This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Sensing-Communication-Computing-Control Closed-Loop Optimization for 6G Unmanned Robotic Systems

Xinran Fang, Chengleyang Lei, Wei Feng,  Yunfei Chen, 
Ming Xiao,  Ning Ge, and Cheng-Xiang Wang, Fellow, IEEE
X. Fang, C. Lei, W. Feng, and N. Ge are with the State Key Laboratory of Space Network and Communications, Department of Electronic Engineering, Tsinghua University, Beijing 100084, China (e-mail: fxr20@mails.tsinghua.edu.cn, lcly21@mails.tsinghua.edu.cn, fengwei@tsinghua.edu.cn, and gening@tsinghua.edu.cn). Y. Chen is with the Department of Engineering, University of Durham, DH1 3LE Durham, U.K. (e-mail: yunfei.chen@durham.ac.uk). M. Xiao is with the Department of Information Science and Engineering, School of Electrical Engineering and Computer Science, Royal Institute of Technology, Sweden (e-mail: mingx@kth.se). C.-X. Wang is with the National Mobile Communications Research Laboratory, School of Information Science and Engineering, Southeast University, Nanjing, 210096, China, and also with the Purple Mountain Laboratories, Nanjing 211111, China (e-mail: chxwang@seu.edu.cn).
Abstract

Rapid advancements in field robots have brought a new kind of cyber physical system (CPS)–unmanned robotic system–under the spotlight. In the upcoming sixth-generation (6G) era, these systems hold great potential to replace humans in hazardous tasks. This paper investigates an unmanned robotic system comprising a multi-functional unmanned aerial vehicle (UAV), sensors, and actuators. The UAV carries communication and computing modules, acting as an edge information hub (EIH) that transfers and processes information. During the task execution, the EIH gathers sensing data, calculates control commands, and transmits commands to actuators—leading to reflex-arc-like sensing-communication-computing-control (𝐒𝐂3\mathbf{SC}^{3}) loops. Unlike existing studies that design 𝐒𝐂3\mathbf{SC}^{3} loop components separately, we take each 𝐒𝐂3\mathbf{SC}^{3} loop as an integrated structure and propose a goal-oriented closed-loop optimization scheme. This scheme jointly optimizes uplink and downlink (UL&DL) communication and computing within and across the 𝐒𝐂3\mathbf{SC}^{3} loops to minimize the total linear quadratic regulator (LQR) cost. We derive optimal closed-form solutions for intra-loop allocation and propose an efficient iterative algorithm for inter-loop optimization. Under the condition of adequate CPU frequency availability, we derive an approximate closed-form solution for inter-loop bandwidth allocation. Simulation results demonstrate that the proposed scheme achieves a two-tier task-level balance within and across 𝐒𝐂3\mathbf{SC}^{3} loops.

Index Terms:
Closed-loop optimization, goal-oriented communication, sensing-communication-computing-control (𝐒𝐂3\mathbf{SC}^{3}) loop, unmanned robotic system, uplink and downlink (UL&DL) configuration

I Introduction

I-A Background and Motivation

Cyber physical system (CPS) refers to the system that integrates communication, computing, and control to get information from the physical world, perform analysis, and change the physical world [1, 2]. In recent decades, a new kind of CPSs–unmanned robotic system–has received great attention for their human-like capabilities [3]. Driven by technologies such as smart computing and cloud-fog architectures, these systems have made significant strides in industrial automation, significantly improving production efficiency [4, 5]. Moreover, recent advancements in field robots have extended unmanned robotic systems from indoor factories to outdoor environments. These systems are now being deployed in hard-to-access areas, replacing humans in dangerous tasks such as disaster rescue [6], oil exploitation, and space exploration [7]. To fully unlock the potential of unmanned robotic systems, supporting field robots has been identified as an important use case for the sixth-generation (6G) network [nextG].

Due to the lack of ground facilities in remote areas, aerial-borne and space-borne platforms such as unmanned aerial vehicles (UAVs) and satellites, are envisioned to provide global seamless coverage in 6G [8, 9]. These platforms are agile to carry communication and computing modules, acting as edge information hubs (EIHs) to both transfer and process information [10]. A digital twin can be further integrated into EIHs to enable intelligent decision-making [11]. During the task execution, sensors collect raw data and upload them to the EIH via the sensor-EIH link. Based on the sensing data, the EIH calculates control commands. These commands are then transmitted to the actuators via the EIH-actuator link for actions. Synergistically, the sensor, the sensor-EIH link, the EIH, the EIH-actuator link, and the actuator form an integrated sensing-communication-computing-control (𝐒𝐂3\mathbf{SC}^{3}) loop. Through effective feedback, the 𝐒𝐂3\mathbf{SC}^{3} loop continuously learns the behavior of the physical system and guides its evolution to the desired direction. From the perspective of biology, the 𝐒𝐂3\mathbf{SC}^{3} loop has great similarity to the reflex arc, as we compared in Fig. 1. In biology, it is widely recognized that the presence of the reflex depends on the functional integrity of the reflex arc [12]. In this sense, it is reasonable to take the 𝐒𝐂3\mathbf{SC}^{3} loop as an integrated structure when we investigate the unmanned robotic system.

Refer to caption
Figure 1: Comparisons between the reflex arc and the 𝐒𝐂3\mathbf{SC}^{3} loop. The reflex arc consists of five parts: receptor, afferent nerve, nerve center, efferent nerve, and effector. By analogy, the 𝐒𝐂3\mathbf{SC}^{3} loop also consists of five parts: sensor, uplink, EIH, downlink, and actuator. The similarity of these two structures motivates us to take the 𝐒𝐂3\mathbf{SC}^{3} loop as an integrated structure and devise the unmanned robotic system from a structured lens.

However, due to the heterogeneity of communication, computing, and control, current applications design 𝐒𝐂3\mathbf{SC}^{3}-loop components separately. For this reason, the fifth-generation (5G) network positions itself as a communication network and primarily focuses on data transmission. It applies multiple access and duplex techniques, e.g., orthogonal frequency-division multiple access (OFDMA) and time-division duplexing/frequency-division duplexing (TDD/FDD), to decompose the network into independent links. Although this link-level division brings high capacity for communication, the task-level connections of different components within the 𝐒𝐂3\mathbf{SC}^{3} loop are disintegrated. The mismatch of the sensor-EIH link, computing, and EIH-actuator link impairs the overall functioning of the 𝐒𝐂3\mathbf{SC}^{3} loop, ultimately degrading the task efficiency of the robotic system.

Unlike Shannon who separated communication from its served system and regarded communication engineering as “reproducing at one point either exactly or approximately a message selected at another point[13], the creator of cybernetics, Wiener, noted that “The problems of control engineering and communication engineering were inseparable, and that they centered not around the technique of electrical engineering but around the much more fundamental notion of the message.[14]. By understanding communication through Wiener’s lens, we can find that communication is not merely for data transmission but an integral part for task execution. In this context, we need to shift our focus from individual communication links to integrated 𝐒𝐂3\mathbf{SC}^{3} loops. As a result, the communication efficiency transcends bit transmission: it involves cooperating with computing and control to achieve good task performance. Building on these insights, we use a structured lens to regard the sensor and actuator within the 𝐒𝐂3\mathbf{SC}^{3} loop as a virtual user [15]. The sensor-EIH link and EIH-actuator link are thus the uplink and downlink (UL&DL) of this virtual user. On this basis, we consider the goal-oriented closed-loop design for the unmanned robotic system.

I-B Related Studies

In the literature, related studies mostly focus on part of the 𝐒𝐂3\mathbf{SC}^{3} loop. In wireless control systems (WCSs), the interplay between communication and control has been extensively studied. In mobile edge computing (MEC), joint optimization of communication and computing has been a central topic. In goal-oriented communication, related studies integrated the task efficiency into the communication design, and the learning-based approaches have become a dominant trend. In the following, we review related studies on WCS, MEC, and goal-oriented communication.

1) WCS: In WCS, related studies investigated the impact of imperfect communication, such as low data rate and latency, on control [16, 17]. From the theoretical perspective, Tatikonda et al. analyzed linear discrete-time systems and derived the lower and upper bounds on the data rate required for different control objectives [18]. Kostina et al. further generalized the work in [18] and derived the lower bound of the data rate given the control objective measured by the linear quadratic regulator (LQR) cost [19]. In terms of optimization schemes, Baumann et al. and Gatsis et al. devised control-aware transmission schemes that the sensor uploads sensing data only when the estimation error surpasses a certain threshold [20, 21]. By taking the LQR cost as the objective, Wang et al. optimized the UL [22], while Lei et al. and Fang et al. optimized the DL [23, 7]. For ultra-reliable and ultra-low latency communication (URLLC)-supported WCSs, Chang et al. jointly optimized communication bandwidth, power, and control convergence rate to maximize the spectrum efficiency (SE) [24], and Yang et al. optimized the UL&DL transmit power and block length to minimize a new metric named energy-to-control efficiency [25]. In addition to above theoretical advancements, researchers also established simulation platforms to testify the control performance under different communication conditions. Bhimavarapu et al. proposed a Unobtrusive Latency Tester solution to measure the communication latency and reliability in real-time control [26]. Lyu et al. proposed a novel hardware-in-the-loop simulation platform, which provided reliable test results by accurately stimulating the real wireless environment [27, 28]. Utilizing these platforms, the performance of 5G and Wi-Fi 6 was assessed, which provides valuable insights for selecting communication protocols for specific applications [26, 27, 28].

2) MEC: The core idea of MEC is to place computing resources close to mobile devices to support real-time applications. Most studies used joint communication and computing optimization to minimize the task latency [29, 30, 31], energy consumption [32][33], or maximize the utility [34, 35, 36]. For example, Wen et al. considered a TDD-mode MEC system in which each user is allocated a single slot to complete the data uploading, computing, and result downloading. The authors optimized bit, subchannel, and time allocation to minimize energy consumption [33]. Jian et al. focused on computing and DL transmission, proposing a joint MEC server-user association, CPU frequency, and bandwidth optimization scheme [34]. Wang et al. considered a joint sensing, communication, and computing framework, where the base station detects surrounding objects and uploads part of computing tasks to the cloud center using integrated sensing and communication (ISAC) signals. The authors optimized the beamformer and CPU frequency to maximize the computing rate [36].

3) Goal-Oriented Communication: The core idea of goal-oriented communication is to adapt communication strategies to the specific needs of supported tasks. For example, Wen et al. considered a real-time inference task performed by ISAC devices and an edge server. The authors took the discriminant gain as the objective and jointly optimized the transmit power, time allocation, and quantization bit allocation [37]. Girgis et al. proposed a semantic communication-control co-design that trains an encoder at the edge to abstract the low dimensional feature and a decoder at the control center to recover the state and calculate the command [38]. Shao et al. utilized the information bottleneck method to maximize the mutual information between the inference result and the encoded feature, while minimizing the mutual information between the raw input data and the encoded feature [39]. Mostaani et al. devised a distributed deep learning scheme for a multi-agent system, and maximized the long-term return by jointly optimizing communication and control policies [40].

In summary, these studies offer valuable insights into the design of the 𝐒𝐂3\mathbf{SC}^{3} loop. Most of these studies have focused on part of the 𝐒𝐂3\mathbf{SC}^{3} loop, such as UL and computing or DL and control, using indirect task metrics like latency or computing performance as their optimization objectives. However, for unmanned robotic systems, the reflex-arc-like 𝐒𝐂3\mathbf{SC}^{3} loop is an integrated structure. The loop performance is reflected by the control actions on the physical world rather than the intermediate metrics. There is a lack of work that jointly optimizes the UL, computing, and DL within and across the 𝐒𝐂3\mathbf{SC}^{3} loops from a goal-oriented perceptive.

I-C Main Contributions

In this paper, we consider an unmanned robotic system formed by a multi-functional UAV, sensors, and actuators. The UAV carries communication and computing modules, with a digital twin simulating the physical process in real time. During the task execution, the UAV acts as an EIH that collects data, calculates commands, and distributes commands to actuators to take actions. Together, the EIH, sensors, and actuators form reflex-arc-like 𝐒𝐂3\mathbf{SC}^{3} loops. Different from current studies that devise 𝐒𝐂3\mathbf{SC}^{3} loop components separately, our study takes the 𝐒𝐂3\mathbf{SC}^{3} loop as an integrated structure and jointly configures UL, computing, and DL within and across the 𝐒𝐂3\mathbf{SC}^{3} loops from a goal-oriented perspective. The main contributions are listed as follows.

