Abstract
With the rapid development of the industrial Internet of Things and the comprehensive popularization of mobile intelligent devices, the construction of smart city and economic development of wireless network demand are increasingly high. SDN has the advantages of control separation, programmable interface, and centralized control logic. Therefore, integrating this technical concept into the smart city data management WLAN network not only can effectively solve the problems existing in the previous wireless network operation but also provide more functions according to different user needs. In this case, the traditional WLAN network is of low cost and is simple to operate, but it cannot guarantee network compatibility and performance. From a practical perspective, further network compatibility and security are a key part of industrial IoT applications. This paper designs the network architecture of smart city industrial IoT based on SDN, summarizes the access control requirements and research status of industrial IoT, and puts forward the access control requirements and objectives of industrial IoT based on SDN. The characteristics of the industrial Internet of Things are regularly associated with data resources. In the framework of SDN industrial Internet of Things, gateway protocol is simplified and topology discovery algorithm is designed. The access control policy is configured on the gateway. The access control rule can be dynamically adjusted in real time. An SDN-based intelligent city industrial Internet of Things access control function test platform was built, and the system was simulated. The proposed method is compared with other methods in terms of extension protocol and channel allocation algorithm. Experimental results verify the feasibility of the proposed scheme. Finally, on the basis of performance analysis, the practical significance of the design of a smart city wireless network hierarchical data management system based on SDN industrial Internet of Things architecture is expounded.
1. Introduction
According to the analysis of “Made in China 2025” proposed under the background of the new era, the development of the industrial Internet of Things has received the attention of the whole society, especially the information and communication technology and intelligent manufacturing have now become the core content of China’s urban construction and development. From the perspective of the Internet of Things practice, the Internet of Things can complete big data integration services more efficiently through the use of work. Among them, the Industrial Internet of Things, as the basis of Internet content, will integrate cloud computing, big data, and sensors into the entire process. The emergence of the Industrial Internet of Things uses advanced technology to gradually transform traditional industries into intelligent industries, thereby improving product quality and production efficiency. At the same time, during the development of the Industry 4.0 era, the biggest feature is the network physical system, also known as CPS. The whole physical process needs to be controlled by a computer, and relevant data and commands are transmitted to the CPS controller. With the comprehensive promotion of subsequent Ethernet technology, it can bring clear real-time attributes and can transmit real-time or non-real-time traffic in the same media, but because of their incompatibility, it is impossible to run different technologies in the same physical media in the development of practice. In view of this situation, researchers have strengthened the research on time-sensitive network (TSN), especially as the key content of which the smart city data management algorithm has become the focus of scientific research and exploration, which will play a positive role in the future industrial communication and automation technology innovation. Abosata et al. [1] further verified the importance of TSN research in Industry 4.0 in their research on the development of China’s industrial Internet of Things. Wiers et al. [2] also put forward new conclusions about time-sensitive network technology and its application in an industrial network, especially it has been widely used in many fields of industrial network and attracted more scholars to participate in the research. Nowadays, with the deepening of practical research tasks, effective countermeasures have been obtained to solve some TSN data processing problems [3]. For example, Cerrato et al. [4] put forward new views on the South Industrial Control Security Gateway on the basis of ensuring the security of sensitive data in the industrial control system. Pinheiro et al. [5] proposed the TT traffic data processing method based on the operation characteristics of TSN and completed various TT communication data processing work accordingly. At the same time, Xu et al. [6] proposed the tabu search heuristic algorithm to clarify the TT frame data processing so as to minimize the WCD of the RC frame. In addition, Smirnov et al. [7] calculated and analyzed the constraint conditions required for offline data processing according to the clear characteristics of time-sensitive traffic in TSN and the general configuration of behavioral function data so as to avoid the delay phenomenon of key communication flow from port to port. Chen et al. [8]. Mapped the actual system data processing problems to the job-shop data processing problems that did not need to wait under the condition of ensuring time-sensitive traffic to minimize network delay and then used the tabu search algorithm to deal with the problems. As the core content of urban economic construction and development, Internet of Things technology is gradually integrated into the innovation work of various industries and fields but also shows a very broad development prospect and brings more terminal equipment management problems. Combined with the above design and analysis of the smart city data management wireless networking hierarchical system based on SDN network architecture, it can be seen that the future technology research and development of the Internet of Things must pay attention to wireless network access control, and combined with CPS, the TSN data processing algorithm is deeply explored [9].
