Next Article in Journal
Preparation and Performance of Biomimetic Zebra-Striped Wood-Based Photothermal Evaporative Materials
Next Article in Special Issue
Bio-Inspired Observability Enhancement Method for UAV Target Localization and Sensor Bias Estimation with Bearing-Only Measurement
Previous Article in Journal
A Gaussian Mixture Model-Based Unsupervised Dendritic Artificial Visual System for Motion Direction Detection
Previous Article in Special Issue
Comprehensive Adaptive Enterprise Optimization Algorithm and Its Engineering Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Routing and Scheduling in Time-Sensitive Networking by Evolutionary Algorithms

1
School of Artificial Intelligence, Jiaxing University, Jiaxing 314001, China
2
Technology Research and Development Centre, Xuelong Group Co., Ltd., Ningbo 315899, China
3
School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China
*
Authors to whom correspondence should be addressed.
Biomimetics 2025, 10(5), 333; https://doi.org/10.3390/biomimetics10050333
Submission received: 4 April 2025 / Revised: 13 May 2025 / Accepted: 16 May 2025 / Published: 20 May 2025

Abstract

:
Routing and scheduling in Time-Sensitive Networking (TSN) is an NP-hard problem. In this paper, we propose a novel routing and scheduling approach for TSN based on evolutionary algorithm. Specifically, we introduce a flow grouping method that leverages the greatest common divisor to optimize flow aggregation. On this basis, we develop a flow routing strategy that employs a genetic algorithm, where the evaluation function considers not only flow combinability but also path length and network load. By exploiting the non-combinable properties of flows, we effectively reduce the search space for the genetic algorithm. Furthermore, we design a scheduling method based on differential evolution algorithms tailored to TSN’s requirements of zero jitter and no frame loss. We propose a gene coding method and rigorously prove its correctness, which significantly reduces the search space of the differential evolution algorithm. The experimental results demonstrate that our approach enables more flows to traverse along the shortest path compared to both k-shortest path methods and integer linear programming approaches, while achieving a faster execution time in large-scale scheduling scenarios.

1. Introduction

With the rapid advancement of intelligent driving vehicle networks, the industrial Internet, and 5G communication technologies, an increasing number of data acquisition nodes and computing nodes have complicated network design and imposed significant data loads on communication links. Although the traditional Ethernet meets high bandwidth requirements and facilitates seamless connectivity among various specialized devices, it lacks essential real-time functionalities such as low jitter, minimal network latency, and efficient bandwidth allocation [1]. To address these limitations, the IEEE 802.1 standards have introduced a Time-Sensitive Networking (TSN) [2] solution that combines the cost-effectiveness and high-bandwidth capabilities of Ethernet with high-quality data transmission. Consequently, TSN-related technologies have garnered significant attention from both academia and industry. However, practical analysis and computation in TSN systems can become complex due to diverse network architectures and varying Quality of Service (QoS) requirements for different data flows. Studies indicate that routing and scheduling challenges within TSN are classified as NP-complete problems [3].
While most research has focused on addressing traffic scheduling using methods such as Satisfiability Modulo Theories (SMT) [4] and Integer Linear Programming (ILP) [5,6], these approaches often suffer from long solution times, limiting their practical applicability and scalability. In contrast, heuristic algorithms offer inherent scalability for solving routing and scheduling problems, leading to increased attention from researchers exploring TSN-based methods. In this paper, we focus on the routing and scheduling problem of TSN using evolutionary algorithms. A time-sensitive network routing and scheduling optimization scheme that deeply integrates genetic algorithm (GA) and differential evolution (DE) algorithms is proposed. Both evolutionary computing methods are inspired by the bionic simulation of biological evolution mechanisms. Genetic algorithms encode feasible routes as chromosomes, simulating the “survival of the fittest” principle in nature, and achieve iterative solution optimization through operations such as selection, crossover, and mutation. Differential evolution algorithms leverage the intelligent behavior of differentiated collaboration among biological populations, enhancing global search capabilities via vector differential perturbation. The synergy between the two algorithms mirrors the phenomenon of species coevolution in nature. Specifically, the genetic algorithm focuses on generating high-quality routing schemes, while the differential evolution algorithm refines the scheduling strategy, ultimately forming a bionic intelligent optimization framework. This approach not only demonstrates the robust adaptability of biological evolution principles in engineering optimization but also offers a novel bionic solution for complex constraint problems, such as those encountered in time-sensitive networks.
From the perspective of bionics, this method effectively translates the evolutionary intelligence of nature into engineering optimization tools. The fitness function in genetic algorithms mimics environmental selection pressure, the population cooperation mechanism in differential evolution replicates biological swarm intelligence, and the treatment of constraint conditions parallels the survival competition principle within an ecosystem. This bionic optimization strategy not only ensures the robustness of the algorithm in complex network environments but also, its hierarchical evolution architecture demonstrates self-organizing characteristics akin to those observed in biological systems. The research findings have comprehensively validated the practical significance of bionic intelligence theory in industrial communication systems, offering a critical methodological reference for the optimization of future intelligent networks.
The main contributions of our work are as follows.
(1)
We proposed an innovative approach for route selection in TSN using a genetic algorithm for each flow. A fitness function that incorporates multiple factors including flow combinability, route length, and network load is formulated to identify routes that enhance efficient implementation of scheduling. To reduce the search space of the GA, we developed a method to eliminate infeasible routes by leveraging flow combinability analysis.
(2)
An efficient method for finding a feasible scheduling solution for TSN based on differential evolution algorithm was developed. We proposed a straightforward and effective encoding scheme designed to substantially reduce the search space of the algorithm. Furthermore, we employ the differential evolution algorithm to tackle the feasible scheduling problem in TSN utilizing the number of constraints that must be satisfied by a feasible schedule as our objective function.
The rest of this paper is organized as follows. Section 2 provides a comprehensive review of the existing literature on the routing and scheduling of TSN. The route selection method based on the genetic algorithm is presented in Section 3. Section 4 details the scheduling approach for TSN that employs the differential evolution algorithm. The simulation results are analyzed in Section 5. Finally, Section 6 summarizes the findings of this study and outlines directions for future research.

2. Related Work

Real-time scheduling for TSN aims to determine a feasible network-wide configuration, including routing paths and schedules, which meets the end-to-end timing requirements of a given set of flows. In this section, we review related work on real-time scheduling of TSN. Existing work on time-sensitive network scheduling can be categorized into three distinct groups. The first category includes fixed route scheduling methods, which concentrate on determining the optimal routes for each flow to improve the scheduling success rate. The second category covers joint routing and scheduling (JRS) approaches, which aim to establish an integrated framework combining routing and scheduling while proposing solution strategies to tackle these associated challenges. The third category involves scheduling techniques for pre-determined routes, emphasizing the design of effective scheduling mechanisms to ensure flow schedulability once the routes are determined. We refer to these three categories as routing problems, joint routing and scheduling problems, and scheduling problems, respectively.

2.1. Routing

Greedy algorithms are widely employed to solve routing problems in TSN. By incorporating network performance metrics, researchers have developed various greedy algorithms to identify optimal route for each flow. For instance, A. Alnajim et al. proposed an incremental QoS-aware path selection algorithm that leverages QoS measurement to route TSN flows [7]. Shih-Hung Chang et al. proposed a real-time routing scheduler (RTRS) which determines both the shortest path and the path with the worst-case end-to-end delay (WCED) between source and destination nodes [8]. M. A. Ojewale et al. proposed selecting routes based on optimal load distribution among all valid paths [9]. Kai Huang et al. proposed a period-aware routing algorithm to alleviate scheduling bottlenecks, thereby accommodating a greater number of flows [10]. Despite their effectiveness, greedy algorithms suffer from an excessively large search space, leading to high time complexity. To address this issue, researchers have enhanced greedy algorithms through methods such as the K-shortest path approach [11] and the improved Dijkstra algorithm [12]. Additionally, heuristic search-based routing strategies have been proposed to effectively reduce the search space [13,14,15]. Moreover, some researchers have explored route selection methodologies using linear programming [16] and reinforcement learning [17,18], although these approaches demand substantial computational resources and runtime.

2.2. Joint Routing and Scheduling

The joint routing and scheduling approach offers the advantage of enabling integrated decision making for both the routing and scheduling of each flow. This integration enhances network resources utilization and improves schedulability. Integer Linear Programming and Satisfiability Modulus Theory can be employed to address the JRS problem, thereby minimizing the occurrences where the scheduling algorithm fails to find feasible solutions. The JRS problem can be formulated as an ILP model and solved using CPLEX and SMT solvers [19,20,21,22,23]. However, these methods are limited to small-scale problems due to their computational complexity, which increases significantly with the size of the problem. To address the challenges associated with large-scale JRS problems, researchers have explored alternative approaches. Xiaolong Wang et al. developed a greedy algorithm for JRS that incorporates load balancing [24]. Hao Yu et al. proposed a deep reinforcement learning-based deterministic flow scheduler to handle deterministic flow routing and scheduling [25]. N. Reusch et al. developed a novel way that integrates a simulated annealing metaheuristic with an ASAP list scheduling technique [26]. Jie Jia et al. proposed the two-level iterative JOORS algorithm, which is based on the differential evolution algorithm, to determine the injection time offset and routing strategies that maximize the scheduling success rate [27]. M. Pahlevan and R. Obermaisser et al. presented a genetic algorithm-based method for solving the JRS problem [28].

