Beruflich Dokumente
Kultur Dokumente
Systems
Graham C. Goodwin, Eduardo I. Silva, Daniel E. Quevedo
School of Electrical Engineering and Computer Science, The University of Newcastle, NSW 2308, Australia
E-mail: graham.goodwin@newcastle.edu.au
Abstract: Networked Control has emerged in recent years as a new and exciting area in systems science. The topic has
many potential applications in diverse areas ranging from control of microrobots to biological and economic systems. The
supporting theory is very rich and combines aspects of control, signal processing, telecommunications and information
theory. In this paper, we will give a brief overview of recent developments in Networked Control with an emphasis on
our contributions. We also point to several open problems in this emerging area.
Key Words: Networked Control, Performance, Data-Rate Constraints, Delays, Data Dropouts
1
978-1-4244-1734-6/08/$25.00
c 2008 IEEE
d w
D
r u y
C(z) G(z)
w s v y
D E F (z)
f channel
D E
s D E
channel
decoder encoder
Figure 2: Proposed coding scheme for stabilization.
Figure 1: Basic Networked control system (including cod-
ing scheme).
2.1 Key results
signed for non-networked control systems can be embel- For the setting described above, a key result states that it
lished so as to achieve good performance when used in is possible to find coders, decoder and controllers such that
an NCS that employs unreliable communication channels the resulting system is mean square stable (MSS) if and
(see [34] and related work [3540]). only if the average data-rate in bits per sample, say R, sat-
isfies (see [6])
The remainder of this paper is organized as follows: Sec-
tion 2 discusses the problem of stabilization of NCSs sub- np
ject to data rate constraints. Section 3 discusses the design R > log2 |pi | , (1)
of coding systems that optimize NCS performance. Sec- i=1
tion 4 studies some aspects in MIMO networked control.
Section 5 studies control over unreliable networks. Section where {pi }i=1, ,np denotes the set of unstable plant poles.
6 draws conclusions. The above result is valid for every coder, decoder and con-
troller in the class of (time varying and non-linear) causal
2 Stability systems. Therefore, (1) establishes a fundamental separa-
tion between what is achievable in NCSs over digital chan-
An overarching issue in any closed loop system is the po- nels and what is not (when the problem of interest is MSS).
tential for instability. For this reason, obtaining necessary We note that bounds similar to (1) arise as solutions to quite
and sufficient conditions which guarantee closed loop sta- a few different problems (e.g., observability, deterministic
bility has become a central issue in control theory. NCSs stability, etc.) and under different assumptions on the chan-
give rise to new challenges with respect to stability. This nels and coding schemes (see, e.g., [6,9,41,4547]). Indeed
section will give some insights into the stability question. the quantity on the right hand side of (1) is a fundamental
Consider the networked control situation shown in Fig- measure of the difficulty of manipulating a system, as ex-
ure 1. In that figure, G(z) is a SISO LTI plant, C(z) is plored in [8, 48].
a LTI controller, r is a reference signal1 and d is a dis- Proving that the rate at which a stable control system
turbance. Unlike standard non-networked control systems is transmitting data must satisfy (1) (i.e., necessity) is
(see, e.g., [13]) the feedback path in the control system in fairly simple and employs standard tools (see also [49
Figure 1 comprises a non-transparent channel and a coding 51]), whereas constructing an actual coding scheme that
scheme. The coding scheme is a novel aspect of networked achieves stability at any rate above the absolute limit (i.e.,
control that has no equivalent in traditional control theory. the proof of sufficiency) is much more involved (see [6, 9]).
