<<

University of Pennsylvania ScholarlyCommons

Real-Time and Embedded Systems Lab (mLAB) School of Engineering and Applied

2011

The Control Network: A New Approach for Control over Networks

Miroslav Pajic University of Pennsylvania, [email protected]

Shreyas Sundaram University of Waterloo, [email protected]

George Pappas University of Pennsylvania, [email protected]

Rahul Mangharam University of Pennsylvania, [email protected]

Follow this and additional works at: https://repository.upenn.edu/mlab_papers

Part of the Controls and Control Theory Commons, Electrical and Electronics Commons, and the Systems and Communications Commons

Recommended Citation Miroslav Pajic, Shreyas Sundaram, George Pappas, and Rahul Mangharam, "The Wireless Control Network: A New Approach for Control over Networks", . January 2011.

Suggested Citation: M. Pajic, S. Sundaram, G.J. Pappas and R. Mangharam, "The Wireless Control Network: A New Approach for Control over Networks", IEEE Transactions on Automatic Control, vol. 56, no. 10, pp. 2305-2318, October 2011. ©2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

This paper is posted at ScholarlyCommons. https://repository.upenn.edu/mlab_papers/29 For more information, please contact [email protected]. The Wireless Control Network: A New Approach for Control over Networks

Abstract We present a method to stabilize a plant with a network of resource constrained wireless nodes. As opposed to traditional networked control schemes where the nodes simply route information to and from a dedicated controller (perhaps performing some encoding along the way), our approach treats the network itself as the controller. Specifically, we formulate a strategy for each in the network to follow, where at each time-step, each node updates its internal state to be a linear combination of the states of the nodes in its neighborhood. We show that this causes the entire network to behave as a linear dynamical system, with sparsity constraints imposed by the .We provide a numerical design procedure to determine appropriate linear combinations to be applied by each node so that the transmissions of the nodes closest to the actuators will stabilize the plant. We also show how our design procedure can bemodified ot maintain mean square stability under packet drops in the network, and present a distributed scheme that can handle node failures while preserving stability.We call this architecture aWireless Control Network, and show that it introduces very low computational and communication overhead to the nodes in the network, allows the use of simple transmission scheduling algorithms, and enables compositional design (where the existing wireless control infrastructure can be easily extended to handle new plants that are brought online in the vicinity of the network).

Keywords Cooperative control, decentralized control, linear systems, networked control systems, wireless networks

Disciplines Controls and Control Theory | Electrical and Electronics | Systems and Communications

Comments Suggested Citation:

M. Pajic, S. Sundaram, G.J. Pappas and R. Mangharam, "The Wireless Control Network: A New Approach for Control over Networks", IEEE Transactions on Automatic Control, vol. 56, no. 10, pp. 2305-2318, October 2011.

©2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

This journal article is available at ScholarlyCommons: https://repository.upenn.edu/mlab_papers/29 TRANSACTIONS ON AUTOMATIC CONTROL 1 The Wireless Control Network: A New Approach for Control over Networks Miroslav Pajic, Student Member, IEEE, Shreyas Sundaram, Member, IEEE, George J. Pappas, Fellow, IEEE and Rahul Mangharam, Member, IEEE,

