Download Control Engineering Laboratory Process control across network

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Wireless USB wikipedia , lookup

CAN bus wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Distributed firewall wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Network tap wikipedia , lookup

Wireless security wikipedia , lookup

IEEE 1355 wikipedia , lookup

Airborne Networking wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Control Engineering Laboratory
Process control across network
Vincenzo Mattina and Leena Yliniemi
Report A No28, October 2005
University of Oulu
Control Engineering Laboratory
Report A No 28, October 2005
Process control across network
Vincenzo Mattina* and Leena Yliniemi**
• *University of Palermo, Department of Chemical Engineering
**University of Oulu, Control Engineering Laboratory
Abstract: This research analyzes and examines process control across wireless network.
The main focus is to examine the applicability of a wireless network to the control of a
laboratory-scaled process and to compare results with the results achieved by two different
wired networks (EthernetLAN and Internet). Especially the delay times and packet losses
will be compared using wired and wireless networks.
The theoretical part reviews the terminology and basic technologies of communication
networks, emphasizing the principles of various network types. The new wireless
technologies and their main characteristics have been presented, with particular interest on
new application fields of these technologies. The compensation methods of a network delay
have been also presented.
In the experimental part, the components and software used have been described and a
control application suitable for controlling a real-time process via network has been
presented. The programs LabVIEW and Commview have been used in developing the
control application and in monitoring the traffic of UDP packets on the network. UDP is a
protocol used to transport the measurement and control data. The experimental environment
consists of a laboratory-scaled flow process. Two different test series have been done. In the
first test series the controller and the process are in the same place, in a classroom of the
university and in the second test series the controller is in the main library of Oulu City,
while the process is in the same place as in the first test series.
The results show that the process control via wireless network is good and feels little the
effects of distance between the process and controller. The packet losses and delay times are
minimal and almost the same both for the wired and wireless network. These experiments
show that wireless technologies are applicable for process control taking into the delay time
and packet loss.
Keywords: wireless control, network control, remote control
ISBN 951-42-7875-5
ISSN 1238-9390
University of Oulu
Control Engineering Laboratory
Box 4300, FIN-90014 University of Oulu
Contents
1
2
3
4
5
6
7
8
Introduction
Networking
2.1
Network types for control systems
2.1.1 Ethernet with CSMA/CD mechanism
2.1.2 Token-passing bus (ControlNet)
2.1.3 CAN bus
Protocol architecture
3.1
Protocols
WLAN
4.1
Physical layer
Bluetooth
5.1
Physical link definition
5.2
Supported protocols
Networked-based control system
6.1
Structure of networked-based control systems
6.2
Stability of network control systems
6.3
Problems in network control systems
6.3.1 Time delays
6.4
Networked control methodologies
6.4.1 Robust control methodology
6.4.2 Fuzzy logic modulation methodology
6.4.3 Novel auto-tuning robust PID controller
for networked control system
Wireless network
7.1
Comparison between wireless and wired systems
7.2
Topology of wireless
7.3
Types of wireless networks
7.4
Wireless network control system for chemical plants
Comparison of experimental results between wireless and
wired networks
Conclusions
References
1
2
3
3
3
3
4
4
6
6
7
7
8
9
9
9
10
10
14
15
16
18
23
23
24
25
26
28
38
39
1
INTRODUCTION
A traditional centralized control system is no longer suitable to meet new requirements
such as modularity, distributed control, integrated diagnostics, quick and easy
maintenance and low cost. Network systems with common bus architectures, called
networked control systems (NCSs) provide several advantages such as small volume of
wiring and distributed processing. Connecting the control system components such as
sensors, controllers and actuators via a network it is possible to reduce the complexity of
the systems.
The applications connected through the network can be remotely controlled from a longdistance source. Especially with respect to manufacturing systems, NCS architectures that
utilize processing power at each node allow for the modularization of functionality and
standard interfaces for interchangeability and interoperability. Many different network
types exist for control systems. The most common are the Ethernet with CSMA/CD
mechanism, token-passing bus (ControlNet), and controller area network (CAN) bus
(DeviceNet).
1
2
NETWORKING
Network is typically defined as a collection of terminals, computers, servers, allowing an
easy data flow and usage of common resources. There are several ways of assorting
networks comprehending size, type of connection, media, protocol or use. The network
size can be presented with three typical magnitudes as Figure 1 presents
•
•
•
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN).
LAN is generally characterized by three basic features:
•
•
•
Diameter of not more than few kilometers
Total rate at least several Mbps
Complete ownership by a single organization.
WAN typically covers whole countries. It has slower data rates and the infrastructure is
usually owned by multiple organizations. WANs normally consist of several LANs,
which have been connected together with the third party networks.
WLANs are the newest step in the networking technology. The purpose of WLAN
(Wireless Local Area Network) is to provide all features and benefits of traditional LAN
technologies such as Ethernet but wirelessly. WLAN works without limitations of cabling
using either infrared light (IR) or radio frequencies (RF) as a medium.
WAN(Wide Area Network)
MAN(Metropolitan Area Network)
LAN(Local Area Network)
Figure 1. Different networks with magnitudes.
2
2.1
Network types for control systems
A network is a collection of computing devices interconnected with cables, radio
transmissions or light (IR) which has the capacity to communicate via the connection
media. Thus, the devices on a network have the ability to connect and transmit data, if the
conditions of the media and transmission procedures are met. For control systems, the
common network types are Ethernet (CSMA/CD), token-passing bus
( ControlNet ) and CAN Bus ( Device Net ).
2.1.1
Ethernet with CSMA/CD mechanism /1, 2/
Ethernet uses the CSMA/CD mechanism for resolving contention on the communication
medium. When a node wants to transmit, it listens to the network. If the network is busy,
it waits until the network is idle, otherwise it transmits immediately. If two or more nodes
listen to the idle network and decide to transmit simultaneously, the messages of these
transmitting nodes collide and the messages are corrupted. While transmitting, a node
must also listen to detect a message collision. On detecting a collision between two or
more messages, a transmitting node stops transmitting and waits a random length of time
to retry its transmission. The data packet frame size is between 46 and 1500 bytes.
Ethernet uses a simple algorithm for operation of the network and has almost no delay at
low network loads. It is mainly used in data networks. Ethernet is a technology, which
does not support any message prioritization. At high network loads, message collisions
are the major problem because they greatly affect data throughput and time delay, which
may be unbounded.
2.1.2
Token-passing bus (ControlNet) /1/
The nodes in the token-passing bus network are arranged logically into a ring and each
node knows the address of its predecessor and its successor. During operation of the
network, the node with the token transmits data frames until either it runs out of data
frames to transmit or the time it has held the token reaches a limit. The node then
regenerates the token and transmits it to its logical successor on the network. Data frames
do not collide, as only one node can transmit at a time. The token- passing bus is
deterministic that provides excellent throughput and efficiency at high network loads.
Although the token bus is efficient and deterministic at high network loads, at low
channel traffic its performance cannot match that of contention protocols.
2.1.3
CAN bus (DeviceNet) /1/
CAN is a serial communication protocol developed mainly for applications in the
automotive industry and it is optimized for short messages and uses a CSMA/arbitration
on message priority medium access method. A node that wants to transmit a message
waits until the bus is free and then starts to send the identifier of its message bit by bit.
