15

Internet congestion control

A linear multivariable control look

Abstract

The working mechanism of today’s Internet is a feedback system, which has the responsibilities of managing the allocation of bandwidth resources among competing traffic flows and controlling the congestion. Congestion control mechanisms in the Internet represent some of the largest deployed artificial feedback systems. The main aim of this chapter is to give an outline for the Internet congestion control from the perspective of a linear multivariable control system. We bring this subject into a control domain by looking at and those between the dynamics of individual flow rates and the dynamics of aggregate flow rates, the transferring relations between link price and flow aggregate price from a multivariable control point of views including the Smith-McMillan forms. Finally we look at the issue of feedback control design to relate the transport control protocol (TCP) source flow rate with the aggregate flow price which is in a proportional (P) controller structure. These analyses of the flow level then constitute a theoretical basis for TCP protocol design in the packet level.

Keywords

Internet; Congestion control; Flow dynamics; Primal-dual algorithm; Linear multivariable control system; Smith-McMillan form; Proportional (P) controller; Transmission control protocol; Active queue management; Feedback; ACK; Packet level; Flow level; Stability

Congestion control mechanisms in the Internet represent one of the largest deployed artificial feedback systems.

(from [42])

The working mechanism of today’s Internet is a feedback system, which has the responsibilities of managing the allocation of bandwidth resources among competing traffic flows and controlling the congestion. Being sharply different from the traditional telephony network, where resources are allocated by the network core using an admission policy, the Internet’s resources are allocated in a real-time manner, mainly by the end computer and communication systems themselves. The response is required to meet the desire to accommodate a diversity of demands, from “mice” being made of a few packets, to long “elephants” being greedy for whatever bandwidth is available, and to avoid a centralized allocation mechanism while performing all the manipulations in a distributed manner. The fact that end-systems must control their throughput with little information about the overall network facilitates the use of feedback; such mechanisms have been incorporated since the late 1980s [129] (the well-known Jacobson’s congestion avoidance algorithm) into the transport control protocol (TCP) layer of the Internet protocol (IP) stack. For a survey of these algorithms, see [42].

Congestion control and resource allocation mechanisms in today’s wireless and wire-lined networks, including the Internet, have already represented many challenges in design, as they continues to expand in size, diversity, reaching scope, integration, and convergence. Having a deep understanding of how their fundamental resource is controlled, and how the allocated resource is contributing to congestion control and service quality, becomes extremely important. Computer networks including the Internet are initially designed on a heuristic, intricate basis of many control mechanisms microscopically on the packet level, they are understood afterwards macroscopically in the flow level.

The notable approaches to address the congestion control and resource allocation issues from a macroscopic perspective are the primal algorithm, the dual algorithm, and the primal-dual algorithm. All these algorithms result from the network utility maximization model. The significance in these algorithms are in terms of the modeling of the congestion measuring and source actions, which is presented in the following:

 Links can feedback to data sources information on the congestion in the resources being used. It is assumed that each network link measures its congestion by a scalar variable (termed price) and that sources have information on the aggregate price of links in their path.

 After gaining congestion information, flows can take action by using their control mechanisms to react to the congestion along the path to adjust their sending rate.

These assumptions are implicitly presented in many variants of today’s TCP protocols. The price signal being used in these protocols can be, for example, loss probability and queueing delay. Also, it is the natural setting for exploring alternative protocols based on more explicit price signaling; for example, the random marking and random dropping actions of packet.

In the primal-dual congestion control algorithm, there are two key blocks: the source rates are adjusted to be adapted to aggregate prices in the TCP algorithm and the link prices are updated in terms of link utilization. Mathematically, we can model the TCP/AQM systems by the following general forms:

X.(t)=F(X(t),Q(t))×Q(t),

si1_e  (15.1)

P.(t)=G(P(t),Y(t))×Y(t).

si2_e  (15.2)

The first equation in the above is the mechanism of source rate vector X updating in terms of the aggregate price vector Q, while the second equation in the above is responsible for generating the link price vector P in terms of the aggregate flow rate Y. Note that F(X(t), Q(t)) and G(P(t), Y (t)) are matrix functions, which are involved into generating the source rate vector and the link price vector. Being deviated from the model presented by Low et al. [42] and Wang [130], herein we are considering a more general communication model, where there are possibly multicast communications.