2. Methods
Similar to the industrial Internet of Things, it can be applied to the development of various industries and can provide more opportunities and challenges for the realization of automation and intelligent industrialization. Considering the integration of SDN network architecture and wireless network sharing system design in smart city construction, it can be seen that when the virtual WLAN design simplifies network management operation, it does not put forward effective solutions for resource allocation, so it is difficult to improve the overall performance in the practical development. Due to the open network architecture and industrial Internet of Things sharing data information in big data era, network information security issues are easy to affect information operations, so real-time networks have advantages in R&D application. First is large data transmission capacity. The second is to give priority to functional design. At this time, this problem can be solved by controlling the real-time communication network. This provides the basic guarantee for the actual data transmission [10] as shown in Figure 1.

2.1. Architecture Analysis
According to the analysis of Figure 2, the overall design framework is mainly divided into three layers: the first layer is the application layer; the second is the network control layer; and the third is the network infrastructure layer. Take the network infrastructure layer as an example, all the wireless access points (APs) contained in it need to build virtualized APs, also known as VAPs, which belong to virtual machines of physical APs and can be used to virtualize network resources. At the same time, all APs have the ability to virtual multiple VAPs, and all VAPs exist independently not only to provide system users with required network services but also to provide relay services for various APs. In addition, any switch with a wire terminal in the network system can run the OpenFlow protocol service [11].

2.2. Functional Design
According to the analysis of Figure 3, the structure of SD-AP contains three layers: (1) VAP: this level refers to the abstract materialization of SD-AP, which is mainly used to deal with channel detection, user management, state detection and other work. (2) Wireless network card driver: this level is mainly used to support the transmission of WLAN protocol signals and collect the information of the state of the wireless channel. (3) The south interface agent: it is mainly used to expand the protocol interpretation, to execute the commands proposed by the controller, and on the basis of encapsulating the network events, the relevant contents are transmitted to the controller through the southward protocol.(1)User Management. System users should connect with the network through the SD-AP wireless port and conduct comprehensive control over the operation of the wireless network. This effort is user-centric, not port-centric. In this study, in order to better control all associated users, a lightweight virtual access point (LVAP), which represents the user’s proprietary state set, is proposed to represent the specific state of the user’s connection with the network. In essence, LVAP can be regarded as the interface provided by SD-AP for all users, mainly used to control the specific situation of users. When all users connect to the network for the first time, this module will form the LVAP, and all LVAPs will have a unique basic service set identifier (BSSID), which needs to be formed from the MAC address of the system user. At the same time, because LVAP reserves the authentication information of all users, such as MAC address, IP address, and so on, in the process of communication with SD-AP, it is equivalent to communicating with LVAP. In other words, as long as LVAPs are formed in SD-AP, users can be effectively linked to the network. In this module, users not only can manage the scheduling problems transformed into LVAP after abstract processing but also can put forward appropriate security countermeasures according to different user needs. [12].(2)Channel Detection. For all users, the most important concern is how to obtain a QoE or how to provide a corresponding QoS. And this mapping to the physical layer is the transmission quality of wireless communication. From the practical point of view, the construction of the channel monitoring module is to better guarantee the operation management quality of the application layer, avoid the interference of various factors during the application period, and thus improve the effectiveness of network resource allocation and the experience of receiving services. Generally speaking, the channel monitoring module is mainly used to control layer transmission. There is a relationship between the user and the signal-to-interference ratio, the overall strength of the received signal, the duration, and the average packet loss rate associating all the parameters between the SD-AP. These contents are uploaded to the network controller after encapsulation and processing, which can facilitate the network management personnel to implement resource scheduling according to the specific operation state [13].(3)Resource Description. The network is distributed equally among all users, and the smallest unit of resources is called a resource block. And the user will obtain the network resources according to the acquisition of resource blocks. In the wireless network system, because the access mechanism of random access has been fully promoted. So user access to resources is competitive. However, in a large-scale network, factors such as adjacent channels and transmitting power will affect user services, and each SD-AP will involve computing storage resources, real-time performance and other related issues, which need to be dealt with directly in SD-AP. In other words, on the basis of collecting and analyzing network, SD-AP resources can implement global optimization processing to the whole network. It can be seen that the purpose of this module design is to obtain the resources in SD-AP and bring the specific view of network resources to the control layer so as to help the system application carry out the resource scheduling work in an orderly manner [14].(4)Status Monitoring. In order to better provide users with quality services, the network will put forward corresponding optimization mechanisms according to the system operation, such as interference management and load balancing, so as to ensure that users can obtain a better service experience inside the system. In the process of popularizing these optimization countermeasures, it is necessary to combine the current network state analysis results to conduct in-depth exploration. Therefore, it is necessary to obtain the state information of SD-AP in the control layer, so as to bring an effective basis for the actual application layer. In practice, this module is mainly used to obtain the information related to computing storage and network resource application contained in SD-AP, package and process it into state frame, and transmit the relevant information to the controller under the condition that the controller makes a request. Because all SD-APs can involve multiple VAPs, in order to ensure the stable operation of all VAPs, it is necessary to balance all SD-AP resources occupied by all VAPs in the control layer and report the application of resources in real time.

