• No results found

Monitoring and fault detection in networked control systems

N/A
N/A
Protected

Academic year: 2022

Share "Monitoring and fault detection in networked control systems"

Copied!
30
0
0

Loading.... (view fulltext now)

Full text

(1)

Monitoring and Fault Detection in Networked Control Systems

Thomas Gustafsson

Lule ˚a University of Technology

Department of Computer Science and Electrical Engineering Systems and Interaction

SE-971 87 Lule ˚a SWEDEN tgu@ltu.se

(2)

Overview

• FDI - Fault detection and isolation

• NCS - Networked Control Systems

• FDI and NDC

• Some suggestions and current research

• Open problems

(3)

Model based Fault detection

Process

Estimator Detection

algorithm

Input Output

Residual Alarm

Residual generation Residual evaluation

The residual generator is usually model-based as the estimator includes a model of the process.

(4)

Fault detection

One of the aims for fault detection and isolation is to provide the informa- tion needed for predictive maintenance or condition maintenance.

Fault detection could also be part of a Fault tolerant control system

Process

Estimator Detection

algorithm

Input Output

Residual Alarm

Residual generation Residual evaluation

Predictive Maintanace

(5)

Fault isolation in induction machines

(6)

Fault isolation in induction machines

Process

Detector

Alarm?

Short circuit Estimator

Input Output

R1

Increased Resistance

Estimator

Rn

(7)

Residual evaluator

(8)

Networked Control System

• Feedback control system

• Closed via a serial communication channel (Network)

• Network possibly shared with other nodes outside the control system

Continuous- time process

Controller A/D

D/A

FDI

Computer Fault

detection

Controller and FDI

ActuatorActuatorActuatorActuatorActuator

Sensor Sensor Sensor Sensor Sensor

Process plant Network

(9)

Why use a NCS?

• Sensors and controllers are distributed.

• Pervasive mixed data flow.

– Time-critical data, including

∗ periodic variables, e.g. sample data used for updating controller output.

∗ aperiodic(event) variables, e.g. alarm and device status signal.

– Non-critical data (message)

∗ include system or nodes initialization and installation information.

∗ network supervision and diagnosis.

∗ interaction with high level systems.

(10)

Example: Flexible Manufacturing

!"#$%&'#()#(*#(+,-,./,($(01#23#32245()6789&5(:9".6&;

00

<",=,>6-(?,"(6&(%<

@A$B<CDEF<$0>G(76--(3224

!"#$%&'()*+*,

F6&6'9.9&G(H(I,'J>GJ7 ,?(G89(I,76-(<",KL7GJ,&(MJG9

N96-$OJ.9(+,&G",-F@M

F,&JG,"J&' H(!J6'&,>J>

+,&G",-(H F6&6'9.9&G

+,&G",-(I,'J7(H F678J&9$&96"(ML=9"PJ>J,&

-%./%0*0$

)*+*, -*,,()*+*,

+,$,"KJ&6GJ,&(+,&G",-(I,'J7(H ML=9"PJ>J,&(,?(+9--$Q986PJ,"

!"#$

%&'()"!"*()

-%,,"1%&"$2+*(3&%45#$2%0(65$%."$2%0

!""#"$%&'(#$)*&+,$-.$/*#$)-''&0-1&/+2#$31-"(4/+-,$!(/-5&/+-,$!661-&4*

(11)

Example: ICT challenged rural/remote areas

Harsh and challenging network environments have special communication needs

! Disruption of links and network partitioning is the rule rather than the exception

! Continuous, synchronous communication is not feasible

! Contemporaneous end-to-end path between source and destination may never exist

ICT-challenged

rural/remote areas

Interplanetary networks

Military/emergency rescue operations Wireless sensor

networks

(12)

Why use a NCS?

Attractive features of serial communication networks

• High transmission speed and quick, efficient bus arbitration (due to transfer of real-time data).

• Capable of transferring time-critical data as well as non-critical mes- sage.

• High transmission reliability

• Operability in harsh environment

• Simple installation and maintenance

• Good diagnostic capability

• Inexpensive

(13)

The Pros and Cons of the NCS

Advantage of NCS vs. Traditional Point-to-point Interconnected Control System

+ Increase system reliability and testability.

+ Enhance resource utilization.

+ Reduce weight, space, power and wiring requirements.

- Signal delay and distortion due to limited network resource (or finite bandwidth constraint, i.e. at one time only one node can access the network.

(14)

Performance in Networked Control Systems

Unstable

Acceptable Performance

Networked Control

Digital Control

Continuous control

Performance

Sampling Frequency

WorseBetter

(15)

Fault detection in Networked Control System

Continuous process

A/D

A/D A/D D/A

D/A D/A

Residual generator

and evaluation

(16)

Fault detection in NCS

Process

Estimator Detection

algorithm

Input Output

Residual Alarm

Residual generation Residual evaluation

Signals randomly delayed or

missing

(17)

Fault detection in NCS

Y1

Y2

Y3

Y4

Residual evaluation

Signals

Time

(18)

FD with randomly delayed signals

To not loose detectability we must have knowledge of

• Inter-sample behavior of the process

– Requires enhanced model of the process

• Time delay of signals

– Requires time-stamped measurements (increases traffic) – Requires synchronization of time over a network (difficult)

• How to deal with missing data

Necessary to find other methods to avoid loss of detectability of faults.