A multicast (one-to-many or many-to-many distribution [131]) is group communication, where information is addressed to a group of destination computers simultaneously. Group communication has two forms: application layer multicast and network assisted multicast. The network assisted multicast makes it possible for the source to efficiently send to a specific group in a single transmission. Copies are automatically created in other network elements, such as routers, switches, and cellular network base stations, but only to network segments that currently contain members of the group. One typical example of multicast communications is the IP multicast. IP multicast is a technique for one-to-many communication over an IP infrastructure in a network. The destination nodes send join and leave messages, for example in the case of Internet television when the user changes from one TV channel to another. IP multicast scales to a larger receiver population by not requiring prior knowledge of the identity of number of receivers. Multicast uses network infrastructure efficiently by requiring that the source send a packet only once, even if it needs to be delivered to a large number of receivers. The nodes in the network take care of replicating the packet to reach multiple receivers only when it is necessary.

In the situation of multicast, there are interactions (coupled components) in the source rate vector X and in the link price vector P, as one source may issue more than one flow and the link may set more than one price value for a flow. In the usual model presented in, for example, [42, 130], an inherited assumption is that any source only issues one flow. This usual model does not consider the multicast flows and multiple pricing mechanism. Therefore in our model presented in Eqs. (15.1), (15.2) there may be interactions among the components of X and P. This is the reason why we have written the source rate updating and the link price updating mechanisms into the matrix equation forms rather than the individual and independent equations as in Eqs. (15.1), (15.2).

The complete system, which is coupled and interacted by Eqs. (15.1), (15.2), determines both the equilibrium and dynamic characteristics of the TCP/AQM network [130]. However, the equilibrium point is not necessarily unique and it will depend on the initial settings of the system. Therefore the dynamic characteristics of the network may have a diversity. This issue is, however, very complex and deserves further study.

The mechanism of the source rate updating and link price updating, the relation between the individual source rate and link aggregate rate, which is related to the routing matrix, and the relation between the individual link price and the aggregated flow price, which is also related to the routing matrix, are demonstrated in Fig. 15.1.

f15-01-9780081019467
Fig. 15.1 The mechanism of the source rate updating and link price updating in the Internet.

As a distributed algorithm [132] to allocate network resources among competing users, congestion control consists of two components: a source algorithm that dynamically adjusts the rate in response to the congestion in its path, and a link algorithm that implicitly or explicitly, updates a congestion measure and sends it back to the sources that use that link. In the current Internet, the source algorithm is carried out by TCP, and the link algorithm by active queue management (AQM) schemes. The TCP algorithms include TCP Reno [129], TCP Vegas [133, 134], High-speed TCP [135], Scalable-TCP [136], FAST TCP [137139], and Generalized FAST TCP [132, 140]; while the AQM algorithms include Drop-Tail [141], RED [142], BLUE [143], REM/PI [144], and AVQ [139, 145]. The working mechanism of the TCP algorithms and the AQM algorithms in the Internet are displayed in Fig. 15.2.

f15-02-9780081019467
Fig. 15.2 The interactions between the transport control protocol algorithms and the active queue management algorithms in the Internet.

Different protocols use different metrics to measure congestion. For example, TCP Reno [129] and its variants use loss probability as congestion measure, while TCP Vegas [133, 134], FAST TCP [137, 139], and the generalized Fast TCP [140] use queueing delay.

It is established in [146, 147] that, the overall operations of TCP congestion control algorithms work very similarly to a time-delayed closed-loop control system. The feedback control theory for time-delayed systems have been successfully used to enhance the performance of the TCP/RED system in a very logical manner in [146, 147]. Other developments on stability of TCP/AQM systems along the line of control theory can be found in [148153].

The main aim of this chapter is to give an outline of the Internet congestion control from the perspective of linear multivariable control system. We bring this subject into a control domain by looking at the transferring relations between the dynamics of individual flow rates and the dynamics of aggregate flow rates, the transferring relations between link price and flow aggregate price from a multivariable control point of views including the Smith-McMillan forms. Finally, we look at the issue of feedback control design to relate the TCP source flow rate with the aggregate flow price, which is in a proportional (P) controller structure. These analyses in the flow level then constitute a theoretical basis for TCP protocol design on the packet level.