Abstract—We present a method to stabilize a plant with a to “hot-swap” between a faulty module and a backup module network of resource constrained wireless nodes. As opposed to via a simple activation command, and facilitates “plug-n-play” traditional networked control schemes where the nodes simply automation architectures which reduce downtime.1 Along the route information to and from a dedicated controller (perhaps performing some encoding along the way), our approach treats same lines, through the use of certain algorithms that satisfy the network itself as the controller. Specifically, we formulate a the principle of compositionality (where the existing setup can strategy for each node in the network to follow, where at each be easily extended for increased functionality and robustness), time-step, each node updates its internal state to be a linear wireless networks make it possible to incrementally upgrade combination of the states of the nodes in its neighborhood. systems in a straightforward manner. We show that this causes the entire network to behave as a linear dynamical system, with sparsity constraints imposed by Wireless networks also pose some interesting new chal- the network topology. We provide a numerical design procedure lenges. One problem arises due to the fundamental unreliabil- to determine appropriate linear combinations to be applied by ity of wireless communication; the probability that a wireless each node so that the transmissions of the nodes closest to the transmission will be received by a node’s neighbors depends actuators will stabilize the plant. We also show how our design on various factors, including the amount of power used to procedure can be modified to maintain mean square stability under packet drops in the network, and present a distributed transmit information, environmental factors that affect the scheme that can handle node failures while preserving stability. propagation characteristics of the channel, and collisions that We call this architecture a Wireless Control Network, and show might occur due to multiple nodes transmitting at the same that it introduces very low computational and communication time. Another problem is the need to maintain a reasonable overhead to the nodes in the network, allows the use of simple end-to-end delay in the network. The topic of designing transmission scheduling algorithms, and enables compositional design (where the existing wireless control infrastructure can be controllers that are tolerant to these types of issues has been easily extended to handle new plants that are brought online in intensively studied by researchers over the past decade [7], the vicinity of the network). [8], [9], [10], [11], [12]. The vast majority of work in this Index Terms—Networked control systems, cooperative control, area considers the case of a single sensing point and a single decentralized control, wireless sensor networks, linear systems. actuation point on the plant, and adopts the convention of having a dedicated controller/estimator located somewhere in the network. The stability of the closed loop system is then I.INTRODUCTION studied, assuming that the sensor-estimator and/or controller- NDUSTRIAL control systems are often deployed in large, actuator communication channels are unreliable (e.g., dropping I spatially distributed plants that involve numerous , packets with a certain probability). While these and other actuators and internal process variables. The traditional means works have made great inroads into understanding the problem of interconnecting the various components of these systems of feedback control over networks, they have some potential has been via physical wires; this is often difficult to do (in drawbacks when it comes to implementation. First, the state hard-to-reach or dangerous areas), expensive (due to the labor vectors maintained by the controllers in these existing works and materials involved) and fault-prone (due to degradation typically have sizes on the order of the size of the plant’s state of wires, miswiring due to human error, etc.). Over the last vector, and intermediate nodes are also expected to perform decade, low-cost and reliable wireless networks have emerged operations on state vectors of similar size. However, devices as a practical method to alleviate these issues in automation in wireless networks are often battery operated and have systems [2], [3]. Besides the obvious physical benefit of reduc- severe resource constraints, allowing only a modest amount ing excessive wiring, these networks introduce a set of logical of computation and storage (examples of this are discussed in benefits [4]. For example, wireless communication allows one Section III). Also, by adding one (or a few) specialized nodes This research has been partially supported by the DARPA MuSyC, the capable of performing computationally expensive procedures, NSF-CNS 0931239 and NSF-MRI Grant 0923518. It has also been supported the control infrastructure becomes susceptible to failure on the by a grant from NSERC. Preliminary versions of some of these results have part of those nodes. A second drawback of these traditional ap- been presented in [1]. M. Pajic, G. J. Pappas and R. Mangharam are with the De- proaches is that they do not capture the real-world scenario of partment of Electrical and Systems Engineering, University of Penn- sylvania, Philadelphia, PA, USA 19014. Email: {pajic, pappasg, 1In traditional wired automation systems, modules are connected with rahulm}@seas.upenn.edu. S. Sundaram is with the Department of an industrial bus (e.g., PROFIBUS [5], CAN [6]) and a large number of Electrical and , University of Waterloo, Waterloo, ON, I/O connectors, where the wiring is usually inaccessible, which significantly Canada, N2L 3G1. Email: [email protected] increases the time and cost needed for replacements. TRANSACTIONS ON AUTOMATIC CONTROL 2 multiple sensing and actuation points that are geographically from a dedicated controller). Specifically, the WCN requires dispersed throughout the plant, with signals that are injected very little overhead, is very simple to schedule, is capable of into and out of different nodes throughout the network. handling plants with dispersed sensing and actuation points, In order to minimize end-to-end delays in the network can explicitly account for computational constraints at each and to maximize the network lifetime, one typically uses node, and satisfies the principle of compositionality (allowing wireless link protocols which broadly fall into two categories: ease of incremental upgrades to the plant). synchronous or asynchronous. Asynchronous protocols have The rest of the paper is organized as follows. In Section II, the advantage of not requiring a communication schedule we introduce and describe the Wireless Control Network in between nodes, since a node simply transmits its packet as more detail, including the mathematical formulation that will soon as it is received. However, this simplicity results in large set up the design procedures. In Section III, we list the imple- communication jitter which makes end-to-end timing analysis mentation advantages of the WCN in comparison to existing very difficult in multi-hop scenarios [13], and complicates the networked control schemes. We then delve into the problem of task of characterizing the stability of the system. synthesizing the WCN in Section IV, where we adapt existing Time synchronized network protocols are the norm in the algorithms from the literature on static output feedback to control automation industry and recent standards (such as determine an appropriate set of stabilizing linear combinations. WirelessHART [2] and ISA 100.11a [14]) employ a time divi- In Section V, we show how these algorithms can be modified sion link protocol. Full network synchronization to account for probabilistic packet drops in the network. For allows the use of Time-Triggered Architectures (TTAs) where the sake of clarity, we assume in both of these preceding communication and computation are scheduled at particular sections that each node can only perform calculations on instances of time (i.e., time slots) [15]. From the perspective a single (scalar) value; in Section VI, we generalize our of analyzing system stability, TTAs have the advantage that discussion to vector states at each node. We provide examples the network-induced delay is known. Furthermore, a closed- of our scheme in Section VII. In Section VIII we show how loop system based on a TTA can be modeled as a switched the WCN is able to gracefully degrade under node failures, control system [16], allowing the use of existing techniques and we discuss the relationship between the WCN and the for switched-system analysis. However, in this case the system traditional notions of delay introduced by the feedback loop. performance depends on communication and computation Finally, we finish in Section IX by describing some possible schedules that have to be carefully designed and interleaved directions for future improvements on this scheme. on a node-by-node basis. Even in the case with only one plant being controlled over a multi-hop network, the task of A. Notation constructing these schedules in order to meet strict end-to-end We use e to denote the ith unit column vector (of appropri- delay requirements is very complex [16], [17]. i ate dimension) and the symbol 1 denotes the column vector (of The goal of this paper is to introduce a new way of looking appropriate size) consisting of all 1’s. The symbol I denotes at the problem of control over wireless networks. Instead of as- N the N × N identity . The notation diag (·) indicates signing the computation of the control law to a particular node a square matrix with the quantities inside the brackets on the in the network, we show how to cause the entire network itself diagonal, and zeros elsewhere. The notation tr (·) indicates the to act as the controller. We call this fully-distributed paradigm trace of a square matrix. We will denote the cardinality of a the Wireless Control Network (WCN). To develop this idea, we set S by |S|. The set of nonnegative integers is denoted by N. consider a setup where several resource constrained wireless The notation A ≻ 0( 0) indicates that matrix A is positive nodes are deployed in the proximity of a plant, with some (semi)definite. The set of all n × n positive definite matrices nodes having access to the sensor measurements (i.e., outputs) is denoted by Sn . A graph is an ordered pair G = {V, E}, of the plant, and some nodes placed within the listening range ++ where V = {v , v , ..., v } is a set of vertices (or nodes), and of the plant’s actuators. Each node in the network is capable 1 2 N E is a set of ordered pairs of different vertices, called directed of maintaining only a limited internal state. Given this setup, edges. The vertices in the set N = {v |(v , v ) ∈ E} are we present a simple linear iterative strategy for each node to vi j j i said to be neighbors of vertex v . follow, where each node periodically updates its state to be a i linear combination of the states of the nodes in its immediate II. THE WIRELESS CONTROL NETWORK neighborhood. In addition, the plant actuators apply linear combinations of the states of the nodes in their neighborhood. Consider the system presented in Fig. 1, where the plant is The key insight of our work is that this simple scheme causes to be controlled using a multi-hop, fully synchronized wireless 2 the entire network itself to behave as a structured dynamical network. In this paper we focus on plants of the form compensator. Based on this insight, we adapt numerical al- x[k +1]= Ax[k]+ Bu[k] gorithms from the literature on structured and static output (1) y[k]= Cx[k], feedback control design to synthesize the stabilizing linear combinations employed by each node and actuator. We also show how this design procedure can be modified to account for 2The plant model can be generalized to include update and measurement packet drops in the network. As discussed in Section III, this noise; if the noise is taken to be independent and identically distributed with a bounded variance, all of our analysis and results will still ensure that the approach to control over a has many benefits system is mean square stable. For the purposes of clarity, we will therefore over traditional schemes (where information is routed to and omit the noise terms in our discussion. TRANSACTIONS ON AUTOMATIC CONTROL 3

 Control Network). To achieve this, we have each node in the    network utilize a linear iterative strategy where, at each time-   step, it updates its value to be a linear combination of its 4   previous value and the values of its neighbors. In addition,

  the update procedure of each node from the set VS includes   a linear combination of the sensor measurements (i.e., plant   outputs) from all sensors in its neighborhood. If we let zi[k]     denote node vi’s (scalar) state at time step k, we obtain the update procedure:5    zi[k +1] = wiizi[k]+ wij zj [k]+ hij yj [k]. (2)

