Вы находитесь на странице: 1из 16

By Wei Zhang, Michael S. Branicky, and Stephen M.

Phillips

Stability of
Networked
Control Systems

F
eedback control systems
wherein the control loops are
closed through a real-time
n e t w o r k a re c a l l e d n e t-
worked control systems
(NCSs) [1]-[4]. The defining
feature of an NCS is that information
(reference input, plant output, control
input, etc.) is exchanged using a net-
work among control system compo-
nents (sensors, controller, actuators,

©2000 Image 100 Ltd.


etc.). Fig. 1 illustrates a typical setup
and the information flows of an NCS.
The primary advantages of an NCS are
reduced system wiring, ease of system
diagnosis and maintenance, and in-
creased system agility.
The insertion of the communication network in the feed- lay) that occurs while exchanging data among devices con-
back control loop makes the analysis and design of an NCS nected to the shared medium. This delay, either constant
complex. Conventional control theories with many ideal as- (up to jitter) or time varying, can degrade the performance
sumptions, such as synchronized control and nondelayed of control systems designed without considering the delay
sensing and actuation, must be reevaluated before they can and can even destabilize the system. Next, the network can
be applied to NCSs. Specifically, the following issues need to be viewed as a web of unreliable transmission paths. Some
be addressed. The first issue is the network-induced delay packets not only suffer transmission delay but, even worse,
(sensor-to-controller delay and controller-to-actuator de- can be lost during transmission. Thus, how such packet

Zhang, Branicky (msb11@po.cwru.edu), and Phillips are with the Electrical Engineering and Computer Science Department, Case Western
Reserve University, 10900 Euclid Ave., Cleveland, OH 44106-7221, U.S.A.

0272-1708/01/$10.00©2001IEEE
84 IEEE Control Systems Magazine February 2001
dropouts affect the performance of an NCS is an issue
that must be considered. Another issue is that plant Physical Plant
outputs may be transmitted using multiple network
packets (so-called multiple-packet transmission), due to
the bandwidth and packet size constraints of the net- Actuator 1 ... Actuator m Sensor 1 ... Sensor n
work. Because of the arbitration of the network me-
dium with other nodes on the network, chances are
that all/part/none of the packets could arrive by the Other Control Network Other
Processes Processes
time of control calculation.
Controller
The implementation of distributed control can be
traced back at least to the early 1970s when
Figure 1. A typical NCS setup and information flows.
Honeywell’s Distributed Control System (DCS) was in-
troduced. Control modules in a DCS are loosely con-
nected because most of the real-time control tasks (sensing, sion as asynchronous dynamical systems (ADSs) [11] and
calculation, and actuation) are carried out within individual analyze their stability. Finally, we present our conclusions.
modules. Only on/off signals, monitoring information, alarm
information, and the like are transmitted on the serial net- Review of Previous Work
work. Today, with help from ASIC chip design and significant Halevi and Ray [1] consider a continuous-time plant and dis-
price drops in silicon, sensors and actuators can be crete-time controller and analyze the integrated communica-
equipped with a network interface and thus can become in- tion and control system (ICCS) using a discrete-time
dependent nodes on a real-time control network. Hence, in approach. They study a clock-driven controller with mis-syn-
NCSs, real-time sensing and control data are transmitted on chronization between plant and controller. The system is rep-
the network, and network nodes need to work closely to- resented by an augmented state vector that consists of past
gether to perform control tasks. values of the plant input and output, in addition to the cur-
Current candidate networks for NCS implementations rent state vectors of the plant and controller. This results in a
are DeviceNet [5], Ethernet [6], and FireWire [7], to name a finite-dimensional, time-varying discrete-time model. They
few. Each network has its own protocols that are designed also take message rejection and vacant sampling into account.
for a specific range of applications. Also, the behavior of an Nilsson [2] also analyzes NCSs in the discrete-time do-
NCS largely depends on the performance parameters of the main. He further models the network delays as constant, in-
underlying network, which include transmission rate, me- dependently random, and random but governed by an
dium access protocol, packet length, and so on. underlying Markov chain. From there, he solves the LQG op-
There are two main approaches for accommodating all of timal control problem for the various delay models. He also
these issues in NCS design. One way is to design the control points out the importance of time-stamping messages,
system without regard to the packet delay and loss but design which allows the history of the system to be known.
a communication protocol that minimizes the likelihood of In Walsh et al. [3], the authors consider a continuous
these events. For example, various congestion control and plant and a continuous controller. The control network,
avoidance algorithms have been proposed [8], [9] to gain shared by other nodes, is only inserted between the sensor
better performance when the network traffic is above the limit nodes and the controller. They introduce the notion of maxi-
that the network can handle. The other approach is to treat the mum allowable transfer interval (MATI), denoted by τ,
network protocol and traffic as given conditions and design which supposes that successive sensor messages are sepa-
rated by at most τ seconds. Their goal is to find that value of
control strategies that explicitly take the above-mentioned is-
τ for which the desired performance (e.g., stability) of an
sues into account. To handle delay, one might formulate con-
NCS is guaranteed to be preserved.
trol strategies based on the study of delay-differential
It is assumed that the nonnetworked feedback system
equations [10]. Here, we discuss analysis and design strate-
gies for both network-induced delay and packet loss.
x&( t ) = A11 x ( t ), x ( t ) = [x p ( t ), x c ( t )]
T
This article is organized as follows. First, we review some
previous work on NCSs and offer some improvements.
Then, we summarize the fundamental issues in NCSs and ex- (where x p and x c represent the plant and controller state) is
amine them with different underlying network-scheduling globally exponentially stable. Thus, there exists a P such that
protocols. We present NCS models with network-induced
delay and analyze their stability using stability regions and a AT11 P + PA11 = − I . (1)
hybrid systems technique. Following that, we discuss meth-
ods to compensate network-induced delay and present ex- Next, it is assumed that the network’s effects can be com-
perimental results over a physical network. Then, we model puted by the error, e(t), between the plant output and con-
NCSs with packet dropout and multiple-packet transmis- troller input. So the networked system’s state vector is

February 2001 IEEE Control Systems Magazine 85


z ( t ) = [x T ( t ), eT ( t )]T , and thus the networked closed-loop Corollary 2: If the Lyapunov function V ( x ) = x T Px of the
system is nonnetworked, closed-loop system satisfies

z&( t ) = Az ( t ) AT11 P + PA11 = −Q, (3)

where A can be partitioned as (more general than (1)), where P ,Q are positive-definite
symmetric matrices, the bound on τ becomes
A A12 
A =  11 .
 A21 A22  (2)  ln(2)
 1
τ < min  , ,
1 + 1)∑ i = 1 i
p

p A 8 A ( λ 2 / λ
Walsh et al. study two scheduling methods: try-once-
λ min (Q ) 
discard (TOD) and token-ring-type static scheduling. As- 
.
suming there are p sensor nodes connected to the NCS, 16 λ 2 λ 2 / λ 1 A ( λ 2 / λ 1 + 1)∑ i = 1
2 p
i 
static scheduling simply means that each node transmits
exactly once every p transmissions in a fixed order. Under
Furthermore, the third term is always the smallest, so
the MATI constraint, the controller must receive a transmis-
sion from at least one of the sensors every τ seconds. Hence,
λ min (Q )
under static scheduling, all sensor values are updated in at τ<
16 λ 2 λ 2 / λ 1 A ( λ 2 / λ 1 + 1)∑ i = 1 i
2 p
most pτ seconds. (4)
TOD is a scheduling protocol in which the node with the
guarantees the global exponential stability of
the NCS.
The defining feature of an NCS is Proof: See the Appendix.
Corollary 2 shows that the MATI τ depends
that information is exchanged using on A , p, and Q; Q in turn determines P using
(3). A and p are fixed for a particular system
a network among control system setup; thus Q is the only variable in choosing τ.

