Networked Control Systems Lecture Notes
Laura Giarr´e
Networked Control Systems: Introduction
I Course Objectives I Rules
I Materials
I Tentative scheduling
L. Giarr´ e- Networked Control Systems 2020-2021 - 2
Course Objectives
I To learn how to identify and control a networked system, both theoretically and practically.
I To understand the model and the algorithms to be used in a network of agents and sensors.
I Estimation theory, Graph theory, consensus theory, information theory is essential for distributed control and identification. I Understands the limitations of the current state-of-the-art and
trends in NCSs
Course Objectives
I To learn how to identify and control a networked system, both theoretically and practically.
I To understand the model and the algorithms to be used in a network of agents and sensors.
I Estimation theory, Graph theory, consensus theory, information theory is essential for distributed control and identification. I Understands the limitations of the current state-of-the-art and
trends in NCSs
L. Giarr´ e- Networked Control Systems 2020-2021 - 3
Course Objectives
I To learn how to identify and control a networked system, both theoretically and practically.
I To understand the model and the algorithms to be used in a network of agents and sensors.
I Estimation theory, Graph theory, consensus theory, information theory is essential for distributed control and identification.
I Understands the limitations of the current state-of-the-art and
trends in NCSs
Course Objectives
I To learn how to identify and control a networked system, both theoretically and practically.
I To understand the model and the algorithms to be used in a network of agents and sensors.
I Estimation theory, Graph theory, consensus theory, information theory is essential for distributed control and identification.
I Understands the limitations of the current state-of-the-art and trends in NCSs
L. Giarr´ e- Networked Control Systems 2020-2021 - 3
Tests and Grading
Grading Homeworks: 10%+ Presentation of a paper and discussion:
20% + Implementation of a project: 70%
Materials
I Slides and Videos I Reference books:
I Lectures on Network Systems. Francesco Bullo. CreateSpace Independent Publishing Platform, Mar 10, 2018 - Network analysis (available online @
http://motion.me.ucsb.edu/book-lns/)
I Graph Theoretic Methods in Multiagent Networks di Mehran Mesbahi Magnus Egerstedt (2010) di Princeton University Press
I L. Lyung System Identification Theory for the user 1998 I Themistoklis Charalambous Lecture notes Aalto Finland http://www.themistoklis.org/teaching.html ELEC-E8123:
Networked Control Systems
L. Giarr´ e- Networked Control Systems 2020-2021 - 5
Tentative Schedule
LEC DATES TOPICS
1 (2) 22/09 Rules and Introduction 2 (2) 24/09 Review of past material 3 (2) 29/09 Examples- homeworks 4 (2) 1/10 Review of past material 5 (2) 6/10 Examples- homework 6 (2) 8/10 Estimation
7 (2) 13/10 Example and exercises 8 (2) 15/10 Least square
9 (2) 20/10 Examples and exercises - Homeworks 10(2) 21/10 Consensus Algorithm
11(2) 27/10 Examples and exercises - Homeworks
Tentative Schedule
LEC DATES TOPICS
14 (2) 5/11 Information Theory 15 (2) 10/11 Examples and howeworks 16 (2) 13/11 Sampling theory
17 (2) 17/11 Examples and homeworks
18 (2) 19/11 Communication links, data theorems, and their effect on control
19 (2) 24/11 Examples
20 (2) 26/11 Stabilization of LTI systems over fading channels 21 (2) 1/12 Examples
22 (2) 2/12 Channel Scheduling and Access
in (Wireless) Networked Control Systems 23 (2) 10/12 Application and Homeworks
24 (2) 15/12 Identification
25 (2) 18/12 Examples and homeworks 26 (2) 22/12 Recap
L. Giarr´ e- Networked Control Systems 2020-2021 - 7
Networked Control Systems: Overview
I Introduction to the problem
I Applications
Where do we find sensors?
Nowadays, sensors appear (almost) everywhere
I Our smartphones (magnetometer, GPS, gyroscope, accelerometer, proximity sensor, ambient light sensor, ...) I (Wireless) industrial automation
I Infrastructure monitoring and control I Automated vehicles
I Intelligent transportations systems
I Wireless sensor and actuator networks in rescue operations I ...
L. Giarr´ e- Networked Control Systems 2020-2021 - 9
Where do we find sensors?
Nowadays, sensors appear (almost) everywhere
I Our smartphones (magnetometer, GPS, gyroscope, accelerometer, proximity sensor, ambient light sensor, ...) I (Wireless) industrial automation
I Infrastructure monitoring and control I Automated vehicles
I Intelligent transportations systems
I Wireless sensor and actuator networks in rescue operations
I ...
Applications: Network Information processing
I Exploiting everything connected: information processing on a global scale
Motivation
Applications: networked information processing
Exploiting everything connected: information processing on a global scale L. Giarr´ e- Networked Control Systems 2020-2021 - 10
Applications: network information processing
I Exploiting everything connected: information processing on a large
scale, e.g., google traffic information:
Applications: Wide area sensing and monitoring
I Sensor networks (with applications in, e.g., machine-to-machine communication for security, surveillance and environmental management)
I A water quality monitoring technology in a wide area is developed to detect water pollution in streams, rivers and coastal areas I Water pollution data from water quality sensors are transmitted
between the field servers with the sensors and finally, to the base station (sink) through a designed self-organizing autonomous wireless sensor network
L. Giarr´ e- Networked Control Systems 2020-2021 - 12
Applications: Micro-Electro-Mechanical Systems
I Micro-Electro-Mechanical Systems (MEMS) 1 are extensively used in smartphones, wearable devices, and other electronic devices, owing to its enhanced electrical performance at high frequencies. The MEMS market is expected to gain popularity as the consumer electronics industry is shifting its focus from traditional sensors to MEMS technology 2 I In current and future generations of MEMS, there can be as many as
10 4 − 10 6 actuators or sensors on a single chip, and their aim is to control
one or more dynamical systems by deploying a shared network for data
exchange
Applications: Autonomous/automated cars
Source: www.networkworld.com/article/3147892/internet/one-autonomous-car-will-use-4000-gb-of-dataday.html
I Self-driving cars will soon create significantly more data than people
L. Giarr´ e- Networked Control Systems 2020-2021 - 14
Applications: Intelligent transportation systems
I Interconnecting vehicles and infrastructure for safety and
efficiency
Applications: Smart Energy Networks
I Distributed energy management in smart energy networks, e.g.,
I Distributed optimal power dispatch (OPD) 3 problem
3 OPD aims at managing real power generation to control the frequency to be close to the rated value (usually 50Hz).
L. Giarr´ e- Networked Control Systems 2020-2021 - 16
From sensing to decisions and control
I Ongoing challenge: transform networked sensor data to effective decisions
I Network limitations determine how to sense, process and act on data
I In this course, we will focus on the following concepts:
I Minimum rates required to stabilize a networked-constrained control system for different channels
I How is the data transmitted (quantization) given the data rate
Introduction
I The feedback loop of a NCS is closed via a communication network
I NCSs are spatially distributed systems wherein the control loops are closed through a communication network 1.2. The need for research on wireless networked control systems 5
P
C
Network S A
!"#$%
&$'"!%$&
P
C
S A
!"#$%
&$'"!%$&
(a) (b)
Figure 1.2: Block diagrams of networked control systems with a plant P, a sensor
S, a controller C, and an actuator A. In the figure, (a) illustrates that a controller is going to be designed for a given abstraction of network and plant whereas (b) shows that both a controller and communication protocol is going to be designed for a given plant.
Throughout this thesis, we propose new analysis and design frameworks to improve the performance guarantees of wireless networked control systems. Specifi- cally, Chapter 3 develops a co-design framework in which we jointly optimize the communication protocol (how wireless nodes forward data packets over multiple unreliable hops to guarantee a certain level of latency and end-to-end packet delivery rate) and the control algorithms. Chapter 4 determines the optimal number of retransmission attempts to minimize the expected control loss of the closed-loop control system. In addition, it demonstrates whether or not the maximal number of retransmissions depends on the control architecture (e.g., time- or event-driven).
Chapter 5 investigates how event-triggered communication from the controller to the actuator allows to reduce the network traffic (and, indirectly, the energy con- sumption of the network) while maintaining the same control performance. Finally, Chapter 6 presents a supervisory control structure that only needs a crude idea of the network state (or rather, on the network-induced end-to-end delays) to trigger the most appropriate controller from a multi-controller unit.
We would like to point out that this thesis focuses on challenges related to ensuring good performance of a networked control loop in the presence of information delays and losses. Networked control systems also pose a range of challenges that are not covered in this thesis, e.g., network security and resilience to structural changes (e.g., sensors and/or actuators that are added and removed). See, for example, the theses [8,9] and the references therein.
