You are on page 1of 12

White Paper

TSN – Time Sensitive Table of Contents


• Introduction..........................................1
Networking • Real-time communication
today and in the world of the
Industrial IoT.........................................2
• TSN – Mechanisms and
Dr. René Hummen – CTO Office, interdependencies...............................3
Hirschmann Automation and Control GmbH  • Prioritization based on timing
with the Time-Aware Shaper........3

Stephan Kehrer – CTO Office,


 • The necessity of guard bands......4

 • Interruption of Ethernet
Hirschmann Automation and Control GmbH frames...............................................5
 • Synchronous transmission
Lukas Wüsteney – CTO Office, cycles as a prerequisite.................6
Hirschmann Automation and Control GmbH  • Traffic shaping with imprecise
transmission timespans................6
 • Combined use of Traffic
Shapers.............................................8
Time-Sensitive Networking (TSN) adds a level of determinism to Ethernet-based  • Preventing interfering
data transmissions that was previously not possible with conventional Ethernet traffic with ingress filtering
technology. and policing.....................................8

Ethernet networks are now able to provide:


 • Better safe than sorry:
fault tolerance in
• Predictable, guaranteed end-to-end latencies communication paths....................9
• Highly limited latency fluctuations ( jitter)  • Configuration of the entire
TSN network ...................................9
• Extremely low packet loss
• Summary and outlook.................... 12
From a standardization point of view, key TSN features already are an integral part • References.........................................12
of basic Ethernet according to IEEE 802.1 and IEEE 802.3 for quite some time now.
In addition, this next step in Ethernet evolution is increasingly becoming available
in current FPGA IP cores and ASICs. Therefore, now is the right time to get an
overview of the most important TSN functions and their advantages in demanding
automation networks. The goal of this white paper is to provide exactly that.
areas, such as process automation, network. TSN offers a suitable solution
Real-time communication also benefit from TSN. In these cases, for converged network infrastructure
today and in the world of cycle times are usually significantly with high bandwidth requirements on
the Industrial IoT longer than, for example, in the one hand and hard and soft real-
synchronized drive applications. time requirements on the other hand.
Latency guarantees are a basic However, applications in this field also
prerequisite for the transmission of frequently require guaranteed end-to- When having a look at the automation
process data with real-time end latency or dedicated bandwidth. networks of the future, the pivotal
requirements in a number of application In current networks, these guarantees importance of TSN is also evident here.
fields. These include, in particular, are typically implemented through flat Even today, industrial automation is
synchronized drive technology, overprovisioning. With TSN, it becomes undergoing a transformation that is
automation of control technology in possible to move away from such driven by the idea of building production
power generation and transmission approximate solutions and to provide facilities that are much more flexible,
and transportation networks. In these and guarantee precisely the required intelligent and able to cope with more
application fields, the cycle times for bandwidth, based on the process data dynamic changes. The terms frequently
the transmission of time-critical data that needs to be transferred. Thus, used in this context are “Industry 4.0
are, in some cases, significantly less TSN is the tool that permits planning (I4.0)” and “Industrial Internet of Things
than 1 ms. In order to achieve such and dimensioning of future automation (IIoT)”. They describe the idea of an
cycle times with corresponding networks according to the actual intelligent production environment, in
latency guarantees, usually real-time bandwidth requirements and latencies which production machines, conveyors
communication methods such as to be expected. and work pieces are constantly
EtherCAT, Profinet IRT or SERCOS III communicating with each other to
are used. Although these methods are In general, it can be observed that automatically guide and support the
based on conventional Ethernet, they all multiple parallel networks, installed production process. This is made
extend it separately in an incompatible and used for different applications in a possible by increased inter-networking
form to guarantee latency boundaries. production facility are converging into of the sensors and actuators involved
The value proposition of TSN is a singular multi-service networks. While in production and by an increased
uniform physical layer and data link in current plants, time-critical control integration of the (local) cloud
layer that is standardized by the IEEE. information is often transmitted via infrastructure. Through this, virtual
It can be used by the entire real-time dedicated networks, customers are programmable logic controllers (PLCs)
communication market with increasingly expressing the wish that are directly integrated into the
corresponding economies of scale this critical process data, together with production processes. These changes
and reduced efforts on the part of the “best-effort” data (e.g. configuration and also affect the basic models on which
implementers and users. monitoring information) and data with automation networks are developed
“soft” real-time requirements (e.g. video and planned today. As shown in Figure 1,
In addition to these fields of application data from surveillance cameras) should for example, the well-known automation
with “firm” real-time requirements, other be transmitted via a single common pyramid is, from a network perspective,

Figure 1: Transformation from the automation pyramid to the automation pillar in future automation networks

2 EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com


Be Certain. Belden.