components. One might use an analytic method to find the Q


that could maximize τ. By maximization we
mean the largest τ possible that could still pre-
greatest weighted error from its last reported value (to the serve stability of the NCS. However, the follow-
controller) transmits its message. Again, the MATI con- ing example illustrates the use of random search in
straint ensures at least one such transmission every τ sec- choosing τ.
onds. However, TOD does not guarantee that each node will Example 1: Consider the state-space plant model
transmit once every p transmissions.
For each of these protocols, one can compute an upper  x& 1  0 1   x 1   0 
bound on the MATI τ that preserves stability of the  x&  = 0 −01 +
.   x 2  01
. 
u,
 2 
closed-loop system. The result is given in the following x 
y = [1 0] 1  .
theorem. x2 (5)
Theorem 1 [3, Theorem 2]: Given an NCS with p sensor
nodes operating under TOD or static scheduling, define
A continuous-state feedback controller is u = − Kx , where
λ 1 = λ min( P ), λ 2 = λ max ( P ) (where P was defined above). If the
K = [3.75 ,115. ] (closed-loop poles at –1/2 and –3/4).
MATI satisfies
Using Theorem 1, for p = 1 (only one node, which
is a nonnetworked sampled-data system), we obtain
 ln(2)
 1 τ = 2.7 ×10 −4 s. By randomly selecting Q and solving for P, we
τ < min  , ,
1 + 1)∑ i = 1 i
p

p A 8 A ( λ 2 / λ can calculate τ using the formula in Corollary 2. In 200 trials,
the maximum τ found was 4.5 ×10 −4 s. However, the maxi-

1  mum stable constant sampling period for this feedback con-
,
16 λ 2 λ 2 / λ 1 A ( λ 2 / λ 1 + 1)∑ i = 1
2 p
i  trol system is 1.7 s (this can be determined using the
“stability region” technique we discuss below), which
shows that Theorem 1 and Corollary 2 may be conservative.
then the NCS is globally exponentially stable.
Theorem 1 and Corollary 2 give sufficient conditions on
The calculation of the bound for τ can be generalized and
the network sampling rate to guarantee that the original
tightened by the following corollary.
nonnetworked system remains stable when the control loop
is closed over the network. They might be too conservative,

86 IEEE Control Systems Magazine February 2001


Case 1: Case 2: Case 3: occurs, and transmission of the lower priority message
No collision When a collison occurs When a collison occurs is terminated and will be retried when the network is
occurs on DeviceNet, one with on Ethernet, both back idle, as shown in Case 2 of Fig. 2. Ethernet employs a
higher priority transmits off and transmit again CSMA with collision detection (CSMA/CD) protocol.
Node i When there is a collision, all of the affected nodes will
back off, wait a random time (usually decided by the bi-
nary exponential backoff algorithm [6]), and retransmit,
kh (k+1)h (k+2)h as shown in Case 3 of Fig. 2. Packets on these types of
networks are affected by random delays, and the
worst-case transmission time of packets is unbounded.
Therefore, CSMA networks are generally considered
Node j nondeterministic. However, if network messages are
prioritized, higher priority messages have a better
chance of timely transmission.
kh (k+1)h (k+2)h
The TP protocol appears in token bus (IEEE Stan-
Figure 2. Timing diagram for two nodes on a random access network. dard 802.4), token ring (IEEE Standard 802.5) [6], and
the fiber distributed data interface (FDDI) MAC [13] ar-
however, to be of practical use. We later examine stability chitectures; TDMA is used in FireWire [7]. A timing diagram
for some specific examples to develop some insight into the for this type of network is shown in Fig. 3. These protocols
problem. eliminate the contention for the shared network medium by
allowing each node on the network to transmit according to
Fundamental Issues in NCSs a predetermined schedule. In a token bus, the token is
In this section, we will analyze some basic problems in passed around a logical ring, whereas in a token ring, it is
NCSs, including network-induced delay, single-packet or passed around a physical ring. In scheduling networks, it is
multiple-packet transmission of plant inputs and outputs, possible to arrange for periodic transmission of messages.
and dropping of network packets. For example, FireWire has a transmission cycle (125 µs) di-
vided into small time slots, where each isochronous trans-
action is guaranteed a time slot to transmit in every cycle.
Network-Induced Delay
Packet transmission delays on scheduling networks occur
The network-induced delay in NCSs occurs when sensors,
while waiting for the token or time slot. They can be made
actuators, and controllers exchange data across the net-
both bounded and constant by transmitting packets peri-
work. This delay can degrade the performance of control
odically.
systems designed without considering it and can even
destabilize the system.
Single-Packet versus
Depending on the medium access control (MAC) proto-
Multiple-Packet Transmission
col of the control network, network-induced delay can be
Single-packet transmission means that sensor or actuator
constant, time varying, or even random. MAC protocols gen-
data are lumped together into one network packet and
erally fall into two categories: random access and scheduling
transmitted at the same time, whereas in multiple-packet
[12]. Carrier sense multiple access (CSMA) is most often
transmission, sensor or actuator data are transmitted in
used in random access networks, whereas token passing
separate network packets, and they may not arrive at the
(TP) and time division multiple access (TDMA) are com-
controller and plant simultaneously. One reason for multi-
monly employed in scheduling networks.
ple-packet transmission is that packet-switched networks
Control networks using CSMA protocols include can only carry limited information in a single packet due to
DeviceNet [5] and Ethernet [6]. Fig. 2 illustrates various pos- packet size constraints. Thus, large amounts of data must
sible situations for this type of network. The figure depicts be broken into multiple packets to be transmitted. The
two nodes continually transmitting messages (with respect
to a fixed time line). A node on a CSMA network monitors the
network before each transmission. When the network is idle, Waiting for Token Signal Sent
or Time Slot
it begins transmission immediately, as shown in Case 1 of Fig.
2. Otherwise it waits until the network is not busy. When two
Node i Signal Ready
or more nodes try to transmit simultaneously, a collision oc-
curs. The way to resolve the collision is protocol dependent.
DeviceNet, which is a controller area network (CAN), uses kh (k+1)h (k+2)h
CSMA with a bitwise arbitration (CSMA/BA) protocol. Since
CAN messages are prioritized, the message with the highest Figure 3. Timing diagram for an arbitrary node on a scheduling
priority is transmitted without interruption when a collision network.

February 2001 IEEE Control Systems Magazine 87


Dropping Network Packets
ZOH Continuous h Network packet drops occasionally happen on an NCS when
Actuator Time Plant Sensor there are node failures or message collisions. Although
most network protocols are equipped with transmis-
sion-retry mechanisms, they can only retransmit for a lim-
ited time. After this time has expired, the packets are
dropped. Furthermore, for real-time feedback control data
Control Discrete Time
Control such as sensor measurements and calculated control sig-
Network Network
τca Controller τsc nals, it may be advantageous to discard the old,
untransmitted message and transmit a new packet if it be-
Continuous Signal comes available. In this way, the controller always receives
Digital Signal fresh data for control calculation.
Figure 4. NCS model with network-induced delay. Normally, feedback-controlled plants can tolerate a cer-
tain amount of data loss, but it is valuable to determine
whether the system is stable when only transmitting the
x(kh) or y (kh) packets at a certain rate and to compute acceptable lower
bounds on the packet transmission rate.
Plant
Stability of NCSs with
kh (k+1)h (k+2)h Network-Induced Delay
Modeling NCSs with
τ sc,k u(kh)
Network-Induced Delay
Controller The NCS model considering network-induced delay is
shown in Fig. 4. The model consists of a continuous plant
kh (k+1)h (k+2)h
x&( t ) = Ax ( t ) + Bu ( t )
y( t ) = Cx ( t ) (6)
τ ca,k u(kh)