1.2. The need for research on wireless networked control systems 5
P
C
Network S A
!"#$%
&$'"!%$&
P
C
S A
!"#$%
&$'"!%$&
(a) (b)
Figure 1.2: Block diagrams of networked control systems with a plant P, a sensor
S, a controller C, and an actuator A. In the figure, (a) illustrates that a controller is going to be designed for a given abstraction of network and plant whereas (b) shows that both a controller and communication protocol is going to be designed for a given plant.
Throughout this thesis, we propose new analysis and design frameworks to improve the performance guarantees of wireless networked control systems. Specifi- cally, Chapter 3 develops a co-design framework in which we jointly optimize the communication protocol (how wireless nodes forward data packets over multiple unreliable hops to guarantee a certain level of latency and end-to-end packet delivery rate) and the control algorithms. Chapter 4 determines the optimal number of retransmission attempts to minimize the expected control loss of the closed-loop control system. In addition, it demonstrates whether or not the maximal number of retransmissions depends on the control architecture (e.g., time- or event-driven).
Chapter 5 investigates how event-triggered communication from the controller to the actuator allows to reduce the network traffic (and, indirectly, the energy con- sumption of the network) while maintaining the same control performance. Finally, Chapter 6 presents a supervisory control structure that only needs a crude idea of the network state (or rather, on the network-induced end-to-end delays) to trigger the most appropriate controller from a multi-controller unit.
We would like to point out that this thesis focuses on challenges related to ensuring good performance of a networked control loop in the presence of information delays and losses. Networked control systems also pose a range of challenges that are not covered in this thesis, e.g., network security and resilience to structural changes (e.g., sensors and/or actuators that are added and removed). See, for example, the theses [8,9] and the references therein.
1.2. The need for research on wireless networked control systems 5
P
C
Network S A
!"#$%
&$'"!%$&
P
C
S A
!"#$%
&$'"!%$&
(a) (b)
Figure 1.2: Block diagrams of networked control systems with a plant P, a sensor
S, a controller C, and an actuator A. In the figure, (a) illustrates that a controller is going to be designed for a given abstraction of network and plant whereas (b) shows that both a controller and communication protocol is going to be designed for a given plant.
Throughout this thesis, we propose new analysis and design frameworks to improve the performance guarantees of wireless networked control systems. Specifi- cally, Chapter 3 develops a co-design framework in which we jointly optimize the communication protocol (how wireless nodes forward data packets over multiple unreliable hops to guarantee a certain level of latency and end-to-end packet delivery rate) and the control algorithms. Chapter 4 determines the optimal number of retransmission attempts to minimize the expected control loss of the closed-loop control system. In addition, it demonstrates whether or not the maximal number of retransmissions depends on the control architecture (e.g., time- or event-driven).
Chapter 5 investigates how event-triggered communication from the controller to the actuator allows to reduce the network traffic (and, indirectly, the energy con- sumption of the network) while maintaining the same control performance. Finally, Chapter 6 presents a supervisory control structure that only needs a crude idea of the network state (or rather, on the network-induced end-to-end delays) to trigger the most appropriate controller from a multi-controller unit.
We would like to point out that this thesis focuses on challenges related to ensuring good performance of a networked control loop in the presence of information delays and losses. Networked control systems also pose a range of challenges that are not covered in this thesis, e.g., network security and resilience to structural changes (e.g., sensors and/or actuators that are added and removed). See, for example, the theses [8,9] and the references therein.
1.2. The need for research on wireless networked control systems 5
P
C
Network S A
!"#$%
&$'"!%$&
P
C
S A
!"#$%
&$'"!%$&
(a) (b)
Figure 1.2: Block diagrams of networked control systems with a plant P, a sensor
S, a controller C, and an actuator A. In the figure, (a) illustrates that a controller is going to be designed for a given abstraction of network and plant whereas (b) shows that both a controller and communication protocol is going to be designed for a given plant.
Throughout this thesis, we propose new analysis and design frameworks to improve the performance guarantees of wireless networked control systems. Specifi- cally, Chapter 3 develops a co-design framework in which we jointly optimize the communication protocol (how wireless nodes forward data packets over multiple unreliable hops to guarantee a certain level of latency and end-to-end packet delivery rate) and the control algorithms. Chapter 4 determines the optimal number of retransmission attempts to minimize the expected control loss of the closed-loop control system. In addition, it demonstrates whether or not the maximal number of retransmissions depends on the control architecture (e.g., time- or event-driven).