  1. 1.

    We investigate an unnamed robotic system formed by multiple reflex-arc-like 𝐒𝐂3\mathbf{SC}^{3} loops. To effectively use limited resources, we propose a goal-oriented closed-loop optimization scheme that jointly optimizes bandwidth, time, and CPU frequency within and across 𝐒𝐂3\mathbf{SC}^{3} loops, with the objective of minimizing the total LQR cost.

  2. 2.

    In the intra-loop configuration, we derive optimal closed-form solutions for UL&DL bandwidth and time, along with the optimal LQR cost. Based on these results, we demonstrate the task-level balance between the UL&DL, as well as the interchange relationships between communication bandwidth and computing CPU frequency.

  3. 3.

    In the inter-loop configuration, we propose an iterative algorithm to optimize the bandwidth and CPU-frequency allocation. Under the condition of adequate CPU frequency availability, we derive an approximate closed-form solution for the inter-loop bandwidth allocation and analyze the allocation principles regarding communication and control parameters.

  4. 4.

    We conduct comprehensive simulation to validate our findings. We show the superiority of the goal-oriented closed-loop optimization by comparing it with separate schemes and communication-oriented schemes. We show that the proposed scheme achieves a two-tier task-level balance within and across the 𝐒𝐂3\mathbf{SC}^{3} loops, which is crucial for the overall performance of the unmanned robotic system.

I-D Organization and Notation

The rest of this paper is organized as follows. Section II introduces the model of the unmanned robotic system and the related 𝐒𝐂𝟑\mathbf{SC^{3}} loop. Section III presents the goal-oriented closed-loop optimization scheme and its solution. Section IV presents simulation results and discussion. Section V draws conclusions.

Throughout this paper, vectors, matrices, and sets are represented by bold lowercase letters, bold uppercase letters, and curly uppercase letters, respectively. n×n\mathbb{R}^{n\times n} represents the set of n×nn\times n real matrices, 𝐈n\mathbf{I}_{n} is the n×nn\times n unit matrix, and 𝟎n\mathbf{0}_{n} is the n×nn\times n zero matrix. λ(𝐀)\lambda(\mathbf{A}) denotes the eigenvalue of matrix 𝐀\mathbf{A} and det𝐀\det\mathbf{A} denotes the determinant of matrix 𝐀\mathbf{A}. The complex Gaussian distribution of zero mean and σ2\sigma^{2} variance is denoted as 𝒞𝒩(0,σ2)\mathcal{CN}(0,\sigma^{2}). The optimal solution of xx is denoted as (x)(x)^{*}.

II Unmanned Robotic System and 𝐒𝐂3\mathbf{SC}^{3} Loop Model

Refer to caption
Figure 2: Illustration of the unmanned robotic system. The system comprises a multi-functional UAV and KK pairs of sensors and actuators, which synergistically form KK 𝐒𝐂3\mathbf{SC}^{3} loops. The UAV carries communication and computing modules, acting as an EIH that transfers and processes information. A digital twin is integrated within it to simulate the physical process in real time. In this figure, the objects marked in black font represent the physical world and the objects marked in red font represent the digital twin.

As shown in Fig. 2, we consider an unmanned robotic system performing a control-type task, such as radioactive object recycling. The system consists of KK 𝐒𝐂3\mathbf{SC}^{3} loops, which are formed by a multi-functional UAV and KK pairs of sensors and actuators. The UAV carries communication and computing modules, serving as an EIH that transfers and processes information. A digital twin can be further integrated into the EIH for simulating the physical process in real time. We regard each pair of sensor and actuator as a virtual user. In this way, the sensor-EIH link and EIH-actuator link are the UL&DL of the virtual user. During the task execution, sensors collect raw data and upload them to the EIH via the UL. Based on the sensing data, the EIH updates the digital twin and calculates control commands using the reasoning of system behavior. These commands are transmitted to the actuators via the DL. Then, the actuators take actions. To ensure the correct operations of the EIH, the satellite provides telemetry, tracking, and control services for the EIH, while a cloud server provides high-level guidelines. In this paper, we focus on the unmanned robotic system in the field and do not consider the remote satellite and cloud server.

For simplicity, we assume that the controlled systems are linear time-invariant processes. For nonlinear processes, this linear model represents the linearization around the system’s working point, which provides a reasonable approximation of its local behavior [41]. Taking the kk-th 𝐒𝐂3\mathbf{SC}^{3} loop and time index ii as an example, the system evolution is described by the following equation:

𝐱k,i+1=𝐀k𝐱k,i+𝐁k𝐮k,i+𝐯k,i,\mathbf{x}_{k,i+1}=\mathbf{A}_{k}\mathbf{x}_{k,i}+\mathbf{B}_{k}\mathbf{u}_{k,i}+\mathbf{v}_{k,i}, (1)

where 𝐱k,in×1\mathbf{x}_{k,i}\in\mathbb{R}^{n\times 1} denotes the system state, 𝐮k,in×1\mathbf{u}_{k,i}\in\mathbb{R}^{n\times 1} denotes the control action, 𝐯k,in×1\mathbf{v}_{k,i}\in\mathbb{R}^{n\times 1} denotes the process noise, and nn denotes the dimension of the controlled system. The matrices 𝐀kn×n\mathbf{A}_{k}\in\mathbb{R}^{n\times n} and 𝐁kn×n\mathbf{B}_{k}\in\mathbb{R}^{n\times n} are determined by the system dynamics, i.e., 𝐀k\mathbf{A}_{k} quantifies the intrinsic dynamics of the system without external intervention, and 𝐁k\mathbf{B}_{k} quantifies the effect of control actions on the state evolution. The system to be controlled is inherently unstable (λ(𝐀k)>1)(\lambda(\mathbf{A}_{k})>1), and it can be stabilized by the pair (𝐀k,𝐁k)(\mathbf{A}_{k},\mathbf{B}_{k}). We use LQR cost to measure the control performance of the 𝐒𝐂3\mathbf{SC}^{3} loop, which is a weighted summation of system states and control inputs over the entire control process,

lk=lim supN𝔼[i=1N(𝐱k,iT𝐐k𝐱k,i+𝐮k,iT𝐑k𝐮k,i)],l_{k}=\limsup\limits_{N\rightarrow\infty}\mathbb{E}\left[\sum_{i=1}^{N}\left(\mathbf{x}_{k,i}^{\text{T}}\mathbf{Q}_{k}\mathbf{x}_{k,i}+\mathbf{u}_{k,i}^{\text{T}}\mathbf{R}_{k}\mathbf{u}_{k,i}\right)\right], (2)

where lkl_{k} denotes the LQR cost, 𝐐kn×n\mathbf{Q}_{k}\in\mathbb{R}^{n\times n} and 𝐑kn×n\mathbf{R}_{k}\in\mathbb{R}^{n\times n} are weighting matrices that balance the cost between state deviations and control inputs.

For communication, we denote the bandwidth, transmission time, and the SE of UL&DL as u={Bku}k=1K\mathcal{B}^{u}=\{B_{k}^{u}\}_{k=1}^{K}, d={Bkd}k=1K\mathcal{B}^{d}=\{B_{k}^{d}\}_{k=1}^{K}, 𝒯u={tku}k=1K\mathcal{T}^{u}=\{t^{u}_{k}\}_{k=1}^{K}, 𝒯d={tkd}k=1K\mathcal{T}^{d}=\{t^{d}_{k}\}_{k=1}^{K}, u={rku}k=1K\mathcal{R}^{u}=\{r^{u}_{k}\}_{k=1}^{K}, and d={rkd}k=1K\mathcal{R}^{d}=\{r^{d}_{k}\}_{k=1}^{K}, respectively. According to the Shannon capacity, rkur^{u}_{k} and rkdr^{d}_{k} are calculated as follows

rku\displaystyle r^{u}_{k} =log2(1+|hku|2pkuσ2)(bits/s/Hz),\displaystyle=\log_{2}(1+\frac{|h^{u}_{k}|^{2}p^{u}_{k}}{\sigma^{2}})\ \text{(bits/s/Hz)}, (3)
rkd\displaystyle r^{d}_{k} =log2(1+|hkd|2pkdσ2)(bits/s/Hz),\displaystyle=\log_{2}(1+\frac{|h^{d}_{k}|^{2}p^{d}_{k}}{\sigma^{2}})\ \text{(bits/s/Hz)},

where hkuh^{u}_{k} and hkdh^{d}_{k} denote the channel gain, pkup^{u}_{k} and pkdp^{d}_{k} denote the transmit power, σ2\sigma^{2} is the channel noise variance. In this paper, we assume that the UL&DL SEs, rkur^{u}_{k} and rkdr^{d}_{k}, remain constant throughout the control process. This can be achieved through adaptive power control, that the transmit power is dynamically adjusted according to channel conditions to maintain a target signal-to-noise ratio (SNR) [42]. This assumption applies to the bandwidth-constrained systems whose power resources are relatively sufficient to compensate for channel variations. By making this assumption, we focus on the bandwidth and time allocation in this paper. The channel gain consists of both small-scale fading and large-scale fading, which is given by,

hku\displaystyle h^{u}_{k} =βkugku,\displaystyle=\beta^{u}_{k}\sqrt{g^{u}_{k}}, (4)
hkd\displaystyle h^{d}_{k} =βkdgkd,\displaystyle=\beta^{d}_{k}\sqrt{g^{d}_{k}},

where βku\beta^{u}_{k} and βkd\beta^{d}_{k} are the small-scale fading, which conforms to the complex Gaussian distribution, and gkug^{u}_{k} and gkdg^{d}_{k} are the large-scale fading, which are calculated by the path-loss model,

gku(dB)\displaystyle g^{u}_{k}\ (\text{dB}) =32.4+20log2(dku)+20log2(fc),\displaystyle=32.4+20\log_{2}(d^{u}_{k})+20\log_{2}(f_{c}), (5)
gkd(dB)\displaystyle g^{d}_{k}\ (\text{dB}) =32.4+20log2(dkd)+20log2(fc),\displaystyle=32.4+20\log_{2}(d^{d}_{k})+20\log_{2}(f_{c}),

where dkud^{u}_{k} (km) and dkdd^{d}_{k} (km) denote the transmission distance of the UL&DL, and fcf_{c} (MHz) denotes the carrier frequency. In each 𝐒𝐂3\mathbf{SC}^{3} cycle, the amount of information transmit via the UL&DL are given by,

Dku\displaystyle D^{u}_{k} =Bkutkurku(bits),\displaystyle=B^{u}_{k}t^{u}_{k}r^{u}_{k}\ \text{(bits)}, (6)
Dkd\displaystyle D^{d}_{k} =Bkdtkdrkd(bits).\displaystyle=B^{d}_{k}t^{d}_{k}r^{d}_{k}\ \text{(bits)}.

