• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fundamental Issues in Networked Control Systems

    2018-09-28 10:58:00MagdiMahmoudandMutazHamdan
    IEEE/CAA Journal of Automatica Sinica 2018年5期

    Magdi S.Mahmoud and Mutaz M.Hamdan

    Abstract—This paper provides a survey on modeling and theories of networked control systems(NCS).In the first part,modeling of the different types of imperfections that affect NCS is discussed.These imperfections are quantization errors,packet dropouts,variable sampling/transmission intervals,variable transmission delays,and communication constraints.Then follows in the second part a presentation of several theories that have been applied for controlling networked systems.These theories include:inputdelay system approach,Markovian system approach,switched system approach,stochastic system approach,impulsive system approach,and predictive control approach.In the last part,some advanced issues in NCS including decentralized and distributed NCS,cloud control system,and co-design of NCS are reviewed.

    I.INTRODUCTION

    A Networked control system(NCS)is a system in which the traditional control loops are closed through a communication network such that signals of the system(control signals and feedback signals)can be exchanged among all components(sensors,controllers,and actuators)through a common network.Fig.1 shows a typical structure of NCS.In comparison with traditional control system,NCS has several advantages including:less wiring,lower cost,and more flexibility and maintainability of the system.As a result,NCS have been used widely in the lastdecades in many fields such as:industrial control,process control,engineering systems,aerospace systems,intelligentsystems,microgrids,and teleoperation,to name a few.However,it turns outthatthe inclusion of networks in dynamical systems introduce new challenges to the overall system due to the appearance of imperfections.These include quantization errors,varying delays,dropouts,etc.The imperfections essentially affect the behavior of the NCS by degrading the performance or causing instability.It is therefore essential to build up an appropriate dynamic representation of the NCS and design effective controllers that achieve stability under these circumstances.

    The research of NCS can be classified into two main categories:1) control of network,and 2) control over or through network.Control of network considers the problems of communication network such as communication protocols,routing control,congestion control etc.On the other hand control over or through network focuses on the design and control of systems that are using a network as a transmission media to obtain the desired performance.The second topic“controlover network”,which willbe the subjectof this paper,contains two main aspects:the quality of service(QoS)and the quality of control(QoC).Maintaining both of QoS and QoC is a major objective of research in NCS.Measures of the network like transmission rates and error rates are subjected to QoS,while QoC is concerned with the stability of the system subjected to different conditions.

    Fig.1. A typical networked control system.

    Severalsurvey papers existin the literature forsummarizing the updated result on NCS.Following a chronological order,[1]reviewed the stability of NCS in 2001.While in 2006[2]provided a generalsurvey on NCS,in which the effectof NCS over the control methodologies of conventional large scale system is reviewed.In 2007,the challenges of control and communication in networked real-time system were presented in[3],and[4]provided an overview on estimation,analysis,and controller synthesis for NCS.Some of the research topics and trends of NCS were presented in 2010[5].A survey on network-induced constraints in NCS was presented in 2013[6].In 2015,[7]has discussed several aspects of NCS such as:quantization,estimation,fault detection and networked predictive control.Also,it presented cloud control issues.Recently,an overview on the theoreticaldevelopmentof NCS was provided in[8]and[9].An overview of the research investigations into the evolving area of NCS was provided in[10].The interaction between control and computing theories was discussed[11].Reference[12]provided a review on event-based controland filtering of NCS.Besides,some results were presented in[13]-[17],and a coverage of analysis,stability and design of NCS can be found in[18].

    The objectives of this paper are:First,to provide a review on modeling of the imperfections in NCS.Second,review the theories applied for analyzing and achieving the stability of NCS.Finally,to present some advanced issues in NCS including decentralized and distributed NCS,Cloud NCS and Co-design of NCS.

    II.MODELING OF NCS

    The components of NCSs are connected via communication systems as shown in Fig.1,and this connection addresses new imperfections and constraints that have to be considered in the modeling of the complete system.As listed in[19],the imperfections and constraints in NCS are classified into five types:

    1)quantization errors in the transmitted signals;

    2)packet dropouts,because of the unreliable transmissions;

    3)variable sampling/transmission intervals;

    4)variable transmission delays;and

    5)communication constraints,since not all of the signals of sensors and actuators can be transmitted at the same time.

    These imperfections are summarized in Fig.2.

    Fig.2. Types of imperfections and constraints in NCS.

    A.Quantization Errors

    Due to the existence of the communication network and its limited transmission capacity,signals have to be quantized before they are transmitted.The controlsignaland plantoutput signal both are quantized before they are sent to the network as shown in Fig.3.A quantizer is a device thatreceives a realvalued signal and converts it to a piecewise constant one with a finite set of values.

    In the literature,there are two common types ofquantization which are:logarithmic quantization and uniform quantization.

    Fig.3.System configuration of an NCS with quantizers.

    1)Logarithmic Quantization:

    The logarithmic quantization is considered as static quantization,its performance near the origin is better in comparison with uniform quantization,and it could be either with infinite quantization level or with finite quantization level.The logarithmic quantization with infinite quantization levelis modeled as

    where U = {±vi:vi= ρiv0,i = ±1,±2,...}∪{±v0}∪{0},0< ρ < 1,v0> 0 is the set of the quantization values.The logarithmic quantization with finite quantization level is modeled as

    where U={±vi:vi= ρiv0,i= ±1,±2,...,±(N-1)}∪{±v0}∪{0},0< ρ < 1,v0> 0 is the set of the quantization values.

    2)Uniform Quantization:

    Uniform quantizer is easier to be operated and it has the following conditions when it is applied with an arbitrarilyshaped quantitative area which satisfies:

    where M andΔare the saturation value and the sensitivity,respectively.The upper bound of the quantization error when the quantization is not saturated is represented by the first condition.While,the second condition gives the way oftesting the saturation of the quantization.The rectangular shaped quantitative area is modeled as:

    More details about the two types of quantization could be found in[7]and[20].

    Remark 1:The logarithmic quantizers are mainly used with linear systems with infinite quantization levels.While,the zoom strategy is a beneficial control policy when uniform quantization is applied,and it has two steps:“zoom-in”and“zoom-out”[7].

    Remark 2:The implementation ofzooming-in and zoomingoutwas initially discussed in[21],[22].Itwas used to obtain the sufficient condition for the asymptotic stability for linear and nonlinear systems.

    As a result of quantization,information loss will be introduced in the system.Therefore,the modelofNCS hasto take it into account.The quantization error is inversely proportional to the number of bits used for quantization,i.e.,the small number of bits leads to a higher quantization error.Due to this fact,a significant research is directed to determine the minimum number of bits required for achieving the stability of the system,some examples could be found in[21]-[25].

    Some researchers focus on controlling the quantization and its effects on the system.Reference[26]proposed a sector bounded approach for dealing with the quantization errors,so its effects on NCS could be investigated using the procedures of robustness analysis.Quantization and stochastic packet dropouts were considered in the study ofthe quadratic stability of NCS and finite quantization was used for implementing the controller[27].The quantizer step size influence on NCS considering packet dropouts and finite-level quantization were studied in[28].In[29]and[30],an adaptable “center”and “zoom”parameters of the quantizers with finite values were considered,the input-to-state stability was obtained by applying a strategy of switching the controller continuously between “zooming-out”and “zooming-in”.The same strategy of “zooming-out”and “zooming-in”was used to obtain parametrized inputto state stability of NCS subjected to packet dropoutand unknown disturbances butwith random lengths of quantization regions based on the packetdropoutprocess[31].Reference[32]has used sector bound and convex combination property of quantizer for determining the sufficient conditions to achieve the desired control of NCS subjected to several categories ofasynchronous sampling and quantization.Quantization with the implementation ofeventtriggering controlwas discussed in many literatures,some examples are:[33]-[37].

    Remark 3:There are two phenomena caused by quantization:

    1)Saturation,which occurs when the signal is larger than the quantization range and that leads to a higher quantization error causing instability in the closed loop system.

    2)Deterioration of the performance around the original point,which occurs near the origin when the signal is not exactly quantized due to the limitation of the accuracy of the quantizers,and this will prevent approaching the asymptotic stability of the closed-loop system.

