Articulo A Brief Introduction To The Analysis and Design of Networked Control Systems
Articulo A Brief Introduction To The Analysis and Design of Networked Control Systems
Systems
Graham C. Goodwin, Eduardo I. Silva, Daniel E. Quevedo
School of Electrical Engineering and Computer Science, The University of Newcastle, NSW 2308, Australia
E-mail: [email protected]
Abstract: Networked Control has emerged in recent years as a new and exciting area in systems science. The topic has
many potential applications in diverse areas ranging from control of microrobots to biological and economic systems. The
supporting theory is very rich and combines aspects of control, signal processing, telecommunications and information
theory. In this paper, we will give a brief overview of recent developments in Networked Control with an emphasis on
our contributions. We also point to several open problems in this emerging area.
Key Words: Networked Control, Performance, Data-Rate Constraints, Delays, Data Dropouts
Introduction
1
c 2008 IEEE
978-1-4244-1734-6/08/$25.00
d
r
C(z)
G(z)
D
decoder
channel
encoder
An overarching issue in any closed loop system is the potential for instability. For this reason, obtaining necessary
and sufficient conditions which guarantee closed loop stability has become a central issue in control theory. NCSs
give rise to new challenges with respect to stability. This
section will give some insights into the stability question.
Consider the networked control situation shown in Figure 1. In that figure, G(z) is a SISO LTI plant, C(z) is
a LTI controller, r is a reference signal1 and d is a disturbance. Unlike standard non-networked control systems
(see, e.g., [13]) the feedback path in the control system in
Figure 1 comprises a non-transparent channel and a coding
scheme. The coding scheme is a novel aspect of networked
control that has no equivalent in traditional control theory.
The coding scheme has two parts: the encoder and the decoder. The encoder is in charge of appropriately processing the signal to be sent over the channel so as to compensate, if possible, channel characteristics and/or to translate
the measurements into symbols that the channel can understand. (This is the case of, e.g., digital channels where the
symbols are binary words.) On the other hand, the decoder
is in charge of translating back the channel symbols into
the standard signal domain.
There exist many channel models (see, e.g., [41, 42]). To
highlight the ideas, in the present section we will consider
error- and delay-free digital channels, i.e., channels that can
transmit a countable set of symbols (countable alphabet)
without errors or delays. Of course, in practice, channels
always have restricted bandwidth and the channel alphabet
is, thus, finite (not just countable; see also [7, 43, 44]).
1 All
signals in this paper are assumed wise sense stationary (wss) stationary processes.
F (z)
2.1
Stability
channel
signed for non-networked control systems can be embellished so as to achieve good performance when used in
an NCS that employs unreliable communication channels
(see [34] and related work [3540]).
The remainder of this paper is organized as follows: Section 2 discusses the problem of stabilization of NCSs subject to data rate constraints. Section 3 discusses the design
of coding systems that optimize NCS performance. Section 4 studies some aspects in MIMO networked control.
Section 5 studies control over unreliable networks. Section
6 draws conclusions.
Key results
np
log2 |pi | ,
(1)
i=1
where {pi }i=1, ,np denotes the set of unstable plant poles.
The above result is valid for every coder, decoder and controller in the class of (time varying and non-linear) causal
systems. Therefore, (1) establishes a fundamental separation between what is achievable in NCSs over digital channels and what is not (when the problem of interest is MSS).
We note that bounds similar to (1) arise as solutions to quite
a few different problems (e.g., observability, deterministic
stability, etc.) and under different assumptions on the channels and coding schemes (see, e.g., [6,9,41,4547]). Indeed
the quantity on the right hand side of (1) is a fundamental
measure of the difficulty of manipulating a system, as explored in [8, 48].
Proving that the rate at which a stable control system
is transmitting data must satisfy (1) (i.e., necessity) is
fairly simple and employs standard tools (see also [49
51]), whereas constructing an actual coding scheme that
achieves stability at any rate above the absolute limit (i.e.,
the proof of sufficiency) is much more involved (see [6, 9]).