15.1 The basic model of Internet congestion control

This section presents the basic model of Internet congestion control.

Consider a network that consists of a set L = {1, …, M} of unidirectional links of capacity cl, lL. The network is shared by a set I = {1, …, N} of sources. Let xi be the rate of flow i and let X(t) = {xi(t), iI} be the rate vector. Let R = (Rli, iI, lL) be the routing matrix, where Rli = 1 if flow i traverses link l, and 0 otherwise. By introducing the link rate vector Y (t) = {yl(t), lL}, the link price vector P(t) = {pl(t), lL}, and the source price vector Q(t) = {qi(t), iI}, we then have

Y(t)=RX(t),

si3_e  (15.3)

Q(t)=RTP(t).

si4_e  (15.4)

It is noted that the above two equations relate the individual source rate vector with the aggregate flow (at the links) rate vector and the individual link price vector with the source aggregate price vector.

At time t, we assume link l observes the aggregate source rate

yl(t)=i=1NRlixi(tτlif),

si5_e  (15.5)

and source i observes the aggregate price in its path

qi(t)=l=1MRlipl(tτlib),

si6_e  (15.6)

where τlifsi7_e is the forward feedback delay from source i to link l, and τlibsi8_e is the backward feedback delay from link l to source i. For simplicity, we assume that the feedback delays τlifsi7_e and τlibsi8_e are constants. Further, we consider propagation delay and neglect the queueing delay, thus treating round trip delay for any link l on the path of source i, i.e., τi=τlif+τlibsi11_e, as a constant.

15.2 Internet congestion control: A multivariable control look

In this section, by describing the congestion control network model as a time-delayed multivariable control system, we propose a method to analyze the transfer functions between the individual source rate and the link aggregate rate, between the link price and the source aggregate price. Based on this, we look at the issue of feedback control design to relate the TCP source flow rate with the aggregate flow price, which is in a proportional (P) controller structure. This can further be utilized to analyze the important properties, such as stability, of the network systems.

Stability of the algorithm in Internet congestion control is especially important when it is implemented within a network. For example, to have an efficient throughput, to bound the delay and to minimize packet loss, the rate of data flow through its links should tend toward an equilibrium value, rather than continually oscillating between having bandwidth spare and being completely overloaded. Given the fact that the control system structure of Eqs. (15.5), (15.6) like the Smith-McMillan form governs their system performance, e.g., the stability, let us take a closer look.

Taking the Laplace transform of Eqs. (15.5), (15.6), respectively, and writing the delay routing matrices in the frequency domain as

Rf(s)=(Rlif(s),iI,lL),

si12_e

where

Rlif(s)=eτlifs,if flowitraverses linkl,0,otherwise,

si13_e

and

Rb(s)=(Rlib(s),iI,lL),

si14_e

where

Rlib(s)=eτlibs,if flowitraverses linkl,0,otherwise,

si15_e

we then have

Y(s)=Rf(s)X(s),

si16_e  (15.7)

Q(s)=(Rb(s))TP(s),

si17_e  (15.8)

where X(s), Y (s), P(s), and Q(s) denote the Laplace transform of the vectors X(t), Y (t), P(t), and Q(t), respectively, and T denotes the transport of the matrix.

15.3 Padé approximations to the system (15.7) and (15.8)

Polynomials are not such a good class of functions if one wants to approximate functions with singularities because polynomials are entire functions without singularities. They are only useful up to the first singularity. Rational functions are the simplest ones with singularities. The idea is that the poles of the rational functions will move to the singularities of the function and hence the domain of convergence can be enlarged, and singularities of it may be discovered using the poles of the rational approximations.