Actuator
and a discrete controller

kh (k+1)h (k+2)h u ( kh) = − Kx ( kh), k = 0 ,1,2,K . (7)


τk

Here, x ∈ R n , u ∈ R m , y ∈ R p , and A, B,C , K are of compatible


Figure 5. Network-induced delay. dimensions.
There are two sources of delays from the network: sen-
other reason is that sensors and actuators in an NCS are of- sor-to-controller τ sc and controller-to-actuator τ ca . Any con-
ten distributed over a large physical area, and it is impossi- troller computational delay can be absorbed into either τ sc
ble to put the data into one network packet. or τ ca without loss of generality [2]. For fixed control law
Conventional sampled-data systems assume that plant (time-invariant controllers), the sensor-to-controller delay
outputs and control inputs are delivered at the same time, and controller-to-actuator delay can be lumped together as
which may not be true for NCSs with multiple-packet trans- τ = τ sc + τ ca for analysis purposes.
missions. Due to network access delays, the controller may We consider the setup with a) clock-driven sensors that
not be able to receive all of the plant output updates at the sample the plant outputs periodically at sampling instants;
time of the control calculation. b) an event-driven controller, which can be implemented by
Different networks are suitable for different types of an external event interrupt mechanism and which calcu-
transmissions. Ethernet, originally designed for transmit- lates the control signal as soon as the sensor data arrives;
ting information such as data files, can hold a maximum of and c) event-driven actuators, which means the plant inputs
1500 bytes of data in a single packet [6]. Hence, it is more ef- are changed as soon as the data become available. The tim-
ficient to lump the sensor data into one packet and transmit ing of signals of the setup with τ < h is shown in Fig. 5.
it together—single-packet transmission. On the other hand,
DeviceNet, featuring frequent transmission of small-size Delay Less than One Sampling Period
control data, has a maximum 8-byte data field in each First consider the case where the delay of each sample, τ k , is
packet; thus, sensor data often must be shuttled in different less than one sampling period, h. (Here the subscript repre-
packets on DeviceNet. sents the sampling instant.) This constraint means that at

88 IEEE Control Systems Magazine February 2001


most two control samples, u (( k −1)h) and u ( kh), need be ap- Φ Γ1( τ ′k ) Γ0 ( τ ′k ) L 0 
plied during the kth sampling period. The system equations  0 0 I L 0
~
Φ ( k) =  ,
can be written as  M M M O M
 −K L 0 
 0 0 (10)
x&( t ) = Ax ( t ) + Bu ( t ), t ∈ [kh + τ k , ( k + 1)h + τ k + 1 ),
y( t ) = Cx ( t ),
where τ ′k = τ k − (l − 1)h and the augmented state vector is
u ( t + ) = − Kx ( t − τ k ), t ∈ {kh + τ k , k = 0 ,1,2,K} (8) z ( kh) = [x T ( kh),u T (( k − l )h),K ,u T (( k − 1)h)]T .
In the more general case, tedious bookkeeping must be
~
where u ( t + ) is piecewise continuous and only changes value performed, as even the block structure of the matrix Φ is
at kh +τ k . Sampling the system with period h we obtain [14] time varying, since it depends on the schedule of the receipt
of the control samples.
x (( k + 1)h) = Φx ( kh) + Γ0 ( τ k )u ( kh) + Γ1( τ k )u (( k − 1)h),
y( kh) = Cx ( kh) Stability Regions
Conventionally, a faster sampling rate is desirable in sam-
where pled-data systems so the discrete-time control design and
performance can approximate that of the continuous sys-
Φ = e Ah , tem. But in NCSs, a faster sampling rate can increase the net-
Γ0 ( τ k ) = ∫
h−τ k
e As B ds , work load, which in turn results in longer delay of the
0
signals. Thus finding a sampling rate that can both tolerate
Γ1( τ k ) = ∫
h
e As B ds.
h−τ k the network-induced delay and achieve desired system per-
formance is important in NCS design.
Defining z ( kh) = [x T ( kh),u T (( k −1)h)]T as the augmented Plotting the stability region of an NCS with respect to the
state vector, the augmented closed-loop system is sampling rate, h, and network delay, τ, is helpful to see the
relationship between these two parameters. Note that here
~
z (( k + 1)h) = Φ ( k )z ( kh) (9) we are considering constant delay, which can be achieved
by using an appropriate network protocol.
where
Integrator Case
~ Φ − Γ0 ( τ k )K Γ1( τ k ) The relationship between h and τ can be derived analytically
Φ ( k) =  .
 −K 0  for simple scalar systems.
Example 2: Consider the integrator example
If the delay is constant (i.e., τ k = τ for k = 0 ,1,2,K), the sys-
tem is still time invariant, which simplifies the system analy- x&( t ) = u ( t ), t ∈ [kh + τ ,( k + 1)h + τ ), τ < h,
sis. Thus we can envision static scheduling network u ( t + ) = − Kx ( t − τ ), t ∈ {kh + τ , k = 0 ,1,2,K}, K > 0.
protocols, such as token ring or token bus, which can pro- (11)
vide constant delay. Even in this simplified setup, the next Defining z ( kh) as in (9)
question is, “How much delay can the system tolerate?”
Another observation is that the sensor-controller delay ~ 1 − hK + τK τ
Φ = .
can be compensated by an estimator if the messages sent out
 −K 0 
by sensors are time stamped (cf. [2]). Traditional one-step
prediction estimation can compensate delays less than one
For this 2 × 2 case, we can use the stability triangle [15] to
sampling period, since the estimate of x ( kh)only depends on
explicitly calculate the relation between τ and h. For a stable
the value of y(( k −1)h). We will revisit this problem in the sec-
NCS, the delay τ must satisfy
tion on compensation for network-induced delay.

1 1  1 
Longer Delays max h − , 0  < τ < min , h
2 K  K  (12)
When the delays can be longer than one sampling period
(say, 0 < τ k < lh, l > 1), one may receive zero, one, or more
than one (up to l) control sample(s) in a single sampling pe- or
riod. In the special case where (l − 1)h < τ k < lh for all k, one
control sample is received every sample period for k > l . In 1 1  τ 1 
max − , 0  < < min , 1.
this case, the analysis follows that in [14], resulting in 2 Kh  h  Kh 

The analytically determined stability region for 0 ≤ τ < h


is shown in Fig. 6. We can see from the stability region that

February 2001 IEEE Control Systems Magazine 89


100%
~  e ah −
Φ =
K
a
(
e a ( h − τ ) −1 ) 1 ah
a
(
e 1 − e − aτ ).
Unstable  −K 0 
80%

The stability region can be determined by simulation. A spe-


1/(hK) cial scalar case with a = 1 and K = 2 is shown in Fig. 7. For this
τ/h

60%
Stable simulation, we considered delays between 0 and 4h. We can
see that when0 ≤ τ < h, the region has a shape similar to the in-
40%
tegrator case. The shape of the stability region is also affected
by the feedback controller (in this case, the scalar feedback
20% gain).
1/2–1/(hK)
0 Analyzing Stability Using a
0 1/K 2/K 3/K 4/K Hybrid Systems Technique
h The stability of an NCS with network-induced delay can also
Figure 6. Stability region of a controlled integrator. be analyzed using a hybrid systems stability analysis tech-
nique. Hybrid systems contain continuous dynamics and
4 discrete events [16]. The NCS model we are studying resem-
bles a class of hybrid systems with fixed instants of impulse
3.5
effect. The stability of such continuous-discrete systems
3 was reviewed and extended in [17], where linearized hybrid
systems of the following form are considered:
2.5
x&( t ) = Ax ( t ) + Bu ( t ) + f ( x ( t ),u ( t ), t ), t ∈ I \ Θ,
τ/h