Conflict for access to the bus is resolved during transmission by an arbitration process at
the bit level of the arbitration field, which is the initial part of each frame. If two devices
want to send messages at the same time, they first continue to send message frames and
then listen to the network. If one of them receives a bit different from the one it sends out,
it loses the right to continue to send its message, and the other wins the arbitration. CAN
is a deterministic protocol optimized for short messages. Higher priority messages always
gain access to the medium during arbitration. The major disadvantage of CAN compared
with the other networks is the slow data rate and the throughput is limited. CAN is also
not suitable for transmission of messages of large data sizes.
3
3
PROTOCOL ARCHITECTURE /2, 3/
In the protocol architecture the modules are arranged in a vertical stack, where each
layer performs a related subset of functions required to communicate with another
system. Communication is achieved by having peer layers in two systems
communicate. The peer layers communicate by means of formatted blocks of data
that obey a set of rules or conventions known as protocol.
3.1
Protocols
The protocols on the network layer are the key components of a computer network.
The protocols are a set of standardized instructions, which the applications use to
communicate with each other over the network. Data communication protocols are
accurately standardized, documented and widely known. They are used to transport
data from an application to a remote application over the network. Two protocols are
special importance in the network control systems: TCP/IP and UDP/IP.
The communication tasks for TCP/IP (Transmission Control Protocol/Internet
Protocol) can be organized into five relatively independent layers:
•
•
•
•
•
application layer
transport layer
internet layer
network access layer
physical layer.
TCP provides a point-to-point channel for applications that require reliable
communication. It can be used to transport data with a wide variety of network
technologies and it functions on a Token Ring network as well as it does on an
Ethernet. TCP/IP can also be used to transmit data by using the serial
communication port and radio frequency links. It is the most supported protocol
worldwide.
UDP (User Datagram Protocol) is a protocol that sends independent packets of data,
called datagrams, from one computer to another with no guarantee about arrival.
UDP is not connection-based like TCP. The order of delivery is not important and is
not guaranteed, and each message is independent of any other. For many
applications, the guarantee of reliability is critical to the success of the transfer of
information from one end of the connection to the other. However, other forms of
communication do not require such strict standards.
The OSI reference model was developed by the International Organization for
Standardization (ISO) as a model for a computer protocol architecture and as a
framework for developing protocol standards. It consists of seven layers:
1. Physical layer: Provides electrical, functional, and procedural characteristics to
activate, maintain, and deactivate physical links that transparently send the bit
stream; only recognises individual bits, not characters or multicharacter frames.
2. Data link layer: Provides functional and procedural means to transfer data
between network entities and (possibly) correct transmission errors; provides for
4
activation, maintenance, and deactivation of data link connections, grouping of bits
into characters and message frames, character and frame synchronisation, error
control, media access control, and flow.
3. Network layer: Provides independence from data transfer technology and
relaying and routing considerations; masks peculiarities of data transfer medium
from higher layers and provides switching and routing functions to establish,
maintain, and terminate network layer connections and transfer data between users.
4. Transport layer: Provides transparent transfer of data between systems, relieving
upper layers from concern with providing reliable and cost effective data transfer;
provides end-to-end control and information interchange with quality of service
needed by the application program; first true end-to-end layer.
5. Session layer: Provides mechanisms for organising and structuring dialogues
between application processes; mechanisms allow for two-way simultaneous or twoway alternate operation, establishment of major and minor synchronization points,
and techniques for structuring data exchanges.
6. Presentation layer: Provides independence to application processes from
differences in data representation that is, in syntax; syntax selection and conversion
provided by allowing the user to select a "presentation context" with conversion
between alternative contexts.
7. Application layer: Concerned with the requirements of application. All
application processes use the service elements provided by the application layer. The
elements include library routines which perform interprocess communication,
provide common procedures for constructing application protocols and for accessing
the services provided by servers which reside on the network.
5
4
WLAN /4/
The wireless network is a system of data transmission that exploits the radio
frequency technology to the place of the connection with cables. It allows computer,
telephones, etc. to exactly be interconnected among them as through a net LAN or
traditional WAN. In this way the sharing of information and resources among distant
points geographically it becomes more flexible and fast guaranteeing the immediate
circulation of any data (audio/video, projects, documents, signals of trial, etc.).
In comparison to the transit of data in the internet the wireless system guarantees a
greater safety (the net is deprived) and a greater bandwidth to equivalent costs and
often even inferior. The wireless solution is to prefer in comparison to the solution
wired (copper or fibre optics) in how much it guarantees very competitive costs.
Beginning from 2002 the wireless network underline a notable development both for
the liberalization of the band 2,4 GHz and 5,4 GHz, that for the most greater
efficiency of the data transmission. Several standards are available for wireless
networking. They are referred to as the IEEE 802.11 standard set. Collision detection
is difficult to implement in wireless networks and a variant of CSMA/CD is used for
this purpose. This variant is called Carrier Sense Multiple Access with Collision
Avoidance(CSMA/CA).
4.1
Physical Layer
The physical layer specification includes two RF (radio frequencies) spread
spectrum technologies and one infrared technology ( IF ): DSSS, FHSS and IF.
DSSS (direct-sequence spread spectrum) operating in the 2.4 GHz ISM (Industrial
Scientific and Medical) band, at data rates of 1Mbps, 2 Mbps, 5.5 Mbps and 11
Mbps. That is the bandwidth reserved for general use by Industrial, Scientific and
Medical applications worldwide. It requires that each data bit is spread over a 22
MHz slice of the ISM band by mixing each data bit with a high rate pseudorandom
“chipping code”. After the mixing operation, the resulting data is carried by RF.
FHSS (frequency-hopping spread spectrum) operating in the 2.4 GHz ISM band, at
data rates of 1 Mbps and 2 Mbps. It uses a transmitter and receiver pre-defined
pseudorandom hopping pattern which must hop across 75.1 MHz frequency slots at
least once every 400ms. Each frequency slot must be utilized at least once every 30
seconds. The standard specifies that the entire data frame must be sent before it hops
to another frequency. The FHSS systems commonly work with 1 Mbps data rate.
IF operates at wavelengths between 850 and 950 nanometers and achieves data rates
of 1 Mbps and 2 Mbps. Of all sections, this solution is quite rare.
6
5
Bluetooth /5/
The Bluetooth technology eliminates the need for wires, cables, and the
corresponding connectors between mobile phones, modems, computers, and so on.
The main aim of Bluetooth is to be widely available, inexpensive, convenient, easy
to use, small and low power. One of the most characteristics of the Bluetooth
specification is that it should allow devices from a lot of different manufacturers to
work with each another. Bluetooth allows up to eight devices to connect together in a
group called a piconet. It uses packet-based transmission. The information stream is
fragmented into packets. All packets have the same format, starting with an access
code, followed by a packet header, and ending with the user payload. Bluetooth
devices operate at 2.4 GHz, in the globally available, license-free, ISM band. Since
this radio band is free to be used by any radio transmitter as long as it satisfies the
regulations, the intensity and the nature of interference can not be predicted.
Therefore, the interference immunity is very important issue for Bluetooth.
Interference immunity can be obtained by interference suppression or avoidance.
Suppression can be obtained by coding or direct-sequence spreading. Instead,
interference avoidance is more attractive since the desired signal is transmitted at
points in frequency and time where interference is low or absent. Avoidance in
frequency is more practical. Since the 2.4 GHz band provides about 80 MHz of
bandwidth and most radio systems are band-limited, with high probability a part of
the radio spectrum can be found where there is no dominant interference. Filtering in
the frequency domain provides the suppression of the interferers at other parts of the
radio band. To implement the multiple access scheme for the Bluetooth, FH-CDMA
(Frequency Hopping – Code Division Multiple Access) technique has been chosen.
