Sie sind auf Seite 1von 13

A Brief Introduction to the Analysis and Design of Networked Control

Systems
Graham C. Goodwin, Eduardo I. Silva, Daniel E. Quevedo
School of Electrical Engineering and Computer Science, The University of Newcastle, NSW 2308, Australia
E-mail: graham.goodwin@newcastle.edu.au

Abstract: Networked Control has emerged in recent years as a new and exciting area in systems science. The topic has
many potential applications in diverse areas ranging from control of microrobots to biological and economic systems. The
supporting theory is very rich and combines aspects of control, signal processing, telecommunications and information
theory. In this paper, we will give a brief overview of recent developments in Networked Control with an emphasis on
our contributions. We also point to several open problems in this emerging area.

Key Words: Networked Control, Performance, Data-Rate Constraints, Delays, Data Dropouts

1 Introduction data-rate necessary to achieve stability and signal-to-noise


ratio requirements (see [15]). This observation reinforces
Traditionally, control theory has dealt with situations where the use of signal-to-noise ratio models in the context of
the communication links between plant and controller can NCS performance analysis (see, e.g., [16]).
be regarded as transparent (see, e.g., [13]). There exist,
however, cases where the links in a control system are far For SISO LTI plant models, one can design coding schemes
from being transparent and may become bottlenecks in the that, for a given initial non-networked controller design,
achievable performance. Control systems where this hap- allow one to minimize the impact of quantization effects on
pens are collectively referred to as Networked Control Sys- overall closed loop performance. These results emphasize
tems (NCSs). the essential role that the available degrees of freedom play
in NCSs (see [1618] and also [1923]).
The study of NCSs has emerged as an active research field
during the past years (see, e.g., the special issues [4, 5]). The issue of performance is particularly interesting in the
Key questions within this framework are related to the way context of networked control architectures for MIMO plant
in which network artifacts affect the stability and perfor- models. Practical control systems for MIMO plant models
mance of control loops that employ non-transparent com- often use structurally constrained controllers such as diag-
munication channels. Typical channel artifacts include onal or triangular ones (see, e.g., [1, 24]). The reasons for
data-rate limits, random delays and data dropouts. A uni- this choice are manifold and include ease of design, sim-
fying framework for the treatment of general NCS analy- plified tuning, and implementation related issues such as
sis and design problems does not yet exist. Nevertheless, cabling or geographic plant distribution. It is well known
there has been significant progress in the study of several that restricting the controller architecture generally limits
subproblems. For example, data-rate constraints have been the achievable performance (see, e.g., [2527]). Within
studied in, e.g., [69]. The issue of data dropouts has been this context, networks can play significative roles. In-
studied in, e.g., [1012] and random time delays have been deed, it is easy to envisage decentralized control architec-
considered in, e.g., [13, 14]. tures that, when enriched with additional (non-transparent)
A pivotal issue in any closed loop system is that of sta- communication links, may provide enhanced performance.
bility. When focusing on quantization issues, a key result This may (partially) overcome the limitations that arise as
establishes necessary and sufficient conditions on the chan- a consequence of the controller structure constraint (see,
nel data-rate that allows one to achieve closed loop stabil- e.g., [2832]). To illustrate these ideas, in the present pa-
ity (in an appropriate sense; see, e.g., [7] and the many per we will examine the control of MIMO LTI systems for
references therein). These results are given in terms of a which a decentralized controller has been successfully de-
lower bound on the channel data-rate (that depends on the signed. Unsurprisingly, for high-quality channels it turns
unstable plant poles only) over which control and coding out that a networked MIMO architecture outperforms de-
schemes can be constructed so as to achieve stability. These centralized ones. However, an interesting finding is that,
coding schemes are quite involved and may not be attrac- in some situations, the networked architecture will perform
tive from a practical point of view. This fact has motivated better than the decentralized one only if the channels are
us to study simple coding schemes that achieve rates close extremely reliable (see [33]).
to the bounds identified above (see [15]). Recent research We finally address the problem of dealing with arbitrary
has also established an important link between the average data dropouts and delays. We show how control laws de-

1
978-1-4244-1734-6/08/$25.00 
c 2008 IEEE
d w
D
r u y
C(z) G(z)
w s v y
D E F (z)
f channel
D E
s D E
channel
decoder encoder
Figure 2: Proposed coding scheme for stabilization.
Figure 1: Basic Networked control system (including cod-
ing scheme).
2.1 Key results

signed for non-networked control systems can be embel- For the setting described above, a key result states that it
lished so as to achieve good performance when used in is possible to find coders, decoder and controllers such that
an NCS that employs unreliable communication channels the resulting system is mean square stable (MSS) if and
(see [34] and related work [3540]). only if the average data-rate in bits per sample, say R, sat-
isfies (see [6])
The remainder of this paper is organized as follows: Sec-
tion 2 discusses the problem of stabilization of NCSs sub- np

ject to data rate constraints. Section 3 discusses the design R > log2 |pi | , (1)
of coding systems that optimize NCS performance. Sec- i=1
tion 4 studies some aspects in MIMO networked control.
Section 5 studies control over unreliable networks. Section where {pi }i=1, ,np denotes the set of unstable plant poles.
6 draws conclusions. The above result is valid for every coder, decoder and con-
troller in the class of (time varying and non-linear) causal
2 Stability systems. Therefore, (1) establishes a fundamental separa-
tion between what is achievable in NCSs over digital chan-
An overarching issue in any closed loop system is the po- nels and what is not (when the problem of interest is MSS).
tential for instability. For this reason, obtaining necessary We note that bounds similar to (1) arise as solutions to quite
and sufficient conditions which guarantee closed loop sta- a few different problems (e.g., observability, deterministic
bility has become a central issue in control theory. NCSs stability, etc.) and under different assumptions on the chan-
give rise to new challenges with respect to stability. This nels and coding schemes (see, e.g., [6,9,41,4547]). Indeed
section will give some insights into the stability question. the quantity on the right hand side of (1) is a fundamental
Consider the networked control situation shown in Fig- measure of the difficulty of manipulating a system, as ex-
ure 1. In that figure, G(z) is a SISO LTI plant, C(z) is plored in [8, 48].
a LTI controller, r is a reference signal1 and d is a dis- Proving that the rate at which a stable control system
turbance. Unlike standard non-networked control systems is transmitting data must satisfy (1) (i.e., necessity) is
(see, e.g., [13]) the feedback path in the control system in fairly simple and employs standard tools (see also [49
Figure 1 comprises a non-transparent channel and a coding 51]), whereas constructing an actual coding scheme that
scheme. The coding scheme is a novel aspect of networked achieves stability at any rate above the absolute limit (i.e.,
control that has no equivalent in traditional control theory. the proof of sufficiency) is much more involved (see [6, 9]).
The coding scheme has two parts: the encoder and the de- These observations motivate the remainder of this section.
coder. The encoder is in charge of appropriately process- 2.2 Some insights into the problem of stabilization
ing the signal to be sent over the channel so as to compen- with data-rate constraints
sate, if possible, channel characteristics and/or to translate
the measurements into symbols that the channel can under- In this section we shed some light into the limitations that
stand. (This is the case of, e.g., digital channels where the finite data-rates impose. To fix ideas, we will consider the
symbols are binary words.) On the other hand, the decoder coding scheme depicted in Figure 2, where F (z) is a LTI
is in charge of translating back the channel symbols into filter, and E and D are abstract systems that translate the
the standard signal domain. discrete time signal v into channel symbols s and channel
symbols into the discrete time signal w, respectively. Our
There exist many channel models (see, e.g., [41, 42]). To
presentation will start at an heuristic level and will then
highlight the ideas, in the present section we will consider
move towards a formal approach based on information the-
error- and delay-free digital channels, i.e., channels that can
oretic considerations.
transmit a countable set of symbols (countable alphabet)
without errors or delays. Of course, in practice, channels
always have restricted bandwidth and the channel alphabet 2.2.1 An additive noise model for quantization
is, thus, finite (not just countable; see also [7, 43, 44]).
Since the channel is digital, it becomes clear that E must
1 Allsignals in this paper are assumed wise sense stationary (wss) sta- quantize v prior to transmission. We will focus on the most
tionary processes. simple situation where D is the identity and E is a finite

