1. Introduction
In recent years, Networked Control Systems (NCS) have been gaining importance in the control community [
1]. NCS are distributed architectures composed of controllers, sensors that can obtain information from the environment, actuators for acting on them, and a communication network that connects all the elements to achieve a common goal. Therefore, NCS is a field which includes different disciplines such as control theory, communications, software engineering and computer science. Typical applications where these control systems are being used are: space or terrestrial explorations, factory automation, remote diagnostics and troubleshooting, hazardous environments, experimental facilities, mobile robots, multi-vehicles networks, aircraft, manufacturing plant monitoring, nursing homes or hospitals, tele-robotics, tele-operation, etc.
The elements of an NCS system are called the agents. These elements use a communication network to exchange the information between them. Depending on the application where the NCS is used, this network can be deployed using wireline or wireless technology. These communication networks use digital technology to transmit the information which has constraints in delays and limited bandwidth. The information packaging and the constraints due to the limited resources of the network produce undesirable effects such as packet losses, variable delays and signal quantization issues among others. These effects may disturb the stability and performance of the system [
2].
Therefore, reducing the traffic in the network is a critical aspect. If the number of packets is decreased can be guaranteed a predictable bandwidth, and at the same time, the analysis of the delays of the network is simplified [
3]. As a conclusion, an important issue in the design of these control systems is to implement protocols for transmitting the sensor signals, the state of the system and the control information in a more effective way.
Some researchers have investigated the timing issues in NCS [
4]. In traditional approaches, the controllers are used under the assumption of perfect communication, and then, the Maximum Allowable Transfer Interval (MATI) between two subsequent message transmissions that ensures closed loop stability under a network protocol is determined. Try Once Discard (TOD) and Round Robin (RR) are protocols implemented based on this philosophy. On the other hand, the MATI protocol is often deployed in a centralized way, therefore, it is not practical for systems of large-scale.
Other proposals have achieved an important reduction of network resources usage without a significant loss of performance. Two approaches have been raised: Model-Based Networked Control Systems (MBNCS) and Event-Based Control (EBC). The basics of the MBNCS have been developed in [
5,
6], and they have been considered in networks of coupled systems in [
7] using periodic communication. Another approach to deal with this problem has been built on an event-based feedback scheme in NCS [
8,
9,
10,
11]. In event-based control systems, the agent information is broadcast only when some measures of the state error cross a specified level (the event threshold). This control scheme is decentralized in the sense that an agent can broadcast its state using the local information and in an asynchronous way.
In an EBC system, the impact of noise in the sensors increases the number of events and therefore a degradation of the performance. If the disturbance is known or can be modeled, the controller can be properly set to reduce its effects. However, in most applications it is difficult either to estimate the noise level or to have a reliable model. In these cases, it becomes a hard work to tune the controller in a proper way. In [
12,
13] these problems have been investigated where a new control scheme has been proposed which are dynamically adjusted depending on the conditions of the environment. In both proposals, the algorithms work with an estimation of the noise previously calculated. In [
14], the estimation of the noise and the tune of the controller is made in real time.
The EBC strategies have been widely used to control dynamical processes while decreasing considerably the number of packets that the sensors have to send to the controller over the network. In [
15] the events based on state errors have been investigated. In [
16,
17,
18], similar proposals have been analysed to apply in networked interconnected systems. In these works, the use of a zero-order hold (ZOH) in the controller is a common feature. In [
19], an event-triggering in networked systems with probabilistic sensor and actuator fault has been investigated to reduce the computation load. An overview on sampled-data-based event-triggered control and filtering for networked systems has been presented in [
20]. In this research, a deep investigation of the sampled data-based event-triggered scheme has been made. In general, the event-based control architectures can be a good solution for the systems with limited resources and they could be a more efficient control scheme than the classical ones [
21,
22].
In this paper, a new event-based control architecture based on a simple event-based control scheme for NCS environments is presented. Making use of the control strategy implemented a full analysis of different resource consumption is carried out. The use of bandwidth, computational load and energy resources are analysed. Several methods and methodologies to measure the efficiency in the resources consumption are also proposed. The main contributions of this work are the models development of resource consumption and their parametrization. Finally, the ideas presented in this work are applied to an NCS mobile robots system to solve the navigation problem.
The paper is organized as follows.
Section 2 presents an overview of the event-based control. In
Section 3, the principles of sampling criteria are described. In
Section 4, the proposed control strategy is presented.
Section 5 shows the resource usage in the proposed system.
Section 6 presents the experimental results. Finally, the conclusions and future work are discussed in
Section 7.
2. Event-Based Control Overview
The event-based control has motivated the interest of the control community in the last few years, multiple control architectures and new applications have been propossed based on these ideas. In [
23], an event-driven sampling method called the area-triggered method has been proposed. In this scheme, sensor data are sent only when the integral of the differences between the current sensor value and the last transmitted one is greater than a given threshold. The proposed system reduces the data transmission rate and also improves the estimation performance in comparison with the conventional time-driven technique. In [
24], a greenhouse climate is controlled by an event-based control system. The system is based on a network of wireless sensors to control the low frequency dynamics of the environment. In this case, the control actions are calculated by considering the events that produce the external disturbances. The proposed system increases the actuators life and allows cost savings by minimizing the wear while maintaining a good performance. In [
25], an event-based sampling according to a constant energy of sampling error is investigated. The defined criterion is suitable for applications where the energy of the sampling error should be bounded (e.g., in greenhouse climate monitoring and control or in building automation). Finally, in [
26], a fault isolation filter to apply on discrete-time networked control systems based on a particular form of the Kalman filter is proposed. The scheme makes an efficient use of the resources with a good estimation of failures and its effect on the performance. The sampled-data-based event-triggered control schemes is another emerging event-based control technique. The reliable control design for networked control system under event-triggered scheme is investigated in [
19]. The key idea of this work is that only the newly sampled sensor measurements that violate specified triggering condition will be transmitted to the controller. The main advantage of this approach is that the proposed event-triggered scheme only needs a supervision of the system state in discrete instants and there is no need to retrofit the existing system. Finally, in [
20], an overview and a deep investigation on sampled-data-based event-triggered control and filtering for networked systems has been done. Compared with some existing event-triggered and self-triggered schemes, a sampled-data-based event-triggered scheme can ensure a positive minimum inter-event time and make it possible to jointly design suitable feedback controllers and event-triggered threshold parameters.
In event-based control systems, information is exchanged between the elements (controller, sensors and actuators) depending on the state of the system [
27]. When the system variables exceed a certain level an event is generated in the system and the control actions are executed. This means that the activity of the controller and the use of resources to communicate the different elements are restricted to the time intervals in which a control action must inevitably be taken to guarantee the system specifications.
In
Figure 1, the basic scheme of an event-based control strategy is presented [
28,
29].
The control scheme is composed of an event detector, an observer, and a control signal generator. The event detector generates an output signal when an event occurs, it happens when the error signal crosses a threshold. When an events occurs, the observer is updated and it passes the information to the control signal generator. With this information, the control signal generator generates the input signal to control the process. An important aspect of this strategy is that the observer and the control signal generator works in open loop between events.
This control architecture combines feedback and feedforward strategies. When an event is generated there is a feedback action. On the other hand, the feedforward actions happen when the actuators are driven by the control signal generator in open loop between events.
3. Event-Based Sampling Schemes
Different sampling criteria have been proposed in the event-based control schemes [
27]. In the event-based sampling methods, the system acts only when the variables of the plant are in transient state. In the steady state the system does not act and some resources can be saved. On the other hand, in discrete time schemes the sampling is executed periodically (with the period
where
is the sampling frequency) and it does not depend on the state of the system (
Figure 2a).
Send-on-delta and integral criterion are the most widely used techniques in event-based control schemes. In the following sections, these methods will be defined and their effectiveness will be discussed.
3.1. Send-On-Delta
The send-on-delta sampling algorithm is the most natural signal-dependent strategy; in the literature, it is also known as level-crossing or deadbands sampling. In the send-on-delta technique, the sensors do not broadcast a new message if the signal remains within a certain level of confidence
(resolution) (
Figure 2b). The sampling criterion is defined as
The ratio of events that the send-on-delta algorithm generates can not be calculated in a general way, but its average value
may be estimated by the following expression [
30,
31]:
where
is the mean period between events considering the analysis interval
In the send-on-delta algorithm, an event occurs when
and the interval time between the events
and
k is expressed as
where
is defined as
at this point, the mean period between events
can be defined as
in [
31], the following relationship has been proven
where
was defined as
taking Equations (2) and (7) into account, the mean rate of events
can be written as
In this case, the ratio of events in the system depends on two parameters:
As presented in Equation (
9), the message rate in the send-on-delta strategy is a trade off between the resolution
and the average slope of the signal
.
3.2. Integral Criterion
There are some reasons to apply the event-based integral criterion in control systems. This method has a high efficiency for sampling burst signals. Likewise, this technique is a good solution in applications where a critical problem of sampling process is the accuracy of approximation of a continuous-time signal by a sequence of discrete-time samples. In this algorithm, the sampling criterion (
Figure 2c) is defined by Equation (
10), where
is the resolution of the method:
then, the mean rate of events
can be estimated as follows [
32]:
The system generates an event when the following condition is satisfied
taking into account the time interval between the events
k and
(
), in [
32], it has been demonstrated that the mean period between events considering the interval
is
where
is defined by
Finally, the mean rate of events
based on the integral criterion strategy can be expressed as:
Taking Equation (
14) into account, the mean rate of events depends on the mean of the square root of the signal derivative absolute value and the resolution
used in the algorithm
3.3. Effectiveness of Event-Based Sampling
To study how effective the presented sampling algorithms are, they will be compared with periodic sampling strategies. In the send-on-delta algorithm, the mean rate of events
was estimated in Equation (
9). If the periodic sampling algorithm is considered, the sampling period
T can be obtained by Equation (
15) where the accuracy of the algorithm is
Now, the ratio of samples
can be calculated as
If the send-on-delta is compared with the periodic sampling considering the same resolution for both methods (
), the following equation is obtained
In this case, if is a linear signal, for the rest of the continuous-time signal is fulfilled. The last expression implies that the send-on-delta is more efficient than the periodic sampling algorithm.
Taking into account the integral criterion, the number of samples in the periodic sampling strategy is given by (see [
32]):
If both methods (event-based and periodic) have the same accuracy (
), the following equation is obtained from Equations (
14) and (
18):
which shows that for the integral criterion the event-based strategy is more efficient than the periodic sampling
in a general way.
It can be concluded that the event-based sampling algorithms are more efficient than the periodic strategies. It means that the event-based solution generates less events than the periodic sampling scheme.
4. NCS Control Architectures
In this section, two NCS schemes are discussed. First, the classical discrete-time architecture is presented, and then the event-based solution proposed in this work is investigated in detail. In these NCS, the agents (the controller and the remote node) are connected by a wireless network.
The basic scheme of a discrete-time NCS is presented in
Figure 3a. The signals
(control signal) and
(sensor signal) are sampled with the frequency
. The signal
is sent to remote node over the communication channel
. In the remote node, this information is used to act over the actuators. The signal
is sent to the controller over the
. Finally, the controller calculates
considering the reference signal
and
. Therefore, this architecture exchanges information over the communication channels every period of time defined by
. When the plant is in a steady state, it is not necessary to interchange information between the elements of the system because the plant does not need new control actions. However, in this scheme, the communication channels
and
, the controller, the actuators and the sensors are busy every period of time
T.