2
u ( t + ) = Cx ( t ) + Du ( t ) + φ( x ( t ),u ( t ), t ), t ∈ Θ, (13)
1.5
where x ∈ R n , u ∈ R m , and Θ = {t k|t k = kh, h > 0, k = 0 ,1,2,K}.
1 Let z ( t ) = [x T ( t ),u T ( t )]T ; then f ( z , t ):Ω 0 × I → Rn is continu-
ous in z in the neighborhoodΩ 0 ⊂ R n + m for any t in the inter-
0.5
val I ⊂ R + . Furthermore, f (0 , t ) = 0 , t ∈ I , φ(0 , t ) = 0 , t ∈ Θ and
0 for z ′ , z ′′∈ Ω 0 , the conditions
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6
h 1+ α
f ( z ′ , t ) − f ( z ′′, t ) ≤ L1 z ′− z ′′ ; L1 , α > 0 ; t ∈I
Figure 7. Simulation of the stability region of x&( t ) = x ( t ) − Kx ( t − τ )
with K = 2 and 0 < τ < 4h. and

when the sampling period h is small, the system can toler- 1+ α


φ( z ′ , t ) − φ( z ′′, t ) ≤ L2 z ′− z ′′ ; L2 , α > 0 ; t ∈Θ
ate a delay up to one full sampling period. As h becomes
larger, the upper bound on τ/h becomes smaller. Note that hold. The stability of this type of system reduces to evaluat-
forK > 2 h, even the system with no delay is unstable. ing the Schur-ness (i.e., whether all the eigenvalues of a ma-
trix have magnitude less than one) of
General Scalar System
~
It may be analytically infeasible to derive the exact stability  e Ah B 
H =  Ah ~ ,
region for general systems; however, stability regions for CB + D 
Ce
such systems can still be determined by simulation. The sta-
bility region is plotted by incrementally increasing the delay, ~ h
τ, and testing the closed-loop system matrix, as formulated in where B = ∫ e A ( h − s ) B ds ≡ E ( h)B.
0
(9) and (10). If the closed-loop system matrix is stable, a point
is marked in that location of the stability region. Theorem 3 [17, Corollary 14]: If H is Schur, then the
zeroth solution of (13) is asymptotically stable.
Example 3: For a general scalar system
We now apply this to an NCS. Using the NCS model in (8)
and referring to the timing of the signals shown in Fig. 5, the
x&( t ) = ax ( t ) + u ( t ), t ∈ [kh + τ ,( k + 1)h + τ ),
following is suitable for our analysis:
u ( t + ) = − Kx ( t − τ ), t ∈ {kh + τ , k = 0 ,1,2,K}.
x&( t ) = Ax ( t ) − BKx$ ( t ), t ∈ [kh + τ ,( k + 1)h + τ ),
Defining z ( kh) as in (9) x$ ( t + ) = x ( t − τ ), t ∈ {kh + τ , k = 0 ,1,2,K}. (14)

90 IEEE Control Systems Magazine February 2001


Writing x ( t − τ ) in terms of x ( t ) and x$ ( t ), we obtain With full-state feedback, the only task of the estimator is to
compensate for the delay, τ sc , to achieve a more accurate
x ( t − τ ) = e − Aτ x ( t ) + e − Aτ E ( τ )BKx$ ( t ) plant state at the time the control signal is calculated. As-
suming the plant and controller models are given by (6) and
and (7), this can be done using

x ( t ) = e At x (0 ) + ∫ e A ( t − s ) Bu ( s )ds.
t
C = e − Aτ ,
0 (15)
D = e − Aτ E ( τ )BK .
The estimation scheme is illustrated in Fig. 8. There, τ sc, k de-
Comparing this to (13), we obtain the following corollary. notes the sensor-to-controller delay for plant state x ( kh),
Corollary 4: The stability of an NCS with constant delay and x ( kh + τ sc, k ) denotes the plant state estimate at the time
reduces to examining the Schur-ness of x ( kh) is received. Assuming there is no measurement noise,
x ( kh + τ sc, k ) can be calculated by
 e Ah − E ( h)BK 
H =  A( h − τ ) − Aτ . x ( kh + τ sc, k ) = x ( kh + τ sc, k )
e −e ( E ( h) − E ( τ ))BK 
x ( kh) + ∫
Aτ sc kh + τ sc A ( kh + τ sc −s)
=e
,k
,k
e ,k
Bu ( s )ds
kh
We can use this to recalculate the integrator example of (16)
(11). By setting A = 0 and B = 1 in (14), we find and the control law is computed by

1 − hK  u ( kh + τ sc, k ) = − K x ( kh + τ sc, k ).
H = .
(17)
1 −( h − τ )K 
Using this control law, the closed-loop system becomes
For H to be Schur, τ must satisfy (12), which verifies Ex-
~
ample 2. x (( k + 1)h + τ k + 1) = Φ ( δk )x ( kh + τ k ) (18)

Compensation for where


Network-Induced Delay
δk = h + τ sc, k + 1 − τ sc, k ,
Sensor-to-controller delay, τ sc , and controller-to-actuator ~
Φ ( δk ) = Φ ( δk ) − Γ( δk )K ,
delay, τ ca , have different natures. Sensor-to-controller delay
can be known when the controller uses the sensor’s data to Φ ( δk ) = e Aδ k ,
Γ( δk ) = ∫
δk
generate the control signal, provided the sensor and con- e As B ds.
0
troller clocks are synchronized and the message is time
stamped. Thus an estimator can be used to reconstruct an
Output Feedback
approximation to the undelayed plant state and make it
When full-state information is not available for calculation
available for the control calculation. Controller-to-actuator
of the control signal, a state estimator is built to estimate the
delay is different, however, in that the controller does not
plant state. A conventional current-state estimator esti-
know how long it will take the control signal to reach the ac-
tuator; therefore, no exact correction can be made at the
time of control calculation.
x(kh) x((k+1)h) x((k+2)h)
We present a method of estimating the undelayed plant
state using time domain solutions of the plant state equations. Plant
An NCS estimator should have two primary functions.
One is to work as a conventional state estimator to estimate
the full state of the plant using partial state measurements kh (k+1)h (k+2)h
(i.e., the plant outputs); the other is to compensate for the
sensor delay to make a more accurate estimate. Thus, two x(kh+τsc,k )
situations should be analyzed: systems with full-state feed- Estimator
Controller
back and those with partial-state feedback. The estimation
of the plant state x ( kh + τ sc, k ) is based on the sensor mea-
kh (k+1)h (k+2)h
surement at time kh and the sensor-to-controller delay τ sc, k .
τsc,k
Here we assume single-packet transmission and delay less
than one sampling period (i.e., τ sc < h).
Figure 8. Plant and estimator timing diagram with full-state
Full-State Feedback feedback.

February 2001 IEEE Control Systems Magazine 91


y(kh) y((k+1)h) y((k+2)h) Remark 5: The separation principle holds for the estima-
tion scheme described by (21)-(24). Let
z ( kh + τ k ) = [x T ( kh + τ k ), x~T ( kh + τ k )]T , where x~( kh + τ k ) is
Plant the estimation error and is defined as

kh (k+1)h (k+2)h x~( kh + τ k ) = x ( kh + τ k ) − x ( kh + τ k ). (25)

x (kh+ τ sc,k ) Using the notation defined in (18), the closed-loop system
Estimator with the estimator is
Controller
x (kh) x((k+1)h)
~
z (( k + 1)h + τ k + 1) = Φ ( δk )z ( kh + τ k ) (26)
kh (k+1)h (k+2)h
τ sc,k where

Figure 9. Plant and estimator timing diagram with output feedback. ~ Φ ( δk ) − Γ( δk )K − Γ( δk )K 


Φ ( δk ) =  .
 0 Φ ( δk ) − Lc HΦ ( δk )

mates the plant state x ( kh) using the plant output


Proof: See the Appendix.
y( kh) = Cx ( kh), as described in [15]:
We can see that the separation principle holds for the esti-
mation scheme. Thus the plant and the estimator can be de-
x$ (( k + 1)h) = Φx ( kh) + Γu ( kh) (19)
signed separately, and we can guarantee the stability of both.

