You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

14 October 2025

Research on a Hybrid Scheduling Algorithm Based on Critical-Link Optimization for Large-Scale Time-Triggered Ethernet

,
,
and
1
School of Aeronautics and Astronautics, Zhejiang University, Hangzhou 310058, China
2
Shanghai Aerospace Electronic Technology Institute, Shanghai 201108, China
*
Author to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

With the rapid development of the Industrial Internet of Things (IIoT), the application scale of Time-Triggered Ethernet (TTE) technology in the IIoT has been increasingly expanding. To address the issues of rapidly increasing computation time and deteriorating scheduling quality in traditional scheduling algorithms for large-scale TTE applications, this paper proposes a hybrid scheduling algorithm based on critical-link optimization. A large-scale TTE message scheduling model is established based on the characteristics of Time-Triggered (TT) messages, and the constraints of TT scheduling are mathematically abstracted. After identifying the critical link of the network, a time slot balancing scheduling algorithm based on static priority is adopted for the link. The algorithm searches for the optimal scheduling time of current message by time-sliding within the current maximum time gap of TT messages from the center to both sides, maximizing the balance of TT message intervals to reduce the impact on Best-Effort (BE) message transmission performance. An improved genetic algorithm is proposed for the scheduling of the entire network to further enhance the global optimization capability, which takes the scheduling results of the critical link as the genes of initial population. The TT scheduling constraints are converted into the fitness function and the optimized genetic operators are developed for the genetic algorithm. Simulation results showed that the proposed algorithm can significantly reduce computing time and increase the success rate of message scheduling. At the same time, the scheduling results exhibit a better degree of TT message balance and can effectively reduce the transmission delay and jitter of BE messages as message load increases compared with traditional algorithms, making it better meet the scheduling requirements of large-scale TTE application scenarios.