2.3. Scheduling

For the fixed route scheduling method, designing an efficient scheduling algorithm after the route has been computed is a critical issue. Many SMT and ILP formulations have been presented to determine a communication schedule based on precomputed routes [29,30,31]. A.A. Atallah et al. introduced a novel DoC-aware flow partitioning approach aimed at enhancing the success rate of iterated ILP-based scheduling [32]. However, due to the substantial computational demands associated with linear programming, researchers have increasingly focused on heuristic algorithms for scheduling methods. For instance, A. Berisa et al. proposed an AVB-aware heuristic scheduling algorithm which ensures the timely delivery of flows while optimizing the schedulability of AVB traffic [33]. M. Vlk et al. developed an Efficient Probing Instructed by Conflicts (EPIC)algorithm, which operates independently of third-party solvers [34]. F. Dürr et al. presented a Tabu search algorithm for efficient schedule computation and schedule compression technique to minimize the number of guard bands [29]. Mingwu Yao et al. presented a Mixed Initial Population Genetic Algorithm (MGA) to address the scheduling problem [35].

3. Routing Based on Flow Combinability

In this section, we present a routing method that is grounded in the concept of flow combinability. Initially, flows are grouped based on the greatest common divisor of their respective periods. Subsequently, a genetic algorithm is employed to facilitate routing according to flow combinability.

3.1. Flow Grouping Method Utilizing the Greatest Common Divisor

Kai Huang et al. demonstrated that if the greatest common divisor (GCD) of the periods of two flows is 1, it indicates a potential conflict when both flows traverse the same link, meaning these two flows cannot be combined [10]. In this paper, we categorize flows according to their GCDs, ensuring that uncombinable flows are separated into different groups. Furthermore, within any given group, the GCD of any two flows must be greater than 1.
Let F = { 1 , 2 , , m } be a set of flows. The flow grouping method based on the greatest common divisor is presented in Algorithm 1. In the first line, flows are sorted in ascending order by their periods, and the result is recorded as F _ s o r t . Lines 4 to 8 identify the flow i with the smallest period that has not yet been grouped within F _ s o r t . Lines 10 to 14 group the flows whose periods share a GCD greater than 1.
Algorithm 1. Flow Grouping Based on Greatest Common Divisor
Input: flow set F = { 1 , 2 , , m }
Output: flow grouping c l a s s f l o w
1 Sort the flows in descending order based on their periods, denoted as F _ s o r t = { i 1 , i 2 , , i m }
2 c l a s s f l o w =
3 while there exist ungrouped flows within F _ s o r t do
4        for  i = i 1 i m  do
5             if  i has not been grouped then
6                  break
7             end if
8          end for
9           c l a s s _ i = { i }
10        for  k = i 1 i m  do
11             if  k has not been grouped and g c d ( T i , T k ) 1 then
12                   c l a s s _ i = c l a s s _ i   { k }
13             end if
14         end for
15          c l a s s f l o w = c l a s s f l o w { c l a s s _ i }
16 end while
17 return  c l a s s f l o w

3.2. Route Selection Based on Genetic Algorithm

In this section, we present a routing method that utilizes a genetic algorithm [35]. This method is grounded in the definition of individual encoding, the construction of a fitness function for individuals, and the implementation of genetic operations. The tailored genetic algorithm is specifically designed to optimize the routing for each group of flows.

3.2.1. Individual Coding

Let c l a s s _ k denote the k -th group of c l a s s f l o w , which encompasses flows f 1 k , f 2 k , …, f n k . Each flow is associated with a corresponding set of feasible paths P S 1 , P S 2 , …, P S n . The individual encoding employs a decimal representation in which each gene bit corresponds to a selected feasible path for each flow. An example of the individual coding is illustrated in Figure 1. The variable n j represents the number of the path selected by flow f j k , where 1 j n .

3.2.2. Fitness Function

The individual fitness function serves as the foundation for evaluating the quality of an individual within a genetic algorithm. The calculation of the individual fitness value should consider four critical factors: (1) flow combinability, (2) link load, (3) path length, and (4) the number of remaining feasible paths.
Let x represent an individual in the population, and let the components x 1 , x 2 , , x n denote the number of paths chosen by these n flows. The corresponding paths are represented as p 1 x , p 2 x , , p n x , respectively. Following the methodologies established in the literature [10], we define the sum of weights of all flows passing through link ( u , v ) within the path selected by the k -th group of flows as S O W ( u , v ) . The formula for this calculation is presented in Equation (1).
S O W u , v = i ϵ F u , v x S i T i T i GCD u , v
where F u , v x = f i k u , v is the link on p i x , 1 i n denotes the set of flow, T i denotes the periods of i-th flow, and G C D ( u , v ) denotes the greatest common divisor of the periods of flows that traverse the link ( u , v ) .
When S O W ( u , v ) is larger, it indicates that the bandwidth of the link ( u , v ) is occupied by a greater number of flows. Consequently, the flow combinability on this link decreases, resulting in lower schedulability for these flows traversing the same link. Conversely, when S O W ( u , v ) is smaller, fewer flows occupy the bandwidth of the link ( u , v ) , thereby enhancing flow combinability for flows traversing the same link. This improvement facilitates higher schedulability for these flows as they pass through the same link.
However, if each flow exclusively prioritizes paths with high combinability during path selection, three potential issues may arise: (1) the number of network nodes that the time-triggered flow traversed might increase accordingly, thereby imposing a heavier load on the network; (2) this strategy could result in an excessive concentration of time-triggered flows passing through a single link; and (3) it might substantially reduce the number of remaining feasible paths for certain flows or even leave some flows without any viable paths. All these scenarios negatively affect the schedulability of the entire network. To address these challenges, the fitness function should consider S O W ( u , v ) , the total path lengths, the number of flows traversing link ( u , v ) , and the number of remaining feasible paths, simultaneously.
The total path lengths L x is calculated by Equation (2).
L x = i = 1 n ( u , v ) E I u , v p i
where I u , v p i is defined for 0 and 1 variables. If ( u , v ) is the link on p i x , I u , v p i = 1. Otherwise, I u , v p i = 0.
Definition 1.
The intersection of paths  p  and  q  is defined as follows: If there exists a link  ( u , v )  that is both a link on path  p  and  q , then p q , otherwise p q = .
Assume that all flows are categorized into h groups based on Algorithm 1. Let r k x denote the path chosen by each flow in group k , while r 1 , k 1 represents the paths selected by all flows from group 1 to group k 1 . We define N x as the total number of remaining feasible paths for all flows from group k + 1 to group h , which is contingent upon individual variable x . N x is calculated according to Equation (3).
N x = i = k + 1 h f c l a s s f l o w ( i ) p f l o w P a t h ( f ) K f , p r k x , r 1 , k 1
where c l a s s f l o w ( i ) represents the i -th flow group of classflow, and f l o w P a t h ( f ) consists of all simple paths associated with the flow f . K f , p r k x , r 1 , k 1 is utilized to evaluate whether the simple path p is a feasible route for these flows. For a given simple path p of flow f , if there exists a flow f * in the first k groups with an associated path p * , such that flows f and f * cannot be combined, and the intersection of paths p and p * is non-empty, then the simple path p is not a feasible path for flow f . K f , p r k x , r 1 , k 1 can be determined using Equation (4).
K f , p r k x , r 1 , k 1 = 0 f * , p * r k x r 1 , k 1 s a t i s f y gcd T f , T f * = 1   a n d   p p * 1 e l s e
Let f ( x ) denote the fitness function of individual x . The definition of f ( x ) is as follows:
f x = ( u , v ) E S O W u , v + α × ( u , v ) E F u , v x + β × N x + L x
The function f ( x ) is defined by four distinct formulas. The first formula quantifies the flow combinability, while the second reflects the magnitude of link load. The third formula indicates the number of remaining feasible paths, and the fourth assesses the length of the selected route path. Here, α represents a penalty factor associated with the total flow traversing through link ( u , v ) ; whereas β denotes a penalty factor related to the count of available remaining paths.