(19)

Distributed Fault Detection

Controller and FDI

ActuatorActuatorActuatorActuator Actuator

Sensor Sensor Sensor Sensor Sensor

Process plant Network

(20)

Distributed Control and Fault Detection

Continuous process

A/D and residual generator

A/D and residual generator

A/D and residual generator

D/A

D/A

D/A Residual

evaluation

(21)

Current Research Projects

FP6 IP SOCRADES (ABB, LTU, KTH, Schneider, ... ) C4-DTN (CDT1, ProcessIT Innovations2)

Modeling of complex dynamic systems (HLRC3, ProcessIT Innovations)

• Ad-hoc network in harsh environments.

• Reactive architecture supported by TIMBER

• Model-based sensors and actuators

• Residual generation in sensor and evaluation on aggregated level. Less sensitive to time-delays

• Control under communication constraints

1

(22)

Traditional (Internet-like) networking

• Infrastructure based and TCP/IP based

– Mostly fixed (extended to end-host mobility, e.g., cellular networks) – Reliable and predictable

• Contemporaneous end-to-end path between source and destination – Disruption of links and network partitioning is an exception

– Low, bounded end-to-end delay

– Routing is end-to-end, i.e., communication fails in the absence of an exsisting path to the destination

(23)

Hash and challenging network environments

Have special communication needs

• Disruption of links and network partitioning is the rule rather than the exception

• Continuous, synchronous communication is not feasible

• Contemporaneous end-to-end path between source and destination may never exist

(24)

Hash and challenging network environments

Harsh and challenging network environments have special communication needs

! Disruption of links and network partitioning is the rule rather than the exception

! Continuous, synchronous communication is not feasible

! Contemporaneous end-to-end path between source and destination may never exist

ICT-challenged rural/remote areas

Interplanetary networks

Military/emergency rescue operations Wireless sensor

networks

(25)

Reactive Software Design

Traditional languages for RTOS based design

• lack the notion of time

• lack the notion of parallelism and blocking

• lack automatic memory management

Consequences; a time consuming error prone design methodology

• time has to be encoded by ”artificia” process priorities

• parallelism and blocking has to be manually encoded by concepts of threads, semaphores, monitors etc.

(26)

Timber

Timber4; a language based on reactive objects is being developed, that

• captures timely behavior of parallel systems intuitively by reactive ob- jects

• solves memory (state) integrity and dead/live locks

• supports dynamic (heap based) memory and garbage collection Offers a time efficient and robust design methodology through

• modern language design; advanced type checking, object orientation etc.

• system analysis by formal methods; Timber is an executable model

4http://www.csee.ltu.se/index.php?subject=timber

(27)

• fully self contained; does not rely on RTOS or other external compo- nents

(28)

Control under communication constraints

Emerging Areas Project, Rotterdam 2003

Problem: Control a distributed system consisting of a large number com- ponents of very different nature – such as analog devices, sensors, com- puters, decision logics – which exchange information through (wireless) networks.

Little effort has been put so far in understanding how communication con- straints affect the performance of a distributed control system.

Communication constraints may induce a change in control design princi- ples.

Rigorous analysis of robustness, and guaranteed robustness margins, are sought.

(29)

Control under communication constraints

Emerging Areas Project, Rotterdam 2003

The goal is to design sensors, encoders, communication channels and controllers (or estimators) so as to achieve prescribed performances de- spite of all the constraints and obstacles imposed by the communication channels and in the presence of possible uncertainties and disturbances.

Constraints imposed by the communication channels include:

• bandwidth

• delays (of variable amount)

• quantization errors

• transmission noise

(30)

Questions

References

Related documents

Due to the diversity of studied lifecycle stages (from Product Development to Aftermarket), departments (Hydraulics, software, product maintenance, validation and

Second, we evaluate different secure messaging protocols and we consider the scientific work and relevant activities addressing transparency from the edge devices to the

In that case the IMS based call session control functions hosted by the core network provider request resources from the core Bandwidth Manager, and through inter-RAC

Introducing the site concept in the Hive system enables each client to favour a subset n ⊂ N of all the clients in the network which are likely to perform well and be close in

At the receiving end, TCP uses a receive window (TCP RWND) to inform the transmitting end on how many Bytes it is capable of accepting at a given time derived from Round-Trip

Analysis of Massive MIMO Base Station Transceivers Christopher Mollén. Linköping Studies in Science and Technology,

Figure A.21: Confidences on Smaller Multi-stream Network: predictions for rain, straight road and lane change.. Figure A.22: Confidences on Smaller Multi-stream Network: predictions

The data used in task 6 is an adapta- tion of the restaurant reservation dataset from the second dialog state tracking challenge (DSTC2) [8].. The dataset was originally designed