Chapter 5 investigates how event-triggered communication from the controller to the actuator allows to reduce the network traffic (and, indirectly, the energy con- sumption of the network) while maintaining the same control performance. Finally, Chapter 6 presents a supervisory control structure that only needs a crude idea of the network state (or rather, on the network-induced end-to-end delays) to trigger the most appropriate controller from a multi-controller unit.
We would like to point out that this thesis focuses on challenges related to ensuring good performance of a networked control loop in the presence of information delays and losses. Networked control systems also pose a range of challenges that are not covered in this thesis, e.g., network security and resilience to structural changes (e.g., sensors and/or actuators that are added and removed). See, for example, the theses [8,9] and the references therein.
I The use of a shared network to connect spatially distributed components, e.g., actuators, sensors and controllers, makes it possible to design large-scale systems
I The constraints in communication and the interaction between control and communication make the classical approaches not suitable
L. Giarr´ e- Networked Control Systems 2020-2021 - 18
Building blocks of NCSs
Sensors are the collectors of data.They are the simplest devices (e.g., electronic sensors, biosensors, chemical sensors) in the network and their number is usually large. They have to be cheap, and hence operate on low energy budget.
Actuators are the recipients of instructions and perform the action(s) prompted to them by a controller.
Controllers sensors transmit the system output to the controller
by putting the sensor measurement into a frame or a packet. The
control signal is encapsulated in a frame or a packet and sent to
the actuator via the network as well.
Building blocks of NCSs
Sensing and actuation in Industrial Internet
• Embedding sensors and actuators in machines (and other physical objects) brings them into the connected world
• Sensors are the collectors of data
• Actuators are the recipients of instructions and perform the action(s) prompted to them by a controller
14 Background
P
1C
1S
A P
2C
2S A
Network
P
NS A
C
N...
...
Figure 2.1: Block diagram of general networked control systems. Multiple control loops, with each loop consisting of a plant Piand a controller Cifor all i ∈ {1, �, N }, share a communication network. Each controller Cicommunicates with the sensor Si and the actuator Aiby sending messages over the shared communication network.
• Variable communication delays (latency). Data transmission over a wireless network takes an uncertain amount of time due to several reasons.
If multiple senders try using the same link, each of them has to wait for an uncertain amount of time before the link becomes available to initiate their data transfer. In addition, collisions – introducing an extra delay until packets can be successfully retransmitted – almost always happen in shared links.
Packet retransmissions are also used to improve reliability of lossy networks.
• Data rate (bandwidth). When different devices use a shared network re- source, the rate at which they communicate over this network is limited by the network capacity [30,33]. This limitation, in turn, imposes a constraint on the stability of closed-loop control systems. For example, the works [34–37]
have focused on identifying the minimal data rate required to stabilize a linear system.
Bearing in mind that any of these aforementioned imperfections may deteriorate the closed-loop control performance, or even cause the control system to become unstable [30], it is crucial to know how these imperfections can affect the closed-loop system in terms of control performance and stability. The next section provides a brief summary of existing models of delays and losses.
(b) A networked control system; each controller aims to communicate with its Actuator and Sensor through a shared network.
1.2. The need for research on wireless networked control systems 5
P
C
Network S A
!"#$%
&$'"!%$&
P
C
S A
!"#$%
&$'"!%$&
(a) (b)
Figure 1.2: Block diagrams of networked control systems with a plant P, a sensor S, a controller C, and an actuator A. In the figure, (a) illustrates that a controller is going to be designed for a given abstraction of network and plant whereas (b) shows that both a controller and communication protocol is going to be designed for a given plant.
Throughout this thesis, we propose new analysis and design frameworks to improve the performance guarantees of wireless networked control systems. Specifi- cally, Chapter 3 develops a co-design framework in which we jointly optimize the communication protocol (how wireless nodes forward data packets over multiple unreliable hops to guarantee a certain level of latency and end-to-end packet delivery rate) and the control algorithms. Chapter 4 determines the optimal number of retransmission attempts to minimize the expected control loss of the closed-loop control system. In addition, it demonstrates whether or not the maximal number of retransmissions depends on the control architecture (e.g., time- or event-driven).
Chapter 5 investigates how event-triggered communication from the controller to the actuator allows to reduce the network traffic (and, indirectly, the energy con- sumption of the network) while maintaining the same control performance. Finally, Chapter 6 presents a supervisory control structure that only needs a crude idea of the network state (or rather, on the network-induced end-to-end delays) to trigger the most appropriate controller from a multi-controller unit.