1. Introduction

Building on next-generation Industrial Internet of Things (IIoT) technology, the Industrial 5.0 era aims to establish a fully interconnected industrial network system that connects humans, machines, and things [1]. This system enables real-time acquisition, free transmission, precise analysis, and intelligent feedback of massive industrial data. With the development of IIoT, an increasing number of devices are interconnected across networks, requiring diverse data traffic to be supported in a single network simultaneously, such as high-security control, high-bandwidth AI perception, and real-time cross-domain human–machine interaction. The traditional “best-effort” mechanism of Ethernet is no longer sufficient to meet the requirements of microsecond-level synchronization and mixed deterministic transmission [2].
Time-Triggered Ethernet (TTE) extends conventional Ethernet by incorporating time-triggering, synchronization, and redundancy mechanisms [3,4]. TTE can serve applications with varying latency and reliability requirements over the same physical network, providing sub-microsecond-level time synchronization and bounded transmission jitter using a global clock and offline schedule tables. TTE also supports fault tolerance and traffic isolation while remaining fully compatible with traditional Ethernet. This makes it well-suited for the stringent transmission and processing demands of industrial networks. TTE technology has gained widespread attention and recognition in the industry and is increasingly being applied in fields such as healthcare, aerospace, and automotive [5,6,7,8].
TTE classifies traffic into Time-Triggered (TT) and Event-Triggered (ET) traffic [9], with the latter comprising Rate-Constrained (RC) and Best-Effort (BE) messages. TT traffic is transmitted according to a pre-defined schedule, ensuring deterministic latency and jitter, while ET traffic is transmitted in the gaps between TT transmissions. Consequently, the quality of the TT scheduling table directly impacts both TT traffic performance and the transmission of other traffic types, thereby influencing the overall network capacity [10]. With the large-scale deployment of TTE, network topologies have become increasingly complex. The demand for real-time data transmission has grown substantially, resulting in greater computational complexity in solving TTE scheduling problems [11]. Therefore, in large-scale TTE networks, how to rapidly deliver high-quality solutions tailored to specific applications and operational requirements remains a pressing challenge for TTE scheduling algorithms.
The solving of TTE scheduling tables is NP-Complete Problem (NPC). In current research and engineering applications, traditional TTE scheduling methods mainly include Satisfiability Modulo Theory (SMT) -based algorithms [12] and Metaheuristic Algorithms (MA) [13]. In [14], a network-planning-based SMT solver was first proposed to generate static schedules, and its performance was validated through simulation. An incremental scheduling mechanism was also introduced, in which TT traffic is divided into multiple batches and schedules are generated sequentially using the SMT solver; however, the results yielded only feasible solutions, with limited improvement in bandwidth and time utilization. In [15], the authors introduced the Strict Periodic Utilization (SPU) factor to quantify the scheduling difficulty of TT traffic, and TT flows are then incrementally scheduled by the SMT solver in descending order of SPU. By computing interference times between TT flows, the scale of conflict-free constraints between scheduled and unscheduled flows during incremental scheduling is reduced, thereby decreasing the number of backtracking steps. In [16], a load-balancing strategy and distributed iterative conflict backtracking method were incorporated into the SMT framework, where message clusters were divided into smaller subsets and each subset was solved once at a time. When a subset was successfully scheduled, the results were added as new constraints to the SMT solver, improving both computational efficiency and load balance to some extent. In [17], a Fuzzy-controlled Quantum-behaved Particle Swarm Optimization (FQPSO)-SMT algorithm was proposed, in which priorities were defined to determine the order of incremental scheduling. This method considered not only end-to-end delay but also interference between scheduled and unscheduled messages, enabling rapid resolution of collision-free and timing constraint problems for basic periodic frames, with better load balancing and bandwidth utilization than standard incremental SMT. In [18], a hybrid scheduling technique combining Genetic Algorithm (GA) and Simulated Annealing (SA) was employed, where chromosome encoding, a penalty-based fitness function, and elite selection with POX crossover were designed, and by incorporating a simulated-annealing strategy during the mutation phase, the algorithm enhances both global and local search capabilities. However, this approach was limited to smaller network topologies and message sets, with SA parameters empirically tuned and lacking adaptive mechanisms.
Since TT messages have the highest scheduling priority in the network, the results of TTE scheduling algorithms have a significant impact on the performance of ET messages. In [19], the paper introduced a novel Dynamic Programming Priority (DPP) algorithm designed for scheduling RC flows in TTE, which combines priority-based scheduling with dynamic programming, dividing RC flows into different priority groups. Higher-priority groups are scheduled using First input first output (FIFO) policy, while lower-priority groups leverage dynamic programming for optimal resource utilization. The algorithm also integrates an SMT solver to pre-schedule TT messages, minimizing their interference with RC flows. In [20], the authors first employed an SMT solver to obtain an initial schedule where TT traffic is distributed as evenly as possible while satisfying inherent transmission constraints. Network calculus was then applied to verify whether RC traffic met its delay requirements; if satisfied, the scheduling process terminated with the current result, otherwise, TT flows causing excessive RC traffic delays were rescheduled until the RC traffic delay requirement was met. In [21], a Modified Weighted Round-Robin (MWRR) scheduling algorithm based on optimal time slices was proposed. The algorithm utilizes SMT to generate an offline scheduling table for TT messages, thereby optimizing the transmission time slices for RC messages. Within these time slices, bandwidth is allocated proportionally and a deficit counter is introduced to ensure fairness, thus improving the scheduling fairness and real-time performance of different types of RC messages. In [22], A TTE optimal scheduling technology based on rapid increment was proposed to optimize scheduling intervals to reduce RC message waiting time. By backtracking to correct multi-hop delays and adjusting the TT message schedule, the transmission performance of RC messages is improved. In [23], a scheduling optimization method was introduced to minimize the “makespan” of TT messages, aiming to reserve the maximum possible bandwidth for RC traffic to ensure its real-time performance and stability. However, this model imposes strict constraints on link bandwidth and message periods, and its computational complexity increases sharply with the number of messages, limiting its practical applicability.
Based on the current research on TTE scheduling algorithms, several pressing issues remain when addressing large-scale TTE applications. First, due to factors such as sensor locations, service characteristics, network topology, and resource distribution, traffic loads vary significantly across different links within the same network [24,25]. Traditional scheduling algorithms typically employ unified global scheduling strategies without accounting for the traffic heterogeneity of different links, which reduces computational efficiency and limits the quality of the solutions. Second, in practical applications, BE messages often constitute the majority of traffic in TTE networks. Real-time and precise remote monitoring and control rely on stable BE traffic (such as image and audio) to support human–machine feedback interaction. Since BE messages have the lowest priority, the scheduling results for TT messages have the greatest impact on the performance of transmission of BE messages; however, existing optimization efforts primarily focus on the scheduling of TT and RC messages, while the impact on BE messages has not been a primary research focus. Finally, the complexity of the network topology and the number of network messages that need to be scheduled increase rapidly as the scale of the TTE network expands. The issue of the time complexity of traditional algorithms becomes increasingly critical, making it difficult to obtain feasible solutions even in certain complex scenarios [26].
To address the above issues, this paper proposes a hybrid scheduling algorithm based on critical-link optimization for large-scale TTE. First, a TT network topology and message scheduling model is established based on large-scale network application scenarios, and the constraints of TT scheduling are analyzed and mathematically abstracted. Second, a slot-balanced scheduling algorithm based on static priority is introduced for the most critical link, in which messages on the link are first prioritized according to their periods, and then scheduled sequentially by priority. For each message, the scheduling slot is determined by searching the feasible optimal slot closest to the center of the largest TT message gap according to the distribution of already scheduled messages to achieve the most balanced time slot arrangement, thus reducing the impact of continuous TT slot allocation on delay and jitter of BE message transmission. Finally, after completing the critical link scheduling, a genetic algorithm is applied to solve the network-wide scheduling problem and the scheduling results of the critical link are used as input to the genetic algorithm. The scheduling constraints are converted into the fitness function of the genetic algorithm and optimized genetic operators are used to further improve the algorithm’s optimization capabilities. By combining static scheduling for the critical link with dynamic global scheduling based on genetic algorithm, the proposed hybrid scheduling algorithm effectively reduces computation time while improving scheduling quality.