Figure 2: Time division multiplexing permits the reservation of time slots within a cycle in order to enable the timely transmission of periodic real-time data

developing into an automation pillar. in-vehicle networks. Even today, it is documents. In the following sections
This is a continuous long-term foreseeable that some of TSN’s target of the white paper, we will provide an
transformation process. In the context markets will differ significantly from overview of the most important TSN
of the automation pillar, the full value of each other concerning their requirements. mechanisms and how these
TSN becomes apparent: It enables the For example, a deterministic and, at mechanisms interact with each other.
demand-oriented scaling of real-time the same time, fault-tolerant data
mechanisms. It also allows for planning transmission may be absolutely Prioritization based on timing with the
of the network topology and the necessary in one application, but Time-Aware Shaper
bandwidth and, at the same time, in another case, the fault tolerance Until now, Class of Service (CoS)
retains investment security in the requirements may only be of secondary mechanisms such as the strict priorities
networks due to the backwards importance. To cater to these different according to IEEE 802.1Q have not been
compatibility to the proven, existing requirements, TSN is designed as a able to guarantee the forwarding of
Ethernet technology. modular system in which the exact time-critical data traffic at a fixed point
characteristics of deterministic data in time: A low-priority Ethernet frame
transmission – and the associated already in the sending queue of a switch
TSN – Mechanisms and hardware and software requirements – can delay the transmission of other
interdependencies can be adapted to the respective data frames, even when they are tagged
requirements. Following this logic, TSN with the highest priority (i.e. priority 7).
TSN extends Ethernet-based data is not specified in one single standards This is possible in each Ethernet switch
communication with novel mechanisms document, but rather through a family along the transmission path. As one
to provide determinism. This is done on of international standards that have of the central components of TSN, the
such a level of performance that TSN been in development since 2012 at the “Enhancements for Scheduled Traffic”
can satisfy even the most demanding IEEE 802 and its TSN Task Group [1]. introduce the possibility of prioritizing
requirements of modern control By now – with only a few exceptions – the data transmission of conventional
networks, e.g. in industrial automation, all mechanisms of the TSN family are Ethernet frames on a temporal level.
automotive manufacturing and available as finished standards For the first time with Ethernet, this

Figure 3: The Time-Aware Shaper (TAS) implements time-based prioritization via the newly-introduced Time-Aware Gates that are located between the CoS
queues and the selection function for the packets to be sent

EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com 3


allows to guarantee forwarding at a switch until they reach the queues The necessity of guard bands
fixed point in time. In this document, (traffic queues) at the output port. Due to the very poor predictability of
this mechanism is referred to as the At this point, the TAS intervenes in the traffic patterns of Best-Effort data
Time-Aware Shaper (TAS). packet processing through the newly transmissions, it is normally not
introduced Time-Aware Gates, as foreseeable when such data packets
The core idea of this TSN mechanism shown in Figure 3. To be more precise, will be transmitted. Accordingly, as
(IEEE 802.1Qbv-2015 [2]), which was the selection of the next Ethernet shown in Figure 4, the transmission of
published in March 2016, is to divide frame to be transmitted is no longer a best-effort packet could begin during
time into discrete sections. These performed exclusively based on a strict time slot 2, right before the opening of
sections of equal length, so-called ranking of the queues when using time slot 1. The transmission of this
cycles, can be further broken down TAS, but the state of the respective frame must be completed before the
according to the time slot method Time-Aware Gate is also taken into transmission of the time-critical frames
(TDMA – Time Division Multiple Access) account. This can be either open or in time slot 1 can be started. Figure 4
as shown in Figure 2. This enables the closed. Based to this time-dependent shows that despite the use of the TAS in
allocation of data packets with real-time state, Ethernet frames in the associated this case, the best-effort packet would
requirements to dedicated time slots queue are taken into account when extend into the time slot 1 of the
within these cycles. In other words, queued packets are selected for following cycle. This would delay the
the TAS can be used to temporarily transmission. For example, at the point transmission of the time-critical real-time
interrupt the transmission of conventional in time that is shown in Figure 3, only data and could result in a violation of
best-effort Ethernet traffic in order to the queue associated to Priority 7 is the end-to-end latency guarantees.
forward time-critical data traffic within served.
specifically reserved time slots. The In order to avoid such situations,
TAS thus enables a temporal preference The Gate Control List (GCL) determines so-called guard bands are introduced
of periodic real-time data over conven- which traffic queue is allowed to send with TAS, together with the time
tional best-effort data traffic (see “Time at a certain point in time within the slots. These guard bands prevent the
slot 1” in Figure 2). cycle. In addition to the states of the forwarding of frames for the length of
Time-Aware Gates, the Gate Control a maximum-size Ethernet frame, right
Similar to the strict priorities that are List specifies the time period for which before the transition from one time slot
common in Ethernet switches today, a particular entry is active. Going back to the next. This is done by explicitly
the TAS relies on the CoS Priorities to the example in Figure 3 on the right configuring an additional time slot
(PCP - Priority Code Point) which are hand side, this GCL reflects the cycle in which all gates are closed – for as
encoded in the VLAN tag of the Ethernet from Figure 2, consisting of a phase with long as it would take to transmit the
header. Ethernet frames are initially time-prioritized data traffic (Time slot 1) maximum-size frame. Thus, the guard
processed unchanged in the Ethernet and a best-effort phase (Time slot 2). band can prevent the transmission of a

