 8, bin width Δ = 80 μs).
(a) Payload L st = 2  kB
Scheme C start A b s : 2 A b s : 5 A b s : 10 A b s : 20
Mode A (r-TWT)1.061.702.403.104.00
Mode B (r-TWT + QTP)0.801.302.203.003.90
Mode C (r-TWT + QTP + RE)0.550.951.802.703.60
(b) Payload  L st = 4  kB
Scheme C start A b s : 2 A b s : 5 A b s : 10 A b s : 20
Mode A (r-TWT)0.971.502.102.803.70
Mode B (r-TWT + QTP)0.901.502.403.204.10
Mode C (r-TWT + QTP + RE)0.781.252.203.104.00
Table 6. Mapping of TAS parameters to WLAN parameters and dimensioning rules.
Table 6. Mapping of TAS parameters to WLAN parameters and dimensioning rules.
TAS Parameter (from CNC)WLAN Parameter
(AP MLME)
Description
BaseTimeTarget Wake Time (TWT)Absolute schedule anchor; start of the first r-TWT SP.
CycleTimeWake IntervalPeriod; equals the ST service interval.
GCE TimeInterval (ST slot)Wake Duration (r-TWT)ST slot length → r-TWT SP duration.
GCE GateState (ST queue open)TWT Member & Trigger-enabledSingle STA as r-TWT member; AP triggers intended AC/TID at SP start.
Guard Band (length)Restricted TWT & QTP alignment (boundary protection)GB is dimensioned by the longest NST transmission time on the link so that no NST TXOP can spill into the SP. QTP starts one such NST transmission time before each SP and remains active until the end of SP.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ahn, W. TSN-Interworked Deterministic Transmission over WLAN. Sensors 2025, 25, 5660. https://doi.org/10.3390/s25185660

AMA Style

Ahn W. TSN-Interworked Deterministic Transmission over WLAN. Sensors. 2025; 25(18):5660. https://doi.org/10.3390/s25185660

Chicago/Turabian Style

Ahn, Woojin. 2025. "TSN-Interworked Deterministic Transmission over WLAN" Sensors 25, no. 18: 5660. https://doi.org/10.3390/s25185660

APA Style

Ahn, W. (2025). TSN-Interworked Deterministic Transmission over WLAN. Sensors, 25(18), 5660. https://doi.org/10.3390/s25185660

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop