Beruflich Dokumente
Kultur Dokumente
ACKNOWLEDGMENT
The author would like to thank Dr. Cruz for many useful discussions and feedback and E. Ardestani who helped with the figures,
the reviewers for their valuable feedback, and the anonymous reviewers whose recommendations have helped us greatly in revising
the manuscript.
REFERENCES
[1] S. K. Agarwal, M. Laifenfeld, A. Trachtenberg, and M. Alanyali,
Using bandwidth sharing to fairly overcome channel asymmetry, in
Proc. Inform. Theory Appl., San Diego, CA, Feb. 2006, [CD ROM].
[2] S. Asmussen, Applied Probability and Queues. New York: Springer,
2000.
[3] F. Baccelli, Two Parallel Queues Created by Arrivals With Two Demands; the M/G/2 Symmetrical Case, Tech. Rep., 1985.
[4] F. Baccelli and Z. Liu, On the execution of parallel programs on multiprocessor systems: a queueing theoretic approach, J. ACM, vol. 37,
no. 2, pp. 373414, Apr. 1990.
[5] F. Baccelli, W. A. Massey, and D. Towsley, A cyclic fork-join queuing
networks, J. ACM, vol. 36, pp. 615642, 1989.
[6] G. Barrenechea, B. Beferull-Lozano, A. Verma, P. L. Dragotti, and M.
Vetterli, Multiple description source coding and diversity routing: A
joint source channel coding approach to real-time services over dense
networks, in Proc 13th Int. Packet Vid. Workshop, 2003, [CD ROM].
[7] B. B. Bhattacharyya, Reverse submartingale and some functions of
order statistics, Ann. Math. Statist., vol. 41, pp. 21552157, 1970.
[8] J. Chakareski, S. Han, and B. Girod, Layered coding vs. multiple descriptions for video streaming over multiple paths, in Proc. ACM Multidmed., Nov. 2003, [CD ROM].
[9] C. S. Chang, R. Nelson, and D. D. Yao, Scheduling parallel processors: Structural properties and optimal policies, Math. Comput. Model,
vol. 23, pp. 93114, 1994.
[10] H. A. David and H. N. Nagaraja, Order Statistics. New York: Wiley,
2003.
[11] M. Harchol-Balter, Task assignment with unknown duration, J. ACM,
vol. 49, pp. 260288, Dec. 2002.
[12] APX10 Access Point Aggregator, for the Enlightened Wireless Data
User Tech. Rep. [Online]. Available: http://www.mushroomnetworks.com
[13] T. Javidi, Cooperation and resource sharing in data networks: A delay
perspective, in Proc. Allerton Conf., 2006, [CD ROM].
[14] P. Konstantopoulos and J. Walrand, Stationary and stability of fork/
join networks, J. Appl. Probab., pp. 604614, 1989.
[15] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, Cooperative diversity
in wireless networks: Efficient protocols and outage behavior, IEEE
Trans. Inform. Theory, vol. 50, no. 12, pp. 30623080, Dec. 2004.
[16] A. M. Makowski and R. Nelson, An optimal scheduling policy for
fork/join queues, in Proc. 32nd IEEE Conf. Decision Control, 1993,
pp. 36113617.
[17] S. Mao, Multi-path routing for multiple description video over
wireless ad hoc networks, in Proc. IEEE INFOCOM, 2005, pp.
740750.
[18] S. Mao, S. Lin, Y. Wang, S. Panwar, and Y. Li, Multipath video transport over ad hoc networks, IEEE Wireless Commun. Mag., vol. 12, no.
4, pp. 4249, Aug. 2005.
[19] A. W. Marshall and I. Olkin, Inequalities: Theory of Majorization and
Its Applications. New York: Academic, 1979.
[20] A. Muller and D. Stoyan, Comparison Methods for Stochastic Models
and Risks. New York: Wiley, 2002.
[21] R. Nelson and A. N. Tantawi, Approximate analysis of fork/join synchronization in parallel queues, IEEE Trans. Comput, vol. 37, no. 6,
pp. 739743, Jun. 1988.
[22] R. Nelson, D. Towsley, and A. N. Tantawi, Performance analysis of
parallel processing systems, IEEE Trans. Software Eng., vol. SE-14,
no. 4, pp. 532540, Apr. 1988.