The coding scheme has two parts: the encoder and the de- These observations motivate the remainder of this section.
coder. The encoder is in charge of appropriately process- 2.2 Some insights into the problem of stabilization
ing the signal to be sent over the channel so as to compen- with data-rate constraints
sate, if possible, channel characteristics and/or to translate
the measurements into symbols that the channel can under- In this section we shed some light into the limitations that
stand. (This is the case of, e.g., digital channels where the finite data-rates impose. To fix ideas, we will consider the
symbols are binary words.) On the other hand, the decoder coding scheme depicted in Figure 2, where F (z) is a LTI
is in charge of translating back the channel symbols into filter, and E and D are abstract systems that translate the
the standard signal domain. discrete time signal v into channel symbols s and channel
symbols into the discrete time signal w, respectively. Our
There exist many channel models (see, e.g., [41, 42]). To
presentation will start at an heuristic level and will then
highlight the ideas, in the present section we will consider
move towards a formal approach based on information the-
error- and delay-free digital channels, i.e., channels that can
oretic considerations.
transmit a countable set of symbols (countable alphabet)
without errors or delays. Of course, in practice, channels
always have restricted bandwidth and the channel alphabet 2.2.1 An additive noise model for quantization
is, thus, finite (not just countable; see also [7, 43, 44]).
Since the channel is digital, it becomes clear that E must
1 Allsignals in this paper are assumed wise sense stationary (wss) sta- quantize v prior to transmission. We will focus on the most
tionary processes. simple situation where D is the identity and E is a finite
by an additive i.i.d. noise source, uniformly distributed on 2.2.2 Limits imposed by signal-to-noise ratio con-
rthe interval (
2 , 2 ) and independent of the input to the straints
3
quantizer v. This model is valid only if is small enough,
the quantizer does not overload and v has a smooth prob- Consider the setting in Figure 2 and assume that E and D
ability density function (see, e.g., [57]). These conditions are such that q obeys the additive model for quantization
usually do not hold in the case of quantizers that are em- described in Section 2.2.1. We note that, since q depends
bedded in feedback loops, as is the case of NCSs (see, on the way in which E and D are designed, the variance of
e.g., [58]). We also note that assuming that q is either in- q, say q2 , becomes a decision variable.6 Within this setting
dependent of v or uncorrelated with v is, certainly, not a a basic question arises, namely finding the conditions on
valid assumption in networked situations. In these cases, the signal-to-noise ratio that guarantee MSS.
it makes more sense to assume that q is independent of (or It is possible to show via standard control theoretic argu-
uncorrelated with) the external signals r and d. ments (see [15]) that, for any strictly proper plant model
In order to avoid quantizer overload, it is usual in practice G(z) and any wss r and d, there exists C(z), F (z) and a
to choose a quantizer dynamic range such that the proba- finite q2 such that the resulting NCS is MSS if and only if
bility of overload is negligible (see, e.g, [52]). Indeed, if v np
is wss and is any positive real value, then one can always 2
find a finite such that4 V = v guarantees that the prob- > inf |pi | 1, (5)
ability of overload is less than ; is called the quantizer i=1
quantizers that are scaled on-line according to the statistics of the input
Situations where the channel is analog, but prone to
signals. This topic is interesting, but is beyond the scope of this paper i.i.d. data dropouts (i.e., analog erasure channel; see
(see references in [7]). also [10, 11, 62]). Indeed, it has been recently shown
(see [63]) that, for such data dropout profiles, analog 3.2 Coding system design
erasure channels are equivalent, up to second order Based on (9) and noting that Tdrw (z)dr (z) is fixed, we
statistics, to an additive white noise channel with a next study the problem of finding10
fixed signal-to-noise ratio. (This result is actually in-
spired by the work [12], where the authors implicitly Jopt inf J(A(z), F (z))
A(z)U
use a fixed signal-to-noise ratio constraint to design F (z)RH2
dropout compensators in a specific networked situa- ||T (z)+S(z)F (z)||22 <
tion.)
and filters A(z) and F (z) that achieve Jopt (or approximate
Jopt arbitrarily well). The exact solution of this problem is
3.1 Setup and Analysis not straightforward, so we describe a simple iterative solu-
We will focus on the NCS depicted in Figure 4, where the tion.
controller C(z) is a given admissible controller for G(z).9 If F (z) is a given strictly proper and stable filter (as re-
We will show how to design the coding system filters F (z) quired for MSS), then the Cauchy-Schwarz inequality im-
and A(z) so as optimize overall closed loop performance. F (z)
plies that the optimal filter A(z), say Aopt (z), satisfies
(We refer the reader to [64] for controller design proce- (see [16], [18])
dures.)