3.2.3. Feasible Path for Flow

Since two uncombinable flows traversing the same link will inevitably collide, effective scheduling in time-sensitive networks cannot be guaranteed. As a result, not all simple paths for a flow within the network are feasible. For instance, if the route selected by flow j includes link ( u , v ) , and flow i is incompatible with flow j , then any path for flow i that contains link ( u , v ) becomes invalid. Consequently, it is essential to determine which paths are feasible for each specific flow. This section presents the methodology for identifying such feasible paths.
Let us first define a function named Optional Path Set Construction, which is designed to identify a simple path that does not contains specified link. The detailed implementation of this function is presented in Algorithm 2. The function determines whether each simple path in flow i includes any link from the set of a b l i s t (line 2~12). If a simple path contains a link from the a b l i s t , this path is marked with 0. Otherwise, it is marked with 1. Subsequently, the marker of each simple path of flow i is analyzed, and the path designated with the value of 1 is considered an optional path for flow i (line 13~16). If a simple path contains a link from the a b l i s t , this path is marked with 0. Otherwise, it is marked with 1. Subsequently, the marker of each simple path of flow i is analyzed, and the path designated with the value of 1 is considered an optional path for flow i (line 13~16).
Algorithm 2 Optional Path Set Construction
Input: A simple path set of f l o w P a t h , flow i , a link set of a b l i s t
Output: Optional path for flow i
1 f e a s p a t h = , f e a s p a t h f l a g =
2 for  k = 1 l e n ( f l o w P a t h [ i ] )  do
3        f l a g = 1
4      for   j = 1 l e n ( a b l i s t )  do
5             a = a b l i s t [ j ] [ 0 ]
6             b = a b l i s t [ j ] [ 1 ]
7            if  ( a , b )  in  f l o w P a t h [ i ] [ k ]  then
8                   f l a g = 0
9            end if
10      end for
11       f e a s p a t h f l a g = f e a s p a t h f l a g { f l a g }
12 end for
13 for  k = 1 l e n ( f e a s p a t h f l a g )  do
14      if  f e a s p a t h f l a g [ k ] = 1  then
15              f e a s p a t h = f e a s p a t h { f l o w P a t h [ i ] [ k ] }
16      end if
17 end for
18 return  f e a s p a t h
Based on Algorithm 2, we propose a function referred to as Feasible Path Set Construction, as shown in Algorithm 3, which is specifically designed to identify the feasible paths for each flow within the k -th group of c l a s s f l o w . This function consists of five parameters: the simple path for all flows ( f l o w P a t h ), the flows set ( F ), the flows grouping ( c l a s s f l o w ), the order number of groups ( k ), and the selected paths of all flows in the preceding k 1 group ( h a v e s e l e c t ). When k = 1 , there are no selected paths for flow, that is, h a v e s e l e c t = . Consequently, the feasible paths for each flow within this group comprise all its simple paths in the network. When k > 1 , lines 9 to 25 of the function are employed to identify the feasible path for each flow within the group. Firstly, we obtain a flow from group k , denoted as a (line 12). Additionally, we acquire a flow from the set of h a v e s e l e c t , represented as b (line 13). If a and b cannot be combined, each link along the path of flow b is added to the set of a b l i s t (line 14~21). Subsequently, Function 1 is invoked to identify a viable path for flow a (line 23).
Algorithm 3 Feasible Path Set Construction
Input:  f l o w P a t h ,  F , c l a s s f l o w , k , h a v e s e l e c t
Output: Feasible path for each flow within the k -th group
1 f e a s p a t h l i s t =
2 if k = 1 then
3          for   i = 1 l e n ( c l a s s f l o w [ k ] )  do
4                 j = c l a s s f l o w [ k ] [ i ]
5                 f e a s p a t h l i s t = f e a s p a t h l i s t f l o w P a t h [ j ]
6          end for
7          return  f e a s p a t h l i s t
8 end if
9 for  i = 2 l e n ( c l a s s f l o w [ k ] )  do
10      a b l i s t =
11     for  j = 1 l e n ( h a v e s e l e c t )  do
12           a = c l a s s f l o w [ k ] [ i ]
13           b = h a v e s e l e c t [ j ] [ 0 ]
14          if  g c d ( T a ,   T b ) = 1  then
15                  p a t h = h a v e s e l e c t [ j ] [ 1 ]
16                 for  x = 1 l e n ( p a t h )  do
17                        if  [ p a t h [ x ] ,   p a t h [ x + 1 ] ] not in a b l i s t  then
18                                a b l i s t = a b l i s t [ p a t h [ x ] ,   p a t h [ x + 1 ] ]
19                        end if
20                 end for
21          end if
22     end for
23      t e m p l i s t = f e a s i b l e _ p a t h ( f l o w P a t h ,   c l a s s f l o w [ k ] [ i ] ,   a b l i s t )
24      f e a s p a t h l i s t = f e a s p a t h l i s t   t e m p l i s t
25 end for
26 return  f e a s p a t h l i s t

3.2.4. Route Selection Algorithm

We present a route selection method for each flow using a genetic algorithm, as detailed in Algorithm 4. This algorithm employs a set named h a v e s e l e c t to record the paths chosen by each flow, with this set being initially as empty. The k-th iteration of the algorithm’s outer loop focuses on identifying the route for the flow within the group k . Each iteration starts by invoking the Feasible Path Set Construction function to determine the feasible paths for each flow within group k (line 3). Subsequently, the parameters of the genetic algorithm are initialized, and the initial population is generated (line 4~5). The inner loop executes genetic operations such as selection, crossover, and mutation, while also updating the best individual (line 6~9). Once the paths for group k have been determined, the h a v e s e l e c t set is updated accordingly (line 10).
Algorithm 4 Route selection based on genetic algorithm
Input: the simple path for all flows ( f l o w P a t h ), flows set ( F ), flows grouping ( c l a s s f l o w )
Output: Route for each flow
1 h a v e s e l e c t =
2 for  k = 1 l e n ( c l a s s f l o w )  do
3          f e a s p a t h l i s t = c o m p u t e _ f e a s p a t h l i s t ( f l o w P a t h ,   F ,   c l n a s s f l o w ,   k ,   h a v e s e l e c t )
4         Initialize population size, crossover probability, mutation probability
5         Initialize the population and calculate the optimal individual
6         for  i = 1 m a x i t e r  do
7              Implement selection, crossover and mutation operations
8              Update the optimal individual
9         end for
10       Update h a v e s e l e c t based on the optimal individual
11 end for
12 return  h a v e s e l e c t

4. Scheduling for TSN Based on Differential Evolution Algorithm

4.1. Scheduling Problem and Modeling

In the preceding section, we have introduced a routing selection method that considers flow combinability. Once the routing for all flows has been established, it becomes crucial to determine the transmission timing of each frame within every flow at each node along its path, ensuring that all frames of each flow can be transmitted and received within the designated time during the super period, while also guaranteeing that no two transmissions on a link (in the same direction) overlap. This concept is referred to as network scheduling.
In this section, we propose a novel approach to find a feasible scheduling scheme for TSN based on the differential evolution algorithm. We assume that the time sensitive network satisfies zero jitter and no frame loss. Let the path of flow i be denoted as p i = n 1 i n 2 i , , n l i i . The duration required to transmit flow i from any given node to its adjacent nodes is represented as W i . The latest deadline by which the listener must acquire the data is denoted as D i . The period of flow i is indicated by T i and the hyper-period of the network is represented as H P . Let S k , t i denote the sending time of the t-th frame for flow i at the k-th node. A feasible scheduling solution of TSN must satisfy the following four constraints:
(1) Precedence Constraint
A frame transmission along the path must satisfy the precedence constraint, meaning that the transmission time of a frame at node k + 1 cannot be earlier than the sum of the transmission time of the frame at node k and the propagation delay between two adjacent nodes. This constraint can be described by Formula (6).
S k + 1 , t i S k , t i + W i
where 1 k l i 1 , l i represents the total number of nodes traversed by flow i along its path.
(2) Deadline Constraint
The time interval between the listener and the talker node must not exceed D i . This constraint can be described by Formula (7).
S l i 1 , t i + W i S 1 , t i D i
(3) Period Constraint
The reception time of the final frame in flow i must not surpass the hyper-period. This constraint can be described by Formula (8).
S l i 1 , H P T i i + W i H P
(4) Resource Constraint
For each pair of different frames on a link, one frame must be transmitted only after the preceding frame has been fully transferred. For any two flow i 1 and i 2 , if both flows traverse the link ( u , v ) , any α { 0 , 1 , , l c m T i 1 , T i 2 T i 1 } and any β { 0 , 1 , , l c m T i 1 , T i 2 T i 2 } must satisfy the following constraint:
S u , 1 i 1 + α · T i 1 S u , 1 i 2 + β · T i 2 + W i 2   S u , 1 i 2 + β · T i 2 S u , 1 i 1 + α · T i 1 + W i 1
where i 1 < i 2 .
Theorem 1.
If the transmission time of the first frame of flow i satisfies the precedence constraint, it follows that the transmission time of the t-th frame of flow i also satisfies the precedence constraint, where 2 t H P T i .
The proof is given in Appendix A.1.
Theorem 2.
If the first frame of flow  i  satisfies the deadline constraint, the t-th frame of flow i  also satisfies the deadline constraint, where  2 t H P T i .
The proof is given in Appendix A.2.
Theorem 3.
If  S 1,1 i + H P T i 1 · T i + ( l i 1 ) · W i H P , flow i meets the period constraint.
The proof is given in Appendix A.3.
Theorem 4.
Let the paths of flows  i 1  and i 2 share a common link ( u ,   v ) , where the serial number of node  u  on the path of flow  i 1  is denoted as k 1 ,  and the serial number of node  v  on the path of flow  i 2  is denoted as  k 2 . The expression of Formula (9) can be equivalently represented as Formula (10), which is detailed as follows:
S 1,1 i 1 + k 1 1 · W i 1 + α · T i 1 S 1,1 i 2 + k 2 1 · W i 2 + β · T i 2 + W i 2 S 1,1 i 2 + k 2 1 · W i 2 + β · T i 2 S 1,1 i 1 + k 1 1 · W i 1 + α · T i 1 + W i 1
The proof is given in Appendix A.4.
According to the conclusions drawn from the aforementioned four theorems, it is sufficient to determine the transmission time of the first frame of each flow at the talker. Subsequently, we can compute the transmission times for this frame at other nodes and ascertain the transmission times for additional frames at each node. This process enables us to evaluate whether scheduling is feasible. Consequently, our scheduling algorithm requires only solving for the transmission time of the first frame at the talker. Thus, this approach significantly reduces the complexity associated with addressing this problem.
Theorem 5.
Let n 1 , n 2 , , n m  represent the number of nodes in the path of flow  i 1 , i 2 , , i m ,  respectively. Assume that for the links ( u 1 , v 1 ), ( u 2 , v 2 ), …, ( u h , v h ), each link carries two or more flows, denoted respectively as { i 1 1 , i 2 1 , … , i k 1 1  },{ i 1 2 , i 2 2 , … , i k 2 2  }, …,{ i 1 h , i 2 h , … , i k h h  }. Let the number of constraints that a feasible scheduling must satisfy be denoted as CN. Consequently, it follows that the value of CN is equivalent to the value presented in Formula (11).
i = 1 m n i 2 + 2 m + j = 1 h x = 1 k j y = 1 x y k j [ l c m ( T i x j , T i y j ) ] 2 T i x j · T i y j
The proof is given in Appendix A.5.

