Академический Документы
Профессиональный Документы
Культура Документы
Phillips
Stability of
Networked
Control Systems
F
eedback control systems
wherein the control loops are
closed through a real-time
n e t w o r k a re c a l l e d n e t-
worked control systems
(NCSs) [1]-[4]. The defining
feature of an NCS is that information
(reference input, plant output, control
input, etc.) is exchanged using a net-
work among control system compo-
nents (sensors, controller, actuators,
Zhang, Branicky (msb11@po.cwru.edu), and Phillips are with the Electrical Engineering and Computer Science Department, Case Western
Reserve University, 10900 Euclid Ave., Cleveland, OH 44106-7221, U.S.A.
0272-1708/01/$10.00©2001IEEE
84 IEEE Control Systems Magazine February 2001
dropouts affect the performance of an NCS is an issue
that must be considered. Another issue is that plant Physical Plant
outputs may be transmitted using multiple network
packets (so-called multiple-packet transmission), due to
the bandwidth and packet size constraints of the net- Actuator 1 ... Actuator m Sensor 1 ... Sensor n
work. Because of the arbitration of the network me-
dium with other nodes on the network, chances are
that all/part/none of the packets could arrive by the Other Control Network Other
Processes Processes
time of control calculation.
Controller
The implementation of distributed control can be
traced back at least to the early 1970s when
Figure 1. A typical NCS setup and information flows.
Honeywell’s Distributed Control System (DCS) was in-
troduced. Control modules in a DCS are loosely con-
nected because most of the real-time control tasks (sensing, sion as asynchronous dynamical systems (ADSs) [11] and
calculation, and actuation) are carried out within individual analyze their stability. Finally, we present our conclusions.
modules. Only on/off signals, monitoring information, alarm
information, and the like are transmitted on the serial net- Review of Previous Work
work. Today, with help from ASIC chip design and significant Halevi and Ray [1] consider a continuous-time plant and dis-
price drops in silicon, sensors and actuators can be crete-time controller and analyze the integrated communica-
equipped with a network interface and thus can become in- tion and control system (ICCS) using a discrete-time
dependent nodes on a real-time control network. Hence, in approach. They study a clock-driven controller with mis-syn-
NCSs, real-time sensing and control data are transmitted on chronization between plant and controller. The system is rep-
the network, and network nodes need to work closely to- resented by an augmented state vector that consists of past
gether to perform control tasks. values of the plant input and output, in addition to the cur-
Current candidate networks for NCS implementations rent state vectors of the plant and controller. This results in a
are DeviceNet [5], Ethernet [6], and FireWire [7], to name a finite-dimensional, time-varying discrete-time model. They
few. Each network has its own protocols that are designed also take message rejection and vacant sampling into account.
for a specific range of applications. Also, the behavior of an Nilsson [2] also analyzes NCSs in the discrete-time do-
NCS largely depends on the performance parameters of the main. He further models the network delays as constant, in-
underlying network, which include transmission rate, me- dependently random, and random but governed by an
dium access protocol, packet length, and so on. underlying Markov chain. From there, he solves the LQG op-
There are two main approaches for accommodating all of timal control problem for the various delay models. He also
these issues in NCS design. One way is to design the control points out the importance of time-stamping messages,
system without regard to the packet delay and loss but design which allows the history of the system to be known.
a communication protocol that minimizes the likelihood of In Walsh et al. [3], the authors consider a continuous
these events. For example, various congestion control and plant and a continuous controller. The control network,
avoidance algorithms have been proposed [8], [9] to gain shared by other nodes, is only inserted between the sensor
better performance when the network traffic is above the limit nodes and the controller. They introduce the notion of maxi-
that the network can handle. The other approach is to treat the mum allowable transfer interval (MATI), denoted by τ,
network protocol and traffic as given conditions and design which supposes that successive sensor messages are sepa-
rated by at most τ seconds. Their goal is to find that value of
control strategies that explicitly take the above-mentioned is-
τ for which the desired performance (e.g., stability) of an
sues into account. To handle delay, one might formulate con-
NCS is guaranteed to be preserved.
trol strategies based on the study of delay-differential
It is assumed that the nonnetworked feedback system
equations [10]. Here, we discuss analysis and design strate-
gies for both network-induced delay and packet loss.
x&( t ) = A11 x ( t ), x ( t ) = [x p ( t ), x c ( t )]
T
This article is organized as follows. First, we review some
previous work on NCSs and offer some improvements.