    B.Packet Dropouts

    Due to the use of the network for communication,the signals of the systems need to be grouped before transmitting,each group of signals is called “packet”and its size depends on the network used.The transmission of packets could be either single or multiple.In single packet transmission,all data are grouped from sensors or controller and transmitted together.On the other hand,in multiple packet transmission,the data are transmitted in several network packets,causing non simultaneous arriving of data to the controller or actuator.The limited size of the network is notthe only reason of using parallel transmission,but also the distribution of sensors and actuators practically over a large area makes it difficult to lump the data into one network packetleading to use multiple transmission.

    Occurrence offailures ormessage collisions on nodes cause packetdropout.To avoid that,mostprotocols use transmission retry mechanisms;However,if the retransmission fails within a limited time,the packets are dropped.Since the communication network is the source ofthe losses,this type ofdropouts is called “network-induced packetdropout”.Moreover,if a new packet sent earlier is available at the node later,it is more practical to discard it and use the recent one,and this type of packet dropouts called “active packet dropout”.For tackling this issue,some techniques like logicalzero-order-hold(ZOH)mechanisms[38]and message rejection[39]were proposed.

    Fig.4.An NCS with quantizers and packetdropoutrepresented by a switch.

    One methodology of dealing with packet dropouts is to design the controller to withstand with the upper bound of the dropouts in the system[40],[41],and[42].Another famous approach is to represent the dropoutin the system by a switch[43]-[45].As shown in Fig.4,when the switch is open(T2)the dropout happens,while there is no dropout when it is closed(T1).Then,the relation between the packetdropoutrate and the H∞controller is derived to guarantee the exponential stability of the system.Consider the following discrete-time linear system model of an NCS:

    where x(k)is the switched system state,σ(k):R+={0,1,2,...}→Γ={1,2,...,N}is the switching signal which is a piecewise constant function depending on time k and/orstate x(k).The subsystem i is activated whenσ(k)=i,Aiand Biare constant matrices.A hybrid state feedback controller u(k)is used such that

    where K is the controller gains to be designed,kis the switched system state,and(k)is the switching signal received by the hybrid controllers over the network.The subsystem i is activated at time P k whenσi(k)=1,and σi(k)=0 otherwise,and thus=1.So,the discrete time switched system is represented by

    Now,let s be the transmission indicator function defi ned as

    So,the dynamics of the switch system could be described by

    where βsare switch variables such thatβ1=1 and β2=0.By combining(4)-(6),the closed loop networked switched control system with the hybrid state feedback controller is rewritten as

    Now,letζ(k)=[x(k)T(k)T]be the augmented state vector,then,the closed-loop networked switched control system with the network packet dropout effect is written as

    and here we have two cases,when the switch is positioned at T1,s=1,β1=1,so

    When the switch is positioned at T2,s=2,β2=0,so

    Theorem 1[43]:Forsystem(11),assume thatthe plantstate and the switching signal in a single packetare transmitted ata rate of r.If there exist symmetrical positive definite matrices Pi,Qi,i∈ Υ and scalarsα1,α2> 0 such that hold,then system(11)is exponentially stable.

    Remark 4:The proof of Theorem II-B could be derived using the following candidate switched Lyapunov-Krasovskii functional:

    The other methodology is to consider the packet dropout as a random process,then model it as a Markovian process as in[46]and[47],or as a Bernoulli distribution such as[48]and[49].In[50],the stability analysis and controller synthesis problems were presented for NCS with time-varying delays and affected by nonstationary packet dropouts.The plant is described by the following discrete-time linear time-invariant system

    where xp(k)∈Rnis the state vector of the plant and up(k)∈Rmand yp(k)∈Rpare the controlinputand outputvectors of plant,respectively.A,B,and C are real matrices with appropriate dimensions.The measurement received by the controller is affected by a randomly varying communication delay and represented by:

    where pkassumes discrete values.So,there are two classes to be considered which are[50]:

    Class 1:pkhas the probability mass function where qr-qr-1=constant for r=2,...,n.This covers a wide range of cases[51].

    Class 2:pk=X/n,n>0 and 0≤X≤n is a random variable thatfollows the Binomialdistribution B(q,n),q>0,that is

    The following observer-based controller is required to be designed in case thatthe fullstate information is not available and the time delay occurs on the actuation side[51]:

    Assume that the “actuation delay”and the “measurement delay”are time-varying with bounded conditions as follows:

    Also,let the estimation error e(k)equal to xp(k)-(k).Then

    where the matrices{Aj,Bj,CCCj,j=1,...,4}with j is an index identifying one of the following pairs{(δ(k)=1,α(k)=1),(δ(k)=1, α(k)=0),(δ(k)=0, α(k)=0),(δ(k)=0, α(k)=1)}

    Now,it is desired to design an observer based feedback stabilizing controller in the form of(18)and(19)such thatthe closed loop system(23)is exponentially stable in the meansquare sense.The switched time-delay systems based approach is used to solve this problem[50].

    Theorem 2[50]: Let the controller and observer gain matrices K and L be given.The closed-loop system(23)is exponentially stable if there exist matrices 0<P,0<= Qj,j = 1,...,4 and matrices Ri,Si,and Mi,i=1,2,such that the following matrix inequality holds

    where

    C.Variable Sampling/Transmission Intervals

    The signals in NCS need to be sampled before the transmission through the network.The sampling periods are usually fixed in conventional systems due to its simplicity in design and analysis,and called:“time-triggered sampling”,“periodic sampling”,and “uniform sampling”.On the other hand,it is varying in the recent NCS since itis waiting in a queue before the transmission process which willbe based on the availability of the network and the protocolused.Itis proved recently that sampling at varying time may have better performance than sampling at fixed intervals[52].

    The other method of sampling is event-triggered sampling.It is also called: “Lebesgue sampling”,“l(fā)evel-crossing sampling”,and “magnitude-driven sampling”,etc.,in this case,the sampling and transmission occurs based on triggering of an event such as changing of one of the output signal to a specific value.

    There are several approaches for modeling sampled/transmission intervals[52],but the most famous one is the input delay approach due to the using ofthe linearmatrix inequality.By applying this approach,it is easy to determine the maximum upper bound of two consecutive samplings and design the proper controller for the NCS.Letthe system with sampled signal is given by

    where x(t)∈Rnand u(t)∈ Rmare the state vector of the system and control input vector,respectively.{t1,t2,...,tk,...}is a sequence of sampling such that tk< tk+1,limk→∞tk= ∞ and supk{tk+1-tk} ≤ hufor some known hu>0.

    By applying the input delay approach,the above system is rewritten as[53]

    with piecewise time varying delayτ(t):=t-tk,tk≤ t<tk+1satisfying 0≤τ(t)≤hu?t≥t0.Using this model,the Lyapunov-Krasovskii functional approach could be used to obtain the stability conditions and formulate the linear matrix inequalities for calculating the admissible upper bound of huand the corresponding controller gain K[53].Other examples of the input delay approach are found in[54]-[59].

    D.Variable Transmission Delays

    As shown in Fig.5,the NCS has two main kinds of delays:1)Sensor to controller delay,which represents the time between sampling the signal from sensors and receiving it by the controller;2)Controller to actuator delay,which represents the time between generating the control signal and receiving it by the actuator.Some of the sources of these delays are the limited data bandwidth,network traffic,and the used protocols in the network[60].In the early published work,only one of these delays was considered in the design of the controller and it is called one-mode controller.On the other hand,two-mode controller is used to show that both of the aforementioned delays were considered in the model.One of the earlier results on two-mode controller was discussed in[61]-[63],where both of the sensor-to-controller and controller-to-actuator random delays were considered and modeled as Markov chain.

    Fig.5.Network induced delay.

    The networked induced delay is represented by

    whereτ(tk)is the total networked induced delay at sampling time tk, τscand τcaare the sensor to controller delay and controller to actuator delay,respectively.Fig.6 shows the timing diagram of the signals in NCS.

    The overall delay in the NCS is calculated by considering any possible delay in the system such as computationaldelays in the controller,actuator,and sensor nodes[64].So,the complete delay in the system is represented by

    whereτc,τa,and τsare the computational delay in the controller,actuator,and sensor,respectively.Note that u as shown in Fig.5 could be defined as

    where K represents the feedback control gain matrix.