We would like to point out that this thesis focuses on challenges related to ensuring good performance of a networked control loop in the presence of information delays and losses. Networked control systems also pose a range of challenges that are not covered in this thesis, e.g., network security and resilience to structural changes (e.g., sensors and/or actuators that are added and removed). See, for example, the theses [8,9] and the references therein.
1.2. The need for research on wireless networked control systems 5
P
C
Network S A
!"#$%
&$'"!%$&
P
C
S A
!"#$%
&$'"!%$&
(a) (b)
Figure 1.2: Block diagrams of networked control systems with a plant P, a sensor S, a controller C, and an actuator A. In the figure, (a) illustrates that a controller is going to be designed for a given abstraction of network and plant whereas (b) shows that both a controller and communication protocol is going to be designed for a given plant.
Throughout this thesis, we propose new analysis and design frameworks to improve the performance guarantees of wireless networked control systems. Specifi- cally, Chapter 3 develops a co-design framework in which we jointly optimize the communication protocol (how wireless nodes forward data packets over multiple unreliable hops to guarantee a certain level of latency and end-to-end packet delivery rate) and the control algorithms. Chapter 4 determines the optimal number of retransmission attempts to minimize the expected control loss of the closed-loop control system. In addition, it demonstrates whether or not the maximal number of retransmissions depends on the control architecture (e.g., time- or event-driven).
Chapter 5 investigates how event-triggered communication from the controller to the actuator allows to reduce the network traffic (and, indirectly, the energy con- sumption of the network) while maintaining the same control performance. Finally, Chapter 6 presents a supervisory control structure that only needs a crude idea of the network state (or rather, on the network-induced end-to-end delays) to trigger the most appropriate controller from a multi-controller unit.
We would like to point out that this thesis focuses on challenges related to ensuring good performance of a networked control loop in the presence of information delays and losses. Networked control systems also pose a range of challenges that are not covered in this thesis, e.g., network security and resilience to structural changes (e.g., sensors and/or actuators that are added and removed). See, for example, the
theses [8,9] and the references therein.
(a) A classical control system
(via a communication network)
I Embedding sensors and actuators in machines (and other physical objects) −→ brings them into the connected world
L. Giarr´ e- Networked Control Systems 2020-2021 - 20
I The interplay between communication (wired or wireless) and control requires a new paradigm, since estimation/control interacts with communication in various ways:
I a critical transmission rate below which there does not exist any quantization and control scheme able to stabilize an unstable plant
I when a signal is transmitted over a digital network, the signal must be sampled, encoded in a digital format, transmitted over the network and finally the data must be decoded at the receiver side, thus inducing delays in the feedback loop I a critical packet-loss rate above which the mean state
