Control Loop Challenges of Wireless Systems


Automation is defined as using various control systems to operate equipment such that there is minimal human intervention. Closed control loops (feedback systems) regulate how other systems or devices behave by taking into consideration their output and making corrections based on feedback. An example of this feedback system is Progressive Automation Linear Actuators. In this article challenges of control loops in wireless systems are discussed.

Though embedded modules can be used be used with Wi-Fi, the aim of recent protocols is providing wireless networks with more focused support for control loops. For tight control loops, devices supporting the IEEE802.15.4 ZigBee standard can be used in supporting the recent protocols. Below is a Microchip’s MRF24WB Wi-Fi module.

For sharing a common medium of communication, sensors and controllers are required by a control system that is adopting wireless communication. The network’s quality is a trivial part of the functioning of the overall system when implementing a closed-loop control system using a common communication system.
Earlier short range wireless networks pose a problem since delay deadlines are not used in packet consideration and regardless of these requirements, the packets are treated the same. For a closed loop control system, this presents a major challenge since actuators influencing the system are controlled by the sensor’s data. Data delays lead to negative reinforcement, hence instead of a process being kept within close limits, it runs away.An open loop system, on the other hand, returns analyzed data with changes to a central controller, ordered in minutes or even seconds. In situations or processes that change slowly, the above is used where the process can be brought back easily, is not within its limit or terminated.

The above can be by-passed by having an application use the wireless medium associating every packet with a delay requirement. In a system where a high number of users exist, Wireless Sensor Network simulations done using the IEEE 802.15.4 standard showed a considerable outperformance of the original standards by these mechanisms.
Researchers are looking into using IP technology to be used in wireless networks to provide deterministic control loops. The use of machine-to-machine applications (M2M) has been increasing. In a typical M2M scenario, an anomaly is detected by the sensor then sends to a monitoring middleware an alert that gives information to a business operation software, produces a command for an actuator, and to an operator off the loop, it sends an alarm.

M2M applications need to scalable. This is being made possible by IPV6 that has an address range of 128 bits. It also has neighbor discovery and has improved mechanisms for address allocation and peering. New introductions include unique local Addresses and a provision of a more deterministic environment for supporting control loops.

For More Details : Control Loop Challenges of Wireless Systems

About The Author

Ibrar Ayyub

I am an experienced technical writer holding a Master's degree in computer science from BZU Multan, Pakistan University. With a background spanning various industries, particularly in home automation and engineering, I have honed my skills in crafting clear and concise content. Proficient in leveraging infographics and diagrams, I strive to simplify complex concepts for readers. My strength lies in thorough research and presenting information in a structured and logical format.

Follow Us:

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top