    Remark 5:The induced delay in the NCS(τ)could be extended to consider the dropouts in the system by representing it as a special case of time delay,such that

    whereτd(tk)is overall delay including the dropouts delay,d is the number of dropouts,and h is the sampling period.

    Fig.6.Signals in an NCS with delays.

    There are four main models for random delays in NCS which are[65]:

    1)Constant Delay Model

    The NCS in this model is considered as a deterministic system with a constant time delay normally equal to the maximum delay in the system similar to(29)or(30).It is used when itis difficultto characterize the random delay in the system.Here,a receiver buffer is introduced at the controller(or actuator)node,and its size is equalto the maximum delay(sensor to controller delay or controller to actuator delay)[66]and[67].Thus,the NCS can be treated as a deterministic system,after that,many deterministic control methods can be applied to achieve the stability of the NCS.

    2)Mutually Independent Stochastic Delay Model

    When the probabilistic dependence is unknown,the constant delay model and the deterministic control strategies could hardly achieve the required performance of the system.The reason is due to the presence of many stochastic factors in networks such as:load in network,competition between nodes,and network congestion,and these factors make the network delay to be stochastic.The delay could be modeled either as mutually independent or probabilistically dependent.

    3)Markov Chain Model

    This type considers the special dependency relationships among the delays which is the Markov chain.This model has two types:

    a)One Markov chain including the sum of delays in the NCS,i.e.,sensor to controller and controller to sensor.

    b)Two Markov chains for modeling both sensor to controller delay and controller to actuator delay.

    4)Hidden Markov Model

    In this model,all of the stochastic factors such as:load in the network,competition of nodes,and network congestion are grouped into a hidden variable and defined as a network state,and this network state governs the distribution of delays.The network state cannot be observed directly butrather it can be estimated through observing network delays,and so,a hidden Markov model is applied to describe the relation between the network state and the network delay.

    E.Communication Constraints

    In NCS,the communication network is normally shared with sensors and actuators of multiple nodes,and because of the limitation of data transmission,only one or some of these nodes are active ata time and have access to the network.This is the reason behind the communication constraints or some times it is called as “medium access constraint”.As a result,the network requires a protocol for allocating the access of each node to it.This protocolcould be either deterministic or random[68].And so,the model of constraints in NCS could be either deterministic or stochastic.

    1)Deterministic Model of Communication Constraints

    Previously,the problem was to choose a periodic communication sequence and after that,to design a suitable controller for that[69].But,this method is NP-hard problem as shown in[70].So,the later work was to design the controller first and then to find the suitable communication sequence either off-line[71],[72]or online[73]-[75].Other examples of this type could be found in[76]-[80].

    2)Stochastic Model of Communication Constraints

    In this modela random media access control(MAC)protocolis used.One example is thata node makes sure thatthere is no other traffic before transmitting its data[68].Examples of this model could be found in[81]-[86].

    F.Discussions

    As mentioned in the beginning of this section,there are five imperfections thatcould affect NCS.The stability analysis of NCS with two types of imperfections availed the highest level of efforts in the recent years,examples of that are[87]-[92].Table Ishows the references thatdiscussed three or four imperfections.To the best of the authors knowledge,no research has considered all of the five imperfections together.

    III.CONTROL OVER NETWORKS

    Several methods were developed for stabilizing NCS while considering one or more of the imperfections which have been discussed in the previous section.These methods as listed in Fig.7 include:Input delay system approach,switched system approach,Markovian system approach,impulsive system approach,stochastic system approach,and predictive control approach.A discussion on each of them follows.

    TABLE I REFERENCES THAT STUDY MANY IMPERFECTIONS

    Fig.7. Theories of control over networks.

    A.Input Delay System Approach

    The NCS in this approach is modeled as a system with time varying delay including:the delay from sensor to controller,the delay from controller to actuator,and a representation of the dropout as a delay[1],[108].Additionally,the computational delay could be considered in the model as mentioned earlier in(32)[109].Moreover,this approach was developed for considering the signal sampling[55],and were applied for solving the problem of synchronization of complex network[110],[111].

    As mentioned in Section II-B,some researchers have considered the disorder of data.A logical ZOH is designed to identify most recently arrived control input signal by making comparison between time stamps of the received signals and then the newest one is used for controlling the process[38].The NCS with the sampler and the logic ZOH is described by the following discrete time system with a delay on the input

    where τ(k)is the inputdelay which is bounded by τmaxsuch that 0≤ τ(k)≤ τmax.By applying a state feedback controller u=K x the overall closed loop system is described by

    where K is to be designed and Z+is the set of nonnegative integers.The sufficient condition of stability of the NCS is derived based on a proper Lyapunov function and presented using LMI method as follows[38].

    Theorem 3[38]:The NCS described in(34)is asymptotically stable if there exist matrices P∈S+,R∈S+,W1∈ Rn×n,and W2∈ Rn×nsatisfying

    where

    Remark 6:The basis ofproving Theorem 3 is the application of Lyapunov-Krasoviskii stability theory to the following function:

    where

    and

    Fig.8.An NCS with a master-slave structure.

    Another way of analyzing NCS is by using a structure of a Master-Slave system[112]-[114].The control of the system is performed in one PC considered as a Master which communicates through a network with a Slave that includes another PC and the process is as shown in Fig.8.Four delay sources are considered here:communication delay,data sampling,transmitting delay,and the possible packet losses.The Slave is considered to have the following linear form:

    where(A,B,C)is controllable and observable andτ1(t)is the total Master-to-Slave delay.

    For a given k and for any t∈[t1,k+h1m,t1,k+1+h1m],there exists asuch thatthe proposed observeris represented by

    where k′corresponds to the newest output information received by the Master.Now,given a signal g(t)and the global delayτ(t)and packet loss delay h(tk)occurred during the transmission of the packet containing the kthsample at time tk,g(t)can be described by

    Now,by using(39),(38)is rewritten as

    where τ1(t)=h1,k+t-t1,k+d1and τ2(t)=h2,k′+t+d2,The characteristics of the system lead to τ1(t)≤ h1m+T+d1andτ2(t) ≤ h2m+T+d2.Also,the error vector between the estimated state(t)and the real state x(t)is defined as

    Thus,the error is represented as

    Finally,a delay dependentstate feedback controlis designed by the Master based on Lyapunov-Krasovskii functional and the LMIapproach,and a remote observer is used for estimating the states of the Salve.So,a uniform stability is achieved for the system and it is characterized by the following two theorems[113].

    Theorem 4 [112]:Suppose that,for some positive scalarsαandε,there exists n×n matrices 0< P1,P,S,Y1,Y2,Z1,Z2,Z3,R,Raand a matrix W with appropriate dimensions such that the following LMI conditions are satisfied for j=1,2

    whereβij,i=1,2,j=1,2 are given by

    and the matrices Y,Z andΞ2are defined as

    Then,the gain

    makes the error(42)of observer(40)exponentially converge to the solution e(t)=0,with a decay rateα.

    The solution of the LMI problem corresponding to this theorem is written

    For the control design,consider the controller u=K x,i=1,2,i.e.,the ideal situation e(t)=0,x(t)=(t)and

    Theorem 5[112]:Suppose that,for some positive scalars αandε,there exists a positive definite matrix,matrices of size n×n:0<similar to(44)and an n×m matrix W,such that the following LMI conditions hold

    whereβ1ifor i=1,2 are defined by(43)and

    Then,the gain

    exponentially stabilizes the system(47)with the decay rateα for all delayτ1(t).

    The solution of the LMIproblem corresponding to Theorem 5 is written as

    Remark 7:The input delay system approach was applied in other researches with other protocols like round-robin(RR)protocol[115]and quadratic protocol(QP)[116]and the results ofboth ofthem were extended and applied on a discrete NCS with actuator constraints[117]and the results were also generated for systems with more than two nodes[118].