These observations motivate the remainder of this section.
2.2
(2)
(3)
rthe interval (
2 , 2 ) and independent of the input to the
3
quantizer v. This model is valid only if is small enough,
the quantizer does not overload and v has a smooth probability density function (see, e.g., [57]). These conditions
usually do not hold in the case of quantizers that are embedded in feedback loops, as is the case of NCSs (see,
e.g., [58]). We also note that assuming that q is either independent of v or uncorrelated with v is, certainly, not a
valid assumption in networked situations. In these cases,
it makes more sense to assume that q is independent of (or
uncorrelated with) the external signals r and d.
In order to avoid quantizer overload, it is usual in practice
to choose a quantizer dynamic range such that the probability of overload is negligible (see, e.g, [52]). Indeed, if v
is wss and is any positive real value, then one can always
find a finite such that4 V = v guarantees that the probability of overload is less than ; is called the quantizer
loading factor.5 With such a choice for the loading factor,
it is immediate to see that, provided q is as in the classical
additive model described above,
3
v2
= 2 (L 1)2 ,
q2
(4)
where is the quantizer signal-to-noise ratio. Thus, bitrate limits translate into signal-to-noise ratio constraints.
It is important to note that the previous model for quantization can actually be rendered exact by a simple randomization procedure. Indeed, it suffices to consider a dithered
uniform quantizer. In this case
v(k) + dh (k)
,
s(k) = satV
on (
2 , 2 ) and such that dh (k) is independent of v(k).
In this situation, and provided no overload occurs, q in (3)
becomes distributed as dh (see, e.g., [53,59,60]). In other
words, q becomes just as in the simplified model described
above. Again, in order to avoid quantizer overload, one
needs to consider an appropriate quantizer loading factor
and a signal-to-noise ratio constraint arises.
In practice, implementation of dithered quantizers is not
trivial since it requires the availability of the dither signal dh at both the sending and receiving ends. Usually
the dither is generated using pseudo-random number generators that are initialized with the same seeds. Nevertheless, even if one employs a non-dithered uniform quantizer with as small as 4 levels, it turns out that the predictions made using the simple additive quantization model
described above are surprisingly accurate (see simulation
studies in [16, 17, 55, 61]).
2.2.2
np
|pi |
1,
(5)
i=1
np
2
2
|pi | 1 , (6)
b > binf log2 1 +
3
i=1
where b log2 L is the number of bits in the quantizer.
In other words, provided no overload occurs and the noise
model for quantization holds, (6) gives a bound on the
instantaneous data-rate over the channel that guarantees
6 For
2
.
12
dh
s+
EC
ED
channel
unif. quantizer
Average data-rates
In the previous section we dealt with instantaneous datarates. There are at least two reasons that can be advanced
for abandoning that setting. First, if the external signals
have unbounded support, then it is impossible to give any
guarantee using the above reasoning, unless one employs
quantizers with infinitely many levels so as to avoid overload (thus incurring infinite instantaneous data-rates). Second, if the external signals are bounded, then the quantizer
loading factor may need to be quite large in order to accommodate v without overload. This implies that, even
in those cases, one needs to use a quantizer with either
a large number of bits (which increases the instantaneous
rate), or a large quantization step (which implies poor performance). We thus conclude that, at least from a theoretical point of view, it is interesting to study average datarates.8 (Of course, guaranteeing that average data-rates are
bounded does not ensure that instantaneous rates will be
bounded.)
A popular way to deal with average data rate constraints
is to use an entropy coded dithered quantizer (ECDQ; see,
e.g., [59]). Figure 3 shows the architecture of an ECDQ
and its relationship to E and D in Figure 2. An ECDQ uses
a dithered infinite uniform quantizer, as described earlier,
but instead of sending the quantizer output directly over
the channel, it entropy-codes it prior to transmission. The
basic idea behind the entropy-coder EC in Figure 3 is to
exploit the fact that some of the quantizer output values are
more likely than others. Thus, one can assign short channel symbols (i.e., few bits) to very frequent quantizer output values and long symbols (i.e., many bits) to infrequent
ones (see [42]). Correspondingly, the task of the entropydecoder ED is to convert the channel symbols back into the
exact quantizer output at the receiving end (see [42]).