The proposed event-based NCS is presented in
Figure 3b. As mentioned above, the proposed system follows the basic principles of an event-based control system, being the evaluation of the consumption of resources the main objective of this work. The system is composed of a controller, an event generator (EG) and a memory block (M). In the EG the signals,
and
are compared. If the difference between these signals crosses the event threshold
, the system generates an event
k and the signal
(error signal) is sent to the controller. Different methods can be applied to produce events, in [
21], a review of these methodologies is presented. In a general way, the event threshold
is defined as a constant value. This parameter can be defined as a function of the noise in the sensors or as a function of other relevant variables of the process to generate the events in a more accuracy way. In [
12,
14], these ideas have been explored. Therefore, the event threshold has to be set as a trade off between the accuracy of the system and the number of events. The communication channel
is used to send the signal
to the controller. In this case, the RF channel is occupied only when the EG generates events. On the other hand, when the signals
and
are very similar, the plant/process is in a steady state. In this case, no events occur in the system and the channel
is free. When the signal
arrives in the remote node it is stored in the memory
M. Therefore, every time the system generates an event, the memory is updated with a new value. In the periods of time between events, the information stored in the memory is used to control the remote node. Besides, when an event is generated in the system, the controller receives the signal
and it calculates the signal
. Afterwards, this control signal is sent to the remote node via
. As result of this, the communication resources
and
are used only when the system is generating events.
In general, the communication channels and use Industrial, Scientific and Medical (ISM) bands which are not exclusive and many agents may be using them at the same time. When other devices are using the same channel, the interferences, the packet dropouts and an excessive delay in the network could affect the performance of the control system. To avoid these effects, a free channel in the radio link between the remote node and the controller has to be selected. For example, if the 2.4 GHz band is used, there are around 126 available channels so there is a high probability of finding interference-free channels in the wireless network.
As a conclusion, the proposed event-based solution has three main advantages:
In a practical way, to compare the responses of both NCS architectures (discrete-time and event-based), some conditions must be imposed:
5. Resources Usage
To measure the performance of a control system, the Integral Absolute Error
is applied. This criterion is widely used in continuous-time and discrete-time control systems. The
calculates the difference between the output of the system (
for continuous-time or
for discrete-time) and the reference signal (
or
) by the following equations:
Therefore, the analysed system has a good performance if the
is small.
Another way to evaluate the performance of a control system is by the Integral Absolute Error compared to Periodic loop
. This criterion is mainly used in event-based control systems [
34,
35]. This indicator compares the output of the event-based system
with the output of its equivalent discrete-time system
, as presented in Equation (
21).
Although the
is a good criterion to measure the performance of an event-based control system, in practice, many researchers [
36,
37,
38,
39,
40] use the ratio of events
. This parameter calculates the activity of an event-based control system versus an equivalent discrete-time control system, the ration of events is given by:
where
is the number of events in the analysed system and
the number of samples in the equivalent discrete-time system. In this case, the number of events can be defined as
for the send-on-delta algorithm and
for the integral criterion, where
is the analysis period. In the same way, the number of samples is defined as
(see
Section 3). In this context, if
the event-based system has less activity than the equivalent discrete-time system and consequently, it uses less resources. As was previously analysed, the event-based sampling criteria generate less events than the periodic sampling techniques using the same resolution in both methods. It means that
(where
if the send-on-delta is used or
if the integral criterion is used (see Equations (
17) and (
19)). If the analysis period
is taken into account, it can be written
and
, then the ratio of events is given as:
where
.
Using the event efficiency
, this can be expressed as:
In a general way, if the resolutions in the sampling methods are the same, the activity of the event-based control systems is more efficient than the discrete-time solutions ().
In this work, to analyse the resources usage efficiency, the ratio
is defined as follows
where
R indicates which resource is analysed,
is the usage of the resource
R in the event-based control system and
denotes the usage of the same resource in the equivalent discrete-time control system. In the same way, the efficiency in the usage of the resource
R can be expressed as
In the following sections, the usage efficiency of the resources of the control system such as bandwidth, computational load and energy are investigated.
5.1. Bandwidth Usage
The model depicted in
Figure 4a has been used to analyse the bandwidth usage.
The information in the uplink direction is
bits and in the downlink is
bits. The analysis period
is considered. In this interval time, the discrete-time system generates
samples and the event-based system
events. Then, the bandwidth usage, defined as the number of bits transmitted per second, can be written for the discrete-time system by
and for the event-based solution is given by
where
and
represent the bandwidth usage in the uplink and in the downlink direction, respectively.