For computing, upon receiving sensing data, the EIH processes these data, extracts task-related information, and updates the digital twin. Using the updated digital twin, which simulates system behavior, the EIH calculates control commands. The information extraction process is described as,

DkuρkDku(bits),D^{u}_{k}\rightarrow\rho_{k}D^{u}_{k}\ \text{(bits)}, (7)

where ρk\rho_{k} is a proportion parameter. ρkDku\rho_{k}D^{u}_{k} denotes the task-related information extracted from the sensing data, which also denotes the information contained in the command. The computing time is calculated by,

tkcomp=αkDkufk,t^{\text{comp}}_{k}=\frac{\alpha_{k}D^{u}_{k}}{f_{k}}, (8)

where αk\alpha_{k} (cycles/bit) denotes the processing difficulty (the required CPU cycles for processing one-bit data), fkf_{k} denotes the allocated CPU frequency for the kk-th 𝐒𝐂3\mathbf{SC}^{3} loop, and we denote ={fk}k=1K\mathcal{F}=\{f_{k}\}_{k=1}^{K}. In practice, αk\alpha_{k} and ρk\rho_{k} are the parameters of the neural network . A larger network usually provides a more accurate modeling of the physical process, enables a more thorough extraction of task-related information, and outputs more effective control commands, resulting in a higher ρk\rho_{k}. Conversely, the larger network also incurs greater computational complexity, resulting in a higher αk\alpha_{k}. Therefore, finding a proper precision of the digital twin is crucial for the practical deployment [43]. Nonetheless, we do not delve into this issue in this paper. The calculated commands are sent to the actuators to guide their actions. However, due to the capacity constraints of the DL, the command information may not fully reach the actuators. The information that finally works for the controlled system is jointly determined by the task-related information extracted from the UL and the information successfully transmitted via the DL,

Dk𝐒𝐂3min{ρkDku,Dkd}(bits),D^{\mathbf{SC}^{3}}_{k}\leqslant\min\{\rho_{k}D^{u}_{k},D^{d}_{k}\}\ \text{(bits)}, (9)

where Dk𝐒𝐂3D^{\mathbf{SC}^{3}}_{k} is defined as the closed-loop information, which is the information that finally works within one 𝐒𝐂3\mathbf{SC}^{3} cycle. According to [19], the lower bound of the LQR cost has a direct relationship with the closed-loop information as,

lknN(𝐯𝐤)|det𝐌k|1n22n(Dk𝐒𝐂3log2|det𝐀k|)1+tr(𝚺𝐯k𝐒k),l_{k}\geqslant\frac{nN\!\left(\mathbf{v_{k}}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{2^{\frac{2}{n}(D^{\mathbf{SC}^{3}}_{k}-\log_{2}|\det\mathbf{A}_{k}|)}-1}+\text{tr}\left(\mathbf{\Sigma}_{\mathbf{v}_{k}}\mathbf{S}_{k}\right), (10)

where N(𝐱)12πee2nh(𝐱)N(\mathbf{x})\triangleq\frac{1}{2\pi e}e^{\frac{2}{n}h(\mathbf{x})} and h(𝐱)h(\mathbf{x}) is the differential entropy of 𝐱\mathbf{x}, i.e., h(𝐱)nf𝐱(x)logf𝐱(x)dxh(\mathbf{x})\triangleq-\int_{\mathbb{R}^{n}}f_{\mathbf{x}}(x)\log f_{\mathbf{x}}(x)\mathrm{d}x, 𝚺𝐯k\mathbf{\Sigma}_{\mathbf{v}_{k}} is the covariance matrix of the process noise, log2|det𝐀k|\log_{2}|\det\mathbf{A}_{k}| is the intrinsic entropy, and 𝐌k\mathbf{M}_{k} and 𝐒k\mathbf{S}_{k} are determined by the Riccati equations,

𝐒k\displaystyle\mathbf{S}_{k} =𝐐k+𝐀kT(𝐒k𝐌k)𝐀k,\displaystyle=\mathbf{Q}_{k}+\mathbf{A}_{k}^{T}\left(\mathbf{S}_{k}-\mathbf{M}_{k}\right)\mathbf{A}_{k}, (11)
𝐌k\displaystyle\mathbf{M}_{k} =𝐒kT𝐁k(𝐑k+𝐁k𝐒k𝐁k)1𝐁kT𝐒k.\displaystyle=\mathbf{S}_{k}^{T}\mathbf{B}_{k}\left(\mathbf{R}_{k}+\mathbf{B}_{k}\mathbf{S}_{k}\mathbf{B}_{k}\right)^{-1}\mathbf{B}_{k}^{\text{T}}\mathbf{S}_{k}.

To ensure the system can be stabilized, the closed-loop information needs to satisfy the following stable condition [19],

Dk𝐒𝐂3>log2|det𝐀k|.D^{\mathbf{SC}^{3}}_{k}>\log_{2}|\det\mathbf{A}_{k}|. (12)

In addition, the 𝐒𝐂3\mathbf{SC}^{3} loop needs to run within the given cycle time, and we have the following cycle-time constraint,

tku+tkcomp+tkdTk,t^{u}_{k}+t^{\text{comp}}_{k}+t^{d}_{k}\leqslant T_{k}, (13)

where TkT_{k} denotes the cycle time for the kk-th 𝐒𝐂3\mathbf{SC}^{3} loop. We can see from (9) and (10), the LQR cost is constrained by the closed-loop information, and the closed-loop information is further determined by the information transmitted via the UL&DL. In addition, the computing time affects the time available for data transmission, thereby indirectly influencing the LQR cost. Consequently, a co-design of UL, computing, and DL is essential to ensure a good control performance of the 𝐒𝐂3\mathbf{SC}^{3} loop.

III Goal-Oriented Closed-Loop Optimization

III-A Problem Formulation

In this paper, we aim to minimize the total LQR cost of the unmanned robotic system by jointly optimizing bandwidth, CPU frequency, and time within and across the 𝐒𝐂3\mathbf{SC}^{3} loops. The optimization problem is formulated as follows:

(P1) minu,𝒯u,,d,𝒯dk=1Klk\displaystyle\min\limits_{\mathcal{B}^{u},\mathcal{T}^{u},\mathcal{F},\mathcal{B}^{d},\mathcal{T}^{d}}\sum_{k=1}^{K}l_{k} (14a)
s.t. lknN(𝐯k)|det𝐌k|1n22n(Dk𝐒𝐂3log2|det𝐀k|)1+tr(𝚺𝐯k𝐒k),k\displaystyle l_{k}\geqslant\frac{nN\!\left(\mathbf{v}_{k}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{2^{\frac{2}{n}(D^{\mathbf{SC}^{3}}_{k}-\log_{2}|\det\mathbf{A}_{k}|)}-1}+\text{tr}\left(\mathbf{\Sigma}_{\mathbf{v}_{k}}\mathbf{S}_{k}\right),\forall k (14b)
Dk𝐒𝐂3min(ρkDku,Dkd),k\displaystyle D^{\mathbf{SC}^{3}}_{k}\leqslant\min(\rho_{k}D^{u}_{k},D^{d}_{k}),\forall k (14c)
Dk𝐒𝐂3>log2|det𝐀k|,k\displaystyle D^{\mathbf{SC}^{3}}_{k}>\log_{2}|\det\mathbf{A}_{k}|,\forall k (14d)
DkutkuBkurku,k\displaystyle D^{u}_{k}\leqslant t^{u}_{k}B^{u}_{k}r^{u}_{k},\forall k\ (14e)
DkdtkdBkdrkd,k\displaystyle D^{d}_{k}\leqslant t^{d}_{k}B^{d}_{k}r^{d}_{k},\forall k (14f)
tku+αkDkufk+tkdTk,k\displaystyle t^{u}_{k}+\frac{\alpha_{k}D^{u}_{k}}{f_{k}}+t^{d}_{k}\leqslant T_{k},\forall k (14g)
k=1K(Bku+Bkd)Bmax\displaystyle\sum\limits_{k=1}^{K}(B^{u}_{k}+B^{d}_{k})\leqslant B_{\max} (14h)
k=1Kfkfmax\displaystyle\sum\limits_{k=1}^{K}f_{k}\leqslant f_{\max} (14i)
Bku0tku0fk0Bkd0tkd0,k,\displaystyle B^{u}_{k}\geqslant 0\ t^{u}_{k}\geqslant 0\ f_{k}\geqslant 0\ B^{d}_{k}\geqslant 0\ t^{d}_{k}\geqslant 0,\ \forall k, (14j)

where BmaxB_{\max} and fmaxf_{\max} denote the maximal bandwidth and CPU frequency, respectively. Due to the coupling relationships among different variables, (P1) is a highly complex problem with non-convex constraints (14e), (14f) and (14g). To address this challenge, we begin by investigating the intra-loop configuration within an 𝐒𝐂3\mathbf{SC}^{3} loop and move to investigate the inter-loop optimization across multi-𝐒𝐂3\mathbf{SC}^{3} loops.

III-B Single-𝐒𝐂3\mathbf{SC}^{3}-Loop Optimization

For simplicity, the index kk is omitted when we consider an 𝐒𝐂3\mathbf{SC}^{3} loop. When K=1K=1, the optimization problem becomes

(PA-1) minBu,tu,f,Bd,tdl\displaystyle\min\limits_{B^{u},t^{u},f,B^{d},t^{d}}l (15a)
s.t. lnN(𝐯)|det𝐌|1n22n(D𝐒𝐂3log2|det𝐀|)1+tr(𝚺𝐯𝐒)\displaystyle l\geqslant\frac{nN\!\left(\mathbf{v}\right)|\det\mathbf{M}|^{\frac{1}{n}}}{2^{\frac{2}{n}(D^{\mathbf{SC}^{3}}-\log_{2}|\det\mathbf{A}|)}-1}+\text{tr}\left(\mathbf{\Sigma}_{\mathbf{v}}\mathbf{S}\right) (15b)
D𝐒𝐂3min(ρDu,Dd)\displaystyle D^{\mathbf{SC}^{3}}\leqslant\min(\rho D^{u},D^{d}) (15c)
D𝐒𝐂3>log2|det𝐀|\displaystyle D^{\mathbf{SC}^{3}}>\log_{2}|\det\mathbf{A}| (15d)
DutuBuru\displaystyle D^{u}\leqslant t^{u}B^{u}r^{u} (15e)
DdtdBdrd\displaystyle D^{d}\leqslant t^{d}B^{d}r^{d} (15f)
tu+αDuf+tdT\displaystyle t^{u}+\frac{\alpha D^{u}}{f}+t^{d}\leqslant T (15g)
Bu+BdBmax\displaystyle B^{u}+B^{d}\leqslant B_{\max} (15h)
ffmax,\displaystyle f\leqslant f_{\max}, (15i)
Bu0tu0f0Bd0td0.\displaystyle B^{u}\geqslant 0\ t^{u}\geqslant 0\ f\geqslant 0\ B^{d}\geqslant 0\ t^{d}\geqslant 0. (15j)

As the lower bound of the LQR cost (15b) monotonically decreases with the closed-loop information, minimizing the LQR cost is equivalent to maximizing the closed-loop information for an 𝐒𝐂3\mathbf{SC}^{3} loop. In addition, as there are no other 𝐒𝐂3\mathbf{SC}^{3} loops competing for resources, the optimal CPU frequency is its maximum allowable value, i.e., (f)=fmax(f)^{*}=f_{\max}. As a result, the critical focus in the single-𝐒𝐂3\mathbf{SC}^{3}-loop optimization is the UL&DL configuration,

(PA-2) maxBu,tu,Bd,tdD𝐒𝐂3\displaystyle\max\limits_{B^{u},t^{u},B^{d},t^{d}}D^{\mathbf{SC}^{3}} (16a)
s.t. D𝐒𝐂3min(ρDu,Dd)\displaystyle D^{\mathbf{SC}^{3}}\leqslant\min(\rho D^{u},D^{d}) (16b)
DutuBuru\displaystyle D^{u}\leqslant t^{u}B^{u}r^{u} (16c)
DdtdBdrd\displaystyle D^{d}\leqslant t^{d}B^{d}r^{d} (16d)
tu+αDufmax+tdT\displaystyle t^{u}+\frac{\alpha D^{u}}{f_{\max}}+t^{d}\leqslant T (16e)
Bu+BdBmax\displaystyle B^{u}+B^{d}\leqslant B_{\max} (16f)
Bu0tu0Bd0td0,\displaystyle B^{u}\geqslant 0\ t^{u}\geqslant 0\ B^{d}\geqslant 0\ t^{d}\geqslant 0, (16g)

where the stable condition (15d) is omitted. We test it after solving (PA-2). If the optimization result, (D𝐒𝐂3)(D^{\mathbf{SC}^{3}})^{*} satisfies (15d), we calculate the LQR cost according to (10). Otherwise, the controlled system cannot be stabilized, and the LQR cost is infinite.

Lemma 1:

The optimal UL&DL configuration for an 𝐒𝐂3\mathbf{SC}^{3} loop is to keep a task-level balance, described by the following equation,

ρ(Du)=(Dd).\rho(D^{u})^{*}=(D^{d})^{*}. (17)

The optimal UL&DL time allocation is given by,

(tu)=1ρBuru1ρBuru+αρfmax+1BdrdT\displaystyle(t^{u})^{*}=\frac{\frac{1}{\rho B^{u}r^{u}}}{\frac{1}{\rho B^{u}r^{u}}+\frac{\alpha}{\rho f_{\max}}+\frac{1}{B^{d}r^{d}}}T (18)
(td)=1Bdrd1ρBuru+αρfmax+1BdrdT.\displaystyle(t^{d})^{*}=\frac{\frac{1}{B^{d}r^{d}}}{\frac{1}{\rho B^{u}r^{u}}+\frac{\alpha}{\rho f_{\max}}+\frac{1}{B^{d}r^{d}}}T.

Proof:.

See Appendix A.

