Networked Control under Communication Constraints: A Time-Delay Approach

Kun Liu, Emilia Fridman, Yuanqing Xia

Research output: Book/ReportBookpeer-review

Abstract

This book presents a time-delay approach to the analysis and synthesis of networked control systems (NCSs) under communication constraints. Differently from other approaches, the time-delay approach to NCSs allows communication delays to be larger than the sampling intervals in the presence of scheduling protocols. The book starts from a comprehensive introduction to three main approaches to sampled-data and networked control. It then focuses on time-delay approach, and the modelling of the closed-loop systems in the form of time-delay system. It presents discontinuous (in time) Lyapunov functional constructions that are efficient for NCSs in the presence of communications delays. Further, it highlights time-delay approaches developed to model and analyze NCSs under communication constraints, with a particular focus on dynamic quantization, round-robin, try-once-discard and stochastic protocols. The results are first presented for the continuous-time NCSs and then extended to discrete-time NCSs. Discussing recent developments in Lyapunov-based analysis of NCSs under communication constraints, the book is a valuable resource for researchers interested in sampled-data and networked control, and time-delay systems, as well as for graduate students in automatic control and systems theory.
Original languageEnglish
Place of PublicationSingapore
Number of pages268
StatePublished - 2020

Publication series

NameAdvances in Delays and Dynamics
PublisherSpringer Singapore
Volume11

Keywords

  • Automatic control
  • Automatic control engineering
  • Communications engineering / telecommunications
  • Cybernetics & systems theory
  • Electrical engineering
  • Engineering
  • Science
  • System theory
  • Technology & Engineering

Fingerprint

Dive into the research topics of 'Networked Control under Communication Constraints: A Time-Delay Approach'. Together they form a unique fingerprint.

Cite this