vj v sj v Fig. 1. A multi-hop wireless control network used as a distributed controller. X∈N i X∈N i Each plant input ui[k],i ∈{1,...,m} is taken to be a linear Rn n Rn m Rp n combination of values from the nodes in the neighborhood of with A ∈ × , B ∈ × and C ∈ × . The out- 6 T the actuator ai: put vector y[k] = y1[k] y2[k] ... yp[k] contains measure- ments of the plant state vector x[k] provided by the sensors ui[k]= gij zj[k]. (3)   T s ,s , ..., s . The input vector u[k]= u [k] u [k]... u [k] j a 1 2 p 1 2 m ∈NXi corresponds to the signals applied to the plant by actuators Remark 1: Note that the time-step k of the network in the a ,a ..., a .   1 2 m above updates is the same as the time-step of the plant. This The WCN consists of a set of nodes that communicate with is in contrast to the typical paradigm of control over networks, each other and with the sensors and actuators installed on where the sampling rate of the plant must be slow enough that the plant. Each node in the network is equipped with a information can be routed within the wireless network without along with (limited) memory and computational much of an impact on the closed-loop system. This paradigm capabilities.3 Similarly, each sensor and actuator on the plant automatically enforces that the nodes in the network operate contains a radio transceiver, allowing them to communicate at a faster rate than the plant. However, the above WCN with neighboring nodes. The wireless network is described algorithm only requires each node to operate on information by a graph G = {V, E}, where V = {v , ..., v } is the set 1 N from one-hop neighbors. Thus, we can either slow the network of N nodes and E⊆V×V represents the radio connectivity nodes down to the sampling rate of the plant (potentially (communication topology) in the network (i.e., edge (v , v ) ∈ j i obtaining benefits in reliability, efficiency, etc.), or speed up E if node v can receive information directly from node v ). i j the sampling rate of the plant to match the rate of the network We also define V ⊂ V as the set of nodes that can receive S (potentially yielding better control performance). information directly from at least one sensor, and V ⊂V as A The scalars w ,h and g specify the linear combinations the set of nodes whose transmissions can be heard by at least ij ij ij that are computed by each node and actuator in the network. one actuator. If we aggregate the values of all nodes at time step k into the To facilitate our development, we will find it convenient T value vector z z [k] z [k] ... z [k] the behavior of to consider a new graph G¯ that includes the plant’s sen- [k] = 1 2 N , the entire network can be represented as: sors and actuators. This graph is obtained by taking the   graph G and adding p + m new vertices S ∪ A, where z[k +1]= Wz[k]+ Hy[k] , S = {s ,s ,...,s } corresponds to the plant’s sensors, while 1 2 p u[k]= Gz[k] A = {a1,a2,...,am} corresponds to the plant’s actuators. N N N p m N Define the edge sets for all k ∈ N (W ∈ R × , H ∈ R × , G ∈ R × ). In the above equation, for all i ∈ {1,...,N}, wij = 0 if vj ∈/ sl ∈ S, vi ∈VS, EO = (sl, vi) Nv ∪{vi}, hij = 0 if sj ∈/ Nv , and gij = 0 if vj ∈/ Na . vi can receive values from sensor sl i i i   Thus, the matrices W, H and G are structured, meaning that al ∈ A, vi ∈VA, EI = (vi,al) they have sparsity constraints determined by the topology of act. ai can receive values from vi   the WCN. Throughout the rest of the paper, we will define Ψ We then obtain G¯ = {V∪S∪A, E∪EI ∪EO}. 4The proposed scheme is similar in flavor to the algorithms used in linear Unlike traditional networked control schemes where a par- network coding [18], where nodes in a network mathematically combine ticular node vi ∈ V is designated as the controller and all packets before transmitting them. In our case, the objective is to choose other nodes are used to route information between vi and the these linear combinations to stabilize the plant, rather than simply transmit information through the network. plant, we propose a fully distributed control scheme where the 5 The neighborhood Nv of a vertex v is with respect to the graph G¯. entire network itself acts as a controller (becoming a Wireless 6Here we assume that each actuator, in addition to having a radio transceiver, has computational capabilities to be able to calculate the weighted 3We will model these resource constraints by limiting the size of the state sum of its neighboring nodes’ states. However, in cases where an actuator vector that can be maintained by each node. To present our idea, we will is equipped only with a transceiver, the state of only one node in the initially focus on the case where each node’s state is represented as a scalar. actuator’s neighborhood is used by that actuator. Thus, in this case for each The more general case, where each node can maintain a vector state with i ∈ {1, ··· ,p}, gij = 1 for exactly one j ∈ {1, ··· N}, and all other possibly different dimensions, is considered in Section VI. weights are equal to zero. TRANSACTIONS ON AUTOMATIC CONTROL 4

N N N p to be the set of all tuples (W, H, G) ∈ R × × R × × m N R × satisfying the aforementioned sparsity constraints. The above representation leads to our first key observation: the linear strategy employed by the nodes causes the network to act as a structured dynamical compensator. If we denote the T overall system state by xˆ[k] = x[k]T z[k]T , the closed- loop system becomes:   A BG x[k] xˆ[k +1]= , Aˆ xˆ[k] (4) HC W z[k]    Remark 2: The WCN is a fully distributed controller, im- plemented upon a substrate provided by a wireless network. One of the key differences between the WCN and classical decentralized control approaches is that the latter typically assume that each controller has direct access to some of the plant inputs and outputs [19]. In contrast, if we view each node in the WCN as a separate controller, many of these controllers will not be directly connected to the plant, but only Fig. 2. (a) On the left of the coin, a low-power FireFly node; on the right, a FireFly node with an add-on AM receiver for hardware-based out-of-band to other nodes (or controllers). Furthermore, we enforce size synchronization; (b) An example of FireFly nodes in a process-in-the-loop constraints on the state of each controller, and study how to simulation using the Honeywell Unisim process (plant) modeling tool. leverage the between the nodes in order to stabilize the system. bytes per frame in order to control the system, which can In the next section, we describe the implementation advan- be easily accommodated in each transmitted message. This tages of the above control mechanism, and then we present also allows the possibility of using the proposed scheme as algorithms to find an element of Ψ that causes the closed loop a backup (fault-tolerant) mechanism in traditional networked system to be stable. control systems. Specifically, if the primary control mechanism (i.e., dedicated controller) in the existing networked control III. ADVANTAGES OF THE WIRELESS CONTROL NETWORK infrastructure fails, the wireless network itself can take over With the mathematical description of the WCN from the the role of stabilizing the plant (i.e., operate as a WCN) until previous section in hand, we will now discuss some advantages the functionality of the primary controller is restored. of this architecture in the context of multi-hop embedded The requirement that all nodes in the WCN be at least wireless networks for control. loosely synchronized can be easily accomplished using in- 1. Low overhead: The proposed scheme is computationally band synchronization as a part of a TDMA-based Medium inexpensive since each node only needs to compute a linear Access Control (MAC) protocol (i.e., nodes implicitly syn- combination of its value and values of its neighbors. Thus, the chronize with another nodes using the current transmission WCN can be easily implemented even on resource constrained, slot, as in RT-Link [23] and wirelessHART [24]) or with hard- low-power wireless nodes (such as those shown in Fig. 2),7 ware synchronization (e.g., using an additional AM receiver, 8 using very simple, periodic tasks executed on a real-time as shown in Fig. 2(a) [23]). operating system (such as nano-RK [21] or TinyOS [22]). 2. Simple scheduling: The presented scheme does not Furthermore, unlike in traditional networked control schemes, require complex communication scheduling, since each node our approach can explicitly account for these computational needs to transmit exactly once in a frame and the WCN does and resource constraints during the design procedure (i.e., by not impose end-to-end delay constraints (i.e., nodes close to limiting the size of the state vector maintained by each node). the actuators do not need to wait for information to propagate In addition, as the only requirement of the scheme is that all the way from the sensors). The only requirement of the a node transmits its state once per time-step (also known as communication schedule is to be conflict-free (i.e., two nodes a frame in the wireless networking literature), the proposed within the same transmission range should not broadcast at scheme can be easily “piggy-backed” into wireless networks the same time). Since the WCN does not use any routing to that already assign a transmission slot for each node to and from a dedicated controller, the communication schedule maintain network related information (e.g., wireless systems does not have to change when link qualities change. On the for factory automation based on the ISA100.11a standard [14] other hand, standard routing techniques require a recalculation of the routes and communication schedules if the packet drop or wirelessHART [2]). For example, if the node’s state zi[k] is a 16-bit scalar, each node only needs to transmit 2 additional probability on one of the links increases dramatically. Thus,

7These nodes usually contain an 8-bit or 16-bit operating on 8Although the nodes in the network have to be synchronized, the WCN 8 MHz (or lately 16 MHz) clock, with up to 16 KB of RAM and a low-power scheme can also be implemented in wireless networks that utilize asyn- radio (typically IEEE 802.15.4 compatible radio, with 250 Kbps physical layer chronous MAC protocols (e.g., B-MAC [25]). In this case, the effects of data rate). Their power consumption is also very low; for example, the FireFly (increased) message collisions have to be taken into account while calculating node uses 60mW when both CPU and radio are active, or 3uW when the CPU the probability of message failure, since they will have negative effects on the and radio are in sleep mode [20]. system’s stability (as shown in Section V). TRANSACTIONS ON AUTOMATIC CONTROL 5