Control Experiments
x (( k + 1)h) = x$ (( k + 1)h) + Lc ( y(( k + 1)h) − Cx$ (( k + 1)h))
over a Physical Network
(20)
Setup
where Lc denotes the current estimator gain. The calcula-
tion is done in two steps; first, the estimator state x ( kh) is
projected forward by one sampling period to obtain
x$ (( k + 1)h), and then x$ (( k + 1)h) is corrected based on the
plant output received. Plant Computer
The estimator with sensor measurement delay is based Plant Computation
on the current-state estimator. Fig. 9 shows how the estima- (MATLAB)
tion is carried out. The estimation scheme at time kh is as
follows: ActiveX
1) Correction based on y( kh): Automation
Actuator Sensor
x ( kh) = x$ ( kh) + Lc (y( kh) − Cx$ ( kh))
Data Plant Data
(21) (C++ Program)

2) Forward to kh + τ sc, k :

x ( kh) + ∫
Aτ sc kh + τ sc A ( kh + τ sc −s)
x ( kh + τ sc, k ) = e
,k
,k
e ,k
Bu ( s )ds
kh

(22) Controller
(C++ Program)
3) Calculate control law:

ActiveX
u ( kh + τ sc, k ) = − K x ( kh + τ sc, k ) (23) Automation

4) Forward to ( k + 1)h:
Controller Computation
A ( h − τ sc
(MATLAB)
x$ (( k + 1)h) = e x ( kh + τ sc, k )
,k )

Controller Computer
+∫
( k + 1) h
e A (( k + 1) h − s ) Bu ( s )ds.
kh + τ sc ,k (24)

Figure 10. Experimental setup.

92 IEEE Control Systems Magazine February 2001


To show the influence of networks on control system perfor- Example 4: Consider the state-space plant model
mance and to test the compensation and control strategies,
control experiments over a physical network were per-  x& 1  0 5   x 1  0 
 x&  = 0 0   x  + 1  u
formed. This experiment allows real network traffic to be in-  2    2  
volved in the feedback control of the plant. The x 
experimental setup is shown in Fig. 10. y = [1 0] 1  .
x2
For our experiments, we use the Case Western Reserve
University campus-wide network (CWRUnet), which is a
A state feedback controller is u = − Kx , where K = [25 , 10]
wide-area network containing both Ethernet and ATM at the
(closed-loop poles at −5 ± 10 j).
physical layer. Communication between nodes is done us-
The plant and controller are implemented in two
ing TCP/IP sockets (at the transport and network layer, re-
MATLAB M-files that run on two computers, as described
spectively). TCP/IP sockets provide reliable transmission of
above. The plant state x ( t ) and the control signal u ( t ) are
data packets, regardless of possible collisions that might
sent using TCP/IP sockets. A scaled step response using
happen on the physical transmission medium. Therefore,
full-state feedback is shown in Fig. 11, with comparison to
TCP/IP will result in packet delay but not packet loss.
the nonnetworked sampled data system. Network-induced
In our control setup, two computers, working as plant and
delay causes the closed-loop plant to be underdamped, re-
controller, respectively, are connected over CWRUnet. Each
sulting in larger overshoot in the step response. After using
computer runs a Visual C++ program as the user interface for
setting up the sockets between them and accepting various
1.6
configuration parameters, such as sampling period, control w/o Delay
with estimation, and clock synchronization. The computa- w/ Network
1.4 w/ Estimation
tion for simulating the plant and controller is carried out us-
ing MATLAB; that is, MATLAB works as a computation engine 1.2
for each program on its own computer. MATLAB is invoked as
1
an ActiveX automation server. On the plant computer, the
Output

C++ program obtains the control signal from the network, 0.8
passes it to MATLAB for plant state and output calculation,
and then sends the plant output to the controller computer. 0.6

On the controller computer, the C++ program obtains the 0.4


plant output from the network, uses MATLAB to calculate the
control signal, and sends the signal to the plant computer. In 0.2
this way, sensor data and control data are passed on the net-
0
work, along with other campus network traffic, and may ex- 0 0.5 1 1.5 2
perience collision or delay. Time (s)
For a detailed description of an alternate experimental
Figure 11. Comparison of scaled step responses with full-state
testbed for controlling systems over the Internet, see [18].
feedback.

Clock Synchronization
In the experiment, every message sent out by the plant and 1.6
w/o Delay
controller is time stamped. To calculate the delay accu- w/ Network
1.4 w/ Estimation
rately, plant and controller clocks must be synchronized.
Clock synchronization can be achieved in several ways, 1.2
such as software synchronization, hardware synchroniza-
1
tion, or a combination of the two. Clock synchronization in
Output

our experiment has been done as in [19]. Suppose the con- 0.8
troller wants to synchronize its clock with the plant. It sends
0.6
a message to the plant, and the plant will send its clock read-
ing back to the controller. The controller records the clock 0.4
offset and the round-trip time. The measurement is carried
out many times, and the controller uses the clock offset with 0.2

the minimum round-trip time. 0


0 0.5 1 1.5 2
Time (s)
An Example
The following example illustrates the effectiveness of the Figure 12. Comparison of scaled step responses with unmodeled
compensation scheme described above. nonlinearity.

February 2001 IEEE Control Systems Magazine 93


delay compensation, the response is very similar to the with continuous-valued state x ( k ) ∈ R n . Here, 1,2,K , N rep-
nonnetworked system. Indeed, the difference is caused by resents the set of discrete states, which has a correspond-
the controller-to-actuator delay, which is not compensated ing set of rates r1 , r2 ,K , rN . These rates represent the fraction
by this scheme. of time that each discrete state occurs; thus Σ Ni = 1 ri = 1.
This linear estimator also works well when there is an The stability of such an ADS is given by the following the-
unmodeled nonlinearity in the plant model. For example, orem.
consider the plant Theorem 6 [11]: Given an ADS as defined above. If there
exist a Lyapunov function V ( x ( k )):R n → R + and scalars
x& 1 = 5sin( x 2 ), α 1 , α 2 ,K , α N corresponding to each rate such that
x& 2 = u .
α r11 α r22 ⋅⋅⋅ α rNN > α > 1 (27)
The experimental result, shown in Fig. 12, illustrates that the
compensation scheme still works well. and

