Tracking Control of Nonlinear Networked and Quantized Control Systems with Communication Delays ††thanks: This work was supported by National Natural Science Foundation of China, under Grant 61773357.
Abstract
This paper studies the tracking control problem of nonlinear networked and quantized control systems (NQCSs) with communication delays. The desired trajectory is generated by a reference system. The communication network is to guarantee the information transmission among the plant, the reference system and the controller. The communication network also brings about some undesired issues like time-varying transmission intervals, time-varying transmission delays, packet dropouts, scheduling and quantization effects, which lead to non-vanishing network-induced errors and affect the tracking performances. As a result, we develop a general hybrid system model for NQCSs with all aforementioned issues. Based on the Lyapunov approach, sufficient conditions are established to guarantee the stability of the tracking error with respect to the non-vanishing network-induced errors. The obtained conditions lead to a tradeoff between the maximally allowable transmission interval and the maximally allowable delay. Furthermore, the existence of Lyapunov functions satisfying the obtained conditions is studied. For specific time-scheduling protocols (e.g., Round-Robin protocol and Try-Once-Discard protocol) and quantizers (e.g., zoom quantizer and box quantizer), Lyapunov functions are constructed explicitly. Finally, a numerical example is presented to demonstrate the developed theory.
Index Terms:
Lyapunov functions, networked control systems, quantized control, tracking control, time-scheduling protocols.I Introduction
Because of fast development and widespread application of digital network technologies, networked control systems (NCSs) have attracted attention in the control community over the past decades; see [1, 2, 3, 4, 5]. The presence of the network offers considerable advantages over the traditional feedback control systems in terms of simplicity and flexibility in installation and maintenance, low cost and convenient resource sharing. On the other hand, the introduction of the limited-capacity network also induces many issues. The network-induced issues can be grouped into five types as follows [6, 7, 8, 9]: time-varying transmission intervals; time-varying transmission delays; quantization errors; packet dropouts (caused by the unreliability of the network); and communication constraints (caused by the sharing of the network by multiple nodes and the fact that only one node is allowed to transmit its packet per transmission). Therefore, system modelling, stability analysis and controller design are fundamental problems for NCSs. Based on different modeling approaches and analysis methods, many results have been obtained in the literature. For instance, both system modelling and stability analysis have been studied in [10, 9, 11, 8, 12], and stabilizing controllers have been developed in [6, 13, 14, 15].
However, as another fundamental problem in control theory, tracking control has seldom been studied for NCSs; see [16, 14, 17, 18]. The main objective of tracking control is to design appropriate controller such that the considered system can track a given reference trajectory as close as possible; see [19, 20, 21]. In the tracking control, the controller consists of two parts [22, 16]: the feedforward part to induce the reference trajectory in the whole system, and the feedback part to ensure the stabilization of the considered system and the convergence to the reference trajectory. Compared with stability analysis, the tracking control problem is well recognized to be more general and more difficult [23, 14]. In addition, due to the presence of the network, the aforementioned network-induced issues have great impacts on the tracking performance. For instance, both quantization and time-varying transmission delays result in the feedforward error; the communication constraints and limited capacity of the network deteriorate the tracking performance. Therefore, only approximate tracking can be achieved [16]. For instance, the approximate tracking control problem has been studied in [16] for sampled-data systems, and in [18] for NCSs with time-varying transmission intervals and delays via the emulation-like approach as in [9, 11]. However, observe from all the previous works that only parts of the aforementioned issues are studied, which motivates us to study this topic further.
In this paper, we study the tracking control problem for nonlinear networked and quantized control systems (NQCSs) with communication delays, which are nonlinear NCSs with all the aforementioned issues. To this end, a unified hybrid model in the formalism of [24, 25] is developed for the tracking control of NQCSs with communication delays based on the emulation-like approach as in [10, 8, 9], which is our first contribution. We aim at proposing a high fidelity model that is amenable to controller design and tracking performance analysis. To achieve this, all aforementioned network-induced issues are studied, including time-varying transmission intervals; time-varying transmission delays and quantization errors; packet dropouts and communication constraints. In addition, a general quantizer is proposed to recover most types of the quantizers in previous works [26, 27, 28, 8]. As a result, the proposed hybrid model extends those in previous works [14, 18, 16, 8, 9] on stability analysis and tracking control of NCSs.
Our second contribution is to establish sufficient conditions to guarantee the convergence of the tracking error with respect to network-induced errors using the Lyapunov-based approach. To this end, some reasonable assumptions are provided, which are different from those in [9] for stability analysis of NCSs. With these assumptions, We derive the tradeoff between the maximally allowable transmission interval (MATI) and the maximally allowable delay (MAD) to guarantee that the tracking error converges to the origin up to some errors due to the aforementioned network-induced errors. These network-induced errors not only leads to the main difference from the scenario of stabilizing an equilibrium point, but also results in additional technical difficulties in tracking performance analysis. Note that the obtain results are also available for the scenario of stabilizing an equilibrium point. In addition, the tradeoff depends on the applied communication protocol, and thus allows for the comparison of different protocols.
Since the assumptions we adopt are different from those for stability analysis, it is necessary to verify the existence of Lyapunov functions satisfying these assumptions, which is the third contribution of this paper. The construction of Lyapunov functions is presented explicitly based on the quantization-free and delay-free case in [18], the quantization-free case [9] and the delay-free cases in [8, 10]. In addition, for different time-scheduling protocols and quantizers, specific Lyapunov functions are established. In the construction of Lyapunov functions, we also show how to reduce the effects of the network-induced errors on the tracking performance through the implementation of the controller and the design of the time-scheduling protocol.
A preliminary version of this work has been presented in the conference paper [29] where the zoom quantizer is considered and the reference trajectory is required to be convergent. The current paper extends the approach to consider general NQCSs with a more general quantizer and no constraints on the reference trajectory. In addition, Lyapunov functions is constructed explicitly in this paper. Therefore, the result of [29] is recovered as a particular case.