[23] E. Setton, Y. Liang, and B. Girod, Adpative multiple description video
streaming over multiple channels with active probing, in Proc. IEEE
ICME, Jul. 2003, pp. 509512.
[24] C. Xia, G. Michailidis, and N. Bambos, Dynamic on-line task scheduling on parallel processors, Perform. Eval., vol. 46, no. 23, pp.
219233, Oct. 2001.
I. INTRODUCTION
In a number of emerging engineering applications, the measurement
and control commands need to be sent over communication networks,
which bring considerable and varying transmission times. Typical examples can be seen in the remote control of several mobile units, arrays of microactuators, underwater acoustic, and even neurobiological
and social-economical systems. A typical feature in these systems is
that time division multiplexed computer networks are employed for exchanging information between spatially distributed plant components.
Motivated by these emerging engineering applications, in recent years
more and more attention has been drawn to the development of a general theory for networked control systems (NCSs), which considers
control and communication issues simultaneously.
Results on NCSs are extensively scattered in the literature [1], highlighted by the recent special issue [2], survey papers [3][5], and monograph [6]. The stability of NCSs has been investigated in [7] and [8]
where networked induced delays are taken into consideration for the
stability analysis. The control problem has been addressed in a number
of papers. To mention a few, a sampled-data approach has been developed to design state-feedback controllers which considers the network
induced delays and data-packet dropouts simultaneously in the control
design with or without performance requirements [9], [10]; stochastic
approaches have been proposed by using various stochastic descriptions about the network induced delays or data packet dropouts [11],
[12]; and a moving horizon control strategy has been reported in [13].
The problem of estimation has been solved in [14] which takes into account the data missing phenomenon. In addition, the quantization effect caused by the coding-encoding strategies for NCSs has also been
investigated in [15][17].
Manuscript received January 16, 2007; revised April 17, 2008. Current
version published October 8, 2008. This work was supported by the Natural
Sciences and Engineering Research Council of Canada, National Natural Science Foundation of China (60528007, 60504008), the 111 Project (B08015),
the Research Fund for the Doctoral Programme of Higher Education of
China (20070213084), and Fok Ying Tung Education Foundation (111064).
Recommended by Associate Editor I. Kolmanovsky.
H. Gao and X. Meng are with the Space Control and Inertial Technology
Research Center, Harbin Institute of Technology, Harbin 150001, China (e-mail:
hjgao@hit.edu.cn, mxydavid@yahoo.com.cn).
T. Chen is with the Department of Electrical and Computer Engineering, University of Alberta, Edmonton, AB T6G 2V4, Canada (e-mail: tchen@ece.ualberta.ca).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TAC.2008.930190
Authorized licensed use limited to: IEEE Xplore. Downloaded on November 20, 2008 at 12:33 from IEEE Xplore. Restrictions apply.
2143
arrives. The buffer will compare the time stamps on the arrived control signal and the one stored in it, and will be updated only when the
arrived control input is more recent than the existing one. By such a
mechanism, the buffer always stores the most recent control signals and
discards all the old signals according to the time stamps. Therefore, by
considering the network induced delay and the data packet dropout, we
have
u (k) = Kx(k 0 dk )
where dk denotes the step delay of the control signal stored in the
buffer. It is assumed that dk takes values in a finite set, that is, dk 2
f1; 2; . . . ; q g. In addition, the process fdk g is assumed to be i. i. d.
(independent and identically-distributed), with the probabilities given
by
(2)
(1)
fd k = j g = j ; j = 1 ; . . . ; q
(3)
where j is a positive scalar and qj=1 j = 1. If there is only a
Prob
single delay with unit probability, the result will reduce to [23]. An
interesting extension would be to consider (3) as a distribution around
a time-varying mean, such as described in [24].
Remark 1: In our problem formulation, dk denotes the step difference between the running step (k) and time stamp of the data in the
buffer. For example, suppose that the buffer stores the most recent control signal with time stamp t1 . When the next measurement after t1 is
lost during its transmission, the control signal with time stamp t1 will
be used. Thus, dk = k 0 t1 (k denotes the running step). Since dk
depends on both the network-induced delays and data packet dropouts
and we assume that the communication delay and the number of consecutive data packet dropouts are bounded, that is, dk is bounded.