The [m, n] Padé approximation of a function f in a point a is the rational function QmPn,si18_e with Qm a polynomial of degreem and Pn a polynomial of degreen, for which we have the following interpolation condition at a

f(z)Qm(z)Pn(z)=O((za)m+n+1),za.

si19_e  (15.9)

The computation of the polynomials Pn and Qm is not so straightforward in the above condition since one first has to compute the Taylor expansion of QmPnsi20_e and then equate the first m + n + 1 Taylor coefficients to the first m + n + 1 Taylor coefficients of f. Usually the Padé approximation is defined by linearizing the interpolation condition as

Pn(z)f(z)Qm(z)=O((za)m+n+1),za.

si21_e  (15.10)

For Padé approximation near infinity to a function of the form

f(z)=k=0ckzk+1,

si22_e

we let m = n − 1 and the interpolation condition is

Pnf(z)Qn1(z)=O(zn1),z.

si23_e

There is a degree of freedom since we can multiply both sides of Eq. (15.10) by a constant. Usually we normalize this by taking Pn monic, that is it is in the form xn + ⋯, when this is possible. This can only be done if Pn is of the exact degree n. If we take Pn monic, then we can determine the n unknown coefficients ak (k = 1, …, n) in

Pn=:k=0nak(za)nk,a0=1,

si24_e  (15.11)

by putting the coefficients of (za)k for k = m + 1, m + 2, …, m + n in the Taylor expansion of Pnf equal to zero. The polynomial Qm then corresponds to the Taylor polynomial of degree m of Pnf.

Hereafter we present another approach. Suppose f is analytic in a domain Ω that contains a. Again we take a contour Γ inside Ω encircling a once in the positive direction. Divide both sides of Eq. (15.10) by (za)m+k+2 and integrate, to find

12πiΓPn(z)f(z)(za)m+k+2dz12πiΓQm(z)(za)m+k+2dz=j=m+n+1bn,j12πiΓ(za)jmk2dz,

si25_e

where the bn, js are the coefficients in the expansion of PnfQm around a. The integral involving Qm is zero for k ≥ 0 since it is proportional to the (m + k + 1)th derivative of Qm, which is zero for k ≥ 0. The summation on the right-hand side has a contribution only when j = m + k + 1, but when 0 ≤ kn − 1 then jm + n, and such indices do not appear in the summation. Hence the right hand side also vanishes for kn − 1. Therefore Eq. (15.10) tells us that

12πiΓPn(z)(za)m+k+2f(z)dz=0,k=0,1,,n1.

si26_e

If we use the expansion (15.11) then this gives

j=0naj12πiΓ(za)njmk2f(z)dz=0,k=0,1,2,,n1

si27_e

and then

12πiΓ(za)njmk2f(z)dz=cmn+k+j+1.

si28_e

Therefore we obtain the following system of equations

cmn+1cmn+2cm+1cmn+2cmn+3cm+2cmcm+1cm+na0a1an=000.

si29_e

There is one degree of freedom here since we have n + 1 unknowns and n (homogeneous) equations. The choice a0 = 1 (if possible) gives the monic polynomial Pn, but sometimes other normalization will be used.

15.3.1 Padé approximation to the transfer functions of the time-delay system (15.7) and (15.8)

For the transfer function of a time-delay system

H(S)=eτs,

si30_e  (15.12)

which is irrational (it has no s-polynomial in the numerator and in the denominator), in some situations as in analyzing the frequency response of this sort of control system containing a time-delay, it is necessary to substitute eτs with the following Padé approximation

eτs1k1s+k2s2+±knsn1+k1s+k2s2++knsn,

si31_e  (15.13)

where n is the order of the approximation.

In particular, to find a second order Padé approximation (n = 2) for the time-delay transfer function H(s), we have

k1=τ2,k2=τ212.

si32_e  (15.14)

Subsequently, the second order Padé approximation to the transfer function H(s), denoted by HP(s), comes out to be

HP(s)=1k1s+k2s21+k1s+k2s2=1τ2s+τ212s21+τ2s+τ212s2.

si33_e  (15.15)

With regard to the Padé approximation to the time-delay system (15.7) and (15.8), so far we are able to establish the following result.