2 2008 Chinese Control and Decision Conference (CCDC 2008)


uniform quantizer (see, e.g., [52, 53]), i.e.,2 where dh is an i.i.d. random process, uniformly distributed
   on (
2 , 2 ) and such that dh (k) is independent of v(k).
v(k) In this situation, and provided no overload occurs, q in (3)
s(k) = Q(v(k))  satV . (2)
becomes distributed as dh (see, e.g., [53,59,60]). In other
words, q becomes just as in the simplified model described
In (2), V > 0 is the quantizer dynamic range,  above. Again, in order to avoid quantizer overload, one
2V (L 1)1 is the quantization step and L is the number needs to consider an appropriate quantizer loading factor
of quantization levels. We say the the quantizer is over- and a signal-to-noise ratio constraint arises.
loaded if and only if |v(k)| > V for some k. (If in (2) satV
In practice, implementation of dithered quantizers is not
is removed and is fixed at any arbitrary positive value,
trivial since it requires the availability of the dither sig-
then Q becomes an infinite uniform quantizer.)
nal dh at both the sending and receiving ends. Usually
Quantization is a deterministic non-linear operation and
the dither is generated using pseudo-random number gen-
hence, the exact analysis of quantized systems is diffi-
erators that are initialized with the same seeds. Neverthe-
cult (see, e.g., [43, 44, 54]). It has thus become standard,
less, even if one employs a non-dithered uniform quan-
particularly in the signal processing literature (see, e.g.,
tizer with as small as 4 levels, it turns out that the predic-
[52, 55, 56]), to approximate quantization noise, i.e., the
tions made using the simple additive quantization model
process
described above are surprisingly accurate (see simulation
q  w v, (3) studies in [16, 17, 55, 61]).

by an additive i.i.d. noise source, uniformly distributed on 2.2.2 Limits imposed by signal-to-noise ratio con-
rthe interval (
2 , 2 ) and independent of the input to the straints
3
quantizer v. This model is valid only if is small enough,
the quantizer does not overload and v has a smooth prob- Consider the setting in Figure 2 and assume that E and D
ability density function (see, e.g., [57]). These conditions are such that q obeys the additive model for quantization
usually do not hold in the case of quantizers that are em- described in Section 2.2.1. We note that, since q depends
bedded in feedback loops, as is the case of NCSs (see, on the way in which E and D are designed, the variance of
e.g., [58]). We also note that assuming that q is either in- q, say q2 , becomes a decision variable.6 Within this setting
dependent of v or uncorrelated with v is, certainly, not a a basic question arises, namely finding the conditions on
valid assumption in networked situations. In these cases, the signal-to-noise ratio that guarantee MSS.
it makes more sense to assume that q is independent of (or It is possible to show via standard control theoretic argu-
uncorrelated with) the external signals r and d. ments (see [15]) that, for any strictly proper plant model
In order to avoid quantizer overload, it is usual in practice G(z) and any wss r and d, there exists C(z), F (z) and a
to choose a quantizer dynamic range such that the proba- finite q2 such that the resulting NCS is MSS if and only if
bility of overload is negligible (see, e.g, [52]). Indeed, if v  np
is wss and is any positive real value, then one can always  2
find a finite such that4 V = v guarantees that the prob- > inf  |pi | 1, (5)
ability of overload is less than ; is called the quantizer i=1

loading factor.5 With such a choice for the loading factor,


where {p1 , , pnp } is the set of unstable plant poles.
it is immediate to see that, provided q is as in the classical
From this result we conclude that, as was the case for (1),
additive model described above,
the degree of instability of the plant plays a key role in
v2 3 the interplay between stability and communications con-
 = 2 (L 1)2 , (4) straints (as expressed by signal-to-noise ratio constraints in
q2
our current framework). It is interesting to note that if one
where is the quantizer signal-to-noise ratio. Thus, bit- adds one and takes logarithms in (5), then one recovers the
rate limits translate into signal-to-noise ratio constraints. right hand side in (1). (In [15], we have shown that this
It is important to note that the previous model for quanti- connection is not a mere coincidence.)
zation can actually be rendered exact by a simple random- It is easy to see from (5) and (4) that, if the additive model
ization procedure. Indeed, it suffices to consider a dithered for quantization holds, then MSS is equivalent to
uniform quantizer. In this case 

   2 np
v(k) + dh (k) b > binf  log2 1 +  2
|pi | 1 , (6)
s(k) = satV , 3
i=1
w(k) = s(k) dh (k),
x
where b  log2 L is the number of bits in the quantizer.
2 sat (x)  x if |x| V and satV (x)  |x| V if |x| > V ; x
V In other words, provided no overload occurs and the noise
denotes the integer part of x.
3 Sometimes q is assumed only to be uncorrelated with v. model for quantization holds, (6) gives a bound on the
4 denotes the standard deviation of v.
v
instantaneous data-rate over the channel that guarantees
5 For example, if v(k) is Gaussian, then = 4 gives an overload
2
probability of 6.33 105 . 6 For the additive model described previously q2 = 12
.

2008 Chinese Control and Decision Conference (CCDC 2008) 3


MSS.7 Clearly, this bound on b is optimistic. Indeed, it dh dh
is only exact if one employs a dithered uniform quantizer
and there is no overload. But, if r, d or the initial plant state v s+ s w
have unbounded support, then it is impossible to guarantee Q EC ED
that the input to the quantizer is deterministically bounded. unif. quantizer channel
Even if r, d and the plant initial state have bounded sup- E D
port, and thus v is bounded, the previous analysis usually
requires a very large value for the loading factor . Equa- Figure 3: Entropy coded dithered quantizer.
tion (6) then provides only a conservative bound on binf .
In practice it is often sufficient to assume that v is such
that a sensibly small value for gives negligible overload such that the average data-rate is upper bounded by (see
probability (a typical value is = 4; see [52] and also [15]).
Sections 3 and 4).  
1 1 2e
R ln (1 + ) + log2 + 1. (7)
2 2 12
2.2.3 Average data-rates
Thus, we see that signal-to-noise ratio considerations give
In the previous section we dealt with instantaneous data- an upper bound on the average data-rate. In other words,
rates. There are at least two reasons that can be advanced there exists a strong link between signal-to-noise ratio con-
for abandoning that setting. First, if the external signals straints and average data-rate constraints. This goes beyond
have unbounded support, then it is impossible to give any the heuristic discussion in Section 2.2.1, and serves as a ba-
guarantee using the above reasoning, unless one employs sis for a simple but rigorous treatment of average data-rate
quantizers with infinitely many levels so as to avoid over- constraints in networked control.
load (thus incurring infinite instantaneous data-rates). Sec- In particular, one can use (7) to show that it is possible to
ond, if the external signals are bounded, then the quantizer achieve MSS at average data-rates that satisfy (see [15])
loading factor may need to be quite large in order to ac-
np
  