    B.Markovian System Approach

    In this approach,the Markovian model is applied to represent the closed loop NCS.In[46],the Markovian system approach was applied on a vehicle control problem in order to study the effectof packetdropouts on the system which uses a wireless local network,and it has the following description:

    whereθ(k)is the time-varying dependence of the state matrices via the network packet losses parameters,and θis either equal to(0)when the packet from sensor is dropped or equal to(1)when the packet is received.Thus,θ(k)is represented as θ(k) = σ ∈ {0,1}.The state matrices are functions of a discretetime Markov chain with values in a finite set N={1,...,N}.The Markov chain has a transition probability matrix P=[pij]where pij=P r(θ(k+1)=j|θ(k)=i)subject to the restrictions pij≥0 andpij=1 for any i∈N,which means that jumping probability is positive and that the Markov chain has to jump from mode i into some state thathas a probability of one.Using the above model,the stochastic stability is derived for system(50)and represented in an LMI format as follows:

    Theorem 6[119]:System(50)is mean square stable(MSS)iff there exists G>0 such that

    Now,the objective is to design a dynamic output feedback controller that has the following form:

    where xc(k)∈Rnis the controller state and the subscript c denotes the controller matrices/states.Again,forθ(k)= σ∈ {0,1},Acσ,Bcσ,and Ccσare used to denote the state space matrices of this two mode controller.The closed loop system is described by:

    where the subscript“cl”denotes the closed loop matrices.By applying Theorem 6 and by using Schur complements,system(53)is MSS for the following condition[46]:

    where Z=G-1.

    In a similar way the model for a NCS with known packet loss was derived as a Markovian jumping system,and then an H∞controller was designed for that system[120].[121]studied the stochastic stability of discrete-time NCS with random delays.Two Markov chains were used to represent the sensor-to-controller and controller-to-actuator delays,and the obtained closed-loop systems are two modes jump linear systems.In[122]the stability of the discrete time NCS contains polytopic uncertainty was considered,where a smart controller is updated with the buffered sensor information at stochastic intervals and the amount of the buffered data received by the controller under the buffer capacity constraint is also random.The exponential stability of generic switched NCS and the exponential mean-square stability of Markovchain driven NCS were assured by establishing the sufficient conditions.

    Other examples of literature that had used Markovian system approach are[123]-[128].

    Remark 8:A special class of hybrid and stochastic system is called Markovian jump system.This system is applicable in many real systems such as manufacturing systems,power,chemical,economic,communication and control systems.A Markovian jump time-delay system model considering external disturbances of an event triggered NCS was presented in[129],the H∞control problem was solved and sufficient conditions to ensure stability of the closed-loop system were derived.More details aboutMarkovian jump systems could be found in[130].

    C.Switched System Approach

    The NCS in switched system approach is represented by a discrete-time switched system with a finite number of subsystems.In[131],a discrete-time switched systems with arbitrary switching was formulated for an NCS while considering the effects ofbounded uncertain access delay and packet losses.Then,both of asymptotic stability and L∞persistent disturbance attenuation issues were investigated.The plant is represented by the following continuous linear time-invariant system:

    where t∈R+,R+is the positive real numbers,x(t)∈Rnis the state variable,u(t)∈Rmis the control input,and z(t)∈Rpis the controlled output.The disturbance input d(t)is contained in D?Rr,and Ac,Bc,Ec,Ccare constant matrices.The control signal is assumed to be time-varying within a sampling period,and the sampling period is divided into a number of sub-intervals in which the controller reads its buffer at a higher frequency than the sampling frequency.The discrete time model of the system is described by

    where and C=Cc.Then,the time delay and dropouts effects were added to the model.There are three main scenarios which could occur during each sampling period.

    1)If the delayτ=h×T,where T=Ts/N,and h=1,2,...,d1max,then u1[k]=u2[k]= ···=uh[k]=u[k-1],uh+1[k]=uh+2[k]= ···=uN[k]=u[k],and(56)can be written as

    2)If a packet-dropout happens with delay less thanτmax,then the actuator will implement the previous control signal,i.e.,u1[k]=u2[k]= ···=uN[k]=u[k-1].Therefor,the state transition equation(56)for this case can be written as

    3)The packets are dropped periodically,with period Tmwhich is an integral multiple of the sampling period Ts,i.e.,Tm=mTs.In case of m=Tm/Ts≥2,the first(m1)packets are dropped.Then,for these first(m1)steps,the previous control signal is used.Therefore where the integer N=T s/T,and T is the period of the controller reading its receiving buffers.

    During the period t∈[k Tm+(m-1)Ts,(k+1)Tm),the new packet is transmitted successfully with some delay,such thatτ=,where h=0,1,2,...,dmax.And Assuming that d(k T)=d(k T+1)= ···=d(k T+m-1),andmmmthat the controller uses just the time-invariant linear feedback control law,u(t)=K x(t).Then,we may obtain

    where

    where

    Here m=Tm/Ts≥2 in this case,and h=0,1,...,dmax.

    The aforementioned system could be represented in the following format:

    Theorem 7[131]:If the set P(k)? int{X0(μ)}for some k,then the switched system(60)does not admit a positive disturbance invariant set under arbitrary switching in X0(μ),In other wordsμ<μ∞,where

    Pis a positive disturbance invariantfor the switched system(60)with arbitrary switching such that

    μ∞is the l∞induced norm from d[k]to z[k]and defined asμinf=inf{μ : ‖z[k]‖l∞ ≤ μ ?d[k],‖d[k]‖l∞ ≤ 1}.

    Remark 9:In[131],a systematic proofand detailed stability analysis and l∞persistent disturbance attenuation for the above NCS were developed.Similar works are presented in[132]-[136].

    In[137],the continuous time NCS is modeled as an event based discrete-time model while allowing nonuniform sampling and varying delay larger than a sampling period,then the stability is achieved by solving a control problem for a switched polytopic system with an additive norm bounded uncertainty.A discrete-time switched linear uncertain system was used to model an NCS that includes time-varying transmission intervals,time-varying transmission delays,and communication constraints[138].Ateach single transmission,only one known node is allowed to communicate with the network for transmitting its data.Then,a convex over-approximation method in the form of a polytopic system with norm-bounded additive uncertainty was used to determine the stability criteria for this NCS and represent it in an LMI format.The same procedure was followed but with consideration of the quantization of the NCS[107].The asymptotic stability was assured based on quantizer with finite quantization level and the quantizer parameters were suitably adjusted[106].

    Remark 10:A switched system approach is implemented for NCS with network-induced delays by defining a switching function.The closed-loop NCS is represented by a time-delay switched system with two switching modes and each mode has a controller with a different gain[139].Stability analysis is carried out based on both the time-delay switched system model and the average dwell time technique.Similarly,the exponential stability is achieved[140].

    Other examples of the switched system approach could be found in[141]-[147].

    D.Stochastic System Approach

    The stochastic system approach is applied when the network-induced delays and/or packet dropouts are random.[148]has discussed the stability of NCS with stochastic input delays,considering the following delayed NCS:

    whereτ(t)refers to a piecewise continuous and bounded time delay including the delay from sensor to actuator,the delay from actuator to sensor,and the effectof dropouts.Assuming thatthe probability distribution ofτ(t)is known a prioriwhich takes values in[0,]and(,],and 0≤≤,also,two random events F1,F2are defined forthe stochastic inputdelay τ(t)such that:F1:τ(t)∈[0,]and F2:τ(t)∈(,],and a random variable δ(t)is defined such that δ(t)=1 when F1occurs andδ(t)=0 when F2occurs.Moreover,two functions are definedτ1:R+→[0,]andτ2:R+→such that

    Now,by using(62),(61)can be rewritten as

    where u(t)=K x(t),K is a constant matrix to be designed,andδ(t)is assumed to have a Bernoullidistribution sequence with P rob{δ(t)=1}=E{δ(t)}= δ0and P rob{δ(t)=0}=1-E{δ(t)}=1- δ0and 0 ≤ δ0≤ 1 is a constant.The closed-loop system of(63)is described by the following formula:

    Theorem 8[148]:System(64)is exponentially stable in the mean-square sense if,for given constants,,δ0and matrix K,there exist matrices P>0,Qi>0,Ri>0,Zi>0(i=1,2),Nj,Mj,Tj,Wj(j=1,2,3,4,5,6),and Sl(l= 1,2,3,4)of appropriate dimensions such that the following LMIs hold:

    Remark 11:Consider the following candidate function

    with

    Application of Lyapunov-Krasovskii stability theory to(66)forms the basis of the proof.