9 if di is the maximal degree of the interference graph, a static separate stabilizing set of linear combinations for each of the conflict-free schedule can be derived using graph coloring, new plants, with corresponding separate states maintained by with di slots in a frame. Since the duration of a frame is equal each node. To control all plants simultaneously, each node to the plant’s sampling period, the minimal sampling period of groups all of its P (possibly vector) states into a single 11 the plant is equal to diTslot, where Tslot is the duration of a transmission packet. Upon reception of the P different states communication slot. In contrast, traditional networked control from each of its neighbors, each node updates its P different systems often impose a requirement that the sampling period internal states using the appropriate linear combinations. This be greater than the end-to-end delay, causing the minimal enables a completely decoupled computation of the matrices P sampling period to directly depend on the network diameter. {Wi, Hi, Gi}i=1 that guarantee stability for each of the P 3. Multiple sensing/actuation points: The WCN can plants, although physically realized by the same WCN. As readily handle plants with multiple geographically distributed controlling an additional plant does not change the commu- sensors and actuators, a case that is not easily handled by nication schedule for the WCN, one can avoid the complex the “sensor → channel → controller/estimator → channel → rescheduling of communications and computations that is actuator” setup that is commonly adopted in networked control inherent in traditional networked control systems [16], [17]. design. Even in the few works that consider networked control over arbitrary topologies (e.g., [11], [12]), an assumption is IV. STABILIZING THE CLOSED-LOOP SYSTEM made that there is a single actuation and a single sensing point on the plant. Under this assumption, those papers recommend In this section we discuss the problem of determining the placing the controller at the actuation point, so that the con- linear combinations that should be used by each node and troller will know all of the inputs that are applied to the plant, actuator to stabilize the closed-loop system via the WCN. and can thus correctly estimate the state from the information From (4), the closed-loop system is stable if the matrix ˆ ˆ that it receives from the sensing point (via the other nodes). A = A(W, H, G) is Schur. The traditional approach to However, real-world plants contain multiple actuation and achieving this would be to attempt to find a positive definite ˆ T ˆ sensing locations, in which case it is no longer clear that the matrix X satisfying the Lyapunov inequality X−A XA ≻ 0, X Aˆ T X conclusions in those papers hold. Our approach, on the other or equivalently, XAˆ X ≻ 0. hand, does not rely on the existence of dedicated controllers, The above conditionh is noti linear in the design parameters and inherently captures the case of nodes exchanging values X, W, H, G; this is of no consequence in standard controller with the plant at various points in the network. design (when there are no structural constraints on the design 4. Compositionality: The WCN allows compositionality, matrices), because this condition can be converted to a Linear meaning that an existing design can be easily extended to Matrix Inequality (LMI) via an appropriate transformation of accommodate new subsystems that are added to the plant. the system matrices (e.g., as done in [26]). However, the fact In subsequent sections we describe how to synthesize the that the matrices are structured in our framework prevents WCN to stabilize a given plant. However, suppose that some us from directly applying these standard procedures.12 While new subsystems (or plants) are added in the proximity of the this direct attempt to cast the controller design problem as a wireless network, and the existing wireless infrastructure is LMI does not work in our context, we note that problems of to be used to control these new systems (in addition to the the above form appear in the design of static output feedback original plant). In traditional networked control schemes (with controllers with sparsity constraints on the gain matrix [28]. a dedicated controller node, and all other nodes functioning Although this is a computationally difficult problem in general as routers), reusing the network is complicated due to several (e.g., various versions of this problem are NP-hard [29], factors. First, each node would potentially have to transmit [30], [31]), various numerical approximation algorithms have multiple times during a given frame, based on when the been proposed in the literature (e.g., [32], [33], [34]). We information reaches it from the various sensors on the different now describe one such procedure that can be used to design plants. This requires the calculation of a new collision-free the WCN, and later we will show how this procedure can schedule for the entire network.10 Second, with each change be modified to deal with unreliable communication links in of communication schedules, it is necessary to analyze the the network. We start with the following characterization of schedule of computations on each node to determine whether stability of structured systems from [35]. a controller assigned with the execution of one (or more) Theorem 1: ([35]) A matrix Aˆ is Schur if and only if there control procedure(s) can schedule and execute them in time exist symmetric, positive-definite matrices X and Y such that X Aˆ T 1 (between packet reception and subsequent transmission) to Aˆ Y ≻ 0, X = Y− . provide outputs that are to be transmitted to actuators [16]. h i Compositionality is inherent in the WCN due to the fact 11Usually this is not a severe limitation even for low-, 802.15.4 that each node is only required to transmit once per frame networks (where each transmission can carry up to 1024 bits). In these (and end-to-end delay requirements do not enter into the networks, if each plant is controlled using the scheme where a node maintains a scalar 16 bit state value, then up to 64 plants can be controlled in parallel. picture). If P is the total number of plants, one can calculate a 12For matrices that have particular structures (such as being block diagonal), a common approach is to consider X to be block diagonal, which would 9 The interference graph is defined as G¯Int = {V ∪ S ∪ A, EInt}, where a maintain the structure of the design matrices after the linearization [27]. link between two nodes (or a node and a sensor/actuator) indicates that they However, for the (arbitrary) network topologies that we study in this paper, can interfere with each other (i.e., cannot transmit simultaneously). our experiments show that this approach is overly conservative and fails to 10Here we consider networks that utilize TDMA MAC protocols. find feasible solutions even when they exist. TRANSACTIONS ON AUTOMATIC CONTROL 6