5.1
Physical link definition /6/
There are two basic types of physical links:
•
•
Synchronous Connection Oriented ( SCO )
Asynchronous Connection-Less ( ACL )
A SCO link is a point-to point link and it provides a symmetric link between the
master and the slave as shown in Fig. 2, with regular periodic exchange of data in the
form of reserved slots. The master is the unit that controls FH channel, whereas the
slaves are all devices involved in the session have to adjust
their spreading sequences and clocks to the master´s. Thus, the SCO link provides a
circuit-switched connection where data are regularly exchanged and as such it is
intended for use with time-bounded information. A master can support up to three
SCO links to the same or to different slaves.
An ACL link is a point-to-multipoint link between the master and all the slaves on
the piconet as shown in Fig. 2. It can use all of remaining slots on the channel not
used for SCO links. The ACL link provides a packet-switched connection where data
are exchanged sporadically. The traffic over the ACL link is completely scheduled
by the master.
7
Figure 2. Point-to-point and point-to-multipoint piconets /5/.
5.2
Supported protocols /7/
Bluetooth is designed in such a way to allow many different protocols to be run on
top of it. Some of these protocols are:
•
The Wireless Access Protocol (WAP) – WAP provides a protocol stack
similar to the IP stack, but it is tailored for the needs of mobile devices. It
supports the limited display size and resolution typically found on mobile
devices by providing special formats for Web pages which suit their
capabilities. It also provides for the low bandwidth of mobile devices by
defining a method for WAP content to be compressed before it is
transmitted across a wireless link. WAP can use Bluetooth as a bearer
layer in the same way as it can use GSM, CDMA and other wireless
services. The WAP stack is joined to the Bluetooth stack using User
Datagram Protocol (UDP), Internet protocol (IP) and Point to Point
Protocol (PPP).
•
Object Exchange Protocol (OBEX) – OBEX is a protocol designed to
allow a variety of devices to exchange data simply and spontaneously.
Bluetooth has adopted this protocol from the Infrared Data Association
(IrDA) specifications. OBEX has a client/server architecture and allows a
client to push data to a server or pull data from the server.
•
The Telephony Control Protocol – Bluetooth´s Telephony Control
protocol Specification (TCS) defines how telephone calls should be sent
across a Bluetooth link. It gives guidelines for the signaling needed to set
up both point to point and point to multipoint calls. By use of TCS, calls
from an external network can be directed to other Bluetooth devices. TCS
is driven by a telephony application which provides the user interface,
and provides the source of voice or data transferred across the connection
set up by TCS.
8
6
Networked-based control system
In many control applications as Figure 3 shows, networks are used as medium to
transfer data, such as control signals, alarm signals and sensor measurements for
different purposes. The two major types of control systems that utilize networks are
complex control systems and remote control systems. The first type is a large-scale
system containing several subsystems. A subsystem by itself can be thought of as a
control system with three system components as sensors, actuators and controllers.
In many cases, sensors and actuators are attached to a plant at different locations
from the controller. The complex system applications such as chemical processes,
automobiles, aircraft, and manufacturing plants have successfully used networks for
system control.
Figure 3. Applications of network-based control systems.
Remote control systems, instead, include remote data acquisition systems and remote
monitoring systems. To implement a remote control system, communication between
local and remote sites must be established. Many remote control systems have their
own specific communication connections. These connections are usually
conservative and are limited to only one single platform.
A more efficient way is to connect remote systems and controllers through a sharedmedium network. Using this scheme, several remote control systems can operate
with more utilization of the medium.
There are two general ways to design a control system via a network. The first way
is to have several subsystems, then form a hierarchical structure, in which each of
the subsystems contains sensors (S), actuators (A), and controllers (C) by itself, as
depicted in Figure 4.
9
A1
S1
A2
S2
C1
C2
Network
CM
Figure 4. Hierarchical structure of a control system with subystems.
These system components are attached to the same control plant. In this case, a
subsystem controller receives a set point from the main controller CM as shown in Figure
5.
Set point
A1
S1
CM
Network
C1
Measurement
Figure 5. Hierarchical structure of a control system.
The measurement data or status signal is then transmitted back via a network to the
central controller.
The structure shown in Figure 6 is denoted as the direct structure because sensors and
actuators of a control loop are connected directly to a network directly.
10
A1
Control
Network
C1
Measurement
S1
Figure 6. Direct structure of a control system.
According to Figure 6 a set of sensors and actuators are attached to a plant, while a
controller is separated from the plant via a network connection. The controller has to
perform the following tasks:
•
•
•
Read measurements via the network
Compute control signals
Send the control signals to the actuators through the network.
Both the hierarchical and direct structures have their own advantages. The
hierarchical structure is more modular. The control loop is simpler to reconfigure.
The direct structure has better interaction between system components because the
data are transmitted to components directly.
A controller in the direct structure can observe and process every measurement,
whereas a (central) controller in the hierarchical structure may have to wait until the
set point is satisfied before transferring the complete measurements, status signals, or
alarm signals. A control system in the direct structure is known as a network-based
control system.
A general problem of network-based control is the problem of network delays. The
major system components of a network-based control system are: controller, sensor,
and actuator. A shared-network acts as a medium to connect all these components
together. This network can also be shared with other control loops and network
resources. The message arrivals at a controller or an actuator are discrete events. As
such, they cannot be easily handled by a continuous-time model. Therefore, a
discrete-time model is more preferred.
6.1
Structure of network-based control systems
There are a number of possible arrangements for network control loops. A sensor,
controller, and actuator can either be a time-driven device or an event-driven device.
In a time-driven device, input reception or output transmission is controlled by a
sampling time, which could be represented by a clock signal. On the other hand, an
event-driven device starts to process immediately at the arrival of a device input.
11
6.2
Stability of network control systems
The stability of a network itself is defined by the number of messages in the queue of
each node. If this number is larger than a certain constant or tends to infinity as time
increases, the network is said to be unstable. On the other hand, the stability of a
networked control system should be defined by the performance of both the network
and the control system. That is, when the networks are unstable and network-induced
time delays degrade the control system sufficiently, the networked control system
can become unstable. It is possible to have a system with an unstable network but a
stable control system, and vice-versa. If sensors sample the data faster than the
network can transmit the data, then the network will be saturated and data will be
queued at the buffer. Although high sampling rates improve performance in
traditional control systems, they also induce high traffic loads on the network
medium. High traffic loads increase the message time delays and can degrade control
performance.
6.3
Problems in network control systems /8/
When designing a control loop over a NCS, an important point to consider is that the
behaviour of the distributed architecture largely depends on the characteristics and
performance parameters of the network, such as medium access protocol or available
communication bandwidth. Network providing real-time guarantees refers to the fact
that the exchanged data over the communication media must be sent and received
within a bounded time interval, otherwise a timing fault is said to occur. Therefore,
for control systems, candidate control networks must meet two main criteria:
bounded time delay and guaranteed transmission; that is, a message should be
transmitted successfully within a bounded time delay. Unsuccessfully transmitted or
large and unpredicted time-delayed messages may deteriorate the control system
performance, even causing a critical failure in the system. The main problems, in the
implementation of control loops over NCSs, are:
•
Time Delays : distributed computing architectures introduce various forms of
delays in control loops: communication and computational delays.
Communication delays occur when processors (such as sensors, controllers
and actuators ) exchange data through the shared communication media.
Computational delays appear because processors take time in processing the
data.
•
Data Consistency: network packet drops occasionally happen on an NCS,
when there are node failures or message collisions.