    A similar result could be found in[149].In[150],random communication delays from sensor to the controller and from controller to actuator through a limited bandwidth communication channel were represented by a linear function of the stochastic variable satisfying Bernoulli random binary distribution,then the exponential stability is achieved by applying an H∞controller.The stability was discussed using a stochastic computational technique in NCS by representing transmission intervals and transmission delays as a sequence of continuous random variables[151].Properties for some inputoutput stability were derived for a general class of nonlinear NCS with exogenous disturbances using stochastic protocols subject to random network-induced delays and packet losses[152].Other examples of using stochastic approach in NCS are found in[153]-[158].

    E.Impulsive System Approach

    In this approach,the NCS is represented by a hybrid discrete/continuous model or in other words “impulsive system”.An LTI system with uncertainties in the parameters of the process and intervals of sampling was modeled as a linear impulsive system described by the following equations[159]:

    where fkand gkare locally Lipschitz functions from RnX R to Rnsuch that fk(0,t)=0,gk(0,t)=0,?t≥ 0,and the impulse time sequence skforms a strictly increasing sequence in[s0,∞)for some initial time s0≥ 0.Then,a discontinuous Lyapunov function atthe impulse times was used for achieving the exponential stability of system(67).For an NCS with variable sampling time,the objective is to find the maximum allowable time intervalτMATIfor the following general LTI system[159]

    where x,u are the state and inputof the process respectively.Atthe sampling time sk,k∈N the state of the system x(sk),is sent to the controller and the control input u=K x(sk)is sent back to the actuator.The resulting closed loop system is modeled as an impulsive system with state ξ(t):=[x′(t)z′(t)]where z(t):=x(sk),t∈[sk,sk+1).So,the impulsive system is describe by:

    Theorem 9[160]:System(69)is stable if there exist symmetric positive definite matrices P,R,X1and a matrix N such that

    where

    Remark 12:Application of Lyapunov-Krasovskii stability theory to the following candidate function:

    where

    with R,P,and X1as symmetric positive definite matrices.

    The Razumikhin technique and Lyapunov functions are applied to achieve exponential stability of an NCS subject to variable bounded delay by applying impulsive control[161].A modelof a threshold-error-dependent augmented impulsive system with an interval time-varying delay is used to design a dissipative control for model-based NCS subject to event triggered communication[162].A delay scheduled impulsive(DSI)controller is presented to achieve a robust stability of NCS subject to integral quadratic constraint and delays[162].Other examples of this approach could be found in[163]-[167].

    F.Predictive Control Approach

    In this approach,a network predictive controller(NPC)is designed in order to compensate for the effect of time delays and packetdropouts in the network.The NPC scheme consists of two parts as shown in Fig.9:a controlprediction generator and a compensator.A set of future control predictions is generated,packed,and transmitted to the plant side by the controlprediction generator based on the signals received from the sensor.Using the most recent control value from the latest control prediction sequence,the compensator is designed to compensate forthe delays and dropouts thatoccurfrom sensor to controller or from controllerto actuatorchannels to achieve the desired performance.

    Fig.9. A network predictive controller scheme.

    In[168],an NPC was presented for compensating for the network-induced delay,for the following discrete-time system:

    where xk∈Rnis the state vector,ukand yk∈R are the inputand outputvectors,respectively.A,B,and C are system matrices.An output feedback controller is used such that uk= Kkyk.The NPC generates state predictions on the controller side up to time t+τas follows:

    where i=2,3,...,dk+τk,...,dk+τandis the state prediction for time k-dk+1 on the basis of the information at time k-dk.And on the controller side,the following control signals are generated

    where

    The output feedback control input of the system(73)after applying the NCS strategy is calculated as

    where

    Then,the Markovian jump systems with discrete and distributed delays could be written as

    whereι=dk+τk-i+1

    Theorem 10[168]:For the NCS in(73)with random delays dkandτkin the feedback and forward channels,where dkand τkare Markov processes,respectively,the closed-loop system in(79)with the predictive controller(78)is stochastically stable if there exist symmetric positive definite matrices Si,j,R,and Q such that the following matrix inequality holds

    where for all the i and j

    Remark 13:Consider the following candidate function

    with

    Application of Lyapunov-Krasovskii stability theory to(81)proves Theorem 10.

    Other examples of implementing this approach could be found in[169]-[174].

    IV.ADVANCED ISSUES IN NCS

    A.Decentralized and Distributed NCS

    In addition to the centralized configuration of NCS in which a single controller communicates with the system,there are two other configurations which are:decentralized and distributed configurations.Large scale systems are usually modeled as a system of systems or system with subsystems with interconnection among them and several controllers are used for controlling the overallsystem,these controllers either have a communication among them as shown in Fig.10 and it is called decentralized configuration or work separately as shown in Fig.11 and it is called distributed configuration.

    Fig.10.Model of a decentralized NCS.

    Fig.11.Model of a distributed NCS.

    The nodes of the controllers in the decentralized configuration do not share information with nearby nodes.Although the system may have one objective,this causes each controller to work locally.Because of lack of information,a suboptimal control performance may be achieved.Moreover,a deterioration in the system performance and a limitation in the application scope of the decentralized configuration may be occurred in wireless NCS due to the absence of communication and cooperation between decentralized controllers[18].Examples of decentralized NCS are discussed in[175]-[179].

    The main features in distributed configuration is that,the exchange of information of each subsystem among components of the system and the plants in order to achieve the objective of the system and which usually contains large number of interacting physicalunits,can be physically distributed and interconnected to others to coordinate their tasks,and this leads to the so-called cooperative control[18].Since sharing oflocal information is allowed among the distributed controllers in this configuration,they have the capability of coordination which leads to modularity,scalability and robustness.Examples of distributed NCS are found in[180]-[186].

    B.Cloud Control System

    Cloud computing is one of the recent essential tools in industry since it provides customers with a high powerful computation power and itreduces the requirements of the storage.And this opens new windows to the control techniques.Cloud controlsystems have become one ofthe mostpromising directions[187].The structure of cloud control systems is shown in Fig.12.The cloud computing system provides a medium of configurable resources including computation,software,data access,and storage services for practical systems while customers do not need to know the real location and configuration of the service provider during their using of it.

    Fig.12.Cloud control systems.

    The requirements for computation and communication are increasing in cloud systems due to the increase of the system scale.Generally speaking,in the absence of powerful tools and appropriate system information,most of the complex systems cannot be controlled properly.But,a necessary platform for computability is provided by the development of new technologies,including recentinnovations in software and hardware.Additionally,big data faces a lotof challenges such as:storage,search,capturing,transfer,sharing,visualization,analysis,etc.In the cloud control systems,big data will be transmitted to the centers of cloud computing to be treated fi rstly.Then,control signals,such as scheduling schemes,predictive control sequences and any other useful information will be generated instantly for cloud control systems.So,a powerfultoolfor controlling the complex system,which were not available before,is provided by cloud control systems.

    Let us consider the following discrete dynamic system S with unknown process disturbances and measurement noises

    where x(k)is the system state,u(k)and y(k)are the system input and output respectively;f(x(k),u(k),w(k))and g(x(k),u(k),v(k))are general models which can be linear or nonlinear.w(k)and v(k)are the unknown process disturbances and the unknown measurement noises respectively.For NCS where there are network induced time delays and data dropouts,ithas been proven thatthe networked predictive method is a very effective method[15]and[187].To estimate the state of the system(82)and then produce the predictive states with finite horizon N1,Kalman filter is adopted as follows:

    where K F represents the compact form of Kalman filter expression and K(k+i)is time-varying Kalman filter gain.A networked predictive control scheme consisting of a control prediction generator and a network delay compensator is proposed to overcome unknown random network transmission delays[187].The network delay compensator considers the recent control value from the control prediction sequences available on the plant.When there is no time delay in the sensor-to-controllerchanneland the time delay from controller to actuator is kithen,the following predictive control sequences are received on the plant side:

    whereιi=t+N-ki|t-k-i and the control valuesfor i=1,2,...,t,are available to be chosen as the control input of the plant at time t,the output of the network delay compensator will be

    The controller sends packets to the plant node:

    At each time instant k,the actuator selects a preferable control signal to be the actual input of the plant:

    where i=arg mini{u(k|k-i)is available}.