The above theorem provides a matrix inequality that is Algorithm 1 Stabilizing closed-loop system with the WCN linear in the design variables W, G and H, but suffers from 1. Find feasible points X0, Y0, W0, H0, G0 that satisfy 1 the fact that the constraint X = Y− is nonconvex. One the constraints (6)-(7). If a feasible point does not exist, then appealing approach to deal with this was suggested in [33], it is not possible to stabilize the system with this network 1 [32], where the constraint X = Y− is approximated with an topology. optimization problem via the following lemma. 2. At iteration k (k ≥ 0), from Xk, Yk obtain the matrices Lemma 1: Positive-definite matrices X, Y satisfy the con- Xk+1, Yk+1, Wk+1, Hk+1, Gk+1 by solving the follow- 1 straint X = Y− if and only if they are optimal points for the ing LMI problem problem min tr(YkXk+1 + XkYk+1) 1 n S T (P1) : min tr(XY), s.t. X  Y− , X, Y ∈ ++ X Aˆ Xk 1 I k+1 k+1 ≻ 0, +  0, Aˆ Y I Yk 1 and the optimal cost of the problem is n.  k+1 k+1   +  1 Using the Schur complement, the constraint X  Y− in A BGk+1 X I Aˆ k+1 = , the above lemma can be transformed to the form [ I Y ]  0. Hk CWk 1  +1 +  Theorem 1 and Lemma 1 yield the following corollary. n+N (Wk 1, Hk , Gk ) ∈ Ψ, Xk , Yk ∈ S . Corollary 1: There exist a Schur matrix Aˆ = Aˆ (W, H, G) + +1 +1 +1 +1 ++ where the matrices W, H and G satisfy the desired sparsity 3. If the matrix constraints ((W, H, G) ∈ Ψ) if and only if the following ˆ A BGk+1 optimization problem Ak+1 = Hk CWk  +1 +1  min tr(XY), (5) is Schur, stop the algorithm. Otherwise, set k = k +1 and X Aˆ T X I A BG go to the step 2. ≻ 0,  0, Aˆ = Aˆ Y I Y HC W       (6) compared the convergence rates of various algorithms, and (W, H, G) ∈ Ψ, X, Y ∈ Sn+N (7) ++ similar experiments can be run for the synthesis of the WCN. is feasible with optimal cost n + N. Furthermore, in [33] the authors propose a simple modification Note that with the exception of the objective function (5), of the utilized algorithm in order to provide faster convergence. all of the constraints in the above corollary are linear in the However, the convergence rate of the algorithm depends on unknown parameters, and can readily be solved using LMI the initial points X0 and Y0, but we do not currently have tools. As described in [32], [36], a problem of the form (P1) a way to pick the ‘best’ such initial points. Indeed, due to from Lemma 1 (or (5)-(7) from Corollary 1) is known as a the computational complexity of the static output feedback cone complementarity problem (CCP). For such problems, El problem, it is difficult to obtain fast convergence of such Ghaoui et al. [32] showed that the nonconvex function tr(XY) algorithms in general. can be replaced with a linear approximation V. STABILIZATION DESPITE UNRELIABLE φlin(X, Y)= constant + tr(Y0X + X0Y), COMMUNICATION LINKS for any given matrices X0 and Y0. With this insight, [32], [33] In the previous section we considered the case where mes- showed that an iterative algorithm can be used to minimize sages exchanged between nodes are always delivered. Since tr(XY), while ensuring satisfaction of LMI constraints. For unreliability of the communication links is one of the main our application, the iterative approach proposed in those papers drawbacks of wireless networks, in this section we focus on can be formulated as Algorithm 1. more “realistic” system models, where potential message drops In [32] the authors showed that the sequence tk = are taken into account. In this case the system’s evolution can tr(YkXk+1 + XkYk+1) will always converge. In addition, if be described as: 1 the sequence converges to 2(n + N) the condition Y = X− A BGθ(k) , ˆ can be satisfied under the given LMI constraints. A similar xˆ[k +1]= xˆ[k] Aθ(k)xˆ[k], (8) H k CW k proof can be constructed in this case, which leads us to the  θ( ) θ( )  following theorem. where xˆ[k] ∈ Rn+N is the overall system’s state and Theorem 2: Algorithm 1 determines a tuple (W, H, G) ∈ the subscript θ(k) describes time-variations in the matrices Ψ that causes the matrix Aˆ (W, H, G) to be Schur if the se- (W, H, G) caused by (probabilistic) drops of communication quence tk = tr(YkXk+1 + XkYk+1) converges to 2(n + N). packets. The focus of this section is to adapt the design procedure described in the previous section to generate a set of Note that while each iteration of the above algorithm is a weights that guarantee stability of the system in a probabilistic convex optimization problem (which can be efficiently solved sense, defined below. using standard LMI toolboxes), currently there is no way to Definition 1: ([26], [37]) The system is mean-square stable 2 characterize the number of iterations required for the algorithm if for any initial state (xˆ[0],θ(0)), limk E kxˆ[k]k = 0, to converge. This problem has attracted substantial attention in where the expectation is with respect to→∞ the probability distri- the context of static output feedback design. For example, [34] bution of the packet drop sequence θ(k).   TRANSACTIONS ON AUTOMATIC CONTROL 7

    t = Ω(a,b) for convenience, and its weight as w ,h or g .   t t t

 In addition, all variables related to the link will be denoted  with index t (e.g., ξt[k], instead ξji[k]). The contribution of  +   )  +         )   the node vi to the linear combination calculated by node vj at

  time k can be represented as wtξt[k]zi[k], where ξt has mean  2 2 µt = E [ξt[k]] and a finite variance σt = E (ξt[k] − µt) . Following the approach in [37], we consider the link trans- Fig. 3. Remote control over channel; (a) A link between nodes vi   and vj ; (b) Link transformation into a robust control form. formation shown in Fig. 3(b). By writing ξt[k]= µt + ∆t[k], 2 where ∆t[k] is a zero-mean random variable with variance σt , the original unreliable link is modeled as a combination of a A vast amount of research has focused on the topic of deterministic link (without message drops) with gain µ and designing controllers to stabilize plants over communication t a random link described with gain ∆ [k]. Let r [k] denote the channels that are subject to Bernoulli packet drops, typically t t signal transmitted over the tth link, scaled by the weight on assuming the existence of a single unreliable channel between that link: the plant sensor and the controller, and the controller and the plant actuators [10], [9]. However, there are relatively few re- htyi[k] if t = Ω(si, vj ), r [k]= w z [k] if t = Ω(v , v ), sults that explicitly consider packet drops in networked control t  t i i j systems with general topologies. The paper [11] considered the  gtzi[k] if t = Ω(vi,aj). problem of the optimal location for a controller in a network Stacking all of the r [k]’s in a vector r[k] of length N , we t l and showed that placing the controller at the plant’s actuator can write would maximize the amount of information available to the y[k] C 0 r[k]= Jor = Jor xˆ[k] , Jˆorxˆ[k], (9) controller (since at any other location, it would not know z[k] 0 IN whether a control signal that it sent to the actuator was dropped     or RNl (N+p) along the way). The papers [12], [38] considered the issue where each row of the matrix J ∈ × contains a single nonzero element, equal to a gain wt,ht or gt. More of allowing intermediate nodes to encode information that or they are routing to the controller, so that the controller would precisely, the matrix J is defined as: receive enough information to stabilize the plant. All of these ht, if i ≤ p and ∃vj , Ω(si, vj )= t, papers assume a single sensor and actuation point on the plant, or wt, if p