There are two main approaches for accommodating all of these problematic issues in
the design of control loops over NCSs. An approach is to design the control system
regardless of delays or packets drops, but ensuring that the communication
mechanisms will minimize the likelihood of these events. The other approach is to
treat the network characteristics as design specifications for control applications.
That is, to take into account, delays and packet drops in the controller design.
6.3.1
Time delays /9/
12
When a control loop is closed over a network, data transfers between the controller
and the remote system will induce network delays in addition to the controller
processing delay.
Figure 7. General NCS configuration and network delays for NCS formulation /9/.
Figure 7 shows network delays in the control loop, where r is the setpoint, u is the
control signal, y is the output signal, k is the time index, and T is the sampling
period.
t se
t cs
t ce
Figure 8. Timing diagram of network delay propagations /9/.
13
t rs
Figure 8 shows the corresponding timing diagram of network delay propagations.
Network delays in a NCS can be categorized from the direction of data transfers as
the sensor-to-controller delay τ sc and the controller-to-actuator delay τ ca . The
delays are computed as
τ sc = t cs − t se ,
(1)
τ
(2)
ca
= t rs − t ce ,
where t se is the time instant that the remote system encapsulates the measurement to
a frame or a packet to be sent, t cs is the time instant that the controller starts
processing the measurement in the delivered frame or packet, t ce is the time instant
that the main controller encapsulates the control signal to a packet to be sent, and t rs
is the time instant that the remote system starts processing the control signal. The
controller processing delay τ c and both network delays can be lumped together as
the control delay τ for ease of analysis. Although the controller processing delay τ c
always exists, this delay is usually small compared to the network delays, and could
be neglected. The delays τ sc and τ ca are composed of at least the following parts:
•
Waiting time delay τ w . The waiting time delay is the delay, of which a
source ( the main controller or the remote system ) has to wait for queuing
and network availability before actually sending a frame or a packet out
•
Frame time delay τ F . The frame time delay is the delay during the moment
that the source is placing a frame or a packet on the network.
•
Propagation delay τ P . The propagation delay is the delay for a frame or a
packet traveling through a physical media. The propagation delay depends
on the speed of signal transmission and the distance between the source and
destination.
These three delay parts are fundamental delays that occur on a local area network.
When the control or sensory data travel across networks, there can be additional
delays such as the queuing delay at a switch or a router, and the propagation delay
between network hops. The delays τ sc and τ ca also depend on other factors such as
maximal bandwidths from protocol specifications, and frame or packet sizes.
6.4
Networked control methodologies /9/
The methodologies to control a NCS have to maintain the stability of the system in
addition to controlling and maintaining the system performance as much as possible.
To write these methodologies based on several types of network behaviors in
conjunction with different ways to treat the delay problems, some assumptions may
be required, as:
•
•
Network transmission are error-free.
Every frame or packet always has the same constant length.
14
•
The difference between the sampling times of the controller and of the sensor
is constant.
The computational delay τ c is constant and is much smaller than the
sampling period T.
The network traffic cannot be overloaded.
Every dimension of the output measurement or the control signal can be
packed into one single frame or packet.
•
•
•
Some methodologies are described below.
6.4.1
Robust control methodology /10/
Goktas (2000) designed a networked controller in the frequency domain using robust
control theory. This methodology is denoted as the robust control methodology. A
major advantage of this methodology is that it does not require a priori information
about the probability distributions of network delays. In the robust control
methodology, the network delays τ ca and τ sc are modeled as simultaneous
multiplicative pertubation. The network delay formulation is described as follows:
1
2
1
2
− 1 ≤ δ ≤ 1,
τ n = (τ max + τ min ) + (τ max − τ min )δ ,
= (1 − α )τ max + ατ max δ ,
0≤α ≤
1
,
2
(3)
where τ n can be τ sc and τ ca ,τ max is the upper bound of τ n , τ min is the lower
bound of τ n , α and δ are real numbers to be determined based on an application.
The first term in the equation (3) represents a constant delay, whereas the second
term represents the uncertain delay varying from the first term. The delay in the
equation (3) is converted for use in the frequency domain, and approximated by the
first-order Padè approximation as
e −τ
n
s
1 − sτ n / 2
1 + sτ n / 2
1 − s (1 − α )τ max / 2
1 − sατ max δ / 2
≈(
)*(
).
1 + s (1 − α )τ max / 2
1 + sατ max δ / 2
= e − s (1−α )τ max e − sατ maxδ ≈
(4)
The uncertain delay part is treated as the simultaneous multiplicative perturbation
expressed as follows:
1 − sατ max δ / 2
(
) = 1 + Wm ( s ) ∆,
1 + sατ max δ / 2
(5)
where ∆ is the perturbation function and
ατ max s
Wm ( s ) =
.
1 + ατ max s / 3.465
is a mutiplicative uncertainty weight which covers the uncertain delay. The factor
3.465 is selected based on a designer’s preference. The control loop in the robust
15
control methodology using this formulation is depicted in Figure 9, where R(s), U(s),
Y(s), and E(s)= R(s) – Y(s) are the reference, control, output and error signals in the
frequency domain, respectively.
Figure 9. Configuration of NCS in the robust control methodology /10/.
6.4.2
Fuzzy logic modulation methodology /11,12/
Fuzzy logic control is used for the control of a plant, where the plant modeling is
difficult and conventional control methods have shown limited successes. From the
viewpoint of the controller designer, the plant of NCS includes not only the plant to
be controlled but also the network that connects the system components. This
network part of the plant is quite difficult to handle because the network system is
stochastic in nature and there is no differential equation to describe it. In fact, the
network is a discrete event system of which state transition occurs at discrete instants
of time. Due to this reason, fuzzy logic control becomes a very attractive method for
controller design for NCS.
Almutairi (2001) proposed the fuzzy logic modulation methodology for a NCS with
a linear plant and a modulated PI controller to compensate the network delay effect
based on fuzzy logic. The PI controller needs not to be redesigned, modified, or
interrupted for use on a network enviroment. The system configuration of the fuzzy
logic modulator methodology is depicted in Fig.10.
Figure10. Configuration of NCS in the fuzzy logic modulation methodology /11/.
16
The output of the PI controller is defined as u PI (t ), and the modified PI controller
output by the fuzzy logic modulation methodology is defined as u C (t ) .
Rule base
Figure 11. Structure or fuzzy logic controller /12/.
Figure11 shows the structure of a fuzzy logic controller, which consists of three
parts: fuzzifier that converts the error and the change of error into linguistic values,
inference engine that creates the fuzzy output using fuzzy control rules generated
from expert experience, and defuzzifier that calculates control input to the plant from
the inferred results. The fuzzy logic modulation methodology can be implemented in
a unit called the fuzzy logic modulator, which modifies the control u PI (t ) by
t
u C (t ) = β u PI (t ) = β K I ∫ e(ξ )d (ξ ).
(6)
t0
The multiplicative factor β is used to externally adjust the controller gains at the
output without interrupting the original PI controller. The value of β is selected
from two fuzzy rules based on the network delay effects as follows:
If e(t) is SMALL, then β = β 1,
If e(t) is LARGE, then β = β 2,
where 0 < β 1 < β 2 < 1. The membership functions of e(t) are depicted in Fig. 12
where µ SMALL and µ LARGE are the membership functions representing the degrees of
memberships for the linguistic variable SMALL and LARGE, respectively; α 1 and
α 2 are factors to adjust the shapes of the membership functions.
17
Figure 12. Membership functions of e(t) /11/.