From (17), we can see that the task-level balance between UL&DL is to match the task-related information extracted from the raw data transmitted via the UL with the information transmitted via the DL. This balance can be illustrated by the analogy to water pipes. The UL and computing are considered as one pipe, while the DL is another. Just as the maximum water flow through the interconnected pipes is limited by the pipe with the smallest capacity, the optimal solution requires equalizing the capacities of both pipes, as indicated by the equilibrium in (17).

Based on the (17) and (18), we can express the closed-form information as an expression of the bandwidth,

D𝐒𝐂3\displaystyle D^{\mathbf{SC}^{3}} =min{ρ(Du),(Dd)}=ρ(Du)\displaystyle=\min\{\rho(D^{u})^{*},(D^{d})^{*}\}=\rho(D^{u})^{*} (19)
=ρ(tu)Buru=T1ρBuru+αρfmax+1Bdrd.\displaystyle=\rho(t^{u})^{*}B^{u}r^{u}=\frac{T}{\frac{1}{\rho B^{u}r^{u}}+\frac{\alpha}{\rho f_{\max}}+\frac{1}{B^{d}r^{d}}}.

From (19), we observe that D𝐒𝐂3D^{\mathbf{SC}^{3}} is monotonically decreasing with [1ρBuru+αρfmax+1Bdrd][\frac{1}{\rho B^{u}r^{u}}+\frac{\alpha}{\rho f_{\max}}+\frac{1}{B^{d}r^{d}}]. This expression represents the time to transfer or process one-bit task-related information, where [1ρBuru][\frac{1}{\rho B^{u}r^{u}}], [αρfmax][\frac{\alpha}{\rho f_{\max}}], and [1Bdrd][\frac{1}{B^{d}r^{d}}] represent the time for UL, computing, and DL, respectively. Therefore, we move to consider the time-minimization problem as follows:

(PA-3)minBu,Bd\displaystyle\mbox{(PA-3)}\ \ \min\limits_{B^{u},B^{d}}\ \ 1ρBuru+αρfmax+1Bdrd\displaystyle\frac{1}{\rho B^{u}r^{u}}+\frac{\alpha}{\rho f_{\max}}+\frac{1}{B^{d}r^{d}} (20a)
s.t. Bu+BdBmax\displaystyle B^{u}+B^{d}\leqslant B_{\max} (20b)
Bu0Bd0.\displaystyle B^{u}\geqslant 0\ B^{d}\geqslant 0. (20c)
Theorem 1:

The optimal UL&DL bandwidth allocation is given by:

(Bu)\displaystyle(B^{u})^{*} =rdBmaxρru+rd\displaystyle=\frac{\sqrt{r^{d}}B_{\max}}{\sqrt{\rho r^{u}}+\sqrt{r^{d}}} (21a)
(Bd)\displaystyle(B^{d})^{*} =ρruBmaxρru+rd.\displaystyle=\frac{\sqrt{\rho r^{u}}B_{\max}}{\sqrt{\rho r^{u}}+\sqrt{r^{d}}}. (21b)

The optimal closed-loop information and optimal LQR cost are given by:

(D𝐒𝐂3)=T1Bmaxrcomm+1fmaxrcomp(D^{\mathbf{SC}^{3}})^{*}=\frac{T}{\frac{1}{B_{\max}r^{\text{comm}}}+\frac{1}{f_{\max}r^{\text{comp}}}}\\ (22)
(l)={+,(D𝐒𝐂3)log2|det𝐀|nN(𝐯)|det𝐌|1n22n((D𝐒𝐂3)log2|det𝐀|)1+tr(𝚺𝐯𝐒),otherwise,(l)^{*}=\left\{\begin{aligned} &+\infty,\quad\quad\quad\quad\quad\quad\quad\quad\quad(D_{\mathbf{SC}^{3}})^{*}\leqslant\log_{2}|\det\mathbf{A}|\\ &\frac{nN\!\left(\mathbf{v}\right)|\det\mathbf{M}|^{\frac{1}{n}}}{2^{\frac{2}{n}\bigg{(}(D_{\mathbf{SC}^{3}})^{*}-\log_{2}|\det\mathbf{A}|\bigg{)}}-1}+\text{tr}\left(\mathbf{\Sigma}_{\mathbf{v}}\mathbf{S}\right),\text{otherwise,}\\ \end{aligned}\right. (23)

where rcommr^{\text{comm}} denotes the SE of the 𝐒𝐂3\mathbf{SC}^{3} loop, referred to as closed-loop SE, and rcompr^{\text{comp}} denotes the computing efficiency (CE):

rcomm\displaystyle r^{\text{comm}} =ρrurd(ρru+rd)2(bits/s/Hz)\displaystyle=\frac{\rho r^{u}r^{d}}{(\sqrt{\rho r^{u}}+\sqrt{r^{d}})^{2}}\ \text{(bits/s/Hz)} (24a)
rcomp\displaystyle r^{\text{comp}} =ρα(bits/cycle).\displaystyle=\frac{\rho}{\alpha}\ \text{(bits/cycle)}. (24b)

Proof:.

See Appendix B.

From (24a), we can see that the closed-loop SE is jointly determined by the UL&DL SEs. It has the following approximation,

rcomm={min(ρru,rd),ρru>>rdorρru<<rd14ρru,rurd.r^{\text{comm}}=\left\{\begin{aligned} &\min(\rho r^{u},r^{d}),\quad\quad\rho r^{u}>>r^{d}\ \text{or}\ \rho r^{u}<<r^{d}\\ &\frac{1}{4}\rho r^{u},\quad\quad\quad\ \quad\quad r^{u}\simeq r^{d}.\end{aligned}\right. (25)

In fact, ρru\rho r^{u} and rdr^{d} represent the task-level SE of UL&DL, respectively. From (25), we can learn that closed-loop SE is determined by the weak link. A task-level balance of UL&DL SEs is required to ensure a large closed-loop SE.

In addition, from (22), we observe an interesting trade-off between bandwidth and CPU frequency for a given closed-loop performance. This trade-off is achieved by adjusting communication and computing time. For instance, increasing the bandwidth reduces communication time, 1(Bmax+ΔB)rcomm\frac{1}{(B_{\max}+\Delta B)r^{\text{comm}}}, which in turn allows for an increase in computing time, 1(fmaxΔf)rcomp\frac{1}{(f_{\max}-\Delta f)r^{\text{comp}}}, leading to a reduction of the CPU frequency. Consequently, the relationship between ΔB\Delta B and Δf\Delta f can be derived to illustrate how bandwidth and CPU frequency can be exchanged for a given closed-loop performance:

1rcomm(Bmax+ΔB)+1rcomp(fmaxΔf)\displaystyle\frac{1}{r^{\text{comm}}(B_{\max}+\Delta B)}+\frac{1}{r^{\text{comp}}(f_{\max}-\Delta f)} (26)
=1rcommBmax+1rcompfmax,\displaystyle\quad\quad\quad\quad\quad\quad\quad\quad=\frac{1}{r^{\text{comm}}B_{\max}}+\frac{1}{r^{\text{comp}}f_{\max}},
\displaystyle\Rightarrow ΔB=Bmaxrcomprcomm(fmax2ΔfBmaxfmaxBmax)1.\displaystyle\Delta B=\frac{B_{\max}}{\frac{r^{\text{comp}}}{r^{\text{comm}}}(\frac{f_{\max}^{2}}{\Delta fB_{\max}}-\frac{f_{\max}}{B_{\max}})-1}.

From the above expression, we observe that ΔB\Delta B is influenced by the working point of the 𝐒𝐂3\mathbf{SC}^{3} loop, characterized by the bandwidth, CPU frequency, and SE-to-CE ratio, (Bmax,fmax,rcommrcomp)(B_{\max},f_{\max},\frac{r^{\text{comm}}}{r^{\text{comp}}}). With a fixed Δf\Delta f, a large bandwidth is required when BmaxB_{\max} is high, fmaxf_{\max} is low, and rcommrcomp\frac{r^{\text{comm}}}{r^{\text{comp}}} is high, which corresponds to the communication-saturated region.

III-C Multi-𝐒𝐂3\mathbf{SC}^{3}-Loop Optimization

Based on the optimal intra-loop configuration, we move to the inter-loop allocation problem. Using the optimal LQR cost expression (23), (P1) is simplified into the following inter-loop bandwidth and CPU frequency allocation problem:

(PB-1) min,k=1Klk\displaystyle\min\limits_{\mathcal{B},\mathcal{F}}\sum_{k=1}^{K}l_{k} (27a)
s.t. lknN(𝐯k)|det𝐌k|1n22n(Dk𝐒𝐂3log2|det𝐀k|)1+tr(𝚺𝐯k𝐒k),k\displaystyle l_{k}\geqslant\frac{nN\!\left(\mathbf{v}_{k}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{2^{\frac{2}{n}(D^{\mathbf{SC}^{3}}_{k}-\log_{2}|\det\mathbf{A}_{k}|)}-1}+\text{tr}\left(\mathbf{\Sigma}_{\mathbf{v}_{k}}\mathbf{S}_{k}\right),\forall k (27b)
Dk𝐒𝐂3Tk1Bkrkcomm+1fkrkcomp,k\displaystyle D^{\mathbf{SC}^{3}}_{k}\leqslant\frac{T_{k}}{\frac{1}{B_{k}r_{k}^{\text{comm}}}+\frac{1}{f_{k}r_{k}^{\text{comp}}}},\forall k (27c)
Dk𝐒𝐂3>log2|det𝐀k|,k\displaystyle D^{\mathbf{SC}^{3}}_{k}>\log_{2}|\det\mathbf{A}_{k}|,\forall k (27d)
k=1KBkBmax\displaystyle\sum\limits_{k=1}^{K}B_{k}\leqslant B_{\max} (27e)
k=1Kfkfmax\displaystyle\sum\limits_{k=1}^{K}f_{k}\leqslant f_{\max} (27f)
Bk0fk0,k,\displaystyle B_{k}\geqslant 0\ f_{k}\geqslant 0,\forall k, (27g)

where BkB_{k} denotes the bandwidth allocated to the kk-th 𝐒𝐂3\mathbf{SC}^{3} loop and we denote ={Bk}k=1K\mathcal{B}=\{B_{k}\}_{k=1}^{K}. By calculating the second-order derivative of the right-hand side of (27b), it is easy to prove that it is a convex expression of Dk𝐒𝐂3D_{k}^{\mathbf{SC}^{3}}. Thus, the only non-convex constraint in (PB-1) is (27c). To address this, we first transform it into

1Bkrkcomm+1fkrkcompTk1Dk𝐒𝐂3.\frac{\frac{1}{B_{k}r_{k}^{\text{comm}}}+\frac{1}{f_{k}r_{k}^{\text{comp}}}}{T_{k}}\leqslant\frac{1}{D^{\mathbf{SC}^{3}}_{k}}. (28)

Since [1x][\frac{1}{x}] is a convex expression of xx when x>0x>0, we can see that only the right-hand side of (28) does not satisfy the rule of convex optimization. By using the successive convex approximation, we propose an iterative algorithm. The convex optimization problem in the ss-th iteration is given by

(PB-2) min,k=1Klk\displaystyle\ \min\limits_{\mathcal{B},\mathcal{F}}\sum_{k=1}^{K}l_{k} (29a)
s.t. lknN(𝐯k)|det𝐌k|1n22n(Dk𝐒𝐂3log2|det𝐀k|)1+tr(𝚺𝐯k𝐒k),k\displaystyle l_{k}\geqslant\frac{nN\!\left(\mathbf{v}_{k}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{2^{\frac{2}{n}(D^{\mathbf{SC}^{3}}_{k}-\log_{2}|\det\mathbf{A}_{k}|)}-1}+\text{tr}\left(\mathbf{\Sigma}_{\mathbf{v}_{k}}\mathbf{S}_{k}\right),\forall k (29b)
1Bkrkcomm+1fkrkcompTk2(Dk𝐒𝐂3)s1Dk𝐒𝐂3((Dk𝐒𝐂3)s1)2,k\displaystyle\frac{\frac{1}{B_{k}r_{k}^{\text{comm}}}+\frac{1}{f_{k}r_{k}^{\text{comp}}}}{T_{k}}\leqslant\frac{2(D^{\mathbf{SC}^{3}}_{k})^{s-1}-D^{\mathbf{SC}^{3}}_{k}}{\big{(}(D^{\mathbf{SC}^{3}}_{k})^{s-1}\big{)}^{2}},\forall k (29c)
(27d)(27g),\displaystyle\eqref{27d}-\eqref{27g},

where the right side of (29c) is the Taylor expansion of [1Dk𝐒𝐂3]\big{[}\frac{1}{D^{\mathbf{SC}^{3}}_{k}}\big{]} at the result obtained in the (s1)(s-1)-th iteration, (Dk𝐒𝐂3)s1(D^{\mathbf{SC}^{3}}_{k})^{s-1}. We summarize the proposed iterative algorithm in Algorithm 1. The convergence of the algorithm is proved in Appendix C.