Stability of NCS ( )
V ( x ( k + 1)) − V ( x ( k )) ≤ α −s 2 − 1 V ( x ( k )), s = 1,2,K , N ,
with Data Packet Dropout (28)
When using an NCS, one must consider not only net- then the ADS remains exponentially stable, with decay rate
work-induced delay, but also data packet dropout. Net- greater than α.
works can be viewed as unreliable data transmission paths, Theorem 6 requires the ADS to be stable on the average.
where packet collision and network node failure occasion- It does not require every difference equation of the ADS to
ally occur. When there is a packet collision, instead of re- be stable, but rather it guarantees the ADS to be stable on
peated retransmission attempts, it might be advantageous the whole. If the discrete state dynamics is given by
to drop the old packet and transmit a new one. Thus it is x (( k + 1)h) = Φ s x ( kh) for s = 1,2,K , N , the search for the
valuable to analyze the rate (percentage successful) at Lyapunov function of type V ( x ( kh)) = x T ( kh)Px ( kh) and
which the data should be transmitted to achieve the desired the scalars α 1 , α 2 ,K , α N can be cast into a bilinear matrix in-
performance (stability). equality (BMI) problem [11]. Equations (27) and (28) can be
An NCS with data packet dropout can be modeled as an rewritten as
asynchronous dynamical system (ADS) with rate con-
straints on events. The stability of this type of system is r1 log α 1 + r2 log α 2 + ⋅⋅⋅ + rN log α N > 0
studied in [11]. We will extend a result therein to NCSs.
and
ADSs with Rate Constraints
ADSs, like hybrid systems, are systems that incorporate Φ Ts P Φ s ≤ α −s 2 P , s = 1,2,K , N .
continuous and discrete dynamics. The continuous dynam-
ics are governed by differential or difference equations, This is a BMI problem in P and the log α i s.
whereas the discrete dynamics are governed by finite au-
tomata that are driven asynchronously by external discrete Modeling an NCS
events with fixed rates [11]. with Data Packet Dropout
We consider a simplified ADS with rate constraints that Fig. 13 illustrates an NCS setup with the possibility of drop-
can be described by a set of difference equations ping data packets. Here we assume that the nonnetworked
system is stable and the network is only inserted from the
x ( k + 1) = fs ( x ( k )), s = 1,2,K , N , plant to the controller. The network can be modeled as a
switch that closes at a certain rate r. When the switch is
x(kh) closed (position S 1 ), the network packet containing x ( kh) is
Plant
x ((k+1) h) = Φ x (kh) + Γ u(kh) transmitted, whereas when it is open (position S 2 ), the out-
put of the switch is held at the previous value and the packet
is lost. Thus the dynamics of the switch (state x) can be
modeled as
S1 S2
S 1: x ( kh) = x ( kh),
S 2: x ( kh) = x (( k − 1)h).
Controller x(kh)
K x (kh) Let z ( kh) = [x T ( kh), x T ( kh)]T be the augmented state vec-
tor; the closed-loop system with the network packet drop-
Figure 13. NCS with data packet dropout. out effect is represented by

94 IEEE Control Systems Magazine February 2001


~
z (( k + 1)h) = Φ s z ( kh) which proves the stability of the system. This means that
when the plant state is sampled every 0.3 s, if 70% of the pack-
for s = 1,2. When the switch is in position S 1 , ets are delivered to the controller, we can still guarantee the
stability of the feedback control system. The result shows an
~ Φ − ΓK  effective sampling period of heff = h / r = 0.43 s; in fact, the max-
Φ1 =  ;
Φ − ΓK  imum stable constant sampling period for this system is 1.7 s.
The comparison of step responses with packet dropouts is
shown is Fig. 14. We can see that the step response with 70%
when the switch is position S 2 ,
packets transmitted is similar to the original system. A large
difference can be seen when only 20% of packets are transmit-
~ Φ − ΓK 
Φ2 =  . ted (but the system is still stable, as we prove below).
0 I  The setup in Fig. 13 has also been considered by Walsh et
al. [3], who used a different approach to determine the MATI
Normally, a feedback control system can tolerate a certain τ when the feedback loop is closed over the network. Using
amount of feedback data loss. The following corollary can be this conservative approach, the MATI τ of this example is
used to test the system stability for a certain rate of data loss. 4.5 ×10 −4 s, which will consume a lot of network bandwidth if
Corollary 7: For the above system setup, assume the it is implemented in a real application. The method pre-
plant state x ( kh)is transmitted at the rate of r. If there exist a sented here takes a probabilistic approach while guarantee-
Lyapunov functionV ( x ( kh)) = x T ( kh)Px ( kh) and scalars α 1 ing the exponential stability of the NCS, and it only requires
and α 2 such that plant state to be transmitted at a certain rate. This reduces
network traffic without sacrificing stability.
α r1 α 12 − r > 1, The lower the transmission rate, the less network band-
~T ~ width used. The next question would be, “What is the lower
Φ 1 P Φ 1 ≤ α 1−2 P ,
~ ~ bound on transmission rate r that still guarantees the stabil-
Φ T2 P Φ 2 ≤ α 2−2 P
ity of the system?” Theorem 8 involves the bound on the
transmission rate r for a stable NCS.
the system is still exponentially stable. Theorem 8: Consider the setup of Fig. 13, assuming that
With the plant state being transmitted at rate r, the effec- the closed-loop system with no dropout is stable (i.e.,Φ − ΓK
tive sampling period becomes heff = h / r . This suggests that is Schur).
the plant can be stabilized by a slower sampling rate. In • If the open-loop system (Φ) is marginally stable, then
other words, the result shows that when we have fast sam- the system is exponentially stable for all 0 < r ≤ 1.
pling, we can drop the samples at a certain rate to save net- • If the open-loop system is unstable, then the system is
work bandwidth and still provide a stable feedback control exponentially stable for all
system. 1
< r ≤1
Example 5: Consider the state-space plant model in Ex- 1 − γ1 / γ2
ample 1. When the plant is sampled with a sampling period
h = 0.3 s, we obtain where

1.4
10
. 0.2955  0.0167 0.0512 w/o Packet Dropout
Φ =  , ΓK =  , w/ 70% Packets Transmitted
 0 0.9704  01108
. 0.3399  1.2 w/ 20% Packets Transmitted

and the closed-loop system (Φ − ΓK ) is still stable with the 1


continuous controller. With the setup shown in Fig. 13, and
0.8
assuming the transmission rate r = 0.7, we solve the LMI
Output

problem [20], [21] in Corollary 7 to find 0.6

α 1 = 11288
. , α 2 = 0.7552 0.4

and 0.2

0
 0.9210 0.9196 −0.6578 −0.5144  0 5 10 15 20 25 30
 
0.9196 24788
. −0.5232 −1.6644  Time (s)
P= ,
 −0.6578 −0.5232 0.7003 0.6461 
  Figure 14. Comparison of scaled step responses with packet
 −0.5144 −16644
. 0.6461 20562
.  dropouts.

February 2001 IEEE Control Systems Magazine 95


x1 (kh) Φ 11 Φ 12 − Γ1 K 1 − Γ1 K 2 
Φ Φ 22 − Γ2 K 1 − Γ2 K 2 
Plant ~
x ((k+1) h) = Φ x (kh) + Γ u(kh) x 2 (kh) Φ 1 =  21 ,
Φ 11 Φ 12 − Γ1 K 1 − Γ1 K 2 
 0 I 
 0 0

S1 S2 whereas when the switch is at S 2 ,

Φ 11 Φ 12 − Γ1 K 1 − Γ1 K 2 
Controller Φ Φ 22 − Γ2 K 1 − Γ2 K 2 
~
–K x (kh) Φ 2 =  21 .
x(kh) = [ x T1(kh), x 2T(kh)] T  0 0 I 0 
Φ Φ − Γ2 K 1 − Γ2 K 2 
Figure 15. NCS with multiple-packet transmission.  21 22

x1 x2 x1 x2 The modeling can be easily extended to systems with


more than two packets.
... Stability in Scheduling Networks
kh (k+1)h (k+2)h (k+3)h We know that in scheduling networks, packets are sent out
sequentially in a predetermined order, as shown in Fig. 16.
Figure 16. Multiple-packet transmission with static scheduling.
The packet sequence received by the controller is
x 1 → x 2 → x 1 → x 2 → ⋅⋅⋅.
~ ~
Remark 9: If Φ 1 ⋅ Φ 2 is Schur, the NCS with static schedul-
[
γ 1 = log λ2max (Φ − ΓK ) , ] [
γ 2 = log λ2max (Φ ) . ] ing of transmitting plant states is exponentially stable.
~
This shows that it is not necessary to ensure that both Φ 1
~ ~ ~
Proof: See the Appendix. and Φ 2 are Schur. The NCS is stable if Φ 1 ⋅ Φ 2 is Schur, as the
Example 6: Example 5 hasΦ marginally stable, so the net- following example illustrates.
worked controller is stable for all r > 0. Example 7: Consider the system in Example 5 with the
plant state x 1 , x 2 transmitted separately in two packets.
Modeling an NCS With h = 0.3 s, we have
with Multiple-Packet Transmission
10
. 0.2995 −0.0167−0.0512
An NCS with multiple-packet transmission can also be mod-  
~ 0 0.9704 −01108
. −0.3399 
eled as an ADS. In multiple-packet transmission mode, plant Φ1 =
state or output are split into separate packets. Fig. 15 illus- 1.0 0.2995 −0.0167−0.0512
 
trates a case where the plant state is transmitted in two 0 0 10. 0 
packets. The dynamics of the network is given by 10
. 0.2995 −0.0167−0.0512
 