Theorem 15.3.1

The Padé approximations to the time-delay system (15.7) and (15.8) are given by

Y(s)=RfP(s)X(s),

si34_e  (15.16)

Q(s)=(RbP(s))TP(s),

si35_e  (15.17)

where RfP(s)si36_e and (RbP(s))Tsi37_e are the respectively Padé approximations to the transfer function matrices (with delays) Rf(s) and (Rb(s))T. They are given by

RfP(s)=((Rlif(s))P,iI,lL),

si38_e

where

(Rlif(s))P=1k1s+k2s2+±knsn1+k1s+k2s2++knsn,if flowitraverses linkl,0,otherwise,

si39_e

and

RbP(s)=((Rlib(s))P,iI,lL),

si40_e

where

(Rlib(s))P=1k1s+k2s2+±knsn1+k1s+k2s2++knsn,if flowitraverses linkl,0,otherwise.

si41_e

In the above, all the parameters ki (i = 1, 2, …, n) and ki′ (i = 1, 2, …, n) can be determined with relations to the order of the approximation and the delays.

It should be noted that the above theorem is very important for us to explore the system structure of Internet congestion control, in that it has actually reduced the original transfer functions from irrational to rational. This enables us to work on the rational function matrices given in Eqs. (15.16), (15.17) by using the generalized linear multivariable control approaches.

15.3.2 A proportional controller

Now we design the following proportional control to relate the source rate with the experienced aggregate price of that source

xi(t)=ψiqi(t),iI,

si42_e  (15.18)

where 0 ≤ ψi ≤ 1 is the control gain.

We have the following formulations to calculate the congestion price. For a given flow that traverses a set of link Li, if all the packet loss probabilities pl(t) at all links are small enough, the end-to-end packet loss probabilities qi(t) satisfy

qi(t)=1ΠlLi(1pl(t))ΣlLipl(t).

si43_e

The aggregate queuing delay for that flow is given by

qi(t)=ΣlLiRliblcl,

si44_e

where bl is the backlog at link l and cl is the leaking capacity of the link.

From a TCP protocol point of view, the controller (15.18) suggests that if qi represents congestion price (either queuing delay or packet loss probability) in the sources path, the source rate should be a monotonically decreasing function of it. Specifically, as a larger queuing delay or packet loss probability suggests a higher degree of congestion, the source rate should be decreased proportionally to the congestion degree parameter (the aggregate queuing delay or the aggregate packet loss probability). Alternatively, if a source is likely to experience slight congestion along its path, i.e., the aggregate queuing delay or the aggregate packet loss probability is smaller, one should increase the sending rate for this source.

Combining all the above N equations (15.18) together, we have the following matrix equation

X(t)=ΨQ(t),

si45_e  (15.19)

where Ψ = diag{ψ1, ψ2, …, ψN}. By taking the Laplace transform of the above equation and then substituting this Laplace transformed form into Eq. (15.16), with Eq. (15.17) being considered, we arrive at the following relation between Y (s) and P(s)

Y(s)=RfP(s)Ψ(RbP(s))TP(s).

si46_e  (15.20)

The above equation is the Padé approximation to the transfer function from the link price vector to the link aggregate rate vector. We will work on it to gain insights into its frequency structure later on by using a simple network example.

15.4 Analyses into system structure of congestion control of a simple network in frequency domain

Let us consider a simple network with three links and four flows as shown in Fig. 15.3. In this network, there are four flows: f1 traverses link L1, f2 traverses link L2, f3 traverses link L3, and f4 traverses link L1, link L2, and link L3. Flows f1, f2, and f3 represent one-hop short flow, which is dominant in the Internet: most peer-to-peer applications involve one-link flows between a data source and a receiver (downloader); while flow f4 represents long flows which traverse more than one hop. The routing structure of this network is described by the following routing matrix

f15-03-9780081019467
Fig. 15.3 A simple but representative network: three links and four flows.

R=100101010011.

si47_e

Letting xi denote the source sending rate of flow fi, (i = 1, 2, 3, 4). The individual flow rate vector is then

X(t)=x1(t)x2(t)x3(t)x4(t).

si48_e

Letting yl (l = 1, 2, 3) denote the aggregate flow rate at link l, the aggregate flow rate vector is then denoted by

Y(t)=y1(t)y2(t)y3(t).

si49_e

Each link is suggesting a price (either delay or packet loss ratio), one has the link price vector

P(t)=p1(t)p2(t)p3(t).

si50_e

The total price for flow fi is the sum of all the prices for all links it traverses and is denoted by qi. We then denote the aggregate price vector as

Q(t)=q1(t)q2(t)q3(t)q4(t).