Then, we summarize the fundamental issues in NCSs and ex- (where x p and x c represent the plant and controller state) is
amine them with different underlying network-scheduling globally exponentially stable. Thus, there exists a P such that
protocols. We present NCS models with network-induced
delay and analyze their stability using stability regions and a AT11 P + PA11 = − I . (1)
hybrid systems technique. Following that, we discuss meth-
ods to compensate network-induced delay and present ex- Next, it is assumed that the network’s effects can be com-
perimental results over a physical network. Then, we model puted by the error, e(t), between the plant output and con-
NCSs with packet dropout and multiple-packet transmis- troller input. So the networked system’s state vector is
where A can be partitioned as (more general than (1)), where P ,Q are positive-definite
symmetric matrices, the bound on τ becomes
A A12
A = 11 .
A21 A22 (2) ln(2)
1
τ < min , ,
1 + 1)∑ i = 1 i
p
p A 8 A ( λ 2 / λ
Walsh et al. study two scheduling methods: try-once-
λ min (Q )
discard (TOD) and token-ring-type static scheduling. As-
.
suming there are p sensor nodes connected to the NCS, 16 λ 2 λ 2 / λ 1 A ( λ 2 / λ 1 + 1)∑ i = 1
2 p
i
static scheduling simply means that each node transmits
exactly once every p transmissions in a fixed order. Under
Furthermore, the third term is always the smallest, so
the MATI constraint, the controller must receive a transmis-
sion from at least one of the sensors every τ seconds. Hence,
λ min (Q )
under static scheduling, all sensor values are updated in at τ<
16 λ 2 λ 2 / λ 1 A ( λ 2 / λ 1 + 1)∑ i = 1 i
2 p
most pτ seconds. (4)
TOD is a scheduling protocol in which the node with the
guarantees the global exponential stability of
the NCS.
The defining feature of an NCS is Proof: See the Appendix.
Corollary 2 shows that the MATI τ depends
that information is exchanged using on A , p, and Q; Q in turn determines P using
(3). A and p are fixed for a particular system
a network among control system setup; thus Q is the only variable in choosing τ.
Actuator
and a discrete controller
1 1 1
Longer Delays max h − , 0 < τ < min , h
2 K K (12)
When the delays can be longer than one sampling period
(say, 0 < τ k < lh, l > 1), one may receive zero, one, or more
than one (up to l) control sample(s) in a single sampling pe- or
riod. In the special case where (l − 1)h < τ k < lh for all k, one
control sample is received every sample period for k > l . In 1 1 τ 1
max − , 0 < < min , 1.
this case, the analysis follows that in [14], resulting in 2 Kh h Kh
60%
Stable simulation, we considered delays between 0 and 4h. We can
see that when0 ≤ τ < h, the region has a shape similar to the in-
40%
tegrator case. The shape of the stability region is also affected
by the feedback controller (in this case, the scalar feedback
20% gain).
1/2–1/(hK)
0 Analyzing Stability Using a
0 1/K 2/K 3/K 4/K Hybrid Systems Technique
h The stability of an NCS with network-induced delay can also
Figure 6. Stability region of a controlled integrator. be analyzed using a hybrid systems stability analysis tech-
nique. Hybrid systems contain continuous dynamics and
4 discrete events [16]. The NCS model we are studying resem-
bles a class of hybrid systems with fixed instants of impulse
3.5
effect. The stability of such continuous-discrete systems
3 was reviewed and extended in [17], where linearized hybrid
systems of the following form are considered:
2.5
x&( t ) = Ax ( t ) + Bu ( t ) + f ( x ( t ),u ( t ), t ), t ∈ I \ Θ,
τ/h
2
u ( t + ) = Cx ( t ) + Du ( t ) + φ( x ( t ),u ( t ), t ), t ∈ Θ, (13)
1.5
where x ∈ R n , u ∈ R m , and Θ = {t k|t k = kh, h > 0, k = 0 ,1,2,K}.