The bandwidth usage ratio for the uplink
and for the downlink
can be expressed by the following equations
considering
, the bandwidth usage ratio for both directions
can be defined as
and the bandwidth usage efficiency is given by
As Equation (
32) shows, the bandwidth usage efficiency is the same as the event efficiency.
5.2. Computational Load Reduction
To obtain a model of the computational load in the analysed control systems, the scheme depicted in
Figure 5 has been used.
The control algorithm is composed of two elements: the algorithm in the controller and the algorithm in the remote node. In the remote node, the algorithm is divided in two blocks, the control algorithm and the polling algorithm. The polling block is used to get the measures from the sensors and in the event-based solution it also generates the events. In the controller, operations are executed each time the algorithm is run. On the other hand, in the remote node, operations are executed in the control algorithm either when the discrete-time solution is used or when the event-based technique is selected.
Taking into account the previous assumptions, the computational load in the discrete-time system
and in the event-based control system
considering the analysis period
can be expressed by
then, the computational load ratio
is given by
and the computational load efficiency can be written as
In general, if increases, the efficiency decreases. If the computational load of the polling algorithms is smaller than the control algorithms ( and ), and . On the other hand, when the load of the polling algorithms increases, the computational load ratio () and the event-based control system does not have efficiency in computational load . As a conclusion, the computational load efficiency of the system has a high dependence on the computational load of the polling algorithms.
From a practical point of view, to evaluate the computational burden of the system a simple procedure has to be followed. First, it is necessary to distinguish which part of the algorithm is executed periodically and which one is executed eventually when the events occur in the system. Then, the parameters
,
,
and
can be obtained doing a high level analysis of the control algorithm. In
Section 6.3.2 and in
Appendix A, this procedure has been applied in the application used as practical example in this work.
5.3. Energy Consumption
In this section, the energy efficiency of the presented event-based control system is investigated. In
Figure 6, the simplified energy model of the system is depicted.
The electric power in the controller can be obtained adding up the power that the modem needs to transmit and receive the information
and the power in the rest of the system of the controller
. When the discrete-time system is considered, the power of the controller is given by
where
is the power ratio defined by
Using the same argument, the power of the controller when the event-based architecture is used can be written as
Taking into account the analysis period
, the energy usage in the discrete-time controller
and for the event-based controller
are given by the following equations
and the energy ratio in the controller
can be expressed as
and the energy efficiency in the controller can be written as
Using the same reasoning in the remote node, the energy usage in the discrete-time implementation
and in the event-based solution
can be written as
where
. Then, the energy ratio in the remote system is defined by
and the energy efficiency in the remote node can be written as
If the power of the modem in the controller is high (), the efficiency in energy usage in the proposed event-based system is the event efficiency and . On the other hand, when the power of this device is low (), the system is not energy efficient, and . Similar conclusions can be obtained in the remote node considering the parameter . In conclusion, the power of the modems determines the energy efficiency of the proposed event-based control scheme.
6. Experimental Results
To check the ideas presented in this work, a test laboratory to investigate wireless control systems has been developed (
Figure 7). In this platform, the controller has been implemented in a laptop and the remote nodes are the mobile robots. For this purpose, mOway mobile robots [
41] have been used. Using this platform, an analysis of the behaviour of the event-based control schemes presented in this paper is carried out as well as a comparison with their equivalent discrete-time implementation.
The control algorithms have been programmed in C++ for the controller and in the mOway World environment for the robots (
Figure 7a). A radio link interface is used to communicate the controller and the robots (
Figure 7b). Finally, other applications such as the Tracker, the Matlab/Simulink and some scripts in the controller can be used to analyse the experimental results (
Figure 7c).
The structure and components of the robots are depicted in
Figure 8. The robots have four infra-red obstacle sensors with a maximum range of 3 cm and a sensor to measure the battery level (
Figure 8a). The wireless communication system (robot RF interface (
Figure 8b), and PC RF interface (
Figure 8c)) works in the worldwide ISM frequency band at 2.400–2.4835 GHz and uses GFSK modulation. In the system 126 channels can be configured, the rate for each channel is 2 Mbps. The angular speeds of the wheels can be varied from 0 to
rad/s and their geometrical parameters
cm (distance between wheels) and
cm (radius of the wheels).