4.2. Gene Coding

According to Theorems 1 to 4, once the transmission time of the first frame in a flow at the sending node is established, it becomes possible to determine the transmission times for all frames within that flow across each node. Subsequently, this allows us to assess whether the scheduling of the flow adheres to relevant constraints. Therefore, the problem of scheduling in time-sensitive networks fundamentally revolves around determining the transmission time of the first frame for each flow at its respective talker. To address this issue, we can represent the time-sensitive network scheduling encoding for flows i 1 , i 2 , , i m as a real number encoding with a length of m, as shown in Figure 2.
According to the genetic code, the solution to scheduling problem fundamentally involves determining the transmission time of the first frame for each flow at the talker. A larger range of transmission time results in an extended algorithmic solution time, whereas a smaller range leads to a reduced solution time. We present the following theorem concerning the upper limit of this value.
Theorem 6.
Given that the path of flow  i k  is denoted as p i k  = n 1 i k n 2 i k , , n l i k i k , the duration required to transmit flow  i k  from any given node to its adjacent nodes is represented as W i k , and the deadline of flow i k  is denoted as D i k , it can be concluded that value of  S i k  must not surpass  D i k W i k · ( l i k 1 )  , where 1 k i m .
The proof of is given in Appendix A.6.
To ascertain whether the flow scheduling adheres to the relevant constraints, it is essential to determine the transmission time of each flow at every node. Let us denote the transmission time of the first frame of flow i at the talker n 1 i as S i . Consequently, the transmission times for this frame at nodes n 2 i , , n l i 1 i can be expressed as S i , S i + W i , …, and S i + ( l i 2 ) W i , respectively. Therefore, based on the encoding S i 1 , S i 2 , ,  S i m 1 , S i m , each flow can be derived at each node during transmission time.
Let X = [ S i 1 , S i 2 , , S i m ] represent the sending times of the first frame of each flow at the talker. The transmission times for each flow at every node are determined using Algorithm 5. Let Y be utilized to store the transmission times of each flow across all nodes. A for loop is employed to traverse through each flow, where X [ k ] denotes the transmission times of flow i k at the talker. The while loop is designed to compute the transmission times for the subsequent nodes of flow i k (line 5~8). Here, W i k signifies the transmission time of flow i k in an adjacent node.
Algorithm 5 Computing the transmission time of each frame at every node along its path
Input: The transmission time of the first frame X
Output: The transmission time of each frame at every node along its path Y 1 Y = [   ]
2 for   k = 1 m  do
3          Y .append( X [ k ] )
4          j = 1
5         while  j < = l e n ( p i k ) 1  do
6              Y.append( Y [ l e n ( Y ) ] + W i k )
7               j = j + 1
8         end while
9 end for
10 return  Y

4.3. The Fitness Function and Its Calculation

According to Theorem 5, we gain insight into the number of constraints that a feasible scheduling solution must fulfill. Consequently, we regard the quantity of satisfiable constraints as the fitness function for the differential evolution algorithm. The fitness function is defined as Equation (12).
f X = ϕ X + ω X + η X + σ ( X )
where ϕ ( X ) represents the number of constraints that individual X satisfies the precedence constraint, ω ( X ) denotes the number of constraints that X meets the deadline constraint, η ( X ) indicates the number of constraints that X satisfies period constraint, and σ ( X ) signifies the number of constraints that X adheres to with respect to the resource constraint.
If a link is traversed by multiple flows, it is referred to as a shared link. The key of determining the value of f ( X ) lies in calculating the quantity of constraints that X meets the resource constraint. In order to compute the number of constraints that X satisfies the resource constraint, we must identify all shared links. Firstly, an algorithm is developed to address the link information according to the path of all flows, as detailed in Algorithm 6. The link information is represented by a three-tuple: [ i r , ( p r , j , p r , j + 1 ) , n u m ] , where i r denotes the flow number, ( p r , j , p r , j + 1 ) represents the j-th link on path p r , and n u m denotes the number associated with this link. Each iteration of the outer loop begins by calculating the length of the path (line 3). Subsequently, it obtains every link of the path and assigns its numerical identifiers (line 4~7).
Algorithm 6 Deriving Link Information
Input:  Flow   i 1 ,   i 2 , , i m and its path p 1 ,   p 2 , , p m
Output: Link information p a t h _ i n f o r
1 p a t h _ i n f o r = φ , n u m = 1
2 for  r = 1 m  do
3          k = l e n ( p r )
4         for  j = 1 k  do
5               p a t h _ i n f o r = p a t h _ i n f o r   { [ i r ,   ( p r , j ,   p r , j + 1 ) ,   n u m ] }
6               n u m = n u m + 1
7         end for
8 end for
9 return  p a t h _ i n f o r
Given flow i 1 , i 2 , , i m and its path p 1 , p 2 , , p m , we present a way to obtain shared links based on the link information, which is determined by Algorithm 6. Algorithm 7 provides a detailed description of the process for identifying shared links. In each iterate, creating a temporary set named t e m p and this set contains the iterated tuple (line 2). It then retrieves the flow and the link associated with this tuple (line 3~4). Subsequently, it examines the flow and the link present in other tuples. If two different flows share a common link, such a tuple is added to t e m p (line 6~12). In cases where multiple elements exist within t e m p , it is incorporated into the set of c o n f l i c t _ i n f o r (line 14~16).
Algorithm 7 Finding Shared Link
Input: Link information p a t h _ i n f o r
Output: The set of shared link c o n f l i c t _ i n f o r
1 for  i = 1 l e n ( p a t h _ i n f o r )  do
2         t e m p = { p a t h _ i n f o r [ i ] }
3         f 1 = p a t h _ i n f o r [ i ] [ 0 ]
4         l 1 = p a t h _ i n f o r [ i ] [ 1 ]
5         j = i + 1
6        while  j < = 1 l e n ( p a t h _ i n f o r )  do
7                 f 2 = p a t h _ i n f o r [ j ] [ 0 ]
8                 l 2 = p a t h _ i n f o r [ j ] [ 1 ]
9                if  f 1 f 2 and l 1 = l 2  then
10                      t e m p = t e m p { p a t h _ i n f o r [ j ] }
11              end if
12              j = j + 1
13       end while
14       if  l e n ( t e m p ) > 1  then
15               c o n f l i c t _ i n f o r = c o n f l i c t _ i n f o r t e m p
16       end if
17 end for
18 return  c o n f l i c t _ i n f o r
Based on the shared link derived from Algorithm 7, we present the algorithm for calculating the value of f ( X ) , as illustrated in Algorithm 8. Firstly, Algorithm 5 is applied to compute the transmission time of each frame at every node along its path (line 2). Then, the corresponding subscript in Y for the transmission time of flow i k at its talker is determined (line 4). Subsequently, the quantity of the precedence constraint that a flow must satisfy is calculated (lines 6–9), the quantity of the deadline constraint that a flow must meet is established (line 10), and the quantity of the period constraint that a flow must adhere to is evaluated (lines 11–13). For each set within the c o n f l i c t _ i n f o r , consider any two tuples contained in that set. First, extract the flow associated with these two tuples. Subsequently, obtain the corresponding subscript in Y for the transmission time of both flows at the talker (line 19~20). Finally, whether flows i x and i y satisfy the resource constraint is assessed and the quantity of this constraint is computed (line 21~27).
Algorithm 8 Computing the fitness of individual
Input: Individual X
Output: The fitness of individual
1 s u m = 0
2 Computing the transmission time of each frame by Algorithm 5 and store it in Y
3 for  k = 1 m  do
4       if  k = 1  then  j = 1  else  j = j + l e n ( p i k ) 1  end if
5        t = j , s = j
6       while  t < = j + l e n ( p i k ) 1  do
7              if  Y [ t ] > = Y [ t 1 ] + W i k    then  s u m = s u m + 1  end if
8               t = t + 1
9       end while
10     if  Y [ t 1 ] + W i k Y [ s ] < = W i k  then  s u m = s u m + 1  end if
11     if  Y s + H P T i k 1 * T i k + l e n p i k W i k H P  then
12             s u m = s u m + 1
13     end if
14 end for
15 for  e a c h  in  c o n f l i c t _ i n f o r  do
16   for  t u p l e 1  in  e a c h  do
17     for  t u p l e 2  in  e a c h  do
18            if  t u p l e 1 t u p l e 2 then
19               i x = t u p l e 1 [ 1 ] ,   i y = t u p l e 2 [ 1 ]
20               x 1 = t u p l e 1 [ 3 ] ,   x 2 = t u p l e 2 [ 3 ]
21              for  k 1 = 0 l c m ( T i x ,   T i y ) / T i x 1  do
22                for  k 2 = 0 l c m ( T i x ,   T i y ) / T i y 1  do
23                  if  Y [ x 1 ] + k 1 T i x > = Y [ x 2 ] + k 2 T i y + W i y   o r   Y [ x 2 ] + k 2 T i y > = Y [ x 1 ] + k 1 T i x + W i x  then
24                     s u m = s u m + 1
25                  end if
26                end for
27              end for
28            end if
29     end for
30   end for
31 end for
32 return  s u m

4.4. Optimization Objective of Differential Evolution Algorithm

Based on the preceding analysis, it can be concluded that if the value of f ( X ) equals to the number of constraints C N that a feasible scheduling solution must satisfy, then the individual X is indeed a feasible scheduling solution. Therefore, we utilize a differential evolution algorithm to maximize the value of f ( X ) . During the iterative process of this algorithm, the execution will terminate under one of two conditions: either f ( X ) equals C N , or the maximum iteration limit is reached. Upon completion of the algorithm, if f ( X ) equals C N , we provide the scheduling results for each flow based on X . Conversely, if f ( X ) < C N , it indicates that the algorithm cannot find a feasible scheduling for TSN.

4.5. Differential Evolution Algorithm for TSN Scheduling

The differential evolution algorithm is an efficient global optimization algorithm [36]. Additionally, it is a population-based heuristic search algorithm, where each individual within the population represents a solution vector. The evolutionary process of differential evolution closely resembles that of genetic algorithms, involving mutation, crossover, and selection operations. However, the specific definitions and implementations of these operations differ significantly from those in genetic algorithms.