commodate v without overload. This implies that, even 1 2e
in those cases, one needs to use a quantizer with either R log2 |pi | + log2 + 1 + F (),
i=1
2 12
a large number of bits (which increases the instantaneous
rate), or a large quantization step (which implies poor per- where F is a positive function that goes to zero if .
formance). We thus conclude that, at least from a theoret- Therefore, the use of an ECDQ allows one to achieve an av-
ical point of view, it is interesting to study average data- erage rate that can be made arbitrarily
 close
 to the absolute
rates.8 (Of course, guaranteeing that average data-rates are minimum rate in (1) plus 12 log2 2e + 1 bits per sam-
12
bounded does not ensure that instantaneous rates will be ple (i.e., 1.25 bits per sample). This additional rate is com-
bounded.) posed by two terms: the first one is due to the divergence of
A popular way to deal with average data rate constraints the distribution of quantization noise from Gaussianity, and
is to use an entropy coded dithered quantizer (ECDQ; see, the second one originates in the inefficiency of the loss-less
e.g., [59]). Figure 3 shows the architecture of an ECDQ coding scheme employed to generate the channel symbols
and its relationship to E and D in Figure 2. An ECDQ uses (i.e., the inefficiency of EC).
a dithered infinite uniform quantizer, as described earlier,
but instead of sending the quantizer output directly over 3 Performance
the channel, it entropy-codes it prior to transmission. The Next we turn to the question of performance. Motivated
basic idea behind the entropy-coder EC in Figure 3 is to by the analysis presented in the previous section, we will
exploit the fact that some of the quantizer output values are utilize an independent additive noise channel model with
more likely than others. Thus, one can assign short chan- a signal-to-noise ratio constraint. This hypothesis covers
nel symbols (i.e., few bits) to very frequent quantizer out- many situations:
put values and long symbols (i.e., many bits) to infrequent
ones (see [42]). Correspondingly, the task of the entropy- Situations where the actual physical channel is addi-
decoder ED is to convert the channel symbols back into the tive and with a signal-to-noise ratio constraint.
exact quantizer output at the receiving end (see [42]). Situations where the channel is digital, has a finite
A key property of ECDQs is that the average data-rate at alphabet and one assumes that quantization noise is
which data is transmitted can be related to the quantizer white, independent, and the quantizer is properly
signal-to-noise ratio . Indeed, it is possible to show that, scaled (recall Section 2.2.1).
if the dither is as in Section 2.2 and is also independent of
r, d and the filters initial states, then the coding scheme Situations where the channel is digital, has a count-
proposed in Figure 2, when E and D form an ECDQ, is able alphabet, and one employs an ECDQ (see Section
7 Clearly, 2.2.3).
binf is in general greater than the right hand side in (1).
8 Alternatively, one could also examine time varying (i.e., adaptive)

quantizers that are scaled on-line according to the statistics of the input
Situations where the channel is analog, but prone to
signals. This topic is interesting, but is beyond the scope of this paper i.i.d. data dropouts (i.e., analog erasure channel; see
(see references in [7]). also [10, 11, 62]). Indeed, it has been recently shown

4 2008 Chinese Control and Decision Conference (CCDC 2008)


d It is possible to show that, provided C(z) is an admissible
r y controller for G(z) and the model for quantization holds,
C(z) G(z)
the model in Figure 4 is MSS if and only if F (z) is stable,

strictly proper, A(z) is stable, minimum phase (MP) and
biproper, and the signal to noise ratio satisfies
F (z)
2
> ||T (z) + S(z)F (z)||2 . (10)

2
f It is illustrative to note that, if ||T (z) + S(z)F (z)||2 ,
A(z)1 A(z)
w v then J(A(z), F (z)) (unless all exogenous signals
q
have zero spectral density, in which case J(A(z)F (z))
0). Also, if , then J(A(z), F (z)) 0 and we
Figure 4: Linear model for the NCS in Section 3. recover the non-networked performance that is achieved
with C(z) and a transparent communication link.

(see [63]) that, for such data dropout profiles, analog 3.2 Coding system design
erasure channels are equivalent, up to second order Based on (9) and noting that Tdrw (z)dr (z) is fixed, we
statistics, to an additive white noise channel with a next study the problem of finding10
fixed signal-to-noise ratio. (This result is actually in-
spired by the work [12], where the authors implicitly Jopt  inf J(A(z), F (z))
A(z)U
use a fixed signal-to-noise ratio constraint to design F (z)RH2
dropout compensators in a specific networked situa- ||T (z)+S(z)F (z)||22 <

tion.)
and filters A(z) and F (z) that achieve Jopt (or approximate
Jopt arbitrarily well). The exact solution of this problem is
3.1 Setup and Analysis not straightforward, so we describe a simple iterative solu-
We will focus on the NCS depicted in Figure 4, where the tion.
controller C(z) is a given admissible controller for G(z).9 If F (z) is a given strictly proper and stable filter (as re-
We will show how to design the coding system filters F (z) quired for MSS), then the Cauchy-Schwarz inequality im-
and A(z) so as optimize overall closed loop performance. F (z)
plies that the optimal filter A(z), say Aopt (z), satisfies
(We refer the reader to [64] for controller design proce- (see [16], [18])
dures.)
 
It is easy to see from Figure 4 that the variance of the track-  F (z) j 4
ing error, i.e., Aopt (e ) =
 
T (ej )(1 F (ej ))2
e  r y, (8) , (11)
Tdry (ej )d r(ej )d r(ej )H Tdry (ej )H
is given by
where is any arbitrary positive real. We note that the
2 F (z)
e2 = ||Tdre (z)dr (z)||2 + J(A(z), F (z)), (9) characterization of Aopt (z) given above is explicit but is
in general not satisfied by any stable, biproper and MP ra-
where tional transfer function (indeed, the 4th root of the right
hand side in (11) is usually irrational). Nevertheless, since
J(A(z), F (z))  the condition (11) holds on the magnitude of A(z) only, it
2   2 is always possible to find a filter with the desired charac-
||A(z)Tdry (z)dr (z)||2 T (z)A(z)1 (1 F (z))2
, teristics that achieves a performance that is as close as de-
2
||T (z) + S(z)F (z)||2 sired to the optimal performance. In practice, it is usually
enough to consider reasonably low order filters to approxi-
and where Tdre (z) and Tdry denote the transfer functions F (z)
mate Aopt (z) (see also [16]).
from [d r]T to e and y, respectively, dr (z) denotes a spec-
Now consider that A(z) is any given stable, MP and
tral factor of [d r]T , is the channel signal-to-noise ratio
biproper transfer function. For any such A(z), it is pos-
and
sible to show that (see [18])
1
S(z) = , T (z)  1 S(z). A(z)
Fopt (z) = F (z), (12)
1 + G(z)C(z)

A straightforward calculation shows that Tdre (z) depends where F (z),  [0, 1], is defined via
on C(z) only, which is fixed in our setting. Thus,
to optimize performance we would like to minimize F (z)  arg inf J1 (F (z)) + (1 )J2 (F (z)),
F (z)RH2
J(A(z), F (z)).
10 RH denotes the set of all stable and strictly proper real rational
2
9 i.e.,
an internally stabilizing controller that defines a well possed con- transfer functions, and U denotes the set of all stable, MP and biproper
trol loop (see,e.g., [3]). transfer functions.