Algorithm 1 Iterative Algorithm for Goal-Oriented Closed-Loop Optimization Scheme
0:  The number of the 𝐒𝐂3\mathbf{SC}^{3} loops, KK, and the iteration terminating threshold, δ\delta. Control related parameters: nn, log2|det𝐀k|\log_{2}|\det\mathbf{A}_{k}|, 𝐁k\mathbf{B}_{k}, 𝐐k\mathbf{Q}_{k}, 𝐑k\mathbf{R}_{k}, TkT_{k}, and Σ𝐯k\Sigma_{\mathbf{v}_{k}};Communication related parameters: rkur^{u}_{k}, rkdr^{d}_{k}, and BmaxB_{\max};Computing related parameters: αk\alpha_{k}, ρk\rho_{k}, fmaxf_{\max};
1:  Calculate 𝐒k\mathbf{S}_{k} and 𝐌k\mathbf{M}_{k} according to (11);
2:  Calculate the closed-loop SE and CE for each 𝐒𝐂3\mathbf{SC}^{3} loop according to (24);
3:  Initialization: s=0s=0 and (Dk𝐒𝐂3)0=log2|det𝐀k|+1,k(D^{\mathbf{SC}^{3}}_{k})^{0}=\log_{2}|\det\mathbf{A}_{k}|+1,\forall k;
4:  repeat
5:     s=s+1s=s+1;
6:     Solve (PB-2) to obtain (Bk)s(B_{k})^{s}, (fk)s(f_{k})^{s}, and (Dk𝐒𝐂3)s(D^{\mathbf{SC}^{3}}_{k})^{s};
7:  until |k=1K(lk)sk=1K(lk)s1|k=1K(lk)s1δ\frac{\absolutevalue{\sum\limits_{k=1}^{K}(l_{k})^{s}-\sum\limits_{k=1}^{K}(l_{k})^{s-1}}}{\sum\limits_{k=1}^{K}(l_{k})^{s-1}}\leqslant\delta for (P3)
8:  Calculate the optimal UL&DL bandwidth allocation for each 𝐒𝐂3\mathbf{SC}^{3} loop according to (21);
9:  Calculate the optimal time allocation for each 𝐒𝐂3\mathbf{SC}^{3} loop according to (18);
9:  The UL&DL bandwidth, time, and CPU frequency of KK 𝐒𝐂3\mathbf{SC}^{3} loops: (u)(\mathcal{B}^{u})^{*}, (d)(\mathcal{B}^{d})^{*}, (𝒯u)(\mathcal{T}^{u})^{*}, (𝒯d)(\mathcal{T}^{d})^{*}, and ()(\mathcal{F})^{*}.

Next, we derive the approximate closed-form solution for the inter-loop bandwidth allocation. We assume that the CPU frequency is sufficiently adequate such that the computing time becomes negligible compared to the communication time, 1Bkrkcomm+1fkrkcomp1Bkrkcomm\frac{1}{B_{k}r_{k}^{\text{comm}}}+\frac{1}{f_{k}r_{k}^{\text{comp}}}\approx\frac{1}{B_{k}r_{k}^{\text{comm}}}. On this basis, the LQR cost can be approximated as follows:

lknN(𝐯k)|det𝐌k|1n22n(TkBkrkcommlog2|det𝐀k|)+tr(𝚺𝐯k𝐒k),l_{k}\approx\frac{nN\!\left(\mathbf{v}_{k}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{2^{\frac{2}{n}(T_{k}B_{k}r_{k}^{\text{comm}}-\log_{2}|\det\mathbf{A}_{k}|)}}+\text{tr}\left(\mathbf{\Sigma}_{\mathbf{v}_{k}}\mathbf{S}_{k}\right), (30)

where the term [1-1] in the denominator is omitted from its original expression (23), under the assumption that the system operates in the assured-to-be-stable region, i.e., TkBkrkcommlog2|det𝐀k|T_{k}B_{k}r_{k}^{\text{comm}}\gg\log_{2}|\det\mathbf{A}_{k}|. Using (30), (PB-1) is simplified into a convex bandwidth allocation problem,

(PB-3)min\displaystyle\mbox{(PB-3)}\ \min\limits_{\mathcal{B}}\ k=1KnN(𝐯k)|det𝐌k|1n22n(TkBkrkcommlog2|det𝐀k|)\displaystyle\sum_{k=1}^{K}\frac{nN\!\left(\mathbf{v}_{k}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{2^{\frac{2}{n}(T_{k}B_{k}r_{k}^{comm}-\log_{2}|\det\mathbf{A}_{k}|)}} (31a)
s.t. k=1KBkBmax\displaystyle\sum\limits_{k=1}^{K}B_{k}\leqslant B_{\max} (31b)
Bk0,k,\displaystyle B_{k}\geqslant 0,\forall k, (31c)

where tr(𝚺𝐯k𝐒k)\text{tr}\left(\mathbf{\Sigma}_{\mathbf{v}_{k}}\mathbf{S}_{k}\right) is omitted as it does not influence the allocation results. The stable condition is also omitted as in the assure-to-be-stable region.

Theorem 2:

The optimal bandwidth allocation to (PB-3) is given by

(Bk)=n2rkcommTk×\displaystyle(B_{k})^{*}=\frac{n}{2r^{\text{comm}}_{k}T_{k}}\times (32)
(i=1,ikKn2ricommTi[(ekei)+log2(rkcommTkricommTi)]+Bmaxi=1Kn2ricommTi),\displaystyle\bigg{(}\frac{\sum\limits_{i=1,i\neq k}^{K}\frac{n}{2r^{\text{comm}}_{i}T_{i}}[(e_{k}-e_{i})+\log_{2}(\frac{r^{\text{comm}}_{k}T_{k}}{r^{\text{comm}}_{i}T_{i}})]+B_{\max}}{\sum\limits_{i=1}^{K}\frac{n}{2r^{\text{comm}}_{i}T_{i}}}\bigg{)},

where eke_{k} denotes the control-related parameter,

eklog2(N(𝐯k))+2nlog2|det𝐀k|.e_{k}\triangleq\log_{2}(N(\mathbf{v}_{k}))+\frac{2}{n}\log_{2}|\det\mathbf{A}_{k}|. (33)

Proof:.

See Appendix D.

We can learn from (32) that bandwidth allocation is influenced by both the communication parameter, rkcommr_{k}^{\text{comm}}, and the control parameter, eke_{k}. The 𝐒𝐂3\mathbf{SC}^{3} loop with poor communication performance (smaller rcommr^{\text{comm}}) or controlling a more unstable system (larger eke_{k}) is allocated more bandwidth. This shows that this inter-loop bandwidth allocation is fairness-minded, which balances the control processes across different 𝐒𝐂3\mathbf{SC}^{3} loops.

Refer to caption
Figure 3: The closed-loop SE varying with the task-level SEs of UL&DL. The left subfigure illustrates the case of imbalanced task-level SEs between UL&DL, and the right figure illustrates the balanced case. The red arrow and black arrow indicate the steepest and slowest directions to improve the closed-loop SE.

IV Simulation Results and Discussion

In this section, we present the simulation results and discussion. We consider an unmanned robotic system composed of K=4K=4 𝐒𝐂3\mathbf{SC}^{3} loops. The channel noise variance is σ2=107\sigma^{2}=-107 dBm [44], and the large-scale fading coefficients, gug_{u} and gdg_{d}, are calculated using the path-loss model given in (5), where fc=2f_{c}=2 GHz, and UL&DL distances are set as dku=[1,1.5,2,2.5]d^{u}_{k}=[1,1.5,2,2.5] km and dkd=[3,3.5,4,5]d^{d}_{k}=[3,3.5,4,5] km, respectively. The small-scale fading is randomly generated following 𝒞𝒩(0,1)\mathcal{CN}(0,1) [44]. The UL&DL transmit power is adjusted to maintain a constant received SNR, i.e., |hku|2pkuσ2=gkuσ2\frac{|h^{u}_{k}|^{2}p^{u}_{k}}{\sigma^{2}}=\frac{g^{u}_{k}}{\sigma^{2}} and |hkd|2pkdσ2=gkdσ2\frac{|h^{d}_{k}|^{2}p^{d}_{k}}{\sigma^{2}}=\frac{g^{d}_{k}}{\sigma^{2}}. Accordingly, we can calculate the UL&DL SEs by (3), i.e, rku=[10.5,9.9,9.5,9.2]r^{u}_{k}=[10.5,9.9,9.5,9.2] bits/s/Hz and rkd=[12.2,12.0,11.8,11.6]r^{d}_{k}=[12.2,12.0,11.8,11.6] bits/s/Hz. The computing-related parameters are set as fmax=2f_{\max}=2 GHz, ρk=0.01\rho_{k}=0.01, k\forall k, and αk=[100,200,1000,50]\alpha_{k}=[100,200,1000,50] (cycles/bit). The control-related parameters are configured as n=100n=100, log|det𝐀k|=[10,20,30,40]\log|\det\mathbf{A}_{k}|=[10,20,30,40], 𝐑=𝟎100\mathbf{R}=\mathbf{0}_{100}, 𝐐=𝐈100\mathbf{Q}=\mathbf{I}_{100} [7], and Tk=T=10T_{k}=T=10 ms, k\forall k. The iteration termination threshold is set as δ=0.001\delta=0.001, and the optimization tool is CVX [45]. Unless otherwise stated, these parameters are used throughout the results below.

IV-A Single-𝐒𝐂3\mathbf{SC}^{3}-Loop Simulation

In Fig. 3, we present the relationships between UL&DL SEs and the closed-loop SE, as described in (25). In the left figure, we set the information extraction ratio as ρ=0.01\rho=0.01, which creates the unbalance of UL&DL SEs at the task level. In this case, the closed-loop SE is constrained by the UL. As indicated by the red and black arrows, the most effective way to enhance the closed-loop SE is by improving the UL SE, while improving the DL SE provides little improvement. In contrast, the right figure illustrates the case where the information extraction ratio is set as ρ=1\rho=1, resulting in relatively balanced task-level UL&DL SEs. In this case, the most effective way to enhance the closed-loop SE is to simultaneously improve UL&DL SEs. It is noted that, in practice, the raw data transmitted via the UL often contain redundant and irrelevant information, leading the information extraction ratio a very small number, ρ1\rho\ll 1. An enhanced UL is usually required for keeping the task-level balance between UL&DL.

In Fig. 4, we present the LQR cost under different UL&DL configurations. Here, we compare the proposed scheme with two classical schemes: equal allocation and proportional allocation.

  • Equal allocation: The bandwidth is equally divided for UL&DL like FDD, Bd=Bu=Bmax2B^{d}=B^{u}=\frac{B_{\max}}{2}.

  • Proportional allocation: The UL&DL bandwidth is proportional allocated per the information extraction ratio, Bu=11+ρBmaxB^{u}=\frac{1}{1+\rho}B_{\max} and Bd=ρ1+ρBmaxB^{d}=\frac{\rho}{1+\rho}B_{\max}.

In above two schemes, the DL transmission time is set as td=T3t^{d}=\frac{T}{3}, and the remaining time is adjusted between UL and computing by letting the UL transmitted information rightly processed by computing, i.e., tu+αDufmax=2T3t^{u}+\frac{\alpha D^{u}}{f_{\max}}=\frac{2T}{3}. The maximal bandwidth is set as Bmax=500B_{\max}=500 kHz, and the CPU frequency is set as fmax=0.5f_{\max}=0.5 GHz. Fig. 4 is a dual-axis chart with the left side representing the task-related information and the right side representing the LQR cost. From the bar, we can see that, under the proposed scheme, the UL&DL are aligned to transmit the same amount of task-related information, while the other two schemes fail to achieve this balance. Their weak ULs constrain the control performance of the 𝐒𝐂3\mathbf{SC}^{3} loop, leading to the high LQR cost (shown by the black curve). In addition, we can observe that the LQR cost is higher with more degree of UL&DL imbalance, indicating the importance of keeping task-level UL&DL balance within the 𝐒𝐂3\mathbf{SC}^{3} loop.