1 Let z ( t ) = [x T ( t ),u T ( t )]T ; then f ( z , t ):Ω 0 × I → Rn is continu-
ous in z in the neighborhoodΩ 0 ⊂ R n + m for any t in the inter-
0.5
val I ⊂ R + . Furthermore, f (0 , t ) = 0 , t ∈ I , φ(0 , t ) = 0 , t ∈ Θ and
0 for z ′ , z ′′∈ Ω 0 , the conditions
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6
h 1+ α
f ( z ′ , t ) − f ( z ′′, t ) ≤ L1 z ′− z ′′ ; L1 , α > 0 ; t ∈I
Figure 7. Simulation of the stability region of x&( t ) = x ( t ) − Kx ( t − τ )
with K = 2 and 0 < τ < 4h. and
x ( t ) = e At x (0 ) + ∫ e A ( t − s ) Bu ( s )ds.
t
C = e − Aτ ,
0 (15)
D = e − Aτ E ( τ )BK .
The estimation scheme is illustrated in Fig. 8. There, τ sc, k de-
Comparing this to (13), we obtain the following corollary. notes the sensor-to-controller delay for plant state x ( kh),
Corollary 4: The stability of an NCS with constant delay and x ( kh + τ sc, k ) denotes the plant state estimate at the time
reduces to examining the Schur-ness of x ( kh) is received. Assuming there is no measurement noise,
x ( kh + τ sc, k ) can be calculated by
e Ah − E ( h)BK
H = A( h − τ ) − Aτ . x ( kh + τ sc, k ) = x ( kh + τ sc, k )
e −e ( E ( h) − E ( τ ))BK
x ( kh) + ∫
Aτ sc kh + τ sc A ( kh + τ sc −s)
=e
,k
,k
e ,k
Bu ( s )ds
kh
We can use this to recalculate the integrator example of (16)
(11). By setting A = 0 and B = 1 in (14), we find and the control law is computed by
1 − hK u ( kh + τ sc, k ) = − K x ( kh + τ sc, k ).
H = .
(17)
1 −( h − τ )K
Using this control law, the closed-loop system becomes
For H to be Schur, τ must satisfy (12), which verifies Ex-
~
ample 2. x (( k + 1)h + τ k + 1) = Φ ( δk )x ( kh + τ k ) (18)
x (kh+ τ sc,k ) Using the notation defined in (18), the closed-loop system
Estimator with the estimator is
Controller
x (kh) x((k+1)h)
~
z (( k + 1)h + τ k + 1) = Φ ( δk )z ( kh + τ k ) (26)
kh (k+1)h (k+2)h
τ sc,k where
Control Experiments
x (( k + 1)h) = x$ (( k + 1)h) + Lc ( y(( k + 1)h) − Cx$ (( k + 1)h))
over a Physical Network
(20)
Setup
where Lc denotes the current estimator gain. The calcula-
tion is done in two steps; first, the estimator state x ( kh) is
projected forward by one sampling period to obtain
x$ (( k + 1)h), and then x$ (( k + 1)h) is corrected based on the
plant output received. Plant Computer
The estimator with sensor measurement delay is based Plant Computation
on the current-state estimator. Fig. 9 shows how the estima- (MATLAB)
tion is carried out. The estimation scheme at time kh is as
follows: ActiveX
1) Correction based on y( kh): Automation
Actuator Sensor
x ( kh) = x$ ( kh) + Lc (y( kh) − Cx$ ( kh))
Data Plant Data
(21) (C++ Program)
2) Forward to kh + τ sc, k :
x ( kh) + ∫
Aτ sc kh + τ sc A ( kh + τ sc −s)
x ( kh + τ sc, k ) = e
,k
,k
e ,k
Bu ( s )ds
kh
(22) Controller
(C++ Program)
3) Calculate control law:
ActiveX
u ( kh + τ sc, k ) = − K x ( kh + τ sc, k ) (23) Automation
4) Forward to ( k + 1)h:
Controller Computation
A ( h − τ sc
(MATLAB)
x$ (( k + 1)h) = e x ( kh + τ sc, k )
,k )
Controller Computer
+∫
( k + 1) h
e A (( k + 1) h − s ) Bu ( s )ds.
kh + τ sc ,k (24)
C++ program obtains the control signal from the network, 0.8
passes it to MATLAB for plant state and output calculation,
and then sends the plant output to the controller computer. 0.6
Clock Synchronization
In the experiment, every message sent out by the plant and 1.6
w/o Delay
controller is time stamped. To calculate the delay accu- w/ Network
1.4 w/ Estimation
rately, plant and controller clocks must be synchronized.