By connecting (2) to (1), the closed-loop system is given by
(4)
!1
dm dk dM :
(5)
The assumption in (3) is essentially different from that in (5), and has
some advantages. Let us consider a simple example: suppose the delay
dk takes values in f2; 4; 6g. In this case, if we still use the standard
assumption in (5), we have to select dm = 2 and dM = 6. In such
a way, we actually assume that dk also takes values in f3; 5g besides
f2; 4; 6g, and thus overdesign will be introduced due to the inaccuracy
of the delay characterization.
Remark 3: The problem formulated above is different from that in
[11]. In [11], the problem of stochastic analysis and control of real-time
systems with random time delays is investigated, where the stochastic
delays are assumed to be less than one sampling period. While in our
problem, we start from the discrete-time model, and consider the case
of longer network induced delays with certain probabilities. In addition, [11] investigates the problem of optimal stochastic control while
we target at stochastic stability analysis and stabilization. The above
Authorized licensed use limited to: IEEE Xplore. Downloaded on November 20, 2008 at 12:33 from IEEE Xplore. Restrictions apply.
2144
fd
=
1; d k = j
g as
g = 0; dk 6= j .
Thus we have
fd
=
g = Prob fdk = j g = j ; j = 1; . . . ; q:
45
046 < 0
(7)
where see the first equation shown at the bottom of the page.
Remark 5: It is worth noting that not only the delay sizes i but
also the delay probabilities i have been incorporated into the stability
condition presented in Theorem 1. When i and i are known, the condition in Theorem 1 is a linear matrix inequality over the decision variables to be determined. The derivation of Theorem 1 makes use of the
free weighting matrix idea for achieving delay-dependence (such as
[28]), which potentially reduces the conservatism as no model transformation has been performed and thus no inequality has been utilized
for bounding cross product terms. The conservatism also largely depends on the choice of the Lyaopunov-Krasovskii functional, i.e., (13).
One could consider employing a less conservative treatment of Q and
Z for a specified j (see [29]).
Based on Theorem 1, a controller design result is given in the following theorem.
Theorem 2: Consider the networked control problem in Fig. 1.
Given the system in (1), a state-feedback controller in the form of
(2) exists such that the closed-loop system in (4) is GMSAS for any
network induced delays dk satisfying (3) if there exist matrices P > 0,
Q j > 0, M j , Zj > 0 satisfying
x(k + 1) = Ax (k) +
q
j =1
fd
=
g BKx(k 0 j ):
1 +
2T +
2
3
5
7
3
4 0 0 < 0
3
3
6 0
3
3 3
8
(6)
p T
p 2 AT 1 1 1 p q AT
p1K1 AT BT
0
p2 K0 T BT 11 11 11
0
3
51 =
..
.
3
3
pq K0 T BT
3
3
3
p1 (A 0 I )T p2 (A 0 I )T 1 1 1 pq (A 0 I )T
p 1 K T B T
0
p2 K0 T BT 11 11 11
0
3
52 =
..
.
0
3
3
3
3
3 p q K T B T
q
41 = diag 0P + Qj ; 0Q1 ; 0Q2 ; . . . ; 0Qq
42 =
q
j =1
j =1
Mj
0M1 0M2 1 1 1 0 Mq
j Z j ;
j Z j ; . . . ;
j Z j
j =1
j =1
Authorized licensed use limited to: IEEE Xplore. Downloaded on November 20, 2008 at 12:33 from IEEE Xplore. Restrictions apply.
(8)
where you see the equation shown at the bottom of the page. Moreover,
an admissible controller gain is given by
K = K P 01 :
(9)
1 = diag 0P +
q
j =1
2145
rate the convergence rate optimization into the controller design procedure. One possible way is to consider the exponential convergence
rate, which could be achieved by modifying the index function we introduced in (13). Some existing references about the exponential stability in the LMI framework (such as [33]) are illuminating for solving
this problem.