It is easy to see from Figure 4 that the variance of the track- F (z) j 4
ing error, i.e., Aopt (e ) =
T (ej )(1 F (ej ))2
e r y, (8) , (11)
Tdry (ej )d r(ej )d r(ej )H Tdry (ej )H
is given by
where is any arbitrary positive real. We note that the
2 F (z)
e2 = ||Tdre (z)dr (z)||2 + J(A(z), F (z)), (9) characterization of Aopt (z) given above is explicit but is
in general not satisfied by any stable, biproper and MP ra-
where tional transfer function (indeed, the 4th root of the right
hand side in (11) is usually irrational). Nevertheless, since
J(A(z), F (z)) the condition (11) holds on the magnitude of A(z) only, it
2 2 is always possible to find a filter with the desired charac-
||A(z)Tdry (z)dr (z)||2 T (z)A(z)1 (1 F (z))2
, teristics that achieves a performance that is as close as de-
2
||T (z) + S(z)F (z)||2 sired to the optimal performance. In practice, it is usually
enough to consider reasonably low order filters to approxi-
and where Tdre (z) and Tdry denote the transfer functions F (z)
mate Aopt (z) (see also [16]).
from [d r]T to e and y, respectively, dr (z) denotes a spec-
Now consider that A(z) is any given stable, MP and
tral factor of [d r]T , is the channel signal-to-noise ratio
biproper transfer function. For any such A(z), it is pos-
and
sible to show that (see [18])
1
S(z) = , T (z) 1 S(z). A(z)
Fopt (z) = F (z), (12)
1 + G(z)C(z)
A straightforward calculation shows that Tdre (z) depends where F (z), [0, 1], is defined via
on C(z) only, which is fixed in our setting. Thus,
to optimize performance we would like to minimize F (z) arg inf J1 (F (z)) + (1 )J2 (F (z)),
F (z)RH2
J(A(z), F (z)).
10 RH denotes the set of all stable and strictly proper real rational
2
9 i.e.,
an internally stabilizing controller that defines a well possed con- transfer functions, and U denotes the set of all stable, MP and biproper
trol loop (see,e.g., [3]). transfer functions.
one fixes A(z) (or F (z); trivial choices are F (z) = 0 and Nominal performance
wi = vi + qi , and
Link 2 q2
G(z)
Link 1 q1
v1
C12 (z) F1 (z)1 F1 (z)
r2 e2 u2 y2
C22 (z)
for any C(z), and any choice for F1 (z) and F2 (z). As a they do not depend on the channel signal-to-noise ratios.
consequence, we see that, for any given full MIMO con- This allows one to conjecture that the optimal filters will
troller, and no matter how the coding system is chosen, perform well for a large class of communication channels.
there exist sufficiently poor channels which render the per-
4.4 Example
formance of the resulting partially networked closed loop
arbitrary bad. In these cases, any stabilizing decentralized We end this section with an example that considers (instan-
controller (that makes no use of the non-transparent chan- taneous) bit-rate limited channels and, for simplicity, we
nels) will provide better performance than a NCS. Stated a assume equal bit rates on each channel, i.e., b1 = b2 = b,
different way, in the situation under study, there are cases and take the sampling interval as 1[s]. The plant model is
where poor information is much worse than not having in- given by
formation at all. Of course, this conclusion is tied to the
0.6 0.4
fact that we are considering a pre-designed controller. If (z0.8) (z0.8)
G(z) = 1 1 .
one were to design a centralized controller considering the (z0.5) (z0.5)
communication constraints from the very beginning, then
one could outperform any decentralized design. For this plant we synthesize the decentralized controller
1.3333(z0.8)
4.3 Coder Design (z+0.8)(z1) 0
Cd (z) = 0.8(z0.5) ,
In this section we show how to design optimal coders F1 (z) 0 (z+0.8)(z1)
and F2 (z) under a mild simplifying assumption.