1, if 1 ≤ i ≤ N, and ∃v ∈V∪S, Ω(v, vi)= t, Algorithm 2 Stabilizing the closed-loop system with unreli- Jdst = i,t 0, else. able communication links  (11) 1. Find feasible points X0, Y0, W0, H0, G0 that satisfy   Jdst dst u Defining J = Jdst the overall system (with potential the constraints (13), where: v message drops) can be represented as: h i X0 I n+N  0, (W0, H0, G0) ∈ Ψ, X0, Y0 ∈ S A BG B 0 I Y0 ++ xˆ[k+1] = µ xˆ[k]+ Jdst ∆[k]r[k],   HµCWµ 0 IN     If there is no feasible point, it is not possible to obtain dst MSS with this network topology and distribution on the Aˆ µ Jˆ (12) communication links. | {z } | {z } with r[k] given by (9). 2. At iteration k, (k ≥ 0) from Xk, Yk obtain the matri- As previously mentioned, an assumption is made that ces Xk+1, Yk+1, Wµ,k+1, Hµ,k+1, Gµ,k+1 and a vector ∆t[1], ∆t[2],... ∆t[k],... are independent zero-mean random RNl by solving the following LMI problem: 2 αk+1 ∈ variables with variance σt . In addition, we assume that all ran- YkXk 1 XkYk 1 dom variables, ∆1,..., ∆Nl are independent (i.e., link failures min tr( + + + ) are independent across time and space). With this assumption, dst T dst T Xk − (Jˆ ) diag{αk }(Jˆ ) Aˆ µ,k using the approach in [37], we obtain the following result.15 +1 +1 +1 ≻ 0, Aˆ T Y Theorem 3: The system from (12) is MSS if and only " µ,k+1 k+1 # if there exists a positive-definite matrix X and scalars Xk+1 I  0, α ,...,α satisfying the LMIs I Yk+1 1 Nl   ˆ ˆ T ˆdst ˆdst T A BGµ,k+1 X ≻ AµXAµ + J diag{α}(J ) Aˆ µ,k+1 = , (13) Hµ,k+1CWµ,k+1 2 ˆor ˆor T   αi ≥ σi (J )iX(J )i , ∀i ∈{1,...,Nl} ˆor αi,k+1 σi(Jk+1)i or th or or T  0, 1 ≤ i ≤ Nl, where Jˆ denotes the row of the matrix Jˆ . σi(Jˆ ) Yk+1 ( )i i  k+1 i  Using the Schur complement and the cone complementarity Sn+N (Wµ,k+1, Hµ,k+1, Gµ,k+1) ∈ Ψ, Xk+1, Yk+1 ∈ ++ condition as in Section IV, Algorithm 2 (shown below) can be constructed to solve the inequalities presented in the above 3. Stop the algorithm if the following conditions are true dst theorem (note that the matrix Jˆ and σi’s are constants). As ˆ ˆ T ˆdst ˆdst T Xk+1 ≻ Aµ,k+1Xk+1Aµ,k+1 + J diag{αk+1}(J ) in the previous section, we obtain the following theorem. 2 or or T Theorem 4: Algorithm 2 will determine the tuple αi,k+1 ≥ σi (Jk+1)iXk+1(Jk+1)i , 1 ≤ i ≤ Nl. (W, G, H) ∈ Ψ that guarantees MSS of the system under Otherwise, set k = k +1 and go to step 2. the given distribution of the link failures in the network if the sequence tk = tr(YkXk+1 + XkYk+1) converges to 2(n + N). we can model the WCN as a linear system precisely due to Remark 3: It is worth noting that any matrices the specific linear iterative strategy that we are having each dst or Aˆ µ, X, J , J and vector α that satisfy the constraints T node follow). from (13) for the link quality vector σ¯ = [¯σ1,..., σ¯Nl ] , also satisfy the constraints for any vector σ such that σ  σ¯ VI.INCORPORATING MORE POWERFUL NODES (where “” implies elementwise inequality). Thus, finding a Our development so far has treated the case where each node R vector σ = σ1, σ ∈ for which there exists matrices W, in the WCN maintains a single scalar state, which allows very G H and that guarantee MSS allows the use of the same simple nodes to be used for controlling the plant. However, our matrices W, G, H even when the link qualities are better approach can also be used to design heterogeneous networks than that specified by the vector σ. The largest value of σ for where nodes may have different memory and computing R which the system is MSS can be found by allowing σ ∈ to capabilities (including the case where some nodes are, in fact, be a variable. This causes the last matrix inequality in step dedicated controllers). Mathematically, this can be modeled by 2 of Algorithm 2 to be a bilinear constraint, but this can be describing node ’s state with a vector z Rni , with update R vi i ∈ handled by using bisection on the parameter σ ∈ (e.g., as procedure (similar to (2)): done in [26]). Remark 4: Note that the number of constraints in Algo- zi[k +1]= wiizi[k]+ wij zj [k]+ hij yj [k] rithm 2 grows linearly with the number of links in the vj v sj v X∈N i X∈N i network, rather than exponentially (i.e., we do not have to where w ∈ Rni nj and h ∈ Rni . In addition, a plant’s consider all possible combinations of failed links at any given ij × ij input u at time-step k has the form: time-step). This is due to the fact that stability under link i failures is viewed as a problem of robustness in a linear system ui[k]= gij zj [k] in this framework, which is one of its main benefits (note that j a ∈NXi R1 nj 15The proof of this theorem is a special case of the proof of Theorem 5 with gij ∈ × . If each value from a node’s state is provided in the Appendix. transmitted in separate packets, a node vi could be modeled TRANSACTIONS ON AUTOMATIC CONTROL 9

j as ni different nodes (vi , j ∈ {1, ..., ni}), where each node    would maintain a scalar value as its state. This would allow    the use of Algorithm 2 to determine matrices W, H, G that   have the desired sparsity pattern and guarantee MSS of the       system. However, this scheme would also require more than      one transmission per node per frame, which would increase the   minimal required sampling period of the plant and complicate    the task of scheduling transmissions. Instead, if each node    transmits its whole state vector in a single message, a node      cannot be modeled as a set of separate independent nodes, as    in this case the assumption that all channels are independent Fig. 4. Two examples of WCNs; (a) A plant with a scalar state controlled by is not valid (if the packet is not received, all values from a WCN where each node maintains a scalar state; (b) A single-input-single R3 the packet are lost). In this case, each link t = Ω(v , v ) or output plant with state controlled by a WCN where each node maintains i j a scalar state. t = Ω(vi,aj ) will carry ct = ni scalar values at each time- 2 step. As in Section V, let rt[k] denote the signal transmitted ni = 1 (scalar state) ni = 2 (R state) over the t-th link, scaled by the weight (matrix) on that N = 2 pmax = 0.69% pmax = 0.72% N = 3 pmax = 0.74% pmax = 0.77% link (i.e., rt[k] is htyi[k], wtzi[k] or gtzi[k], depending on N = 4 pmax = 0.77% pmax = 0.79% whether the link is from a sensor to a node, between two TABLE I nodes, or from a node to an actuator, respectively). Let ct′ MAXIMALMESSAGEDROPPROBABILITYFOR MSS IN FIG. 4(A) Nl denote the size of rt[k], and let Cs = t=1 ct′ , where Nl denotes the number of links in the network. As in Section P if each node maintains a scalar state, Algorithm 2 converges V, the overall system is given by equations (9) and (12), after 51 iterations17 to a stable configuration where xˆ[k] ∈ RNs , G ∈ Rm Ns , H ∈ RNs p, W ∈ µ × µ × µ 0.228 0.965 1 RNs Ns dst R(m+Ns) Cs or RCs (p+Ns) W = , H = , G = 0 1.837 . (15) × and J ∈ × , J ∈ × , with  −2.872 −1.660  0 N   Ns = i=1 ni representing the total number of states over all nodes. The matrices Jor and Jdst are defined as in (10) and Using the bisection method described in the Remark 3, (11), withP a small difference that instead of scalars, matrices of we extracted the maximal probabilities of message drops, p , for which there exists a tuple (W, H, G) ∈ Ψ that appropriate dimensions are used.16 In addition, r[k] ∈ RCs and max N guarantees MSS. We considered two cases, one where all ∆[k] = blkdiag({∆ [k]} l ), where blkdiag is a block- t t=1 nodes in the network maintain a scalar state and the other diagonal operator and ∆t[k] = ∆t[k]Ic′ c′ . This brings us to t t R2 the following theorem (the proof is provided× in the Appendix). where they maintain a vector state in . In addition, networks Theorem 5: The system described with (12) and (9) (with with N = 3 and N = 4 nodes were considered, where the vector states at each node) is MSS if and only if there graph G = {V, E} is complete (V = {v1,...,vN }). The ′ ′ c c obtained results are presented in Table I. As can be seen, exist positive-definite matrices X and α ∈ R i i , i ∈ i × adding additional nodes does not significantly increase {1,...,N } that satisfy the following LMIs pmax l for this example; a possible hypothesis for this is that the single ˆ T dst dst T X ≻ Aˆ µXA + Jˆ blkdiag{α1,...,αN }(Jˆ ) link between node vN and the actuator is the bottleneck for µ l (14) 2 or or T stability. Similarly, adding more powerful nodes with larger αi  σ (Jˆ )i · X · (Jˆ ) , ∀i ∈{1,...,Nl} i i WCN states does not increase the robustness of the system to or th or 18 where (Jˆ )i denotes the i block-row of the matrix Jˆ packet drops in this particular example. i 1 i (containing ci′ rows from t−=1 ct′ +1 to t=1 ct′ ). To show compositionality, consider the system presented Using the theorem above, an algorithm similar to Algo- in Fig. 4(b), with a single-input-single-output plant of the rithm 2 can be used to determineP the (vector-valued)P update form (1), where for each node to apply in order to guarantee MSS. 1 1 0 0 A =  0 1 1  , B = 0.5 , C = 1 0.5 1 , VII. EXAMPLES 0 0 2 1       To illustrate the application of our design procedure from is controlled by a WCN consisted of nine nodes with a mesh the previous sections, consider the single state plant shown topology. The nodes v1, v2 and v3 are in the neighborhood of in Fig. 4(a) and suppose that each link in the network is the plant’s sensor, while nodes v7, v8 and v9 can communicate modeled as an independent Bernoulli process with probability with the plant’s actuator. As in the previous example, all links of losing a packet equal to p (the variance of each process in the network are modeled as independent Bernoulli processes is σ2 = p(1 − p)). To solve the optimization problem from with probability of losing a packet equal to p. We consider the Algorithm 2 we used CVX, a package for specifying and case where p = 0.1% for all links except the links between solving convex programs [39]. For α = 2 and p = 0.5%, the sensor and nodes v1, v2 and v3 and the links between