IV. ILLUSTRATIVE EXAMPLE
In this section, we use an inverted pendulum system to illustrate the
results developed in the above section. The discretized model for the
pendulum system is given by [23]
x (k + 1) = Ax (k) + Bu (k)
with
A=
(10)
(11)
187:4243 0138:0439
0138:0439 923:2942
K = 104 2 [ 1:7907 0:9014 ] :
P =
q
M j 0M 1 0M 2 1 1 1 0M q
2 =
j =1
7 = [ pp
T p2 P AT 1 1 1 pq P AT
p11KPTABT
0
p2 K0 T BT 11 11 11
0
3
5 =
..
.
0
3
3
3
3
3 pq K T BT
8 = diag 0Z1
10 ; 0Z2
10 ; . . . ; 0Zq
10
p1 P (A 0 I )T p2 P (A 0 I )T 1 1 1 pq P (A 0 I )T
p1 K T BT
0
p2 K0 T BT 11 11 11
0
3
9 =
:
..
.
0
3
3
3
3
3 pq K T BT
Authorized licensed use limited to: IEEE Xplore. Downloaded on November 20, 2008 at 12:33 from IEEE Xplore. Restrictions apply.
2146
CALCULATED VALUES OF d
TABLE I
BY DIFFERENT EXISTING METHODS
) (
;
Let Xk fx k 0 q ; x k 0 q
orem, we introduce the following function:
V
(Xk ; k)
V1
0V 2
V3
Fig. 2. State responses of the closed-loop system.
(k)
Prob
= 4 = 0 1 Prob
u (k) = [ 117:8241
Prob
= 12 = 0 1
f1V jXk g
=2
V. CONCLUSION
The problem of stabilization for networked control systems has
been solved based on a new assumption on the network induced
delays, which characterizes the network induced delays more accurately and reasonable than some exiting ones extensively used in the
literature. Stability analysis and stabilization control problems have
been addressed using the Lyapunov method and the linear matrix
inequality techniques. A sufficient condition for the mean-square
asymptotic stability is first derived for the closed-loop networked
(14)
where you see the equation shown at the top of the next page. For any
appropriately dimensioned matrices
(12)
(13)
=2 = 08
25:3483] x(k 0 dk ):
V 1 + V2 + V 3 ;
x T (k ) P x (k ) ;
q
k01
xT (i)Qj x(i);
j =1 i=k0
q
01 k01
T (m)Zj (m);
j =1 i=0 m=k +i
x(k + 1) 0 x (k) ;
Mj
= [ M0Tj
1 1 1 MqjT ]T
M1Tj M2Tj
we have
T (k ) M j x (k ) 0 x (k 0 j ) 0
()=
() (
01
0
l=k
) (
(l)
= 0;
j = 1; . . . ; q
)T
where k
x T k x T k 0 1 x T k 0 2 1 1 1 xT k 0 q .
Then, we have (15), shown on the next page. Note that the last term
in (15) is no larger than zero. By Schur complement, (7) guarantees
q
01 T
1
2
1 3 T1 2 4 T2
2T
j =1 j Mj Zj Mj < .
we have f V Xk+1 ; k
j Xk g < V Xk ; k ,
Thus, for all Xk 6
that is, there exists < < satisfying
4 + 4 + 4 + 5 4 5 +5 4 5 +
=0
(
+ 1)
0
1
f V (Xk+1 ; k + 1)j Xk g V (Xk ; k) :
By using this relationship recursively we have
Authorized licensed use limited to: IEEE Xplore. Downloaded on November 20, 2008 at 12:33 from IEEE Xplore. Restrictions apply.