4.5.1. Scheduling Coding

Given that the scheduling coding of flows i 1 , i 2 , , i m is represented as [ S i 1 , S i 2 , , S i m ], according to Theorem 6, the value range of S i k extends from 0 to D i k W i k · ( l i k 1 ) , where 1 k m . The initial values of the component S i k is computed using the following formula:
S i k = r a n d i n t ( 0 , D i k W i k · ( l i k 1 ) )
Here, r a n d i n t ( a , b ) denotes a random integer between a and b .

4.5.2. Operators of Differential Evolution Algorithm

The operations of differential evolution algorithms include mutation, crossover, and selection operations.
(1) Mutation
For each individual xi within the population, its mutation vector is generated based on the following formula:
v i = x r 1 + F · ( x r 2 x r 3 )
where x r 1 , x r 2 , x r 3 were randomly selected from the population and i r 1 r 2 r 3 . The parameter F is utilized to regulate the extent of bias amplification. In this paper, we employ an adaptive adjustment strategy for the F value as follows:
γ = 1 m a x i t e r m a x i t e r + 1 k
F = F 0 · 2 γ
where m a x i t e r is the maximum number of iterations of DE algorithm, k is the number of iterations, and F 0 0.2 , 0.5 . F 0 usually takes 0.4.
(2) Crossover
The objective of crossover is to recombine the components of an individual x i and its mutation individual v i in order to generate a new individual. The crossover process is conducted as follows:
u i , j = v i , j   r C R     r a n d i n t 1 , D = j u i , j   r > C R     r a n d i n t 1 , D j
where CR is the crossover probability and D is the number of individual components.
(3) Selection
According to the greedy criterion, the differential evolution algorithm compares the new individual u i and the original individual x i obtained by mutation and crossover, and the one with the highest fitness value is selected as the individual of the next generation of the population. The selection is as follows:
x i t + 1 = u i t f u i t > f x i t x i t e l s e

5. Simulation Experiment

In this section, we evaluate the validity of the proposed flow-combinability-based genetic algorithm for routing in TSN and the developed differential evolution algorithm for scheduling in TSN. Specifically, we compare the proposed algorithm with the shortest path-based ILP method [29] denoted as SP-ILP, the degree of conflict (DoC)-aware flows partitioning-based ILP method [32] denoted as DA-ILP, and the joint routing and scheduling (JRS)-based ILP method [37] denoted as JRS-ILP. The proposed algorithm was implemented using Python 3.8, and all simulations were executed on a PC equipped with an Intel® Core (TM) i7-10510U CPU (1.80 GHz base frequency, boosting up to 2.30 GHz) 16 GB RAM, and running Windows 10.

5.1. TSN with Each Flow Has a Unique Shortest Path and All Flows Can Be Combined

In this series of experiments, we investigate whether each flow in TSN can transmit information via the shortest path and be successfully scheduled, assuming that the shortest path for each flow is unique and all flows are combinable.

5.1.1. Experiment 1

In this case, we first examine a small-scale mesh network illustrated in Figure 3, which has three switches, five end stations, and three flows. The set of flows is defined as F = { 0 , 1 , 2 } , with their corresponding parameters detailed in Table 1. The delay of the switch is 1 unit. For flow0, the transmission time between adjacent nodes is 35 units; conversely, both flow1 and flow2 have a transmission time of 24 units between adjacent nodes.
The proposed method effectively schedules each flow via the shortest path. The Gantt chart depicting the schedule is presented in Figure 4, where flow0, flow1, and flow2 are indicated by blue, red, and purple, respectively. In this experiment, all flows can be successfully scheduled using SP-ILP, DA-ILP, and JRS-ILP methods.

5.1.2. Experiment 2

In this case, we examine a line network illustrated in Figure 5, which has eight switches, eight end stations, and nine flows. The set of flows is defined as F = { 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 } , with their corresponding parameters detailed in Table 2. Each switch incurs a delay of 1 unit, and each flow is transmitted between two adjacent nodes with a transmission time of 24 units.
The proposed method effectively schedules each flow by utilizing the shortest path. As illustrated in Figure 6 through a Gantt chart, flows 0 to 8 are respectively indicated by cyan, blue, sky-blue, purple, pink, orange, black, brown, and red. In this scenario, each flow follows a distinct path. Moreover, due to the seamless integration of all flows, it is evident that each flow can also be scheduled using DE, SP-ILP, DA-ILP, and JRS-ILP methods.

5.1.3. Experiment 3

In this case, we examine a ring network illustrated in Figure 7, which has 18 switches, 18 end stations, and 10 flows. The set of flows is defined as F = { 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 } , with their corresponding parameters detailed in Table 3. Each switch incurs a delay of 1 unit, and each flow is transmitted between two adjacent nodes with a transmission time of 35 units.
The method proposed in this paper ensures that each flow is scheduled along the shortest path with a probability of 100%. Specific routing details for each flow are provided in Table 3. Additionally, the Gantt chart depicting the schedule is shown in Figure 8, where flows 0 to 9 are represented by cyan, blue, sky-blue, purple, pink, orange, black, brown, red, and green, respectively.
In this case, all flows can be effectively combined, and each flow is successfully scheduled using the proposed method, as well as the SP-ILP method and the JRS-ILP method. However, it is important to note that the JRS-ILP method without optimization of path length does not guarantee the successful scheduling of each flow along the shortest path. The DA-ILP method could not find a feasible solution, as the DoC-aware routing method is not always stable.

5.2. TSN with Each Flow Has a Unique Shortest Path but Not All Flows Can Be Combined

In this section, we investigate the TSN scenario where each flow is assigned a unique shortest path, yet not all flows can be combined. Specifically, our aim is to quantify the number of flows that can successfully transmit information via their shortest path, assuming that each flow is scheduled without conflict.
In this experiment, we examine a mesh network illustrated in Figure 9, which has 12 switches, 12 end stations and 5 flows. The set of flows is defined as F = { 0 , 1 , 2 , 3 , 4 } , with their corresponding parameters detailed in Table 4. Each switch incurs a delay of 0.1 units, and the transmission time between two adjacent nodes for each flow is 1 unit.
According to Algorithm 4, the path selected by flow0 corresponds to the second shortest path, specifically: 1-13-12-16-17-18-19-7. By contrast, all other flows adopt the shortest paths. Moreover, four flows transmit data via the shortest path. Based on these routing results, effective flow scheduling can be achieved by applying Algorithm 8. The Gantt chart depicting this schedule is shown in Figure 10, where flow0 is indicated in red, flow1 in blue, flow2 in green, flow3 in black, and flow4 in orange.
The shortest paths for both flow0 and flow1 include the links (14,15). However, it is not possible to combine flow0 and flow1. Consequently, the successful implementation of flow scheduling under the routing policy based solely on the shortest path cannot be achieved, leading to a probability of successful scheduling of zero.
In this instance, the SP-ILP method and DA-ILP method could not find a successful schedule. The reason is that, whether it is the SP-ILP method or the DA-ILP method, they both belong to the fixed route scheduling method, that is, the implementation adopts a specific method to set a fixed route for each flow before scheduling, without comprehensively considering the route and scheduling. However, regarding the JRS-ILP method without optimization of path length, while it is true that every flow can be scheduled successfully during each run, there is no assurance that the number of flows transmitting messages over the shortest path will simultaneously reach four.

5.3. TSN with Some Flows Have Multiple Shortest Paths and Not All Flows Can Be Combined

In this section, we explore the TSN scenario in which certain flows have multiple shortest paths available, and not all flows can be simultaneously combined. We mainly evaluate the probability of successfully scheduling each flow along its shortest path. To illustrate this, we analyze a mesh network depicted in Figure 11, which has 12 switches, 10 end stations, and six flows. The set of flows is defined as F = { 0 , 1 , 2 , 3 , 4 , 5 } , with their corresponding parameters detailed in Table 5. In this setup, each switch incurs a delay of 0.1 units, and the transmission time between two adjacent nodes for each flow is 1 unit.
The shortest path for flow1 includes the links (13,14). Since flows 1 and 0 are not combinable, if flow1 transmits a message via its shortest path, flow0 is unable to utilize any of its shortest path that contain the link (13,14). Similarly, the shortest path for flow2 comprises the link (19,20). Given that flows 2 and 0 are also non-combinable, flow0 cannot send messages through any of its shortest paths containing link (19,20) while flow2 is active. For flow5, its shortest path consists of the link (18,17), since flows 5 and 3 are non-combinable as well. flow5’s transmission along this route prevents flow3 from using any of its shortest paths containing (18,17). If flow3 transmits its message via the shortest path involving (21,14), then flow0 is again precluded from sending messages via this route because both remaining shortest paths available to it include these same links. Thus far, it has been established that flow3 can only transmit messages through an alternative route: 8-18-21-16-15-5. Notably, one of the two shortest paths for flow0 includes (18,21), and since flow0 and flow3 are not combinable, flow0 can only send messages via the shortest path 0-10-11-20-21-14-4. Therefore, the scheme in which every flow is capable of transmitting messages via its shortest path is unique.
Based on the shortest path method, if a unique shortest path exists, it must be selected. When multiple shortest paths are available, one is randomly chosen as the flow route. Given that the scheme where every flow transmits messages via the shortest path is unique, the probability of successfully scheduling each flow along the shortest path using the shortest path method [11] is calculated as 1 6 × 1 3 = 1 18 .
Based on the two-shortest path method, we calculate the probability that the shortest path for flow0, which includes the link (18,21), is chosen as an alternative path. The total number of combinations for selecting two paths from a set of six paths is given by C 6 2 . Among these combinations, there are five combinations that include the link (18,21). Therefore, the probability of selecting a path containing (18,21) as an alternative path can be expressed as 5 C 6 2 = 1 3 . Similarly, we assess the probability that the shortest path for flow3, which contains the link (18,17), is selected as an alternative path. In this case, there are two valid combinations out of C 3 2 possibilities. Thus, this probability can be calculated as 2 C 3 2 = 2 3 . Consequently, using this method, the overall probability that all flows can be successfully scheduled utilizing their respective shortest paths is computed to be 1 3 × 2 3 = 2 9 .
Based on the three-shortest path method, the probability of selecting the shortest path of flow0, which includes the link (18,21), as the alternative path can be calculated as follows. The total number of combinations for selecting three paths from out of six paths is represented by C 6 3 . Simultaneously, the number of combinations that include the link (18,21) is denoted by C 5 2 . Therefore, the probability of selecting a path containing (18,21) as an alternative path can be expressed as: C 5 2 C 6 3 = 1 2 . Similarly, for flow3, whose shortest path includes the link (18,17), this specific path is selected as an alternative with a probability of 1. Consequently, under this method, the probability that each flow can be successfully scheduled using one of the shortest paths is 0.5.
The proposed method in this paper ensures that each flow is scheduled along the shortest path with a probability of 1. As illustrated in Figure 12, the Gantt chart shows the schedule, where flow0, flow1, flow2, flow3, flow4, and flow5 are represented by red, blue, green, black, orange, and purple, respectively. The SP-ILP method and DA-ILP method could not find a successful schedule in this experiment.