6.4.3
Novel auto-tuning robust PID controller for networked control system
/13/
S. Li et al. proposed the methodology to design a novel dual PID controller for NCS
after making some reasonable simplification of the complex structure of NCS. One
of advantages of the novel PID controller is that it improves dynamic performance
and disturbance rejection capability. To effect the simplification of NCS, we need
some definition and proposition:
Definition 1. Delay τ sc - Communication delay between the sensor and the
controller.
Definition 2. Delay τ ca - Communication delay between the controller and the
actuator.
Proposition 1. The time-varying delay τ sc and τ ca in the Fig.13 can be lumped
together as a single delay τ = τ (τ sc ,τ ca ) in the as Fig.14 shows. It is equivalently
provided that
A1. The sensor and controller have identical sampling periods
A2. No message rejection at the sensor and controller terminals
A3. τ (t ) ≥ 0, ∀t ;
A4. τ (kT + τ k ) = τ k ;
A5. τ (kT + δ ) ≤ δ , ∀δ ∈ [τ k , T + τ k +1 ).
where τ k = τ ksc + τ kca .
18
Actuator
u(t)
y(t)
Plant
τ ca
Sensor
τ sc
Network
uk
Controller
R
Figure13. A generic diagram for an NCS /13/.
R +
Controller
Z.O.H.
y(t) -
Lumped delay
τ = τ (τ sc ,τ ca )
Plant
T0
Figure 14. Reasonable simplification diagram for an NC /13/.
According to proposition 1, NCS can be simplified as Figure 14 shows. From the
process o f designing controllers we know that PID controller can be easily designed
if the model of the system is known. The authors search for parameters with the
method of relay auto-tuning. Its basic idea is to set up two modes in the control
system: tuning mode and modulation mode. In the tuning mode, the nonlinear relay
part tests the oscillation frequency and the gain of the plant. In the modulation mode
PID controller is first obtained according to feature parameters of the plant, then the
controller modulates its dynamic performance. If the parameters of the plant are
changed, the mode needs to be switched to the tuning one, which again returns to the
modulation one after tuning is finished. The switching of the modes is realized
through a digital switch as shown in Figure 15.
Figure 15. A schematic diagram for relay auto-tuning PID control system /13/.
19
Figure 16. The output wave of system and relay /13/.
e −τs
. The pure time delay τ can
Ts + 1
be directly obtained by oscillation as Figure 16. The computing equation of the gain
k is
Let the transfer function of the plant be G(s)= k
Ra = k (h0 − h + 2h∆T1 / Tc ) ,
(7)
where Ra is the mean value of oscillation wave. After approximating the system
output illustrated as Fig. 16 as the step response of one-order inertia, the computing
equation of time constant T can be obtained:
T=
τ
kh − ε
ln
kh − a
.
(8)
As τ → 0,
T=
Tc
,
[ R − ε − k (h0 + h)][ R + ε − k (h0 − h)]
ln
[ R − ε − k (h0 − h)][ R + ε − k (h0 + h)]
(9)
where relay characteristic amplitude h and hysteresis loop width ε need to be set
before the system begins to oscillate. Fig. 17 presents the system structure of dual
PID controllers, where ϑ (s) is a deterministic network disturbance. Ge −τ m s and
Ge −τs are transfer functions of the plant model and real-life plant respectively.
20
ϑ ( s)
+
-
+
+
Gh ( s)
Dl 1
G ( s )e −τs
-
+
Gm e −τ m s
T
Gh (s )
T0
Dl 2
Figure 17. The system structure with dual PID controller /13/.
Whenever the mismatch of model occurs, the digital switch is on the tuning mode.
Whenever the mismatch of model disappears, the digital switch is on the modulation
mode. In this case the controller Dl 2 of loop l 2 act on ϑ ( s ) independently and is
irrelevant with controller Dl1 . The robust PID design method needs other definitions
and propositions, which are:
Definition 3. z Definition: let z be equivalent to the complex factor z −1 in the ztransform.
Proposition
2.
Given
real
coefficient
polynomials
as
f = bz d + Ma(1 − z ), b = b0 + b1 z + ... + bm z m , a = a 0 + a1 z + ... + a n z n
The general forms of digital PID controller given are
Dl 1 =
k p (c 0 + c1 z + c 2 z 2 ) + k1
k
k
and Dl 2 = 1
=
1− z
1− z
1− z
(10)
According to Figure 17, the transfer function of a closed loop system is
y(z)= y r ( z ) r + yϑ ( z )ϑ ,
(11)
where
yr ( z) =
Dl1 (GG h ) z
d
1 + Dl1 (GG h ) z d
, yϑ ( z ) =
1
Gz d
1 + Dl 2 (GGh ) z d
1 + Dl1 (GGh ) z d
.
(12)
The dynamic performance and disturbance rejection ability of the system can be
easily changed through the change of parameter ξ . The controller parameter is
chosen as:
21
2
⎧
⎫
k p = ν sgn ⎨a (1)b(1)∑ ci ⎬,ν ∈ (0,ν 0 ]
i =0
⎩
⎭
where ν = ξ
a (1)
2
b(1)∑ ci (1 + ξ )
(13)
, d ≤ d0 = [
d +1
τ max
T0
]
i =0
Dl1 designs under different control plants are given in Table 1.
Table 1. Dl1 design under different control plants /13/.
22
(14)
7 Wireless network
The term wireless refers to telecommunication technology, in which radio waves,
infrared waves and microwaves, instead of cables or wires, are used to carry a signal
to connect communication devices. Many fields today such as industrial plants,
healthcare and emergency care require mobility of works. Wireless networking
makes it possible to place portable computers in their hands. It is very useful when
employees must process information on the spot, directly in front of customers and
patients, or share real-time information. There are a wide-range of wireless devices
that implement radio frequency (RF) to carry the communication signal. Some
wireless systems operate at infrared frequencies, whose electromagnetic wavelengths
are shorter than those of RF fields. Wireless systems can be devided into fixed,
portable, and IR wireless systems.
A fixed wireless system uses radio frequency requiring a line of sight for connection.
Unlike cellular and other mobile wireless systems, they use fixed antennas with
narrowly focused beams.
A portable wireless system is a device or system, usually battery-powered, that is
used outside the office or vehicle.
An IR wireless system uses infrared radiation to send signals within a limited-range
of communication.
7.1 Comparison between wireless and wired systems /14/
•
Simplicity and Flexibility: Broadband wireless links can be deployed faster
than wire line links. As well, broadband wireless network can be quickly,
easily, and inexpensively modified to meet changing connectivity needs. A
broadband wireless network gives flexibility to painlessly add or eliminate
locations, or secure additional bandwidth, users can access date while on the
move. Promotes new ways of working.
•
Speed and reach: A wireless building-to-building link provides throughput
rates several times faster than those offered by wire line alternatives. And
unlike wire line high-speed circuits that are typically available only in urban
centers, broadband wireless links can be deployed virtually anywhere, urban,
suburban, and rural locations alike.
•
Reliability and security: Wireless suffers a few more reliability problems
than wire. Wireless signals are subject to interference, with careful
installation, the likelihood of interference can be minimized. In theory,
wireless are less secure than wires, because wireless communication signals
travel through the air operating in the 2.4 GHz frequency range, potential for
interference.
•
Economy and Pricing: Connecting LANs together using wireless links is
significantly less expensive than upgrading existing wires or laying new
ones. As well, wireless infrastructure is less prone to required maintenance
than wire line infrastructure.