2. Time-Triggered Ethernet Model

2.1. Network Traffic Analysis

TTE supports diverse types of data transmission, with its services built upon network-wide time synchronization. It enables the coexistence of three distinct classes of message transmission over a single physical network [27]. TT messages are subject to strict temporal constraints. Their transmission times are determined by a pre-defined offline communication schedule and are strictly executed at scheduled time points during runtime. This schedule is cyclically repeated with a fixed duration known as the cluster cycle [28]. RC messages are ET messages regulated through bandwidth allocation mechanisms. These messages achieve flow control and data rate limitation via the Bandwidth Allocation Gap (BAG). BE messages are also ET messages but are not subject to any timing or bandwidth constraints. Traditional Ethernet traffic falls under the BE message category.
In TTE, different applications typically employ different message types according to their transmission requirements. The network performs mixed scheduling and transmission of the three message types based on an offline scheduling table. For example, in aerospace vehicle networks, critical data such as real-time control and time services are transmitted using TT messages, while status data, voice, video, and other services are transmitted using RC and BE messages. An illustration of mixed scheduling in a TTE network is shown in Figure 1.
Figure 1. Mixed scheduling in a TTE network.
In TTE, since BE traffic can only be transmitted during the idle intervals of TT and RC traffic, the scheduling of TT messages increasingly impacts the performance of BE traffic as the network scales up. The significant delay and jitter experienced by BE messages can adversely affect applications relying on BE traffic, such as causing stuttering or latency in video or voice communications, as well as data congestion and packet loss. These issues, in turn, constrain the overall performance of the TTE network. Therefore, optimizing the static scheduling table of TT messages to reduce their interference with BE traffic is crucial for improving the overall performance of TTE networks.

2.2. Network Topology Model

Traditional TTE networks typically employ simple topologies such as star or snowflake structures. To evaluate the performance of algorithms under large-scale and non-single-path network conditions, this study constructs a multi-hop tree topology based on a TTE network comprising 35 end systems and 6 switches. The network topology is illustrated in Figure 2.
Figure 2. Topology of large-scale multi-hop TTE network.
In the figure, circles represent network end systems or switch nodes, while the lines between nodes represent network links. The multi-hop TTE network is modeled as an undirected graph G ( V , E ) , where the vertex set V (i.e., the circles in the figure) represents switches or end systems, and the edge set E (i.e., the straight lines) denotes bidirectional connections between vertices. Let F denote the set of all frames in the network. A vector L represents the set of data links, where ( v x , v y ) L indicates a data link directed from vertex v x to vertex v y , and ( v y , v x ) L denotes the data link in the opposite direction on the same edge. Two vertices ( v x , v y ) V can exchange frames only if at least one of them is a switch.

2.3. Message Scheduling Model

In a TTE network, all TT frames are transmitted periodically, though the transmission periods may differ among virtual link messages. Suppose there are N messages in the network, and T f n denotes the transmission period of frame f n . The cluster cycle, denoted as T F , is defined as the least common multiple (LCM) of the periods T f 1 , T f 2 , …, T f n of all TT frames. The variable Φ f n represents the offset of frame f n relative to the start of the cluster cycle. A schematic diagram of the TT message periodic scheduling model is shown in Figure 3, which illustrates two TT messages.
Figure 3. Periodic scheduling model of TT messages.
Figure 3 illustrates the periodic transmission characteristics of two TT messages, f 1 and f 2 , over two cluster cycles. As shown, within each cluster cycle, the same TT message maintains a consistent time offset relative to the start of the cycle. Since TT traffic is deterministic and periodic, once the offset of a message is determined, its transmission schedule over time can be derived based on its period. Therefore, the TT message scheduling problem can be simplified to determining the time offsets of all messages within a single cluster cycle. This leads to the construction of a static communication schedule table that ensures collision-free transmission of TT messages over the network links [29]. After the schedule table is generated, the configuration tool encapsulates the schedule table into an image file and loads it into the local storage of each switch and end device before the network starts to run. After the schedule table is loaded, each switch and terminal transmits and receives data according to the locally stored scheduling table.
The time offset of a frame within a single cluster cycle is defined as follows:
Φ f ( i , l , j ) = t , t > 0
It indicates that the source node j begins transmitting the i -th frame over link l at time t after the start of the cluster cycle. According to the periodic nature of TT messages, the interval between the i -th frame and the i + 1 -th frame is equal to the frame’s period. This relationship can be expressed mathematically as follows:
Φ f ( i + 1 , l , j ) = Φ f ( i , l , j ) + T f , i = 1 , 2 , N f
An end system transmitter can send information to one or multiple receiving end systems. Therefore, in a TT network architecture, unicast, broadcast, and multicast communications can be implemented at the link layer. The data flow path p i is defined as the sequence of links from the sender v s to the receiver v r , as shown in following:
p i = [ ( v s , v s + 1 ) , , ( v r 1 , v r ) ]
For any frame f , its path tree is defined as T P f , which is the union of all data flows from the sender of frame f to each of its receivers. Accordingly, frame f can be defined by a tuple as shown in following:
f = T f , Φ f , L f , T P f
In this tuple, T f denotes the transmission period of the frame, Φ f represents the time offset of the frame, L f is the frame length (in bytes), and T P f is the path tree as defined above. Based on the previous definitions, for a given set of frames F , the message scheduling table can be constructed using the set of time offsets Φ f to form a complete transmission schedule.
Since searching for time offsets in the continuous time domain is particularly complex, the continuous transmission time is discretized into natural-number-based time slots. A basic time slot unit is defined as 1 microsecond and is denoted by t s i z e . Thus, both the transmission offset and duration of each frame can be expressed in terms of time slots, which simplifies the problem. Under this assumption, the transmission duration of frame f on link l can be represented by the number of time slots δ f l , as shown in following:
δ f l = t f l t s i z e
Here, t f l represents the actual transmission duration of frame f on link l , and other time-related variables can be similarly expressed and simplified using this time slot representation.
Considering that the cluster cycle T F is the LCM of a set of frame periods, a frame on a given virtual link may need to be scheduled multiple times within a single cluster cycle. Therefore, the number of scheduling instances is calculated as follows:
N f = T F T f
In the formula, T f represents the period of frame f .

