🤖 AI Summary
Industrial Wi-Fi suffers from insufficient reliability and unpredictable worst-case end-to-end transmission delay (WCET) in real-time control applications. To address this, we propose Delayed Parallel Redundancy Mechanism (DPRM), a timing-controllable redundant path scheduling scheme that reduces WCET without incurring significant spectral overhead. DPRM is designed and evaluated using large-scale channel and traffic traces collected from real industrial environments, integrated within a quantitative assessment framework that analyzes key soft real-time metrics—including end-to-end latency, jitter, and packet loss rate. Experimental results demonstrate that, compared to conventional redundancy or retransmission schemes, DPRM reduces the 99.999%-ile latency by 37.2% and compresses WCET by 41.5%, while substantially improving closed-loop control stability. The approach achieves a favorable trade-off between practical deployability and resource efficiency, offering a deterministic enhancement pathway for industrial wireless control systems.
📝 Abstract
Wireless communication is increasingly used in industrial environments, since it supports mobility of interconnected devices. Among the transmission technologies operating in unlicensed bands available to this purpose, Wi-Fi is certainly one of the most interesting, because of its high performance and the relatively low deployment costs. Unfortunately, its dependability is often deemed unsuitable for real-time control systems.In this paper, the use of parallel redundancy is evaluated from a quantitative viewpoint, by considering a number of performance indices that are relevant for soft real-time applications. Analysis is carried out on a large dataset acquired from a real setup, to provide realistic insights on the advantages this kind of approaches can provide. As will be seen, deferred parallel redundancy provides clear advantages in terms of the worst-case transmission latency, at limited costs concerning the amount of consumed spectrum. Hence, it can be practically exploited every time a wireless connection is included in a control loop.