•
23
7.2
Topology of wireless /14/
Two topologies of wireless networks are possible. They differ on how wireless
devices communicate to each other. Wireless network operates either in ad-hoc or
infrastructure mode. The mode of infrastructure requires the use of a Basic Service
Set (BSS) which is a wireless access point (WAP). The access point is required to
allow for wireless computers to connect not only to each other but also to a wired
network as shown in Figure18.
Figure 18. Infrastructure of wireless networking.
Ad-hoc is also known as peer-to-peer wireless networking as shown in Figure 19.
There are a number of wireless computers that need to transmit files to each other.
This mode of operation is known as Independent Basic Service Set (IBSS).
Figure 19. Ad-hoc wireless networking.
24
7.3
Types of wireless networks /15/
Major types of wireless networks include:
CDPD ( Cellular Digital Packet Data ): CDPD is a specification for supporting
wireless access to the Internet and other public packet-switched networks over
cellular telephone networks. it supports TCP/IP and Connectionless Network
Protocol, the max bandwidth is 19.2 Kb.
HSCSD ( High Speed Circuit Switched Data ): HSCSD is a specification for data
transfer over GSM ( Global System for Mobile communication ) networks. HSCSD
utilizes up to four 9.6 Kb or 14.4 Kb time for a total bandwidth of 38.4 Kb or 57.6
Kb.
PDC.P ( Packet Data Cellular ): PDC.P is a packet switching message system.
PDC.P utilizes up to three 9.6 Kb TDMA channels, for a total maximum bandwidth
of 28.8 Kb.
GPRS ( General Packet Radio Service ): GPRS ia a specification for data transfer on
TDMA and GSM networks. GPRS utilizes up to eight 9.05 Kb or 13.4 Kb TDMA
timeslots, for a total bandwidth of 72.4 Kb or 107.2 Kb.
Bluetooth: Bluetooth provides three types of power classes, although class 3 devices
are not in general availability.
Type
Class 3 devices
Class 2 devices
Class 1 devices
Power level
100 mW
10 mW
1 mW
Operating range
Up to 100 meters
Up to 10 meters
0.1 – 10 meters
Table 2. Bluetooth power classes /15/.
IrDA: IrDA defines a standard for an interoperable universal two way cordless
infrared light transmission data port. IrDA is utilized for high speed short range, line
of sight, digital cameras, handheld data collection devices. The max bandwidth is 16
Mb.
MMDS ( Multichannel Multipoint Distribution Service ): MMDS is a broadband
wireless point-to-multipoint specification utilizing UHF ( Ultra High Frequency )
communications. The max bandwidth is 10 Mb.
802.11: 802.11 ( Wi-Fi ) is a suit of specifications for wireless Ethernet. The 802.11
standards are defined by the IEEE.
25
Standard
Speed
Frequency
Modulation
802.11
2 Mb
2.4 GHz
Phase-Shift
Keying
802.11a
54 Mb
5 GHz
802.11b
11 Mb
2.4 GHz
Orthogonal
Frequency
Division
Multiplexing
Complementary
Code Keying
802.11g
54 Mb
2.4 GHz
802.11n
100 Mb
20-40 MHz
Orthogonal
Frequency
Division
Multiplexing
Orthogonal
Frequency
Division
MultiplexingMultiple input,
multiple
output
many
antennae
technique
Table 3. IEEE 802.11 standards /15/.
7.4
Wireless network control system for chemical plants
The manufacture and processing of chemicals is a highly capital and resourceintensive, as well as potentially dangerous business. There is very little room for
product differentiation or innovation: production methods are well established and
widely known. The way to make a profit is to maximise efficiency and continuity,
while paying close attention to safety, and professional on-site wireless
communications can make a valuable contribution in all of these areas. The chemical
industry is a classic commodity business, in the areas like basic organic and
inorganic compounds, fertilisers, gasoline and plastics. The supply chain is typically
long and complex, and involves many transactions,with extremely tight margins. The
chemical industry is also very transparent. Most of the technology and processes
have been around for 50 years or more old, and there are virtually no commercial
secret and very few patents. While chemical manufacturing has one of the best safety
records of any of the process industries, and industry in general, in terms of
accidents per man-hour, fire explosions and even sabotage are always present.
Identifying and acting on problems early on is key to preventing small faults
snowballing into major incidents.
Wireless communications supports fast, accurate processes for dealing with faults
and emergency situations. The wireless communications solution can be integrated
26
with plant monitoring and alarm systems for example, so that critical alarms
immediately trigger an alert to the most appropriate person regardless of where they
are on the plant. Plants are also typically very large sites, with relatively few people
working on them. Together, these factors mean reliable on-site communications is
vital in ensuring day-to-day operations run smoothly. In a typical large processing
plant, wireless communication has an essential role in ensuring that plant engineers
and operators are able to communicate with each other and with the control room,
wherever they happen to be. With well-integrated wireless communications, plant
supervisors do not need to stay in the control room in order to be kept fully up-todate on operations. Wireless communications solutions can be integrated with plant
monitoring and control systems to pull together information from a variety of
sources and present it on screen to plant managers and engineers wherever they are
working. On-site wireless communications can make a significant contribution,
enabling quicker response to changing conditions, enhanced efficiency and
continuity, and improved health and safety.
27
8 Comparison of experimental results between wireless
and wired networks
For examining the performance of the remote process control across the wireless and
wired networks two test series with the laboratory process presented in the reference
/16/ have been made. In the first test series the process and the controller are in the
same room at the university and in the second test series the controller is in main
library of Oulu City and the process at the university. In this case the distance
between the controller and the process is about seven kilometres. Delay times and
loss packets are compared in different test series.
The behaviour of the delay time, where both the controller and the process locate in
the university is presented in Figure 20. The network is wireless. In Figure 21 there
are the same conditions, but it is used the wired network.
Time [s]
Delays Time [1Hz]
0,05
0,048
0,046
0,044
0,042
0,04
0,038
0,036
0,034
0,032
0,03
0,028
0,026
0,024
0,022
0,02
0,018
0,016
0,014
0,012
0,01
0,008
0,006
0,004
0,002
0
1
26 51 76 101 126 151 176 201 226 251 276 301 326 351 376 401 426 451 476 501 526 551 576 601 626 651 676 701 726 751 776 801 826
Packets number
Figure 20. Delay time in the first test series with the sample frequency 1Hz via the
wireless network
28
Delays Time [1Hz]
0,02000
Time [s]
0,01500
0,01000
0,00500
0,00000
1
14 27 40 53 66 79 92 105 118 131 144 157 170 183 196 209 222 235 248 261 274 287 300 313 326 339 352 365 378 391
Packets number
Figure 21. Delay time in the first test series with sample frequency 1Hz via the
wired network /16/.
Figures 20 and 21 show that the delay time is in the wireless network three times
more than that in the wired network. The average time in the wireless network is 3
ms and in the wired network 1 ms. In the wired network the delay time of the
packets over 20 ms is 1,8 % of the all 391 sampled packets, while in the wireless
network the corresponding number is 5,2 % of the all 826 sampled packets. Also in
this case the delay times are more distributed.
