Articulo Asymptotic Behavior of Nonlinear Networked Control Systems
Articulo Asymptotic Behavior of Nonlinear Networked Control Systems
7, JULY 2001
1093
REFERENCES
I. INTRODUCTION
Using a (local area) networked control architecture has many advantages over a traditional point-to-point design including low cost of
installation, ease of maintenance, lower cost, and greater flexibility [3],
[4]. For these reasons the networked control architecture is already used
in many applications, particularly where weight and volume are of consideration, for example in automobiles [2] and aircraft [5], [6]. The introduction of a computer network in the feedback loop unfortunately
invalidates the traditional analytic stability and performance guarantees that control design typically produces. In this note, we reconnect
the analysis of the control design to the networked control context, and
provide guarantees of stability and certain levels of asymptotic performance to the control systems employing networked feedback loops.
We focus on a multiple-inputmultiple-output (MIMO) nonlinear
plant with a nonlinear controller connected by a communication network. A block diagram of this system is presented in Fig. 1.
We assume that the controller is designed without regard to the network, meaning that if the input to the controller is connected directly
to the output of the plant the system would be globally (or locally) exponentially stable. We provide conditions under which these stability
properties are preserved when the communication network is inserted
into the loop between the outputs of the plant and the controller input.
Each output, or group of outputs, is assumed to be monitored by a smart
sensor with a network interface. Specifically, in the laboratory we us
a Controller Area Network (CAN-II) operating at 1 Mb/sec because
CAN-II is commonly used in automobiles and manufacturing plants.
Each smart sensor must compete with the others for access to the network. The resulting communication constraint is the primary focus of
this note, hence propagation delays, communication errors and observation noise will not be treated.
The general system consists of the time-varying plant, the
time-varying controller, and the network. We denote the plant
dynamics by x_ p (t) = fp (t; xp (t); up (t)), y (t) = gp (t; xp (t)),
Manuscript received April 5, 1999; revised December 23, 1999 and August
16, 2000. Recommended by Associate Editor L. Dai. This work was supported
in part by the United States Army Research Offic under Grant DAAG55-98-D0002, and in part by the National Science Foundation under Grant ECS-9702717.
G. C. Walsh is with the Department of Mechanical Engineering, University
of Maryland, College Park, MD 20742 USA (e-mail: [email protected]).
O. Beldiman is with Mitusbishi Electric and Electronics, Inc., Durham, NC
27613 USA (e-mail: [email protected]).
L. G. Bushnell is with the Department of Electrical Engineering, University of Washington, Seattle, WA 98195-2500 USA (e-mail: [email protected]).
Publisher Item Identifier S 0018-9286(01)06614-4.
00189286/01$10.00 2001 IEEE
1094
and let y^(t) denote the input to the controller. This is the vector of
the most recently transmitted plant output values, and has the same
dimension as y (t). At each transmission time a component(s) of y^(t)
is set to the corresponding component(s) of y (t). The controller is
described by the following equations: x_ c (t) = fc (t; xc (t); y^(t)),
up (t) = gc (t; xc (t)). We define the network induced error as
e(t) = y(t) 0 y^(t). Between two successive transmission times we
have e_ (t) well defined as long as gp is continuously differentiable.
Note that the network may also be used to transmit the control signal
u(t) by augmenting the error vector.
We now combine the controller and plant states into the vector x(t),
and we relabel the vector fields to obtain the following dynamics for
the closed-loop system in between two successive transmission times
(1)
(f;
@V
@t
@V
f (t; x; 0) 0c3 kxk2
@x
@V
c4 kxk:
@x
(2)
(3)
sources may transmit its data, and so how the transmission opportunities are scheduled is critical.
Two scheduling algorithms are considered. The simplest is a static
scheduler. The transmission order is decided in advance and this order
is repeated indefinitely. This common method would typically be implemented by polling or by a token ring. The other method uses bit-wise
arbitration to dynamically schedule the use of the network at run time.
This is the Try-Once-Discard (TOD) protocol introduced in [7]. Some
portion of a nodes identifier (the CAN-II identifier is 29 bit long) is
used to transmit a local evaluation of the importance of the locally held
data. The information source or smart sensor that consider its data the
most important wins use of the network and all losing data packets are
discarded.
Lemma 1 (Scheduler Error Bound) [7]: Consider a static or a dynamic network scheduler starting at time t0 , visiting each node at least
once, with integer periodicity p, maximum allowable transfer interval
, maximum growth in error e(t) in seconds strictly bounded by
2 (0; 1). Then, for any time t t0 + p , the error is bounded
as ke(t)k < p(p 0 1)=2.
Proof: For the static scheduler, because the transmission is
p-cyclic, every node will transmit at least one time in p seconds, and
the bound follows.