~ 0 0.9704 −01108
. −0.3399 
Φ2 = .
S 1: x 1( kh) = x 1( kh), x 2( kh) = x 2(( k − 1)h), 0 0 10. 0 
S 2: x 1( kh) = x 1(( k − 1)h), x 2( kh) = x 2( kh).  
0 0.9704 −01108
. −0.3399 

~ ~ ~ ~
Assume Neither Φ 1 nor Φ 2 is Schur; however, Φ 1 ⋅ Φ 2 is Schur,
which proves the stability of the system if a scheduling net-
Φ 11 Φ 12  work is applied.
x ( kh) = [x T1 ( kh), x T2 ( kh)]T , Φ =  ,
Φ 21 Φ 22  Using static scheduling on this two-packet setup, each
Γ  packet is transmitted 50% of the time; thus the effective
Γ =  1  , K = [K 1 , K 2]. sampling period is heff = h / 0.5 = 0.6 s. The step response of
 Γ2 
this two-packet transmission setup is similar to the origi-
nal system.
Let the augmented state be z ( kh) = x T1 ( kh) , x T2 ( kh) ,[
x T1 ( kh), x T2 ( kh)]T . We can now write the closed-loop system
Conclusions
with two-packet transmission as
This article analyzed several fundamental issues in network
~ control systems. One issue is the network-induced delay
z (( k + 1)h) = Φ s z ( kh) when transmitting sensor data and control data. Depending
on the control network protocol employed, the delay can be
for s = 1,2. When the switch is at S 1 , either constant or time varying. The relationship between

96 IEEE Control Systems Magazine February 2001


the sampling rate h and the network-induced delay τ was [22] G.H. Golub and C.F. Van Loan, Matrix Computations, 3rd ed. Baltimore,
MD: Johns Hopkins Univ. Press, 1996.
captured using a stability region plot. Stability of an NCS was
also characterized using a hybrid systems stability analysis
technique. Methods to compensate network-induced delay Appendix
using the time-domain solution of the plant model were dis- Proof (Corollary 2): Throughout, we use vector and ma-
cussed, and experimental results over a physical network trix norm definitions and inequalities [22].
(CWRUnet) were presented. We then modeled an NCS with The Lyapunov function V ( x ) must satisfy the following
packet dropout and multiple-packet transmission (which inequalities:
may occur due to the limitation of the control network) as
λ1 x ≤ V ( x ) ≤ λ2 x
2 2
an asynchronous dynamical system. We determined
whether the NCS is stable at a certain rate of data loss, and V& ( x ) = − X T QX ≤ − λ
2
min (Q ) x .
we searched for the highest rate of data loss for the NCS to
be stable.
Thus, following the proof of [3, Theorem 2], (8) of [3] should
be rewritten as:
References
( )
[1] Y. Halevi and A. Ray, “Integrated communication and control systems:
Part I—Analysis,” J. Dynamic Syst., Measure. Contr., vol. 110, pp. 367-373, Dec. V& ( x ( t$ )) ≤ x ( t$ ) − λ min (Q ) x ( t$ ) + 2λ 2 A γ 1 z ( t 0 ) .
1988.
[2] J. Nilsson, “Real-time control systems with delays,” Ph.D. dissertation,
Dept. Automatic Control, Lund Institute of Technology, Lund, Sweden, Janu- Because of the choice of τ,
ary 1998.
[3] G.C. Walsh, H. Ye, and L. Bushnell, “Stability analysis of networked control
λ min (Q ) λ (Q )
systems,” in Proc. Amer. Control Conf., San Diego, CA, June 1999, pp. 2876-2880. γ1 < ≤ min .
[4] M.S. Branicky, S.M. Phillips, and W. Zhang, “Stability of networked control 8 λ2 λ2 / λ1 A 8 λ2 A
systems: Explicit analysis of delay,” in Proc. Amer. Control Conf., Chicago, IL,
June 2000, pp. 2352-2357.
[5] W. Lawrenz, CAN System Engineering: From Theory to Practical Applica- The same result as in [3] can then be obtained: for all
tions. New York: Springer-Verlag, 1997. t > t 0 + pτ ,V ( x ( t )) < γ 2||z ( t 0 )||2 . Setting
[6] A.S. Tanenbaum, Computer Networks, 3rd ed. Upper Englewood Cliffs, NJ:
Prentice-Hall, 1996.
1 λ min (Q ) 
[7] D. Anderson, FireWire System Architecture. Reading, MA: Addison-Wesley, γ 1 < min , 
1998. 4 8 λ 2 λ 2 / λ 1 A 
[8] E. Altman, T. Bas,ar, and R. Srikant, “Congestion control as a stochastic con-
trol problem with action delays,” Automatica, vol. 35, pp. 1937-1950, Dec. 1999.
we still have V ( x ( t )) < γ 2 z ( t 0 ) , e( t ) < γ 1 z ( t 0 ) for all
2
[9] S. Mascolo, “Classical control theory for congestion avoidance in
high-speed Internet,” in Proc. IEEE Conf. Decision and Control, Phoenix, Dec. t > t 0 + pτ.
1999, pp. 2709-2714.
[10] L. Dugard and E.I. Verriest, Eds., Stability and Control of Time-Delay Sys-
Viewing the NCS as perturbed by the bounded error sig-
tems (Lecture Notes in Control and Information Sciences), vol. 228. Heidel- nal e( t ), consider the system
berg, Germany: Springer-Verlag, 1997.
[11] A. Hassibi, S.P. Boyd, and J.P. How, “Control of asynchronous dynamical
x& z ( t ) = A11 x z ( t ) + A12 e( t )
systems with rate constraints on events,” in Proc. IEEE Conf. Decision and Con-
trol, Phoenix, AZ, Dec. 1999, pp. 1345-1351.
[12] J.D. Spragins, J.L. Hammond, and K. Pawlikowski, Telecommunications: s t a r t i n g a t t = t 0 + pτ w i t h z e ro i n i t i a l c o n d i t i o n
Protocols and Designs. Reading, MA: Addison-Wesley, 1991. x ( t 0 + pτ ) = 0. We can conclude that for all t > t 0 + pτ,
[13] M. Tangemann and K. Sauer, “Performance analysis of the timed token
protocol of FDDI and FDDI-II,” IEEE J. Select. Areas Commun., vol. 9, pp. 2
4 λ32 A γ 21 z 0 ( t )
2
271-278, Feb. 1991.
[14] K.J. Åström and B. Wittenmark, Computer-Controlled Systems: Theory and Vz ( x z ( t )) <
Design, 3rd ed. Englewood Cliffs, NJ: Prentice-Hall, 1997.
λ2min (Q )
[15] G.F. Franklin, J.D. Powell, and M. Workman, Digital Control of Dynamic Sys- 2λ 2 λ 2 / λ 1 A γ 1 z ( t 0 )
tems, 3rd ed. Reading, MA: Addison Wesley Longman, 1997. xz(t ) <
[16] M.S. Branicky, “Hybrid systems: Modeling, analysis, and control,” Sc.D.
λ min (Q )
dissertation, Dept. Electrical Engineering and Computer Science, Massachu-
setts Institute of Technol., Cambridge, MA, June 1995.
and, by the choice of γ 1 above, x z ( t ) < (1/4 ) z ( t 0 ) . The rest
[17] M.S. Branicky, “Stability of hybrid systems: State of the art,” in Proc. IEEE
Conf. Decision and Control, San Diego, CA, Dec. 1997, pp. 120-125. of the proof for this part continues as in [3].
[18] J.W. Overstreet and A. Tzes, “An Internet-based real-time control engi - We now proceed to prove that the third bound is always
neering laboratory,” IEEE Contr. Syst. Mag., vol. 19, pp. 19-34, Oct. 1999. the smallest among the three terms above. We first prove
[19] D. Mills, “Internet time synchronization: The network time protocol,”
IEEE Trans. Commun., vol. 39, pp. 1482-1493, Oct. 1991.
1 ln(2)
[20] S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequal- < .
8 A ( λ 2 / λ 1 + 1)∑ i = 1 i
p
ities in System and Control Theory. Philadelphia, PA: SIAM, 1994. pA
[21] P. Gahinet, A. Nemirovshi, A. Laub, and M. Chilali, MATLAB LMI Control
Toolbox. Natick, MA: MathWorks, May 1995
We know that λ 2 / λ 1 ≥ 1, ∑ i = 1 i = p( p + 1) / 2 and p ≥ 1, hence
p