To analyse the event-based control architecture proposed in this work and its resources usage efficiency, some experiments have been set up. In these experiments robot navigation algorithms will be checked in the laboratory. In the following sections, the proposed navigation algorithms, their implementation in the system and the experimental results will be analysed in detail.
6.1. Navigation Algorithms
In navigation applications for mobile robots, the algorithms such as Go To Goal (GTG), Obstacle Avoidance (OA) and Wall Following (WF) are widely used [
42,
43,
44,
45,
46]. In these applications, it is also critical to define a precise positioning mechanism to guarantee the convergence of the navigation algorithm [
47,
48].
In this work, the behaviour and the resource usage of the OA and WF algorithms are investigated in the proposed event-based control architecture. To define the navigation algorithms, the position and the orientation of the obstacle sensors have to be taken into account (
Figure 9a). The variables that contain the measurements of the sensors are defined by two indexes as follows:
lateral left,
front left,
front right and
lateral right. The parameter
stores the battery level. In the actuators, the linear speeds of the wheels are
speed left and
speed right. Finally, the parameter
(robot number) identifies the robot in the platform.
The sensor information
and the control signals
are sent and received by the RF interface, as shown in
Figure 9b.
The architecture of the algorithm in the robots is depicted in
Figure 10.
The orange arrows represent the discrete-time implementation. The green ones are used for the event-based solution. The discrete-time algorithm works as follows:
The navigation speed is assigned to and .
The speeds and are applied to the actuators.
The sensors group gets the information from the sensors.
The sensor information y is sent to the controller.
The control signals u are received from the controller.
Finally, the speeds are applied to the robot wheels.
In the event-based solution, Steps 4 and 5 are executed only if the event condition is fulfilled. Furthermore, depending on which algorithm is executing (OA or WF) the event condition will be different. In the following subsections, these aspects and the controller algorithm will be defined in detail.
6.1.1. Obstacles Avoidance Algorithm
In the event-based implementation of the OA algorithm, the event condition is given by
where
is the event threshold. As shown in Equation (
48), if any of the obstacle sensors (
) exceeds the value of the event threshold (
), an event is generated in the system and the robot sends the sensor information to the controller. The value of the event threshold determines the accuracy of the algorithm and the number of the events that the robot generates. If the threshold value is high, the number of events decreases at the same time as the accuracy of the algorithm does. On the other hand, there will be an inverse behaviour when the value of the event threshold decreases.
The algorithm in the controller is shown in
Figure 11 and in Equation (
49). In this case, the same algorithm is use for the two implementations (discrete-time and event-based).
where conditions
–
are defined by Equations (
50)–(
58)
In
Figure 11, the orange arrows represent the discrete-time solution and the green arrows the proposed event-based control algorithm. This algorithm is parametrized by the linear speed
v and the angular speed
. Theses magnitudes are transformed into wheel speeds
and
by
where
is expressed as a percentage of the angular speed and
is the maximum angular speed of the robot. Notice that, in this control algorithm, condition
is only executed in the discrete-time implementation.
As presented in
Figure 11, the algorithm receives from the robot the sensor information (
). In the discrete-time implementation, this information is received every period of time
and in the event-based solution when an event is generated in the robot. Depending on the values of the sensors (conditions
to
), different control actions are taken. In this implementation,
represents a turn of the robot to the left, on the contrary
does the robot turns to the right. For example, if the right sensors detect an obstacle (the conditions
OR
OR
is fulfilled) the robot must turn to the left. In this case, the control law is defined as
(turn to left) and
(maintain constant linear velocity).
6.1.2. Wall Following Algorithm
Two variants of the WF algorithm are usually implemented: clockwise (CW) or counter-clockwise (CCW) [
45]. In this work, the second option has been selected. The event condition in the algorithm is defined by
where
represents the event-threshold and the parameter
w represents the target distance between the robot and the wall. As presented in Equation (
61), if there is an obstacle in front of the robot (
) or the distance from the robot to the wall exceeds the event threshold (
), an event is generated in the robot.