2008 Chinese Control and Decision Conference (CCDC 2008) 5


  2
J1 (F (z))  T (z)A(z)1 (1 F (z))2 , x 10
4 = 9.1875 ( 3 [bit] )
2 7
J2 (F (z))  ||T (z) + S(z)F (z)||2 , (1)
Case 1

Tracking error variance ( 2 )


e
Case 2
and 6.5
Case 3
J1 (F (z))
  arg min . (13) 6
)
(0, J2 (F (z))
5.5
In (13),  is defined as follows: If there does not exist an
 (0, 1] such that J2 (F (z)) = , then  = 1. Other- 5
wise,  =  , where  is the unique real in (0, 1] such that
(3) (2)
J2 (F (z)) = . 4.5
We note that the problem of finding F (z) is a standard 0 2 4 6 8 10
Number of iterations
convex problem that can be tackled using well-known tools
(see, e.g., [65, 66]). On the other hand, calculating  Figure 5: Tracking error as function of the number of it-
amounts to solving a (scalar) line search problem. This erations in proposed design procedure (see Section 3.3 for
is also a simple problem to solve. details).
By utilizing the previous results, it is immediate to envis-
age an iterative procedure that allows one to construct ap-
proximations to the optimal A(z), F (z) pair: In a first step 10
1

one fixes A(z) (or F (z); trivial choices are F (z) = 0 and Nominal performance

Tracking error variance ( 2e )


No coding (empirical)
A(z) = 1). Then, one uses (12) to calculate the optimal Opt. coding (empirical)
F (z) for the initial choice of A(z) (or (11) to calculate the 2
Opt. coding (analytical)
optimal A(z) for the initial choice of F (z)). This is re- 10
peated fixing A(z) or F (z) intermittently. This algorithm
is guaranteed to converge, at least, to a local minimum.
F (z) A(z)
In general, Aopt (z) = 1 and Fopt (z) = 0. Thus, fixing 10
3

A(z) or F (z) and optimally choosing the other filter, will


obviously provide a coding system that enhances closed
loop performance when compared with a non-coded net- 1 2 3 4 5 6 7 8
Bit rate [bit/sample]
worked situation.11 From the above, it is also clear that
the use of the proposed iterative procedure allows one to Figure 6: Tracking error as function of the channel bit rate
design coding systems that will always outperform simple (see Section 3.3).
coding systems that do not consider feedback in the quan-
tizer (i.e., where F (z) = 0; see [16]). This again highlights
the role of architectures (equivalently, available degrees of
to b = 3. Cases 1 and 2 refer to iterations that start with
freedom) in NCSs. Further discussions regarding the in-
A(z) = 1 and F (z) = 0. In Case 1 we initially fixed A(z),
terplay between coding system architecture and networked
whereas in Case 2 we start fixing F (z). Case 3 refers to it-
performance can be found in [16].
erations that start with the choices suggested in [17] (where
3.3 Example it is assumed that is high enough).
Consider a nominal loop with plant and controller given by In Figure 5 we have identified three points. The first of
these (point (1)) refers to the performance achieved without
1 z 0.8
G(z) = , C(z) = . coding (F (z) = 0 and A(z) = 1). The second (point (2))
z 0.8 z1 refers to the performance achieved when employing the op-
The disturbance d is assumed zero, whilst the reference is timal coding system proposed in [16]. The third (point (3))
considered to have a power spectral density with spectral refers to the performance achieved using the approximately
factor optimal filters described in [17].
0.02z The results show that coding is, indeed, useful to achieve
r (z) = . good closed loop performance. (Compare point (1) with,
z 0.9
e.g., the value of e2 after 10 iterations.) It is also possi-
We consider a finite uniform quantizer with overload factor ble to see that use of the proposed procedure yields cod-
= 4 and b bits. We send the output of the quantizer ing systems that perform better than the simpler proposals
directly through the channel (i.e., without entropy coding). in [16,17]; see also the discussion at the end of Section 3.2.
Thus, b corresponds to the instantaneous channel data-rate (Compare points (2) and (3) with the limiting value for e2 .)
in bits per sample.
Finally, we examine the behavior of the tracking error vari-
Figure 5 shows the steady state tracking error variance e2
ance as a function of the channel bit rate b. The results
(see (9)) as a function of the number of iterations in the pro-
are presented in Figure 6, where Nominal performance
posed design algorithm for = 9.1875, which corresponds
refers to the performance achieved by the nominal loop
11 Provided both situations use the same channel and the same quantizer. (without quantization), No coding (empirical) refers to

6 2008 Chinese Control and Decision Conference (CCDC 2008)


simulated results12 when no coding is employed (i.e., when
qi
A(z) = 1 and F (z) = 0), Opt. coding (empirical) refers
to simulated results obtained with the filters suggested in mi vi wi ni
Fi (z)1 Fi (z)
Section 3.2 (after 10 iterations), and Opt. coding (ana-
lytical) refers to the corresponding predictions made us- channel
ing the simplified noise model for quantization. One can
Figure 7: i-th communication link.
see that, as expected, the effects of quantization vanish as
b . Interestingly, the predictions made by the additive
noise model turn out to be very accurate for every bit rate: plant input, y = [y1 y2 ]T is the plant output, r = [r1 r2 ]T
indeed, for b 3 the relative errors are of less than 1% and, is the reference sequence, and e = [e1 e2 ]T denotes the
for b {1, 2}, the relative errors are around 8%. (We note tracking error, i.e.,
that F (z) = 0 turns out to be non-admissible for b = 1,
i.e., (10) is not satisfied. Accordingly, we have omitted the e  r y.
non coded results for b = 1.)
4 MIMO systems 4.2 Analysis
Next we turn to MIMO systems. Our development here It is easy to see from Figure 8 that13
is largely based on [33]. We focus on control of 2 2 2

2 2
MIMO LTI plants modes and explore the potential bene- e2 = ||S(z)r (z)||2 + i2 ||S(z)G(z)i Fi (z)||2 ,
fits of enhancing a traditional diagonal non-networked con- i=1
trol architecture with additional non-transparent channels (14)
which are subject to signal-to-noise ratio constraints. We 2
2
 2
will show how to design LTI coding systems which opti- v2i = ||Ai (z)r (z)||2 + j2 ||Ai (z)G(z)F (z)j ||2 ,
mize overall performance. j=1

4.1 Setup (15)


As before, G(z) denotes the plant model. We assume that where r (z) is a spectral factor of r and
an admissible full MIMO controller, say
  F (z)  diag {F1 (z), F2 (z)} ,
C11 (z) C12 (z)
C(z) =
C21 (z) C22 (z) S(z)  (I + G(z)C(z))1 ,
A1 (z)  F1 (z)1 C12 (z)T2 S(z),
has already been designed for G(z). The diagonal terms
of this controller are implemented without communication A2 (z)  F2 (z)1 C21 (z)T1 S(z).
constraints, but the off-diagonal terms communicate using
Equation (15) allows one to establish that the NCS de-
non transparent communication links.
scribed above is MSS if and only if both F1 (z) and F2 (z)
We will focus on a situation where the non transparent
are stable, MP and biproper,
communication links are as in Figure 7. In that figure,
Fi (z) is the i-th (i {1, 2}) coder transfer function, vi   2
1 > B1  C12 (z)T2 S(z)G(z)1 2 , (16)
is the i-th channel input and wi is the i-th channel output.   2
These signals are related via   T
2 > B2  C21 (z)2 S(z)G(z)2 2 ,   (17)

wi = vi + qi , and

where qi is the i-th channel noise. Each noise sequence is (1 B1 ) (2 B2 ) >


considered white, having variance 0 i2 < and power 2 2
||A1 (z)G(z)F (z)2 ||2 ||A2 (z)G(z)F (z)1 ||2 . (18)
spectral density i (ej ) = i2 , [, ]. As in previ-
ous sections, we assume that i2 is a design parameter that Thus, and as expected from the SISO case examined ear-
is proportional to the variance of the channel input (namely, lier, we see that MSS imposes limits on the achievable
proportional to v2i ). We define the associated i-th channel channel signal-to-noise ratio and, hence, on the corre-
signal-to-noise ratio as sponding channel data-rate.
v2i An immediate consequence of the previous result is that,
i  . provided (16)-(18) hold,
i2
lim e2 = ,
The NCS which results from employing the links described (1 ,2 )(1 ,2 )
above to implement the off-diagonal terms of C(z) can be
visualized as in Figure 8. In that figure, u = [u1 u2 ]T is the where
 
12 All simulations use an actual uniform quantizer with L = 2b levels. S  (1 , 2 ) R2 : 1 and 2 achieve equality in (18) ,
For each b, the results correspond to the average of 200 simulations (each
one 105 samples long and using a different reference realization). 13
i is the ith element of the canonical basis in R2 .