Figure 4: The guard band in TSN prevents best effort frames from extending into a time slot that is reserved for real-time data, but it decreases the available bandwidth

4 EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com


Be Certain. Belden.

Figure 5: With the method of Ethernet frame pre-emption, the guard band size can be reduced from the maximum size of an Ethernet frame to the size of a partial packet

best-effort Ethernet frame and can stop critical traffic will not be disturbed, as transmission of the frame can then be
it from violating the subsequent time the best-effort packet will be buffered interrupted and suspended at a multiple
slot, as shown in Figure 4. At the same until the next best-effort time slot of the 64 byte limit before completion of
time, however, a guard band inevitably starts, but it would experience a delay the current time slot. The transmission
leads to unwanted downtime in the in transmission and the bandwidth is then resumed and completed at the
network, as nothing can be transmitted, that can effectively be used would be beginning of the next best-effort phase.
and thus to a waste of bandwidth. restricted. Frame pre-emption allows the guard
band to be limited to the maximum size
As an alternative to the explicit guard Interruption of Ethernet frames of the Ethernet fragments, with 64 byte
band, the Transmission Selection In order to maximize the bandwidth as the minimum. With Fast Ethernet
mechanism (see Figure 3) can utilization for best-effort Ethernet networks, for example, this results in
additionally take the packet length of frames, the IEEE 802 working group a reduction in the “dead time” of up to
an Ethernet frame into account. This also developed a method for Ethernet 0.12 ms per transition from a best-effort
works as long as the size of the packet frame pre-emption (IEEE 802.1Qbu- phase to a phase with time-critical data
is known at the point in time when 2016 [3], IEEE 802.3br-2016 [4]), which traffic. This subsequently results in
the transmission decision is taken. was completed in June 2016. Using significantly less wasted bandwidth.
The transmission decision therefore this method, conventional Ethernet
depends on whether the next packet frames can be divided into small packet As a component of the TSN toolkit,
in the queue still “fits” and can be fragments of at least 64 bytes and Ethernet frame pre-emption can, of
completely transmitted – before the each fragment can be transmitted course, also be used separately from
transition to the next time slot. Still, the separately. As shown in Figure 5, this the TAS mechanism. In this case, for
situation may arise where a packet can enables the transmission of an Ethernet example, the CoS priority assigned to
no longer be transmitted if it is too large frame to be started within a best-effort the time-critical control traffic can be
or if the remaining time in the time slot phase, despite insufficient remaining configured as “express” – effectively
is too short. In this case, the time- time to transmit the whole frame. The as preferred traffic that is not to

Figure 6: Precise time synchronization is a prerequisite for the TSN Time-Aware Shaper

EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com 5


be fragmented. The other priorities this means that all network participants for example, regarding the support for
can similarly be configured as must have a common notion of time. multiple synchronized time domains.
“pre-emptible”, effectively data traffic The participants must know when a This feature currently is available in
that can be fragmented. As a result, a cycle begins and which time slot is IEEE 1588, but not in 802.1AS, and allows
switch configured in this way interrupts active during which period. To ensure network participants to synchronize
the transmission of best-effort traffic this, the use of a time synchronization against a global clock (as with NTP)
as required when control traffic is protocol such as the Precision Time as well as a second time source for
present, thus reducing the transmission Protocol (PTP) according to IEEE 1588 a working clock. This, for example,
latency of time-critical control data. (IEEE 1588-2008 [6]) or the IEEE 1588 offers the possibility to use the globally
However, in this scenario, an increased variant IEEE 802.1AS (IEEE 802.1AS- synchronized clock for unique event
volume of control traffic on the network 2011 [7]) is mandatory. logging, while the working clock can
decreases the prediction quality of the be used for the TAS. This has the
transmission latency compared to the Both IEEE 1588 and IEEE 802.1AS advantage of not having to adjust to
method that includes TAS. This is due enable the synchronization of global time conventions – such as the
to the fact that multiple express frames distributed clocks within a network leap second – in the working clock,
can still interfere with each other, as with an accuracy of 1 μs and below. which could interfere with synchronized
known from conventional Ethernet. When implemented with hardware local operations.
support, accuracies in the range of
Due to the fact that Ethernet frame a few nanoseconds can be achieved Since the current version of IEEE 1588
pre-emption necessitates changes in (Hirschmann PTP Whitepaper [8]). In was already specified in 2008, this
the Ethernet frame structure, it is contrast to protocols known from the IT technology for time synchronization
important to note that this mechanism environment, such as the Network Time has already established itself in many
is limited to links where both adjacent Protocol (NTP), IEEE 1588 often does markets and application areas. In some
devices support the procedure. These not aim for global time synchronization, cases, special profiles have been
two devices (e.g. two Ethernet switches) for example, the synchronization with developed for distinct fields of
inform each other about their pre- an atomic clock. Instead, the Best applications such as the energy
emption support on the connected Master Clock (BMC) algorithm is used market. In such cases, of course, IEEE
to determine the network subscriber
Ethernet ports by means of the Link 802.1AS is not a requirement the use
with the most accurate, free-running
Layer Discovery Protocol (LLDP) (IEEE of TSN. Rather, the TSN mechanisms
clock. This device serves as a reference
802.1AB-2016 [5]). Only with mutual do not mandate the use of a specific
clock (grandmaster clock) against
support on both ends, pre-emption is mechanism for time synchronization.
which the other network participants
activated on the corresponding end Depending on the application, the use
synchronize. With respect to TSN, this
device or switch ports. This ensures of IEEE 1588 with or without profiles
means that the time on all clocks in a
backward compatibility with existing can therefore continue to be preferred
network must be synchronized. The
Ethernet devices. over 802.1AS as the solution for time
actual time, on the other hand, only
synchronization. Regardless of the
plays a secondary role.
Synchronous transmission cycles synchronization protocol used,
as a prerequisite however, it is necessary that the selected
IEEE 802.1AS is a relatively new time
TAS operates only based on local time synchronization mechanism offers
synchronization protocol in the
device information – in other words the a high degree of accuracy such that
automation environment. It follows the
information available within a network time slots of the TAS mechanism start
same basic synchronization model as
device (bridged end-device or Ethernet and end at the right time on all devices
IEEE 1588 and originally was developed
switch). This information includes, for in the network.
to limit the high number of configuration
example, the cycle length and time slot options of IEEE 1588 to exactly those
periods. To ensure that data streams Traffic shaping with imprecise
parameters that are relevant in local
can actually be transmitted with area networks (LANs). IEEE 802.1AS, transmission timespans
guaranteed latencies over an end-to- for example, limits the choice of In application fields such as process
end connection, unplanned waiting transport technology and encapsulation automation, periodic control processes
times must be avoided in all devices to Ethernet, while IEEE 1588 provides are often executed. These will only
on the transmission path. To ensure additional UDP/IP encapsulation for use sporadically lead to data transmissions,
this, the frames must “hit” the correct in wide area networks. In the course for instance in the case of an event
time slots on each device as they move of TSN standardization, the existing occurring. Such event-based data
through the network. In addition to the IEEE 802.1AS protocol will be extended transmissions can e.g. occur for the
operation of TAS, this requires a close through the work in IEEE 802.1AS-Rev [9] communication of state transitions of
coordination between the devices in by some additional mechanisms from a process or for the transmission of
the network that participate in the IEEE 1588 that are required for use in aggregated measurement values when
transmission (see Figure 6). In particular, automation networks. This is the case, certain pre-determined time or value

6 EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com


Be Certain. Belden.