A key property of ECDQs is that the average data-rate at
which data is transmitted can be related to the quantizer
signal-to-noise ratio . Indeed, it is possible to show that,
if the dither is as in Section 2.2 and is also independent of
r, d and the filters initial states, then the coding scheme
proposed in Figure 2, when E and D form an ECDQ, is
7 Clearly,
quantizers that are scaled on-line according to the statistics of the input
signals. This topic is interesting, but is beyond the scope of this paper
(see references in [7]).
dh
np
log2 |pi | +
i=1
1
log2
2
2e
12
+ 1 + F (),
Performance
d
r
C(z)
G(z)
F (z)
A(z)1
A(z)
v
q
(8)
is given by
2
(9)
where
J(A(z), F (z))
2
2
||A(z)Tdry (z)dr (z)||2 T (z)A(z)1 (1 F (z))2
2
and where Tdre (z) and Tdry denote the transfer functions
from [d r]T to e and y, respectively, dr (z) denotes a spectral factor of [d r]T , is the channel signal-to-noise ratio
and
S(z) =
1
,
1 + G(z)C(z)
3.2
an internally stabilizing controller that defines a well possed control loop (see,e.g., [3]).
inf
A(z)U
F (z)RH2
||T (z)+S(z)F (z)||22 <
J(A(z), F (z))
and filters A(z) and F (z) that achieve Jopt (or approximate
Jopt arbitrarily well). The exact solution of this problem is
not straightforward, so we describe a simple iterative solution.
If F (z) is a given strictly proper and stable filter (as required for MSS), then the Cauchy-Schwarz inequality imF (z)
plies that the optimal filter A(z), say Aopt (z), satisfies
(see [16], [18])
F (z) j 4
Aopt (e ) =
T (ej )(1 F (ej ))2
,
Tdry (ej )d r(ej )d r(ej )H Tdry (ej )H
(11)
T (z) 1 S(z).
(10)
A(z)
(12)
inf
F (z)RH2
10 RH denotes the set of all stable and strictly proper real rational
2
transfer functions, and U denotes the set of all stable, MP and biproper
transfer functions.
2
J1 (F (z)) T (z)A(z)1 (1 F (z))2 ,
(0,
)
J1 (F (z))
.
J2 (F (z))
3.3 Example
Consider a nominal loop with plant and controller given by
1
,
z 0.8
C(z) =
z 0.8
.
z1
0.02z
.
z 0.9
x 10
(1)
Case 1
Case 2
Case 3
(13)
G(z) =
and
arg min
= 9.1875 ( 3 [bit] )
7
6.5
6
5.5
5
(3)
4.5
(2)
4
6
8
Number of iterations
10
Figure 5: Tracking error as function of the number of iterations in proposed design procedure (see Section 3.3 for
details).
1
10
Tracking error variance ( 2e )
2
S(z)F (z)||2
Nominal performance
No coding (empirical)
Opt. coding (empirical)
Opt. coding (analytical)
10
10
3
4
5
6
Bit rate [bit/sample]
qi
mi
v2i
.
i2
wi
Fi (z)
ni
channel
MIMO systems
Fi (z)1
vi
Analysis
e2 = ||S(z)r (z)||2 +
2
i2 ||S(z)G(z)i Fi (z)||2 ,
i=1
(14)
2
j=1
(15)
where r (z) is a spectral factor of r and
F (z) diag {F1 (z), F2 (z)} ,
S(z) (I + G(z)C(z))1 ,
A1 (z) F1 (z)1 C12 (z)T2 S(z),
A2 (z) F2 (z)1 C21 (z)T1 S(z).