2.3. Network Controller
According to the analysis of Figure 3 above, this module is mainly divided into two parts: (1) the network virtualization module and (2) the network controller set (VNCs). The former is mainly used to virtualize the physical networks, while the latter is mainly used to control the virtualization resources within the network. This paper studies thinking from the user perspective, mapping the transmit power included in SD-AP into the letter drying ratio (SINR) of all users, then the mapping between the resource and the user signal quality is obtained, and the following formula is obtained:
where represents the link gain case existing by the SD-AP user i, Pj represents the emission power of the SD-AP, N0 represents additive Gaussian white noise, and Ai represents the cover range, involving all SD-AP sets contained by the user i.
According to the network controller, the wireless network system design must include two forms: one is resource management (RVNC) and the other is state management (SVNC). For the former, its work content is to classify the internal resources according to the resource view described by the network virtual module so as to facilitate the subsequent resource scheduling. The latter needs to collect various states of the network, such as resource occupation and network operation, so as to lay a foundation guarantee for the orderly allocation of subsequent resources [15].
The biggest advantage of the southbound interface expansion protocol of OpenFlow is centralized processing control and convenient fine-grained flow-based flow control. Therefore, the number of associated user terminals for all VAPs can be accurately calculated in a specific topological view. The average channel utilization probability formula for VAPj is as follows:
Formula (2) expresses the transmission speed of real-time network. In the formula, T represents the unit test time, ti represents the user I channel time, Ii represents the user I’s unit test time range, and rij represents the user I’s VAPj probability of data transmission speed. Unit test includes general data collection and transmission times; the specific calculation formula is as follows:
where P represents the transmitted power, G represents the factor of link gain, and F represents the mapping function
SDN integrates existing virtual WLAN and time-sensitive networks (TSN) to obtain the TSSDN architecture, as shown in Figure 4. It can isolate the time-triggered flow from the spatial and temporal perspectives and thus provide a basic guarantee for data clarity.

Combined with the analysis of the OpenFlow architecture diagram shown in Figure 5, it is assumed that the source of the time-triggered flow will deliver unicast packets to the specified area at a fixed bit rate, and the time period is set to be an integer multiple of the minimum transmission period that can be supported. This time-triggered mode is more suitable for sensors with fixed sampling cycles or actuators that transmit commands at specified time intervals so that time-triggered traffic can transmit data in high-priority UDP packets and is stronger than other priority traffic. Because the end system needs to synchronize accurately using the precise time protocol (PTP) and all event-triggered traffic has the same priority, an additional scheduling mechanism needs to be proposed to optimize the time-triggered traffic when conflicts occur.

According to the Figure 5 architecture, derived by the above formula, the trigger time can be determined. .
Consider the trigger flow of time as a tuple . And, V represents a collection of nodes, and derive , where i and j represent network link connections as a set of network connections. At the same time, , where S and H are collections of switches and hosts , where si and di represent the source and final destination region of the stream, respectively. Then you design the input variables for the related problem, where the set of streams triggered by scheduled events is as follows:
The specific map to the network link is as follows:
Suppose the stream i is transferred to the destination area via the link j, otherwise, it will become 0.