2008 Chinese Control and Decision Conference (CCDC 2008) 7


r1 e1 u1 y1
C11 (z)
v2
C21 (z) F2 (z)1 F2 (z)

Link 2 q2
G(z)
Link 1 q1
v1
C12 (z) F1 (z)1 F1 (z)
r2 e2 u2 y2
C22 (z)

Figure 8: Partly networked MIMO control architecture (see Section 4).

for any C(z), and any choice for F1 (z) and F2 (z). As a they do not depend on the channel signal-to-noise ratios.
consequence, we see that, for any given full MIMO con- This allows one to conjecture that the optimal filters will
troller, and no matter how the coding system is chosen, perform well for a large class of communication channels.
there exist sufficiently poor channels which render the per-
4.4 Example
formance of the resulting partially networked closed loop
arbitrary bad. In these cases, any stabilizing decentralized We end this section with an example that considers (instan-
controller (that makes no use of the non-transparent chan- taneous) bit-rate limited channels and, for simplicity, we
nels) will provide better performance than a NCS. Stated a assume equal bit rates on each channel, i.e., b1 = b2 = b,
different way, in the situation under study, there are cases and take the sampling interval as 1[s]. The plant model is
where poor information is much worse than not having in- given by
formation at all. Of course, this conclusion is tied to the  
0.6 0.4
fact that we are considering a pre-designed controller. If (z0.8) (z0.8)
G(z) = 1 1 .
one were to design a centralized controller considering the (z0.5) (z0.5)
communication constraints from the very beginning, then
one could outperform any decentralized design. For this plant we synthesize the decentralized controller
 1.3333(z0.8) 
4.3 Coder Design (z+0.8)(z1) 0
Cd (z) = 0.8(z0.5) ,
In this section we show how to design optimal coders F1 (z) 0 (z+0.8)(z1)
and F2 (z) under a mild simplifying assumption.
From (15) one can immediately conclude that, provided and the full MIMO controller
(16)-(18) are satisfied and 1 , 2 are large enough, then  
5(z0.8) 2(z0.5)
e2 J, where C(z) = z1
5(z0.8)
z1
3(z0.5) .
z1 z1
2
 2 2
||Ai (z)r (z)|| ||Sd (z)i Fi (z)||
2 2
J . We also assume that the reference description is given by
i=1
i Bi
0.0049627(z + 0.9934)
We will denote the coders that minimize J by F1o (z) and r (z) = I,
(z 2 1.97z + 0.9802)
F2o (z).
Using simple arguments (again based on the Cauchy- and that the quantizers are as in Section 3.3.
Schwarz inequality), it is possible to see that Figure 9 shows the tracking error variance in the proposed
networked MIMO architecture as a function of the per-
 o j 4 Mi (ej )Mi (ej )H channel bit-rate b in several situations: Analytical no cod-
Fi (e ) = i ,
H
(Sd (ej )i ) Sd (ej )i ing refers to the performance predicted by (14) and (15)
when no coding is employed; Empirical no coding refers
where to simulated performance when no coding is considered;
Analytical opt. coding and Empirical opt. coding refer
M1 (z)  C12 (z)T2 S(z)r (z), to analytical and simulated performance when the coders
M2 (z)  C21 (z)T1 S(z)r (z), suggested by in Section 4.3 are employed. For compar-
ison purposes, Figure 9 also shows the non networked
and i is an arbitrary positive constant. This results shows full MIMO performance (Ideal full MIMO) and the per-
how to synthesize coding systems that minimize the impact formance achieved when using Cd1 (z) (Decentralized).
of the communication links on overall closed loop perfor- The results allow one to conclude that, in this case, the ben-
mance. An interesting feature of the proposed filters is that efits of coding are significative.

8 2008 Chinese Control and Decision Conference (CCDC 2008)


0 r
10
Decentralized U u x

Tracking error variance ( e2 )


Ideal full MIMO Unreliable
Controller Buffer and Plant
Analytical no coding Network selection logic
1 Empirical no coding
10 Analytical opt. coding
Empirical opt. coding

Figure 10: NCS over an unreliable network.


2
10

(see, e.g., [2, 3, 68, 69]). Assuming that the state x is avail-
3 able for measurement, in a non-networked case, the plant
10
3 4 5 6 7 8 input can be considered as if were given by a (possibly
Bit rate ( b ) [bit/s] time-varying and dynamic) mapping of the plant state, say
Figure 9: Tracking error variance as a function of the per- u(k) = k (x(k)), k N0 , (20)
channel bit rate (see Section 4.4).
where k : X U is the control policy.
We will now show how one can embed the control law (20)
As expected, non-networked full MIMO performance is in a more general control strategy where the controller
recovered as b , irrespective of the coders used. communicates with the plant input via an unreliable net-
Moreover, it is apparent that the non coded networked full work (see Figure 10). This network is assumed to be able
MIMO architecture should be preferred to the decentral- to carry large packets of data (say, a few kilobytes). How-
ized one for b > 3.36. On the other hand, the optimally ever, each packet, say U (k), may be delayed or even lost
coded networked MIMO architecture provides significant (due to buffer overflows and transmission errors).
improvement in performance for b > 3.20, when compared We assume that the delay experienced by U (k) has both
to the decentralized architecture. It is also interesting to a fixed component, which can be included in the plant
note that, if b 3.07, then the performance becomes arbi- model (19), and a time-varying component, say (k). The
trary poor no matter what the coding is. This is consistent latter depends on several factors including network load.
with (16)-(18) as straightforward calculations reveal, and Since we will concentrate on a configuration where sen-
brings back the question of how to actually design MIMO sors, actuators and controller operate at the same sampling
controllers for the considered situation (not just coding sys- rate, it suffices to consider (k) N0 . Packets which are
tems for a given fixed controller design). delayed by more than a given value, say max , will be re-
garded as lost. Thus, we will use the term lost to refer to
5 Data Loss and Delays those packets which are effectively dropped by the network
as well as to those which do not arrive during a prespeci-
Up to this point in this paper, we have focused on quanti-
fied time frame. Lost packets will not be used further in the
zation issues. However, in modern network protocols (e.g.,
NCS strategy described in this section.
Ethernet; see [67]), data is sent in large packets. Accord-
The maximum delay max constitutes a timeout value
ingly, quantization effects may become negligible in those
which can be designed based upon network delay and
situations, and the fact that data packets may get corrupted,
dropout characteristics, see, e.g., [70]. The model adopted
delayed or lost becomes the dominant issue. In this sec-
above includes pure erasure channels (see, e.g., [10, 39,
tion (which is based on [34]) we will present an approach
40]), as a particular case, by setting max = 0.
that allows one to deal with data loss and random delays.
Our proposal exploits the assumption that it is possible to 5.2 Scenario Based Networked Control
transmit relatively large packets that cover multiple data- This section briefly describes a control strategy to deal with
dropout and delay scenarios. the situation described above. A detailed description of the
5.1 Setup control policy can be found in [34].
At the plant side, there exists a buffer, say b(k), that con-
We consider a discrete-time nonlinear plant model de- tains N control input values to be sequentially passed on to
scribed in state-space form via: the actuator. The buffer is updated as follows: If the packet
U (k) is received (without error) at time instant k + (k)
x(k + 1) = f (x(k), u(k)). (19)
and none of the packets
The plant input and state are constrained according to: {U (k + 1), U (k + 2), . . . , U (k + (k))} (21)