estimation error covariance matrices of the Kalman filter will diverge
I the variable network conditions such as congestion and channel
quality may also induce variable delays due to the network
I These phenomena strongly imply that the network has significant effects on the control/filtering performance
I This raises new fundamental challenges in investigating NCSs from the perspective of unifying communication, estimation, and control
I Reliable transmission protocols such as TCP (handshake) not always appropriate for NCSs since data that are retransmitted are outdated and may not be useful - communication
protocols should be revised as well
L. Giarr´ e- Networked Control Systems 2020-2021 - 22
Applications: Wireless industrial automation
I Today’s industrial control systems use a multitude of spatially distributed sensors and actuators to monitor and control physical processes
I Traditionally, resorted to wired communication infrastructure
to exchange information among various system components
Applications: Wireless industrial automation
I Traditionally, resorted to wired communication infrastructure to exchange information among various system components
I Communication cabling: high set-up costs; subject to heavy wear and tear in industry robots and therefore requires frequent maintenance
I slow deployment
I impossible in certain scenarios
L. Giarr´ e- Networked Control Systems 2020-2021 - 24
Wired vs Wireless Communications
I New feature/trend in NCSs - use of wireless communications −→ Wireless NCSs (WNCSs)
X Cost reduction: faster & cheaper installations, more efficient monitoring and fault diagnosis X Flexibility: easy to add, replace and modify
wireless sensors; sensor and actuator nodes can be placed more appropriately; less restrictive maneuvers and control actions; more powerful control through distributed computations X Reliability: wear- and tear-free data transfer,
and fairly reliable communication without the use of expensive connectors
Wired vs Wireless Communication
• Common feature in Industrial Internet - use of wireless communications:
• Today’s industrial control systems use a multitude of spatially distributed sensors and actuators to monitor and control physical processes
• Traditionally resorted to wired communication infrastructure to exchange information among various system components
• High set-up and maintenance costs of physical wires, slow deployment, impossible in certain scenarios
✓ Cost reduction: faster & cheaper installations, efficient fault isolations
✓ Flexibility: easy to add, replace and modify wireless sensors
✓ Reliability: wear- and tear-free data transfer, and fairly reliable communication
Wired vs Wireless Communications
7 Complexity: systems designers and programmers need suitable abstractions to hide the complexity from wireless devices and communication
7 Security: wireless technology is vulnerable; security mechanisms needed for control loops
7 Reliability: systems should have robust and predictable behavior despite characteristics of wireless networks
L. Giarr´ e- Networked Control Systems 2020-2021 - 26
Example of a Wireless Networked Control System (WNCS)
Example of a wireless networked control system
UWB anchors:
placed in steady positions in the indoor space
quadrotor with an UWB tag
onboard computer: that serves
as the controller
Classical approach
Classical control approach