29
Delays time [s]
Delays Time [2Hz]
0,05
0,048
0,046
0,044
0,042
0,04
0,038
0,036
0,034
0,032
0,03
0,028
0,026
0,024
0,022
0,02
0,018
0,016
0,014
0,012
0,01
0,008
0,006
0,004
0,002
0
1
42
83
124 165 206 247 288 329 370 411 452 493 534 575 616 657 698 739 780 821 862 903 944 985 1026 1067
Packets number
Figure 22. Delay time in the first test series with sample frequency 2Hz via the
wireless network
Delay time [2Hz]
0,01200
0,01000
0,00800
Time [s]
0,00600
0,00400
0,00200
0,00000
1
48
95
142
189
236
283
330
377
424
471
518
565
612
659
706
753
800
847
894
941
988 1035 1082 1129 1176
Packet number
Figure 23. Delay time in the first test series t with sample frequency 2Hz via the
wired network /16/.
Figures 22 and 23 show the delay time with the sample frequency 2 Hz, where the
controller and process are in the same room is quite similar as with sample frequency
1 Hz.
30
Delays Time [s]
Delays Time [5Hz]
0,05
0,048
0,046
0,044
0,042
0,04
0,038
0,036
0,034
0,032
0,03
0,028
0,026
0,024
0,022
0,02
0,018
0,016
0,014
0,012
0,01
0,008
0,006
0,004
0,002
0
1
122 243 364 485 606 727 848 969 1090 1211 1332 1453 1574 1695 1816 1937 2058 2179 2300 2421 2542 2663 2784 2905 3026 3147
Packets number
Figure 24. Delay times in the first test series with sample frequency 5Hz via the
wireless network.
Delays Time [5Hz]
Time [s]
0,06000
0,04000
0,02000
0,00000
1
68
135 202 269 336 403 470 537 604 671 738 805 872 939 1006 1073 1140 1207 1274 1341 1408 1475 1542 1609 1676
Packets number
Figure 25. Delay time in the first test series with sample frequency 5Hz via the
wired network /16/.
31
Also in the case of the sample frequency 5 Hz the average delay times are the same
as in the experiments with the sample frequencies 1 and 2 Hz i.e. 1 ms in the wired
network and 3 ms in the wireless network. In the wired network it can be found that
the initial time is unstable in the range of the sampled packets between 68 and 135,
but after this range it is very constant.
Figures 26 and 27 present the delay times in the wired and wireless networks, when
the controller locates about from seven kilometres from the process.
Delay time [1Hz]
0,05
0,048
0,046
0,044
0,042
0,04
0,038
0,036
0,034
0,032
0,03
Time0,028
[s]
0,026
0,024
0,022
0,02
0,018
0,016
0,014
0,012
0,01
0,008
0,006
0,004
0,002
0
1
22
43
64
85 106 127 148 169 190 211 232 253 274 295 316 337 358 379 400 421 442 463 484 505 526 547 568 589 610 631 652 673
Packet number
Figure 26. Delay time in the second test series t where the controller and process
locate seven kilometres from each other. The sample frequency is 1Hz via the
wireless network
32
Delay tTime [1Hz]
0,350
0,300
Time [s]
0,250
0,200
0,150
19
0,100
25
31
37
43
49
55
61
67
73
79
85
91
97 103 109 115 121 127 133 139 145 151 157 163 169 175 181
Packet number
Figure 27. Delay time in the second experiment where the controller and process
locate seven kilometres from each other. The sample frequency is 1Hz via the wired
network /16/.
The above figures show that the delay time is longer in the wired network than in the
wireless network, even the difference is minimal. The average delay time is 30 ms
for the wired network and 25 ms for the wireless network. In both cases they are
constant in the whole range of the sampled packets.
Delays Time [2Hz]
0,08
0,076
0,072
0,068
0,064
0,06
0,056
0,052
Time [s]
0,048
0,044
0,04
0,036
0,032
0,028
0,024
0,02
0,016
0,012
0,008
0,004
0
1
58
115 172 229 286 343 400 457 514 571 628 685 742 799 856 913 970 1027 1084 1141 1198 1255 1312 1369 1426 1483
Packets number
Figure 28. Delay time in the second test series with the sample frequency 2Hz via
the wireless network.
33
Delay time [2Hz]
0,500
0,400
0,300
Time [s]
0,200
0,100
0,000
1
43
85
127
169
211
253
295
337
379
421
463
505
547
589
631
673
715
757
799
841
883
925
967 1009 1051
Packetnumber
Figure 29. Delay time in the second test series with the sample frequency 2Hz via
the wired network /16/.
Figures 28 and 29 show that with the sample frequency 2 Hz the difference between
the values of delay times in these two networks is not big, but in the wired network it
is unstable compared with the wired network. In the wireless network the average
time is 25 ms in the whole range of sampled packets and in the wired network the
average delay time is 30 ms, but it is unstable. The number of packets with the delay
time over 0,1 s is 32,3 % of the total sampled packets.
34
Delay time [5Hz]
0,05
0,048
0,046
0,044
0,042
0,04
0,038
0,036
0,034
0,032
0,03
Time0,028
[s]
0,026
0,024
0,022
0,02
0,018
0,016
0,014
0,012
0,01
0,008
0,006
0,004
0,002
0
1
170
339
508
677
846 1015 1184 1353 1522 1691 1860 2029 2198 2367 2536 2705 2874 3043 3212 3381 3550 3719 3888 4057 4226
Packet number
Figure 30. Delay time in the second experiment with the sample frequency 5Hz via
the wireless network.
Delay time [5Hz]
0,120
0,100
0,080
Time [s]
0,060
0,040
0,020
0,000
1
46
91
136 181
226 271 316 361
406 451 496 541 586
631 676 721 766
811 856 901 946
991 1036 1081 1126 1171
Packet number
Figure 31. Delay time in the second experiment with the sample frequency 5Hz via
the wired network /16/.
35
Figures 30 and 31 show the results are quite similar compared with the experiments
with sample frequency 1Hz. The average delay times for wired and wireless
networks are respectively 30 and 25 ms, and they are constant in the whole range of
sampled packets.
The experiments show that the delay times in the wired and wireless networks have
some differences. When the controller and process are close to each other, the delay
time in the wired network are smaller than in the wireless network, even if this
difference is very small. Instead, when the controller and process are far, the wireless
network is faster than the wired network. Also delay time in the wired network is
more unstable than in the wireless network.
The data given in Tables 3 and 4 presents the packet loss in the first test series via
the wireless and wired networks.
Measurement
Controller
Packet loss
packages
packages
[%]
Freq.[Hz] Bytes sent Bytes received Bytes sent
Bytes received Measurement Controller
1
2
5
10
50
6552
8520
25200
61640
230088
6560
8528
25256
61656
231168
6552
8504
25200
61640
229896
6552
8520
25200
61640
230088
0.12
0.09
0.22
0.03
0.47
0
0.19
0
0
0.08
Table 3. Percentage of the packet loss in the first test series via the wireless network.
Measurement
Controller
Packet loss
packages
packages
[%]
Freq.[Hz] Bytes sent Bytes received Bytes sent
Bytes received Measurement Controller
1
2
5
10
50
771
1406
2443
9390
22168
771
1406
2443
5014
22168
771
1406
3443
5014
22168
771
1406
2443
9390
22168
0
0
0
0
0
0
0
0
0
0
Table 4. Percentage of the packet loss in the first test series via the wired network /16/.
The difference in the packet loss between the wireless and wired networks is evident.
This confirms the problem of the reliability of the wireless network, even if the
percentage of the packet loss in every sample frequency is very low. The values show
that in the wired network there is no packet loss, while in the wireless network the packet
36
loss can be found due to the presence of possible obstacles or interferences of devices
which operate in the same frequency.