    In[188],a cloud predictive control scheme for networked multiagent systems(NMASs)via cloud computing was presented in order to achieve both consensus and stability simultaneously and for compensating actively the communication delays.More information about cloud control could be found in[189],[190].

    Remark 14:The principle of cooperative cloud control system is used to describe the system in which two or more cloud controllers are used to achieve the control objectives in form of cooperation.Reasonable allocation for control objectives is however,a difficult dynamic problem[189].

    C.Co-Design in NCS

    The Co-design of NCS deals with the interaction between control and computing theories.Normally,digital networks are used for connecting sensors,controllers,and actuators in NCS.The concept of centralized control was applied in the previous years in which the sensors,controllers,and actuators are located in an area where the communication is peer to peer.As a result of the short distance,there is no time delay between the NCS parts and also,no packet losses.After that,the concept of decentralized systems was applied since manufactures tend to separate their large plants to subsystems with their own control system with indirect communication.Then,manufactures applied the hybrid systems which contain centralized and decentralized systems.As a result,Internetof things(IOT)became a rising research area in both of academia and industry and it established the future interaction between the computing and communications[11],[187].

    Since IOT systems are complex,it is difficult to model them.Practically,the control system faces issues affecting the stability and the overall performance of the system which may lead to instability such as:critical time delay of data,irregularity,time-variance and packet dropout.Traffic congestion could cause losing of data and unreliable nature of the link or protocol malfunctioning[11].On the other hand,the continuous growing of computing systems raises the capabilities to compute,store and process IOT data with high quality and reliable measurements[187].

    The implementation of modelestimation,optimization,and controlapproaches into into the progressive data controlcenter was presented in[191]and the implementation of control theory in computing systems was discussed in[192].Two methodologies for remote control systems were proposed in which control system design is provided as a cloud service and hence time and cost were reduced and the design of the plant-wide system became simpler[193].In[194],both communication and control problems were solved simultaneously using co-design approach.[195]proposed a solution for a co-design problem of a mixed event-triggering mechanism(ETM)and state feedback controller for discrete-time linear parameter-varying(LPV)systems in a network environment.A parameter-dependentco-design condition for event-triggered H∞control was given for the problem as a finite setof LMIs.The issue ofperformance limitation ofnetworked systems was discussed by co-designing the controller and communication filter in[196].And itwas shown thatusing the controller and communication filter co-design could deteriorate the performance and revoke the effect of the channel noise.

    V.CONCLUSIONS

    A survey on modeling and theories of networked control system(NCS)was provided in this paper.In the first part,the modeling of the different kind of imperfections that affect NCS was discussed.These imperfections are:quantization errors,packetdropouts,variable sampling/transmission intervals,variable transmission delays,and communication constraints.Then,several theories which were applied for controlling networked systems were presented.These theories include:input delay system approach,Markovian system approach,switched system approach,stochastic system approach,impulsive system approach,and predictive controlapproach.Finally,some advanced issues in NCS including decentralized and distributed NCS,cloud control system,and co-design of NCS were reviewed.