Figure 7: With the Credit-Based Shaper, data streams with reserved bandwidths are handled with higher priority than best effort traffic, as long as positive
transmission credit is available

threshold are exceeded. Accordingly, is then prioritized by the respective working group for the predecessor
it is not always possible to predict the traffic shaper in a way that ensures that technology of TSN, Audio/Video
exact time of communication in these certain latency bounds for the time- Bridging (AVB). As the name suggests,
scenarios. During the data transmission critical data can be achieved. However, this technology primarily serves audio/
however, clearly defined latency limits a compromise for the flexibility in video and comparable applications.
should typically be adhered to in order prioritization gained in this way is a The aim of the Credit-Based Shaper
to ensure a control decision based on conceptually lower accuracy in the is to secure the maximum bandwidth
current information. But the TAS achievable latency and jitter guarantees required for an audio/video transmission
mechanism can only provide low in comparison to the TAS mechanism. in a defined time interval without
latency and jitter guarantees if the end noticeably interrupting the best-effort
device meets predictable transmission As part of the standardization activities data traffic that shares the same network.
times. Therefore, this mechanism is at the IEEE, three different traffic shapers To achieve this, the Credit-Based Shaper
only suitable to a limited extent for such are currently being considered for use allocates transmission credit to data
traffic patterns to ensure prioritization with TSN: streams with reserved bandwidth.
of the process data. Initially this credit is 0.
• Credit-Based Shaper
(CBS; IEEE 802.1Qav-2009 [10])
In addition to the TAS mechanism, TSN As long as the transmission credit is
therefore offers further prioritization • Cyclic Queuing and Forwarding in the positive range (≥0), data packets
mechanisms, so-called traffic shapers. (CQF; IEEE 802.1Qch-2017 [11]) with reserved bandwidth are transmitted
These afford the reservation of worst- • Asynchronous Traffic Shaping preferentially (see, for example, the
case bandwidth requirements for time- (ATS; IEEE P802.1Qcr [12]) transmission of the first AVB frame
critical control data based on defined marked in blue in Figure 7 on the left).
observation intervals (e.g. 250 μs). The Credit-Based Shaper was already Through any such preferential
The forwarding of such reserved traffic developed in 2009 by the IEEE 802.1 transmission, the transmission credit

Figure 8: Using Cyclic Queuing and Forwarding, data streams with reserved bandwidth are transmitted intermittently by one hop in the direction of the receiver
with each cycle

EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com 7


decreases until it finally reaches a core idea of the Cyclic Queuing and Forwarding Shaper and Priority 7 to the
negative value. After finishing the Forwarding procedure is to collect the TAS to implement communication with
transmission of a packet and while data packets that are received within a soft and hard real-time requirements.
the credit for transmission is negative, cycle with reserved bandwidth and to In this way, different traffic classes can
data packets with reserved bandwidth send them prioritized at the beginning coexist in the same network and be
are temporarily held back and are no of the next cycle. This allows the prioritized by the appropriate mechanism.
longer being transmitted. During these maximum end-to-end latency to be The basic prerequisite for this, however,
brief recesses in preferential clearly determined by the number of is that all devices in the network observe
transmission, best-effort traffic is hops on the transmission path and the CoS priorities and support all the
served. While the AVB packets are configured cycle time. These properties shaping mechanisms that are utilized.
waiting, their transmission credit may make Cyclic Queuing and
recovers until the credit reaches 0 Forwarding an appropriate mechanism Preventing interfering traffic with
again. If the forwarding of AVB packets e.g. for process automation applications. ingress filtering and policing
is delayed by longer best-effort packets,
In a system in which all participants
the transmission credit of the Due to the similarities with TAS, it behave as expected, the TSN standards
corresponding data stream increases is clear that Cyclic Queuing and that are described so far already offer
above the “0” mark (see Transmission Forwarding also requires a common all the mechanisms necessary for
of the black marked Best Effort Frame time understanding of the network deterministic data transmission.
in Figure 7). As a result, after the participants and thus a time However, the methods described so far
best-effort packet is finished, the AVB synchronization mechanism must require complete packet reception and
packets that were temporarily held be in place. The third Traffic Shaper, (partial) packet processing in a switch
back can be transmitted back-to-back Asynchronous Traffic Shaping, differs or end station. Incorrectly configured
following the best-effort transmission, in this detail from Cyclic Queuing and devices or malicious network
for as long as the transmission credit Forwarding: It does not require a time participants can significantly disrupt
lasts. This allows time-critical frames synchronization mechanism. the functioning of TSN mechanisms
and especially the reserved bandwidth Asynchronous Traffic Shaping is such as the TAS by sending data
to statistically catch up. suitable for the preferred transmission packets with incorrectly assigned
of telemetry and monitoring data, for CoS priorities or by overusing the
Due to this prioritization behavior, the
example, for manual or non-real-time resources that the network provides,
Credit-Based Shaper is ideally suited
monitoring. It focuses on the e.g. bandwidth. To counteract this, the
for the preferred transmission of audio/
prioritization of traffic bursts. These are IEEE 802.1 working group has defined
video data, for example in video
passed through the network cyclically Ingress Filtering and Policing
surveillance of production processes.
and not synchronized as bundles mechanisms (IEEE 802.1Qci-2017 [14])
This is of particular importance if
of packets. At the time of writing as part of the TSN standardization
limited buffering of data at the receiving
(Q3 2019), the Asynchronous Traffic activities.
end-station is advantageous. However,
Shaping process is still in the process
it has been shown [13] that the maximum
of standardization, such that no final These new mechanisms offer the
end-to-end latency of 2 ms (AVB Class A)
statement can be made about the possibility to carry out filtering and
or 50 ms (AVB Class B) over 7 hops
concrete implementation and policing decisions at different
that is specified in the standard cannot
performance of this mechanism. granularity levels. These levels range
be met in worst case scenarios. This
prevents the Credit-based Shaper from from a port level to the granularity of
Combined use of Traffic Shapers individual data streams. In a migration
being used in application areas such as
process control, where fixed guarantees The use of the different traffic shapers scenario from non-TSN to TSN networks,
with regard to maximum end-to-end is always linked to the assignment of for example, port-level policing allows
latency are absolutely required. For one of the eight CoS priorities from the the traffic of a non-TSN network
this reason, the IEEE has been and is VLAN tag to a specific shaping subscriber to be restricted to ensure
currently developing additional traffic algorithm. If, for example, a device that it cannot use all bandwidth for
shapers that are able to guarantee supports the Time-Aware Shaper best-effort traffic. Policing at the data
end-to-end latencies without restriction according to IEEE 802.1Qbv, the Cyclic stream level, on the other hand, ensures
with regard to network topology and Queueing and Forwarding Traffic that a network participant cannot use
communication patterns. Shaper according to IEEE 802.1Qch as more than the bandwidth that was
well as the strict priorities according to reserved by it for that stream. Ingress
One, as of 18 May 2017 readily published, IEEE 802.1Q, the various CoS priorities Policing is not only limited to bandwidth
traffic shaper is the Cyclic Queuing and can be assigned to these shaping monitoring, but also offers the possibility
Forwarding procedure (IEEE 802.1Qch- mechanisms in the device configuration. to allow or disallow packet reception in
2017), which is based on the TAS Priorities 4 and 5, for example, can be a device – with the above mentioned
mechanism. As shown in Figure 8, the assigned to the Cyclic Queueing and granularity levels – based on a certain