Equation (15) allows one to establish that the NCS described above is MSS if and only if both F1 (z) and F2 (z)
are stable, MP and biproper,
2
(16)
1 > B1 C12 (z)T2 S(z)G(z)1 2 ,
2
T
2 > B2 C21 (z)2 S(z)G(z)2 2 ,
(17)
and
(1 B1 ) (2 B2 ) >
2
(18)
Thus, and as expected from the SISO case examined earlier, we see that MSS imposes limits on the achievable
channel signal-to-noise ratio and, hence, on the corresponding channel data-rate.
An immediate consequence of the previous result is that,
provided (16)-(18) hold,
lim
(1 ,2 )(
1 ,
2 )
e2 = ,
where
S (1 , 2 ) R2 : 1 and 2 achieve equality in (18) ,
13
i
r1
e1
y1
u1
C11 (z)
v2
F2 (z)1
C21 (z)
F2 (z)
Link 2
q2
Link 1
q1
G(z)
r2
e2
v1
F1 (z)1
C12 (z)
F1 (z)
u2
C22 (z)
y2
for any C(z), and any choice for F1 (z) and F2 (z). As a
consequence, we see that, for any given full MIMO controller, and no matter how the coding system is chosen,
there exist sufficiently poor channels which render the performance of the resulting partially networked closed loop
arbitrary bad. In these cases, any stabilizing decentralized
controller (that makes no use of the non-transparent channels) will provide better performance than a NCS. Stated a
different way, in the situation under study, there are cases
where poor information is much worse than not having information at all. Of course, this conclusion is tied to the
fact that we are considering a pre-designed controller. If
one were to design a centralized controller considering the
communication constraints from the very beginning, then
one could outperform any decentralized design.
4.3
Coder Design
2
2
2
||Ai (z)r (z)|| ||Sd (z)i Fi (z)||
2
i=1
i Bi
where
M1 (z) C12 (z)T2 S(z)r (z),
M2 (z) C21 (z)T1 S(z)r (z),
and i is an arbitrary positive constant. This results shows
how to synthesize coding systems that minimize the impact
of the communication links on overall closed loop performance. An interesting feature of the proposed filters is that
Example
We end this section with an example that considers (instantaneous) bit-rate limited channels and, for simplicity, we
assume equal bit rates on each channel, i.e., b1 = b2 = b,
and take the sampling interval as 1[s]. The plant model is
given by
G(z) =
0.6
(z0.8)
1
(z0.5)
0.4
(z0.8)
1
(z0.5)
5(z0.8)
z1
5(z0.8)
z1
2(z0.5)
z1
3(z0.5)
z1
.
0.0049627(z + 0.9934)
I,
(z 2 1.97z + 0.9802)
10
Decentralized
Ideal full MIMO
Analytical no coding
Empirical no coding
Analytical opt. coding
Empirical opt. coding
10
Controller
x
Plant
10
(see, e.g., [2, 3, 68, 69]). Assuming that the state x is available for measurement, in a non-networked case, the plant
input can be considered as if were given by a (possibly
time-varying and dynamic) mapping of the plant state, say
5
6
Bit rate ( b ) [bit/s]
Figure 9: Tracking error variance as a function of the perchannel bit rate (see Section 4.4).
Up to this point in this paper, we have focused on quantization issues. However, in modern network protocols (e.g.,
Ethernet; see [67]), data is sent in large packets. Accordingly, quantization effects may become negligible in those
situations, and the fact that data packets may get corrupted,
delayed or lost becomes the dominant issue. In this section (which is based on [34]) we will present an approach
that allows one to deal with data loss and random delays.
Our proposal exploits the assumption that it is possible to
transmit relatively large packets that cover multiple datadropout and delay scenarios.
5.1
Buffer and
selection logic
10
u
Unreliable
Network
Setup
(19)
u(k) U R ,
x(k) X R ,
k N0 N{0},
u(k) = k (x(k)),
k N0 ,
(20)
(21)
j=0 i=0
(i,j)=(0,0), i+jk
P (k i j) = i (k) > 0
(k 1) > 1 (k j i + 1) > j + i 1 .