This paper is organized as follows. Preliminaries are presented in Section II. In Section III, the tracking problem is formulated and a unified system model is developed. The Lyapunov-based conditions are obtained in Section V to guarantee the convergence of the tracking error and the tradeoff between the MATI and the MAD. The existence of Lyapunov functions is studied in Section VI. In Section VII, the developed results are illustrated by a numerical example. Conclusions and further researches are stated in Section VIII.
II Preliminaries
Basic definitions and notation are presented in this section. ; ; ; ; . Given two sets and , . Given a constant and a set , . A set is symmetric if for all . stands for Euclidean norm; denotes the supremum norm of a function on an interval and denotes the supremum norm in the case of , where is the given initial time. For the vectors , for simplicity of notation and denotes the usual inner product. represents the identity matrix of dimension , and denotes the block diagonal matrix made of the square matrices and . The symbols and denote separately ‘and’ and ‘or’ in logic. denotes the hypercubic box centered at with edges of length . for a given function . A function is of class if it is continuous, , and strictly increasing; it is of class if it is of class and unbounded. A function is of class if is of class for each fixed and decreases to zero as for each fixed . A function is of class if is of class for each fixed and of class for each fixed .
The basic concepts of hybrid systems are introduced as follows; see [24] for the details. Consider hybrid systems of the form:
(1) |
where is the system state, is the external input, is the flow map, is the jump map, is the flow set and is the jump set. For the hybrid system (1), the following basic assumptions are given [24]: the sets are closed; is continuous on ; and is continuous on .
A subset is a compact hybrid time domain if for some finite sequence of times . is a hybrid time domain if for all , is a compact hybrid time domain. For all , denote (or ) if (or ). A function is a hybrid input if is Lebesgue measurable and locally essentially bounded for each . A function is a hybrid arc if is locally absolutely continuous for each . The hybrid arc and the hybrid input are a solution pair to (1) if: i) and ; ii) for all and almost all such that , and ; iii) for all such that , and . A solution pair to (1) is maximal if it cannot be extended, and it is complete if is unbounded. Let be a hybrid input with as initial hybrid time, we define where denotes the set of all such that . Denote by the set of all maximal solution pairs to the system (1) with and finite .
III Problem Formulation
In this section, the tracking control problem for NQCSs with communication delays is formulated using the emulation approach as proposed in [11, 10].
III-A Tracking Problem of NQCSs
Consider the nonlinear system of the form
(2) |
where is the system state, is the control input, and is the system output. The reference system tracked by the system (2) is of the form:
(3) |
where is the reference state (), is the feedforward control input, and is the reference output (). Assume that the reference system (3) has a unique solution for any initial condition and any input.
To track the reference system, the controller, which is designed for (2) in the absence of the network, is given by
(4) |
where is the feedforward item, and is the feedback item. The feedback item is from the nonlinear feedback controller given below:
(5) |
where is the feedback controller state, is the feedback controller output. Observe from (5) that the feedback controller depends on the difference between the outputs and , which is different from the cases studied in previous works [10, 8, 11, 9, 18] where the feedback controller depends on the outputs and . The feedback controller of the form (5) can be found in the literature [20, 16]. In addition, denote for the sake of convenience.
Assume that and are continuous; and are continuously differentiable. The objective of this paper is to implement the designed controller over the network, as illustrated in Fig. 1, and to demonstrate that under reasonable assumptions, the assumed tracking performance of the system (2)-(5) will be preserved for the NQCS.
III-B Information Transmission over Quantizer and Network
At the transmission times , , (part of) the outputs of the plant, the reference system and the controller are sampled, quantized and transmitted through the communication network. The communication network is used to guarantee the information transmission among the sensors, the controller and the actuators. Based on the band-limited network and the spatial location of the sensors and actuators [30], we group the sensors and actuators into nodes connecting the network. Correspondingly, the transmitted information is partitioned into parts. At each , one and only one node is allowed to access to the network, which is determined by time-scheduling protocols; see also [7, 8, 11] and Subsection VI-A. The transmission times are strictly increasing, and the transmission intervals are defined as , . Due to computation and data coding, the information can not be transmitted instantaneously; see [31, 32]. As a result, there exist transmission delays , , such that the controller and actuators receive the transmitted information at the arrival times , . For both and , , the following assumption is adopted; see also [9, Assumption II.1].
Assumption 1
There exist constants and such that and for all .
In Assumption 1, and are called the maximally allowable transfer interval (MATI) and the maximally allowable delay (MAD), respectively. implies that there are no Zeno solutions for the closed-loop system; see [8, Assumption 1], [32]. Assumption 1 guarantees that each transmitted information arrives before the next sampling, which is called the small delay case; see [33, 9].
Remark 1
As aforementioned, to match the limited transmission capacity of the network, and are quantized before they are transmitted via the network. Each node has a quantizer, which is a piecewise continuous function , where is a finite or countable set and . The quantizer has a quantization parameter and satisfies the following assumption, which is a generalization of those in [34, 26, 28].
Assumption 2
For each , there exist nonempty symmetric sets and a constant such that , the origin is contained in and for all ,
(6) | ||||
(7) | ||||
(8) |
In Assumption 2, is defined as the quantization error. For each , is the union of all the quantization regions; is the set of all the (possible) quantization errors; is the deadzone of the quantizer. Condition (6) gives a bounded region on the quantization error if the quantizer does not saturate. Condition (7) provides an approach to detect the possible saturation. Note that the constant is related to the sizes of the sets and . If the signal is so small, then condition (8) implies that it is reasonable to quantize such signal as zero. Two special quantizers will be studied in Subsections VI-C and VI-D. On the other hand, assume that the quantizer is applied synchronously on both sides of the network; otherwise, see [35] for more details.
Remark 2
The applied quantizer is a dynamic quantizer due to the quantization parameter. Because of the applied dynamic quantizer, the feedback control is of the form (5) such that is driven to converge. If the reference trajectory is convergent, then the convergence point of the reference trajectory can be set as the origin in the applied quantizer. In this case, we can relax the feedback controller (5) as the following form:
(9) |
That is, the controller depends on the outputs and , which is similar to the cases in previous works [10, 8, 11, 9, 18]. In this case, the system modelling and tracking performance analysis in this paper can be proceeded along the similar fashion with a slight modification; see also [29, 18].