8 EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com


Be Certain. Belden.

time window. In other words: while malicious intent, the failure of a network as shown in Figure 9, at the first
TAS acts on the output side for time- element or a communication line can network element (e.g. a switch) on the
controlled sending, Ingress Policing also lead to interference in deterministic transmission path. At the destination,
offers similar functionality on the input data transmission. In order to avoid the first replicated data packet is
side upon reception, i.e. before the the packet loss associated with such a forwarded to the application layer.
packet is processed by the switch or disruption, a fault-tolerance procedure Subsequently received packet
end device. Due to implementation was developed at the IEEE with duplicates, on the other hand, are
complexities associated with time- IEEE 802.1CB-2017 [16], which works detected via a new redundancy field
based policing, it is not yet completely similarly to the already established, in the Ethernet header, the so-called
clear if and in which scenarios this full seamless redundancy mechanisms R-TAG, and rejected. This ensures that
version of the Ingress Filtering and High Availability Seamless Redundancy redundant data transmission according
Policing mechanism will be used. (HSR) and the Parallel Redundancy to IEEE 802.1CB is transparent for
Bandwidth monitoring, on the other Protocol (PRP) according to IEC 62439-3, higher-level layers in the network stack
hand, is commonly used today in and was kept compatible with them. and does not have to be considered
switches for automation networks. IEEE 802.1CB is therefore a static separately there.
Last but not least, TSN can also be fault-tolerance procedure in which the
used with existing Layer 2 security redundant transmission paths are The redundancy mechanisms
mechanisms such as MACsec permanently active. In the event of an developed as part of IEEE 802.1CB offer
(IEEE 802.1AE [15]). In this way, the error, the switchover times from one a significant advantage over HSR and
authenticity of the sender can be path to the other path can be avoided. PRP: they can be used on any topology.
checked and only correctly verified IEEE 802.1CB is not limited to the
Ethernet frames can be forwarded. In In order to achieve seamless otherwise mandatory ring topologies
this way, it is possible to handle a large redundancy according to IEEE 802.1CB, or topologies with completely
number of attacks and scenarios with the Ethernet frames are replicated at the independent parallel networks. In
incorrectly configured network beginning of a redundant transmission addition, IEEE 802.1CB supports
participants. path and then transmitted through the redundant transmissions over more
network via the different redundant than two path in order to further
Better safe than sorry: fault tolerance paths. Usually, the frame replication reduce the probability of packet losses
in communication paths takes place either directly at the sending and, thus, eliminates this limitation
In addition to incorrectly configured end device or, if the end device does not of existing redundancy mechanisms.
network subscribers or those with have a redundant network connection However, it must be ensured that all
redundant paths can meet the required
latency guarantees. The management
of requirements and comfortable
configuration of TSN networks is
therefore an important part of a
functioning TSN ecosystem that
consists of both network devices and
network management.