The controller algorithm, which is the same in both architectures (discrete-time and event-based), is defined by
where
represents the approach speed to the wall. In this case, the control law is the same for both implementations (discrete-time and event-based). In this algorithm, when there is an obstacle in front of the robot (
), the left wheel rotates with a constant speed (
) and the right wheel stops (
). In any other situation, the speed of the right wheel remains constant (
) and the right wheel is modulated according to
to maintain a constant distance
w to the wall.
6.2. System Activity
In this work, two experiments have been set up, the OA algorithm has been checked in experiment 1 and the FW in experiment 2. In both experiments, the discrete-time architecture was implemented in robot number 1 () and the event-based one in robot number 2 ().
The discrete-time system works with a sampling frequency of 10 Hz, and the event-based system uses the send-on-delta sampling method. The obstacles sensors have a maximum change rate (
) of 3 cm/s. To compare the efficiency of both systems (discrete-time and event-based), they must have the same accuracy. In other words, the precision of the discrete-time system
has to be the same as
(see
Section 3.3). In this case,
and
is defined as
for the OA algorithm and as
for the WF algorithm. Taking into account the previous assumptions, the event thresholds were set up to
cm.
The parameters of the algorithms are presented in
Table 1 and
Table 2.
In the experiments, the responses of the systems were analysed during fifteen minutes ( min). To analyse the activity of the control scheme, the number of samples in the discrete-time system and the number of events in the proposed architecture have been measured.
In
Figure 12 and
Figure 13, some snapshots of the experiment are shown. In both experiments, the robots show a stable behaviour. The control scheme solve the navigation problem in the discrete-time solution
as in the event-based implementation
.
In
Figure 14, the activity of the systems is presented.
In both experiments, the number of samples
in the discrete-time architecture is the same (
Figure 14a,b). On the other hand, the number of events
is always smaller than the number of samples
in Equation (
17) (
Figure 14c,d), as demonstrated in
Section 3.3. In this case, the event efficiency
for the 15 min experiment is
for the OA and
for WF algorithm, as presented in
Figure 14e,f and in
Table 3.
6.3. Resource Efficiency
In this section, the RF bandwidth, the computational load and the energy consumption in both architectures have been analysed. At the same time, the experimental results are discussed.
6.3.1. RF bandwidth
In each sensor and in each actuator, the transmitted information is a 8 bit code. Taking into account this assumption, the RF uplink (from controller to robot) uses 16 bits and the RF downlink (from robot to controller) needs 48 bits to send a packet of information (see
Figure 10). Some additional bits also have to be included to manage the radio interface. In this case, the downlink is the critical link because it needs most of the bandwidth.
The downlink (DL) bandwidth for the two experiments is depicted in
Figure 15a,b.
As demonstrated in
Section 5.1, the efficiency in the bandwidth usage
(
Figure 15e,f) is the same as the event efficiency
(
32) (
Figure 15c,d). The average bandwidths for each architecture (
,
), the bandwidth usage ratio
and the bandwidth usage efficiency
are presented in
Table 4.
Taking into account these results, the bandwidth efficiency is 63% for the OA algorithm and 17% for the WF one.
6.3.2. Computational Load
To estimate the computational load in both experiments, a high level analysis of the algorithms has been performed. In
Table 5, the number of operations for each algorithm is presented.
The parameters
,
,
and
have been calculated taking into account the high level representation of the algorithms of the robots and the controllers (see
Figure 5 and
Appendix A). Considering
Table 5 and the activity of the system (
and
), the computational load for each experiment can be calculated by Equations (
33)–(
35).
The results for experiments 1 and 2 are depicted in
Figure 16.
In experiment 1, the computational load is lower in the event-based implementation than in the discrete-time one (
Figure 16a,c). In this case, the computational load efficiency
reaches 24% (
Figure 16e and
Table 6). On the other hand, in experiment 2, the computational load in the event-based solution is higher than the discrete-time one (
Figure 16b,d). In this case, the computational load efficiency is −19% (
Figure 16f and
Table 6).