u(k) U R , x(k) X R , k N0  N{0}, have been received by time k + (k), then U (k) is used to
replace the current content of the buffer. Otherwise, if any
where N denotes the set of positive integers, denotes the of the more recent packets in (21) have been received by
dimension of the plant input, whilst refers to the state time k + (k), then U (k) is discarded. This guarantee that
dimension. only fresh data is used at the plant side.
To control (19), one can employ standard discrete-time At each time instant the controller needs to send a packet
controllers operating at the same sampling rate as the plant U (k). This packet is formed assuming knowledge of the

2008 Chinese Control and Decision Conference (CCDC 2008) 9


current plant state x(k), the buffer state in the previous
sampling instant b(k 1),14 and the previously sent pack- 0.2

Probability
ets. With this information, the controller uses (20) to gen- 0.15
erate a set of N -length sequences of control inputs, each 0.1
one taking into account one possible value for the delay15 0.05
(k) {0, 1, . . . , max } and one possible set of packets 0
that may arrive before U (k). Each one of these transmis- 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
Network delay ( )
sion outcomes constitutes a scenario. Upon reception, and
if U (k) arrived before U (k + i), i 1, the buffer selection Figure 11: Delay distributions of the network examined in
logic at the plant uses time-stamping to determine the de- Section 5.3.
lay experienced by U (k) and, based upon the knowledge of
which packets where received in [k, k + (k) 1], selects
the corresponding control inputs sequence. 5.3 Example
It is possible to analyze the previous strategy in a precise This section presents an example to illustrate the perfor-
fashion. Indeed, one can derive deterministic performance mance of SBNC. We will assume that the network has, for
guarantees (see [34]). Here, we concentrate on a key result every k, a delay profile as illustrated in Figure 11. Thus, if,
that states that controlling a nonlinear constrained unstable for example, one sets max 4, then most packets will be
plant model over an unreliable channel by means of SBNC effectively lost.
amounts (essentially) to controlling the same plant over an Consider the following stable nonlinear plant having scalar
erasure channel with equivalent data dropout probability input
peq (k) given by16  
x1 (k + 1) = x1 (k) + 0.01 x2 (k) + x2 (k)3

peq (k)  1 P { (k) = 0} x2 (k + 1) = x2 (k) + 0.01 2x1 (k) 3x2 (k)
 

N 1 
max + u(k) 1 + 0.1x1 (k)2

P (k i j) = i (k) > 0 y(k) = x1 (k) + d(k),
j=0 i=0
(i,j)=(0,0), i+jk
 where x(k) = [x1 (k) x2 (k)]T is the plant state at time k,
(k 1) > 1 (k j i + 1) > j + i 1 . {u(k)} is the plant input, {y(k)} is the plant output, and
{d(k)} is a piecewise constant output disturbance having
This important result, implies that, in order to analyze or infrequent steps at random times. Both the plant state and
design SBNC loops, it suffices to consider a setting wherein disturbance measurements are affected by Gaussian white
the network is modeled via an erasure channel with a given noise of variance d2 = 0.01 and x2 = 0.04I2 , respectively.
dropout probability (see, e.g., [1012, 71, 72] and the many The control objective is to achieve reference tracking for
references therein). the plant output. Whilst future reference values are known
It should be emphasized here that if { (k)}kN0 is a se- to the controller, future disturbances are not. For simplicity,
quence of independent random variables, then the latter are assumed to remain at their current value.
The underlying controller is given by:
peq (k) = peq , ry (k) d(k) B(x(k))
k (x(k)) = ,
A(x(k))
i.e., the equivalent probability, is a constant. However, the
sequence of dropouts in SBNC is, in general, not a se- where {ry (k)} is the reference for y(k),
quence of independent random variables, even if the un-
derlying network delay and dropout distributions are. A(x) = (1 + 3x22 )(1 + 0.1x21 )/9,
The equivalent dropout probability characterizes closed B(x) = (2x1 + 6x22 x1 + 9x32 4x2 4x32 9x1 )/9.
loop control performance. It can be used as a guideline
for choosing the horizon length N and the timeout value We illustrate the effect on performance of the SBNC design
max . Indeed, peq (k) can be made arbitrarily small (and, parameters max and N in Figure 12,17 where typical plant
thus, the performance will become indistinguishable from output trajectories for step-like reference and disturbances
that achieved in the non-networked case). This is achieved are shown. For each pair (N, max ) we also calculated the
by choosing sufficiently large values for N and max , al- equivalent dropout probability peq (k) (which is constant in
beit at an increase in computational complexity (for details this case).
see [34]). Fortunately, in practice, choosing moderate val- As expected, closed loop performance improves when N
ues for N and max is often sufficient to achieve good per- and max are increased. However, it is also appreciated
formance as illustrated below. that there are cases where increasing N has no obvious ef-
fect on SBNC performance. This is easily explained if one
14 This implies that the network protocol must have acknowledgements,
notes that, as suggested by our comments in Section 5.2,
as in TCP.
15 This implies that the actual delay distribution does not play any role. 17 As mentioned in Section 5.2, SBNC does not require knowledge of
16 P{} stands for probability of (). the statistical properties of the delay profiles.

10 2008 Chinese Control and Decision Conference (CCDC 2008)


max = 1 max = 2 max = 7

3 3 3

Output y
2 2 2

N=2 1
peq = 0.930
1
peq = 0.784
1
peq = 0.295
0 0 0
0 2000 4000 0 2000 4000 0 2000 4000

3 3 3
Output y

2 2 2
N=6

1 1 1
peq = 0.844 peq = 0.607 peq = 0.013
0 0 0
0 2000 4000 0 2000 4000 0 2000 4000

3 3 3
Output y
N = 10

2 2 2
1 1 1
peq = 0.841 peq = 0.604 p = 0.010
eq
0 0 0
0 2000 4000 0 2000 4000 0 2000 4000

3 3 3
Output y
N = 15

2 2 2
1 1 1 peq = 0.010
peq = 0.841 p = 0.604
eq
0 0 0
0 2000 4000 0 2000 4000 0 2000 4000
Sample number k Sample number k Sample number k

Figure 12: SBNC closed loop performance as a function of N and max (see Section 5.3).