From (15) one can immediately conclude that, provided and the full MIMO controller
(16)-(18) are satisfied and 1 , 2 are large enough, then
5(z0.8) 2(z0.5)
e2 J, where C(z) = z1
5(z0.8)
z1
3(z0.5) .
z1 z1
2
2 2
||Ai (z)r (z)|| ||Sd (z)i Fi (z)||
2 2
J . We also assume that the reference description is given by
i=1
i Bi
0.0049627(z + 0.9934)
We will denote the coders that minimize J by F1o (z) and r (z) = I,
(z 2 1.97z + 0.9802)
F2o (z).
Using simple arguments (again based on the Cauchy- and that the quantizers are as in Section 3.3.
Schwarz inequality), it is possible to see that Figure 9 shows the tracking error variance in the proposed
networked MIMO architecture as a function of the per-
o j 4 Mi (ej )Mi (ej )H channel bit-rate b in several situations: Analytical no cod-
Fi (e ) = i ,
H
(Sd (ej )i ) Sd (ej )i ing refers to the performance predicted by (14) and (15)
when no coding is employed; Empirical no coding refers
where to simulated performance when no coding is considered;
Analytical opt. coding and Empirical opt. coding refer
M1 (z) C12 (z)T2 S(z)r (z), to analytical and simulated performance when the coders
M2 (z) C21 (z)T1 S(z)r (z), suggested by in Section 4.3 are employed. For compar-
ison purposes, Figure 9 also shows the non networked
and i is an arbitrary positive constant. This results shows full MIMO performance (Ideal full MIMO) and the per-
how to synthesize coding systems that minimize the impact formance achieved when using Cd1 (z) (Decentralized).
of the communication links on overall closed loop perfor- The results allow one to conclude that, in this case, the ben-
mance. An interesting feature of the proposed filters is that efits of coding are significative.
(see, e.g., [2, 3, 68, 69]). Assuming that the state x is avail-
3 able for measurement, in a non-networked case, the plant
10
3 4 5 6 7 8 input can be considered as if were given by a (possibly
Bit rate ( b ) [bit/s] time-varying and dynamic) mapping of the plant state, say
Figure 9: Tracking error variance as a function of the per- u(k) = k (x(k)), k N0 , (20)
channel bit rate (see Section 4.4).
where k : X U is the control policy.
We will now show how one can embed the control law (20)
As expected, non-networked full MIMO performance is in a more general control strategy where the controller
recovered as b , irrespective of the coders used. communicates with the plant input via an unreliable net-
Moreover, it is apparent that the non coded networked full work (see Figure 10). This network is assumed to be able
MIMO architecture should be preferred to the decentral- to carry large packets of data (say, a few kilobytes). How-
ized one for b > 3.36. On the other hand, the optimally ever, each packet, say U (k), may be delayed or even lost
coded networked MIMO architecture provides significant (due to buffer overflows and transmission errors).
improvement in performance for b > 3.20, when compared We assume that the delay experienced by U (k) has both
to the decentralized architecture. It is also interesting to a fixed component, which can be included in the plant
note that, if b 3.07, then the performance becomes arbi- model (19), and a time-varying component, say (k). The
trary poor no matter what the coding is. This is consistent latter depends on several factors including network load.
with (16)-(18) as straightforward calculations reveal, and Since we will concentrate on a configuration where sen-
brings back the question of how to actually design MIMO sors, actuators and controller operate at the same sampling
controllers for the considered situation (not just coding sys- rate, it suffices to consider (k) N0 . Packets which are
tems for a given fixed controller design). delayed by more than a given value, say max , will be re-
garded as lost. Thus, we will use the term lost to refer to
5 Data Loss and Delays those packets which are effectively dropped by the network
as well as to those which do not arrive during a prespeci-
Up to this point in this paper, we have focused on quanti-
fied time frame. Lost packets will not be used further in the
zation issues. However, in modern network protocols (e.g.,
NCS strategy described in this section.