si51_e

The aggregate flow rate vector and the individual rate vector is associated by the routing matrix, and the aggregate price vector and the individual price vector are also associated by the transpose of the routing matrix. They are mathematically described by

Y(t)=RX(t),

si3_e  (15.21)

Q(t)=RTP(t).

si4_e  (15.22)

In particular, at time t, the links observe the following corresponding aggregate source rate

y1(t)=x1(tτ11f)+x4(tτ14f),

si54_e  (15.23)

y2(t)=x2(tτ22f)+x4(tτ24f),

si55_e  (15.24)

y3(t)=x3(tτ33f)+x4(tτ34f),

si56_e  (15.25)

where τlifsi7_e (l = 1, 2, 3;i = 1, 2, 3, 4) denotes the feed-forward delay of the data flow fi by the traveling link l. This delay is determined by the propagation delay and the forward queuing delay at the link. The propagation delay is determined by the distance between the source and the destination while the forward queuing delay is determined by the queue length and the leaking capacity at the link.

Similarly, the sources observe the following corresponding aggregate price along their path

q1(t)=p1(tτ11b),

si58_e  (15.26)

q2(t)=p2(tτ22b),

si59_e  (15.27)

q3(t)=p3(tτ33b),

si60_e  (15.28)

q4(t)=p1(tτ14b)+p2(tτ24b)+p3(tτ34b),

si61_e  (15.29)

where τlibsi8_e (l = 1, 2, 3;i = 1, 2, 3, 4) denotes the feed-backward delay of flow fi. These backward delays are actually experienced by the acknowledgment (ack) packets for their corresponding data flows. They are all related to the distance between the destination and the source and the capacity (in the opposite direction) correspondingly.

By taking the Laplace transform of Eqs. (15.23), (15.24), (15.25), and denoting the Laplace transformation of X(t) and Y (t) as X(s) and Y (s), respectively, one has

Y(s)=RfP(s)X(s),

si63_e

where the transfer function RfP(s)si36_e is given by

RfP(s)=eτ11fs00eτ14fs0eτ22fs0eτ24fs00eτ33fseτ34fs.

si65_e

The second order Padé approximation to the above transfer function is

RfP(s)=126τ11fs+(τ11f)2s212+6τ11fs+(τ11f)2s200126τ14fs+(τ14f)2s212+6τ14fs+(τ14f)2s20126τ22fs+(τ22f)2s212+6τ22fs+(τ22f)2s20126τ24fs+(τ24f)2s212+6τ24fs+(τ24f)2s200126τ33fs+(τ33f)2s212+6τ33fs+(τ33f)2s2126τ34fs+(τ34f)2s212+6τ34fs+(τ34f)2s2.

si66_e

If we set all the forward delays as τ11f=1,τ22f=2,τ33f=6,τ14f=3,τ24f=4,τ34f=9,si67_e by denoting

a1f=126τ11fs+(τ11f)2s2=126s+s2a2f=126τ22fs+(τ22f)2s2=1212s+4s2a3f=126τ33fs+(τ33f)2s2=1236s+36s2a4f=126τ14fs+(τ14f)2s2=1218s+9s2a5f=126τ24fs+(τ24f)2s2=1224s+16s2a6f=126τ34fs+(τ34f)2s2=1254s+81s2b1f=12+6τ11fs+(τ11f)2s2=12+6s+s2b2f=12+6τ22fs+(τ22f)2s2=12+12s+4s2b3f=12+6τ33fs+(τ33f)2s2=12+36s+36s2b4f=12+6τ14fs+(τ14f)2s2=12+18s+9s2b5f=12+6τ24fs+(τ24f)2s2=12+24s+16s2b6f=12+6τ34fs+(τ34f)2s2=12+54s+81s2

si68_e

then we have the following approximated transfer function

RfP(s)=a1fb1f00a4fb4f0a2fb2f0a5fb5f00a3fb3fa6fb6f.

si69_e

Using df(s) to denote the least common multiple (lcm) of the denominators of all the elements of RfP(s)si36_e, one has

df(s)=b1f×b2f×b3f×b4f×b5f×b6f.