    欧美变态另类bdsm刘玥| 国产成人a∨麻豆精品| av网站在线播放免费| 免费在线观看黄色视频的| 黄频高清免费视频| 国产欧美亚洲国产| 午夜影院在线不卡| 搡老岳熟女国产| 不卡一级毛片| 性色av一级| 免费在线观看影片大全网站| 女性被躁到高潮视频| 久久ye,这里只有精品| 成人三级做爰电影| 国产区一区二久久| 大码成人一级视频| 女人精品久久久久毛片| 免费高清在线观看日韩| 国产精品一二三区在线看| 狂野欧美激情性bbbbbb| 欧美精品亚洲一区二区| 丝袜脚勾引网站| xxxhd国产人妻xxx| 黄色毛片三级朝国网站| 国产1区2区3区精品| 精品久久久精品久久久| 又黄又粗又硬又大视频| 两性午夜刺激爽爽歪歪视频在线观看 | 99久久精品国产亚洲精品| 国产麻豆69| 欧美人与性动交α欧美精品济南到| 成人手机av| 亚洲天堂av无毛| 中文欧美无线码| 在线观看免费午夜福利视频| 亚洲熟女精品中文字幕| 波多野结衣一区麻豆| 欧美人与性动交α欧美精品济南到| 精品国产乱码久久久久久小说| 人妻 亚洲 视频| 欧美国产精品一级二级三级| 成在线人永久免费视频| 久久99一区二区三区| 久久国产精品影院| 中亚洲国语对白在线视频| 久久亚洲精品不卡| 亚洲av成人一区二区三| 亚洲av国产av综合av卡| 80岁老熟妇乱子伦牲交| 欧美性长视频在线观看| 亚洲精品国产色婷婷电影| 精品免费久久久久久久清纯 | 国产精品影院久久| 欧美大码av| 精品熟女少妇八av免费久了| 十八禁网站免费在线| 韩国高清视频一区二区三区| 亚洲 欧美一区二区三区| 国产熟女午夜一区二区三区| 80岁老熟妇乱子伦牲交| 岛国在线观看网站| 纵有疾风起免费观看全集完整版| 纯流量卡能插随身wifi吗| 青春草亚洲视频在线观看| 我的亚洲天堂| 欧美av亚洲av综合av国产av| 日本av手机在线免费观看| 亚洲av国产av综合av卡| 午夜福利一区二区在线看| 亚洲欧美精品综合一区二区三区| 免费在线观看日本一区| bbb黄色大片| 少妇精品久久久久久久| 一边摸一边抽搐一进一出视频| 欧美一级毛片孕妇| 中文字幕另类日韩欧美亚洲嫩草| 美女午夜性视频免费| 手机成人av网站| 久久国产精品人妻蜜桃| av网站在线播放免费| 黄频高清免费视频| 成年动漫av网址| 悠悠久久av| 一级黄色大片毛片| 免费一级毛片在线播放高清视频 | 欧美一级毛片孕妇| 母亲3免费完整高清在线观看| 精品乱码久久久久久99久播| 久久久久久久大尺度免费视频| 91精品国产国语对白视频| 狂野欧美激情性xxxx| 丝袜人妻中文字幕| 国产欧美日韩精品亚洲av| 国产在线一区二区三区精| 亚洲中文日韩欧美视频| 十分钟在线观看高清视频www| 国产成人影院久久av| 俄罗斯特黄特色一大片| 国产亚洲精品第一综合不卡| 久久久久国产精品人妻一区二区| 窝窝影院91人妻| 精品久久蜜臀av无| 精品国产乱码久久久久久小说| 国产伦人伦偷精品视频| 考比视频在线观看| 欧美+亚洲+日韩+国产| 麻豆乱淫一区二区| 国产精品1区2区在线观看. | 老熟妇仑乱视频hdxx| 不卡一级毛片| 亚洲国产精品成人久久小说| 亚洲专区字幕在线| 91精品伊人久久大香线蕉| 亚洲精品久久午夜乱码| 久久国产精品人妻蜜桃| 婷婷丁香在线五月| 久久久国产一区二区| 日韩大片免费观看网站| 色婷婷av一区二区三区视频| 亚洲精品国产av蜜桃| 欧美精品啪啪一区二区三区 | 国产亚洲一区二区精品| 999精品在线视频| 国产成人欧美| 国产精品99久久99久久久不卡| 亚洲国产精品成人久久小说| 老司机在亚洲福利影院| 在线 av 中文字幕| 美女国产高潮福利片在线看| 亚洲专区国产一区二区| 一本大道久久a久久精品| 欧美国产精品va在线观看不卡| 欧美国产精品va在线观看不卡| av免费在线观看网站| 免费日韩欧美在线观看| 精品卡一卡二卡四卡免费| 中文字幕精品免费在线观看视频| 亚洲专区国产一区二区| 一区二区三区乱码不卡18| 巨乳人妻的诱惑在线观看| 黑人操中国人逼视频| 亚洲av成人一区二区三| 中文字幕高清在线视频| 国产99久久九九免费精品| 久久午夜综合久久蜜桃| 人妻久久中文字幕网| 欧美黄色淫秽网站| 国产麻豆69| 首页视频小说图片口味搜索| 日本wwww免费看| 久久久精品国产亚洲av高清涩受| 国产97色在线日韩免费| 亚洲综合色网址| 狂野欧美激情性xxxx| 两人在一起打扑克的视频| 各种免费的搞黄视频| 国产成人av教育| 色婷婷av一区二区三区视频| www.精华液| 亚洲国产精品一区三区| 国产精品一区二区免费欧美 | 99国产极品粉嫩在线观看| 日韩 欧美 亚洲 中文字幕| 国产伦理片在线播放av一区| 国产精品国产av在线观看| 人人妻人人澡人人爽人人夜夜| 日本a在线网址| 国产精品av久久久久免费| 久久人妻福利社区极品人妻图片| av网站免费在线观看视频| 免费高清在线观看视频在线观看| 免费观看a级毛片全部| e午夜精品久久久久久久| 精品一区在线观看国产| 真人做人爱边吃奶动态| 超碰成人久久| 欧美成人午夜精品| 国产高清视频在线播放一区 | 人人妻人人澡人人看| 亚洲第一欧美日韩一区二区三区 | 黄色视频,在线免费观看| 一二三四社区在线视频社区8| 天天添夜夜摸| 日本a在线网址| 丝袜人妻中文字幕| 久9热在线精品视频| 色婷婷av一区二区三区视频| 成年人黄色毛片网站| 中国美女看黄片| 男女床上黄色一级片免费看| 人人妻人人澡人人爽人人夜夜| 香蕉丝袜av| 亚洲国产欧美一区二区综合| 欧美精品人与动牲交sv欧美| 69精品国产乱码久久久| 免费不卡黄色视频| 亚洲avbb在线观看| 一级毛片女人18水好多| 欧美精品啪啪一区二区三区 | 日韩欧美一区二区三区在线观看 | 中文欧美无线码| 在线观看免费午夜福利视频| 欧美黄色淫秽网站| √禁漫天堂资源中文www| 久久国产亚洲av麻豆专区| 欧美精品亚洲一区二区| 在线观看www视频免费| www.自偷自拍.com| 精品一品国产午夜福利视频| 国产精品国产av在线观看| www.av在线官网国产| 日韩欧美一区视频在线观看| 国产成人系列免费观看| 搡老岳熟女国产| 国产欧美日韩精品亚洲av| 男女免费视频国产| 中文字幕人妻熟女乱码| 欧美日韩亚洲国产一区二区在线观看 | 亚洲七黄色美女视频| 久久精品人人爽人人爽视色| videosex国产| 最新的欧美精品一区二区| 久久精品久久久久久噜噜老黄| 日本撒尿小便嘘嘘汇集6| 国产精品欧美亚洲77777| 高清在线国产一区| 免费在线观看日本一区| 不卡av一区二区三区| 老司机靠b影院| 亚洲 国产 在线| 亚洲精品久久成人aⅴ小说| 久久久水蜜桃国产精品网| 久久99一区二区三区| 久久精品久久久久久噜噜老黄| 一级毛片女人18水好多| 免费av中文字幕在线| 青春草亚洲视频在线观看| 在线观看免费高清a一片| 午夜两性在线视频| 精品人妻一区二区三区麻豆| 国产一卡二卡三卡精品| 黄频高清免费视频| 国产欧美日韩一区二区精品| 可以免费在线观看a视频的电影网站| 国产成人av激情在线播放| 免费在线观看视频国产中文字幕亚洲 | 午夜激情av网站| 麻豆国产av国片精品| 亚洲精品国产一区二区精华液| 啦啦啦中文免费视频观看日本| 中文字幕制服av| 亚洲欧美清纯卡通| 一边摸一边做爽爽视频免费| 国产精品麻豆人妻色哟哟久久| 90打野战视频偷拍视频| 成年人黄色毛片网站| 丰满人妻熟妇乱又伦精品不卡| 国产免费一区二区三区四区乱码| 国产日韩欧美视频二区| 99国产极品粉嫩在线观看| 99精品欧美一区二区三区四区| 日韩人妻精品一区2区三区| 欧美黄色淫秽网站| 精品国产国语对白av| 啦啦啦啦在线视频资源| 午夜福利视频在线观看免费| 大香蕉久久网| 久久久久国内视频| 亚洲av男天堂| 日日夜夜操网爽| av免费在线观看网站| 日韩视频在线欧美| 免费女性裸体啪啪无遮挡网站| 精品久久久久久电影网| 中文字幕av电影在线播放| 婷婷色av中文字幕| 啦啦啦免费观看视频1| 成在线人永久免费视频| 免费在线观看黄色视频的| 精品国内亚洲2022精品成人 | 十八禁网站免费在线| 中国美女看黄片| √禁漫天堂资源中文www| 不卡av一区二区三区| 在线亚洲精品国产二区图片欧美| 高清视频免费观看一区二区| 黄色视频,在线免费观看| 欧美激情高清一区二区三区| 亚洲一码二码三码区别大吗| 大香蕉久久成人网| 亚洲人成电影免费在线| 亚洲欧洲精品一区二区精品久久久| 夜夜骑夜夜射夜夜干| 999精品在线视频| 人妻 亚洲 视频| 美女大奶头黄色视频| 久久这里只有精品19| 免费一级毛片在线播放高清视频 | 亚洲天堂av无毛| 夜夜夜夜夜久久久久| 国精品久久久久久国模美| 在线观看www视频免费| 久久亚洲国产成人精品v| 免费看十八禁软件| 爱豆传媒免费全集在线观看| netflix在线观看网站| 亚洲全国av大片| 高清视频免费观看一区二区| 十八禁人妻一区二区| www.