5.4. Runtime

Table 6 describes the comparison of the runtime of the GA-DE method proposed in this paper with the SP-ILP, DA-ILP, and JRS-ILP methods in the designed five experiments. It can be seen that with the differences in network scale and traffic characteristics, the SP-ILP method cannot find feasible solutions in Experiment 4 and Experiment 5, and the DA-ILP method cannot find feasible solutions in Experiment 3, Experiment 4, and Experiment 5. The reasons have been analyzed in the previous text. Both the JRS-ILP method and the GA-DE method proposed in this paper can find feasible solutions in all experiments. In terms of the running time of the algorithm, with the expansion of the network scale and the increase in the amount of traffic, the running time of the JRS-ILP method will increase sharply because the number of constraints that need to be solved increases exponentially. However, the GA-DE method proposed in this paper does not have this problem.

5.5. Discussions

The routing and scheduling problem for critical flow in time-sensitive networks has consistently been a focal point of research. Existing studies predominantly address the routing and scheduling challenges either by jointly solving them using SMT or ILP solvers, or by first performing pre-routing with techniques such as shortest path or conflict-aware methods, followed by solver-based scheduling. However, as the network size and the number of time-sensitive flows increase, the number of constraints required to be established by SMT and ILP methods grows exponentially, leading to prolonged solution times and, thereby, restricting their practical applicability and scalability. In contrast, while heuristic algorithms like bio-evolutionary algorithms exhibit relatively high computational complexity, their complexity does not escalate dramatically with the expansion of problem scale, thus inherently offering better scalability for addressing routing and scheduling issues. This paper proposes a TSN path selection method based on the genetic algorithm. A fitness function is designed to comprehensively consider factors such as flow combinability, route length, and network load, thereby enabling effective route selection. To further reduce the search space of the genetic algorithm, infeasible paths are eliminated in advance by leveraging the theory of flow combinability analysis. For the scheduling problem, the differential evolution algorithm is employed. By taking the number of constraints that a feasible schedule must satisfy as the objective function, a direct and efficient coding scheme is devised to significantly reduce the algorithm’s search space. Experiments conducted on networks with varying topological architectures and flow characteristics validate the feasibility of the proposed method. However, this method, which simulates biological evolution, relies on continuous iteration to search for feasible solutions, unlike exact solvers that can guarantee optimal solutions. Additionally, when addressing flow routing and scheduling in small-scale networks, the algorithm exhibits high complexity and requires extended solution times.

6. Conclusions

In this paper, a novel method based on evolutionary algorithm is introduced for the routing and scheduling of time-triggered flows in TSN. The proposed genetic algorithm approach optimizes routing by leveraging flow combinability to enhance effective flow grouping, thereby improving schedulability. Furthermore, we developed a differential evolution algorithm-based scheduling approach for TSN. The proposed encoding technique effectively reduces the search space. Five experiments were designed to evaluate the performance of proposed method across different scale topologies with various numbers of flows. The results indicate that the proposed method not only enhances the flow along the shortest paths for scheduling, but also significantly reduces execution time in large-scale scheduling scenarios. However, the proposed TSN scheduling method based on the differential evolution algorithm is currently limited to scenarios with zero jitter and no frame loss. In future work, we aim to extend the differential evolution-based scheduling approaches to handle scenarios involving jitter and frame loss.

Author Contributions

Z.W. (Zengkai Wang): conceptualization, methodology, formal analysis, investigation, writing—original draft. W.L.: conceptualization, methodology, writing—review and editing. X.X.: conceptualization, methodology, supervision, writing—review and editing. Z.W. (Zijia Wang): validation, writing—review and editing, supervision. Y.D.: validation, writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon request. There are no restrictions on data availability.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (62106055, 61703183), National Key Research and Development Program of China (2023YFC3305900, 2023YFC3305903), Natural Science Foundation of Zhejiang Province (LGG19F030010), Guangdong Natural Science Foundation (2025A1515010256), Guangzhou Science and Technology Planning Project (2023A04J0388, 2023A03J0662), and the Qin Shen Scholar Program of Jiaxing University.

Conflicts of Interest

Author Xiaoyun Xia and Yaolong Duan was employed by the company Technology Research and Development Centre, Xuelong Group Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
TSNTime-Sensitive Networking
QoSQuality of Service
SMTSatisfiability Modulo Theories
ILPInteger Linear Program
GAGenetic Algorithm
DEDifferential Evolution
RTRSReal-Time Routing Scheduler
WCEDWorst-Case End-to-End Delay
JRSJoint Routing and Scheduling
DoCDegree of Conflict
EPICEfficient Probing Instructed by Conflicts
MGAMixed Initial Population Genetic Algorithm
GCDGreatest Common Divisor
SOWSum of Weights
LCMLeast Common Multiple
SPShortest Path
DADoc Aware

Appendix A

Appendix A.1. Proof of Theorem 1

Since the requirement is zero jitter, we have S k + 1 , t i = S k + 1,1 i + t 1 T i , where 2 t H P T i . Given that the transmission time of the first frame of flow i satisfies the precedence constraint, it holds that S k + 1,1 i S k , 1 i + W i for any k { 1 , 2 , , l i 1 } . Therefore, it follows that
S k + 1,1 i + t 1 T i S k , 1 i + W i + t 1 T i
Since S k , t i = S k , 1 i + t 1 T i , we have
S k + 1,1 i + t 1 T i   S k ,   t i + W i
It implies that
S k + 1 ,   t i S k ,   t i + W i
Consequently, the transmission time of the t-th frame of flow i also satisfies the precedence constraint.

Appendix A.2. Proof of Theorem 2

Since S l i 1 , t i = S l i 1,1 i + t 1 · T i , therefore, the time required for frame t to be completed at the listener is expressed as follows:
S l i 1,1 i + t 1 · T i + W i
The transmission time S 1 , t i of frame t at the talker is given by S l i 1,1 i + t 1 · T i . Therefore, the duration between the reception time of frame t at the listener and the transmission time of frame t at the talker is calculated by Formula (A5).
S l i 1,1 i + t 1 · T i + W i ( S 1,1 i + t 1 · T i ) = S l i 1,1 i + W i S 1,1 i
Given that the first frame of flow i satisfies the deadline constraint, it follows that S l i 1,1 i + W i S 1,1 i D i . This implies that Formula (A6) holds true.
S l i 1 , t i + W i S 1 , t i D i
Thus, it can be concluded that the t-th frame of flow i also meets the deadline constraint.

Appendix A.3. Proof of Theorem 3

Let S 1,1 i denote the transmission time of the first frame at the talker, and S 1 , H P T i i represent the transmission time of the last frame at the talker. Given that zero jitter is a requirement, it follows that
S 1 , H P T i i = S 1,1 i + H P T i 1 · T i
Let the transmission time of the last frame at node l i 1 be denoted as S l i 1 , H P T i i . It can be readily established that Formula (A8) holds true:
S l i 1 , H P T i i = S 1,1 i + H P T i 1 · + l i 2 · W i
Thus, we have
S l i 1 , H P T i i + W i = S 1,1 i + H P T i 1 · T i + l i 2 · W i + W i
= S 1,1 i + H P T i 1 · T i + ( l i 1 ) · W i
Given that
S 1,1 i + H P T i 1 · T i + ( l i 1 ) · W i H P
According to Formulas (A9) and (A10), it follows that
S l i 1 , H P T i i + W i H P
Therefore, flow i meets the period constraint.

Appendix A.4. Proof of Theorem 4

Let S u i 1 represent the transmission time of the first frame of flow i 1 at the talker. Given that the serial number of node u on the path of flow i 1 is denoted as k 1 , we s have
S u i 1 = S 1,1 i 1 + k 1 1 · W i 1
Similarly, it follows that
S u i 2 = S 1,1 i 2 + k 2 1 · W i 2
We employ Formulas (A12) and (A13) to substitute S u i 1 and S u i 2 in Formula (9), resulting in Formula (10). This indicates that Theorem 4 is valid.

