Game Theoretic Feedback Control for Reliability Enhancement of EtherCAT-Based Networked Systems

Liying Li, Peijin Cong, Kun Cao, Junlong Zhou, Tongquan Wei, Mingsong Chen, Shiyan Hu, Xiaobo Sharon Hu

Research output: Contribution to journalArticlepeer-review

14 Scopus citations

Abstract

EtherCAT has become one of the leading real-time Ethernet solutions for networked industrial systems, where a reliable communication infrastructure is needed due to highly error-prone environments. However, existing work on EtherCAT mainly focuses on clock synchronization and timeliness improvement. The reliability of EtherCAT-based networked systems has largely been ignored. In this paper, we present a proportional integral derivative (PID)-based feedback control scheme that aims at enhancing reliability of networked systems under timing and system resource constraints. Instead of retransmitting data upon error detection, we use forward error control technique based on inequality of arithmetic and geometric means to achieve the required system reliability at a low deadline miss rate of messages. We further optimize the forward error control technique and design a fast and fair error resilient mechanism by using a cooperative game. In addition to reliability enhancement, our PID-based error control scheme can also improve the stability of a system in terms of deadline miss rate in the presence of burst errors. Simulation results show that the proposed scheme can achieve reliability enhancement of up to 91% compared to benchmarking methods.

Original languageEnglish
Article number8418836
Pages (from-to)1599-1610
Number of pages12
JournalIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Volume38
Issue number9
DOIs
StatePublished - Sep 2019
Externally publishedYes

Keywords

  • Embedded systems
  • EtherCAT
  • feedback control scheme
  • game theory
  • real-time
  • reliability

Fingerprint

Dive into the research topics of 'Game Theoretic Feedback Control for Reliability Enhancement of EtherCAT-Based Networked Systems'. Together they form a unique fingerprint.

Cite this