Freq.[Hz]
1
2
5
10
50
Measurement
Controller
Packet loss
packages
packages
[%]
Bytes sent
4240
7144
16560
33208
160616
Bytes received
4224
7144
16560
33056
160216
Bytes sent
4240
7144
16560
33056
160216
Bytes received
4240
7144
16560
33056
160216
Measurement
0
0
0
0.46
0.25
Controller
0.38
0
0
0
0
Table 5. Percentage of the packet loss in the second test series via the wireless
network.
Measurement
Controller
Packet loss
packages
packages
[%]
Freq.[Hz] Bytes sent
Bytes received Bytes sent
Bytes received Measurement
Controller
1
2
5
10
20
50
909
1987
2858
7111
13491
25696
909
1987
2848
7099
13474
25685
0
0
0.35
0.24
0.17
0.47
909
1987
2848
7099
13474
25685
909
1987
2848
7094
13468
25684
0
0
0
0
0
0
Table 6. Percentage of the packet loss in the second test series via the wired network
/16/.
The tables 5 and 6 show the percentage of the packet loss when the controller locates
in Oulu City and the process in the university. In this case it can be found small
packet loss also in the wired network and it concerns control packages. The average
percentage is 0,20 %. This average percentage is the same as in the wireless network
but in the inverse run, because it concerns measurement packages. The packet loss is
due to the packet collision, i.e. the traffic of data in the network. However, the
packet loss in these two networks is very low
37
Conclusions
The main focus in this research has been to examine delay times and packet losses in
the wireless and wired networks in the control of a laboratory-scaled process.
Therefore two different test series have been done where the controller and the
process itself locate in the same room or they are about seven kilometres from each
other.
The results show that the process control across the wireless network is good and
feels little the effects of distance between the process and controller. The packet
losses and delay times are minimal, and almost the same both for the wired and
wireless network. These experiments show that wireless technology applies well for
process control taking into the delay time and packet loss.
38
References
1 Lian F-L., Moyne J.R., Tilbury D.M.: Performance evaluation of Control
Networks. IEEE Control Systems. Magazine, 21(2001)1, 66–83.
2 Jaakohuhta H.: Local Area Networks Ethernet, Edita Publishing Inc, IT Press, 5796.
3 Sanjiv K.B.: www.cs.umsl.edu/~sanjiv/cs373/lectures/protocols.pdf , Computer
Networks and Communication, Protocols and Architecture, 2005.
4
Mel
R.:
www.scit.wlv.ac.uk/~in8297/cp2073/wireless%20Networks.pdf,
Computer Architecture (HND), Course Notes: Wireless Networks, 2005.
5 Mander J., Picopoulos D.: www.ee.ucl.ac.uk/~afernand/Examples.pdf , Bluetooth
Piconet Applications, 2005.
6 Haartsen J. C. "The Bluetooth Radio System", IEEE Personal Communications,
Feb 2000,28-36
7 Djonin D., Zhu J.: The Bluetooth System, University of Victoria, Project Report,
Elec 510-Computer Communication Networks, (2001).
8 Wei Z., Branicky M.S., Phillips S.M.: Stability of networked control systems,
IEEE Control Systems Magazine, 21 (2001)1, 84-99.
9 Tipsuwan Y., Chow M-Y.: Control methodologies in networked control systems,
Control Engineering Practice, 11(2003)10, 1099-1111.
10 Goktas F.: Distributed control of systems over communication networks, Ph.D.
dissertation, University of Pennsylvania, Philadelphia, PA, 2000.
11 Almutairi N.B., Chow M-Y., Tipsuwan Y.: Network-based controlled DC motor
with fuzzy compensation, 27th Annual Conference of the IEEE Industrial Electronics
Society, 2001.
12 Lee S., Sang Ho Lee, Kyung Chang Lee , Remote Fuzzy Logic Control for
Networked Control System”, 27th Annual Conference of the IEEE Industrial
Electronics Society, 2001.
13 Li S., Wang Z., Youxian Sun Y.: A Novel Auto-tuning Robust PID Controller for
Networked Control System”, 29th Annual Conference of the IEEE Industrial
Electronics Society, 2003.
14 TechTarget,15-04-2005,www-document,
searchnetworking.techtarget.com/searchNetworking/downloads/WSecurity.pdf
15 Tech.Faq,
networks.shtml
15-04-2005,
www-document,
www.tech-faq.com/wireless-
16 Sirkka J.: Real-time process control via network. M.Sc. Thesis, University of
Oulu, Finland . 2005, 99p. (in Finnish).
39
ISBN 951-42-7875-5
ISSN 1238-9390
University of Oulu
Control Engineering Laboratory – Series A
Editor: Leena Yliniemi
11. Isokangas A & Juuso E, Fuzzy modelling with linguistic equation methods.
February 2000.33 p. ISBN 951-42-5546-1.
12. Juuso E, Jokinen T, Ylikunnari J & Leiviskä K, Quality forecasting tool for
electronics manufacturing. March 2000. ISBN 951-42-5599-2.
13. Gebus S, Process Control Tool for a Production Line at Nokia. December 2000. 27
p. ISBN 951-42-5870-3.
14. Juuso E & Kangas P, Compacting Large Fuzzy Set Systems into a Set of Linguistic
Equations. December 2000. 23 p. ISBN 951-42-5871-1.
15. Juuso E & Alajärvi K, Time Series Forecasting with Intelligent Methods. December
2000. 25 p. Not available.
16. Koskinen J, Kortelainen J & Sutinen R, Measurement of TMP properties based on
NIR spectral analysis. February 2001. ISBN 951-42-5892-4.
17. Pirrello L, Yliniemi L & Leiviskä K, Development of a Fuzzy Logic Controller for
a Rotary Dryer with Self-Tuning of Scaling Factor. 32 p. June 2001. ISBN 951-426424-X.
18. Fratantonio D, Yliniemi L & Leiviskä K, Fuzzy Modeling for a Rotary Dryer. 26
p. June 2001. ISBN 951-42-6433-9.
19. Ruusunen M & Paavola M, Quality Monitoring and Fault Detection in an
Automated Manufacturing System - a Soft Computing Approach. 33 p. May 2002.
ISBN 951-42-6726-5.
20. Gebus S, Lorillard S & Juuso E, Defect Localization on a PCB with Functional
Testing. 44 p. May 2002. ISBN 951-42-6731-1.
21. Saarela U, Leiviskä K & Juuso E, Modelling of a Fed-Batch Fermentation
Process. 23 p. June 2003. ISBN 951-42-7083-5.
22. Warnier E, Yliniemi L & Joensuu P, Web based monitoring and control of
industrial processes. 15 p. September 2003. ISBN 951-42-7173-4.
23. Van Ast J M & Ruusunen M, A Guide to Independent Component Analysis –
Theory and Practice. 53 p. March 2004. ISBN 951-42-7315-X.
24. Gebus S, Martin O, Soulas A. & Juuso E, Production Optimization on PCB
Assembly Lines using Discrete-Event Simulation. 37 p. May 2004. ISBN 951-427372-9.
25. Näsi J & Sorsa A, On-line measurement validation through confidence level based
optimal estimation of a process variable. December 2004. ISBN 951-42-7607-8.
26. Paavola M, Ruusunen M & Pirttimaa M, Some change detection and time-series
forecasting algorithms for an electronics manufacturing process. 23 p. March 2005.
ISBN 951-42-7662-0. ISBN 951-42-7663-9 (pdf).
27. Baroth R. Literature review of the latest development of wood debarking. August
2005. ISBN 951-42-7836.
28. Mattina V & Yliniemi L, Process control across network, 39 p. October 2005.
ISBN 95142-7875-5.