the equivalent dropout probability peq is the key parameter 6 Conclusions


determining SBNC performance. Indeed, cases with very
disparate values of N or max can exhibit similar perfor- Networked Control Systems are control systems in which
mance if the corresponding equivalent dropout probabili- the communication channels between plant and controller
ties are similar.18 are not transparent. Specifically, NCSs are control systems
It is also informative to compare the probability of a packet which include non standard features such as quantization
being effectively lost due to the choice of max , and the (i.e. data rate limits), data dropouts and random delays.
equivalent dropout probability peq (which depends on the NCS theory brings together fundamental (and contempo-
interplay between N and max ). It follows from Figure 11 rary) ideas from control theory, information theory, signal
that if max {1, 2, 7}, then P{ (k) > max } equals processing and communications theory. It is, thus, an ex-
0.959, 0.877 and 0.143, respectively. The above results cellent area for the systems scientist to contribute to.
show that by a proper choice of N one can decrease this In specific areas, significant results have been found that al-
probability dramatically. It must be noted, however, that low one to analyze and synthesize networked control strate-
if one chooses N too small (as compared with max ), then gies. Nevertheless, we feel that the big picture is still miss-
peq could be larger than P{ (k) > max } (see the case ing. Many questions remain unanswered. For example, the
(N, max ) = (2, 7)). This is due to the fact that, in those issues of robustness to plant and channel model errors and
cases, the buffer will frequently run out of data. adaptation need further work. More ambitious is the search
It is also worth mentioning that, for this problem, using of explicit solutions to certain kinds of problems, which
max = 0, does not stabilize the loop for any value of N . would certainly increase the understanding of the interac-
In addition, the simple policy that regards all delayed data tions between control objectives and communications con-
as lost and only sends the current plant input also gives straints.
unstable behaviour. This strongly supports the use of the Beyond technical details, the key open problem in NCSs is
SBNC scheme advocated here. the development of a unified framework which takes chan-
18 Consider, for example, the cases (N, nel issues into account and gives practice-oriented design
max ) = (15, 1) and
(N, max ) = (2, 2) or, more dramatically, (N, max ) = (6, 7) and methodologies. This makes this research area a challeng-
(N, max ) = (15, 7). ing and interesting one, with a high development potential.

2008 Chinese Control and Decision Conference (CCDC 2008) 11


Acknowledgment trolled system, in Proc. of the European Control Confer-
ence, Kos, Greece, 2007.
The authors would like to thank M.S. Derpich and J. ster- [22] Y. Minami, S. Azuma, and T. Sugie, An optimal dynamic
gaard for fundamental contributions to the work summa- quantizer for feedback control with discrete-valued signal
rized here. constraints, in Proc. of the 46th IEEE Conference on Deci-
REFERENCES sion and Control, New Orleans, USA, 2007.
[23] S. Azuma and T. Sugie, Optimal dynamic quantizers for
[1] S. Skogestad and I. Postlethwaite, Multivariable Feedback discrete-valued input control, Automatica, vol. 44, pp.
Control: Analysis and Design. New York: Wiley, 1996. 396406, 2008.
[2] G. Goodwin, S. Graebe, and M. Salgado, Control System [24] M. Salgado and A. Conley, MIMO interaction measure
Design. New Jersey: Prentice Hall, 2001. and controller structure selection, Int. J. Contr., vol. 77,
[3] K. Zhou, J. Doyle, and K. Glover, Robust and optimal con- no. 4, pp. 367383, March 2004.
trol. Englewood Cliffs, N.J.: Prentice Hall, 1996. [25] G. Goodwin, M. Salgado, and E. Silva, Time-domain per-
[4] P. Antsaklis and J. Baillieul, Guest editorial special is- formance limitations arising from decentralized architec-
sue on networked control systems, IEEE Trans. Automat. tures and their relationship to the RGA, Int. J. Contr.,
Contr., vol. 49, no. 9, pp. 14211423, Sept. 2004. vol. 78, no. 13, pp. 10451062, September 2005.
[5] , Special issue on technology of networked control [26] V. Kariwala, Fundamental limitation on achievable decen-
systems, Proc. IEEE, vol. 95, no. 1, pp. 58, January 2007. tralized performance, To appear in Automatica, 2007.
[6] G. Nair and R. Evans, Stabilizability of stochastic linear [27] E. Silva, D. Oyarzun, and M. Salgado, On structurally con-
systems with finite feedback data rates, SIAM J. Control strained H2 performance bounds for stable MIMO plant
and Optimization, vol. 43, no. 2, pp. 413436, July 2004. models, IET Control Theory & Applications, vol. 1, no. 4,
[7] G. Nair, F. Fagnani, S. Zampieri, and R. Evans, Feedback pp. 10331045, 2007.
control under data rate constraints: An overview, Proc. [28] H. Ishii and B. Francis, Stabilization with control net-
IEEE, vol. 95, no. 1, pp. 108137, January 2007. works, Automatica, vol. 38, pp. 1745 1751, 2002.
[8] A. Savkin, Analysis and synthesis of networked control [29] J. Rawlings and B. Stewart, Coordinating multiple opti-
systems: Topological entropy, observability, robustness and mization based controllers: New opportunities and chal-
optimal control, Automatica, vol. 42, pp. 5162, 2006. lenges, in Proc. of the 8th Int. IFAC DYCOPS, Cancun,
[9] S. Tatikonda and S. Mitter, Control under communication Mexico, June 2007.
constraints, IEEE Trans. on Automatic Control, vol. 49, [30] S. Yuksel and T. Basar, Communication constraints for
no. 7, pp. 10561068, July 2004. decentralized stabilizability with time-invariant policies,
[10] L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and IEEE Trans. on Automatic Control, vol. 52, no. 6, pp. 1060
S. S. Sastry, Foundations of control and estimation over 1066, 2007.
lossy networks, Proc. IEEE, vol. 95, no. 1, January 2007. [31] A. Matveev and A. Savkin, Decentralized stabilization
[11] P. Seiler and R. Sengupta, An H approach to networked of linear systems via limited capacity communication net-
control, IEEE Trans. Automat. Contr., vol. 50, no. 3, 2005. works, in Proc. of the 44th IEEE CDC and the ECC 2005,
[12] Q. Ling and M. Lemmon, Power spectral analysis of net- Sevilla, Spain, 2005, pp. 11551161.
worked control systems with data dropouts, IEEE Trans. [32] S. Jiang and P. Voulgaris, Cooperative control over link
Automat. Contr., vol. 49, no. 6, pp. 955960, June 2004. limited abd packet dropping networks, in Proc. of the Eu-
[13] J. Nilsson, Real-time control systems with delays, Ph.D. ropean Control Conf., 2007.
dissertation, Lund Institute of Technology, 1998. [33] E. Silva, G. Goodwin, and D. Quevedo, On networked
[14] F. Lian, J. Moyne, and D. Tilbury, Modelling and optimal control architectures for mimo plants, in Accepted for pre-
controller design of networked control systems with mutli- sentation at the 17th IFAC World Congress, Seoul, Korea,
ple delays, Int. J. Contr., vol. 76, no. 6, pp. 591606, 2003. 2008.
[15] E. Silva, M. Derpich, J. stergaard, and D. Quevedo, Sim- [34] D. Quevedo, E. Silva, and G. Goodwin, Control over un-
ple low bit-rate coding for achieving mean square stability, reliable networks affected by packet erasures and variable
in Submitted to the 46th IEEE Conference on Decision and transmission delays, To appear in IEEE Journal On Se-
Control, Cancun, Mexico, 2008. lected Areas In Communications, 2008.
[16] G. Goodwin, D. Quevedo, and E. Silva, Architectures and [35] A. Bemporad, Predictive control of teleoperated con-
coder design for networked control systems, Automatica, strained systems with unbounded communication delays,
vol. 44, no. 1, pp. 248257, 2008. in Proc. IEEE Conf. Decis. Contr., 1998, tampa, Florida,
[17] E. Silva, G. Goodwin, D. Quevedo, and M. Derpich, Opti- USA.
mal noise shaping for networked control systems, in Proc. [36] G. Liu, J. Mu, D. Rees, and S. Chai, Design and stability
of the European Control Conference, Kos, Greece, 2007. analysis of networked control systems with random com-
[18] E. Silva, D. Quevedo, M. Derpich, and G. Goodwin, De- munication time delay using the modified MPC, Int. J.
sign of feedback quantizers for networked control systems, Contr., vol. 79, pp. 288297, April 2006.
Submitted to Int. J. Robust Nonlinear Control, 2008. [37] A. Casavola, E. Mosca, and M. Papini, Predictive tele-
[19] C. Canudas de Wit, F. Rodrguez, J. Fornes, and F. Gomez- operation of constrained dynamic systems via internet-like
Estern, Differential coding in networked controlled linear channels, IEEE Trans. Contr. Syst. Technol., vol. 14, pp.
systems, in Proc. Amer. Contr. Conf., Minneapolis, MN, 681694, July 2006.
2006. [38] P. L. Tang and C. W. de Silva, Compensation for trans-
[20] C. Canudas de Wit, J. Jaglin, and K. Vega, Entropy coding mission delays in an ethernet-based control network us-
for networked controlled systems, in Proc. of the European ing variable-horizon predictive control, IEEE Trans. Contr.
Control Conference, Kos, Greece, 2007. Syst. Technol., vol. 14, no. 4, pp. 707718, July 2006.
[21] I. Lopez, C. Abdallah, and C. Canudas de Wit, Gain- [39] V. Gupta, B. Sinopoli, S. Adlakha, and A. Goldsmith, Re-
scheduling multi-bit delta-modulator for networked con- ceding horizon networked control, in Proc. Allerton Conf.