Refer to caption
Figure 4: The task-related information and LQR cost under three UL&DL configuration schemes.

In Fig. 5, we illustrate the interchange relationships between bandwidth and CPU frequency. This figure shows the required bandwidth in exchange for 1 MHz CPU frequency under different working points of the 𝐒𝐂3\mathbf{SC}^{3} loop, described by the bandwidth, CPU frequency, and SE-to-CE ratio, i.e., (BB, ff,rcommrcomp\frac{r^{\text{comm}}}{r^{\text{comp}}}). The color gradient represents the amount of required bandwidth, increasing as the color shifts from blue to yellow. The figure shows that in the communication-saturated region, more bandwidth is required compared to the communication-limited region. For example, at the working point of (1MHz,2GHz,5×104)(1\text{MHz},2\text{GHz},5\times 10^{4}), the required bandwidth is ΔB=12.6kHz\Delta B=12.6\ \text{kHz}, whereas at (2MHz,1GHz,105)(2\text{MHz},1\text{GHz},10^{5}), the required bandwidth is ΔB=500kHz\Delta B=500\ \text{kHz}, with an increase of forty-fold. This indicates the marginal effect, that the effectiveness of additional bandwidth diminishes as the 𝐒𝐂3\mathbf{SC}^{3} loop approaches the communication-saturated region.

Refer to caption
Figure 5: The required communication bandwidth to exchange 11 MHz computing CPU frequency varies with (BB,ff,rcommrcomp\frac{r^{\text{comm}}}{r^{\text{comp}}}).

IV-B Multi-𝐒𝐂3\mathbf{SC}^{3}-Loop Simulation

Refer to caption
Figure 6: The number of iterations of the proposed iterative algorithm under 100 random simulations.

In Fig. 6, we provide the convergence performance of the proposed iterative algorithm. In this simulation, we randomly generate UL&DL distances within the range of [0.5,5][0.5,5] km, the maximum bandwidth is set as Bmax=1B_{\max}=1 MHz. The results show that, across all 100 simulations, the proposed algorithm consistently requires only 4 or 5 iterations to converge.

Refer to caption
Figure 7: The LQR cost varies with the bandwidth under different allocation schemes.

In Fig. 7 we compare the proposed scheme with a TDD-mode optimization scheme [33] and three separate schemes, with each focused on a part of the 𝐒𝐂3\mathbf{SC}^{3} loop. For fair comparisons, we consider these schemes to be goal-oriented by taking the LQR cost as the objective.

  • TDD-Mode Optimization Scheme [33]: This scheme uses TDD to access four 𝐒𝐂3\mathbf{SC}^{3} loops. Each loop is allocated with an equal time slot, Tk=T4=2.5T_{k}=\frac{T}{4}=2.5 ms, and exclusively uses bandwidth and CPU frequency resources in this slot. It optimizes the UL&DL, and computing time for each 𝐒𝐂3\mathbf{SC}^{3} loop.

  • UL&Computing Optimization Scheme: This scheme optimizes UL transmission and computing, while the DL parameters are fixed as Bkd=Bmax2K,kB^{d}_{k}=\frac{B_{\max}}{2K},\forall k and tkd=1ms,kt^{d}_{k}=1\ \text{ms},\forall k.

  • DL&Computing Optimization Scheme [34]: This scheme optimizes DL transmission and computing, with the UL parameters fixed at Bku=Bmax2K,kB^{u}_{k}=\frac{B_{\max}}{2K},\forall k and tku=4ms,kt^{u}_{k}=4\text{ms},\forall k.

  • UL&DL Optimization Scheme: This scheme optimizes UL&DL transmission, with the CPU frequency fixed at fk=fmaxK,kf_{k}=\frac{f_{\max}}{K},\forall k.

It can be observed that the proposed scheme achieves the lowest LQR cost compared to the other four schemes. In the bandwidth-limited region, the DL&Computing Optimization Scheme [34] performs the worst. This is because the fixed UL is the bottleneck, which largely determines the 𝐒𝐂3\mathbf{SC}^{3}-loop performance: the data transmitted via the UL are the data processed by computing, which in turn determines the accuracy of the command transmitted via the DL. Conversely, in the bandwidth-adequate region, the TDD-Mode Optimization Scheme and UL&DL Optimization Scheme perform poorly. This is because these two schemes constrain the inter-loop adjustment, negatively affecting the balance of the control progress across different 𝐒𝐂3\mathbf{SC}^{3} loops. This highlights the advantage of treating the 𝐒𝐂3\mathbf{SC}^{3} loop as an integrated structure and jointly configuring resources within and across the 𝐒𝐂3\mathbf{SC}^{3} loops.

Refer to caption
Figure 8: The LQR cost varies with the bandwidth under the goal-oriented and communication-oriented schemes.

In Fig. 8, we compare the proposed goal-oriented scheme with two communication-oriented schemes.

  • Communication-Oriented Max-Sum Rate Scheme: This scheme maximizes the sum of the closed-loop information, i.e., maxk=1KDk𝐒𝐂3\max\sum\limits_{k=1}^{K}{D^{\mathbf{SC}^{3}}_{k}}.

  • Communication-Oriented Max-Min Rate Scheme: This scheme maximizes the minimal closed-loop information, i.e., maxminkDk𝐒𝐂3\max\min\limits_{k}{D^{\mathbf{SC}^{3}}_{k}}.

These two communication-oriented schemes can be solved using a similar iterative algorithm by replacing the objective of the LQR cost with the sum-rate and min-rate objective, i.e., maxk=1KDk𝐒𝐂3\max\sum\limits_{k=1}^{K}D^{\mathbf{SC}^{3}}_{k} and maxminkDk𝐒𝐂3\max\min\limits_{k}D^{\mathbf{SC}^{3}}_{k}, and convert the LQR constraint (29b) into a closed-loop-information constraint,

Dk𝐒𝐂3n2log2(nN(𝐯𝐤)|det𝐌k|1nlktr(𝚺𝐤𝐒𝐤)+1)+log2|det𝐀k|.D^{\mathbf{SC}^{3}}_{k}\geqslant\frac{n}{2}\log_{2}(\frac{nN\!\left(\mathbf{v_{k}}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{l_{k}-\text{tr}(\mathbf{\mathbf{\Sigma}_{k}\mathbf{S}_{k}})}+1)+\log_{2}|\det\mathbf{A}_{k}|. (34)

In this simulation, we set the LQR cost requirement in (34) as lk=5,kl_{k}=5,\forall k. From the figure we can see that, the Communication-Oriented Max-Sum Rate Scheme performs the worst. This is because this scheme disproportionately allocates the most resources to the 𝐒𝐂3\mathbf{SC}^{3} loops with the highest SE and CE, amplifying the imbalance among different 𝐒𝐂3\mathbf{SC}^{3} loops. As the bandwidth increases, this bias intensifies, leading the LQR cost of other 𝐒𝐂3\mathbf{SC}^{3} loops to rise sharply, resulting in the increase of the sum LQR cost. In addition, we can observe that, when Bmax1.4B_{\max}\geqslant 1.4 MHz, the LQR cost reaches its maximum and remains unchanged under the Communication-Oriented Max-Sum Rate Scheme. In this region, the control performance of the 𝐒𝐂3\mathbf{SC}^{3} loops diverges into two extremes: the LQR cost of the 𝐒𝐂3\mathbf{SC}^{3} loops with the highest SE or CE approaches its minimal value, while the LQR cost of the remaining 𝐒𝐂3\mathbf{SC}^{3} loops barely meets the basic requirement as given in (34). Conversely, the Communication-Oriented Max-Min Rate Scheme performs similarly to the proposed scheme. They have a small performance gap, which is because the Max-Min Rate Scheme prioritizes the rate balance while overlooking the differences of controlled systems. The good performance of the Max-Min Rate Scheme and the proposed scheme indicates the importance of keeping balance across different 𝐒𝐂3\mathbf{SC}^{3} loops.

Refer to caption
Figure 9: The LQR cost under the approximate closed-form solution given in (32) and the optimal solution solved by CVX.

Fig. 9 compares the approximate closed-form solution for the inter-loop bandwidth allocation (32) with the optimal solution obtained by CVX. We can see that the LQR costs under the approximate closed-form solution and the optimal solution exhibit a small gap in the bandwidth-limited region, and this gap rapidly approaches zero as the bandwidth increases. This demonstrates the accuracy of the approximate closed-form solution, particularly when the system has sufficient communication and computing resources.

Furthermore, we show the bandwidth allocation principles by comparing the proposed goal-oriented scheme with two communication-oriented schemes in Fig. 10. The maximal bandwidth is set as Bmax=1B_{\max}=1 MHz. In the top subfigure, we set the four 𝐒𝐂3\mathbf{SC}^{3} loops with different intrinsic entropy, log2|det𝐀k|=[10,20,100,200]\log_{2}|\det\mathbf{A}_{k}|=[10,20,100,200], and equal SE, rkcomm=0.1r^{\text{comm}}_{k}=0.1 bits/s/Hz, k\forall k. It can be seen that the proposed scheme allocates more bandwidth to the 𝐒𝐂3\mathbf{SC}^{3} loops with higher intrinsic entropy, whereas two communication-oriented schemes allocate bandwidth equally. This is because the communication-oriented schemes focus on the data rate, and as a result, they are unable to perceive the stability differences of the controlled systems. In the bottom subfigure, we set the four 𝐒𝐂3\mathbf{SC}^{3} loops with different SEs, rkcomm=[0.08,0.10,0.12,0.14]r^{\text{comm}}_{k}=[0.08,0.10,0.12,0.14] bits/s/Hz, and equal intrinsic entropy, log2|det𝐀k|=20,k\log_{2}|\det\mathbf{A}_{k}|=20,\ \forall k. In this case, the Max-Sum Rate Scheme disproportionately allocates the most resources to the 𝐒𝐂3\mathbf{SC}^{3} loop with the highest SE (loop 4), leaving other 𝐒𝐂3\mathbf{SC}^{3} loops with minimal resources to satisfy the LQR-cost constraint (34). In contrast, both the proposed scheme and the Max-Min Rate Scheme allocate more bandwidth to the 𝐒𝐂3\mathbf{SC}^{3} loops with lower SEs, aiming to achieve the task-level and rate-level balance, respectively. This shows that the proposed scheme is fairness-minded. Instead of over-resourcing the strong 𝐒𝐂3\mathbf{SC}^{3} loop at the expense of others, it maintains the task-level balance across 𝐒𝐂3\mathbf{SC}^{3} loops to ensure the control performance of the whole unmanned robotic system.

Refer to caption
Figure 10: The bandwidth allocation ratio under three different schemes. The top subfigure shows the bandwidth allocation ratio under different intrinsic entropy and the bottom subfigure shows the bandwidth allocation ratio under different closed-loop SEs.

V Conclusions

In this paper, we have investigated an unmanned robotic system formed by the reflex-arc-like 𝐒𝐂3\mathbf{SC}^{3} loops. We have proposed a goal-oriented closed-loop optimization scheme that jointly configures UL&DL bandwidth, time, and CPU frequency to improve the control performance of the system. We have derived closed-form solutions for the UL&DL bandwidth and time allocation within the 𝐒𝐂3\mathbf{SC}^{3} loop and proposed an iterative algorithm to optimize the inter-loop bandwidth and CPU frequency allocation. Under the condition of adequate CPU frequency availability, we have also derived the approximate closed-form solution for the inter-loop bandwidth allocation. We have shown that the superiority of the proposed scheme lies in achieving a two-tier task-level balance within and across the 𝐒𝐂3\mathbf{SC}^{3} loops. We believe that such a structured design—taking the 𝐒𝐂3\mathbf{SC}^{3} loop as an integrated structure—will promote the development of unmanned robotic systems in 6G.