Appendix A.5. Proof of Theorem 5

(1) According to the precedence constraint and Theorem 1, if a path of a flow has n nodes, then, the transmission time of a frame from the second node to the ( n 1 ) -th node must be greater than or equal to the reception time of the preceding node. Consequently, the number of precedence constraints is n 2 . Therefore, the number of the precedence constraint for flows i 1 , i 2 , , i m that are satisfied is equal to i = 1 m n i 2 .
(2) According to Theorem 2, if the interval between the reception time of the first frame of flow i at the listener and the talker does not exceed the deadline, it follows that the intervals between the reception times and the transmission times of all subsequent frames of flow i will also remain within this deadline. Consequently, a single flow is required to satisfy only one constraint; thus, for m flows, a total of m constraints must be satisfied.
(3) According to Theorem 3, the receiving time of the last frame of each flow cannot exceed the hyper-period, so m constraints must also be satisfied on this constraint.
(4) According to resource constraint, for the flow i 1 j , i 2 j , …, i k j j passing through the link ( u j , v j ), the number of constraints that must be satisfied is expressed by Formula (A14).
x = 1 k j y = 1 x y k j l c m ( T i x j , T i y j ) T i x j · l c m ( T i x j , T i y j ) T i y j
Thus, we have
x = 1 k j y = 1 x y k j [ l c m ( T i x j , T i y j ) ] 2 T i x j · T i y j
where 1 j h . Therefore, the number of constraints that must be satisfied across h links is as follows:
j = 1 h x = 1 k j y = 1 x y k j [ l c m ( T i x j , T i y j ) ] 2 T i x j · T i y j
By integrating the four types of constraints discussed above, the number of constraints that a feasible scheduling solution must satisfy is represented by Formula (11).

Appendix A.6. Proof of Theorem 6

Let the transmission time of flow i k at the talker be denoted as S i k ; according to W i k , the time at which the first frame is received by the listener is equal to S i k + W i k · ( l i k 1 ) . Assume that S i k > D i k W i k · ( l i k 1 ) ; then, we have the following inequation:
S i k + W i k · ( l i k 1 ) > D i k W i k · ( l i k 1 ) + W i k · ( l i k 1 )
It follows that
S i k + W i k · ( l i k 1 ) > D i k
It implies that the frame received time is longer than D i k . That is, the deadline constraint is violated. Therefore, that value of S i k must not surpass D i k W i k · ( l i k 1 ) .