3. Time-Triggered Scheduling Constraints

3.1. Frame Period Constraint

For any frame f , in order to ensure that the time offsets of all links along the path tree satisfy the frame period constraint, the following condition must be met: the deadline of the first instance of frame f on any link l within the path tree shall fall within the time interval 0 , T f . The frame period constraint is mathematically expressed as follows:
f F ,       l T P f : 0 < Φ f ( 1 , l , j ) + δ f l T f
In the formula, F represents the set of all frames in the network, T P f is the path tree of frame f , and δ f l is the transmission duration of frame f on link l . Once the period constraint is satisfied, the time offset of the i -th frame transmitted from the source node can be derived based on the offset of the first frame. The calculation is given as follows:
Φ f ( i , l , j ) = Φ f ( 1 , l , j ) + ( i 1 ) × T f

3.2. Contention-Free Constraint

The contention-free constraint ensures that no data link conflict occurs between any two TT message frames, and it is the most fundamental requirement in a TTE static schedule table. In other words, the transmission time of any frame on any link within the network system cannot overlap. The contention-free constraint is formally described by the mathematical expression as follows:
( v x , v y ) L , f m , f n F : ( f m f n ) , i f m = 1 , 2 N f m , i f n = 1 , 2 N f n ( Φ f m ( i f m , ( v x , v y ) , v x ) Φ f n ( i f n , ( v x , v y ) , v x ) + δ f n l ) ( Φ f n ( i f n , ( v x , v y ) , v x ) Φ f m ( i f m , ( v x , v y ) , v x ) + δ f m l )
In the formula, F represents the set of all frames in the network, f m and f n represent any two distinct frames. δ f m l and δ f n l represent the transmission duration of frames on link l . Since TT message frames exhibit periodic behavior, Equation (9) can be further simplified to Equation (10), where T F denotes the LCM of the periods of all frames, as described earlier.
( v x , v y ) L , f m , f n F ( f m f n ) , a 0 , 1 ( T F T f m 1 ) , b 0 , 1 ( T F T f n 1 ) : a × T f m + Φ f m ( 1 , ( v x , v y ) , v x ) b × T f n + Φ f ( 1 , ( v x , v y ) , v x ) + δ f n l b × T f n + Φ f n ( 1 , ( v x , v y ) , v x ) a × T f m + Φ f m ( 1 , ( v x , v y ) , v x ) + δ f m l
Here, a and b denote the sequence numbers of frames f m and f n on the link, respectively—that is, the a -th instance of f m and the b -th instance of f n on the link.

3.3. Causality Constraint

The data flow path of a frame must follow the transmission order of links from the sender to the receiver. Therefore, a switch must first receive a frame before it can forward it. The causality constraint ensures the correct temporal ordering of TT frame transmissions across adjacent physical links involving a switching node. Specifically, for each pair of consecutive links ( v x , v y ) , ( v y , v x ) T P f , which belong to the path tree of frame f , the causality constraint as the frame passes through the relay node can be described as follows:
p i T P f , ( v x , v y ) , ( v y , v z ) p i : Φ f ( i , ( v y , v z ) , v y ) Φ f ( i , ( v x , v y ) , v x ) T h d
Here, T h d represents the minimum time a frame is stored in the switch before being relayed—that is, the minimum forwarding delay of the switch.

3.4. Buffer Capacity Limit Constraint

The scheduling algorithm must also consider the Buffer capacity limit of relay switches—that is, the maximum duration a TT frame can be buffered within a switch. If this upper bound is exceeded, packet loss may occur. Therefore, for each pair of consecutive links ( v x , v y ) , ( v y , v z ) T P f , which belong to the path tree of frame f , the buffer capacity limit constraint as the frame passes through the relay node can be expressed as follows:
p i T P f , ( v x , v y ) , ( v y , v z ) p i : Φ f ( i , ( v y , v z ) , j ) Φ f ( i , ( v x , v y ) , j ) T m m
T m m denotes a constant determined by switch memory size, representing the maximum buffering time before frame forwarding. Unlike non-TT traffic, output port contention is not considered, allowing queuing analysis to be omitted.

3.5. End-to-End Delay Constraint

For TT message transmission, the time interval from the start of frame transmission at the sender to its reception at each receiver must be bounded. Although such end-to-end delay is practically constrained by buffer overflow avoidance, it can be further restricted by the parameter T e t . The end-to-end delay constraint for a data frame f , from the transmitting node to the receiving node, is defined as follows:
Φ f ( i , ( v r 1 , v r ) , j ) Φ f ( i , ( v s , v s + 1 ) , j ) < T e t
In this equation, v r denotes the destination node of the message in the network topology, and v s represents the source node.