Positioning System desired Σ
position
error e k
<latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit>
(x
<latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit>d , y d ) u
<latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit>k (x, y)
<latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit>• Tested indoors with the fastest settings: 64 bit preamble length and bitrate 6.81 Mbits/sec which result in a message update rate of 30Hz.
• Mean response time: 200-300ms +
-
(¯
<latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit>x, ¯ y)
Network Controller control
input
received position
actual position
L. Giarr´ e- Networked Control Systems 2020-2021 - 28
Classical approach
Classical control approach
Positioning System desired Σ
position
error e k
<latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit>
(x
<latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit>d , y d ) u
<latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit>k (x, y)
<latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit>• Tested indoors with the fastest settings: 64 bit preamble length and bitrate 6.81 Mbits/sec which result in a message update rate of 30Hz.
+ -
(¯
<latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit>x, ¯ y)
Network Controller control
input
received position
actual
position
WNCSs approach
desired Σ position (x d , y d )
<latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit><latexit sha1_base64="uL3N7D7vbJ4IBWX5fKehRa54SvA=">AAAB8XicbZDLSsNAFIZP6q3WW9Wlm8EiVJCSiKC4KrhxWcFesA1hMpm0QyeTMDMRQ+hbuHGhiFvfxp1v47TNQlt/GPj4zznMOb+fcKa0bX9bpZXVtfWN8mZla3tnd6+6f9BRcSoJbZOYx7LnY0U5E7Stmea0l0iKI5/Trj++mda7j1QqFot7nSXUjfBQsJARrI31UH/ygjOUecGpV63ZDXsmtAxOATUo1PKqX4MgJmlEhSYcK9V37ES7OZaaEU4nlUGqaILJGA9p36DAEVVuPtt4gk6ME6AwluYJjWbu74kcR0plkW86I6xHarE2Nf+r9VMdXrk5E0mqqSDzj8KUIx2j6fkoYJISzTMDmEhmdkVkhCUm2oRUMSE4iycvQ+e84Ri+u6g1r4s4ynAEx1AHBy6hCbfQgjYQEPAMr/BmKevFerc+5q0lq5g5hD+yPn8AMuuP6g==</latexit>
+
- error
e k
<latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit><latexit sha1_base64="flxj24NEwN3szZHP3kwGCXrYZmw=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbCft0s0m7G6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJ4Nq47rdTWlvf2Nwqb1d2dvf2D6qHR20dp4phi8UiVt2AahRcYstwI7CbKKRRILATTG7n9c4TKs1j+WimCfoRHUkeckaNtR5wMBlUa27dzUVWwSugBoWag+pXfxizNEJpmKBa9zw3MX5GleFM4KzSTzUmlE3oCHsWJY1Q+1m+6oycWWdIwljZJw3J3d8TGY20nkaB7YyoGevl2tz8r9ZLTXjtZ1wmqUHJFh+FqSAmJvO7yZArZEZMLVCmuN2VsDFVlBmbTsWG4C2fvArti7pn+f6y1rgp4ijDCZzCOXhwBQ24gya0gMEInuEV3hzhvDjvzseiteQUM8fwR87nD0RAjb8=</latexit>
Challenges:
• Synthesize communication-aware controllers, i.e., controllers that account for communication impairments
Communication- aware controller
• Design control-aware communication protocols
• Design filtering and prediction methods to make the performance more robust to noise
(¯ x, ¯ y)
<latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit><latexit sha1_base64="zLpoKCeJ/YsenZb8169W6BdnhrM=">AAAB+3icbZDLSsNAFIZPvNZ6i3XpZrAIFaQkIiiuCm5cVrAXaEOZTKft0MkkzEykIeRV3LhQxK0v4s63cZpmoa0/DHz85xzOmd+POFPacb6ttfWNza3t0k55d2//4NA+qrRVGEtCWyTkoez6WFHOBG1ppjntRpLiwOe040/v5vXOE5WKheJRJxH1AjwWbMQI1sYa2JVa38cynWUXKIckOx/YVafu5EKr4BZQhULNgf3VH4YkDqjQhGOleq4TaS/FUjPCaVbux4pGmEzxmPYMChxQ5aX57Rk6M84QjUJpntAod39PpDhQKgl80xlgPVHLtbn5X60X69GNlzIRxZoKslg0ijnSIZoHgYZMUqJ5YgATycytiEywxESbuMomBHf5y6vQvqy7hh+uqo3bIo4SnMAp1MCFa2jAPTShBQRm8Ayv8GZl1ov1bn0sWtesYuYY/sj6/AFccZP3</latexit>