References

  1. Akram, B.O.; Noordin, N.K.; Hashim, F.; Rasid, M.A.F.; Salman, M.I.; Abdulghani, A.M. Enhancing reliability of time-triggered traffic in joint scheduling and routing optimization within time-sensitive networks. IEEE Access 2024, 12, 78379–78396. [Google Scholar] [CrossRef]
  2. Messenger, J.L. Time-sensitive networking: An introduction. IEEE Commun. Stand. Mag. 2018, 2, 29–33. [Google Scholar] [CrossRef]
  3. Chen, Z.; Lu, Y.; Wang, H.; Qin, J.; Wang, M.; Pan, W. Dynamic stream partitioning for time-triggered traffic in Time-Sensitive Networking. Comput. Netw. 2024, 248, 110492. [Google Scholar] [CrossRef]
  4. Zhou, Y.; Samii, S.; Eles, P.; Peng, Z. Time-triggered scheduling for time-sensitive networking with preemption. In Proceedings of the 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC), Taipei, China, 17–20 January 2022; IEEE: Piscataway, NJ, USA, 2022. [Google Scholar] [CrossRef]
  5. Xue, C.; Zhang, T.; Zhou, Y.; Nixon, M.; Loveless, A.; Han, S. Real-time scheduling for time-sensitive networking: A systematic review and experimental study. arXiv 2023, arXiv:2305.16772. [Google Scholar] [CrossRef]
  6. Stüber, T.; Osswald, L.; Lindner, S.; Menth, M. A survey of scheduling algorithms for the time-aware shaper in time-sensitive networking (TSN). IEEE Access 2023, 11, 61192–61233. [Google Scholar] [CrossRef]
  7. Alnajim, A.; Salehi, S.; Shen, C.-C. Incremental path-selection and scheduling for time-sensitive networks. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Big Island, HI, USA, 9–13 December 2019; IEEE: Piscataway, NJ, USA, 2019. [Google Scholar] [CrossRef]
  8. Chang, S.-H.; Chen, H.; Cheng, B.-C. Time-predictable routing algorithm for Time-Sensitive Networking: Schedulable guarantee of Time-Triggered streams. Comput. Commun. 2021, 172, 183–195. [Google Scholar] [CrossRef]
  9. Ojewale, M.A.; Yomsi, P.M. Routing heuristics for load-balanced transmission in TSN-based networks. ACM Sigbed Rev. 2020, 16, 20–25. [Google Scholar] [CrossRef]
  10. Huang, K.; Wu, J.; Jiang, X.; Xiong, D.; Huang, K.; Yao, H.; Xu, W.; Peng, Y.; Liu, Z. A period-aware routing method for IEEE 802.1 Qbv TSN networks. Electronics 2020, 10, 58. [Google Scholar] [CrossRef]
  11. Gavrilut, V.; Zhao, L.; Raagaard, M.L.; Pop, P. AVB-aware routing and scheduling of time-triggered traffic for TSN. IEEE Access 2018, 6, 75229–75243. [Google Scholar] [CrossRef]
  12. Huang, J.-Y.; Hsu, M.-H.; Shen, C.-A. A novel routing algorithm for the acceleration of flow scheduling in time-sensitive networks. Sensors 2020, 20, 6400. [Google Scholar] [CrossRef]
  13. Li, Y.; Yin, Z.; Ma, Y.; Xu, F.; Yu, H.; Han, G.; Bi, Y. Heuristic routing algorithms for time-sensitive networks in smart factories. Sensors 2022, 22, 4153. [Google Scholar] [CrossRef] [PubMed]
  14. Pahlevan, M.; Tabassam, N.; Obermaisser, R. Heuristic list scheduler for time triggered traffic in time sensitive networks. ACM Sigbed Rev. 2019, 16, 15–20. [Google Scholar] [CrossRef]
  15. Huang, K.; Wan, X.; Wang, K.; Jiang, X.; Chen, J.; Deng, Q.; Xu, W.; Peng, Y.; Liu, Z. Reliability-aware multipath routing of time-triggered traffic in time-sensitive networks. Electronics 2021, 10, 125. [Google Scholar] [CrossRef]
  16. Nayak, N.G.; Dürr, F.; Rothermel, K. Routing algorithms for IEEE802. 1Qbv networks. ACM Sigbed Rev. 2018, 15, 13–18. [Google Scholar] [CrossRef]
  17. Li, J.; Wei, M.; Huo, C.; Kim, K. A Time-Sensitive Networking Traffic Scheduling Method Based on Q-Learning Routing Optimization. In Proceedings of the 2024 18th International Conference on Ubiquitous Information Management and Communication (IMCOM), Kuala Lumpur, Malaysia, 3–5 January 2024; IEEE: Piscataway, NJ, USA, 2024. [Google Scholar] [CrossRef]
  18. Min, J.; Kim, Y.; Kim, M.; Paek, J.; Govindan, R. Reinforcement learning based routing for time-aware shaper scheduling in time-sensitive networks. Comput. Netw. 2023, 235, 109983. [Google Scholar] [CrossRef]
  19. Schweissguth, E.; Timmermann, D.; Parzyjegla, H.; Danielis, P.; Muhl, G. ILP-based routing and scheduling of multicast realtime traffic in time-sensitive networks. In Proceedings of the 2020 IEEE 26th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), Gangnueng, Republic of Korea, 19–21 August 2020; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar] [CrossRef]
  20. Nie, H.; Li, S.; Liu, Y. An enhanced routing and scheduling mechanism for time-triggered traffic with large period differences in time-sensitive networking. Appl. Sci. 2022, 12, 4448. [Google Scholar] [CrossRef]
  21. Pang, Z.; Huang, X.; Li, Z.; Zhang, S.; Xu, Y.; Wan, H.; Zhao, X. Flow scheduling for conflict-free network updates in time-sensitive software-defined networks. IEEE Trans. Ind. Inform. 2020, 17, 1668–1678. [Google Scholar] [CrossRef]
  22. Yu, Q.; Gu, M. Adaptive group routing and scheduling in multicast time-sensitive networks. IEEE Access 2020, 8, 37855–37865. [Google Scholar] [CrossRef]
  23. Vlk, M.; Hanzálek, Z.; Tang, S. Constraint programming approaches to joint routing and scheduling in time-sensitive networks. Comput. Ind. Eng. 2021, 157, 107317. [Google Scholar] [CrossRef]
  24. Wang, X.; Yao, H.; Mai, T.; Xiong, Z.; Wang, F.; Liu, Y. Joint routing and scheduling with cyclic queuing and forwarding for time-sensitive networks. IEEE Trans. Veh. Technol. 2022, 72, 3793–3804. [Google Scholar] [CrossRef]
  25. Yu, H.; Taleb, T.; Zhang, J. Deep reinforcement learning-based deterministic routing and scheduling for mixed-criticality flows. IEEE Trans. Ind. Inform. 2022, 19, 8806–8816. [Google Scholar] [CrossRef]
  26. Reusch, N.; Craciunas, S.S.; Pop, P. Dependability-aware routing and scheduling for Time-Sensitive Networking. IET Cyber-Phys. Syst. Theory Appl. 2022, 7, 124–146. [Google Scholar] [CrossRef]
  27. Jia, J.; Zhang, Y.; Xue, Y.; Chen, J.; Du, A.; Wang, X. Joint scheduling and routing for end-to-end deterministic transmission in TSN. Peer–Peer Netw. Appl. 2025, 18, 87. [Google Scholar] [CrossRef]
  28. Pahlevan, M.; Obermaisser, R. Genetic algorithm for scheduling time-triggered traffic in time-sensitive networks. In Proceedings of the 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), Torino, Italy, 4–7 September 2018; IEEE: Piscataway, NJ, USA, 2018. [Google Scholar] [CrossRef]
  29. Dürr, F.; Nayak, N.G. No-wait packet scheduling for IEEE time-sensitive networks (TSN). In Proceedings of the 24th International Conference on Real-Time Networks and Systems, Brest, France, 19–21 October 2016. [Google Scholar] [CrossRef]
  30. Craciunas, S.S.; Oliver, R.S.; Chmelík, M.; Steiner, W. Scheduling real-time communication in IEEE 802.1 Qbv time sensitive networks. In Proceedings of the 24th International Conference on Real-Time Networks and Systems, Brest, France, 19–21 October 2016. [Google Scholar] [CrossRef]
  31. Pop, P.; Raagaard, M.L.; Craciunas, S.S.; Steiner, W. Design optimisation of cyber-physical distributed systems using IEEE time-sensitive networks. IET Cyber-Phys. Syst. Theory Appl. 2016, 1, 86–94. [Google Scholar] [CrossRef]
  32. Atallah, A.A.; Hamad, G.B.; Mohamed, O.A. Routing and scheduling of time-triggered traffic in time-sensitive networks. IEEE Trans. Ind. Inform. 2019, 16, 4525–4534. [Google Scholar] [CrossRef]
  33. Berisa, A.; Zhao, L.; Craciunas, S.S.; Ashjaei, M.; Mubeen, S.; Daneshtalab, M.; Sjödin, M. AVB-aware routing and scheduling for critical traffic in time-sensitive networks with preemption. In Proceedings of the 30th International Conference on Real-Time Networks and Systems, Paris, France, 6–7 June 2022. [Google Scholar] [CrossRef]
  34. Vlk, M.; Brejchová, K.; Hanzálek, Z.; Tang, S. Large-scale periodic scheduling in time-sensitive networks. Comput. Oper. Res. 2022, 137, 105512. [Google Scholar] [CrossRef]
  35. Yao, M.; Liu, J.; Du, J.; Yan, D.; Zhang, Y.; Liu, W.; So, A.M.-C. A unified flow scheduling method for time sensitive networks. Comput. Netw. 2023, 233, 109847. [Google Scholar] [CrossRef]
  36. Gong, W.; Wang, Y.; Cai, Z.; Wang, L. Finding multiple roots of nonlinear equation systems via a repulsion-based adaptive differential evolution. IEEE Trans. Syst. Man Cybern. Syst. 2018, 50, 1499–1513. [Google Scholar] [CrossRef]
  37. Hellmanns, D.; Haug, L.; Hildebrand, M.; Dürr, F.; Kehrer, S.; Hummen, R. How to optimize joint routing and scheduling models for TSN using integer linear programming. In Proceedings of the 29th International Conference on Real-Time Networks and Systems, Nantes, France, 7–9 April 2021. [Google Scholar] [CrossRef]
Figure 1. Routing selection encoding.
Figure 1. Routing selection encoding.
Biomimetics 10 00333 g001
Figure 2. Gene coding for scheduling. S i 1 , S i 2 , , S i m 1 , S i m represent the transmission time of flows i 1 , i 2 , , i m at the talker.
Figure 2. Gene coding for scheduling. S i 1 , S i 2 , , S i m 1 , S i m represent the transmission time of flows i 1 , i 2 , , i m at the talker.
Biomimetics 10 00333 g002
Figure 3. The network of Experiment 1. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 3. The network of Experiment 1. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Biomimetics 10 00333 g003
Figure 4. The schedule Gantt chart of Experiment 1. The schedult results of flow0, flow1, and flow2 are indicated by bule, red, and purple, respectively.
Figure 4. The schedule Gantt chart of Experiment 1. The schedult results of flow0, flow1, and flow2 are indicated by bule, red, and purple, respectively.
Biomimetics 10 00333 g004
Figure 5. The network of Experiment 2. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 5. The network of Experiment 2. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Biomimetics 10 00333 g005
Figure 6. The schedule Gantt chart of Experiment 2. The schedule results of flows 0 to 8 are respectively indicated by cyan, blue, sky-blue, purple, pink, orange, black, brown, and red.
Figure 6. The schedule Gantt chart of Experiment 2. The schedule results of flows 0 to 8 are respectively indicated by cyan, blue, sky-blue, purple, pink, orange, black, brown, and red.
Biomimetics 10 00333 g006
Figure 7. The network of Experiment 3. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 7. The network of Experiment 3. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Biomimetics 10 00333 g007
Figure 8. The schedule Gantt chart of Experiment 3. The schedule results of flows 0 to 9 are represented by cyan, blue, sky-blue, purple, pink, orange, black, brown, red, and green, respectively.
Figure 8. The schedule Gantt chart of Experiment 3. The schedule results of flows 0 to 9 are represented by cyan, blue, sky-blue, purple, pink, orange, black, brown, red, and green, respectively.
Biomimetics 10 00333 g008
Figure 9. The network of Experiment 4. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 9. The network of Experiment 4. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Biomimetics 10 00333 g009
Figure 10. The schedule Gantt chart of Experiment 4. The schedule results of flow 0 to 4 are indicated in red, blue, green, black, and orange, respectively.
Figure 10. The schedule Gantt chart of Experiment 4. The schedule results of flow 0 to 4 are indicated in red, blue, green, black, and orange, respectively.
Biomimetics 10 00333 g010
Figure 11. The network of Experiment 5. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Figure 11. The network of Experiment 5. The circles represent the switches, the squares represent the terminals, and the numbers are the node sequence numbers.
Biomimetics 10 00333 g011
Figure 12. The schedule Gantt chart of Experiment 5. The schedule results of flow 0 to 5 are represented by red, blue, green, black, orange, and purple, respectively.
Figure 12. The schedule Gantt chart of Experiment 5. The schedule results of flow 0 to 5 are represented by red, blue, green, black, orange, and purple, respectively.
Biomimetics 10 00333 g012
Table 1. Flow parameters of Experiment 1.
Table 1. Flow parameters of Experiment 1.
TalkerListenerSizeDeadlinePeriodThe Shortest Path
Flow015351501501-6-8-5
Flow124241001002-6-8-4
Flow234241001003-7-8-4
Table 2. Flow parameters of Experiment 2.
Table 2. Flow parameters of Experiment 2.
TalkerListenerSizeDeadlinePeriodThe Shortest Path
Flow01192430030011-3-2-1-9
Flow1913243003009-1-2-3-4-5-13
Flow21392430030013-5-4-3-2-1-9
Flow398243003009-1-0-8
Flow41382430030013-5-4-3-2-1-0-8
Flow511102430030011-3-2-10
Flow689243003008-0-1-9
Flow7910243003009-1-2-10
Flow810122430030010-2-3-4-12
Table 3. Flow parameters of Experiment 3.
Table 3. Flow parameters of Experiment 3.
TalkerListenerSizeDeadlinePeriodThe Shortest Path
Flow034313550050034-16-15-14-13-31
Flow134283550050034-16-15-14-13-12-11-10-28
Flow230313550050030-12-13-31
Flow321353550050021-3-2-1-0-17-35
Flow420183550050020-2-1-0-18
Flow518333550050018-0-17-16-15-33
Flow631193550050031-13-14-15-16-17-0-1-19
Flow718353550050018-0-17-35
Flow825203550050025-7-6-5-4-3-2-20
Flow931183550050031-13-14-15-16-17-0-18
Table 4. Flow parameters of Experiment 4.
Table 4. Flow parameters of Experiment 4.
TalkerListenerSizeDeadlinePeriodThe Shortest Path
Flow01718101-13-14-15-19-7
Flow1261992-14-15-19-18-6
Flow24718104-16-17-18-19-7
Flow3351993-15-19-18-17-5
Flow40818100-12-16-20-8
Table 5. Flow parameters of Experiment 5.
Table 5. Flow parameters of Experiment 5.
TalkerListenerSizeDeadlinePeriodThe Shortest Path
Flow004110100-10-11-20-21-14-4
0-10-11-12-13-14-4
0-10-19-20-21-14-4
0-10-19-20-13-14-4
0-10-19-18-21-14-4
0-10-11-20-13-14-4
Flow1161991-11-12-13-14-15-16-6
Flow2931999-19-20-13-3
Flow3851998-18-21-16-15-5
8-18-21-14-15-5
8-18-17-16-15-5
Flow4251992-12-13-14-15-5
Flow507110100-10-19-18-17-7
Table 6. Comparison of runtime (s) between DE algorithm and ILP based methods.
Table 6. Comparison of runtime (s) between DE algorithm and ILP based methods.
InstanceGA-DESP-ILP [29]DA-ILP [32]JRS-ILP [37]
Example10.341.021.360.80
Example23.191.201.690.94
Example33.091.58NA2.41
Example41.16NANA15.75
Example50.94NANA41
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Z.; Liao, W.; Xia, X.; Wang, Z.; Duan, Y. Routing and Scheduling in Time-Sensitive Networking by Evolutionary Algorithms. Biomimetics 2025, 10, 333. https://doi.org/10.3390/biomimetics10050333

AMA Style

Wang Z, Liao W, Xia X, Wang Z, Duan Y. Routing and Scheduling in Time-Sensitive Networking by Evolutionary Algorithms. Biomimetics. 2025; 10(5):333. https://doi.org/10.3390/biomimetics10050333

Chicago/Turabian Style

Wang, Zengkai, Weizhi Liao, Xiaoyun Xia, Zijia Wang, and Yaolong Duan. 2025. "Routing and Scheduling in Time-Sensitive Networking by Evolutionary Algorithms" Biomimetics 10, no. 5: 333. https://doi.org/10.3390/biomimetics10050333

APA Style

Wang, Z., Liao, W., Xia, X., Wang, Z., & Duan, Y. (2025). Routing and Scheduling in Time-Sensitive Networking by Evolutionary Algorithms. Biomimetics, 10(5), 333. https://doi.org/10.3390/biomimetics10050333

Article Metrics

Back to TopTop