Remark 3
The quantizer satisfying Assumption 2 is an extension of zoom quantizer in [28] (see also Subsection VI-C) and includes many types of quantizers in the existing works [27, 36, 26, 33]. For instance, for the uniform quantizer in [27, 28], is constant, , and , where . For the zoom quantizer [31, 28], is time-varying, , and , where . For the box quantizer in [8, 26], , and , where is the estimate of and is a given constant. Note that for all the preceding quantizers and is a small constant.
All the quantization parameters in nodes are combined as , and then the overall quantizer is defined as
The quantization parameter evolves according to a hybrid dynamics, which will be given later. The quantized measurements are defined as , and . Correspondingly, the quantization errors are , and . Denote .
The quantized measurements are transmitted via the network and received at arrival times , . In the following, we use the variables and respectively denote the networked versions of and . Therefore, the plant (2) receives , which is the networked version of the control input ; the reference system (3) receives ; and the feedback controller (5) receives . In addition, the errors induced by the quantizer and the network are defined as , and . After the reception of the quantized measurements at arrival times, the received measurements are updated with the latest quantized measurements as follows.
where , and are the update functions, and depend on the time-scheduling protocol that determines which node is granted to access to the network; see also Subsection VI-A.
In the arrival intervals, the received measurements are assumed to be operated in zero-order hold (ZOH) fashion, i.e., for all , ,
(10) |
Therefore, at the arrival times , , the error is updated as follows.
(11) |
where , and . In (III-B), the third “” holds due to ZOH device and . Similarly,
where is an auxiliary variable to ensure that the update of is of the form (III-B). The variable is related to because .
Remark 4
In this paper, the ZOH technique is required in (10). The reason lies in the existence of time delays. For the time-delay case (see also [16, 37, 9]), the ZOH technique leads to the fact that , which is applied in (III-B). For the delay-free case (see also [11, 8, 18]), such a technique is not required, and the generation of in (10) can be more flexible.
Similar to the evolution of the received measurements, the quantized measurements are operated in ZOH fashion on and updated at , , with the update of . The evolution of is given as follows.
(12) | ||||
(13) |
where is an evolution function and is an update function that depends on the time-scheduling protocol.
Remark 5
The evolution of the quantization parameter is analogous to those in [38, 8, 37]. That is, is time-varying in continuous intervals and updated at discrete-time instants. If is time-invariant in and only updated at the arrival times, then in and . This scenario is similar to the case in [37]. However, is updated at the arrival times in this paper instead of at the transmission times in all the previous works [38, 8]. Similar case can be found in [37], where there are two zoom parameters (the one is in the coder side and the other is in the decoder side) being updated at the arrival times.
Since there are some errors induced by the quantizer and the network, the following assumption is used to guarantee that the quantizer does not saturate; see [37, 8].
Assumption 3
The bound of the initial state is assumed to be known a priori. The quantization parameter is such that the quantization error is bounded.
Assumption 3 ensures that the system state is in the quantization regions, which further implies that the time-scheduling protocol is Lyapunov uniformly globally exponentially stable [9, 10, 11]. This assumption is enforced easily for linear systems [8, 26], and reasonable due to the extensive study on quantized control in the literature. For instance, the bound of the initial state is obtained by an initial zooming-out stage, where the quantization parameter increases such that the state is captured by the quantization regions; see [31, 34]. The bound of the quantization error can be obtained for linear systems in [31] and for nonlinear systems in [39].
Remark 6
In previous works [34] without Assumption 3, the quantization mechanism with zooming-out stage is implemented. The goal of the zooming-out stage is to bound the system state in finite time by increasing the quantization parameter. However, since the quantization errors are increasing in the zooming-out stage, the time-scheduling protocol is not Lyapunov uniformly globally asymptotically stable (UGAS); see [9, 10, 11]. As a result, the stability analysis in this paper can not be applied directly in this case.
IV Development of System Model
According to the analysis for information transmission in Subsection III-B, we construct an impulsive model and further a unified hybrid model for the tracking control problem of NQCSs in this section. To this end, the objective of this paper is first transformed to establish the convergence of towards in the presence of the quantizer and network. To measure the convergence of towards , define the tracking error and the error , where . Combining all the variables and analyses in Subsection III-B, the resulting system model, denoted by , is presented as the following impulsive system.
All the functions in are derived by detailed calculations and assumed to be continuous. See Appendix for the detailed expressions of all the functions appear in .
Remark 7
The impulsive model is general enough to include the one in [18]. If the feedback controller (9) is applied, then a similar impulsive model can be obtained along the same fashion. In addition, if the reference system (3) is removed, then is reduced to a general model for NQCSs with communication delays. In this case, extends those developed in [8, 9] by combining all the network-induced issues and casts a new light on stability analysis for NQCSs with communication delays.
Now, our objective is to establish sufficient conditions to guarantee ISS of the system from to . Here, is the network-induced errors, and not necessarily vanishing with the time line; see [16, 18]. For specific quantizers and time-scheduling protocols, the effects of can be attenuated, which will be discussed in Section VI.
IV-A Reformulation of System Model
To facilitate stability analysis, the system model is further transformed into a hybrid system by the similar mechanism proposed in [25] and employed in [9, 37, 10, 18]. To this end, some auxiliary variables are introduced. For the sake of convenience, define the augmented state and the augmented error , where and . For the update at the arrival times , , the variables and are used to store the information and , respectively. In addition, denote and . The variable is a timer to compute both transmission intervals and transmission delays, and is a variable to count the transmission event. The variable is a logical variable to show whether the next event is a transmission event or an update event. That is, the existence of is to make sure that the update event is prior to the next sampling.
Based on above auxiliary variables, the resulting hybrid system, denoted by , is presented below. The hybrid system has two part. The first part is flow equation, which is given by
(14) |
To simplify the notation, denote and . The second part is the jump equation: . The jump equation also contains two parts for different time instants: the transmission jump equation for the transmission instants , , is given by
(15) |
and the update jump equation for the arrival instants , , is given by
(16) |
Note that for the jump equations (IV-A)-(IV-A), we have that holds, where the constant is given in Assumption 2.