16 17 Specifically, matrices wt, gt and ht should be substituted for scalars The number of iterations needed before the algorithm converges to a wt,gt and ht, respectively. Also, instead of the scalar ‘1’ in (11), the identity stable configuration depends on initial points X0, Y0. 18 matrix Ini should be used, where ni is the state vector size for the link’s However, more powerful nodes can be shown to improve resilience to receiving node. packet drops in other scenarios [40]. TRANSACTIONS ON AUTOMATIC CONTROL 10

0.799 0.030 0 0.047 0.018 0 0 0 0 0.017 ......  −3 677 −2 097 −2 768 0 078 0 107 0 188 0 0 0  0 927 0 0.021 0.787 0 0.029 −0.002 0 0 0 0.020  −10.770 4.247 0 −0.560 0.067 0 0.035 −1.148 0   0      W =  −0.992 0.713 −1.008 0.163 0.757 −0.025 −0.030 0.291 −0.141  , H =  0  , (16)      0 −8.576 12.909 0 −0.314 1.370 0 3.769 0.038   0       0 0 0 −3.587 1.366 0 0.691 4.861 0   0       0 0 01.661 −0.060 −0.459 −0.015 −0.144 −0.090   0       0 0 0 00.286 −0.204 0 0.805 0.744   0  G = 0000000.056 −1.620 0.233 . (17)    with topology shown in Fig. 5, where each sensor sj can      th measure the j output (yj), while each input ui is controlled   by the actuator . Algorithm 1 converged in less than 27      ai  minutes to a stable configuration. However, as the considered network has 132 unidirectional links (since a bidirectional link             is considered as two unidirectional links), the optimization      problem considered in Algorithm 2 has 132 additional con-       straints compared to the optimization problem in Algorithm 1.

 This increase in the number of constraints proved to be too      much for CVX to handle, causing it to exceed the memory   available on our computers; this was not unexpected, however,        as CVX is not designed to deal with large scale problems [39]. Part of our future work in this area will be to write a dedicated Fig. 5. An example of plant with 30 states controlled by a WCN consisted solver to fully test our scheme on large-scale systems. of mesh network with 16 nodes.

ISCUSSION nodes v7, v8 and v9 and the actuator. In this case, Algorithm 2 VIII. D converged to the stable configuration shown in (16), (17). A. Relationship Between the WCN and Multi-Hop Delays Now consider a scenario in which the plant from Fig. 4(a) is At first glance, the WCN might seem to introduce some added to the system in a way that its sensor can communicate delay into the feedback loop (since the sensor nodes and only to node v , while its actuator can receive packets only 4 actuator nodes might be separated by multiple intermediate from node v . If these two links are modeled as Bernoulli 7 nodes, each taking one time-step to propagate information), links with p ≤ 0.5% nodes v and v can be used to control 4 7 which might limit the class of plants that can be stabilized with the plant with configuration derived in the previous example this method. However, the relationship between the WCN and (from Remark 3, the derived configuration guarantees MSS the traditional notions of delay introduced by the feedback for networks where probabilities for all links are loop is not as obvious as it might appear at first glance. less or equal 0.5%). In this case, both plants can be controlled Specifically, note that we allow each node in the network to with the WCN from Fig. 4(b), where all nodes in the WCN maintain a value that is a function of its previous value and the maintain two scalar states and calculate the first update using values of all its neighbors, rather than simply routing values the coefficients from (16), (17) while the second update is to a controller. This simple modification causes the network calculated using a matrix W where only w , w , w , w 44 74 47 77 to act as a linear dynamical system with sparsity constraints are nonzero and are derived from (15). As described in in the system matrices; in other words, this control scheme Section III, we were not required to model both plants as should be viewed as a dynamic compensator, rather than a a single plant in order to extract a stable configuration (under static feedback gain at the end of a chain of delay elements. the assumption that each node can maintain a vector state in The following example shows that this fact allows our scheme R2), but were rather able to compose previously computed to stabilize plants that cannot be stabilized with delayed static stable configurations. It is worth noting that, although the feedback. previous two examples were calculated for networks with Consider once again the single-state plant shown on the left different topologies, in cases when a network is a subgraph side of Fig. 4(a) (with α > 1), which is to be controlled by of another network, the former stable configuration can be a network with two nodes v and v . Node v receives the simply ‘extended’ by adding zeros to unused links in the 1 2 1 plant output y[k]= x[k] at each time-step k, and the input to latter network. Furthermore, note that no new computation of the plant is taken to be a scaled version of the transmission communication or computation schedules is required for the of the node v (i.e., u[k]= gz [k], for some scalar g). If the WCN; the new plant is controlled simply by increasing the 2 2 nodes apply the linear strategy that we study in this paper, the information in the (single) transmission by each node. closed loop system evolves according to To test our algorithm on an even more complex example, we generated a random plant with n = 50 states, p = 10 inputs x[k + 1] α 0 g x[k] and m = 10 inputs, with approximately three eigenvalues z [k + 1] = h w w z [k] , (18)  1   11 12  1  in the interval (1, 1.1]. The plant is connected to the WCN z2[k + 1] 0 w21 w22 z2[k]       TRANSACTIONS ON AUTOMATIC CONTROL 11

for some scalars w11, w12, w21, w22,g and h. Recall from the be performed in a distributed manner during run-time via example in Section VII that these scalars can be chosen so a simple leader-election protocol [41]). This neighbor then that the closed loop system is stable. In fact, if one chooses becomes a virtual node, emulating the behavior of the failed 1 3 the values g = h = 1, w11 = 0, w12 = α , w21 = −α and node by maintaining its state, and transmitting and receiving w22 = −α, the closed-loop system will have all poles at zero in the time-slots assigned to the failed node (in addition to for any α 6=0. maintaining and transmitting its own state, as usual). With this Now, consider a control scheme where node v1 simply scheme, all other nodes in the network (with the exception forwards the state measurement to v2 at each time-step, and v2 of the neighbors of the failed node) continue to operate as sends this value to the actuator where the input u[k]= gz2[k] normal. Note that this method causes some nodes to expend is applied. This can be modeled by setting w11 = w12 = more power after failures (due to the fact that neighbors of w22 = 0, w21 = 1, and h = 1 in (18). The characteristic the failed node have to transmit over longer distances and one polynomial of this system is z2(z − α) − g, and one can show neighbor performs extra computations). However, it presents (e.g., using the root locus) that it is possible to find a g such a simple distributed approach to ensure graceful degradation that this polynomial has all roots inside the unit circle if and of the network under failures. 3 only if |α| < 2 . In other words, the delay introduced by this routing scheme limits the class of plants that can be stabilized. IX. CONCLUSION AND FUTURE WORK As a further example, consider the case where we allow w22 to be nonzero (thereby allowing v2 to be a “controller” We have introduced the concept of a Wireless Control with dynamics, while v1 is still a ). In this case, the Network, where the network itself acts as a controller for the 3 2 characteristic polynomial is z − (α + w22)z + αw22z − g. plant. Each node in a WCN executes a simple procedure by Letting p1,p2,p3 denote the roots of this polynomial, we see updating its state to be a linear combination of the states of that α + w22 = p1 + p2 + p3 and αw22 = p1p2 + p1p3 + p2p3. its neighbors. We presented a procedure that can be used to Now, if all roots are inside the unit circle, it follows that design the linear combinations in order to stabilize the closed loop system. In addition, we showed that the aforementioned −3