12 2008 Chinese Control and Decision Conference (CCDC 2008)


Communications, Control, and Computing, Monticello, IL, Data Converters. Wiley-IEEE Press, 2004.
USA, 2006. [56] H. Bolcskei and F. Hlawatsch, Noise reduction in over-
[40] D. Quevedo, E. Silva, and G. Goodwin, Packetized predic- sampled filter banks using predictive quantization, IEEE
tive control over erasure channels, in 26th American Con- Trans. Inform. Theory, vol. 47, no. 1, pp. 155172, January
trol Conference, New York, USA, 2007. 2001.
[41] S. Tatikonda and S. Mitter, Control over noisy channels, [57] W. Bennet, Spectra of quantized signals, Bell Syst. Tech.
IEEE Trans. on Automatic Control, vol. 49, no. 7, pp. 1196 J., vol. 27, no. 4, pp. 446472, 1948.
1201, July 2004. [58] R. Gray, Quantization noise spectra, IEEE Transactions
[42] T. Cover and J. Thomas, Elements of Information Theory, on Information Theory, vol. 36, pp. 12201244, November
2nd ed. John Wiley and Sons, Inc., 2006. 1990.
[43] D. Delchamps, Stabilizing a linear system with quantized [59] R. Zamir and M. Feder, On universal quantization by ran-
state feedback, IEEE Trans. on Automatic Control, vol. 35, domized uniform/lattice quantizers, IEEE Transactions on
no. 8, pp. 916924, August 1990. Information Theory, vol. 38, no. 2, pp. 428436, March
[44] D. Quevedo, G. Goodwin, and J. De Dona, Finite con- 1992.
straint set receding horizon control, International Jour- [60] , Information rates of pre/post-filtered dithered quan-
nal of Robust and Nonlinear control, vol. 14, pp. 355377, tizers, IEEE Transactions on Information Theory, vol. 42,
March 2004. no. 5, pp. 13401353, September 1996.
[45] G. Nair and R. Evans, Exponential stabilisability of finite- [61] M. Derpich, E. Silva, D. Quevedo, and G. Goodwin, On
dimensional linear systems with limited data rates, Auto- optimal perfect reconstruction feedback quantizers, Un-
matica, vol. 39, no. 4, pp. 585593, April 2003. dergoing second review in IEEE Transaction on Signal Pro-
[46] J. Hespanha, A. Ortega, and L. Vasudevan, Towards the cessing, 2008.
control of a linear system with minimum bit-rate, in Pro- [62] N. Elia, Remote stabilization over fading channels, Syst.
ceeding 15th Int. Symp. Mathematical Theory Networks & Contr. Lett., pp. 237249, 2005.
System. Univ. Notre Dame, August 2002. [63] E. Silva, On networked control with i.i.d. data dropouts,
[47] F. Fagnani and S. Zampieri, Stability analysis and syn- School of EE and CS, The University of Newcastle, Aus-
thesis for scalar linear systems with a quantized feedback, tralia, Tech. Rep., 2007.
IEEE Trans. Automat. Contr., vol. 48, no. 9, pp. 15691584, [64] E. Silva, D. Quevedo, and G. Goodwin, Optimal controller
Sept. 2003. design for networked control systems, in Accepted for pre-
[48] G. Nair, R. Evans, I. Mareels, and W. Moran, Topolog- sentation at the 17th IFAC World Congress, Seoul, Korea,
ical feedback entropy and nonlinear stabilization, IEEE 2008.
Trans. on Automatic Control, vol. 49, no. 9, pp. 15851597, [65] S. Boyd and C. Barratt, Linear Controller Design-Limits of
September 2004. Performance. New Jersey: Prentice Hall, 1991.
[49] J. Freudenberg, R. Middleton, and V. Solo, The minimal [66] S. Boyd, E. F. L. El Ghaoui, and V. Balakrishnan, Linear
signal-to-noise ratio requirements to stabilize over a noisy Matrix Inequalities in System and Control Theory. SIAM,
channel, in Proc. of the 2006 American Control Confer- 1994.
ence, Minneapolis, USA, June 2006. [67] G. Kaplan, Ethernets winning ways, IEEE Spectrum,
[50] N. Elia, When Bode meets Shannon: Control oriented vol. 38, no. 1, pp. 113115, 2001.
feedback communication schemes, IEEE Trans. on Auto- [68] A. Isidori, Nonlinear Control Systems, 3rd ed. Springer
matic Control, vol. 49, no. 9, pp. 14771488, 2004. Verlag, 1995.
[51] N. Martins and M. Dahleh, Fundamental limitations of [69] G. C. Goodwin, M. M. Seron, and J. A. De Dona, Con-
performance in the presence of finite capacity feedback, in strained Control & Estimation An Optimization Ap-
Proceedings of the American Control Conference, Portland, proach. London: Springer-Verlag, 2005.
USA, June 2005. [70] C. Bovy, H. Mertodimedjo, G. Hooghiemstra, H. Uiter-
[52] N. Jayant and P. Noll, Digital Coding of Waveforms. Prin- waal, and P. Van Mieghem, Analysis of end-to-end de-
ciples and Approaches to Speech and Video. Prentice Hall, lay measurements in the internet, in Proc. Passive and Ac-
1984. tive Measurement Workshop-PAM, Fort Collins, Colorado,
[53] R. Gray and T. S. (Jr.), Dithered quantizers, IEEE Trans- USA, 2002.
actions on Information Theory, vol. 39, no. 3, pp. 805812, [71] O. Imer, S. Yuksel, and T. Basar, Optimal control of LTI
May 1993. systems over unreliable communication links, Automatica,
[54] C. Gunturk, One-bit sigma-delta quantization with expo- vol. 42, pp. 1429 1439, 2006.
nential accuracy, Commun. Pure Appl. Math., vol. 56, [72] J. Hespanha, P. Naghshtabrizi, and Y. Xu, A survey of
no. 11, pp. 16081630, 2003. recent results in networked control systems, Proc. IEEE,
[55] R. Schreier and G. Temes, Understanding Delta Sigma vol. 95, no. 1, pp. 138162, January 2007.

2008 Chinese Control and Decision Conference (CCDC 2008) 13

Das könnte Ihnen auch gefallen