This important result, implies that, in order to analyze or
design SBNC loops, it suffices to consider a setting wherein
the network is modeled via an erasure channel with a given
dropout probability (see, e.g., [1012, 71, 72] and the many
references therein).
It should be emphasized here that if { (k)}kN0 is a sequence of independent random variables, then
peq (k) = peq ,
i.e., the equivalent probability, is a constant. However, the
sequence of dropouts in SBNC is, in general, not a sequence of independent random variables, even if the underlying network delay and dropout distributions are.
The equivalent dropout probability characterizes closed
loop control performance. It can be used as a guideline
for choosing the horizon length N and the timeout value
max . Indeed, peq (k) can be made arbitrarily small (and,
thus, the performance will become indistinguishable from
that achieved in the non-networked case). This is achieved
by choosing sufficiently large values for N and max , albeit at an increase in computational complexity (for details
see [34]). Fortunately, in practice, choosing moderate values for N and max is often sufficient to achieve good performance as illustrated below.
14 This implies that the network protocol must have acknowledgements,
as in TCP.
15 This implies that the actual delay distribution does not play any role.
16 P{} stands for probability of ().
10
Probability
0.2
0.15
0.1
0.05
0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
Network delay ( )
Example
This section presents an example to illustrate the performance of SBNC. We will assume that the network has, for
every k, a delay profile as illustrated in Figure 11. Thus, if,
for example, one sets max 4, then most packets will be
effectively lost.
Consider the following stable nonlinear plant having scalar
input
x1 (k + 1) = x1 (k) + 0.01 x2 (k) + x2 (k)3
x2 (k + 1) = x2 (k) + 0.01 2x1 (k) 3x2 (k)
+ u(k) 1 + 0.1x1 (k)2
y(k) = x1 (k) + d(k),
where x(k) = [x1 (k) x2 (k)]T is the plant state at time k,
{u(k)} is the plant input, {y(k)} is the plant output, and
{d(k)} is a piecewise constant output disturbance having
infrequent steps at random times. Both the plant state and
disturbance measurements are affected by Gaussian white
noise of variance d2 = 0.01 and x2 = 0.04I2 , respectively.
The control objective is to achieve reference tracking for
the plant output. Whilst future reference values are known
to the controller, future disturbances are not. For simplicity,
the latter are assumed to remain at their current value.
The underlying controller is given by:
k (x(k)) =
Output y
N=2
max = 1
3
Output y
N=6
Output y
2000
4000
peq = 0.784
0
2000
4000
1
0
peq = 0.844
0
2000
4000
1
0
peq = 0.607
0
2000
4000
peq = 0.841
0
2000
4000
1
0
peq = 0.604
0
2000
4000
2000
4000
Sample number k
eq
= 0.604
2000
4000
Sample number k
2000
2000
4000
eq
2000
1
0
4000
peq = 0.013
peq = 0.841
peq = 0.295
Output y
peq = 0.930
N = 10
max = 7
N = 15
max = 2
= 0.010
4000
peq = 0.010
0
2000
4000
Sample number k
Figure 12: SBNC closed loop performance as a function of N and max (see Section 5.3).
the equivalent dropout probability peq is the key parameter
determining SBNC performance. Indeed, cases with very
disparate values of N or max can exhibit similar performance if the corresponding equivalent dropout probabilities are similar.18
It is also informative to compare the probability of a packet
being effectively lost due to the choice of max , and the
equivalent dropout probability peq (which depends on the
interplay between N and max ). It follows from Figure 11
that if max {1, 2, 7}, then P{ (k) > max } equals
0.959, 0.877 and 0.143, respectively. The above results
show that by a proper choice of N one can decrease this
probability dramatically. It must be noted, however, that
if one chooses N too small (as compared with max ), then
peq could be larger than P{ (k) > max } (see the case
(N, max ) = (2, 7)). This is due to the fact that, in those
cases, the buffer will frequently run out of data.
It is also worth mentioning that, for this problem, using
max = 0, does not stabilize the loop for any value of N .