IV-B Hybrid Model of NQCSs
In view of Subsection IV-A, we further write the system into the formalism as in [24, 25]. Denote . The hybrid system can be rewritten as
(17) |
where and . The mapping in (17) is defined as
(18) |
and the mapping in (17) is defined as
(19) |
where with corresponds to a transmission jump (IV-A); and with corresponds to the update jump (IV-A).
For the hybrid model , the sets and in (17) are closed, and the flow map in (18) is continuous due to the continuity assumptions on and . The jump map in (19) is continuous and locally bounded by continuity of and . As a result, the hybrid model satisfies the basic assumptions given in Section II; see also [32, 24, 25].
V Stability Analysis
In this section, the main results are presented. Sufficient conditions are derived to guarantee ISS from to . Before we state the main results, some assumptions are required. For the -subsystem in flow equation (18) and the jump equation (19), the following two assumptions are satisfied.
Assumption 4
There exist a function which is locally Lipschitz in for all , and such that for all ,
(20) | ||||
(21) | ||||
(22) | ||||
(23) |
Assumption 5
For each , there exist a continuous function , and such that for all and almost all ,
(24) |
In Assumptions 4-5, the function is used to analyze the stability of -subsystem. Assumption 4 is to estimate the jumps of at the discrete-time instants, i.e., the transmission times and the arrival times. Assumption 5 is to estimate the derivative of in the continuous-time intervals. Since Assumptions 4-5 are applied to the -subsystem, (4)-(5) hold with respect to the additional item , which are parts of . As a result, Assumptions 4-5 are different from the classic assumptions like Condition IV.1 in [9] and Assumption 1 in [10], where the external disturbances are involved. Moreover, and in Assumption 4 are allowed to be the same. For instance, (4)-(4) hold with , respectively. On the other hand, similar conditions to Assumptions 4-5 have been considered in previous works [38, 18]. However, external disturbances have been studied in [38], whereas is part of the augmented error in Assumptions 4-5. Both quantization and transmission delays have not been considered in [18], and however are studied in this paper. The construction of satisfying Assumptions 4-5 will be presented in Section VI.
Assumption 6
There exist a locally Lipschitz function , , and constants for , such that for all ,
(25) |
and for all and almost all ,
(26) |
where is defined in Assumption 5.
Assumption 6 is a robust stability property of the closed-loop system (2)-(5), and the function is used to analyze the stability of the -subsystem; see [18]. Observe from (6) that is treated as the external input of the -subsystem, which relaxes the standard assumptions in [37, 9, 8]. In addition, Assumption 6 implies that the designed controller leads the -subsystem (i.e., the tracking error dynamics) to have ISS-like property from to . Moreover, Assumption 6 also indicates that the -subsystem is -stable from to ; see [11, Theorem 4] and [9, Remark V.2]. In Section VII, a numerical example is presented to demonstrate how to verify Assumptions 4-6.
Although the transmission intervals and the transmission delays are bounded in Assumption 1, the tradeoff between and needs to be studied further. Consider the following differential equations
(27) |
where , and are given in Assumptions 5-6. In addition, , and , where is given in Assumption 4. Based on Claim 1 in [10] and Claim 1 in [18], the solutions to (6) are strictly decreasing as long as , .
Now we are in the position to state the main result of this section. Its proof is based on the comparison principle [24, Lemma C.1] for hybrid systems and the proof of Theorem IV. 2 in [9]. However, some essential modifications are required to deal with the effects of the networked-induced errors.
Theorem 1
Proof:
Consider the hybrid system in (17). For , define the following Lyapunov function:
(30) |
Using (20), (21) and (25), it follows that
According to (28), there exist such that
(31) |
where,
Next, consider the evolution of in the continuous-time intervals and at the discrete-time instants, respectively. For the flow equation in (18), we have that111 is used here with a slight abuse of terminology since is not differential almost everywhere. However, this is justified by the fact that and in (14).
(32) |
where, the first “=” holds due to the definition of the flow equation; the first “” holds because of the functions in (27) and Assumptions 5-6; the second “” holds due to the fact that for all and . In addition, with .
For the jump equation in (19), there are two cases based on the values of the variable . For the case ,
(33) |
where, the first “=” holds due to the definition of the jump equation; the first “” holds due to Assumption 4; the second “” holds due to the fact that for all and ; the third “” holds due to the inequality (28a). In addition, . Similarly, for the case ,
(34) |
where .
Integrating and iterating (35)-(36) from to in the hybrid time domain, one has
(37) |
where is given in Assumption 1. From (31) and (V), we have
Thus, the system is ISS from to with
where the definition of comes from the fact that (see also [10, Section V-A]), and is given in Assumption 1. As a result, the proof is completed. ∎
Remark 8
In Theorem 1, (28a)-(28b) for the MATI and the MAD are different from those in [10, 18, 9]. For the delay-free and quantization-free case, the formula of the MATI was given explicitly in [18, Assumption 4]. In fact, the MATI in [18] is the same as the one in [10], and is the solution to the equation , where . Such equation has the similar form as (27). As a result, the delay-free and quantization-free case in [18] is recovered as a particular case of this paper.
Note that if and are respectively lower bounded by the functions of and , then the system is ISS from to along the similar line as in the proof of Theorem 1. In addition, according to Theorem 1, the following corollary is an direct consequence, and hence the proof is omitted here.
Corollary 1
If all the assumptions in Theorem 1 are satisfied with , , and , where , then the system is EISS from to .
In Theorem 1, the tracking error is established to converge to the region around of the origin. The radius of such a region is related to the ISS nonlinear gain , which is the function of the norm of , respectively. In the following, we further study the ISS gains obtained in Theorem 1, and develop the relation among the ISS nonlinear gain in (1), the MATI , and the MAD .