The specific map of the flow to the time slot is as follows:
The corresponding variables are as follows:
The stream i is obtained assuming that the link j is transferred to the destination area and is assigned to the time slot k, . Otherwise, it will become 0. This gives the best scheduling countermeasures to define the delivery schedule of the event trigger flow, as follows:
Among them, the shortest path formula for the optimization objective is as follows:
The calculation formula for the time-slot constraints is as follows:
The numerical formula for variable consistency is as follows:
where in (src (i)) represents the input of the source host, out (src (i)) represents the source host output, in (dst (i)) represents the input of the destination host, and out (dst (i)) represents the output of the destination host.
2.4. Transmission Scheduling
In studying the scheduling of time-triggered flows in the industrial Internet of Things, the transmission delay of link packets can be seen as a binary multibackpack phenomenon and is studied using the minimum ant system (MMAS) algorithm. Assuming you want n items into different weights of m backpacks and all the items in the backpack have different qualities, then you need to consider the backpack in which they should be placed. The multiple pack problem is more complex than the 0–1 pack problem and can be described as a backpack with m capacity is . And there are n items whose value is Pi; in the case of putting the i-th item into the j-th item, the corresponding weight is Wij and conforms to and . This problem involves calculating two cases: one where a single item goes into the backpack and the other is not to put a certain item into the backpack at all; in the backpack, capacity does not meet the constraints on the basis of maximizing the total value of the items into the backpack.
The problem of binary multiple knapsacks can be expressed as follows:
The formula for maximizing the total value of items in the backpack of the optimization target is as follows:
The capacity limit formula of each backpack is as follows:
Among them, . Item I is selected into the backpack, and 0 is not selected into the backpack. The formula for selecting a game for a bunch of items is as follows:
This paper studies the use of a directed graph to represent the network, where V represents the set of nodes and conforms to . This condition. The KTH bandwidth provided by link (I, j) is assumed to be consistent . A stream can go through a link, so it is 1, or vice versa. In addition, combining with the conservation constraint analysis of flow, we can get
It is proved that the traffic of the KTH stream of the network entering the transmission node should be consistent with the traffic proposed by this node.
At the same time, the link capacity should be restricted and meet the constraint conditions, as follows:
In addition, the formula of service self-similar traffic is used to study the average packet delay of the flow through the i-th link. The calculation formula is as follows:
where conforms to the . This condition, and H is a constant.
According to the binary backpack problem, the number of the link through which the event-triggered flow passes is determined so as to avoid queuing phenomena during the transmission of packets and to minimize the actual delay phenomenon so as to achieve optimization processing goal. The specific mathematical model is as follows:
From the perspective of ant colony optimization algorithm, it is assumed that the number of nodes is n; the total number of ants is m; and the distance between node I and node j needs to be expressed as . Then, the residual information intensity at time t on the link between the two can be expressed as . Ant k looks for the next path according to the residual pheromone intensity; then the probability that it moves from node I at time t to node j is . Then, we can get
where represents the node set that ant k can walk, and the taboos can be expressed as ; Nodes that pass through are recorded in the taboos table. After the ant passes through all nodes and returns to the initial point, n cities are recorded . And the path is the feasible solution. represents the degree of expectation of ant K from node I to I and represents the heuristic factor, usually . The corresponding importance needs to be utilized . s represents the neighboring nodes of the current time t. After the completion of all ants in each link, the global update formula is as follows:
where represents the volatility coefficient, represents the permanent coefficient of pheromone, using the information increment in the ant week model . After the above derivation, as shown in the figure, we show the basic model of the Ant (ACO) algorithm:
where Q represents a constant, which refers to the intensity of pheromone, and Lk represents the length of the path traveled by the KTH ant.
Through optimization and improvement analysis of TSN scheduling algorithm combined with ant colony system, the improved form of the initial pheromone is shown as follows:
where A represents the parameter, U represents the complement of the node set, and represents the number of currently impassable nodes in the vicinity of the node.