In addition, the simple policy that regards all delayed data
as lost and only sends the current plant input also gives
unstable behaviour. This strongly supports the use of the
SBNC scheme advocated here.
18 Consider, for example, the cases (N,
max ) = (15, 1) and
(N, max ) = (2, 2) or, more dramatically, (N, max ) = (6, 7) and
(N, max ) = (15, 7).
Conclusions
11
Acknowledgment
The authors would like to thank M.S. Derpich and J. stergaard for fundamental contributions to the work summarized here.
REFERENCES
[23]
12
[22]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
trolled system, in Proc. of the European Control Conference, Kos, Greece, 2007.
Y. Minami, S. Azuma, and T. Sugie, An optimal dynamic
quantizer for feedback control with discrete-valued signal
constraints, in Proc. of the 46th IEEE Conference on Decision and Control, New Orleans, USA, 2007.
S. Azuma and T. Sugie, Optimal dynamic quantizers for
discrete-valued input control, Automatica, vol. 44, pp.
396406, 2008.
M. Salgado and A. Conley, MIMO interaction measure
and controller structure selection, Int. J. Contr., vol. 77,
no. 4, pp. 367383, March 2004.
G. Goodwin, M. Salgado, and E. Silva, Time-domain performance limitations arising from decentralized architectures and their relationship to the RGA, Int. J. Contr.,
vol. 78, no. 13, pp. 10451062, September 2005.
V. Kariwala, Fundamental limitation on achievable decentralized performance, To appear in Automatica, 2007.
E. Silva, D. Oyarzun, and M. Salgado, On structurally constrained H2 performance bounds for stable MIMO plant
models, IET Control Theory & Applications, vol. 1, no. 4,
pp. 10331045, 2007.
H. Ishii and B. Francis, Stabilization with control networks, Automatica, vol. 38, pp. 1745 1751, 2002.
J. Rawlings and B. Stewart, Coordinating multiple optimization based controllers: New opportunities and challenges, in Proc. of the 8th Int. IFAC DYCOPS, Cancun,
Mexico, June 2007.
S. Yuksel and T. Basar, Communication constraints for
decentralized stabilizability with time-invariant policies,
IEEE Trans. on Automatic Control, vol. 52, no. 6, pp. 1060
1066, 2007.
A. Matveev and A. Savkin, Decentralized stabilization
of linear systems via limited capacity communication networks, in Proc. of the 44th IEEE CDC and the ECC 2005,
Sevilla, Spain, 2005, pp. 11551161.
S. Jiang and P. Voulgaris, Cooperative control over link
limited abd packet dropping networks, in Proc. of the European Control Conf., 2007.
E. Silva, G. Goodwin, and D. Quevedo, On networked
control architectures for mimo plants, in Accepted for presentation at the 17th IFAC World Congress, Seoul, Korea,
2008.
D. Quevedo, E. Silva, and G. Goodwin, Control over unreliable networks affected by packet erasures and variable
transmission delays, To appear in IEEE Journal On Selected Areas In Communications, 2008.
A. Bemporad, Predictive control of teleoperated constrained systems with unbounded communication delays,
in Proc. IEEE Conf. Decis. Contr., 1998, tampa, Florida,
USA.
G. Liu, J. Mu, D. Rees, and S. Chai, Design and stability
analysis of networked control systems with random communication time delay using the modified MPC, Int. J.
Contr., vol. 79, pp. 288297, April 2006.
A. Casavola, E. Mosca, and M. Papini, Predictive teleoperation of constrained dynamic systems via internet-like
channels, IEEE Trans. Contr. Syst. Technol., vol. 14, pp.
681694, July 2006.
P. L. Tang and C. W. de Silva, Compensation for transmission delays in an ethernet-based control network using variable-horizon predictive control, IEEE Trans. Contr.
Syst. Technol., vol. 14, no. 4, pp. 707718, July 2006.
V. Gupta, B. Sinopoli, S. Adlakha, and A. Goldsmith, Receding horizon networked control, in Proc. Allerton Conf.
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
13