si71_e

Subsequently the Smith form of RfP(s)si36_e is Sf(s), which is given by

Sf(s)=10000b1f×b2f×b3f×b4f×b5f×b6f0000b1f×b2f×b3f×b4f×b5f×b6f0.

si73_e

Accordingly the Smith-McMillan form of RfP(s)si36_e is Mf(s)

Mf(s)=1b1f×b2f×b3f×b4f×b5f×b6f00001000010=1(s+3+3i)×(s+33i)×1s+3+3i2×s+33i2×1s+3+3i6×s+33i6×1s+3+3i3×s+33i3×1s+3+3i4×s+33i4×1s+3+3i9×s+33i900001000010.

si75_e

Similarly, by taking the Laplace transform of Eqs. (15.26), (15.27), (15.28), (15.29), and denoting the Laplace transformation of P(t) and Q(t) as P(s) and Q(s), respectively, one has

Q(s)=(RfP(s))TX(s),

si76_e

where the transfer function (RfP(s))Tsi77_e is given by

(RbP(s))T=126τ11bs+(τ11b)2s212+6τ11bs+(τ11b)2s2000126τ22bs+(τ22b)2s212+6τ22bs+(τ22b)2s200012+6τ33bs+(τ33b)2s212+6τ33bs+(τ33b)2s2126τ14bs+(τ14b)2s212+6τ14bs+(τ14b)2s2126τ24bs+(τ24b)2s212+6τ24bs+(τ24b)2s2126τ34bs+(τ34b)2s212+6τ34bs+(τ34b)2s2.

si78_e

If the backward delays are set as τ11b=11,τ22b=5,τ33b=7,τ14b=14,τ24b=8,τ34b=12,si79_e by denoting

a1b=126τ11bs+(τ11b)2s2=12+66s+121s2a2b=126τ22bs+(τ22b)2s2=12+30s+25s2a3b=126τ33bs+(τ33b)2s2=12+42s+49s2a4b=126τ14bs+(τ14b)2s2=12+84s+196s2a5b=126τ24bs+(τ24b)2s2=12+48s+64s2a6b=126τ34bs+(τ34b)2s2=12+72s+144s2b1b=12+6τ11bs+(τ11b)2s2=12+66s+121s2b2b=12+6τ22bs+(τ22b)2s2=12+30s+25s2b3b=12+6τ33bs+(τ33b)2s2=12+42s+49s2b4b=12+6τ14bs+(τ14b)2s2=12+84s+196s2b5b=12+6τ24bs+(τ24b)2s2=12+48s+64s2b6b=12+6τ34bs+(τ34b)2s2=12+72s+144s2,

si80_e

we then have

(RbP(s))T=a1bb1b000a2bb2b000a3bb3ba4bb4ba5bb5ba6bb6b.

si81_e

Further, if db(s) is the least common multiple (lcm) of the denominators of all the elements in (RbP(s))Tsi37_e, that is

db(s)=b1b×b2b×b3b×b4b×b5b×b6b,

si83_e

then the Smith form of (RbP(s))Tsi37_e (denoted by Sb(s)) is given by

Sb(s)=1000b1b×b2b×b3b×b4b×b5b×b6b000b1b×b2b×b3b×b4b×b5b×b6b000.

si85_e

Therefore the Smith-McMillan form of (RbP(s))Tsi37_e (denoted by Mb(s)) is given by

Mb(s)=1b1b×b2b×b3b×b4b×b5b×b6b00010001000=1s+3+3i11×s+33i11×1s+3+3i5×s+33i5×1s+3+3i7×s+33i7×1s+3+3i14×s+33i14×1s+3+3i8×s+33i8×1s+3+3i12×s+33i1200010001000.

si87_e

Now we design the following proportional control to relate the source rate with the experienced aggregate price of that source

xi(t)=ψiqi(t),i=1,2,3,4,

si88_e

where 0 ≤ ψi ≤ 1 is the control gain. The transfer function from P(s) to Y (s) is then given by