Filtering
Networked control systems’ approach
received position (ˆ
<latexit sha1_base64="6wvlfKDu7AzJSYugq+Uz5Y6/LXE=">AAAB+nicbZDLSsNAFIZP6q3WW6pLN8EiVJCSiGCXBTcuK9gLtKFMppN26GQSZiZqiHkUNy4UceuTuPNtnKZZaOuBYT7+/xzmzO9FjEpl299GaW19Y3OrvF3Z2d3bPzCrh10ZxgKTDg5ZKPoekoRRTjqKKkb6kSAo8BjpebPrud+7J0LSkN+pJCJugCac+hQjpaWRWa0Pp0ilj9l5fifZ2cis2Q07L2sVnAJqUFR7ZH4NxyGOA8IVZkjKgWNHyk2RUBQzklWGsSQRwjM0IQONHAVEumm+emadamVs+aHQhysrV39PpCiQMgk83RkgNZXL3lz8zxvEym+6KeVRrAjHi4f8mFkqtOY5WGMqCFYs0YCwoHpXC0+RQFjptCo6BGf5y6vQvWg4mm8va61mEUcZjuEE6uDAFbTgBtrQAQwP8Ayv8GY8GS/Gu/GxaC0ZxcwR/Cnj8wcat5Pb</latexit><latexit sha1_base64="6wvlfKDu7AzJSYugq+Uz5Y6/LXE=">AAAB+nicbZDLSsNAFIZP6q3WW6pLN8EiVJCSiGCXBTcuK9gLtKFMppN26GQSZiZqiHkUNy4UceuTuPNtnKZZaOuBYT7+/xzmzO9FjEpl299GaW19Y3OrvF3Z2d3bPzCrh10ZxgKTDg5ZKPoekoRRTjqKKkb6kSAo8BjpebPrud+7J0LSkN+pJCJugCac+hQjpaWRWa0Pp0ilj9l5fifZ2cis2Q07L2sVnAJqUFR7ZH4NxyGOA8IVZkjKgWNHyk2RUBQzklWGsSQRwjM0IQONHAVEumm+emadamVs+aHQhysrV39PpCiQMgk83RkgNZXL3lz8zxvEym+6KeVRrAjHi4f8mFkqtOY5WGMqCFYs0YCwoHpXC0+RQFjptCo6BGf5y6vQvWg4mm8va61mEUcZjuEE6uDAFbTgBtrQAQwP8Ayv8GY8GS/Gu/GxaC0ZxcwR/Cnj8wcat5Pb</latexit><latexit sha1_base64="6wvlfKDu7AzJSYugq+Uz5Y6/LXE=">AAAB+nicbZDLSsNAFIZP6q3WW6pLN8EiVJCSiGCXBTcuK9gLtKFMppN26GQSZiZqiHkUNy4UceuTuPNtnKZZaOuBYT7+/xzmzO9FjEpl299GaW19Y3OrvF3Z2d3bPzCrh10ZxgKTDg5ZKPoekoRRTjqKKkb6kSAo8BjpebPrud+7J0LSkN+pJCJugCac+hQjpaWRWa0Pp0ilj9l5fifZ2cis2Q07L2sVnAJqUFR7ZH4NxyGOA8IVZkjKgWNHyk2RUBQzklWGsSQRwjM0IQONHAVEumm+emadamVs+aHQhysrV39PpCiQMgk83RkgNZXL3lz8zxvEym+6KeVRrAjHi4f8mFkqtOY5WGMqCFYs0YCwoHpXC0+RQFjptCo6BGf5y6vQvWg4mm8va61mEUcZjuEE6uDAFbTgBtrQAQwP8Ayv8GY8GS/Gu/GxaC0ZxcwR/Cnj8wcat5Pb</latexit><latexit sha1_base64="6wvlfKDu7AzJSYugq+Uz5Y6/LXE=">AAAB+nicbZDLSsNAFIZP6q3WW6pLN8EiVJCSiGCXBTcuK9gLtKFMppN26GQSZiZqiHkUNy4UceuTuPNtnKZZaOuBYT7+/xzmzO9FjEpl299GaW19Y3OrvF3Z2d3bPzCrh10ZxgKTDg5ZKPoekoRRTjqKKkb6kSAo8BjpebPrud+7J0LSkN+pJCJugCac+hQjpaWRWa0Pp0ilj9l5fifZ2cis2Q07L2sVnAJqUFR7ZH4NxyGOA8IVZkjKgWNHyk2RUBQzklWGsSQRwjM0IQONHAVEumm+emadamVs+aHQhysrV39PpCiQMgk83RkgNZXL3lz8zxvEym+6KeVRrAjHi4f8mFkqtOY5WGMqCFYs0YCwoHpXC0+RQFjptCo6BGf5y6vQvWg4mm8va61mEUcZjuEE6uDAFbTgBtrQAQwP8Ayv8GY8GS/Gu/GxaC0ZxcwR/Cnj8wcat5Pb</latexit>x, ˆ y)
estimated
position Network
Positioning System control- aware
(x, y)
<latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit><latexit sha1_base64="0QnNOqvMKPolwaTslYJzb9/g0Vw=">AAAB7XicbZDLSgMxFIbP1Futt6pLN8EiVJAyI4LiquDGZQV7gXYomTTTxmaSIcmIw9B3cONCEbe+jzvfxrSdhbb+EPj4zznknD+IOdPGdb+dwsrq2vpGcbO0tb2zu1feP2hpmShCm0RyqToB1pQzQZuGGU47saI4CjhtB+Obab39SJVmUtybNKZ+hIeChYxgY61W9ekMpaf9csWtuTOhZfByqECuRr/81RtIkkRUGMKx1l3PjY2fYWUY4XRS6iWaxpiM8ZB2LQocUe1ns20n6MQ6AxRKZZ8waOb+nshwpHUaBbYzwmakF2tT879aNzHhlZ8xESeGCjL/KEw4MhJNT0cDpigxPLWAiWJ2V0RGWGFibEAlG4K3ePIytM5rnuW7i0r9Oo+jCEdwDFXw4BLqcAsNaAKBB3iGV3hzpPPivDsf89aCk88cwh85nz9FxY48</latexit>
u k
<latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit><latexit sha1_base64="l2HvXLMVcItJFeMjnu7V/BXptg8=">AAAB6nicbZBNS8NAEIYn9avWr6pHL4tF8FQSERRPBS8eK9oPaEPZbDft0s0m7E6EEvoTvHhQxKu/yJv/xm2ag7a+sPDwzgw78waJFAZd99spra1vbG6Vtys7u3v7B9XDo7aJU814i8Uy1t2AGi6F4i0UKHk30ZxGgeSdYHI7r3eeuDYiVo84Tbgf0ZESoWAUrfWQDiaDas2tu7nIKngF1KBQc1D96g9jlkZcIZPUmJ7nJuhnVKNgks8q/dTwhLIJHfGeRUUjbvwsX3VGzqwzJGGs7VNIcvf3REYjY6ZRYDsjimOzXJub/9V6KYbXfiZUkiJXbPFRmEqCMZnfTYZCc4ZyaoEyLeyuhI2ppgxtOhUbgrd88iq0L+qe5fvLWuOmiKMMJ3AK5+DBFTTgDprQAgYjeIZXeHOk8+K8Ox+L1pJTzBzDHzmfP1ygjc8=</latexit>