1 / 17

Networked Control System: Overview and Research Trends

Networked Control System: Overview and Research Trends. Rachana Ashok Gupta, Member, IEEE, and Mo-Yuen Chow, Fellow, IEEE. Outline. I. INTRODUCTION II. NCS BASICS III. NCS RESEARCH TOPICS AND TRENDS IV. CONCLUSION AND FUTURE RESEARCH. I. INTRODUCTION.

joey
Download Presentation

Networked Control System: Overview and Research Trends

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networked Control System: Overviewand Research Trends Rachana Ashok Gupta, Member, IEEE, and Mo-Yuen Chow, Fellow, IEEE

  2. Outline • I. INTRODUCTION • II. NCS BASICS • III. NCS RESEARCH TOPICS AND TRENDS • IV. CONCLUSION AND FUTURE RESEARCH

  3. I. INTRODUCTION • Definition: When a traditional feedback control system is closed via a communication channel (such as a network), which may be shared with other nodes outside the control system, then the control system is classified as a networked control system (NCS).

  4. II. NCS BASICS • NCS research is categorized into the following two parts • 1) Control of network • Study and research on communications and networks to make them suitable for realtime NCSs, e.g., routing control, congestion reduction, efficient data communication, networking protocol, etc. • 2) Control over network • This deals more with control strategies and control system design over the network to minimize the effect of adverse network parameters on NCS performance such as network delay.

  5. Challenges • Maintain the quality of service (QoS) and the quality of control (QoC). • QoS is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and, to some extent, guaranteed in advance. • QoC is a runtime strategy where the quality (or performance) of a set of applications with real-time requirements is managed.

  6. III. NCS RESEARCH TOPICS AND TRENDS • A. Networking Technologies—Evolution and Research • B. Network Delay Effect • C. Fault-tolerant control (FTC) in NCS • D. Bandwidth Allocation and Scheduling • E. Network Security in NCS • F. Integration of Components in NCS

  7. A. Networking Technologies—Evolution and Research • ARPANET • 1969 • Controller Area Network (CAN) • 1980s • Fieldbus • 1989 • Ethernet • the most widely implemented physical and link layer protocol today. • Internet • the most suitable and inexpensive choice for many applications where the plant and the controller are far away from each other. • Wireless NCS (WNCS) • Motivation: mobile operations, flexible installations, and rapid deployments • 802.11 a/b/g, bluetooth, ZigBee … • Colandairaj et al. demonstrated that the principles of codesign, the merging of communication technology with control theory

  8. B. Network Delay Effect • The network can introduce unreliable/nondeterministic levels of service in terms of delays, jitter, and losses. • Time-sensitive applications can be either hard real time or soft real time

  9. (1) Modeling and Analysis of Network Delays • Network delays are modeled and analyzed in various ways. They can be modeled as • a constant delay (timed buffer) • an independent random delay • a delay with known probability distribution governed by the Markov chain model

  10. (2) Delay Compensation

  11. (2) Delay Compensation Other solutions includes: • Stability and stabilization of a class of multimode systems • A gain scheduler middleware (GSM) • A delay-independent stability condition • Control prediction generator and a network delay compensator(precise delay time models are needed) • A time delay compensation method based on the • Concept of network disturbance and communication disturbance observer(delay time model is not needed) • A networked predictive controller in the presence of random network delay in both the forward and feedback channels. • Represented nonlinear NCSs by a T-S fuzzy model • Discrete-model switch system for NCSs with time delay and packet drop • A state feedback controller for NCSs for asymptotic stability

  12. C. FTC in NCS • Fault tolerance is implemented to prevent faults from propagating through the system. • Patankar presented a model in [69] for a fault-tolerant NCS using time-triggered protocol communication. • Huoet al. [68] studied scheduling and control codesign for a robust FTC of NCS based on robust H∞ FTC idea. • Wang et al. [71] proposed a fault detection approach for NCS, which considers the influence of unknown and random network-induced delay as multiplicative faults. • Mendes et al. [70] proposed a multiagentplatformbased on decentralized design and distributed computing for FTC systems. • Zhu and Zhou [72] applied a states-observerbased fault detection approach on the uncertain long-time-delay NCS without changing the system construction. • A procedure for controlling a system over a network using the concept of an NCS information packet is described by Klinkhieoet al. in [73]. This procedure is composed of an augmented vector consisting of control moves and fault flags. The size of this packet is used to define a completely fault-tolerant NCS.

  13. D. Bandwidth Allocation and Scheduling • Objective: minimizing the cost and maximizing the service data flow. • The network scheduling method should have a basic sampling time within maximum allowable delay bound (MADB) while still guaranteeing real-time transmission. • 1) NCS Scheduling Approaches • Rate monotonic scheduling (RMS) • 2) DBA: Dynamic bandwidth allocation • supporting multimedia applications like VoIP, video traffic, and ATM networks.

  14. E. Network Security in NCS • A biologically inspired learning model for multiagent IDS utilized in the network infrastructures of industrial plants. • methods to determine and reduce the vulnerability of NCS to unintended and malicious intrusions for an industrial plant • policy-based network security technologies and XML processing technologies • characterized the WNCS application on the basis of security effect on NCS performance • D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, “Security for industrial communication systems,” Proc. IEEE, vol. 93, no. 6, pp. 1152–1177, Jun. 2005.

  15. F. Integration of Components in NCS Aim • Integration of the individual modules. • A well-designed software architectural framework and a middleware are critical. Areas: • autonomous vision-based navigation, obstacle avoidance, and convoy tracking; • process information from a large number of diverse sensors using multilevel symbolization; • highly integrated control and programming platform named Motronic in automotive industry

  16. IV. CONCLUSION AND FUTURE RESEARCH Conclusion • Network delay compensation and resource allocation have been analyzed since the advent of NCS. • Scheduling, network security with NCS, fault tolerance are the ones which came into focus later. Unsolved problems • The real-time secured control. • Designing an FTC system for a large-scalecomplex NCS • Build new protocols which will give the flexibility to the system and make it time independent • Multiagent traffic control in urban areas with efficient vehicle communication, includes correct data estimation, data fusion in real time to make robust decisions.

  17. More referneces • Colandairaj, J.; Scanlon, W.; Irwin, G.; "Understanding wireless networked control systems through simulation," Computing & Control Engineering Journal , vol.16, no.2, pp. 26- 31, April-May 2005 • J. Colandairaj, G. W. Irwin, and W. G. Scanlon, “A co-design solution for wireless feedback control,” in Proc. IEEE Int. Conf. Netw., Sens. Control, 2007, pp. 404–409. • D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, “Security for industrial communication systems,” Proc. IEEE, vol. 93, no. 6, pp. 1152–1177, Jun. 2005.

More Related