RfP(s)Ψ((RfP(s))T)=a1fb1f00a4fb4f0a2fb2f0a5fb5f00a3fb3fa6fb6fψ10000ψ20000ψ30000ψ4a1bb1b000a2bb2b000a3bb3ba4bb4ba5bb5ba6bb6b=ψ1a1fb1fa1bb1b+ψ4a4fb4fa4bb4bψ4a4fb4fa5bb5bψ4a4fb4fa6bb6bψ5a4fb4fa4bb4bψ2a2fb2fa2bb2b+ψ4a5fb5fa5bb5bψ4a5fb5fa6bb6bψ4a6fb6fa4bb4bψ4a6fb6fa5bb5bψ3a3fb3fa3bb3b+ψ4a6fb6fa6bb6b=ψ1a1fa1bb4fb4b+ψ4a4fa4bb1fb1bb1fb1bb4fb4bψ4a4fa5bb4fb5bψ4a4fa6bb4fb6bψ5a4fa5bb4fb5bψ2a2fa2bb5fb5b+ψ4a5fa5bb2fb2bb2fb2bb5fb5bψ4a5fa6bb5fb6bψ4a6fa4bb6fb4bψ4a6fa5bb6fb5bψ3a3fa3bb6fb6b+ψ4a6fa6bb3fb3bb3fb3bb6fb6b

si89_e

In the above all the elements are given by

b1fb1bb4fb4b=s+3+3iτ11f×s+33iτ11f×s+3+3iτ11b×s+33iτ11b×s+3+3iτ14f×s+33iτ14f×s+3+3iτ14b×s+33iτ14b=(s+3+3i)×(s+33i)×s+3+3i11×s+33i11×s+3+3i3×s+33i3×s+3+3i14×s+33i14b4fb5b=s+3+3iτ14f×s+33iτ14f×s+3+3iτ24b×s+33iτ24b=s+3+3i3×s+33i3×s+3+3i8×s+33i8b4fb6b=s+3+3iτ14f×s+33iτ14f×s+3+3iτ34b×s+33iτ34b=s+3+3i3×s+33i3×s+3+3i12×s+33i12b4fb5b=s+3+3iτ14f×s+33iτ14f×s+3+3iτ24b×s+33iτ24b=s+3+3i3×s+33i3×s+3+3i8×s+33i8b2fb2bb5fb5b=s+3+3iτ22f×s+33iτ22f×s+3+3iτ22b×s+33iτ22b×s+3+3iτ24f×s+33iτ24f×s+3+3iτ24b×s+33iτ24b=s+3+3i2×s+33i2×s+3+3i5×s+33i5×s+3+3i4×s+33i4×s+3+3i8×s+33i8b5fb6b=s+3+3iτ24f×s+33iτ24f×s+3+3iτ34b×s+33iτ34b=s+3+3i4×s+33i4×s+3+3i12×s+33i12b6fb4b=s+3+3iτ34f×s+33iτ34f×s+3+3iτ14b×s+33iτ14b=s+3+3i9×s+33i9×s+3+3i14×s+33i14

si90_e

b6fb5b=s+3+3iτ34f×s+33iτ34f×s+3+3iτ24b×s+33iτ24b=s+3+3i9×s+33i9×s+3+3i8×s+33i8b3fb3bb6fb6b=s+3+3iτ33f×s+33iτ33f×s+3+3iτ11b×s+33iτ11b×s+3+3iτ34f×s+33iτ34f×s+3+3iτ34b×s+33iτ34b=s+3+3i6×s+33i6×s+3+3i7×s+33i7×s+3+3i9×s+33i9×s+3+3i12×s+33i12

si91_e

Therefore one finds that all the poles of the matrix RfP(s)Ψ((RfP(s))T)si92_e are

3+3i,33i3+3i11,33i11,3+3i2,33i2,3+3i5,33i5,3+3i6,33i6,3+3i7,33i7,3+3i3,3+3i3,33i14,3+3i14,3+3i4,3+3i4,33i8,3+3i8,3+3i9,3+3i9,33i12,3+3i12.

si93_e

Observing from the above analyses, one finds that all the poles of the open-loop transfer functions from X(s) to Y (s) and from P(s) to Q(s), and the closed-loop transfer function from P(s) to Y (s) are lying in the left half complex plane. This suggests that all the three considered systems are bounded-input bounded-output (BIBO) stable. However, note that we have taken the second-order Padé approximation. The stability of the systems may be specific to the particular Padé approximations.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.86.134