Clock synchronization can be achieved in several ways, 1.2
such as software synchronization, hardware synchroniza-
1
tion, or a combination of the two. Clock synchronization in
Output
our experiment has been done as in [19]. Suppose the con- 0.8
troller wants to synchronize its clock with the plant. It sends
0.6
a message to the plant, and the plant will send its clock read-
ing back to the controller. The controller records the clock 0.4
offset and the round-trip time. The measurement is carried
out many times, and the controller uses the clock offset with 0.2
Stability of NCS ( )
V ( x ( k + 1)) − V ( x ( k )) ≤ α −s 2 − 1 V ( x ( k )), s = 1,2,K , N ,
with Data Packet Dropout (28)
When using an NCS, one must consider not only net- then the ADS remains exponentially stable, with decay rate
work-induced delay, but also data packet dropout. Net- greater than α.
works can be viewed as unreliable data transmission paths, Theorem 6 requires the ADS to be stable on the average.
where packet collision and network node failure occasion- It does not require every difference equation of the ADS to
ally occur. When there is a packet collision, instead of re- be stable, but rather it guarantees the ADS to be stable on
peated retransmission attempts, it might be advantageous the whole. If the discrete state dynamics is given by
to drop the old packet and transmit a new one. Thus it is x (( k + 1)h) = Φ s x ( kh) for s = 1,2,K , N , the search for the
valuable to analyze the rate (percentage successful) at Lyapunov function of type V ( x ( kh)) = x T ( kh)Px ( kh) and
which the data should be transmitted to achieve the desired the scalars α 1 , α 2 ,K , α N can be cast into a bilinear matrix in-
performance (stability). equality (BMI) problem [11]. Equations (27) and (28) can be
An NCS with data packet dropout can be modeled as an rewritten as
asynchronous dynamical system (ADS) with rate con-
straints on events. The stability of this type of system is r1 log α 1 + r2 log α 2 + ⋅⋅⋅ + rN log α N > 0
studied in [11]. We will extend a result therein to NCSs.
and
ADSs with Rate Constraints
ADSs, like hybrid systems, are systems that incorporate Φ Ts P Φ s ≤ α −s 2 P , s = 1,2,K , N .
continuous and discrete dynamics. The continuous dynam-
ics are governed by differential or difference equations, This is a BMI problem in P and the log α i s.
whereas the discrete dynamics are governed by finite au-
tomata that are driven asynchronously by external discrete Modeling an NCS
events with fixed rates [11]. with Data Packet Dropout
We consider a simplified ADS with rate constraints that Fig. 13 illustrates an NCS setup with the possibility of drop-
can be described by a set of difference equations ping data packets. Here we assume that the nonnetworked
system is stable and the network is only inserted from the
x ( k + 1) = fs ( x ( k )), s = 1,2,K , N , plant to the controller. The network can be modeled as a
switch that closes at a certain rate r. When the switch is
x(kh) closed (position S 1 ), the network packet containing x ( kh) is
Plant
x ((k+1) h) = Φ x (kh) + Γ u(kh) transmitted, whereas when it is open (position S 2 ), the out-
put of the switch is held at the previous value and the packet
is lost. Thus the dynamics of the switch (state x) can be
modeled as
S1 S2
S 1: x ( kh) = x ( kh),
S 2: x ( kh) = x (( k − 1)h).