Proposition 1
Proof:
Following the same line as in the proof of Theorem 1, we have with the following form
Since in (31), we obtain that . For , define the constant with certain positive definitive functions . It holds from the definitions of the functions and in (35)-(36) that
(38) |
where and the fourth “” holds because of the following two facts [40]: for all and , (i) ; (ii) there exist such that . Using such two facts several times, there exist a strictly decreasing function , a positive definitive function and such that . Therefore, the proof is completed. ∎
Remark 9
From the proofs of Theorem 1 and Proposition 1, the norm and the function are related to the MATI and the MAD . Since ZOH devices are applied, the bound on can be established via a step-by-step sampling approach; see [16, Section 4.1]. Thus, the upper bound on can also be obtained. In addition, the function is related to the minimum inter-transmission interval . From (V), increases to as . That is, the larger is, the smaller is. Due to the existence of in all practical networks, the effects of on can not be avoided but be limited by choosing appropriate networks, thereby leading to the minimum of .
Observe from Theorem 1 and Proposition 1 that the conservatism of the obtained results comes from the ISS gain . We would like to obtain the ISS gains as small as possible, which in turn implies better tracking performance. If the feedforward input is transmitted to the reference system directly, then and . In addition, the Lyapunov function satisfying Assumptions 4-5 is constructed in Section VI, and , which thus reduces the conservatism of the obtained results. On the other hand, if the reference trajectory is bounded, we would like to guarantee the boundedness of . For this case, the following corollary is established, which is an extension of Proposition 1 in [18] and thus the proof is omitted here.
Corollary 2
If all the assumptions in Theorem 1 are satisfied, and there exist , , such that for all in the admissible domain of the solution,
(39) | ||||
(40) |
then there exists a function such that
In Corollary 2, the conditions (39)-(40) hold due to the boundedness of the reference trajectory. In (39), the boundedness of the reference state comes obviously from the bounded reference trajectory. If the feedforward input is bounded, then is also bounded. The boundedness of is from Assumption 6, which implies that the designed controller leads to the ISS-like property from to ; see also [11, Theorem 4] and [9, Remark V.2]. The interested readers are referred to [18] for more details.
VI On the Existence of Lyapunov Functions
In this section, the existence of the Lyapunov function satisfying Assumptions 4-5 is discussed. Since the network-induced errors are involved, which leads to different assumptions on Lyapunov functions, it is necessary to verify the existence of these Lyapunov functions to ensure the satisfaction of the applied assumptions. Therefore, based on the construction of Lyapunov functions in [8, 37, 9], Assumptions 4-5 are verified under some appropriate conditions. In addition, explicit Lyapunov functions for different time-scheduling protocols and quantizers are presented.
VI-A Time-Scheduling Protocols
In Section III, the update of is given by
(41) |
where is the update function. Similar to the analysis and the terminology in [9, 37], the function is referred to as the protocol. Based on nodes of the network, is partitioned into . If the -th node is granted to access to the network according to certain time-scheduling protocol, then the corresponding component is updated and the other components are kept. In the literature, there are several time-scheduling protocols that can be modeled as ; see [9, 37, 8]. In the following, two classes of commonly-used protocols are presented.
The first protocol is Round-Robin (RR) protocol [11], which is a periodic protocol [7]. The period of the RR protocol is , and each node has and only has one chance to access to the network in a period. The function is given by
(42) |
where, and , . If , ; otherwise, .
Another protocol is Try-Once-Discard (TOD) protocol, which is a quadratic protocol [7, 11]. For the TOD protocol, the node with a minimum index where the norm of the local network-induced error is the largest is allowed to access to the network. The function is given by
(43) |
where, , and if ; otherwise, .
Before verifying Assumptions 4-5, the Lyapunov uniformly globally exponentially stable (UGES) protocol is presented as follows. The Lyapunov UGES protocol was proposed first in [11, Definition 7] and extended in [37, 9, 8].
Definition 2
The protocol given by is Lyapunov UGES, if there exist a function with locally Lipschitz for all , constants and such that for all , and ,
(44) | ||||
(45) |
Definition 2 is an extension of Condition 1 in [37] and the results in [8, Subsections IV-C and IV-D]. Condition 1 in [37] guarantees the Lyapunov UGES property for the combined protocol of zoom quantizer and network scheduling. In addition, the Lyapunov UGES property is studied for NQCSs in [8], where only zoom quantizer and box quantizer are considered. Therefore, Definition 2 provides the Lyapunov UGES property for the combined protocol of the general quantizer and network scheduling.
VI-B Construction of Lyapunov Functions
Based on the aforementioned Lyapunov UGES protocol, the Lyapunov function satisfying Assumptions 4-5 is constructed. To begin with, the following assumption is required.
Assumption 7
There exist constants , such that for all , and ,
(46) |
and for almost all , and all ,
(47) |
In Assumption 7, it follows from (46) that is bounded at the transmission jump. In addition, (47) equals to the requirement that is globally Lipschitz in uniformly for , which is valid for the applied protocols in the existing works and this paper. Furthermore, Assumption 7 generalizes the assumptions for the quantization-free case in [9] and the case of zoom quantization in [37]. Besides Assumption 7, assume further that there exist a function and constants such that
(48) |
Theorem 2
Proof:
According to the local Lipschitz property of and Lebourg’s Lipschitz mean value theorem [41, Theorem 2.3.7], it follows that
(49) |
Define . Based on defined in Theorem 2, there are following four cases for Assumptions 4-5.
Case 1: and . In this case, for the discrete-time instants, we have
For the continuous-time intervals, we have that
Case 2: and . In this case, we yield that
and for the continuous-time intervals, it follows that
Case 3: and . At the discrete-time instants, one has that . In the continuous-time intervals,
Case 4: and . We get that at the discrete-time instants, . In the continuous-time intervals,
Remark 10
In Theorem 2, only the function can be constructed for the system and the function can not, which is different from the existing works [10, 9, 37], where both and were constructed. The reasons lie in that the objective of this paper is the tracking performance and that involves in the information of the tracking error, the reference system and the feedback controller. In the previous works [10, 9, 37], the objectives are on stability analysis of NCSs and is only related to the state of the plant. Since the stability analysis is a basic topic for NCSs and numerous preliminary results have been obtained, has been constructed in the previous works, whereas in this paper cannot be developed along the similar techniques as applied in [10, 9, Section V].