Appendix A Proof of Lemma 1

In (PA-2), the optimal values of D𝐒𝐂3D^{\mathbf{SC}^{3}}, DuD^{u}, and DdD^{d} are their maximum value allowed. As a result, the equality in constraints (16b)–(16d) must hold at the optimal solution,

(D𝐒𝐂3)=min{ρ(Du),(Dd)}(D^{\mathbf{SC}^{3}})^{*}=\min\{\rho(D^{u})^{*},(D^{d})^{*}\} (35)

where

(Du)=tuBuru,(Dd)=tdBdrd.(D^{u})^{*}=t^{u}B^{u}r^{u},\ (D^{d})^{*}=t^{d}B^{d}r^{d}. (36)

If ρ(Du)(Dd)\rho(D^{u})^{*}\neq(D^{d})^{*} at the optimal solution, taking ρ(Du)>(Dd)\rho(D^{u})^{*}>(D^{d})^{*} as an example, we thus have (D𝐒𝐂3)=min{ρ(Du),(Dd)}=(Dd)(D^{\mathbf{SC}^{3}})^{*}=\min\{\rho(D^{u})^{*},(D^{d})^{*}\}=(D^{d})^{*}. In this case, (Dd)(D^{d})^{*} can be improved by reallocating UL time to the DL as long as ρ(Du)>(Dd)\rho(D^{u})^{*}>(D^{d})^{*}. This improves the objective by

td(Dd)(D𝐒𝐂3),t^{d}\uparrow\ \rightarrow(D^{d})^{*}\uparrow\rightarrow(D^{\mathbf{SC}^{3}})^{*}\uparrow, (37)

which contradicts the assumption that (D𝐒𝐂3)(D^{\mathbf{SC}^{3}})^{*} is optimal. Similarly, if ρ(Du)<(Dd)\rho(D^{u})^{*}<(D^{d})^{*}, we can use the similar reasoning to show that (D𝐒𝐂3)(D^{\mathbf{SC}^{3}})^{*} can be improved. Therefore, neither ρ(Du)>(Dd)\rho(D^{u})^{*}>(D^{d})^{*} nor ρ(Du)<(Dd)\rho(D^{u})^{*}<(D^{d})^{*} hold, meaning that at the optimal solution ρ(Du)=(Dd)\rho(D^{u})^{*}=(D^{d})^{*}.

Furthermore, based on ρ(Du)=(Dd)\rho(D^{u})^{*}=(D^{d})^{*}, we have ρtuBuru=tdBdrd\rho t^{u}B^{u}r^{u}=t^{d}B^{d}r^{d}. The optimal time for DL transmission and computing can be expressed as a function of the optimal time for UL transmission,

(td)=ρ(tu)BuruBdrd,(tcomp)=α(tu)Buruf.(t^{d})^{*}=\frac{\rho(t^{u})^{*}B^{u}r^{u}}{B^{d}r^{d}},\ (t^{\text{comp}})^{*}=\frac{\alpha(t^{u})^{*}B^{u}r^{u}}{f}. (38)

In addition, since more time enables transmitting and processing more information, thereby increasing D𝐒𝐂3D^{\mathbf{SC}^{3}}, the cycle-time constraint (16e) must be satisfied as an equality at the optimal solution,

(tu)+αDuf+(td)=T.(t^{u})^{*}+\frac{\alpha D^{u}}{f}+(t^{d})^{*}=T. (39)

Then by substituting (38) into (39), we obtain the optimal expression of the UL transmission time,

(tu)+αtuBuruf+ρ(tu)BuruBdrd=T\displaystyle(t^{u})^{*}+\frac{\alpha t^{u}B^{u}r^{u}}{f}+\frac{\rho(t^{u})^{*}B^{u}r^{u}}{B^{d}r^{d}}=T \displaystyle\Rightarrow (40)
(tu)=1ρBuru1ρBuru+αρf+1BdrdT.\displaystyle(t^{u})^{*}=\frac{\frac{1}{\rho B^{u}r^{u}}}{\frac{1}{\rho B^{u}r^{u}}+\frac{\alpha}{\rho f}+\frac{1}{B^{d}r^{d}}}T.

Based on (tu)(t^{u})^{*}, we can further obtain (td)(t^{d})^{*} and (tcomp)(t^{\text{comp}})^{*} by substituting (40) into (38).

Appendix B Proof of Theorem 1

In (PA-3), the objective is monotonically decreasing with the UL&DL bandwidth. Therefore, the bandwidth constraint (20b) must be satisfied as an equality at the optimal solution,

(Bu)+(Bd)=Bmax.(B^{u})^{*}+(B^{d})^{*}=B_{\max}. (41)

We let (Bd)=Bmax(Bu)(B^{d})^{*}=B_{\max}-(B^{u})^{*} and substitute it to the objective. By calculating the first-order derivative of the objective and setting it to zero, we derive the optimal closed-form solution for the bandwidth allocation as follows:

Bu[1ρBuru+αρfmax+1(BmaxBu)rd]=0\displaystyle\frac{\partial}{\partial B^{u}}\bigg{[}\frac{1}{\rho B^{u}r^{u}}+\frac{\alpha}{\rho f_{\max}}+\frac{1}{(B_{\max}-B^{u})r^{d}}\bigg{]}=0 (42)
\displaystyle\Rightarrow 1ρ(Bu)2ru+1(BmaxBu)2rd=0\displaystyle-\frac{1}{\rho(B^{u})^{2}r^{u}}+\frac{1}{(B_{\max}-B^{u})^{2}r^{d}}=0
\displaystyle\Rightarrow (Bu)=rdBmaxρru+rd.\displaystyle(B^{u})^{*}=\frac{\sqrt{r^{d}}B_{\max}}{\sqrt{\rho r^{u}}+\sqrt{r^{d}}}.

Then, it is easy to further get (Bd)(B^{d})^{*} according to (41). By substituting (Bu)(B^{u})^{*} and (Bd)(B^{d})^{*} into (19) and (10), we further get the optimal expression of the closed-form information, (D𝐒𝐂3)(D^{\mathbf{SC}^{3}})^{*}, and LQR cost, (l)(l)^{*}.

Appendix C Proof of the convergence of Algorithm 1

We prove the convergence of the proposed algorithm by proving this optimization process leads to a non-increasing objective. We first prove that the solution in the (s1)(s-1)-th iteration is a feasible solution in the ss-th iteration.

From convenience, we introduce a function to express the constraint (29c) in (PB-2),

G(Bk,fk,Dk𝐒𝐂3)1Bkrcomm+1fkrcompTk1Dk𝐒𝐂3.G(B_{k},f_{k},D^{\mathbf{SC}^{3}}_{k})\triangleq\frac{\frac{1}{B_{k}r^{\text{comm}}}+\frac{1}{f_{k}r^{\text{comp}}}}{T_{k}}-\frac{1}{D^{\mathbf{SC}^{3}}_{k}}. (43)

Denote the results obtained in the ss-th iteration as {(Bk)s,(fk)s,(Dk𝐒𝐂3)s,(lk)s,k}\{(B_{k})^{s},(f_{k})^{s},(D^{\mathbf{SC}^{3}}_{k})^{s},(l_{k})^{s},\forall k\}. The constraint (29c) in the ss-th iteration can be expressed as

G(Bk,fk,Dk𝐒𝐂3|(Dk𝐒𝐂3)s1)0,G(B_{k},f_{k},D^{\mathbf{SC}^{3}}_{k}|(D^{\mathbf{SC}^{3}}_{k})^{s-1})\geqslant 0, (44)

where G(Bk,fk,Dk𝐒𝐂3|(Dk𝐒𝐂3)s1)G(B_{k},f_{k},D^{\mathbf{SC}^{3}}_{k}|(D^{\mathbf{SC}^{3}}_{k})^{s-1}) represents the Taylor expansion of G(Bk,fk,Dk𝐒𝐂3)G(B_{k},f_{k},D^{\mathbf{SC}^{3}}_{k}) at (Dk𝐒𝐂3)s1(D^{\mathbf{SC}^{3}}_{k})^{s-1}. Since [1x][-\frac{1}{x}] is a concave expression for xx when x>0x>0, its Taylor expansion is greater than or equal to the original value. Therefore, we have the following inequalities:

G((Bk)s1,(fk)s1,(Dk𝐒𝐂3)s1|(Dk𝐒𝐂3)s1)\displaystyle G((B_{k})^{s-1},(f_{k})^{s-1},(D^{\mathbf{SC}^{3}}_{k})^{s-1}|(D^{\mathbf{SC}^{3}}_{k})^{s-1}) (45)
=\displaystyle= G((Bk)s1,(fk)s1,(Dk𝐒𝐂3)s1)\displaystyle G((B_{k})^{s-1},(f_{k})^{s-1},(D^{\mathbf{SC}^{3}}_{k})^{s-1})
\displaystyle\geqslant G((Bk)s1,(fk)s1,(Dk𝐒𝐂3)s1|(Dk𝐒𝐂3)s2)\displaystyle G((B_{k})^{s-1},(f_{k})^{s-1},(D^{\mathbf{SC}^{3}}_{k})^{s-1}|(D^{\mathbf{SC}^{3}}_{k})^{s-2})
\displaystyle\geqslant 0.\displaystyle 0.

This shows that {(Bk)s1,(fk)s1,(Dk𝐒𝐂3)s1}\{(B_{k})^{s-1},(f_{k})^{s-1},(D^{\mathbf{SC}^{3}}_{k})^{s-1}\} is a feasible solution in the ss-th iteration. As a result, k=1K(lk)s1\sum\limits_{k=1}^{K}(l_{k})^{s-1} is an achievable objective in the ss-th iteration. Since in the ss-th iteration, {(Bk)s,(fk)s,(Dk𝐒𝐂3)s}\{(B_{k})^{s},(f_{k})^{s},(D^{\mathbf{SC}^{3}}_{k})^{s}\} is the optimal solution, it satisfies that k=1K(lk)sk=1K(lk)s1\sum\limits_{k=1}^{K}(l_{k})^{s}\leqslant\sum\limits_{k=1}^{K}(l_{k})^{s-1}. According to the monotone bounded theorem, the proposed iterative algorithm is assured to be convergent.

Appendix D Proof of Theorem 2

(PB-3) is a convex optimization problem and satisfies the Slater condition, which guarantees strong duality. As a result, the optimal solution to the dual problem is the same as that of the primal problem. Therefore, we solve the dual problem of (PB-3) to obtain the closed-form solution for the bandwidth. The dual problem is formulated as follows:

(PB-4)maxλmin\displaystyle\mbox{(PB-4)}\ \max\limits_{\lambda}\min\limits_{\mathcal{B}} k=1KnN(𝐯k)|det𝐌k|1n22n(TkBkrkcommlog2|det𝐀k|)\displaystyle\sum_{k=1}^{K}\frac{nN\!\left(\mathbf{v}_{k}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{2^{\frac{2}{n}(T_{k}B_{k}r_{k}^{\text{comm}}-\log_{2}|\det\mathbf{A}_{k}|)}}
+λ(k=1KBkBmax)\displaystyle\quad\quad+\lambda(\sum\limits_{k=1}^{K}B_{k}-B_{\max}) (46a)
s.t. λ0,\displaystyle\lambda\geqslant 0, (46b)

where λ\lambda is the Lagrange multiplier. The Karush-Kuhn-Tucker (KKT) condition of (PB-4) is given by

Bk[k=1KnN(𝐯k)|det𝐌k|1n22n(TkBkrkcommlog2|det𝐀k|)\displaystyle\frac{\partial}{\partial B_{k}}\bigg{[}\sum\limits_{k=1}^{K}\frac{nN\!\left(\mathbf{v}_{k}\right)|\det\mathbf{M}_{k}|^{\frac{1}{n}}}{2^{\frac{2}{n}(T_{k}B_{k}r_{k}^{\text{comm}}-\log_{2}|\det\mathbf{A}_{k}|)}}
+λ(k=1KBkBmax)]=0\displaystyle\quad\quad\quad\quad\quad+\lambda(\sum\limits_{k=1}^{K}B_{k}-B_{\max})\bigg{]}=0 (47a)
k=1KBkBmax=0\displaystyle\sum\limits_{k=1}^{K}B_{k}-B_{\max}=0 (47b)
λ(k=1KBkBmax)=0\displaystyle\lambda(\sum\limits_{k=1}^{K}B_{k}-B_{\max})=0 (47c)
λ0,\displaystyle\lambda\geqslant 0, (47d)

where the constraint (47b) is an equality since the available bandwidth must be fully utilized at the optimal solution. By calculating (47a), the optimal bandwidth is expressed as a function of λ\lambda,

(Bk)=n2Tkrkcommlog2(2In2N(𝐯k)|det𝐀k|2nTkrkcommλ).(B_{k})^{*}=\frac{n}{2T_{k}r_{k}^{\text{comm}}}\log_{2}(\frac{2\mbox{In}2N(\mathbf{v}_{k})|\det\mathbf{A}_{k}|^{\frac{2}{n}}T_{k}r_{k}^{comm}}{\lambda}). (48)

We further substitute (48) into (47b) to get the following expression of the Lagrange multiplier,

log2(λ)=\displaystyle\log_{2}(\lambda)= (49)
i=1Kn2Tiricommlog2(2In2N(𝐯i)|det𝐀i|2nTiricomm)Bmaxi=1Kn2ricommTi.\displaystyle\frac{\sum\limits_{i=1}^{K}\frac{n}{2T_{i}r_{i}^{\text{comm}}}\log_{2}(2\text{In}2N(\mathbf{v}_{i})|\det\mathbf{A}_{i}|^{\frac{2}{n}}T_{i}r_{i}^{\text{comm}})-B_{\max}}{\sum\limits_{i=1}^{K}\frac{n}{2r_{i}^{\text{comm}}T_{i}}}.