For the dynamic scheduler, the error of the channels not transmitted
is bounded by the error of the channel that did transmit. Consequently,
if any channel repeats, it establishes a bound for the remaining channels. If no channel repeats, then the error bound is similar to the static
scheduler because in p seconds all channels will have transmitted at
least one time. Let t1 ; . . . ; tp be the last p transmission times (t1 the
most recent) and i1 ; . . . ; ip be the channels that were transmitted, respectively. Let im be the first channel that is repeated. If m = p then
the lemma is proved, since the error on channel ik at time t1 is bounded
by k .
Assume m < p. Let 1 l < m be the index of the time when
channel im was last transmitted. Then ei (tl ) (m 0 l) . Also, since
at time tl channel im was transmitted it must have had the highest error,
so all the other channels have error bounded by (m 0 1) . The channels
ik with 1 k l have the usual bound k . Summing up and taking
the worst case will give the bound from the lemma statement.
III. STABILITY OF NONLINEAR NETWORKED CONTROL SYSTEMS
In this section, we present the main result of this note: that the stability property of a networked system is preserved if the network is fast
enough. There are no assumptions about the initial conditions of the
error e(t), and so only BellmanGronwall can bound the growth of
z = (x; e)0 during the first p seconds. At t = p , however, Lemma
1 provides a bound on ke(t)k. We then prove that for t p , the error
remains bounded and kx(t)k decreases exponentially to a ball proportional to the bound on ke(t)k. The previous steps are repeated to show
overall exponential decay.
Theorem 1: Consider a NCS whose continuous dynamics are described by equation (1) with the control law designed so that equations
(2)(4) are satisfied, with p nodes of sensors operating under TOD or
static scheduling, a maximum allowable transfer interval (MATI) that
satisfies < minf(ln(2)=kh p), (S=8), (Sc3 =32kf c4 )((c1 =c2 ))3=2 g
where S = (( c2 =c1 +1)kh pi=1 j )01 . Then, the networked system
is exponentially stable.
Proof: We first expand the bounds imposed on for easy reference. Note that some of the bounds are used for several inequalities.
ln(2)
kh p
S
<
<
) ek
p
) < S
<2
(4)
(5)
< Sc3 c1
32kf c4
c2
3 2
) 2S < 14
(6)
) kf c 2S < c
4
(7)
4kf c4
c2
c1
c1
2:
1
(8)
1095
where we used (9) and (2) to get the bound on kxk and (10) for the
bound on kek.
The growth of error in any interval included in [t0 + p; t^] is
bounded by kh (2=S + 2 c2 =c1 )kz (t0 )k, which is less than , according to (5). Applying Lemma 1 on [t^ 0 p; t^], we get
Let z (t0 ) be the initial condition at the initial time t0 . For any t in
[t0 ; t0 + p ], using BellmanGronwall and (4) we have:
kz(t)k ek
p kz (t
k 2 kz(t )k :
0)
t0 + p ], we have
ke_ (t)k kz_ (t)k kh (t; z(t))k kh kz(t)k 2kh kz(t0 )k
and the maximum growth of error in a interval is bounded
c2 =c1 )kz (t0 )k. We denote
by 2kh kz (t0 )k < 2kh (1 +
= 2kh (1 + c2 =c1 )kz (t0 )k and we use it to apply Lemma 1.
While the smaller bound 2kh kz (t0 )k is acceptable for the interval
[t0 ; t0 + p ], the larger bound 2kh (1 + c2 =c1 )kz (t0 )k is needed to
extend the result beyond this short transient period, as is shown later.
We can now use Lemma 1 to get that
ke(t
k
+ p )
j kz (t0 )k = 2 kz (t0 )k :
S
j =1
8 t > t + p
8 t > t + p:
0
(9)
(10)
Suppose this is not true. Then there is a first time t^ when one of these
conditions (or both of them) fails.
Consider the case when (9) does not hold
t;^
x(t^) = 4c2
kz(t )k :
2
(11)
x(t^)
V_ (x) = @V
@t
@V
=
@t
(12)
+ kf c4
2
2
(13)
kz(t )k :
0
kz(t )k :
0
c2
c1
2
kz(t )k
0
+ p ,
8t t :
0
(15)
c2 kz (t )k2 :
0
c1
(c2 =c1 ). Using the
Comparison Lemma [1, p. 100], and the fact that V (t0 + p; x(t0 +
p )) < 4c2 kz (t0 )k2 , we obtain
V (t0 + t; x(t0 + t)) kz (t0 )k2 e0(t0p) (4c2 0 ) +
for all t > p .