In Theorem 2, the Lyapunov function satisfying the items i) and ii) exists; see [11, 37, 9, 10]. The item iii) guarantees that the local errors do not increase at each transmission time for all the relevant protocols. Such constraint is valid for all protocols discussed in [8, 11]. We can also double the bound of the local errors due to the quantization error. In the following, two types of the quantizers are introduced as the special cases of the quantizer satisfying Assumption 2 and specific Lyapunov functions are constructed for different cases of time-scheduling protocols and quantizers.
VI-C Zoom Quantizer
A zoom quantizer is defined as
(50) |
where , in the right-hand side of (50) is a uniform quantizer; see [31, 28] and Remark 3 in Section III. According to Assumption 2, we have that for zoom quantizer, , and . In addition, the quantization parameter is time-invariant in the arrival intervals and updated at the arrival times according to with .
If the zoom quantizer is implemented, then appropriate Lyapunov functions satisfying Assumption 4 are constructed in the following propositions for different time-scheduling protocols.
Proposition 2
Proof:
For the RR protocol and zoom quantizer case, the Lyapunov function is constructed in several steps. First, the Lyapunov functions for the -subsystem and -subsystem are constructed, respectively. Then, such two Lyapunov functions are combined into a Lyapunov function for the whole system.
For the RR protocol, the functions are of the form (46). First, we consider the following system
(51) |
Denote by the solution to the system (VI-C) at time starting at time with the initial condition and define . Based on Proposition 4 in [11] and similar to the proof of Proposition 3 in [18], we have . Define and , where is given in Proposition 2. Thus, we have that (20)-(21) hold with and , respectively. In addition, and .
The following proposition presents the Lyapunov function satisfying Assumption 4 under the TOD protocol and zoom quantizer case. Its proof is a combination of the proofs of Proposition 2 and Proposition 8 in [8], and hence omitted here.
Proposition 3
In terms of Theorem 2, is not given a priori. However, in Propositions 2-3, which implies that the effects of on can be ignored. In this case, the feedforward input can be transmitted to the plant and the reference system directly. To reduce the effects of , some addition conditions are needed or the time-scheduling protocol needs to be changed. In the following, we introduce the TOD-tracking protocol [18], which is a refined TOD protocol with defined as
(53) |
That is, the node to access to the network depends on instead of . Thus, and (28) holds with . The TOD-tracking protocol depends on the network setup. For instance, if is generated by the controller [16], then which node is granted to access the network is associated to . If and are transmitted via the same nodes, then the node to access to the network is related to . For the TOD-tracking protocol, the following proposition is presented.
VI-D Box Quantizer
Box quantizer, whose quantization regions are rectangle boxes, is another type of dynamical quantizers; see [26, 8]. A box quantizer is defined by three parameters [8]: an integer to define the number of the quantization levels, an estimate of the variables to be quantized and a real number to define the size of the quantization regions, where . Because is a given constant and depends on , is called the quantization parameter. Consider the box and divide it into equally small sub-boxes numbered from 1 to in some way. Thus, is the number of the sub-box containing , and is updated to be the center of such sub-box.222If is in the intersection of some sub-boxes, then can be any number of these sub-boxes. In addition, we allow not to be the same for different nodes, which generalizes the cases in [8, 26]. The evolution of is presented as follows; see [8] for the details.
(54) | ||||
(55) |
For the RR protocol, and are given by
where and are the diagonal matrices with different dimensions, and depends on the quantization procedure; see [8]. For the box quantizer and RR protocol case, the following proposition establishes the existence of Lyapunov function satisfying Assumption 4.
Proposition 5
Let Assumption 3 hold. If the RR protocol and the box quantizer are applied and there exists a constant such that ,333The existence of depends on the expression of , which has been given in [8, Section III-C] (where quantization is considered but transmission delays are not studied). then Assumption 4 is verified with , where and are the solutions to and at time starting at time with the initial condition and , respectively. Moreover, , ,
, , , and .
Proof:
First, we consider the -subsystem. Define , where is the solution to at time starting at time with the initial condition . Let and following the similar line as the proof of Proposition 5 in [8], we have
(56) | ||||
(57) |
Next, for the -subsystem, consider the following system
(58) |
Define , where is the solutions to (VI-D) at time starting at time with the initial condition . Similar to the proof of Proposition 2, we have . Based on the proof of Proposition 5 in [8] and similar to the proof of Proposition 2, we obtain that
(59) |
For the TOD protocol and the TOD-tracking protocol, the time-scheduling protocol and the update of are given by
In above cases, the following propositions are presented. The proofs are proceeded along the similar strategy as the proof of Proposition 5, and hence omitted here.
Proposition 6
VII Illustrative Example
In this section, the developed results are demonstrated with a numerical example. We will illustrate how Assumptions 4-6 could be verified and how the verification of these conditions leads to quantitative tradeoff between and .
Consider a single-link revolute manipulator modeled by Lagrange dynamics [42, 43]: . Pick , , , and define , , we have that
(61) |
where is the generalized configuration coordinate, is the generalized velocity, is the generalized force acting on the system and are certain constants. Both and are measurable. The reference system is given by
(62) |
where are measurable and .
Assume that if there is no communication network, then the tracking error is asymptotically stable. The designed controller is , where , where and . In this paper, we consider the case that the communication between the controller and the plant is via a quantizer and a communication network. The applied quantizer is zoom quantizer (50) with and . The controller is applied using ZOH devices and the network is assumed to have nodes for , and , respectively. In this case, the applied feedback controller is emulated and given by . In addition, is assumed to be transmitted to the reference system directly for the TOD-tracking protocol and are implemented in ZOH fashion in the update intervals, which implies that the feedback controller knows but does not depend on . To simplify the following simulation, the transmission intervals and the transmission delays are constants, that is, and for all .
In the following, we first verify Assumptions 4-6. Based on (61)-(62), we obtain that , , , and . Choose the Lyapunov function in Proposition 2 for the RR protocol, for the TOD protocol and for the TOD-tracking protocol. Thus, Assumption 4 holds easily based on Propositions 2-4.