5. Simulation and Analysis

5.1. Simulation Parameters and Algorithms

In the simulation network, five different types of TT messages are configured. Based on the message periods, the cluster cycle of the network is set to 30,000 time slots. The detailed configuration of the messages is shown in Table 1.
Table 1. Detailed configuration of the messages.
According to the scheduling characteristics of TTE, the greater the number of time slots occupied by TT messages on a link, the higher the scheduling complexity. To quantify the scheduling difficulty of a link, a link scheduling pressure parameter is defined. This parameter is expressed as the ratio between the number of time slots occupied by TT messages on the link within a cluster cycle and the total number of time slots in that period. The link scheduling pressure p of link l k can be calculated as follows:
p l k = f F k ( δ f · N f ) T F
In the formula, T F represents the cluster cycle, N f denotes the number of cycles of frame f within the cluster cycle, and F k represents the set of all frames in the critical link. To thoroughly evaluate the scheduling performance of the proposed algorithm under varying scheduling pressures, eight simulation conditions are designed based on different network load levels. These conditions cover a range of scheduling pressure levels on the link, with the number of frames and link scheduling pressure configured for each case shown in Table 2.
Table 2. Configuration of eight simulation conditions.
The simulation adopts the network topology shown in Figure 2, which includes 35 end systems and 6 switches, totaling 41 network nodes. Frame forwarding behavior occurs only at the switches. The communication links between nodes are represented by straight lines; since the network uses full-duplex bidirectional links, each direct connection represents two separate links. The two numbers on each line indicate the link IDs in both directions. There are 80 links in total across the network. To verify the scalability of the algorithm, the network scale was further increased based on the aforementioned basic network topology, and the configurations of the three resulting simulation network topologies are shown in Table 3.
Table 3. Configuration of three simulation network topologies.
Taking topology 1 as an example, assume that nodes 26–31 have relatively high latency and jitter requirements for BE messages, therefore link 16 associated with them also has high link importance. Meanwhile, due to the direct connection to the central root node, link 16 has the highest link centrality. Finally, we configured link 16 with frames according to Table 2, which has a relatively high link traffic load. The link criticality of each link was calculated, and the link with the highest criticality, link 16, was ultimately selected as the critical link for simulation. The frame distribution across each link under condition 5 and topology 1 is shown in Figure 7.
Figure 7. Frame distribution across links under condition 5 and topology 1.
It can be observed that among the 80 links, there is a significant variation in the frame distribution. Links connected to switch nodes carry more frames compared to those connected to end nodes. Link 16 has the highest frame count and is identified as the critical link in this simulation.
To validate the effectiveness of the proposed algorithm, three scheduling algorithms are selected for comparison: the SMT algorithm (SMTA), the Genetic Algorithm (GA), the Particle Swarm Optimization Algorithm (PSOA) and the proposed Hybrid Scheduling Algorithm (HSA) based on critical-link optimization. Both SMTA and PSOA are based on industrial standard algorithms. GA is the global scheduling algorithm proposed in this paper, with relevant parameters consistent with those of the HSA based on critical link optimization. The weights α 1 , α 2 , α 3 , α 4 of the fitness function of the genetic algorithm are set to 0.54, 0.32, 0.08, 0.06, respectively, the population size M is set to 350, the elite retention ratio r is set to 20%, the initial crossover probability ω c is set to 0.8, and the initial mutation probability ω m is set to 0.08.
The simulation experiments were conducted on a system equipped with an Intel® Core™ i9-12900H CPU and 32 GB of RAM (Intel Corporation, Santa Clara, CA, USA). The scheduling algorithms were implemented using MATLAB R2016a, and comparative simulations were performed on the PyCharm Community Edition 2023.2.3 development platform.

5.2. Calculation Time and Success Rate of Solution

Three algorithms were used to solve the TTE scheduling tables under three topologies and eight different conditions, and each algorithm was run 10 times under each condition. If a feasible solution could not be found within 2 h, the run was considered a failure and the simulation was terminated. For the SMT solver, a random seed was set and heuristic search was enabled to ensure the randomness of each solving process. The running results of three algorithms under eight conditions are summarized in Table 4.
Table 4. Running results of three algorithms under three topologies and eight conditions.
In Table 4, each cell contains two values: the average calculation time (in seconds) and the success rate of obtaining a feasible solution. A dash (“–”) indicates that no solution was found within the 2 h time limit.
The comparison shows that in large-scale network TT scheduling, the SMTA has the longest calculation time, which grows rapidly with the increase in message volume, while its success rate continuously declines. Under all three network topologies, there are cases where the SMTA rarely produces feasible results. Since SMTA relies on exhaustive search, while GA and PSOA iteratively optimizes along constraint convergence directions, their solving times are relatively shorter than that of SMTA, and their success rates are higher. However, as message scale increases, there are cases where no solution can be found for GA under all three topologies, and for PSOA under topologies 2 and 3. Compared to SMTA, GA and PSOA, the proposed HSA consistently achieves the shortest solving times across all conditions and succeeds in all topologies. This improvement stems from combining the critical link algorithm with a global genetic algorithm, which enhances the efficiency of scheduling on key links and overall solution quality, making it better suited for large-scale message transmission in complex topologies.