Ethernet; see [67]), data is sent in large packets. Accord-
The maximum delay max constitutes a timeout value
ingly, quantization effects may become negligible in those
which can be designed based upon network delay and
situations, and the fact that data packets may get corrupted,
dropout characteristics, see, e.g., [70]. The model adopted
delayed or lost becomes the dominant issue. In this sec-
above includes pure erasure channels (see, e.g., [10, 39,
tion (which is based on [34]) we will present an approach
40]), as a particular case, by setting max = 0.
that allows one to deal with data loss and random delays.
Our proposal exploits the assumption that it is possible to 5.2 Scenario Based Networked Control
transmit relatively large packets that cover multiple data- This section briefly describes a control strategy to deal with
dropout and delay scenarios. the situation described above. A detailed description of the
5.1 Setup control policy can be found in [34].
At the plant side, there exists a buffer, say b(k), that con-
We consider a discrete-time nonlinear plant model de- tains N control input values to be sequentially passed on to
scribed in state-space form via: the actuator. The buffer is updated as follows: If the packet
U (k) is received (without error) at time instant k + (k)
x(k + 1) = f (x(k), u(k)). (19)
and none of the packets
The plant input and state are constrained according to: {U (k + 1), U (k + 2), . . . , U (k + (k))} (21)
u(k) U R , x(k) X R , k N0 N{0}, have been received by time k + (k), then U (k) is used to
replace the current content of the buffer. Otherwise, if any
where N denotes the set of positive integers, denotes the of the more recent packets in (21) have been received by
dimension of the plant input, whilst refers to the state time k + (k), then U (k) is discarded. This guarantee that
dimension. only fresh data is used at the plant side.
To control (19), one can employ standard discrete-time At each time instant the controller needs to send a packet
controllers operating at the same sampling rate as the plant U (k). This packet is formed assuming knowledge of the
Probability
ets. With this information, the controller uses (20) to gen- 0.15
erate a set of N -length sequences of control inputs, each 0.1
one taking into account one possible value for the delay15 0.05
(k) {0, 1, . . . , max } and one possible set of packets 0
that may arrive before U (k). Each one of these transmis- 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
Network delay ( )
sion outcomes constitutes a scenario. Upon reception, and
if U (k) arrived before U (k + i), i 1, the buffer selection Figure 11: Delay distributions of the network examined in
logic at the plant uses time-stamping to determine the de- Section 5.3.
lay experienced by U (k) and, based upon the knowledge of
which packets where received in [k, k + (k) 1], selects
the corresponding control inputs sequence. 5.3 Example
It is possible to analyze the previous strategy in a precise This section presents an example to illustrate the perfor-
fashion. Indeed, one can derive deterministic performance mance of SBNC. We will assume that the network has, for
guarantees (see [34]). Here, we concentrate on a key result every k, a delay profile as illustrated in Figure 11. Thus, if,
that states that controlling a nonlinear constrained unstable for example, one sets max 4, then most packets will be
plant model over an unreliable channel by means of SBNC effectively lost.