On the other hand, it holds that , where . It is known from Propositions 2-4 that for all and for almost all and , where for the RR protocol and for the TOD and TOD-tracking protocols. Thus, . As a result, Assumption 5 holds with , , and .
To verify Assumption 6, define , where are chosen to make satisfy (25). Assume that there exists a time-varying parameter such that . Thus, using twice the fact that for all and , we get that , where are defined in (27) and . Therefore, if are chosen such that (25) holds and
(63) |
then Assumption 6 is verified with , , , and is arbitrarily small.
Observe that and depend on the magnitude of and ; and depend on the choice of and . Thus, the tradeoff between and is related to and . Pick , , , and . The choices of and are to satisfy (25) and (VII). Thus, , , , for the RR protocol and , , , for the TOD and the TOD-tracking protocols.
Set the initial for the RR protocol, and for the TOD and TOD-tracking protocols, then and are obtained via (28a)-(28b); see Figs. 2-3. Follows from Figs. 2-3, and for the RR protocol; and for the TOD and TOD-tracking protocols. In addition, the magnitudes of and are different from different initial conditions. For instance, and for the RR protocol with ; and for the TOD protocol with and . and for the RR protocol with ; and for the TOD protocol with and . Therefore, different tradeoffs between and can be obtained for different initial conditions. Furthermore, from (28), and depend on and . For instance, changing the value of leads to the different magnitudes of and . The maximal value of is 2.090. If , then there is no intersection between and .
Based on and obtained from Figs. 2-3, the tracking errors are illustrated in Figs. 4-6 for different cases. Figs. 4-5 are for the RR and TOD protocol cases, respectively. The tracking errors are convergent and bounded in Figs. 4-5 due to the effects of the network-induced error . Since is transmitted to the reference system and the plant directly in the TOD-tracking protocol, and the tracking error converge to zero in Fig. 6.
VIII Conclusions
In this paper, the tracking control of nonlinear networked and quantized control systems was analyzed based on a Lyapunov approach. To deal with the network-induced issues, a new hybrid model was developed. Sufficient conditions were established to guarantee the convergence of the tracking error. In addition, the Lyapunov function satisfying the obtained conditions was constructed. For the specific time-scheduling protocols and quantizers, we discussed how to reduce the effects of the network-induced errors on the convergence of the tracking error. Finally, the developed results were demonstrated by a numerical example.
Appendix
References
- [1] J. Baillieul and P. J. Antsaklis, “Control and communication challenges in networked real-time systems,” Proceedings of the IEEE, vol. 95, no. 1, pp. 9–28, 2007.
- [2] J. Lunze, Control Theory of Digitally Networked Dynamic Systems. Springer, 2014.
- [3] R. A. Gupta and M.-Y. Chow, “Networked control system: Overview and research trends,” IEEE Transactions on Industrial Electronics, vol. 57, no. 7, pp. 2527–2535, 2010.
- [4] N. W. Bauer, “Networked Control Systems: From Theory to Experiments,” Ph.D. dissertation, Technische Universiteit Eindhoven, 2013.
- [5] P. Antsaklis and J. Baillieul, “Special issue on technology of networked control systems,” Proceedings of the IEEE, vol. 95, no. 1, pp. 5–8, 2007.
- [6] I. Karafyllis and M. Krstic, “Nonlinear stabilization under sampled and delayed measurements, and with inputs subject to delay and zero-order hold,” IEEE Trans. Autom. Control, vol. 57, no. 5, pp. 1141–1154, 2012.
- [7] M. Donkers, W. Heemels, N. Van De Wouw, and L. Hetel, “Stability analysis of networked control systems using a switched linear systems approach,” IEEE Trans. Autom. Control, vol. 56, no. 9, pp. 2101–2115, 2011.
- [8] D. Nešić and D. Liberzon, “A unified framework for design and analysis of networked and quantized control systems,” IEEE Trans. Autom. Control, vol. 54, no. 4, pp. 732–747, 2009.
- [9] W. M. H. Heemels, A. R. Teel, N. van de Wouw, and D. Nešić, “Networked control systems with communication constraints: Tradeoffs between transmission intervals, delays and performance,” IEEE Trans. Autom. Control, vol. 55, no. 8, pp. 1781–1796, 2010.
- [10] D. Carnevale, A. R. Teel, and D. Nešić, “A Lyapunov proof of an improved maximum allowable transfer interval for networked control systems,” IEEE Trans. Autom. Control, vol. 52, no. 5, p. 892, 2007.
- [11] D. Nešić and A. R. Teel, “Input-output stability properties of networked control systems,” IEEE Trans. Autom. Control, vol. 49, no. 10, pp. 1650–1667, 2004.
- [12] D. Antunes, J. Hespanha, and C. Silvestre, “Stability of networked control systems with asynchronous renewal links: An impulsive systems approach,” Automatica, vol. 49, no. 2, pp. 402–413, 2013.
- [13] M. B. Cloosterman, L. Hetel, N. Van De Wouw, W. Heemels, J. Daafouz, and H. Nijmeijer, “Controller synthesis for networked control systems,” Automatica, vol. 46, no. 10, pp. 1584–1594, 2010.
- [14] H. Gao and T. Chen, “Network-based output tracking control,” IEEE Trans. Autom. Control, vol. 53, no. 3, pp. 655–667, 2008.
- [15] S. Hirche, T. Matiakis, and M. Buss, “A distributed controller approach for delay-independent stability of networked control systems,” Automatica, vol. 45, no. 8, pp. 1828–1836, 2009.
- [16] N. van de Wouw, P. Naghshtabrizi, M. Cloosterman, and J. P. Hespanha, “Tracking control for sampled-data systems with uncertain time-varying sampling intervals and delays,” International Journal of Robust and Nonlinear Control, vol. 20, no. 4, pp. 387–411, 2010.
- [17] H. Zhang, Y. Shi, and M. Liu, “ step tracking control for networked discrete-time nonlinear systems with integral and predictive actions,” IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 337–345, 2013.