0
)
f1V1 jXk g =
Ax (k) +
q
j =1
fd = g BKx(k 0 j )
2 Ax (k) +
= xT (k)
+
f1V2 jXk g =
01
q
j =1
q
j =1
q
l=1
l Z l
j xT (k)(A 0 I )T
l=1
q
j x T (k 0 j )K T B T
q
01
0
j =1 l=k
q
j =1
q
l=1
T (l)Zj (l)
q
j =1
q
q
l=1
j xT (k)(A 0 I )T
01
k=0
j =1
j =1 l=k
q
j =1
j xT (k) AT P BKx(k 0 j )
l Zl BKx(k 0 j )
l=1
q
l=1
T (l )Z j (l )
l Zl BKx(k 0 j )
Xk
T (k ) M j x (k ) 0 x (k 0 j ) 0
q
01
0
j =1 l=k
Since
(X k ; k ) X 0
(1 + + 1 1 1 + N )V (X0 ; 0)
N +1
= 1 01 0 V (X0 ; 0) :
01
0
l=k
(l )
Then, we have
N
Xk :
(A 0 I ) x (k)
l Z l
j x T (k 0 j )K T B T
+2
l Zl BKx(k 0 j )
x T (k )Q j x (k ) 0 x T (k 0 j )Q j x (k 0 j )
j =1
j =1
l Zl BKx(k 0 j )
j xT (k 0 j )K T B T P BKx(k 0 j )
+ xT (k)(A 0 I )T
Xk
(A 0 I ) x (k)
+2
j =1
j xT (k) AT P BKx(k 0 j )
T (k ) Z j (k ) 0 T (k + i)Z j (k + i)
j =1 i=
0 xT (k) P x (k) Xk
j x (k 0 j )K B P BKx(k 0 j );
T
= xT (k)(A 0 I )T
fd = g BKx(k 0 j )
A T P A 0 P x (k ) + 2
f1V3 jXk g =
j =1
j =1
+2
j =1
2147
Qj
>
limN !1
N
k=0
and
Xk :
xT (k)Px(k) X0
Zj
(15)
>
0, then
(1=1 0 )W0 (X0 ).
lim
N !1
N
k=0
x T (k )x (k ) X 0
Authorized licensed use limited to: IEEE Xplore. Downloaded on November 20, 2008 at 12:33 from IEEE Xplore. Restrictions apply.
(1 0 )1min (P ) V (X0 ; 0)
2148
j ( )j2 ! 0 as
which means
concluded.
x k
APPENDIX II
PROOF OF THEOREM 2
First by noticing Zi
which is equivalent to
>
0, we have i 0 i01 i 0 0,
P
0 i01 i 0 2
PZ
(16)
P:
1 +
T2 +
2
3
5
7
3
4 0 0
3
3
6 0
3
3 3
8
defining
(17)
4
where
Performing
diag
<
PZ
;P
;P
P;
PZ
P;
Q P
Z P
KP
= 01
01
01
j = j
0
1
0
1
j = j j
= 01
= 01 01
01 01
10 j 01
j = diag
PZ
QP
;P
M P
REFERENCES
[1] D. Yue, J. Lam, and Z. Wang, Persistent disturbance rejection via state
feedback for networked control systems, Chaos, Solitons & Fractals,
to be published.
[2] P. Antsaklis and J. Baillieul, Guest editorial. Special issue on networked control systems, IEEE Trans. Automat. Control, vol. 49, no.
9, pp. 14211423, Sep. 2004.
[3] J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, A survey of recent results
in networked control systems, Proc. IEEE, vol. 95, no. 1, pp. 138162,
Jan. 2007.
[4] Y. Tipsuwan and M. Y. Chow, Control methodologies in networked
control systems, Control Eng. Practice, vol. 11, pp. 10991111, 2003.
[5] T. C. Yang, Networked control system: A brief survey, Proc. Inst.
Elect. Eng. D, vol. 153, pp. 403412, 2006.
[6] H. Ishii and B. A. Francis, Limited Data Rate in Control Systems With
Networks, ser. Lecture Notes in Control and Information Sciences.
Berlin, Germany: Springer-Verlag, 2002, vol. 275.
[7] G. C. Walsh, H. Ye, and L. Bushnell, Stability analysis of networked
control systems, IEEE Trans. Control Syst. Technol., vol. 10, no. 3, pp.
438446, May 2002.
[8] W. Zhang, M. Branicky, and S. Phillips, Stability of networked control
systems, IEEE Control Syst. Mag., vol. 21, pp. 8499, 2001.
[9] M. Yu, L. Wang, and T. Chu, Sampled-data stabilization of networked
control systems with nonlinearity, Proc. Inst. Elect. Eng. D, vol. 152,
no. 6, pp. 609614, 2005.
control of
[10] D. Yue, Q.-L. Han, and J. Lam, Network-based robust
systems with uncertainty, Automatica, vol. 41, no. 6, pp. 9991007,
2005.
Authorized licensed use limited to: IEEE Xplore. Downloaded on November 20, 2008 at 12:33 from IEEE Xplore. Restrictions apply.