Controller x(kh)
K x (kh) Let z ( kh) = [x T ( kh), x T ( kh)]T be the augmented state vec-
tor; the closed-loop system with the network packet drop-
Figure 13. NCS with data packet dropout. out effect is represented by
1.4
10
. 0.2955 0.0167 0.0512 w/o Packet Dropout
Φ = , ΓK = , w/ 70% Packets Transmitted
0 0.9704 01108
. 0.3399 1.2 w/ 20% Packets Transmitted
α 1 = 11288
. , α 2 = 0.7552 0.4
and 0.2
0
0.9210 0.9196 −0.6578 −0.5144 0 5 10 15 20 25 30
0.9196 24788
. −0.5232 −1.6644 Time (s)
P= ,
−0.6578 −0.5232 0.7003 0.6461
Figure 14. Comparison of scaled step responses with packet
−0.5144 −16644
. 0.6461 20562
. dropouts.
Φ 11 Φ 12 − Γ1 K 1 − Γ1 K 2
Controller Φ Φ 22 − Γ2 K 1 − Γ2 K 2
~
–K x (kh) Φ 2 = 21 .
x(kh) = [ x T1(kh), x 2T(kh)] T 0 0 I 0
Φ Φ − Γ2 K 1 − Γ2 K 2
Figure 15. NCS with multiple-packet transmission. 21 22
~ ~ ~ ~
Assume Neither Φ 1 nor Φ 2 is Schur; however, Φ 1 ⋅ Φ 2 is Schur,
which proves the stability of the system if a scheduling net-
Φ 11 Φ 12 work is applied.
x ( kh) = [x T1 ( kh), x T2 ( kh)]T , Φ = ,
Φ 21 Φ 22 Using static scheduling on this two-packet setup, each
Γ packet is transmitted 50% of the time; thus the effective
Γ = 1 , K = [K 1 , K 2]. sampling period is heff = h / 0.5 = 0.6 s. The step response of
Γ2
this two-packet transmission setup is similar to the origi-
nal system.
Let the augmented state be z ( kh) = x T1 ( kh) , x T2 ( kh) ,[
x T1 ( kh), x T2 ( kh)]T . We can now write the closed-loop system
Conclusions
with two-packet transmission as
This article analyzed several fundamental issues in network
~ control systems. One issue is the network-induced delay
z (( k + 1)h) = Φ s z ( kh) when transmitting sensor data and control data. Depending
on the control network protocol employed, the delay can be
for s = 1,2. When the switch is at S 1 , either constant or time varying. The relationship between
+∫
h − τ sc
e As B ds u ( kh + τ sc, k )
,k
1
≤ .
8 A ( λ 2 / λ 1 + 1)∑ i = 1 i
p
The estimation error is defined in (25), and the error equa-
tion is
λ min (Q ) (29)
≤ 1. Now apply the control law to form the closed-loop sys-
2λ 2 λ 2 / λ 1 A
tem
( )
~
{ }
λ2max Φ 2 = max 1, λ2max (Φ ) ,
Lund Institute of Technology’s Dept. of Automatic Control.
His research interests include hybrid systems, intelligent
control, and learning, with applications to robotics, flexible
with one achieving the maximum if and only if Φ is stable. manufacturing, and control over networks.
The theorem is now seen to easily follow.
Q.E.D. Stephen M. Phillips received the B.S. degree with distinction
in electrical engineering from Cornell University in 1984 and
Wei Zhang received his B.S. and M.S. degrees in electrical the M.S. and Ph.D. degrees in electrical engineering from
engineering from Tianjin University, Tianjin, China, in 1993 Stanford University in 1985 and 1988, respectively. He joined
and 1996, respectively. He then worked for the Industrial Au- the faculty of Case Western Reserve University in 1988, where
tomation and Control Division of Honeywell (Tianjin) Ltd. as he is currently Associate Professor in the Department of Elec-
a Systems Engineer from 1996 to 1997. He is now pursuing trical Engineering and Computer Science. He serves as Direc-
his Ph.D. degree in electrical engineering and computer sci- tor of the Center for Automation and Intelligent Systems and
ence at Case Western Reserve University. His research inter- is a registered professional engineer. His research interests
ests include the modeling, analysis, and design of include sampled-data control, system identification, and
networked control systems. adaptive control, with applications to manufacturing, aero-
space, and microelectromechanical systems.
Michael S. Branicky received the B.S. (1987) and M.S.
(1990) degrees in electrical engineering and applied physics