精华液| 欧美激情久久久久久爽电影 | 十分钟在线观看高清视频www| 免费在线观看日本一区| 一区二区三区激情视频| 宅男免费午夜| 国产成人影院久久av| 免费久久久久久久精品成人欧美视频| 不卡av一区二区三区| 日韩精品免费视频一区二区三区| 日韩视频一区二区在线观看| 日本vs欧美在线观看视频| 亚洲精品国产av成人精品| 国产日韩欧美亚洲二区| 91精品三级在线观看| 久久香蕉激情| 91精品国产国语对白视频| 男人舔女人的私密视频| 精品少妇黑人巨大在线播放| 天天操日日干夜夜撸| 日本vs欧美在线观看视频| 真人做人爱边吃奶动态| 老熟妇仑乱视频hdxx| 国产一区二区激情短视频 | 欧美精品啪啪一区二区三区 | 一个人免费在线观看的高清视频 | 免费在线观看日本一区| 飞空精品影院首页| 国产在线视频一区二区| 桃红色精品国产亚洲av| 黄色a级毛片大全视频| 日韩一区二区三区影片| 精品久久久久久电影网| 男女国产视频网站| 国产精品国产三级国产专区5o| 午夜福利一区二区在线看| 一区二区三区精品91| 制服人妻中文乱码| 亚洲成人免费电影在线观看| 在线精品无人区一区二区三| 69av精品久久久久久 | 国产精品秋霞免费鲁丝片| 真人做人爱边吃奶动态| www.自偷自拍.com| 色94色欧美一区二区| 亚洲国产av新网站| 啦啦啦在线免费观看视频4| 欧美日韩精品网址| 国产91精品成人一区二区三区 | 狠狠狠狠99中文字幕| 桃花免费在线播放| 淫妇啪啪啪对白视频 | 日韩电影二区| 久久中文字幕一级| 成人国语在线视频| 国产成人a∨麻豆精品| 亚洲国产欧美日韩在线播放| 欧美变态另类bdsm刘玥| 国产福利在线免费观看视频| 欧美另类一区| 亚洲精品成人av观看孕妇| 亚洲精品久久成人aⅴ小说| 满18在线观看网站| 在线av久久热| 搡老熟女国产l中国老女人| 久久久国产欧美日韩av| 色94色欧美一区二区| 国产亚洲午夜精品一区二区久久| 成年人午夜在线观看视频| 国产主播在线观看一区二区| 免费观看av网站的网址| 国产成人免费观看mmmm| 丝袜美足系列| av天堂在线播放| 男女免费视频国产| 一本—道久久a久久精品蜜桃钙片| 人人妻人人添人人爽欧美一区卜| www.av在线官网国产| 亚洲成人免费av在线播放| 久久99一区二区三区| 多毛熟女@视频| 婷婷成人精品国产| 亚洲成av片中文字幕在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 色播在线永久视频| 亚洲第一av免费看| 超色免费av| 免费在线观看日本一区| 日韩欧美国产一区二区入口| 国产成人精品无人区| 国产成人av激情在线播放| 91字幕亚洲| 亚洲黑人精品在线| av天堂久久9| 亚洲 国产 在线| 久久久久久久久久久久大奶| 啦啦啦中文免费视频观看日本| 搡老岳熟女国产| 丝袜人妻中文字幕| av在线播放精品| 欧美精品高潮呻吟av久久| av超薄肉色丝袜交足视频| 脱女人内裤的视频| 亚洲少妇的诱惑av| 51午夜福利影视在线观看| 国产人伦9x9x在线观看| 免费在线观看影片大全网站| 天堂中文最新版在线下载| 欧美另类一区| www.自偷自拍.com| 欧美亚洲 丝袜 人妻 在线| 亚洲 欧美一区二区三区| 亚洲少妇的诱惑av| 18在线观看网站| 精品久久久精品久久久| 久久毛片免费看一区二区三区| av福利片在线| 丰满少妇做爰视频| 在线观看免费视频网站a站| 大香蕉久久成人网| 欧美性长视频在线观看| 啦啦啦 在线观看视频| 国产成人啪精品午夜网站| 999久久久国产精品视频| 69av精品久久久久久 | www.熟女人妻精品国产| av在线老鸭窝| 一级,二级,三级黄色视频| 无限看片的www在线观看| 久久亚洲精品不卡| 成人国产av品久久久| 国产成人免费无遮挡视频| 欧美+亚洲+日韩+国产| 亚洲精品自拍成人| 黑人操中国人逼视频| a级片在线免费高清观看视频| 国产极品粉嫩免费观看在线| 亚洲精品第二区| 在线看a的网站| 国产99久久九九免费精品| 成年动漫av网址| 亚洲av男天堂| 免费在线观看影片大全网站| 国产福利在线免费观看视频| 黄色怎么调成土黄色| 国产xxxxx性猛交| 中文字幕人妻熟女乱码| 国产精品免费视频内射| 亚洲欧美一区二区三区黑人| 国产精品秋霞免费鲁丝片| 狂野欧美激情性bbbbbb| 久久青草综合色| 亚洲精品国产区一区二| 精品免费久久久久久久清纯 | 久久久水蜜桃国产精品网| 国产激情久久老熟女| 国产日韩欧美亚洲二区| 后天国语完整版免费观看| 老司机深夜福利视频在线观看 | av一本久久久久| 精品人妻1区二区| 青草久久国产| 在线 av 中文字幕| 国内毛片毛片毛片毛片毛片| av天堂久久9| 免费黄频网站在线观看国产| 亚洲天堂av无毛| 一边摸一边抽搐一进一出视频| 国产精品一区二区在线观看99| 国产高清videossex| 国产精品久久久av美女十八| 国产麻豆69| 亚洲国产成人一精品久久久| 亚洲激情五月婷婷啪啪| 一本大道久久a久久精品| 大香蕉久久网| 青春草亚洲视频在线观看| 亚洲精品久久成人aⅴ小说| 久久久久视频综合| 欧美 日韩 精品 国产| 美女大奶头黄色视频| 无限看片的www在线观看| 岛国毛片在线播放| 久久影院123| 少妇被粗大的猛进出69影院| 日韩大片免费观看网站| 少妇粗大呻吟视频| 大香蕉久久成人网| 欧美国产精品va在线观看不卡| 免费高清在线观看日韩| 黄色a级毛片大全视频| 另类亚洲欧美激情| 狂野欧美激情性xxxx| 男女午夜视频在线观看| 波多野结衣一区麻豆| 国产精品久久久久久精品古装| 汤姆久久久久久久影院中文字幕| 搡老熟女国产l中国老女人| 女性生殖器流出的白浆| av在线播放精品| 99精品欧美一区二区三区四区| 久久午夜综合久久蜜桃| 在线观看免费视频网站a站| 欧美黄色淫秽网站| 精品人妻1区二区| 丰满迷人的少妇在线观看| 老熟女久久久| 中文字幕人妻熟女乱码| 女人被躁到高潮嗷嗷叫费观| 国产成人影院久久av| 97人妻天天添夜夜摸| 纵有疾风起免费观看全集完整版| 色播在线永久视频| 亚洲av日韩精品久久久久久密| 日日摸夜夜添夜夜添小说| 亚洲久久久国产精品| 国产高清videossex| 啦啦啦免费观看视频1| 最新在线观看一区二区三区| 伊人久久大香线蕉亚洲五| 日韩有码中文字幕| 中文字幕制服av| 日韩有码中文字幕| 12—13女人毛片做爰片一| 黄片大片在线免费观看| 欧美成人午夜精品| 天堂中文最新版在线下载| 欧美人与性动交α欧美软件| 午夜福利免费观看在线| 亚洲成人手机| 欧美激情极品国产一区二区三区| 国产99久久九九免费精品| 黄色视频不卡| 丁香六月欧美| 岛国毛片在线播放| 日日爽夜夜爽网站| 五月开心婷婷网| 真人做人爱边吃奶动态| 成年人免费黄色播放视频| 亚洲情色 制服丝袜| 日本精品一区二区三区蜜桃| 黄色怎么调成土黄色| 欧美日本中文国产一区发布| 青春草亚洲视频在线观看| 1024香蕉在线观看| 亚洲av电影在线观看一区二区三区| 国产精品国产av在线观看| 一边摸一边抽搐一进一出视频| 色94色欧美一区二区| 精品卡一卡二卡四卡免费| 美女脱内裤让男人舔精品视频| 日韩免费高清中文字幕av| 国产亚洲精品久久久久5区| 亚洲va日本ⅴa欧美va伊人久久 | 一进一出抽搐动态| 午夜视频精品福利| 一进一出抽搐动态| 动漫黄色视频在线观看| 欧美成狂野欧美在线观看| 一级黄色大片毛片| 亚洲人成电影观看| 999久久久精品免费观看国产| 人成视频在线观看免费观看| 亚洲午夜精品一区,二区,三区| 成年美女黄网站色视频大全免费| 精品久久久精品久久久| 久久精品国产亚洲av高清一级| 水蜜桃什么品种好| 久久久久国内视频| 精品国产超薄肉色丝袜足j| 中文欧美无线码| 黑人巨大精品欧美一区二区mp4| 国产精品偷伦视频观看了| 不卡一级毛片| 99精品久久久久人妻精品| 亚洲全国av大片| 久久这里只有精品19| 国产野战对白在线观看| 亚洲伊人久久精品综合| 人人妻,人人澡人人爽秒播| 极品人妻少妇av视频| av天堂在线播放| 各种免费的搞黄视频| 久久久精品免费免费高清| 亚洲欧洲日产国产| 一区福利在线观看| 亚洲欧洲精品一区二区精品久久久| 美女高潮喷水抽搐中文字幕| 啦啦啦中文免费视频观看日本| 日韩熟女老妇一区二区性免费视频| 日本av手机在线免费观看| 国产三级黄色录像| 天天躁日日躁夜夜躁夜夜| 男女之事视频高清在线观看| 美女国产高潮福利片在线看| 这个男人来自地球电影免费观看| 韩国高清视频一区二区三区| 最黄视频免费看| 男女午夜视频在线观看| 91麻豆av在线| 亚洲成人国产一区在线观看| av国产精品久久久久影院| 精品国产一区二区三区久久久樱花| 在线 av 中文字幕| 丝袜人妻中文字幕| 老熟妇仑乱视频hdxx|