As discussed in
Section 5.2, the computational load has a high dependence on the ratio of events
and the polling algorithms. In these experiments, the polling algorithms have a small computational load (see
Table 5), but the ratio of events is very large especially in the WF algorithm (see
Table 3). This is the main reason why the efficiency in WF algorithm is negative. Therefore, the proposed system does not present good results for computational load in the WF algorithm. In this case, the solution could be to modify the event threshold
to improve the efficiency with the inconvenience of reducing the accuracy of the system.
6.3.3. Energy Consumption
In these experiments, the controller has been implemented in a laptop with Windows OS. In this system, it is very complicated to measure the consumed energy by the controller and therefore this consumption has not been considered. On the other hand, in the mOway robot measuring this energy is easy by using the battery level sensor .
The results of the experiments are depicted in
Figure 17.
As shown in
Figure 17a,b, when both experiments end, the battery level in the proposed event-based architecture is higher than in the discrete-time implementation, which means that the proposed system uses less energy than the classical discrete-time solution. The energy used in the robot can be estimated in the discrete-time solution as
and in the event-based architecture by
where
denotes the level of battery measured in sensor
for the discrete-time solution and
for the event-based one.
In these experiments, the energy ratio in the robot can be obtained directly by
and energy efficiency by
. The results are presented in
Figure 17c,d and
Table 7.
In this case, the energy efficiency is 31% for experiment 1 and 14% for experiment 2. The energy consumed by the robot could be directly obtained using the measures of the sensor
and this has allowed to calculate the energy efficiency directly. On the other hand, using the model developed in
Section 5.3, the power ratio
can be obtained. In these experiments
, this means that the modem of the robot consumes less than 1% of the robots energy. This value is extremely small because the modem has very little power (< 1 mW) and consequently a short range (less than 20 m).
As analysed previously, if the power of the modem increases, the efficiency also increases. In these examples, if the power of the modem is increased (e.g., 100 mW which implies a range of 1 km, ) the efficiency in the OA algorithm increases from 31% to 62% and in the WF algorithm from 14% to 17%.
7. Conclusions and Future Work
The event-based control architectures presented in this work can be an alternative to the classical discrete-time control systems. The features of these new control schemes help to manage the resources of the system under optimal conditions because they present high efficiency in the resource usage. In a general way, by using a sampling criterion such as the send-on-delta or the integral criterion, the activity of the presented solution can be reduced. In this paper, some new methods have been proposed to analyse the resources usage and the criteria to minimize their consumption. Thus, it can be concluded that these new schemes use fewer resources such as bandwidth, computational load and energy than the classical ones. The ideas presented in this work have been applied to an NCS for mobile robots as a practical approach. The navigation problem was solved using this new control paradigm and it has been compared with a classical discrete-time solution. Finally, the experimental results have demonstrated the stability and the efficiency in the resources usage of the proposed event-based control architecture if it is compared with classical control schemes.
In this work, the effects of the delays, the packet dropouts and the packet disorders in the network have not been analysed. To avoid these undesirable effects that the network produces in the proposed control system a free RF channel is selected to communicate the robots and the controller. This reduces the interference that other agents using the same frequency can produce. To improve the proposed system, a logic-like trigger [
49] or other similar ideas could be applied in a simple way. To apply these methods, two main aspects must be previously developed. First, it is necessary to find a stochastic model of the mobile robots. Then, an exhaustive analysis of the network with different levels of congestion must be performed. With this model, an estimation of the delay between the packets and the volume of the disordered packets can be obtained. Finally, once these models have been developed a network-based H∞ filtering using a logic jumping-like trigger could be applied.
As a future work, the proposed strategy and the ideas presented in this paper will be analysed in systems such as Unmanned Aerial Vehicles (UAVs), Autonomous Underwater Vehicles (AUVs) or Legged Mobile Robots (LMRs). Furthermore, new strategies to ensure the stability and the efficiency of these systems will be investigated.