[21] “nano-RK Sensor Real-Time Operating System,” Publishers, Inc., 1996. http://nanork.org. [42] S. Boyd, L. E. Ghaoui, E. Feron, and V. Balakrishnan, “Linear [22] P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, matrix inequalities in system and control theory,” in SIAM A. Woo, D. Gay, J. Hill, M. Welsh, E. Brewer, and D. Culler, Studies in Applied Mathematics, 1994, vol. 15, p. 131. “TinyOS: An Operating System for Sensor Networks,” in Am- bient Intelligence, 2005, pp. 115–148. [23] A. Rowe, R. Mangharam, and R. Rajkumar, “RT-Link: A Time- Synchronized Link Protocol for Energy-Constrained Multi-hop Wireless Networks,” in SECON’06: Proc. 3rd Annual IEEE Miroslav Pajic (S’06) received the Engineer Communications Society on Sensor and Ad Hoc Communica- Diploma (graduated with summa cum laude) from tions and Networks, 2006, pp. 402–411. the School of Electrical Engineering, University of [24] J. Song, S. Han, A. Mok, D. Chen, M. Lucas, M. Nixon, Belgrade in 2003 and M.S. degrees in electrical and W. Pratt, “WirelessHART: Applying wireless technology engineering from University of Belgrade in 2007 and the University of Pennsylvania in 2010. Since in real-time industrial process control,” in RTAS’08: Proc. 14th 2008 he has been a Ph.D. candidate in the Dept. of IEEE Real-Time and Embedded Technology and Applications Electrical & Systems Engineering at the University Symposium, 2008, pp. 377–386. of Pennsylvania. His research interests include real- [25] J. Polastre, J. Hill, and D. Culler, “Versatile low power media time embedded systems, networked control systems, access for wireless sensor networks,” in Proc. 2nd International medical devices, and cyber-physical systems. conference on Embedded networked sensor systems, ACM Sen- sys, 2004, pp. 95–107. [26] P. Seiler and R. Sengupta, “Analysis of communication losses in vehicle control problems,” in Proc. American Control Con- ference, 2001, pp. 1491–1496. Shreyas Sundaram (M’09) is an Assistant Professor [27] L. Bakule, “Decentralized control: An overview,” Annual Re- in the Dept. of Electrical and Computer Engineering at the University of Waterloo. He received his MS views in Control, vol. 32, no. 1, pp. 87–98, 2008. and PhD degrees in electrical engineering from [28] V. Syrmos, C. Abdallah, P. Dorato, and K. Grigoriadis, “Static the University of Illinois at Urbana-Champaign in output feedback - A survey,” Automatica, vol. 33, no. 2, pp. 2005 and 2009, respectively. He was a Postdoctoral 125–137, 1997. Researcher in the GRASP Laboratory at the Univer- [29] V. Blondel and J. Tsitsiklis, “NP-hardness of some linear control sity of Pennsylvania from 2009-2010. His research design problems,” SIAM Journal of Control and Optimization, interests include secure and fault-tolerant control vol. 35, no. 6, pp. 2118–2127, 1997. of distributed systems and networks, analysis of [30] O. Toker and H. Ozbay, “On the NP-hardness of solving bilinear complex networks, structured system theory, and the matrix inequalities and simultaneous stabilization with static application of graph theory to systems analysis. He was a finalist for the Best Student Paper Award at the 2007 and 2008 American Control Conferences. output feedback,” in Proc. American Control Conference, 1995, pp. 2525 – 2526. [31] V. D. Blondel and J. N. Tsitsiklis, “A survey of computational complexity results in systems and control,” Automatica, vol. 36, no. 9, pp. 1249–1274, 2000. George J. Pappas (S’90-M’91-SM’04-F’09) re- [32] L. El Ghaoui, F. Oustry, and M. Ait Rami, “A cone comple- ceived the Ph.D. degree in electrical engineering and mentarity linearization algorithm for static output-feedback and computer from the University of California, related problems,” IEEE Transactions on Automatic Control, Berkeley, in 1998 where he received the Eliahu Jury vol. 42, no. 8, pp. 1171–1176, 1997. Award for Excellence in Systems Research. He is [33] P. Naghshtabrizi and J. P. Hespanha, “Anticipative and non- currently the Joseph Moore Professor of Electrical anticipative controller design for network control systems,” in and Systems Engineering at the University of Penn- Networked Embedded Sensing and Control, ser. Lect. Notes in sylvania. He is a member of the General Robotics, Automation, Sensing and Perception (GRASP) Lab- Contr. and Inform. Sci. Springer, 2006, vol. 331, pp. 203–218. oratory and serves as the Deputy Dean for Re- [34] M. de Oliveira and J. Geromel, “Numerical comparison of search in the School of Engineering and Applied output feedback design methods,” in Proc. 16th American Science. His current research interests include hybrid and embedded systems, Control Conference, 1997, pp. 72–76. hierarchical control systems, distributed control systems, nonlinear control [35] M. C. de Oliveira, J. E. Camino, and R. E. Skelton, “A convex- systems, with applications to robotics, unmanned aerial vehicles, biomolecular ifying algorithm for the design of structured linear controllers,” networks, and green buildings. Proc. 39th IEEE Conference on Decision and Control, pp. Prof. Pappas has received numerous awards, including the National Science 2781–2786, 2000. Foundation (NSF) CAREER Award in 2002, the NSF Presidential Early [36] O. Mangasarian and J. Pang, “The extended linear comple- Career Award for Scientists and Engineers in 2002, the 2009 George S. Axelby Outstanding Paper Award, and the 2010 Anotnio Ruberti Outstanding Young mentarity problem,” SIAM Journal on Matrix Analysis and Researcher Prize. He is also a Fellow of IEEE. Applications, vol. 16, no. 2, 1995. [37] N. Elia, “Remote stabilization over fading channels,” Systems & Control Letters, vol. 54, no. 3, pp. 237–249, 2005. [38] C. L. Robinson and P. R. Kumar, “Sending the most recent observation is not optimal in networked control,” in Proc. 46th Rahul Mangharam (M’02) received his BS, MS IEEE Conference on Decision and Control, 2007, pp. 334–339. and Ph.D. in Electrical and Computer Engineering [39] M. Grant and S. Boyd, “CVX: Matlab software for dis- from Carnegie Mellon University in 2000, 2002 and ciplined convex programming (web page and software). 2008 respectively. He is the Stephen J Angello Chair http://stanford.edu/ boyd/cvx,” June 2009. and Assistant Professor in the Dept. of Electrical & [40] M. Pajic, S. Sundaram, G. J. Pappas, and R. Mangharam, Systems Engineering and Dept. of Computer & In- “A Simple Distributed Method for Control over Wireless Net- formation Science at the University of Pennsylvania. His interests are in real-time scheduling algorithms works,” in The First Workshop on Real-Time Wireless for for networked embedded systems with applications Industrial Applications, 2011. in automotive systems, medical devices and control [41] N. A. Lynch, Distributed Algorithms. Morgan Kaufmann networks.