February 2001 IEEE Control Systems Magazine 97


A ( h − τ sc
x (( k + 1)h) = e x ( kh + τ sc, k )
)
1 1 1 ,k
≤ < .
8 A ( λ 2 / λ 1 + 1)∑ i = 1 i 8 A p( p + 1) 8 p A
p

+∫
h − τ sc
e As B ds u ( kh + τ sc, k )
,k

Since ln(2) is greater than 0.125, + Lc He


A ( h − τ sc ,k )
( x ( kh + τ sc, k ) − x ( kh + τ sc, k ))

ln(2) 1 and from (22) we have


>
pA 8p A
x (( k + 1)h + τ sc, k + 1 ) = Φ ( δk )x ( kh + τ sc, k )
and the result follows. We then can prove + Γ( δk )u ( kh + τ sc, k )

λ min (Q ) + Lc HΦ( δk )( x ( kh + τ sc, k )

16 λ 2 λ 2 / λ 1 A ( λ 2 / λ 1 + 1)∑ i = 1 i − x ( kh + τ sc, k )).


2 p

1
≤ .
8 A ( λ 2 / λ 1 + 1)∑ i = 1 i
p
The estimation error is defined in (25), and the error equa-
tion is

x~(( k + 1)h + τ sc, k + 1 ) = (Φ ( δk ) − Lc HΦ ( δk )) x~( kh + τ sc, k ).


Canceling common terms, we must show

λ min (Q ) (29)
≤ 1. Now apply the control law to form the closed-loop sys-
2λ 2 λ 2 / λ 1 A
tem

Since λ 2 / λ 1 ≥ 1 by definition, it is enough to show


u ( kh + τ sc, k ) = − Kx ( kh + τ sc, k ).
λ min (Q )
≤ 1. The closed-loop system is
2λ 2 A

x (( k + 1)h + τ sc, k + 1 ) = Φ ( δk )x ( kh + τ sc, k )


Taking norms on both sides of (3), we obtain
− Γ( δk )Kx ( kh + τ sc, k )
−Q = A P + PA11
T
11
= (Φ ( δk ) − Γ( δk )K ) x ( kh + τ sc, k )
≤ AT11 P + P A11 − Γ( δk )Kx~( kh + τ sc, k ).
(30)
= 2 P A11
Combining (29) and (30), we have (26).
where the inequality follows from the triangle inequality Q.E.D.
plus the submultiplicative property of the matrix 2-norm.
Proof (Theorem 8): Consider the setup of Corollary 7,
N o w, s i n c e P i s p o s i t i v e -d e f i n i t e s y m m e t r i c ,
and define β i = α −2
i for i = 1,2. Substituting and taking logs, if
P = λ max ( P ) = λ 2 . Also, A ≥ A11 follows easily from the def-
the transmission rate r satisfies
inition of the induced norm, since the latter is a submatrix of
the former (cf. (2)). Therefore, log β 2
< r ≤1
log β 2 − log β 1 (31)
λ min (Q ) ≤ −Q ≤ 2λ 2 A

where β 1 < 1 andβ 2 > β 1 are positive constants and P is a pos-


and
itive-definite symmetric matrix such that
λ min (Q )
≤ 1. ~ ~
Φ T1 PΦ 1 ≤ β 1 P ,
2λ 2 A
~ ~
Φ T2 PΦ 2 ≤ β 2 P
Q.E.D.
Proof (Corollary 5): The plant model is given by the system is exponentially stable.
Transmission rate r depends on β 1 and β 2 , and the choice
x (( k + 1)h + τ sc, k + 1 ) = Φ ( δk )x ( kh + τ sc, k ) + Γ( δk )u ( kh + τ sc, k ),
~ ~
of β 1 , β 2 must satisfy β 1 ≥ λ2max (Φ 1 ) and β 2 ≥ λ2max (Φ 2 ).
Looking at (31), it makes sense to minimize both logβ 2
where δk , Φ( δk ), and Γ( δk ) are given (18). and logβ 1 < 0 to obtain the weakest lower bound on r
The estimation scheme is given by (21)-(24); from (21) possible from that equation.
and (24) we have Now note that

98 IEEE Control Systems Magazine February 2001


( )
~
λ2max Φ 1 = λ2max (Φ − ΓK ), from Case Western Reserve University (CWRU). In 1995, he
received his Sc.D. in electrical engineering and computer
science from the Massachusetts Institute of Technology. In
since the two matrices share the same spectrum (although
1997, he rejoined CWRU as an Assistant Professor of Electri-
each eigenvalue of the former has twice the multiplicity of
~ cal Engineering and Computer Science. He has held re-
the latter). Also note that the block-diagonal structure of Φ 2
search positions at MIT’s AI Lab, Wright-Patterson AFB,
implies
NASA Ames, Siemens Corporate Research (Munich), and

( )
~
{ }
λ2max Φ 2 = max 1, λ2max (Φ ) ,
Lund Institute of Technology’s Dept. of Automatic Control.
His research interests include hybrid systems, intelligent
control, and learning, with applications to robotics, flexible
with one achieving the maximum if and only if Φ is stable. manufacturing, and control over networks.
The theorem is now seen to easily follow.
Q.E.D. Stephen M. Phillips received the B.S. degree with distinction
in electrical engineering from Cornell University in 1984 and
Wei Zhang received his B.S. and M.S. degrees in electrical the M.S. and Ph.D. degrees in electrical engineering from
engineering from Tianjin University, Tianjin, China, in 1993 Stanford University in 1985 and 1988, respectively. He joined
and 1996, respectively. He then worked for the Industrial Au- the faculty of Case Western Reserve University in 1988, where
tomation and Control Division of Honeywell (Tianjin) Ltd. as he is currently Associate Professor in the Department of Elec-
a Systems Engineer from 1996 to 1997. He is now pursuing trical Engineering and Computer Science. He serves as Direc-
his Ph.D. degree in electrical engineering and computer sci- tor of the Center for Automation and Intelligent Systems and
ence at Case Western Reserve University. His research inter- is a registered professional engineer. His research interests
ests include the modeling, analysis, and design of include sampled-data control, system identification, and
networked control systems. adaptive control, with applications to manufacturing, aero-
space, and microelectromechanical systems.
Michael S. Branicky received the B.S. (1987) and M.S.
(1990) degrees in electrical engineering and applied physics

February 2001 IEEE Control Systems Magazine 99

Вам также может понравиться