5.3. Degree of Balance in Message Scheduling

Since the scheduling balance of TT messages directly affects the performance of BE messages, the scheduling balance achieved by the three algorithms is compared using the formula defined as follows:
E = 1 i = 1 n j = 1 n g i g j 2 n 2 g ¯
Here, g i denotes the time interval between any two TT messages, n represents the total number of message intervals, and g ¯ denotes the average message interval. The calculated degree of balance ranges from 0 to 1, where a larger value indicates higher balance. The average scheduling balance of the three algorithms under eight conditions is shown in Figure 8.
Figure 8. Average scheduling balance.
The comparison of scheduling balance above shows that HSA consistently achieves higher balance than the SMTA, GA and PSOA across all conditions. As the message scale increases, the SMTA, GA and PSOA exhibit a significant decline in balance, whereas the HSA maintains a relatively stable balance level. This stability results from the HSA’s use of a slot-balanced scheduling algorithm for the critical link during the initial static scheduling phase, which ensures an even distribution of TT message intervals on the critical link. Additionally, due to the periodic nature of TT messages, this balanced distribution on the critical link propagates throughout the entire network, thereby optimizing overall network balance.
Taking condition 5 under topology 1 as an example, the Gantt charts of TT frames of link 16 generated by the three algorithms are shown in Figure 9.
Figure 9. Gantt charts of TT frames generated by the three algorithms under condition 5.
Figure 9 shows that the message scheduling obtained by the SMTA exhibits high randomness, resulting in the most uneven slot distribution and clearly causing greater delay and jitter for BE messages. The GA and PSOA produces a relatively more uniform message distribution compared to SMTA. The proposed HSA achieves the most optimal slot distribution, with well-spaced intervals between TT messages, minimizing the impact on BE message transmission performance.

5.4. BE Message Transmission Performance

Using the scheduling results described above, a simulation of network message transmission performance was conducted. Four hundred BE messages were randomly generated from network nodes, and their transmission delays were recorded at the receivers. To simulate random network traffic, the arrival process of BE messages is set to a Poisson process and the packet-size distribution is set to log-normal distribution. The average BE message delay under the eight conditions for different algorithms are shown in Figure 10, Figure 11 and Figure 12, with the corresponding average jitter presented in Figure 13, Figure 14 and Figure 15.
Figure 10. Average BE message delay under topology 1.
Figure 11. Average BE message delay under topology 2.
Figure 12. Average BE message delay under topology 3.
Figure 13. Average BE message jitter under topology 1.
Figure 14. Average BE message jitter under topology 2.
Figure 15. Average BE message jitter under topology 3.
The figures indicate that as the message scale increases, the BE message delay and jitter resulting from the scheduling table of SMTA, GA and PSOA grow significantly, whereas those from the HSA remain substantially lower. For instance, under topology 1 and condition 5, the average BE message delay with the HSA is reduced by 87.9% compared to SMTA, by 71.8% compared to GA, and by 68.1% compared to PSOA. Similarly, the average BE message jitter with the HSA decreases by 81.1% relative to SMTA, by 75.6% relative to GA, and by 77.7% relative to PSOA.
Taking topology 1 and condition 5 as an example, the delay distribution of four hundred BE messages under the scheduling results of the three algorithms is shown in Figure 16, and the jitter distribution is shown in Figure 17.
Figure 16. Delay distribution of four hundred BE messages under condition 5 and topology 1.
Figure 17. Jitter distribution of four hundred BE messages under condition 5 and topology 1.
The figure shows that the scheduling results from the SMTA, GA and PSOA exhibit significant fluctuations in BE message transmission delay due to the “back-to-back” arrangement of numerous TT messages. Specifically, the SMTA’s maximum delay and jitter are 4970 and 4689 time slots, respectively; the GA’s maximum delay and jitter are 2800 and 2391 time slots respectively; and the PSOA’s maximum delay and jitter are 3585 and 3151 time slots respectively. In contrast, the HSA employs static scheduling based on slot balancing on the critical link, producing deterministic schedules that facilitate rapid BE message transmission through gaps between TT messages. As a result, HSA achieves the lowest message delays, with a maximum delay of 980 time slots and a maximum jitter of 598 time slots. This demonstrates that the HSA significantly reduces BE message transmission delay and jitter.