In order to improve the level of actual random search, the adaptive pseudo-random ratio should be used to obtain the next node j. The specific formula is as follows:
where q0 will usually get a constant in the range of 0 to 1 and q can also be selected at random. The probability of getting the next node needs to be determined by q. Assuming that the number goes down gradually, the corresponding probability goes up. When the amount of information and heuristic factors between nodes are strengthened, the results are as follows:in . At this time, it is derived as
where represents the volatility coefficient of pheromone, while t represents the specific parameter. The corresponding algorithm flow chart is shown in Algorithm 1.
|
3. Results
3.1. Performance Analysis of Transmission Scheduling
First, the application performance of the proposed improved algorithm shows that the impact of the number of event-triggered flows in the industrial IoT should be studied. The improved algorithm MMAS uses the network topology of the switch and the host to detect the working hours of industrial data processing at different times; the algorithm is compared with 10 traditional simulated annealing algorithms (TSA) and 11 traditional genetic algorithms (TGA). The final results are shown in Figures 6 and 7.


According to the analysis of the picture presentation results, the working time needed to outline the algorithm is less than the other two algorithms [16].
The actual number is controlled between 13 and 86, and the 60 event trigger streams are used for smart city transmission data processing, and finally, the working hours are carefully detected under different network topologies. Based on the linear optimization of topology size, the improved algorithm proposed in this paper is significantly lower than the results of other algorithms [17].
This paper designs two standard forms, one with 4 switches and 12 hosts, 6 switches with 24 hosts, and 60 event trigger streams to process and transmit data at any time. Compared with the above three algorithms, 30 operations are performed, and the results are shown in Table 1. At this time, it is shown to improve the convergence of the algorithm under different network scales. This shows that the target value and average value of the improved algorithm are better than the other two algorithms, and the number of optimal solutions in the 30-run process is more than that of the other two algorithms [18].
Combined with the performance comparison results shown in Table 1, we study the target convergence results of three algorithms at two sizes, as shown in Figure 8 [18].

Compared with the convergence at two scales, the improved algorithm is superior and the optimal solution can be obtained quickly. It proves that the MMAS algorithm can show positive advantages in the intelligent urban data management based on SDN network architecture, can effectively deal with the TSN data processing problems, appear no falling problems similar to the traditional algorithm, and thus improve the computational efficiency and quality of the actual optimal solution. [19].
3.2. Controller Performance Analysis
Considering the jitter change of the network time continuation, the observation and analysis show that when the ants look for the initial route, the number of pheromones in the link is very small, so the initial jitter change is very large. On the basis of increasing iterations, the jitter level of the design algorithm began to reach stability. On the basis of increasing the number of iterations, it can be lower than 22% from the perspective of parameters, so the jitter level of the design algorithm begins to stabilize. In addition, when studying the convergence of the target value obtained by triggering the flow algorithm at different times, 6 switches and 24 hosts are selected to build a network scenario, and the control quantity value is between 12 and 68. It is concluded that the actual number of iterations of the simulation results reaches 50 times, and the final results are shown in Table 2.
It is proved that the algorithm selected in this paper has better performance. In order to prove that the algorithm selected in this paper has better performance, the influence on the simulation is studied in combination with the number of network connections. Based on the continued increase in the number of network links, the objective function value will be increased, and the results show that the increase in the improved algorithm is significantly lower than the original algorithm. Therefore, the improved algorithm can meet the needs of system design. Through observation and analysis, it can be seen that the working time of the two algorithms will increase along with the continuous linear increase of the network topology. For smaller network structures, the incremental ant colony algorithm takes a longer time than the original one. However, from the perspective of large-scale network structure, the incremental ant colony algorithm has a shorter running time. Therefore, the incremental ant colony algorithm can effectively deal with large-scale network scheduling problems in the SDN network architecture.
4. Conclusion
To sum up, with the in-depth research on industrial Internet of Things technology concept in recent years, domestic and foreign researchers gradually realize the positive role of ant colony algorithm in the overall technical research and start to use the soft-considered network (SDN) framework to provide basic guarantee for data processing transmitted by a smart city. In this study, the scheduling problems in smart city data management design are static scheduling. It changes the possibility that some unpredictable disturbances may interfere with our schedule due to the complexity of the intelligent industry environment and uses the minimum ant system (MMAS) algorithm to design the system framework. For better improvement, dynamic scheduling is selected instead. At the same time, the data processing problem is discussed deeply. In this way, we not only can find effective optimization countermeasures but also further improve the urban intelligent construction system to meet the needs of urban residents and industrial development [20, 21].
Data Availability
This article did not collect relevant data but designed the algorithm and added parameters for simulation. The data have been reflected in the table.
Conflicts of Interest
The authors declare that they have no conflicts of interest regarding the present study.