Fix t1 > p so that
e0(t 0p) < =(4c2 0 )
and then
kx(t
+ t1 )
(16)
Using the bounds (15) and (14) in inequality (16), we get that
1
k kx(t
+ t0 )
In this case, t^ cannot be a transmission time because during a transmission the error can only decrease. For any time in the interval [t0 ; t^] that
is not a transmission time, we have
kh
kz(t
e(t^)
t
(14)
k ke(t
+ t1 ) +
+ t1 )
k 3=4 kz(t )k :
+ t0 )
x(t^) 0c
At a time t
Using the Lyapunov bounds (2) and (3) and the Lipschitz condition for
the function f , we get
V_ t;^ x(t^)
kz(t
@V f (t; x; e)
@x
@V
+
(f (t; x; 0) + f (t; x; e) 0 f (t; x; 0)) :
@x
+
kz(t
8 t t + p
8t t
k (3=4)k kz(t )k :
+ kt1 )
1096
Fig. 2.
Fig. 4. Single link: stable ( = 0:01) (solid line) and unstable ( = 0:05)
(dashed line) trajectories.
linear system in order to stabilize the origin, and then map it back to
the original system.
The goal of this example is to show what happens to the stability of
the system when the average amount of bandwidth allocated to the control loop is varied. We are going to model this variation by changing the
average of the Poisson distribution used for the transmission times.
Due to the random nature of the transmission times distribution, we run
[1] H. K. Khalil, Nonlinear Systems, second ed. Upper Saddle River, NJ:
Prentice-Hall, 1996.
[2] U. zgner, H. Goktag, and H. Chan, Automotive suspension control
through a computer communication network, in Proc. IEEE Conf. Control Applications, 1992.
Fig. 3. Single link: the percent of stable cases as function of . The system
loses stability when is around 0.015
J q2 0 k(q1 0 q2 ) = u:
z=
q1
q_1
where
REFERENCES
I. INTRODUCTION
One of the most popular methods for model reduction of large-scale
systems is the singular perturbation method. This approach has attracted much attention because of its simplicity and good performance
in most experimental situations. In the case of discrete-time linear systems, the theory of the singular perturbation has been probably initiated
by [1], [2]. In these papers, the method is treated by using the similar
ideas used in continuous-time case. After these results, the singular perturbation discrete-time linear system has received a great deal of attention in the literature, and significant progress has been made toward the
optimal feedback control of large-scale linear systems. Among several
contributions to the subject, we would-like to point out those related to
[3]. In that paper, the authors have derived sufficient conditions for the
existence of a suboptimal solution, and a near-optimum design method
has also been proposed. Another notable work in this area is the book
of Naidu [4] in which the author gives a particularly excellent account
of the application of the singular perturbation in discrete-time linear
control theory.
This paper is entirely devoted to the singularly perturbed nonlinear
discrete-time systems and develops a discrete-time counterpart of certain results of singularly perturbed continuous-time nonlinear control
problems. More precisely, a method will be developed in Section II
which parallels the corresponding method in [6]. In particular, a mode
decoupling approach will be given for the solution to be approximated
Manuscript received October 1, 1999; revised December 11, 2000. Recommended by Associate Editor M. Krstic
R. Bouyekhf and A. El Moudni are with the University of Technology BelfortMontbeliard (UTBM), Laboratory SET, 90010 Belfort Cedex, France.
A. El Hami is with INSA of Rouen-LMR-UPRESA 6104, 76801 Saint-Etienne du Rouvroy Cedex, France.
Publisher Item Identifier S 0018-9286(01)06613-2.
1097
1 f (x(k); y(k))
x(k + 1) = f (x(k); y(k); ) =
(1)
1
y(k + 1) = g(x(k); y(k); ) = g(x(k); y(k))
(2)
n
where f (1) and g (1) are smooth functions for x 2 Dx
and y 2
Dy m satisfying f (0; 0) = g(0; 0) = 0. Here, Dx and Dy are
open convex neighborhoods of the origins of the respective Euclidian
spaces. k 2 and is a smallpositive perturbation parameter. This
system will be studied under the following assumption.
Assumption 1: For all (x; y )T 2 Dx 2 Dy we assume that
i) supk0 kx(k)k a1 < 1;
ii) supk0 ky (k)k a2 < 1;
iii) ((@f=@x)(x; y )) < where (1) denotes the spectrum of
a matrix and 0 < < 1.
System (1) and (2) is characterized by an explicit separation of variables x(k) and y (k), owing to the presence of the small parameter
that multiplies the state y(k). This fact allows decomposing such
system into separate reduced-order subsystems. Indeed, the reduced
subsystem is obtained by setting = 0, then the dimension of the
system (1) and (2) reduces from n + m to n because the system (1)
and (2) degenerates into the n-dimensional system
xs (k + 1) = f (xs (k); 0)
ys (k + 1) = g(xs (k); 0)
(3)
(4)
(5)
1 f (x (k))
xs (k + 1) = f (xs (k); 0) =
(6)
s s
1
ys (k) = g(h(xs (k)); 0) = gs (xs (k)):
(7)
It is straightforward to see that xs starts from the same initial condition
as x. By contrast ys is not free to start from y0 , hence the approximation
of x by xs may be uniform for all k 2 that is
x(k) = xs (k) + O():
(8)
However, the approximation
(9)