6. Conclusions

This paper addresses the scheduling demands of large-scale TTE by constructing a representative large-scale TTE network topology and establishing a TTE message scheduling model. The scheduling constraints of TTE messages are analyzed, and a critical-link optimized scheduling algorithm for large-scale TTE is proposed. The algorithm adopts a two-step approach: first, it applies a static priority–based slot-balanced scheduling algorithm on critical links; then, it incorporates the critical link results as fixed genes in the initial population of a genetic algorithm to perform global network scheduling. This method optimizes both the solving process and the results. As the network message volume increases, the algorithm improves the success rate, reduces solving time, and effectively minimizes the impact of TT messages on BE message transmission performance, making it well-suited for large-scale TTE scheduling scenarios. The following conclusions can be drawn:
Compared to traditional algorithms that apply the same solving method to all links, this work identifies link heterogeneity by locating critical links within the network topology and applies a distinct static solving algorithm specifically for these critical links, thereby improving solving efficiency. Additionally, the use of slot-balanced scheduling on critical links effectively reduces the impact of the scheduling results on BE message performance.
Compared to the conventional SMT algorithm used in engineering applications, this paper employs a genetic algorithm to solve the global network scheduling table. It abstracts network constraints into a mathematical model and constructs a scheduling framework with effective fitness functions and genetic operators. Leveraging the genetic algorithm’s strong global search capability and parallel computing advantages, the approach accelerates convergence and enhances scheduling performance.
Simulation results demonstrate that, in large-scale TTE environments, the proposed algorithm achieves higher solving success rates and shorter solving times compared to traditional methods. Additionally, it effectively reduces BE message transmission delay and jitter, making it more suitable for dense message scheduling in large-scale, complex network topologies.
Despite the insights provided, several limitations merit mention. Firstly, the algorithm we proposed is a static solution and offline scheduling algorithm. In industrial networks, there may be application scenarios where network topology or traffic changes dynamically. Future work will focus on the incremental or online scheduling methods of TTE. Secondly, the algorithm proposed in this paper is based on the premise that the transmission path of messages has been pre-determined. Factors such as path selection, path backup, and path distance constraints in path planning also affect the scheduling results of messages [30]. In subsequent work, we will continue to study the joint optimization of message path planning and message scheduling.

Author Contributions

Writing—original draft preparation, H.Z. and Z.L.; writing—review and editing, Z.L. and J.C.; validation, J.C.; supervision, Z.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
BAGBandwidth Allocation Gap
BEBest-Effort
CSPConstraint Satisfaction Problem
DPPDynamic Programming Priority
ETEvent-Triggered
FIFOFirst In, First Out
FQPSOFuzzy-controlled Quantum-behaved Particle Swarm Optimization
GAGenetic Algorithm
HSAHybrid Scheduling Algorithm (based on critical-link optimization)
IIoTIndustrial Internet of Things
LCMleast common multiple
MAMetaheuristic Algorithms
MWRRModified Weighted Round-Robin
NPCNP-Complete Problem
PSOAParticle Swarm Optimization Algorithm
RCRate-Constrained
SASimulated Annealing
SMTASatisfiability Modulo Theory Algorithm
SMTSatisfiability Modulo Theory
TTETime-Triggered Ethernet
TTTime-Triggered