amounts (essentially) to controlling the same plant over an Consider the following stable nonlinear plant having scalar
erasure channel with equivalent data dropout probability input
peq (k) given by16
x1 (k + 1) = x1 (k) + 0.01 x2 (k) + x2 (k)3
peq (k) 1 P { (k) = 0} x2 (k + 1) = x2 (k) + 0.01 2x1 (k) 3x2 (k)
N 1
max + u(k) 1 + 0.1x1 (k)2
P (k i j) = i (k) > 0 y(k) = x1 (k) + d(k),
j=0 i=0
(i,j)=(0,0), i+jk
where x(k) = [x1 (k) x2 (k)]T is the plant state at time k,
(k 1) > 1 (k j i + 1) > j + i 1 . {u(k)} is the plant input, {y(k)} is the plant output, and
{d(k)} is a piecewise constant output disturbance having
This important result, implies that, in order to analyze or infrequent steps at random times. Both the plant state and
design SBNC loops, it suffices to consider a setting wherein disturbance measurements are affected by Gaussian white
the network is modeled via an erasure channel with a given noise of variance d2 = 0.01 and x2 = 0.04I2 , respectively.
dropout probability (see, e.g., [1012, 71, 72] and the many The control objective is to achieve reference tracking for
references therein). the plant output. Whilst future reference values are known
It should be emphasized here that if { (k)}kN0 is a se- to the controller, future disturbances are not. For simplicity,
quence of independent random variables, then the latter are assumed to remain at their current value.
The underlying controller is given by:
peq (k) = peq , ry (k) d(k) B(x(k))
k (x(k)) = ,
A(x(k))
i.e., the equivalent probability, is a constant. However, the
sequence of dropouts in SBNC is, in general, not a se- where {ry (k)} is the reference for y(k),
quence of independent random variables, even if the un-
derlying network delay and dropout distributions are. A(x) = (1 + 3x22 )(1 + 0.1x21 )/9,
The equivalent dropout probability characterizes closed B(x) = (2x1 + 6x22 x1 + 9x32 4x2 4x32 9x1 )/9.
loop control performance. It can be used as a guideline
for choosing the horizon length N and the timeout value We illustrate the effect on performance of the SBNC design
max . Indeed, peq (k) can be made arbitrarily small (and, parameters max and N in Figure 12,17 where typical plant
thus, the performance will become indistinguishable from output trajectories for step-like reference and disturbances
that achieved in the non-networked case). This is achieved are shown. For each pair (N, max ) we also calculated the
by choosing sufficiently large values for N and max , al- equivalent dropout probability peq (k) (which is constant in
beit at an increase in computational complexity (for details this case).
see [34]). Fortunately, in practice, choosing moderate val- As expected, closed loop performance improves when N
ues for N and max is often sufficient to achieve good per- and max are increased. However, it is also appreciated
formance as illustrated below. that there are cases where increasing N has no obvious ef-
fect on SBNC performance. This is easily explained if one
14 This implies that the network protocol must have acknowledgements,
notes that, as suggested by our comments in Section 5.2,
as in TCP.
15 This implies that the actual delay distribution does not play any role. 17 As mentioned in Section 5.2, SBNC does not require knowledge of
16 P{} stands for probability of (). the statistical properties of the delay profiles.
3 3 3
Output y
2 2 2
N=2 1
peq = 0.930
1
peq = 0.784
1
peq = 0.295
0 0 0
0 2000 4000 0 2000 4000 0 2000 4000
3 3 3
Output y
2 2 2
N=6
1 1 1
peq = 0.844 peq = 0.607 peq = 0.013
0 0 0
0 2000 4000 0 2000 4000 0 2000 4000
3 3 3
Output y
N = 10
2 2 2
1 1 1
peq = 0.841 peq = 0.604 p = 0.010
eq
0 0 0
0 2000 4000 0 2000 4000 0 2000 4000
3 3 3
Output y
N = 15
2 2 2
1 1 1 peq = 0.010
peq = 0.841 p = 0.604
eq
0 0 0
0 2000 4000 0 2000 4000 0 2000 4000
Sample number k Sample number k Sample number k
Figure 12: SBNC closed loop performance as a function of N and max (see Section 5.3).