Configuration of the entire TSN


network
As explained at the beginning of this
white paper, TSN consists of a series
of standards and mechanisms that
serve the various requirements of
deterministic data transmissions.
In order to use these mechanisms
together in a network and to be able
to parameterize them across different
network participants from different
manufacturers, a standardized
configuration method is required. This
configuration method must allow the
use of TSN mechanisms such as
Ethernet frame pre-emption or
Figure 9: In the case of the seamless redundancy protocol IEEE 802.1CB, Ethernet frames are replicated seamless redundancy according to

EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com 9


IEEE 802.1CB to be activated as IEEE for the configuration of TSN: a then be configured automatically
required on the network devices. On centralized, a distributed and a according to these announced
the other hand, the TSN mechanisms combined/hybrid approach. All three capabilities and requirements.
such as TAS must be parameterized approaches share the requirement that
consistently for proper functioning, the configuration should be largely The general configuration sequence of
including the configuration of cycle automated in order to ensure easy a TSN network is as follows: First, the
times, CoS priorities and time slots for handling of TSN. It should be possible TSN mechanisms supported within a
the time-prioritized transmission of for end devices to announce the network are determined and activated
real-time data. communication mechanisms that they as required. Subsequently, the
support, for example TAS, and their transmitting end device, the so-called
Three different models (IEEE 802.1Qcc- data transmission requirements. talker, announces information about
2018 [17]) have been developed at the Network devices subsequently should the data stream it is about to transmit.

Figure 10: In the centralized TSN configuration approach, the end devices communicate directly with a central configuration instance

Figure 11: The decentralized and hybrid approaches offer a configuration interface to the end devices that is agnostic to the configuration model

10 EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com


Be Certain. Belden.

Figure 12: Hirschmann Industrial HiVision enables convenient manual engineering and monitoring of TSN networks

This information includes characteristics specific protocols such as OPC UA can Allocation Protocol (RAP, IEEE P802.1Qdd
such as the cycle time and bandwidth be used for the information exchange [19]) to specify a new distributed
requirements. End devices that are between Talker or Listener and CUC. protocol at the IEEE that considers the
interested in a data stream that is The switches are configured using new TSN mechanisms.
announced, so-called listeners, can then existing management protocols such
use this information to register for a as SNMP (Simple Network Management Finally, the hybrid approach combines
specific data stream. After registration, Protocol) or through YANG models the centralized and decentralized
they will receive the data packets with protocols such as NETCONF. approaches. Like with the distributed
belonging to the stream. To interface CNC to the CUC, IEEE approach, the end devices announce
802.1Qcc already defines some basic their requirements via the distributed
The three planned configuration models structures in the form of a YANG model. protocol. However, as shown in Figure
differ in how the device and stream Within the scope of a new standardization 11, the actual TSN configuration takes
requirements are communicated and project (IEEE P802.1Qdj), these basic place centrally. One advantage of this
processed in the network. With the structures will now be extended to a approach is that end devices only
centralized approach, talkers and complete interface definition. This will, have to support a single configuration
listeners communicate via a direct for example, enable a uniform interface protocol, but the network can be either
end-to-end connection with a (logically) based on RESTCONF in the future. managed centrally or configured in a
centralized end device configuration decentralized fashion, depending on the
instance, the Centralized User In contrast to the centralized approach, network operator's preference. SRP in
Configuration (CUC), as shown in the distributed approach propagates IEEE 802.1Qcc has already been extended
Figure 10. the end device requirements in the for this purpose.
network (see Figure 11) and determines
The CUC creates the combined a common configuration of the TSN Even though all three configuration
requirements for the data streams from mechanisms to be used, based on the mechanisms described here are still
the Talker and Listener information locally available information in each under development, it is already
and passes them on to the Centralized device. The Stream Reservation possible today to configure the presented
Network Configuration (CNC), which is Protocol (SRP) that was originally TSN mechanisms. Configuration
also the logical network configuration developed for the TSN predecessor interfaces are available via standardized
instance. The CNC calculates the time technology AVB operates based on protocols such as SNMP. This enables,
slot for a new data stream, for example, this principle. However, it does consider for example, manual engineering of the
based on the information available the TSN configuration requirements, cycle times and time slots of the TAS
regarding the network topology and the as TSN was developed later. Therefore, mechanism using network management
resource reservations already allocated, IEEE 802.1 is currently developing the tools such as Hirschmann Industrial
and configures the network participants Link-local Registration Protocol (LRP, HiVision (see Figure 12).
(e.g. switches) accordingly. Application- IEEE P802.1CS [18]) and the Resource