- [18] R. Postoyan, N. Van de Wouw, D. Nešić, and W. M. H. Heemels, “Tracking control for nonlinear networked control systems,” IEEE Trans. Autom. Control, vol. 59, no. 6, pp. 1539–1554, 2014.
- [19] J. B. Biemond, N. van de Wouw, W. H. Heemels, and H. Nijmeijer, “Tracking control for hybrid systems with state-triggered jumps,” IEEE Trans. Autom. Control, vol. 58, no. 4, pp. 876–890, 2013.
- [20] J. Lian and Y. Ge, “Robust output tracking control for switched systems under asynchronous switching,” Nonlinear Analysis: Hybrid Systems, vol. 8, pp. 57–68, 2013.
- [21] M. J. Grimble, “Nonlinear generalized minimum variance feedback, feedforward and tracking control,” Automatica, vol. 41, no. 6, pp. 957–969, 2005.
- [22] N. Van De Wouw, P. Naghshtabrizi, M. Cloosterman, and J. P. Hespanha, “Tracking control for networked control systems,” in IEEE Conference on Decision and Control. IEEE, 2007, pp. 4441–4446.
- [23] E. Garcia, G. Vitaioli, and P. J. Antsaklis, “Model-based tracking control over networks,” in 2011 IEEE International Conference on Control Applications (CCA). IEEE, 2011, pp. 1226–1231.
- [24] C. Cai and A. R. Teel, “Characterizations of input-to-state stability for hybrid systems,” Syst. Control Lett., vol. 58, no. 1, pp. 47–53, 2009.
- [25] R. Goebel and A. R. Teel, “Solutions to hybrid inclusions via set and graphical convergence with stability theory applications,” Automatica, vol. 42, no. 4, pp. 573–587, 2006.
- [26] D. Liberzon, “On stabilization of linear systems with limited information,” IEEE Trans. Autom. Control, vol. 48, no. 2, pp. 304–307, 2003.
- [27] R. W. Brockett and D. Liberzon, “Quantized feedback stabilization of linear systems,” IEEE Trans. Autom. Control, vol. 45, no. 7, pp. 1279–1289, 2000.
- [28] D. Liberzon, “Hybrid feedback stabilization of systems with quantized signals,” Automatica, vol. 39, no. 9, pp. 1543–1554, 2003.
- [29] W. Ren and J. Xiong, “Tracking control of networked and quantized control systems,” in IEEE Conference on Decision and Control. IEEE, 2018, pp. 5844–5849.
- [30] M. Tabbara, D. Nešić, and A. R. Teel, “Stability of wireless and wireline networked control systems,” IEEE Trans. Autom. Control, vol. 52, no. 9, pp. 1615–1630, 2007.
- [31] K. Liu, E. Fridman, and K. H. Johansson, “Dynamic quantization of uncertain linear networked control systems,” Automatica, vol. 59, pp. 248–255, 2015.
- [32] W. Wang, D. Nešić, and R. Postoyan, “Emulation-based stabilization of networked control systems implemented on FlexRay,” Automatica, vol. 59, pp. 73–83, 2015.
- [33] S. van Loon, M. Donkers, N. van de Wouw, and W. Heemels, “Stability analysis of networked and quantized linear control systems,” Nonlinear Analysis: Hybrid Systems, vol. 10, pp. 111–125, 2013.
- [34] D. Liberzon and D. Nešić, “Input-to-state stabilization of linear systems with quantized state measurements,” IEEE Trans. Autom. Control, vol. 52, no. 5, pp. 767–781, 2007.
- [35] T. Kameneva and D. Nešić, “Robustness of quantized control systems with mismatch between coder/decoder initializations,” Automatica, vol. 45, no. 3, pp. 817–822, 2009.
- [36] M. Fu and L. Xie, “The sector bound approach to quantized feedback control,” IEEE Trans. Autom. Control, vol. 50, no. 11, pp. 1698–1711, 2005.
- [37] W. Heemels, D. Nešić, A. R. Teel, and N. van de Wouw, “Networked and quantized control systems with communication delays,” in Proceedings of the 48th IEEE Conference on Decision and Control. IEEE, 2009, pp. 7929–7935.
- [38] M. Tabbara and D. Nešić, “Input-output stability with input-to-state stable protocols for quantized and networked control systems,” in Proceedings of IEEE Conference on Decision and Control. IEEE, 2008, pp. 2680–2685.
- [39] A. Franci and A. Chaillet, “Quantised control of nonlinear systems: analysis of robustness to parameter uncertainty, measurement errors, and exogenous disturbances,” International Journal of Control, vol. 83, no. 12, pp. 2453–2462, 2010.
- [40] C. M. Kellett, “A compendium of comparison function results,” Mathematics of Control, Signals, and Systems, vol. 26, no. 3, pp. 339–374, 2014.
- [41] F. H. Clarke, Optimization and nonsmooth analysis. Philadelphia, PA: SIAM, 1990.
- [42] F. Lewis, S. Jagannathan, and A. Yesildirak, Neural Network Control of Robot Manipulators and Nonlinear Systems. CRC Press, 1998.
- [43] L. Sciavicco and B. Siciliano, Modelling and Control of Robot Manipulators. Springer Science & Business Media, 2012.
Wei Ren received his B.Sci. degree from Hubei University, China, and his Ph.D. degree from the University of Science and Technology of China, China, in 2011 and 2018. He was a joint-Ph.D. under the supervision of Professor Dragan Nešić in the University of Melbourne, Victoria, Australia. Currently, he is a post-doctor at KTH Royal Institute of Technology, Stockholm, Sweden. His research interests include networked control systems, nonlinear systems, symbolic abstraction, multi-agent systems and hybrid systems. |
Junlin Xiong received his B.Eng. and M.Sci. degrees from Northeastern University, China, and his Ph.D. degree from the University of Hong Kong, China, in 2000, 2003 and 2007, respectively. From November 2007 to February 2010, he was a research associate at the University of New South Wales at the Australian Defense Force Academy, Australia. In March 2010, he joined the University of Science and Technology of China where he is currently a Professor in the Department of Automation. His current research interests are in the fields of Markovian jump systems, networked control systems and negative imaginary systems. |