By back-substituting the above expression into (48), we thus obtain the closed-form solution for the inter-loop bandwidth allocation, as given in (32) in Theorem 2.

References

  • [1] E. A. Lee, “The past, present and future of cyber-physical systems: A focus on models,” Sensors, vol. 15, no. 3, pp. 4837-4869, Feb. 2015.
  • [2] H. Chen “Applications of cyber-physical system: A literature review,” J. Ind. Integr. Manage., vol. 2, no. 3, pp. 1750012, Qct. 2017.
  • [3] P. Jain, P. K. Aggarwal, P. Chaudhary et al., “Convergence of IoT and CPS in robotics,” Emergence of Cyber Physical System and IoT in Smart Automation and Robotics, Cham, Springer Int. Publ., 2021.
  • [4] H. Lyu, J. Yan, J. Zhang, Z. Pang, G. Yang, and A. J. Isaksson, “Cloud–fog automation: Heterogenous applications over new-generation infrastructure of virtualized computing and converged networks,” IEEE Ind. Electron. Mag., Early Access, Jun. 2024.
  • [5] J. Jin, K. Yu, J. Kua, N. Zhang, Z. Pang, and Q. -L. Han, “Cloud-fog automation: Vision, enabling technologies, and future research directions,” IEEE Trans. Ind. Inf., vol. 20, no. 2, pp. 1039-1054, Feb. 2024.
  • [6] R. Mariappan, P. V. Narayana Reddy, and C. Wu, “Cyber physical system using intelligent wireless sensor actuator networks for disaster recovery,” in Proc. 2015 Int. Conf. Comput. Intell. Commun. Netw. (CICN), Jabalpur, India, 2015, pp. 95-99.
  • [7] X. Fang, W. Feng, Y. Chen, N. Ge, and G. Zheng, “Control-oriented deep space communications for unmanned space exploration,” IEEE Trans. Wireless Commun., Early Access, Jun. 2024.
  • [8] X. Fang, W. Feng, T. Wei, Y. Chen, N. Ge, and C. -X. Wang, “5G embraces satellites for 6G ubiquitous IoT: Basic models for integrated satellite terrestrial networks,” IEEE Internet Things J., vol. 8, no. 18, pp. 14399-14417, Sep. 2021.
  • [9] W. Feng, Y. Lin, Y. Wang, J. Wang, Y. Chen, N. Ge, S. Jin, and H. Zhu, “Radio map-based cognitive satellite-UAV networks towards 6G on-demand coverage,” IEEE Trans. Cognit. Commun. Netw., vol. 10, no. 3, pp. 1075-1089, Jun. 2024.
  • [10] C. Lei, W. Feng, P. Wei, Y. Chen, N. Ge, and S. Mao, “Edge information hub: Orchestrating satellites, UAVs, MEC, sensing and communications for 6G closed-loop controls,” IEEE J. Sel. Areas Commun., Early access, Sep. 2024.
  • [11] D. Jones, C. Snider, A. Nassehi, et al., “Characterising the digital twin: A systematic literature review,” CIRP J. Manuf. Sci. Technol., vol.29, pp. 36-52, May 2020.
  • [12] A. Rijnberk and H. W. (Eds.) De Vries, “Medical history and physical examination in companion animals,” Springer Science & Business Media, 1995.
  • [13] C. E. Shannon, “A mathematical theory of communication,” The Bell Sys. Tech. J., vol. 27, no. 3, pp. 379-423, Jul. 1948.
  • [14] N. Wiener, “Cybernetics: Or control and communication in the animal and the machine,” MIT press, 2019.
  • [15] W. Feng, Y. Wang, Y. Chen, N. Ge, and C.-X. Wang, “Structured satellite-UAV-terrestrial networks for 6G Internet of Things,” IEEE Netw., vol. 38, no. 4, pp. 48-54, Jul. 2024.
  • [16] P. Park, S. Coleri Ergen, C. Fischione, C. Lu, and K. H. Johansson, “Wireless network design for control systems: A survey,” IEEE Commun. Surv. Tutorials, vol. 20, no. 2, pp. 978-1013, Q2nd 2018.
  • [17] Y. Wang, S. Wu, C. Lei, J. Jiao, and Q. Zhang, “A review on wireless networked control system: The communication perspective,” IEEE Internet Things J., vol. 11, no. 5, pp. 7499-7524, Mar. 2024.
  • [18] S. Tatikonda and S. Mitter, “Control under communication constraints,” IEEE Trans. Autom. Control, vol. 49, no. 7, pp. 1056-1068, Jul. 2004.
  • [19] V. Kostina and B. Hassibi, “Rate-cost tradeoffs in control,” IEEE Trans. Autom. Control, vol. 64, no. 11, pp. 4525-4540, Nov. 2019.
  • [20] D. Baumann, F. Mager, M. Zimmerling, and S. Trimpe, “Control-guided communication: Efficient resource arbitration and allocation in multi-hop wireless control systems,” IEEE Control Sys. Lett., vol. 4, no. 1, pp. 127-132, Jan. 2020.
  • [21] K. Gatsis, A. Ribeiro, and G. J. Pappas, “Optimal power management in wireless control systems,” IEEE Trans. Autom. Control, vol. 59, no. 6, pp. 1495-1510, Jun. 2014.
  • [22] X. Wang, C. Chen, J. He, S. Zhu, and X. Guan, “AoI-aware control and communication co-design for industrial IoT systems,” IEEE Internet Things J., vol. 8, no. 10, pp. 8464-8473, May 2021.
  • [23] C. Lei, W. Feng, J. Wang, S. Jin, and N. Ge, “Control-oriented power allocation for integrated satellite-UAV networks,” IEEE Wireless Commun. Lett., vol. 12, no. 5, pp. 883-887, May 2023.
  • [24] B. Chang, L. Zhang, L. Li, G. Zhao, and Z. Chen, “Optimizing resource allocation in URLLC for real-time wireless control systems,” IEEE Trans. Veh. Technol., vol. 68, no. 9, pp. 8916-8927, Sep. 2019.
  • [25] H. Yang, K. Zhang, K. Zheng, and Y. Qian, “Leveraging linear quadratic regulator cost and energy consumption for ultrareliable and low-latency IoT control systems,” IEEE Internet Things J., vol. 7, no. 9, pp. 8356-8371, Sep. 2020.
  • [26] K. Bhimavarapu, Z. Pang, O. Dobrijevic, and P. Wiatr, “Unobtrusive, accurate, and live measurements of network latency and reliability for time-critical internet of things,” IEEE Internet Things Mag., vol. 5, no. 3, pp. 38-43, Sep. 2022.
  • [27] H. Lyu, Z. Pang, K. Bhimavarapu, and G. Yang, “Impacts of wireless on robot control: The network hardware-in-the-loop simulation framework and real-life comparisons,” IEEE Trans. Ind. Inf., vol. 19, no. 9, pp. 9255-9265, Sep. 2023.
  • [28] H. Lyu, Z. Pang, A. Bengtsson, S. Nilsson, A. J. Isaksson, and G. Yang, “Latency-aware control for wireless cloud-fog automation: Framework and case study,” IEEE Trans. Autom. Sci. Eng., Early Access, Jul. 2024.
  • [29] J. Liu and Q. Zhang, “Offloading schemes in mobile edge computing for ultra-reliable low latency communications,” IEEE Access, vol. 6, pp. 12825-12837, Feb. 2018.
  • [30] L. Ferdouse, A. Anpalagan, and S. Erkucuk, “Joint communication and computing resource allocation in 5G cloud radio access networks,” IEEE Trans. Veh. Technol., vol. 68, no. 9, pp. 9122-9135, Sep. 2019.
  • [31] C.-L. Chen, C. G. Brinton, and V. Aggarwal, “Latency minimization for mobile edge computing networks,” IEEE Trans. Mob. Comput., vol. 22, no. 4, pp. 2233-2247, Apr. 2023.
  • [32] X. Cao, F. Wang, J. Xu, R. Zhang, and S. Cui, “Joint computation and communication cooperation for energy-efficient mobile edge computing,” IEEE Internet Things J., vol. 6, no. 3, pp. 4188-4200, Jun. 2019.
  • [33] W. Wen, Y. Fu, T. Q. S. Quek, F. -C. Zheng, and S. Jin, “Joint uplink/downlink sub-channel, bit and time allocation for multi-access edge computing,” IEEE Commun. Lett., vol. 23, no. 10, pp. 1811-1815, Oct. 2019.
  • [34] Z. Jian, W. Muqing, and Z. Min, “Joint computation offloading and resource allocation in C-RAN with MEC based on spectrum efficiency,” IEEE Access, vol. 7, pp. 79056-79068, Jun. 2019.
  • [35] S. Li, S. Lin, L. Cai, W. Li, and G. Zhu, “Joint resource allocation and computation offloading with time-varying fading channel in vehicular edge computing,” IEEE Trans. Veh. Technol., vol. 69, no. 3, pp. 3384-3398, Mar. 2020.
  • [36] Z. Wang, X. Mu, Y. Liu, X. Xu, and P. Zhang, “NOMA-aided joint communication, sensing, and multi-tier computing systems,” IEEE J. Sel. Areas Commun., vol. 41, no. 3, pp. 574-588, Mar. 2023.
  • [37] D. Wen et al., “Task-oriented sensing, computation, and communication integration for multi-device edge AI,” IEEE Trans. Wireless Commun., vol. 23, no. 3, pp. 2486-2502, Mar. 2024.
  • [38] A. M. Girgis, H. Seo, J. Park, and M. Bennis, “Semantic and logical communication-control codesign for correlated dynamical systems,” IEEE Internet Things J., vol. 11, no. 7, pp. 12631-12648, Apr. 2024.
  • [39] J. Shao, Y. Mao, and J. Zhang, “Learning task-oriented communication for edge inference: An information bottleneck approach,” IEEE J. Sel. Areas Commun., vol. 40, no. 1, pp. 197-211, Jan. 2022.
  • [40] A. Mostaani, T. X. Vu, H. Habibi, S. Chatzinotas, and B. Ottersten, “Task-oriented communication design at scale,” IEEE Trans. Commun., Early Access, Jun. 2024.
  • [41] L. B. Prasad, B. Tyagi, and H. O. Gupta, “Optimal control of nonlinear inverted pendulum dynamical system with disturbance input using PID controller & LQR,” in Proc. 2011 IEEE Int. Conf. Control Sys., Comput. Eng., Penang, Malaysia, 2011, pp. 540-545.
  • [42] R. K. Mallik, M. Z. Win, J. W. Shao, M.-S. Alouini, and A. J. Goldsmith, “Channel capacity of adaptive transmission with maximal ratio combining in correlated Rayleigh fading,” IEEE Trans. Wireless Commun., vol. 3, no. 4, pp. 1124-1133, Jul. 2004.
  • [43] M. Liu, S. Fang , H. Dong et al., “Review of digital twin about concepts, technologies, and industrial applications,” J. Manuf. Syst., vol. 58, pp. 346-361, Jun. 2021.
  • [44] X. Fang et al., “NOMA-based hybrid satellite-UAV-terrestrial networks for 6G maritime coverage,” IEEE Trans. Wireless Commun., vol. 22, no. 1, pp. 138-152, Jan. 2023.
  • [45] M. C. Grant and S. P. Boyd, “The CVX users’ guide,” Jan. 2020, [Online], Available:https://cvxr.com/cvx/doc/CVX.pdf.