EMEA +49 (0) 7127/14 -1809 | beldensolutions.com  US 1-800-BELDEN-1 | belden.com 11


Be Certain. Belden.

Summary and outlook


With TSN, deterministic data transmissions with Ethernet according to IEEE 802.1 and 802.3 become possible for the first time.
TSN's range of functions allows it to be used in a wide variety of application scenarios, some with very different requirements in
terms of transmission latency, jitter and reliability. The “TSN Profile for Industrial Automation” (IEC/IEEE 60802) will therefore be
of particular importance for automation networks. Its aim is to pick a selection of mechanisms from the TSN set of standards
to form a baseline specification for automation networks. This profile is currently being developed in cooperation between the
IEC and the IEEE 802.1 TSN Working Group. In addition, IEEE naturally continues to develop complementary mechanisms and
enhances existing TSN standards as required. Central mechanisms of the TSN family have already been completed for some
time and have been successfully demonstrated on several occasions. These mechanisms, such as the Time-Aware Shaper, are
already integrated in various products, so that their advantages can already be used productively. The IEEE 802 standardization
process also ensures complete backward compatibility: TSN networks already installed today can be used in the future as well.
The time of TSN has come!

References
1. https://1.ieee802.org/tsn/
2. https://ieeexplore.ieee.org/document/7440741
3. http://ieeexplore.ieee.org/servlet/opac?punumber=7553413
4. http://ieeexplore.ieee.org/servlet/opac?punumber=7900319
5. http://ieeexplore.ieee.org/servlet/opac?punumber=7433913
6. http://ieeexplore.ieee.org/servlet/opac?punumber=4579757
7. http://ieeexplore.ieee.org/servlet/opac?punumber=5741896
8. Hirschmann IEEE 1588 White Paper
9. https://1.ieee802.org/tsn/802-1as-rev/
10. http://ieeexplore.ieee.org/servlet/opac?punumber=5375702
11. http://ieeexplore.ieee.org/servlet/opac?punumber=7961301
12. https://1.ieee802.org/tsn/802-1qcr/
13. http://www.ieee802.org/1/files/public/docs2010/ba-boiger-bridge-latency-calculations.pdf
14. http://ieeexplore.ieee.org/servlet/opac?punumber=8064219
15. http://ieeexplore.ieee.org/servlet/opac?punumber=11085
16. https://ieeexplore.ieee.org/document/8091139
17. https://ieeexplore.ieee.org/document/8514112
18. https://1.ieee802.org/tsn/802-1cs/
19. https://1.ieee802.org/tsn/802-1qdd/

About Belden
Belden Inc., a global leader in high quality, end-to-end signal transmission solutions, delivers a comprehensive product
portfolio designed to meet the mission-critical network infrastructure needs of industrial, enterprise and broadcast markets.
With innovative solutions targeted at reliable and secure transmission of rapidly growing amounts of data, audio and video
needed for today’s applications, Belden is at the center of the global transformation to a connected world. Founded in 1902,
the company is headquartered in St. Louis, USA, and has manufacturing capabilities in North and South America, Europe
and Asia.

For more information, visit us at www.belden.com and follow us on Twitter @BeldenIND.

Belden, Belden Sending All The Right Signals, GarrettCom, Hirschmann, Lumberg Automation, Tofino Security, Tripwire and the Belden logo are trademarks or registered trademarks of Belden Inc. or its affiliated companies in
the United States and other jurisdictions. Belden and other parties may also have trademark rights in other terms used herein.

EMEA +49 (0) 7127/14-1809  |  beldensolutions.com US 1-800-BELDEN-1  |  belden.com


12 ©Copyright 2019, Belden Inc. TSN-TIME-SENSITIVE-NETWORKING_WP00027_INIT_HIR_1019_ENG

You might also like