References

  1. Babayigit, B.; Abubaker, M. Industrial Internet of Things: A Review of Improvements over Traditional SCADA Systems for Industrial Automation. IEEE Syst. J. 2024, 18, 120–133. [Google Scholar] [CrossRef]
  2. Xie, X.; Wang, H.; Liu, X. Scheduling for Minimizing the Age of Information in Multisensor Multiserver Industrial Internet of Things Systems. IEEE Trans. Ind. Inform. 2024, 20, 573–582. [Google Scholar] [CrossRef]
  3. Steiner, W.; Bauer, G.; Hall, B.; Paulitsch, M.; Varadarajan, S. TTEthernet dataflow concept. In Proceedings of the Eighth IEEE International Symposium on Network Computing and Applications, Cambridge, MA, USA, 9–11 July 2009. [Google Scholar]
  4. Song, Y.; Zhou, C.; Luo, Y.; Huang, J. Research on Synchronization Mechanism of Time Triggered Ethernet. In Proceedings of the 2024 International Conference on Guidance, Navigation and Control (ICGNC 2024), Changsha, China, 9–11 August 2024. [Google Scholar]
  5. Khanmohamadi, M.; Guerrieri, M. Smart Intersections and Connected Autonomous Vehicles for Sustainable Smart Cities: A Brief Review. Sustainability 2025, 17, 3254. [Google Scholar] [CrossRef]
  6. Chen, C.; Sun, Y.; Sun, Z.; Wang, D.; He, X.; Cheng, B.; Liu, Y.; Yin, Y. Research on the Deterministic Ethernet Application for Manned Lunar Exploration. J. Astronaut. 2024, 45, 142–153. [Google Scholar]
  7. TARIQ, N.; PETRUNIN, I.; AL-RUBAYE, S. Analysis of Synchronization in Distributed Avionics Systems Based on Time-Triggered Ethernet. In Proceedings of the 2021 IEEE/AIAA 40TH Digital Avionics Systems Conference (DASC), San Antonio, AX, USA, 3–7 October 2021. [Google Scholar]
  8. ZHANG, X.; ZHAO, X. Architecture design of distributed redundant flight control computer based on time-triggered buses for UAVs. IEEE Sens. J. 2020, 21, 3944–3954. [Google Scholar] [CrossRef]
  9. Lu, J.; Xiong, H.; He, F.; Zheng, Z.; Li, H. A Mixed-Critical Consistent Update Algorithm in Software Defined Time-Triggered Ethernet Using Time Window. IEEE Access 2020, 8, 65554–65565. [Google Scholar] [CrossRef]
  10. Calabrese, M.; Curbo, J.; Falco, G. A Software Defined Networking Architecture for Time Triggered Ethernet in Space Systems. In Proceedings of the 2024 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), Daytona Beach, FL, USA, 16–18 December 2024. [Google Scholar]
  11. Ye, F.; Chen, Y.; Wang, T.; Ji, Y.; Luo, M.; Jiang, X. A load-balanced TTE scheduling method for large-scale message transmission. J. Sichuan Univ. 2022, 59, 6–14. [Google Scholar]
  12. Chen, C.; Zhao, A.; Zhang, Z.; Zhang, T.; Fan, C. Research on Multi-Agent Collaborative Scheduling Planning Method for Time-Triggered Networks. Electronics 2025, 14, 2575. [Google Scholar] [CrossRef]
  13. Zhang, X.; Fan, Y.; Zhou, S. Research progress on Time-Triggered Ethernet traffic scheduling. Telecommun. Eng. 2025, 65, 152–162. [Google Scholar]
  14. Steiner, W. An Evaluation of SMT-Based Schedule Synthesis for Time-Triggered Multi-hop Networks. In Proceedings of the Real-Time Systems Symposium, San Diego, CA, USA, 30 November–3 December 2010. [Google Scholar]
  15. Song, Z.; Li, Q.; Wang, J.; Xiong, H. Time-triggered scheduling table generation method based on schedulability ranking. J. Beijing Univ. Aeronaut. Astronaut. 2018, 44, 2388–2395. [Google Scholar]
  16. Wei, A.; Zhang, G.; Zhang, T. Research on time triggered ethernet scheduling planning method. In Proceedings of the 2020 4th International Conference on Machine Vision and Information Technology (CMVIT 2020), Sanya, China, 20–22 February 2020. [Google Scholar]
  17. Jian, J.; Wang, L.; Chen, H.; Nie, X. Scheduling optimization of time-triggered cyber-physical systems based on fuzzy-controlled QPSO and SMT solver. Energies 2020, 13, 668–690. [Google Scholar] [CrossRef]
  18. Yuan, H.; Wang, Y. A Hybrid Schedule Technology Based on Genetic Algorithm and Simulated Annealing for Time-Triggered Ethernet. In Proceedings of the 2022 IEEE 2nd International Conference on Information Communication and Software Engineering (ICICSE), Chongqing, China, 18–20 March 2022. [Google Scholar]
  19. Zhang, Y.; He, F.; Lu, G.; Xiong, H. Scheduling Rate-Constrained Flows with Dynamic Programming Priority in Time-Triggered Ethernet. Chin. J. Electron. 2017, 26, 849–855. [Google Scholar] [CrossRef]
  20. Zhang, Y.; He, F.; Lu, G.; Xiong, H. A modified weighted round robin scheduling algorithm in TTE. J. Beijing Univ. 2017, 43, 1577–1584. [Google Scholar]
  21. Finzi, A.; Craciunas, S. Integration of SMT-based scheduling with RC network calculus analysis in TTEthernet networks. In Proceedings of the 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Zaragoza, Spain, 10–13 September 2019. [Google Scholar]
  22. Yuan, H.; Wang, Y. A Time-Triggered Ethernet Optimal Scheduling Technology Based on Rapid Increment. Electron. Opt. Control. 2023, 30, 86–90+98. [Google Scholar]
  23. Dvořák, J.; Heller, M.; Hanzálek, Z. Makespan minimization of Time-Triggered traffic on a TTEthernet network. In Proceedings of the 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway, 31 May–2 June 2017. [Google Scholar]
  24. Lu, Y.; Xiong, X.; Wang, M.; Qin, J.; Pan, W. A Bandwidth Allocation Method of AVB Traffic Based on Link Load Balancing in TSN. J. South China Univ. Technol. 2023, 51, 1–9. [Google Scholar]
  25. Moutsinas, G.; Guo, W. Probabilistic Stability of Traffic Load Balancing on Wireless Complex Networks. IEEE Syst. J. 2020, 14, 2551–2556. [Google Scholar] [CrossRef]
  26. Falk, J.; Dürr, F.; Rothermel, K. Time-triggered traffic planning for data networks with conflict graphs. In Proceedings of the 2020 IEEE Real-Time and Embedded Technology and Applications Symposium, Sydney, Australia, 21–24 April 2020. [Google Scholar]
  27. Liu, M.; Yin, H.; Li, H.; Ji, X. An efficient scheduling algorithm for adjustable time slots in time-triggered ethernet. In Proceedings of the 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, 12–15 June 2019. [Google Scholar]
  28. Eramo, V.; Fiori, T.; Lavacca, F.G.; Valente, F.; Baiocchi, A.; Ciabuschi, S.; Albano, M.; Cavallini, E. A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks. Comput. Commun. 2023, 198, 85–97. [Google Scholar] [CrossRef]
  29. Wang, B.; Han, S.; Zhang, J.; Wu, J.; Meng, W. Research of Telemetry Communication Technology Based on TTE Time Triggered Ethernet. In Proceedings of the 2023 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Beijing, China, 14–16 June 2023. [Google Scholar]
  30. Arbelaez, A.; Mehta, D.; O’Sullivan, B.; Quesada, L. A constraint-based parallel local search for the edge-disjoint rooted distance-constrained minimum spanning tree problem. J. Heuristics 2018, 24, 359–394. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.